Professional Documents
Culture Documents
Wireless
Wireless
Login
The Login page is where you enter the Broadband User Name and Password given by
your Broadband service provider. This needs to be provided only the first time you
connect.
Before entering the User Name and Password, please check that your Router is ready
to connect to Broadband.
Status: Down
Status: Handshaking
Status: Training
You are ready to connect to Broadband. Enter the Broadband User Name and
Password and click Connect.
If connection fails:
Troubleshooting
Troubleshooting allows you to carry out diagnostic tests on your local Ethernet and
WAN connection. The tests results can be used to identify any problem related to
your ADSL connection or related to the configuration of your Router.
Select the WAN connection you want to test from the pull down list
Click Run diagnostic tests
Tests results :
Quick setup
Your Router is pre-configured to work with a Broadband service using PPPoA, VPI
0, VCI 38 and VC MUX encapsulation. These settings are specific to your Internet
service provider and should be compatible with most broadband service. Some
provider use different settings and the Quick Setup page allows you to easily change
these settings.
You do not have to use quick setup if you are already connected to the Internet.
Before starting quick setup, please obtain the following information from your ISP:
VPI/VCI
Protocol: PPPoA or PPPoE
IP settings: Dynamic or Fixed. If fixed, then your ISP should also provide you
an IP address
NAT: Disabled or Enabled
PPP User Name and Password (also known as Broadband User Name and
Password)
When you have this information, you can proceed using Quick Setup:
Enter the information from your ISP and click Next> on every screen.
Note that LAN side settings are generally not Remitted by the service
provider and may be configured on your own. If unsure, please use the default
settings
IP Filter
The IP filter feature enables you to create rules that control the forwarding of
incoming and outgoing data Between the LAN and WAN side.
You can create IP filter rules to block attempts by certain computers on your LAN to
access certain types of data or Internet locations. You can also block accesses to your
LAN computers from the WAN side.
When you define an IP filter rule and enable the feature, you instruct the
ADSL/Ethernet router to examine data packets to determine whether they meet
criteria set forth in the rule. The criteria can include the network or internet protocol,
the packet carries, the direction in which it is traveling (for example, from the LAN to
the WAN and vice versa). The source IP address, the destination IP address, and other
characteristics of the packet data.
If the packet matches the criteria established in a rule, the packet can either be
accepted (forwarded towards its destination), or denied (discarded), depending on the
action specified in the rule.
The IP Filter Configuration page provides the capability to enable/disable the IP filter
feature and the IP Filter rule entries for all currently established rules. Click on the
icons to edit, delete, of the defined rule. Click add to create new IP Filter rules.
Setting up a DMZ has implications for the security of your network. Only set-up a
DMZ if you understand the consequences.
Port Forwarding
A NAT reserved mapping maps the LAN side private IP address to a public IP address
visible on the WAN side. Reserved mappings are useful if you want to host one of the
LAN side machine as a server. This enables you to host the server with the public IP
address thus hiding the LAN side IP address.
The list of all reserved mapping information for a specific WAN is displayed on this
page.
. To delete or edit a single NAT reserved mapping entry click on the respective icons
delete or edit of the corresponding entry To delete all NAT reserved mapping entries
click Delete All.
This page also allows you to create a reserved mapping for standard games from
WAN to an internal IP address based on.
Note that the outside and inside port ranges must be of the same size
Your modem provides the capability to act as an Wireless router thus enabling
multiple Wireless PCs to get connected on to the broadband connection. The Wireless
Network pages let you enable and disable this feature and set various global settings
security settings for your Wireless network.
Different countries have different laws about how you can transmit radio signals.
Since Wireless networking uses radio signals, You need to be careful in choosing the
right ProductName that complies to your country. The correct ProductName chosen
for the country will ensure that all the options chosen comply with the laws of the
country. The ProductName should only be changed if you change the country.
There are three basic types of Wireless networks, which are usually called A, B and G
(or, to give them their full names, 802.11A, 802.11B and 802.11G). You must select
which of these network types you wish to run. Please note that ProductName might
only offer some of these network types.
802.11B/ B_ONLYnetworks are the slowest (11MBits), but have a longer range than
A networks because they work on a different frequency.
802.11G/ G_ONLY networks have the same range as B networks but can run as fast
as A networks. To get the best speed you can operate a G-only network - this makes
your network faster, but Wireless PCs which only support B networks will not be able
to connect.
