C HAPTER 9 The VoIP General Screens 9.1 VoIP Overview The VOICE > General screens allow you to set up global SIP and Quality of Service (QoS) settings. VoIP (Voice over IP) is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. You can also use servers to run telephone service applications like PBX services and voice mail.
Chapter 9 The VoIP General Screens • G.729 is an Analysis-by-Synthesis (AbS) hybrid waveform codec. It uses a filter based on information about how the human vocal tract produces sounds. The codec analyzes the incoming voice signal and attempts to synthesize it using its list of voice elements. It tests the synthesized signal against the original and, if it is acceptable, transmits details of the voice elements it used to make the synthesis.
Chapter 9 The VoIP General Screens 9.1.3 Before you Begin • Ensure that you have all of your voice account information on hand. If not, contact your voice account service provider to find out which settings in this chapter you should configure in order to use your telephone with the BM2022w. • Connect your BM2022w to the Internet, as described in the Quick Start Guide. If you have not already done so, then you will not be able to test your VoIP settings. 9.
Chapter 9 The VoIP General Screens Table 68 VoIP > General > Media (continued) LABEL DESCRIPTION Voice Jitter Buffer Type Voice jitter is a variation in delay of RTP packets delivery. This could cause strange sound effects. The BM2022w can utilize the following types of jitter buffer to minimize the effects of jitter. Dynamic - Jitter buffer size is dynamically changed by RTP packets delivery status. Static - Jitter buffer size is fixed.
Chapter 9 The VoIP General Screens 9.4 SIP Settings Click VoIP > General > SIP to set up session timer on the BM2022w. See Section 10.8 on page 173 for more information on SIP. Figure 88 VoIP > General > SIP The following table describes the labels in this screen. Table 70 VoIP > General > SIP LABEL DESCRIPTION Session Timer Enable Select this to activate the BM2022w’s SIP Session Timer.
Chapter 9 The VoIP General Screens The following table describes the labels in this screen. Table 71 VoIP > General > Speed Dial LABEL DESCRIPTION Speed Dial Rules - This is a list of speed dial numbers. To edit an existing speed dial rule, you can click the row for the rule and editable fields will appear. Active This field displays whether the rule is activated or not.
C HAPTER 10 The VoIP Account Screens 10.1 Overview Use the VoIP > Account 1 and VoIP > Account 2 screens to configure SIP servers, authentication, additional VoIP features, dialing timeout values and how to handle fax messages for two accounts on the BM2022w. Account 1 maps to phone port 1 and account 2 maps to phone port 2. Since both the Account 1 and Account 2 screens are quite similar, this section uses the VoIP > Account 1 screens to describe the fields. 10.1.
Chapter 10 The VoIP Account Screens SIP Service Domain The SIP service domain of the VoIP service provider (the company that lets you make phone calls over the Internet) is the domain name in a SIP URI. For example, if the SIP address is 1122334455@VoIP-provider.com, then “VoIP-provider.com” is the SIP service domain. SIP Register Server A SIP register server maintains a database of SIP identity-to-IP address (or domain name) mapping.
Chapter 10 The VoIP Account Screens STUN STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address Translators) allows the BM2022w to find the presence and types of NAT routers and/or firewalls between it and the public Internet. STUN also allows the BM2022w to find the public IP address that NAT assigned, so the BM2022w can embed it in the SIP data stream. STUN does not work with symmetric NAT routers or firewalls. See RFC 3489 for details on STUN.
Chapter 10 The VoIP Account Screens Supplementary Phone Services Overview Supplementary services such as call hold, call waiting, call transfer, etc. are generally available from your VoIP service provider. The BM2022w supports the following services: • Call Waiting • Call Forwarding • Caller ID Note: To take full advantage of the supplementary phone services available though the BM2022w's phone port, you may need to subscribe to the services from your VoIP service provider. 10.
Chapter 10 The VoIP Account Screens Table 72 VoIP > Account 1 (or Account 2) > Status LABEL DESCRIPTION Outbound Server This field displays the IP address (or domain name) and service port number of the outbound proxy server, if you have configured one. Register Status This field displays Disabled if the SIP account (set up in Section 10.4 on page 169) is disabled or de-registered from the registrar server.
