Administrative Guide Configuration Click on Add to create a new Static Route. Enter the destination network address, subnet mask, gateway AND/OR available WAN interface then click "Save Settings" to add the entry to the routing table. (Figure 6-10-1, 6-10-2) Figure 6-10-2. Advanced Setup – Route – Static Route – Add 6.4.3.2 RIP To activate RIP for the device, select the 'Enabled' radio button for Global RIP Mode.
Administrative Guide Configuration 6.4.4 NAT It’s separated into three parts: Virtual Servers, Port Trigger, and DMZ. 6.4.4.1 Virtual Servers Virtual Server allows you to direct incoming traffic from WAN side (identified by Protocol, IP address and service port) to the internal server with private IP address on the LAN side. The Internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side.
Administrative Guide Configuration Figure 6-12-2. Advanced Setup – NAT – Virtual Servers – Add 6.4.4.2 Port Triggering Some applications require that specific port(s) in the Router's firewall be opened for access by the remote parties. Port Trigger dynamically opens up the 'Open Ports' in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote party using the 'Triggering Ports'.
Administrative Guide Configuration Figure 6-13-1. Advanced Setup – NAT – Port Triggering Figure 6-13-2. Advanced Setup – NAT – Port Triggering – Add Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration 6.4.4.3 DMZ The EUT will forward IP packets from the WAN that do not belong to any of the applications configured in the Virtual Servers table to the DMZ host computer. (Figure 614) Figure 6-14. Advanced Setup – NAT – DMZ 6.4.5 Security The configuration display only when WAN page’s security option is selected. It’s separated into three parts: Incoming Filter, Output Filter, and Parental Control. 6.4.5.
Administrative Guide Configuration Figure 6-15-1. Advanced Setup – Security – Incoming IP Filtering Figure 6-15-2. Advanced Setup – Security – Incoming IP Filtering – Add 6.4.5.2 Output Filter It allows the users to create a filter rule to identify outgoing IP traffic by specifying a new filter name and at least one condition. All of the specified conditions in this filter rule must be satisfied for the rule to take effect. (Figure 6-16-1, Figure 6-16-2) Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration Figure 6-16-1. Advanced Setup – Security – Outgoing IP Filtering Figure 6-16-2. Advanced Setup – Security – Outgoing IP Filtering – Add 6.4.5.3 Parental Control It adds time restriction to a special LAN device connected to the Router. The 'Browser's MAC Address' automatically displays the MAC address of the LAN device where the browser is running. To restrict other LAN device, click the "Other MAC Address" button and enter the MAC address of the other LAN device.
Administrative Guide Configuration Figure 6-17-1. Advanced Setup – Security –Parental Control Figure 6-17-2. Advanced Setup – Security –Parental Control – Add 6.4.6 Quality of Service It’s separated into two parts: Traffic Class, and Bandwidth Control. Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration 6.4.6.1 Traffic Class Click on Add to create a class to identify the IP traffic by specifying at least one condition below. If multiple conditions are specified, all of them should be satisfied to make sure the rule will take effect. (Figure 6-18-1, Figure 6-18-2) IP QoS is applied to the traffic from LAN to WAN; the traffic from WAN to LAN will not be applied. Enter the QoS class name for this policy.
Administrative Guide Configuration Figure 6-18-2. Advanced Setup – Quality of Service – Traffic Class – Add 6.4.6.2 Bandwidth Control This page allows you to control WAN port's upstream bandwidth according to your settings (Figure 6-19). And it can ensure the highest priority IP packets' traffic firstly. By default, all voice packets has been queued in the highest IP packets, and the others has been queued in the normal IP packets if they have not been set in the priority field of the traffic class rule.