It is also possible to run a B/G network (MIXED_G_WiFi)- which means that both B
and G Wireless PCs can connect, but G PCs won't be as fast as they would in a G-
only network.
If you change the type of network you are running, your choice of channels will
change - because of which you will be asked to re-enter your Wireless settings.
Network Name (or SSID, ie, Service Set Identifier) is an ASCII text string that is
assigned to an AP by the administrator. This name helps in distinguishing a particular
AP among multiple APs present in radio range. Length of this name ranges between 0
to 32 bytes.
The Wireless network can use one of 14 channels.These can be selected based on the
local environment. Since some countries restrict usage of certain channels, you may
have fewer options to choose from. If you prefer, ProductName can automatically
select the best channel for you. Some countries impose that the channel be selected
automatically. This would be indicated in case a user wants to select a channel for
that particular country.
Why do I need Wireless network security and what are my security options?
Wireless network security provides a mechanism to encrypt the data transmitted for a
secure communication.
64 bit encryption (low security): this uses an encryption method called Wired
Equivalent Privacy (WEP). Data is encrypted using a 40 bit key which is configured
manually on all the devices on the Wireless network. Weaknesses in WEP make this a
low security option.
128 bit encryption (low security): Also uses Wired Equivalent Privacy (WEP). Data is
encrypted using a 104 bit key which is configured manually on all the devices on the
Wireless network. Weaknesses in WEP make this a low security option.
A Wireless network key is required if you are using 64 bit or 128 bit encryption. It is
a combination of numbers and the letters A to F. All the devices connected to your
network must share the same Wireless network key, and you need to set the key
manually on each device.
64 bit encryption requires a key that is exactly 10 characters long. 128 bit encryption
requires a key that is exactly 26 characters long.
Wi-Fi Protected Access (WPA) (high security): This uses a stronger encryption
method (called Temporal Key Integrity Protocol or AES-CCMP ) which is much
harder to attack. A passphrase is configured manually on all the devices on the
Wireless network, and keys are automatically generated for use between
ProductName and each Wireless PC in case of local authentication (PSK) while with
WPA user can configure the Radius Authentication for more secured communication.
Wi-Fi Protected Access2 (WPA) (high security): This method is similar to WPA and
having Local/Radius Authentication support with both TKIP/AES-CCMP encryption
algorithms but it has some advanced feature of PMK Caching and pre-auth which are
not present in WPA.
A Wireless network pass phrase (or master key) is required if you are using Wi-Fi
Protected Access. It consists of between 8 and 63 characters. All the devices
connected to your network must share the same Wireless network pass phrase, and
you need to set the pass phrase manually on each device.
When you disable your Wireless network your device will shutdown its Wireless
interface. After this no Wireless client will be able to send/receive data to/from your
device and no new Wireless client will be able to connect your device. When you
enable your Wireless network (from disabled state) the Wireless interface of the
device will be enabled. After this Wireless client will be able to connect to the device
Wireless network security can provide one way of restricting access to your network -
another way is to only allow particular Wireless PCs to access the network based on
their Wireless address.
Every Wireless device has a unique address which can be used to identify it - this is
usually called a MAC address. You can set ProductName to only allow a particular
list of addresses to connect to your network. You will need to find out the addresses
of the Wireless PCs first - you should read the manual that came with your Wireless
card to find out how. Once you've found out the ist of addresses you can add them to
the list to allow access to ProductName.
Another option is to allow all Wireless PCs to connect to ProductName except a list
of particular addresses which you enter. Finally you can disable address
authentication entirely and allow all Wireless PCs to connect to your network
RTS Threshold: The RTS threshold specifies the packet size of a request to send
(RTS) transmission. This helps control traffic flow through the access point,
especially one with a lot of clients.
NitroXM PiggyBack: Piggyback refers to interleaving the TCP Ack return flow with
the TCP Data Flow.
Using PPPoA (Point to Point Protocol over ATM) allows Internet access only
after you have entered a valid username and password.
Using PPPoE (Point to Point Protocol over Ethernet) allows Internet access
only after you have entered a valid username and password.
Using RFC1483.
Bridging.
Before starting Internet Connection, please obtain the following information from
your ISP:
VPI/VCI
Protocol: PPPoA or PPPoE
IP settings: Dynamic or Fixed. If fixed, then your ISP should also provide you
an IP address
NAT: Disabled or Enabled
PPP User Name and Password (also known as Broadband User Name and
Password)
This is an advanced feature and should only be used when instructed by your ISP.
