Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 20

Router Help

Login
The Login page is where you enter the Broadband User Name and Password given by
your Broadband service provider. This needs to be provided only the first time you
connect.

Before entering the User Name and Password, please check that your Router is ready
to connect to Broadband.

Router is not ready to connect to Broadband

Status: Down

 Check that your Router is correctly connected to the Broadband ADSL


line.
 Check with your Broadband ADSL service provider that your ADSL
line has been activated
 If you are still having problems, read the troubleshooting section in
your Router user guide

Status: Handshaking

 Check that your Router is correctly connected to the Broadband ADSL


line and that microfilters are correctly installed. Instructions can be
found in your Quick Start Guide or user guide
 Remove any other previous Broadband ADSL modem/router that
might still be connected to the line
 Check with your Broadband ADSL service provider that your ADSL
line has been activated
 If you are still having problems, read the troubleshooting in your
Router user guide

Status: Training

 Your Router is in the process of establishing connection with the


Broadband ADSL network. Please wait a few seconds for Broadband
line to become ready

Router is ready to connect to Broadband

You are ready to connect to Broadband. Enter the Broadband User Name and
Password and click Connect.
If connection fails:

 Check your Broadband User Name and Password


 Remove any other previous ADSL modem/router that might still be
connected to the line
 Check your Internet browser's settings. See instructions from your
service provider
 Check with your Broadband ADSL service provider that your ADSL
line has been activated

Troubleshooting
Troubleshooting allows you to carry out diagnostic tests on your local Ethernet and
WAN connection. The tests results can be used to identify any problem related to
your ADSL connection or related to the configuration of your Router.

To start the test:

 Select the WAN connection you want to test from the pull down list
 Click Run diagnostic tests

Tests results :

 Ping to Named Host:


- It pings to specified named host. If specified named host respons the result is
pass else N/A.
 Connection to your local network: If any of these test fails, then there is a
hardware fault with your Router. Try resetting your Router from the
Advanced | System | Reset & Restart menu. Make sure the option Reset to
factory default settings is ticked.

 Connection to your ADSL service provider:


- ADSL Synchronization: Failure indicates that your Router cannot
synchronise with the ADSL network. Any further tests are skipped if this test
fails.
- ATM tests: Indicates correct communication with the ADSL network. Some
networks may fail either one of the F5 tests, but this is not a problem.

 Connection to Internet service provider:


- PPP server connection: Test will fail if your Router cannot communicate
with you Internet service provider. Check that the Broadband activation date
provided by your ISP has passed and try again later.
- Authentication with ISP: Test will fail if you have entered an incorrect
Broadband User Name and/or Password on the Quick Start page or if you
have not connected. Go back to the Quick Start page, enter the User Name
and Password provided by your ISP, then click Connect. Also make sure that
the Broadband activation date provided by your ISP has passed. Any further
tests are skipped if this test fails.
- IP address and ping tests: If any of these test fails, try again later or check
with your ISP that they do not have temporary service closure

Quick setup
Your Router is pre-configured to work with a Broadband service using PPPoA, VPI
0, VCI 38 and VC MUX encapsulation. These settings are specific to your Internet
service provider and should be compatible with most broadband service. Some
provider use different settings and the Quick Setup page allows you to easily change
these settings.

You do not have to use quick setup if you are already connected to the Internet.

Before starting quick setup, please obtain the following information from your ISP:

 VPI/VCI
 Protocol: PPPoA or PPPoE
 IP settings: Dynamic or Fixed. If fixed, then your ISP should also provide you
an IP address
 NAT: Disabled or Enabled
 PPP User Name and Password (also known as Broadband User Name and
Password)

When you have this information, you can proceed using Quick Setup:

 Enter the information from your ISP and click Next> on every screen.
 Note that LAN side settings are generally not Remitted by the service
provider and may be configured on your own. If unsure, please use the default
settings

IP Filter
The IP filter feature enables you to create rules that control the forwarding of
incoming and outgoing data Between the LAN and WAN side.

