Top Banner
P-2812HNU-51c Dual WAN VDSL2 IAD with 802.11n Wireless Support Notes Firmware Version 1.02BLL0C0 July 2010 Edition 2.0
78
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51cDual WAN VDSL2 IAD with 802.11n Wireless

Support NotesFirmware Version 1.02BLL0C0July 2010Edition 2.0

Page 2: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Table of ContentsGeneral Application Notes ...................................................................................... 6

Highlights of P2812HNU-51c............................................................................ 6

Dual WAN to Simplify the Logistics for ISP .............................................. 6

Internet Access through 3G Networks ........................................................ 6

Dual mode VDSL2/ADSL2+ functionality................................................. 6

Quality of Service (QoS)............................................................................ 7

TR-069 Remote Management .................................................................... 7

Multi-Service Application Scenario ........................................................................ 8

VDSL2 as WAN ................................................................................................ 8

Ethernet as WAN ............................................................................................... 9

Prerequisites .............................................................................................. 9

Access Application Notes........................................................................................11

Web GUI ......................................................................................................... 11

Telnet .............................................................................................................. 12

Internet Connection .............................................................................................. 13

The Default Configured WAN Interfaces Available.......................................... 13

Bridge Mode (In the following example configuration of a bridge WAN

interface, the Ethernet WAN is used.)....................................................... 13

IPoE Mode (In the following example configuration of an IPoE WAN

interface, the VDSL WAN is used.) .......................................................... 16

PPPoE Mode (In the following example configuration of a PPPoE

connection, the ADSL WAN interface is used.) ........................................ 20

IGMP Multicast Proxy Application Note.............................................................. 26

IP Multicast Introduction ................................................................................. 26

IGMP Multicast Proxy Configuration ................................................... 27

VoIP Application Notes.......................................................................................... 28

VoIP Introduction............................................................................................. 28

What is Voice over IP? ............................................................................. 28

VoIP Configuration .......................................................................................... 29

VLAN Based Configuration Note ......................................................................... 32

Environment .................................................................................................... 32

WAN Configuration......................................................................................... 32

Internet Service........................................................................................ 33

IPTV Service ........................................................................................... 36

Interface Grouping........................................................................................... 38

Verification...................................................................................................... 40

Quality of Service Application Note...................................................................... 42

Page 3: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Environment .................................................................................................... 42

QoS configuration ........................................................................................... 42

Wireless Application Notes.................................................................................... 44

Wireless Introduction....................................................................................... 44

WEP Configuration (Wired Equivalent Privacy) Introduction .................. 44

Wi-Fi Protected Access Introduction................................................................ 46

Wireless Configuration .................................................................................... 47

WPS Application Notes ......................................................................................... 50

What is WPS?.................................................................................................. 50

WPS configuration .......................................................................................... 51

Maintenance Log ................................................................................................... 53

Internal Maintenance ....................................................................................... 53

View the log in the Web GUI. .................................................................. 54

Maintenance Tools................................................................................................. 55

Maintenance Procedure.................................................................................... 55

Upgrading firmware................................................................................. 55

Backing-up the Configuration .................................................................. 55

Upload Configuration .............................................................................. 57

Restoring to Factory Default .................................................................... 58

Product FAQ.......................................................................................................... 60

What URLs allow access to P-2812HNU-51c?......................................... 60

What is default IPv6 address on Lan?....................................................... 60

Will the device work with my Internet connection? .................................. 60

What is PPPoE? ....................................................................................... 61

Does the device support PPPoE?.............................................................. 61

How do I know I am using PPPoE?.......................................................... 61

Why does my provider use PPPoE? ......................................................... 61

Which Internet Applications can I use with the device? ............................ 61

How can I configure the device? .............................................................. 62

Does the device support dynamic IP addressing?...................................... 62

What is the difference between the internal IP and the real IP from my ISP?

................................................................................................................ 62

How does e-mail work through the device?.............................................. 62

Is it possible to access a server running behind SUA from the outside

Internet? If possible, how? ....................................................................... 63

What DHCP capability does the device support?...................................... 63

How do I use the reset button, moreover what parameters will be reset by

reset button?............................................................................................. 63

Page 4: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

How does the device support TFTP? ........................................................ 63

Can the device support TFTP over WAN? ................................................ 63

How fast can the data go? ........................................................................ 64

What is Multi-NAT? ................................................................................ 65

When do I need Multi-NAT?.................................................................... 66

What IP/Port mapping does Multi-NAT support? ..................................... 66

What is the difference between SUA and Multi-NAT?.............................. 67

What is BOOTP/DHCP?.......................................................................... 68

What is DDNS? ....................................................................................... 68

When do I need DDNS service?............................................................... 68

Wireless FAQ ............................................................................................ 69

What is a Wireless LAN?......................................................................... 69

What are the advantages of Wireless LANs? ............................................ 69

What are the disadvantages of Wireless LANs?........................................ 70

Where can you find wireless 802.11 networks? ........................................ 70

What is an Access Point? ......................................................................... 70

What is IEEE 802.11? .............................................................................. 70

What is 802.11b? ..................................................................................... 70

How fast is 802.11b?................................................................................ 71

What is 802.11a?...................................................................................... 71

What is 802.11g? ..................................................................................... 71

What is 802.11n? ..................................................................................... 71

Is it possible to use products from a variety of vendors?........................... 72

What is Wi-Fi?......................................................................................... 72

What types of devices use the 2.4 GHz Band?.......................................... 72

Does 802.11 interfere with Bluetooth devices?......................................... 72

Can radio signals pass through walls? ...................................................... 73

What are potential factors that may causes interference among WLAN

products? ................................................................................................. 73

What's the difference between a WLAN and a WWAN?........................... 73

What is Ad Hoc mode? ............................................................................ 73

What is Infrastructure mode? ................................................................... 74

How many Access Points are required in a given area? ............................ 74

What is Direct-Sequence Spread Spectrum Technology – (DSSS)? .......... 74

What is Frequency-hopping Spread Spectrum Technology – (FHSS)?...... 74

Do I need the same kind of antenna on both sides of a link? ..................... 74

Why the 2.4 GHz Frequency range?......................................................... 75

What is Server Set ID (SSID)? ................................................................. 75

Page 5: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

What is an ESSID? .................................................................................. 75

How do I secure the data across an Access Point's radio link? .................. 75

What is WEP?.......................................................................................... 75

What is the difference between 40-bit and 64-bit WEP? ........................... 76

What is a WEP key?................................................................................. 76

Will WEP keys of different lengths be used communicate? ...................... 76

Can the SSID be encrypted?..................................................................... 76

By turning off the broadcast of SSID, can someone still sniff the SSID? .. 76

What are Insertion Attacks? ..................................................................... 76

What is Wireless Sniffer?......................................................................... 77

What is the difference between Open System and Shared Key

Authentication Type? ............................................................................... 77

What is 802.1x? ....................................................................................... 77

What is the difference between No authentication required, No access

allowed and Authentication required? ...................................................... 77

What is AAA?.......................................................................................... 78

What is RADIUS? ................................................................................... 78

What is WPA?.......................................................................................... 78

What is WPA-PSK? ................................................................................. 78

Page 6: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

General Application Notes

Highlights of P2812HNU-51c The P-2812HNU-51c is a VDSL integrated access device (IAD), which provides high-speed VDSL Internet access from major vendors to meet the worldwide market requirements of triple-play services. The P-2812HNU-51c model also features built-in 802.11n WLAN which helps resolve deployment issues where wiring is difficult. Two lines of telephony service are provided using VoIP technology with SIP signaling protocol. Additionally, the device is designed with dual WAN function, suitable forcombining with xPON or WiMAX connections. Users can also leverage the USB interface in P-2812HNU-51c for file sharing or together with a 3G USB dongle for 3G backup.

