MN 7204BRA UserGuide
MN 7204BRA UserGuide
MN 7204BRA UserGuide
February 2004
TABLE OF CONTENTS
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Using this Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Notational conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Typographical conventions . . . . . . . . . . . . . . . . . . . . . . . . 3
Special messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Quick Start . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Connecting the Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Step 1. Connect the ADSL cable . . . . . . . . . . . . . . . . . . . 8
Step 2. Connect the Ethernet cable . . . . . . . . . . . . . . . . . 9
Step 3. Attach the power connector . . . . . . . . . . . . . . . . . 9
Step 4. Power up your systems . . . . . . . . . . . . . . . . . . . . 9
Configuring Your Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Windows® XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Windows 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Windows Me . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Windows 95, 98 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Windows NT 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Assigning static Internet Information to your PCs . . . . . . 16
Configuring the ADSL Barricade . . . . . . . . . . . . . . . . . . . . . . . 17
Logging into the ADSL Barricade –
Quick Configuration Page . . . . . . . . . . . . . . . . . . . . . . . . 17
Default Router Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 20
i
Table of Contents
ii
Table of Contents
Configuring IP Routes . . . . . . . . . . . . . . . . . . . . . 85
Overview of IP Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
IP routing versus telephone switching . . . . . . . . . . . . . . 85
Hops and gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Using IP routes to define default gateways . . . . . . . . . . 87
Do I need to define IP routes? . . . . . . . . . . . . . . . . . . . . 87
Viewing the IP Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Adding IP Routes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
iii
Table of Contents
iv
Table of Contents
Appendix A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Structure of an IP address . . . . . . . . . . . . . . . . . . . . . . 167
Network classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Subnet masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Appendix B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Binary Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Bits and bytes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 175
Technical Specifications . . . . . . . . . . . . . . . . . . 181
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Compliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Legal Information and Contacts . . . . . . . . . . . . . vii
v
INTRODUCTION
Congratulations on becoming the owner of the ADSL Barricade,
a 4-port ADSL Router with built-in ADSL Modem. Your LAN (Local
Area Network) will now be able to access the Internet using your
high-speed ADSL connection. This User Guide will show you how
to set up the ADSL Barricade, and how to customize its
configuration to get the most out of your new product.
Features
• External ADSL modem for high-speed Internet access.
1
Introduction
System Requirements
In order to use the ADSL Barricade, you must have the following:
2
Using this Document
Typographical conventions
• Italics are used to identify terms that are defined
in the Terminology.
Special messages
This document uses the following statement to call your attention
to specific instructions or explanations.
3
GETTING TO KNOW THE
ADSL BARRICADE
Package Contents
• One ADSL Barricade.
5
Getting to Know the ADSL Barricade
Hardware Description
Front Panel
LED Label Power Link TX/RX Ethernet
1 2 3 4
Color Status Green Green Green Green / 100 Mbps
Yellow / 10 Mbps
Green Steady Power On ADSL line DSL Link
is trained. Transmitting/
Receiving
Green Blink N/A Training TX/RX Transmitting/
Receiving
Yellow Steady N/A N/A N/A Link
Yellow Blink N/A N/A N/A Transmitting/
Receiving
OFF Power Off No Connection No TX/RX No Connection
Rear Panel
Rear Panel Connector Description
Power Supply 12V, 1.2A
Reset and Restore Factory Defaults Button If depressed for 1-2 seconds:
reset.
If depressed for 5 seconds or
more: reset to factory default.
DSL Port RJ-11 phone connector
Ethernet Port Four 10/100M BASE-T RJ-45
connectors
6
QUICK START
This Quick Start provides basic instructions for connecting
the ADSL Barricade to a computer or LAN and to the Internet.
Warning: Before you begin, turn the power off for all devices.
These include your computer(s), your LAN hub/
switch (if applicable), and the ADSL Barricade.
7
Quick Start
Wall Jack
ADSL Barricade
AC adapter
To a hub: use cross-
over cable to uplink or
port or straight cable
to standard port
To a PC: use a
cross-over cable
Stand-alone computer
Networked Computers
Warning: Although you use the same type of cable, the ADSL
and Phone ports are not interchangeable. Do not
route the ADSL connection through the Phone port.
8
Configuring Your Computers
9
Quick Start
Windows® XP
1. In the Windows task bar, click the [Start] button, and then
click [Control Panel].
4. Ensure that the check box to the left of the item labeled
[Internet Protocol (TCP/IP)] is checked, and click [Properties].
10
Configuring Your Computers
Windows 2000
11
Quick Start
Windows Me
12. In the [TCP/IP Settings] dialog box, click the radio button
labeled [Server assigned IP address]. Also click the radio
button labeled [Server assigned name server address].
Windows 95, 98
13
Quick Start
6. Click [OK] to return to the [Network] dialog box, and then click
[OK] again. You may be prompted to install files from your
Windows 95/98 installation CD. Follow the instructions
to install the files.
10. In the [TCP/IP Properties] dialog box, click the [IP Address] tab.
12. Click the [DNS Configuration] tab, and then click the
radio button labeled [Obtain an IP address automatically].
14
Configuring Your Computers
Windows NT 4.0
10. In the [Microsoft TCP/IP Properties] dialog box, click the radio
button labeled [Obtain an IP address from a DHCP server].
11. Click [OK] twice to confirm and save your changes, and then
close the [Control Panel].
15
Quick Start
16
Configuring the ADSL Barricade
17
Quick Start
The fields are described in the following table. Work with your
ISP to determine which settings you need to change.
Field Description
General Settings
ATM Interface: This setting allows you to select the ATM interface you want to
use (usually [atm-0]). Your system may be configured with more
than one ATM interface if you are using different types of services
with your ISP.
Operation Mode: This setting enables or disables the ADSL Barricade.
When set to [No], the device cannot be used to provide Internet
connectivity for your network. Set it to [Enabled ], if necessary.
Encapsulation: This setting determines the type of data link your ISP uses
to communicate with your ADSL Barricade. Contact them
to determine the appropriate setting.
VPI: These values are provided by your ISP and determine the unique
VCI: path that your connection uses to communicate with your ISP.
18
Configuring the ADSL Barricade
Bridge: You may select [Enabled] or [Disabled] to set the bridging between
the ADSL Barricade and your ISP. Your ISP may also refer to this
as RFC 1483 or Ethernet over ATM.
