ZyXEL Communications VMG8324B10A Wireless N VDSL2 VoIP Combo WAN Gigabit IAD User Manual VMG8324 B10A UserMan 2 2013 12 09

ZyXEL Communications Corporation Wireless N VDSL2 VoIP Combo WAN Gigabit IAD VMG8324 B10A UserMan 2 2013 12 09

Contents

(VMG8324-B10A)UserMan(2) 2013-12-09

Download: ZyXEL Communications VMG8324B10A Wireless N VDSL2 VoIP Combo WAN Gigabit IAD User Manual  VMG8324 B10A UserMan 2  2013 12 09
Mirror Download [FCC.gov]ZyXEL Communications VMG8324B10A Wireless N VDSL2 VoIP Combo WAN Gigabit IAD User Manual  VMG8324 B10A UserMan 2  2013 12 09
Document ID2137566
Application IDoGppsElbkIw3JBj+nhhX5g==
Document Description(VMG8324-B10A)UserMan(2) 2013-12-09
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize271.64kB (3395517 bits)
Date Submitted2013-12-10 00:00:00
Date Available2013-12-13 00:00:00
Creation Date2017-10-24 18:35:41
Producing SoftwareGPL Ghostscript 9.18
Document Lastmod2017-10-24 18:35:41
Document Title(VMG8324-B10A)UserMan(2) 2013-12-09
Document CreatorFrameMaker 9.0

C HAPTER
17
Parental Control
17.1 Overview
Parent al cont rol allows you t o block web sit es wit h t he specific URL. You can also define t im e
periods and days during which t he Device perform s parent al cont rol on a specific user.
17.2 The Parental Control Screen
Use t his screen t o enable parent al cont rol, view t he parent al cont rol rules and schedules.
Click Se cur it y > Pa r e nt a l Cont r ol t o open t he following screen.
Figure 124 Securit y > Parent al Cont rol
The following t able describes t he fields in t his screen.
Table 93 Securit y > Parent al Cont rol
LABEL
DESCRIPTION
Parent al
Cont rol
Select En a ble t o act ivat e parent al cont rol.
Add new PCP
Click t his if you want t o configure a new parent al cont rol rule.
This shows t he index num ber of t he rule.
St at us
This indicat es whet her t he rule is act ive or not .
A yellow bulb signifies t hat t his rule is act ive. A gray bulb signifies t hat t his rule is not act ive.
PCP Nam e
This shows t he nam e of t he rule.
Hom e Net work
User ( MAC)
This shows t he MAC address of t he LAN user ’s com put er t o which t his rule applies.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
207
Chapter 17 Parental Control
Table 93 Securit y > Parent al Cont rol ( cont inued)
LABEL
DESCRIPTION
I nt ernet Access
Schedule
This shows t he day( s) and t im e on which parent al cont rol is enabled.
Net work
Service
This shows whet her t he net work service is configured. I f not , N on e will be shown.
Websit e Block
This shows whet her t he websit e block is configured. I f not , N on e will be shown.
Modify
Click t he Edit icon t o go t o t he screen where you can edit t he rule.
Click t he D e le t e icon t o delet e an exist ing rule.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
17.2.1 Add/Edit a Parental Control Rule
Click Add n e w PCP in t he Pa r e nt a l Cont r ol screen t o add a new rule or click t he Edit icon next t o
an exist ing rule t o edit it . Use t his screen t o configure a rest rict ed access schedule and/ or URL
filt ering set t ings t o block t he users on your net work from accessing cert ain web sit es.
Figure 125 Parent al Cont rol Rule: Add/ Edit
208
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 17 Parental Control
The following t able describes t he fields in t his screen.
Table 94 Parent al Cont rol Rule: Add/ Edit
LABEL
DESCRIPTION
General
Act ive
Select t he checkbox t o act ivat e t his parent al cont rol rule.
Parent al
Cont rol Profile
Nam e
Ent er a descript ive nam e for t he rule.
Hom e Net work
User
Select t he LAN user t hat you want t o apply t his rule t o from t he drop- down list box. I f you
select Cu st om , ent er t he LAN user ’s MAC address. I f you select All, t he rule applies t o all
LAN users.
I nt ernet Access Schedule
Day
Select check boxes for t he days t hat you want t he Device t o perform parent al cont rol.
Tim e
Drag t he t im e bar t o define t he t im e t hat t he LAN user is allowed access.
Net work Service
Net work
Service Set t ing
I f you select Block , t he Device prohibit s t he users from viewing t he Web sit es wit h t he URLs
list ed below.
I f you select Allow , t he Device blocks access t o all URLs except ones list ed below.
Add new
service
Click t his t o show a screen in which you can add a new service rule. You can configure t he
Se r vice N a m e , Pr ot ocol, and N a m e of t he new rule.
This shows t he index num ber of t he rule. Select t he checkbox next t o t he rule t o act ivat e it .
Service Nam e
This shows t he nam e of t he rule.
Prot ocol: Port
This shows t he prot ocol and t he port of t he rule.
Modify
Click t he Edit icon t o go t o t he screen where you can edit t he rule.
Click t he D e le t e icon t o delet e an exist ing rule.
Blocked Sit e/
URL Keyword
Click Add t o show a screen t o ent er t he URL of web sit e or URL keyword t o which t he Device
blocks access. Click D e le t e t o rem ove it .
Apply
Click t his but t on t o save your set t ings back t o t he Device.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
209
Chapter 17 Parental Control
210
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
18
Scheduler Rule
18.1 Overview
You can define t im e periods and days during which t he Device perform s scheduled rules of cert ain
feat ures ( such as Firewall Access Cont rol) in the Scheduler Rule screen.
18.2 The Scheduler Rule Screen
Use t his screen t o view, add, or edit t im e schedule rules.
Click Se cur it y > Sche dule r Rule t o open t he following screen.
Figure 126 Securit y > Scheduler Rule
The following t able describes t he fields in t his screen.
Table 95 Securit y > Scheduler Rule
LABEL
DESCRIPTION
Add new rule
Click t his t o creat e a new rule.
This is t he index num ber of t he ent ry.
Rule Nam e
This shows t he nam e of t he rule.
Day
This shows t he day( s) on which t his rule is enabled.
Tim e
This shows t he period of t im e on which t his rule is enabled.
Descript ion
This shows t he descript ion of t his rule.
Modify
Click t he Edit icon t o edit t he schedule.
Click t he D e le t e icon t o delet e a scheduler rule.
Note: You cannot delete a scheduler rule once it is applied to a certain feature.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
211
Chapter 18 Scheduler Rule
18.2.1 Add/Edit a Schedule
Click t he Add but t on in t he Sche dule r Rule screen or click t he Edit icon next t o a schedule rule t o
open t he following screen. Use t his screen t o configure a rest rict ed access schedule.
Figure 127 Scheduler Rule: Add/ Edit
The following t able describes t he fields in t his screen.
Table 96 Scheduler Rule: Add/ Edit
212
LABEL
DESCRIPTION
Rule Nam e
Ent er a nam e ( up t o 31 print able English keyboard charact ers, not including spaces) for t his
schedule.
Day
Select check boxes for t he days t hat you want t he Device t o perform t his scheduler rule.
Tim e if Day
Range
Ent er t he t im e period of each day, in 24- hour form at , during which t he rule will be enforced.
Descript ion
Ent er a descript ion for t his scheduler rule.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
19
Certificates
19.1 Overview
The Device can use cert ificat es ( also called digit al I Ds) t o aut hent icat e users. Cert ificat es are based
on public- privat e key pairs. A cert ificat e cont ains t he cert ificat e owner ’s ident it y and public key.
Cert ificat es provide a way t o exchange public keys for use in aut hent icat ion.
19.1.1 What You Can Do in this Chapter
• The Loca l Ce r t ifica t e s screen let s you generat e cert ificat ion request s and im port t he Device's
CA- signed cert ificat es ( Sect ion 19.4 on page 216) .
• The Tr u st e d CA screen let s you save t he cert ificat es of t rust ed CAs t o t he Device ( Sect ion 19.4
on page 216) .
19.2 What You Need to Know
The following t erm s and concept s m ay help as you read t hrough t his chapt er.
Certification Authority
A Cert ificat ion Aut horit y ( CA) issues cert ificat es and guarant ees t he ident it y of each cert ificat e
owner. There are com m ercial cert ificat ion aut horit ies like CyberTrust or VeriSign and governm ent
cert ificat ion aut horit ies. The cert ificat ion aut horit y uses it s privat e key t o sign cert ificat es. Anyone
can t hen use t he cert ificat ion aut horit y's public key t o verify t he cert ificat es. You can use t he Device
t o generat e cert ificat ion request s t hat cont ain ident ifying inform at ion and public keys and t hen send
t he cert ificat ion request s t o a cert ificat ion aut horit y.
19.3 The Local Certificates Screen
Click Se cur it y > Ce r t ifica t e s t o open t he Loca l Ce r t ifica t e s screen. This is t he Device’s sum m ary
list of cert ificat es and cert ificat ion request s.
Figure 128 Securit y > Cert ificat es > Local Cert ificat es
VMG8324-B10A / VMG8324-B30A Series User’s Guide
213
Chapter 19 Certificates
The following t able describes t he labels in t his screen.
Table 97 Securit y > Cert ificat es > Local Cert ificat es
LABEL
DESCRIPTION
Privat e Key is
prot ect ed by a
password
Select t he checkbox and ent er t he privat e key int o t he t ext box t o st ore it on t he Device.
The privat e key should not exceed 63 ASCI I charact ers ( not including spaces) .
Browse...
Click t his t o find t he cert ificat e file you want t o upload.
I m port Cert ificat e
Click t his but t on t o save t he cert ificat e t hat you have enrolled from a cert ificat ion
aut horit y from your com put er t o t he Device.
Creat e Cert ificat e
Request
Click t his but t on t o go t o t he screen where you can have t he Device generat e a
cert ificat ion request .
Current File
This field displays t he nam e used t o ident ify t his cert ificat e. I t is recom m ended t hat you
give each cert ificat e a unique nam e.
Subj ect
This field displays ident ifying inform at ion about t he cert ificat e’s owner, such as CN
( Com m on Nam e) , OU ( Organizat ional Unit or depart m ent ) , O ( Organizat ion or com pany)
and C ( Count ry) . I t is recom m ended t hat each cert ificat e have unique subj ect
inform at ion.
I ssuer
This field displays ident ifying inform at ion about t he cert ificat e’s issuing cert ificat ion
aut horit y, such as a com m on nam e, organizat ional unit or depart m ent , organizat ion or
com pany and count ry.
Valid From
This field displays t he dat e t hat t he cert ificat e becom es applicable. The t ext displays in
red and includes a N ot Ye t V a lid! m essage if t he cert ificat e has not yet becom e
applicable.
Valid To
This field displays t he dat e t hat t he cert ificat e expires. The t ext displays in red and
includes an Ex pir in g! or Ex pir e d! m essage if t he cert ificat e is about t o expire or has
already expired.
Modify
Click t he V ie w icon t o open a screen wit h an in- dept h list of inform at ion about t he
cert ificat e ( or cert ificat ion request ) .
For a cert ificat ion request , click Loa d Sign e d t o im port t he signed cert ificat e.
Click t he Re m ove icon t o delet e t he cert ificat e ( or cert ificat ion request ) . You cannot
delet e a cert ificat e t hat one or m ore feat ures is configured t o use.
19.3.1 Create Certificate Request
Click Se cur it y > Ce r t ifica t e s > Loca l Ce r t ifica t e s and t hen Cr e a t e Ce r t ifica t e Re que st t o
open t he following screen. Use t his screen t o have t he Device generat e a cert ificat ion request .
Figure 129 Creat e Cert ificat e Request
214
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 19 Certificates
The following t able describes t he labels in t his screen.
Table 98 Creat e Cert ificat e Request
LABEL
DESCRIPTION
Cert ificat e
Nam e
Type up t o 63 ASCI I charact ers ( not including spaces) t o ident ify t his cert ificat e.
Com m on Nam e
Select Au t o t o have t he Device configure t his field aut om at ically. Or select Cu st om ize t o
ent er it m anually.
Type t he I P address ( in dot t ed decim al not at ion) , dom ain nam e or e- m ail address in t he
field provided. The dom ain nam e or e- m ail address can be up t o 63 ASCI I charact ers. The
dom ain nam e or e- m ail address is for ident ificat ion purposes only and can be any st ring.
Organizat ion
Nam e
Type up t o 63 charact ers t o ident ify t he com pany or group t o which t he cert ificat e owner
belongs. You m ay use any charact er, including spaces, but t he Device drops t railing spaces.
St at e/ Province
Nam e
Type up t o 32 charact ers t o ident ify t he st ate or province where t he cert ificat e owner is
locat ed. You m ay use any charact er, including spaces, but t he Device drops t railing spaces.
Count ry/ Region
Nam e
Select a count ry t o ident ify t he nat ion where t he cert ificat e owner is locat ed.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
Aft er you click Apply, t he following screen displays t o not ify you t hat you need t o get t he cert ificat e
request signed by a Cert ificat e Aut horit y. I f you already have, click Loa d_ Signe d t o im port t he
signed cert ificat e int o t he Device. Ot herwise click Ba ck t o ret urn t o t he Loca l Ce r t ifica t e s screen.
Figure 130 Cert ificat e Request Creat ed
19.3.2 Load Signed Certificate
Aft er you creat e a cert ificat e request and have it signed by a Cert ificat e Aut horit y, in t he Loca l
Ce r t ifica t e s screen click t he cert ificat e request ’s Loa d Sign e d icon t o im port t he signed cert ificat e
int o t he Device.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
215
Chapter 19 Certificates
Not e: You m ust rem ove any spaces from t he cert ificat e’s filenam e before you can im port
it .
Figure 131 Load Signed Cert ificat e
The following t able describes t he labels in t his screen.
Table 99 Load Signed Cert ificat e
LABEL
DESCRIPTION
Cert ificat e
Nam e
This is t he nam e of t he signed cert ificat e.
Cert ificat e
Copy and past e t he signed cert ificat e int o t he t ext box t o st ore it on t he Device.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
19.4 The Trusted CA Screen
Click Se cur it y > Ce r t ifica t e s > Tr u st e d CA t o open t he following screen. This screen displays a
sum m ary list of cert ificat es of t he cert ificat ion aut horit ies t hat you have set t he Device t o accept as
t rust ed. The Device accept s any valid cert ificat e signed by a cert ificat ion aut horit y on t his list as
216
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 19 Certificates
being t rust wort hy; t hus you do not need t o im port any cert ificat e t hat is signed by one of t hese
cert ificat ion aut horit ies.
Figure 132 Securit y > Cert ificat es > Trust ed CA
The following t able describes t he fields in t his screen.
Table 100 Securit y > Cert ificat es > Trust ed CA
LABEL
DESCRIPTION
I m port
Cert ificat e
Click t his but t on t o open a screen where you can save t he cert ificat e of a cert ificat ion
aut horit y t hat you t rust t o t he Device.
This is t he index num ber of t he ent ry.
Nam e
This field displays t he nam e used t o ident ify t his cert ificat e.
Subj ect
This field displays inform at ion t hat ident ifies t he owner of t he cert ificat e, such as Com m on
Nam e ( CN) , OU ( Organizat ional Unit or depart m ent ) , Organizat ion ( O) , St at e ( ST) and
Count ry ( C) . I t is recom m ended t hat each cert ificat e have unique subj ect inform at ion.
Type
This field displays general inform at ion about t he cert ificat e. ca m eans t hat a Cert ificat ion
Aut horit y signed t he cert ificat e.
Modify
Click t he Vie w icon t o open a screen wit h an in- dept h list of inform at ion about t he
cert ificat e ( or cert ificat ion request ) .
Click t he Re m ove but t on t o delet e t he cert ificat e ( or cert ificat ion request ) . You cannot
delet e a cert ificat e t hat one or m ore feat ures is configured t o use.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
217
Chapter 19 Certificates
19.4.1 View Trusted CA Certificate
Click t he Vie w icon in t he Tr u st e d CA screen t o open t he following screen. Use t his screen t o view
in- dept h inform at ion about t he cert ificat ion aut horit y’s cert ificat e.
Figure 133 Trust ed CA: View
The following t able describes t he fields in t his screen.
Table 101 Trust ed CA: View
LABEL
DESCRIPTION
Nam e
This field displays t he ident ifying nam e of t his cert ificat e.
Type
This field displays general inform at ion about t he cert ificat e. ca m eans t hat a Cert ificat ion
Aut horit y signed t he cert ificat e.
Subj ect
This field displays inform at ion t hat ident ifies t he owner of t he cert ificat e, such as Com m on
Nam e ( CN) , Organizat ional Unit ( OU) , Organizat ion ( O) and Count ry ( C) .
Cert ificat e
This read- only t ext box displays t he cert ificat e in Privacy Enhanced Mail ( PEM) form at . PEM
uses base 64 t o convert t he binary cert ificat e int o a print able form .
You can copy and past e t he cert ificat e int o an e- m ail t o send t o friends or colleagues or you
can copy and past e t he cert ificat e int o a t ext edit or and save t he file on a m anagem ent
com put er for lat er dist ribut ion ( via floppy disk for exam ple) .
Back
218
Click Ba ck t o ret urn t o t he previous screen.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 19 Certificates
19.4.2 Import Trusted CA Certificate
Click t he I m por t Ce r t ifica t e but t on in t he Tr ust e d CA screen t o open t he following screen. The
Device t rust s any valid cert ificat e signed by any of t he im port ed t rust ed CA cert ificat es.
Figure 134 Trust ed CA: I m port Cert ificat e
The following t able describes t he fields in t his screen.
Table 102 Trust ed CA: I m port Cert ificat e
LABEL
DESCRIPTION
Cert ificat e File
Pat h
Type in t he locat ion of t he cert ificat e you want t o upload in t his field or click Br ow se ... t o
find it .
Enable Trust ed
CA for 802.1x
Aut hent icat ion
I f you select t his checkbox, t he t rust ed CA will be used for 802.1x aut hent icat ion. The
select ed t rust ed CA will be displayed in t he N e t w or k Se t t in g > Br oa dba n d > 8 0 2 .1 x :
Edit screen.
Cert ificat e
Copy and past e t he cert ificat e int o t he t ext box t o st ore it on t he Device.
OK
Click OK t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
219
Chapter 19 Certificates
220
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
20
VPN
20.1 Overview
A virt ual privat e net work ( VPN) provides secure com m unicat ions over t he t he I nt ernet . I nt ernet
Prot ocol Securit y ( I PSec) is a st andards- based VPN t hat provides confident ialit y, dat a int egrit y, and
aut hent icat ion. This chapt er shows you how t o configure t he Device’s VPN set t ings.
20.2 The IPSec VPN General Screen
Use t his screen t o view and m anage your VPN t unnel policies. The following figure helps explain t he
m ain fields in t he web configurat or.
Figure 135 I PSec Fields Sum m ary
Remote Network
Local Network
VPN Tunnel
Click Se cur it y > I PSe c VPN t o open t his screen as shown next .
Figure 136 Securit y > I PSec VPN
VMG8324-B10A / VMG8324-B30A Series User’s Guide
221
Chapter 20 VPN
This screen cont ains t he following fields:
Table 103 Securit y > I PSec VPN
LABEL
DESCRIPTION
Add New
Connect ion
Click t his but t on t o add an it em t o t he list .
This displays t he index num ber of an ent ry.
St at us
This displays whet her t he VPN policy is enabled ( En a ble ) or not ( D isa ble ) .
Connect ion Nam e
The nam e of t he VPN policy.
Rem ot e Gat eway
This is t he I P address of t he rem ot e I PSec rout er in t he I KE SA.
Local Addresses
This displays t he I P address( es) on t he LAN behind your Device.
Rem ot e
Addresses
This displays t he I P address( es) on t he LAN behind t he rem ot e I PSec’s rout er.
Delet e
Click t he Edit icon t o m odify t he VPN policy.
Click t he D e le t e icon t o delet e t he VPN policy.
20.3 The IPSec VPN Add/Edit Screen
Use t hese set t ings t o add or edit VPN policies. Click t he Add N e w Conne ct ion but t on in t he
Se cur it y > VPN screen t o open t his screen as shown next .
222
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Figure 137 Securit y > I PSec VPN: Add/ Edit
This screen cont ains t he following fields:
Table 104 Securit y > I PSec VPN: Add/ Edit
LABEL
DESCRIPTION
Act ive
Select t his t o act ivat e t his VPN policy.
I PSec Connect ion
Nam e
Ent er t he nam e of t he VPN policy.
Rem ot e I PSec
Gat eway Address
Ent er t he I P address of t he rem ot e I PSec rout er in t he I KE SA.
Tunnel access
from local I P
addresses
Select Sin gle Addr e ss t o have only one local LAN I P address use t he VPN t unnel. Select
Su bn e t t o specify local LAN I P addresses by t heir subnet m ask.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
223
Chapter 20 VPN
Table 104 Securit y > I PSec VPN: Add/ Edit
LABEL
DESCRIPTION
I P Address for
VPN
I f Single Addr e ss is select ed, ent er a ( st at ic) I P address on t he LAN behind your Device.
I f Su bn e t is select ed, specify I P addresses on a net work by t heir subnet m ask by ent ering
a ( st at ic) I P address on t he LAN behind your Device. Then ent er t he subnet m ask t o
ident ify t he net work address.
I P Subnet m ask
I f Su bn e t is select ed, ent er t he subnet m ask t o ident ify t he net work address.
Tunnel access
from rem ot e I P
addresses
Select Sin gle Addr e ss t o have only one rem ot e LAN I P address use t he VPN t unnel.
Select Subne t t o specify rem ot e LAN I P addresses by t heir subnet m ask.
I P Address for
VPN
I f Sin gle Addr e ss is select ed, ent er a ( st at ic) I P address on t he LAN behind t he rem ot e
I PSec’s rout er.
I f Su bn e t is select ed, specify I P addresses on a net work by t heir subnet m ask by ent ering
a ( st at ic) I P address on t he LAN behind t he rem ot e I PSec’s rout er. Then ent er t he subnet
m ask t o ident ify t he net work address.
I P Subnet m ask
I f Su bn e t is select ed, ent er t he subnet m ask t o ident ify t he net work address.
Prot ocol
Select which prot ocol you want t o use in t he I PSec SA. Choices are:
AH ( RFC 2402) - provides int egrit y, aut hent icat ion, sequence int egrit y ( replay
resist ance) , and non- repudiat ion but not encrypt ion. I f you select AH , you m ust select an
I n t e gr a t y Algor it hm .
ESP ( RFC 2406) - provides encrypt ion and t he sam e services offered by AH , but it s
aut hent icat ion is weaker. I f you select ESP, you m ust select an Encr ypt ion Agor it h m
and I n t e gr a t y Algor it h m .
Bot h AH and ESP increase processing requirem ent s and lat ency ( delay) . The Device and
rem ot e I PSec rout er m ust use t he sam e act ive prot ocol.
Key Exchange
Met hod
Select t he key exchange m et hod:
Au t o( I KE) - Select t his t o use aut om at ic I KE key m anagem ent VPN connect ion policy.
M a n u a l - Select t his opt ion t o configure a VPN connect ion policy t hat uses a m anual key
inst ead of I KE key m anagem ent . This m ay be useful if you have problem s wit h I KE key
m anagem ent .
Note: Only use manual key as a temporary solution, because it is not as secure as a regular
IPSec SA.
Aut hent icat ion
Met hod
Select Pr e - Sh a r e d Ke y t o use a pre- shared key for aut hent icat ion, and t ype in your preshared key. A pre- shared key ident ifies a com m unicat ing part y during a phase 1 I KE
negot iat ion. I t is called " pre- shared" because you have t o share it wit h anot her part y
before you can com m unicat e wit h t hem over a secure connect ion.
Select Ce r t ifica t e ( X .5 0 9 ) t o use a cert ificat e for aut hent icat ion.
Pre- Shared Key
Type your pre- shared key in t his field. A pre- shared key ident ifies a com m unicat ing part y
during a phase 1 I KE negot iat ion.
Type from 8 t o 31 case- sensit ive ASCI I charact ers or from 16 t o 62 hexadecim al ( " 0- 9" ,
" A- F" ) charact ers. You m ust precede a hexadecim al key wit h a " 0x” ( zero x) , which is not
count ed as part of t he 16 t o 62 charact er range for t he key. For exam ple, in
" 0x0123456789ABCDEF" , “ 0x” denot es t hat t he key is hexadecim al and
“ 0123456789ABCDEF” is t he key it self.
Local I D Type
Select I P t o ident ify t he Device by it s I P address.
Select E- m a il t o ident ify t his Device by an e- m ail address.
Select D N S t o ident ify t his Device by a dom ain nam e.
Select ASN 1 D N ( Abst ract Synt ax Not at ion one - Dist inguished Nam e) t o t his Device by
t he subj ect field in a cert ificat e. This is used only wit h cert ificat e- based aut hent icat ion.
224
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Table 104 Securit y > I PSec VPN: Add/ Edit
LABEL
DESCRIPTION
Local I D Cont ent
When you select I P in t he Loca l I D Type field, t ype t he I P address of your com put er in
t his field. I f you configure t his field t o 0.0.0.0 or leave it blank, t he Device aut om at ically
uses t he Pr e - Sh a r e d Ke y ( refer t o t he Pr e - Sh a r e d Ke y field descript ion) .
I t is recom m ended t hat you t ype an I P address ot her t han 0.0.0.0 in t his field or use t he
D N S or E- m a il t ype in t he following sit uat ions.
•
•
When t here is a NAT rout er bet ween t he t wo I PSec rout ers.
When you want t he rem ot e I PSec rout er t o be able t o dist inguish bet ween VPN
connect ion request s t hat com e in from I PSec rout ers wit h dynam ic WAN I P addresses.
When you select D N S or E- m a il in t he Loca l I D Type field, t ype a dom ain nam e or em ail address by which t o ident ify t his Device in t his field. Use up t o 31 ASCI I charact ers
including spaces, alt hough t railing spaces are t runcat ed. The dom ain nam e or e- m ail
address is for ident ificat ion purposes only and can be any st ring.
Rem ot e I D Type
Select I P t o ident ify t he rem ot e I PSec rout er by it s I P address.
Select E- m a il t o ident ify t he rem ot e I PSec rout er by an e- m ail address.
Select D N S t o ident ify t he rem ot e I PSec rout er by a dom ain nam e.
Select ASN 1 D N t o ident ify t he rem ot e I PSec rout er by t he subj ect field in a cert ificat e.
This is used only wit h cert ificat e- based aut hent icat ion.
Rem ot e I D
Cont ent
The configurat ion of t he rem ot e cont ent depends on t he rem ot e I D t ype.
For I P, t ype t he I P address of t he com put er wit h which you will m ake t he VPN connect ion.
I f you configure t his field t o 0.0.0.0 or leave it blank, t he Device will use t he address in
t he Re m ot e I PSe c Ga t e w a y Addr e ss field ( refer t o t he Re m ot e I PSe c Ga t e w a y
Addr e ss field descript ion) .
For D N S or E- m a il, t ype a dom ain nam e or e- m ail address by which t o ident ify t he
rem ot e I PSec rout er. Use up t o 31 ASCI I charact ers including spaces, alt hough t railing
spaces are t runcat ed. The dom ain nam e or e- m ail address is for ident ificat ion purposes
only and can be any st ring.
I t is recom m ended t hat you t ype an I P address ot her t han 0.0.0.0 or use t he D N S or Em a il I D t ype in t he following sit uat ions:
•
•
When t here is a NAT rout er bet ween t he t wo I PSec rout ers.
When you want t he Device t o dist inguish bet ween VPN connect ion request s t hat com e
in from rem ot e I PSec rout ers wit h dynam ic WAN I P addresses.
Advanced I KE
Set t ings
Click m or e t o display advanced set t ings. Click le ss t o display basic set t ings only.
NAT_Traversal
Select En a ble if you want t o set up a VPN t unnel when t here are NAT rout ers bet ween t he
Device and rem ot e I PSec rout er. The rem ot e I PSec rout er m ust also enable NAT t raversal,
and t he NAT rout ers have t o forward UDP port 500 packet s t o t he rem ot e I PSec rout er
behind t he NAT rout er. Ot herwise, select D isa ble .
Phase 1
Mode
Select t he negot iat ion m ode t o use t o negot iat e t he I KE SA. Choices are:
M a in - t his encrypt s t he Device’s and rem ot e I PSec rout er ’s ident it ies but t akes m ore
t im e t o est ablish t he I KE SA.
Aggr e ssive - t his is fast er but does not encrypt t he ident it ies.
The Device and t he rem ot e I PSec rout er m ust use t he sam e negot iat ion m ode.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
225
Chapter 20 VPN
Table 104 Securit y > I PSec VPN: Add/ Edit
LABEL
DESCRIPTION
Encrypt ion
Algorit hm
Select which key size and encrypt ion algorit hm t o use in t he I KE SA. Choices are:
D ES - a 56- bit key wit h t he DES encrypt ion algorit hm
3 D ES - a 168- bit key wit h t he DES encrypt ion algorit hm
AES - 1 2 8 - a 128- bit key wit h t he AES encrypt ion algorit hm
AES - 1 9 6 - a 196- bit key wit h t he AES encrypt ion algorit hm
AES - 2 5 6 - a 256- bit key wit h t he AES encrypt ion algorit hm
The Device and t he rem ot e I PSec rout er m ust use t he sam e key size and encrypt ion
algorit hm . Longer keys require m ore processing power, result ing in increased lat ency and
decreased t hroughput .
I nt egrit y
Algorit hm
Select which hash algorit hm t o use t o aut hent icat e packet dat a. Choices are M D 5 , SH A1 .
SH A is generally considered st ronger t han M D 5 , but it is also slower.
Select DiffieHellm an Group
for Key Exchange
Select which Diffie- Hellm an key group you want t o use for encrypt ion keys. Choices for
num ber of bit s in t he random num ber are: 768, 1024, 1536, 2048, 3072, 4096.
Key Life Tim e
Define t he lengt h of t im e before an I PSec SA aut om at ically renegot iat es in t his field.
The longer t he key, t he m ore secure t he encrypt ion, but also t he longer it t akes t o encrypt
and decrypt inform at ion. Bot h rout ers m ust use t he sam e DH key group.
A short SA Life Tim e increases securit y by forcing t he t wo VPN gat eways t o updat e t he
encrypt ion and aut hent icat ion keys. However, every t im e t he VPN t unnel renegot iat es, all
users accessing rem ot e resources are t em porarily disconnect ed.
Phase 2
Encrypt ion
Algorit hm
Select which key size and encrypt ion algorit hm t o use in t he I KE SA. Choices are:
D ES - a 56- bit key wit h t he DES encrypt ion algorit hm
3 D ES - a 168- bit key wit h t he DES encrypt ion algorit hm
AES - 1 2 8 - a 128- bit key wit h t he AES encrypt ion algorit hm
AES - 1 9 2 - a 196- bit key wit h t he AES encrypt ion algorit hm
AES - 2 5 6 - a 256- bit key wit h t he AES encrypt ion algorit hm
Select ESP_ N ULL t o set up a t unnel wit hout encrypt ion. When you select ESP_ N ULL,
you do not ent er an encrypt ion key.
The Device and t he rem ot e I PSec rout er m ust use t he sam e key size and encrypt ion
algorit hm . Longer keys require m ore processing power, result ing in increased lat ency and
decreased t hroughput .
I nt egrit y
Algorit hm
226
Select which hash algorit hm t o use t o aut hent icat e packet dat a. Choices are M D 5 and
SH A1 . SH A is generally considered st ronger t han M D 5 , but it is also slower.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Table 104 Securit y > I PSec VPN: Add/ Edit
LABEL
DESCRIPTION
Perfect Forward
Secrecy ( PFS)
Select whet her or not you want t o enable Perfect Forward Secrecy ( PFS)
PFS changes t he root key t hat is used t o generat e encrypt ion keys for each I PSec SA. The
longer t he key, t he m ore secure t he encrypt ion, but also t he longer it t akes t o encrypt and
decrypt inform at ion. Bot h rout ers m ust use t he sam e DH key group. Choices are:
N on e - do not use any random num ber.
7 6 8 bit ( D H Gr ou p1 ) - use a 768- bit random num ber
1 0 2 4 bit ( D H Gr ou p2 ) - use a 1024- bit random num ber
1 5 3 6 bit ( D H Gr ou p5 ) - use a 1536- bit random num ber
2 0 4 8 bit ( D H Gr ou p1 4 ) - use a 2048- bit random num ber
3 0 7 2 bit ( D H Gr ou p1 5 ) - use a 3072- bit random num ber
4 0 9 6 bit ( D H Gr ou p1 6 ) - use a 4096- bit random num ber
Key Life Tim e
Define t he lengt h of t im e before an I PSec SA aut om at ically renegot iat es in t his field.
A short SA Life Tim e increases securit y by forcing t he t wo VPN gat eways t o updat e t he
encrypt ion and aut hent icat ion keys. However, every t im e t he VPN t unnel renegot iat es, all
users accessing rem ot e resources are t em porarily disconnect ed.
The following fields are available if you select Manual in t he Key Exchange Met hod field.
Encrypt ion
Algorit hm
Select which key size and encrypt ion algorit hm t o use in t he I KE SA. Choices are:
D ES - a 56- bit key wit h t he DES encrypt ion algorit hm
3 D ES - a 168- bit key wit h t he DES encrypt ion algorit hm
EPS_ N ULL - no encrypt ion key or algorit hm
Encrypt ion
Key
This field is applicable when you select an Encrypt ion Algorit hm .
Ent er t he encrypt ion key, which depends on t he encrypt ion algorit hm .
D ES - t ype a unique key 16 hexadecim al charact ers long
3 D ES - t ype a unique key 48 hexadecim al charact ers long
Aut hent icat ion
Algorit hm
Select which hash algorit hm t o use t o aut hent icat e packet dat a. Choices are MD5, SHA1.
SHA is generally considered st ronger t han MD5, but it is also slower.
Aut hent icat ion
Key
Ent er t he aut hent icat ion key, which depends on t he aut hent icat ion algorit hm .
M D 5 - t ype a unique key 32 hexadecim al charact ers long
SH A1 - t ype a unique key 40 hexadecim al charact ers long
SPI
Type a unique SPI ( Securit y Param et er I ndex) in hexadecim al charact ers.
The SPI is used t o ident ify t he Device during aut hent icat ion.
The Device and rem ot e I PSec rout er m ust use t he sam e SPI .
OK
Click OK t o save your changes.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
227
Chapter 20 VPN
20.4 The IPSec VPN Monitor Screen
Use t his screen t o check your VPN t unnel’s current st at us. You can also m anually t rigger a VPN
t unnel t o t he rem ot e net work. Click Se cu r it y > I PSe c VPN > M on it or t o open t his screen as
shown next .
Figure 138 Securit y > I PSec VPN > Monit or
This screen cont ains t he following fields:
Table 105 Securit y > I PSec VPN > Monit or
LABEL
DESCRIPTION
Refresh I nt erval
Select how oft en you want t he Device t o updat e t his screen. Select N o Re fr e sh t o have
t he Device st op updat ing t he screen.
St at us
This displays a green line bet ween t wo host s if t he VPN t unnel has been est ablished
successfully. Ot herwise, it displays a red line in bet ween.
Connect ion Nam e
This displays t he nam e of t he VPN policy.
Rem ot e Gat eway
This is t he I P address of t he rem ot e I PSec rout er in t he I KE SA.
Local Addresses
This displays t he I P address( es) on t he LAN behind your Device.
Rem ot e
Addresses
This displays t he I P address( es) on t he LAN behind t he rem ot e I PSec rout er.
Act ion
Click Tr igge r t o est ablish a VPN connect ion wit h t he rem ot e net work.
20.5 Technical Reference
This sect ion provides som e t echnical background inform at ion about t he t opics covered in t his
sect ion.
20.5.1 IPSec Architecture
The overall I PSec archit ect ure is shown as follows.
228
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Figure 139 I PSec Archit ect ure
IPSec Algorithms
The ESP ( Encapsulat ing Securit y Payload) Prot ocol ( RFC 2406) and AH ( Aut hent icat ion Header)
prot ocol ( RFC 2402) describe t he packet form at s and t he default st andards for packet st ruct ure
( including im plem ent at ion algorit hm s) .
The Encrypt ion Algorit hm describes t he use of encrypt ion t echniques such as DES ( Dat a Encrypt ion
St andard) and Triple DES algorit hm s.
The Aut hent icat ion Algorit hm s, HMAC- MD5 ( RFC 2403) and HMAC- SHA- 1 ( RFC 2404, provide an
aut hent icat ion m echanism for t he AH and ESP prot ocols.
Key Management
Key m anagem ent allows you t o det erm ine whet her t o use I KE ( I SAKMP) or m anual key
configurat ion in order t o set up a VPN.
20.5.2 Encapsulation
The t wo m odes of operat ion for I PSec VPNs are Tr a n spor t m ode and Tunne l m ode. At t he t im e of
writ ing, t he Device support s Tun n e l m ode only.
Figure 140 Transport and Tunnel Mode I PSec Encapsulat ion
VMG8324-B10A / VMG8324-B30A Series User’s Guide
229
Chapter 20 VPN
Transport Mode
Tr a nspor t m ode is used t o prot ect upper layer prot ocols and only affect s t he dat a in t he I P packet .
I n Tr a n spor t m ode, t he I P packet cont ains t he securit y prot ocol ( AH or ESP) locat ed aft er t he
original I P header and opt ions, but before any upper layer prot ocols cont ained in t he packet ( such
as TCP and UDP) .
Wit h ESP, prot ect ion is applied only t o t he upper layer prot ocols cont ained in t he packet . The I P
header inform at ion and opt ions are not used in t he aut hent icat ion process. Therefore, t he
originat ing I P address cannot be verified for int egrit y against t he dat a.
Wit h t he use of AH as t he securit y prot ocol, prot ect ion is ext ended forward int o t he I P header t o
verify t he int egrit y of t he ent ire packet by use of port ions of t he original I P header in t he hashing
process.