Dual WAN to Simplify the Logistics for ISP

When a customer migrates from ADSL2+ or VDSL2 to PON or WiMAX, the ISP only needs to install a simple and relatively cheap bridge-device to terminate the physical connection and provide an Ethernet-interface towards the customer. The customer’s existing CPE (P-2812HNU-51c) will still be used for terminating the IP-connection, but now via the Ethernet WAN-interface. The end-users can still enjoy the servicesprovided by their original CPE, without having to change the CPE due to the differentphysical connection.

Internet Access through 3G Networks

The P-2812HNU-51c with a USB interface for 3G USB dongles provides convenient Internet access through 3G networks to eliminate the restrictions of wired networks and to further extend last-mile connectivity. In Internet-challenged environments,such as rural or mountain areas, 3G connectivity may be the only viable solution; and it can be used to provide temporary Internet access to places such as exhibition booths as well. Furthermore, 3G access can be used as a WAN backup for high-availability Internet connection in office environments.

Dual mode VDSL2/ADSL2+ functionality

The P-2812HNU-51c series supports dual-mode functionality that enables service providers to support ATM or PTM on the same device. It offers bi-directional high speed VDSL2, VDSL connection with speed of up to 100/45Mbps in PTM mode and

Page 7: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

24/1Mbps ADSL2+, ADSL2 and ADSL connection in ATM mode. This powerful feature ensures the service provider can support connections not only on the IP network but also on the legacy ATM network without changing the CPE.

Quality of Service (QoS)

The P-2812HNU-51c series is equipped with both ATM and IP QoS features.Service providers can freely design their QoS policy and prioritize the mission-critical services such as IPTV and VoIP, based on the selected service plan. This increases both network efficiency and productivity while enabling service providers to bring real multi-play into the residential user’s life.

TR-069 Remote Management

With TR-069 standard management specifications, the service provider is able to manage and configure client devices remotely without the end-user’s manual intervention. This unique feature not only offers users a true “plug-and-play” experience but also reduces the complexity of deployment, therefore reducing the service provider’s operation and maintenance costs.

Page 8: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Multi-Service Application Scenario

VDSL2 as WAN

Page 9: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Ethernet as WAN

Prerequisites

Before we begin:

The device is shipped with the following factory defaults:

1. IP address = 192.168.1.1, subnet mask = 255.255.255.0 (24 bits) 2. DHCP server enabled with IP pool starting from 192.168.1.33 3. Default username/password = admin/1234

Setting up the PC (Windows OS)

1. Ethernet Connection for LAN access

All PCs must have an Ethernet adapter card installed

2. TCP/IP Installation

Page 10: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

You must first install TCP/IP software on each PC before you can use it for Internet access. If you have already installed TCP/IP, go to the next section to configure it; otherwise, follow these steps to install TCP/IP:

In the Control Panel/Network window, click Add button. In the Select Network Component Type windows, select Protocol and click

Add. In the Select Network Protocol windows, select Microsoft from the

manufacturers, then select TCP/IP from the Network Protocols and click OK.

3. TCP/IP Configuration

Follow these steps to configure Windows TCP/IP:

In the Control Panel/Network window, select your Ethernet network connection, click the TCP/IP entry to select it and click the Properties button.

In the TCP/IP Properties window, select obtain an IP address automatically.

Note: Do not assign an arbitrary IP address and subnet mask to your PCs; otherwise, you will not be able to access the Internet.

1. Click the WINS configuration tab and select Disable WINS Resolution.2. Click the Gateway tab. Highlight any installed gateways and click the Remove

button until there are none listed.3. Click the DNS Configuration tab and select Disable DNS.4. Click OK to save and close the TCP/IP properties window.5. Click OK to close the Network window. You will be prompted to insert your

Windows CD or disk. When the drivers are updated, you will be asked if you want to restart the PC. Make sure that your Device is powered on before answering “Yes” to the prompt. Repeat the above steps for each Windows PC on your network.

Page 11: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Access Application Notes

Web GUI

The following procedure describes the most typical usage of the device via a Browser. The device supports an embedded Web server that allows you to use a Web browser to configure it. Before configuring the router using a Browser, please make sure there is no Telnet or Console login.

a. Log into the P2812HNU-51c via Web GUI.1. Set up your PC/NB IP address as a DHCP client.2. Connect to a LAN port of the P2812HNU-51c via an RJ45 Ethernet cable

and open your Webbrowser.3. The default URL of the P2812HNU-51c is https://192.168.1.1 or

http://192.168.1.1 with username/password = admin/1234.

Page 12: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Telnet

Telnet is also a common way to configure the device, but we have to use CLI commands, which may not be quick-to-learn. The commonly used CLI commands are available upon request from PLM.

b. Login the P2812HNU-51c via Telnet.1. Set up your PC/NB IP address as a DHCP client.2. Connect to a LAN port of P2812HNU-51c via an RJ45 Ethernet cable and

open your Hyper Terminal software (capable of using TELNET).3. The default IP of P2812HNU-51c is 192.168.1.1 username/password =

admin/1234.4. Type in the command “atsh” to display the basic information of device.

Page 13: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Internet Connection

The Default Configured WAN Interfaces Available

In the default configuration file, there are already 3 WAN interfaces configured which are Ethernet WAN (eth4100), ADSL WAN (atm0), and VDSL WAN (ptm0.100). The current mode can be identified on the Network>WAN>Internet Connection page. Please refer to the Web GUI page below:

NOTE: The following sections are step-by-step examples of how to configure different Internet connection types (PPPoE, IPoE, and Bridge) with different WAN interfaces (Ethernet, VDSL, and ADSL).

Bridge Mode (In the following example configuration of a bridge WAN

interface, the Ethernet WAN is used.)

Scenario:The P2812HNU-51c is a CPE bridge.

Page 14: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

a. Bridge Mode1. Go to Network > WAN > Internet Connection.2. Click Add3. Select the Layer 2 interface for this service, e.g. “eth4.100”.

4. Click Next5. Select the desired WAN service type, i.e. “Bridging”.6. Enter the Service Description or use the default value.7. Configure Rate Limitation, or set up VLAN ID if needed.

8. Click Next

Page 15: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

9. Click Apply/Save, and the WAN bridge interface (ETH/Bridge) you just configured will be displayed on the Network>WAN>Internet Connection page.

Page 16: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

IPoE Mode (In the following example configuration of an IPoE WAN

interface, the VDSL WAN is used.)

Scenario:The P2812HNU-51c is a DHCP client in routing mode.

b. IPoE Mode1. Go to Network > WAN > Internet Connection.2. Click Add3. Select the Layer 2 interface for this service, e.g. “ptm0/(0_0_1)”.

4. Click Next5. Select the desired WAN service type, i.e. “IP over Ethernet”.6. Enter the Service Description, or use the default values.7. Configure Rate Limitation, or set up VLAN ID if needed.

Page 17: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

8. Click Next9. Select Obtain an IP address automatically. There is also the option to set a

static IP. Please select the option that fits in the current topology.

10. Click Next11. Select Enable NAT and choose one of the NAT types.12. Optionally select IGMP Multicast Proxy if needed.

Page 18: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

13. Click Next

Note: Default gateway interface list can have multiple WAN interfaces serving as system default gateways but only one will be used according to priority, with the first being the highest and the last one the lowest priority if the WAN interface is connected (no backup WAN functionality is supported). Priority order can be changed by removing all interfaces and adding them again.