You can create IP filter rules to block attempts by certain computers on your LAN to
access certain types of data or Internet locations. You can also block accesses to your
LAN computers from the WAN side.

When you define an IP filter rule and enable the feature, you instruct the
ADSL/Ethernet router to examine data packets to determine whether they meet
criteria set forth in the rule. The criteria can include the network or internet protocol,
the packet carries, the direction in which it is traveling (for example, from the LAN to
the WAN and vice versa). The source IP address, the destination IP address, and other
characteristics of the packet data.

If the packet matches the criteria established in a rule, the packet can either be
accepted (forwarded towards its destination), or denied (discarded), depending on the
action specified in the rule.

The IP Filter Configuration page provides the capability to enable/disable the IP filter
feature and the IP Filter rule entries for all currently established rules. Click on the
icons to edit, delete, of the defined rule. Click add to create new IP Filter rules.

Virtual Server (DMZ)


A DMZ (DeMilitarized Zone) host is a computer on your LAN network that can be
accessed from the Internet. A DMZ is often used to host Web servers, FTP servers etc
that need to be accessible from the Internet.

Setting up a DMZ has implications for the security of your network. Only set-up a
DMZ if you understand the consequences.

Port forwarding settings will override your DMZ setting.

To setup a DMZ Host:

 Choose a WAN interface and click on the Edit link.


 Select Forwarded to the DMZ Host
 Enter the IP address of the computer you wish to place in the DMZ
 Click Apply

Port Forwarding
A NAT reserved mapping maps the LAN side private IP address to a public IP address
visible on the WAN side. Reserved mappings are useful if you want to host one of the
LAN side machine as a server. This enables you to host the server with the public IP
address thus hiding the LAN side IP address.

The list of all reserved mapping information for a specific WAN is displayed on this
page.

. To delete or edit a single NAT reserved mapping entry click on the respective icons
delete or edit of the corresponding entry To delete all NAT reserved mapping entries
click Delete All.

This page also allows you to create a reserved mapping for standard games from
WAN to an internal IP address based on.

 Name --A standard game or an user defined value.


 Wan Interface
 Protocol(TCP/UDP)
 External Packet Port Start and End-- A range of TCP/UDP port numbers on
the outside interface
 Forward to Internal Host Port Start and End-- A range of TCP/ UDP port
numbers on the inside interface

Note that the outside and inside port ranges must be of the same size

Wireless (Basic and Advanced Settings)


General:

Your modem provides the capability to act as an Wireless router thus enabling
multiple Wireless PCs to get connected on to the broadband connection. The Wireless
Network pages let you enable and disable this feature and set various global settings
security settings for your Wireless network.

Why do I need to set a country to use my Wireless network?

Different countries have different laws about how you can transmit radio signals.
Since Wireless networking uses radio signals, You need to be careful in choosing the
right ProductName that complies to your country. The correct ProductName chosen
for the country will ensure that all the options chosen comply with the laws of the
country. The ProductName should only be changed if you change the country.

What are the different types of Wireless network? profiles

There are three basic types of Wireless networks, which are usually called A, B and G
(or, to give them their full names, 802.11A, 802.11B and 802.11G). You must select
which of these network types you wish to run. Please note that ProductName might
only offer some of these network types.

802.11A networks operate at a different frequency to B and G networks, so if you run


an A network then Wireless PCs using B and G Wireless cards will not be able to
connect. 802.11A networks are fast (up to 54Mbits) but tend to have shorter range
than B or G networks.

802.11B/ B_ONLYnetworks are the slowest (11MBits), but have a longer range than
A networks because they work on a different frequency.

802.11G/ G_ONLY networks have the same range as B networks but can run as fast
as A networks. To get the best speed you can operate a G-only network - this makes
your network faster, but Wireless PCs which only support B networks will not be able
to connect.

It is also possible to run a B/G network (MIXED_G_WiFi)- which means that both B
and G Wireless PCs can connect, but G PCs won't be as fast as they would in a G-
only network.

MIXED_LONG is the general profile available.

If you change the type of network you are running, your choice of channels will
change - because of which you will be asked to re-enter your Wireless settings.

