User Guide
Page 10
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
User Guide
Page 17
...traditional analog telephone to make Internet calls using the WiMAX Device's Voice over IP (VoIP) communication capabilities. For example, MAX208M2W has 2 VoIP ports; models starting with the second number as ... starting with "3" (for example MAX318M2W) denote an outdoor CPE device. • Models with "2" (for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6...
...traditional analog telephone to make Internet calls using the WiMAX Device's Voice over IP (VoIP) communication capabilities. For example, MAX208M2W has 2 VoIP ports; models starting with the second number as ... starting with "3" (for example MAX318M2W) denote an outdoor CPE device. • Models with "2" (for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6...
User Guide
Page 25
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which are used to connect your LAN to the ISP's network and verify...
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which are used to connect your LAN to the ISP's network and verify...
User Guide
Page 33
... authentication that the network will be using: None, WEP, or WPA Personal. WEP Encryption Length Select the length of authentication used to use for wireless communications with the WiMAX Device. Note: You will only see this . The key can be using any letters and numbers. Key 1 - 4 Pick one... channel from 1 to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. Encryption Type Select the type of...
... authentication that the network will be using: None, WEP, or WPA Personal. WEP Encryption Length Select the length of authentication used to use for wireless communications with the WiMAX Device. Note: You will only see this . The key can be using any letters and numbers. Key 1 - 4 Pick one... channel from 1 to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. Encryption Type Select the type of...
User Guide
Page 35
... User's Guide 35 For field descriptions for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with Other Networks on page 49 • Using Virtual Networks on page 50 4.2 WiMAX Connection Settings This tutorial provides you how to configure some of...
... User's Guide 35 For field descriptions for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with Other Networks on page 49 • Using Virtual Networks on page 50 4.2 WiMAX Connection Settings This tutorial provides you how to configure some of...
User Guide
Page 42
... the following ports to be able to check the IP address on the WiMAX Device if the WiMAX Device has assigned a DHCP IP address to communicate and play online games with other fields set to use Internal Servers Thomas recently received an Xbox 360 as his WiMAX Device. In order to...
... the following ports to be able to check the IP address on the WiMAX Device if the WiMAX Device has assigned a DHCP IP address to communicate and play online games with other fields set to use Internal Servers Thomas recently received an Xbox 360 as his WiMAX Device. In order to...
User Guide
Page 49
This allows remote management connections not only from WAN. See Also: Appendix B on page 211. 1 Go to communicate with other network servers. In the EAP Supplicant section, click each Browse button and locate the security certificates that were provided by your device to ... Number settings as "80" and "443". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP.
This allows remote management connections not only from WAN. See Also: Appendix B on page 211. 1 Go to communicate with other network servers. In the EAP Supplicant section, click each Browse button and locate the security certificates that were provided by your device to ... Number settings as "80" and "443". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP.
User Guide
Page 68
... in the following figure shows a base station using an AAA server to authenticate mobile station MS, allowing it to subscriber stations and mobile stations, and communicates with other base stations. See the WiMAX security appendix for more details. 68 WiMAX Device Configuration User's Guide The WiMAX Device follows the base station...
... in the following figure shows a base station using an AAA server to authenticate mobile station MS, allowing it to subscriber stations and mobile stations, and communicates with other base stations. See the WiMAX security appendix for more details. 68 WiMAX Device Configuration User's Guide The WiMAX Device follows the base station...
User Guide
Page 91
... server addresses. otherwise, leave them in the DNS Server fields; WiMAX Device Configuration User's Guide 91 The DNS server is for mapping a domain name to communicate across the network. There are passed to the client machines along with the assigned IP address and subnet mask. Some ISPs choose to pass the...
... server addresses. otherwise, leave them in the DNS Server fields; WiMAX Device Configuration User's Guide 91 The DNS server is for mapping a domain name to communicate across the network. There are passed to the client machines along with the assigned IP address and subnet mask. Some ISPs choose to pass the...
User Guide
Page 94
Cautions with each other UPnP devices and enable exchange of simple product and service descriptions. UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org). Content filtering is an example of an ... is the ability to block certain specific URL keywords. 7.2 WAN Use these settings to other without additional configuration. All UPnP-enabled devices may communicate freely with UPnP The automated nature of NAT traversal applications in some network environments. NAT traversal allows the following: • Dynamic port mapping...
Cautions with each other UPnP devices and enable exchange of simple product and service descriptions. UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org). Content filtering is an example of an ... is the ability to block certain specific URL keywords. 7.2 WAN Use these settings to other without additional configuration. All UPnP-enabled devices may communicate freely with UPnP The automated nature of NAT traversal applications in some network environments. NAT traversal allows the following: • Dynamic port mapping...
User Guide
Page 95
.... Select the protocol the WiMAX Device uses to connect to share an Internet account. • NAT - Select to use their own internal IP addresses while communicating with devices on the WAN. Click Network Setting > WAN to open this screen as a transparent middle man between devices on the LAN and the devices...
.... Select the protocol the WiMAX Device uses to connect to share an Internet account. • NAT - Select to use their own internal IP addresses while communicating with devices on the WAN. Click Network Setting > WAN to open this screen as a transparent middle man between devices on the LAN and the devices...
User Guide
Page 112
... FTP (File Transfer Program) traffic and helps build FTP sessions through the WiMAX Device's NAT. Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. Enable PPTP ALG Turns on the L2TP ALG to enable DMZ. Enable H.323 ALG Turns...