IGMP: You may select [Enabled] or [Disabled] to set the Internet Group
Management Protocol, which some ISPs use to perform remote
configuration of your device.
IP Address: If your ISP has assigned a public IP address to your LAN, enter the
Subnet Mask: address and the associated subnet mask in the provided boxes.
(Note: In some configurations, the public IP address should be
entered on your PC rather than on the ADSL Barricade; please
check with your ISP.)
DNS
Primary DNS Enter the Primary and Secondary DNS server addresses
Server: provided by your ISP.
Secondary DNS
Server:
PPP
Username: Enter the Username and the Password you use to log in to your
Password: ISP. (Note: This is not the same as the user name and password
you have used to log in to Configuration Manager.)
19
Quick Start
20
Configuring the ADSL Barricade
LAN Port IP Address Assigned static This is the IP address of the LAN
IP address: port on the device. The LAN port
192.168.1.1 connects the device to your
Subnet mask: Ethernet network. Typically,
255.255.255.0 you will not need to change
this address. See Configuring
the LAN Ports on page 33 for
instructions.
21
GETTING STARTED WITH THE
CONFIGURATION MANAGER
The ADSL Barricade includes a preinstalled program called
Configuration Manager, which provides an interface to the
software installed on the device. It enables you to configure
the device settings to meet the needs of your network. You
access it through your web browser from any PC connected
to the ADSL Barricade via the LAN ports.
23
Getting Started with the Configuration Manager
2. Enter your [User Name] and [Password], and then click [OK].
The first time you log into the program, use these default values:
Default User Name : smc
Default Password : smcadmin
24
Functional Layout
Functional Layout
Configuration Manager tasks are grouped into several categories,
which can be accessed by clicking the tabs at the top of each page.
Each tab displays the available tasks in a horizontal menu at the
top of the page. You can click on these menu items and display
the specific configuration options.
A separate page appears for each task in the task bar. The left-most
task appears by default when you click on a new tab. The same
task may appear in more than one tab, when appropriate. For
example, the [Lan Config] task appears in both the [LAN]
tab and the [Routing] tab.
25
Getting Started with the Configuration Manager
26
The Home Page and System View Table
Table Description
Heading
Device This table displays basic information about the ADSL Barricade
hardware and software versions, the system uptime (since
the last reboot), and the preconfigured operating mode.
DSL This table displays the operational status, version, and performance
statistics for the DSL line. You can check DSL in the table or display
the [WAN] tab to view additional DSL settings, which are described
in Configuring EOA Interfaces.
WAN This table displays the software name(s) and various settings for
Interfaces the device interface(s) that communicates with your ISP via DSL.
Even if you only have one physical DSL port, multiple software-
defined interfaces can be configured to use it. See the ATM VC,
PPP, EOA, and IPoA chapters for more information about the WAN
interfaces defined on your system. For each interface, a [Lower
Interface] name, such as [aal5-0], should appear. You can click
on the [Lower Interface] name to view or change the ATM VC
settings that this interface uses.
LAN This table displays the software names and various settings for the
Interface device interfaces that communicate directly with your network. These
typically include an [Ethernet Interface] named [eth-0], and may
include a [USB Interface] named [usb-0]. For information on how
to modify properties of these interfaces, see Configuring the LAN
Ports on page 33.
27
Getting Started with the Configuration Manager
Services This table displays the status of various services that the ADSL
Summary Barricade performs to help you manage your network. A green
check mark indicates that the service is active and a red X
indicates that it is inactive.
[NAT] : to translate private IP addresses to your public IP address
(Configuring Network Address Translation).
[IP Filter] : to set up the filtering rules that accept or deny incoming
or outgoing data (Configuring IP Filters and Blocking Protocols).
[RIP] : to enable router-to-router communication (Configuring the
Routing Information Protocol).
[DHCP Relay] : to enable dynamic assignment of IP information from
your ISP to your computers (Configuring Dynamic Host Configuration
Protocol).
[DHCP Client] : to enable dynamic assignment of IP information from
your ISP or another computer on your network to the device’s LAN
port (Configuring the LAN Ports).
[DHCP Server]: to enable dynamic assignment of IP information from
the device’s built-in DHCP server to your LAN computers (Configuring
Dynamic Host Configuration).
[IGMP] : to enable message forwarding from external sources such
as your ISP, based on Internet Group Management Protocol (not
configurable).
Note: Changing the ADSL Barricade date and time does not
affect the date and time on your PCs.
28
Modifying Basic System Information
Option Description
Date: These fields initially appear dimmed. To modify the date and time,
Time: click the respective check boxes and select the appropriate values
from the drop-down lists. The time appears in military format.
Time Zone: You can select your time zone from the drop-down list, and then
click the appropriate radio button to indicate whether Daylight
DST: Savings Time is currently in effect. After you initially set the time,
(Daylight turning DST On or Off will adjust the current displayed time by one
Savings hour in the appropriate direction. You must remember to change
Time) the DST option each spring and fall as it will not change
automatically.
29
Getting Started with the Configuration Manager
Host Name: You can use this field to specify an easy-to-remember name
for the ADSL Barricade. The next time you want to access the
Configuration Manager, you can type this name in the location box
in your Web browser, instead of typing the digital IP address. For
example, if you have entered myrouter in this field (and have left
the Domain Name field blank), then you can type the following
in your Web browser to access the Configuration Manager:
http://myrouter.
Note: This will only work if you are using the ADSL Barricade’s
DNS relay feature. This feature is automatically enabled when
the DNS server address configured on your PCs is also the address
assigned to the LAN port on the ADSL Barricade. See Configuring
DNS Server Addresses on page 81 for more information.
Domain You can use this field to specify an Internet domain name for the
Name: ADSL Barricade. The next time you access Configuration Manager,
you can type the domain name and the device name (see the Name
field above) in your Web browser. For example, if you have entered
myrouter in the [Name] field and mydomain.com in the [Domain
Name] field, then you can type the following in your Web browser
to access the Configuration Manager: http://myrouter.mydomain.com
30
Committing Changes and Rebooting
1. Click the [Admin] tab, and then click [Commit & Reboot]
in the task bar. The [Commit & Reboot] page appears.
To reboot the device, display the [Commit & Reboot] page, select
the appropriate [Reboot Mode:] from the drop-down list, and then
click [Reboot].
31
Getting Started with the Configuration Manager
Option Description
Reboot from Last This option is to reboot the device using the current settings
Configuration in the permanent memory, including any changes you have
just committed.
