User Manual for COMTREND models including: Home Gateway, VR-3071
Version A1.0, January 10, 2020. Page 2. 1. Preface. This manual provides information related to the installation and operation of this device. The individual ...
VR- 3071 ( Series) Hom e Gat eway User Manual 261099-055 Version A1.0, January 10, 2020 Pr e f a ce This m anual provides inform at ion relat ed t o t he inst allat ion and operat ion of t his device. The individual reading t his m anual is presum ed t o have a basic understanding of telecom m unications term inology and concepts. I f you find the product to be inoperable or m alfunct ioning, please cont act t echnical support for im m ediat e service by em ail at I NT- support @com t rend.com For product updat e, new product release, m anual revision, or soft ware upgrades, please visit our website at http: / / www.com trend.com I m portant Safety I nstructions With reference to unpacking, installation, use, and m aintenance of your electronic device, the following basic guidelines are recom m ended: Do not use or inst all t his product near wat er, t o avoid fire or shock hazard. For exam ple, near a bathtub, kit chen sink or laundry tub, or near a swim m ing pool. Also, do not expose the equipm ent to rain or dam p areas ( e.g. a wet basem ent) . Do not connect t he power supply cord on elevat ed surfaces. Allow it t o lie freely. There should be no obst ruct ions in it s pat h and no heavy it em s should be placed on the cord. I n addition, do not walk on, step on, or m istreat the cord. Use only t he power cord and adapt er t hat are shipped wit h t his device. Never inst all t elephone wiring during st orm y weat her condit ions. CAUTI ON: Always disconnect all t elephone lines from t he wall out let before servicing or disassem bling this equipm ent. Changes or m odificat ions t o t his unit not expressly approved by t he part y responsible for com pliance could void the user authority to operate the equipm ent. Do not st ack equipm ent or place equipm ent in t ight spaces, in drawers, or on carpets. Be sure that your equipm ent is surrounded by at least 2 inches of air space. To prevent int erference wit h cordless phones, ensure t hat t he gat eway is at least 5 feet ( 1.5m ) from the cordless phone base station. I f you experience t rouble wit h t his equipm ent , disconnect it from t he network until the problem has been corrected or until you are sure that equipm ent is not m alfunctioning. 1 W ARNI NG Disconnect t he power line from t he device before servicing For indoor use only Do NOT open t he casing Do NOT use near wat er Do NOT insert sharp obj ect s int o t he RJ- 11 j ack Keep away from t he fire For use in vent ilat ed environm ent / space Use 26 AWG or larger cable connect t o RJ- 11 port Débranchez l'alim ent at ion élect rique avant l'ent ret ien Cet appareil est conçu pour l'usage int érieur seulem ent N'ouvrez pas le boît ier N'ut ilisez pas cet appareil près de l'eau N'insérez pas d'obj et s t ranchant s dans la prise RJ- 11 N'approchez pas du feu Veuillez ut iliser dans un environnem ent aéré Veuillez ut iliser fil élect rique de 26AWG pour port RJ- 11 Power Specificat ions ( Alim ent at ion ) : I nput : 12Vdc, 3.0A or 2.0A Out put : USB3.0, 900mA User I nform ation Any changes or m odificat ions not expressly approved by the party responsible for com pliance could void your authority to operate the equipm ent. Aucune m odificat ion apport ée à l'appareil par l'ut ilisat eur, quelle qu'en soit la nat ure. Tout changem ent ou m odificat ion peuvent annuler le droit d'ut ilisat ion de l'appareil par l'ut ilisat eur. N ot e : This equipm ent has been t est ed and found t o com ply wit h t he lim it s for a Class B digit al device, pursuant t o part 15 of t he FCC Rules. These lim it s are designed to provide reasonable protection against harm ful interference in a resident ial inst allat ion. This equipm ent generat es, uses and can radiat e radio frequency energy and, if not inst alled and used in accordance wit h the inst ruct ions, m ay cause harm ful int erference t o radio com m unicat ions. However, t here is no guarantee that interference will not occur in a particular installat ion. I f this equipm ent does cause harm ful interference to radio or television reception, which can be determ ined by turning the equipm ent off and on, the user is encouraged to try to correct the interference by one or m ore of the following m easures: --Reorient or relocat e t he receiving ant enna. --I ncrease t he separat ion bet ween t he equipm ent and receiver. --Connect t he equipm ent int o an out let on a circuit different from t hat t o which t he receiver is connected. --Consult t he dealer or an experienced radio/ TV t echnician for help. This device com plies wit h Part 15 of t he FCC Rules. Operat ion is subj ect t o t he following t wo condit ions: ( 1) This device m ay not cause harm ful int erference, and ( 2) this device m ust accept any interference received, including interference that m ay cause undesired operat ion. 2 This Class B digit al apparat us com plies wit h Canadian I CES- 003. To reduce pot ent ial radio int erference t o ot her users, t he ant enna t ype and its gain should be so chosen that the equivalent isotropically radiated power ( e.i.r.p.) is not m ore t han t hat perm it t ed for successful com m unicat ion. This device com plies wit h Part 15 of t he FCC Rules and I ndust ry Canada licence- exem pt RSS st andard( s) . Operat ion is subj ect t o t he following t wo condit ions: 1. This device m ay not cause int erference, and 2. This device m ust accept any int erference, including int erference t hat m ay cause undesired operat ion of the device. Cet appareil num érique de la classe B est conform e à la norm e NMB- 003 Canada. Pour réduire le risque d'int erférence aux aut res ut ilisat eurs, le t ype d'ant enne et son gain doivent être choisies de façon que la puissance isotrope rayonnée équivalent e ( PI RE) ne dépasse pas ce qui est nécessaire pour une com m unication réussie. Cet appareil est conform e à la norm e RSS I ndust rie Canada exem pt s de licence norm e(s) . Son fonct ionnem ent est soum is aux deux condit ions suivant es: 1. Cet appareil ne peut pas provoquer d'int erférences et 2. Cet appareil doit accept er t out e int erférence, y com pris les int erférences qui peuvent causer un m auvais fonctionnem ent du disposit if. Radiat ion Exposure FCC 1. This Transm it t er m ust not be co-locat ed or operat ing in conj unct ion wit h any ot her ant enna or t ransm it t er. 2. This equipm ent com plies wit h FCC RF radiat ion exposure lim it s set fort h for an uncont rolled environm ent . This equipm ent should be inst alled and operat ed wit h a m inim um dist ance of 23 cm bet ween t he radiat or and your body. I SED This device com plies wit h t he I SED radiat ion exposure lim it set fort h for an uncont rolled environm ent . This device should be inst alled and operat ed wit h m inim um dist ance 23 cm bet ween t he radiat or & your body. This t ransm it t er m ust not be co- locat ed or operat ing in conj unct ion wit h any ot her ant enna or t ransm it t er. "This product m eet s t he applicable I nnovat ion, Science and Econom ic developm ent Canada t echnical specificat ions". The device for operat ion in t he band 51505250 MHz is only for indoor use t o reduce t he pot ent ial for harm ful int erference t o co- channel m obile sat ellit e syst em s. This product m eet s t he applicable I ndust ry Canada t echnical specificat ions. The Ringer Equivalence Num ber ( REN) indicat es t he m axim um num ber of devices allowed t o be connect ed t o a t elephone int erface. The t erm inat ion of an int erface m ay consist of any com bination of devices subj ect only to the requirem ent that the sum of t he RENs of all t he devices not exceed five. 3 Cet équipem ent est conform e avec l'exposit ion aux radiat ions I SED définies pour un environnem ent non cont rôlé. Cet équipem ent doit êt re inst allé et ut ilisé à une dist ance m inim um de 23 cm ent re le radiat eur et vot re corps. Cet ém et t eur ne doit pas être co- localisées ou opérant en conj onction avec une autre antenne ou t ransm et t eur. «Ce produit est conform e aux spécificat ions t echniques applicables d'I nnovat ion, Sciences et Développem ent économ ique Canada». les disposit ifs fonct ionnant dans la bande 5150- 5250 MHz sont réservés uniquem ent pour une utilisation à l'intérieur afin de réduire les risques de brouillage préj udiciable aux syst èm es de satellites m obiles utilisant les m êm es canaux. Le présent m at ériel est conform e aux specificat ions t echniques applicables d'I ndust rie Canada. L'indice d'équivalence de la sonnerie ( I ES) sert à indiquer le nom bre m axim al de t erm inaux qui peuvent êt re raccordés à une int erface t éléphonique. La t erm inaison d'une interface peut consister en une com binaison quelconque de dispositifs, à la seule condit ion que la som m e d'indices d'équivalence de la sonnerie de t ous les dispositifs n'excède pas cinq. Le num éro REN ( Ringer Equivalence Num ber) indique le nom bre m axim al de périphériques pouvant êt re connect és à une int erface t éléphonique. La t erm inaison d'une interface peut consister en une com binaison quelconque d'appareils, à la condit ion que la som m e des REN de t ous les appareils ne dépasse pas cinq. Ce r t ifica t ion FCC / I C st andard Part 15B / I CES- 003 Part 15C / RSS- 247( 2.4GHz ) Part 15E / RSS- 247( 5GHz ) TI A- 968 / I C- CS03 UL 62368- 1 / CSA 62368- 1 Copyr ight Copyright © 2020 Com t rend Corporat ion. All right s reserved. The inform at ion cont ained herein is propriet ary t o Com t rend Corporat ion. No part of t his docum ent m ay be translated, transcribed, reproduced, in any form , or by any m eans without prior writ t en consent of Com t rend Corporat ion. N OTE: This docum ent is subj ect t o change wit hout not ice. 4 Open Source Softw are Notice Com t rend's product s use open source soft ware t o fulfill t heir funct ion. Licenses for t he open source soft ware are grant ed under t he GNU General Public License in various versions. For furt her inform at ion on t he GNU General Public License see ht t p: / / www.gnu.org/ licenses/ You are allowed t o m odify all open source code ( except for propriet ary program s) and to conduct reverse engineering for the purpose of debugging such m odifications; t o t he ext ent such program s are linked t o libraries licensed under t he GNU Lesser General Public License. You are not allowed t o dist ribut e inform at ion result ing from such reverse engineering or to distribut e t he m odified propriet ary program s. The right s owners of t he open source soft ware require you t o refer t o t he following disclaim er which shall apply with regard to those rights owners: W arranty Disclaim er THE OPEN SOURCE SOFTWARE I N THI S PRODUCT I S DI STRI BUTED I N THE HOPE THAT I T WI LL BE USEFUL, BUT WI THOUT ANY WARRANTY, WI THOUT EVEN THE I MPLI ED WARRANTY OF MERCHANTABI LI TY OR FI TNESS FOR A PARTI CULAR PURPOSE. SEE THE APPLI CABLE LI CENSES FOR MORE DETAI LS. Com t rend's products will strictly follow the m arket's standard requirem ents. I t is not perm itted t o m odify any Wi- Fi param et ers, including t he Wi- Fi power set t ing. Obt a in Sour ce Code I f you wish t o download t he open source code please see: https: / / www.com trend.com / gplcddl.htm l I f you do not see the required source code on our website link and wish to be provided with the entire source code for that product, we will provide it to you and any third party with the source code of the software licensed under an open source soft ware license. Please send us a writ t en request by em ail or m ail t o one of t he following addresses: Em a il: Com t rend support t eam - opensource@com t rend.com Post a l: Com t rend Corporat ion 3F- 1, 10 Lane 609, Chongxin Rd., Sect ion 5, Sanchong Dist, New Taipei Cit y 24159, Ta i w a n Tel: 886- 2- 2999- 8261 I n detail nam e the product and firm ware version for which you request the source code and indicat e m eans t o cont act you and send you t he source code. PLEASE NOTE WE WI LL CHARGE THE COSTS OF A DATA CARRI ER AND THE POSTAL CHARGES TO SEND THE DATA CARRI ER TO YOU.THE AMOUNT WI LL VARY ACCORDI NG TO YOUR LOCATI ON AND THE COMTREND SUPPORT TEAM WI LL NOTI FY THE EXACT COSTS WHEN REVI EWI NG THE REQUEST. THI S OFFER I S VALI D FOR THREE YEARS FROM THE MOMENT WE DI STRI BUTED THE PRODUCT. FOR MORE I NFORMATI ON AND THE OPEN SOURCE LI ST ( & RESPECTI VE LI CENCES) FOR I NDI VI DUAL PRODUCTS PLEASE SEE: https: / / www.com trend.com / gplcddl.htm l 5 Prot ect Our Environm ent This sym bol indicat es t hat when t he equipm ent has reached t he end of it s useful life, it m ust be t aken t o a recycling cent re and processed separate from dom estic waste. The cardboard box, t he plast ic cont ained in t he packaging, and t he part s t hat m ake up this router can be recycled in accordance wit h regionally est ablished regulations. Never dispose of this electronic equipm ent along with your household waste; you m ay be subj ect t o penalt ies or sanct ions under the law. I nstead, please be responsible and ask for disposal instructions from your local governm ent. 6 Table of Contents CHAPTER 1 INTRODUCTION.........................................................................................................10 CHAPTER 2 INSTALLATION........................................................................................................... 11 2.1 HARDWARE SETUP......................................................................................................................... 11 2.1.1 Back Panel.............................................................................................................................12 2.1.2 Bottom Panel ......................................................................................................................... 14 2.1.3 Front Panel............................................................................................................................15 CHAPTER 3 WEB USER INTERFACE............................................................................................17 3.1 DEFAULT SETTINGS ....................................................................................................................... 17 3.2 IP CONFIGURATION........................................................................................................................18 3.3 LOGIN PROCEDURE........................................................................................................................20 CHAPTER 4 DEVICE INFORMATION...........................................................................................22 4.1 WAN ............................................................................................................................................. 24 4.2 STATISTICS.....................................................................................................................................26 4.2.1 LAN Statistics ........................................................................................................................ 26 4.2.2 WAN Service .......................................................................................................................... 27 4.2.3 XTM Statistics........................................................................................................................28 4.2.4 xDSL Statistics ....................................................................................................................... 29 4.3 ROUTE ........................................................................................................................................... 35 4.4 ARP............................................................................................................................................... 36 4.5 DHCP ........................................................................................................................................... 37 4.6 NAT SESSION ................................................................................................................................ 38 4.7 IGMP INFO .................................................................................................................................... 39 4.8 CPU & MEMORY ........................................................................................................................... 40 4.9 NETWORK MAP ............................................................................................................................. 41 4.10 WIRELESS .................................................................................................................................... 42 4.10.1 Station Info .......................................................................................................................... 42 4.10.2 WiFi Insight ......................................................................................................................... 43 4.10.2.1 Site Survey ........................................................................................................................ 44 4.10.2.2 Channel Statistics ............................................................................................................. 46 4.10.2.3 Metrics (Advanced Troubleshooting)................................................................................50 4.10.2.4 Configure .......................................................................................................................... 52 CHAPTER 5 BASIC SETUP...............................................................................................................53 5.1 WAN SETUP ................................................................................................................................... 54 5.1.1 WAN Service Setup ................................................................................................................ 55 5.2 NAT .............................................................................................................................................. 57 5.2.1 Virtual Servers ....................................................................................................................... 57 5.2.2 Port Triggering ...................................................................................................................... 59 5.2.3 DMZ Host .............................................................................................................................. 61 5.3 LAN .............................................................................................................................................. 62 5.3.1 Lan VLAN Setting .................................................................................................................. 64 5.3.2 LAN IPv6 Autoconfig ............................................................................................................. 65 5.3.3 UPnP ..................................................................................................................................... 67 5.4 PARENTAL CONTROL ..................................................................................................................... 68 5.4.1 Time Restriction ..................................................................................................................... 68 5.4.2 URL Filter ............................................................................................................................. 69 5.5 HOME NETWORKING ..................................................................................................................... 71 5.5.1 Print Server ........................................................................................................................... 71 5.5.2 DLNA.....................................................................................................................................71 5.5.3 Storage Service ...................................................................................................................... 