What are Wireless network names?

Network Name (or SSID, ie, Service Set Identifier) is an ASCII text string that is
assigned to an AP by the administrator. This name helps in distinguishing a particular
AP among multiple APs present in radio range. Length of this name ranges between 0
to 32 bytes.

What are Wireless network channels?

The Wireless network can use one of 14 channels.These can be selected based on the
local environment. Since some countries restrict usage of certain channels, you may
have fewer options to choose from. If you prefer, ProductName can automatically
select the best channel for you. Some countries impose that the channel be selected
automatically. This would be indicated in case a user wants to select a channel for
that particular country.

Why do I need Wireless network security and what are my security options?

Wireless network security provides a mechanism to encrypt the data transmitted for a
secure communication.

Your Wireless security options are as follows.

64 bit encryption (low security): this uses an encryption method called Wired
Equivalent Privacy (WEP). Data is encrypted using a 40 bit key which is configured
manually on all the devices on the Wireless network. Weaknesses in WEP make this a
low security option.

128 bit encryption (low security): Also uses Wired Equivalent Privacy (WEP). Data is
encrypted using a 104 bit key which is configured manually on all the devices on the
Wireless network. Weaknesses in WEP make this a low security option.

What are Wireless network keys?

A Wireless network key is required if you are using 64 bit or 128 bit encryption. It is
a combination of numbers and the letters A to F. All the devices connected to your
network must share the same Wireless network key, and you need to set the key
manually on each device.

64 bit encryption requires a key that is exactly 10 characters long. 128 bit encryption
requires a key that is exactly 26 characters long.

Wi-Fi Protected Access (WPA) (high security): This uses a stronger encryption
method (called Temporal Key Integrity Protocol or AES-CCMP ) which is much
harder to attack. A passphrase is configured manually on all the devices on the
Wireless network, and keys are automatically generated for use between
ProductName and each Wireless PC in case of local authentication (PSK) while with
WPA user can configure the Radius Authentication for more secured communication.

Wi-Fi Protected Access2 (WPA) (high security): This method is similar to WPA and
having Local/Radius Authentication support with both TKIP/AES-CCMP encryption
algorithms but it has some advanced feature of PMK Caching and pre-auth which are
not present in WPA.

What is a Wireless network pass phrase?

A Wireless network pass phrase (or master key) is required if you are using Wi-Fi
Protected Access. It consists of between 8 and 63 characters. All the devices
connected to your network must share the same Wireless network pass phrase, and
you need to set the pass phrase manually on each device.

How Can I enable/disable my Wireless device?

When you disable your Wireless network your device will shutdown its Wireless
interface. After this no Wireless client will be able to send/receive data to/from your
device and no new Wireless client will be able to connect your device. When you
enable your Wireless network (from disabled state) the Wireless interface of the
device will be enabled. After this Wireless client will be able to connect to the device

Wireless (MAC Filter)


How can I restrict who can access my Wireless network?

Wireless network security can provide one way of restricting access to your network -
another way is to only allow particular Wireless PCs to access the network based on
their Wireless address.

Every Wireless device has a unique address which can be used to identify it - this is
usually called a MAC address. You can set ProductName to only allow a particular
list of addresses to connect to your network. You will need to find out the addresses
of the Wireless PCs first - you should read the manual that came with your Wireless
card to find out how. Once you've found out the ist of addresses you can add them to
the list to allow access to ProductName.

Another option is to allow all Wireless PCs to connect to ProductName except a list
of particular addresses which you enter. Finally you can disable address
authentication entirely and allow all Wireless PCs to connect to your network

Advanced Parameters for Wireless

Fragmentation Threshold: The fragmentation threshold is a way of limiting the size


of packets (frames) transmitted over the network. If a packet exceeds the
fragmentation threshold set here, the fragmentation function will be activated and the
packet will be sent as multiple 802.11 frames.

RTS Threshold: The RTS threshold specifies the packet size of a request to send
(RTS) transmission. This helps control traffic flow through the access point,
especially one with a lot of clients.