Chapter 10 The VoIP Account Screens 10.3 Server Click VoIP > Account 1 (or Account 2) > Server to configure the registrar server, proxy server and outbound proxy server for this SIP account. Figure 95 VoIP > Account 1 (or Account 2) > Server The following table describes the labels in this screen. Table 73 VoIP > Account 1 (or Account 2) > Server LABEL DESCRIPTION Registrar Server Registrar Server Enter the IP address or domain name of a register server. You can use up to 63 printable ASCII characters.
Chapter 10 The VoIP Account Screens Table 73 VoIP > Account 1 (or Account 2) > Server LABEL Port Number DESCRIPTION Enter the SIP proxy server’s listening port number, if your VoIP service provider gave you one. Otherwise, keep the default value. Outbound Server Outbound Server Enter the IP address or domain name of the outbound proxy server provided by your VoIP service provider. You can use up to 63 printable ASCII characters. If you choose not to use an outbound proxy server, set this to 0.0.0.0.
Chapter 10 The VoIP Account Screens Table 74 VoIP > Account 1 (or Account 2) > SIP LABEL Password DESCRIPTION Type the SIP password associated with this account. This field can be 0-31 printable characters (A-Z, a-z, 0-9), underscores (_), pluses (+), periods (.), and “at” symbols (@). Codec Settings 1st Codec, 2nd Codec, 3rd Codec Select the BM2022w’s first, second, and third choices of the type of voice coder/decoder (codec) that you want the phone line to use when communicating with the SIP server.
Chapter 10 The VoIP Account Screens 10.5 Feature Click VoIP > Account 1 (or Account 2) > Feature to configure advanced VoIP features such as DTMF, Call Forwarding and Call Waiting. Figure 97 VoIP > Account 1 (or Account 2) > Feature The following table describes the labels in this screen. Table 75 VoIP > Account 1 (or Account 2) > Feature LABEL DESCRIPTION Feature Settings Block Anonymous Call Select this to have the BM2022w block all incoming calls from phone that do not send caller ID.
Chapter 10 The VoIP Account Screens Table 75 VoIP > Account 1 (or Account 2) > Feature LABEL MWI (Message Waiting Indication) DESCRIPTION Select this to enable Message Waiting Indicator (MWI) function for this SIP account specified in Section 10.4 on page 169. When there is at least one new voicemail for the SIP account, the voice LED (described in Section 1.2.1 on page 19) turns yellow and the BM2022w sends a beeping tone to the phone while user picks-up the phone to make calls.
Chapter 10 The VoIP Account Screens The following table describes the labels in this screen. Table 76 VoIP > Account 1 (or Account 2) > Dialing LABEL DESCRIPTION Inter-digit Timeout Set the time in seconds (1~5) the BM2022w waits for each digit input of a complete callee number after you press the first key on the phone. If the BM2022w cannot receive the next digit entered within this time period, the BM2022w processes digits you have dialed.
Chapter 10 The VoIP Account Screens time values. When the duration of the call reaches half of the SE time period, the session is refreshed. Table 78 SIP Call Progression A P B 1. INVITE SE: 60 ------------------> 2. 422 MSE: 3600 <----------------------3. ACK ------------------> 4. INVITE SE: 3600 MSE: 3600 ------------------> 5. INVITE SE: 3600 MSE: 3600 ------------------------> 6. INVITE SE: 3600 MSE: 3600 --------------------> 7. OK SE: 3600 <------------------8.
Chapter 10 The VoIP Account Screens Table 78 SIP Call Progression (continued) A P B 13. UPDATE SE: 3600 ------------------> 14. UPDATE SE:3600 -----------------------> --------------------> 15. OK SE: 3600 <---------------------- <------------------- 16. OK SE: 3600 <-----------------17. BYE ------------------> 18. OK <------------------- 1 A sends a SIP INVITE request. This message is an invitation for B to participate in a SIP telephone call. A’s INVITE specifies a SE of 60 seconds.
Chapter 10 The VoIP Account Screens 14 The UPDATE request is forwarded by P to B. 15 B receives the UPDATE request and responds with an OK message. 16 The OK message is received by A. 17 After talking, A hangs up and sends a BYE request. 18 B replies with an OK response confirming receipt of the BYE request and the call is terminated. 10.8.2 SIP Client Server SIP is a client-server protocol. A SIP client is an application program or device that sends SIP requests.