Reboot from Backup This option is to reboot the device using settings stored
Configuration in the backup memory. These are the settings that were
effective before you committed new settings in the current
session.
Reboot from Default This option is to reboot the device to the default settings
Configuration provided by your ISP or the manufacturer. Choosing this
option erases any custom settings.
32
CONFIGURING THE
LAN PORTS
This section describes how to configure IP properties for the
interfaces on the ADSL Barricade that communicate with your
LAN computers.
33
Configuring the LAN Ports
1. Log into Configuration Manager and then click the [LAN] tab.
The [LAN Configuration] page appears.
34
Configuring the LAN Port IP Address
Setting Description
System Mode: This setting is preconfigured for your device, such as [Routing
mode], [Bridging mode], or both modes simultaneously.
This setting is not user-configurable.
Get LAN This setting provides options for how the device’s LAN port
Address: is assigned an IP address:
[Manual] indicates that you will be assigning a static IP address,
which you can enter in the fields below.
[External DHCP Server] indicates that your ISP will be assigning
an IP address from their own DHCP server to the port, dynamically
each time you log on.
[Internal DHCP Server] indicates that you have a DHCP server
device on your network that will assign an address to the port.
If you choose either the internal or external server option, the
LAN port is called a DHCP client of the server.
Note: The public IP address assigned to you by your ISP is not
your LAN IP address. The public IP address identifies the WAN
(ADSL) port on your ADSL Barricade to the Internet.
LAN The IP address and Network Mask for the port. See IP Addresses,
IP Address: Network Masks, and Subnets for and overview of IP addresses
LAN and masks.
Network Mask:
35
Configuring the LAN Ports
• Enabling DHCP:
If you choose to have the LAN port be a DHCP client
of an internal or external server, the [LAN Network Mask]
field will be dimmed and made unavailable for entry. The
[LAN IP Address] field will remain editable, however. The
address that you specify here will be used as a request
to the DHCP server. This is referred to as a Configured IP
Address in the program. If the configured IP address
is not available from the DHCP server, then the system
will accept another assigned address. Even after another
number is assigned, the same configured IP address will
continue to display in this field.
3. Click [Submit].
36
Configuring the LAN Port IP Address
37
VIEWING SYSTEM IP
ADDRESSES AND IP
PERFORMANCE STATISTICS
The interface on the ADSL Barricade that communicates with other
network and Internet devices are identified by unique Internet
protocol (IP) addresses. You can use the Configuration Manager
to view the list of IP addresses that your device uses, and to view
other system and network performance data. See IP Addresses,
Network Masks, and Subnets for a description of IP addresses
and masks.
The table lists the [IP address], the network masks ([Netmask]),
and the interface names ([IF Name]) for each of its IP-enabled
interfaces.
39
Viewing System IP Addresses and IP Performance Statistics
40
Viewing IP Performance Statistics
41
CONFIGURING DYNAMIC
HOST CONFIGURATION
PROTOCOL
You can configure your network and ADSL Barricade to use
the Dynamic Host Configuration Protocol (DHCP). This section
provides an overview of DHCP and instructions for implementing
it on your network.
Overview of DHCP
What is DHCP?
DHCP is a protocol that enables network administrators to centrally
manage the assignment and distribution of IP information
to computers on a network.
When you enable DHCP on a network, you allow a device – such
as the ADSL Barricade or a router located with your ISP – to assign
temporary IP addresses to your computers whenever they connect
to your network. The assigning device is called a DHCP server,
and the receiving device is a DHCP client.
Note: If you used the Quick Start instructions, you
configured each LAN PC with an IP address,
or you specified that it will receive IP information
dynamically (automatically). If you chose to have
the information assigned dynamically, then you
configured your PCs as DHCP clients that will
accept IP addresses assigned from a DCHP
server such as the ADSL Barricade.
43
Configuring Dynamic Host Configuration Protocol
• If your ISP performs the DCHP server function for your network,
then you can configure the device as a DHCP relay agent. When
the ADSL Barricade receives a request for Internet access from
a computer on your network, it contacts your ISP for the
necessary IP information, and then relays the assigned
information back to the computer.
44
Configuring DHCP Server
45
Configuring Dynamic Host Configuration Protocol
• You have only one subnet, but the addresses you want
to distribute are not in a continuous range. (Alternatively,
you can exclude particular addresses from distribution from
a single pool; see page 50.)
With this configuration, you could create the following two pools:
Pool 0: 192.168.1.2 through 192.168.1.11
Pool 1: 192.168.2.2 through 192.168.2.2
The DHCP server would automatically distribute the Pool 0
addresses only to computers connected to the interface in the
same subnet as these addresses-the LAN interface, eth-0.
46
Configuring DHCP Server
47
Configuring Dynamic Host Configuration Protocol
Field Description
Start IP Address: This field specifies the lowest and highest addresses in the pool,
End IP Address: up to a maximum range of 254 addresses. For example, if the
LAN port is assigned IP address 192.168.1.1, then you could
create a pool with address range 192.168.1.2 – 192.168.1.254
for distribution to your LAN computers.
Mac Address A MAC address is a manufacturer-assigned hardware ID that
is unique for each device on a network. Use this field only if you
want to assign a specific IP address to the computer that uses
this MAC address. If you type a MAC address here, you must
have specified the same IP address in both the [Start IP
Address:] and [End IP Address:] fields.
48
Configuring DHCP Server
IRC Address:
WINS Address:
SWINS Address:
(optional)
49
Configuring Dynamic Host Configuration Protocol
50
Configuring DHCP Server
51
Configuring Dynamic Host Configuration Protocol
Field Description
IP Address This field indicates the address that has been leased from the pool.
Netmask This is the network mask associated with the leased address. This
identifies the network ID and host ID portions of the address (see
IP Addresses, Network Masks, and Subnets for an explanation of
these terms).
Mac This field indicates the unique hardware ID of the computer to which
Address the IP address has been assigned.
Pool Start This is the lower boundary of the address pool (shown here to
identify the pool from which the leased address was assigned).
Address The adress type can be [Static] or [Dynamic].
Type
[Static] indicates that the IP number has been assigned
permanently to the specific hardware device.
[Dynamic] indicates that the number has been leased
emporarily for a specified length of time.
Time This field indicates the amount of time left for the device
Remaining to use the assigned address. The default lease time
is 30 days (31536000 seconds).