... FTP (File Transfer Program) traffic and helps build FTP sessions through the WiMAX Device's NAT. Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. Enable PPTP ALG Turns on the L2TP ALG to enable DMZ. Enable H.323 ALG Turns...
User Guide
Page 140
... that come in "0x0123456789ABCDEF", "0x" denotes that best describes your pre-shared key in the Local Content field. Choose this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. When you select Domain Name or E-mail in the following fields: Table 60 IPSec VPN: Add LABEL DESCRIPTION Property Enable...
... that come in "0x0123456789ABCDEF", "0x" denotes that best describes your pre-shared key in the Local Content field. Choose this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. When you select Domain Name or E-mail in the following fields: Table 60 IPSec VPN: Add LABEL DESCRIPTION Property Enable...
User Guide
Page 143
Select Tunnel mode or Transport mode from the Encryption Algorithm and Authentication Algorithm fields (described below). Both AH and ESP increase processing requirements and communications latency (delay). WiMAX Device Configuration User's Guide 143 You may need to configure the peer to respond to pings. If you select tcp or udp, ...
Select Tunnel mode or Transport mode from the Encryption Algorithm and Authentication Algorithm fields (described below). Both AH and ESP increase processing requirements and communications latency (delay). WiMAX Device Configuration User's Guide 143 You may need to configure the peer to respond to pings. If you select tcp or udp, ...
User Guide
Page 145
At the time of the VPN gateway. With ESP, protection is fundamentally an IP tunnel with authentication and encryption. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of writing, the WiMAX... to protect upper layer protocols and only affects the data in the packet. Key Management Key management allows you to determine whether to gateway communications. This is required for gateway services to provide access to internal systems. Tunnel mode is applied only to transmit it securely. A Tunnel ...
At the time of the VPN gateway. With ESP, protection is fundamentally an IP tunnel with authentication and encryption. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of writing, the WiMAX... to protect upper layer protocols and only affects the data in the packet. Key Management Key management allows you to determine whether to gateway communications. This is required for gateway services to provide access to internal systems. Tunnel mode is applied only to transmit it securely. A Tunnel ...
User Guide
Page 147
... AH protocol digitally signs the outbound packet, both data payload and headers, with one of its negotiating power and it eliminates several steps when the communicating parties are negotiating authentication (phase 1). The new IP packet's source address is the outbound address of the sending VPN gateway, and its destination address is... in between the IPSec endpoints will be established for each connection through IKE negotiations. • Main Mode ensures the highest level of security when the communicating parties are encrypted. A NAT device in both parties want to the packet.
... AH protocol digitally signs the outbound packet, both data payload and headers, with one of its negotiating power and it eliminates several steps when the communicating parties are negotiating authentication (phase 1). The new IP packet's source address is the outbound address of the sending VPN gateway, and its destination address is... in between the IPSec endpoints will be established for each connection through IKE negotiations. • Main Mode ensures the highest level of security when the communicating parties are encrypted. A NAT device in both parties want to the packet.
User Guide
Page 150
It is called "pre-shared" because you can communicate with another party before you have a shared secret, but the IKE SA is a public-key cryptography protocol that allows two parties to establish a shared secret ... 3072-bit Diffie-Hellman groups are supported. Diffie-Hellman is used within IKE SA setup to share it with them over an unsecured communications channel. Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases).
It is called "pre-shared" because you can communicate with another party before you have a shared secret, but the IKE SA is a public-key cryptography protocol that allows two parties to establish a shared secret ... 3072-bit Diffie-Hellman groups are supported. Diffie-Hellman is used within IKE SA setup to share it with them over an unsecured communications channel. Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases).
User Guide
Page 155
... of speed dial numbers. Click VoIP > General > Speed Dial to use Re-Invite requests. Active This field displays whether the rule is a list of the communication peers to determine if the call session is set up session timer on SIP. Table 69 Speed Dial LABEL DESCRIPTION Speed Dial Rules - This is...
... of speed dial numbers. Click VoIP > General > Speed Dial to use Re-Invite requests. Active This field displays whether the rule is a list of the communication peers to determine if the call session is set up session timer on SIP. Table 69 Speed Dial LABEL DESCRIPTION Speed Dial Rules - This is...
User Guide
Page 158
... Translators) allows the WiMAX Device to find the public IP address that SIP can be used on STUN. See RFC 3489 for peer-to-peer communications even though it is using client device C. 1 The client device (A in the SIP data stream. Chapter 10 The VoIP Account Screens SIP User Agent A SIP...
... Translators) allows the WiMAX Device to find the public IP address that SIP can be used on STUN. See RFC 3489 for peer-to-peer communications even though it is using client device C. 1 The client device (A in the SIP data stream. Chapter 10 The VoIP Account Screens SIP User Agent A SIP...
User Guide
Page 164
... muLaw (typically used in North America and Japan) • G.729 You can also select NONE for all phone connections on page 155 to use when communicating with the INVITE or UPDATE method. 164 WiMAX Device Configuration User's Guide Chapter 10 The VoIP Account Screens Table 72 SIP (continued) LABEL 1st Codec...
... muLaw (typically used in North America and Japan) • G.729 You can also select NONE for all phone connections on page 155 to use when communicating with the INVITE or UPDATE method. 164 WiMAX Device Configuration User's Guide Chapter 10 The VoIP Account Screens Table 72 SIP (continued) LABEL 1st Codec...