C HAPTER 11 The VoIP Line Screens 11.1 Overview The VoIP > Line screens allow you to configure the volume, echo cancellation, VAD settings and custom tones for phone ports 1 and 2 which map to SIP accounts 1 and 2 (see Chapter 10 on page 163). Since both the Line 1 and Line 2 screens are quite similar, this section uses the VoIP > Line 1 screens to describe the fields. 11.1.1 What You Can Do in This Chapter • The Phone screen (Section 11.2 on page 178) lets you configure phone settings.
Chapter 11 The VoIP Line Screens 11.2 Phone Click VoIP > Line 1 (or Line 2) > Phone to configure phone related settings. Figure 100 VoIP > Line 1 (or Line 2) > Phone The following table describes the labels in this screen. Table 79 VoIP > Line 1 (or Line 2) > Phone LABEL DESCRIPTION Phone Hook Flash Detect Upper Bound Enter the number of milliseconds for the upper bound of a quick on-hook and offhook cycle in order to recognize a hook flash event.
Chapter 11 The VoIP Line Screens Table 80 VoIP > Line 1 (or Line 2) > Voice LABEL DESCRIPTION LEC - Line Echo Cancellation Line Echo Canceller Tail Length Select the maximum number of milliseconds of an echo length (16 ms, 32 ms or 48 ms) the BM2022w can handle and eliminate the effect. An echo is normally caused by the sound of your voice reverberating in the telephone receiver while you talk. Select Disable to turn this feature off. 11.
Chapter 11 The VoIP Line Screens 180 BM2022w User’s Guide
C HAPTER 12 Maintenance 12.1 Overview Use these screens to manage and maintain your BM2022w. 12.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. Remote Management Limitations Remote management over LAN or WAN will not work when: 1 You have disabled that service in one of the remote management screens. 2 The IP address in the Secured Client IP field does not match the client IP address.
Chapter 12 Maintenance Note: SNMP is only available if TCP/IP is configured. TR-069 TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipment (CPE), such as the BM2022w. It can be managed over a WAN by means of an Auto Configuration Server (ACS). TR-069 is based on sending Remote Procedure Calls (RPCs) between the ACS and the client device. RPCs are sent in Extensible Markup Language (XML) format over HTTP or HTTPS.
Chapter 12 Maintenance SNMP An SNMP managed network consists of two main types of component: agents and a manager. Figure 104 SNMP Management Model An agent is a management software module that resides in a managed device (the BM2022w). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions.
Chapter 12 Maintenance The BM2022w sends traps to the SNMP manager when any of the following events occurs: Table 82 SNMP Traps TRAP NAME DESCRIPTION 0 coldStart (defined in RFC-1215) A trap is sent after booting (power on). 1 warmStart (defined in RFC-1215) A trap is sent after booting (software reboot). 4 authenticationFailure (defined in RFC-1215) A trap is sent to the manager when receiving any SNMP get or set requirements with the wrong community (password).
Chapter 12 Maintenance disparate types of data over HTTP. Security encryption for communication is handled by different processes configured elsewhere in the BM2022w’s web configurator Basic Access Authentication – Sends a person’s user name and password in Base64. This authentication protocol is supported by all browsers that are HTTP 1.0/1.1 compliant.
Chapter 12 Maintenance Daytime A network protocol used by devices for debugging and time measurement. A computer can use this protocol to set its internal clock but only if it knows in which order the year, month, and day are returned by the server. Not all servers use the same format. Time A network protocol for retrieving the current time from a server.
Chapter 12 Maintenance 12.3 HTTP Use this screen to allow remote access to the WiMAX Device from a network connection over HTTP. Click Maintenance > Remote MGMT > HTTP to open this screen as shown next. Figure 108 HTTP Screen This screen contains the following fields: Table 84 HTTP LABEL DESCRIPTION HTTP Server Enable Select this to enable remote management using this service. Port Number Enter the port number this service can use to access the BM2022w. The computer must use the same port number.
Chapter 12 Maintenance Click Maintenance > Remote MGMT > Telnet to open this screen as shown next. Figure 109 Telnet Screen This screen contains the following fields: Table 85 Telnet LABEL DESCRIPTION Enable Select this to enable remote management using this service. Port Number Enter the port number this service can use to access the BM2022w. The computer must use the same port number. Allow Connection from WAN Select this to allow connections using this service that originate on the WAN.