52
Configuring DHCP Relay
53
Configuring Dynamic Host Configuration Protocol
54
Setting the DHCP Mode
3. Click [Submit].
4. Click the [Admin] tab, and then click [Commit & Reboot]
in the task bar.
55
CONFIGURING NETWORK
ADDRESS TRANSLATION
This section provides an overview of Network Address Translation
(NAT) and instructions for modifying the default configuration
on your device.
Overview of NAT
Network Address Translation is a method for disguising the private
IP addresses you use on your LAN as the public IP address you use
on the Internet. You can define NAT rules that specify exactly how
and when to translate between public and private IP addresses.
Definition: A private IP address is created by a network
administrator for use only on a LAN, whereas
a public IP address is purchased from the Internet
Corporation for Assigned Names and Numbers
(ICANN) for use on the Internet. Typically, your
ISP provides a public IP address for your entire
LAN, and you define the private addresses
for computers on your LAN.
In a typical NAT setup, your ISP provides you with a single public
IP address to use for your entire network. Then, you assign each
computer on your LAN a unique private IP address. (Or, you define
a pool of private IP addresses for dynamic assignment to your
computers, as described in Configuring Dynamic Host Configuration
Protocol.) On the ADSL Barricade, you set up a NAT rule to specify
that whenever one of your computers communicates with
the Internet, (that is, it sends and receives IP data packets)
its private IP address - which is referenced in each packet -
will be replaced by the LAN's public IP address.
57
Configuring Network Address Translation
58
Viewing NAT Global Settings and Statistics
59
Configuring Network Address Translation
• The [Enable] and [Disable] radio buttons will allow you to turn
on or off the NAT feature.
Field Description
TCP Idle Timeout When two computers communicate via the Internet,
(sec): a TCP-based communication session is created between them
to control the exchange of data packets. The TCP session can
TCP Close Wait
(sec): be viewed as being in one of three states, depending on the
types of packets being transferred.
TCP Def Timeout
(sec): - The establishing state, where the connection is being set up.
- The active state, where the connection is being used to
transfer data.
- The closing state, in which the connection is being shut down.
When a NAT rule is effective on a TCP session in the active
state, the session will timeout if no packets are received for
the time specified in [TCP Idle Timeout].
When in the closing state, the session will timeout if no packets
are received for the time specified in [TCP Close Wait].
When in the establishing state, the session will timeout
if no packets are received for the time specified in [TCP
Def Timeout].
UDP Timeout Same as TCP Idle Timeout, but for UDP-based
(sec): communication sessions.
ICMP Timeout Same as TCP Idle Timeout, but for ICMP-based
(sec): communication sessions.
60
Viewing NAT Global Settings and Statistics
If you change any values, click [Submit], and click the [Admin] tab
and [Commit] your changes to permanent system memory (see
Committing your changes on page 30).
The table provides basic information for each NAT rule you
have set up. You can click [Clear] to restart the accumulation
of the statistics at their initial values.
61
Configuring Network Address Translation
62
Viewing Current NAT Translations
The statistics show how many times this rule has been invoked
and how many currently active sessions are using this rule.
You can click [Clear] to reset the statistics to zeros and [Refresh]
to display newly accumulated data.
63
Configuring Network Address Translation
Field Description
Trans Index This is the sequential number assigned to the IP session used
by this NAT translation session.
Rule ID This field indicates the ID of the invoked NAT rule.
Interface This field indicates the device interface on which the NAT rule
was invoked (from the rule definition).
Protocol This field indicates the IP protocol used by the data packets that
are undergoing translations (from the rule definition) Example:
[TCP], [UDP], [ICMP].
Alg Type This is the Application Level Gateway (ALG), if any, that was
used to enable this NAT translation (ALGs are special settings
that certain applications require in order to work while NAT
is enabled).
NAT Direction This field indicates the direction ([Inside] or [Outside]) of the
translation. A NAT direction is assigned to each port; the
Ethernet and USB ports are defined as [Inside] ports, and the
WAN ports are defined as [Outside] ports. The NAT direction
is determined by the interface on which the rule is invoked.
Entry Age This field indicates the elapsed time, in seconds, of the NAT
translation session.
64
Viewing Current NAT Translations
Field Description
Translated In This field indicates the public IP address to which the private
Address: IP address was translated.
In Address: This field indicates the private IP address that was translated.
Out Address: This field indicates the IP address of the outside destination
(web, ftp site, etc.)
In Packets: These fields indicate the number of incoming and outgoing
Out Packets: IP packets that have been translated in this translation session.
In Ports: This is the actual port number corresponding to the LAN computer.
Out Ports: This is the port number associated with the destination address.
Translated In This is the port number to which the LAN computer’s actual port
Ports: number was translated.
65
Configuring Network Address Translation
66
Adding NAT Rules
5. From the [IF Name:] drop-down list, select the interface on the
device to which this rule applies. Typically, NAT rules are used
for communication between your LAN and the Internet. Because
the device uses the WAN interface (which may be named
[ppp-0], [eoa-0], or [ipoa-0]) to connect your LAN to your ISP,
it is the usual IF Name selection.
67
Configuring Network Address Translation
You can specify that data from all LAN addresses should
be translated by typing [0] (zero) in each [From] field and [255]
in each [To] field. Or, type the same address in both fields if
the rule only applies to one LAN computer.
8. Click [Submit].
10. Ensure that the [Enable] radio button is selected, and then
click [Submit]. A page appears to confirm your changes.
11. Click the [Admin] tab, and then click [Commit and Reboot]
in the task bar.
68
Adding NAT Rules
69
Configuring Network Address Translation
70
Adding NAT Rules
You can specify a range using the [From/To] fields if you want
the rule to apply to a range of port types, or enter the same
port number in both fields.
71
Configuring Network Address Translation
72
Adding NAT Rules
You can create a BASIC rule for each specific address translation
to occur. The range of addresses should correspond to private
addresses already in use on your network, whether assigned
statically to your PCs, or assigned dynamically using DHCP.
73
Configuring Network Address Translation
74
Adding NAT Rules
75
Configuring Network Address Translation
8. You can specify a range using the From/To fields if you want
the rule to apply to a range of port types, or enter the same
port number in both fields. See step 6 for creating an RDR
Rule on page 71 for an explanation of port IDs.
76
Adding NAT Rules
4. In the [Global Address:] field, type the address that you want
to serve as the publicly known address for the LAN computer.