72 5.6 WIRELESS ...................................................................................................................................... 75 5.6.1 SSID.......................................................................................................................................75 5.6.2 Security .................................................................................................................................. 76 CHAPTER 6 ADVANCED SETUP.....................................................................................................77 6.1 SECURITY ...................................................................................................................................... 77 7 6.1.1 IP Filtering ............................................................................................................................ 77 6.1.2 MAC Filtering ....................................................................................................................... 81 6.2 QUALITY OF SERVICE (QOS)..........................................................................................................83 6.2.1 QoS Queue.............................................................................................................................84 6.2.1.1 QoS Queue Configuration .................................................................................................. 84 6.2.1.2 Wlan Queue ........................................................................................................................ 88 6.2.2 QoS Classification ................................................................................................................. 89 6.2.3 QoS Port Shaping .................................................................................................................. 92 6.3 ROUTING ....................................................................................................................................... 93 6.3.1 Default Gateway .................................................................................................................... 93 6.3.2 Static Route............................................................................................................................94 6.3.3 Policy Routing ....................................................................................................................... 95 6.3.4 RIP.....................................................................................................................97 6.4 DNS .............................................................................................................................................. 98 6.4.1 DNS Server ............................................................................................................................ 98 6.4.2 Dynamic DNS ........................................................................................................................ 99 6.5 DSL.............................................................................................................................................101 6.6 DNS PROXY ................................................................................................................................ 103 6.7 INTERFACE GROUPING ................................................................................................................. 104 6.8 IP TUNNEL...................................................................................................................................107 6.8.1 IPv6inIPv4 ........................................................................................................................... 107 6.8.2 IPv4inIPv6 ........................................................................................................................... 109 6.8.3 MAP..................................................................................................................................... 110 6.9 IPSEC .......................................................................................................................................... 112 6.9.1 IPSec Tunnel Mode Connections ......................................................................................... 112 6.10 CERTIFICATE .............................................................................................................................. 116 6.10.1 Local .................................................................................................................................. 116 6.10.2 Trusted CA ......................................................................................................................... 119 6.11 MULTICAST................................................................................................................................120 6.12 WIRELESS .................................................................................................................................. 123 6.12.1 SSID...................................................................................................................................123 6.12.2 Security .............................................................................................................................. 124 6.12.3 WPS ................................................................................................................................... 125 6.12.4 MAC Filtering ................................................................................................................... 126 6.12.5 Wireless WDS( Wireless Distribution System ) .................................................................. 127 6.12.6 Advanced ........................................................................................................................... 133 CHAPTER 7 DIAGNOSTICS...........................................................................................................136 7.1 DIAGNOSTICS INDIVIDUAL TESTS ............................................................................................. 136 7.2 ETHERNET OAM ......................................................................................................................... 137 7.3 PING ............................................................................................................................................ 139 7.4 TRACE ROUTE ............................................................................................................................. 140 CHAPTER 8 MANAGEMENT ........................................................................................................ 141 8.1 SETTINGS.....................................................................................................................................141 8.1.1 Backup Settings.................................................................................................................... 141 8.1.2 Update Settings....................................................................................................................142 8.1.3 Restore Default .................................................................................................................... 142 8.2 SYSTEM LOG ............................................................................................................................... 144 8.3 SNMP AGENT ............................................................................................................................. 146 8.4 TR-069 CLIENT ........................................................................................................................... 147 8.5 INTERNET TIME ........................................................................................................................... 149 8.6 ACCESS CONTROL ....................................................................................................................... 150 8.6.1 Accounts .............................................................................................................................. 150 8.6.2 Services................................................................................................................................152 8.6.3 IP Address............................................................................................................................153 8.7 UPDATE SOFTWARE ..................................................................................................................... 155 8.8 REBOOT ....................................................................................................................................... 156 CHAPTER 9 LOGOUT ..................................................................................................................... 157 APPENDIX A - FIREWALL ............................................................................................................. 158 8 APPENDIX B - PIN ASSIGNMENTS .............................................................................................. 161 APPENDIX C SPECIFICATIONS ................................................................................................ 162 APPENDIX D - SSH CLIENT .......................................................................................................... 165 APPENDIX E - PRINTER SERVER................................................................................................166 APPENDIX F - CONNECTION SETUP..........................................................................................173 9 Cha pt e r 1 I nt r oduct ion VR-3071 is a Multi-DSL router using the Intel solution and provides both ADSL and 35b VDSL. It integrates 5 Giga Ethernet ports, WLAN 802.11ax 2.4GHz (2T2R) frequency band and 802.11ax 5GHz (4T4R) frequency band. VR-3071 is designed for high speed applications and TR-069 allows for uncomplicated remote management. 10 Cha pt e r 2 I nst a lla t ion 2 .1 Hardw are Setup Non- stackable This device is not st ackable do not place unit s on t op of each ot her, ot herwise dam age could occur. Follow t he inst ruct ions below t o com plet e t he hardware set up. 11 2 .1 .1 Back Panel The figure below shows t he back panel of t he device. W iFi On/ Off/ W PS Button 5 G Press t he 5G but t on for less t han 5 seconds t o enable WPS which will allow 2 m inut es for WiFi connect ion. Press and hold t he 5G but t on > 5 seconds and less t han 10 seconds t o enable/ disable t he WiFi funct ion. W iFi On/ Off/ W PS Button 2 .4 G Press t he 2.4G but t on for less t han 5 seconds t o enable WPS which will allow 2 m inut es for WiFi connect ion. Press and hold t he 2.4G but t on > 5 seconds and less t han 10 seconds t o enable/ disable t he WiFi funct ion. 12 W PS Button Press t he WPS but t on less t han 2 seconds t o enable WPS which will allow 2 m inut es for WiFi connect ion. DSL Connect t o t he DSL port wit h t he DSL RJ11 cable. The VR- 3071 support s t he following DSL profiles ADSL : ADSL, ADSL 2, ADSL 2+ . VDSL : 8a, 8b, 8c, 8d, 12a, 12b, 17a, 30a and 35b. USB Port This port can be used t o connect t he rout er t o a st orage device. I t can only be used for SAMBA( st orage) and for a Print er Server. Support for ot her devices m ay be added in future firm ware upgrades. LAN ( Et hernet ) Port s You can connect t he rout er t o up t o four LAN devices using RJ45 cables. The port s are aut o- sensing MDI / X and eit her st raight- t hrough or crossover cable can be used. ETH W AN PORT This port is designat ed t o be used for Et hernet WAN funct ionalit y only. Use 1000- BASE-T RJ- 45 cables t o connect t o Gigabit WAN server, or 10/ 100BASE-T RJ- 45 cables for st andard net work usage. This port s is aut o- sensing MDI / X; so either straight- through or crossover cable can be used. Pow er ON Press t he power but t on t o t he OFF posit ion ( OUT) . Connect t he power adapt er t o t he power port . At t ach t he power adapt er t o a wall out let or ot her AC source. Press t he power but t on t o t he ON posit ion ( I N) . I f t he Power LED displays as expect ed t hen t he device is ready for set up ( see sect ion LED I ndicat ors) . Caut ion 1: I f t he device fails t o power up, or it m alfunct ions, first verify t hat t he power cords are connect ed securely and t hen power it on again. I f t he problem persists, contact technical support. Caut ion 2: Before servicing or disassem bling t his equipm ent , disconnect all power cords and telephone lines from their outlets. 13 2 .1 .2 Bottom Panel Reset Button Rest ore t he default param et ers of t he device by pressing t he Reset but t on for 10 seconds. Aft er t he device has reboot ed successfully, t he front panel should display as expect ed ( see sect ion 2.1.3 Front Panel for det ails) . N OTE: I f pressed down for m ore t han 60 seconds, t he VR- 3071 will go int o a firm ware updat e st at e ( CFE boot m ode) . The firm ware can t hen be updated using an I nternet browser pointed to the default I P address. 14 2 .1 .3 Front Panel The front panel LED indicat ors are shown below and explained in t he following t able. This inform at ion can be used t o check t he st at us of t he device and it s connect ions. LED I NTERNET Co l o r Gr een Red Mode On Off Fu n ct ion I P connected and no traffic detected. I f an I P or PPPoE session is dropped due t o an idle t im eout , the light will rem ain blue. The light will t urn red when it at t em pt s t o reconnect and DHCP or PPPoE fails. Modem power off, m odem in WDSd m ode or WAN connection not present. I P connect ed and I P Traffic is passing t hrough t he Blink device ( either direction) Device attem pted to becom e I P connected and On failed ( no DHCP response, no PPPoE response, PPPoE aut hent icat ion failed, no I P address from I PCP, et c.) 15 DSL Gr een ETH WAN Green 5G WiFi Gr een 2.4G WiFi Green WPS Gr een ETH 1X- 4X Green USB Gr een POWER Gr een Red On Off Blink On Off Blink On Off Blink On Off Blink On Off Blink On Off Blink On Off Blink On Off On xDSL Link is est ablished. The device is powered down. xDSL Link is t raining. Et hernet WAN is connect ed. Et hernet WAN is not connect ed. Et hernet WAN is t ransm it t ing/ receiving. Wi- Fi enabled. Wi- Fi disabled. Dat a t ransm it t ing or receiving over WLAN. Wi- Fi enabled. Wi- Fi disabled. Dat a t ransm it t ing or receiving over WLAN. WPS connect ion successful. The LED will st ay on for 3 m inutes. No WPS associat ion process ongoing. WPS connect ion in progress. An Et hernet Link is est ablished. An Et hernet Link is not est ablished. Dat a t ransm it t ing or receiving over Et hernet . At least one device is connect ed t o t he USB port . No device is connect ed t o t he USB port or a device is connect ed t o a USB port but not act ive. Dat a TX/ RX passing t hrough at least one of t he USB port s. The device is powered up. The device is powered down. POST ( Power On Self Test ) failure or ot her m alfunction. A m alfunction is any error of int ernal sequence or state that will prevent the device from connect ing t o t he DSLAM or passing custom er data. Note: A m alfunction is any error of internal sequence or state that will prevent the device from connect ing t o t he DSLAM or passing cust om er dat a. This m ay be ident ified at various tim es such after power on or during operation through the use of self testing or in operat ions which result in a unit st at e t hat is not expect ed or should not occur. I P connect ed ( t he device has a WAN I P address from I PCP or DHCP and DSL is up or a st at ic I P address is configured, PPP negot iat ion has successfully com plet e if used and DSL is up ) and no t raffic det ect ed. I f t he I P or PPPoE session is dropped for any ot her reason, t he light is t urned off. The light will t urn red when it at t em pt s t o reconnect and DHCP or PPPoE fails. 16 Cha pt e r 3 W e b Use r I nt e r fa ce This sect ion describes how t o access t he device via t he web user int erface ( WUI ) using an I nt ernet browser such as I nt ernet Explorer ( version 5.0 and lat er) . 3 .1 Default Settings The fact ory default set t ings of t his device are sum m arized below. LAN I P address: 192.168.1.1 LAN subnet m ask: 255.255.255.0 Adm inist rat ive access ( usernam e: r oot , password: 1 2 3 4 5 ) WLAN access: e na ble d Technical Note During power on, the device initializes all settings to default values. I t will then read t he configurat ion profile from t he perm anent st orage sect ion of flash m em ory. The default at t ribut es are overwrit t en when ident ical at t ribut es wit h different values are configured. The configurat ion profile in perm anent st orage can be creat ed via the web user interface or telnet user interface, or other m anagem ent protocols. The fact ory default configurat ion can be restored eit her by pushing t he reset but t on for m ore t han t en seconds unt il t he power indicat es LED blinking or by clicking t he Rest ore Default Configurat ion opt ion in t he Rest ore Set t ings screen. 17 3 .2 I P Configur a t ion D H CP M OD E When t he VR- 3071 powers up, t he onboard DHCP server will swit ch on. Basically, t he DHCP server issues and reserves I P addresses for LAN devices, such as your PC. To obt ain an I P address from t he DCHP server, follow t he st eps provided below. N OTE: The following procedure assum es you are running Windows. However, t he general st eps involved are sim ilar for m ost operat ing syst em s ( OS) . Check your OS support docum ent at ion for furt her det ails. STEP 1 : From t he Net work Connect ions window, open Local Area Connect ion ( You m ay also access t his screen by double- clicking t he Local Area Connect ion icon on your t askbar) . Click t he Pr ope r t ie s but t on. STEP 2 : Select I nt ernet Prot ocol ( TCP/ I P) a n d click t he Propert ies but t on. STEP 3 : Select Obt ain an I P address aut om at ically as shown below. STEP 4 : Click OK t o subm it t hese set t ings. I f you experience difficult y wit h DHCP m ode, you can t ry st at ic I P m ode inst ead. 18 STATI C I P MODE I n st at ic I P m ode, you assign I P set t ings t o your PC m anually. Follow t hese st eps t o configure your PC I P address t o use subnet 192.168.1.x. N OTE: The following procedure assum es you are running Windows. However, t he general st eps involved are sim ilar for m ost operat ing syst em s ( OS) . Check your OS support docum ent at ion for furt her det ails. STEP 1 : From t he Net work Connect ions window, open Local Area Connect ion ( You m ay also access t his screen by double- clicking t he Local Area Connect ion icon on your t askbar) . Click t he Pr ope r t ie s but t on. STEP 2 : Select I nt ernet Prot ocol ( TCP/ I P) a n d click t he Propert ies but t on. STEP 3 : Change t he I P address t o t he 192.168.1.x ( 1< x< 255) subnet wit h subnet m ask of 255.255.255.0. The screen should now display as shown below. STEP 4 : Click OK t o subm it t hese set t ings. 19 3 .3 Login Procedure Perform t he following st eps t o login t o t he web user int erface. N OTE: The default set t ings can be found in sect ion 3.1 Default Set t ings. STEP 1 : St art the I nternet browser and ent er t he default I P address for t he device in t he Web address field. For exam ple, if t he default I P address is 192.168.1.1, type http: / / 192.168.1.1. N OTE: For local adm inist rat ion ( i.e. LAN access) , t he PC running t he browser m ust be at t ached t o t he Et hernet , and not necessarily t o t he device. For rem ot e access ( i.e. WAN) , use t he I P address shown on t he Device I nform ation screen and login with rem ote usernam e and password. STEP 2 : A dialog box will appear, such as t he one below. Ent er t he default usernam e and password, as defined in sect ion 3.1 Default Set t ings. Click OK t o cont inue. N OTE: The login password can be changed lat er ( see sect ion 8.6.1 Account s) . 20 STEP 3 : Aft er successfully logging in for t he first t im e, you will reach t his screen. You can also reach t his page by clicking on t he follow ing icon locat ed at t he t op of the screen. 