MAC address spoofing allows your modem to pretend to be a device specified by
your ISP. It is important that you only use the value given to you by your ISP
When a PC user types a domain name into a browser, the PC must first send a request
to a DNS server to obtain the equivalent IP address. The DNS server will attempt to
look up the domain name in its own database, and will communicate with higher-
level DNS servers when the name cannot be found locally. When the address is
found, it is sent back to the requesting PC and is referenced in IP packets for the
remainder of the communication.
It provides a method for retrieving a list of IP addresses for a host name and the
ability to acquire the host name for a given IP address.
This page allows you to add a primary and secondary address for the DNS Server
When a PC user types a domain name into a browser, the PC must first send a request
to a DNS server to obtain the equivalent IP address. The DNS server will attempt to
look up the domain name in its own database, and will communicate with higher-
level DNS servers when the name cannot be found locally. When the address is
found, it is sent back to the requesting PC and is referenced in IP packets for the
remainder of the communication.
The DNS relay is capable of forwarding query packets from one or more DNS
resolvers to a DNS server. DNS responses received from the server are then
forwarded back to the DNS resolver that made the original request.
This page allows you to create a new DNS relay local LAN database entry. It takes
the hosts and IP addresses present on the local network and adds it to the DNS relay
local LAN database.
Overview
You can click advance link to display additional parameters in the various sections.
The Overview page displays the basic parameters when you first access the web
pages or, when you click on the Overview link. This provides a snapshot of the
device configuration. Note that some of the settings are links to the pages that give
their respective configuration.
The following heading describes the various sections of data on the overview page.
System Information
Displays basic information about the device hardware and software versions, the
system uptime since the last reboot, and some other preconfigured parameters.
Internet Connection
Displays the status, DSL standard , and performance statistics for the DSL line.
Wireless Settings
Displays basic information like Name, Status, Channel, SSID and Security for
Wireless.
LAN Settings
Displays the parameters like Mac Address, Ip Address, DHCP server and Subnet
Mask for the lan port
You can click on the links in the Status table to display the related configuration
pages.
Routing
ARP
DHCP
Wireless Connection
Traffic Stats
Domain Filter
The Domain filtering feature is provided to control the access of the configured sites.
While configuring the device for this feature, you will need to specify the domain
string along with the policy type and the Time Of Day-range.
Domain filtering feature is to target only the packets flowing from internal to external
or from DMZ to external. Internal to DMZ packets are also taken into consideration.
The page display global Rule action allow deny, used to change the default action
required for every created domainfilter rule and the rule table, which shows all
currently established rules. . When rules are defined, you can edit and delete using the
icons ,of the corresponding rule. Click Add to create IP Filter rules. Where, Filter
Name is name of the filter. The policyname is the firewall policy. Doamin Filter is
any string which representsa valid domain name. Start time from when filter is active.
Similarly, End time is the time after which filter is no more active Format will be in
24 hour hh:mm:ss.
IGMP Proxy
A router performing IGMP-based forwarding has a single upstream interface and one
or more downstream interfaces. It performs the router portion of the IGMP protocol
on its downstream interfaces, and the host portion of IGMP on its upstream interface.
You can set the upstream interface for the iGMP Proxy through the combobox
provided on the IGMP Configuration page.
IP Routing (Static)
IP routes can be created on the ADSL/Ethernet router to specify where it should send
data received on a particular interface. Routes specify the IP address of the next
device interface or Internet destination to forward data to, given the ultimate
destination of the data.
A common type of route is a default gateway, which defines the IP address where all
data is forwarded unless an IP route has been defined for the particular destination in
question.
This page allows you to add static routes . You need to provide the destination IP
address, net mask.. You also need to choose where the packets will be forwarded to
either the gateway IP address or the interface i.e. the iplan or ipwan interface that
your modem has.
IP Routing (Dynamic)
IP routes can be created on the ADSL/Ethernet router to specify where it should send
data received on a particular interface. Routes specify the IP address of the next
device interface or Internet destination to forward data to, given the ultimate
destination of the data.
A common type of route is a default gateway, which defines the IP address where all
data is forwarded unless an IP route has been defined for the particular destination in
question.
SNMP
Remote CPE Management is a remote way to manage CPE without the need to
establish IP connectivity with the unit first. The CPE is managed remotely via a
transport that is always available at the boot-up and has no additional overhead. CPE
management uses either VC or EOC channel to provide access to the unit’s SNMP
agent.