Chapter 12 Maintenance 12.6 SNMP Use this screen to allow remote access to the WiMAX Device from a network connection over SNMP. Click Maintenance > Remote MGMT > SNMP to open this screen as shown next. Figure 111 SNMP Screen This screen contains the following fields: Table 87 SNMP LABEL DESCRIPTION Enable Select this to enable remote management using this service. Location Enter the location of the SNMP server (for example, “Engineering Dept., Floor 6, Building A, New York City”).
Chapter 12 Maintenance Click Maintenance > Remote MGMT > CWMP to open this screen as shown next. Figure 112 CWMP Screen This screen contains the following fields: Table 88 CWMP LABEL DESCRIPTION Enable Select this to enable remote management using this service. ACS Server URL Enter the URL or IP address of the auto-configuration server. Bootstrap Enable Select this to enable bootstrap events.
Chapter 12 Maintenance Table 88 CWMP (continued) LABEL DESCRIPTION Connection Request Password Enter the connection request password that the ACS must send to the BM2022w when it requests a connection. You can enter up to 31 alphanumeric characters (a-z, A-Z, 0-9) and underscores but spaces are not allowed. Note: This must be provided by the ACS administrator. CA Certificate File Click Browse to upload a Certificate Authority (CA) certificate to the BM2022w.
Chapter 12 Maintenance Table 89 OMA-DM (continued) LABEL DESCRIPTION Server Auth Type Select the encryption algorithm scheme used by the OMA-DM server to communicate with client devices. If the scheme selected here does not match the actual scheme used by the server, then server will challenge the BM2022w to automatically update its settings. • • • • None - No authentication. Basic - Server ID and Password are encoded using a Basic Access Authentication Code.
Chapter 12 Maintenance 12.9 Date Use these settings to set the system time or configure an NTP server for automatic time synchronization. Click Maintenance > Date/Time > Date to open this screen as shown next. Figure 114 Date Screen This screen contains the following fields: Table 90 Date LABEL DESCRIPTION Manual New Time Enter the new time in this field. New Date Enter the new date in this field. Get from Time Server Time Protocol Select the time service protocol that your time server uses.
Chapter 12 Maintenance This screen contains the following fields: Table 91 Time Zone LABEL DESCRIPTION Time Zone Select the time zone at your location. Enable Daylight Savings Time Select this if your location uses daylight savings time. Daylight savings is a period from late spring to early fall when many places set their clocks ahead of normal local time by one hour to give more daytime light in the evening.
Chapter 12 Maintenance After two minutes, log in again, and check your new firmware version in the Status screen. You might have to open a new browser window to log in. If the upload is not successful, you will be notified by error message. 12.12 Upgrade Link Use this screen to set the URL of a firmware file on a remote computer and upload it to the WiMAX Device. Click Maintenance > Firmware Upgrade > Upgrade Link to open this screen as shown next.
Chapter 12 Maintenance 12.14 Backup Use this screen to backup your current WiMAX Device settings to a local computer. Click Maintenance > Backup/Restore > Backup to open this screen as shown next. Figure 119 Backup/Restore Screen This screen contains the following fields: Table 95 Backup/Restore LABEL DESCRIPTION Backup Click this to save the BM2022w’s current configuration to a file on your computer.
Chapter 12 Maintenance This screen contains the following fields: Table 96 Restore LABEL DESCRIPTION Configuration File Click Choose File then browse to the location of a firmware upgrade file and select it. Click File Restore to upload the specified configuration to the BM2022w and replace the current settings. Backup Configuration File URL Enter the URL or IP address of the backup configuration file’s location on the network.
Chapter 12 Maintenance 12.17 Log Setting Use this screen to configure which type of events on the WiMAX Device are logged. Click Maintenance > LOG > Log Setting to open this screen as shown next. Figure 122 Log Setting Screen This screen contains the following fields: Table 98 Log Setting LABEL DESCRIPTION Enable Log Select this to have the BM2022w log network activity according to the selected Log Level. Log Level Select the type of logs to record.
Chapter 12 Maintenance Click Maintenance > LOG > Log Display to open this screen as shown next. Figure 123 Log Display Screen This screen contains the following fields: Table 99 Log Display LABEL DESCRIPTION Display Level Select the type of logs to display from this menu. Refresh Click this to refresh the logs in the display window. 12.19 Ping Test Use this screen to test network connectivity using ping. Click Maintenance > Network Test > Ping to open this screen as shown next.