77
Configuring Network Address Translation
78
Adding NAT Rules
79
CONFIGURING DNS
SERVER ADDRESSES
About DNS
Domain Name System (DNS) servers map the user-friendly
domain names that users type into their Web browsers (e.g.
yahoo.com) to the equivalent numerical IP addresses that
are used for Internet routing.
When a PC user types a domain name into a browser, the PC
must first send a request to a DNS server to obtain the equivalent
IP addresses. The DNS server will attempt to look up the domain
name in its own database, and will communicate with higher-level
DNS servers when the name cannot be found locally. When
the address is found, it is sent back to the requesting PC and is
referenced in IP packets for the remainder of the communication.
• Statically:
If your ISP provides you with their DNS server addresses,
you can assign them to each PC by modifying the PCs'
IP properties.
81
Configuring DNS Server Addresses
82
Configuring DNS Relay
Using this option provides the advantage that you will not
need to reconfigure the PCs or the ADSL Barricade if the
ISP changes their DNS addresses.
2. If you are using a PPP connection to the ISP, click the [Use
DNS] check box so that the DNS server addresses it learns
are used for DNS relay.
83
Configuring DNS Server Addresses
3. Click the [Admin] tab, and then click [Commit & Reboot] in
the task bar.
84
CONFIGURING IP ROUTES
You can use the Configuration Manager to define specific routes
for your Internet and network data. This section describes basic
routing concepts and provides instructions for creating routes.
Note: Most users do not need to define IP routes.
Overview of IP Routes
The essential challenge of a router is: when it receives data intended
for a particular destination, which device should it send that data
to? When you define IP routes, you provide the rules that a computer
uses to make these decisions.
85
Configuring IP Routes
With both the telephone and the computer, all transactions are
initially sent to the same switchboard or router, which serves as a
gateway to other higher- or lower-level devices. No single device
knows at the outset the eventual path the data will take, but each
uses a specific part of the destination address/phone number to
make a decision about which device to connect to next.
86
Overview of IP Routes
87
Configuring IP Routes
You may need to define routes if your home setup includes two
or more networks or subnets, if you connect to two or more ISP
services, or if you connect to a remote corporate LAN.
88
Viewing the IP Routing Table
The [IP Route Table] displays a row for each existing route.
These include routes that were predefined on the device, routes
you may have added, and routes that the device has identified
automatically through communication with other devices.
The following table defines the fields in the [IP Route Table].
Field Description
Destination This field specifies the IP address of the destination computer.
The destination can be specified as the IP address of a specific
computer or an entire network. It can also be specified as
all zeros to indicate that this route should be used for all
destinations for which no other route is defined
(this is the route that creates the default gateway).
NetMask This field indicates which parts of the destination address refer
to the network and which parts refer to a computer on the network.
Refer to IP Addresses, Network Masks, and Subnets, for an
explanation of network masks.
NextHop This field specifies the next IP address to send data to when its
final destination is that shown in the [Destination] column.
IFName This field displays the name of the interface on the device
through which data is forwarded to the specified next hop.
Route Type This field displays whether the route is [Direct] or [Indirect].
In a [Direct] route, the source and destination computers are
on the same network, and the router attempts to directly deliver
the data to the computer.
In an [Indirect] route, the source and destination computers are
on different networks, and the router forwards data to a device
on another network for further handling.
Route Origin This field displays how the route was defined.
[Dynamic] indicates that the route was created automatically or
predefined by your ISP or the manufacturer. Routes you create
are labeled Local. Other routes can be created automatically
(using RIP, as described in Configuring the Routing Information
Protocol), or defined remotely through various network
management protocols (LCL or ICMP).
Action
This field displays an icon ( ) you can click on to delete a
route.
89
Configuring IP Routes
Adding IP Routes
Follow these instructions to add an IP route to the routing table.
1. From the [IP Route Table] page, click [Add]. The [IP Route -
Add] page appears, as shown in Figure 30.
90
Adding IP Routes
3. Click [Submit].
The [IP Routing Table] will now display the new route.
5. Click the [Admin] tab, and then click [Commit & Reboot]
in the task bar.
91
CONFIGURING THE ROUTING
INFORMATION PROTOCOL
The ADSL Barricade can be configured to communicate with
other routing devices to determine the best path for sending
data to its intended destination. Routing devices communicate
this information using a variety of IP protocols. This section
describes how to configure the ADSL Barricade to use one
of these, called the Routing Information Protocol (RIP).
RIP Overview
RIP is an Internet protocol you can set up to share routing table
information with other routing devices on your LAN, at your ISP's
location, or on remote networks connected to your network via
the ADSL line. Generally, RIP is used to enable communication
on autonomous networks. An autonomous network is one in
which all of the computers are administered by the same entity.
An autonomous network may be a single network, or a grouping
of several networks under the same administration. An example
of an autonomous network is a corporate LAN, including devices
that can access it from remote locations, such as the computers
telecommuters use.
Using RIP, each device sends its routing table to its closest
neighbor every 30 seconds. The neighboring device in turn
passes the information on to its next neighbor and so on until all
devices in the autonomous network have the same set of routes.
93
Configuring the Routing Information Protocol
• Your ISP requests that you run RIP for communication with
devices on their network.
94
Configuring the ADSL Barricade's Interfaces with RIP
These are global settings for all interfaces that use RIP.
95
Configuring the Routing Information Protocol
96
Configuring the ADSL Barricade's Interfaces with RIP
6. Click [Add]. The new RIP entry will display in the table.
7. Click the [Enable] radio button to enable the RIP feature.
97
Configuring the Routing Information Protocol
You can click [Clear] to reset all statistics to zero and [Refresh]
to display any newly accumulated data.
98
CONFIGURING THE ATM
VIRTUAL CIRCUIT
As your LAN computers access the Internet via the ADSL
Barricade, data is exchanged with your ISP through a complex
network of telephone switches, Internet routers, servers, and
other specialized hardware. These various devices communicate
using a common language, or protocol, called Asynchronous
Transfer Mode (ATM). On the Wide Area Network (WAN) that
connects you to your ISP, the ATM protocol performs functions
like those that the Ethernet protocol performs on your LAN.
This section describes how to configure the ATM virtual circuit
(VC). The VC properties define the path the ADSL Barricade
uses to communicate with your ISP over the ATM network.
99
Configuring the ATM Virtual Circuit
Field Description
Interface This field indicates the name of the lower-level interface on which
this VC operates. The low-level interface names are preconfigured
in the software and identify the type of traffic that can be
supported, such as data or voice. Internet data services typically
use an aal5-type interface.
