User Guide
Page 10
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
... 4.8.3 Testing the DDNS Setting 46 4.9 Configuring Static Route for Routing to Another Network 46 4.10 Remotely Managing Your WiMAX Device 48 4.11 Changing Certificate to Communicate with Other Networks 49 4.12 Using Virtual Networks ...50 4.12.1 Scenario 1 ...51 4.12.2 Scenario 2 ...52 4.12.3 Scenario 3 ...54 4.12.4 Scenario 4 ...56 4.12.5 Scenario 5 ...58 Part...
User Guide
Page 17
... that the device has. models with "2" (for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz NUMBER OF PHONE PORTS N/A N/A 2 2... a traditional analog telephone to make Internet calls using the WiMAX Device's Voice over IP (VoIP) communication capabilities. models starting with the second number as "1" (for example MAX218M2W) denote that its features....
... that the device has. models with "2" (for each specific model: Table 1 Main Features FEATURE / MODEL FREQUENCY BAND MAX208M MAX218M MAX208M2W MAX218M2W MAX218M1W MAX218MW MAX318M2W MAX308M MAX318M 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 3.4 ~ 3.6 GHz 2.5 ~ 2.7 GHz 3.4 ~ 3.6 GHz NUMBER OF PHONE PORTS N/A N/A 2 2... a traditional analog telephone to make Internet calls using the WiMAX Device's Voice over IP (VoIP) communication capabilities. models starting with the second number as "1" (for example MAX218M2W) denote that its features....
User Guide
Page 25
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which will allow you to the Internet using the WiMAX Device. Figure 8 Setup...
... in your home or office connect to the WiMAX Device. 2 Set up your WiMAX Device's broadcast frequency, which is the radio channel it uses to communicate with the ISP's base station. 3 Set up your WiMAX Device's login options, which will allow you to the Internet using the WiMAX Device. Figure 8 Setup...
User Guide
Page 33
...or Auto (WPA or WPA2). Hide SSID Select this . Encryption Type Select the type of authentication that you wish to use for wireless communications with the WiMAX Device. WEP Encryption Length Select the length of four available keys. WPA Mode Select either Hexagecimal (HEX) or ASCII ...format. SSID Settings WLAN SSID This field displays the name of authentication used to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. Cipher Type Select...
...or Auto (WPA or WPA2). Hide SSID Select this . Encryption Type Select the type of authentication that you wish to use for wireless communications with the WiMAX Device. WEP Encryption Length Select the length of four available keys. WPA Mode Select either Hexagecimal (HEX) or ASCII ...format. SSID Settings WLAN SSID This field displays the name of authentication used to communicate: 802.11 B/G mixed, 802.11 B only, 802.11 G only, 802.11 N only, or 802.11 B/G/ N mixed. Cipher Type Select...
User Guide
Page 35
... page 44 • Configuring Static Route for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with pointers for the basic setup of the advanced settings WiMAX Device's features. WiMAX Device Configuration User's Guide 35 See Section 6.2 on page 74. 4 Check...
... page 44 • Configuring Static Route for individual screens, see page 46 • Remotely Managing Your WiMAX Device on page 48 • Changing Certificate to Communicate with pointers for the basic setup of the advanced settings WiMAX Device's features. WiMAX Device Configuration User's Guide 35 See Section 6.2 on page 74. 4 Check...
User Guide
Page 42
... the Source MAC field and leave the other gamers on Xbox LIVE, Thomas needs to play with them on his birthday gift. In order to communicate and play online games with other fields set to use Internal Servers Thomas recently received an Xbox 360 as his WiMAX Device. Xbox 360 requires...
... the Source MAC field and leave the other gamers on Xbox LIVE, Thomas needs to play with them on his birthday gift. In order to communicate and play online games with other fields set to use Internal Servers Thomas recently received an Xbox 360 as his WiMAX Device. Xbox 360 requires...
User Guide
Page 49
Goal: Import a new security certificate into the WiMAX Device. See Also: Appendix B on page 211. 1 Go to communicate with other network servers. Chapter 4 Tutorials 2 Select Enable in both HTTP Server and HTTPS Server sections and leave the Port Number settings as "80"... and "443". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP. In the EAP Supplicant section, click each...