Chapter 12 Maintenance 12.20 Traceroute Test Use this screen to test network connectivity using traceroute. Click Maintenance > Network Test > Traceroute to open this screen as shown next. Figure 125 Traceroute Screen This screen contains the following fields: Table 101 Traceroute LABEL DESCRIPTION IP Address Enter the IP address or domain name of a target device to which this test will send. Traceroute Click this to start the test. The result will show at the bottom of the screen. 12.
Chapter 12 Maintenance Table 102 About (continued) LABEL DESCRIPTION CROM Version This field displays the CROM version number. Firmware Version This field displays the current version of the firmware inside the device. Firmware Date This field displays the date the firmware version was created. Bootloader Version This field displays the bootloader version. 12.22 Reboot Use this screen to perform a software restart of the WiMAX Device.
Chapter 12 Maintenance 202 BM2022w User’s Guide
C HAPTER 13 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories: • Power, Hardware Connections, and LEDs • BM2022w Access and Login • Internet Access • Reset the BM2022w to Its Factory Defaults 13.1 Power, Hardware Connections, and LEDs The BM2022w does not turn on. None of the LEDs turn on. 1 Make sure you are using the power adapter or cord included with the BM2022w.
Chapter 13 Troubleshooting 13.2 BM2022w Access and Login I forgot the IP address for the BM2022w. 1 The default IP address is http://192.168.1.1192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the BM2022w by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 13 Troubleshooting 6 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions • Try to access the BM2022w using another service, such as Telnet. If you can access the BM2022w, check the remote management settings and firewall rules to find out why the BM2022w does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port.
Chapter 13 Troubleshooting 4 Check your WiMAX settings. The BM2022w may have been set to search the wrong frequencies for a wireless connection. See Chapter 6 on page 69. If you are unsure of the correct values, contact your service provider. 5 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP. 6 Disconnect all the cables from your BM2022w, and follow the directions in the Quick Start Guide again.
Chapter 13 Troubleshooting 2 Contact your ISP if the problem persists. 13.4 Reset the BM2022w to Its Factory Defaults If you reset the BM2022w, you lose all of the changes you have made. The BM2022w re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the Reset button. To reset the BM2022w, 1 Make sure the Power LED is on and not blinking. 2 Press and hold the Reset button for five to ten seconds.
Chapter 13 Troubleshooting 208 BM2022w User’s Guide
C HAPTER 14 Product Specifications This chapter gives details about your BM2022w’s hardware and firmware features.
Chapter 14 Product Specifications Table 105 Radio Specifications (continued) Output Power Typically 26.5 dBm with internal antennas Duplex mode Time Division Duplex (TDD) Security PKMv2 EAP-TTLS/CHAP/PAP/MSCHAP/MSCHAPv2 CMAC message authentication CCM mode 128-bit AES data ciphering Device authentication WiMAX Forum X.
Chapter 14 Product Specifications Table 106 Firmware Specifications (continued) FEATURE DESCRIPTION SIP ALG Your device is a SIP Application Layer Gateway (ALG). It allows VoIP calls to pass through NAT for devices behind it (such as a SIP-based VoIP software application on a computer). Dynamic Jitter Buffer The built-in adaptive buffer helps to smooth out the variations in delay (jitter) for voice traffic (up to 60 ms). This helps ensure good voice quality for your conversations.
Chapter 14 Product Specifications Table 107 Standards Supported (continued) STANDARD DESCRIPTION RFC 2543 SIP Protocol RFC 2617 Hypertext Transfer Protocol (HTTP) Authentication: Basic and Digest Access Authentication RFC 2782 A DNS RR for specifying the location of services (DNS SRV) RFC 2833 Real-time Transport Protocol Payload for DTMF Digits, Telephony Tones and Telephony Signals RFC 2976 The SIP INFO Method RFC 3261 Session Initiation Protocol (SIP version 2) RFC 3262 Reliability of Pro
Chapter 14 Product Specifications Table 108 Voice Features Phone config The phone configuration table allows you to customize the phone keypad combinations you use to access certain features on the BM2022w, such as call waiting, call return, call forward, etc. The phone configuration table is configurable in command interpreter mode.