Tunnel Mode
Tunne l m ode encapsulat es t he ent ire I P packet t o t ransm it it securely. A Tunne l m ode is required
for gat eway services t o provide access t o int ernal syst em s. Tunne l m ode is fundam ent ally an I P
t unnel wit h aut hent icat ion and encrypt ion. This is t he m ost com m on m ode of operat ion. Tu n ne l
m ode is required for gat eway t o gat eway and host t o gat eway com m unicat ions. Tunne l m ode
com m unicat ions have t wo set s of I P headers:
• Out side he a de r : The out side I P header cont ains t he dest inat ion I P address of t he VPN gat eway.
• I nside he a de r : The inside I P header cont ains t he dest inat ion I P address of t he final syst em
behind t he VPN gat eway. The securit y prot ocol appears aft er t he out er I P header and before t he
inside I P header.
20.5.3 IKE Phases
There are t wo phases t o every I KE ( I nt ernet Key Exchange) negot iat ion – phase 1 ( Aut hent icat ion)
and phase 2 ( Key Exchange) . A phase 1 exchange est ablishes an I KE SA and t he second one uses
t hat SA t o negot iat e SAs for I PSec.
230
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Figure 141 Two Phases t o Set Up t he I PSec SA
I n phase 1 you m ust :
• Choose a negot iat ion m ode.
• Aut hent icat e t he connect ion by ent ering a pre- shared key.
• Choose an encrypt ion algorit hm .
• Choose an aut hent icat ion algorit hm .
• Choose a Diffie- Hellm an public- key crypt ography key group.
• Set t he I KE SA lifet im e. This field allows you t o det erm ine how long an I KE SA should st ay up
before it t im es out . An I KE SA t im es out when t he I KE SA lifet im e period expires. I f an I KE SA
t im es out when an I PSec SA is already est ablished, t he I PSec SA st ays connect ed.
I n phase 2 you m ust :
• Choose an encrypt ion algorit hm .
• Choose an aut hent icat ion algorit hm
• Choose a Diffie- Hellm an public- key crypt ography key group.
• Set t he I PSec SA lifet im e. This field allows you t o det erm ine how long t he I PSec SA should st ay
up before it t im es out . The Device aut om at ically renegot iat es t he I PSec SA if t here is t raffic when
t he I PSec SA lifet im e period expires. I f an I PSec SA t im es out , t hen t he I PSec rout er m ust
renegot iat e t he SA t he next t im e som eone at t em pt s t o send t raffic.
20.5.4 Negotiation Mode
The phase 1 N e got ia t ion M ode you select det erm ines how t he Securit y Associat ion ( SA) will be
est ablished for each connect ion t hrough I KE negot iat ions.
• M a in M ode ensures t he highest level of securit y when t he com m unicat ing part ies are
negot iat ing aut hent icat ion ( phase 1) . I t uses 6 m essages in t hree round t rips: SA negot iat ion,
Diffie- Hellm an exchange and an exchange of nonces ( a nonce is a random num ber) . This m ode
feat ures ident it y prot ect ion ( your ident it y is not revealed in t he negot iat ion) .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
231
Chapter 20 VPN
• Aggr e ssive M ode is quicker t han M a in M ode because it elim inat es several st eps when t he
com m unicat ing part ies are negot iat ing aut hent icat ion ( phase 1) . However t he t rade- off is t hat
fast er speed lim it s it s negot iat ing power and it also does not provide ident it y prot ect ion. I t is
useful in rem ot e access sit uat ions where t he address of t he init iat or is not know by t he responder
and bot h part ies want t o use pre- shared key aut hent icat ion.
20.5.5 IPSec and NAT
Read t his sect ion if you are running I PSec on a host com put er behind t he Device.
NAT is incom pat ible wit h t he AH prot ocol in bot h Tr a nspor t and Tu n n e l m ode. An I PSec VPN using
t he AH prot ocol digit ally signs t he out bound packet , bot h dat a payload and headers, wit h a hash
value appended t o t he packet . When using AH prot ocol, packet cont ent s ( t he dat a payload) are not
encrypt ed.
A NAT device in bet ween t he I PSec endpoint s will rewrit e eit her t he source or dest inat ion address
wit h one of it s own choosing. The VPN device at t he receiving end will verify t he int egrit y of t he
incom ing packet by com put ing it s own hash value, and com plain t hat t he hash value appended t o
t he received packet doesn't m at ch. The VPN device at t he receiving end doesn't know about t he
NAT in t he m iddle, so it assum es t hat t he dat a has been m aliciously alt ered.
I PSec using ESP in Tu n ne l m ode encapsulat es t he ent ire original packet ( including headers) in a
new I P packet . The new I P packet 's source address is t he out bound address of t he sending VPN
gat eway, and it s dest inat ion address is t he inbound address of t he VPN device at t he receiving end.
When using ESP prot ocol wit h aut hent icat ion, t he packet cont ent s ( in t his case, t he ent ire original
packet ) are encrypt ed. The encrypt ed cont ent s, but not t he new headers, are signed wit h a hash
value appended t o t he packet .
Tunne l m ode ESP wit h aut hent icat ion is com pat ible wit h NAT because int egrit y checks are
perform ed over t he com binat ion of t he " original header plus original payload," which is unchanged
by a NAT device.
Tr a nspor t m ode ESP wit h aut hent icat ion is not com pat ible wit h NAT.
Table 106 VPN and NAT
SECURITY PROTOCOL
MODE
NAT
AH
Transport
AH
Tunnel
ESP
Transport
ESP
Tunnel
20.5.6 VPN, NAT, and NAT Traversal
NAT is incom pat ible wit h t he AH prot ocol in bot h t ransport and t unnel m ode. An I PSec VPN using
t he AH prot ocol digit ally signs t he out bound packet , bot h dat a payload and headers, wit h a hash
value appended t o t he packet , but a NAT device bet ween t he I PSec endpoint s rewrit es t he source or
dest inat ion address. As a result , t he VPN device at t he receiving end finds a m ism at ch bet ween t he
hash value and t he dat a and assum es t hat t he dat a has been m aliciously alt ered.
NAT is not norm ally com pat ible wit h ESP in t ransport m ode eit her, but t he Device’s N AT Tr a ve r sa l
feat ure provides a way t o handle t his. NAT t raversal allows you t o set up an I KE SA when t here are
NAT rout ers bet ween t he t wo I PSec rout ers.
232
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 20 VPN
Figure 142 NAT Rout er Bet ween I PSec Rout ers
Norm ally you cannot set up an I KE SA wit h a NAT rout er bet ween t he t wo I PSec rout ers because
t he NAT rout er changes t he header of t he I PSec packet . NAT t raversal solves t he problem by adding
a UDP port 500 header t o t he I PSec packet . The NAT rout er forwards t he I PSec packet wit h t he UDP
port 500 header unchanged. I n t he above figure, when I PSec rout er A t ries t o est ablish an I KE SA,
I PSec rout er B checks t he UDP port 500 header, and I PSec rout ers A and B build t he I KE SA.
For NAT t raversal t o work, you m ust :
• Use ESP securit y prot ocol ( in eit her t ransport or t unnel m ode) .
• Use I KE keying m ode.
• Enable NAT t raversal on bot h I PSec endpoint s.
• Set t he NAT rout er t o forward UDP port 500 t o I PSec rout er A.
Finally, NAT is com pat ible wit h ESP in t unnel m ode because int egrit y checks are perform ed over t he
com binat ion of t he " original header plus original payload," which is unchanged by a NAT device. The
com pat ibilit y of AH and ESP wit h NAT in t unnel and t ransport m odes is sum m arized in t he following
t able.
Table 107 VPN and NAT
SECURITY PROTOCOL
MODE
NAT
AH
Transport
AH
Tunnel
ESP
Transport
Y*
ESP
Tunnel
Y* - This is support ed in t he Device if you enable NAT t raversal.
20.5.7 ID Type and Content
Wit h aggressive negot iat ion m ode ( see Sect ion 20.5.4 on page 231) , t he Device ident ifies incom ing
SAs by I D t ype and cont ent since t his ident ifying inform at ion is not encrypt ed. This enables t he
Device t o dist inguish bet ween m ult iple rules for SAs t hat connect from rem ot e I PSec rout ers t hat
have dynam ic WAN I P addresses.
Regardless of t he I D t ype and cont ent configurat ion, t he Device does not allow you t o save m ult iple
act ive rules wit h overlapping local and rem ot e I P addresses.
Wit h m ain m ode ( see Sect ion 20.5.4 on page 231) , t he I D t ype and cont ent are encrypt ed t o
provide ident it y prot ect ion. I n t his case t he Device can only dist inguish bet ween up t o 12 different
incom ing SAs t hat connect from rem ot e I PSec rout ers t hat have dynam ic WAN I P addresses. The
Device can dist inguish up t o 48 incom ing SAs because you can select bet ween t hree encrypt ion
algorit hm s ( DES, 3DES and AES) , t wo aut hent icat ion algorit hm s ( MD5 and SHA1) and eight key
groups when you configure a VPN rule ( see Sect ion 20.2 on page 221) . The I D t ype and cont ent act
as an ext ra level of ident ificat ion for incom ing SAs.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
233
Chapter 20 VPN
The t ype of I D can be a dom ain nam e, an I P address or an e- m ail address. The cont ent is t he I P
address, dom ain nam e, or e- m ail address.
Table 108 Local I D Type and Cont ent Fields
LOCAL ID TYPE= CONTENT=
IP
Type t he I P address of your com put er.
DNS
Type a dom ain nam e ( up t o 31 charact ers) by which t o ident ify t his Device.
E- m ail
Type an e- m ail address ( up t o 31 charact ers) by which t o ident ify t his Device.
The dom ain nam e or e- m ail address t hat you use in t he Loca l I D Con t e nt field is used
for ident ificat ion purposes only and does not need t o be a real dom ain nam e or e- m ail
address.
20.5.7.1 ID Type and Content Examples
Two I PSec rout ers m ust have m at ching I D t ype and cont ent configurat ion in order t o set up a VPN
t unnel.
The t wo Devices in t his exam ple can com plet e negot iat ion and est ablish a VPN t unnel.
Table 109 Mat ching I D Type and Cont ent Configurat ion Exam ple
Device A
Device B
Local I D t ype: E- m ail
Local I D t ype: I P
Local I D cont ent : t om @yourcom pany.com
Local I D cont ent : 1.1.1.2
Rem ot e I D t ype: I P
Rem ot e I D t ype: E- m ail
Rem ot e I D cont ent : 1.1.1.2
Rem ot e I D cont ent : t om @yourcom pany.com
The t wo Devices in t his exam ple cannot com plet e t heir negot iat ion because Device B’s Loca l I D
Type is I P, but Device A’s Re m ot e I D Type is set t o E- m a il. An “ I D m ism at ched” m essage
displays in t he I PSEC LOG.
Table 110 Mism at ching I D Type and Cont ent Configurat ion Exam ple
DEVICE A
DEVICE B
Local I D t ype: I P
Local I D t ype: I P
Local I D cont ent : 1.1.1.10
Local I D cont ent : 1.1.1.2
Rem ot e I D t ype: E- m ail
Rem ot e I D t ype: I P
Rem ot e I D cont ent : aa@yahoo.com
Rem ot e I D cont ent : 1.1.1.0
20.5.8 Pre-Shared Key
A pre- shared key ident ifies a com m unicat ing part y during a phase 1 I KE negot iat ion ( see Sect ion
20.5.3 on page 230 for m ore on I KE phases) . I t is called “ pre- shared” because you have t o share it
wit h anot her part y before you can com m unicat e wit h t hem over a secure connect ion.
20.5.9 Diffie-Hellman (DH) Key Groups
Diffie- Hellm an ( DH) is a public- key crypt ography prot ocol t hat allows t wo part ies t o est ablish a
shared secret over an unsecured com m unicat ions channel. Diffie- Hellm an is used wit hin I KE SA
set up t o est ablish session keys. Upon com plet ion of t he Diffie- Hellm an exchange, t he t wo peers
have a shared secret , but t he I KE SA is not aut hent icat ed. For aut hent icat ion, use pre- shared keys.
234
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
21
Voice
21.1 Overview
Use t his chapt er t o:
• Connect an analog phone t o t he Device.
• Make phone calls over t he I nt ernet , as well as t he regular phone net work.
• Configure set t ings such as speed dial.
• Configure net work set t ings t o opt im ize t he voice qualit y of your phone calls.
21.1.1 What You Can Do in this Chapter
These screens allow you t o configure your Device t o m ake phone calls over t he I nt ernet and your
regular phone line, and t o set up t he phones you connect t o t he Device.
• Use t he SI P Account screen ( Sect ion 21.3 on page 236) t o set up inform at ion about your SI P
account , cont rol which SI P account s t he phones connect ed t o t he Device use and configure audio
set t ings such as volum e levels for t he phones connect ed t o t he Device.
• Use t he SI P Se r vice Pr ovide r screen ( Sect ion 21.4 on page 241) t o configure t he SI P server
inform at ion, QoS for VoI P calls, t he num bers for cert ain phone funct ions, and dialing plan.
• Use t he Ph one Re gion screen ( Sect ion 21.5 on page 249) t o change set t ings t hat depend on t he
count ry you are in.
• Use t he Ca ll Rule screen ( Sect ion 21.6 on page 249) t o set up short cut s for dialing frequent lyused ( VoI P) phone num bers.
• Use t he Ca ll H ist or y Sum m a r y screen ( Sect ion 21.7 on page 250) t o view t he sum m ary list of
received, dialed and m issed calls.
• Use t he Ca ll H ist or y Out going screen ( Sect ion 21.8 on page 251) t o view det ailed inform at ion
for each out going call you m ade.
• Use t he Ca ll H ist or y I n com in g screen ( Sect ion 21.9 on page 251) t o view det ailed inform at ion
for each incom ing call from som eone calling you.
You don’t necessarily need t o use all t hese screens t o set up your account . I n fact , if your service
provider did not supply inform at ion on a part icular field in a screen, it is usually best t o leave it at
it s default set t ing.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
235
Chapter 21 Voice
21.1.2 What You Need to Know About VoIP
VoIP
VoI P st ands for Voice over I P. I P is t he I nt ernet Prot ocol, which is t he m essage- carrying st andard
t he I nt ernet runs on. So, Voice over I P is t he sending of voice signals ( speech) over t he I nt ernet ( or
anot her net work t hat uses t he I nt ernet Prot ocol) .
SIP
SI P st ands for Session I nit iat ion Prot ocol. SI P is a signalling st andard t hat let s one net work device
( like a com put er or t he Device) send m essages t o anot her. I n VoI P, t hese m essages are about
phone calls over t he net work. For exam ple, when you dial a num ber on your Device, it sends a SI P
m essage over t he net work asking t he ot her device ( t he num ber you dialed) t o t ake part in t he call.
SIP Accounts
A SI P account is a t ype of VoI P account . I t is an arrangem ent wit h a service provider t hat let s you
m ake phone calls over t he I nt ernet . When you set t he Device t o use your SI P account t o m ake
calls, t he Device is able t o send all t he inform at ion about t he phone call t o your service provider on
t he I nt ernet .
St rict ly speaking, you don’t need a SI P account . I t is possible for one SI P device ( like t he Device) t o
call anot her wit hout involving a SI P service provider. However, t he net working difficult ies involved
in doing t his m ake it t rem endously im pract ical under norm al circum st ances. Your SI P account
provider rem oves t hese difficult ies by t aking care of t he call rout ing and set up - figuring out how t o
get your call t o t he right place in a way t hat you and t he ot her person can t alk t o one anot her.
How to Find Out More
See Chapt er 4 on page 37 for a t ut orial showing how t o set up t hese screens in an exam ple
scenario.
See Sect ion 21.10 on page 252 for advanced t echnical inform at ion on SI P.
21.2 Before You Begin
• Before you can use t hese screens, you need t o have a VoI P account already set up. I f you don’t
have one yet , you can sign up wit h a VoI P service provider over t he I nt ernet .
• You should have t he inform at ion your VoI P service provider gave you ready, before you st art t o
configure t he Device.
21.3 The SIP Account Screen
The Device uses a SI P account t o m ake out going VoI P calls and check if an incom ing call’s
dest inat ion num ber m at ches your SI P account ’s SI P num ber. I n order t o m ake or receive a VoI P
236
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
call, you need t o enable and configure a SI P account , and m ap it t o a phone port . The SI P account
cont ains inform at ion t hat allows your Device t o connect t o your VoI P service provider.
See Sect ion 21.3.1 on page 237 for how t o m ap a SI P account t o a phone port .
Use t his screen t o view SI P account inform at ion. You can also enable and disable each SI P account .
To access t his screen, click VoI P > SI P > SI P Accou nt .
Figure 143 VoI P > SI P > SI P Account
Each field is described in t he following t able.
Table 111 VoI P > SI P > SI P Account
LABEL
DESCRIPTION
Add new account
Click t his t o configure a SI P account .
This is t he index num ber of t he ent ry.
Act ive
This shows whet her t he SI P account is act ivat ed or not .
A yellow bulb signifies t hat t his SI P account is act ivat ed. A gray bulb signifies t hat t his SI P
account is not act ivat ed.
SI P Account
This shows t he nam e of t he SI P account .
Service Provider
This shows t he nam e of t he SI P service provider.
Account No.
This shows t he SI P num ber.
Modify
Click t he Edit icon t o configure t he SI P account .
Click t he D e le t e icon t o delet e t his SI P account from t he Device.
21.3.1 The SIP Account Add/Edit Screen
Use t his screen t o configure a SI P account and m ap it t o a phone port . To access t his screen, click
t he Add ne w a ccoun t but t on or click t he Edit icon of an ent ry in t he VoI P > SI P > SI P Accou n t
screen.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
237
Chapter 21 Voice
Not e: Click m or e t o see all t he fields in t he screen. You don’t necessarily need t o use all
t hese fields t o set up your account . Click le ss t o see and configure only t he fields
needed for t his feat ure.
Figure 144 VoI P > SI P > SI P Account > Add new accoun/ Edit
Each field is described in t he following t able.
Table 112 VoI P > SI P > SI P Account > Add new accoun/ Edit
LABEL
DESCRIPTION
SI P Account
Select ion
This field displays AD D _ N EW if you are creat ing a new SI P account or t he SI P
account you are m odifying.
SI P Service
Provider
Associat ion
Select t he SI P service provider profile t o use for t he SI P account you are
configuring in t his screen. This field is read- only when you are m odifying a SI P
account .
General
Enable SI P
Account
Select t his if you want t he Device t o use t his account . Clear it if you do not want
t he Device t o use t his account .
SI P Account
Num ber
Ent er your SI P num ber. I n t he full SI P URI , t his is t he part before t he @ sym bol.
You can use up t o 127 print able ASCI I charact ers.
Aut hent icat ion
238
Usernam e
Ent er t he user nam e for regist ering t his SI P account , exact ly as it was given t o
you. You can use up t o 95 print able ASCI I charact ers.
Password
Ent er t he user nam e for regist ering t his SI P account , exact ly as it was given t o
you. You can use up t o 95 print able ASCI I Ext ended set charact ers.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Table 112 VoI P > SI P > SI P Account > Add new accoun/ Edit ( cont inued)
LABEL
DESCRIPTION
Apply To Phone
Select a phone port on which you want t o m ake or receive phone calls for t his
SI P account .
I f you m ap a phone port t o m ore t han one SI P account , t here is no way t o
dist inguish bet ween t he SI P account s when you receive phone calls. The Device
uses t he m ost recent ly regist ered SI P account first when you m ake an out going
call.
I f a phone port is not m apped t o a SI P account , you cannot receive or m ake any
calls on t he phone connect ed t o t his phone port .
m ore/ less
Click m or e t o display and edit m ore inform at ion for t he SI P account . Click le ss
t o display and configure t he basic SI P account set t ings.
URI Type
Select whet her or not t o include t he SI P service dom ain nam e when t he Device
sends t he SI P num ber.
SI P - include t he SI P service dom ain nam e.
TEL - do not include t he SI P service dom ain nam e.
Voice Feat ures
Prim ary
Com pression
Type
Secondary
Com pression
Type
Third
Com pression
Type
Select t he t ype of voice coder/ decoder ( codec) t hat you want t he Device t o use.
G.711 provides high voice qualit y but requires m ore bandwidt h ( 64 kbps) . G.711
is t he default codec used by phone com panies and digit al handset s.
•
•
G.7 1 1 a is t ypically used in Europe.
G.7 1 1 u is t ypically used in Nort h Am erica and Japan.
G.7 2 6 - 2 4 operat es at 2 4 kbps.
G.7 2 6 - 3 2 operat es at 3 2 kbps.
G.7 2 2 is a 7 KHz wideband voice codec t hat operat es at 48, 56 and 64 kbps. By
using a sam ple rat e of 16 kHz, G.722 can provide higher fidelit y and bet t er audio
qualit y t han narrowband codecs like G.711, in which t he voice signal is sam pled
at 8 KHz.
The Device m ust use t he sam e codec as t he peer. When t wo SI P devices st art a
SI P session, t hey m ust agree on a codec.
Select t he Device’s first choice for voice coder/ decoder.
Select t he Device’s second choice for voice coder/ decoder. Select N on e if you
only want t he Device t o accept t he first choice.
Select t he Device’s t hird choice for voice coder/ decoder. Select N on e if you only
want t he Device t o accept t he first or second choice.
Speaking Volum e
Cont rol
Select t he loudness t hat t he Device uses for speech t hat it sends t o t he peer
device.
List ening Volum e
Cont rol
Select t he loudness t hat t he Device uses for speech t hat it receives from t he
peer device.
- 1 2 is t he quiet est , and 1 2 is t he loudest .
- 1 2 is t he quiet est , and 1 2 is t he loudest .
Enable G.168
( Echo
Cancellat ion)
Select t his if you want t o elim inat e t he echo caused by t he sound of your voice
reverberat ing in t he t elephone receiver while you t alk.
Enable VAD
( Voice Act ive
Det ect or)
Select t his if t he Device should st op t ransm it t ing when you are not speaking.
This reduces t he bandwidt h t he Device uses.
Call Feat ures
VMG8324-B10A / VMG8324-B30A Series User’s Guide
239
Chapter 21 Voice
Table 112 VoI P > SI P > SI P Account > Add new accoun/ Edit ( cont inued)
LABEL
DESCRIPTION
Send Caller I D
Select t his if you want t o send ident ificat ion when you m ake VoI P phone calls.
Clear t his if you do not want t o send ident ificat ion.
Enable Call
Transfer
Select t his t o enable call t ransfer on t he Device. This allows you t o t ransfer an
incom ing call ( t hat you have answered) t o anot her phone.
Enable Call
Wait ing
Select t his t o enable call wait ing on t he Device. This allows you t o place a call on
hold while you answer anot her incom ing call on t he sam e t elephone num ber.
Call Wait ing
Rej ect Tim er
Specify a t im e of seconds t hat t he Device wait s before rej ect ing t he second call if
you do not answer it .
Enable
Uncondit ional
Forward
Select t his if you want t he Device t o forward all incom ing calls t o t he specified
phone num ber.
Enable Busy
Forward
Select t his if you want t he Device t o forward incom ing calls t o t he specified
phone num ber if t he phone port is busy.
Specify t he phone num ber in t he To N u m be r field on t he right .
Specify t he phone num ber in t he To N u m be r field on t he right .
I f you have call wait ing, t he incom ing call is forwarded t o t he specified phone
num ber if you rej ect or ignore t he second incom ing call.
Enable No Answer
Forward
Select t his if you want t he Device t o forward incom ing calls t o t he specified
phone num ber if t he call is unanswered. ( See N o An sw e r Tim e .)
Specify t he phone num ber in t he To N u m be r field on t he right .
No Answer Tim e
This field is used by t he Act ive N o Answ e r For w a r d feat ure.
Ent er t he num ber of seconds t he Device should wait for you t o answer an
incom ing call before it considers t he call is unanswered.
Enable Do Not
Dist urb
Select t his t o set your phone t o not ring when som eone calls you.
Enable
Anonym ous Call
Block
Select t his if you do not want t he phone t o ring when som eone t ries t o call you
wit h caller I D deact ivat ed.
Enable Call
Com plet ion on
Busy Subscriber
( CCBS)
When you m ake a phone call but hear a busy t one, Call Com plet ion on Busy
Subscriber ( CCBS) allows you t o enable aut o- callback by pressing 5 and hanging
up t he phone. The Device t hen t ries t o call t hat phone num ber every m inut e
since aft er you hang up t he phone. When t he called part y becom es available
wit hin t he CCBS t im eout period ( 60 m inut es by default ) , bot h phones ring.
•
•
•
I f t he called part y’s phone rings because of CCBS but no one answers t he
phone aft er 180 seconds, you w ill hear a busy t one. You can enable CCBS on
t he called num ber again.
I f you m anually call t he num ber on which you have enabled CCBS before t he
CCBS t im eout period expires, t he Device disables CCBS on t he called
num ber.
I f you call a second num ber before t he first called num ber ’s CCBS t im eout
period expires, t he Device st ops calling t he first num ber unt il you finish t he
second call.
Select t his opt ion t o act ivat e CCBS on t he Device.
240
MWI ( Message
Wait ing
I ndicat ion)
Select t his if you want t o hear a wait ing ( beeping) dial t one on your phone when
you have at least one voice m essage. Your VoI P service provider m ust support
t his feat ure.
Expirat ion Tim e
Keep t he default value for t his field, unless your VoI P service provider t ells you
t o change it . Ent er t he num ber of seconds t he SI P server should provide t he
m essage wait ing service each t im e t he Device subscribes t o t he service. Before
t his t im e passes, t he Device aut om at ically subscribes again.
Hot Line / Warm
Line Enable
Select t his t o enable t he hot line or warm line feat ure on t he Device.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Table 112 VoI P > SI P > SI P Account > Add new accoun/ Edit ( cont inued)
LABEL
DESCRIPTION
Warm Line
Select t his t o have t he Device dial t he specified warm line num ber aft er you pick
up t he t elephone and do not press any keys on t he keypad for a period of t im e.
Hot Line
Select t his t o have t he Device dial t he specified hot line num ber im m ediat ely
when you pick up t he t elephone.
Hot Line / Warm
Line num ber
Ent er t he num ber of t he hot line or warm line t hat you want t he Device t o dial.
Warm Line Tim er
Ent er a num ber of seconds t hat t he Device wait s before dialing t he warm line
num ber if you pick up t he t elephone and do not press any keys on t he keypad.
Enable Missed
Call Em ail
Not ificat ion
Select t his opt ion t o have t he Device e- m ail you a not ificat ion when t here is a
m issed call.
Mail Server
Select a m ail server for t he e- m ail address specified below. I f you select N on e
here, e- m ail not ificat ions will not be sent via e- m ail.
You m ust have configured a m ail server already in t he Em a il N ot ifica t ion
screen.
Send
Not ificat ion t o
Em ail
Not ificat ions are sent t o t he e- m ail address specified in t his field. I f t his field is
left blank, not ificat ions will not be sent via e- m ail.
Missed Call
Em ail Tit le
Type a t it le t hat you want t o be in t he subj ect line of t he e- m ail not ificat ions t hat
t he Device sends.
Early Media
I VR Play
I ndex
Select t his opt ion if you want people t o hear a cust om ized recording when t hey
call you.
Select t he t one you want people t o hear when t hey call you.
This field is configurable only when you select Ea r ly M e dia . See Sect ion 21.10
on page 252 for inform at ion on how t o record t hese t ones.
Music On Hold
I VR Play
I ndex
Select t his opt ion t o play a cust om ized recording when you put people on hold.
Select t he t one t o play when you put som eone on hold.
This field is configurable only when you select M u sic On H old. See Sect ion
21.10 on page 252 for inform at ion on how t o record t hese t ones.
Apply
Click t his t o save your changes and t o apply t hem t o t he Device.
Cancel
Click t his t o set every field in t his screen t o it s last- saved value.
21.4 The SIP Service Provider Screen
Use t his screen t o view t he SI P service provider inform at ion on t he Device. Click VoI P > SI P >
SI P Se r vice Pr ovide r t o open t he following screen.
Figure 145 VoI P > SI P > SI P Service Provider
VMG8324-B10A / VMG8324-B30A Series User’s Guide
241
Chapter 21 Voice
Each field is described in t he following t able.
Table 113 VoI P > SI P > SI P Service Provider
LABEL
DESCRIPTION
Add new provider
This is t he index num ber of t he ent ry.
SI P Service
Provider Nam e
This shows t he nam e of t he SI P service provider.
SI P Server
Address
This shows t he I P address or dom ain nam e of t he SI P server.
REGI STER Server
Address
This shows t he I P address or dom ain nam e of t he SI P regist er server.
SI P Service
Dom ain
This shows t he SI P service dom ain nam e.
Modify
Click t he Edit icon t o configure t he SI P service provider.
Click t he D e le t e icon t o delet e t his SI P service provider from t he Device.
21.4.1 The SIP Service Provider Add/Edit Screen
Use t his screen t o configure a SI P service provider on t he Device. Click t he Add ne w pr ovide r
but t on or an Edit icon in t he VoI P > SI P > SI P Se r vice Pr ovide r t o open t he following screen.
242
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Not e: Click m or e t o see all t he fields in t he screen. You don’t necessarily need t o use all
t hese fields t o set up your account . Click le ss t o see and configure only t he fields
needed for t his feat ure.
Figure 146 VoI P > SI P > SI P Service Provider > Add new provider/ Edit
Each field is described in t he following t able.
Table 114 VoI P > SI P > SI P Service Provider > Add new provider/ Edit
LABEL
DESCRIPTION
SI P Service Provider Select ion
Service
Provider
Select ion
Select t he SI P service provider profile you want t o use for t he SI P account you configure in
t his screen. I f you change t his field, t he screen aut om at ically refreshes.
General
SI P Service
Provider Nam e
Ent er t he nam e of your SI P service provider.
SI P Local Port
Ent er t he Device’s list ening port num ber, if your VoI P service provider gave you one.
Ot herwise, keep t he default value.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
243
Chapter 21 Voice
Table 114 VoI P > SI P > SI P Service Provider > Add new provider/ Edit ( cont inued)
LABEL
DESCRIPTION
SI P Server
Address
Ent er t he I P address or dom ain nam e of t he SI P server provided by your VoI P service
provider. You can use up t o 95 print able ASCI I charact ers. I t does not m at t er whet her t he
SI P server is a proxy, redirect or regist er server.
SI P Server Port
Ent er t he SI P server ’s list ening port num ber, if your VoI P service provider gave you one.
Ot herwise, keep t he default value.
REGI STER
Server Address
Ent er t he I P address or dom ain nam e of t he SI P regist er server, if your VoI P service provider
gave you one. Ot herwise, ent er t he sam e address you ent ered in t he SI P Se r ve r Addr e ss
field. You can use up t o 95 print able ASCI I charact ers.
REGI STER
Server Port
Ent er t he SI P regist er server ’s list ening port num ber, if your VoI P service provider gave you
one. Ot herwise, ent er t he sam e port num ber you ent ered in t he SI P Se r ve r Por t field.
SI P Service
Dom ain
Ent er t he SI P service dom ain nam e. I n t he full SI P URI , t his is t he part aft er t he @ sym bol.
You can use up t o 127 print able ASCI I Ext ended set charact ers.
RFC Support
Support
Locat ing SI P
Server
( RFC3263)
Select t his opt ion t o have t he Device use DNS procedures t o resolve t he SI P dom ain and
find t he SI P server ’s I P address, port num ber and support ed t ransport prot ocol( s) .
The Device first uses DNS Nam e Aut horit y Point er ( NAPTR) records t o det erm ine t he
t ransport prot ocols support ed by t he SI P server. I t t hen perform s DNS Service ( SRV) query
t o det erm ine t he port num ber for t he prot ocol. The Device resolves t he SI P server ’s I P
address by a st andard DNS address record lookup.
The SI P Se r ve r Por t and REGI STER Se r ve r Por t fields in t he Ge n e r a l sect ion above are
grayed out and not applicable and t he Tr a n spor t Type can also be set t o AUTO if you
select t his opt ion.
RFC
3262( Require:
100rel)
PRACK ( RFC 3262) defines a m echanism t o provide reliable t ransm ission of SI P provisional
response m essages, which convey inform at ion on t he processing progress of t he request .
This uses t he opt ion t ag 100rel and t he Provisional Response ACKnowledgem ent ( PRACK)
m et hod.
Select t his t o have t he t he peer device require t he opt ion t ag 100rel t o send provisional
responses reliably.
VoI P I OP Flags
Select t he VoI P int er- operabilit y set t ings you want t o act ivat e.
Replace dial
digit '# ' t o
'% 23' in SI P
m essages
Replace a dial digit “ # ” wit h “ % 23” in t he I NVI TE m essages.
Rem ove ‘: 5060’
and
't ransport = udp'
from requesturi in SI P
m essages
Rem ove “ : 5060” and “ t ransport = udp” from t he “ Request- URI ” st ring in t he REGI STER and
I NVI TE packet s.
Rem ove t he
'Rout e' header
in SI P
m essages
Rem ove t he 'Rout e' header in SI P packet s.
Don't send reI nvit e t o t he
rem ot e part y
w hen t here are
m ult iple codecs
answered in t he
SDP
Do not send a re- I nvit e packet t o t he rem ot e part y when t he rem ot e part y answers t hat it
can support m ult iple codecs.
Bound I nt erface Nam e
244
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Table 114 VoI P > SI P > SI P Service Provider > Add new provider/ Edit ( cont inued)
LABEL
DESCRIPTION
Bound
I nt erface Nam e
I f you select LAN or Any_ W AN , t he Device aut om at ically act ivat es t he VoI P service when
any LAN or WAN connect ion is up.
I f you select M u lt i_ W AN , you also need t o select t wo or m ore pre- configured WAN
int erfaces. The VoI P service is act ivat ed only when one of t he select ed WAN connect ions is
up.
Out bound Proxy
Out bound
Proxy Address
Ent er t he I P address or dom ain nam e of t he SI P out bound proxy server if your VoI P service
provider has a SI P out bound server t o handle voice calls. This allows t he Device t o work
wit h any t ype of NAT rout er and elim inat es t he need for STUN or a SI P ALG. Turn off any SI P
ALG on a NAT rout er in front of t he Device t o keep it from re- t ranslat ing t he I P address
( since t his is already handled by t he out bound proxy server) .
Out bound
Proxy Port
Ent er t he SI P out bound proxy server ’s list ening port , if your VoI P service provider gave you
one. Ot herwise, keep t he default value.
RTP Port Range
St art Port
End Port
Ent er t he list ening port num ber( s) for RTP t raffic, if your VoI P service provider gave you t his
inform at ion. Ot herwise, keep t he default values.
To ent er one port num ber, ent er t he port num ber in t he St a r t Por t and En d Por t fields.
To ent er a range of port s,
•
•
ent er t he port num ber at t he beginning of t he range in t he St a r t Por t field.
ent er t he port num ber at t he end of t he range in t he En d Por t field.
SRTP Support
SRTP Support
When you m ake a VoI P call using SI P, t he Real- t im e Transport Prot ocol ( RTP) is used t o
handle voice dat a t ransfer. The Secure Real- t im e Transport Prot ocol ( SRTP) is a securit y
profile of RTP. I t is designed t o provide encrypt ion and aut hent icat ion for t he RTP dat a in
bot h unicast and m ult icast applicat ions.
The Device support s encrypt ion using AES wit h a 128- bit key. To prot ect dat a int egrit y, SRTP
uses a Hash- based Message Aut hent icat ion Code ( HMAC) calculat ion wit h Secure Hash
Algorit hm ( SHA) - 1 t o aut hent icat e dat a. HMAC SHA- 1 produces a 80 or 32- bit
aut hent icat ion t ag t hat is appended t o t he packet .
Bot h t he caller and callee should use t he sam e algorit hm s t o est ablish an SRTP session.
Crypt o Suit e
Select t he encrypt ion and aut hent icat ion algorit hm set used by t he Device t o set up an SRTP
m edia session wit h t he peer device.
Select AES_ CM _ 1 2 8 _ H M AC_ SH A1 _ 8 0 or AES_ CM _ 1 2 8 _ H M AC_ SH A1 _ 3 2 t o enable
bot h dat a encrypt ion and aut hent icat ion for voice dat a.
Select AES_ CM _ 1 2 8 _ N ULL t o use 128- bit dat a encrypt ion but disable dat a aut hent icat ion.
Select N ULL_ CI PH ER_ H M AC_ SH A1 _ 8 0 t o disable encrypt ion but require aut hent icat ion
using t he default 80- bit t ag.
DTMF Mode
DTMF Mode
Cont rol how t he Device handles t he t ones t hat your t elephone m akes when you push it s
but t ons. You should use t he sam e m ode your VoI P service provider uses.
RFC2 8 3 3 - send t he DTMF t ones in RTP packet s.
PCM - send t he DTMF t ones in t he voice dat a st ream . This m et hod works best when you are
using a codec t hat does not use com pression ( like G.711) . Codecs t hat use com pression
( like G.729 and G.726) can dist ort t he t ones.
SI P I N FO - send t he DTMF t ones in SI P m essages.
Transport Type
Transport Type
Select t he t ransport layer prot ocol UD P or TCP ( usually UDP) used for SI P.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
245
Chapter 21 Voice
Table 114 VoI P > SI P > SI P Service Provider > Add new provider/ Edit ( cont inued)
LABEL
DESCRIPTION
I gnore Direct I P Select En a ble t o have t he connect ed CPE devices accept SI P request s only from t he SI P
proxy/ regist er server specified above. SI P request s sent from ot her I P addresses will be
ignored.
FAX Opt ion
This field cont rols how t he Device handles fax m essages.
G711 Fax
Passt hrough
Select t his if t he Device should use G.711 t o send fax m essages. You have t o also select
which operat ing codec ( G.7 1 1 M u la w or G.7 1 1 Ala w ) t o use for encoding/ decoding FAX
dat a. The peer devices m ust use t he sam e set t ings.
T38 Fax Relay
Select t his if t he Device should send fax m essages as UDP or TCP/ I P packet s t hrough I P
net works. This provides bet t er qualit y, but it m ay have int er- operabilit y problem s. The peer
devices m ust also use T.38.
QoS Tag
SI P DSCP Mark
Set t ing
Ent er t he DSCP ( DiffServ Code Point ) num ber for SI P m essage t ransm issions. The Device
creat es Class of Service ( CoS) priorit y t ags wit h t his num ber t o SI P t raffic t hat it t ransm it s.