Enable disable snmp agent: When SNMP is enabled, the modem responds to SNMP
requests from the host. The host may ask to read data from the MIB or, when its
privileges allow, write data to it.
Read and write communities: Privilege levels are defined by the SNMP
communities configured on the modem.Each community is defined as having either
read-only or read/write privileges.
Enable trap service and configure trap community with Ip address: SNMP
community and trap community needs to be configured for accessing the unit and for
sending traps so check this box and enter a ipaddress for the trap manager.
Submitting changes saves them only until the device is reset or powered down.
Committing changes saves them permanently You can commit changes to save them
permanently to flash memory by clicking on the commit button.
To reboot the device from the Commit and Reboot page, select a reboot mode from
the drop-down menu, and then click Reboot. You can select from the following
reboot options:
Reboot is the default setting and reboots using the settings currently in
memory, including any changes you made and committed during the current
session.
Reboot from factory reboots the device to default settings provided by your
ISP or the manufacturer. Choosing this option erases any custom settings.
Remote Access
This page is used to configure your router remotely. It provides various applications
that can be used to configure your router from a remote point. The user need to
provide the start & end ip ranges for a particular application through which he want
to configure his router remotely. The remote system can only access your router if its
ip is in the range of start & end ip ranges provided for a particular application. Also
the firewall must be disabled on the router to be configured remotely.
Web Browser
Telnet
FTP
SNMP
TFTP
SSH
PING.
Change Password
Configuration Manager is configured with a default user name and password
combination, or login. The default login allows theuser full access to all
Configuration Manager features. You can change the password for the default login or
for any logins you create.
Super user-level privileges enable users to modify all the features available in
Configuration Manager. The default login has super-level privileges
Time Zone
Time Zone (SNTP Server and SNTP Client)
Certain systems may not have a date or time mechanism or may be using inaccurate
time/day information. the Simple Network Time Protocol feature provides a way to
synchronize the device’s own time of day setting with a remote time server as
described in RFC 2030 (SNTP) and RFC 1305 (NTP).
SNTP Server and SNTP Client Configuration
You can add server to the SNTP association list using Ip address or Host Name You
should only use the hostname attribute if your image supports DNS client. Adding a
server to the association list automatically starts the synchronization process.
To delete a single server association from the client’s list, click on the delete icon of
the corresponding entry.
If you do not want to synchronize the local time with an internal or external server,
you can set the device’s clock manually using SNTP Client page.
DayLightSaving: Several polar countries adjust there time by one hour in winters to
make better use of daylight. This adjustment is called daylight saving. Different
countries perform daylight saving on different dates. If daylight saving is required,
you can either manually adjust the system clock on the required date, or you can
configure ISOS to do that automatically.
Mode: SNTP client operates in one of three time synchronous access modes:
broadcast mode: the SNTP client waits for an NTP server to send out a
broadcast synchronization packet to the client. The client accepts the packet
and sets the local time based on the packet setting. As packets are accepted
from servers located on the network, this mode is generally used to
synchronize local clocks.
unicast mode: configures the SNTP client to synchronize with a single NTP
server that has been added to the server association list (either manually or
automatically). The client sends a packet out to a particular server and waits
for a response.
anycast mode: allows the SNTP client to synchronize with any NTP server
that is available. The client sends out a broadcast packet, accepts/binds to the
first valid response, synchronizes the local time and automatically adds the
responding server to the server association list. Future synchronization is
carried out by sending packets to this server in unicast mode.
You can set the retry value to any value between 0-10, and the default value is 2. If
you do not want the client to send packet retry attempts, enter Retries to be 0
The Timeout can be any value between 0-30 seconds and the default value is 5
seconds. For example, to set the Timeout to 15,
Enter: PollInterval Once a server has been added to the association list and the local
time has been automatically synchronized, the device waits for the number of minutes
specified by the attribute then starts the synchronization process again.
Synchronization is repeated at the end of each interval. For example, if you are using
unicast mode and wish to automatically synchronize the local time with an associated
server every 15 minutes, enter 15.
Transport Settings:
User must attach the classifier profile to the transport on which user wants
classification. QOS web page provides user option for selecting the configured
transport in system and list of created profile. User can attach any of the profile to the
any transport.
If there is not any profile than user can create any no of profile with no of rules.
Note: For any transport user wants classification underline support for classification
must be enable for that transport.
