User Guide
Page 27
In order to use the web configurator you need to access the device's Web Configurator. Figure 5 Password Screen P-2812HNU(L)-Fx Series User's Guide 27 The recommended screen resolution is an HTML-based management interface that allows easy device setup and management ... from your password and click Login. See Appendix C on page 329 if you have changed the password, enter your device. Type "admin" as the default Username and "1234" as the URL. 4 A password screen displays. Click Login. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3 and later versions, or Safari...
In order to use the web configurator you need to access the device's Web Configurator. Figure 5 Password Screen P-2812HNU(L)-Fx Series User's Guide 27 The recommended screen resolution is an HTML-based management interface that allows easy device setup and management ... from your password and click Login. See Appendix C on page 329 if you have changed the password, enter your device. Type "admin" as the default Username and "1234" as the URL. 4 A password screen displays. Click Login. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3 and later versions, or Safari...
User Guide
Page 45
... is connected to the Internet. 2 Open the web configurator. 3 Click VoIP > SIP to open the SIP Service Provider screen. P-2812HNU(L)-Fx Series User's Guide 45 Chapter 3 Tutorials The following parameters are used in this example: SIP Service Provider Name SIP Server Address... REGISTER Server Address SIP Service Domain SIP Account Number Username Password ServiceProvider1 sip.example.com registersip.example.com sip.example.com 12345678 ChangeMe ThisIsMySIP 3.5.1 VoIP Calls With a Registered SIP Account To...
... is connected to the Internet. 2 Open the web configurator. 3 Click VoIP > SIP to open the SIP Service Provider screen. P-2812HNU(L)-Fx Series User's Guide 45 Chapter 3 Tutorials The following parameters are used in this example: SIP Service Provider Name SIP Server Address... REGISTER Server Address SIP Service Domain SIP Account Number Username Password ServiceProvider1 sip.example.com registersip.example.com sip.example.com 12345678 ChangeMe ThisIsMySIP 3.5.1 VoIP Calls With a Registered SIP Account To...
User Guide
Page 46
Tutorial: Registration Status 46 P-2812HNU(L)-Fx Series User's Guide Chapter 3 Tutorials 5 Go to register your SIP account has been registered successfully. Leave other settings as default. 7 Click Apply to save ... Register to the SIP Account screen, click the Edit icon of SIP 1. 6 Select the Active SIP Account check box, then enter the SIP Account Number, Username, and Password.
Tutorial: Registration Status 46 P-2812HNU(L)-Fx Series User's Guide Chapter 3 Tutorials 5 Go to register your SIP account has been registered successfully. Leave other settings as default. 7 Click Apply to save ... Register to the SIP Account screen, click the Edit icon of SIP 1. 6 Select the Active SIP Account check box, then enter the SIP Account Number, Username, and Password.
User Guide
Page 77
... (12345). You can then log into www.dyndns.org using . You can find the IP address on Your Device Configure the following settings as the username and password. 3 Log into the Device and manage it. Then you should appear. P-2812HNU(L)-Fx Series User's Guide 77
... (12345). You can then log into www.dyndns.org using . You can find the IP address on Your Device Configure the following settings as the username and password. 3 Log into the Device and manage it. Then you should appear. P-2812HNU(L)-Fx Series User's Guide 77
User Guide
Page 88
...5 Broadband 5.1.1 What You Can Do in other networks. To set up Internet connection using PPPoE (PPP over Ethernet), they should also provide a username and password (and service name) for the Device, which makes it accessible from an upper layer protocol into a lower layer protocol. WAN IP ... they should also assign you the subnet mask and DNS server IP address(es). 88 P-2812HNU(L)-Fx Series User's Guide If your ISP (Internet Service Provider). It can also configure the WAN settings on the ZyXEL Device for Internet access (Section 5.2 on page 91). • Use the 3G Backup ...
...5 Broadband 5.1.1 What You Can Do in other networks. To set up Internet connection using PPPoE (PPP over Ethernet), they should also provide a username and password (and service name) for the Device, which makes it accessible from an upper layer protocol into a lower layer protocol. WAN IP ... they should also assign you the subnet mask and DNS server IP address(es). 88 P-2812HNU(L)-Fx Series User's Guide If your ISP (Internet Service Provider). It can also configure the WAN settings on the ZyXEL Device for Internet access (Section 5.2 on page 91). • Use the 3G Backup ...