21 Cha pt e r 4 D e vice I nfor m a t ion You can reach t his page by clicking on t he following icon locat ed at t he t op of t he scr een . The web user int erface window is divided int o t wo fram es, t he m ain m enu ( on t he left ) and t he display screen ( on t he right ) . The m ain m enu has several opt ions and selecting each of these options opens a subm enu with m ore selections. N OTE: The m enu it em s shown are based upon t he configured connect ion( s) and user account privileges. For exam ple, user account has lim it ed access t o configuration m odification. Device I nfo is the first select ion on the m ain m enu so it will be discussed first. Subsequent chapters will introduce the other m ain m enu options in sequence. The Device I nfo Sum m ary screen displays at st art up. 22 This screen shows hardware, soft ware, I P set t ings and ot her relat ed inform at ion. 23 4 .1 W AN Select WAN from t he Device I nfo subm enu t o display t he configured PVC( s) . Re fr e sh Click t his but t on t o refresh t he screen. D H CP Re le a se Click t his but t on t o release t he I P t hrough I PoE service. D H CP Re ne w - Click t his but t on t o refresh an I P t hrough I PoE service. I tem I nterface Descr ipt ion Ty p e VlanMuxI d I Pv6 I gm p Pxy I gm p Src Enbl MLD Pxy MLD Src Enbl NAT Fi r ew a l l D e scr ip t ion Nam e of the interface for WAN Nam e of the WAN connection Shows the connect ion type Shows 802.1Q VLAN I D Shows WAN I Pv6 st at us Shows I nt ernet Group Managem ent Prot ocol ( I GMP) proxy st at us Shows t he st at us of WAN int erface used as I GMP sou r ce Shows Mult icast List ener Discovery ( MLD) proxy st at u s Shows t he st at us of WAN int erface used as MLD sou r ce Shows Net work Address Translat ion ( NAT) st at us Shows t he st at us of Firewall 24 I Pv4 St at us I Pv4 Address PPP connect/ disconnect I Pv6 St at us I Pv6 Address List s t he st at us of I Pv4 connect ion if WAN enabled I Pv4 Shows WAN I Pv4 address Shows t he PPP connect ion st at us List s t he st at us of I Pv6 connect ion if WAN enabled I Pv6 Shows WAN I Pv6 address For your reference, if Manual Mode is enabled in PPP service as shown here. Manual PPP connect / disconnect opt ion will becom e available on t he WAN I nfo page ( as shown here) . 25 4 .2 Statistics This select ion provides LAN, WAN, ATM and xDSL st at ist ics. N OTE: These screens are updat ed aut om at ically every 15 seconds. Click Re se t St a t ist ics t o perform a m anual updat e. 4 .2 .1 LAN Statistics This screen shows dat a t raffic st at ist ics for each LAN int erface. I tem I nterface Received/ Transm it t ed: - Byt es - Pkt s - Errs - Drops D e scr ip t ion LAN int erface( s) Num ber of Bytes Num ber of Packet s Num ber of packets with errors Num ber of dropped packets 26 4 .2 .2 W AN Service This screen shows dat a t raffic st at ist ics for each WAN int erface. I tem I nterface Descr ipt ion Received/ Transm it t ed - Byt es - Pkt s - Errs - Drops D e scr ip t ion WAN interfaces WAN service label Num ber of Bytes Num ber of Packet s Num ber of packets with errors Num ber of dropped packets 27 4 .2 .3 XTM Statistics The following figure shows ATM ( Asynchronous Transfer Mode) / PTM ( Packet Transfer Mode) st at ist ics. XTM I nterface Statistics I tem D e scr ip t ion Port Num ber ATM PORT ( 0- 1) I n Oct et s Num ber of octets received over the interface Out Oct et s Num ber of oct et s t ransm it t ed over t he int erface I n Packet s Num ber of packets received over the interface Out Packet s Num ber of packets transm itted over the interface I n OAM Cells Num ber of OAM Cells received over t he int erface Out OAM Cells Num ber of OAM Cells t ransm it t ed over t he int erface I n ASM Cells Num ber of ASM Cells received over t he int erface Out ASM Cells Num ber of ASM Cells t ransm it t ed over t he int erface I n Packet Er r o r s Num ber of packet s in Error I n Cell Errors Num ber of cells in Error 28 4 .2 .4 xDSL Statistics The xDSL St at ist ics screen displays inform at ion corresponding t o t he xDSL t ype. The t wo exam ples below ( VDSL & ADSL) show t his variat ion. V D SL2 29 ADSL2 + Click t he Re se t St a t ist ics but t on t o refresh t his screen. 30 I tem Mode Traffic Type St at u s Link Power St at e phyR St at us Line Coding ( Trellis) SNR Margin ( 0.1 dB) At t enuat ion ( 0.1 dB) Out put Power ( 0.1 dBm ) At t ainable Rat e ( Kbps) Rat e ( Kbps) D e scr ip t ion VDSL, VDSL2 ATM, PTM List s t he st at us of t he DSL link Link out put power st at e Shows t he st at us of PhyRTM ( Physical Layer Re-Transm ission) im pulse noise prot ect ion Trellis On/ Off Signal t o Noise Rat io ( SNR) m argin Est im at e of average loop at t enuat ion in t he downst ream direction Tot al upst ream out put power The sync rat e you would obt ain Current sync rat es downst ream / upst ream I n ADSL2 / VDSL m ode, t he follow ing sect ion is insert ed. I tem MSGc B M T R S L D I N D e scr ip t ion Num ber of bytes in overhead channel m essage Num ber of byt es in Mux Dat a Fram e Num ber of Mux Dat a Fram es in a RS codeword Num ber of Mux Dat a Fram es in an OH sub- fram e Num ber of redundancy byt es in t he RS codeword Num ber of dat a sym bols t he RS codeword spans Num ber of bit s t ransm it t ed in each dat a sym bol The int erleaver dept h The int erleaver block size in byt es RS codeword size 31 Delay I NP The delay in m illiseconds ( m sec) DMT sym bol I tem Super Fram es Super Fram e Errors RS Words RS Correct able Errors RS Uncorrect able Errors D e scr ip t ion Tot al num ber of super fram es Num ber of super fram es received with errors Tot al num ber of Reed- Solom on code errors Tot al Num ber of RS wit h correct able errors Tot al Num ber of RS words wit h uncorrect able errors I tem D e scr ip t ion OH Fram es Tot al num ber of OH fram es OH Fram e Errors Num ber of OH fram es received wit h errors RS Words Tot al num ber of Reed- Solom on code errors RS Correct able Errors Tot al Num ber of RS wit h correct able errors RS Uncorrect able Errors Tot al Num ber of RS words wit h uncorrect able errors I tem HEC Errors OCD Errors LCD Errors Tot al Cells Dat a Cells Bit Errors D e scr ip t ion Tot al Num ber of Header Error Checksum errors Tot al Num ber of Out- of- Cell Delineat ion errors Tot al num ber of Loss of Cell Delineat ion Tot al num ber of ATM cells ( including idle + dat a cells) Tot al num ber of ATM dat a cells Tot al num ber of bit errors 32 I tem Tot al ES Tot al SES Tot al UAS D e scr ip t ion Tot al Num ber of Errored Seconds Tot al Num ber of Severely Errored Seconds Tot al Num ber of Unavailable Seconds xDSL BER TEST Click x D SL BER Te st on t he xDSL St at ist ics screen t o t est t he Bit Error Rat e ( BER) . A sm all pop- up window will open after the button is pressed, as shown below. Click St a r t t o st art t he t est or click Close t o cancel t he t est . Aft er t he BER t est ing is com plete, the pop- up window will display as follows. 33 xDSL TONE GRAPH Click D r a w Gr a ph on t he xDSL St at ist ics screen and a pop- up window will display t he xDSL st at ist ics graph, including SNR, Bit s per t one, QLN and Hlog of t he xDSL line connection, as shown below. 34 4.3 Route Choose Rou t e t o display t he rout es t hat t he VR- 3071 has found. I tem Dest in at ion Gat eway Subnet Mask Flag Met ric Ser v ice I nterface D e scr ip t ion Destination network or destination host Next hop I P address Subnet Mask of Dest inat ion U: rout e is up !: rej ect route G: use gat eway H: target is a host R: reinst at e rout e for dynam ic rout ing D: dynam ically installed by daem on or redirect M: m odified from rout ing daem on or redirect The 'dist ance' t o t he t arget ( usually count ed in hops) . I t is not used by recent kernels, but m ay be needed by rout ing daem ons. Shows the WAN connect ion label Shows connect ion int erfaces 35 4 .4 ARP Click ARP t o display t he ARP inform at ion. I tem I P address Flags HW Address Dev ice D e scr ip t ion Shows I P address of host PC Com plet e, I ncom plet e, Perm anent , or Publish Shows t he MAC address of host PC Shows the connect ion int erface 36 4 .5 D H CP Click D H CP t o display all DHCP Leases. I tem Hostnam e MAC Address I P Address Expires I n D e scr ip t ion Shows t he device/ host / PC net work nam e Shows t he Et hernet MAC address of t he device/ host / PC Shows I P address of device/ host / PC Shows how m uch t im e is left for each DHCP Lease 37 4 .6 NAT Session This page displays all NAT connect ion session including bot h UPD/ TCP prot ocols passing through the device. Click t he " Show All" but t on t o display t he following. I tem Source I P Source Port Destination I P Dest inat ion Port Prot ocol Tim eout D e scr ip t ion The source I P from which t he NAT session is est ablished The source port from which t he NAT session is est ablished The I P which t he NAT session was connect ed t o The port which t he NAT session was connect ed t o The Prot ocol used in est ablishing t he part icular NAT session The t im e rem aining for t he TCP/ UDP connect ion t o be act ive 38 4 .7 I GMP I nfo Click I GM P I n fo t o display t he list of I GMP ent ries broadcast ing t hrough t he I GMP proxy enabled WAN connection. I tem I nterface WAN Gr o u p s Mem ber Tim eout Last Report Tim e Tot al Tim e( sec) Tot al Joins Tot al Leaves D e scr ip t ion The Source int erface from which t he I GMP report was r eceiv ed The WAN int erface from which t he m ult icast t raffic is r eceiv ed The dest inat ion I GMP group address The Source I P from which t he I GMP report was received The t im e rem aining before t he I GMP report expires The t im e of t he last received I GMP report Tot al Tot al I GMP j oin packet s received for t his I GMP address for this client Tot al I GMP leave packet s received for t his I GMP address for this client 39 4 .8 CPU & M e m or y Displays t he syst em perform ance graphs. Shows t he current loading of t he CPU and m em ory usage with dynam ic updates. 40 4.9 Netw ork Map The net work m ap is a graphical represent at ion of rout er 's wan st at us and LAN d ev ices. 41 4 .1 0 W ireless 4 .1 0 .1 Station I nfo This page shows aut hent icat ed wireless st at ions and t heir st at us. Consult t he t able below for descript ions of each colum n heading. I tem Wir eless I nterface BSS- MAC ( SSI D) MAC Address Associat ion Tim e Aut horized WMM Link Power Save APSD Default D e scr ip t ion List s t he 5GHz/ 2.4GHz int erface t hat t he st at ion connect s to List s which SSI D of t he m odem t hat t he st at ions connect to List s t he MAC address of all t he st at ions. List s all t he st at ions t hat are associat ed wit h t he Access Point , along wit h t he am ount of t im e since packet s were transferred to and from each station. I f a station is idle for too long, it is rem oved from this list. List s t hose devices wit h aut horized access List s t hose devices t hat ut ilize WMM List s t hose devices t hat ut ilize t he Power Save Feat ure List s t hose devices t hat ut ilize t he Aut om at ic Power Save Delivery Feat ure 42 4 .1 0 .2 W iFi I nsight This page allows you t o configure t he WiFi I nsight syst em . The WiFi I nsight syst em allows the wireless int erface t o collect beacon dat a from nearby devices and analyze t raffic on t he connect ed st at ions. This dat a collect ion requires m em ory st orage and t herefore needs t o be configured prior t o use. To begin, click on t he " St art Dat a Collect ion" but t on if no change is needed. 43 4 .1 0 .2 .1 Site Survey The graph displays wireless APs found in your neighborhood by channel collect ed under t he WiFi insight syst em . Select t he wireless int erface, channel, bandwidt h t o check the different display if desired. 2 .4 GHz 44 5 GHz 45 4 .1 0 .2 .2 Ch a n ne l St a t ist ics This page allows you t o see t he WiFi and Non WiFi int erference, and also t he available capacit y. This page is broken down int o individual part s below. Click on t he drop- down m enu t o select 2.4GHz or 5GHz int erface. 2 .4 GHz Shows the bandwidth that is available for use in each channel. Shows int erference level in each channel. 46 Shows t he highest RSSI on each adj acent channel. Adj acent AP and associat ed st at ions are displayed for checking interference on t hose channels. 47 5 GHz Shows the bandwidth that is available for use in each channel. Shows int erference level in each channel. 48 Shows t he highest RSSI on each adj acent channel. Adj acent AP and associat ed st at ions are displayed for checking interference on t hose channels. Shows t he channel dist ribut ion and t he possible int erference caused for each AP. 49 4 .1 0 .2 .3 Metrics ( Advanced Troubleshooting) I n t his page you will see m ost of t he count ers like AMPDU( if available) , Glit ch, Chanim and Packet Queue St at ist ics. This page is broken down int o individual part s below. Click on t he drop- down m enu t o select 2.4GHz or 5GHz int erface. Shows the rx glitch counters, bad fram e check sequence count ers received from air over tim e. Select t he count er of int erest t o m onit or t he st at ist ics received over t im e in t he chanim statistics graph. 50 List t he associat ed st at ion t o t he wireless int erface. 51 4 .1 0 .2 .4 Con figur e This page allows you t o configure t he WiFi insight syst em . Sam ple I nterval Select t he desired t im e int erval t o collect sam pling dat a wit h t he WiFi insight system . St a r t / St op D a t a Colle ct ion Start/ Stop the data collection process. Database Size Define t he dedicat ed dat abase size t o be used for t he WiFi insight syst em . Count e r s Define t he count ers t hat would be collect ed by t he WiFi insight syst em . Ex port Da t a ba se Export and save t he collect ed dat abase file. 52 Cha pt e r 5 Ba sic Se t up You can reach t his page by clicking on t he following icon locat ed at t he t op of t he scr een . This will bring you t o t he following screen. 53 5 .1 W an Setup Click WAN Set up on t he on t he left of your screen. Add or rem ove ATM, PTM and ETH WAN int erface connect ions here. Click Add t o creat e a new Layer 2 I nt erface ( see Appendix F - Connect ion Set up) . To rem ove a connect ion, click t he Re m ove but t on. 54 5 .1 .1 W AN Service Setup This screen allows for t he configurat ion of WAN int erfaces. Click t he Add but t on t o creat e a new connect ion. For connect ions on ATM or PTM or ETH WAN int erfaces see Appendix F - Connect ion Set up. To rem ove a connect ion, select it s Rem ove colum n radio but t on and click Re m ove . I tem D e scr ip t ion I nterface Nam e of the interface for WAN Descr ipt ion Nam e of the WAN connection Ty p e Shows the connect ion type Vlan8021p VLAN I D is used for VLAN Tagging ( I EEE 802.1Q) VlanMuxI d Shows 802.1Q VLAN I D Vl a n Tp i d VLAN Tag Prot ocol I dent ifier I GMP Proxy Shows I nt ernet Group Managem ent Prot ocol ( I GMP) Proxy st at u s I GMP Source Shows t he st at us of WAN int erface used as I GMP source NAT Shows Net work Address Translat ion ( NAT) st at us Fi r ew a l l Shows the Security stat us I Pv6 Shows t he WAN I Pv6 address MLD Proxy Shows Mult icast List ener Discovery ( MLD) Proxy st at us Mld Source Shows t he st at us of WAN int erface used as MLD source Manual Mode I ndicat es t he st at us of t he PPP m anual connect / disconnect but t on Rem ove Select int erfaces t o rem ove Edit Click t he Edit but t on t o m ake changes t o t he WAN int erface To rem ove a connect ion, select it s Rem ove colum n radio but t on and click Re m ove . 55 N OTE: Up t o 16 PVC profiles can be configured and saved in flash m em ory. 56 5 .2 NAT For NAT feat ures under t his sect ion t o work, NAT m ust be enabled in at least one PVC. 5 .2 .1 Virtual Servers Virt ual Servers allow you t o direct incom ing t raffic from t he WAN side ( ident ified by Prot ocol and Ext ernal port ) t o t he int ernal server wit h privat e I P addresses on t he LAN side. The I nt ernal port is required only if t he ext ernal port needs t o be convert ed t o a different port num ber used by t he server on t he LAN side. A m axim um of 32 entries can be configured. To add a Virt ual Server, click Add. The following will be displayed. Click Apply/ Sa ve t o apply and save t he set t ings. 57 Consult t he t able below for field and header descript ions. I tem Use I nt erface Select a Service Or Cust om Service Server I P Address Ext ernal Port St art Ext ernal Port End Prot ocol I nt ernal Port St art I nt ernal Port End D e scr ip t ion Select a WAN interface from the drop- down m enu. I f you choose All I nt erface, server rules will be creat ed for all WAN interfaces. User should select t he service from t he list . Or User can ent er t he nam e of t heir choice. Ent er t he I P address for t he server. Ent er t he st art ing ext ernal port num ber ( when you select Cust om Server) . When a service is select ed, t he port ranges are autom atically configured. Ent er t he ending ext ernal port num ber ( when you select Cust om Server) . When a service is select ed, t he port ranges are autom atically configured. TCP, TCP/ UDP, or UDP. Ent er t he int ernal port st art ing num ber ( when you select Cust om Server) . When a service is select ed t he port ranges are autom atically configured Ent er t he int ernal port ending num ber ( when you select Cust om Server) . When a service is select ed, t he port ranges are autom atically configured. 58 5.2.2 Port Triggering Som e applicat ions require t hat specific port s in t he firewall be opened for access by t he rem ot e part ies. Port Triggers dynam ically 'Open Port s' in t he firewall when an applicat ion on t he LAN init iat es a TCP/ UDP connect ion t o a rem ot e part y using t he 'Triggering Port s'. The Rout er allows t he rem ot e part y from t he WAN side t o est ablish new connect ions back t o t he applicat ion on t he LAN side using t he 'Open Port s'. A m axim um 32 ent ries can be configured. To add a Trigger Port , click Add. The following will be displayed. Click Sa ve / Apply t o save and apply t he set t ings. 59 Consult t he t able below for field and header descript ions. I tem Use I nt erface Select an Applicat ion Or Cust om Applicat ion Trigger Port St art Trigger Port End Trigger Prot ocol Open Port St art Open Port End Open Prot ocol D e scr ip t ion Select a WAN interface from the drop- down m enu. User should select t he applicat ion from t he list . Or User can ent er t he nam e of t heir choice. Ent er t he st art ing t rigger port num ber ( when you select custom application) . When an application is selected, the port ranges are autom atically configured. Ent er t he ending t rigger port num ber ( when you select custom application) . When an application is selected, the port ranges are autom atically configured. TCP, TCP/ UDP, or UDP. Ent er t he st art ing open port num ber ( when you select custom application) . When an application is selected, the port ranges are autom atically configured. Ent er t he ending open port num ber ( when you select custom application) . When an application is selected, the port ranges are autom atically configured. TCP, TCP/ UDP, or UDP. 60 5 .2 .3 DMZ Host The DSL rout er will forward I P packet s from t he WAN t hat do not belong t o any of t he applicat ions configured in t he Virt ual Servers t able t o t he DMZ host com put er. To Act iva t e t he DMZ host , ent er t he DMZ host I P address and click Sa ve / Apply. To D e a ct iva t e t he DMZ host , clear t he I P address field and click Sa ve / Apply. 61 5 .3 LAN Configure t he LAN int erface set t ings and t hen click Apply/ Sa ve . The set t ings shown above are described below. Gr ou pN a m e : Select an I nt erface Group. 1 st LAN I N TERFACE I P Addr e ss: Ent er t he I P address for t he LAN port . Su bn e t M a sk : Ent er t he subnet m ask for t he LAN port . En a ble I GM P Sn oopin g: Enable by t icking t he checkbox . St andard Mode: I n st andard m ode, m ult icast t raffic will flood t o all WDS port s when no client subscribes t o a m ult icast group even if I GMP snooping is enabled. Blocking Mode: I n blocking m ode, t he m ult icast dat a t raffic will be blocked and not flood to all WDS ports when there are no client subscriptions to any m ulticast group. 