NitroXM PiggyBack: Piggyback refers to interleaving the TCP Ack return flow with
the TCP Data Flow.

Internet Connection (Connection)


This is a wizard page that allows you to configure your modem to connect to the
Internet. You can access the Internet in one of several ways depending on the service
provided by your Internet Service Provider (ISP):

 Using PPPoA (Point to Point Protocol over ATM) allows Internet access only
after you have entered a valid username and password.
 Using PPPoE (Point to Point Protocol over Ethernet) allows Internet access
only after you have entered a valid username and password.
 Using RFC1483.
 Bridging.

Before starting Internet Connection, please obtain the following information from
your ISP:

 VPI/VCI
 Protocol: PPPoA or PPPoE
 IP settings: Dynamic or Fixed. If fixed, then your ISP should also provide you
an IP address
 NAT: Disabled or Enabled
 PPP User Name and Password (also known as Broadband User Name and
Password)

This page allows you to add or edit or delete any connection.


Internet Connection (ADSL)
ADSL is a form of DSL, a data communications technology that enables faster data
transmission. It does this by utilizing frequencies that are normally not used by a
voice telephone call. The distinguishing characteristic of ADSL is that the volume of
data flow is greater in one direction than the other, i.e. it is asymmetric. Providers
usually market ADSL as a service for people to connect to the Internet in a relatively
passive mode: able to use the higher speed direction for the "download" from the
Internet but not needing to run servers that would require bandwidth in the other
direction.

Your modem supports multiple standards/annexes of ADSL such as AnnexA, BisA,


BisB and BisM. This page allows you to

 Select multiple standards/annexes, which must be auto-negotiated when the


DSL line trains, by selecting multiple check-boxes.
 Configure basic and advanced attributes for each standard/annex by clicking
on the basic and advanced links.
 Revert to default settings by clicking on the Defaults button.
 Start the line train-up by clicking on the Start button.

Internet Connection (MAC Spoofing)


Physical MAC addresses are permanent by design, several mechanisms allow
modification, or "spoofing", of the MAC address that is reported by the operating
system. This can be useful for privacy reasons, for instance when connecting to a Wi-
Fi hotspot, or to ensure interoperability. Some internet service providers bind their
service to a specific MAC address; if the user then changes their network card or
intends to install a router, the service won't work anymore. Changing the MAC
address of the new interface will solve the problem. Similarly, some software licenses
are bound to a specific MAC address. Changing the MAC address in this way is not
permanent: after a reboot, it will revert to the MAC address physically stored in the
card.

This is an advanced feature and should only be used when instructed by your ISP.
MAC address spoofing allows your modem to pretend to be a device specified by
your ISP. It is important that you only use the value given to you by your ISP

Local Network (LAN)


This page displays the IP address and subnet mask for your modem. The default IP
address and subnet mask of your modem is suitable for most networks. It allows you
to modify the IP address , Subnet mask , Domain name , Host name, MTU for your
modem.
Local Network (DNS Client)
Domain Name System (DNS) servers map the user-friendly domain names that users
type into their Web browsers (e.g., "yahoo.com") to the equivalent numerical IP
addresses that are used for Internet routing.

When a PC user types a domain name into a browser, the PC must first send a request
to a DNS server to obtain the equivalent IP address. The DNS server will attempt to
look up the domain name in its own database, and will communicate with higher-
level DNS servers when the name cannot be found locally. When the address is
found, it is sent back to the requesting PC and is referenced in IP packets for the
remainder of the communication.

It provides a method for retrieving a list of IP addresses for a host name and the
ability to acquire the host name for a given IP address.

This page allows you to add a primary and secondary address for the DNS Server

Local Network (DNS Relay)


Domain Name System (DNS) servers map the user-friendly domain names that users
type into their Web browsers (e.g., "yahoo.com") to the equivalent numerical IP
addresses that are used for Internet routing.

When a PC user types a domain name into a browser, the PC must first send a request
to a DNS server to obtain the equivalent IP address. The DNS server will attempt to
look up the domain name in its own database, and will communicate with higher-
level DNS servers when the name cannot be found locally. When the address is
found, it is sent back to the requesting PC and is referenced in IP packets for the
remainder of the communication.