RTP DSCP Mark
Set t ing
Ent er t he DSCP ( DiffServ Code Point ) num ber for RTP voice t ransm issions. The Device
creat es Class of Service ( CoS) priorit y t ags wit h t his num ber t o RTP t raffic t hat it t ransm it s.
Tim er Set t ing
246
Expirat ion
Durat ion
Ent er t he num ber of seconds your SI P account is regist ered wit h t he SI P regist er server
before it is delet ed. The Device aut om at ically t ries t o re- regist er your SI P account when
one- half of t his t im e has passed. ( The SI P regist er server m ight have a different expirat ion.)
Regist er Resend t im er
Ent er t he num ber of seconds t he Device wait s before it t ries again t o regist er t he SI P
account , if t he first t ry failed or if t here is no response.
Session Expires
Ent er t he num ber of seconds t he Device let s a SI P session rem ain idle ( wit hout t raffic)
before it aut om at ically disconnect s t he session.
Min- SE
Ent er t he m inim um num ber of seconds t he Device let s a SI P session rem ain idle ( wit hout
t raffic) before it aut om at ically disconnect s t he session. When t wo SI P devices st art a SI P
session, t hey m ust agree on an expirat ion t im e for idle sessions. This field is t he short est
expirat ion t im e t hat t he Device accept s.
Phone Key
Config
Ent er t he key com binat ions for cert ain funct ions of t he SI P phone.
Call Ret urn
Ent er t he key com binat ions t hat you can ent er t o place a call t o t he last num ber t hat called
you.
One Shot Caller
Display Call
Ent er t he key com binat ions t hat you can ent er t o act ivat e caller I D for t he next call only.
One Shot Caller
Hidden Call
Ent er t he key com binat ions t hat you can ent er t o deact ivat e caller I D for t he next call only.
Call Wait ing
Enable
Ent er t he key com binat ions t hat you can ent er t o t urn on t he call wait ing funct ion.
Call Wait ing
Disable
Ent er t he key com binat ions t hat you can ent er t o t urn off t he call wait ing funct ion.
I VR
Ent er t he key com binat ions t hat you can ent er t o record cust om caller ringing t ones ( t he
sound a caller hears before you pick up t he phone) and on hold t ones ( t he sound som eone
hears when you put t heir call on hold) . I VR st ands for I nt eract ive Voice Response.
I nt ernal Call
Ent er t he key com binat ions t hat you can ent er t o call t he phone( s) connect ed t o t he Device.
Call Transfer
Ent er t he key com binat ions t hat you can ent er t o t ransfer a call t o anot her phone.
Uncondit ional
Call Forward
Enable
Ent er t he key com binat ions t hat you can ent er t o forward all incom ing calls t o t he phone
num ber you specified in t he SI P > SI P Account screen.
Uncondit ional
Call Forward
Disable
Ent er t he key com binat ions t hat you can ent er t o t urn t he uncondit ional call forward
funct ion off.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Table 114 VoI P > SI P > SI P Service Provider > Add new provider/ Edit ( cont inued)
LABEL
DESCRIPTION
No Answer Call
Forward Enable
Ent er t he key com binat ions t hat you can ent er t o forward incom ing calls t o t he phone
num ber you specified in t he SI P > SI P Account screen if t he calls are unanswered.
No Answer Call
Forward
Disable
Ent er t he key com binat ions t hat you can ent er t o t urn t he no answer call forward funct ion
off.
Call Forward
When Busy
Enable
Ent er t he key com binat ions t hat you can ent er t o forward incom ing calls t o t he phone
num ber you specified in t he SI P > SI P Account screen if t he phone port is busy.
Call Forward
When Busy
Disable
Ent er t he key com binat ions t hat you can ent er t o t urn t he busy forward funct ion off.
One Shot Call
Wait ing Enable
Ent er t he key com binat ions t hat you can ent er t o act ivat e call wait ing on t he next calls.
One Shot Call
Wait ing Disable
Ent er t he key com binat ions t hat you can ent er t o deact ivat e call wait ing on t he next call
only.
Do Not Dist urb
Enable
Ent er t he key com binat ions t hat you can ent er t o set your phone not t o ring when som eone
calls you.
Do Not Dist urb
Disable
Ent er t he key com binat ions t hat you can ent er t o t urn t his funct ion off.
Call Com plet ion
on Busy
Subscriber
( CCBS)
Deact ivat e
Ent er t he key com binat ions t hat you can ent er t o disable CCBS on a call.
Out going SI P
Ent er t he key com binat ions t hat you can ent er t o select t he SI P account t hat you use t o
m ake out going calls.
I f you ent er # 12( by default ) < SI P account index num ber> # < t he phone num ber you want t o
call> , # 1201# 12345678 for exam ple, t he Device uses t he first SI P account t o call
12345678.
Dial Plan
Dial Plan
Enable
Select t his t o act ivat e t he dial plan rules you specify in t he t ext box provided. See Sect ion
21.4.2 on page 248 for how t o set up a rule.
Dialing I nt erval Select ion
Dialing I nt erval
Select ion
Ent er t he num ber of seconds t he Device should wait aft er you st op dialing num bers before it
m akes t he phone call. The value depends on how quickly you dial phone num bers.
I f you select I m m e dia t e D ia l En a ble , you can press t he pound key ( # ) t o t ell t he Device
t o m ake t he phone call im m ediat ely, regardless of t his set t ing.
I m m ediat e Dial Enable
I m m ediat e Dial
Enable
Select t his if you want t o use t he pound key ( # ) t o t ell t he Device t o m ake t he phone call
im m ediat ely, inst ead of wait ing t he num ber of seconds you select ed in t he D ia lin g I n t e r va l
Se le ct ion field.
I f you select t his, dial t he phone num ber, and t hen press t he pound key.
The Device m akes t he call im m ediat ely, inst ead of wait ing. You can st ill wait , if you want .
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
247
Chapter 21 Voice
21.4.2 Dial Plan Rules
A dial plan defines t he dialing pat t erns, such as t he lengt h and range of t he digit s for a t elephone
num ber. I t also includes count ry codes, access codes, area codes, local num bers, long dist ance
num bers or int ernat ional call prefixes. For exam ple, t he dial plan ( [ 2- 9] xxxxxx) does not allow a
local num ber which begins wit h 1 or 0.
Wit hout a dial plan, users have t o m anually ent er t he whole callee’s num ber and wait for t he
specified dialing int erval t o t im e out or press a t erm inat or key ( usually t he pound key on t he phone
keypad) before t he Device m akes t he call.
The Device init ializes a call when t he dialed num ber m at ches any one of t he rules in t he dial plan.
Dial plan rules follow t hese convent ions:
• The collect ion of rules is in parent heses ( ) .
• Rules are separat ed by t he | ( bar) sym bol.
• “ x” st ands for a wildcard and can be any digit from 0 t o 9.
• A subset of keys is in a square bracket [ ] . Ranges are allowed.
For exam ple, [ 359] m eans a num ber m at ching t his rule can be 3, 5 or 9. [ 26- 8* ] m eans a
num ber m at ching t his rule can be 2, 6, 7, 8 or * .
• The dot “ .” appended t o a digit allows t he digit t o be ignored or repeat ed m ult iple t im es. Any digit
( 0~ 9, * , # ) aft er t he dot will be ignored.
For exam ple, ( 01.) m eans a num ber m at ching t his rule can be 0, 01, 0111, 01111, and so on.
• < dialed- num ber: t ranslat ed- num ber> indicat es t he num ber aft er t he colon replaces t he num ber
before t he colon in an angle bracket < > . For exam ple,
( < : 1212> xxxxxxx) m eans t he Device aut om at ically prefixes t he t ranslat ed- num ber “ 1212” t o
t he num ber you dialed before m aking t he call. This can be used for local calls in t he US.
( < 9: > xxx xxxxxxx) m eans t he Device aut om at ically rem oves t he specified prefix “ 9” from t he
num ber you dialed before m aking t he call. This is always used for m aking out side calls from an
office.
( xx< 123: 456> xxxx) m eans t he Device aut om at ically t ranslat es “ 123” t o “ 456” in t he num ber
you dialed before m aking t he call.
• Calls wit h a num ber followed by t he exclam at ion m ark “ !” will be dropped.
• Calls wit h a num ber followed by t he t erm inat ion charact er “ @” will be m ade im m ediat ely. Any
digit ( 0~ 9, * , # ) aft er t he @ charact er will be ignored.
I n t his exam ple dial plan ( 0 | [ 49] 11 | 1 [ 2- 9] xx xxxxxxx | 1 947 xxxxxxx ! ) , you can dial “ 0” t o call
t he local operat or, call 411 or 911, or m ake a long dist ance call wit h an area code st art ing from 2 t o
9 in t he US. The calls wit h t he area code 947 will be dropped.
248
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
21.5 The Phone Screen
Use t his screen t o m aint ain set t ings t hat depend on which region of t he world t he Device is in. To
access t his screen, click VoI P > Ph on e .
Figure 147 VoI P > Phone
Each field is described in t he following t able.
Table 115 VoI P > Phone
LABEL
DESCRIPTION
Region Set t ings
Select t he place in which t he Device is locat ed.
Call Service Mode
Select t he m ode for supplem ent ary phone services ( call hold, call wait ing, call t ransfer
and t hree- way conference calls) t hat your VoI P service provider support s.
Eur ope Type - use supplem ent ary phone services in European m ode
USA Type - use supplem ent ary phone services Am erican m ode
You m ight have t o subscribe t o t hese services t o use t hem . Cont act your VoI P service
provider.
Apply
Click t his t o save your changes and t o apply t hem t o t he Device.
Cancel
Click t his t o set every field in t his screen t o it s last- saved value.
21.6 The Call Rule Screen
Use t his screen t o add, edit , or rem ove speed- dial num bers for out going calls. Speed dial provides
short cut s for dialing frequent ly- used ( VoI P) phone num bers. You also have t o creat e speed- dial
ent ries if you want t o call SI P num bers t hat cont ain let t ers. Once you have configured a speed dial
VMG8324-B10A / VMG8324-B30A Series User’s Guide
249
Chapter 21 Voice
rule, you can use a short cut ( t he speed dial num ber, # 01 for exam ple) on your phone's keypad t o
call t he phone num ber.
Figure 148 VoI P > Call Rule
Each field is described in t he following t able.
Table 116 VoI P > Call Rule
LABEL
DESCRIPTION
Clear all speed
dials
Click t his t o erase all t he speed- dial ent ries on t his screen.
Keys
This field displays t he speed- dial num ber you should dial t o use t his ent ry.
Num ber
Ent er t he SI P num ber you want t he Device t o call when you dial t he speed- dial num ber.
Descript ion
Ent er a nam e t o ident ify t he part y you call when you dial t he speed- dial num ber. You can
use up t o 127 print able ASCI I charact ers.
Apply
Click t his t o save your changes and t o apply t hem t o t he Device.
Cancel
Click t his t o set every field in t his screen t o it s last- saved value.
21.7 The Call History Summary Screen
The Device logs calls from or t o your SI P num bers. This screen allows you t o view t he sum m ary of
received, dialed and m issed calls.
Click VoI P > Ca ll H ist or y > Ca ll H ist or y Sum m a r y. The following screen displays.
Figure 149 VoI P > Call Hist ory > Call Hist ory Sum m ary
250
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Each field is described in t he following t able.
Table 117 VoI P > Call Hist ory > Call Hist ory Sum m ary
LABEL
DESCRIPTION
Refresh
Click t his but t on t o renew t he call hist ory list .
Clear All
Click t his but t on t o rem ove all ent ries from t he call hist ory list .
This is a read- only index num ber.
Dat e
This is t he dat e when t he calls were m ade.
Tot al Calls
This displays t he t ot al num ber of calls from or t o your SI P num bers t hat day.
Out going Calls
This displays how m any calls originat ed from you t hat day.
I ncom ing Calls
This displays how m any calls you received t hat day.
Missing Calls
This displays how m any incom ing calls were not answered t hat day.
Tot al Durat ion
This displays how long all calls last ed t hat day.
21.8 The Call History Outgoing Calls Screen
Use t his screen t o see det ailed inform at ion for each out going call you m ade.
Click VoI P > Ca ll H ist or y > Ca ll H ist or y Out going. The following screen displays.
Figure 150 VoI P > Call Hist ory > Call Hist ory Out going
Each field is described in t he following t able.
Table 118 VoI P > Call Hist ory > Call Hist ory Out going
LABEL
DESCRIPTION
Refresh
Click t his but t on t o renew t he dialed call list .
Clear All
Click t his but t on t o rem ove all ent ries from t he dialed call list .
This is a read- only index num ber.
t im e
This is t he dat e and t im e when t he call was m ade.
phone port
This is t he phone port on which you m ade t he call.
phone num ber
This is t he SI P num ber you called.
durat ion
This displays how long t he call last ed.
21.9 The Call History Incoming Calls Screen
Use t his screen t o see det ailed inform at ion for each incom ing call from som eone calling you.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
251
Chapter 21 Voice
Click VoI P > Ca ll H ist or y > Ca ll H ist or y I ncom ing Ca lls. The following screen displays.
Figure 151 VoI P > Call Hist ory > Call Hist ory I ncom ing Calls
Each field is described in t he following t able.
Table 119 VoI P > Call Hist ory > Call Hist ory I ncom ing
LABEL
DESCRIPTION
Refresh
Click t his but t on t o renew t he received call list .
Clear All
Click t his but t on t o rem ove all ent ries from t he received call list .
This is a read- only index num ber.
t im e
This is t he dat e and t im e when t he call was m ade.
phone port
This is t he phone port on which you received t he call.
M isse d m eans t he call was unanswered.
phone num ber
This is t he SI P num ber t hat called you.
durat ion
This displays how long t he call last ed.
21.10 Technical Reference
This sect ion cont ains background m at erial relevant t o t he VoI P screens.
VoIP
VoI P is t he sending of voice signals over I nt ernet Prot ocol. This allows you t o m ake phone calls and
send faxes over t he I nt ernet at a fract ion of t he cost of using t he t radit ional circuit- swit ched
t elephone net work. You can also use servers t o run t elephone service applicat ions like PBX services
and voice m ail. I nt ernet Telephony Service Provider ( I TSP) com panies provide VoI P service.
Circuit- swit ched t elephone net works require 64 kilobit s per second ( Kbps) in each direct ion t o
handle a t elephone call. VoI P can use advanced voice coding t echniques wit h com pression t o reduce
t he required bandwidt h.
SIP
The Session I nit iat ion Prot ocol ( SI P) is an applicat ion- layer cont rol ( signaling) prot ocol t hat handles
t he set t ing up, alt ering and t earing down of voice and m ult im edia sessions over t he I nt ernet .
SI P signaling is separat e from t he m edia for which it handles sessions. The m edia t hat is exchanged
during t he session can use a different pat h from t hat of t he signaling. SI P handles t elephone calls
and can int erface wit h t radit ional circuit- swit ched t elephone net works.
SIP Identities
A SI P account uses an ident it y ( som et im es referred t o as a SI P address) . A com plet e SI P ident it y is
called a SI P URI ( Uniform Resource I dent ifier) . A SI P account 's URI ident ifies t he SI P account in a
252
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
way sim ilar t o t he way an e- m ail address ident ifies an e- m ail account . The form at of a SI P ident it y
is SI P- Num ber@SI P- Service- Dom ain.
SIP Number
The SI P num ber is t he part of t he SI P URI t hat com es before t he “ @” sym bol. A SI P num ber can
use let t ers like in an e- m ail address ( j ohndoe@your- I TSP.com for exam ple) or num bers like a
t elephone num ber ( 1122334455@VoI P- provider.com for exam ple) .
SIP Service Domain
The SI P service dom ain of t he VoI P service provider is t he dom ain nam e in a SI P URI . For exam ple,
if t he SI P address is 1122334455@VoI P- provider.com , t hen “ VoI P- provider.com ” is t he SI P service
dom ain.
SIP Registration
Each Device is an individual SI P User Agent ( UA) . To provide voice service, it has a public I P
address for SI P and RTP prot ocols t o com m unicat e wit h ot her servers.
A SI P user agent has t o regist er wit h t he SI P regist rar and m ust provide inform at ion about t he
users it represent s, as well as it s current I P address ( for t he rout ing of incom ing SI P request s) .
Aft er successful regist rat ion, t he SI P server knows t hat t he users ( ident ified by t heir dedicat ed SI P
URI s) are represent ed by t he UA, and knows t he I P address t o which t he SI P request s and
responses should be sent .
Regist rat ion is init iat ed by t he User Agent Client ( UAC) running in t he VoI P gat eway ( t he Device) .
The gat eway m ust be configured wit h inform at ion let t ing it know where t o send t he REGI STER
m essage, as well as t he relevant user and aut horizat ion dat a.
A SI P regist rat ion has a lim it ed lifespan. The User Agent Client m ust renew it s regist rat ion wit hin
t his lifespan. I f it does not do so, t he regist rat ion dat a will be delet ed from t he SI P regist rar's
dat abase and t he connect ion broken.
The Device at t em pt s t o regist er all enabled subscriber port s when it is swit ched on. When you
enable a subscriber port t hat was previously disabled, t he Device at t em pt s t o regist er t he port
im m ediat ely.
Authorization Requirements
SI P regist rat ions ( and subsequent SI P request s) require a usernam e and password for
aut horizat ion. These credent ials are validat ed via a challenge / response syst em using t he HTTP
digest m echanism ( as det ailed in RFC 3261, " SI P: Session I nit iat ion Prot ocol") .
SIP Servers
SI P is a client- server prot ocol. A SI P client is an applicat ion program or device t hat sends SI P
request s. A SI P server responds t o t he SI P request s.
When you use SI P t o m ake a VoI P call, it originat es at a client and t erm inat es at a server. A SI P
client could be a com put er or a SI P phone. One device can act as bot h a SI P client and a SI P server.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
253
Chapter 21 Voice
SIP User Agent
A SI P user agent can m ake and receive VoI P t elephone calls. This m eans t hat SI P can be used for
peer- t o- peer com m unicat ions even t hough it is a client- server prot ocol. I n t he following figure,
eit her A or B can act as a SI P user agent client t o init iat e a call. A and B can also bot h act as a SI P
user agent t o receive t he call.
Figure 152 SI P User Agent
SIP Proxy Server
A SI P proxy server receives request s from client s and forwards t hem t o anot her server.
I n t he following exam ple, you want t o use client device A t o call som eone who is using client device
C.
The client device ( A in t he figure) sends a call invit at ion t o t he SI P proxy server ( B) .
The SI P proxy server forwards t he call invit at ion t o C.
Figure 153 SI P Proxy Server
SIP Redirect Server
A SI P redirect server accept s SI P request s, t ranslat es t he dest inat ion address t o an I P address and
sends t he t ranslat ed I P address back t o t he device t hat sent t he request . Then t he client device t hat
originally sent t he request can send request s t o t he I P address t hat it received back from t he
redirect server. Redirect servers do not init iat e SI P request s.
254
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
I n t he following exam ple, you want t o use client device A t o call som eone who is using client device
C.
Client device A sends a call invit at ion for C t o t he SI P redirect server ( B) .
The SI P redirect server sends t he invit at ion back t o A wit h C’s I P address ( or dom ain nam e) .
Client device A t hen sends t he call invit at ion t o client device C.
Figure 154 SI P Redirect Server
SIP Register Server
A SI P regist er server m aint ains a dat abase of SI P ident it y- t o- I P address ( or dom ain nam e)
m apping. The regist er server checks your user nam e and password when you regist er.
RTP
When you m ake a VoI P call using SI P, t he RTP ( Real t im e Transport Prot ocol) is used t o handle voice
dat a t ransfer. See RFC 1889 for det ails on RTP.
Pulse Code Modulation
Pulse Code Modulat ion ( PCM) m easures analog signal am plit udes at regular t im e int ervals and
convert s t hem int o bit s.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
255
Chapter 21 Voice
SIP Call Progression
The following figure displays t he basic st eps in t he set up and t ear down of a SI P call. A calls B.
Table 120 SI P Call Progression
1. I NVI TE
2. Ringing
3. OK
4. ACK
5.Dialogue ( voice t raffic)
6. BYE
7. OK
A sends a SI P I NVI TE request t o B. This m essage is an invit at ion for B t o part icipat e in a SI P
t elephone call.
B sends a response indicat ing t hat t he t elephone is ringing.
B sends an OK response aft er t he call is answered.
A t hen sends an ACK m essage t o acknowledge t hat B has answered t he call.
Now A and B exchange voice m edia ( t alk) .
Aft er t alking, A hangs up and sends a BYE request .
B replies wit h an OK response confirm ing receipt of t he BYE request and t he call is t erm inat ed.
SIP Call Progression Through Proxy Servers
Usually, t he SI P UAC set s up a phone call by sending a request t o t he SI P proxy server. Then, t he
proxy server looks up t he dest inat ion t o which t he call should be forwarded ( according t o t he URI
request ed by t he SI P UAC) . The request m ay be forwarded t o m ore t han one proxy server before
arriving at it s dest inat ion.
The response t o t he request goes t o all t he proxy servers t hrough which t he request passed, in
reverse sequence. Once t he session is set up, session t raffic is sent bet ween t he UAs direct ly,
bypassing all t he proxy servers in bet ween.
256
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
The following figure shows t he SI P and session t raffic flow bet ween t he user agent s ( UA 1 and UA
2 ) and t he proxy servers ( t his exam ple shows t wo proxy servers, PROXY 1 and PROXY 2 ) .
Figure 155 SI P Call Through Proxy Servers
PROXY 1
PROXY 2
SIP
SIP
SIP
SIP & RTP
UA 1
UA 2
The following t able shows t he SI P call progression.
Table 121 SI P Call Progression
UA 1
PROXY 1
PROXY 2
UA 2
I nvit e
I nvit e
100 Trying
I nvit e
100 Trying
180 Ringing
180 Ringing
180 Ringing
200 OK
200 OK
200 OK
ACK
RTP
RTP
BYE
200 OK
Use r Age n t 1 sends a SI P I NVI TE request t o Pr ox y 1 . This m essage is an invit at ion t o Use r
Age nt 2 t o part icipat e in a SI P t elephone call. Pr ox y 1 sends a response indicat ing t hat it is t rying
t o com plet e t he request .
Pr ox y 1 sends a SI P I NVI TE request t o Pr ox y 2 . Pr ox y 2 sends a response indicat ing t hat it is
t rying t o com plet e t he request .
Pr ox y 2 sends a SI P I NVI TE request t o Use r Age nt 2 .
Use r Age n t 2 sends a response back t o Pr ox y 2 indicat ing t hat t he phone is ringing. The response
is relayed back t o Use r Age n t 1 via Pr ox y 1 .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
257
Chapter 21 Voice
Use r Age n t 2 sends an OK response t o Pr ox y 2 aft er t he call is answered. This is also relayed
back t o Use r Age nt 1 via Pr ox y 1 .
Use r Age n t 1 and Use r Age nt 2 exchange RTP packet s cont aining voice dat a direct ly, wit hout
involving t he proxies.
When Use r Age nt 2 hangs up, he sends a BYE request .
Use r Age n t 1 replies wit h an OK response confirm ing receipt of t he BYE request , and t he call is
t erm inat ed.
Voice Coding
A codec ( coder/ decoder) codes analog voice signals int o digit al signals and decodes t he digit al
signals back int o analog voice signals. The Device support s t he following codecs.
• G.711 is a Pulse Code Modulat ion ( PCM) waveform codec. PCM m easures analog signal
am plit udes at regular t im e int ervals and convert s t hem int o digit al sam ples. G.711 provides very
good sound qualit y but requires 64 kbps of bandwidt h.
• G.726 is an Adapt ive Different ial PCM ( ADPCM) waveform codec t hat uses a lower bit rat e t han
st andard PCM conversion. ADPCM convert s analog audio int o digit al signals based on t he
difference bet ween each audio sam ple and a predict ion based on previous sam ples. The m ore
sim ilar t he audio sam ple is t o t he predict ion, t he less space needed t o describe it . G.726 operat es
at 16, 24, 32 or 40 kbps.
• G.729 is an Analysis- by- Synt hesis ( AbS) hybrid waveform codec t hat uses a filt er based on
inform at ion about how t he hum an vocal t ract produces sounds. G.729 provides good sound
qualit y and reduces t he required bandwidt h t o 8 kbps.
Voice Activity Detection/Silence Suppression
Voice Act ivit y Det ect ion ( VAD) det ect s whet her or not speech is present . This let s t he Device reduce
t he bandwidt h t hat a call uses by not t ransm it t ing “ silent packet s” when you are not speaking.
Comfort Noise Generation
When using VAD, t he Device generat es com fort noise when t he ot her part y is not speaking. The
com fort noise let s you know t hat t he line is st ill connect ed as t ot al silence could easily be m ist aken
for a lost connect ion.
Echo Cancellation
G.168 is an I TU-T st andard for elim inat ing t he echo caused by t he sound of your voice
reverberat ing in t he t elephone receiver while you t alk.
MWI (Message Waiting Indication)
Enable Message Wait ing I ndicat ion ( MWI ) enables your phone t o give you a m essage–wait ing
( beeping) dial t one when you have a voice m essage( s) . Your VoI P service provider m ust have a
m essaging syst em t hat sends m essage wait ing st at us SI P packet s as defined in RFC 3842.
258
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Custom Tones (IVR)
I VR ( I nt eract ive Voice Response) is a feat ure t hat allows you t o use your t elephone t o int eract wit h
t he Device. The Device allows you t o record cust om t ones for t he Ea r ly M e dia and M usic On H old
funct ions. The sam e recordings apply t o bot h t he caller ringing and on hold t ones.
Table 122 Cust om Tones Det ails
LABEL
DESCRIPTION
Tot al Tim e for All Tones
900 seconds for all cust om t ones com bined
Maxim um Tim e per
I ndividual Tone
180 seconds
Tot al Num ber of Tones
Recordable
You can record up t o 5 different cust om t ones but t he t ot al t im e m ust be 900
seconds or less.
Recording Custom Tones
Use t he following st eps if you would like t o creat e new t ones or change your t ones:
Pick up t he phone and press “ * * * * ” on your phone’s keypad and wait for t he m essage t hat says
you are in t he configurat ion m enu.
Press a num ber from 1101~ 1105 on your phone followed by t he “ # ” key.
Play your desired m usic or voice recording int o t he receiver ’s m out hpiece. Press t he “ # ” key.
You can cont inue t o add, list en t o, or delet e t ones, or you can hang up t he receiver when you are
done.
Listening to Custom Tones
Do t he following t o list en t o a cust om t one:
Pick up t he phone and press “ * * * * ” on your phone’s keypad and wait for t he m essage t hat says
you are in t he configurat ion m enu.
Press a num ber from 1201~ 1208 followed by t he “ # ” key t o list en t o t he t one.
You can cont inue t o add, list en t o, or delet e t ones, or you can hang up t he receiver when you are
done.
Deleting Custom Tones
Do t he following t o delet e a cust om t one:
Pick up t he phone and press “ * * * * ” on your phone’s keypad and wait for t he m essage t hat says
you are in t he configurat ion m enu.
Press a num ber from 1301~ 1308 followed by t he “ # ” key t o delet e t he t one of your choice. Press
14 followed by t he “ # ” key if you wish t o clear all your cust om t ones.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
259
Chapter 21 Voice
You can cont inue t o add, list en t o, or delet e t ones, or you can hang up t he receiver when you are
done.
21.10.1 Quality of Service (QoS)
Qualit y of Service ( QoS) refers t o bot h a net work's abilit y t o deliver dat a wit h m inim um delay, and
t he net working m et hods used t o provide bandwidt h for real- t im e m ult im edia applicat ions.
Type of Service (ToS)
Net work t raffic can be classified by set t ing t he ToS ( Type of Service) values at t he dat a source ( for
exam ple, at t he Device) so a server can decide t he best m et hod of delivery, t hat is t he least cost ,
fast est rout e and so on.
DiffServ
DiffServ is a class of service ( CoS) m odel t hat m arks packet s so t hat t hey receive specific per- hop
t reat m ent at DiffServ- com pliant net work devices along t he rout e based on t he applicat ion t ypes
and t raffic flow. Packet s are m arked wit h DiffServ Code Point s ( DSCP) indicat ing t he level of service
desired. This allows t he int erm ediary DiffServ- com pliant net work devices t o handle t he packet s
different ly depending on t he code point s wit hout t he need t o negot iat e pat hs or rem em ber st at e
inform at ion for every flow. I n addit ion, applicat ions do not have t o request a part icular service or
give advanced not ice of where t he t raffic is going. 3
DSCP and Per-Hop Behavior
DiffServ defines a new DS ( Different iat ed Services) field t o replace t he Type of Service ( TOS) field
in t he I P header. The DS field cont ains a 2- bit unused field and a 6- bit DSCP field which can define
up t o 64 service levels. The following figure illust rat es t he DS field.
DSCP is backward com pat ible wit h t he t hree precedence bit s in t he ToS oct et so t hat non- DiffServ
com pliant , ToS- enabled net work device will not conflict wit h t he DSCP m apping.
Figure 156 DiffServ: Different iat ed Service Field
DSCP
Unused
( 6- bit )
(2-bit)
The DSCP value det erm ines t he forwarding behavior, t he PHB ( Per- Hop Behavior) , t hat each packet
get s across t he DiffServ net work. Based on t he m arking rule, different kinds of t raffic can be
m arked for different priorit ies of forwarding. Resources can t hen be allocat ed according t o t he DSCP
values and t he configured policies.
21.10.2 Phone Services Overview
Supplem ent ary services such as call hold, call wait ing, and call t ransfer. are generally available from
your VoI P service provider. The Device support s t he following services:
3.
260
The Device does not support DiffServ at the time of writing.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
• Call Ret urn
• Call Hold
• Call Wait ing
• Making a Second Call
• Call Transfer
• Call Forwarding
• Three- Way Conference
• I nt ernal Calls
• Call Park and Pickup
• Do not Dist urb
• I VR
• Call Com plet ion
• CCBS
• Out going SI P
Not e: To t ake full advant age of t he supplem ent ary phone services available t hrough t he
Device's phone port s, you m ay need t o subscribe t o t he services from your VoI P
service provider.
21.10.2.1 The Flash Key
Flashing m eans t o press t he hook for a short period of t im e ( a few hundred m illiseconds) before
releasing it . On newer t elephones, t here should be a " flash" key ( but t on) t hat generat es t he signal
elect ronically. I f t he flash key is not available, you can t ap ( press and im m ediat ely release) t he
hook by hand t o achieve t he sam e effect . However, using t he flash key is preferred since t he t im ing
is m uch m ore precise. Wit h m anual t apping, if t he durat ion is t oo long, it m ay be int erpret ed as
hanging up by t he Device.
You can invoke all t he supplem ent ary services by using t he flash key.
21.10.2.2 Europe Type Supplementary Phone Services
This sect ion describes how t o use supplem ent ary phone services wit h t he Eur ope Type Ca ll
Se r vice M ode . Com m ands for supplem ent ary services are list ed in t he t able below.
Aft er pressing t he flash key, if you do not issue t he sub- com m and before t he default sub- com m and
t im eout ( 2 seconds) expires or issue an invalid sub- com m and, t he current operat ion will be
abort ed.
Table 123 European Flash Key Com m ands
COMMAND
SUB-COMMAND
Flash
DESCRIPTION
Put a current call on hold t o place a second call.
Swit ch back t o t he call ( if t here is no second call) .
Flash
Drop t he call present ly on hold or rej ect an incom ing call which is wait ing
for answer.
Flash
Disconnect t he current phone connect ion and answer t he incom ing call or
resum e wit h caller present ly on hold.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
261
Chapter 21 Voice
Table 123 European Flash Key Com m ands
COMMAND
SUB-COMMAND
DESCRIPTION
Flash
1. Swit ch back and fort h bet ween t wo calls.
2. Put a current call on hold t o answer an incom ing call.
3. Separat e t he current t hree- way conference call int o t wo individual calls
( one is on- line, t he ot her is on hold) .
Flash
Creat e t hree- way conference connect ion.
Flash
* 98#
Transfer t he call t o anot her phone.
European Call Hold
Call hold allows you t o put a call ( A) on hold by pressing t he flash key.
I f you have anot her call, press t he flash key and t hen “ 2” t o swit ch back and fort h bet ween caller A
and B by put t ing eit her one on hold.
Press t he flash key and t hen “ 0” t o disconnect t he call present ly on hold and keep t he current call
on line.
Press t he flash key and t hen “ 1” t o disconnect t he current call and resum e t he call on hold.
I f you hang up t he phone but a caller is st ill on hold, t here will be a rem ind ring.
European Call Waiting
This allows you t o place a call on hold while you answer anot her incom ing call on t he sam e
t elephone ( direct ory) num ber.
I f t here is a second call t o a t elephone num ber, you will hear a call wait ing t one. Take one of t he
following act ions.
• Rej ect t he second call.
Press t he flash key and t hen press “ 0”.
• Disconnect t he first call and answer t he second call.
Eit her press t he flash key and press “ 1”, or j ust hang up t he phone and t hen answer t he phone
aft er it rings.
• Put t he first call on hold and answer t he second call.
Press t he flash key and t hen “ 2”.
European Call Transfer
Do t he following t o t ransfer an incom ing call ( t hat you have answered) t o anot her phone.
262
Press t he flash key t o put t he caller on hold.
When you hear t he dial t one, dial “ * 98# ” followed by t he num ber t o which you want t o t ransfer t he
call.
Aft er you hear t he ring signal or t he second part y answers it , hang up t he phone.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
European Three-Way Conference
Use t he following st eps t o m ake t hree- way conference calls.
When you are on t he phone t alking t o som eone, press t he flash key t o put t he caller on hold and
get a dial t one.
Dial a phone num ber direct ly t o m ake anot her call.
When t he second call is answered, press t he flash key and press “ 3” t o creat e a t hree- way
conversat ion.
Hang up t he phone t o drop t he connect ion.
I f you want t o separat e t he act ivat ed t hree- way conference int o t wo individual connect ions ( one is
on- line, t he ot her is on hold) , press t he flash key and press “ 2”.
21.10.2.3 USA Type Supplementary Services
This sect ion describes how t o use supplem ent ary phone services wit h t he USA Type Ca ll Se r vice
M ode . Com m ands for supplem ent ary services are list ed in t he t able below.
Aft er pressing t he flash key, if you do not issue t he sub- com m and before t he default sub- com m and
t im eout ( 2 seconds) expires or issue an invalid sub- com m and, t he current operat ion will be
abort ed.
Table 124 USA Flash Key Com m ands
COMMAND
SUB-COMMAND
Flash
DESCRIPTION
Put a current call on hold t o place a second call. Aft er t he second call is
successful, press t he flash key again t o have a t hree- way conference call.
Put a current call on hold t o answer an incom ing call.
Flash
* 98#
Transfer t he call t o anot her phone.
USA Call Hold
Call hold allows you t o put a call ( A) on hold by pressing t he flash key.
I f you have anot her call, press t he flash key t o swit ch back and fort h bet ween caller A and B by
put t ing eit her one on hold.
I f you hang up t he phone but a caller is st ill on hold, t here will be a rem ind ring.
USA Call Waiting
This allows you t o place a call on hold while you answer anot her incom ing call on t he sam e
t elephone ( direct ory) num ber.
I f t here is a second call t o your t elephone num ber, you will hear a call wait ing t one.
Press t he flash key t o put t he first call on hold and answer t he second call.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
263
Chapter 21 Voice
USA Call Transfer
Do t he following t o t ransfer an incom ing call ( t hat you have answered) t o anot her phone.
Press t he flash key t o put t he caller on hold.
When you hear t he dial t one, dial “ * 98# ” followed by t he num ber t o which you want t o t ransfer t he
call.
Aft er you hear t he ring signal or t he second part y answers it , hang up t he phone.
USA Three-Way Conference
Use t he following st eps t o m ake t hree- way conference calls.
When you are on t he phone t alking t o som eone ( part y A) , press t he flash key t o put t he caller on
hold and get a dial t one.
Dial a phone num ber direct ly t o m ake anot her call ( t o part y B) .
When part y B answers t he second call, press t he flash key t o creat e a t hree- way conversat ion.
Hang up t he phone t o drop t he connect ion.
I f you want t o separat e t he act ivat ed t hree- way conference int o t wo individual connect ions ( wit h
part y A on- line and part y B on hold) , press t he flash key.
I f you want t o go back t o t he t hree- way conversat ion, press t he flash key again.
I f you want t o separat e t he act ivat ed t hree- way conference int o t wo individual connect ions again,
press t he flash key. This t im e t he part y B is on- line and part y A is on hold.
21.10.2.4 Phone Functions Summary
The following t able shows t he key com binat ions you can ent er on your phone’s keypad t o use
cert ain feat ures.
Table 125 Phone Funct ions Sum m ary
264
ACTION
FUNCTION
DESCRIPTION
* 98#
Call t ransfer
Transfer a call t o anot her phone. See Sect ion 21.10.2.2 on page 261
( Europe t ype) and Sect ion 21.10.2.3 on page 263 ( USA t ype) .
* 66#
Call ret urn
Place a call t o t he last person who called you.
* 95#
Enable Do Not Dist urb
# 95#
Disable Do Not Dist urb
Use t hese t o set your phone not t o ring when som eone calls you, or
t o t urn t his funct ion off.
* 41#
Enable Call Wait ing
# 41#
Disable Call Wait ing
****
I VR
Use t hese t o set up I nt eract ive Voice Response ( I VR) . I VR allow s
you t o record cust om caller ringing t ones ( t he sound a caller hears
before you pick up t he phone) and on hold t ones ( t he sound
som eone hears when you put t heir call on hold) .
####
I nt ernal Call
Call t he phone( s) connect ed t o t he Device.
Use t hese t o allow you t o put a call on hold when you are answering
anot her, or t o t urn t his funct ion off.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 21 Voice
Table 125 Phone Funct ions Sum m ary
ACTION
FUNCTION
DESCRIPTION
* 82
One Shot Caller Display Call
Act ivat e or deact ivat e caller I D for t he next call only.
