User Guide
Page 10
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
User Guide
Page 17
...a traditional analog telephone to make Internet calls using the WiMAX Device's Voice over IP (VoIP) communication capabilities. models with the second number as the web configurator, provides easy management of the product ... VoIP port. • Models ending with "W" (for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz NUMBER OF PHONE PORTS N/A N/A 2 ...
...a traditional analog telephone to make Internet calls using the WiMAX Device's Voice over IP (VoIP) communication capabilities. models with the second number as the web configurator, provides easy management of the product ... VoIP port. • Models ending with "W" (for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz NUMBER OF PHONE PORTS N/A N/A 2 ...
User Guide
Page 25
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which are used to connect your LAN to the ISP's network and verify...
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which are used to connect your LAN to the ISP's network and verify...
User Guide
Page 33
... the name of the wireless network associated with the wireless stations. Encryption Type Select the type of authentication used to use for wireless communications with the WiMAX Device. Authentication Method Select the type of encryption that the network will be using to 13 for your network: TKIP... None, WEP, or WPA Personal. WLAN Channel Select one of the encryption key: 64-bit or 128-bit. Key 1 - 4 Pick one channel from 1 to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. SSID WPA Settings Type the key ...
... the name of the wireless network associated with the wireless stations. Encryption Type Select the type of authentication used to use for wireless communications with the WiMAX Device. Authentication Method Select the type of encryption that the network will be using to 13 for your network: TKIP... None, WEP, or WPA Personal. WLAN Channel Select one of the encryption key: 64-bit or 128-bit. Key 1 - 4 Pick one channel from 1 to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. SSID WPA Settings Type the key ...
User Guide
Page 35
.... This chapter shows you with pointers for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with Other Networks on page 49 • Using Virtual Networks on page 20 before working properly. For field descriptions for configuring the WiMAX Device to...
.... This chapter shows you with pointers for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with Other Networks on page 49 • Using Virtual Networks on page 20 before working properly. For field descriptions for configuring the WiMAX Device to...
User Guide
Page 42
In order to communicate and play online games with other fields set to configure the port settings on Xbox LIVE, Thomas needs to their defaults. Check the DHCP Leased ...
In order to communicate and play online games with other fields set to configure the port settings on Xbox LIVE, Thomas needs to their defaults. Check the DHCP Leased ...
User Guide
Page 49
...the WiMAX > Profile > Authentication Settings screen. This allows remote management connections not only from WAN. See Also: Appendix B on page 211. 1 Go to communicate with other network servers. s WiMAX Device Configuration User's Guide 49 1 Open the Maintenance > Remote MGMT > HTTP screen. Goal: Import a new security ... "443". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP.
...the WiMAX > Profile > Authentication Settings screen. This allows remote management connections not only from WAN. See Also: Appendix B on page 211. 1 Go to communicate with other network servers. s WiMAX Device Configuration User's Guide 49 1 Open the Maintenance > Remote MGMT > HTTP screen. Goal: Import a new security ... "443". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP.
User Guide
Page 68
... stations connect to the network through a single base station (BS), as an AAA (Authentication, Authorization and Accounting) server to subscriber stations and mobile stations, and communicates with other base stations. Figure 24 Using an AAA Server In this figure, the dashed arrow shows the PKM (Privacy Key Management) secured connection between...
... stations connect to the network through a single base station (BS), as an AAA (Authentication, Authorization and Accounting) server to subscriber stations and mobile stations, and communicates with other base stations. Figure 24 Using an AAA Server In this figure, the dashed arrow shows the PKM (Privacy Key Management) secured connection between...
User Guide
Page 91
... addresses identify individual devices on . The DNS server addresses that an ISP disseminates the DNS server addresses. The first is for mapping a domain name to communicate across the network. If your ISP did not give you enter in the DNS Server fields; Subnet Masks Subnet masks determine the maximum number of...
... addresses identify individual devices on . The DNS server addresses that an ISP disseminates the DNS server addresses. The first is for mapping a domain name to communicate across the network. If your ISP did not give you enter in the DNS Server fields; Subnet Masks Subnet masks determine the maximum number of...
User Guide
Page 94
... information and configuration may also be obtained and modified by users in establishing their own services and opening firewall ports may communicate freely with UPnP The automated nature of simple product and service descriptions. All UPnP-enabled devices may present network security issues.... The WiMAX Device only sends UPnP multicasts to operate through NAT. ZyXEL's UPnP implementation supports IGD 1.0 (Internet Gateway Device). UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org).
... information and configuration may also be obtained and modified by users in establishing their own services and opening firewall ports may communicate freely with UPnP The automated nature of simple product and service descriptions. All UPnP-enabled devices may present network security issues.... The WiMAX Device only sends UPnP multicasts to operate through NAT. ZyXEL's UPnP implementation supports IGD 1.0 (Internet Gateway Device). UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org).
User Guide
Page 95
... on the LAN to share an Internet account. • NAT - Select this if you want multiple computers to use their own internal IP addresses while communicating with devices on the WAN. • Router - Select this if you need to open this to automatically get the IP address the WiMAX Device uses...