When the packet will come on the transport and classifier support is enable than all
the incoming packets will be matched against configured rules in system and once
any rule is matched than specified action will be perform for matching packets for
that rule.
Dynamic DNS
Dynamic DNS allows computers on the Internet to access servers on your network
using a domain name rather than an IP address. This is particularly useful if you are
allocated a dynamic IP address by your ISP. Dynamic IP addresses can change every
time you log on to your service provider, making it difficult for Internet users to find
your servers. A dynamic DNS service provides a permanent domain name for your
users even when your IP address has changed. You must subscribe to a dynamic DNS
service to use this feature. dyndns.org and tzo.com are the two services currently
supported.
UPnP
UPnP is an architecture for pervasive peer-to-peer network connectivity of intelligent
appliances, Wireless devices, and PCs of all form factors. It is designed to bring easy-
to-use, flexible, standards-based connectivity to ad-hoc or unmanaged networks
whether in the home, in a small business, public spaces, or attached to the Internet.
UPnP is a distributed, open networking architecture that leverages TCP/IP and the
Web technologies to enable seamless proximity networking in addition to control and
data transfer among networked devices in the home, office, and public spaces.
UPnP is more than just a simple extension of the plug and play peripheral model. It is
designed to support zero-configuration, "invisible" networking, and automatic
discovery for a breadth of device categories from a wide range of vendors. This
means a device can dynamically join a network, obtain an IP address, convey its
capabilities, and learn about the presence and capabilities of other devices. DHCP and
DNS servers are optional and are used only if available on the network. Finally, a
device can leave a network smoothly and automatically without leaving any
unwanted state behind.
When you enable DHCP on a network, you allow a device - such as your
ADSL/Ethernet router or a router located with your ISP - to assign temporary IP
addresses to your computers whenever they connect to your network.
The DHCP server draws from a defined pool of IP addresses and "leases" them for a
specified amount of time to your computers when they connect to the network. It
monitors, collects, and redistributes the addresses as needed.
From the global setting page you can enable or disable DHCP Server. You can also
specify that on which interface DHCP will operate on.
When you enable DHCP on a network, you allow a device - such as your
ADSL/Ethernet router or a router located with your ISP - to assign temporary IP
addresses to your computers whenever they connect to your network.
The DHCP server draws from a defined pool of IP addresses and "leases" them for a
specified amount of time to your computers when they connect to the network. It
monitors, collects, and redistributes the addresses as needed.
The Server Settings page allows you to set a new or edit a DHCP server subnet so
that the system can assign IP address, subnet mask and option configuration
parameters to DHCP clients.
Also if you have IP addresses that are designated for fixed use with specific devices,
or for some other reason you do not want to make them available to your network,
you can exclude them from the pool by adding them in DHCP Fixed IP/MAC
mapping .
Upgrade
Your Router can be upgraded to the latest firmware revision using this option.
Conexant will periodically publish upgrades via the Router support pages at
http://www.conexant.com/
Make a note of the current firmware version from the upgrade page.
Go to the www.conexant.com/ web site and download the firmware upgrade
file to a suitable directory on your computer.
Important: do not modify the name of the file when saving it to your
computer.
From the Upgrade page, click Browse... and open the file you downloaded
from the web site.
Click the Upgrade button.
After a short time (depending on the speed of your computer this may take several
minutes) the upgrade page will refresh and you will see that the firmware version
matches that of the upgrade file.
WARNING: DO NOT switch off your Router during software upgrade. This may
damage the unit.
These pages also contain Basic and Advanced links. You can click advance link to
display additional advance parameters in blue for that specific port. By deafult for
each port the basic view would be shown
WDS Settings
WDS stands for Wireless Distribution System. It enables the access points (APs) to
be connected on Wireless. Your device can also provide you services of WDS.
You can either remove an existing WDS link to another AP or totally disable the
WDS functionality. To remove a WDS link to an AP, reset the MAC address
associated with the required port to 00:00:00:00:00:00 from web page.
When a PC user types a domain name into a browser, the PC must first send a request
to a DNS server to obtain the equivalent IP address. The DNS server will attempt to
look up the domain name in its own database, and will communicate with higher-
level DNS servers when the name cannot be found locally. When the address is
found, it is sent back to the requesting PC and is referenced in IP packets for the
remainder of the communication.
This page allows you to create a DNS Host name entry manually. The user need to
provide the hostname and the ip address of the DNS Host.