* 67
One Shot Caller Hidden Call
VMG8324-B10A / VMG8324-B30A Series User’s Guide
265
Chapter 21 Voice
266
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
22
Log
22.1 Overview
The web configurat or allows you t o choose which cat egories of event s and/ or alert s t o have t he
Device log and t hen display t he logs or have t he Device send t hem t o an adm inist rat or ( as e- m ail)
or t o a syslog server.
22.1.1 What You Can Do in this Chapter
• Use t he Syst e m Log screen t o see t he syst em logs ( Sect ion 22.2 on page 268) .
• Use t he Se cu r it y Log screen t o see t he securit y- relat ed logs for t he cat egories t hat you select
( Sect ion 22.3 on page 269) .
22.1.2 What You Need To Know
The following t erm s and concept s m ay help as you read t his chapt er.
Alerts and Logs
An alert is a t ype of log t hat warrant s m ore serious at t ent ion. They include syst em errors, at t acks
( access cont rol) and at t em pt ed access t o blocked web sit es. Som e cat egories such as Syst e m
Er r or s consist of bot h logs and alert s. You m ay different iat e t hem by t heir color in t he Vie w Log
screen. Alert s display in red and logs display in black.
Syslog Overview
The syslog prot ocol allows devices t o send event not ificat ion m essages across an I P net work t o
syslog servers t hat collect t he event m essages. A syslog- enabled device can generat e a syslog
m essage and send it t o a syslog server.
Syslog is defined in RFC 3164. The RFC defines t he packet form at , cont ent and syst em log relat ed
inform at ion of syslog m essages. Each syslog m essage has a facilit y and severit y level. The syslog
facilit y ident ifies a file in t he syslog server. Refer t o t he docum ent at ion of your syslog program for
det ails. The following t able describes t he syslog severit y levels.
Table 126 Syslog Severit y Levels
CODE
SEVERITY
Em ergency: The syst em is unusable.
Alert : Act ion m ust be t aken im m ediat ely.
Crit ical: The syst em condit ion is crit ical.
Error: There is an error condit ion on t he syst em .
Warning: There is a warning condit ion on t he syst em .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
267
Chapter 22 Log
Table 126 Syslog Severit y Levels
CODE
SEVERITY
Not ice: There is a norm al but significant condit ion on t he syst em .
I nform at ional: The syslog contains an inform at ional m essage.
Debug: The m essage is int ended for debug- level purposes.
22.2 The System Log Screen
Use t he Syst e m Log screen t o see t he syst em logs. Click Syst e m M onit or > Log t o open t he
Syst e m Log screen.
Figure 157 Syst em Monit or > Log > Syst em Log
The following t able describes t he fields in t his screen.
Table 127 Syst em Monit or > Log > Syst em Log
LABEL
DESCRIPTION
Level
Select a severit y level from t he drop- down list box. This filt ers search result s according t o
t he severit y level you have select ed. When you select a severit y, t he Device searches
t hrough all logs of t hat severit y or higher.
Cat egory
Select t he t ype of logs t o display.
Clear Log
Click t his t o delet e all t he logs.
Refresh
Click t his t o renew t he log screen.
Export Log
Click t his t o export t he select ed log( s) .
Em ail Log Now
Click t his t o send t he log file( s) t o t he E- m ail address you specify in t he M a in t e n a n ce >
Logs Se t t in g screen.
Syst em Log
268
This field is a sequent ial value and is not associat ed wit h a specific ent ry.
Tim e
This field displays t he t im e t he log was recorded.
Facilit y
The log facilit y allows you t o send logs t o different files in t he syslog server. Refer t o t he
docum ent at ion of your syslog program for m ore det ails.
Level
This field displays t he severit y level of t he logs t hat t he device is t o send t o t his syslog
server.
Messages
This field st at es t he reason for t he log.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 22 Log
22.3 The Security Log Screen
Use t he Se cu r it y Log screen t o see t he securit y- relat ed logs for t he cat egories t hat you select .
Click Syst e m M onit or > Log > Se cur it y Log t o open t he following screen.
Figure 158 Syst em Monit or > Log > Securit y Log
The following t able describes t he fields in t his screen.
Table 128 Syst em Monit or > Log > Securit y Log
LABEL
DESCRIPTION
Level
Select a severit y level from t he drop- down list box. This filt ers search result s according t o
t he severit y level you have select ed. When you select a severit y, t he Device searches
t hrough all logs of t hat severit y or higher.
Cat egory
Select t he t ype of logs t o display.
Clear Log
Click t his t o delet e all t he logs.
Refresh
Click t his t o renew t he log screen.
Export Log
Click t his t o export t he select ed log( s) .
Em ail Log Now
Click t his t o send t he log file( s) t o t he E- m ail address you specify in t he M a in t e n a n ce >
Logs Se t t in g screen.
This field is a sequent ial value and is not associat ed wit h a specific ent ry.
Tim e
This field displays t he t im e t he log was recorded.
Facilit y
The log facilit y allows you t o send logs t o different files in t he syslog server. Refer t o t he
docum ent at ion of your syslog program for m ore det ails.
Level
This field displays t he severit y level of t he logs t hat t he device is t o send t o t his syslog
server.
Messages
This field st at es t he reason for t he log.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
269
Chapter 22 Log
270
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
23
Traffic Status
23.1 Overview
Use t he Tr a ffic St a t us screens t o look at net work t raffic st at us and st at ist ics of t he WAN, LAN
int erfaces and NAT.
23.1.1 What You Can Do in this Chapter
• Use t he W AN screen t o view t he WAN t raffic st at ist ics ( Sect ion 23.2 on page 271) .
• Use t he LAN screen t o view t he LAN t raffic st at ist ics ( Sect ion 23.3 on page 273) .
• Use t he N AT screen t o view t he NAT st at us of t he Device’s client ( s) ( Sect ion 23.4 on page 274)
23.2 The WAN Status Screen
Click Syst e m M onit or > Tr a ffic St a t us t o open t he W AN screen. The figure in t his screen shows
t he num ber of byt es received and sent on t he Device.
Figure 159 Syst em Monit or > Traffic St at us > WAN
VMG8324-B10A / VMG8324-B30A Series User’s Guide
271
Chapter 23 Traffic Status
The following t able describes t he fields in t his screen.
Table 129 Syst em Monit or > Traffic St at us > WAN
LABEL
DESCRIPTION
Connect ed
I nt erface
This shows t he nam e of t he WAN int erface t hat is current ly connect ed.
Packet s Sent
Dat a
This indicat es t he num ber of t ransm it t ed packet s on t his int erface.
Error
This indicat es t he num ber of fram es wit h errors t ransm it t ed on t his int erface.
Drop
This indicat es t he num ber of out going packet s dropped on t his int erface.
Packet s Received
Dat a
This indicat es t he num ber of received packet s on t his int erface.
Error
This indicat es t he num ber of fram es wit h errors received on t his int erface.
Drop
This indicat es t he num ber of received packet s dropped on t his int erface.
m ore...hide
m ore
Click m or e ... t o show m ore inform at ion. Click h ide m or e t o hide t hem .
Disabled
I nt erface
This shows t he nam e of t he WAN int erface t hat is current ly disconnect ed.
Packet s Sent
Dat a
This indicat es t he num ber of t ransm it t ed packet s on t his int erface.
Error
This indicat es t he num ber of fram es wit h errors t ransm it t ed on t his int erface.
Drop
This indicat es t he num ber of out going packet s dropped on t his int erface.
Packet s Received
272
Dat a
This indicat es t he num ber of received packet s on t his int erface.
Error
This indicat es t he num ber of fram es wit h errors received on t his int erface.
Drop
This indicat es t he num ber of received packet s dropped on t his int erface.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 23 Traffic Status
23.3 The LAN Status Screen
Click Syst e m M onit or > Tr a ffic St a t us > LAN t o open t he following screen. The figure in t his
screen shows t he int erface t hat is current ly connect ed on t he Device.
Figure 160 Syst em Monit or > Traffic St at us > LAN
The following t able describes t he fields in t his screen.
Table 130 Syst em Monit or > Traffic St at us > LAN
LABEL
DESCRIPTION
Refresh I nt erval
Select how oft en you want t he Device t o updat e t his screen.
I nt erface
This shows t he LAN or WLAN int erface.
Byt es Sent
This indicat es t he num ber of byt es t ransm it t ed on t his int erface.
Byt es Received
This indicat es t he num ber of byt es received on t his int erface.
m ore...hide
m ore
Click m or e ... t o show m ore inform at ion. Click h ide m or e t o hide t hem .
I nt erface
This shows t he LAN or WLAN int erface.
Sent ( Packet s)
Dat a
This indicat es t he num ber of t ransm it t ed packet s on t his int erface.
Error
This indicat es t he num ber of fram es wit h errors t ransm it t ed on t his int erface.
Drop
This indicat es t he num ber of out going packet s dropped on t his int erface.
Received ( Packet s)
Dat a
This indicat es t he num ber of received packet s on t his int erface.
Error
This indicat es t he num ber of fram es wit h errors received on t his int erface.
Drop
This indicat es t he num ber of received packet s dropped on t his int erface.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
273
Chapter 23 Traffic Status
23.4 The NAT Status Screen
Click Syst e m M onit or > Tr a ffic St a t us > N AT t o open t he following screen. The figure in t his
screen shows t he NAT session st at ist ics for host s current ly connect ed on t he Device.
Figure 161 Syst em Monit or > Traffic St at us > NAT
The following t able describes t he fields in t his screen.
Table 131 Syst em Monit or > Traffic St at us > NAT
274
LABEL
DESCRIPTION
Refresh I nt erval
Select how oft en you want t he Device t o updat e t his screen.
Device Nam e
This displays t he nam e of t he connect ed host .
I P Address
This displays t he I P address of t he connect ed host .
MAC Address
This displays t he MAC address of t he connect ed host .
No. of Open
Session
This displays t he num ber of NAT sessions current ly opened for t he connect ed
host .
Tot al
This displays what percent age of NAT sessions t he Device can support is current ly
being used by all connect ed host s.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
24
VoIP Status
24.1 The VoIP Status Screen
Click Syst e m M onit or > VoI P St a t us t o open t he following screen. You can view t he VoI P
regist rat ion, current call st at us and phone num bers in t his screen.
Figure 162 Syst em Monit or > VoI P St at us
The following t able describes t he fields in t his screen.
Table 132 Syst em Monit or > VoI P St at us
LABEL
DESCRIPTION
Poll I nt erval( s)
Ent er t he num ber of seconds t he Device needs t o wait before updat ing t his screen and t hen
click Se t I n t e r va l. Click St op t o have t he Device st op updat ing t his screen.
SI P St at us
Account
This colum n displays each SI P account in t he Device.
Regist rat ion
This field displays t he current regist rat ion st at us of t he SI P account . You can change t his in
t he St a t us screen.
Re gist e r e d - The SI P account is regist ered wit h a SI P server.
N ot Re gist e r e d - The last t im e t he Device t ried t o regist er t he SI P account wit h t he SI P
server, t he at t em pt failed. The Device aut om at ically t ries t o regist er t he SI P account when
you t urn on t he Device or when you act ivat e it .
I n a ct ive - The SI P account is not act ive. You can act ivat e it in V oI P > SI P > SI P
Accou n t .
Regist rat ion
Tim e
This field displays t he last t im e t he Device successfully regist ered t he SI P account . The field
is blank if t he Device has never successfully regist ered t his account .
URI
This field displays t he account num ber and service dom ain of t he SI P account . You can
change t hese in t he V oI P > SI P screens.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
275
Chapter 24 VoIP Status
Table 132 Syst em Monit or > VoI P St at us ( cont inued)
LABEL
DESCRIPTION
Message
Wait ing
This field indicat es whet her or not t here are any m essages wait ing for t he SI P account .
Last I ncom ing
Num ber
This field displays t he last num ber t hat called t he SI P account . The field is blank if no
num ber has ever dialed t he SI P account .
Last Out going
Num ber
This field displays t he last num ber t he SI P account called. The field is blank if t he SI P
account has never dialed a num ber.
Call St at us
Account
This colum n displays each SI P account in t he Device.
Durat ion
This field displays how long t he current call has last ed.
St at us
This field displays t he current st at e of t he phone call.
I dle - There are no current VoI P calls, incom ing calls or out going calls being m ade.
D ia l - The callee’s phone is ringing.
Rin g - The phone is ringing for an incom ing VoI P call.
Pr oce ss - There is a VoI P call in progress.
D I SC - The callee’s line is busy, t he callee hung up or your phone was left off t he hook.
Codec
This field displays what voice codec is being used for a current VoI P call t hrough a phone
port .
Peer Num ber
This field displays t he SI P num ber of t he part y t hat is current ly engaged in a VoI P call
t hrough a phone port .
Phone St at us
276
Phone
This field displays t he nam e of a phone port on t he Device.
Out going
Num ber
This field displays t he SI P num ber t hat you use t o m ake calls on t his phone port .
I ncom ing
Num ber
This field displays t he SI P num ber t hat you use t o receive calls on t his phone port .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
25
ARP Table
25.1 Overview
Address Resolut ion Prot ocol ( ARP) is a prot ocol for m apping an I nt ernet Prot ocol address ( I P
address) t o a physical m achine address, also known as a Media Access Cont rol or MAC address, on
t he local area net work.
An I P ( version 4) address is 32 bit s long. I n an Et hernet LAN, MAC addresses are 48 bit s long. The
ARP Table m aint ains an associat ion bet ween each MAC address and it s corresponding I P address.
25.1.1 How ARP Works
When an incom ing packet dest ined for a host device on a local area net work arrives at t he device,
t he device's ARP program looks in t he ARP Table and, if it finds t he address, sends it t o t he device.
I f no ent ry is found for t he I P address, ARP broadcast s t he request t o all t he devices on t he LAN.
The device fills in it s own MAC and I P address in t he sender address fields, and put s t he known I P
address of t he t arget in t he t arget I P address field. I n addit ion, t he device put s all ones in t he t arget
MAC field ( FF.FF.FF.FF.FF.FF is t he Et hernet broadcast address) . The replying device ( which is eit her
t he I P address of t he device being sought or t he rout er t hat knows t he way) replaces t he broadcast
address wit h t he t arget 's MAC address, swaps t he sender and t arget pairs, and unicast s t he answer
direct ly back t o t he request ing m achine. ARP updat es t he ARP Table for fut ure reference and t hen
sends t he packet t o t he MAC address t hat replied.
25.2 ARP Table Screen
Use t he ARP t able t o view I P- t o- MAC address m apping( s) . To open t his screen, click Syst e m
M onit or > ARP Ta ble .
Figure 163 Syst em Monit or > ARP Table
VMG8324-B10A / VMG8324-B30A Series User’s Guide
277
Chapter 25 ARP Table
The following t able describes t he labels in t his screen.
Table 133 Syst em Monit or > ARP Table
LABEL
278
DESCRIPTION
This is t he ARP t able ent ry num ber.
I Pv4/ I Pv6
Address
This is t he learned I Pv4 or I Pv6 I P address of a device connect ed t o a port .
MAC Address
This is t he MAC address of t he device wit h t he list ed I P address.
Device
This is t he t ype of int erface used by t he device. You can click on t he device t ype t o go t o it s
configurat ion screen.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
26
Routing Table
26.1 Overview
Rout ing is based on t he dest inat ion address only and t he Device t akes t he short est pat h t o forward
a packet .
26.2 The Routing Table Screen
Click Syst e m M onit or > Rou t in g Ta ble t o open t he following screen.
Figure 164 Syst em Monit or > Rout ing Table
The following t able describes t he labels in t his screen.
Table 134 Syst em Monit or > Rout ing Table
LABEL
DESCRIPTION
I Pv4/ I Pv6 Rout ing Table
Dest inat ion
This indicat es t he dest inat ion I Pv4 address or I Pv6 address and prefix of t his rout e.
Gat eway
This indicat es t he I Pv4 address or I Pv6 address of t he gat eway t hat helps forward t his
rout e’s t raffic.
Subnet Mask
This indicat es t he dest inat ion subnet m ask of t he I Pv4 rout e.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
279
Chapter 26 Routing Table
Table 134 Syst em Monit or > Rout ing Table ( cont inued)
LABEL
DESCRIPTION
Flag
This indicat es t he rout e st at us.
U- Up: The rout e is up.
!- Re j e ct : The rout e is blocked and will force a rout e lookup t o fail.
G- Ga t e w a y: The rout e uses a gat eway t o forward t raffic.
H - H ost : The t arget of t he rout e is a host .
R- Re in st a t e : The rout e is reinst at ed for dynam ic rout ing.
D - D yn a m ic ( r e dir e ct ) : The rout e is dynam ically inst alled by a rout ing daem on or redirect .
M - M odifie d ( r e dir e ct ) : The rout e is m odified from a rout ing daem on or redirect .
Met ric
The m et ric represent s t he " cost of t ransm ission" . A rout er det erm ines t he best rout e for
t ransm ission by choosing a pat h wit h t he lowest " cost " . The sm aller t he num ber, t he lower
t he " cost " .
Service
This indicat es t he nam e of t he service used t o forward t he rout e.
I nt erface
This indicat es t he nam e of t he int erface t hrough which t he rout e is forwarded.
br x indicat es a LAN int erface where x can be 0~ 3 t o represent LAN1 t o LAN4 respect ively.
pt m 0 indicat es a WAN int erface using I PoE or in bridge m ode.
ppp0 indicat es a WAN int erface using PPPoE.
280
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
27
IGMP/MLD Status
27.1 Overview
Use t he I GM P St a t us screens t o look at I GMP/ MLD group st at us and t raffic st at ist ics.
27.2 The IGMP/MLD Group Status Screen
Use t his screen t o look at t he current list of m ult icast groups t he Device has j oined and which port s
have j oined it . To open t his screen, click Syst e m M onit or > I GM P/ M LD Gr ou p St a t u s.
Figure 165 Syst em Monit or > I GMP/ MLD Group St at us
The following t able describes t he labels in t his screen.
Table 135 Syst em Monit or > I GMP/ MLD Group St at us
LABEL
DESCRIPTION
I nt erface
This field displays t he nam e of an int erface on t he Device t hat belongs t o an I GMP or MLD
m ult icast group.
Mult icast Group
This field displays t he nam e of t he I GMP or MLD m ult icast group t o which t he int erface
belongs.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
281
Chapter 27 IGMP/MLD Status
Table 135 Syst em Monit or > I GMP/ MLD Group St at us ( cont inued)
LABEL
DESCRIPTION
Filt er Mode
I N CLUD E m eans t hat only t he I P addresses in t he Sou r ce List get t o receive t he m ult icast
group’s t raffic.
EXCLUD E m eans t hat t he I P addresses in t he Sour ce List are not allowed t o receive t he
m ult icast group’s t raffic but ot her I P addresses can.
Source List
282
This is t he list of I P addresses t hat are allowed or not allowed t o receive t he m ult icast
group’s t raffic depending on t he filt er m ode.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
28
xDSL Statistics
28.1 The xDSL Statistics Screen
Use t his screen t o view det ailed DSL st at ist ics. Click Syst e m M on it or > x D SL St a t ist ics t o open
t he following screen.
Figure 166 Syst em Monit or > xDSL St at ist ics
VMG8324-B10A / VMG8324-B30A Series User’s Guide
283
Chapter 28 xDSL Statistics
284
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 28 xDSL Statistics
The following t able describes t he labels in t his screen.
Table 136 St at us > xDSL St at ist ics
LABEL
DESCRIPTION
Refresh I nt erval
Select t he t im e int erval for refreshing st at ist ics.
Line
Select which DSL line’s st at ist ics you want t o display.
xDSL Training
St at us
This displays t he current st at e of set t ing up t he DSL connect ion.
Mode
This displays t he I TU st andard used for t his connect ion.
Traffic Type
This displays t he t ype of t raffic t he DSL port is sending and receiving. I na ct ive displays if
t he DSL port is not current ly sending or receiving t raffic.
Link Upt im e
This displays how long t he port has been running ( or connect ed) since t he last t im e it was
st art ed.
xDSL Port Det ails
Upst ream
These are t he st at ist ics for t he t raffic direct ion going out from t he port t o t he service
provider.
Downst ream
These are t he st at ist ics for t he t raffic direct ion com ing int o t he port from t he service
provider.
Line Rat e
These are t he dat a t ransfer rat es at which t he port is sending and receiving dat a.
Act ual Net Dat a
Rat e
These are t he rat es at which t he port is sending and receiving t he payload dat a wit hout
t ransport layer prot ocol headers and t raffic.
Trellis Coding
This displays whet her or not t he port is using Trellis coding for t raffic it is sending and
receiving. Trellis coding helps t o reduce t he noise in ADSL t ransm issions. Trellis m ay
reduce t hroughput but it m akes t he connect ion m ore st able.
SNR Margin
This is t he upst ream and downst ream Signal- t o- Noise Rat io m argin ( in dB) . A DMT subcarrier ’s SNR is t he rat io bet ween t he received signal power and t he received noise power.
The signal- t o- noise rat io m argin is t he m axim um t hat t he received noise power could
increase wit h t he syst em st ill being able t o m eet it s t ransm ission t arget s.
Act ual Delay
This is t he upst ream and downst ream int erleave delay. I t is t he wait ( in m illiseconds) t hat
det erm ines t he size of a single block of dat a t o be int erleaved ( assem bled) and t hen
t ransm it t ed. I nt erleave delay is used when t ransm ission error correct ion ( Reed- Solom on)
is necessary due t o a less t han ideal t elephone line. The bigger t he delay, t he bigger t he
dat a block size, allowing bet t er error correct ion t o be perform ed.
Transm it Power
This is t he upst ream and downst ream far end act ual aggregat e t ransm it power ( in dBm ) .
Upst ream is how m uch power t he port is using t o t ransm it t o t he service provider.
Downst ream is how m uch port t he service provider is using t o t ransm it t o t he port .
Receive Power
Upst ream is how m uch power t he service provider is receiving from t he port . Downst ream
is how m uch power t he port is receiving from t he service provider.
Act ual I NP
Sudden spikes in t he line’s level of ext ernal noise ( im pulse noise) can cause errors and
result in lost packet s. This could especially im pact t he qualit y of m ult im edia t raffic such as
voice or video. I m pulse noise prot ect ion ( I NP) provides a buffer t o allow for correct ion of
errors caused by error correct ion t o deal wit h t his. The num ber of DMT ( Discret e Mult iTone) sym bols shows t he level of im pulse noise prot ect ion for t he upst ream and
downst ream t raffic. A higher sym bol value provides higher error correct ion capabilit y, but it
causes overhead and higher delay which m ay increase error rat es in received m ult im edia
dat a.
Tot al
At t enuat ion
This is t he upst ream and downst ream line at t enuat ion, m easured in decibels ( dB) . This
at t enuat ion is t he difference bet ween t he power t ransm it t ed at t he near- end and t he power
received at t he far- end. At t enuat ion is affect ed by t he channel charact erist ics ( w ire gauge,
qualit y, condit ion and lengt h of t he physical line) .
At t ainable Net
Dat a Rat e
These are t he highest t heoret ically possible t ransfer rat es at which t he port could send and
receive payload dat a wit hout t ransport layer prot ocol headers and t raffic.
xDSL Count ers
VMG8324-B10A / VMG8324-B30A Series User’s Guide
285
Chapter 28 xDSL Statistics
Table 136 St at us > xDSL St at ist ics ( cont inued)
286
LABEL
DESCRIPTION
Downst ream
These are t he st at ist ics for t he t raffic direct ion com ing int o t he port from t he service
provider.
Upst ream
These are t he st at ist ics for t he t raffic direct ion going out from t he port t o t he service
provider.
FEC
This is t he num ber of Far End Correct ed blocks.
CRC
This is t he num ber of Cyclic Redundancy Checks.
ES
This is t he num ber of Errored Seconds m eaning t he num ber of seconds cont aining at least
one errored block or at least one defect .
SES
This is t he num ber of Severely Errored Seconds m eaning t he num ber of seconds cont aining
30% or m ore errored blocks or at least one defect . This is a subset of ES.
UAS
This is t he num ber of UnAvailable Seconds.
LOS
This is t he num ber of Loss Of Signal seconds.
LOF
This is t he num ber of Loss Of Fram e seconds.
LOM
This is t he num ber of Loss of Margin seconds.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
29
3G Statistics
29.1 Overview
Use t he 3 G St a t ist ics screens t o look at 3G I nt ernet connect ion st at us.
29.2 The 3G Statistics Screen
To open t his screen, click Syst e m M onit or > 3 G St a t ist ics. The 3G st at us is available on t his
screen only when you insert a com pat ible 3G dongle in a USB port on t he Device.
Figure 167 Syst em Monit or > 3G St at ist ics
The following t able describes t he labels in t his screen.
Table 137 Syst em Monit or > 3G St at ist ics
LABEL
DESCRIPTION
Refresh
I nt erval
Select how oft en you want t he Device t o updat e t his screen. Select N o Re fr e sh t o st op
refreshing.
3G St at us
This field displays t he st at us of t he 3G I nt ernet connect ion. This field can display:
GSM - Global Syst em for Mobile Com m unicat ions, 2G
GPRS - General Packet Radio Service, 2.5G
ED GE - Enhanced Dat a rat es for GSM Evolut ion, 2.75G
W CD M A - Wideband Code Division Mult iple Access, 3G
H SD PA - High- Speed Downlink Packet Access, 3.5G
H SUPA - High- Speed Uplink Packet Access, 3.75G
H SPA - HSDPA+ HSUPA, 3.75G
Service
Provider
This field displays t he nam e of t he service provider.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
287
Chapter 29 3G Statistics
Table 137 Syst em Monit or > 3G St at ist ics ( cont inued)
LABEL
288
DESCRIPTION
Signal St rengt h
This field displays t he st rengt h of t he signal in dBm .
Connect ion
Upt im e
This field displays t he t im e t he connect ion has been up.
3G Card
Manufact urer
This field displays t he m anufact urer of t he 3G card.
3G Card Model
This field displays t he m odel nam e of t he 3G card.
3G Card F/ W
Version
This field displays t he firm ware version of t he 3G card.
SI M Card I MSI
The I nt ernat ional Mobile Subscriber I dent it y or I MSI is a unique ident ificat ion num ber
associat ed wit h all cellular net works. This num ber is provisioned in t he SI M card.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
30
User Account
30.1 Overview
I n t he Use r s Account screen, you can change t he password of t he “ adm in” user account t hat you
used t o log in t he Device.
30.2 The User Account Screen
Click M a in t e na n ce > Use r Accoun t t o open t he following screen.
Figure 168 Maint enance > User Account
The following t able describes t he labels in t his screen.
Table 138 Maint enance > User Account
LABEL
DESCRIPTION
User Nam e
This field displays t he nam e of t he account t hat you used t o log in t he syst em .
Old Password
Type t he default password or t he exist ing password you use t o access t he syst em in t his
field.
New Password
Type your new syst em password ( up t o 256 charact ers) . Not e t hat as you t ype a password,
t he screen displays a ( * ) for each charact er you t ype. Aft er you change t he password, use
t he new password t o access t he Device.
Ret ype t o
confirm
Type t he new password again for confirm at ion.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
289
Chapter 30 User Account
290
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
31
Remote Management
31.1 Overview
Rem ot e m anagem ent cont rols t hrough which int erface( s) , which services can access t he Device.
Not e: The Device is m anaged using t he Web Configurat or.
31.2 The Remote MGMT Screen
Use t his screen t o configure t hrough which int erface( s) , which services can access t he Device. You
can also specify t he port num bers t he services m ust use t o connect t o t he Device. Click
M a int e na nce > Re m ot e M GM T t o open t he following screen.
Figure 169 Maint enance > Rem ot e MGMT
The following t able describes t he fields in t his screen.
Table 139 Maint enance > Rem ot e MGMT
LABEL
DESCRIPTION
WAN I nt erface
used for
services
Select An y W AN t o have t he Device aut om at ically act ivat e t he rem ot e m anagem ent service
when any WAN connect ion is up.
HTTP
This is t he service you m ay use t o access t he Device.
LAN/ WLAN
Select t he En a ble check box for t he corresponding services t hat you want t o allow access t o
t he Device from t he LAN/ WLAN.
WAN
Select t he En a ble check box for t he corresponding services t hat you want t o allow access t o
t he Device from t he WAN.
Select M u lt i W AN and t hen select one or m ore WAN connect ions t o have t he Device
act ivat e t he rem ot e m anagem ent service when t he select ed WAN connect ions are up.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
291
Chapter 31 Remote Management
Table 139 Maint enance > Rem ot e MGMT ( cont inued)
LABEL
DESCRIPTION
Port
You m ay change t he server port num ber for a service if needed, however you m ust use t he
sam e port num ber in order t o use t hat service for rem ot e m anagem ent .
Cert ificat e
HTTPS
Cert ificat e
Select a cert ificat e t he HTTPS server ( t he Device) uses t o aut hent icat e it self t o t he HTTPS
client . You m ust have cert ificat es already configured in t he Ce r t ifica t e s screen.
Apply
Click Apply t o save your changes back t o t he Device.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
31.3 The Trust Domain Screen
Use t his screen t o view a list of public I P addresses which are allowed t o access t he Device t hrough
t he services configured in t he M a int e n a n ce > Re m ot e M GM T screen. Click M a int e na nce >
Re m ot e M GM T > Tur st D om a in t o open t he following screen.
Not e: I f t his list is em pt y, all public I P addresses can access t he Device from t he WAN
t hrough t he specified services.
Figure 170 Maint enance > Rem ot e MGMT > Trust Dom ain
The following t able describes t he fields in t his screen.
Table 140 Maint enance > Rem ot e MGMT > Trust Dom ain
292
LABEL
DESCRIPTION
Add Trust
Dom ain
Click t his t o add a t rust ed host I P address.
I Pv4 Address
This field shows a t rust ed host I P address.
Delet e
Click t he D e le t e icon t o rem ove t he t rust I P address.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 31 Remote Management
31.4 The Add Trust Domain Screen
Use t his screen t o configure a public I P address which is allowed t o access t he Device. Click t he Add
Tr ust D om a in but t on in t he M a in t e n a n ce > Re m ot e M GM T > Tur st D om a in screen t o open t he
following screen.
Figure 171 Maint enance > Rem ot e MGMT > Trust Dom ain > Add Trust Dom ain
The following t able describes t he fields in t his screen.
Table 141 Maint enance > Rem ot e MGMT > Trust Dom ain > Add Trust Dom ain
LABEL
DESCRIPTION
I Pv4 Address
Ent er a public I Pv4 I P address which is allowed t o access t he service on t he Device from t he
WAN.
Apply
Click Apply t o save your changes back t o t he Device.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
293
Chapter 31 Remote Management
294
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
32
TR-069 Client
32.1 Overview
This chapt er explains how t o configure t he Device’s TR- 069 aut o- configurat ion set t ings.
32.2 The TR-069 Client Screen
TR- 069 defines how Cust om er Prem ise Equipm ent ( CPE) , for exam ple your Device, can be m anaged
over t he WAN by an Aut o Configurat ion Server ( ACS) . TR- 069 is based on sending Rem ot e
Procedure Calls ( RPCs) bet ween an ACS and a client device. RPCs are sent in Ext ensible Markup
Language ( XML) form at over HTTP or HTTPS.
An adm inist rat or can use an ACS t o rem ot ely set up t he Device, m odify set t ings, perform firm ware
upgrades as well as m onit or and diagnose t he Device. You have t o enable t he device t o be m anaged
by t he ACS and specify t he ACS I P address or dom ain nam e and usernam e and password.
Click M a in t e n a n ce > TR- 0 6 9 Clie n t t o open t he following screen. Use t his screen t o configure
your Device t o be m anaged by an ACS.
Figure 172 Maint enance > TR- 069 Client
VMG8324-B10A / VMG8324-B30A Series User’s Guide
295
Chapter 32 TR-069 Client
The following t able describes t he fields in t his screen.
Table 142 Maint enance > TR- 069 Client
LABEL
DESCRIPTION
I nform
Select En a ble for t he Device t o send periodic inform via TR- 069 on t he WAN. Ot herwise,
select D isa ble .
I nform I nt erval
Ent er t he t im e int erval ( in seconds) at which t he Device sends inform at ion t o t he aut oconfigurat ion server.
ACS URL
Ent er t he URL or I P address of t he aut o- configurat ion server.
ACS User Nam e
Ent er t he TR- 069 user nam e for aut hent icat ion wit h t he aut o- configurat ion server.
ACS Password
Ent er t he TR- 069 password for aut hent icat ion wit h t he aut o- configurat ion server.
WAN I nt erface
used by TR- 069
client
Select a WAN int erface t hrough which t he TR- 069 t raffic passes.
I f you select An y_ W AN , t he Device aut om at ically passes t he TR- 069 t raffic when any WAN
connect ion is up.
I f you select M u lt i_ W AN , you also need t o select t wo or m ore pre- configured WAN
int erfaces. The Device aut om at ically passes t he TR- 069 t raffic when one of t he select ed WAN
connect ions is up.
296
Display SOAP
m essages on
serial console
Select En a ble t o show t he SOAP m essages on t he console.
Connect ion
Request
Aut hent icat ion
Select t his opt ion t o enable aut hent icat ion when t here is a connect ion request from t he ACS.
Connect ion
Request User
Nam e
Ent er t he connect ion request user nam e.
Connect ion
Request
Password
Ent er t he connect ion request password.
When t he ACS m akes a connect ion request t o t he Device, t his user nam e is used t o
aut hent icat e t he ACS.
When t he ACS m akes a connect ion request t o t he Device, t his password is used t o
aut hent icat e t he ACS.
Connect ion
Request URL
This shows t he connect ion request URL.
Local cert ificat e
used by TR- 069
client
You can choose a local cert ificat e used by TR- 069 client . The local cert ificat e should be
im port ed in t he Se cu r it y > Ce r t ifica t e s > Loca l Ce r t ifica t e s screen.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
The ACS can use t his URL t o m ake a connect ion request t o t he Device.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
33
TR-064
33.1 Overview
This chapt er explains how t o configure t he Device’s TR- 064 aut o- configurat ion set t ings.
33.2 The TR-064 Screen
TR- 064 is a LAN- Side DSL CPE Configurat ion prot ocol defined by t he DSL Forum . TR- 064 is built on
t op of UPnP. I t allows t he users t o use a TR- 064 com pliant CPE m anagem ent applicat ion on t heir
com put ers from t he LAN t o discover t he CPE and configure user- specific param et ers, such as t he
usernam e and password.
Click M a in t e na n ce > TR- 0 6 4 t o open t he following screen.
Figure 173 Maint enance > TR- 064
The following t able describes t he fields in t his screen.
Table 143 Maint enance > TR- 064
LABEL
DESCRIPTION
St at e
Select En a ble t o act ivat e m anagem ent via TR- 064 on t he LAN.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
297
Chapter 33 TR-064
298
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
34
SNMP
34.1 Overview
This chapt er explains how t o configure t he SNMP set t ings on t he Device.
34.2 The SNMP Screen
Sim ple Net work Managem ent Prot ocol is a prot ocol used for exchanging m anagem ent inform at ion
bet ween net work devices. Your Device support s SNMP agent funct ionalit y, which allows a m anager
st at ion t o m anage and m onit or t he Device t hrough t he net work. The Device support s SNMP version
one ( SNMPv1) and version t wo ( SNMPv2c) . The next figure illust rat es an SNMP m anagem ent
operat ion.
Figure 174 SNMP Managem ent Model
An SNMP m anaged net work consist s of t wo m ain t ypes of com ponent : agent s and a m anager.
An agent is a m anagem ent soft ware m odule t hat resides in a m anaged device ( t he Device) . An
agent t ranslat es t he local m anagem ent inform at ion from t he m anaged device int o a form
com pat ible wit h SNMP. The m anager is t he console t hrough which net work adm inist rat ors perform
net work m anagem ent funct ions. I t execut es applicat ions t hat cont rol and m onit or m anaged
devices.
The m anaged devices cont ain obj ect variables/ m anaged obj ect s t hat define each piece of
inform at ion t o be collect ed about a device. Exam ples of variables include such as num ber of
packet s received, node port st at us et c. A Managem ent I nform at ion Base ( MI B) is a collect ion of
VMG8324-B10A / VMG8324-B30A Series User’s Guide
299
Chapter 34 SNMP
m anaged obj ect s. SNMP allows a m anager and agent s t o com m unicat e for t he purpose of accessing
t hese obj ect s.
SNMP it self is a sim ple request / response prot ocol based on t he m anager/ agent m odel. The
m anager issues a request and t he agent ret urns responses using t he following prot ocol operat ions:
• Get - Allows t he m anager t o ret rieve an obj ect variable from t he agent .
• Get Next - Allows t he m anager t o ret rieve t he next obj ect variable from a t able or list wit hin an
agent . I n SNMPv1, when a m anager want s t o ret rieve all elem ent s of a t able from an agent , it
init iat es a Get operat ion, followed by a series of Get Next operat ions.
• Set - Allows t he m anager t o set values for obj ect variables wit hin an agent .
• Trap - Used by t he agent t o inform t he m anager of som e event s.
Click M a in t e n a n ce > SN M P t o open t he following screen. Use t his screen t o configure t he Device
SNMP set t ings.
Figure 175 Maint enance > SNMP
The following t able describes t he fields in t his screen.
Table 144 Maint enance > SNMP
300
LABEL
DESCRIPTION
SNMP Agent
Select En a ble t o let t he Device act as an SNMP agent , which allows a m anager st at ion
t o m anage and m onit or t he Device t hrough t he net work. Select D isa ble t o t urn t his
feat ure off.
Get Com m unit y
Ent er t he Ge t Com m un it y, which is t he password for t he incom ing Get and Get Next
request s from t he m anagem ent st at ion.
Set Com m unit y
Ent er t he Se t com m u n it y, which is t he password for incom ing Set request s from t he
m anagem ent st at ion.
Syst em Nam e
Ent er t he SNMP syst em nam e.
Syst em Locat ion
Ent er t he SNMP syst em locat ion.
Syst em Cont act
Ent er t he SNMP syst em cont act .
Trap Dest inat ion
Type t he I P address of t he st at ion t o send your SNMP t raps t o.
Apply
Click t his t o save your changes back t o t he Device.