62 En a ble I GM P LAN t o LAN M u lt ica st : Select Enable from t he drop- down m enu t o allow I GMP LAN t o LAN Mult icast forwarding. En a ble LAN side fir e w a ll: Enable by t icking t he checkbox . D H CP Se rve r : To enable DHCP, select En a ble D H CP se r ve r and ent er St art and End I P addresses and t he Leased Tim e. This set t ing configures t he rout er t o aut om at ically assign I P, default gat eway and DNS server addresses t o every PC on your LAN. Se t t ing TFTP Se r ve r : Enable by t icking t he checkbox . Then, input t he TFTP server address or an I P address. St at ic I P Lease List : A m axim um of 32 entries can be configured. To add an ent ry, ent er MAC address and St at ic I P and t hen click Apply/ Sa ve . To rem ove an ent ry, t ick t he corresponding checkbox in t he Rem ove colum n and then click the Rem ove Ent ries butt on, as shown below. 63 5 .3 .1 Lan VLAN Setting The CPE will t ag VLAN on specific LAN port ( s) when t his feat ure is used. Click t he Add but t on t o display t he following. I tem Vlan I D pbits Rem ove D e scr ip t ion The VLAN I D t o be support ed on t he LAN port . The VLAN priorit y bit t o be support ed on t he LAN port . Tick t he checkbox and click t he Rem ove but t on t o delet e en t r ies. 64 5 .3 .2 LAN I Pv6 Autoconfig Configure t he LAN int erface set t ings and t hen click Sa ve / Apply. The set t ings shown above are described below. St a t ic LAN I Pv6 Addr e ss Configur a t ion I tem I nt erface Address (prefix length is required): D e scr ip t ion Configure st at ic LAN I Pv6 address and subnet prefix length 65 I Pv6 LAN Applicat ions I tem St at eless St at ef u l Start interface I D: End int erface I D: Leased Tim e ( hour) : D e scr ip t ion Use st at eless configurat ion Use st at eful configurat ion Start of interface I D to be assigned to dhcpv6 client End of int erface I D t o be assigned t o dhcpv6 client Lease t im e for dhcpv6 client t o use t he assigned I P ad d r ess I tem Enable RADVD Enable ULA Prefix Advert isem ent Random ly Generat e St at ically Configure Prefix Preferred Life Tim e ( hour) Valid Life Tim e ( hour) Enable MLD Snooping St andard Mode Blocking Mode Enable MLD LAN To LAN Mult icast D e scr ip t ion Enable use of rout er advert isem ent daem on Allow RADVD t o advert ise Unique Local Address Pr ef i x Use a Random ly Generat ed Prefix Specify t he prefix t o be used The preferred life t im e for t his prefix The valid life t im e for t his prefix Enable/ disable I Pv6 m ult icast forward t o LAN port s I n st andard m ode, I Pv6 m ult icast t raffic will flood to all WDS ports when no client subscribes to a m ult icast group even if MLD snooping is enabled In blocking m ode, I Pv6 m ult icast dat a t raffic will be blocked and not flood to all WDS ports when there are no client subscriptions to any m ulticast group Enable/ disable I Pv6 m ult icast bet ween LAN port s 66 5.3.3 UPnP Select t he checkbox provided and click Apply/ Sa ve t o enable UPnP prot ocol. 67 5 .4 Pa r e nt a l Cont r ol This select ion provides WAN access cont rol funct ionalit y. 5 .4 .1 Tim e Restriction This feat ure rest rict s access from a LAN device t o an out side net work t hrough t he device on select ed days at cert ain t im es. Make sure t o act ivat e t he I nt ernet Tim e server synchronizat ion as described in sect ion 8.5 I nt ernet Tim e, so t hat t he scheduled tim es m atch your local tim e. Clicking on t he checkbox in t he Enable field allows t he user t o select all / none ent ries for Enabling/ Disabling. Click Add t o display t he following screen. See below for field descript ions. Click Apply/ Sa ve t o add a t im e rest rict ion. User Nam e: A user- defined label for this restriction. Br ow se r 's M AC Addr e ss: MAC address of t he PC running t he browser. Ot h e r M AC Addr e ss: MAC address of anot her LAN device. D a ys of t he W e e k : The days t he rest rict ions apply. St a r t Block ing Tim e : The t im e t he rest rict ions st art . En d Block in g Tim e : The t im e t he rest rict ions end. 68 5 .4 .2 URL Filter This screen allows for t he creat ion of a filt er rule for access right s t o websit es based on t heir URL address and port num ber. Select URL List Type: Exclude or I nclude. Tick t he Ex clude radio but t on t o deny access t o t he websit es list ed. Tick t he I nclude radio but t on t o rest rict access t o only t hose list ed websit es. Then click Add t o display t he following screen. Ent er t he URL address and port num ber t hen click Apply/ Sa ve t o add t he ent ry t o t he URL filt er. URL Addresses begin wit h " www", as shown in t his exam ple. 69 A m axim um of 100 ent ries can be added t o t he URL Filt er list . 70 5.5 Hom e Netw orking 5 .5 .1 Print Server This page allows you t o enable or disable print er support . Please reference Appe n dix E t o see t he procedure for enabling t he Print er Server. 5 .5 .2 DLNA Enabling DLNA allows users t o share digit al m edia, like pict ures, m usic and video, t o ot her LAN devices from t he digit al m edia server. I nsert t he USB drive int o t he USB host port on t he back of t he rout er. Click Enable on- board digit al m edia server, a dropdown list of direct ories found on t he USB driver will be available for select ion. Select m edia pat h from t he drop- down list or m anually m odify the m edia library path and click Apply/ Save to enable t he DLNA m edia server. 71 5 .5 .3 Storage Service The St orage service allows you t o use St orage devices wit h m odem t o be m ore easily accessed. 5 .5 .3 .1 Storage Device I nfo This page also displays st orage devices at t ached t o t he USB host . Display after storage device attached ( for your reference) . 72 5 .5 .3 .2 Storage User Accounts Add a st orage account t o access t he USB device for t he sam ba access syst em . Click t he Add but t on t o display t he following. volum eNam e would be disk1_1 if only 1 USB has been plugged int o t he device. I n the boxes provided, enter the user nam e, password and volum e nam e on which t he hom e direct ory is t o be creat ed. Then click t he Apply/ Sa ve but t on. 73 I n any windows folder, ent er t he address \ \ 192.168.1.1 t o access t he sam ba folder creat ed. A password prom pt will show. Ent er usernam e password as configured. Access \ \ 192.168.1.1 again ( or refresh the screen) , the user folder will now be available for access. 5 .5 .3 .2 Storage User Accounts This page allows you t o enable / disable USB 3.0 device support . Not e: Enabling USB 3.0 can cause int erference wit h t he built- in 2.4GHz wireless radio. I t is advised leaving t he default value as USB 2.0 74 5 .6 W ireless 5 .6 .1 SSI D This page allows you t o configure t he Virt ual int erfaces for each Physical int erface. Click t he Apply but t on t o apply your changes. The set t ings shown above are described below. I tem Wireless I nterface BSS- MAC ( SSI D) BSS Enabled Network Nam e ( SSI D) Net work Type AP I solat ion BSS Max Associat ions Lim it D e scr ip t ion Select which wireless int erface t o configure Select desired BSS t o configure Enable or disable t his SSI D Set s t he net work nam e ( also known as SSI D) of t his net w or k Select ing Close d hides t he net work from act ive scans. Select ing Open reveals t he network from act ive scans. Select ing On enables AP I solat ion m ode. When enabled, STAs associat ed wit h t he AP will not be able t o com m unicat e wit h each ot her. Set s t he m axim um associat ions for t his BSS 75 WMM Advert ise WMF When WMM is enabled for t he radio, select ing On allows WMM t o be advert ised in beacons and probes for t his BSS. Off disables advert isem ent of WMM in beacons and p r ob es. Choose On t o enable Wireless Mult icast Forwarding on t his BSS. Off disables t his feat ure. 5 .6 .2 Security This page allows you t o configure securit y for t he wireless LAN int erfaces. Click t he Apply but t on t o apply your changes. For inform at ion on each param et er, m ove the cursor over the param eter that you are interested in ( as shown here) . 76 Cha pt e r 6 Adva nce d Se t up You can reach t his page by clicking on t he following icon locat ed at t he t op of t he scr een . 6 .1 Security For det ailed descript ions, wit h exam ples, please consult Appendix A - Firewall. 6 .1 .1 I P Filtering This screen set s filt er rules t hat lim it I P t raffic ( Out going/ I ncom ing) . Mult iple filt er rules can be set and each applies at least one lim it ing condit ion. For individual I P packets to pass the filter all conditions m ust be fulfilled. N OTE: This funct ion is not available when in WDS m ode. I nst ead, MAC Filt ering perform s a sim ilar function. OUTGOI N G I P FI LTER By default, all outgoing I P traffic is allowed, but I P traffic can be blocked with filters. To add a filt er ( t o block som e out going I P t raffic) , click t he Add but t on. On t he following screen, ent er your filt er crit eria and t hen click Apply/ Sa ve. 77 Consult t he t able below for field descript ions. I tem Filt er Nam e I P Version Prot ocol Source I P address Source Port ( port or port : port ) Destination I P address Dest inat ion Port ( port or port : port ) D e scr ip t ion The filt er rule label Select from the drop down m enu TCP, TCP/ UDP, UDP, or I CMP Ent er source I P address Ent er source port num ber or range Ent er dest inat ion I P address Ent er dest inat ion port num ber or range 78 I N COM I N G I P FI LTER By default , all incom ing I P t raffic is blocked, but I P traffic can be allowed wit h filt ers. To add a filt er ( t o allow incom ing I P t raffic) , click t he Add but t on. On t he following screen, ent er your filt er crit eria and t hen click Apply/ Sa ve. Consult t he t able below for field descript ions. I tem Filt er Nam e I P Version D e scr ip t ion The filt er rule label Select from the drop down m enu 79 Prot ocol Source I P address Source Port ( port or port : port ) Destination I P address Dest inat ion Port ( port or port : port ) TCP, TCP/ UDP, UDP, or I CMP Ent er source I P address Ent er source port num ber or range Ent er dest inat ion I P address Ent er dest inat ion port num ber or range At t he bot t om of t his screen, select t he WAN and LAN I nt erfaces t o which t he filt er rule will apply. You m ay select all or j ust a subset . WAN int erfaces in WDS m ode or without firewall enabled are not available. 80 6 .1 .2 MAC Filtering N OTE: This opt ion is only available in WDS m ode. Ot her m odes use I P Filt ering t o perform a sim ilar function. Each net work device has a unique 48- bit MAC address. This can be used t o filt er ( block or forward) packet s based on t he originat ing device. MAC filt ering policy and rules for t he VR- 3071 can be set according t o t he following procedure. The MAC Filt ering Global Policy is defined as follows. FORW ARD ED m eans t hat all MAC layer fram es will be FORW ARDED except t hose m at ching t he MAC filt er rules. BLOCKED m eans t hat all MAC layer fram es will be BLOCKED except t hose m at ching t he MAC filt er rules. The default MAC Filt ering Global policy is FORW ARD ED . I t can be changed by clicking t he Cha nge Policy but t on. Choose Add or Re m ove t o configure MAC filt ering rules. The following screen will appear when you click Add. Creat e a filt er t o ident ify t he MAC layer fram es by specifying at least one condition below. I f m ultiple conditions are specified, all of them m ust be m et. 81 Click Sa ve / Apply t o save and act ivat e t he filt er rule. Consult t he t able below for det ailed field descript ions. I tem Prot ocol Type Dest inat ion MAC Address Source MAC Address Fram e Direct ion WAN I nt erfaces D e scr ip t ion PPPoE, I Pv4, I Pv6, AppleTalk, I PX, Net BEUI , I GMP Defines t he dest inat ion MAC address Defines t he source MAC address Select t he incom ing/ out going packet int erface Applies t he filt er t o t he select ed WDS int erface 82 6 .2 Quality of Service ( QoS) N OTE: QoS m ust be enabled in at least one PVC t o display t his opt ion. ( See Appendix F - Connect ion Set up for det ailed PVC set up inst ruct ions) . To Enable QoS t ick t he checkbox and select a Default DSCP Mark. Click Apply/ Sa ve t o act ivat e QoS. QoS a nd D SCP M a r k a r e de fine d a s follow s: Qualit y of Service ( QoS) : This provides different priorit y t o different users or dat a flows, or guarantees a certain level of perform ance to a data flow in accordance with request s from Queue Priorit izat ion. Default Different iat ed Services Code Point ( DSCP) Mark: This specifies t he per hop behavior for a given flow of packet s in t he I nt ernet Prot ocol ( I P) header t hat do not m at ch any ot her QoS rule. 83 6.2.1 QoS Queue 6 .2 .1 .1 QoS Que ue Configur a t ion Configure queues wit h different priorit ies t o be used for QoS set up. I n ATM m ode, a m axim um of 16 queues can be configured. I n PTM m ode, a m axim um of 8 queues can be configured. For each Et hernet int erface, a m axim um of 8 queues can be configured. For each Et hernet WAN int erface, a m axim um of 8 queues can be configured. ( Please see t he screen on t he following page) . 84 85 To rem ove queues, check t heir rem ove- checkboxes ( for user creat ed queues) , t hen click the Rem ove button. The Ena ble but t on will scan t hrough every queue in t he t able. Queues wit h t he enable- checkbox checked will be enabled. Queues wit h t he enable- checkbox un-checked will be disabled. The enable- checkbox also shows st at us of t he queue aft er page reload. Not e t hat if WMM funct ion is disabled in t he Wireless Page, queues relat ed t o wireless will not t ake effect . This funct ion follows t he Different iat ed Services rule of I P QoS. Enable and assign an int erface and precedence on t he next screen. Click Apply/ Save on t his screen t o act ivat e it . To add a queue, click t he Add but t on t o display t he following screen. N a m e : I dent ifier for t his Queue ent ry. En a ble : Enable/ Disable t he Queue ent ry. I nt erfa ce: Assign t he ent ry t o a specific net work int erface ( QoS enabled) . Drop Algorit hm : Select t he algorit hm t o be used t o ensure t hat t he QoS rule is enforced if the traffic exceeds the configured lim it. D r op Ta il: Packet s are sent in first com e first serve fashion, t he t ailing t raffic would be dropped if they exceed the handling lim it. 86 Ra n dom Ea r ly D e t e ct ion : Packet s are m onit ored by configured queue t hreshold and serving proportion. W RED : Weight ed RED, t he assigned m onit oring queue would be given different priorit y and t hreshold t o ensure various priorit y queues would be served fairly. Aft er select ing an I nt erface t he following will be displayed. The precedence list shows t he scheduler algorit hm for each precedence level. Queues of equal precedence will be scheduled based on t he algorit hm . Queues of unequal precedence will be scheduled based on SP. Shaping Rat e: Specify a shaping rat e lim it t o t he defined queue. Click Apply/ Sa ve t o apply and save t he set t ings. 87 6.2.1.2 W lan Queue Displays t he list of available wireless queues for WMM and wireless dat a t ransm it priorit y. 88 6 .2 .2 QoS Cla ssifica t ion The net work t raffic classes are list ed in t he following t able. Click Add t o configure a net work t raffic class rule and Ena ble t o act ivat e it . To delete an entry from the list, click Rem ove. This screen creat es a t raffic class rule t o classify t he upst ream t raffic, assign queuing priorit y and opt ionally overwrit e t he I P header DSCP byt e. A rule consist s of a class nam e and at least one logical condit ion. All t he condit ions specified in t he rule m ust be satisfied for it to take effect. Click Apply/ Sa ve t o save and act ivat e t he rule. 89 Field D e scr ip t ion Traffic Class Nam e Ent er a nam e for t he t raffic class. Rule Order Last is t he only opt ion. Rule St at us Disable or enable the rule. Cla ssifica t ion Cr it e r ia I ngress I nterface Select an int erface: ( i.e. LAN, WAN, local, ETH1, ETH2, ETH3, wl0) Et her Type Set t he Et hernet t ype ( e.g. I P, ARP, I Pv6) . Source MAC Address A packet belongs t o SET- 1, if a binary-AND of it s source MAC address wit h t he Source MAC Mask is equal t o t he binary-AND of t he Source MAC Mask and this field. Source MAC Mask This is t he m ask used t o decide how m any bit s are checked in Source MAC Address. Dest inat ion MAC Ad d r ess A packet belongs t o SET- 1 t hen t he result t hat t he Dest inat ion MAC Address of it s header binary-AND t o t he Dest inat ion MAC Mask m ust equal t o t he result t hat t his field binary-AND t o t he Dest inat ion MAC Mask . Dest inat ion MAC Mask This is t he m ask used t o decide how m any bit s are checked in t he Dest inat ion MAC Address. Cla ssifica t ion Re sult s Specify Egress I nterface Choose t he egress int erface from t he available list . Specify Egress Queue Choose t he egress queue from t he list of available for the specified egress interface. Mark Different iat ed Service Code Point The select ed Code Point gives t he corresponding priority to packets that satisfy the rule. Mark 802.1p Priorit y Select between 0- 7. - Class non-vlan packet s egress t o a non- vlan interface will be tagged with VI D 0 and the class rule p- bit s. 90 Set Rat e Lim it - Class vlan packet s egress t o a non- vlan int erface will have the packet p- bits re- m arked by the class rule p- bits. No additional vlan tag is added. - Class non-vlan packet s egress t o a vlan int erface will be tagged with the interface VI D and the class rule p-bits. - Class vlan packet s egress t o a vlan int erface will be addit ionally t agged wit h t he packet VI D, and t he class rule p-bits. The dat a t ransm ission rat e lim it in kbps. 91 6 .2 .3 QoS Port Shaping QoS port shaping support s t raffic shaping of t he Et hernet int erface. I nput t he shaping rat e and burst size t o enforce QoS rule on each int erface. I f " Shaping Rat e" is set t o " - 1" , it m eans no shaping and " Burst Size" will be ignored. Click Apply/ Sa ve t o apply and save t he set t ings. 92 6.3 Routing The following rout ing funct ions are accessed from t his m enu: Default Gatew ay, Static Route, Policy Routing and RI P. N OTE: I n WDS m ode, the RI P m enu opt ion is hidden while t he other m enu options are shown but ineffective. 6 .3 .1 Default Gatew ay The default gat eway int erface list can have m ult iple WAN int erfaces served as system default gateways but only one will be used according to the priority with the first being t he highest and t he last one t he lowest priorit y if t he WAN int erface is connect ed. Priorit y order can be changed by rem oving all and adding t hem back in again. Click Apply/ Sa ve t o apply and save t he set t ings. 93 6 .3 .2 Static Route This opt ion allows for t he configurat ion of st at ic rout es by dest inat ion I P. Click Add t o creat e a st at ic rout e or click Re m ove t o delet e a st at ic rout e. Aft er clicking Add t he following will display. I P Ve r sion: Select t he I P version t o be I Pv4 or I Pv6. D e st ina t ion I P a ddr e ss/ pr e fix le n gt h : Ent er t he dest inat ion I P address. I nt erface: Select the proper interface for the rule. Ga t e w a y I P Addr e ss: The next- hop I P address. M e t r ic: The m et ric value of rout ing. After com pleting the settings, click Apply/ Save to add the entry to the routing t able. 94 6 .3 .3 Policy Routing This opt ion allows for t he configurat ion of st at ic rout es by policy. Click Add t o creat e a rout ing policy or Re m ove t o delet e one. On t he following screen, com plet e t he form and click Apply/ Sa ve t o creat e a policy. 95 I tem Policy Nam e Physical LAN Port Source I P Use I nt erface Default Gat eway I P D e scr ip t ion Nam e of the route policy Specify t he port t o use t his rout e policy I P Address to be routed I nterface that traffic will be directed to I P Address of the default gateway 96 6.3.4 RI P To act ivat e RI P, configure t he RI P version/ operat ion m ode and select t he Ena ble d checkbox for at least one WAN int erface before clicking Save/ Apply. 