14. Use the Arrow button to move the interface just created to the Box on the left (Selected Default Gateway Interface.)

Page 19: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

15. Click Next16. Select Obtain DNS info from a WAN interface.

Note: Select DNS server interfaces from the list of available WAN interfaces OR enter static DNS server IP addresses for the system. In ATM mode, if only a single PVC with IPoA or static IPoE protocol is configured, static DNS server IP addresses must be entered.

17. Click Next

18. Click Apply/Save

Page 20: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

PPPoE Mode (In the following example configuration of a PPPoE

connection, the ADSL WAN interface is used.)

In this example, the process of creating a PVC in ADSL interface is also demonstrated. By default, an ADSL WAN interface has only one PVC which is 8/35 and in default mode. If multiple PVCs are required, separate individual PVCs should be configured.

1. Go to Network> WAN > Layer2 Interface.2. Select ATM from the Interface drop down list and click Add.

Page 21: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

3. Configure new PVC’s VCI/PCI as (0/34), and select EoA DSL link type (EoA is for PPPoE, IPoE, and Bridge.)

4. Select the default connection mode.

5. The option to enable Quality of Service is also available on the bottom of this

Page 22: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

page.

6. Click Apply/Save to finish creation of the new PVC. 7. The newly created PVC will be displayed on Network > WAN >Layer2

Interface.

Scenario:The P2812HNU-51c is a PPPoE client.

c. PPPoE Mode1. Go to Network > WAN > Internet Connection.2. Click Add3. Select the ATM interface for this connection.

Page 23: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

4. Click Next5. Select the desired WAN service type, i.e. “PPP over Ethernet (PPPoE)”.6. Enter the Service Description, or use the default value.

7. Click Next8. Enter the PPP Username, e.g. “[email protected]”.9. Enter the PPP Password, e.g. “1234”.10. Enter the PPPoE Service Name, e.g. “PPPoE”.11. Select the Authentication Method to be “AUTO”.

Page 24: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

12. Click Next13. Select the WAN Interface, and move it to the box on the left for the default

gateway. Other default WAN interfaces can be moved to the box on the right as “Available Routed Interfaces”.

14. Click Next15. Select Obtain DNS info from a WAN interface. Like the default gateway

interface configuration, the WAN interfaces to be adopted can be adjustedby using the Arrow buttons.

Page 25: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

16. Click Next

17. Click Apply/Save, and the newly configured PPPoE connection over ADSL WAN interface will be displayed.

Page 26: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

IGMP Multicast Proxy Application Note

IP Multicast Introduction

What is IP Multicast?

Traditionally, IP packets are transmitted in two ways: unicast or broadcast. Multicast is a third way to deliver IP packets to a group of hosts. Host groups are identified by class D IP addresses, i.e., those with "1110" as their higher-order bits. In dotted decimal notation, host group addresses range from 224.0.0.0 to 239.255.255.255. Among them, 224.0.0.1 is assigned to the permanent IP hosts group, and 224.0.0.2 is assigned to the multicast routers group.

IGMP (Internet Group Management Protocol) is the protocol used to support multicast groups. The latest version is version 2 (See RFC2236). IP hosts use IGMP to report their multicast group membership to any immediate-neighbor multicast routers, so the multicast routers can decide if a multicast packet needs to be forwarded. At the start-up, the Prestige queries all directly connected networks to gather group membership.

Page 27: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

After that, the CPE updates the information by periodic queries. The device implementation of IGMP is also compatible with version 1. The multicast setting can be turned on or off on the Ethernet and remote nodes.

IGMP Multicast Proxy Configuration

a. IGMP Multicast Proxy1. Go to Network > WAN > Internet Connection2. Select the WAN interface (IPoE or PPPoE)and click Edit3. Go the page where IGMP Multicast Proxy checkbox is displayed.

4. Select “Enable” to allow IGMP Multicast.5. Click Next until the last configuration page and then click Apply/Save to

store the changes.

Page 28: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

VoIP Application Notes

VoIP Introduction

What is Voice over IP?

Voice over IP refers to communication services — voice, facsimile, and/or voice-messaging applications — that are transported via the Internet, rather than the public switched telephone network (PSTN). The basic steps involved in initiating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the signal into Internet protocol (IP) packets for transmission over the Internet.

It is becoming increasingly common for telecommunications providers to use VoIP telephony over dedicated and public IP networks to connect switching stations and to interconnect with other telephony network providers; this is often referred to as "IP backhaul".

Many telecommunications companies are eyeing the IP Multimedia Subsystem (IMS) which will merge Internet technologies with the mobile world, using a pure VoIP infrastructure. It will enable them to upgrade their existing systems while embracing Internet technologies such as the Web, email, instant messaging, presence, and video conferencing. It will also allow existing VoIP systems to interface with conventional PSTN and mobile phone networks.

Page 29: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

VoIP Configuration

a. Setting up VoIP accounts on P2812HNU-51c

1. Go to VoIP>SIP>SIP Account. P2812HNU-51C can register up to two SIP accounts.

2. SIP Account Selection can create several SIP Accounts. In SIP Account Selection select “SIP0-1002” and under Service Provider Selection select “ServiceProvider-1”, then enable the check box to activate SIP1 account. Configure the SIP account number, SIP account user name and password;select which phone to apply this SIP account to. In this example, the SIP account will be applied to Phone 1.

3. Go to VoIP>SIP>SIP Service Provider. Select the Service Provider Selection name “ServiceProvider-1”. Fill in SIP Service Provider’s SIP server URL/IP address in ServiceProvider-1.

Page 30: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

4. Click Apply. You will see a pop-up window displayed, prompting you to bindthe SIP account/SIP service provider settings to a particular WAN interface.

5. Click “Advanced” to expand the Advanced Menu.

Page 31: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

6. Select Multi_WAN and a WAN interface for VoIP service. In this example please select ptm0_102.

7. Leave all other advanced configuration options as they are from Defaultconfiguration.

8. You should now be able to make/receive VoIP calls.

Page 32: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

VLAN Based Configuration Note

Environment

The Network structure of the Central Office depends on the deployment of different ISPs (Internet Service Provider) in different environments in different countries. One of the commonly used methods for separating different types of traffic is classification by their VLAN ID. In the case of the aforementioned diagram, the Internet traffic is tagged with VID=301 and IPTV traffic is tagged with VID=401. The COE (VDSL switch) receives the already VLAN tagged traffic from the CPE, and handles it according to the VID values. The following step-by-step procedure shows how to configure the P-2812HNU-51c for the aforementioned scenario.

WAN Configuration

Page 33: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Internet Service

1. Go to Network > WAN > Layer 2 Interface2. By default, the PTM WAN interface is set to VLAN MUX mode, therefore, it

fits the structure of our topology (multiple VLANs (layer 3) sharing one PTM WAN interface (layer 2).) Now click Add to add the Internet data connection. This will be set up in routing mode with VLAN ID 301.

3. Choose PTM layer 2 interface as the Internet connection.

Page 34: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

4. Choose “PPPoE connection”, and name it “Internet”. Then assign the VLAN ID 301 (set 802.1P priority to the desired value.)

5. Fill in the PPPoE connection credentials (valid PPPoE username and password), and enable NAT.

6. Click Next

7. Move the “ppp0.301” WAN interface just created to the box on the left as adefault gateway.

Page 35: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

8. Click Next

9. Move the “ppp0.301” WAN interface just created to the box on the left to assign a DNS server corresponding to the WAN interface.

10. Click Next11. Carefully check whether the listed configuration is correct.

Note: QoS is enabled by default for PTM Layer 2 interface.

12. Click Apply/Save, and the “Internet” data interface will be configured. 13. The Internet.301 WAN interface connection will be shown on the list along

Page 36: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

with default internet connections.