The DNS relay is capable of forwarding query packets from one or more DNS
resolvers to a DNS server. DNS responses received from the server are then
forwarded back to the DNS resolver that made the original request.

This page allows you to create a new DNS relay local LAN database entry. It takes
the hosts and IP addresses present on the local network and adds it to the DNS relay
local LAN database.

Overview
You can click advance link to display additional parameters in the various sections.

The Overview page displays the basic parameters when you first access the web
pages or, when you click on the Overview link. This provides a snapshot of the
device configuration. Note that some of the settings are links to the pages that give
their respective configuration.

The following heading describes the various sections of data on the overview page.

System Information

Displays basic information about the device hardware and software versions, the
system uptime since the last reboot, and some other preconfigured parameters.

Internet Connection

Displays the status, DSL standard , and performance statistics for the DSL line.

Wireless Settings

Displays basic information like Name, Status, Channel, SSID and Security for
Wireless.

LAN Settings

Displays the parameters like Mac Address, Ip Address, DHCP server and Subnet
Mask for the lan port

You can click on the links in the Status table to display the related configuration
pages.

 Routing
 ARP
 DHCP
 Wireless Connection
 Traffic Stats

Domain Filter
The Domain filtering feature is provided to control the access of the configured sites.
While configuring the device for this feature, you will need to specify the domain
string along with the policy type and the Time Of Day-range.

Domain filtering feature is to target only the packets flowing from internal to external
or from DMZ to external. Internal to DMZ packets are also taken into consideration.

The page display global Rule action allow deny, used to change the default action
required for every created domainfilter rule and the rule table, which shows all
currently established rules. . When rules are defined, you can edit and delete using the
icons ,of the corresponding rule. Click Add to create IP Filter rules. Where, Filter
Name is name of the filter. The policyname is the firewall policy. Doamin Filter is
any string which representsa valid domain name. Start time from when filter is active.
Similarly, End time is the time after which filter is no more active Format will be in
24 hour hh:mm:ss.

IGMP Proxy
A router performing IGMP-based forwarding has a single upstream interface and one
or more downstream interfaces. It performs the router portion of the IGMP protocol
on its downstream interfaces, and the host portion of IGMP on its upstream interface.

You can set the upstream interface for the iGMP Proxy through the combobox
provided on the IGMP Configuration page.

IP Routing (Static)
IP routes can be created on the ADSL/Ethernet router to specify where it should send
data received on a particular interface. Routes specify the IP address of the next
device interface or Internet destination to forward data to, given the ultimate
destination of the data.

A common type of route is a default gateway, which defines the IP address where all
data is forwarded unless an IP route has been defined for the particular destination in
question.

This page allows you to add static routes . You need to provide the destination IP
address, net mask.. You also need to choose where the packets will be forwarded to
either the gateway IP address or the interface i.e. the iplan or ipwan interface that
your modem has.

IP Routing (Dynamic)
IP routes can be created on the ADSL/Ethernet router to specify where it should send
data received on a particular interface. Routes specify the IP address of the next
device interface or Internet destination to forward data to, given the ultimate
destination of the data.

A common type of route is a default gateway, which defines the IP address where all
data is forwarded unless an IP route has been defined for the particular destination in
question.

If a designated path becomes unavailable, the existing nodes must determine an


alternate route to use to get their data to its destination. They usually accomplish this
through the use of a routing protocol using one of two broad classes of routing
algorithms: distance vector algorithms and link state algorithms, which together
account for nearly every routing algorithm in use on the Internet.
This page allows you to enable or disable operation mode and RIP version for a
particular interface.

SNMP
Remote CPE Management is a remote way to manage CPE without the need to
establish IP connectivity with the unit first. The CPE is managed remotely via a
transport that is always available at the boot-up and has no additional overhead. CPE
management uses either VC or EOC channel to provide access to the unit’s SNMP
agent.