Vpi These settings identify a unique ATM data path for communication
Vci between your ADSL Barricade and your ISP.
Mux Type
Max Proto If you are using an AAL5-type of interface, this setting indicates
per AAL5 the number of higher-level interfaces that the VC can support
(the higher level interfaces can be PPP, EoA, or IPoA interfaces).
Contact your ISP to determine which connection protocol(s) they
require.
Action (s)
This field displays the icons you can click on to modify ( — see
page 94) and delete ( ) the associated interface. You cannot
delete an ATM interface if another protocol such as PPP, EoA, or
IPoA has been defined to operate over the ATM interface. Delete
the higher-level interface first, and then delete the ATM interface.
100
Adding ATM VCs
4. In the [Max Proto per AAL5:] text box, enter the number
of protocols that the ISP indicated that you will need
to configure (usually only one).
5. Click [Submit].
101
Configuring the ATM Virtual Circuit
7. When you have verified that the new settings work properly,
click the [Admin] tab, and then click [Commit & Reboot] in the
task bar.
102
Modifying ATM VCs
2. Enter the new [VPI:] and [VCI:] values, select the [Mux Type:],
or change the maximum number of protocols that the VC can
carry, as directed by your ISP.
3. Click [Submit].
5. Click the [Admin] tab, and then click [Commit & Reboot]
in the task bar.
103
CONFIGURING PPP
INTERFACES
When powered on, the ADSL Barricade initiates a connection
through your DSL line to your ISP.
Your ISP may or may not use the PPP protocol. Contact your ISP
to determine if you will need to change the default settings in order
to connect to their server.
105
Configuring PPP Interfaces
Field Description
Interface This is the predefined name of the PPP interface.
VC This is the virtual circuit over which the PPP data
are sent. The VC identifies the physical path the
data takes to reach your ISP.
Interface Sec Type This fields indicates the type of firewall protections
that are effective on the interface ([Public],
[Private], or [DMZ]).
A [Public] interface connects to the Internet (PPP
interfaces are typically public). Packets received on
a public interface are subject to the most restrictive
set of firewall protections defined in the software.
A [Private] interface connects to your LAN, such as
the Ethernet interface. Packets received on a private
interface are subject to a less restrictive set of
protections, because they originate within the
network.
The term [DMZ] (de-militarized zone), in Internet
networking terms, refers to computers that are
available for both public and in-network accesses
(such as a company's public Web server). Packets
incoming on a DMZ interface - whether from a LAN
or external source - are subject to a set of
protections that is in between public and private
interfaces in terms of restrictiveness.
Protocol This is the type of PPP protocol used. Your ISP
may use PPP-over-Ethernet ([PPPoE]) or
PPP-over-ATM ([PPPoA]).
WAN IP This is the IP address currently assigned to your
WAN (DSL) port by your ISP.
Gateway IP This is the IP address of the server at your ISP that
provides you access to the Internet. See Hops and
gateways on page 86 for a description of gateway
addresses.
107
Configuring PPP Interfaces
Field Description
Default Route This field indicates whether the ADSL Barricade
should use the IP address assigned to this
connection as its default route. It can be [Enable]
or [Disable]. See Quick Start on page 7 for an
explanation of default routes.
Use DHCP When set to [Enable], the device will acquire
additional IP information from the ISP's DHCP
server. The PPP connection itself acquires the
device's IP address, mask, DNS address, and
default gateway address. With the DHCP enabled,
the device will acquire IP addresses for other
various server types (WINS, SMTP, POP3, etc. -
these server types are listed on the [DHCP Server
Configuration] page).
Use DNS When set to [Enable], the DNS address learned
through the PPP connection will be distributed to
clients of the device's DHCP server. This option is
useful only when the ADSL Barricade is configured
to act as a DHCP Server for your LAN. When set to
[Disable], LAN hosts will use the DNS address
preconfigured in the DHCP pool (see Configuring
DHCP Server on page 45) and in the DNS feature.
Oper. Status Ths field indicates whether the link is currently up
or down or if a specific type of data exchange is
under way (e.g., password authorization or
DHCP).
Action
You can use these icons to modify ( ), delete
108
Viewing PPP Interface Details
109
Configuring PPP Interfaces
Field Description
Status: Indicates whether the interface has been specified
in the system as:
[Enabled] A connection will be established for
use when the device is turned on or
rebooted.
[Disabled] The PPP interface cannot currently
be used.
[Start] The PPP connection will be made
only when data is sent to the interface
(e.g., when a LAN user attempts to
use the Internet).
Service Name: (This feature is available with PPPoE interfaces but
not with PPPoA interfaces.) The name of the ISP
service you are using with this PPP connection. ISPs
may offer different types of services (for example,
for online gaming or business communications),
each requiring a different login and other
connection properties.
110
Viewing PPP Interface Details
Field Description
Last Fail Cause: This field indicates the action that ended the
previous PPP session.
[No Valid PADO Recvd]:
The unit initiated a PPPoE handshake but did not
receive a packet in reply from the ISP.
[No Valid PADS Recvd]:
After the initial handshake, the unit did not receive
a confirmation packet from the ISP.
[Stopped by User]:
The user stopped the connection (for example,
by changing the Configuration Manager settings
for the PPP interface.)
[No Activity]:
The PPP communication timed out, in accordance
with the timeout period specified on the PPP
Configuration page.
[Auth Failure]:
The ISP could not authorize the connection based
on the user name and/or password provided.
[PADT Recvd]:
The ISP issued a special packet type to terminate
the PPP connection.
[VC down]:
The Virtual Circuit between the unit and the ISP
is down.
[Internal failure]:
A system software failure occurred.
DNS: This is the IP address of the DNS server (located
with your ISP) used on this PPP connection.
SDNS: The IP address of the secondary DNS server
(located with your ISP) used on this PPP connection.
Security Protocol: This field indicates the type of PPP security your
ISP uses:
[PAP] (Password Authentication Protocol)
[CHAP] (Challenge Handshake Authentication
Protocol).
Login Name: This is the name you use to log in to your ISP each
time this PPP connection is established.
111
Configuring PPP Interfaces
2. Select a [PPP interface] name from the drop-down list, and then
enter or select data for each field.
The fields are defined in the tables on page 107 and 109.
112
Modifying and Deleting PPP Interfaces
5. Click the [Admin] tab, and then click [Commit & Reboot] in the
task bar.