97 6.4 DNS 6 .4 .1 DNS Server Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be ent ered. DN S Server I nt erfaces can have m ult iple WAN int erfaces served as syst em DNS servers but only one will be used according to the priority with the first being the highest and the last one the lowest priority if t he WAN interface is connect ed. Priorit y order can be changed by rem oving all and adding t hem back in again. Click Apply/ Sa ve t o save t he new configurat ion. 98 6.4.2 Dynam ic DNS The Dynam ic DNS service allows you t o m ap a dynam ic I P address t o a st at ic host nam e in any of m any dom ains, allowing t he VR- 3071 t o be m ore easily accessed from various locations on the I nternet. To add a dynam ic DNS service, click Add. The following screen will display. Click Apply/ Sa ve t o save your set t ings. Consult t he t able below for field descript ions. 99 I tem D-DNS provider Hostnam e I nterface Usernam e Passw o r d D e scr ip t ion Select a dynam ic DNS provider from t he list Ent er t he nam e of t he dynam ic DNS server Select the interface from the list Ent er t he usernam e of t he dynam ic DNS ser v er Ent er t he password of t he dynam ic DNS server 100 6 .5 DSL The DSL Set t ings screen allows for t he select ion of DSL m odulat ion m odes. For opt im um perform ance, t he m odes select ed should m at ch t hose of your I SP. Click Apply/ Sa ve t o save your set t ings. Consult t he t able below for field descript ions. 101 DSL Mode G.Dm t G.lit e T1 . 4 1 3 ADSL2 An n ex L AD SL2 + An n ex M VDSL2 Data Transm ission Rate - Mbps ( Megabits per second) Downst ream : 12 Mbps Upst ream : 1.3 Mbps Downst ream : 4 Mbps Upst ream : 0.5 Mbps Downst ream : 8 Mbps Upst ream : 1.0 Mbps Downst ream : 12 Mbps Upst ream : 1.0 Mbps Support s longer loops but wit h reduced t ransm ission rat es Downst ream : 24 Mbps Upst ream : 1.0 Mbps Downst ream : 24 Mbps Upst ream : 3.5 Mbps Downst ream : 100 Mbps Upst ream : 60 Mbps VDSL Profile 8a 8b 8c 8d 12a 12b 17a 30a 35b Maxim um Dow nstream Throughput- Mbps ( Megabits per second) Downstream 50 Downstream 50 Downstream : 50 Downstream : 50 Downstream : 68 Downstream : 68 Downstream : 100 Downst ream : 100 Mbps Upst ream : 100 Mbps Downst ream : 300 Mbps Upst ream : 100 Mbps Options US0 Bit swap Enable SRA Enable G997.1 EOC D e scr ip t ion Band between 20 and 138 kHz for long loops to upstream Enables adapt ive handshaking funct ionalit y Enables Seam less Rat e Adapt at ion ( SRA) Select Equipm ent Serial Num ber or Equipm ent MAC 102 xTU- R Serial Num ber Address t o use rout er's serial num ber or MAC address in ADSL EOC m essages 6.6 DNS Proxy DNS proxy receives DNS queries and forwards DNS queries to the I nternet. After the CPE get s answers from t he DNS server, it replies t o t he LAN client s. Configure DNS proxy wit h t he default set t ing, when t he PC get s an I P via DHCP, t he dom ain nam e, Hom e, will be added t o PC's DNS Suffix Search List , and t he PC can access rout e wit h " Com t rend.Hom e". 103 6 .7 I nterface Grouping I nt erface Grouping support s m ult iple port s t o PVC and bridging groups. Each group perform s as an independent net work. To use t his feat ure, you m ust creat e m apping groups wit h appropriat e LAN and WAN int erfaces using t he Add but t on. The Rem ove but t on rem oves m apping groups, ret urning t he ungrouped int erfaces t o t he Default group. Only t he default group has an I P int erface. To add an I nt erface Group, click t he Add but t on. The following screen will appear. I t list s t he available and grouped int erfaces. Follow t he inst ruct ions shown on scr een . 104 105 Aut om a t ica lly Add Clie nt s W it h Follow ing D H CP Ve ndor I D s: Add support t o aut om at ically m ap LAN int erfaces t o PVC's using DHCP vendor I D ( opt ion 60) . The local DHCP server will decline and send t he request s t o a rem ot e DHCP server by m apping t he appropriat e LAN int erface. This will be t urned on when I nt erface Grouping is enabled. For exam ple, im agine t here are 4 PVCs ( 0/ 33, 0/ 36, 0/ 37, 0/ 38) . VPI / VCI = 0/ 33 is for PPPoE while t he ot her PVCs are for I P set- t op box ( video) . The LAN int erfaces are ETH1, ETH2, ETH3, and ETH4. The I nt erface Grouping configurat ion will be: 1. Default : ETH1, ETH2, ETH3, and ETH4. 2. Video: nas_0_36, nas_0_37, and nas_0_38. The DHCP vendor I D is " Video" . I f t he onboard DHCP server is running on " Default " and t he rem ot e DHCP server is running on PVC 0/ 36 ( i.e. for set- t op box use only) . LAN side client s can get I P addresses from t he CPE's DHCP server and access t he I nt ernet via PPPoE ( 0/ 33) . I f a set- t op box is connect ed t o ETH1 and sends a DHCP request wit h vendor I D " Video" , t he local DHCP server will forward t his request t o t he rem ot e DHCP server. The I nt erface Grouping configurat ion will aut om at ically change t o t he following: 1. Default : ETH2, ETH3, and ETH4 2. Video: nas_0_36, nas_0_37, nas_0_38, and ETH1. 106 6.8 I P Tunnel 6.8.1 I Pv6inI Pv4 Configure 6in4 t unneling t o encapsulat e I Pv6 t raffic over explicit ly- configured I Pv4 lin k s. Click t he Add but t on t o display t he following. Click Apply/ Sa ve t o apply and save t he set t ings. I tem Tunnel Nam e Mechanism D e scr ip t ion I nput a nam e for the tunnel Mechanism used by t he t unnel deploym ent 107 Associated WAN I nterface Associat ed LAN I nt erface Manual/ Aut om at ic I Pv4 Mask Lengt h 6rd Prefix wit h Prefix Lengt h Border Relay I Pv4 Address Select the WAN interface to be used by the t unn el Select t he LAN int erface t o be included in t he t unn el Select autom atic for point- to- m ultipoint tunneling / manual for point-to-point tunneling The subnet m ask lengt h used for t he I Pv4 in t er f ace Prefix and prefix lengt h used for t he I Pv6 in t er f ace I nput t he I Pv4 address of t he ot her device 108 6.8.2 I Pv4inI Pv6 Configure 4in6 t unneling t o encapsulat e I Pv4 t raffic over an I Pv6- only environm ent . Click t he Add but t on t o display t he following. Click Apply/ Sa ve t o apply and save t he set t ings. I tem Tunnel Nam e D e scr ip t ion I nput a nam e for the tunnel Mechanism Mechanism used by t he t unnel deploym ent 109 Associated WAN I nterface Associat ed LAN I nt erface Manual/ Aut om at ic AFTR Select the WAN interface to be used by the t unn el Select t he LAN int erface t o be included in t he t unn el Select autom atic for point- to- m ultipoint tunneling / manual for point-to-point tunneling Address of Address Fam ily Translat ion Rout er 6 .8 .3 MAP This page allows you t o configure MAP-T and MAP- E ent ries. Click t he Add but t on t o display t he following. 110 Click Apply/ Sa ve t o apply and save t he set t ings. The set t ings shown above are described below. I tem Mechanism Associated WAN I nterface Associat ed LAN I nterface Manual Aut om at ic BR I Pv6 Prefix BMR I Pv6 Prefix BMR I Pv4 Prefix PSI D Offset PSI D Lengt h PSI D Value D e scr ip t ion Choose whet her t o encapsulat e wit h MAP- E or MAP-T t o be used for NAT64 t ranslat ion List s t he LAN int erfaces available t o be used for I P MAP List s t he LAN int erfaces available t o be used for I P MAP Configure t he prefix and relat ive PSI D set t ings m anually The prefix set t ings will be configured aut om at ically from the m apping interfaces Configure t he border relay I Pv6 Prefix Configure t he basic m apping rule I Pv6 Prefix Configure t he basic m apping rule I Pv4 Prefix Port Set I D offset assigned t o t he I P MAP Define the port set I D length Define the port set I D value 111 6 .9 I PSec 6 .9 .1 I PSe c Tunne l M ode Conne ct ions You can add, edit or rem ove I PSec t unnel m ode connect ions from t his page. Click Add N e w Conn e ct ion t o add a new I PSec t erm inat ion rule. The following screen will display. 112 Heading I PSec Connect ion Nam e I P Version Tunnel Mode Local Gat eway I nterface Rem ot e I PSec Gat eway Address D e scr ip t ion User- defined label Select t he corresponding I Pv4 / I Pv6 version for t he I PSEC connect ion Select t unnel prot ocol, AH ( Aut hent icat ion Header) or ESP ( Encapsulat ing Securit y Payload) for t his t unnel. Select from the list of wan interface to be used as gat eway for t he I PSEC connect ion The locat ion of t he Rem ot e I PSec Gat eway. I P address or dom ain nam e can be used. 113 Tunnel access from local I P addresses I P Address/ Subnet Mask for VPN Tunnel access from rem ote I P addresses I P Address/ Subnet Mask for VPN Key Exchange Met hod Specify the acceptable host I P on the local side. Choose Single or Subn e t . I f you chose Single, please enter the host I P address for VPN. I f you chose Subn e t , please ent er t he subnet inform at ion for VPN. Specify t he accept able host I P on the rem ot e side. Choose Single or Subn e t . I f you chose Single, please enter the host I P address for VPN. I f you chose Subn e t , please ent er t he subnet inform at ion for VPN. Select from Aut o( I KE) or Manual For t he Aut o( I KE) key exchange m et hod, select Pre- shared key or Cert ificat e ( X.509) aut hent icat ion. For Pre- shared key aut hent icat ion you m ust ent er a key, while for Cert ificat e ( X.509) aut hent icat ion you m ust select a cert ificat e from t he list . See the tables below for a sum m ary of all available opt ions. Aut o( I KE) Key Exchange Met hod Pre- Shared Key / Cert ificat e ( X.509) Perfect Forward Secrecy Advanced I KE Settings I nput Pre- shared key / Choose Cert ificat e Enable or Disable Select Show Advanced Set t ings to reveal the advanced settings options shown below. Advanced I KE Settings Phase 1 / Phase 2 Select Hide Advanced Set t ings t o hide t he advanced settings options shown above. Choose set t ings for each phase, t he available opt ions are separat ed wit h a " / " charact er. 114 Mode Encrypt ion Algorit hm I ntegrity Algorithm Select Diffie- Hellm an Group Key Life Tim e Main / Aggressive DES / 3DES / AES 128,192,256 MD5 / SHA1 768 8192 bit Ent er your own or use t he default ( 1 hour) The Manual key exchange m et hod opt ions are sum m arized in t he t able below. Manual Key Exchange Met hod Encrypt ion Algorit hm Encrypt ion Key Aut hent icat ion Algorit hm Aut hent icat ion Key SPI ( default is 101) DES / 3DES / AES ( aes- cbc) DES: 16 digit Hex, 3DES: 48 digit Hex MD5 / SHA1 MD5: 32 digit Hex, SHA1: 40 digit Hex Ent er a Hex value from 100- FFFFFFFF 115 6 .1 0 Ce r t ifica t e A cert ificat e is a public key, at t ached wit h it s owner 's inform at ion ( com pany nam e, server nam e, personal real nam e, cont act e- m ail, post al address, etc) and digital signat ures. There will be one or m ore digit al signat ures at t ached t o t he cert ificat e, indicating that these entities have verified that this certificate is valid. 6 .1 0 .1 Local 116 CREATE CERTI FI CATE REQUEST Click Cr e a t e Ce r t ifica t e Re qu e st t o generat e a cert ificat e- signing request . The cert ificat e- signing request can be subm it t ed t o t he vendor/ I SP/ I TSP t o apply for a cert ificat e. Som e inform at ion m ust be included in the cert ificat e- signing request . Your vendor/ I SP/ I TSP will ask you t o provide t he inform at ion t hey require and t o provide t he inform at ion in t he form at t hey regulat e. Ent er t he required inform at ion and click Apply t o generat e a privat e key and a cert ificat e- signing request . The contents of this application form do not affect the basic param eter settings of the pr odu ct . The following t able is provided for your reference. I tem Cert ificat e Nam e Com m on Nam e Organizat ion Nam e St at e/ Province Nam e Count ry/ Region Nam e D e scr ip t ion A user- defined nam e for the certificate. Usually, t he fully qualified dom ain nam e for t he m achine. The exact legal nam e of your organizat ion. Do not abbreviate. The st at e or province where your organizat ion is located. I t cannot be abbreviated. The t wo- let t er I SO abbreviat ion for your count ry. 117 I M PORT CERTI FI CATE Click I m por t Ce r t ifica t e t o past e t he cert ificat e cont ent and t he privat e key provided by your vendor/ I SP/ I TSP int o t he corresponding boxes shown below. Ent er a cert ificat e nam e and click t he Apply but t on t o im port t he cert ificat e and it s privat e key. 118 6 .1 0 .2 Tr ust e d CA CA is an abbreviat ion for Cert ificat e Aut horit y, which is a part of t he X.509 syst em . I t is itself a certificate, attached with the owner inform ation of this certificate authority; but its purpose is not encryption/ decryption. I ts purpose is to sign and issue certificates, in order to prove that these certificates are valid. Click I m por t Ce r t ifica t e t o past e t he cert ificat e cont ent of your t rust ed CA. The CA cert ificat e cont ent will be provided by your vendor/ I SP/ I TSP and is used t o aut hent icat e t he Aut o- Configurat ion Server ( ACS) t hat t he CPE will connect t o. Ent er a cert ificat e nam e and click Apply t o im port t he CA cert ificat e. 119 6 .1 1 Multicast I nput new I GMP or MLD prot ocol configurat ion fields if you want m odify default values shown. Then click Apply/ Sa ve . Mult icast Precedence: Select precedence of m ulticast packets. 120 M u lt ica st St r ict Gr oupin g En for ce m e n t : Enable/ Disable m ult icast st rict grouping. I tem D e scr ip t ion Default Version Define I GMP using version wit h video server. Query I nt erval The query int erval is t he am ount of t im e in seconds bet ween I GMP General Query m essages sent by t he router ( if the router is the querier on this subnet) . The default query int erval is 125 seconds. Query Response I nt erval The query response int erval is t he m axim um am ount of t im e in seconds t hat t he I GMP rout er wait s t o receive a response t o a General Query m essage. The query response int erval is t he Maxim um Response Tim e field in t he I GMP v2 Host Mem bership Query m essage header. The default query response int erval is 10 seconds and m ust be less than the query interval. Last Mem ber Query I nterval The last m em ber query int erval is t he am ount of t im e in seconds t hat t he I GMP rout er wait s t o receive a response t o a Group- Specific Query m essage. The last m em ber query int erval is also t he am ount of tim e in seconds bet ween successive Group- Specific Query m essages. The default last m em ber query interval is 10 seconds. Robust ness Value The robust ness variable is a way of indicat ing how suscept ible t he subnet is t o lost packet s. I GMP can recover from robust ness variable m inus 1 lost I GMP packet s. The robust ness variable should be set t o a value of 2 or great er. The default robust ness variable value is 2. Maxim um Mult icast Gr o u p s Set t ing t he m axim um num ber of Mult icast groups. Maxim um Mult icast Dat a Sources ( for I GMPv3) Define the m axim um m ulticast video stream num ber. Maxim um Mult icast Group Mem bers Setting the m axim um num ber of groups that ports can accept. Fast Leave Enable When you enable I GMP fast- leave processing, t he switch im m ediately rem oves a port when it detects an I GMP version 2 leave m essage on t hat port . 121 I GMP Group Except ion List / MLD Group Except ion List I tem Group Address Mask/ Mask Bit s Rem ove D e scr ip t ion This is t he delim it ed list of ignored m ult icast addresses being queried when sending a Group- Specific or Group- and- Source- Specific Query. This is t he delim it ed list of ignored m ult icast m ask being queried when sending a Group- Specific or Group- and- Source- Specific Query. Allows a user t o rem ove a specific it em in t he exception list. 122 6 .1 2 W ireless 6 .1 2 .1 SSI D This page allows you t o configure t he Virt ual int erfaces for each Physical int erface. Click t he Apply but t on t o apply your changes. The set t ings shown above are described below. I tem Wireless I nterface BSS- MAC ( SSI D) BSS Enabled Network Nam e ( SSI D) Net work Type AP I solat ion BSS Max Associat ions Lim it D e scr ip t ion Select which wireless int erface t o configure Select desired BSS t o configure Enable or disable t his SSI D Set s t he net work nam e ( also known as SSI D) of t his net w or k Select ing Close d hides t he net work from act ive scans. Select ing Open reveals t he network from act ive scans. Select ing On enables AP I solat ion m ode. When enabled, STAs associat ed wit h t he AP will not be able t o com m unicat e wit h each ot her. Set s t he m axim um associat ions for t his BSS 123 WMM Advert ise WMF When WMM is enabled for t he radio, select ing On allows WMM t o be advert ised in beacons and probes for t his BSS. Off disables advert isem ent of WMM in beacons and probes. Choose On t o enable Wireless Mult icast Forwarding on t his BSS. Off disables t his feat ure. 6 .1 2 .2 Security This page allows you t o configure securit y for t he wireless LAN int erfaces. Click t he Apply but t on t o apply your changes. For inform at ion on each param et er, m ove the cursor over the param eter that you are interested in ( as shown here) . 124 6.12.3 W PS This page allows you t o configure WPS. Click t he Apply but t on t o apply your changes. For inform at ion on each param et er, m ove the cursor over the param eter that you are interested in ( as shown here) . 125 6 .1 2 .4 MAC Filtering This page allows you to configure the MAC Filtering for each Physical interface. Click t he Apply but t on t o apply your changes. For inform at ion on each param et er, m ove the cursor over the param eter that you are interested in ( as shown here) . 126 6 .1 2 .5 W ireless W DS( W ireless Distribution System ) This page allows you to configure the Physical Wireless interfaces. Click t he Apply but t on t o apply your changes. For inform at ion on each param et er, m ove the cursor over the param eter that you are interested in ( as shown here) . N ot e: With reference to the above setup, please ensure that the conditions below are m et, and both devices are rebooted afterwards: 127 1. Ensure t hat t he first Com t rend device ( hom e rout er) does not use t he sam e I P address as t he second Com t rend wireless device ( wireless WDS) . See sect ion 5.3 LAN, for det ails on how t o change t he I P address. 128 2. Both devices need to have the sam e fixed channel. See section 6.12.6 Advanced for det ails. 129 3. Bot h devices need t o have a ( different ) fixed access SSI D ( Net work Nam e) . See sect ion 6.12.1 SSI D for det ails. 130 4. Bot h devices need t o have 802.11 Aut hent icat ion Open and WPA2- PSK/ WPA3- SAE disabled. See sect ion 6.12.2 Securit y for det ails. 131 5. Bot h devices ( A & B) need t o have each ot her's MAC address. See sect ion 6.12.5 Wireless WDS for details. 6. Now m ake sure t o reboot bot h devices. See sect ion 8.8 Reboot for det ails. 132 6 .1 2 .6 Advanced This page allows you to configure the Physical Wireless interfaces. 2 .4 GHz 133 5 GHz Click t he Apply but t on t o apply your changes. For inform at ion on each param et er, m ove t he cursor over t he param et er t hat you are int erest ed in ( as shown here) . 134 135 Cha pt e r 7 D ia gnost ics You can reach t his page by clicking on t he following icon locat ed at t he t op of t he scr een . 7 .1 Diagnostics I ndividual Tests The first Diagnost ics screen is a dashboard t hat shows overall connect ion st at us. Click t he Diagnost ics Menu it em on t he left side of t he screen t o display t he individual connections. 136 7 .2 Et hernet OAM The Et hernet OAM ( Operat ions, Adm inist rat ion, Managem ent ) page provides set t ings t o enable/ disable 802.3ah, 802.1ag/ Y1.731 OAM prot ocols. To enable Et hernet Link OAM ( 802.3 ah) , click Enabled t o display t he full configurat ion list . At least one opt ion m ust be enabled for 802.1ah. Item WAN I nt erface OAM I D Aut o Event Variable Ret rieval Link Event s Rem ot e Loopback Act ive m ode Description Select layer 2 WAN int erface for out going OAM packet s OAM I dent ificat ion num ber Support s OAM aut o event Support s OAM variable ret rieval Support s OAM link event s Support s OAM rem ove loopback Support s OAM act ive m ode 137 To enable Et hernet Service OAM ( 802.1ag/ Y1731) , click Enabled t o display t he full configuration list. Click Apply/ Sa ve t o im plem ent new configurat ion set t ings. Item Description WAN I nt erface Select from t he list of WAN I nt erfaces t o send OAM pack et s MD Level Maint enance Dom ain Level MD Nam e Maint enance Dom ain nam e MA I D Maint enance Associat ion I dent ifier Local MEP I D Local Maint enance associat ion End Point I dent ifier Local MEP VLAN I D VLAN I P used for Local Maint enance End point 138 Click CCM Transm ission t o enable CPE sending Cont inuit y Check Message ( CCM) cont inuously. Rem ot e MEP I D Maint enance associat ion End Point I dent ifier for t he rem ot e r eceiv er To perform Loopback/ Linkt race OAM t est , ent er t he Target MAC of t he dest inat ion and click " Send Loopback" or " Send Linkt race" but t on. Target MAC Linkt race TTL MAC Address of t he dest inat ion t o send OAM loopback/ linktrace packet Tim e t o Live value for t he loopback/ linkt race packet 7.3 Ping I nput the I P address/ hostnam e and click the Ping button to execute ping diagnostic t est t o send t he I CMP request t o t he specified host . 