The Simple Network Management Protocol (SNMP) enables a host computer to


access configuration, performance, and other system data that resides in a database on
the modem. The host computer is called a management station and the modem is
called an SNMP agent. The data that can be accessed via SNMP is stored in a
Management Information Database (MIB) on the modem.

Following parameters can be configured using this page:

Enable disable snmp agent: When SNMP is enabled, the modem responds to SNMP
requests from the host. The host may ask to read data from the MIB or, when its
privileges allow, write data to it.

Read and write communities: Privilege levels are defined by the SNMP
communities configured on the modem.Each community is defined as having either
read-only or read/write privileges.

Enable trap service and configure trap community with Ip address: SNMP
community and trap community needs to be configured for accessing the unit and for
sending traps so check this box and enter a ipaddress for the trap manager.

Commit & Reboot


Whenever you use the configuration program to change system settings, the changes
are initially placed in temporary storage called random access memory or RAM. Your
changes are made effective when you submit them, but can be lost if the device is
reset or turned off.

Submitting changes saves them only until the device is reset or powered down.
Committing changes saves them permanently You can commit changes to save them
permanently to flash memory by clicking on the commit button.

To reboot the device from the Commit and Reboot page, select a reboot mode from
the drop-down menu, and then click Reboot. You can select from the following
reboot options:

 Reboot is the default setting and reboots using the settings currently in
memory, including any changes you made and committed during the current
session.
 Reboot from factory reboots the device to default settings provided by your
ISP or the manufacturer. Choosing this option erases any custom settings.

Remote Access
This page is used to configure your router remotely. It provides various applications
that can be used to configure your router from a remote point. The user need to
provide the start & end ip ranges for a particular application through which he want
to configure his router remotely. The remote system can only access your router if its
ip is in the range of start & end ip ranges provided for a particular application. Also
the firewall must be disabled on the router to be configured remotely.

The Applications supported are:

 Web Browser
 Telnet
 FTP
 SNMP
 TFTP
 SSH
 PING.

Change Password
Configuration Manager is configured with a default user name and password
combination, or login. The default login allows theuser full access to all
Configuration Manager features. You can change the password for the default login or
for any logins you create.

Super user-level privileges enable users to modify all the features available in
Configuration Manager. The default login has super-level privileges

Time Zone
Time Zone (SNTP Server and SNTP Client)

Certain systems may not have a date or time mechanism or may be using inaccurate
time/day information. the Simple Network Time Protocol feature provides a way to
synchronize the device’s own time of day setting with a remote time server as
described in RFC 2030 (SNTP) and RFC 1305 (NTP).
SNTP Server and SNTP Client Configuration

You can add server to the SNTP association list using Ip address or Host Name You
should only use the hostname attribute if your image supports DNS client. Adding a
server to the association list automatically starts the synchronization process.

To delete a single server association from the client’s list, click on the delete icon of
the corresponding entry.

If you do not want to synchronize the local time with an internal or external server,
you can set the device’s clock manually using SNTP Client page.

Parameters on the sntp client page:

DayLightSaving: Several polar countries adjust there time by one hour in winters to
make better use of daylight. This adjustment is called daylight saving. Different
countries perform daylight saving on different dates. If daylight saving is required,
you can either manually adjust the system clock on the required date, or you can
configure ISOS to do that automatically.

Mode: SNTP client operates in one of three time synchronous access modes:

 broadcast mode: the SNTP client waits for an NTP server to send out a
broadcast synchronization packet to the client. The client accepts the packet
and sets the local time based on the packet setting. As packets are accepted
from servers located on the network, this mode is generally used to
synchronize local clocks.
 unicast mode: configures the SNTP client to synchronize with a single NTP
server that has been added to the server association list (either manually or
automatically). The client sends a packet out to a particular server and waits
for a response.
 anycast mode: allows the SNTP client to synchronize with any NTP server
that is available. The client sends out a broadcast packet, accepts/binds to the
first valid response, synchronizes the local time and automatically adds the
responding server to the server association list. Future synchronization is
carried out by sending packets to this server in unicast mode.