IPTV Service

1. Go to Network > WAN > Internet Connection.2. Click Add3. Select the Layer 2 interface for this service, e.g. “ptm0/(0_0_1)”.

4. Click Next

Page 37: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

5. Select “Bridge” as the WAN service type.6. Enter the Service Description, e.g. “IPTV”.7. Check the Tag VLAN ID for egress packets box.8. Enter “4” as 802.1p priority.9. Type “401” at Enter 802.1Q VLAN ID.

10. Click Next11. Carefully check whether the listed configuration is correct. Click on

Apply/Save to save the configuration.

Page 38: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Now both of the WAN interfaces required for the aforementioned topology are correctly configured. The INTERNET LED should be lit, and Internet access should notbe a problem. Otherwise, repeat the steps to make sure all the configurations arecorrect.

After setting up WAN interfaces, the next step is to group the WAN interfaces with LAN ports.

Interface Grouping

1. Go to Advanced > Interface Group. 2. There is a Default group which includes all the available interfaces. Click on

Add to create a new group. Note: The WAN interfaces created in theprevious sections: ppp0.301 and ptm0.401 should also be listed in the WAN interface column.

Before proceeding to the next step of Interface Grouping, one thing must be kept in mind: the Default group, which includes all the available interfaces, cannot be removed. Some Interfaces can be pulled out and placed into a new group. If the default WAN gateway interface is removed from the default group, then the interfaces belonging to the Default group will lose their connectivity. Therefore, in this example, it is better to create a new group for IPTV.

3. Assign the Group name “IPTV”. 4. Select “IPTV.401/ptm0.401” as the WAN Interface used in the grouping.

Page 39: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

5. Move LAN3 and LAN4 from the “Available LAN Interfaces” box on the right to the box of “Grouped LAN Interfaces” on the left.

6. Click Apply

As the result of a successful configuration, the new group “IPTV” will be listed in the Interface Group table.

7. Assign static IPs for the IPTV server and STB (192.168.33.10 and 192.168.33.14, respectively). If using a DHCP server is preferable, it can be set up on the IPTV server side.

Before starting a multicast stream, be sure to also enable the IGMP Snooping function for the IPTV interface.

8. Go to Network >LAN >IP. Be sure to choose the correct group name to enable the IGMP Snooping function for.

9. Select “IPTV” as the Group Name to configure.

Page 40: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

10. Check the box to enable the IGMP Snooping Function, and then Apply the setting.

Verification

1. Ping from LAN NB to “168.95.1.1” (or any IP or website on the WAN side).

Page 41: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

2. IPTV server starts to play multicast stream, and checks whether the TV can receive the multicast stream.

Page 42: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Quality of Service Application Note

Environment

The “Quality of Service” feature in P-2812HNU-51c has the ability to assign different tasks in accordance with the chosen type of traffic. In the case of the abovediagram, we would like to limit the maximum upload rate of the IPTV service to 350 kbps. The following step-by-step procedure shows how to configure the P-2812HNU-51c to fit the aforementioned scenario.

QoS configuration

a. Enable QoS1. Make sure that QoS is enabled in Network > WAN > Layer2 Interface.

Page 43: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

2. Go to WAN > Internet Connection, and Edit “IPTV.401” WAN Internet Connection.

3. Set the Rate Limit to “350”, and click on Next.

Page 44: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

In our VLAN based scenario configuration a dedicated WAN Interface was created only for IPTV traffic. Therefore, to limit the upstream IPTV traffic, configuring the Rate Limit in the dedicated WAN interface is enough.

Wireless Application NotesWireless IntroductionWEP Configuration (Wired Equivalent Privacy) Introduction

The 802.11 standard describes the communication that occurs in wireless LANs.

The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping, because wireless transmissions are easier to intercept than transmissions over wired networks, and wireless is a shared medium.Everything that is transmitted or received over a wireless network can be intercepted.

WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless Ethernet card) and an access point (i.e. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that the packets have not been modified during the transmission. The standard does not discuss how the shared key is established. In practice, most installations use a single key that is shared between all mobile stations and access points (APs).

Page 45: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

WEP employs a key encryption algorithm called Ron's Code 4 Pseudo Random Number Generator (RC4 PRNG). The same key is used to encrypt and decrypt the data.

To avoid encrypting two cipher texts with the same key stream, an Initialization Vector (IV) is used to augment the shared WEP key (secret key) and produce a different RC4 key for each packet. The IV is also included in the package. The WEP keys (secret key) are available in two types, 64-bit and 128-bit keys. You may often see them referenced as 40-bit and 104-bit keys instead. The reason for this misnomer is that the WEP key (40/104 bits) is concatenated with the initialization vector (24 bits), resulting in a 64/128 bit total key size.

Setting up the Access Point

Page 46: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Most access points and clients have the ability to hold up to 4 WEP keys simultaneously. You need to specify one of the 4 keys as default Key for data encryption. To set up the Access Point, you will need to set one of the following parameters:

o 64-bit WEP key (secret key) with 5 characters.o 64-bit WEP key (secret key) with 10 hexadecimal digits.o 128-bit WEP key (secret key) with 13 characters.o 128-bit WEP key (secret key) with 26 hexadecimal digits.

Wi-Fi Protected Access Introduction

The Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft. Key differences between WPA and WEP are support for user authentication and improved data encryption. WPA utilizes the IEEE 802.1x Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. You cannot use the P-660HW-Tx v2's local user database for WPA authentication purposes, since the local user database uses the MD5 EAP which cannot generate keys.

Page 47: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check and IEEE 802.1x. Temporal Key Integrity Protocol uses 128-bit keys that are dynamically generated and distributed by the authentication server. It includes a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extend initialization vector (IV) with sequencing rules and a re-keying mechanism.

If you do not have an external RADIUS server, you should use the WPA-PSK (WPA Pre-Share Key) security mode that only requires a single (identical) password entered into each access point, wireless gateway and wireless client. As long as the passwords match, the client will be granted access to the WLAN.

WPA2

WPA2 (Wi-Fi Protected Access 2) is the Wi-Fi Alliance interoperable implementation of the ratified IEEE 802.11i standard. WPA 2 implements the National Institute of Standards and Technology (NIST) standard which offers a higher level of security thanWPA. WPA2 it combines an AES-based algorithm and Cipher Block Chaining Message Authentication Code Protocol (CCMP) in it and offers stronger encryption than WPA uses (TKIP). WPA2 encryption keys that are used for each client on the network are unique and specific to that client. Eventually, each packet which is sent over the air is encrypted with a unique key. The higher security is enhanced with the use of a new and unique encryption key because there is no key reuse.

WPA &WPA2

Both WPA & WPA2 offer a high level security to end users and administrators who utilize EAP (Extensible authentication Protocol) for authentication, while alsosupporting both Personal and Enterprise modes. Because WPA2 provides a stronger encryption mechanism through AES (Advanced Encryption Standard), WPA2’s security level and standard is a requirement for some corporate and government users.

Wireless Configuration

Activate the WLAN interface of the P-2812HNU-51c and connect a notebook

Page 48: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

(802.11bgn wireless NIC required) using the WPA-PSK security mode.

a. Wireless Setup.1. Go to Network > Wireless LAN > General.2. Check the Active Wireless LAN box.3. Choose “Auto” Channel selection mode.4. Enter the Network Name (SSID), e.g. “TEST_01”.5. Select the Security Mode, e.g. “WPA2-PSK”.6. Select the WPA Encryption, e.g. “TKIP”.7. Enter the Pre-Shared Key, e.g. “11111111”.8. Enter the WPA Group Key Update Timer, e.g. “1800”.9. Click Apply

Page 49: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Advanced Configuration:

10. Go to Network > Wireless LAN > Advanced.11. On this page, you can configure advanced configuration options such as

allowed Wireless clients, Multicast rate, and 802.11 Mode.