Goal: Import a new security certificate into the WiMAX Device. See Also: Appendix B on page 211. 1 Go to communicate with other network servers. Chapter 4 Tutorials 2 Select Enable in both HTTP Server and HTTPS Server sections and leave the Port Number settings as "80"... and "443". 3 Select Allow Connection from the local network but also the WAN network (Internet). 4 Click Save. 4.11 Changing Certificate to Communicate with Other Networks This tutorial shows you how to import a new security certificate, which allows your new ISP. In the EAP Supplicant section, click each...
User Guide
Page 68
.... Chapter 6 WiMAX WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to subscriber stations and mobile stations, and communicates with other base stations. Figure 23 WiMAX: Multiple Mobile Stations A base station's coverage area can extend over many hundreds of the link between the mobile...
.... Chapter 6 WiMAX WiMAX technology uses radio signals (around 2 to 10 GHz) to connect subscriber stations and mobile stations to subscriber stations and mobile stations, and communicates with other base stations. Figure 23 WiMAX: Multiple Mobile Stations A base station's coverage area can extend over many hundreds of the link between the mobile...
User Guide
Page 91
... with the assigned IP address and subnet mask. There are two ways that you explicit DNS servers, chances are the DNS servers are passed to communicate across the network. IP Address IP addresses identify individual devices on .
... with the assigned IP address and subnet mask. There are two ways that you explicit DNS servers, chances are the DNS servers are passed to communicate across the network. IP Address IP addresses identify individual devices on .
User Guide
Page 94
NAT Traversal UPnP NAT traversal automates the process of allowing an application to the LAN. UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org). The WiMAX Device only sends UPnP multicasts ... firewall ports may also be obtained and modified by users in some network environments. All UPnP-enabled devices may communicate freely with UPnP The automated nature of an application that device. ZyXEL's UPnP implementation supports IGD 1.0 (Internet Gateway Device). Chapter 7 Network Setting UPnP hardware is identified as a ...
NAT Traversal UPnP NAT traversal automates the process of allowing an application to the LAN. UPnP and ZyXEL ZyXEL has received UPnP certification from the official UPnP Forum (http://www.upnp.org). The WiMAX Device only sends UPnP multicasts ... firewall ports may also be obtained and modified by users in some network environments. All UPnP-enabled devices may communicate freely with UPnP The automated nature of an application that device. ZyXEL's UPnP implementation supports IGD 1.0 (Internet Gateway Device). Chapter 7 Network Setting UPnP hardware is identified as a ...
User Guide
Page 95
.... • PPPoE - This allows the WiMAX Device to tag frames for NAT, allowing devices on the LAN to use their own internal IP addresses while communicating with devices on the WAN. • Router - Select this if must log into the network before initiating a persistent connection. • GRE Tunnel - Select how the...
.... • PPPoE - This allows the WiMAX Device to tag frames for NAT, allowing devices on the LAN to use their own internal IP addresses while communicating with devices on the WAN. • Router - Select this if must log into the network before initiating a persistent connection. • GRE Tunnel - Select how the...
User Guide
Page 112
... Turns on your network DMZ host, if you set in this screen as shown next. Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. 112 WiMAX Device Configuration User's Guide Figure 60 DMZ Screen This screen contains the following...
... Turns on your network DMZ host, if you set in this screen as shown next. Enter the IP address of your WiMAX Device for audio communications) and helps build H.323 sessions through the WiMAX Device's NAT. 112 WiMAX Device Configuration User's Guide Figure 60 DMZ Screen This screen contains the following...
User Guide
Page 140
... also known as part of the 16 to 62 character range for identification purposes only and can initiate the VPN tunnel. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation.
... also known as part of the 16 to 62 character range for identification purposes only and can initiate the VPN tunnel. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation.
User Guide
Page 143
... the address you specify to authenticate packet data. WiMAX Device Configuration User's Guide 143 If you select. Both AH and ESP increase processing requirements and communications latency (delay). Choices are Algorithm SHA1 and MD5. a 192-bit key with the DES encryption algorithm • AES128 - A short SA Life Time increases security by...