139 7 .4 Trace Route I nput the I P address/ hostnam e and click the TraceRoute button to execute the t race rout e diagnost ic t est t o send t he I CMP packet s t o t he specified host . 140 Cha pt e r 8 M a na ge m e nt You can reach t his page by clicking on t he following icon locat ed at t he t op of t he scr een . The Managem ent m enu has t he following m aint enance funct ions and processes: 8 .1 Settings This includes Backup Set t ings, Updat e Set t ings, and Rest ore Default screens. 8 .1 .1 Backup Settings To save t he current configurat ion t o a file on your PC, click Ba ck up Se t t in gs. You will be prom pt ed for backup file locat ion. This file can lat er be used t o recover settings on the Update Set t ings screen, as described below. 141 8 .1 .2 Update Settings This opt ion recovers configurat ion files previously saved using Ba ck up Se t t ings. Press Br ow se ... t o search for t he file, or ent er t he file nam e ( including folder pat h) in the File N am e box, and then click Update Set t ings to recover settings. 8 .1 .3 Restore Default Click Re st or e D e fa u lt Se t t ings t o rest ore fact ory default set t ings. After Rest ore Default Set t ings is clicked, t he following screen appears. 142 Close t he browser and wait for 2 m inut es before reopening it . I t m ay also be necessary, t o reconfigure your PC I P configurat ion t o m at ch any new set t ings. N OTE: This ent ry has t he sam e effect as t he Re se t but t on. The VR- 3071 board hardware and the boot loader support the reset to default. I f the Reset but t on is cont inuously pressed for m ore t han 10 seconds, t he current configurat ion dat a will be erased. I f the Reset but t on is cont inuously pressed for m ore t han 60 seconds, the boot loader will erase all configuration data saved in flash m em ory and enter bootloader m ode. 143 8 .2 System Log This funct ion allows a syst em log t o be kept and viewed upon request . Follow t he st eps below t o configure, enable, and view t he syst em log. STEP 1 : Click Configu r e Syst e m Log, as shown below ( circled in Re d) . STEP 2 : Select desired options and click Apply/ Save. Consult t he t able below for det ailed descript ions of each syst em log opt ion. I tem Log D e scr ip t ion I ndicat es whet her t he syst em is current ly recording event s. The user can enable or disable event logging. By default , it is disabled. To enable it , select t he Enable radio but t on and t hen click Apply/ Save. 144 Log Lev el Allows you to configure t he event level and filt er out unwant ed event s below t his level. The event s ranging from t he highest crit ical level " Em ergency" down t o t his configured level will be recorded t o t he log buffer on t he VR- 3071 SDRAM. When t he log buffer is full, t he newer event will wrap up to the top of the log buffer and overwrite the old event. By default , the log level is " Debugging", which is the lowest critical level. The log levels are defined as follows: Em ergency = syst em is unusable Alert = act ion m ust be t aken im m ediat ely Crit ical = crit ical condit ions Error = Error condit ions Warning = norm al but significant condit ion Not ice= norm al but insignificant condit ion I nform at ional= provides inform at ion for reference Debugging = debug- level m essages Em ergency is t he m ost serious event level, whereas Debugging is t he least im port ant . For inst ance, if t he log level is set t o Debugging, all the events from the lowest Debugging level to the m ost critical level Em ergency level will be recorded. I f t he log level is set t o Error, only Error and t he level above will be logged. Display Lev el Allows the user to select the logged events and displays on the View System Log window for events of this level and above to the highest Em ergency level. Mode Allows you to specify whet her event s should be st ored in the local m em ory, or be sent t o a rem ot e syst em log server, or bot h sim ult aneously. I f rem ot e m ode is select ed, view syst em log will not be able t o display event s saved in t he rem ot e syst em log server. When eit her Rem ot e m ode or Bot h m ode is configured, t he WEB UI will prom pt t he user t o ent er t he Server I P address and Server UDP port . STEP 3 : Click Vie w Syst e m Log. The result s are displayed as follows. 145 8 .3 SNMP Agent Sim ple Net work Managem ent Prot ocol ( SNMP) allows a m anagem ent applicat ion t o ret rieve st at ist ics and st at us from t he SNMP agent in t his device. Select t he En a ble radio but t on, configure opt ions, and click Sa ve / Apply t o act ivat e SNMP. 146 8 .4 TR- 0 6 9 Clie n t WAN Managem ent Prot ocol ( TR- 069) allows an Aut o- Configurat ion Server ( ACS) t o perform auto- configuration, provision, collection, and diagnostics to this device. Select desired values and click Apply/ Sa ve t o configure TR- 069 client opt ions. The t able below is provided for ease of reference. I tem Enable TR- 069 OUI - serial I nform D e scr ip t ion Tick t he checkbox t o enable. The serial num ber used t o ident ify t he CPE when m aking a connect ion t o t he ACS using t he CPE WAN Managem ent Prot ocol. Select MAC t o use t he rout er 's MAC address as serial num ber t o aut hent icat e wit h t he ACS or select serial num ber t o use t he rout er 's serial num ber. Disable/ Enable TR- 069 client on t he CPE. 147 I nform I nterval The durat ion in seconds of t he int erval for which t he CPE MUST at t em pt t o connect wit h t he ACS and call t he I nform method. ACS URL URL for t he CPE t o connect t o t he ACS using t he CPE WAN Managem ent Prot ocol. This param et er MUST be in t he form of a valid HTTP or HTTPS URL. An HTTPS URL indicat es t hat t he ACS support s SSL. The " host " port ion of t his URL is used by t he CPE for validat ing t he cert ificat e from t he ACS when using cert ificat e- based au t h en t icat ion . ACS User Nam e Usernam e used t o aut hent icat e t he CPE when m aking a connect ion t o t he ACS using t he CPE WAN Managem ent Prot ocol. This usernam e is used only for HTTP- based aut hent icat ion of t he CPE. ACS Password Password used t o aut hent icat e t he CPE when m aking a connect ion t o t he ACS using t he CPE WAN Managem ent Prot ocol. This password is used only for HTTP- based aut hent icat ion of t he CPE. WAN I nterface used by TR- 069 client Choose Any_WAN, LAN, Loopback or a configured con n ect ion . Conne ct ion Re que st Aut hent icat ion Tick t he checkbox t o enable. User Nam e Usernam e used t o aut hent icat e an ACS m aking a Connect ion Request t o t he CPE. Passw o r d Password used t o aut hent icat e an ACS m aking a Connect ion Request t o t he CPE. URL I P address and port t he ACS uses t o connect t o t he rout er. The Se nd I n for m but t on forces t he CPE t o est ablish an im m ediat e connect ion t o t he ACS. 148 8.5 I nternet Tim e This opt ion aut om at ically synchronizes t he rout er t im e wit h I nt ernet t im eservers. To enable t im e synchronizat ion, t ick t he corresponding checkbox , choose your preferred tim e server( s) , select the correct tim e zone offset , and click Apply/ Save. N OTE: I nt ernet Tim e m ust be act ivat ed t o use. See 5.4 Parent al Cont rol. The int ernet t im e feat ure will not operat e when t he rout er is in WDSd m ode, since t he rout er would not be able t o connect t o t he NTP t im eserver. 149 8 .6 Acce ss Cont r ol 8 .6 .1 Accounts This screen is used t o configure t he user account access passwords for t he device. Access t o t he VR- 3071 is cont rolled t hrough t he following user account s: The root account has unrest rict ed access t o view and change t he configurat ion of your Broadband rout er. Use t he fields t o updat e passwords for t he account s, add/ rem ove account s ( m ax of 5 accounts) as well as adj ust their specific privileges. 150 Not e: Passwords m ay be as long as 16 charact ers but m ust not cont ain a space. Click Sa ve / Apply t o cont inue. 151 8 .6 .2 Services The Services opt ion lim it s or opens t he access services over t he LAN or WAN. These access services available are: HTTP, SSH, TELNET, SNMP, HTTPS, FTP, TFTP and I CMP. Enable a service by select ing it s dropdown list box. Click Apply/ Sa ve to activate. ( I t u na ble t o m odify any Wi- Fi param et ers, inclu de Wi- Fi power set t ing. And COMTREND's Product will follow Market 's st andard requirem ent ) 152 8 .6 .3 I P Address The I P Address Access Cont rol m ode, if enabled, perm it s access t o local m anagem ent services from I P addresses cont ained in t he Access Cont rol List . I f t he Access Cont rol m ode is disabled, t he syst em will not validat e I P addresses for incom ing packet s. The services are t he syst em applicat ions list ed in t he Service Cont rol List be side I CM P. Click t he Add but t on t o display t he following. Configure t he address and subnet of t he m anagem ent st at ion perm it t ed t o access the local m anagem ent services, and click Save/ Apply. 153 I P Address I P address of the m anagem ent st at ion. Subnet Mask Subnet address for t he m anagem ent st at ion. I nt erface Access perm ission for the specified address, allowing the address to access the local m anagem ent service from none/ lan/ wan/ lan&wan interfaces. 154 8 .7 Update Softw are This opt ion allows for firm ware upgrades from a locally st ored file. ( I t u na ble t o m odify any Wi- Fi param et ers, inclu de Wi- Fi power set t ing. And COMTREND's Product will follow Market 's st andard requirem ent ) STEP 1 : Obt ain an updat ed soft ware im age file from your I SP. STEP 2 : Ent er t he pat h and filenam e of t he firm ware im age file in t he Soft w a r e File Nam e field or click the Brow se button to locate the im age file. STEP 3 : Click t he Upda t e Soft w a r e but t on once t o upload and inst all t he file. N OTE: The updat e process will t ake about 2 m inut es t o com plet e. The device will reboot and the browser window will refresh to the default screen upon successful inst allat ion. I t is recom m ended that you com pare the Softw are Version on the Device I nform ation screen with the firm ware version installed, to confirm the installat ion was successful. 155 8.8 Reboot To save t he current configurat ion and reboot t he rout er, click Re boot . N OTE: You m ay need t o close t he browser window and wait for 2 m inut es before reopening it . I t m ay also be necessary, t o reset your PC I P configurat ion. 156 Cha pt e r 9 Logout To log out from t he device sim ply click t he following icon locat ed at t he t op of your scr een . When t he following window pops up, click t he OK but t on t o exit t he rout er. Upon successful exit , t he following m essage will be displayed. 157 Appendix A - Firew all STATEFUL PACKET I N SPECTI ON Refers t o an archit ect ure, where t he firewall keeps t rack of packet s on each connect ion t raversing all it s int erfaces and m akes sure t hey are valid. This is in contrast to static packet filtering which only exam ines a packet based on the inform at ion in t he packet header. D EN I AL OF SERVI CE ATTACK I s an incident in which a user or organization is deprived of the services of a resource t hey would norm ally expect t o have. Various DoS at t acks t he device can wit hst and are ARP At t ack, Ping At t ack, Ping of Deat h, Land, SYN At t ack, Sm urf At t ack, and Tear Drop. TCP/ I P/ PORT/ I N TERFACE FI LTER These rules help in t he filt ering of t raffic at t he Net work layer ( i.e. Layer 3) . When a Rout ing int erface is creat ed, Ena ble Fir e w a ll m ust be checked. Navigat e t o Advanced Set up Securit y I P Filt ering. OUTGOI N G I P FI LTER Helps in set t ing rules t o DROP packet s from t he LAN int erface. By default , if t he Firewall is Enabled, all I P t raffic from t he LAN is allowed. By set t ing up one or m ore filt ers, specific packet t ypes com ing from t he LAN can be dropped. Exam ple 1 : Filt er Nam e Prot ocol Source I P address Source Subnet Mask Source Port Dest . I P Address Dest . Subnet Mask Dest . Port : Out _Filt er1 : TCP : 192.168.1.45 : 255.255.255.0 : 80 : NA : NA : NA This filt er will Drop all TCP packet s com ing from t he LAN wit h I P Address/ Subnet Mask of 192.168.1.45/ 24 having a source port of 80 irrespect ive of the dest inat ion. All ot her packets will be Accept ed. Exam ple 2 : Filt er Nam e Prot ocol Source I P Address Source Subnet Mask Source Port Dest . I P Address Dest . Subnet Mask Dest . Port : Out _Filt er2 : UDP : 192.168.1.45 : 255.255.255.0 : 5060: 6060 : 172.16.13.4 : 255.255.255.0 : 6060: 7070 This filt er will drop all UDP packet s com ing from t he LAN wit h I P Address / Subnet Mask of 192.168.1.45/ 24 and a source port range of 5060 t o 6060, destined to 172.16.13.4/ 24 and a destination port range of 6060 to 7070. I N COM I N G I P FI LTER Helps in set t ing rules t o Allow or Deny packet s from t he WAN int erface. By default , all incom ing I P t raffic from t he WAN is Blocked, if t he Firewall is Enabled. By set t ing up one or m ore filt ers, specific packet t ypes com ing from t he WAN can be Accept ed. 158 Exam ple 1 : Filt er Nam e : I n_Filt er1 Prot ocol : TCP Policy : Allow Source I P Address : 210.168.219.45 Source Subnet Mask : 255.255.0.0 Source Port : 80 Dest . I P Address : NA Dest . Subnet Mask : NA Dest . Port : NA Select ed WAN int erface : br0 This filt er will ACCEPT all TCP packet s com ing from WAN int erface " br0" wit h I P Address/ Subnet Mask 210.168.219.45/ 16 wit h a source port of 80, irrespect ive of t he dest inat ion. All ot her incom ing packet s on t his int erface are DROPPED. Exam ple 2 : Filt er Nam e : I n_Filt er2 Prot ocol : UDP Policy : Allow Source I P Address : 210.168.219.45 Source Subnet Mask : 255.255.0.0 Source Port : 5060: 6060 Dest . I P Address : 192.168.1.45 Dest . Sub. Mask : 255.255.255.0 Dest . Port : 6060: 7070 Select ed WAN int erface : br0 This rule will ACCEPT all UDP packet s com ing from WAN int erface " br0" wit h I P Address/ Subnet Mask 210.168.219.45/ 16 and a source port in t he range of 5060 to 6060, destined to 192.168.1.45/ 24 and a destination port in the range of 6060 t o 7070. All ot her incom ing packet s on t his int erface are DROPPED. MAC LAYER FI LTER These rules help in t he filt ering of Layer 2 t raffic. MAC Filt ering is only effect ive in WDS m ode. Aft er a WDS m ode connect ion is creat ed, navigat e t o Advanced Set up Securit y MAC Filt ering in t he WUI . Exam ple 1 : Global Policy Prot ocol Type Dest . MAC Address Source MAC Address Src. I nterface Dest. I nterface : Forwarded : PPPoE : 00: 12: 34: 56: 78: 90 : NA : eth1 : eth2 Addit ion of t his rule drops all PPPoE fram es going from et h1 t o et h2 wit h a Dest inat ion MAC Address of 00: 12: 34: 56: 78: 90 irrespect ive of it s Source MAC Address. All other fram es on this interface are forwarded. Exam ple 2 : Global Policy Prot ocol Type Dest . MAC Address Source MAC Address Src. I nterface Dest. I nterface : Blocked : PPPoE : 00: 12: 34: 56: 78: 90 : 00: 34: 12: 78: 90: 56 : eth1 : eth2 Addit ion of t his rule forwards all PPPoE fram es going from et h1 t o et h2 wit h a Dest inat ion MAC Address of 00: 12: 34: 56: 78 and Source MAC Address of 00: 34: 12: 78: 90: 56. All other fram es on this interface are dropped. 159 D AYTI M E PAREN TAL CON TROL This feat ure rest rict s access of a select ed LAN device t o an out side Net work t hrough t he VR- 3071, as per chosen days of t he week and t he chosen t im es. Exam ple: User Nam e : Filt erJohn Browser's MAC Address : 00: 25: 46: 78: 63: 21 Days of t he Week : Mon, Wed, Fri St art Blocking Tim e : 14: 00 End Blocking Tim e : 18:00 Wit h t his rule, a LAN device wit h MAC Address of 00: 25: 46: 78: 63: 21 will have no access t o t he WAN on Mondays, Wednesdays, and Fridays, from 2pm t o 6pm . On all ot her days and t im es, t his device will have access t o t he out side Net w or k . 160 Appendix B - Pin Assignm ents Giga ETH ERN ET Por t s ( RJ4 5 ) Pin Name Descr ipt ion 1 BI _DA+ Bi-directional pair A + 2 BI _DA- Bi-directional pair A - 3 BI _DB+ Bi-directional pair B + 4 BI _DC+ Bi-directional pair C + 5 BI _DC- Bi-directional pair C - 6 BI _DB- Bi-directional pair B - 7 BI _DD+ Bi-directional pair D + 8 BI _DD- Bi-directional pair D - 161 Appendix C Specifications Hardw are RJ- 11 X1 for VDSL2 ( 35b) / ADSL2+ ( Annex A) RJ- 45 X 4 for GELAN RJ- 45 X 1 for GEWAN Reset but t on X 1 2.4G WiFi on/ off, WPS but t on X 1 5G WiFi on/ off, WPS but t on X 1 I nt ernal Ant enna X 4 Power swit ch X 1 ADSL G. 9 9 4 G.992.1 ( G.dm t ) Annexes A G.992.2 ( G.lit e) Annexes A ANSI T1.413 G.992.3 ( ADSL2) Annexes A G.992.5 ( ADSL2+ ) Annexes A VDSL G.993.2( VDSL2) 35b, 17a, 12a, 12b, 8a, 8b, 8c, 8d G.993.5 ( G.vect or) G.998.4 ( G.I NP) SRA ( Seam less Rat e Adapt at ion) UPBO ( Upst ream Power Back- off ) Et hernet I EEE 802.3, I EEE 802.3u I EEE 802.3ab 10/ 100 / 1000 BASE-T, aut o- sense Support MDI / MDX Netw orking Protocols RFC 2364 ( PPPoA) , RFC 2684 ( RFC 1483) WDS/ Rout er, RFC 2516 ( PPPoE) ; RFC 1577 ( I PoA) PPPoE Pass-Through, Mult iple PPPoE Sessions on Single WAN I nt erface PPPoE Filt ering of Non- PPPoE Packet s Bet ween WAN and LAN Transparent Bridging Bet ween all LAN and WAN I nt erfaces 802.1p/ 802.1q VLAN, DSCP I GMP Proxy V1/ V2/ V3, I GMP Snooping V1/ V2/ V3, Fast leave St at ic rout e, RI P v1/ v2, ARP, RARP, SNTP DHCP Server/ Client / Relay, DNS Proxy/ Relay, Dynam ic DNS, UPnP, DLNA I Pv6 Dual St ack, I PV6 Rapid Deploym ent ( 6RD) 162 Managem ent TR- 069/ TR- 098/ TR- 104/ TR- 111/ TR- 181, SNMP, Telnet , Web- Based Managem ent , Configurat ion Backup and Rest orat ion Soft ware Upgrade via HTTP, TFTP Server, or FTP Server Firew all/ Filtering St at eful Packet I nspect ion Firewall St at eless Packet Filt er URI / URL Filt ering TCP/ I P/ Port / I nt erface Filt ering Rules Support Bot h I ncom ing and Out going Filt ering NAT/ PAT Port Triggering Port Forwarding ( Virt ual Server) Sym m et ric port- overloading NAT, Full- Cone NAT DMZ host VPN Pass Through ( PPTP, L2TP, I PSec) W ireless I EEE 802.11n, 2.4GHz, 2T2R Backward com patible with 802.11g/ b 2412 - 2462 MHz I EEE 802.11ac,5GHz, 2T2R, Backward com patible with 802.11n/ a U- NI I - 1 ( 51505250 MHz ) U- NI I - 2a ( 52505350 MHz ) opt ional U- NI I - 2c/ 2e ( 54705725 MHz ) opt ional U- NI I - 3 ( 57255825 MHz ) WPA/ WPA- PSK, WPA2/ WPA2- PSK wit h TKI P & AES Securit y Type Mult iple SSI D MAC Address Filt ering Pow er Supply Ext ernal power adapt er : I nput : 12Vdc / 3.0A or 2.0A Out put : USB3.0, 900mA Environm ent Operat ing Tem perat ure: 0° C ~ 40° C ( 32° F ~ 104° F) Operat ing Hum idit y: 10% ~ 90% non- condensing St orage Tem perat ure: - 25° C ~ 65° C ( - 23° F ~ 149° F) St orage Hum idit y: 5% ~ 90% non- condensing 163 Kit W eight ( 1* VR- 3071, 1* RJ11 cable, 1* RJ45 cable, 1* power adapt er) = 0.8 kg N OTE: Specificat ions are subject t o change wit hout not ice. * The PRT- 6 3 0 1 is t he sam e as VR- 3071,wit hout t he xDSL funct ion. 164 Appe ndix D - SSH Clie nt Unlike Microsoft Windows, Linux OS has a ssh client included. For Windows users, there is a public dom ain one called " putty" that can be downloaded from here: http: / / www.chiark.greenend.org.uk/ ~ sgtatham / putty/ download.htm l To access t he ssh client you m ust first enable SSH access for t he LAN or WAN from t he Managem ent Access Cont rol Services m enu in t he web user int erface. To access t he rout er using t he Linux ssh client For LAN access, t ype: ssh - l root 192.168.1.1 For WAN access, t ype: ssh - l root WAN I P address To access t he rout er using t he Windows " put t y" ssh client For LAN access, t ype: put t y - ssh - l root 192.168.1.1 For WAN access, t ype: put t y - ssh - l root WAN I P address N OTE: The WAN I P address can be found on t he Device I nfo WAN screen 165 Appendix E - Printer Server These st eps explain t he procedure for enabling t he Print er Server. N OTE: This funct ion only applies t o m odels wit h a USB host port . STEP 1 : Enable Print Server from Web User I nt erface. Select t he Enable on- board print server checkbox and input Print er nam e & Make and m odel. Click the Apply/ Save button. N OTE: The Pr int e r na m e can be any t ext st ring up t o 40 charact ers. The M a k e a nd m odel can be any t ext st ring up t o 128 charact ers. 166 STEP 2 : Click t he Windows st art but t on. Then select Cont rol Pa ne l. 167 STEP 3 : Select Devices and Print ers. STEP 4 : Select Add a print er. 168 STEP 5 : Select Add a net w ork , w ireless or Bluet oot h print er. STEP 6 : Click t he St op but t on. Select Th e pr in t e r t ha t I w a n t isn 't list e d. 169 STEP 7 : Choose Se le ct a sha r e d pr int e r by na m e . Then input t he print er link and click N ext . ht t p: / / LAN I P: 631/ print ers/ t he nam e of t he print er N OTE: The print er nam e m ust be t he sam e nam e input t ed in t he WEB UI " print er server settings" as in st ep 1. STEP 8 : Select the m anufact urer and m odel of your print er t hen, click OK. 170 STEP 9 : The print er has been successfully inst alled. Click t he N e x t but t on. STEP 1 0 : Click Finish ( or print a t est page if required) . 