Page 50: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

WPS Application Notes

What is WPS?

Wi-Fi Protected Setup (WPS) is a standard created by the Wi-Fi Alliance for easy and secure establishment of a wireless home/office network. The goal of the WPS protocol is to simplify the process of configuring the security of the wireless network, and thus the name Wi-Fi Protected Setup.

There are several different methods defined in WPS to simplify the process of configuration. P-870HW-51aV2 supports two of those methods, which are the PIN Method and the PBC Method.

PIN Method:A PIN (Personal Identification Number) has to be read from either a sticker on the new wireless client device or a display, and entered at either the wireless access point (AP) or a Registrar of the network.

PBC Method:A simple action of “pushing a button” on both the client and AP starts the process of both establishing and securing of the wireless connection.

Page 51: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

WPS configuration

1. Go to Network>Wireless LAN>WPS. Enable the checkbox to activate the WPS feature. Click on “Generate” to generate a new key if you wish. “Apply”.

2. Go to Network>Wireless LAN>WPS Station. We will use the “Push Button”method to establish a secure WLAN connection in this example.

You can either click the button located on the top right corner of P2812HNU-51C or at the Network>Wireless LAN>WPS page. After clicking on the button, the P2812HNU-51C and the WLAN client have 120 seconds to connect.

Page 52: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

After clicking the button, or entering station’s PIN number, the WPS progress window will be displayed on the GUI indicating that the AP and the WLAN clients are connecting to each other.

After successfully connecting to each other through WPS, the successful connection will be announced on the status bar of the GUI.

Page 53: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Maintenance LogInternal Maintenance

The P2812HNU-51C has the ability to record the events occurring in the CPE in a system log (according to severity) and maintain this log in itself or sending logs to a configured syslog server accordingly.

If the maintenance logs are enabled, the system will begin to log all the eventsaccording to the selected Log Level. All the events above or equal to the selected level will be logged.

If the selected Log mode is 'Remote', events will be sent to the specified Syslog Server’s IP address and UDP port. If the selected Log mode is 'Local', events will be recorded in the local memory. If the selected Log mode is “Both”, events will be both logged locally, and sent to the Syslog Server.

Activate the Maintenance Log.1. Go to Maintenance > Logs > Log Settings.

2. Check the Active box.

3. Select the preferred “Log Level”.

4. Select the logging mode to specify the location to store the event logs. Click “Apply”.

Page 54: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

View the log in the Web GUI.

1. Go to Maintenance > Logs > View Logs.

Page 55: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Maintenance Tools

Maintenance Procedure

Upgrading firmware

1. Go to Maintenance > Tools > Firmware.

2. Click Browse3. Select the Firmware to upload and click Open.4. Click Upload

Backing-up the Configuration

1. Go to Maintenance > Tools > Configuration.

Page 56: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

2. Click Backup3. Click Save

4. Select the directory to save your configuration and click Save.

Page 57: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Upload Configuration

1. Go to Maintenance > Tools > Configuration.2. Click Browse3. Select the configuration file to upload and click Open

Page 58: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Restoring to Factory Default

Go to Maintenance > Tools > Configuration. Click Reset

Page 59: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

This action will reset the entire configuration made by the user back to Factory default. Please use this function with caution.

Page 60: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Product FAQ

What URLs allow access to P-2812HNU-51c?http://192.168.1.1/ or https://192.168.1.1/

Does P-2812HNU-51c support IPv6?Yes. This device supports IPv6 in PTM and ATM mode.

What is default IPv6 address on Lan?fe80::10:18ff:fe01:1/64

Will the device work with my Internet connection?

P-2812HNU-51c is designed to be compatible with major ISPs utilizing VDSL as a broadband service. P-2812HNU-51c offers Ethernet ports to connect to your computer so the device is placed in the line between the computer and your ISP. If your ISP supports PPPoE you can also use the device, because PPPoE is supported bythe device.

How to configure 3G Backup?

1. Go to Network > WAN > 3G Backup.2. Select the check box Enable 3G Backup.

Page 61: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

3. Card Description will show what dongle model is plugged intoP-2812HNU-51c.

4. If P-2812HNU-51c supports that dongle, 3G status will read Enable. 5. Fill in the PIN number.6. Enter APN string or number.

What is PPPoE?

PPPoE stands for Point-to-Point Protocol over Ethernet, which is an IETF draft standard specifying how a computer interacts with a broadband modem (i.e. xDSL, cable, wireless, etc.) to achieve access to high-speed data networks via a familiar PPP dialer such as 'Dial-Up Networking' user interface. PPPoE supports a broad range of existing applications and service including authentication, accounting, secure access and configuration management. There are some service providers running PPPoE today. Before configuring PPPoE in the device, please make sure your ISP supports PPPoE.

Does the device support PPPoE?

Yes. The device supports PPPoE.

How do I know I am using PPPoE?

PPPoE requires a user account to login to the provider's server. If you need to configure a user name and password on your computer to connect to the ISP you are probably using PPPoE. If you are simply connected to the Internet when you turn on your computer, you probably are not. You can also check your ISP or the information sheet given by the ISP. Please choose PPPoE as the encapsulation type in the deviceif the ISP uses PPPoE.

Why does my provider use PPPoE?

PPPoE emulates a familiar Dial-Up connection. It allows your ISP to provide services using their existing network configuration over broadband connections. Besides, PPPoE supports a broad range of existing applications and services including authentication, accounting, secure access and configuration management.

Which Internet Applications can I use with the device?

Most common applications include MIRC, PPTP, ICQ, Cu-SeeMe, NetMeeting, IP/TV, RealPlayer, VDOLive, Quake, QuakeII, QuakeIII, StarCraft, & Quick Time.

Page 62: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

How can I configure the device?

a. Telnet remote management: driven user interface for easy remote management

b. Web browser: embedded web server for easy configuration

Does the device support dynamic IP addressing?

The device supports either a static or dynamic IP address from ISP.

What is the difference between the internal IP and the real IP from my ISP?

Internal IPs is sometimes referred to as virtual IPs. They are a group of up to 255 IPs that are used and recognized internally on the local area network. They are not intended to be recognized on the Internet. The real IP from ISP, instead, can be recognized or pinged by another real IP. The Device works like an intelligent router that translates between the virtual IPs and the real IPs.

How does e-mail work through the device?

It depends on what kind of IP you have: Static or Dynamic. If your company has a domain name, it means that you have a static IP address. Suppose your company's e-mail address is [email protected]. Joe and Debbie will be able to send e-mail through the device using [email protected] and [email protected] respectively as their e-mail addresses. They will be able to retrieve their individual private and secure e-mail, if they have been assigned the proper access right.

If your company does not have a domain name, it means that your ISP provides you with a dynamic IP address.

Suppose your company's e-mail address is [email protected]. Jane and John will be able to send e-mail through the device using "jane"<[email protected]> and "john"<[email protected]> respectively as their e-mail addresses. Again, they will be able to retrieve their individual private and secured e-mail, if they have been assigned the proper access right.

Page 63: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Is it possible to access a server running behind SUA from the outside Internet? If possible, how?

Yes, it is possible because the device delivers packets to the local server by looking up its address in a SUA server table. Therefore, to make a local server accessible to the outside users, the port number and the inside IP address of the server must be configured.

What DHCP capability does the device support?

The device supports DHCP client (Ethernet encapsulated) on the WAN port and DHCP server on the LAN port. The device's DHCP client allows it to get the Internet IP address from ISP automatically if your ISP uses DHCP to assign IP addresses. The device's internal DHCP server allows it to automatically assign IP and DNS addresses to the clients on the local LAN.