If a response to a synchronization request is not received by the client within a


specific time limit, you can configure the client to keep sending packet retry attempts
at regular intervals. To set the time limit

You can set the retry value to any value between 0-10, and the default value is 2. If
you do not want the client to send packet retry attempts, enter Retries to be 0

The Timeout can be any value between 0-30 seconds and the default value is 5
seconds. For example, to set the Timeout to 15,

Enter: PollInterval Once a server has been added to the association list and the local
time has been automatically synchronized, the device waits for the number of minutes
specified by the attribute then starts the synchronization process again.
Synchronization is repeated at the end of each interval. For example, if you are using
unicast mode and wish to automatically synchronize the local time with an associated
server every 15 minutes, enter 15.

Rest all the parameters are self explainatory by their names.

Quality of Services (QoS Setting,


Classifier)
Your Modem provides the support for classifies incoming packets to ensure that
important packets are marked as high priority. This classifier device will also
communicate the scheduling priority and drop priority to the Scheduler device and
communicate the meter-id to the Meter device the other components of QOS diffserv
architecture.

Transport Settings:

User must attach the classifier profile to the transport on which user wants
classification. QOS web page provides user option for selecting the configured
transport in system and list of created profile. User can attach any of the profile to the
any transport.

If there is not any profile than user can create any no of profile with no of rules.

Note: For any transport user wants classification underline support for classification
must be enable for that transport.

Classifier profile creation:

MyDSLModem QOS classifier profile creation has twp parts.

1. Classify the incoming packets based on different attributes.


All the incoming packet are classified based on 3 different ways.
1. General classification: In general classification all the incoming
packets will be matched against the configured values of offset, mask
and values.If the incoming packet values matches than the configured
action will perform.
2. Layer 2 classifications: User have option for classify incoming packet
on the basis of layer 2 fields. User can create rule with values of
VLAN-ID and VLAN-ID min- max values.
3. Layer 3 classification: User can create rules with layer 3 fields
(source/destination IP address, mask, DSCP values etc.). If any of the
rule matches than the corresponding action will be performed.
2. Assign the incoming packets to in different classes based on the classification.

When the packet will come on the transport and classifier support is enable than all
the incoming packets will be matched against configured rules in system and once
any rule is matched than specified action will be perform for matching packets for
that rule.

Dynamic DNS
Dynamic DNS allows computers on the Internet to access servers on your network
using a domain name rather than an IP address. This is particularly useful if you are
allocated a dynamic IP address by your ISP. Dynamic IP addresses can change every
time you log on to your service provider, making it difficult for Internet users to find
your servers. A dynamic DNS service provides a permanent domain name for your
users even when your IP address has changed. You must subscribe to a dynamic DNS
service to use this feature. dyndns.org and tzo.com are the two services currently
supported.

UPnP
UPnP is an architecture for pervasive peer-to-peer network connectivity of intelligent
appliances, Wireless devices, and PCs of all form factors. It is designed to bring easy-
to-use, flexible, standards-based connectivity to ad-hoc or unmanaged networks
whether in the home, in a small business, public spaces, or attached to the Internet.
UPnP is a distributed, open networking architecture that leverages TCP/IP and the
Web technologies to enable seamless proximity networking in addition to control and
data transfer among networked devices in the home, office, and public spaces.

UPnP is more than just a simple extension of the plug and play peripheral model. It is
designed to support zero-configuration, "invisible" networking, and automatic
discovery for a breadth of device categories from a wide range of vendors. This
means a device can dynamically join a network, obtain an IP address, convey its
capabilities, and learn about the presence and capabilities of other devices. DHCP and
DNS servers are optional and are used only if available on the network. Finally, a
device can leave a network smoothly and automatically without leaving any
unwanted state behind.

From the web page you can enable or disable UPnP.

DHCP Server (Global Settings)


DHCP is a protocol that enables network administrators to centrally manage the
assignment and distribution of IP information to computers on a network.

When you enable DHCP on a network, you allow a device - such as your
ADSL/Ethernet router or a router located with your ISP - to assign temporary IP
addresses to your computers whenever they connect to your network.