171 STEP 1 1 : Go t o Cont r ol Pa n e l All Con t r ol Pa n e l I t e m s D e vice s a nd Print ers t o confirm that the print er has been configured. 172 Appe ndix F - Conne ct ion Se t up Creat ing a WAN connect ion is a t wo- st age process. 1 - Set up a Layer 2 I nt erface ( ATM, PTM or Et hernet ) . 2 - Add a WAN connect ion t o t he Layer 2 I nt erface. The following sect ions describe each st age in t urn. F1 ~ Layer 2 I nterfaces Every layer2 int erface operat es in Mult i- Service Connect ion ( VLAN MUX) m ode, which support s m ult iple connect ions over a single int erface. Not e t hat PPPoA and I PoA connect ion t ypes are not support ed for Et hernet WAN int erfaces. Aft er adding WAN connect ions t o an int erface, you m ust also creat e an I nt erface Group t o connect LAN/ WAN int erfaces. F1 .1 ATM I nterfaces Follow t hese procedures t o configure an ATM int erface. N OTE: The VR- 3071 support s up t o 16 ATM int erfaces. STEP 1 : Go t o Basic Set up the drop-down m enu. WAN Set up Select ATM I nt erface from 173 This t able is provided here for ease of reference. I tem I nterface VPI VCI DSL Lat ency Cat egory Peak Cell Rat e Sust ainable Cell Rat e Max Burst Size Link Type Connect ion Mode I P QoS Rem ove D e scr ip t ion WAN interface nam e ATM VPI ( 0- 255) ATM VCI ( 32- 65535) { Pat h0} port I D = 0 ATM service cat egory Maxim um allowed t raffic rat e for t he ATM PCR service con n ect ion The average allowable, long- t erm cell t ransfer rat e on t he VBR service connect ion The m axim um allowable burst size of cells t hat can be t ransm it t ed cont inuously on the VBR service connection Choose EoA ( for PPPoE, I PoE, and WDS) , PPPoA, or I PoA. Default Mode Single service over one connect ion Vlan Mux Mode Mult iple Vlan service over one connect ion Qualit y of Service ( QoS) st at us Select it em s for rem oval STEP 2 : Click Add t o proceed t o t he next screen. N OTE: To add WAN connect ions t o one int erface t ype, you m ust delet e exist ing connect ions from the other int erface type using t he rem ove but t on. 174 There are m any set t ings here including: VPI / VCI , DSL Link Type, Encapsulat ion Mode, Service Cat egory and Queue Weight . Here are t he available encapsulat ions for each xDSL Link Type: EoA- LLC/ SNAP- BRI DGI NG, VC/ MUX PPPoA- VC/ MUX, LLC/ ENCAPSULATI ON I PoA- LLC/ SNAP- ROUTI NG, VC MUX STEP 3 : Click Apply/ Sa ve t o confirm your choices. On t he next screen, check t hat t he ATM int erface is added t o t he list . For exam ple, an ATM int erface on PVC 0/ 35 in Default Mode wit h an EoA Link t ype is shown below. To add a WAN connect ion go t o Sect ion F2 ~ WAN Connect ions. 175 F1 .2 PTM I nterfaces Follow t hese procedures t o configure a PTM int erface. STEP 1 : Go t o Basic Set up the drop-down m enu. WAN Set up Select PTM I nt erface from This t able is provided here for ease of reference. I tem I nterface DSL Lat ency PTM Priorit y Connect ion Mode I P QoS Rem ove D e scr ip t ion WAN interface nam e. { Pat h0} port I D = 0 Norm al or High Priorit y ( Preem pt ion) . Default Mode Single service over one int erface. Vlan Mux Mode Mult iple Vlan services over one int erface. Qualit y of Service ( QoS) st at us. Select int erfaces t o rem ove. STEP 2 : Click Add t o proceed t o t he next screen. N OTE: To add WAN connect ions t o one int erface t ype, you m ust delet e exist ing connect ions from the other int erface type using t he rem ove but t on. 176 Default PTM int erface Qualit y of Service can be configured here, including Scheduler, and Queue Weight . STEP 3 : Click Apply/ Sa ve t o confirm your choices. On t he next screen, check t hat t he PTM int erface is added t o t he list . For exam ple, a PTM int erface in Default Mode is shown below. To add a WAN connect ion go t o Sect ion F2 ~ WAN Connect ions. 177 F1 .3 Et hernet W AN I nt erface The VR- 3071 support s a single Et hernet WAN int erface over t he ETH WAN port . Follow t hese procedures t o configure an Et hernet int erface. STEP 1 : Go t o Basic Set up WAN Set up Select ETHERNET I nt erface from the drop-down menu. This t able is provided here for ease of reference. I tem I nterface/ ( Nam e) Connect ion Mode Rem ove D e scr ip t ion WAN int erface nam e. Default Mode Single service over one int erface. Vlan Mux Mode Mult iple Vlan services over one int erface. Select int erfaces t o rem ove. STEP 2 : Click Add t o proceed t o t he next screen. 178 STEP 3 : Select an Et hernet port and Click Apply/ Sa ve t o confirm your choices. On t he next screen, check t hat t he ETHERNET int erface is added t o t he list . To add a WAN connect ion go t o Sect ion F2 ~ WAN Connect ions. 179 F2 ~ W AN Conne ct ions The VR- 3071 support s one WAN connect ion for each int erface, up t o a m axim um of 16 connections. To set up a WAN connect ion follow t hese inst ruct ions. STEP 1 : Go t o Basic Set up WAN Setup. STEP 2 : Click Add t o creat e a WAN connect ion. The following screen will display. STEP 3 : Choose a layer 2 int erface from t he drop- down box and click N e x t . The WAN Service Configurat ion screen will display as shown below. 180 N OTE: The WAN services shown here are t hose support ed by t he layer 2 interface you selected in the previous step. I f you wish to change your selection click the Back button and select a different layer 2 interface. STEP 4 : For VLAN Mux Connect ions only, you m ust ent er Priorit y & VLAN I D t ags. Select a TPI D if VLAN t ag Q- in- Q is used. STEP 5 : You will now follow t he inst ruct ions specific t o t he WAN service t ype you wish t o est ablish. This list should help you locat e t he correct procedure: ( 1) For PPP over ETHERNET ( PPPoE) I Pv4 ( 2) For I P over ETHERNET ( I PoE) I Pv4 ( 3) For Bridging I Pv4 ( 4) For PPP over ATM ( PPPoA) I Pv4 ( 5) For I P over ATM ( I PoA) I Pv4 ( 6) For PPP over ETHERNET ( PPPoE) I Pv6 ( 7) For I P over ETHERNET ( I PoE) I Pv6 ( 8) Bridging I Pv6 ( Not Support ed) ( 9) For PPP over ATM ( PPPoA) I Pv6 ( 10) I PoA I Pv6 ( Not Support ed) The subsect ions t hat follow cont inue t he WAN service set up procedure. 181 F2 .1 PPP over ETHERN ET ( PPPoE) I Pv4 STEP 1 : Select t he PPP over Et hernet radio but t on and click N e x t . STEP 2 : On t he next screen, ent er t he PPP set t ings as provided by your I SP. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 182 Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. The set t ings shown above are described below. PPP SETTI N GS The PPP Usernam e, PPP password and t he PPPoE Service Nam e ent ries are dependent on t he part icular requirem ent s of t he I SP. The user nam e can be a m axim um of 256 characters and the password a m axim um of 32 characters in lengt h. For Aut hent icat ion Met hod, choose from AUTO, PAP, CHAP, and MSCHAP. CON FI GURE KEEP- ALI VE Configures t he int erval and num ber of keep alive packet s ( PPP echo- request ) sent by t he device for t he PPP connect ion. I n t e r va l ( second) : Tim e bet ween sending out each PPP echo- request packet . N u m be r of r e t r ie s: Num ber of ret ries before PPP connect ion is dropped. 183 EN ABLE FULLCON E N AT This opt ion becom es available when NAT is enabled. Known as one- t o- one NAT, all requests from the sam e internal I P address and port are m apped to the sam e external I P address and port. An external host can send a packet to the internal host, by sending a packet to the m apped external address. DI AL ON DEMAN D The VR- 3071 can be configured t o disconnect if t here is no act ivit y for a period of t im e by select ing t he D ia l on de m a n d checkbox . You m ust also ent er an inactivity tim eout period in the range of 1 to 4320 m inutes. EN ABLE N AT I f t he LAN is configured wit h a privat e I P address, t he user should select t his checkbox . The NAT subm enu will appear in t he Advanced Set up m enu aft er reboot . On t he ot her hand, if a privat e I P address is not used on t he LAN side ( i.e. t he LAN side is using a public I P) , t his checkbox should not be select ed t o free up syst em resources for better perform ance. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed t o free up system resources for bet t er perform ance. USE STATI C I Pv4 ADDRESS Unless your service provider specially requires it , do not select t his checkbox . I f selected, enter the static I P address in the I Pv4 Address field. Don't forget t o adj ust t he I P configurat ion t o St at ic I P Mode as described in sect ion 3.2 I P Configurat ion. FI XED MTU Maxim um Transm ission Unit . The size ( in byt es) of largest prot ocol dat a unit which t he layer can pass onwards. This value is 1492 for PPPoE. EN ABLE PPP MAN UAL MODE Use t his but t on t o m anually connect / disconnect PPP sessions. EN ABLE PPP DEBUG MODE When t his opt ion is select ed, t he syst em will put m ore PPP connect ion inform at ion int o t he syst em log. This is for debugging errors and not for norm al usage. W D S PPPOE FRAM ES BETW EEN W AN AN D LOCAL PORTS ( This opt ion is hidden when PPP I P Ext ension is enabled) When Enabled, t his creat es local PPPoE connect ions t o t he WAN side. Enable t his opt ion only if all LAN- side devices are running PPPoE client s, ot herwise disable it . The VR- 3071 support s pass- t hrough PPPoE sessions from t he LAN side while sim ult aneously running a PPPoE client from non- PPPoE LAN devices. EN ABLE I GM P M ULTI CAST PROXY Tick t he checkbox t o enable I nt ernet Group Mem bership Prot ocol ( I GMP) m ult icast . This prot ocol is used by I Pv4 host s t o report t heir m ult icast group m em berships to any neighboring m ulticast routers. 184 EN ABLE I GM P M ULTI CAST SOURCE Enable t he WAN int erface t o be used as I GMP m ult icast source. STEP 3 : Choose an int erface t o be t he default gat eway. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 185 STEP 4 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be entered. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 186 STEP 5 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to m odify them . Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. 187 F2 .2 I P over ETHERN ET ( I PoE) I Pv4 STEP 1 : Select t he I P over Et hernet radio but t on and click N e x t . 188 STEP 2 : The WAN I P set t ings screen provides access t o t he DHCP server set t ings. You can select t he Obt a in a n I P a ddr e ss a u t om a t ica lly radio but t on t o enable DHCP ( use t he DHCP Opt ions only if necessary) . However, if you prefer, you can use t he St a t ic I P a ddr e ss m et hod inst ead t o assign WAN I P address, Subnet Mask and Default Gat eway m anually. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 189 STEP 3 : This screen provides access t o NAT, Firewall and I GMP Mult icast set t ings. Enable each by select ing t he appropriat e checkbox . Click N e x t t o continue or click Back to return to the previous step. EN ABLE N AT I f t he LAN is configured wit h a privat e I P address, t he user should select t his checkbox . The NAT subm enu will appear in t he Advanced Set up m enu aft er reboot . On t he ot her hand, if a privat e I P address is not used on t he LAN side ( i.e. t he LAN side is using a public I P) , t his checkbox should not be select ed, so as t o free up syst em resources for im proved perform ance. EN ABLE FULLCON E N AT This opt ion becom es available when NAT is enabled. Known as one- t o- one NAT, all requests from the sam e internal I P address and port are m apped to the sam e external I P address and port. An external host can send a packet to the internal host, by sending a packet to the m apped external address. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed so as t o free up syst em resources for bet t er perform ance. EN ABLE I GM P M ULTI CAST PROXY Tick t he checkbox t o enable I nt ernet Group Mem bership Prot ocol ( I GMP) m ult icast . This prot ocol is used by I Pv4 host s t o report t heir m ult icast group m em berships to any neighboring m ulticast routers. EN ABLE I GM P M ULTI CAST SOURCE Enable t he WAN int erface t o be used as I GMP m ult icast source. 190 STEP 4 : Choose an int erface t o be t he default gat eway. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 191 STEP 5 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be ent er ed. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 192 STEP 6 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to m odify them . Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. 193 F2 .3 Bridging I Pv4 STEP 1 : Select the Bridging radio button and click N ext . Allow as I GMP Multicast Source Click t o allow use of t his WDS WAN int erface as I GMP m ult icast source. Allow as MLD Multicast Source Click t o allow use of t his WDS WAN int erface as MLD m ult icast source. 194 STEP 2 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to return to the previous screen. Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. N OTE: I f t his WDS connect ion is your only WAN service, t he VR- 3071 will be inaccessible for rem ot e m anagem ent or t echnical support from t he WAN. 195 F2 .4 PPP over ATM ( PPPoA) I Pv4 STEP 1 : Click N e x t t o cont inue. 196 STEP 2 : On t he next screen, ent er t he PPP set t ings as provided by your I SP. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. PPP SETTI N GS The PPP usernam e and password are dependent on t he requirem ent s of t he I SP. The user nam e can be a m axim um of 256 charact ers and t he password a m axim um of 32 charact ers in lengt h. ( Aut hent icat ion Met hod: AUTO, PAP, CHAP, or MSCHAP.) CON FI GURE KEEP- ALI VE Configures t he int erval and num ber of keep alive packet s ( PPP echo- request ) sent by t he device for t he PPP connect ion. I n t e r va l ( second) : Tim e bet ween sending out each PPP echo- request packet . N u m be r of r e t r ie s: Num ber of ret ries before PPP connect ion is dropped. 197 EN ABLE FULLCON E N AT This opt ion becom es available when NAT is enabled. Known as one- t o- one NAT, all requests from the sam e internal I P address and port are m apped to the sam e external I P address and port. An external host can send a packet to the internal host, by sending a packet to the m apped external address. DI AL ON DEMAN D The VR- 3071 can be configured t o disconnect if t here is no act ivit y for a period of t im e by select ing t he D ia l on de m a n d checkbox . You m ust also ent er an inactivity tim eout period in the range of 1 to 4320 m inutes. EN ABLE N AT I f t he LAN is configured wit h a privat e I P address, t he user should select t his checkbox . The NAT subm enu will appear in t he Advanced Set up m enu aft er reboot . On t he ot her hand, if a privat e I P address is not used on t he LAN side ( i.e. t he LAN side is using a public I P) , t his checkbox should not be select ed t o free up syst em resources for better perform ance. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed t o free up system resources for bet t er perform ance. USE STATI C I Pv4 ADDRESS Unless your service provider specially requires it , do not select t his checkbox . I f selected, enter the static I P address in the I P Address field. Also, don't forget to adj ust t he I P configurat ion t o St at ic I P Mode as described in 3.2 I P Configurat ion. Fixed MTU Fixed Maxim um Transm ission Unit . The size ( in byt es) of largest prot ocol dat a unit which t he layer can pass onwards. This value is 1500 for PPPoA. EN ABLE PPP MAN UAL MODE Use t his but t on t o m anually connect / disconnect PPP sessions. EN ABLE PPP DEBUG MODE When t his opt ion is select ed, t he syst em will put m ore PPP connect ion inform at ion int o t he syst em log. This is for debugging errors and not for norm al usage. EN ABLE I GM P M ULTI CAST PROXY Tick t he checkbox t o enable I nt ernet Group Mem bership Prot ocol ( I GMP) m ult icast . This prot ocol is used by I Pv4 host s t o report t heir m ult icast group m em berships to any neighboring m ulticast routers. Enable I GMP Mult icast Source Enable t he WAN int erface t o be used as I GMP m ult icast source. STEP 3 : Choose an int erface t o be t he default gat eway. 198 Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 199 STEP 4 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be entered. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 200 STEP 5 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct , or click Back to m odify them . Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. 201 F2 .5 I P over ATM ( I PoA) I Pv4 STEP 1 : Click N e x t t o cont inue. STEP 2 : Ent er t he WAN I P set t ings provided by your I SP. Click N e x t t o cont inue. STEP 3 : This screen provides access t o NAT, Firewall and I GMP Mult icast set t ings. Enable each by select ing t he appropriat e checkbox . Click N e x t t o continue or click Back to return to the previous step. 202 EN ABLE N AT I f t he LAN is configured wit h a privat e I P address, t he user should select t his checkbox . The NAT subm enu will appear in t he Advanced Set up m enu aft er reboot . On t he ot her hand, if a privat e I P address is not used on t he LAN side ( i.e. t he LAN side is using a public I P) , t his checkbox should not be select ed, so as t o free up syst em resources for im proved perform ance. EN ABLE FULLCON E N AT This opt ion becom es available when NAT is enabled. Known as one- t o- one NAT, all requests from the sam e internal I P address and port are m apped to the sam e external I P address and port. An external host can send a packet to the internal host by sending a packet to the m apped external address. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed so as t o free up syst em resources for bet t er perform ance. EN ABLE I GM P M ULTI CAST PROXY Tick t he checkbox t o enable I nt ernet Group Mem bership Prot ocol ( I GMP) m ult icast . This prot ocol is used by I Pv4 host s t o report t heir m ult icast group m em berships to any neighboring m ulticast routers. Enable I GMP Mult icast Source Enable t he WAN int erface t o be used as I GMP m ult icast source. STEP 4 : Choose an int erface t o be t he default gat eway. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 203 N OTE: I f t he DHCP server is not enabled on anot her WAN int erface t hen t he following notification will be shown before the next screen. STEP 5 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be entered. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 204 STEP 6 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to m odify them . Aft er clicking Apply/ Save, t he new service should appear on the m ain screen. 205 F2 .6 PPP over ETHERN ET ( PPPoE) I Pv6 STEP 1 : Select t he PPP over Et hernet radio but t on. Then select I Pv6 only from t he drop-down box at the bottom off the screen and click N ext . STEP 2 : On t he next screen, ent er t he PPP set t ings as provided by your I SP. 206 Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. The set t ings shown above are described below. 