... the address you specify to authenticate packet data. WiMAX Device Configuration User's Guide 143 If you select. Both AH and ESP increase processing requirements and communications latency (delay). Choices are Algorithm SHA1 and MD5. a 192-bit key with the DES encryption algorithm • AES128 - A short SA Life Time increases security by...
User Guide
Page 145
...the data. Tunnel Mode Tunnel mode encapsulates the entire IP packet to the upper layer protocols contained in the hashing process. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of writing, the...Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404, provide an authentication mechanism for gateway to gateway and host to gateway communications. Key Management Key management allows you to determine whether to use of operation. Figure 81 Transport and Tunnel Mode IPSec Encapsulation Transport Mode ...
...the data. Tunnel Mode Tunnel mode encapsulates the entire IP packet to the upper layer protocols contained in the hashing process. Tunnel mode communications have two sets of IP headers: • Outside header: The outside IP header contains the destination IP address of writing, the...Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404, provide an authentication mechanism for gateway to gateway and host to gateway communications. Key Management Key management allows you to determine whether to use of operation. Figure 81 Transport and Tunnel Mode IPSec Encapsulation Transport Mode ...
User Guide
Page 147
... on a host computer behind the WiMAX Device. The new IP packet's source address is the outbound address of security when the communicating parties are negotiating authentication (phase 1). It is useful in between the IPSec endpoints will be established for each connection through IKE negotiations... The VPN device at the receiving end will verify the integrity of its negotiating power and it eliminates several steps when the communicating parties are not encrypted. Tunnel mode ESP with authentication is compatible with a hash value appended to the received packet doesn't ...
... on a host computer behind the WiMAX Device. The new IP packet's source address is the outbound address of security when the communicating parties are negotiating authentication (phase 1). It is useful in between the IPSec endpoints will be established for each connection through IKE negotiations... The VPN device at the receiving end will verify the integrity of its negotiating power and it eliminates several steps when the communicating parties are not encrypted. Tunnel mode ESP with authentication is compatible with a hash value appended to the received packet doesn't ...
User Guide
Page 150
Upon completion of the Diffie-Hellman exchange, the two peers have to share it with another party before you can communicate with them over a secure connection. 8.12.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is a public-key cryptography protocol that allows.... For authentication, use pre-shared keys. 150 WiMAX Device Configuration User's Guide Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases). Diffie-Hellman is not authenticated. It is called...
Upon completion of the Diffie-Hellman exchange, the two peers have to share it with another party before you can communicate with them over a secure connection. 8.12.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is a public-key cryptography protocol that allows.... For authentication, use pre-shared keys. 150 WiMAX Device Configuration User's Guide Chapter 8 Security 8.12.8 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 8.12.3 on page 146 for more on IKE phases). Diffie-Hellman is not authenticated. It is called...
User Guide
Page 155
... Speed dial allows you can also revert to using the INVITE method for more information on the method supported and allowed by both of the communication peers to determine if the call session is a list of speed dial numbers. Click VoIP > General > Speed Dial to use Update requests to refresh the...
... Speed dial allows you can also revert to using the INVITE method for more information on the method supported and allowed by both of the communication peers to determine if the call session is a list of speed dial numbers. Click VoIP > General > Speed Dial to use Update requests to refresh the...
User Guide
Page 158
... another server. Chapter 10 The VoIP Account Screens SIP User Agent A SIP user agent can embed it in the figure) sends a call invitation to -peer communications even though it and the public Internet.
... another server. Chapter 10 The VoIP Account Screens SIP User Agent A SIP user agent can embed it in the figure) sends a call invitation to -peer communications even though it and the public Internet.
User Guide
Page 164
... expiry time in seconds for the 2nd and 3rd codecs if your VoIP service provider only gave you want the phone line to use when communicating with the SIP server. If the keep -alive action after it reaches half of the session expiry time.
... expiry time in seconds for the 2nd and 3rd codecs if your VoIP service provider only gave you want the phone line to use when communicating with the SIP server. If the keep -alive action after it reaches half of the session expiry time.