Chapter 14 Product Specifications Table 109 Star (*) and Pound (#) Code Support *72 Activate Call Forwarding (*72 followed by the 10 digit phone number that is requesting call forwarding service) *720 Activate Call Forwarding (*720 followed by the 10 digit phone number that is requesting deactivation of call forwarding service) *73 Plus the forward to phone number to activate Call Forwarding No Answer (no VM service plan) *730 Deactivate Call Forwarding No Answer *740 Plus the forward to phone num
A PPENDI X A WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times. User authentication is the process of confirming a user’s identity and level of authorization.
Appendix A WiMAX Security • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your base station acts as a message relay between the MS/SS and the network RADIUS server.
Appendix A WiMAX Security • Authorization request and reply The MS/SS presents its public certificate to the base station. The base station verifies the certificate and sends an authentication key (AK) to the MS/SS. • Key request and reply The MS/SS requests a transport encryption key (TEK) which the base station generates and encrypts using the authentication key. • Encrypted traffic The MS/SS decrypts the TEK (using the authentication key).
Appendix A WiMAX Security 218 BM2022w User’s Guide
A PPENDI X B Setting Up Your Computer’s IP Address Note: Your specific Huawei device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 128 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 130 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 132 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 133 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 134 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. Figure 136 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 137 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 139 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 140 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 141 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 142 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 143 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
Appendix B Setting Up Your Computer’s IP Address • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. Figure 144 Mac OS X 10.4: Network Preferences > Ethernet Click Apply Now and close the window.
Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 146 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 147 Mac OS X 10.
Appendix B Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 148 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your BM2022w. Figure 149 Mac OS X 10.5: Network Preferences > Ethernet 6 232 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 150 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. Figure 152 Ubuntu 8: Network Settings > Connections 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix B Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 154 Ubuntu 8: Network Settings > Connections 5 The Properties dialog box opens. Figure 155 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
Appendix B Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 156 Ubuntu 8: Network Settings > DNS 8 236 Click the Close button to apply the changes.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 160 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 161 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 162 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 240 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 163 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 164 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDI X C Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScript and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 167 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 244 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix C Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 168 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix C Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 169 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript is allowed.
Appendix C Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 170 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 171 Security Settings - Java Scripting Java Permissions 248 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 172 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 173 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScript and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScript and Java Permissions 252 BM2022w User’s Guide
A PPENDI X D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 176 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes. Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.
Appendix D IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 113 Alternative Subnet Mask Notation SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 /24 0000 0000 0 255.255.255.128 /25 1000 0000 128 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.
Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 178 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix D IP Addresses and Subnetting Table 114 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 115 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix D IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 118 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix D IP Addresses and Subnetting Table 120 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix D IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix D IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
A PPENDIX E Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 182 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix E Importing Certificates 4 In the Certificate dialog box, click Install Certificate. Figure 185 Internet Explorer 7: Certificate 5 In the Certificate Import Wizard, click Next.
Appendix E Importing Certificates 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 187 Internet Explorer 7: Certificate Import Wizard 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 188 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix E Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 190 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 191 Internet Explorer 7: Security Warning 11 Finally, click OK when presented with the successful certificate installation message.
Appendix E Importing Certificates 12 The next time you start Internet Explorer and go to a Huawei web configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a Huawei web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 194 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 196 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix E Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 198 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 199 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a Huawei web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS > Options. Figure 203 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 205 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 206 5 274 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information.
Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 207 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 209 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 210 Firefox 2: Delete Web Site Certificates 5 276 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a Huawei web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS > Preferences. Figure 213 Opera 9: Tools Menu 2 In Preferences, click ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 215 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix E Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 217 6 Next, click OK. Figure 218 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details.
Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 219 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 221 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your device’s web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 222 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 223 Konqueror 3.
Appendix E Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 224 Konqueror 3.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a Huawei web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 225 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 226 Konqueror 3.
Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 228 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 229 Konqueror 3.
Appendix E Importing Certificates 288 BM2022w User’s Guide
A PPENDIX F Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix F Common Services Table 121 Commonly Used Services (continued) 290 NAME PROTOCOL PORT(S) DESCRIPTION HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program.
Appendix F Common Services Table 121 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP 161 Simple Network Management Program. SNMP-TRAPS TCP/UDP 162 Traps for use with the SNMP (RFC:1215).