How do I use the reset button, moreover what parameters will be reset by reset button?

You can use a sharp pointed object and insert it into the little reset hole beside the power connector. Press down the reset button and hold it depressed for approx. 5 seconds for the unit to reset. When the reset button is pressed, all the deviceparameters will be reset back to factory defaults, including password and IP address.

The default IP address is 192.168.1.1, username “Admin” and password is “1234”.

How does the device support TFTP?

In addition to the direct console port connection, the device supports upload/download of the firmware and configuration files using TFTP (Trivial File Transfer Protocol) over LAN.

Can the device support TFTP over WAN?

Although TFTP should work over WAN as well, it is not recommended because of the potential data corruption problems.

Page 64: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

How fast can the data go?

The speed of the VDSL is only one part of the equation. There is a combination of factors starting with how fast your PC can handle IP traffic, then how fast your PC to cable modem interface is, then how fast the cable modem system runs and how much congestion there is on the cable network, then how big a pipe there is at the head end to the rest of the Internet.

Different models of PCs and Macs are able to handle IP traffic at varying speeds. Very few can handle it at 100 Mbps.

To create the appearance of faster network access, service companies plan to store or "cache" frequently requested web sites and Usenet newsgroups on a server at their head-end. Storing data locally removes some of the bottleneck at the backbone connection.

How fast can the data go? In a perfect world (or lab) data can be received at speeds of up to 100 Mbps. In the real world, with cost conscious cable companies running the systems, the speed will probably fall behind the speed that the ISP appointed at the first place.

What is Simple token bucket?

This is one kind of Quality of Service algorithm. This algorithm controls when traffic can be transmitted to another interface. We defined each token represents one byte.Simple token Bucket algorithm allows bursts of up to b bytes which is also the bucket size.

What is Single Rate Three Color Marker?

It is method which meters a traffic stream and marks its packets according to three traffic parameters, Committed Information Rate (CIR), Committed Burst Size (CBS), and Excess Burst Size (EBS), to be either green, yellow, or red. A packet is marked green if it doesn't exceed the CBS, yellow if it does exceed the CBS, but not the EBS, and red otherwise.

What is Two Rate Three Color?

It is a method which meters an IP packet stream and marks its packets based on two rates, Peak Information Rate (PIR) and Committed Information Rate (CIR), and their associated burst sizes to be either green, yellow or red. A packet is marked red if it

Page 65: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

exceeds the PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or doesn't exceed the CIR.

What is the function of Email notification for?

Configuration page VOIP > Advanced contains a function named Enable Missed Call Email Notification. If user misses a call, P-2812HNU-51c will send an alert accordingthe mail server and email address setting in Email notification function.

What is Multi-NAT?

NAT (Network Address Translation-NAT RFC 1631) is the translation of an Internet Protocol address used within one network to a different IP address known within another network. One network is designated the inside network and the other is the outside. Typically, a company maps its local inside network addresses to one or more global outside IP addresses and "unmaps" the global IP addresses on incoming packets back into local IP addresses. The IP addresses for the NAT can be either fixed or dynamically assigned by the ISP. In addition, you can designate servers, e.g., a web server and a telnet server, on your local network and make them accessible to the outside world. If you do not define any servers, NAT offers the additional benefit of firewall protection. In such case, all incoming connections to your network will be filtered out by the device, thus preventing intruders from probing your network.

The SUA feature supported by the device previously operated by mapping the private IP addresses to a global IP address. It is only one subset of the NAT. The device supports most of the features of the NAT based on RFC 1631, and we call this feature as 'Multi-NAT'. For more information on IP address translation, please refer to RFC 1631, The IP Network Address Translator (NAT).

Page 66: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

When do I need Multi-NAT?

a. Make local server accessible from outside Internet

When NAT is enabled the local computers are not accessible from outside. You can use Multi-NAT to make an internal server accessible from outside.

a. Support Non-NAT Friendly Applications

Some servers providing Internet applications such as some mIRC servers do not allow users to login using the same IP address. Thus, users on the same network cannot loginto the same server simultaneously. In this case it is better to use Many-to-Many No Overload or One-to-One NAT mapping types, thus each user logs into the server using a unique global IP address.

What IP/Port mapping does Multi-NAT support?

NAT supports five types of IP/port mapping. They are: One to One, Many to One, Many to Many Overload, Many to Many No Overload and Server. The details of the mapping between ILA and IGA are described as below. Here we define the local IP addresses as the Internal Local Addresses (ILA) and the global IP addresses as the Inside Global Address (IGA),

1. One to One

In One-to-One mode, the device maps one ILA to one IGA.

2. Many to One

In Many-to-One mode, the device maps multiple ILA to one IGA. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature that previous ZyNOS routers supported (the SUA only option in today's routers).

3. Many to Many Overload

In Many-to-Many Overload mode, the device maps the multiple ILA to multiple shared IGA.

4. Many-to-Many No Overload

In Many-to-Many No Overload mode, the device maps each ILA to unique IGA.

Page 67: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

5. Server

In Server mode, the device maps multiple inside servers to one global IP address. This allows us to specify multiple servers of different types behind the NAT for outside access. Note: if you want to map each server to a unique IGA, please use the One-to-One mode.

The following table summarizes these types.

NAT Type IP Mapping

One-to-One ILA1<--->IGA1

Many-to-One (SUA/PAT)

ILA1<--->IGA1ILA2<--->IGA1...

Many-to-Many Overload

ILA1<--->IGA1ILA2<--->IGA2ILA3<--->IGA1ILA4<--->IGA2...

Many-to-Many No Overload

ILA1<--->IGA1ILA2<--->IGA2ILA3<--->IGA3ILA4<--->IGA4...

ServerServer 1 IP<--->IGA1 Server 2 IP<--->IGA1

What is the difference between SUA and Multi-NAT?

SUA (Single User Account) in previous ZyNOS versions is a NAT set with 2 rules, Many-to-One and Server. The device now has Full Featured NAT support to map global IP addresses to local IP addresses of clients or servers. With multiple global IP addresses, multiple severs of the same type (e.g., FTP servers) are allowed on the LAN for outside access. In previous ZyNOS versions that supported SUA 'visible' servers had to be of different types. The device supports NAT sets on a remote node basis. They are reusable, but only one set is allowed for each remote node. The device supports 2 sets since there is only one remote node. The default SUA (Read Only) is a convenient, pre-configured, read only, Many-to-One mapping set,

Page 68: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

sufficient for most purposes and helpful for people already familiar with SUA in previous ZyNOS versions.

What is BOOTP/DHCP?

BOOTP stands for Bootstrap Protocol. DHCP stands for Dynamic Host Configuration Protocol. Both are mechanisms to dynamically assign an IP address for a TCP/IP client by the server. In this case, the device is a BOOTP/DHCP server. Win95 and WinNT clients use DHCP to request an internal IP address, while WFW and WinSock clients use BOOTP. TCP/IP clients may specify their own IP or utilize BOOTP/DHCP to request an IP address.

What is DDNS?

The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname, allowing your computer to be more easily accessed from various locations on the Internet. To use the service, you must first apply for an account from one of several free Web services such as WWW.DYNDNS.ORG.

Without DDNS, we always tell the users to use the WAN IP of the device to reach our internal server. It is inconvenient for the users if this IP is dynamic. With DDNS supported by the device, you apply a DNS name (e.g., www.zyxel.com.tw) to your server (e.g., Web server) from a DDNS server. The outside users can always access your web server using the www.zyxel.com.tw DNS name regardless of the WAN IP of the device.