User Guide
Page 94
... over the Ethernet WAN port. If this connection. however, PAP is disabled, the Device only runs IPv4. Select this if you have a username and password for outgoing calls. Select the method of encapsulation used by inserting a tag into a MAC-layer frame that contains bits to define ... is readily available on more secure than PAP; PPPoE (VDSL) LABEL DESCRIPTION General Name Enter a service name of the CHAP. 94 P-2812HNU(L)-Fx Series User's Guide This section is available only when you have a DSL router or modem in your network already. PPP User Name...
... over the Ethernet WAN port. If this connection. however, PAP is disabled, the Device only runs IPv4. Select this if you have a username and password for outgoing calls. Select the method of encapsulation used by inserting a tag into a MAC-layer frame that contains bits to define ... is readily available on more secure than PAP; PPPoE (VDSL) LABEL DESCRIPTION General Name Enter a service name of the CHAP. 94 P-2812HNU(L)-Fx Series User's Guide This section is available only when you have a DSL router or modem in your network already. PPP User Name...
User Guide
Page 98
... Select Enable to allow the Device to traffic through this connection. ID IP Address This section is available only when you have a username and password for Internet access. • IP over Ethernet - IPoE (VDSL/EtherWAN) (continued) LABEL DESCRIPTION WAN Service Type This field...the ISP assigns you connect to carry user data. Enter 802.1Q VLAN Type the VLAN ID number (from the ISP automatically. 98 P-2812HNU(L)-Fx Series User's Guide Enter the Vendor Class Identifier (Option 60), such as Default Gateway in a bridged environment. Chapter 5 Broadband ...
... Select Enable to allow the Device to traffic through this connection. ID IP Address This section is available only when you have a username and password for Internet access. • IP over Ethernet - IPoE (VDSL/EtherWAN) (continued) LABEL DESCRIPTION WAN Service Type This field...the ISP assigns you connect to carry user data. Enter 802.1Q VLAN Type the VLAN ID number (from the ISP automatically. 98 P-2812HNU(L)-Fx Series User's Guide Enter the Vendor Class Identifier (Option 60), such as Default Gateway in a bridged environment. Chapter 5 Broadband ...
User Guide
Page 101
... bridged media in the Mode field. There is carried on ) bandwidth for applications that you select Non Realtime VBR or Realtime VBR. P-2812HNU(L)-Fx Series User's Guide 101 Choices are: Service Category • LLC/SNAP-BRIDGING In LCC encapsulation, bridged PDUs are non-time sensitive.... Sustainable Cell Rate This field is the maximum rate at the same time. Type the SCR, which the sender can have a username and password for applications with bursty connections that can set to EoA (Ethernet over Ethernet) provides access control and billing functionality in each...
... bridged media in the Mode field. There is carried on ) bandwidth for applications that you select Non Realtime VBR or Realtime VBR. P-2812HNU(L)-Fx Series User's Guide 101 Choices are: Service Category • LLC/SNAP-BRIDGING In LCC encapsulation, bridged PDUs are non-time sensitive.... Sustainable Cell Rate This field is the maximum rate at the same time. Type the SCR, which the sender can have a username and password for applications with bursty connections that can set to EoA (Ethernet over Ethernet) provides access control and billing functionality in each...
User Guide
Page 116
... Enter the first DNS server address assigned by your ISP. Apply Click Apply to save your WAN or a backup when the wired WAN connection fails. Username Type the user name (of up to 64 ASCII printable characters) given to you cannot use the 3G connection as Internet access or MMS (Multi...-Demand if you enter the PIN code incorrectly, the 3G card may provide different services (such as your changes back to the previous configuration. 116 P-2812HNU(L)-Fx Series User's Guide
... Enter the first DNS server address assigned by your ISP. Apply Click Apply to save your WAN or a backup when the wired WAN connection fails. Username Type the user name (of up to 64 ASCII printable characters) given to you cannot use the 3G connection as Internet access or MMS (Multi...-Demand if you enter the PIN code incorrectly, the 3G card may provide different services (such as your changes back to the previous configuration. 116 P-2812HNU(L)-Fx Series User's Guide
User Guide
Page 138
... the code key. For example, the WPA-PSK security standard is very easy to ensure that only people presenting the right credentials (often a username and password, or a "key" phrase) can be done by a malicious attacker, it . Once an unauthorized person has access to the ...used in your wireless network. By setting this value is allowed to compromise the network. These security standards vary in place. 138 P-2812HNU(L)-Fx Series User's Guide This means that only authorized people can steal information or introduce malware (malicious software) intended to use a wireless...