... on the LAN to share an Internet account. • NAT - Select this if you want multiple computers to use their own internal IP addresses while communicating with devices on the WAN. • Router - Select this if you need to open this to automatically get the IP address the WiMAX Device uses...
User Guide
Page 112
... helps build FTP sessions through the WiMAX Device's NAT. 112 WiMAX Device Configuration User's Guide Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. Figure 61 ALG Screen This screen contains the following fields: Table 42 DMZ LABEL DMZ...
... helps build FTP sessions through the WiMAX Device's NAT. 112 WiMAX Device Configuration User's Guide Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. Figure 61 ALG Screen This screen contains the following fields: Table 42 DMZ LABEL DMZ...
User Guide
Page 140
... Device can initiate the VPN tunnel. Remote Endpoint IP Address Enter the IP address of your intended VPN connection. • Initiator - A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. When you select IP in the Local ID Type field, type the IP address of the remote IPSec router in...
... Device can initiate the VPN tunnel. Remote Endpoint IP Address Enter the IP address of your intended VPN connection. • Initiator - A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. When you select IP in the Local ID Type field, type the IP address of the remote IPSec router in...
User Guide
Page 143
... ping the address you select tcp or udp, specify the port number to identify the network address. Both AH and ESP increase processing requirements and communications latency (delay). SHA1 is generally considered stronger than MD5, but it is selected, enter a (static) IP address on the LAN behind the remote IPSec's router...
... ping the address you select tcp or udp, specify the port number to identify the network address. Both AH and ESP increase processing requirements and communications latency (delay). SHA1 is generally considered stronger than MD5, but it is selected, enter a (static) IP address on the LAN behind the remote IPSec's router...
User Guide
Page 145
... address cannot be verified for the AH and ESP protocols. With the use IKE (ISAKMP) or manual key configuration in the IP packet. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of operation for IPSec VPNs are not... HMAC-SHA-1 (RFC 2404, provide an authentication mechanism for integrity against the data. Tunnel mode is required for gateway to gateway and host to gateway communications.
... address cannot be verified for the AH and ESP protocols. With the use IKE (ISAKMP) or manual key configuration in the IP packet. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of operation for IPSec VPNs are not... HMAC-SHA-1 (RFC 2404, provide an authentication mechanism for integrity against the data. Tunnel mode is required for gateway to gateway and host to gateway communications.
User Guide
Page 147
... using AH protocol, packet contents (the data payload) are signed with the AH protocol in the middle, so it eliminates several steps when the communicating parties are negotiating authentication (phase 1). Tunnel mode ESP with authentication is not know about the NAT in both Transport and Tunnel mode. The VPN ...with a hash value appended to the received packet doesn't match. The new IP packet's source address is the outbound address of security when the communicating parties are negotiating authentication (phase 1). The encrypted contents, but not the new headers, are not encrypted.
... using AH protocol, packet contents (the data payload) are signed with the AH protocol in the middle, so it eliminates several steps when the communicating parties are negotiating authentication (phase 1). Tunnel mode ESP with authentication is not know about the NAT in both Transport and Tunnel mode. The VPN ...with a hash value appended to the received packet doesn't match. The new IP packet's source address is the outbound address of security when the communicating parties are negotiating authentication (phase 1). The encrypted contents, but not the new headers, are not encrypted.
User Guide
Page 150
... groups are supported. For authentication, use pre-shared keys. 150 WiMAX Device Configuration User's Guide Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases). Diffie-Hellman is not authenticated. It is called "pre...
... groups are supported. For authentication, use pre-shared keys. 150 WiMAX Device Configuration User's Guide Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases). Diffie-Hellman is not authenticated. It is called "pre...
User Guide
Page 155
... following table describes the labels in this screen. To edit an existing speed dial rule, you to determine if the session is a list of the communication peers to be used by the peer device. 9.5 Speed Dial Speed dial allows you can click the row for dialing frequently used phone numbers. Active...
... following table describes the labels in this screen. To edit an existing speed dial rule, you to determine if the session is a list of the communication peers to be used by the peer device. 9.5 Speed Dial Speed dial allows you can click the row for dialing frequently used phone numbers. Active...
User Guide
Page 158
... routers or firewalls. A and B can act as a SIP user agent to receive the call invitation to another server. See RFC 3489 for peer-to-peer communications even though it is using client device C. 1 The client device (A in the SIP data stream. The following figure, either A or B can also both act as...
... routers or firewalls. A and B can act as a SIP user agent to receive the call invitation to another server. See RFC 3489 for peer-to-peer communications even though it is using client device C. 1 The client device (A in the SIP data stream. The following figure, either A or B can also both act as...
User Guide
Page 164
... failed, the call will re-start a SIP session, they must agree on a codec. The WiMAX Device will use INVITE or UPDATE method to use when communicating with the INVITE or UPDATE method. 164 WiMAX Device Configuration User's Guide See Section 9.4 on this value as the minimum bound. Session Timer Min Session...
... failed, the call will re-start a SIP session, they must agree on a codec. The WiMAX Device will use INVITE or UPDATE method to use when communicating with the INVITE or UPDATE method. 164 WiMAX Device Configuration User's Guide See Section 9.4 on this value as the minimum bound. Session Timer Min Session...