Cancel
Click t his t o rest ore your previously saved set t ings.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
35
Time Settings
35.1 Overview
This chapt er shows you how t o configure syst em relat ed set t ings, such as syst em t im e, password,
nam e, t he dom ain nam e and t he inact ivit y t im eout int erval.
35.2 The Time Screen
To change your Device’s t im e and dat e, click M a int e na nce > Tim e . The screen appears as shown.
Use t his screen t o configure t he Device’s t im e based on your local t im e zone.
Figure 176 Maint enance > Tim e
VMG8324-B10A / VMG8324-B30A Series User’s Guide
301
Chapter 35 Time Settings
The following t able describes t he fields in t his screen.
Table 145 Maint enance > Tim e
LABEL
DESCRIPTION
Current Dat e/ Tim e
Current Tim e
This field displays t he t im e of your Device.
Each t im e you reload t his page, t he Device synchronizes t he t im e wit h t he t im e server.
Current Dat e
This field displays t he dat e of your Device.
Each t im e you reload t his page, t he Device synchronizes t he dat e wit h t he t im e server.
NTP Tim e Server
First ~ Fift h NTP
t im e server
Select an NTP t im e server from t he drop- down list box.
Ot herwise, select Ot h e r and ent er t he I P address or URL ( up t o 29 ext ended ASCI I
charact ers in lengt h) of your t im e server.
Select N on e if you don’t want t o configure t he t im e server.
Check wit h your I SP/ net work adm inist rat or if you are unsure of t his inform at ion.
Tim e Zone
Tim e zone offset
Choose t he t im e zone of your locat ion. This will set t he t im e difference bet ween your t im e
zone and Greenwich Mean Tim e ( GMT) .
Daylight Saving
Daylight Saving Tim e is a period from lat e spring t o early fall when m any count ries set
t heir clocks ahead of norm al local t im e by one hour t o give m ore dayt im e light in t he
evening.
St at e
Select En a ble if you use Daylight Saving Tim e.
St art rule:
Configure t he day and t im e when Daylight Saving Tim e st art s if you enabled Daylight
Saving. You can select a specific dat e in a part icular m ont h or a specific day of a specific
week in a part icular m ont h. The Tim e field uses t he 24 hour form at . Here are a couple of
exam ples:
Daylight Saving Tim e st art s in m ost part s of t he Unit ed St at es on t he second Sunday of
March. Each t im e zone in t he Unit ed St at es st art s using Daylight Saving Tim e at 2 A.M.
local t im e. So in t he Unit ed St at es, set t he day t o Se con d, Su n da y, t he m ont h t o M a r ch
and t he t im e t o 2 in t he H ou r field.
Daylight Saving Tim e st art s in t he European Union on t he last Sunday of March. All of t he
t im e zones in t he European Union st art using Daylight Saving Tim e at t he sam e m om ent
( 1 A.M. GMT or UTC) . So in t he European Union you would set t he day t o La st , Sun da y
and t he m ont h t o M a r ch . The t im e you select in t he o'clock field depends on your t im e
zone. I n Germ any for inst ance, you would select 2 in t he H ou r field because Germ any's
t im e zone is one hour ahead of GMT or UTC ( GMT+ 1) .
End rule
Configure t he day and t im e when Daylight Saving Tim e ends if you enabled Daylight
Saving. You can select a specific dat e in a part icular m ont h or a specific day of a specific
week in a part icular m ont h. The Tim e field uses t he 24 hour form at . Here are a couple of
exam ples:
Daylight Saving Tim e ends in t he Unit ed St at es on t he first Sunday of Novem ber. Each
t im e zone in t he Unit ed St at es st ops using Daylight Saving Tim e at 2 A.M. local t im e. So
in t he Unit ed St at es you would set t he day t o Fir st , Su n da y, t he m ont h t o N ove m be r
and t he t im e t o 2 in t he H ou r field.
Daylight Saving Tim e ends in t he European Union on t he last Sunday of Oct ober. All of t he
t im e zones in t he European Union st op using Daylight Saving Tim e at t he sam e m om ent
( 1 A.M. GMT or UTC) . So in t he European Union you would set t he day t o La st , Su nda y,
and t he m ont h t o Oct obe r. The t im e you select in t he o'clock field depends on your t im e
zone. I n Germ any for inst ance, you would select 2 in t he H ou r field because Germ any's
t im e zone is one hour ahead of GMT or UTC ( GMT+ 1) .
302
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 35 Time Settings
Table 145 Maint enance > Tim e ( cont inued)
LABEL
DESCRIPTION
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o exit t his screen wit hout saving.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
303
Chapter 35 Time Settings
304
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
36
E-mail Notification
36.1 Overview
A m ail server is an applicat ion or a com put er t hat runs such an applicat ion t o receive, forward and
deliver e- m ail m essages.
To have t he Device send report s, logs or not ificat ions via e- m ail, you m ust specify an e- m ail server
and t he e- m ail addresses of t he sender and receiver.
36.2 The Email Notification Screen
Click M a int e n a n ce > Em a il N ot ifica t ion t o open t he Em a il N ot ifica t ion screen. Use t his screen
t o view, rem ove and add m ail server inform at ion on t he Device.
Figure 177 Maint enance > Em ail Not ificat ion
The following t able describes t he labels in t his screen.
Table 146 Maint enance > Em ail Not ificat ion
LABEL
DESCRIPTION
Add New Em ail
Click t his but t on t o creat e a new ent ry.
Mail Server
Address
This field displays t he server nam e or t he I P address of t he m ail server.
Usernam e
This field displays t he user nam e of t he sender ’s m ail account .
Password
This field displays t he password of t he sender ’s m ail account .
Em ail Address
This field displays t he e- m ail address t hat you want t o be in t he from / sender line of t he em ail t hat t he Device sends.
Delet e
Click t his but t on t o delet e t he select ed ent ry( ies) .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
305
Chapter 36 E-mail Notification
36.2.1 Email Notification Edit
Click t he Add but t on in t he Em a il N ot ifica t ion screen. Use t his screen t o configure t he required
inform at ion for sending e- m ail via a m ail server.
Figure 178 Em ail Not ificat ion > Add
The following t able describes t he labels in t his screen.
Table 147 Em ail Not ificat ion > Add
LABEL
DESCRIPTION
Mail Server
Address
Ent er t he server nam e or t he I P address of t he m ail server for t he e- m ail address specified
in t he Accou n t Em a il Addr e ss field.
I f t his field is left blank, report s, logs or not ificat ions will not be sent via e- m ail.
Aut hent icat ion
Usernam e
Ent er t he user nam e ( up t o 32 charact ers) . This is usually t he user nam e of a m ail account
you specified in t he Accou n t Em a il Addr e ss field.
Aut hent icat ion
Password
Ent er t he password associat ed wit h t he user nam e above.
Account Em ail
Address
Ent er t he e- m ail address t hat you want t o be in t he from / sender line of t he e- m ail
not ificat ion t hat t he Device sends.
I f you act ivat e SSL/ TLS aut hent icat ion, t he e- m ail address m ust be able t o be aut hent icat ed
by t he m ail server as well.
306
Apply
Click t his but t on t o save your changes and ret urn t o t he previous screen.
Cancel
Click t his but t on t o begin configuring t his screen afresh.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
37
Logs Setting
37.1 Overview
You can configure where t he Device sends logs and which logs and/ or im m ediat e alert s t he Device
records in t he Logs Se t t ing screen.
37.2 The Log Settings Screen
To change your Device’s log set t ings, click M a int e na nce > Logs Se t t in g. The screen appears as
shown.
Figure 179 Maint enance > Logs Set t ing
VMG8324-B10A / VMG8324-B30A Series User’s Guide
307
Chapter 37 Logs Setting
The following t able describes t he fields in t his screen.
Table 148 Maint enance > Logs Set t ing
LABEL
DESCRIPTION
Syslog Set t ing
Syslog Logging
The Device sends a log t o an ext ernal syslog server. Select En a ble t o enable syslog logging.
Mode
Select t he syslog dest inat ion from t he drop- down list box.
I f you select Re m ot e , t he log( s) will be sent t o a rem ot e syslog server. I f you select Loca l
File , t he log( s) will be saved in a local file. I f you want t o send t he log( s) t o a rem ot e syslog
server and save it in a local file, select Loca l File a n d Re m ot e .
Syslog Server
Ent er t he server nam e or I P address of t he syslog server t hat will log t he select ed cat egories
of logs.
UDP Port
Ent er t he port num ber used by t he syslog server.
E- m ail Log Set t ings
Mail Server
Ent er t he server nam e or t he I P address of t he m ail server for t he e- m ail addresses
specified below. I f t his field is left blank, logs and alert m essages will not be sent via E- m ail.
Syst em Log
Mail Subj ect
Type a t it le t hat you want t o be in t he subj ect line of t he syst em log e- m ail m essage t hat
t he Device sends.
Securit y Log
Mail Subj ect
Type a t it le t hat you want t o be in t he subj ect line of t he securit y log e- m ail m essage t hat
t he Device sends.
Send Log t o
The Device sends logs t o t he e- m ail address specified in t his field. I f t his field is left blank,
t he Device does not send logs via E- m ail.
Send Alarm t o
Alert s are real- t im e not ificat ions t hat are sent as soon as an event , such as a DoS at t ack,
syst em error, or forbidden web access at t em pt occurs. Ent er t he E- m ail address where t he
alert m essages will be sent . Alert s include syst em errors, at t acks and at t em pt ed access t o
blocked web sit es. I f t his field is left blank, alert m essages will not be sent via E- m ail.
Alarm I nt erval
Specify how oft en t he alarm should be updat ed.
Allowed
Capacit y Before
Em ail
Set what percent of t he Device’s log st orage space can be filled before t he Device sends a
log e- m ail.
Clear log aft er
sending m ail
Select t his t o delet e all t he logs aft er t he Device sends an E- m ail of t he logs.
Act ive Log and Alert
Syst em Log
Select t he cat egories of syst em logs t hat you want t o record.
Securit y Log
Select t he cat egories of securit y logs t hat you want t o record.
Send
im m ediat e alert
Select log cat egories for which you want t he Device t o send E- m ail alert s im m ediat ely.
Apply
Click Apply t o save your changes.
Cancel
Click Ca n ce l t o rest ore your previously saved set t ings.
37.2.1 Example E-mail Log
An " End of Log" m essage displays for each m ail in which a com plet e log has been sent . The
following is an exam ple of a log sent by e- m ail.
• You m ay edit t he subj ect t it le.
• The dat e form at here is Day- Mont h-Year.
• The dat e form at here is Mont h- Day-Year. The t im e form at is Hour- Minut e- Second.
308
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 37 Logs Setting
• " End of Log" m essage shows t hat a com plet e log has been sent .
Figure 180 E- m ail Log Exam ple
Subject:
Firewall Alert From
Date:
Fri, 07 Apr 2000 10:05:42
From:
user@zyxel.com
To:
user@zyxel.com
1|Apr 7 00 |From:192.168.1.1
To:192.168.1.255
|default policy |forward
| 09:54:03 |UDP
src port:00520 dest port:00520 |<1,00>
2|Apr 7 00 |From:192.168.1.131
To:192.168.1.255
|default policy |forward
| 09:54:17 |UDP
src port:00520 dest port:00520 |<1,00>
3|Apr 7 00 |From:192.168.1.6
To:10.10.10.10 |match
|forward
| 09:54:19 |UDP
src port:03516 dest port:00053 |<1,01>
……………………………..{snip}…………………………………..
……………………………..{snip}…………………………………..
126|Apr 7 00 |From:192.168.1.1
To:192.168.1.255
|match
|forward
| 10:05:00 |UDP
src port:00520 dest port:00520 |<1,02>
127|Apr 7 00 |From:192.168.1.131
To:192.168.1.255
|match
|forward
| 10:05:17 |UDP
src port:00520 dest port:00520 |<1,02>
128|Apr 7 00 |From:192.168.1.1
To:192.168.1.255
|match
|forward
| 10:05:30 |UDP
src port:00520 dest port:00520 |<1,02>
End of Firewall Log
VMG8324-B10A / VMG8324-B30A Series User’s Guide
309
Chapter 37 Logs Setting
310
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
38
Firmware Upgrade
38.1 Overview
This chapt er explains how t o upload new firm ware t o your Device. You can download new firm ware
releases from your nearest ZyXEL FTP sit e ( or www.zyxel.com ) t o use t o upgrade your device’s
perform ance.
Only use firmware for your device’s specific model. Refer to the label on
the bottom of your Device.
38.2 The Firmware Screen
Click M a int e na nce > Fir m w a r e Upgr a de t o open t he following screen. The upload process uses
HTTP ( Hypert ext Transfer Prot ocol) and m ay t ake up t o t wo m inut es. Aft er a successful upload, t he
syst em will reboot .
Do NOT turn off the Device while firmware upload is in progress!
Figure 181 Maint enance > Firm ware Upgrade
The following t able describes t he labels in t his screen.
Table 149 Maint enance > Firm ware Upgrade
LABEL
DESCRIPTION
Current
Firm ware
Version
This is t he present Firm ware version and t he dat e creat ed.
File Pat h
Type in t he locat ion of t he file you want t o upload in t his field or click Br ow se ... t o find it .
Browse...
Click t his t o find t he .bin file you want t o upload. Rem em ber t hat you m ust decom press
com pressed ( .zip) files before you can upload t hem .
Upload
Click t his t o begin t he upload process. This process m ay t ake up t o t wo m inut es.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
311
Chapter 38 Firmware Upgrade
Aft er you see t he firm ware updat ing screen, wait t wo m inut es before logging int o t he Device again.
Figure 182 Firm ware Uploading
The Device aut om at ically rest art s in t his t im e causing a t em porary net work disconnect . I n som e
operat ing syst em s, you m ay see t he following icon on your deskt op.
Figure 183 Net work Tem porarily Disconnect ed
Aft er t wo m inut es, log in again and check your new firm ware version in t he St a t us screen.
I f t he upload was not successful, t he following screen will appear. Click OK t o go back t o t he
Fir m w a r e Upgr a de screen.
Figure 184 Error Message
312
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
39
Configuration
39.1 Overview
The Con figu r a t ion screen allows you t o backup and rest ore device configurat ions. You can also
reset your device set t ings back t o t he fact ory default .
39.2 The Configuration Screen
Click M a int e na nce > Configur a t ion . I nform at ion relat ed t o fact ory default s, backup
configurat ion, and rest oring configurat ion appears in t his screen, as shown next .
Figure 185 Maint enance > Configurat ion
Backup Configuration
Backup Configurat ion allows you t o back up ( save) t he Device’s current configurat ion t o a file on
your com put er. Once your Device is configured and funct ioning properly, it is highly recom m ended
t hat you back up your configurat ion file before m aking configurat ion changes. The backup
configurat ion file will be useful in case you need t o ret urn t o your previous set t ings.
Click Ba ck up t o save t he Device’s current configurat ion t o your com put er.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
313
Chapter 39 Configuration
Restore Configuration
Rest ore Configurat ion allows you t o upload a new or previously saved configurat ion file from your
com put er t o your Device.
Table 150 Rest ore Configurat ion
LABEL
DESCRIPTION
File Pat h
Type in t he locat ion of t he file you want t o upload in t his field or click Br ow se ... t o find it .
Browse...
Click t his t o find t he file you want t o upload. Rem em ber t hat you m ust decom press
com pressed ( .ZI P) files before you can upload t hem .
Upload
Click t his t o begin t he upload process.
Do not turn off the Device while configuration file upload is in progress.
Aft er t he Device configurat ion has been rest ored successfully, t he login screen appears. Login again
t o rest art t he Device.
The Device aut om at ically rest art s in t his t im e causing a t em porary net work disconnect . I n som e
operat ing syst em s, you m ay see t he following icon on your deskt op.
Figure 186 Net work Tem porarily Disconnect ed
I f you uploaded t he default configurat ion file you m ay need t o change t he I P address of your
com put er t o be in t he sam e subnet as t hat of t he default device I P address ( 192.168.1.1) . See
Appendix B on page 335 for det ails on how t o set up your com put er ’s I P address.
I f t he upload was not successful, t he following screen will appear. Click OK t o go back t o t he
Con figu r a t ion screen.
Figure 187 Configurat ion Upload Error
314
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 39 Configuration
Reset to Factory Defaults
Click t he Re se t but t on t o clear all user- ent ered configurat ion inform at ion and ret urn t he Device t o
it s fact ory default s. The following warning screen appears.
Figure 188 Reset Warning Message
Figure 189 Reset I n Process Message
You can also press t he RESET but t on on t he rear panel t o reset t he fact ory default s of your Device.
Refer t o Sect ion 1.6 on page 22 for m ore inform at ion on t he RESET but t on.
39.3 The Reboot Screen
Syst em rest art allows you t o reboot t he Device rem ot ely wit hout t urning t he power off. You m ay
need t o do t his if t he Device hangs, for exam ple.
Click M a in t e n a n ce > Re boot . Click Re boot t o have t he Device reboot . This does not affect t he
Device's configurat ion.
Figure 190 Maint enance > Reboot
VMG8324-B10A / VMG8324-B30A Series User’s Guide
315
Chapter 39 Configuration
316
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
40
Diagnostic
40.1 Overview
The D ia gnost ic screens display inform at ion t o help you ident ify problem s wit h t he Device.
The rout e bet ween a CO VDSL swit ch and one of it s CPE m ay go t hrough swit ches owned by
independent organizat ions. A connect ivit y fault point generally t akes t im e t o discover and im pact s
subscriber ’s net work access. I n order t o elim inat e t he m anagem ent and m aint enance effort s, I EEE
802.1ag is a Connect ivit y Fault Managem ent ( CFM) specificat ion which allows net work
adm inist rat ors t o ident ify and m anage connect ion fault s. Through discovery and verificat ion of t he
pat h, CFM can det ect , analyze and isolat e connect ivit y fault s in bridged LANs.
40.1.1 What You Can Do in this Chapter
• The Pin g & Tr a ce Rou t e & N sLook up screen let s you ping an I P address or t race t he rout e
packet s t ake t o a host ( Sect ion 40.3 on page 318) .
• The 8 0 2 .1 a g screen let s you perform CFM act ions ( Sect ion 40.5 on page 320) .
• The OAM Ping screen let s you send an ATM OAM ( Operat ion, Adm inist rat ion and Maint enance)
packet t o verify t he connect ivit y of a specific PVC. ( Sect ion 40.5 on page 320) .
40.2 What You Need to Know
The following t erm s and concept s m ay help as you read t hrough t his chapt er.
How CFM Works
A Maint enance Associat ion ( MA) defines a VLAN and associat ed Maint enance End Point ( MEP) port s
on t he device under a Maint enance Dom ain ( MD) level. An MEP port has t he abilit y t o send
Connect ivit y Check Messages ( CCMs) and get ot her MEP port s inform at ion from neighbor devices’
CCMs wit hin an MA.
CFM provides t wo t est s t o discover connect ivit y fault s.
• Loopback t est - checks if t he MEP port receives it s Loop Back Response ( LBR) from it s t arget
aft er it sends t he Loop Back Message ( LBM) . I f no response is received, t here m ight be a
connect ivit y fault bet ween t hem .
• Link t race t est - provides addit ional connect ivit y fault analysis t o get m ore inform at ion on where
t he fault is. I f an MEP port does not respond t o t he source MEP, t his m ay indicat e a fault .
Adm inist rat ors can t ake furt her act ion t o check and resum e services from t he fault according t o
t he line connect ivit y st at us report .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
317
Chapter 40 Diagnostic
40.3 Ping & TraceRoute & NsLookup
Use t his screen t o ping, t racerout e, or nslookup an I P address. Click M a int e na nce > D ia gnost ic >
Pin g& Tr a ce Rout e & N sLook up t o open t he screen shown next .
Figure 191 Maint enance > Diagnost ic > Ping &TraceRout e&NsLookup
The following t able describes t he fields in t his screen.
Table 151 Maint enance > Diagnost ic > Ping & TraceRout e & NsLookup
318
LABEL
DESCRIPTION
URL or I P
Address
Type t he I P address of a com put er t hat you want t o perform ping, t racerout e, or nslookup in
order t o t est a connect ion.
Ping
Click t his t o ping t he I P address t hat you ent ered.
TraceRout e
Click t his but t on t o perform t he t racerout e funct ion. This det erm ines t he pat h a packet
t akes t o t he specified com put er.
Nslookup
Click t his but t on t o perform a DNS lookup on t he I P address of a com put er you ent er.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 40 Diagnostic
40.4 802.1ag
Click M a in t e n a n ce > D ia gn ost ic > 8 .2 .1 a g t o open t he following screen. Use t his screen t o
perform CFM act ions.
Figure 192 Maint enance > Diagnost ic > 802.1ag
The following t able describes t he fields in t his screen.
Table 152 Maint enance > Diagnost ic > 802.1ag
LABEL
DESCRIPTION
802.1ag Connect ivit y Fault Managem ent
Maint enance
Dom ain ( MD)
Level
Select a level ( 0- 7) under which you want t o creat e an MA.
Dest inat ion
MAC Address
Ent er t he t arget device’s MAC address t o which t he Device perform s a CFM loopback t est .
802.1Q VLAN
ID
Type a VLAN I D ( 0- 4095) for t his MA.
VDSL Traffic
Type
This shows whet her t he VDSL t raffic is act ivat ed.
Loopback
Message ( LBM)
This shows how m any Loop Back Messages ( LBMs) are sent and if t here is any inorder or
out order Loop Back Response ( LBR) received from a rem ot e MEP.
Linkt race
Message ( LTM)
This shows t he dest inat ion MAC address in t he Link Trace Response ( LTR) .
Set MD Level
Click t his but t on t o configure t he MD ( Maint enance Dom ain) level.
Send Loopback
Click t his but t on t o have t he select ed MEP send t he LBM ( Loop Back Message) t o a specified
rem ot e end point .
Send Linkt race
Click t his but t on t o have t he select ed MEP send t he LTMs ( Link Trace Messages) t o a
specified rem ot e end point .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
319
Chapter 40 Diagnostic
40.5 OAM Ping
Click M a in t e n a nce > D ia gn ost ic > OAM Pin g t o open t he screen shown next . Use t his screen t o
perform an OAM ( Operat ion, Adm inist rat ion and Maint enance) F4 or F5 loopback t est on a PVC. The
Device sends an OAM F4 or F5 packet t o t he DSLAM or ATM swit ch and t hen ret urns it t o t he
Device. The t est result t hen displays in t he t ext box.
ATM set s up virt ual circuit s over which end syst em s com m unicat e. The t erm inology for virt ual
circuit s is as follows:
•
Virt ual Channel ( VC)
Logical connect ions bet ween ATM devices
•
Virt ual Pat h ( VP)
A bundle of virt ual channels
•
Virt ual Circuit s
A series of virt ual pat hs bet ween circuit end point s
Figure 193 Virt ual Circuit Topology
Think of a virt ual pat h as a cable t hat cont ains a bundle of wires. The cable connect s t wo point s and
wires wit hin t he cable provide individual circuit s bet ween t he t wo point s. I n an ATM cell header, a
VPI ( Virt ual Pat h I dent ifier) ident ifies a link form ed by a virt ual pat h; a VCI ( Virt ual Channel
I dent ifier) ident ifies a channel wit hin a virt ual pat h. A series of virt ual pat hs m ake up a virt ual
circuit .
F4 cells operat e at t he virt ual pat h ( VP) level, while F5 cells operat e at t he virt ual channel ( VC)
level. F4 cells use t he sam e VPI as t he user dat a cells on VP connect ions, but use different
predefined VCI values. F5 cells use t he sam e VPI and VCI as t he user dat a cells on t he VC
connect ions, and are dist inguished from dat a cells by a predefinded Payload Type I dent ifier ( PTI ) in
t he cell header. Bot h F4 flows and F5 flows are bidirect ional and have t wo t ypes.
• segm ent F4 flows ( VCI = 3)
• end- t o- end F4 flows ( VCI = 4)
• segm ent F5 flows ( PTI = 100)
• end- t o- end F5 flows ( PTI = 101)
OAM F4 or F5 t est s are used t o check virt ual pat h or virt ual channel availabilit y bet ween t wo DSL
devices. Segm ent flows are t erm inat ed at t he connect ing point which t erm inat es a VP or VC
segm ent . End- t o- end flows are t erm inat ed at t he end point of a VP or VC connect ion, where an ATM
link is t erm inat ed. Segm ent loopback t est s allow you t o verify int egrit y of a PVC t o t he nearest
neighboring ATM device. End- t o- end loopback t est s allow you t o verify int egrit y of an end- t o- end
PVC.
Not e: The DSLAM t o w hich t he Device is connect ed m ust also support ATM F4 and/ or F5
t o use t his t est .
320
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 40 Diagnostic
Not e: This screen is available only when you configure an ATM layer- 2 int erface.
Figure 194 Maint enance > Diagnost ic > OAM Ping
The following t able describes t he fields in t his screen.
Table 153 Maint enance > Diagnost ic > OAM Ping
LABEL
DESCRIPTION
Select a PVC on which you want t o perform t he loopback t est .
F4 segm ent
Press t his t o perform an OAM F4 segm ent loopback t est .
F4 end- end
Press t his t o perform an OAM F4 end- t o- end loopback t est .
F5 segm ent
Press t his t o perform an OAM F5 segm ent loopback t est .
F5 end- end
Press t his t o perform an OAM F5 end- t o- end loopback t est .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
321
Chapter 40 Diagnostic
322
VMG8324-B10A / VMG8324-B30A Series User’s Guide
C HAPTER
41
Troubleshooting
This chapt er offers som e suggest ions t o solve problem s you m ight encount er. The pot ent ial
problem s are divided int o t he following cat egories.
• Power, Hardware Connect ions, and LEDs
• Device Access and Login
• I nt ernet Access
• Wireless I nt ernet Access
• USB Device Connect ion
• UPnP
41.1 Power, Hardware Connections, and LEDs
The Device does not t urn on. None of t he LEDs t urn on.
Make sure t he Device is t urned on.
Make sure you are using t he power adapt or or cord included wit h t he Device.
Make sure t he power adapt or or cord is connect ed t o t he Device and plugged in t o an appropriat e
power source. Make sure t he power source is t urned on.
Turn t he Device off and on.
I f t he problem cont inues, cont act t he vendor.
One of t he LEDs does not behave as expect ed.
Make sure you underst and t he norm al behavior of t he LED. See Sect ion 1.5 on page 20.
Check t he hardware connect ions.
I nspect your cables for dam age. Cont act t he vendor t o replace any dam aged cables.
Turn t he Device off and on.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
323
Chapter 41 Troubleshooting
I f t he problem cont inues, cont act t he vendor.
41.2 Device Access and Login
I forgot t he I P address for t he Device.
The default LAN I P address is 192.168.1.1.
I f you changed t he I P address and have forgot t en it , you m ight get t he I P address of t he Device by
looking up t he I P address of t he default gat eway for your com put er. To do t his in m ost Windows
com put ers, click St a r t > Run , ent er cm d, and t hen ent er ipconfig. The I P address of t he D e fa ult
Ga t e w a y m ight be t he I P address of t he Device ( it depends on t he net work) , so ent er t his I P
address in your I nt ernet browser.
I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 1.6 on page
22.
I forgot t he passwor d.
The default adm in password is 1 2 3 4 .
I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 1.6 on page
22.
I cannot see or access t he Login screen in t he web configurat or.
Make sure you are using t he correct I P address.
• The default I P address is 192.168.1.1.
• I f you changed t he I P address ( Sect ion 7.2 on page 109) , use t he new I P address.
• I f you changed t he I P address and have forgot t en it , see t he t roubleshoot ing suggest ions for I
forgot t he I P address for t he Device.
324
Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See Sect ion
1.5 on page 20.
Make sure your I nt ernet browser does not block pop- up windows and has JavaScript s and Java
enabled. See Appendix D on page 365.
I f it is possible t o log in from anot her int erface, check t he service cont rol set t ings for HTTP and
HTTPS ( M a int e n a n ce > Re m ot e M GM T) .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 41 Troubleshooting
Reset t he device t o it s fact ory default s, and t ry t o access t he Device wit h t he default I P address.
See Sect ion 1.6 on page 22.
I f t he problem cont inues, cont act t he net work adm inist rat or or vendor, or t ry one of t he advanced
suggest ions.
Adva n ce d Sugge st ions
• Make sure you have logged out of any earlier m anagem ent sessions using t he sam e user account
even if t hey were t hrough a different int erface or using a different browser.
• Try t o access t he Device using anot her service, such as Telnet . I f you can access t he Device,
check t he rem ot e m anagem ent set t ings and firewall rules t o find out why t he Device does not
respond t o HTTP.
I can see t he Login screen, but I cannot log in t o t he Device.
Make sure you have ent ered t he password correct ly. The default adm in password is 1 2 3 4 . The field
is case- sensit ive, so m ake sure [ Caps Lock] is not on.
You cannot log in t o t he web configurat or while som eone is using Telnet t o access t he Device. Log
out of t he Device in t he ot her session, or ask t he person who is logged in t o log out .
Turn t he Device off and on.
I f t his does not work, you have t o reset t he device t o it s fact ory default s. See Sect ion 41.1 on page
323.
I cannot Telnet t o t he Device.
See t he t roubleshoot ing suggest ions for I cannot see or access t he Login screen in t he web
configurat or. I gnore t he suggest ions about your browser.
I cannot use FTP t o upload / download t he configurat ion file. / I cannot use FTP t o upload
new firm ware.
See t he t roubleshoot ing suggest ions for I cannot see or access t he Login screen in t he web
configurat or. I gnore t he suggest ions about your browser.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
325
Chapter 41 Troubleshooting
41.3 Internet Access
I cannot access t he I nt er net .
Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he
Quick St a r t Guide and Sect ion 1.5 on page 20.
Make sure you ent ered your I SP account inform at ion correct ly in t he N e t w or k Se t t in g >
Br oa dba n d screen. These fields are case- sensit ive, so m ake sure [ Caps Lock] is not on.
I f you are t rying t o access t he I nt ernet wirelessly, m ake sure t hat you enabled t he wireless LAN in
t he Device and your wireless client and t hat t he wireless set t ings in t he wireless client are t he sam e
as t he set t ings in t he Device.
Disconnect all t he cables from your device and reconnect t hem .
I f t he problem cont inues, cont act your I SP.
I cannot access t he I nt er net t hrough a DSL connect ion.
Make sure you have t he D SL W AN port connect ed t o a t elephone j ack ( or t he DSL or m odem j ack
on a split t er if you have one) .
Make sure you configured a proper DSL WAN int erface (N e t w or k Se t t in g > Br oa dba n d screen)
wit h t he I nt ernet account inform at ion provided by your I SP and t hat it is enabled.
Check t hat t he LAN int erface you are connect ed t o is in t he sam e int erface group as t he DSL
connect ion ( N e t w or k Se t t ing > I nt e r fa ce Gr oup) .
I f you set up a WAN connect ion using bridging service, m ake sure you t urn off t he DHCP feat ure in
t he LAN screen t o have t he client s get WAN I P addresses direct ly from your I SP’s DHCP server.
I cannot connect t o t he I nt ernet using a second DSL connect ion.
ADSL and VDSL connect ions cannot work at t he sam e t im e. You can only use one t ype of DSL
connect ion, eit her ADSL or VDSL connect ion at one t im e.
I cannot access t he I nt ernet anym ore. I had access t o t he I nt ernet ( wit h t he Device) , but m y
I nt ernet connect ion is not available anym ore.
326
Your session wit h t he Device m ay have expired. Try logging int o t he Device again.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Chapter 41 Troubleshooting
Check t he hardware connect ions, and m ake sure t he LEDs are behaving as expect ed. See t he
Quick St a r t Guide and Sect ion 1.5 on page 20.
Turn t he Device off and on.
I f t he problem cont inues, cont act your I SP.
41.4 Wireless Internet Access
What fact ors m ay cause int erm it t ent or unst abled wireless connect ion? How can I solve t his
problem ?
The following fact ors m ay cause int erference:
• Obst acles: walls, ceilings, furnit ure, and so on.
• Building Mat erials: m et al doors, alum inum st uds.
• Elect rical devices: m icrowaves, m onit ors, elect ric m ot ors, cordless phones, and ot her wireless
devices.
To opt im ize t he speed and qualit y of your wireless connect ion, you can:
• Move your wireless device closer t o t he AP if t he signal st rengt h is low.
• Reduce wireless int erference t hat m ay be caused by ot her wireless net works or surrounding
wireless elect ronics such as cordless phones.
• Place t he AP where t here are m inim um obst acles ( such as walls and ceilings) bet ween t he AP and
t he wireless client .
• Reduce t he num ber of wireless client s connect ing t o t he sam e AP sim ult aneously, or add
addit ional APs if necessary.
• Try closing som e program s t hat use t he I nt ernet , especially peer- t o- peer applicat ions. I f t he
wireless client is sending or receiving a lot of inform at ion, it m ay have t oo m any program s open
t hat use t he I nt ernet .
What is a Server Set I D ( SSI D) ?
An SSI D is a nam e t hat uniquely ident ifies a wireless net work. The AP and all t he client s wit hin a
wireless net work m ust use t he sam e SSI D.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
327
Chapter 41 Troubleshooting
41.5 USB Device Connection
The Device fails t o det ect m y USB device.
Disconnect t he USB device.
Reboot t he Device.
I f you are connect ing a USB hard drive t hat com es wit h an ext ernal power supply, m ake sure it is
connect ed t o an appropriat e power source t hat is on.
Re- connect your USB device t o t he Device.
41.6 UPnP
When using UPnP and t he Device reboot s, m y com put er cannot det ect UPnP and refresh M y
N e t w or k Pla ce s > Loca l N e t w or k .
Disconnect t he Et hernet cable from t he Device’s LAN port or from your com put er.
Re- connect t he Et hernet cable.
The Loca l Ar e a Con n e ct ion icon for UPnP disappears in t he screen.
Rest art your com put er.
I cannot open special applicat ions such as whit e board, file t ransfer and video when I use t he
MSN m essenger.
328
Wait m ore t han t hree m inut es.
Rest art t he applicat ions.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
Customer Support
I n t he event of problem s t hat cannot be solved by using t his m anual, you should cont act your
vendor. I f you cannot cont act your vendor, t hen cont act a ZyXEL office for t he region in which you
bought t he device. Regional websit es are list ed below ( see also ht t p: / / www.zyxel.com /
about _zyxel/ zyxel_worldwide.sht m l) . Please have t he following inform at ion ready when you
cont act an office.
Required Information
• Product m odel and serial num ber.
• Warrant y I nform at ion.
• Dat e t hat you received your device.
• Brief descript ion of t he problem and t he st eps you t ook t o solve it .
Corporate Headquarters (Worldwide)
Taiwan
• ZyXEL Com m unicat ions Corporat ion
• ht t p: / / www.zyxel.com
Asia
China
• ZyXEL Com m unicat ions ( Shanghai) Corp.
ZyXEL Com m unicat ions ( Beij ing) Corp.
ZyXEL Com m unicat ions ( Tianj in) Corp.
• ht t p: / / www.zyxel.cn
India
• ZyXEL Technology I ndia Pvt Lt d
• ht t p: / / www.zyxel.in
Kazakhstan
• ZyXEL Kazakhst an
• ht t p: / / www.zyxel.kz
VMG8324-B10A / VMG8324-B30A Series User’s Guide
329
Appendix A Customer Support
Korea
• ZyXEL Korea Corp.
• ht t p: / / www.zyxel.kr
Malaysia
• ZyXEL Malaysia Sdn Bhd.
• ht t p: / / www.zyxel.com .m y
Pakistan
• ZyXEL Pakist an ( Pvt .) Lt d.
• ht t p: / / www.zyxel.com .pk
Philippines
• ZyXEL Philippines
• ht t p: / / www.zyxel.com .ph
Singapore
• ZyXEL Singapore Pt e Lt d.
• ht t p: / / www.zyxel.com .sg
Taiwan
• ZyXEL Com m unicat ions Corporat ion
• ht t p: / / www.zyxel.com
Thailand
• ZyXEL Thailand Co., Lt d
• ht t p: / / www.zyxel.co.t h
Vietnam
• ZyXEL Com m unicat ions Corporat ion-Viet nam Office
• ht t p: / / www.zyxel.com / vn/ vi
Europe
Austria
• ZyXEL Deut schland Gm bH
• ht t p: / / www.zyxel.de
Belarus
• ZyXEL BY
• ht t p: / / www.zyxel.by
330
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix A Customer Support
Belgium
• ZyXEL Com m unicat ions B.V.
• ht t p: / / www.zyxel.com / be/ nl/
Bulgaria
• ZyXEL България
• ht t p: / / www.zyxel.com / bg/ bg/
Czech
• ZyXEL Com m unicat ions Czech s.r.o
• ht t p: / / www.zyxel.cz
Denmark
• ZyXEL Com m unicat ions A/ S
• ht t p: / / www.zyxel.dk
Estonia
• ZyXEL Est onia
• ht t p: / / www.zyxel.com / ee/ et /
Finland
• ZyXEL Com m unicat ions
• ht t p: / / www.zyxel.fi
France
• ZyXEL France
• ht t p: / / www.zyxel.fr
Germany
• ZyXEL Deut schland Gm bH
• ht t p: / / www.zyxel.de
Hungary
• ZyXEL Hungary & SEE
• ht t p: / / www.zyxel.hu
Latvia
• ZyXEL Lat via
• ht t p: / / www.zyxel.com / lv/ lv/ hom epage.sht m l
VMG8324-B10A / VMG8324-B30A Series User’s Guide
331
Appendix A Customer Support
Lithuania
• ZyXEL Lit huania
• ht t p: / / www.zyxel.com / lt / lt / hom epage.sht m l
Netherlands
• ZyXEL Benelux
• ht t p: / / www.zyxel.nl
Norway
• ZyXEL Com m unicat ions
• ht t p: / / www.zyxel.no
Poland
• ZyXEL Com m unicat ions Poland
• ht t p: / / www.zyxel.pl
Romania
• ZyXEL Rom ania
• ht t p: / / www.zyxel.com / ro/ ro
Russia
• ZyXEL Russia
• ht t p: / / www.zyxel.ru
Slovakia
• ZyXEL Com m unicat ions Czech s.r.o. organizacna zlozka
• ht t p: / / www.zyxel.sk
Spain
• ZyXEL Spain
• ht t p: / / www.zyxel.es
Sweden
• ZyXEL Com m unicat ions
• ht t p: / / www.zyxel.se
Switzerland
• St uderus AG
• ht t p: / / www.zyxel.ch/
332
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix A Customer Support
Turkey
• ZyXEL Turkey A.S.
