User Guide
Page 10
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
User Guide
Page 17
...Voice over IP (VoIP) communication capabilities. Please refer to a WiMAX wireless network. For example, MAX208M2W has 2 VoIP ports; models starting with the second number as "1" (for example MAX208M2W) denote an indoor CPE ... the Internet by connecting to the following table for the main features for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz ...
...Voice over IP (VoIP) communication capabilities. Please refer to a WiMAX wireless network. For example, MAX208M2W has 2 VoIP ports; models starting with the second number as "1" (for example MAX208M2W) denote an indoor CPE ... the Internet by connecting to the following table for the main features for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz ...
User Guide
Page 25
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which are used to connect your LAN to the ISP's network and verify...
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which are used to connect your LAN to the ISP's network and verify...
User Guide
Page 33
.... A warning message will appear if you fail to do this option if you selected WEP as the Encryption Type. Key 1 - 4 Pick one channel from 1 to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. Note: You will only see this options ...the pre-shared key or PSK previously shared between the two parties. WEP Encryption Length Select the length of authentication used to use for wireless communications with the WiMAX Device. AES is case sensitive and the length must match the length picked in either WPA, WPA2 or Auto (WPA ...
.... A warning message will appear if you fail to do this option if you selected WEP as the Encryption Type. Key 1 - 4 Pick one channel from 1 to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. Note: You will only see this options ...the pre-shared key or PSK previously shared between the two parties. WEP Encryption Length Select the length of authentication used to use for wireless communications with the WiMAX Device. AES is case sensitive and the length must match the length picked in either WPA, WPA2 or Auto (WPA ...
User Guide
Page 35
... This chapter shows you with pointers for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with Other Networks on page 49 • Using Virtual Networks on page 74. 4 Check the WiMAX Device's connection status to the ISP's authentication servers. For...
... This chapter shows you with pointers for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with Other Networks on page 49 • Using Virtual Networks on page 74. 4 Check the WiMAX Device's connection status to the ISP's authentication servers. For...
User Guide
Page 42
... to their defaults. You may be available in order to operate Xbox LIVE correctly: TCP: 53, 80, 3074 UDP: 53, 88, 3074 1 You have to communicate and play online games with other fields set to check the IP address on the WiMAX network through the Xbox 360 console. Chapter 4 Tutorials 3 An...
... to their defaults. You may be available in order to operate Xbox LIVE correctly: TCP: 53, 80, 3074 UDP: 53, 88, 3074 1 You have to communicate and play online games with other fields set to check the IP address on the WiMAX network through the Xbox 360 console. Chapter 4 Tutorials 3 An...
User Guide
Page 49
...". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with other network servers. See Also: Appendix B on page 211. 1 Go to communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP. In...
...". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with other network servers. See Also: Appendix B on page 211. 1 Go to communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP. In...
User Guide
Page 68
.... Chapter 6 WiMAX WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to subscriber stations and mobile stations, and communicates with other base stations. Figure 23 WiMAX: Multiple Mobile Stations A base station's coverage area can extend over many hundreds of the link between the mobile...
.... Chapter 6 WiMAX WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to subscriber stations and mobile stations, and communicates with other base stations. Figure 23 WiMAX: Multiple Mobile Stations A base station's coverage area can extend over many hundreds of the link between the mobile...
User Guide
Page 91
... that an ISP disseminates the DNS server addresses. There are also known as you explicit DNS servers, chances are the DNS servers are passed to communicate across the network. If your ISP gives you the DNS server addresses, enter them blank. otherwise, leave them in the form of an information sheet...
... that an ISP disseminates the DNS server addresses. There are also known as you explicit DNS servers, chances are the DNS servers are passed to communicate across the network. If your ISP gives you the DNS server addresses, enter them blank. otherwise, leave them in the form of an information sheet...
User Guide
Page 94
...The WiMAX Device only sends UPnP multicasts to operate through NAT. Selecting the icon of simple product and service descriptions. UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org). Content Filter Internet content filtering allows you to configure...Network information and configuration may also be obtained and modified by users in establishing their own services and opening firewall ports may communicate freely with UPnP The automated nature of that supports NAT traversal and UPnP. Disable UPnP if this is the ability to block...
...The WiMAX Device only sends UPnP multicasts to operate through NAT. Selecting the icon of simple product and service descriptions. UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org). Content Filter Internet content filtering allows you to configure...Network information and configuration may also be obtained and modified by users in establishing their own services and opening firewall ports may communicate freely with UPnP The automated nature of that supports NAT traversal and UPnP. Disable UPnP if this is the ability to block...
User Guide
Page 95
...'s Guide 95 This allows the WiMAX Device to tag frames for NAT, allowing devices on the LAN to use their own internal IP addresses while communicating with devices on the WAN. • Router - Select how the WiMAX Device receives its IP address. • User - Select this to manually enter the IP...
...'s Guide 95 This allows the WiMAX Device to tag frames for NAT, allowing devices on the LAN to use their own internal IP addresses while communicating with devices on the WAN. • Router - Select how the WiMAX Device receives its IP address. • User - Select this to manually enter the IP...
User Guide
Page 112
... helps build IPsec sessions through the WiMAX Device's NAT. 112 WiMAX Device Configuration User's Guide Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. Enable H.323 ALG Turns on the L2TP ALG to detect H.323 traffic (used for those...
... helps build IPsec sessions through the WiMAX Device's NAT. 112 WiMAX Device Configuration User's Guide Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. Enable H.323 ALG Turns on the L2TP ALG to detect H.323 traffic (used for those...