113
Configuring PPP Interfaces
You can change only the [Status:] of the PPP connection, the
[Security Protocol:], your [Login Name:], and your [Password:].
To modify the other settings, you must delete the interface and
create a new one.
114
CONFIGURING EOA
INTERFACES
This section describes how to configure an Ethernet-over-ATM
interface on the ADSL Barricade, if one is needed to communicate
with your ISP.
Overview of EOA
The Ethernet-over-ATM (EOA) protocol is often referred to as
RFC1483, which is the Internet specification that defines it. It is
commonly used to carry data between local area networks that
use the Ethernet protocol and wide-area networks that use the
ATM protocol. Many telecommunications industry networks use
the ATM protocol. ISPs who provide DSL services often use the
EOA protocol for data transfer with their customers' DSL modems.
EOA can be implemented to provide a bridged connection between
a DSL modem and the ISP. In a bridged connection, data is shared
between the ISP's network and their customer's as if the networks
were on the same physical LAN. Bridged connections do not use
the IP protocol. EOA can also be configured to provide a routed
connection with the ISP, which uses the IP protocol to exchange
data.
Before creating an EOA interface or modifying the default settings,
contact your ISP to determine which type of protocol they use.
Note: [PPP vs. EOA]: Your ISP may use a protocol other than
EOA for communication with the ADSL Barricade, such
as the point-to-point protocol (PPP). One type of PPP,
named PPP over Ethernet (PPPoE), actually works on
top of the EOA protocol. The other type, PPP over ATM
(PPPoA), does not. However, if your ISP uses either
type of PPP, you do not need to separately create an
EOA interface. See Configuring PPP Interfaces on page
105 for instructions on creating or configuring a PPP
interface.
115
Configuring EOA Interfaces
The EOA table contains a row for each EOA interface currently
defined on the device. The table may contain no entries if your
ISP does not use the EOA protocol.
Field Description
Interface This is the name the software uses to identify the EOA
interface.
116
Viewing Your EOA Setup
Field Description
Interface Sec Type This field indicates the type of security protections in
effect on the interface ([Public], [Private], or [DMZ]).
A [Public] interface connects to the Internet (IPoA
interfaces are typically public). Packets received on
a public interface are subject to the most restrictive
set of firewall protections defined in the software.
A [Private] interface connects to your LAN, such as the
Ethernet interface. Packets received on a private interface
are subject to a less restrictive set of protections, because
they originate within the network.
The term [DMZ] (de-militarized zone), in Internet
networking terms, refers to computers that are available
for both public and in-network accesses (such as a
company's public Web server). Packets incoming on
a DMZ interface - whether from a LAN or external source
- are subject to a level of protection that is in between
those for public and private interfaces.
Lower interface EOA interfaces are defined in software, and then
associated with lower - level software and hardware
structures (at the lowest level, they are associated
with a physical port - the WAN port). This field should
reflect an interface name defined in the next lower level
of software over which the EOA interface will operate.
This will be an ATM VC interface, such as [aal5-0],
as described in Configuring the ATM Virtual Circuit.
Config IP Address The IP address and network mask you want to assign
Netmask to the interface. If the interface will be used for bridging
with your ISP and you will not be using the ADSL
Barricade as a router on your LAN, then you do not need to
specify IP information. If you enable DHCP for this
interface, then the Configured IP address will serve only as
a request to the DHCP server. The actual address that is
assigned by the ISP may differ if this address is not
available.
Use DHCP When [Enable], this setting instructs the device to accept
IP information assigned dynamically by your ISP's DHCP
server. If the interface will be used for bridging with your
ISP and you will not be routing data through it, leave this
checkbox unselected.
117
Configuring EOA Interfaces
Field Description
Default Route This field indicates whether the ADSL Barricade uses the
IP address assigned to this interface, if any, as its default
route for your LAN. Your system can have only one
default route.
Gateway Address The external IP address that the ADSL Barricade
communicates with via the EOA interface to gain
access to the Internet. This is typically an ISP server.
Status A green or red ball will display to indicate that the interface
is currently up or down, respectively. You cannot manually
enable or disable the interface; a red ball may indicate a
problem with the DSL connection.
Action
This field indicats the icons you can click on to edit ( )
or delete ( ) the associated EOA interface.
1. Click the [WAN] tab, and then click [EOA] in the task bar.
118
Adding EOA Interfaces
4. From the [Interface Sec Type:] drop-down list, select the level
of IP Firewall to be used on this interface, as defined on page
116.
119
Configuring EOA Interfaces
8. If you want the EOA interface to serve as the default route for
Internet access for your LAN, click the [Enable] radio button in
the [Default Route:] field.
12. Click the [Admin] tab, and then click [Commit & Reboot]
in the task bar.
120
CONFIGURING IPOA
INTERFACES
This section describes how to configure an IPoA (Internet
Protocol-over-ATM) interface on the ADSL Barricade.
The IPoA table contains a row for each EOA interface currently
defined on the device. The table may initially contain no entries.
121
Configuring IPoA Interfaces
Field Description
Interface This is the name the software uses to identify the IPoA
interface.
RFC 1577 If 1577 is selected, the PPP packets are encapsulated
according to RFC 1577 for transmission over an ATM link.
If 1577 is not selected, RFC 1577 is not applied under this
option.
Lower Interface IPoA interfaces are defined in the software, and then
associated with lower-level software and hardware
structures (at the lowest level, they are associated
with a physical port – the WAN port). This field should
reflect an interface name defined in the next lower
level of software over which the IPoA interface will
operate. This will be an ATM VC interface, such
as [aal5-0].
Peer IP Address The IP address of the remote computer you will be
connecting to via the WAN interface.
Interface Sec Type The type of security protections in effect on the interface
([Public], [Private], or [DMZ]).
A [Public] interface connects to the Internet (IPoA
interfaces are typically public). Packets received on
a public interface are subject to the most restrictive
set of firewall protections defined in the software.
A [Private] interface connects to your LAN, such as the
Ethernet interface. Packets received on a private interface
are subject to a less restrictive set of protections, because
they originate within the network.
The term [DMZ] (de-militarized zone), in Internet
networking terms, refers to computers that are available
for both public and in-network accesses (such as a
company's public Web server). Packets incoming
on a DMZ interface – whether from a LAN or external
source – are subject to a level of protection that is in
between those for public and private interfaces.