Appendix F Common Services 292 BM2022w User’s Guide
A PPENDIX G Legal Information Certifications Federal Communications Commission (FCC) Interference Statement This complies with PartPart 15 of is subject to the following two conditions: Thedevice device complies with 15the of FCC FCCRules. rules.Operation Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and • this Thisdevice device complies part 15 of the FCC Rules.
Appendix G Legal Information ࣹრ!" ࠉᖕ!!פ܅ሽंᘿ୴ࢤሽᖲጥᙄऄ รԼԲය!!ᆖীڤᎁᢞٽհפ܅୴᙮ሽᖲΔॺᆖױΔֆΕᇆࢨࠌش ृ݁լᖐ۞᧢ޓ᙮ΕףՕפࢨ᧢ޓૠհࢤ֗פ౨Ζ รԼය!!פ܅୴᙮ሽᖲհࠌشլᐙଆڜ٤֗եឫٽऄຏॾΙᆖ࿇ ڶեឫွழΔᚨܛمೖشΔࠀޏ۟ྤեឫழֱᤉᥛࠌشΖ ছႈٽऄຏॾΔਐࠉሽॾࡳ܂ᄐհྤᒵሽॾΖפ܅୴᙮ሽᖲႊݴ ࠹ٽऄຏॾࢨՠᄐΕઝᖂ֗᠔᛭شሽंᘿ୴ࢤሽᖲໂհեឫΖ ءᖲૻڇլեឫٽऄሽፕፖլ࠹եឫঅᎽයٙՀ࣍փࠌشΖ! ྇֟ሽंᐙΔᓮݔᔞࠌشΖ Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Index Index A C AAA 70 CA 71, 72 AbS 158 CBC-MAC 217 accounting server see AAA CCMP 215, 217 ACK message 175 Advanced Encryption Standard see AES certificates 215 CA 71 formats 71 verification 217 AES 217 Certification Authority, see CA AH 149 ALG 97 certifications 293 notices 294 algorithms 149 chaining 217 alternative subnet mask notation 256 chaining message authentication see CCMP activity 70 analysis-by-synthesis 158 Application Layer Gateway see ALG cell 69 circuit-switched telep
Index DHCP 95 server 95 G diameter 70 G.168 177 Differentiated Services see DiffServ G.711 157 G.729 158 Diffie-Hellman key groups 155 DiffServ 158 DiffServ Code Point (DSCP) 158 marking rule 162 H digital ID 72, 215 DS field 162 hybrid waveform codec 158 DSCP see DiffServ DTMF 165 I dual-tone multi-frequency see DTMF IANA 260 Dynamic Host Configuration Protocol see DHCP ID type and content 153 identity 70, 215 idle timeout 181 IEEE 802.16 69, 215 E IEEE 802.16e 69 IGD 1.
Index K Network Discovery and Selection see ND&S key 215 request and reply 217 O L outbound proxy 165 SIP 165 L2TP VPN 137 outbound proxy server 165 Layer 2 Tunneling Protocol VPN see L2TP VPN outside header 150 P M pattern-spotting 217 MAC 217 PBX services 157 MAN 69 PCM 157 Management Information Base (MIB) 183 per-hop behavior 162 Message Authentication Code see MAC PHB (per-hop behavior) 162 message integrity 217 Metropolitan Area Network see MAN microwave 69, 70 mobile station see MS
Index number 163 proxy server 164 register server 164 servers 176 service domain 164 URI 163 user agent 164 R RADIUS 70, 72, 215 Message Types 216 Messages 216 Shared Secret Key 216 Real-time Transport Protocol see RTP register server SIP 164 related documentation 3 remote management and NAT 181 remote management limitations 181 required bandwidth 158 RFC 1889 158 RFC 3489 165 RTP 158 SIP outbound proxy 165 SNMP 181 manager 183 sound quality 157 SS 69, 70 STUN 165 subnet 253 mask 254 subnetting 256 subsc
Index U Wireless Metropolitan Area Network see MAN unauthorized device 215 wireless network access 69 standard 69 uniform resource identifier 163 Universal Plug and Play see UPnP UPnP 97 application 98 auto-discovery 119 security issues 98 Windows XP 118 wireless security 215 wizard setup 27 WPS 106 adding stations 107 push button 107 use NAT 165 user authentication 215 V VAD 177 verification 217 virtual LAN see VLAN VLAN 122 examples 52 voice activity detection 177 coding 157 mail 157 Voice over IP
Index 300 BM2022w User’s Guide