• ht t p: / / www.zyxel.com .t r
UK
• ZyXEL Com m unicat ions UK Lt d.
• ht t p: / / www.zyxel.co.uk
Ukraine
• ZyXEL Ukraine
• ht t p: / / www.ua.zyxel.com
Latin America
Argentina
• ZyXEL Com m unicat ion Corporat ion
• ht t p: / / www.zyxel.com / ec/ es/
Ecuador
• ZyXEL Com m unicat ion Corporat ion
• ht t p: / / www.zyxel.com / ec/ es/
Middle East
Egypt
• ZyXEL Com m unicat ion Corporat ion
• ht t p: / / www.zyxel.com / hom epage.sht m l
Middle East
• ZyXEL Com m unicat ion Corporat ion
• ht t p: / / www.zyxel.com / hom epage.sht m l
North America
USA
• ZyXEL Com m unicat ions, I nc. - Nort h Am erica Headquart ers
• ht t p: / / www.us.zyxel.com /
VMG8324-B10A / VMG8324-B30A Series User’s Guide
333
Appendix A Customer Support
Oceania
Australia
• ZyXEL Com m unicat ions Corporat ion
• ht t p: / / www.zyxel.com / au/ en/
Africa
South Africa
• Nology ( Pt y) Lt d.
• ht t p: / / www.zyxel.co.za
334
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
Setting up Your Computer’s IP Address
All com put ers m ust have a 10M or 100M Et hernet adapt er card and TCP/ I P inst alled.
Windows 95/ 98/ Me/ NT/ 2000/ XP/ Vist a, Macint osh OS 7 and lat er operat ing syst em s and all versions
of UNI X/ LI NUX include t he soft ware com ponent s you need t o inst all and use TCP/ I P on your
com put er. Windows 3.1 requires t he purchase of a t hird- part y TCP/ I P applicat ion package.
TCP/ I P should already be inst alled on com put ers using Windows NT/ 2000/ XP, Macint osh OS 7 and
lat er operat ing syst em s.
Aft er t he appropriat e TCP/ I P com ponent s are inst alled, configure t he TCP/ I P set t ings in order t o
" com m unicat e" wit h your net work.
I f you m anually assign I P inform at ion inst ead of using dynam ic assignm ent , m ake sure t hat your
com put ers have I P addresses t hat place t hem in t he sam e subnet as t he Device’s LAN port .
Windows 95/98/Me
Click St a r t , Se t t ings, Cont r ol Pa ne l and double- click t he N e t w or k icon t o open t he N e t w or k
window.
Figure 195 WI ndows 95/ 98/ Me: Net work: Configurat ion
VMG8324-B10A / VMG8324-B30A Series User’s Guide
335
Appendix B Setting up Your Computer’s IP Address
Installing Components
The N e t w or k window Con figu r a t ion t ab displays a list of inst alled com ponent s. You need a
net work adapt er, t he TCP/ I P prot ocol and Client for Microsoft Net works.
I f you need t he adapt er:
I n t he N e t w or k window, click Add.
Select Ada pt e r and t hen click Add.
Select t he m anufact urer and m odel of your net work adapt er and t hen click OK.
I f you need TCP/ I P:
I n t he N e t w or k window, click Add.
Select Pr ot ocol and t hen click Add.
Select M icr osoft from t he list of m a nu fa ct ur e r s.
Select TCP/ I P from t he list of net work prot ocols and t hen click OK.
I f you need Client for Microsoft Net works:
Click Add.
Select Clie n t and t hen click Add.
Select M icr osoft from t he list of m anufact urers.
Select Clie n t for M icr osoft N e t w or k s from t he list of net work client s and t hen click OK.
Rest art your com put er so t he changes you m ade t ake effect .
Configuring
I n t he N e t w or k window Con figu r a t ion t ab, select your net work adapt er's TCP/ I P ent ry and click
Pr ope r t ie s
Click t he I P Addr e ss t ab.
• I f your I P address is dynam ic, select Obt a in a n I P a ddr e ss a ut om a t ica lly.
336
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
• I f you have a st at ic I P address, select Spe cify a n I P a ddr e ss and t ype your inform at ion int o
t he I P Addr e ss and Subn e t M a sk fields.
Figure 196 Windows 95/ 98/ Me: TCP/ I P Propert ies: I P Address
Click t he D N S Configurat ion t ab.
• I f you do not know your DNS inform at ion, select D isa ble D N S.
• I f you know your DNS inform at ion, select En a ble D N S and t ype t he inform at ion in t he fields
below ( you m ay not need t o fill t hem all in) .
Figure 197 Windows 95/ 98/ Me: TCP/ I P Propert ies: DNS Configurat ion
VMG8324-B10A / VMG8324-B30A Series User’s Guide
337
Appendix B Setting up Your Computer’s IP Address
Click t he Ga t e w a y t ab.
• I f you do not know your gat eway’s I P address, rem ove previously inst alled gat eways.
• I f you have a gat eway I P address, t ype it in t he N e w ga t e w a y fie ld and click Add.
Click OK t o save and close t he TCP/ I P Pr ope r t ie s window.
Click OK t o close t he N e t w or k window. I nsert t he Windows CD if prom pt ed.
Turn on your Device and rest art your com put er when prom pt ed.
Verifying Settings
Click St a r t and t hen Run .
I n t he Ru n window, t ype " winipcfg" and t hen click OK t o open t he I P Configur a t ion window.
Select your net work adapt er. You should see your com put er's I P address, subnet m ask and default
gat eway.
Windows 2000/NT/XP
The following exam ple figures use t he default Windows XP GUI t hem e.
Click st a r t ( St a r t in Windows 2000/ NT) , Se t t ings, Cont r ol Pa n e l.
Figure 198 Windows XP: St art Menu
338
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
I n t he Cont r ol Pa n e l, double- click N e t w or k Conne ct ions ( N e t w or k a nd D ia l- up Conne ct ions
in Windows 2000/ NT) .
Figure 199 Windows XP: Cont rol Panel
Right- click Loca l Ar e a Conne ct ion and t hen click Pr ope r t ie s.
Figure 200 Windows XP: Cont rol Panel: Net work Connect ions: Propert ies
VMG8324-B10A / VMG8324-B30A Series User’s Guide
339
Appendix B Setting up Your Computer’s IP Address
Select I n t e r n e t Pr ot ocol ( TCP/ I P) ( under t he Ge n e r a l t ab in Win XP) and t hen click Pr ope r t ie s.
Figure 201 Windows XP: Local Area Connect ion Propert ies
The I nt e r ne t Pr ot ocol TCP/ I P Pr ope r t ie s window opens ( t he Ge ne r a l t a b in Windows XP) .
• I f you have a dynam ic I P address click Obt a in a n I P a ddr e ss a u t om a t ica lly.
• I f you have a st at ic I P address click Use t he follow in g I P Addr e ss and fill in t he I P a ddr e ss,
Subne t m a sk , and D e fa u lt ga t e w a y fields.
340
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
• Click Adva nce d.
Figure 202 Windows XP: I nt ernet Prot ocol ( TCP/ I P) Propert ies
I f you do not know your gat eway's I P address, rem ove any previously inst alled gat eways in t he I P
Se t t in gs t ab and click OK.
Do one or m ore of t he following if you want t o configure addit ional I P addresses:
• I n t he I P Se t t ings t ab, in I P addresses, click Add.
• I n TCP/ I P Addr e ss, t ype an I P address in I P a ddr e ss and a subnet m ask in Subne t m a sk ,
and t hen click Add.
• Repeat t he above t wo st eps for each I P address you want t o add.
• Configure addit ional default gat eways in t he I P Se t t in gs t ab by clicking Add in D e fa ult
ga t e w a ys.
• I n TCP/ I P Ga t e w a y Addr e ss, t ype t he I P address of t he default gat eway in Ga t e w a y. To
m anually configure a default m et ric ( t he num ber of t ransm ission hops) , clear t he Aut om a t ic
m e t r ic check box and t ype a m et ric in M e t r ic.
• Click Add.
• Repeat t he previous t hree st eps for each default gat eway you want t o add.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
341
Appendix B Setting up Your Computer’s IP Address
• Click OK when finished.
Figure 203 Windows XP: Advanced TCP/ I P Propert ies
I n t he I n t e r n e t Pr ot ocol TCP/ I P Pr ope r t ie s window ( t he Ge n e r a l t ab in Windows XP) :
• Click Obt a in D N S se r ve r a ddr e ss a u t om a t ica lly if you do not know your DNS server I P
address( es) .
• I f you know your DNS server I P address( es) , click Use t he follow in g D N S se r ve r
a ddr e sse s, and t ype t hem in t he Pr e fe r r e d D N S se r ve r and Alt e r na t e D N S se r ve r fields.
342
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
I f you have previously configured DNS servers, click Adva nce d and t hen t he D N S t ab t o order
t hem .
Figure 204 Windows XP: I nt ernet Prot ocol ( TCP/ I P) Propert ies
Click OK t o close t he I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window.
Click Close ( OK in Windows 2000/ NT) t o close t he Loca l Ar e a Conn e ct ion Pr ope r t ie s window.
10
Close t he N e t w or k Conn e ct ion s window ( N e t w or k a n d D ia l- up Con n e ct ions in Windows
2000/ NT) .
11 Turn on your Device and rest art your com put er ( if prom pt ed) .
Verifying Settings
Click St a r t , All Pr ogr a m s, Acce ssor ie s and t hen Com m a nd Pr om pt .
I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] . You can also open
N e t w or k Con n e ct ions, right - click a net work connect ion, click St a t us and t hen click t he Suppor t
t ab.
Windows Vista
This sect ion shows screens from Windows Vist a Ent erprise Version 6.0.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
343
Appendix B Setting up Your Computer’s IP Address
Click t he St a r t icon, Con t r ol Pa n e l.
Figure 205 Windows Vist a: St art Menu
I n t he Cont r ol Pa n e l, double- click N e t w or k a nd I nt e r ne t .
Figure 206 Windows Vist a: Cont rol Panel
Click N e t w or k a n d Sh a r in g Ce n t e r.
Figure 207 Windows Vist a: Net work And I nt ernet
344
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
Click M a n a ge n e t w or k con n e ct ions.
Figure 208 Windows Vist a: Net work and Sharing Cent er
Right- click Loca l Ar e a Conne ct ion and t hen click Pr ope r t ie s.
Not e: During t his procedure, click Con t inu e whenever Windows displays a screen saying
t hat it needs your perm ission t o cont inue.
Figure 209 Windows Vist a: Net work and Sharing Cent er
VMG8324-B10A / VMG8324-B30A Series User’s Guide
345
Appendix B Setting up Your Computer’s IP Address
Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and click Pr ope r t ie s.
Figure 210 Windows Vist a: Local Area Connect ion Propert ies
The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens ( t he Ge n e r a l t a b) .
• I f you have a dynam ic I P address click Obt a in a n I P a ddr e ss a u t om a t ica lly.
• I f you have a st at ic I P address click Use t h e follow ing I P a ddr e ss and fill in t he I P a ddr e ss,
Subne t m a sk , and D e fa u lt ga t e w a y fields.
346
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
• Click Adva nce d.
Figure 211 Windows Vist a: I nt ernet Prot ocol Version 4 ( TCP/ I Pv4) Propert ies
I f you do not know your gat eway's I P address, rem ove any previously inst alled gat eways in t he I P
Se t t in gs t ab and click OK.
Do one or m ore of t he following if you want t o configure addit ional I P addresses:
• I n t he I P Se t t ings t ab, in I P addresses, click Add.
• I n TCP/ I P Addr e ss, t ype an I P address in I P a ddr e ss and a subnet m ask in Subne t m a sk ,
and t hen click Add.
• Repeat t he above t wo st eps for each I P address you want t o add.
• Configure addit ional default gat eways in t he I P Se t t in gs t ab by clicking Add in D e fa ult
ga t e w a ys.
• I n TCP/ I P Ga t e w a y Addr e ss, t ype t he I P address of t he default gat eway in Ga t e w a y. To
m anually configure a default m et ric ( t he num ber of t ransm ission hops) , clear t he Aut om a t ic
m e t r ic check box and t ype a m et ric in M e t r ic.
• Click Add.
• Repeat t he previous t hree st eps for each default gat eway you want t o add.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
347
Appendix B Setting up Your Computer’s IP Address
• Click OK when finished.
Figure 212 Windows Vist a: Advanced TCP/ I P Propert ies
I n t he I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window, ( t he Ge n e r a l t a b) :
• Click Obt a in D N S se r ve r a ddr e ss a u t om a t ica lly if you do not know your DNS server I P
address( es) .
• I f you know your DNS server I P address( es) , click Use t he follow in g D N S se r ve r
a ddr e sse s, and t ype t hem in t he Pr e fe r r e d D N S se r ve r and Alt e r na t e D N S se r ve r fields.
348
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
I f you have previously configured DNS servers, click Adva nce d and t hen t he D N S t ab t o order
t hem .
Figure 213 Windows Vist a: I nt ernet Prot ocol Version 4 ( TCP/ I Pv4) Propert ies
10 Click OK t o close t he I n t e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window.
11 Click Close t o close t he Loca l Ar e a Con ne ct ion Pr ope r t ie s window.
12
Close t he N e t w or k Conn e ct ion s window.
13 Turn on your Device and rest art your com put er ( if prom pt ed) .
Verifying Settings
Click St a r t , All Pr ogr a m s, Acce ssor ie s and t hen Com m a nd Pr om pt .
I n t he Com m a nd Pr om pt window, t ype " ipconfig" and t hen press [ ENTER] . You can also open
N e t w or k Con n e ct ions, right - click a net work connect ion, click St a t us and t hen click t he Suppor t
t ab.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
349
Appendix B Setting up Your Computer’s IP Address
Macintosh OS 8/9
Click t he Apple m enu, Cont r ol Pa ne l and double- click TCP/ I P t o open t he TCP/ I P Con t r ol
Pa ne l.
Figure 214 Macint osh OS 8/ 9: Apple Menu
350
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
Select Et he r ne t built - in from t he Con n e ct via list .
Figure 215 Macint osh OS 8/ 9: TCP/ I P
For dynam ically assigned set t ings, select Using D H CP Se r ve r from t he Con figu r e : list .
For st at ically assigned set t ings, do t he following:
• From t he Configu r e box, select M a n u a lly.
• Type your I P address in t he I P Addr e ss box.
• Type your subnet m ask in t he Subne t m a sk box.
• Type t he I P address of your Device in t he Rou t e r a ddr e ss box.
Close t he TCP/ I P Con t r ol Pa ne l.
Click Sa ve if prom pt ed, t o save changes t o your configurat ion.
Turn on your Device and rest art your com put er ( if prom pt ed) .
Verifying Settings
Check your TCP/ I P propert ies in t he TCP/ I P Con t r ol Pa ne l window.
Macintosh OS X
Click t he Apple m enu, and click Syst e m Pr e fe r e nce s t o open t he Syst e m Pr e fe r e nce s window.
Figure 216 Macint osh OS X: Apple Menu
Click N e t w or k in t he icon bar.
• Select Aut om a t ic from t he Loca t ion list .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
351
Appendix B Setting up Your Computer’s IP Address
• Select Bu ilt - in Et h e r n e t from t he Show list .
• Click t he TCP/ I P t ab.
For dynam ically assigned set t ings, select Using D H CP from t he Con figu r e list .
Figure 217 Macint osh OS X: Net work
For st at ically assigned set t ings, do t he following:
• From t he Configu r e box, select M a n u a lly.
• Type your I P address in t he I P Addr e ss box.
• Type your subnet m ask in t he Subne t m a sk box.
• Type t he I P address of your Device in t he Rou t e r a ddr e ss box.
Click Apply N ow and close t he window.
Turn on your Device and rest art your com put er ( if prom pt ed) .
Verifying Settings
Check your TCP/ I P propert ies in t he N e t w or k window.
352
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
Linux
This sect ion shows you how t o configure your com put er ’s TCP/ I P set t ings in Red Hat Linux 9.0.
Procedure, screens and file locat ion m ay vary depending on your Linux dist ribut ion and release
version.
Not e: Make sur e you are logged in as t he root adm inist rat or.
Using the K Desktop Environment (KDE)
Follow t he st eps below t o configure your com put er I P address using t he KDE.
Click t he Red Hat but t on ( locat ed on t he bot t om left corner) , select Syst e m Se t t in g and click
N e t w or k .
Figure 218 Red Hat 9.0: KDE: Net work Configurat ion: Devices
VMG8324-B10A / VMG8324-B30A Series User’s Guide
353
Appendix B Setting up Your Computer’s IP Address
Double- click on t he profile of t he net work card you wish t o configure. The Et he r ne t D e vice
Ge ne r a l screen displays as shown.
Figure 219 Red Hat 9.0: KDE: Et hernet Device: General
• I f you have a dynam ic I P address, click Aut om a t ica lly obt a in I P a ddr e ss se t t in gs w it h and
select dh cp from t he drop down list .
• I f you have a st at ic I P address, click St a t ica lly se t I P Addr e sse s and fill in t he Addr e ss,
Subne t m a sk , and D e fa u lt Ga t e w a y Addr e ss fields.
Click OK t o save t he changes and close t he Et he r ne t D e vice Ge ne r a l screen.
I f you know your DNS server I P address( es) , click t he D N S t ab in t he N e t w or k Configur a t ion
screen. Ent er t he DNS server inform at ion in t he fields provided.
Figure 220 Red Hat 9.0: KDE: Net work Configurat ion: DNS
354
Click t he D e vice s t ab.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix B Setting up Your Computer’s IP Address
Click t he Act iva t e but t on t o apply t he changes. The following screen displays. Click Ye s t o sa ve
t h e cha n ge s in a ll scr e e n s.
Figure 221 Red Hat 9.0: KDE: Net work Configurat ion: Act ivat e
Aft er t he net work card rest art process is com plet e, m ake sure t he St a t us is Act ive in t he N e t w or k
Con figu r a t ion screen.
Using Configuration Files
Follow t he st eps below t o edit t he net work configurat ion files and set your com put er I P address.
Assum ing t hat you have only one net work card on t he com put er, locat e t he ifconfig-eth0
configurat ion file ( where eth0 is t he nam e of t he Et hernet card) . Open t he configurat ion file wit h
any plain t ext edit or.
• I f you have a dynam ic I P address, ent er dhcp in t he BOOTPROTO= field. The following figure
shows an exam ple.
Figure 222 Red Hat 9.0: Dynam ic I P Address Set t ing in ifconfig- et h0
DEVICE=eth0
ONBOOT=yes
BOOTPROTO=dhcp
USERCTL=no
PEERDNS=yes
TYPE=Ethernet
• I f you have a st at ic I P address, ent er static in t he BOOTPROTO= field. Type IPADDR= followed
by t he I P address ( in dot t ed decim al not at ion) and t ype NETMASK= followed by t he subnet
m ask. The following exam ple shows an exam ple where t he st at ic I P address is 192.168.1.10
and t he subnet m ask is 255.255.255.0.
Figure 223 Red Hat 9.0: St at ic I P Address Set t ing in ifconfig- et h0
DEVICE=eth0
ONBOOT=yes
BOOTPROTO=static
IPADDR=192.168.1.10
NETMASK=255.255.255.0
USERCTL=no
PEERDNS=yes
TYPE=Ethernet
VMG8324-B10A / VMG8324-B30A Series User’s Guide
355
Appendix B Setting up Your Computer’s IP Address
I f you know your DNS server I P address( es) , ent er t he DNS server inform at ion in t he resolv.conf
file in t he /etc direct ory. The following figure shows an exam ple where t wo DNS server I P
addresses are specified.
Figure 224 Red Hat 9.0: DNS Set t ings in resolv.conf
nameserver 172.23.5.1
nameserver 172.23.5.2
Aft er you edit and save t he configurat ion files, you m ust rest art t he net work card. Ent er ./network
restart in t he /etc/rc.d/init.d direct ory. The following figure shows an exam ple.
Figure 225 Red Hat 9.0: Rest art Et hernet Card
[root@localhost init.d]# network restart
Shutting down interface eth0:
Shutting down loopback interface:
Setting network parameters:
Bringing up loopback interface:
Bringing up interface eth0:
[OK]
[OK]
[OK]
[OK]
[OK]
Verifying Settings
Ent er ifconfig in a t erm inal screen t o check your TCP/ I P propert ies.
Figure 226 Red Hat 9.0: Checking TCP/ I P Propert ies
[root@localhost]# ifconfig
eth0
Link encap:Ethernet HWaddr 00:50:BA:72:5B:44
inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:717 errors:0 dropped:0 overruns:0 frame:0
TX packets:13 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:730412 (713.2 Kb) TX bytes:1570 (1.5 Kb)
Interrupt:10 Base address:0x1000
[root@localhost]#
356
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
IP Addresses and Subnetting
This appendix int roduces I P addresses and subnet m asks.
I P addresses ident ify individual devices on a net work. Every net working device ( including
com put ers, servers, rout ers, print ers, et c.) needs an I P address t o com m unicat e across t he
net work. These net working devices are also known as host s.
Subnet m asks det erm ine t he m axim um num ber of possible host s on a net work. You can also use
subnet m asks t o divide one net work int o m ult iple sub- net works.
Introduction to IP Addresses
One part of t he I P address is t he net work num ber, and t he ot her part is t he host I D. I n t he sam e
way t hat houses on a st reet share a com m on st reet nam e, t he host s on a net work share a com m on
net work num ber. Sim ilarly, as each house has it s own house num ber, each host on t he net work has
it s own unique ident ifying num ber - t he host I D. Rout ers use t he net work num ber t o send packet s
t o t he correct net work, while t he host I D det erm ines t o which host on t he net work t he packet s are
delivered.
Structure
An I P address is m ade up of four part s, writ t en in dot t ed decim al not at ion ( for exam ple,
192.168.1.1) . Each of t hese four part s is known as an oct et . An oct et is an eight- digit binary
num ber ( for exam ple 11000000, which is 192 in decim al not at ion) .
Therefore, each oct et has a possible range of 00000000 t o 11111111 in binary, or 0 t o 255 in
decim al.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
357
Appendix C IP Addresses and Subnetting
The following figure shows an exam ple I P address in which t he first t hree oct et s ( 192.168.1) are
t he net work num ber, and t he fourt h oct et ( 16) is t he host I D.
Figure 227 Net work Num ber and Host I D
How m uch of t he I P address is t he net work num ber and how m uch is t he host I D varies according
t o t he subnet m ask.
Subnet Masks
A subnet m ask is used t o det erm ine which bit s are part of t he net work num ber, and which bit s are
part of t he host I D ( using a logical AND operat ion) . The t erm “ subnet ” is short for “ sub- net work”.
A subnet m ask has 32 bit s. I f a bit in t he subnet m ask is a “ 1” t hen t he corresponding bit in t he I P
address is part of t he net work num ber. I f a bit in t he subnet m ask is “ 0” t hen t he corresponding bit
in t he I P address is part of t he host I D.
The following exam ple shows a subnet m ask ident ifying t he net work num ber ( in bold t ext ) and host
I D of an I P address ( 192.168.1.2 in decim al) .
Table 154 Subnet Masks
1ST OCTET: 2ND
OCTET:
(192)
(168)
3RD
OCTET:
4TH OCTET
(1)
(2)
I P Address ( Binary)
11000000
10101000
00000001
00000010
Subnet Mask ( Binary)
11111111
11111111
11111111
00000000
Net work Num ber
11000000
10101000
00000001
Host I D
00000010
By convent ion, subnet m asks always consist of a cont inuous sequence of ones beginning from t he
left m ost bit of t he m ask, followed by a cont inuous sequence of zeros, for a t ot al num ber of 32 bit s.
358
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix C IP Addresses and Subnetting
Subnet m asks can be referred t o by t he size of t he net work num ber part ( t he bit s wit h a “ 1” value) .
For exam ple, an “ 8- bit m ask” m eans t hat t he first 8 bit s of t he m ask are ones and t he rem aining 24
bit s are zeroes.
Subnet m asks are expressed in dot t ed decim al not at ion j ust like I P addresses. The following
exam ples show t he binary and decim al not at ion for 8- bit , 16- bit , 24- bit and 29- bit subnet m asks.
Table 155 Subnet Masks
BINARY
DECIMAL
1ST
OCTET
2ND
OCTET
3RD
OCTET
4TH OCTET
8- bit m ask
11111111
00000000
00000000
00000000
255.0.0.0
16- bit m ask
11111111
11111111
00000000
00000000
255.255.0.0
24- bit m ask
11111111
11111111
11111111
00000000
255.255.255.0
29- bit m ask
11111111
11111111
11111111
11111000
255.255.255.248
Network Size
The size of t he net work num ber det erm ines t he m axim um num ber of possible host s you can have
on your net work. The larger t he num ber of net work num ber bit s, t he sm aller t he num ber of
rem aining host I D bit s.
An I P address wit h host I Ds of all zeros is t he I P address of t he net work ( 192.168.1.0 wit h a 24- bit
subnet m ask, for exam ple) . An I P address wit h host I Ds of all ones is t he broadcast address for t hat
net work ( 192.168.1.255 wit h a 24- bit subnet m ask, for exam ple) .
As t hese t wo I P addresses cannot be used for individual host s, calculat e t he m axim um num ber of
possible host s in a net work as follows:
Table 156 Maxim um Host Num bers
SUBNET MASK
HOST ID SIZE
MAXIMUM NUMBER OF HOSTS
24
8 bit s
255.0.0.0
24 bit s
16 bit s
255.255.0.0
16 bit s
2 16 – 2
24 bit s
29 bit s
255.255.255.0
255.255.255.24
8 bit s
3 bit s
– 2
16777214
65534
254
2 – 2
2 – 2
Notation
Since t he m ask is always a cont inuous num ber of ones beginning from t he left , followed by a
cont inuous num ber of zeros for t he rem ainder of t he 32 bit m ask, you can sim ply specify t he
num ber of ones inst ead of writ ing t he value of each oct et . This is usually specified by writ ing a “ / ”
followed by t he num ber of bit s in t he m ask aft er t he address.
For exam ple, 192.1.1.0 / 25 is equivalent t o saying 192.1.1.0 wit h subnet m ask 255.255.255.128.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
359
Appendix C IP Addresses and Subnetting
The following t able shows som e possible subnet m asks using bot h not at ions.
Table 157 Alt ernat ive Subnet Mask Not at ion
SUBNET MASK
ALTERNATIVE
NOTATION
LAST OCTET
(BINARY)
LAST OCTET
(DECIMAL)
255.255.255.0
/ 24
0000 0000
255.255.255.128
/ 25
1000 0000
128
255.255.255.192
/ 26
1100 0000
192
255.255.255.224
/ 27
1110 0000
224
255.255.255.240
/ 28
1111 0000
240
255.255.255.248
/ 29
1111 1000
248
255.255.255.252
/ 30
1111 1100
252
Subnetting
You can use subnet t ing t o divide one net work int o m ult iple sub- net works. I n t he following exam ple
a net work adm inist rat or creat es t wo sub- net works t o isolat e a group of servers from t he rest of t he
com pany net work for securit y reasons.
I n t his exam ple, t he com pany net work address is 192.168.1.0. The first t hree oct et s of t he address
( 192.168.1) are t he net work num ber, and t he rem aining oct et is t he host I D, allowing a m axim um
of 2 8 – 2 or 254 possible host s.
The following figure shows t he com pany net work before subnet t ing.
Figure 228 Subnet t ing Exam ple: Before Subnet t ing
You can “ borrow” one of t he host I D bit s t o divide t he net work 192.168.1.0 int o t wo separat e subnet works. The subnet m ask is now 25 bit s ( 255.255.255.128 or / 25) .
The “ borrowed” host I D bit can have a value of eit her 0 or 1, allowing t wo subnet s; 192.168.1.0 / 25
and 192.168.1.128 / 25.
360
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix C IP Addresses and Subnetting
The following figure shows t he com pany net work aft er subnet t ing. There are now t wo subnet works, A and B.
Figure 229 Subnet t ing Exam ple: Aft er Subnet t ing
I n a 25- bit subnet t he host I D has 7 bit s, so each sub- net work has a m axim um of 2 7 – 2 or 126
possible host s ( a host I D of all zeroes is t he subnet ’s address it self, all ones is t he subnet ’s
broadcast address) .
192.168.1.0 wit h m ask 255.255.255.128 is subnet A it self, and 192.168.1.127 wit h m ask
255.255.255.128 is it s broadcast address. Therefore, t he lowest I P address t hat can be assigned t o
an act ual host for subnet A is 192.168.1.1 and t he highest is 192.168.1.126.
Sim ilarly, t he host I D range for subnet B is 192.168.1.129 t o 192.168.1.254.
Example: Four Subnets
The previous exam ple illust rat ed using a 25- bit subnet m ask t o divide a 24- bit address int o t wo
subnet s. Sim ilarly, t o divide a 24- bit address int o four subnet s, you need t o “ borrow” t wo host I D
bit s t o give four possible com binat ions ( 00, 01, 10 and 11) . The subnet m ask is 26 bit s
( 11111111.11111111.11111111.1 1 000000) or 255.255.255.192.
Each subnet cont ains 6 host I D bit s, giving 2 6 - 2 or 62 host s for each subnet ( a host I D of all
zeroes is t he subnet it self, all ones is t he subnet ’s broadcast address) .
Table 158 Subnet 1
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
I P Address ( Decim al)
192.168.1.
I P Address ( Binary)
11000000.10101000.00000001.
0 0 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
VMG8324-B10A / VMG8324-B30A Series User’s Guide
361
Appendix C IP Addresses and Subnetting
Table 158 Subnet 1 ( cont inued)
LAST OCTET BIT
VALUE
IP/SUBNET MASK
NETWORK NUMBER
Subnet Address:
192.168.1.0
Lowest Host I D: 192.168.1.1
Broadcast Address:
192.168.1.63
Highest Host I D: 192.168.1.62
Table 159 Subnet 2
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
I P Address
192.168.1.
64
I P Address ( Binary)
11000000.10101000.00000001.
0 1 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
Subnet Address:
192.168.1.64
Lowest Host I D: 192.168.1.65
Broadcast Address:
192.168.1.127
Highest Host I D: 192.168.1.126
Table 160 Subnet 3
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT VALUE
I P Address
192.168.1.
128
I P Address ( Binary)
11000000.10101000.00000001.
1 0 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
Subnet Address:
192.168.1.128
Lowest Host I D: 192.168.1.129
Broadcast Address:
192.168.1.191
Highest Host I D: 192.168.1.190
Table 161 Subnet 4
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT VALUE
I P Address
192.168.1.
192
I P Address ( Binary)
11000000.10101000.00000001.
1 1 000000
Subnet Mask ( Binary)
11111111.11111111.11111111.
1 1 000000
Subnet Address:
192.168.1.192
Lowest Host I D: 192.168.1.193
Broadcast Address:
192.168.1.255
Highest Host I D: 192.168.1.254
Example: Eight Subnets
Sim ilarly, use a 27- bit m ask t o creat e eight subnet s ( 000, 001, 010, 011, 100, 101, 110 and 111) .
The following t able shows I P address last oct et values for each subnet .
Table 162 Eight Subnet s
362
SUBNET
SUBNET
ADDRESS
FIRST ADDRESS
LAST
ADDRESS
BROADCAST
ADDRESS
30
31
32
33
62
63
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix C IP Addresses and Subnetting
Table 162 Eight Subnet s ( cont inued)
SUBNET
SUBNET
ADDRESS
FIRST ADDRESS
LAST
ADDRESS
BROADCAST
ADDRESS
64
65
94
95
96
97
126
127
128
129
158
159
160
161
190
191
192
193
222
223
224
225
254
255
Subnet Planning
The following t able is a sum m ary for subnet planning on a net work wit h a 24- bit net work num ber.
Table 163 24- bit Net work Num ber Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
255.255.255.128 ( / 25)
126
255.255.255.192 ( / 26)
62
255.255.255.224 ( / 27)
30
255.255.255.240 ( / 28)
16
14
255.255.255.248 ( / 29)
32
255.255.255.252 ( / 30)
64
255.255.255.254 ( / 31)
128
The following t able is a sum m ary for subnet planning on a net work wit h a 16- bit net work num ber.
Table 164 16- bit Net work Num ber Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
255.255.128.0 ( / 17)
32766
255.255.192.0 ( / 18)
16382
255.255.224.0 ( / 19)
8190
255.255.240.0 ( / 20)
16
4094
255.255.248.0 ( / 21)
32
2046
255.255.252.0 ( / 22)
64
1022
255.255.254.0 ( / 23)
128
510
255.255.255.0 ( / 24)
256
254
255.255.255.128 ( / 25)
512
126
10
255.255.255.192 ( / 26)
1024
62
11
255.255.255.224 ( / 27)
2048
30
12
255.255.255.240 ( / 28)
4096
14
13
255.255.255.248 ( / 29)
8192
14
255.255.255.252 ( / 30)
16384
15
255.255.255.254 ( / 31)
32768
VMG8324-B10A / VMG8324-B30A Series User’s Guide
363
Appendix C IP Addresses and Subnetting
Configuring IP Addresses
Where you obt ain your net work num ber depends on your part icular sit uat ion. I f t he I SP or your
net work adm inist rat or assigns you a block of regist ered I P addresses, follow t heir inst ruct ions in
select ing t he I P addresses and t he subnet m ask.
I f t he I SP did not explicit ly give you an I P net work num ber, t hen m ost likely you have a single user
account and t he I SP will assign you a dynam ic I P address when t he connect ion is est ablished. I f t his
is t he case, it is recom m ended t hat you select a net work num ber from 192.168.0.0 t o
192.168.255.0. The I nt ernet Assigned Num ber Aut horit y ( I ANA) reserved t his block of addresses
specifically for privat e use; please do not use any ot her num ber unless you are t old ot herwise. You
m ust also enable Net work Address Translat ion ( NAT) on t he Device.
Once you have decided on t he net work num ber, pick an I P address for your Device t hat is easy t o
rem em ber ( for inst ance, 192.168.1.1) but m ake sure t hat no ot her device on your net work is using
t hat I P address.
The subnet m ask specifies t he net work num ber port ion of an I P address. Your Device will com put e
t he subnet m ask aut om at ically based on t he I P address t hat you ent ered. You don't need t o change
t he subnet m ask com put ed by t he Device unless you are inst ruct ed t o do ot herwise.
Private IP Addresses
Every m achine on t he I nt ernet m ust have a unique address. I f your net works are isolat ed from t he
I nt ernet ( running only bet ween t wo branch offices, for exam ple) you can assign any I P addresses t o
t he host s wit hout problem s. However, t he I nt ernet Assigned Num bers Aut horit y ( I ANA) has
reserved t he following t hree blocks of I P addresses specifically for privat e net works:
• 10.0.0.0
• 172.16.0.0
— 10.255.255.255
— 172.31.255.255
• 192.168.0.0 — 192.168.255.255
You can obt ain your I P address from t he I ANA, from an I SP, or it can be assigned from a privat e
net work. I f you belong t o a sm all organizat ion and your I nt ernet access is t hrough an I SP, t he I SP
can provide you wit h t he I nt ernet addresses for your local net works. On t he ot her hand, if you are
part of a m uch larger organizat ion, you should consult your net work adm inist rat or for t he
appropriat e I P addresses.
Regardless of your part icular sit uat ion, do not creat e an arbit rary I P address; always follow t he
guidelines above. For m ore inform at ion on address assignm ent , please refer t o RFC 1597, Address
Allocat ion for Privat e I nt ernet s and RFC 1466, Guidelines for Managem ent of I P Address Space.
364
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
Pop-up Windows, JavaScripts and Java
Permissions
I n order t o use t he web configurat or you need t o allow:
• Web browser pop- up windows from your device.
• JavaScript s ( enabled by default ) .
• Java perm issions ( enabled by default ) .
Not e: I nt ernet Explorer 6 screens are used here. Screens for ot her I nt ernet Explorer
ver sions m ay vary.
Internet Explorer Pop-up Blockers
You m ay have t o disable pop- up blocking t o log int o your device.
Eit her disable pop- up blocking ( enabled by default in Windows XP SP ( Service Pack) 2) or allow
pop- up blocking and creat e an except ion for your device’s I P address.
Disable Pop-up Blockers
I n I nt ernet Explorer, select Tools, Pop- u p Block e r and t hen select Tur n Off Pop- up Block e r.
Figure 230 Pop- up Blocker
You can also check if pop- up blocking is disabled in t he Pop- u p Block e r sect ion in t he Pr iva cy t ab.
I n I nt ernet Explorer, select Tools, I nt e r ne t Opt ions, Pr iva cy.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
365
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Clear t he Block pop- ups check box in t he Pop- u p Block e r sect ion of t he screen. This disables any
web pop- up blockers you m ay have enabled.
Figure 231 I nt ernet Opt ions: Privacy
Click Apply t o save t his set t ing.
Enable Pop-up Blockers with Exceptions
Alt ernat ively, if you only want t o allow pop- up windows from your device, see t he following st eps.
366
I n I nt ernet Explorer, select Tools, I nt e r ne t Opt ions and t hen t he Pr iva cy t ab.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Select Se t t ings…t o open t he Pop- up Block e r Se t t ings screen.
Figure 232 I nt ernet Opt ions: Privacy
Type t he I P address of your device ( t he web page t hat you do not want t o have blocked) wit h t he
prefix “ ht t p: / / ”. For exam ple, ht t p: / / 192.168.167.1.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
367
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Click Add t o m ove t he I P address t o t he list of Allow e d sit e s.
Figure 233 Pop- up Blocker Set t ings
Click Close t o ret urn t o t he Pr iva cy screen.
Click Apply t o save t his set t ing.
JavaScripts
I f pages of t he web configurat or do not display properly in I nt ernet Explorer, check t hat JavaScript s
are allowed.