207 PPP SETTI N GS The PPP Usernam e, PPP password and t he PPPoE Service Nam e ent ries are dependent on t he part icular requirem ent s of t he I SP. The user nam e can be a m axim um of 256 characters and the password a m axim um of 32 characters in lengt h. For Aut hent icat ion Met hod, choose from AUTO, PAP, CHAP, and MSCHAP. CON FI GURE KEEP- ALI VE Configures t he int erval and num ber of keep alive packet s ( PPP echo- request ) sent by t he device for t he PPP connect ion. I n t e r va l ( second) : Tim e bet ween sending out each PPP echo- request packet . N u m be r of r e t r ie s: Num ber of ret ries before PPP connect ion is dropped. EN ABLE FULLCON E N AT This opt ion becom es available when NAT is enabled. Known as one- t o- one NAT, all requests from the sam e internal I P address and port are m apped to the sam e external I P address and port. An external host can send a packet to the internal host, by sending a packet to the m apped external address. DI AL ON DEMAN D The VR- 3071 can be configured t o disconnect if t here is no act ivit y for a period of t im e by select ing t he D ia l on de m a n d checkbox . You m ust also ent er an inactivity tim eout period in the range of 1 to 4320 m inutes. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed t o free up system resources for bet t er perform ance. USE STATI C I Pv4 ADDRESS Unless your service provider specially requires it , do not select t his checkbox . I f selected, enter the static I P address in the I Pv4 Address field. Don't forget t o adj ust t he I P configurat ion t o St at ic I P Mode as described in sect ion 3.2 I P Configurat ion. USE STATI C I Pv6 ADDRESS Unless your service provider specially requires it , do not select t his checkbox . I f selected, enter the static I P address in the I Pv6 Address field. Don't forget t o adj ust t he I P configurat ion t o St at ic I P Mode as described in sect ion 3.2 I P Configurat ion. EN ABLE I Pv6 UN N UMBERED M ODEL The I P unnum bered configurat ion com m and allows you t o enable I P processing on a serial int erface wit hout assigning it an explicit I P address. The I P unnum bered interface can "borrow" the I P address of another interface already configured on the rout er, which conserves net work and address space. 208 LAUN CH D H CP6 C FOR AD D RESS ASSI GN M EN T ( I AN A) The I nt ernet Assigned Num bers Aut horit y ( I ANA) is a depart m ent of I CANN responsible for coordinating som e of the key elem ents that keep the I nternet running sm oot hly. Whilst t he I nt ernet is renowned for being a worldwide net work free from central coordination, there is a technical need for som e key parts of the I nt ernet t o be globally coordinat ed, and this coordinat ion role is undert aken by I ANA. Specifically, I ANA allocat es and m aint ains unique codes and num bering syst em s that are used in the technical standards ( " protocols" ) that drive the I nternet. I ANA's various act ivit ies can be broadly grouped in t o t hree cat egories: · Dom ain Nam es I ANA m anages t he DNS Root , t he .int and .arpa dom ains, and an I DN pract ices r esou r ce. · Num ber Resources I ANA coordinat es t he global pool of I P and AS num bers, providing t hem t o Regional I nt ernet Regist ries. · Prot ocol Assignm ent s I nt ernet prot ocols' num bering system s are m anaged by I ANA in conj unct ion with standards bodies. LAUN CH D H CP6 C FOR PREFI X D ELEGATI ON ( I APD ) An I dent it y Associat ion for Prefix Delegat ion ( I APD) is a collect ion of prefixes assigned t o a request ing device. A request ing device m ay have m ore t han one I APD; for exam ple, one for each of its interfaces. A prefix- delegat ing rout er ( DHCPv6 server) select s prefixes t o be assigned t o a request ing rout er ( DHCPv6 client ) upon receiving a request from t he client . The server can select prefixes for a requesting client by using st at ic and dynam ic assignm ent m echanism s. Adm inist rat ors can m anually configure a list of prefixes and associat ed preferred and valid lifet im es for an I APD of a specific client t hat is ident ified by it s DUI D. When t he delegat ing rout er receives a request from a client , it checks if t here is a st at ic binding configured for t he I APD in t he client 's m essage. I f a st at ic binding is present, the prefixes in the binding are returned to the client. I f no such binding is found, t he server at t em pt s t o assign prefixes for the client from other sources. An I Pv6 prefix delegat ing rout er can also select prefixes for a request ing rout er based on an ext ernal aut horit y such as a RADI US server using t he Fram ed- I Pv6- Prefix at t ribut e. LAUN CH D H CP6 C FOR RAPI D COM M I T Rapid- Com m it ; is t he process ( opt ion) in which a Request ing Rout er ( DHCP Client ) obtains "configurable inform ation" ( configurable param eters) from a Delegating Rout er ( DHCP Server) by using a rapid DHCPv6 t wo- m essage exchange. The m essages t hat are exchanged bet ween t he t wo rout ers ( RR and DR) are called t he DHCPv6 " SOLI CI T" m essage and t he DHCPv6 " REPLY" m essage. FI XED MTU Maxim um Transm ission Unit . The size ( in byt es) of largest prot ocol dat a unit which t he layer can pass onwards. This value is 1492 for PPPoE. EN ABLE PPP MAN UAL MODE Use t his but t on t o m anually connect / disconnect PPP sessions. EN ABLE PPP DEBUG MODE When t his opt ion is select ed, t he syst em will put m ore PPP connect ion inform at ion int o t he syst em log. This is for debugging errors and not for norm al usage. 209 W D S PPPOE FRAM ES BETW EEN W AN AN D LOCAL PORTS ( This opt ion is hidden when PPP I P Ext ension is enabled) When Enabled, t his creat es local PPPoE connect ions t o t he WAN side. Enable t his opt ion only if all LAN- side devices are running PPPoE client s, ot herwise disable it . The VR- 3071 support s pass- t hrough PPPoE sessions from t he LAN side while sim ult aneously running a PPPoE client from non- PPPoE LAN devices. EN ABLE M LD M ULTI CAST PROXY Mult icast List ener Discovery ( MLD) is a com ponent of t he I nt ernet Prot ocol Version 6 ( I Pv6) suit e. MLD is used by I Pv6 rout ers for discovering m ult icast list eners on a direct ly at t ached link, m uch like I GMP is used in I Pv4. The prot ocol is em bedded in I CMPv6 inst ead of using a separat e prot ocol. EN ABLE M LD M ULTI CAST SOURCE Click t o allow use of t his WAN int erface as Mult icast List ener Discovery ( MLD) m ulticast source. STEP 3 : Choose an int erface t o be t he default gat eway. Also, select a preferred WAN int erface as t he syst em default I Pv6 gat eway ( from t he drop- down box ) . Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. STEP 4 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be entered. 210 Select t he configured WAN int erface for I Pv6 DNS server inform at ion OR ent er t he st at ic I Pv6 DNS server Addresses. Not e t hat select ing a WAN int erface for I Pv6 DNS server will enable DHCPv6 Client on t hat int erface. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. STEP 5 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to m odify them . 211 Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. 212 F2 .7 I P over ETHERN ET ( I PoE) I Pv6 STEP 1 : Select t he I P over Et hernet radio but t on and click N e x t . Then select I Pv6 only from the drop- down box at the bottom off the screen and click N ext. 213 STEP 2 : The WAN I P set t ings screen provides access t o t he DHCP server set t ings. You can select t he Obt a in a n I Pv6 a ddr e ss a ut om a t ica lly radio but t on t o enable DHCP ( use t he DHCP Opt ions only if necessary) . How ever, if you prefer, you can use t he St a t ic I Pv6 a ddr e ss m et hod inst ead t o assign WAN I P address, Subnet Mask and Default Gat eway m anually. Ent er inform at ion provided t o you by your I SP t o configure t he WAN I Pv6 set t ings. Not ice: I f " Obt ain an I Pv6 address aut om at ically" is chosen, DHCP client will be enabled on t his WAN int erface. I f " Use t he following St at ic I Pv6 address" is chosen, ent er t he st at ic WAN I Pv6 address. I f the address prefix length is not specified, it will be default to / 64. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 214 D H CP6 C FOR AD D RESS ASSI GN M EN T ( I AN A) The I nt ernet Assigned Num bers Aut horit y ( I ANA) is a depart m ent of I CANN responsible for coordinating som e of the key elem ents that keep the I nternet running sm oot hly. Whilst t he I nt ernet is renowned for being a worldwide net work free from central coordination, there is a technical need for som e key parts of the I nt ernet t o be globally coordinat ed, and this coordinat ion role is undert aken by I ANA. Specifically, I ANA allocat es and m aint ains unique codes and num bering syst em s that are used in the technical standards ( " protocols" ) that drive the I nternet. I ANA's various act ivit ies can be broadly grouped in t o t hree cat egories: · Dom ain Nam es I ANA m anages t he DNS Root , t he .int and .arpa dom ains, and an I DN pract ices r esou r ce. · Num ber Resources I ANA coordinat es t he global pool of I P and AS num bers, providing t hem t o Regional I nt ernet Regist ries. · Prot ocol Assignm ent s I nt ernet prot ocols' num bering system s are m anaged by I ANA in conj unct ion with standards bodies. D H CP6 C FOR PREFI X D ELEGATI ON ( I APD ) An I dent it y Associat ion for Prefix Delegat ion ( I APD) is a collect ion of prefixes assigned t o a request ing device. A request ing device m ay have m ore t han one I APD; for exam ple, one for each of its interfaces. A prefix- delegat ing rout er ( DHCPv6 server) select s prefixes t o be assigned t o a request ing rout er ( DHCPv6 client ) upon receiving a request from t he client . The server can select prefixes for a requesting client by using st at ic and dynam ic assignm ent m echanism s. Adm inist rat ors can m anually configure a list of prefixes and associat ed preferred and valid lifet im es for an I APD of a specific client t hat is ident ified by it s DUI D. When t he delegat ing rout er receives a request from a client , it checks if t here is a st at ic binding configured for t he I APD in t he client 's m essage. I f a st at ic binding is present, the prefixes in the binding are returned to the client. I f no such binding is found, t he server at t em pt s t o assign prefixes for the client from other sources. An I Pv6 prefix delegat ing rout er can also select prefixes for a request ing rout er based on an ext ernal aut horit y such as a RADI US server using t he Fram ed- I Pv6- Prefix at t ribut e. W AN N EXT- HOP I Pv6 ADDRESS Specify t he Next- Hop I Pv6 address for t his WAN int erface. This address can be eit her a link local or a global unicast I Pv6 address. 215 STEP 3 : This screen provides access t o NAT, Firewall and I GMP Mult icast set t ings. Enable each by select ing t he appropriat e checkbox . Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. EN ABLE N AT I f t he LAN is configured wit h a privat e I P address, t he user should select t his checkbox . The NAT subm enu will appear in t he Advanced Set up m enu aft er reboot . On t he ot her hand, if a privat e I P address is not used on t he LAN side ( i.e. t he LAN side is using a public I P) , t his checkbox should not be select ed, so as t o free up syst em resources for im proved perform ance. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed so as t o free up syst em resources for bet t er perform ance. EN ABLE M LD M ULTI CAST PROXY Mult icast List ener Discovery ( MLD) is a com ponent of t he I nt ernet Prot ocol Version 6 ( I Pv6) suit e. MLD is used by I Pv6 rout ers for discovering m ult icast list eners on a direct ly at t ached link, m uch like I GMP is used in I Pv4. The prot ocol is em bedded in I CMPv6 inst ead of using a separat e prot ocol. EN ABLE M LD M ULTI CAST SOURCE Click t o allow use of t his WAN int erface as Mult icast List ener Discovery ( MLD) m ulticast source. Enable W AN int erface w it h base MAC Enable t his opt ion t o use t he rout er 's base MAC address as t he MAC address for t his WAN int erface. 216 STEP 4 : To choose an int erface t o be t he default gat eway. Also, select a preferred WAN int erface as t he syst em default I Pv6 gat eway ( from t he drop-down box). Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 217 STEP 5 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be entered. Select t he configured WAN int erface for I Pv6 DNS server inform at ion OR ent er t he st at ic I Pv6 DNS server Addresses. Not e t hat select ing a WAN int erface for I Pv6 DNS server will enable DHCPv6 Client on t hat int erface. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 218 STEP 6 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to m odify them . Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. 219 F2 .8 PPP over ATM ( PPPoA) I Pv6 STEP 1 : Select I Pv6 Only from t he drop- down box at t he bot t om of this screen and click N ext. 220 STEP 2 : On t he next screen, ent er t he PPP set t ings as provided by your I SP. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. PPP SETTI N GS The PPP usernam e and password are dependent on t he requirem ent s of t he I SP. The user nam e can be a m axim um of 256 charact ers and t he password a m axim um of 32 charact ers in lengt h. ( Aut hent icat ion Met hod: AUTO, PAP, CHAP, or MSCHAP.) 221 CON FI GURE KEEP- ALI VE Configures t he int erval and num ber of keep alive packet s ( PPP echo- request ) sent by t he device for t he PPP connect ion. I n t e r va l ( second) : Tim e bet ween sending out each PPP echo- request packet . N u m be r of r e t r ie s: Num ber of ret ries before PPP connect ion is dropped. EN ABLE FULLCON E N AT This opt ion becom es available when NAT is enabled. Known as one- t o- one NAT, all requests from the sam e internal I P address and port are m apped to the sam e external I P address and port. An external host can send a packet to the internal host, by sending a packet to the m apped external address. DI AL ON DEMAN D The VR- 3071 can be configured t o disconnect if t here is no act ivit y for a period of t im e by select ing t he D ia l on de m a n d checkbox . You m ust also ent er an inactivity tim eout period in the range of 1 to 4320 m inutes. EN ABLE FI REW ALL I f t his checkbox is select ed, t he Security subm enu will be displayed on t he Advanced Set up m enu aft er reboot . I f firewall is not necessary, t his checkbox should not be select ed t o free up system resources for bet t er perform ance. USE STATI C I Pv4 ADDRESS Unless your service provider specially requires it , do not select t his checkbox . I f selected, enter the static I P address in the I P Address field. Also, don't forget to adj ust t he I P configurat ion t o St at ic I P Mode as described in 3.2 I P Configurat ion. USE STATI C I Pv6 ADDRESS Unless your service provider specially requires it , do not select t his checkbox . I f selected, enter the static I P address in the I Pv6 Address field. Don't forget t o adj ust t he I P configurat ion t o St at ic I P Mode as described in sect ion 3.2 I P Configurat ion. EN ABLE I Pv6 UN N UMBERED M ODEL The I P unnum bered configurat ion com m and allows you t o enable I P processing on a serial int erface wit hout assigning it an explicit I P address. The I P unnum bered interface can "borrow" the I P address of another interface already configured on the rout er, which conserves net work and address space. LAUN CH D H CP6 C FOR AD D RESS ASSI GN M EN T ( I AN A) The I nt ernet Assigned Num bers Aut horit y ( I ANA) is a depart m ent of I CANN responsible for coordinating som e of the key elem ents that keep the I nternet running sm oot hly. Whilst t he I nt ernet is renowned for being a worldwide net work free from central coordination, there is a technical need for som e key parts of the I nt ernet t o be globally coordinat ed, and this coordinat ion role is undert aken by I ANA. Specifically, I ANA allocat es and m aint ains unique codes and num bering syst em s that are used in the technical standards ( " protocols" ) that drive the I nternet. I ANA's various act ivit ies can be broadly grouped in t o t hree cat egories: · Dom ain Nam es I ANA m anages t he DNS Root , t he .int and .arpa dom ains, and an I DN pract ices r esou r ce. 222 · Num ber Resources I ANA coordinat es t he global pool of I P and AS num bers, providing t hem t o Regional I nt ernet Regist ries. · Prot ocol Assignm ent s I nt ernet prot ocols' num bering system s are m anaged by I ANA in conj unct ion with standards bodies. LAUN CH D H CP6 C FOR PREFI X D ELEGATI ON ( I APD ) An I dent it y Associat ion for Prefix Delegat ion ( I APD) is a collect ion of prefixes assigned t o a request ing device. A request ing device m ay have m ore t han one I APD; for exam ple, one for each of its interfaces. A prefix- delegat ing rout er ( DHCPv6 server) select s prefixes t o be assigned t o a request ing rout er ( DHCPv6 client ) upon receiving a request from t he client . The server can select prefixes for a requesting client by using st at ic and dynam ic assignm ent m echanism s. Adm inist rat ors can m anually configure a list of prefixes and associat ed preferred and valid lifet im es for an I APD of a specific client t hat is ident ified by it s DUI D. When t he delegat ing rout er receives a request from a client , it checks if t here is a st at ic binding configured for t he I APD in t he client 's m essage. I f a st at ic binding is present, the prefixes in the binding are returned to the client. I f no such binding is found, t he server at t em pt s t o assign prefixes for the client from other sources. An I Pv6 prefix delegat ing rout er can also select prefixes for a request ing rout er based on an ext ernal aut horit y such as a RADI US server using t he Fram ed- I Pv6- Prefix at t ribut e. LAUN CH D H CP6 C FOR RAPI D COM M I T Rapid- Com m it ; is t he process ( opt ion) in which a Request ing Rout er ( DHCP Client ) obtains "configurable inform ation" ( configurable param eters) from a Delegating Rout er ( DHCP Server) by using a rapid DHCPv6 t wo- m essage exchange. The m essages t hat are exchanged bet ween t he t wo rout ers ( RR and DR) are called t he DHCPv6 " SOLI CI T" m essage and t he DHCPv6 " REPLY" m essage. FI XED MTU Fixed Maxim um Transm ission Unit . The size ( in byt es) of largest prot ocol dat a unit which t he layer can pass onwards. This value is 1500 for PPPoA. EN ABLE PPP MAN UAL MODE Use t his but t on t o m anually connect / disconnect PPP sessions. EN ABLE PPP DEBUG MODE When t his opt ion is select ed, t he syst em will put m ore PPP connect ion inform at ion int o t he syst em log. This is for debugging errors and not for norm al usage. EN ABLE M LD M ULTI CAST PROXY Mult icast List ener Discovery ( MLD) is a com ponent of t he I nt ernet Prot ocol Version 6 ( I Pv6) suit e. MLD is used by I Pv6 rout ers for discovering m ult icast list eners on a direct ly at t ached link, m uch like I GMP is used in I Pv4. The prot ocol is em bedded in I CMPv6 inst ead of using a separat e prot ocol. EN ABLE M LD M ULTI CAST SOURCE Click t o allow use of t his WAN int erface as Mult icast List ener Discovery ( MLD) m ulticast source. 223 STEP 3 : Choose an int erface t o be t he default gat eway. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 224 STEP 4 : Select DNS Server I nt erface from available WAN int erfaces OR ent er st at ic DNS server I P addresses for t he syst em . I n ATM m ode, if only a single PVC wit h I PoA or st at ic I PoE prot ocol is configured, St at ic DNS server I P addresses m ust be entered. Select t he configured WAN int erface for I Pv6 DNS server inform at ion OR ent er t he st at ic I Pv6 DNS server Addresses. Not e t hat select ing a WAN int erface for I Pv6 DNS server will enable DHCPv6 Client on t hat int erface. Click N e x t t o cont inue or click Ba ck t o ret urn t o t he previous st ep. 225 STEP 5 : The WAN Set up - Sum m ary screen shows a preview of t he WAN service you have configured. Check t hese set t ings and click Apply/ Sa ve if t hey are correct, or click Back to m odify them . Aft er clicking Apply/ Save, t he new service should appear on t he m ain screen. 226