The DHCP server draws from a defined pool of IP addresses and "leases" them for a
specified amount of time to your computers when they connect to the network. It
monitors, collects, and redistributes the addresses as needed.

From the global setting page you can enable or disable DHCP Server. You can also
specify that on which interface DHCP will operate on.

DHCP Server (Server Settings)


DHCP is a protocol that enables network administrators to centrally manage the
assignment and distribution of IP information to computers on a network.

When you enable DHCP on a network, you allow a device - such as your
ADSL/Ethernet router or a router located with your ISP - to assign temporary IP
addresses to your computers whenever they connect to your network.

The DHCP server draws from a defined pool of IP addresses and "leases" them for a
specified amount of time to your computers when they connect to the network. It
monitors, collects, and redistributes the addresses as needed.

The Server Settings page allows you to set a new or edit a DHCP server subnet so
that the system can assign IP address, subnet mask and option configuration
parameters to DHCP clients.

Also if you have IP addresses that are designated for fixed use with specific devices,
or for some other reason you do not want to make them available to your network,
you can exclude them from the pool by adding them in DHCP Fixed IP/MAC
mapping .

Upgrade
Your Router can be upgraded to the latest firmware revision using this option.
Conexant will periodically publish upgrades via the Router support pages at
http://www.conexant.com/

 Make a note of the current firmware version from the upgrade page.
 Go to the www.conexant.com/ web site and download the firmware upgrade
file to a suitable directory on your computer.
Important: do not modify the name of the file when saving it to your
computer.
 From the Upgrade page, click Browse... and open the file you downloaded
from the web site.
 Click the Upgrade button.

After a short time (depending on the speed of your computer this may take several
minutes) the upgrade page will refresh and you will see that the firmware version
matches that of the upgrade file.

Note: If "Checking Firmware Upgrades Automatically" or "Image Upgrade" fails


then please contact your service provider.

WARNING: DO NOT switch off your Router during software upgrade. This may
damage the unit.

Backup & Restore Configuration


You can save the current configuration of your Router to a file on your computer.
This is highly recommended before you change any configuration settings on the
Router or before you upgrade your firmware.

To save your settings on your computer:

 Click the Backup button on the Backup Configuration Screen.


 A File Download window will open.
 Choose the Save option and select a suitable location and filename to save
your backup file to.
 Press Save

To restore your settings:

 Click Browse... and browse to the location of your backup file


 Click Restore

Port Configuration (Basic and


Advanced)
This command lists the ports that are currently available in your system. Ports are
configured in the bun configuration files according to product and hardware type you
are using. Ports are configured in the ISFS initbun configuration file for the product
that you are using. Click on Port Statistics link to display names of all the ports
available in the system. Now click on the port name to get a page that displays the
parameters name and value for that port name.

These pages also contain Basic and Advanced links. You can click advance link to
display additional advance parameters in blue for that specific port. By deafult for
each port the basic view would be shown
WDS Settings
WDS stands for Wireless Distribution System. It enables the access points (APs) to
be connected on Wireless. Your device can also provide you services of WDS.

You can either remove an existing WDS link to another AP or totally disable the
WDS functionality. To remove a WDS link to an AP, reset the MAC address
associated with the required port to 00:00:00:00:00:00 from web page.

To disable the WDS functionality completely, set WDSEnable to FALSE

Local Network (DNS LAN Host)


Domain Name System (DNS) servers map the user-friendly domain names that users
type into their Web browsers (e.g., "yahoo.com") to the equivalent numerical IP
addresses that are used for Internet routing.

When a PC user types a domain name into a browser, the PC must first send a request
to a DNS server to obtain the equivalent IP address. The DNS server will attempt to
look up the domain name in its own database, and will communicate with higher-
level DNS servers when the name cannot be found locally. When the address is
found, it is sent back to the requesting PC and is referenced in IP packets for the
remainder of the communication.

This page allows you to create a DNS Host name entry manually. The user need to
provide the hostname and the ip address of the DNS Host.

You might also like