368
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix D Pop-up Windows, JavaScripts and Java Permissions
I n I nt ernet Explorer, click Tools, I n t e r ne t Opt ion s and t hen t he Se cur it y t ab.
Figure 234 I nt ernet Opt ions: Securit y
Click t he Cu st om Le ve l... but t on.
Scroll down t o Scr ipt ing.
Under Act ive scr ipt ing m ake sure t hat Ena ble is select ed ( t he default ) .
Under Scr ipt ing of Ja va a pple t s m ake sure t hat Ena ble is select ed ( t he default ) .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
369
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Click OK t o close t he window.
Figure 235 Securit y Set t ings - Java Script ing
Java Permissions
370
From I nt ernet Explorer, click Tools, I nt e r ne t Opt ions and t hen t he Se cu r it y t ab.
Click t he Cu st om Le ve l... but t on.
Scroll down t o M icr osoft VM .
Under Ja va pe r m issions m ake sure t hat a safet y level is select ed.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Click OK t o close t he window.
Figure 236 Securit y Set t ings - Java
JAVA (Sun)
From I nt ernet Explorer, click Tools, I nt e r ne t Opt ions and t hen t he Adva n ce d t ab.
Make sure t hat Use Ja va 2 for < a pple t > under Ja va ( Sun) is select ed.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
371
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Click OK t o close t he window.
Figure 237 Java ( Sun)
Mozilla Firefox
Mozilla Firefox 2.0 screens are used here. Screens for ot her versions m ay vary.
You can enable Java, Javascript s and pop- ups in one screen. Click Tools, t hen click Opt ions in t he
screen t hat appears.
Figure 238 Mozilla Firefox: Tools > Opt ions
372
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix D Pop-up Windows, JavaScripts and Java Permissions
Click Cont e n t .t o show t he screen below. Select t he check boxes as shown in t he following screen.
Figure 239 Mozilla Firefox Cont ent Securit y
VMG8324-B10A / VMG8324-B30A Series User’s Guide
373
Appendix D Pop-up Windows, JavaScripts and Java Permissions
374
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
Wireless LANs
Wireless LAN Topologies
This sect ion discusses ad- hoc and infrast ruct ure wireless LAN t opologies.
Ad-hoc Wireless LAN Configuration
The sim plest WLAN configurat ion is an independent ( Ad- hoc) WLAN t hat connect s a set of
com put ers wit h wireless adapt ers ( A, B, C) . Any t im e t wo or m ore wireless adapt ers are wit hin
range of each ot her, t hey can set up an independent net work, which is com m only referred t o as an
ad- hoc net work or I ndependent Basic Service Set ( I BSS) . The following diagram shows an exam ple
of not ebook com put ers using wireless adapt ers t o form an ad- hoc wireless LAN.
Figure 240 Peer- t o- Peer Com m unicat ion in an Ad- hoc Net work
BSS
A Basic Service Set ( BSS) exist s when all com m unicat ions bet ween wireless client s or bet ween a
wireless client and a wired net work client go t hrough one access point ( AP) .
I nt ra- BSS t raffic is t raffic bet ween wireless client s in t he BSS. When I nt ra- BSS is enabled, wireless
client A and B can access t he wired net work and com m unicat e wit h each ot her. When I nt ra- BSS is
VMG8324-B10A / VMG8324-B30A Series User’s Guide
375
Appendix E Wireless LANs
disabled, wireless client A and B can st ill access t he wired net work but cannot com m unicat e wit h
each ot her.
Figure 241 Basic Service Set
ESS
An Ext ended Service Set ( ESS) consist s of a series of overlapping BSSs, each cont aining an access
point , wit h each access point connect ed t oget her by a wired net work. This wired connect ion
bet ween APs is called a Dist ribut ion Syst em ( DS) .
This t ype of wireless LAN t opology is called an I nfrast ruct ure WLAN. The Access Point s not only
provide com m unicat ion wit h t he wired net work but also m ediat e wireless net work t raffic in t he
im m ediat e neighborhood.
376
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix E Wireless LANs
An ESSI D ( ESS I Dent ificat ion) uniquely ident ifies each ESS. All access point s and t heir associat ed
wireless client s wit hin t he sam e ESS m ust have t he sam e ESSI D in order t o com m unicat e.
Figure 242 I nfrast ruct ure WLAN
Channel
A channel is t he radio frequency( ies) used by wireless devices t o t ransm it and receive dat a.
Channels available depend on your geographical area.
Adj acent channels part ially overlap however. To avoid int erference due t o overlap, your AP should
be on a channel at least five channels away from a channel t hat an adj acent AP is using.
RTS/CTS
A hidden node occurs when t wo st at ions are wit hin range of t he sam e access point , but are not
wit hin range of each ot her. The following figure illust rat es a hidden node. Bot h st at ions ( STA) are
wit hin range of t he access point ( AP) or wireless gat eway, but out- of- range of each ot her, so t hey
VMG8324-B10A / VMG8324-B30A Series User’s Guide
377
Appendix E Wireless LANs
cannot " hear" each ot her, t hat is t hey do not know if t he channel is current ly being used. Therefore,
t hey are considered hidden from each ot her.
Figure 243
RTS/ CTS
When st at ion A sends dat a t o t he AP, it m ight not know t hat t he st at ion B is already using t he
channel. I f t hese t wo st at ions send dat a at t he sam e t im e, collisions m ay occur when bot h set s of
dat a arrive at t he AP at t he sam e t im e, result ing in a loss of m essages for bot h st at ions.
RTS/ CTS is designed t o prevent collisions due t o hidden nodes. An RTS/ CTS defines t he biggest
size dat a fram e you can send before an RTS ( Request To Send) / CTS ( Clear t o Send) handshake is
invoked.
When a dat a fram e exceeds t he RTS/ CTS value you set ( bet ween 0 t o 2432 byt es) , t he st at ion
t hat want s t o t ransm it t his fram e m ust first send an RTS ( Request To Send) m essage t o t he AP for
perm ission t o send it . The AP t hen responds wit h a CTS ( Clear t o Send) m essage t o all ot her
st at ions wit hin it s range t o not ify t hem t o defer t heir t ransm ission. I t also reserves and confirm s
wit h t he request ing st at ion t he t im e fram e for t he request ed t ransm ission.
St at ions can send fram es sm aller t han t he specified RTS/ CTS direct ly t o t he AP wit hout t he RTS
( Request To Send) / CTS ( Clear t o Send) handshake.
You should only configure RTS/ CTS if t he possibilit y of hidden nodes exist s on your net work and
t he " cost " of resending large fram es is m ore t han t he ext ra net work overhead involved in t he RTS
( Request To Send) / CTS ( Clear t o Send) handshake.
I f t he RTS/ CTS value is great er t han t he Fr a gm e nt a t ion Thr e sh old value ( see next ) , t hen t he
RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es will be
fragm ent ed before t hey reach RTS/ CTS size.
Not e: Enabling t he RTS Threshold causes redundant net w ork overhead t hat could
negat ively affect t he t hroughput perfor m ance inst ead of pr oviding a rem edy.
Fragmentation Threshold
A Fr a gm e nt a t ion Thr e sh old is t he m axim um dat a fragm ent size ( bet ween 256 and 2432 byt es)
t hat can be sent in t he wireless net work before t he AP will fragm ent t he packet int o sm aller dat a
fram es.
A large Fr a gm e n t a t ion Th r e sh old is recom m ended for net works not prone t o int erference while
you should set a sm aller t hreshold for busy net works or net works t hat are prone t o int erference.
378
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix E Wireless LANs
I f t he Fr a gm e nt a t ion Thr e shold value is sm aller t han t he RTS/ CTS value ( see previously) you
set t hen t he RTS ( Request To Send) / CTS ( Clear t o Send) handshake will never occur as dat a fram es
will be fragm ent ed before t hey reach RTS/ CTS size.
IEEE 802.11g Wireless LAN
I EEE 802.11g is fully com pat ible wit h t he I EEE 802.11b st andard. This m eans an I EEE 802.11b
adapt er can int erface direct ly wit h an I EEE 802.11g access point ( and vice versa) at 11 Mbps or
lower depending on range. I EEE 802.11g has several int erm ediat e rat e st eps bet ween t he
m axim um and m inim um dat a rat es. The I EEE 802.11g dat a rat e and m odulat ion are as follows:
Table 165 I EEE 802.11g
DATA RATE (MBPS)
MODULATION
DBPSK ( Different ial Binary Phase Shift Keyed)
DQPSK ( Different ial Quadrat ure Phase Shift Keying)
5.5 / 11
CCK ( Com plem ent ary Code Keying)
6/ 9/ 12/ 18/ 24/ 36/ 48/
54
OFDM ( Ort hogonal Frequency Division Mult iplexing)
Wireless Security Overview
Wireless securit y is vit al t o your net work t o prot ect wireless com m unicat ion bet ween wireless
client s, access point s and t he wired net work.
Wireless securit y m et hods available on t he Device are dat a encrypt ion, wireless client
aut hent icat ion, rest rict ing access by device MAC address and hiding t he Device ident it y.
The following figure shows t he relat ive effect iveness of t hese wireless securit y m et hods available on
your Device.
Table 166 Wireless Securit y Levels
SECURITY
LEVEL
Least
Secure
SECURITY TYPE
Unique SSI D ( Default )
Unique SSI D wit h Hide SSI D Enabled
MAC Address Filt ering
WEP Encrypt ion
I EEE802.1x EAP wit h RADI US Server Aut hent icat ion
Wi- Fi Prot ect ed Access ( WPA)
WPA2
Most Secure
Not e: You m ust enable t he sam e wireless securit y set t ings on t he Device and on all
wireless client s t hat you want t o associat e wit h it .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
379
Appendix E Wireless LANs
IEEE 802.1x
I n June 2001, t he I EEE 802.1x st andard was designed t o ext end t he feat ures of I EEE 802.11 t o
support ext ended aut hent icat ion as well as providing addit ional account ing and cont rol feat ures. I t
is support ed by Windows XP and a num ber of net work devices. Som e advant ages of I EEE 802.1x
are:
• User based ident ificat ion t hat allows for roam ing.
• Support for RADI US ( Rem ot e Aut hent icat ion Dial I n User Service, RFC 2138, 2139) for
cent ralized user profile and account ing m anagem ent on a net work RADI US server.
• Support for EAP ( Ext ensible Aut hent icat ion Prot ocol, RFC 2486) t hat allows addit ional
aut hent icat ion m et hods t o be deployed wit h no changes t o t he access point or t he wireless
client s.
RADIUS
RADI US is based on a client- server m odel t hat support s aut hent icat ion, aut horizat ion and
account ing. The access point is t he client and t he server is t he RADI US server. The RADI US server
handles t he following t asks:
• Aut hent icat ion
Det erm ines t he ident it y of t he users.
• Aut horizat ion
Det erm ines t he net work services available t o aut hent icat ed users once t hey are connect ed t o t he
net work.
• Account ing
Keeps t rack of t he client ’s net work act ivit y.
RADI US is a sim ple package exchange in which your AP act s as a m essage relay bet ween t he
wireless client and t he net work RADI US server.
Types of RADIUS Messages
The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US
server for user aut hent icat ion:
• Access- Request
Sent by an access point request ing aut hent icat ion.
• Access- Rej ect
Sent by a RADI US server rej ect ing access.
• Access-Accept
Sent by a RADI US server allowing access.
• Access- Challenge
Sent by a RADI US server request ing m ore inform at ion in order t o allow access. The access point
sends a proper response from t he user and t hen sends anot her Access- Request m essage.
The following t ypes of RADI US m essages are exchanged bet ween t he access point and t he RADI US
server for user account ing:
380
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix E Wireless LANs
• Account ing- Request
Sent by t he access point request ing account ing.
• Account ing- Response
Sent by t he RADI US server t o indicat e t hat it has st art ed or st opped account ing.
I n order t o ensure net work securit y, t he access point and t he RADI US server use a shared secret
key, which is a password, t hey bot h know. The key is not sent over t he net work. I n addit ion t o t he
shared key, password inform at ion exchanged is also encrypt ed t o prot ect t he net work from
unaut horized access.
Types of EAP Authentication
This sect ion discusses som e popular aut hent icat ion t ypes: EAP- MD5, EAP-TLS, EAP-TTLS, PEAP and
LEAP. Your wireless LAN device m ay not support all aut hent icat ion t ypes.
EAP ( Ext ensible Aut hent icat ion Prot ocol) is an aut hent icat ion prot ocol t hat runs on t op of t he I EEE
802.1x t ransport m echanism in order t o support m ult iple t ypes of user aut hent icat ion. By using EAP
t o int eract wit h an EAP- com pat ible RADI US server, an access point helps a wireless st at ion and a
RADI US server perform aut hent icat ion.
The t ype of aut hent icat ion you use depends on t he RADI US server and an int erm ediary AP( s) t hat
support s I EEE 802.1x.
For EAP-TLS aut hent icat ion t ype, you m ust first have a wired connect ion t o t he net work and obt ain
t he cert ificat e( s) from a cert ificat e aut horit y ( CA) . A cert ificat e ( also called digit al I Ds) can be used
t o aut hent icat e users and a CA issues cert ificat es and guarant ees t he ident it y of each cert ificat e
owner.
EAP-MD5 (Message-Digest Algorithm 5)
MD5 aut hent icat ion is t he sim plest one- way aut hent icat ion m et hod. The aut hent icat ion server
sends a challenge t o t he wireless client . The wireless client ‘proves’ t hat it knows t he password by
encrypt ing t he password wit h t he challenge and sends back t he inform at ion. Password is not sent in
plain t ext .
However, MD5 aut hent icat ion has som e weaknesses. Since t he aut hent icat ion server needs t o get
t he plaint ext passwords, t he passwords m ust be st ored. Thus som eone ot her t han t he
aut hent icat ion server m ay access t he password file. I n addit ion, it is possible t o im personat e an
aut hent icat ion server as MD5 aut hent icat ion m et hod does not perform m ut ual aut hent icat ion.
Finally, MD5 aut hent icat ion m et hod does not support dat a encrypt ion wit h dynam ic session key. You
m ust configure WEP encrypt ion keys for dat a encrypt ion.
EAP-TLS (Transport Layer Security)
Wit h EAP-TLS, digit al cert ificat ions are needed by bot h t he server and t he wireless client s for
m ut ual aut hent icat ion. The server present s a cert ificat e t o t he client . Aft er validat ing t he ident it y of
t he server, t he client sends a different cert ificat e t o t he server. The exchange of cert ificat es is done
in t he open before a secured t unnel is creat ed. This m akes user ident it y vulnerable t o passive
at t acks. A digit al cert ificat e is an elect ronic I D card t hat aut hent icat es t he sender ’s ident it y.
However, t o im plem ent EAP-TLS, you need a Cert ificat e Aut horit y ( CA) t o handle cert ificat es, which
im poses a m anagem ent overhead.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
381
Appendix E Wireless LANs
EAP-TTLS (Tunneled Transport Layer Service)
EAP-TTLS is an ext ension of t he EAP-TLS aut hent icat ion t hat uses cert ificat es for only t he serverside aut hent icat ions t o est ablish a secure connect ion. Client aut hent icat ion is t hen done by sending
usernam e and password t hrough t he secure connect ion, t hus client ident it y is prot ect ed. For client
aut hent icat ion, EAP-TTLS support s EAP m et hods and legacy aut hent icat ion m et hods such as PAP,
CHAP, MS- CHAP and MS- CHAP v2.
PEAP (Protected EAP)
Like EAP-TTLS, server- side cert ificat e aut hent icat ion is used t o est ablish a secure connect ion, t hen
use sim ple usernam e and password m et hods t hrough t he secured connect ion t o aut hent icat e t he
client s, t hus hiding client ident it y. However, PEAP only support s EAP m et hods, such as EAP- MD5,
EAP- MSCHAPv2 and EAP- GTC ( EAP- Generic Token Card) , for client aut hent icat ion. EAP- GTC is
im plem ent ed only by Cisco.
LEAP
LEAP ( Light weight Ext ensible Aut hent icat ion Prot ocol) is a Cisco im plem ent at ion of I EEE 802.1x.
Dynamic WEP Key Exchange
The AP m aps a unique key t hat is generat ed wit h t he RADI US server. This key expires when t he
wireless connect ion t im es out , disconnect s or reaut hent icat ion t im es out . A new WEP key is
generat ed each t im e reaut hent icat ion is perform ed.
I f t his feat ure is enabled, it is not necessary t o configure a default encrypt ion key in t he wireless
securit y configurat ion screen. You m ay st ill configure and st ore keys, but t hey will not be used while
dynam ic WEP is enabled.
Not e: EAP- MD5 cannot be used wit h Dynam ic WEP Key Exchange
For added securit y, cert ificat e- based aut hent icat ions ( EAP-TLS, EAP-TTLS and PEAP) use dynam ic
keys for dat a encrypt ion. They are oft en deployed in corporat e environm ent s, but for public
deploym ent , a sim ple user nam e and password pair is m ore pract ical. The following t able is a
com parison of t he feat ures of aut hent icat ion t ypes.
Table 167 Com parison of EAP Aut hent icat ion Types
382
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mut ual Aut hent icat ion
No
Yes
Yes
Yes
Yes
Cert ificat e – Client
No
Yes
Opt ional
Opt ional
No
Cert ificat e – Server
No
Yes
Yes
Yes
No
Dynam ic Key Exchange
No
Yes
Yes
Yes
Yes
Credent ial I nt egrit y
None
St rong
St rong
St rong
Moderat e
Deploym ent Difficult y
Easy
Hard
Moderat e
Moderat e
Moderat e
Client I dent it y Prot ect ion
No
No
Yes
Yes
No
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix E Wireless LANs
WPA and WPA2
Wi- Fi Prot ect ed Access ( WPA) is a subset of t he I EEE 802.11i st andard. WPA2 ( I EEE 802.11i) is a
wireless securit y st andard t hat defines st ronger encrypt ion, aut hent icat ion and key m anagem ent
t han WPA.
Key differences bet ween WPA or WPA2 and WEP are im proved dat a encrypt ion and user
aut hent icat ion.
I f bot h an AP and t he wireless client s support WPA2 and you have an ext ernal RADI US server, use
WPA2 for st ronger dat a encrypt ion. I f you don't have an ext ernal RADI US server, you should use
WPA2- PSK ( WPA2- Pre- Shared Key) t hat only requires a single ( ident ical) password ent ered int o
each access point , wireless gat eway and wireless client . As long as t he passwords m at ch, a wireless
client will be grant ed access t o a WLAN.
I f t he AP or t he wireless client s do not support WPA2, j ust use WPA or WPA- PSK depending on
whet her you have an ext ernal RADI US server or not .
Select WEP only when t he AP and/ or wireless client s do not support WPA or WPA2. WEP is less
secure t han WPA or WPA2.
Encryption
WPA im proves dat a encrypt ion by using Tem poral Key I nt egrit y Prot ocol ( TKI P) , Message I nt egrit y
Check ( MI C) and I EEE 802.1x. WPA2 also uses TKI P when required for com pat ibilit y reasons, but
offers st ronger encrypt ion t han TKI P wit h Advanced Encrypt ion St andard ( AES) in t he Count er
m ode wit h Cipher block chaining Message aut hent icat ion code Prot ocol ( CCMP) .
TKI P uses 128- bit keys t hat are dynam ically generat ed and dist ribut ed by t he aut hent icat ion server.
AES ( Advanced Encrypt ion St andard) is a block cipher t hat uses a 256- bit m at hem at ical algorit hm
called Rij ndael. They bot h include a per- packet key m ixing funct ion, a Message I nt egrit y Check
( MI C) nam ed Michael, an ext ended init ializat ion vect or ( I V) wit h sequencing rules, and a re- keying
m echanism .
WPA and WPA2 regularly change and rot at e t he encrypt ion keys so t hat t he sam e encrypt ion key is
never used t wice.
The RADI US server dist ribut es a Pairwise Mast er Key ( PMK) key t o t he AP t hat t hen set s up a key
hierarchy and m anagem ent syst em , using t he PMK t o dynam ically generat e unique dat a encrypt ion
keys t o encrypt every dat a packet t hat is wirelessly com m unicat ed bet ween t he AP and t he wireless
client s. This all happens in t he background aut om at ically.
The Message I nt egrit y Check ( MI C) is designed t o prevent an at t acker from capt uring dat a packet s,
alt ering t hem and resending t hem . The MI C provides a st rong m at hem at ical funct ion in which t he
receiver and t he t ransm it t er each com put e and t hen com pare t he MI C. I f t hey do not m at ch, it is
assum ed t hat t he dat a has been t am pered wit h and t he packet is dropped.
By generat ing unique dat a encrypt ion keys for every dat a packet and by creat ing an int egrit y
checking m echanism ( MI C) , wit h TKI P and AES it is m ore difficult t o decrypt dat a on a Wi- Fi
net work t han WEP and difficult for an int ruder t o break int o t he net work.
The encrypt ion m echanism s used for WPA( 2) and WPA( 2) - PSK are t he sam e. The only difference
bet ween t he t wo is t hat WPA( 2) - PSK uses a sim ple com m on password, inst ead of user- specific
credent ials. The com m on- password approach m akes WPA( 2) - PSK suscept ible t o brut e- force
VMG8324-B10A / VMG8324-B30A Series User’s Guide
383
Appendix E Wireless LANs
password- guessing at t acks but it ’s st ill an im provem ent over WEP as it em ploys a consist ent ,
single, alphanum eric password t o derive a PMK which is used t o generat e unique t em poral
encrypt ion keys. This prevent all wireless devices sharing t he sam e encrypt ion keys. ( a weakness of
WEP)
User Authentication
WPA and WPA2 apply I EEE 802.1x and Ext ensible Aut hent icat ion Prot ocol ( EAP) t o aut hent icat e
wireless client s using an ext ernal RADI US dat abase. WPA2 reduces t he num ber of key exchange
m essages from six t o four ( CCMP 4- way handshake) and short ens t he t im e required t o connect t o a
net work. Ot her WPA2 aut hent icat ion feat ures t hat are different from WPA include key caching and
pre- aut hent icat ion. These t wo feat ures are opt ional and m ay not be support ed in all wireless
devices.
Key caching allows a wireless client t o st ore t he PMK it derived t hrough a successful aut hent icat ion
wit h an AP. The wireless client uses t he PMK when it t ries t o connect t o t he sam e AP and does not
need t o go wit h t he aut hent icat ion process again.
Pre- aut hent icat ion enables fast roam ing by allowing t he wireless client ( already connect ing t o an
AP) t o perform I EEE 802.1x aut hent icat ion wit h anot her AP before connect ing t o it .
Wireless Client WPA Supplicants
A wireless client supplicant is t he soft ware t hat runs on an operat ing syst em inst ruct ing t he wireless
client how t o use WPA. At t he t im e of writ ing, t he m ost widely available supplicant is t he WPA pat ch
for Windows XP, Funk Soft ware's Odyssey client .
The Windows XP pat ch is a free download t hat adds WPA capabilit y t o Windows XP's built- in " Zero
Configurat ion" wireless client . However, you m ust run Windows XP t o use it .
WPA(2) with RADIUS Application Example
To set up WPA( 2) , you need t he I P address of t he RADI US server, it s port num ber ( default is 1812) ,
and t he RADI US shared secret . A WPA( 2) applicat ion exam ple wit h an ext ernal RADI US server
looks as follows. " A" is t he RADI US server. " DS" is t he dist ribut ion syst em .
384
The AP passes t he wireless client 's aut hent icat ion request t o t he RADI US server.
The RADI US server t hen checks t he user's ident ificat ion against it s dat abase and grant s or denies
net work access accordingly.
A 256- bit Pairwise Mast er Key ( PMK) is derived from t he aut hent icat ion process by t he RADI US
server and t he client .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix E Wireless LANs
The RADI US server dist ribut es t he PMK t o t he AP. The AP t hen set s up a key hierarchy and
m anagem ent syst em , using t he PMK t o dynam ically generat e unique dat a encrypt ion keys. The
keys are used t o encrypt every dat a packet t hat is wirelessly com m unicat ed bet ween t he AP and
t he wireless client s.
Figure 244 WPA( 2) wit h RADI US Applicat ion Exam ple
WPA(2)-PSK Application Example
A WPA( 2) - PSK applicat ion looks as follows.
First ent er ident ical passwords int o t he AP and all wireless client s. The Pre- Shared Key ( PSK) m ust
consist of bet ween 8 and 63 ASCI I charact ers or 64 hexadecim al charact ers ( including spaces and
sym bols) .
The AP checks each wireless client 's password and allows it t o j oin t he net work only if t he password
m at ches.
The AP and wireless client s generat e a com m on PMK ( Pairwise Mast er Key) . The key it self is not
sent over t he net work, but is derived from t he PSK and t he SSI D.
The AP and wireless client s use t he TKI P or AES encrypt ion process, t he PMK and inform at ion
exchanged in a handshake t o creat e t em poral encrypt ion keys. They use t hese keys t o encrypt dat a
exchanged bet ween t hem .
Figure 245 WPA( 2) - PSK Aut hent icat ion
VMG8324-B10A / VMG8324-B30A Series User’s Guide
385
Appendix E Wireless LANs
Security Parameters Summary
Refer t o t his t able t o see what ot her securit y param et ers you should configure for each
aut hent icat ion m et hod or key m anagem ent prot ocol t ype. MAC address filt ers are not dependent on
how you configure t hese securit y feat ures.
Table 168 Wireless Securit y Relat ional Mat rix
AUTHENTICATION
ENCRYPTIO
METHOD/ KEY
MANAGEMENT PROTOCOL N METHOD
ENTER
MANUAL KEY
IEEE 802.1X
Open
No
Disable
None
Enable wit hout Dynam ic WEP Key
Open
Shared
WEP
WEP
No
Enable wit h Dynam ic WEP Key
Yes
Enable wit hout Dynam ic WEP Key
Yes
Disable
No
Enable wit h Dynam ic WEP Key
Yes
Enable wit hout Dynam ic WEP Key
Yes
Disable
WPA
TKI P/ AES
No
Enable
WPA- PSK
TKI P/ AES
Yes
Disable
WPA2
TKI P/ AES
No
Enable
WPA2- PSK
TKI P/ AES
Yes
Disable
Antenna Overview
An ant enna couples RF signals ont o air. A t ransm it t er wit hin a wireless device sends an RF signal t o
t he ant enna, which propagat es t he signal t hrough t he air. The ant enna also operat es in reverse by
capt uring RF signals from t he air.
Posit ioning t he ant ennas properly increases t he range and coverage area of a wireless LAN.
Antenna Characteristics
Frequency
An ant enna in t he frequency of 2.4GHz ( I EEE 802.11b and I EEE 802.11g) or 5GHz ( I EEE 802.11a)
is needed t o com m unicat e efficient ly in a wireless LAN
Radiation Pattern
A radiat ion pat t ern is a diagram t hat allows you t o visualize t he shape of t he ant enna’s coverage
area.
Antenna Gain
Ant enna gain, m easured in dB ( decibel) , is t he increase in coverage wit hin t he RF beam widt h.
Higher ant enna gain im proves t he range of t he signal for bet t er com m unicat ions.
For an indoor sit e, each 1 dB increase in ant enna gain result s in a range increase of approxim at ely
386
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix E Wireless LANs
2.5% . For an unobst ruct ed out door sit e, each 1dB increase in gain result s in a range increase of
approxim at ely 5% . Act ual result s m ay vary depending on t he net work environm ent .
Ant enna gain is som et im es specified in dBi, which is how m uch t he ant enna increases t he signal
power com pared t o using an isot ropic ant enna. An isot ropic ant enna is a t heoret ical perfect ant enna
t hat sends out radio signals equally well in all direct ions. dBi represent s t he t rue gain t hat t he
ant enna provides.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
387
Appendix E Wireless LANs
388
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
IPv6
Overview
I Pv6 ( I nt ernet Prot ocol version 6) , is designed t o enhance I P address size and feat ures. The
increase in I Pv6 address size t o 128 bit s ( from t he 32- bit I Pv4 address) allows up t o 3.4 x 10 38 I P
addresses.
IPv6 Addressing
The 128- bit I Pv6 address is writ t en as eight 16- bit hexadecim al blocks separat ed by colons ( : ) . This
is an exam ple I Pv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
I Pv6 addresses can be abbreviat ed in t wo ways:
• Leading zeros in a block can be om it t ed. So 2001:0db8:1a2b:0015:0000:0000:1a2f:0000 can
be writ t en as 2001:db8:1a2b:15:0:0:1a2f:0.
• Any num ber of consecut ive blocks of zeros can be replaced by a double colon. A double colon can
only appear once in an I Pv6 address. So 2001:0db8:0000:0000:1a2f:0000:0000:0015 can be
writ t en as 2001:0db8::1a2f:0000:0000:0015, 2001:0db8:0000:0000:1a2f::0015,
2001:db8::1a2f:0:0:15 or 2001:db8:0:0:1a2f::15.
Prefix and Prefix Length
Sim ilar t o an I Pv4 subnet m ask, I Pv6 uses an address prefix t o represent t he net work address. An
I Pv6 prefix lengt h specifies how m any m ost significant bit s ( st art from t he left ) in t he address
com pose t he net work address. The prefix lengt h is writ t en as “ / x” where x is a num ber. For
exam ple,
2001:db8:1a2b:15::1a2f:0/32
m eans t hat t he first 32 bit s ( 2001:db8) is t he subnet prefix.
Link-local Address
A link- local address uniquely ident ifies a device on t he local net work ( t he LAN) . I t is sim ilar t o a
“ privat e I P address” in I Pv4. You can have t he sam e link- local address on m ult iple int erfaces on a
device. A link- local unicast address has a predefined prefix of fe80: : / 10. The link- local unicast
address form at is as follows.
Table 169 Link- local Unicast Address Form at
1111 1110 10
I nt erface I D
10 bit s
54 bit s
64 bit s
VMG8324-B10A / VMG8324-B30A Series User’s Guide
389
Appendix F IPv6
Global Address
A global address uniquely ident ifies a device on t he I nt ernet . I t is sim ilar t o a “ public I P address” in
I Pv4. A global unicast address st art s wit h a 2 or 3.
Unspecified Address
An unspecified address ( 0: 0: 0: 0: 0: 0: 0: 0 or : : ) is used as t he source address when a device does
not have it s own address. I t is sim ilar t o “ 0.0.0.0” in I Pv4.
Loopback Address
A loopback address ( 0: 0: 0: 0: 0: 0: 0: 1 or : : 1) allows a host t o send packet s t o it self. I t is sim ilar t o
“ 127.0.0.1” in I Pv4.
Multicast Address
I n I Pv6, m ult icast addresses provide t he sam e funct ionalit y as I Pv4 broadcast addresses.
Broadcast ing is not support ed in I Pv6. A m ult icast address allows a host t o send packet s t o all host s
in a m ult icast group.
Mult icast scope allows you t o det erm ine t he size of t he m ult icast group. A m ult icast address has a
predefined prefix of ff00: : / 8. The following t able describes som e of t he predefined m ult icast
addresses.
Table 170 Predefined Mult icast Address
MULTICAST ADDRESS
DESCRIPTION
FF01:0:0:0:0:0:0:1
All host s on a local node.
FF01:0:0:0:0:0:0:2
All rout ers on a local node.
FF02:0:0:0:0:0:0:1
All host s on a local connect ed link.
FF02:0:0:0:0:0:0:2
All rout ers on a local connect ed link.
FF05:0:0:0:0:0:0:2
All rout ers on a local sit e.
FF05:0:0:0:0:0:1:3
All DHCP severs on a local sit e.
The following t able describes t he m ult icast addresses which are reserved and can not be assigned
t o a m ult icast group.
Table 171 Reserved Mult icast Address
MULTICAST ADDRESS
FF00:0:0:0:0:0:0:0
FF01:0:0:0:0:0:0:0
FF02:0:0:0:0:0:0:0
FF03:0:0:0:0:0:0:0
FF04:0:0:0:0:0:0:0
FF05:0:0:0:0:0:0:0
FF06:0:0:0:0:0:0:0
FF07:0:0:0:0:0:0:0
390
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix F IPv6
Table 171 Reserved Mult icast Address ( cont inued)
MULTICAST ADDRESS
FF08:0:0:0:0:0:0:0
FF09:0:0:0:0:0:0:0
FF0A:0:0:0:0:0:0:0
FF0B:0:0:0:0:0:0:0
FF0C:0:0:0:0:0:0:0
FF0D:0:0:0:0:0:0:0
FF0E:0:0:0:0:0:0:0
FF0F:0:0:0:0:0:0:0
Subnet Masking
Bot h an I Pv6 address and I Pv6 subnet m ask com pose of 128- bit binary digit s, which are divided
int o eight 16- bit blocks and writ t en in hexadecim al not at ion. Hexadecim al uses four bit s for each
charact er ( 1 ~ 10, A ~ F) . Each block’s 16 bit s are t hen represent ed by four hexadecim al
charact ers. For exam ple, FFFF: FFFF: FFFF: FFFF: FC00: 0000: 0000: 0000.
Interface ID
I n I Pv6, an int erface I D is a 64- bit ident ifier. I t ident ifies a physical int erface ( for exam ple, an
Et hernet port ) or a virt ual int erface ( for exam ple, t he m anagem ent I P address for a VLAN) . One
int erface should have a unique int erface I D.
EUI-64
The EUI - 64 ( Ext ended Unique I dent ifier) defined by t he I EEE ( I nst it ut e of Elect rical and Elect ronics
Engineers) is an int erface I D form at designed t o adapt wit h I Pv6. I t is derived from t he 48- bit ( 6byt e) Et hernet MAC address as shown next . EUI - 64 insert s t he hex digit s fffe bet ween t he t hird and
fourt h byt es of t he MAC address and com plem ent s t he sevent h bit of t he first byt e of t he MAC
address. See t he following exam ple.
M AC
EUI - 6 4
02
00
: 13
: 49
: 12
: 34
: 56
: 13
: 49
: FF
: FE
: 12
: 34
: 56
Identity Association
An I dent it y Associat ion ( I A) is a collect ion of addresses assigned t o a DHCP client , t hrough which
t he server and client can m anage a set of relat ed I P addresses. Each I A m ust be associat ed wit h
exact ly one int erface. The DHCP client uses t he I A assigned t o an int erface t o obt ain configurat ion
from a DHCP server for t hat int erface. Each I A consist s of a unique I AI D and associat ed I P
inform at ion.
The I A t ype is t he t ype of address in t he I A. Each I A holds one t ype of address. I A_NA m eans an
ident it y associat ion for non- t em porary addresses and I A_TA is an ident it y associat ion for t em porary
addresses. An I A_NA opt ion cont ains t he T1 and T2 fields, but an I A_TA opt ion does not . The
DHCPv6 server uses T1 and T2 t o cont rol t he t im e at which t he client cont act s wit h t he server t o
ext end t he lifet im es on any addresses in t he I A_NA before t he lifet im es expire. Aft er T1, t he client
sends t he server ( S1 ) ( from which t he addresses in t he I A_NA were obt ained) a Renew m essage. I f
VMG8324-B10A / VMG8324-B30A Series User’s Guide
391
Appendix F IPv6
t he t im e T2 is reached and t he server does not respond, t he client sends a Rebind m essage t o any
available server ( S2 ) . For an I A_TA, t he client m ay send a Renew or Rebind m essage at t he client 's
discret ion.
T2
T1
Renew Renew
to S1
to S1
Renew Renew
to S1
to S1
Renew
to S1
Renew
to S1
Rebind
to S2
Rebind
to S2
DHCP Relay Agent
A DHCP relay agent is on t he sam e net work as t he DHCP client s and helps forward m essages
bet ween t he DHCP server and client s. When a client cannot use it s link- local address and a wellknown m ult icast address t o locat e a DHCP server on it s net work, it t hen needs a DHCP relay agent
t o send a m essage t o a DHCP server t hat is not at t ached t o t he sam e net work.
The DHCP relay agent can add t he rem ot e ident ificat ion ( rem ot e- I D) opt ion and t he int erface- I D
opt ion t o t he Relay- Forward DHCPv6 m essages. The rem ot e- I D opt ion carries a user- defined st ring,
such as t he syst em nam e. The int erface- I D opt ion provides slot num ber, port inform at ion and t he
VLAN I D t o t he DHCPv6 server. The rem ot e- I D opt ion ( if any) is st ripped from t he Relay- Reply
m essages before t he relay agent sends t he packet s t o t he client s. The DHCP server copies t he
int erface- I D opt ion from t he Relay- Forward m essage int o t he Relay- Reply m essage and sends it t o
t he relay agent . The int erface- I D should not change even aft er t he relay agent rest art s.
Prefix Delegation
Prefix delegat ion enables an I Pv6 rout er t o use t he I Pv6 prefix ( net work address) received from t he
I SP ( or a connect ed uplink rout er) for it s LAN. The Device uses t he received I Pv6 prefix ( for
exam ple, 2001: db2: : / 48) t o generat e it s LAN I P address. Through sending Rout er Advert isem ent s
( RAs) regularly by m ult icast , t he Device passes t he I Pv6 prefix inform at ion t o it s LAN host s. The
host s t hen can use t he prefix t o generat e t heir I Pv6 addresses.
ICMPv6
I nt ernet Cont rol Message Prot ocol for I Pv6 ( I CMPv6 or I CMP for I Pv6) is defined in RFC 4443.
I CMPv6 has a preceding Next Header value of 58, which is different from t he value used t o ident ify
I CMP for I Pv4. I CMPv6 is an int egral part of I Pv6. I Pv6 nodes use I CMPv6 t o report errors
encount ered in packet processing and perform ot her diagnost ic funct ions, such as " ping" .
Neighbor Discovery Protocol (NDP)
The Neighbor Discovery Prot ocol ( NDP) is a prot ocol used t o discover ot her I Pv6 devices and t rack
neighbor ’s reachabilit y in a net work. An I Pv6 device uses t he following I CMPv6 m essages t ypes:
• Neighbor solicit at ion: A request from a host t o det erm ine a neighbor ’s link- layer address ( MAC
address) and det ect if t he neighbor is st ill reachable. A neighbor being “ reachable” m eans it
responds t o a neighbor solicit at ion m essage ( from t he host ) wit h a neighbor advert isem ent
m essage.