When the ISP assigns the device a new IP, the device updates this IP on the DDNS server so that the server can update its IP-to-DNS entry. Once the IP-to-DNS table in the DDNS server is updated, the DNS name for your web server (i.e., www.zyxel.com.tw) is usable again.

When do I need DDNS service?

When you want your internal server to be accessible by using a DNS name rather than using the dynamic IP address, you can use the DDNS service. The DDNS server allows aliasing a dynamic IP address to a static hostname. Whenever the ISP assigns you a new IP, the device sends this IP to the DDNS server for its updates.

Page 69: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Wireless FAQ

What is a Wireless LAN?

Wireless LANs provide all the functionality of wired LANs, without the need for physical connections (wires). Data is modulated onto a radio frequency carrier and transmitted through the air. Typical bit-rates are 11Mbps and 54Mbps, although in practice data throughput is half of this. Wireless LANs can be formed simply by equipping PC's with wireless NICs. If connectivity to a wired LAN is required, an Access Point (AP) is used as a bridging device. AP's are typically located close to the center of the wireless client population.

What are the advantages of Wireless LANs?

a. Mobility:Wireless LAN systems can provide LAN users with access to real-time information anywhere in their organization. This mobility supports productivity and service opportunities not possible with wired networks.

b. Installation Speed and Simplicity:Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings.

c. Installation Flexibility:Wireless technology allows the network to go where the wire cannot go.

d. Reduced Cost-of-Ownership:While the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring frequent moves and changes.

e. Scalability:Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure

Page 70: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

networks of thousands of users that enable roaming over a broad area.

What are the disadvantages of Wireless LANs?

The speed of Wireless LAN is still relatively slower than wired LAN. The most popular wired LAN operates at 100Mbps, which is almost 10 times that of Wireless LAN (11Mbps). A gigabit wired LAN standard (1000Mbps), which is 100 times faster, is becoming popular as well. Environment will be easy to effect wireless Transmission media this is unstable issue for wireless Lan.Where can you find wireless 802.11 networks?

Airports, hotels, and even coffee shops like Starbucks are deploying 802.11 networks so people can wirelessly browse the Internet with their laptops. As these types of networks proliferate, this will create additional security risk for the remote user if not properly protected.

What is an Access Point?

The AP (access point, also known as a base station) is a wireless server with an antenna and a wired Ethernet connection that broadcasts information using radio signals. An AP typically acts as a bridge for the clients. It can pass information to wireless LAN cards that have been installed in computers or laptops, allowing those computers to connect to the campus/company network and the Internet without wires.

What is IEEE 802.11?

The IEEE 802.11 is a wireless LAN industry standard, and the objective of IEEE 802.11 is to make sure that different manufacturers' wireless LAN devices can communicate with each other. 802.11 provides 1 or 2 Mbps transmission in the 2.4 GHz ISM band using either FHSS or DSSS.

What is 802.11b?

802.11b is the first revision of 802.11 standard, allowing data rates of up to 11Mbps in the 2.4GHz ISM band. It is also known as 802.11 High-Rate and Wi-Fi. 802.11b only uses DSSS, the maximum speed of 11Mbps has fallbacks to 5.5, 2 and 1Mbps.

Page 71: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

How fast is 802.11b?

The IEEE 802.11b standard has a nominal speed of 11 megabits per second (Mbps). However, depending on signal quality and how many other people are using the wireless Ethernet through a particular Access Point, the usable speed will be much less (on the order of 4 or 5 Mbps, which is still substantially faster than most dialup, cable and DSL modems).

What is 802.11a?

802.11a the second revision of 802.11 that operates in the unlicensed 5 GHz band and allows transmission rates of up to 54Mbps. 802.11a uses OFDM (orthogonal frequency division multiplexing) as opposed to FHSS or DSSS. Higher data rates are possible by combining channels. Due to higher frequency, range is less than lower frequency systems (i.e., 802.11b and 802.11g) and can increase the cost of the overall solution because a greater number of access points may be required. 802.11a is not directly compatible with 802.11b or 802.11g networks. In other words, a user equipped with an 802.11b or 802.11g radio card will not be able to interface directly to an 802.11a access point. Multi-mode NICs can solve this problem.

What is 802.11g?

802.11g is an extension to 802.11b. 802.11g increases 802.11b's data rates to 54 Mbps and still utilizes the 2.4 GHz ISM. Modulation is based upon OFDM (orthogonal frequency division multiplexing) technology. An 802.11b radio card will interface directly with an 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. The range at 54 Mbps is less than for 802.11b operating at 11 Mbps.

What is 802.11n?

802.11n supports both 2.4 GHz and 5 GHz radio bands and its data rates range from 54 Mbit/s up to 600 Mbit/s in theory. The 802.11n supports Channel Doubling technology which can double the bandwidth from 20 MHz to 40 MHz and effectively doubles data rates and throughput. It adds a MIMO feature, which uses multiple transmission and reception antennas to allow a higher raw rate, and can resolve more information than possible using a single antenna. It also uses the “Alamouti

Page 72: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

coding” coding schemes to increase transmission range.

Is it possible to use products from a variety of vendors?

Yes. As long as the products comply to the same IEEE 802.11 standard. The Wi-Fi logo is used to define 802.11b compatible products. Wi-Fi5 is a compatibility standard for 802.11a products running in the 5 GHz band.

What is Wi-Fi?

The Wi-Fi logo signifies that a product is interoperable with wireless networking equipment from other vendors. A Wi-Fi logo product has been tested and certified by the Wireless Ethernet Compatibility Alliance (WECA). The Socket Wireless LAN Card is Wi-Fi certified, and that means that it will work (interoperate) with any brand of Access Point that is also Wi-Fi certified.

What types of devices use the 2.4 GHz Band?

Various spread spectrum radio communication applications use the 2.4 GHz band. This includes WLAN systems (not necessarily of the IEEE 802.11b type), cordless phones, wireless medical telemetry equipment and Bluetooth™ short-range wireless applications, which include connecting printers to computers and connecting modems or hands-free kits to mobile phones.

Does 802.11 interfere with Bluetooth devices?

Any time devices are operated in the same frequency band, there is the potential for interference.Both the 802.11b and Bluetooth devices occupy the same2.4-to-2.483-GHz unlicensed frequency range-the same radio band. But a Bluetooth device will not interfere with other 802.11 devices much more than another 802.11 device would interfere. While more collisions are possible with the introduction of a Bluetooth device, they are also possible with the introduction of another 802.11 device, or a new 2.4 GHz cordless phone for that matter. But, Bluetooth devices are usually low-power, so the effects that a Bluetooth device may have on an 802.11 network, if any, aren't far-reaching.

Page 73: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Can radio signals pass through walls?

Transmitting through a wall is possible depending upon the material used in its construction. In general, metals and substances with a high water content do not allow radio waves to pass through. Metals reflect radio waves and concrete attenuates radio waves. The amount of attenuation suffered in passing through concrete will be a function of its thickness and amount of metal reinforcement used.

What are potential factors that may causes interference among WLAN products?

Factors of interference:1. Obstacles: walls, ceilings, furniture… etc.2. Building Materials: metal door, aluminum studs.3. Electrical devices: microwaves, monitors, electric motors.Solution :1.Minimizing the number of walls and ceilings.2.Positioning the Antenna for best reception.3.Keep WLAN products away from electrical devices, e.g.: microwaves, monitors, electric motors,… , etc.4. Add additional APs if necessary.

What's the difference between a WLAN and a WWAN?

WLANs are generally privately owned, wireless systems that are deployed in a corporation, warehouse, hospital, or educational campus setting. Data rates are high and there are no per-packet charges for data transmission.