Administrative Guide Configuration Figure 6-19. Advanced Setup – Quality of Service – Bandwidth Control 6.4.7 Dynamic DNS The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname in any of the many domains, allowing your DSL router to be more easily accessed from various locations on the Internet. (Figure 6-20-1, Figure 6-20-2) Figure 6-20-1. Advanced Setup – Dynamic DNS Figure 6-20-2. Advanced Setup – Dynamic DNS - Add Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration 6.5 Wireless This directory display only when wireless card is installed in your EUT board. Use the Wireless screen to configure the EUT for wireless access. It is separated into 6 parts: z Basic z Security z MAC Filter z Wireless Bridge z Advanced z Station Info The configurable items for each part would be described in the following. 6.5.1 Basic The page (Figure 6-21) allows you to configure basic feature of the wireless LAN interface.
Administrative Guide Configuration 802.1X: As the IEEE standard for access control for wireless and wired LANs, 802.1x provides a means of authentication and authorizing devices to attach to a LAN port. This standard defines the Extensible Authentication Protocol (EAP), which uses a central authentication server to authenticate each user on the network. WPA/WPA2: The Wi-Fi Alliance put together WPA/WPA2 as a data encryption method for 802.11 wireless LANs.
Administrative Guide Configuration WEP, short for Wired Equivalent Privacy, is a protocol for wireless LANs or local area networks. This WEP is defined in the 802.11 Standard. WEP is designed so security levels are maintained at the same level as the wired LAN. WEP’s aim is to provide security by encrypting data over radio waves. WEP protects data as it’s transmitted from one end point to another. WEP is used at two lowest layers, the data link and physical layer.
Administrative Guide Configuration This page allows users to Add/Remove hosts with the specified MAC addresses that are able or unable to access the wireless network. When users decide to use Allow, only the MAC addressed in the user-defined list can access the wireless network. When users use Deny, only the user specified MAC addresses are unable to access to wireless network. And if the Disable option is selected, all users will be able to access to wireless network.
Administrative Guide Configuration Figure 6-24. Wireless – Wireless Bridge 6.5.5 Advanced It allows you to configure advanced features of the wireless LAN interface.
Administrative Guide Configuration Figure 6-25. Wireless – Advanced RTS Threshold: This value should remain at its default setting of 2347. The range is 0~2347 bytes. Should you encounter inconsistent data flow, only minor modifications are recommended. If a network packet is smaller than the packet RTS threshold size, the RTS/CTS mechanism will not be enabled. The IAD sends Request of Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame.
Administrative Guide Configuration 54g protection: In Auto mode the IAD will use RTS/CTS to improve 802.11g performance in mixed 802.11g/802.11b networks. Turn protection off to maximize 802.11g throughput under most conditions. WMM (WiFi Multimedia): Select to enable/disable the support.(Figure 6-25) 6.5.6 Station Info Authenticated wireless stations and their status will be shown here.(Figure 6-26) Figure 6-26. Wireless – Station Info Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration 6.6 Voice Use the Voice screen to configure the EUT function related parameters.
Administrative Guide Configuration Figure 6-27. Voice – Phone – Phone Extension SIP Authentication: It provides 24 IP phones registered. Phone Number: The phone number is a station number. If it conflicts with the setting in Numbering Plan, it fails to add or make the change. Its value range is limited by Start Extension Number and End Extension Number settings in Numbering Plan page. Password: The user password of this phone. The length is up to 24 digits or characters.
Administrative Guide Configuration Day COS: The field assigns Class of Service for day mode operation. Acceptable values are 0-7. At default, all extensions are unrestricted. Night COS: The field assigns Class of Service for night mode operation. Acceptable values are 0-7. At default, all extensions are unrestricted. FXS Phone Start Number: It shows the FXS phone number. It’s programmed in System – Numbering Plan.