392
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix F IPv6
• Neighbor advert isem ent : A response from a node t o announce it s link- layer address.
• Rout er solicit at ion: A request from a host t o locat e a rout er t hat can act as t he default rout er and
forward packet s.
• Rout er advert isem ent : A response t o a rout er solicit at ion or a periodical m ult icast advert isem ent
from a rout er t o advert ise it s presence and ot her param et ers.
IPv6 Cache
An I Pv6 host is required t o have a neighbor cache, dest inat ion cache, prefix list and default rout er
list . The Device m aint ains and updat es it s I Pv6 caches const ant ly using t he inform at ion from
response m essages. I n I Pv6, t he Device configures a link- local address aut om at ically, and t hen
sends a neighbor solicit at ion m essage t o check if t he address is unique. I f t here is an address t o be
resolved or verified, t he Device also sends out a neighbor solicit at ion m essage. When t he Device
receives a neighbor advert isem ent in response, it st ores t he neighbor ’s link- layer address in t he
neighbor cache. When t he Device uses a rout er solicit at ion m essage t o query for a rout er and
receives a rout er advert isem ent m essage, it adds t he rout er ’s inform at ion t o t he neighbor cache,
prefix list and dest inat ion cache. The Device creat es an ent ry in t he default rout er list cache if t he
rout er can be used as a default rout er.
When t he Device needs t o send a packet , it first consult s t he dest inat ion cache t o det erm ine t he
next hop. I f t here is no m at ching ent ry in t he dest inat ion cache, t he Device uses t he prefix list t o
det erm ine whet her t he dest inat ion address is on- link and can be reached direct ly wit hout passing
t hrough a rout er. I f t he address is unlink, t he address is considered as t he next hop. Ot herwise, t he
Device det erm ines t he next- hop from t he default rout er list or rout ing t able. Once t he next hop I P
address is known, t he Device looks int o t he neighbor cache t o get t he link- layer address and sends
t he packet when t he neighbor is reachable. I f t he Device cannot find an ent ry in t he neighbor cache
or t he st at e for t he neighbor is not reachable, it st art s t he address resolut ion process. This helps
reduce t he num ber of I Pv6 solicit at ion and advert isem ent m essages.
Multicast Listener Discovery
The Mult icast List ener Discovery ( MLD) prot ocol ( defined in RFC 2710) is derived from I Pv4's
I nt ernet Group Managem ent Prot ocol version 2 ( I GMPv2) . MLD uses I CMPv6 m essage t ypes, rat her
t han I GMP m essage t ypes. MLDv1 is equivalent t o I GMPv2 and MLDv2 is equivalent t o I GMPv3.
MLD allows an I Pv6 swit ch or rout er t o discover t he presence of MLD list eners who wish t o receive
m ult icast packet s and t he I P addresses of m ult icast groups t he host s want t o j oin on it s net work.
MLD snooping and MLD proxy are analogous t o I GMP snooping and I GMP proxy in I Pv4.
MLD filt ering cont rols which m ult icast groups a port can j oin.
MLD Messages
A m ult icast rout er or swit ch periodically sends general queries t o MLD host s t o updat e t he m ult icast
forwarding t able. When an MLD host want s t o j oin a m ult icast group, it sends an MLD Report
m essage for t hat address.
An MLD Done m essage is equivalent t o an I GMP Leave m essage. When an MLD host want s t o leave
a m ult icast group, it can send a Done m essage t o t he rout er or swit ch. The rout er or swit ch t hen
sends a group- specific query t o t he port on which t he Done m essage is received t o det erm ine if
ot her devices connect ed t o t his port should rem ain in t he group.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
393
Appendix F IPv6
Example - Enabling IPv6 on Windows XP/2003/Vista
By default , Windows XP and Windows 2003 support I Pv6. This exam ple shows you how t o use t he
ipv6 install com m and on Windows XP/ 2003 t o enable I Pv6. This also displays how t o use t he
ipconfig com m and t o see aut o- generat ed I P addresses.
C:\>ipv6 install
Installing...
Succeeded.
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific
IP Address. . . . .
Subnet Mask . . . .
IP Address. . . . .
Default Gateway . .
DNS
. .
. .
. .
. .
Suffix
. . . .
. . . .
. . . .
. . . .
10.1.1.46
255.255.255.0
fe80::2d0:59ff:feb8:103c%4
10.1.1.254
I Pv6 is inst alled and enabled by default in Windows Vist a. Use t he ipconfig com m and t o check
your aut om at ic configured I Pv6 address as well. You should see at least one I Pv6 address available
for t he int erface on your com put er.
Example - Enabling DHCPv6 on Windows XP
Windows XP does not support DHCPv6. I f your net work uses DHCPv6 for I P address assignm ent ,
you have t o addit ionally inst all a DHCPv6 client soft ware on your Windows XP. ( Not e: I f you use
st at ic I P addresses or Rout er Advert isem ent for I Pv6 address assignm ent in your net work, ignore
t his sect ion.)
This exam ple uses Dibbler as t he DHCPv6 client. To enable DHCPv6 client on your com put er:
394
I nst all Dibbler and select t he DHCPv6 client opt ion on your com put er.
Aft er t he inst allat ion is com plet e, select St a r t > All Pr ogr a m s > D ibble r - D H CPv6 > Clie nt
I nst a ll a s se r vice .
Select St a r t > Cont r ol Pa n e l > Adm in ist r a t ive Tools > Se r vice s.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix F IPv6
Double click D ibble r - a D H CPv6 clie nt .
Click St a r t and t hen OK.
Now your com put er can obt ain an I Pv6 address from a DHCPv6 server.
Example - Enabling IPv6 on Windows 7
Windows 7 support s I Pv6 by default . DHCPv6 is also enabled when you enable I Pv6 on a Windows 7
com put er.
To enable I Pv6 in Windows 7:
Select Cont r ol Pa ne l > N e t w or k a n d Sh a r in g Ce n t e r > Loca l Ar e a Con ne ct ion.
Select t he I n t e r n e t Pr ot ocol Ve r sion 6 ( TCP/ I Pv6 ) checkbox t o enable it .
Click OK t o save t he change.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
395
Appendix F IPv6
Click Close t o exit t he Loca l Ar e a Conn e ct ion St a t us screen.
Select St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt .
Use t he ipconfig com m and t o check your dynam ic I Pv6 address. This exam ple shows a global
address ( 2001: b021: 2d: : 1000) obt ained from a DHCP server.
C:\>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS
IPv6 Address. . . . . .
Link-local IPv6 Address
IPv4 Address. . . . . .
Subnet Mask . . . . . .
Default Gateway . . . .
396
Suffix
. . . .
. . . .
. . . .
. . . .
. . . .
2001:b021:2d::1000
fe80::25d8:dcab:c80a:5189%11
172.16.100.61
255.255.255.0
fe80::213:49ff:feaa:7125%11
172.16.100.254
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
Services
The following t able list s som e com m only- used services and t heir associat ed prot ocols and port
num bers.
• N a m e : This is a short , descript ive nam e for t he service. You can use t his one or creat e a
different one, if you like.
• Pr ot ocol: This is t he t ype of I P prot ocol used by t he service. I f t his is TCP/ UD P, t hen t he service
uses t he sam e port num ber wit h TCP and UDP. I f t his is USER- D EFI N ED, t he Por t ( s) is t he I P
prot ocol num ber, not t he port num ber.
• Por t ( s) : This value depends on t he Pr ot ocol.
• I f t he Pr ot ocol is TCP, UD P, or TCP/ UD P, t his is t he I P port num ber.
• I f t he Pr ot ocol is USER, t his is t he I P prot ocol num ber.
• D e scr ipt ion : This is a brief explanat ion of t he applicat ions t hat use t his service or t he sit uat ions
in which t his service is used.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
397
Appendix G Services
Table 172 Exam ples of Services
NAME
398
PROTOCOL
PORT(S)
DESCRIPTION
AH ( I PSEC_TUNNEL) User- Defined
51
The I PSEC AH ( Aut hent icat ion Header)
t unneling prot ocol uses t his service.
AI M
TCP
5190
AOL’s I nt ernet Messenger service.
AUTH
TCP
113
Aut hent icat ion prot ocol used by som e
servers.
BGP
TCP
179
Border Gat eway Prot ocol.
BOOTP_CLI ENT
UDP
68
DHCP Client .
BOOTP_SERVER
UDP
67
DHCP Server.
CU- SEEME
TCP/ UDP
7648
TCP/ UDP
24032
A popular videoconferencing solut ion from
Whit e Pines Soft ware.
DNS
TCP/ UDP
53
Dom ain Nam e Server, a service t hat
m at ches web nam es ( for inst ance
www.zyxel.com ) t o I P num bers.
ESP
( I PSEC_TUNNEL)
User- Defined
50
The I PSEC ESP ( Encapsulat ion Securit y
Prot ocol) t unneling prot ocol uses t his
service.
FI NGER
TCP
79
Finger is a UNI X or I nt ernet relat ed
com m and t hat can be used t o find out if a
user is logged on.
FTP
TCP
20
TCP
21
File Transfer Prot ocol, a program t o enable
fast t ransfer of files, including large files
t hat m ay not be possible by e- m ail.
H.323
TCP
1720
Net Meet ing uses t his prot ocol.
HTTP
TCP
80
Hyper Text Transfer Prot ocol - a client /
server prot ocol for t he world wide web.
HTTPS
TCP
443
HTTPS is a secured ht t p session oft en used
in e- com m erce.
I CMP
User- Defined
I nt ernet Cont rol Message Prot ocol is oft en
used for diagnost ic purposes.
I CQ
UDP
4000
This is a popular I nt ernet chat program .
I GMP ( MULTI CAST)
User- Defined
I nt ernet Group Mult icast Prot ocol is used
when sending packet s t o a specific group
of host s.
I KE
UDP
500
The I nt ernet Key Exchange algorit hm is
used for key dist ribut ion and m anagem ent .
I MAP4
TCP
143
The I nt ernet Message Access Prot ocol is
used for e- m ail.
I MAP4S
TCP
993
This is a m ore secure version of I MAP4 t hat
runs over SSL.
I RC
TCP/ UDP
6667
This is anot her popular I nt ernet chat
program .
MSN Messenger
TCP
1863
Microsoft Net works’ m essenger service
uses t his prot ocol.
Net BI OS
TCP/ UDP
137
TCP/ UDP
138
The Net work Basic I nput / Out put Syst em is
used for com m unicat ion bet ween
com put ers in a LAN.
TCP/ UDP
139
TCP/ UDP
445
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix G Services
Table 172 Exam ples of Services ( cont inued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
NEW- I CQ
TCP
5190
An I nt ernet chat program .
NEWS
TCP
144
A prot ocol for news groups.
NFS
UDP
2049
Net work File Syst em - NFS is a client /
server dist ribut ed file service t hat provides
t ransparent file sharing for net work
environm ent s.
NNTP
TCP
119
Net work News Transport Prot ocol is t he
delivery m echanism for t he USENET
newsgroup service.
PI NG
User- Defined
Packet I Nt ernet Groper is a prot ocol t hat
sends out I CMP echo request s t o t est
whet her or not a rem ot e host is reachable.
POP3
TCP
110
Post Office Prot ocol version 3 let s a client
com put er get e- m ail from a POP3 server
t hrough a t em porary connect ion ( TCP/ I P or
ot her) .
POP3S
TCP
995
This is a m ore secure version of POP3 t hat
runs over SSL.
PPTP
TCP
1723
Point- t o- Point Tunneling Prot ocol enables
secure t ransfer of dat a over public
net works. This is t he cont rol channel.
PPTP_TUNNEL ( GRE) User- Defined
47
PPTP ( Point- t o- Point Tunneling Prot ocol)
enables secure t ransfer of dat a over public
net works. This is t he dat a channel.
RCMD
TCP
512
Rem ot e Com m and Service.
REAL_AUDI O
TCP
7070
A st ream ing audio service t hat enables real
t im e sound over t he web.
REXEC
TCP
514
Rem ot e Execut ion Daem on.
RLOGI N
TCP
513
Rem ot e Login.
ROADRUNNER
TCP/ UDP
1026
This is an I SP t hat provides services m ainly
for cable m odem s.
RTELNET
TCP
107
Rem ot e Telnet .
RTSP
TCP/ UDP
554
The Real Tim e St ream ing ( m edia cont rol)
Prot ocol ( RTSP) is a rem ot e cont rol for
m ult im edia on t he I nt ernet .
SFTP
TCP
115
The Sim ple File Transfer Prot ocol is an old
way of t ransferring files bet ween
com put ers.
SMTP
TCP
25
Sim ple Mail Transfer Prot ocol is t he
m essage- exchange st andard for t he
I nt ernet . SMTP enables you t o m ove
m essages from one e- m ail server t o
anot her.
SMTPS
TCP
465
This is a m ore secure version of SMTP t hat
runs over SSL.
SNMP
TCP/ UDP
161
Sim ple Net work Managem ent Program .
SNMP-TRAPS
TCP/ UDP
162
Traps for use wit h t he SNMP ( RFC: 1215) .
VMG8324-B10A / VMG8324-B30A Series User’s Guide
399
Appendix G Services
Table 172 Exam ples of Services ( cont inued)
400
NAME
PROTOCOL
PORT(S)
DESCRIPTION
SQL- NET
TCP
1521
St ruct ured Query Language is an int erface
t o access dat a on m any different t ypes of
dat abase syst em s, including m ainfram es,
m idrange syst em s, UNI X syst em s and
net work servers.
SSDP
UDP
1900
The Sim ple Service Discovery Prot ocol
support s Universal Plug- and- Play ( UPnP) .
SSH
TCP/ UDP
22
Secure Shell Rem ot e Login Program .
STRM WORKS
UDP
1558
St ream Works Prot ocol.
SYSLOG
UDP
514
Syslog allows you t o send syst em logs t o a
UNI X server.
TACACS
UDP
49
Login Host Prot ocol used for ( Term inal
Access Cont roller Access Cont rol Syst em ) .
TELNET
TCP
23
Telnet is t he login and t erm inal em ulat ion
prot ocol com m on on t he I nt ernet and in
UNI X environm ent s. I t operat es over TCP/
I P net works. I t s prim ary funct ion is t o
allow users t o log int o rem ot e host
syst em s.
VDOLI VE
TCP
7000
UDP
userdefined
A videoconferencing solut ion. The UDP port
num ber is specified in t he applicat ion.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
A PPENDIX
Legal Information
Copyright
Copyright © 2013 by ZyXEL Com m unicat ions Corporat ion.
The cont ent s of t his publicat ion m ay not be reproduced in any part or as a whole, t ranscribed,
st ored in a ret rieval syst em , t ranslat ed int o any language, or t ransm it t ed in any form or by any
m eans, elect ronic, m echanical, m agnet ic, opt ical, chem ical, phot ocopying, m anual, or ot herwise,
wit hout t he prior writ t en perm ission of ZyXEL Com m unicat ions Corporat ion.
Published by ZyXEL Com m unicat ions Corporat ion. All right s reserved.
Disclaimer
ZyXEL does not assum e any liabilit y arising out of t he applicat ion or use of any product s, or
soft ware described herein. Neit her does it convey any license under it s pat ent right s nor t he pat ent
right s of ot hers. ZyXEL furt her reserves t he right t o m ake changes in any product s described herein
wit hout not ice. This publicat ion is subj ect t o change wit hout not ice.
Certifications
Federal Communications Commission (FCC) Interference Statement
The device com plies wit h Part 15 of FCC rules. Operat ion is subj ect t o t he following t wo condit ions:
• This device m ay not cause harm ful int erference.
• This device m ust accept any int erference received, including int erference t hat m ay cause
undesired operat ions.
This device has been t est ed and found t o com ply wit h t he lim it s for a Class B digit al device pursuant
t o Part 15 of t he FCC Rules. These lim it s are designed t o provide reasonable prot ect ion against
harm ful int erference in a resident ial inst allat ion. This device generat es, uses, and can radiat e radio
frequency energy, and if not inst alled and used in accordance wit h t he inst ruct ions, m ay cause
harm ful int erference t o radio com m unicat ions. However, t here is no guarant ee t hat int erference will
not occur in a part icular inst allat ion.
I f t his device does cause harm ful int erference t o radio/ t elevision recept ion, which can be
det erm ined by t urning t he device off and on, t he user is encouraged t o t ry t o correct t he
int erference by one or m ore of t he following m easures:
Reorient or relocat e t he receiving ant enna.
I ncrease t he separat ion bet ween t he equipm ent and t he receiver.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
401
Appendix H Legal Information
Connect t he equipm ent int o an out let on a circuit different from t hat t o which t he receiver is
connect ed.
Consult t he dealer or an experienced radio/ TV t echnician for help.
FCC Radiation Exposure Statement
• This t ransm it t er m ust not be co- locat ed or operat ing in conj unct ion wit h any ot her ant enna or
t ransm it t er.
• I EEE 802.11b or 802.11g operat ion of t his product in t he U.S.A. is firm ware- lim it ed t o channels 1
t hrough 11.
• To com ply wit h FCC RF exposure com pliance requirem ent s, a separat ion dist ance of at least 20
cm m ust be m aint ained bet ween t he ant enna of t his device and all persons.
注意 !
依據
低
率電波輻射性電機管理辦法
第十二條 經型式認證合格之低 率射頻電機,非經許可,公司
者均不得擅自變更頻率
大 率或變更原設計之特性及 能
商號或使用
第十四條 低 率射頻電機之使用不得影響飛航安 及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用
前項合法通信,指依電信規定作業之無線電信 低 率射頻電機須忍
受合法通信或工業 科學及醫療用電波輻射性電機設備之干擾
本機限在不干擾合法電臺與不受被干擾保障條件下於室
減少電磁波影響,請妥適使用
使用
Notices
Changes or m odificat ions not expressly approved by t he part y responsible for com pliance could
void t he user's aut horit y t o operat e t he equipm ent .
This Class B digit al apparat us com plies wit h Canadian I CES- 003.
Cet appareil num érique de la classe B est conform e à la norm e NMB- 003 du Canada.
ZyXEL Limited Warranty
ZyXEL warrant s t o t he original end user ( purchaser) t hat t his product is free from any defect s in
m at erials or workm anship for a period of up t o t wo years from t he dat e of purchase. During t he
warrant y period, and upon proof of purchase, should t he product have indicat ions of failure due t o
fault y workm anship and/ or m at erials, ZyXEL will, at it s discret ion, repair or replace t he defect ive
product s or com ponent s wit hout charge for eit her part s or labor, and t o what ever ext ent it shall
deem necessary t o rest ore t he product or com ponent s t o proper operat ing condit ion. Any
replacem ent will consist of a new or re- m anufact ured funct ionally equivalent product of equal or
higher value, and will be solely at t he discret ion of ZyXEL. This warrant y shall not apply if t he
402
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Appendix H Legal Information
product has been m odified, m isused, t am pered wit h, dam aged by an act of God, or subj ect ed t o
abnorm al working condit ions.
Note
Repair or replacem ent , as provided under t his warrant y, is t he exclusive rem edy of t he purchaser.
This warrant y is in lieu of all ot her warrant ies, express or im plied, including any im plied warrant y of
m erchant abilit y or fit ness for a part icular use or purpose. ZyXEL shall in no event be held liable for
indirect or consequent ial dam ages of any kind t o t he purchaser.
To obt ain t he services of t his warrant y, cont act ZyXEL's Service Cent er for your Ret urn Mat erial
Aut horizat ion num ber ( RMA) . Product s m ust be ret urned Post age Prepaid. I t is recom m ended t hat
t he unit be insured when shipped. Any ret urned product s wit hout proof of purchase or t hose wit h
an out- dat ed warrant y will be repaired or replaced ( at t he discret ion of ZyXEL) and t he cust om er
will be billed for part s and labor. All repaired or replaced product s will be shipped by ZyXEL t o t he
corresponding ret urn address, Post age Paid. This warrant y gives you specific legal right s, and you
m ay also have ot her right s t hat vary from count ry t o count ry.
Registration
Regist er your product online t o receive e- m ail not ices of firm ware upgrades and inform at ion at
www.zyxel.com for global product s, or at www.us.zyxel.com for Nort h Am erican product s.
Open Source Licenses
This product cont ains in part som e free soft ware dist ribut ed under GPL license t erm s and/ or GPL
like licenses. Open source licenses are provided wit h t he firm ware package. You can download t he
lat est firm ware at www.zyxel.com . I f you cannot find it t here, cont act your vendor or ZyXEL
Technical Support at support @zyxel.com .t w. To obt ain t he source code covered under t hose
Licenses, please cont act your vendor or ZyXEL Technical Support at support @zyxel.com .t w.
Safety Warnings
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Do NOT use t his product near wat er, for exam ple, in a wet basem ent or near a swim m ing pool.
Do NOT expose your device t o dam pness, dust or corrosive liquids.
Do NOT st ore t hings on t he device.
Do NOT inst all, use, or service t his device during a t hunderst orm . There is a rem ot e risk of elect ric shock
from light ning.
Connect ONLY suit able accessories t o t he device.
The RJ- 45 LAN and WAN port j acks are not used for t elephone line connect ion.
Do NOT open t he device or unit . Opening or rem oving covers can expose you t o dangerous high volt age
point s or ot her risks. ONLY qualified service personnel should service or disassem ble t his device. Please
cont act your vendor for furt her inform at ion.
Make sure t o connect t he cables t o t he correct port s.
Place connect ing cables carefully so t hat no one will st ep on t hem or st um ble over t hem .
Always disconnect all cables from t his device before servicing or disassem bling.
Use ONLY an appropriat e power adapt or or cord for your device.
Connect t he power adapt or or cord t o t he right supply volt age ( for exam ple, 110V AC in Nort h Am erica or
230V AC in Europe) .
Do NOT allow anyt hing t o rest on t he pow er adapt or or cord and do NOT place t he product where anyone can
walk on t he power adapt or or cord.
Do NOT use t he device if t he power adapt or or cord is dam aged as it m ight cause elect rocut ion.
I f t he power adapt or or cord is dam aged, rem ove it from t he device and t he power source.
Do NOT at t em pt t o repair t he power adapt or or cord. Cont act your local vendor t o order a new one.
VMG8324-B10A / VMG8324-B30A Series User’s Guide
403
Appendix H Legal Information
•
•
•
•
Do not use t he device out side, and m ake sure all t he connect ions are indoors. There is a rem ot e risk of
elect ric shock from light ning.
Do NOT obst ruct t he device vent ilat ion slot s, as insufficient airflow m ay harm your device.
Use only No. 26 AWG ( Am erican Wire Gauge) or larger t elecom m unicat ion line cord.
Ant enna Warning! This device m eet s ETSI and FCC cert ificat ion requirem ent s when using t he included
ant enna( s) . Only use t he included ant enna( s) .
Your product is m arked wit h t his sym bol, which is known as t he WEEE m ark. WEEE st ands for Wast e
Elect ronics and Elect rical Equipm ent . I t m eans t hat used elect rical and elect ronic product s should not be
m ixed wit h general wast e. Used elect rical and elect ronic equipm ent should be t reat ed separat ely.
404
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Index
Index
BYE request 256
ACK m essage 256
ACL rule 202
ACS 295
act ivat ion
firewalls 199
m edia server 191
SI P ALG 166
SSI D 82
CA 213, 381
Address Resolut ion Prot ocol 277
call service m ode 261, 263
adm inist rat or password 26
call t ransfer 262, 264
AH 229
call wait ing 262, 263
algorit hm s 229
Canonical Form at I ndicat or See CFI
alt ernat ive subnet m ask not at ion 360
CCMs 317
ant enna
gain 386
cert ificat e
fact ory default 214
applicat ions
I nt ernet access 18
m edia server 190
act ivat ion 191
iTunes server 190
Cert ificat e Aut horit y
See CA.
call hist ory 250
incom ing calls 251
out going calls 251
call hold 262, 263
aut hent icat ion 94, 95
RADI US server 95
cert ificat es 213
aut hent icat ion 213
CA
creat ing 214
public key 213
replacing 214
st orage space 214
Aut o Configurat ion Server, see ACS 295
Cert ificat ion Aut horit y 213
applicat ions, NAT 173
ARP Table 277, 279
Cert ificat ion Aut horit y. see CA
backup
configurat ion 313
Basic Service Set , See BSS 375
Basic Service Set , see BSS
blinking LEDs 20
Broadband 43
broadcast 68
BSS 97, 375
exam ple 97
VMG8324-B10A / VMG8324-B30A Series User’s Guide
cert ificat ions 401
not ices 402
CFI 68
CFM 317
CCMs 317
link t race t est 317
loopback t est 317
MA 317
MD 317
MEP 317
MI P 317
channel 377
channel, wireless LAN 93
405
Index
Class of Service 260
DNS server address assignm ent 68
Class of Service, see CoS
client list 113
docum ent at ion
relat ed 2
client- server prot ocol 253
Dom ain Nam e 173
com fort noise generat ion 258
Dom ain Nam e Syst em , see DNS
com pat ibilit y, WDS 88
Dom ain Nam e Syst em . See DNS.
configurat ion
backup 313
firewalls 199
reset 315
rest oring 314
st at ic rout e 63, 133, 134, 177
DoS 198
Connect ivit y Check Messages, see CCMs
cont act inform at ion 329
copyright 401
DS field 153, 260
DS, dee different iat ed services
DSCP 152, 260
dynam ic DNS 175
wildcard 176
Dynam ic Host Configurat ion Prot ocol, see DHCP
dynam ic WEP key exchange 382
DYNDNS wildcard 176
CoS 152, 260
CoS t echnologies 140
creat ing cert ificat es 214
CTS ( Clear t o Send) 378
CTS t hreshold 90, 94
cust om er support 329
EAP Aut hent icat ion 381
ECHO 173
echo cancellat ion 258
e- m ail
log exam ple 308
dat a fragm ent t hreshold 90, 94
Encapsulat ion 64
MER 64
PPP over Et hernet 65
DDoS 198
default server address 165
Denials of Service, see DoS
encapsulat ion 44, 229
RFC 1483 65
DH 234
encrypt ion 96, 383
DHCP 108, 128
ESP 229
different iat ed services 260
ESS 376
Different iat ed Services, see DiffServ 152
Europe t ype call service m ode 261
Diffie- Hellm an key groups 234
Ext ended Service Set I Dent ificat ion 74, 84
DiffServ 152
m arking rule 153
Ext ended Service Set , See ESS 376
DiffServ ( Different iat ed Services) 260
code point s 260
m arking rule 260
digit al I Ds 213
disclaim er 401
DLNA 190
FCC int erference st at em ent 401
file sharing 19
DMZ 165
filt ers
MAC address 85, 95
DNS 108, 128
Finger 173
406
VMG8324-B10A / VMG8324-B30A Series User’s Guide
Index
firewalls 197
add prot ocols 199
configurat ion 199
DDoS 198
DoS 198
LAND at t ack 198
Ping of Deat h 198
SYN at t ack 198
I LA 171
firm ware 311
version 39
int erface group 179
flash key 261
flashing 261
forwarding port s 158
fragm ent at ion t hreshold 90, 94, 378
FTP 158, 173
I ndependent Basic Service Set
See I BSS 375
init ializat ion vect or ( I V) 383
I nside Global Address, see I GA
inside header 230
I nside Local Address, see I LA
I nt ernet
wizard set up 33
I nt ernet access 18
wizard set up 33
I nt ernet Key Exchange 230
I nt ernet Prot ocol version 6 45
I nt ernet Prot ocol version 6, see I Pv6
I nt ernet Service Provider, see I SP
G.168 258
I P address 108, 129
ping 318
privat e 129
WAN 45
General wireless LAN screen 72
I P Address Assignm ent 67
Guide
Quick St art 2
I P alias
NAT applicat ions 173
I PSec
algorit hm s 229
archit ect ure 228
NAT 232
hidden node 377
I PSec VPN 221
HTTP 173
I Pv6 45, 389
addressing 45, 69, 389
EUI - 64 391
global address 390
int erface I D 391
link- local address 389
Neighbor Discovery Prot ocol 389
ping 389
prefix 46, 69, 389
prefix delegat ion 47
prefix lengt h 46, 69, 389
unspecified address 390
I ANA 364
I nt ernet Assigned Num bers Aut horit y
see I ANA
I BSS 375
I D t ype and cont ent 233
I EEE 802.11g 379
I EEE 802.1Q 68
I GA 171
I GMP 68
m ult icast group list 281
version 68
I SP 44
iTunes server 190
I TU-T 258
I KE phases 230
VMG8324-B10A / VMG8324-B30A Series User’s Guide
407
Index
Maint enance End Point , see MEP
Managem ent I nform at ion Base ( MI B) 299
key com binat ions 264
keypad 264
m anaging t he device
good habit s 17
Maxim um Burst Size ( MBS) 66
MBSSI D 97
LAN 107
and USB print er 192
client list 113
DHCP 108, 128
DNS 108, 128
I P address 108, 109, 129
MAC address 113
st at us 39
subnet m ask 108, 109, 129
MD 317
m edia server 190
act ivat ion 191
iTunes server 190
MEP 317
MTU ( Mult i-Tenant Unit ) 67
m ult icast 68
m ult im edia 252
Mult iple BSS, see MBSSI D
LAND at t ack 198
m ult iplexing 65
LLC- based 65
VC- based 65
LAN- Side DSL CPE Configurat ion 297
m ult iprot ocol encapsulat ion 65
LBR 317
lim it at ions
wireless LAN 96
WPS 104
link t race 317
Link Trace Message, see LTM
Link Trace Response, see LTR
list ening port 245
login 25
passwords 25, 26
logs 267, 271, 281, 287, 307
Loop Back Response, see LBR
loopback 317
LTM 317
LTR 317
MA 317
MAC address 85, 113
filt er 85, 95
MAC aut hent icat ion 85
Mac filt er 205
Maint enance Associat ion, see MA
Maint enance Dom ain, see MD
408
VMG8324-B10A / VMG8324-B30A Series User’s Guide
NAT 157, 158, 159, 170, 171, 364
applicat ions 173
I P alias 173
exam ple 172
global 171
I GA 171
I LA 171
inside 171
I PSec 232
local 171
out side 171
port forwarding 158
port num ber 173
services 173
SI P ALG 166
act ivat ion 166
t raversal 232
NAT exam ple 174
negot iat ion m ode 231
Net work Address Translat ion
see NAT
Net work Address Translat ion, see NAT
Net work Map 37
Index
net work m ap 29
requirem ent s 191
NNTP 173
privat e I P address 129
non- proxy calls 249
product regist rat ion 403
prot ocol 44
PSK 383
push but t on 22
Push But t on Configurat ion, see PBC
OK response 256, 258
push but t on, WPS 99
ot her docum ent at ion 2
out side header 230
Pairwise Mast er Key ( PMK) 383, 385
passwords 25, 26
PBC 99
Peak Cell Rat e ( PCR) 66
QoS 139, 152, 260
m arking 140
set up 139
t agging 140
versus CoS 139
Qualit y of Service, see QoS
Quick St art Guide 2
peer- t o- peer calls 249
Per- Hop Behavior, see PHB 153
PHB 153, 260
phone book
speed dial 249
phone funct ions 264
PI N, WPS 99
exam ple 101
Ping of Deat h 198
Point- t o- Point Tunneling Prot ocol 173
POP3 173
RADI US 380
m essage t ypes 380
m essages 380
shared secret key 381
RADI US server 95
Real t im e Transport Prot ocol, see RTP
port forwarding 158
regist rat ion
product 403
port s 20
relat ed docum ent at ion 2
Power Mgm t 193
Power Mgm t Add 195
rem ot e m anagem ent
TR- 069 295
PPP over Et hernet , see PPPoE
Rem ot e Procedure Calls, see RPCs 295
PPPoE 44, 65
Benefit s 65
reset 22, 315
PPTP 173
rest oring configurat ion 314
pream ble 91, 94
RFC 1058. See RI P.
pream ble m ode 98
RFC 1389. See RI P.
prefix delegat ion 47
RFC 1483 65
pre- shared key 234
RFC 1889 255
Print er Server 191
RFC 3164 267
print er sharing
and LAN 192
RI P 137
VMG8324-B10A / VMG8324-B30A Series User’s Guide
rest art 315
409
Index
rout er feat ures 18
Rout ing I nform at ion Prot ocol. See RI P
RPPCs 295
RTP 255
RTS ( Request To Send) 378
t hreshold 377, 378
RTS t hreshold 90, 94
Get Next 300
Manager 299
m anagers 299
MI B 299
net work com ponent s 299
Set 300
Trap 300
versions 299
SNMP t rap 173
speed dial 249
SPI 198
srTCM 155
securit y
wireless LAN 94
Securit y Log 269
Securit y Param et er I ndex, see SPI
SSI D 95
act ivat ion 82
MBSSI D 97
Service Set 74, 84
st at ic rout e 131, 137, 305
configurat ion 63, 133, 134, 177
exam ple 131
Services 173
st at ic VLAN
Session I nit iat ion Prot ocol, see SI P
st at us 37
firm ware version 39
LAN 39
WAN 39
wireless LAN 39
service access cont rol 291, 292, 293
set up
firewalls 199
st at ic rout e 63, 133, 134, 177
silence suppression 258
Sim ple Net work Managem ent Prot ocol, see SNMP
Single Rat e Three Color Marker, see srTCM
SI P 252
account 252
call progression 256
client 253
ident it ies 252
I NVI TE request 256, 257
num ber 253
OK response 258
proxy server 254
redirect server 254
regist er server 255
servers 253
service dom ain 253
URI 252
user agent 254
SI P ALG 166
act ivat ion 166
SMTP 173
SNMP 173, 299, 300
agent s 299
Get 300
410
VMG8324-B10A / VMG8324-B30A Series User’s Guide
st at us indicat ors 20
subnet 357
subnet m ask 108, 129, 358
subnet t ing 360
supplem ent ary services 260
Sust ained Cell Rat e ( SCR) 66
SYN at t ack 198
syslog
prot ocol 267
severit y levels 267
syst em
firm ware 311
version 39
passwords 25, 26
reset 22
st at us 37
LAN 39
WAN 39
wireless LAN 39
t im e 301
Index
Virt ual Circuit ( VC) 65
Virt ual Local Area Net work See VLAN
Tag Cont rol I nform at ion See TCI
Tag Prot ocol I dent ifier See TPI D
TCI
The 45
t hree- way conference 263, 264
t hresholds
dat a fragm ent 90, 94
RTS/ CTS 90, 94
t im e 301
ToS 260
TPI D 68
TR- 064 297
TR- 069 295
ACS set up 295
aut hent icat ion 296
t raffic shaping 66
VLAN 67
I nt roduct ion 67
num ber of possible VI Ds
priorit y fram e
st at ic
VLAN I D 68
VLAN I dent ifier See VI D
VLAN t ag 68
voice act ivit y det ect ion 258
voice coding 258
VoI P 252
peer- t o- peer calls 249
VoI P st at us 275
t ransport m ode 230
t rTCM 155
t unnel m ode 230
Two Rat e Three Color Marker, see t rTCM
Type of Service, see ToS
WAN
st at us 39
Wide Area Net work, see WAN 43
warning
wall m ount ing 23
warrant y
not e 403
unicast 68
Uniform Resource I dent ifier 252
Universal Plug and Play, see UPnP
upgrading firm ware 311
WDS 88, 98
com pat ibilit y 88
exam ple 98
web configurat or 25
login 25
passwords 25, 26
WEP 96
UPnP 114
caut ions 109
exam ple 115
inst allat ion 115
NAT t raversal 108
WEP encrypt ion 75
USA t ype call service m ode 263
wireless client WPA supplicant s 384
USB feat ures 19
Wireless Dist ribut ion Syst em , see WDS
VAD 258
VI D
VMG8324-B10A / VMG8324-B30A Series User’s Guide
WEP Encrypt ion 76, 77, 79
WEP key 75
Wi- Fi Prot ect ed Access 383
wireless LAN 71, 92
aut hent icat ion 94, 95
BSS 97
exam ple 97
channel 93
encrypt ion 96
exam ple 93
411
Index
fragm ent at ion t hreshold 90, 94
lim it at ions 96
MAC address filt er 85, 95
MBSSI D 97
pream ble 91, 94
RADI US server 95
RTS/ CTS t hreshold 90, 94
securit y 94
SSI D 95
act ivat ion 82
st at us 39
WDS 88, 98
com pat ibilit y 88
exam ple 98
WEP 96
WPA 96
WPA- PSK 96
WPS 98, 101
exam ple 102
lim it at ions 104
PI N 99
push but t on 22, 99
wireless securit y 379
wizard set up
I nt ernet 33
WLAN
securit y param et ers 386
WPA 96, 383
key caching 384
pre- aut hent icat ion 384
user aut hent icat ion 384
vs WPA- PSK 383
wireless client supplicant 384
wit h RADI US applicat ion exam ple 384
WPA2 383
user aut hent icat ion 384
vs WPA2- PSK 383
wireless client supplicant 384
wit h RADI US applicat ion exam ple 384
WPA2- Pre- Shared Key 383
WPA2- PSK 383
applicat ion exam ple 385
WPA- PSK 96, 383
applicat ion exam ple 385
WPS 98, 101
exam ple 102
lim it at ions 104
PI N 99
412
VMG8324-B10A / VMG8324-B30A Series User’s Guide
exam ple 101
push but t on 22, 99

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V4.4 (128-bit)
User Access                     : Print, Annotate, Fill forms, Extract, Print high-res
Create Date                     : 2013:11:26 11:43:35Z
Modify Date                     : 2013:12:05 11:01:51+08:00
Has XFA                         : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:08:04
Creator Tool                    : FrameMaker 9.0
Metadata Date                   : 2013:12:05 11:01:51+08:00
Format                          : application/pdf
Title                           : 
Creator                         : 
Producer                        : Acrobat Distiller 9.5.5 (Windows)
Document ID                     : uuid:2374e2cf-24e2-4aa4-881c-86b8a2afd24b
Instance ID                     : uuid:a04ff7fc-39a3-48e2-b45f-1ebc8a116817
Page Layout                     : OneColumn
Page Mode                       : UseOutlines
Page Count                      : 206
EXIF Metadata provided by EXIF.tools
FCC ID Filing: I88VMG8324B10A

Navigation menu