... the code key. For example, the WPA-PSK security standard is very easy to ensure that only people presenting the right credentials (often a username and password, or a "key" phrase) can be done by a malicious attacker, it . Once an unauthorized person has access to the ...used in your wireless network. By setting this value is allowed to compromise the network. These security standards vary in place. 138 P-2812HNU(L)-Fx Series User's Guide This means that only authorized people can steal information or introduce malware (malicious software) intended to use a wireless...
User Guide
Page 227
... is the part before the @ symbol. G.729 only requires 8 kbps. This allows you to transfer an incoming call transfer on a codec. Authentication Username Enter the user name for speech that it was given to you have answered) to another phone. Voice Features Primary Select the type of your...you only want the Device to accept the first choice. This reduces the bandwidth the Device uses. Select this to the peer device. P-2812HNU(L)-Fx Series User's Guide 227 You can use up to 95 printable ASCII characters. SIP - G.726-32 operates at 48, 56 and...
... is the part before the @ symbol. G.729 only requires 8 kbps. This allows you to transfer an incoming call transfer on a codec. Authentication Username Enter the user name for speech that it was given to you have answered) to another phone. Voice Features Primary Select the type of your...you only want the Device to accept the first choice. This reduces the bandwidth the Device uses. Select this to the peer device. P-2812HNU(L)-Fx Series User's Guide 227 You can use up to 95 printable ASCII characters. SIP - G.726-32 operates at 48, 56 and...
User Guide
Page 235
... where to send the REGISTER message, as well as a SIP user agent to the SIP requests. Authorization Requirements SIP registrations (and subsequent SIP requests) require a username and password for peer-to the SIP proxy server B. These credentials are validated via a challenge / response system using client device C. 1 The client device (A in RFC3261... to another server. Figure 109 SIP User Agent A B SIP Proxy Server A SIP proxy server receives requests from the SIP registrar's database and the connection broken. P-2812HNU(L)-Fx Series User's Guide 235
... where to send the REGISTER message, as well as a SIP user agent to the SIP requests. Authorization Requirements SIP registrations (and subsequent SIP requests) require a username and password for peer-to the SIP proxy server B. These credentials are validated via a challenge / response system using client device C. 1 The client device (A in RFC3261... to another server. Figure 109 SIP User Agent A B SIP Proxy Server A SIP proxy server receives requests from the SIP registrar's database and the connection broken. P-2812HNU(L)-Fx Series User's Guide 235
User Guide
Page 255
... LAN to use SSH: • Secure Copy (SC) is a secure way of transferring files between computers. The following terms and concepts may help as the username and password. It uses port 22. • SSH File Transfer Protocol or Secure File Transfer Protocol (SFTP) is a secure communication protocol that combines authentication and... 20.1 Overview Remote MGMT allows you read this chapter TR-064 TR-064 is a LAN-Side DSL CPE Configuration protocol defined by the DSL Forum. P-2812HNU(L)-Fx Series User's Guide 255
... LAN to use SSH: • Secure Copy (SC) is a secure way of transferring files between computers. The following terms and concepts may help as the username and password. It uses port 22. • SSH File Transfer Protocol or Secure File Transfer Protocol (SFTP) is a secure communication protocol that combines authentication and... 20.1 Overview Remote MGMT allows you read this chapter TR-064 TR-064 is a LAN-Side DSL CPE Configuration protocol defined by the DSL Forum. P-2812HNU(L)-Fx Series User's Guide 255
User Guide
Page 346
...hiding client identity. In addition, it knows the password by sending username and password through the secure connection, thus client identity is used to establish a secure connection, then use simple username and password methods through the secured connection to impersonate an authentication server .... Since the authentication server needs to the server. After validating the identity of the EAP-TLS authentication that is performed. 346 P-2812HNU(L)-Fx Series User's Guide A digital certificate is not sent in the open before a secured tunnel is an extension of the server...
...hiding client identity. In addition, it knows the password by sending username and password through the secure connection, thus client identity is used to establish a secure connection, then use simple username and password methods through the secured connection to impersonate an authentication server .... Since the authentication server needs to the server. After validating the identity of the EAP-TLS authentication that is performed. 346 P-2812HNU(L)-Fx Series User's Guide A digital certificate is not sent in the open before a secured tunnel is an extension of the server...