Administrative Guide Configuration 6.6.2.1 IP Trunk This page allows you to configure the proxy and registration server of IP Trunk, up to 8 lines of IP Trunk are supported. (Figure 6-29) Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration Figure 6-29. Voice – Trunk – IP Trunk Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration Subscriber Information Trunk Number: The assigned phone number from Uplink Server. Register Expires: how long the Gateway sends REGISTER to uplink registrar server. It counts based on second. Auth ID: The Account ID of registration to uplink server. It’s used for Digest Authentication. Auth Password: The Password of registration to uplink server. It’s used for Digest Authentication. SIP Proxy: the position of uplink registrar server.
Administrative Guide Configuration Figure 6-30. Voice – Trunk –Trunk Group Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration 6.6.2.3 Answering Positions Figure 6-31-1. Voice – Trunk – Answering Positions – AA(Yes) Figure 6-31-2. Voice – Trunk – Answering Positions – AA(No) Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration This Item allows you to configure answering position for each Trunk line including PSTN trunk and IP Trunk. You can choose Auto Attendant, or manual configure the target phone number on Day/night basis. Auto Attendant: Yes/No. Day Answering Position: 6 extension numbers maximum Night Answering Position: 6 extension numbers maximum If choose Auto Attendant as Yes, an idle VAA will auto-answer this incoming trunk call.
Administrative Guide Configuration Figure 6-32. Voice – Trunk – Call Restriction Table Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration 6.6.2.5 Call Routing Table Figure 6-33. Voice – Trunk – Call Routing Table This page allows you to configure the call routing table. Each item will be a routing rule for outgoing call. From/To define the number range, Min/Max define the match length, Del/Insert can change the target number, Destination to define the outbound call interface. You can click the buttons under the table to choose pages.
Administrative Guide Configuration 6.6.3.1 Numbering Plan Figure 6-34. Voice – System – Numbering Plan This page allows you to configure extension number range. You can also define some special service numbers in the table.(Figure 6-33) Start extension number: start phone number of system internal extension. All valid extension number can’t be smaller than it. End extension number: end phone number of system internal extension. All valid extension number can’t be greater than it.
Administrative Guide Configuration Start Trunk Group number: IG provides 4 trunk groups at most. If dialing trunk group number, IG will choose the first idle line for caller automatically. All Paging number: If dialing this number, all internal IP2007s will be paged. Start Paging Group number: 3 paging groups are defined in IG. If dialing a Paging Group number, the call will page to all internal IP2007s of the called paging group.
Administrative Guide Configuration Figure 6-36. Voice – System – Service Mode 6.6.3.3 Transmission This page allows you to configure the Audio, FXS, FXO settings. Click “Save Settings” button to save the new configuration. Click “Cancel Changes” button you can cancel the changes. (Figure 6-36) Copy Right 2006 Tecom, Co. LTD.
Administrative Guide Configuration Figure 6-37. Voice – System – Transmission Audio: It is used to set many Audio-related options. It will be applied to the all FXS and PSTN lines. Country: It may be used to determine not only the Caller ID detection / transmission method but also ring/tone cadence/frequency. Voice Active Detection: Enable or Disable; VAD is a technique that detects the absence of audio and conserved bandwidth by preventing the transmission of “silence packets” over the network.
Administrative Guide Configuration Codec Priority: EUT can support different audio Codec (G711u, G711a, G723, G729a) but only one is active at one time. You can choose “Preferred Codec”, ”Secondary Codec”, ”Thirdly Codec” and ”Fourth Codec” properly. FXS: It is used to set many FXS-related options. Fax Support: The system supports FAX/modem tone detection with G.711 mode. Call ID Method: The system provides the ability to detect the calling party identification provided by PSTN lines.
Administrative Guide Configuration Figure 6-38-1. Voice – System – IG Dynamic Discovery 6.6.3.5 IG Expansion Table This page shows the all cooperated IGs. It can be got through IG Dynamic Discovery. It also allows you to add the specified IG that our calls want to be routed into. IG Host Name: The cooperated IG’s name. IP Address: The cooperated IG’s IP address. Sip Port: The cooperated IG’s SIP port. COS: The cooperated IG’s Class of Service.