User Guide
Page 140
... VPN tunnel. • Responder - Remote Endpoint IP Address Enter the IP address of the remote IPSec router in the IKE SA. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. For example, in "0x0123456789ABCDEF", "0x" denotes that best describes your computer in from IPSec VPN clients. It is recommended that...
... VPN tunnel. • Responder - Remote Endpoint IP Address Enter the IP address of the remote IPSec router in the IKE SA. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. For example, in "0x0123456789ABCDEF", "0x" denotes that best describes your computer in from IPSec VPN clients. It is recommended that...
User Guide
Page 143
... a (static) IP address on the LAN behind the remote IPSec's router. Choices are Algorithm SHA1 and MD5. Both AH and ESP increase processing requirements and communications latency (delay). a 56-bit key with the address you specify to pings. Select Tunnel mode or Transport mode from the Encryption Algorithm and Authentication Algorithm...
... a (static) IP address on the LAN behind the remote IPSec's router. Choices are Algorithm SHA1 and MD5. Both AH and ESP increase processing requirements and communications latency (delay). a 56-bit key with the address you specify to pings. Select Tunnel mode or Transport mode from the Encryption Algorithm and Authentication Algorithm...
User Guide
Page 145
... options are Transport mode and Tunnel mode. Therefore, the originating IP address cannot be verified for the AH and ESP protocols. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of writing, the WiMAX ...AH as TCP and UDP). With ESP, protection is the most common mode of operation for gateway services to provide access to gateway communications. Tunnel Mode Tunnel mode encapsulates the entire IP packet to the upper layer protocols contained in the IP packet. This is applied only...
... options are Transport mode and Tunnel mode. Therefore, the originating IP address cannot be verified for the AH and ESP protocols. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of writing, the WiMAX ...AH as TCP and UDP). With ESP, protection is the most common mode of operation for gateway services to provide access to gateway communications. Tunnel Mode Tunnel mode encapsulates the entire IP packet to the upper layer protocols contained in the IP packet. This is applied only...
User Guide
Page 147
... (your identity is not revealed in the middle, so it assumes that faster speed limits its negotiating power and it eliminates several steps when the communicating parties are running IPSec on a host computer behind the WiMAX Device. NAT is a random number). The VPN device at the receiving end doesn't know by... you are negotiating authentication (phase 1). A NAT device in a new IP packet. The new IP packet's source address is the outbound address of security when the communicating parties are negotiating authentication (phase 1).
... (your identity is not revealed in the middle, so it assumes that faster speed limits its negotiating power and it eliminates several steps when the communicating parties are running IPSec on a host computer behind the WiMAX Device. NAT is a random number). The VPN device at the receiving end doesn't know by... you are negotiating authentication (phase 1). A NAT device in a new IP packet. The new IP packet's source address is the outbound address of security when the communicating parties are negotiating authentication (phase 1).
User Guide
Page 150
...on page 146 for more on IKE phases). Diffie-Hellman is used within IKE SA setup to establish a shared secret over an unsecured communications channel. For authentication, use pre-shared keys. 150 WiMAX Device Configuration User's Guide Upon completion of the Diffie-Hellman exchange, the ...connection. 8.12.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is not authenticated. It is called "pre-shared" because you can communicate with another party before you have a shared secret, but the IKE SA is a public-key cryptography protocol that allows two parties to establish ...
...on page 146 for more on IKE phases). Diffie-Hellman is used within IKE SA setup to establish a shared secret over an unsecured communications channel. For authentication, use pre-shared keys. 150 WiMAX Device Configuration User's Guide Upon completion of the Diffie-Hellman exchange, the ...connection. 8.12.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is not authenticated. It is called "pre-shared" because you can communicate with another party before you have a shared secret, but the IKE SA is a public-key cryptography protocol that allows two parties to establish ...
User Guide
Page 155
... SIP LABEL Session Timer Enable Refresh Method DESCRIPTION Select this screen. The Update method uses less overhead than Re-Invite, but is a list of the communication peers to activate the WiMAX Device's SIP Session Timer. Table 69 Speed Dial LABEL DESCRIPTION Speed Dial Rules - Click VoIP > General > Speed Dial to periodically...
... SIP LABEL Session Timer Enable Refresh Method DESCRIPTION Select this screen. The Update method uses less overhead than Re-Invite, but is a list of the communication peers to activate the WiMAX Device's SIP Session Timer. Table 69 Speed Dial LABEL DESCRIPTION Speed Dial Rules - Click VoIP > General > Speed Dial to periodically...
User Guide
Page 158
... assigned, so the WiMAX Device can make and receive VoIP telephone calls. The following figure, either A or B can act as a SIP user agent to -peer communications even though it is using client device C. 1 The client device (A in the SIP data stream.
... assigned, so the WiMAX Device can make and receive VoIP telephone calls. The following figure, either A or B can act as a SIP user agent to -peer communications even though it is using client device C. 1 The client device (A in the SIP data stream.
User Guide
Page 164
The allowable range is 120~65535 seconds. Enter the session expiry time in highest quality to use when communicating with a "423 session timer too small" message and tell the peer to use INVITE or UPDATE method to configure the Refresh Method with the INVITE ...
The allowable range is 120~65535 seconds. Enter the session expiry time in highest quality to use when communicating with a "423 session timer too small" message and tell the peer to use INVITE or UPDATE method to configure the Refresh Method with the INVITE ...