WWANs are generally publicly shared data networks designed to provide coverage in metropolitan areas and along traffic corridors. WWANs are owned by a service provider or carrier. Data rates are low and charges are based on usage. Specialized applications are characteristically designed around short, burst messaging.

What is Ad Hoc mode?

A wireless network consisting of a number of stations without access points operates in Ad Hoc mode. An Ad Hoc network is created without using an access point or any connection to a wired network.

Page 74: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

What is Infrastructure mode?

Infrastructure mode implies connectivity to a wired communications infrastructure. If such connectivity is required the Access Points must be used to connect to the wired LAN backbone. Wireless clients need to have their configurations set for "infrastructure mode" in order to utilize access points relaying traffic.

How many Access Points are required in a given area?

This depends on the surrounding terrain, the diameter of the client population, and the number of clients. If an area is large with dispersed pockets of populations then extension points can be used for extend coverage.

What is Direct-Sequence Spread Spectrum Technology – (DSSS)?

DSSS spreads its signal continuously over a wide frequency band. DSSS maps the information bearing bit-pattern at the sending station into a higher data rate bit sequence using a "chipping" code. The chipping code (also known as processing gain) introduces redundancy which allows data recovery if certain bit errors occur during transmission. The FCC rules the minimum processing gain should be 10, typical systems use processing gains of 20. IEEE 802.11b specifies the use of DSSS.

What is Frequency-hopping Spread Spectrum Technology – (FHSS)?

FHSS uses a narrowband carrier which hops through a predefined sequence of several frequencies at a specific rate. This avoids problems with fixed channel narrowband noise and simple jamming. Both transmitter and receiver must have their hopping sequences synchronized to create the effect of a single "logical channel". To an unsynchronized receiver an FHSS transmission appears to be short-duration impulse noise. 802.11 may use FHSS or DSSS.

Do I need the same kind of antenna on both sides of a link?

No, provided the antenna is optimally designed for 2.4GHz or 5GHz operation. WLAN NICs often include an internal antenna which may provide sufficient reception.

Page 75: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

Why the 2.4 GHz Frequency range?

This frequency range has been set aside by the FCC, and is generally labeled the ISM band. A few years ago Apple and several other large corporations requested that the FCC allow the development of wireless networks within this frequency range. What we have today is a protocol and system that allows for unlicensed use of radios within a prescribed power level. The ISM band is populated by Industrial, Scientific and Medical devices that are all low power devices, but can interfere with each other.

What is Server Set ID (SSID)?

SSID is a configurable identification that allows clients to communicate with the appropriate base station. With proper configuration, only clients that are configured with the same SSID can communicate with base stations having the same SSID. SSID from a security point of view acts as a simple single shared password between base stations and clients.

What is an ESSID?

ESSID stands for Extended Service Set Identifier and identifies the wireless LAN. The ESSID of the mobile device must match the ESSID of the AP to communicate with the AP. The ESSID is a 32-character maximum string and is case-sensitive.

How do I secure the data across an Access Point's radio link?

Enable Wired Equivalency Protocol (WEP) or Wi-Fi Protected Access (WPA) to encrypt the payload of packets sent across a radio link.

What is WEP?

Wired Equivalent Privacy. WEP is a security mechanism defined within the 802.11 standard and designed to make the security of the wireless medium equal to that of a cable (wire). WEP data encryption was designed to prevent access to the network by "intruders" and to prevent the capture of wireless LAN traffic through eavesdropping. WEP allows the administrator to define a set of respective "Keys" for each wireless network user based on a "Key String" passed through the WEP encryption algorithm. Access is denied by anyone who does not have an assigned key.

Page 76: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

WEP comes in 40/64-bit and 128-bit encryption key lengths. Note, WEP has been shown to have fundamental flaws in its key generation processing.

What is the difference between 40-bit and 64-bit WEP?

40 bit WEP & 64 bit WEP are the same encryption level and can interoperate. The lower level of WEP encryption uses a 40 bit (10 Hex character) as "secret key" (set by user), and a 24 bit "Initialization Vector" (not under user control) (40+24=64). Some vendors refer to this level of WEP as 40 bit, others as 64 bit.

What is a WEP key?

A WEP key is a user defined string of characters used to encrypt and decrypt data.

Will WEP keys of different lengths be used communicate?

128-bit WEP will not communicate with 64-bit WEP or 256-bit WEP Although 128 bit WEP also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users need to use the same encryption level in order to make a connection.

Can the SSID be encrypted?

WEP, the encryption standard for 802.11, only encrypts the data packets not the 802.11 management packets and the SSID is in the beacon and probe management messages. The SSID is not encrypted if WEP is turned on. The SSID goes over the air in clear text. This makes obtaining the SSID easy by sniffing 802.11 wireless traffic.

By turning off the broadcast of SSID, can someone still sniff the SSID?

Many APs by default have broadcasting the SSID turned on. Sniffers typically will find the SSID in the broadcast beacon packets. Turning off the broadcast of SSID in the beacon message (a common practice) does not prevent getting the SSID; since the SSID is sent in the clear in the probe message when a client associates to an AP, a sniffer just has to wait for a valid user to associate to the network to see the SSID.

What are Insertion Attacks?

The insertion attacks are based on placing unauthorized devices on the wireless

Page 77: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

network without going through a security process and review.

What is Wireless Sniffer?

An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for Ethernet are based on capturing the first part of the connection session, where the data would typically include the username and password. An intruder can masquerade as that user by using this captured information. An intruder who monitors the wireless network can apply this same attack principle on the wireless.

What is the difference between Open System and Shared Key Authentication Type?

Open System:The default authentication service that simply announces the desire to associate with another station or access point. A station can authenticate with any other station or access point using open system authentication if the receiving station designates open system authentication.

Shared Key:The optional authentication that involves a more rigorous exchange of frames, ensuring that the requesting station is authentic. For a station to use shared key authentication, it must implement WEP.

What is 802.1x?

IEEE 802.1x Port-Based Network Access Control is an IEEE (Institute of Electrical and Electronics Engineers) standard, which specifies a standard mechanism for link layer (Layer 2) user authentication of access to IEEE 802 networks, such as Ethernet (IEEE 802.3) and Wireless LAN (IEEE 802.11). For IEEE 802.11 WLAN, IEEE 802.1x authentication can be based on username/password or digital certificate.

What is the difference between No authentication required, No access allowed and Authentication required?

No authentication required— disables 802.1X and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1X-based authentication of the client.

Page 78: P-2812HNU-51c_1.02BLL0C0

P-2812HNU-51C Support Notes

All contents copyright (c) 2009 ZyXEL Communications Corporation.

No access allowed— causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface.Authentication required— enables 802.1X and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port transitions from down to up, or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client's MAC address.What is AAA?

AAA is the acronym for Authentication, Authorization, and Accounting and refers to the idea of managing subscribers by controlling their access to the network, verifying that they are who they say they are (via login name and password or MAC address) and accounting for their network usage.

What is RADIUS?

RADIUS stands for Remote Authentication Dial-In User Service. RADIUS is a standard that has been implemented into several software packages and networking devices. It allows user information to be sent to a central database running on a RADIUS Server, where it is verified. RADIUS also provides a mechanism for accounting.

What is WPA?

WPA (Wi-Fi Protected Access) is a subset of the IEEE 802.11i security specificationdraft. Key differences between WPA and WEP are user authentication and improved data encryption.

What is WPA-PSK?

WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) can be used if users do not have a Radius server but still want to benefit from WPA’s improved security. Because WPA-PSK only requires a single password to be entered on wireless AP/gateway and wireless client, as long as the passwords match, a client will be granted access to the WLAN.