Config IP Address These fields indicate the IP address and the network mask
you want to assign to the interface. If DHCP is enabled,
Netmask this address serves as a request to the remote computer's
DHCP server, which may assign another address.
122
Adding IPoA Interfaces
Field Description
Gateway Address This is the external IP address that the ADSL Barricade
communicates with via the IPoA interface to gain
access to the Internet. This is typically an ISP server.
Status A green or red ball will appear to indicate that the interface
is currently up or down, respectively. You cannot manually
enable or disable the interface; a down interface may
indicate a problem with the DSL connection.
Action
This field displays icons you can click on to edit ( ) or
delete ( ) the associated IPoA interface.
1. Display the [IP over ATM (IPoA) Configuration] page and click
[Add]. The [IPoA Interface – Add] page appears, as shown in
Figure 43.
123
Configuring IPoA Interfaces
4. From the [IPF Type:] drop-down list, select the level of firewall
security for the interface ([Public], [Private] or [DMZ], see
page 121 for definitions).
5. In the [IPoA Type:] field, click the [1577] radio button if the
interface complies with the IETF specification RFC 1577.
Otherwise click the [Non 1577] radio button, then click [Add].
6. If you want the IPoA interface to serve as the default route for
your LAN, click the [Enable] radio button in the [Default
Route:] field.
9. Click [Add].
11. Click [Close] to return to the [IP over ATM (IPoA) Configuration]
page and view the new interface in the table.
12. Click the [Admin] tab. Click [Commit & Reboot] in the task bar.
124
CONFIGURING BRIDGING
The ADSL Barricade can be configured to act as a bridging
device between your LAN and your ISP. Bridges are devices that
enable two or more networks to communicate as if they are two
segments of the same physical LAN. This section describes how
to configure the ADSL Barricade to operate as a bridge.
Overview of Bridges
A bridge is a device used to connect two or more networks so they
can exchange data. A bridge learns the unique manufacturer-
assigned hardware IDs of each computer or device on both (or all)
networks it is attached to. It learns that some of the IDs represent
computers attached via one of the device's interfaces and others
represent computers connected via other interfaces. For example,
the hardware IDs of your home computers are attached via the
Ethernet port, and the hardware IDs of your ISP's computers are
attached via the WAN (DSL) port. It stores the ID list and the
interface associated with each ID in its bridge forwarding table.
Note: The bridge does not send the data directly to the
receiving computer, but broadcasts it to the receiving
network, making it available to any node on that
network.
125
Configuring Bridging
126
When to Use the Bridging Feature
The page displays radio buttons for enabling, and a table for
specifying the interfaces on which bridging will be performed.
The table may be empty if bridging has not yet been configured.
4. Click [Submit].
6. Click the [Admin] tab. Click [Commit & Reboot] in the task bar.
128
Deleting a Bridge Interface
129
CONFIGURING
FIREWALL SETTINGS
Configuration Manager provides built-in firewall functions, enabling
you to protect the system against denial of service (DoS) attacks
and other unwelcome or malicious accesses to your LAN. You can
also specify how to monitor attempted attacks, and who should be
automatically notified.
131
Configuring Firewall Settings
Field Description
Blacklist Status: If you want the device to maintain and use a black list,
click [Enable]. Click [Disable] if you do not want to maintain
a list.
Blacklist Period(min): This field specifies the number of minutes that a
computer's IP address will remain on the black list (i.e., all
traffic originating from that computer will be blocked from
passing through any interface on the ADSL Barricade).
For more information, see Managing the Black List on
page 134.
Attack Protection: Click the [Enable] radio button to use the built-in firewall
protections that prevent the following common types of
attacks.
IP Spoofing: Sending packets over the WAN interface
using an internal LAN IP address as the source address.
Tear Drop: Sending packets that contain overlapping
fragments.
Smurf and Fraggle: Sending packets that use the WAN or
LAN IP broadcast address as the source address.
Land Attack: Sending packets that use the same address
as the source and destination address.
Ping of Death: Illegal IP packet length.
Dos Protection: Click the [Enable] radio button to use the following denial
of service protections: SYN DoS, ICMP DoS, Per-host
DoS protection.
Max Half open TCP This field sets the percentage of concurrent IP sessions
Conn.: that can be in the half-open state. In ordinary TCP
communication, packets are in the half-open state only
briefly as a connection is being initiated; the state
changes to active when packets are being exchanged, or
closed when the exchange is complete. TCP connections
in the half-open state can use up the available IP
sessions. If the percentage is exceeded, then the half-open
sessions will be closed and replaced with new sessions
as they are initiated.
132
Configuring Global Firewall Settings
Field Description
Max ICMP Conn.: This field sets the percentage of concurrent IP sessions
that can be used for ICMP messages. If the percentage is
exceeded, then older ICMP IP sessions will be replaced by
new sessions as they are initiated.
Max Single Host This field sets the percentage of concurrent IP session
Conn.: that can originate from a single computer. This
percentage should take into account the number of hosts
on the LAN.
Log Destination: This field specifies how attempted violations of the
firewall settings will be tracked. Records of such events
can be sent via Ethernet to be handled by a system utility
Ethernet to ([Trace]) or be e-mailed to specified
administrators.
E-mail ID of Admin 1: This field specifies the e-mail addresses of the
administrators who should receive notices of any attempted
E-mail ID of Admin 2: firewall violations. Type the addresses in standard
internet e-mail address format (e.g.,
E-mail ID of Admin 3: [email protected]). The e-mail message will
contain the time of the violation, the source address of the
computer responsible for the violation, the destination IP
address, the protocol being used, the source and
destination ports, and the number violations occurring the
previous 30 minutes. If the ICMP protocol were being
used, then instead of the source and destination ports,
the e-mail will report the ICMP code and type.
3. Click [Submit].
133
Configuring Firewall Settings
Field Description
Host IP Address This is the IP address of the computer that sent the
packet(s) that caused the violation
Reason This is a short description of the type of violation. If the
packet violated an IP filter rule, the custom text from the
[Log Tag] field will display. (See Creating IP Filter Rules
on page 138.)
IPF Rule ID If the packet violated an IP filter rule, this field will display
the ID assigned to the rule.
Action(s)
This field displays an icon ( ) you can click on to delete
the entry from the list, if you want it to be removed prior to
its automatic timed expiration.
134
CONFIGURING IP FILTERS
AND BLOCKED PROTOCOLS
Configuring IP Filters
When you define an IP filter rule and enable the feature, you
instruct the ADSL Barricade to examine each data packet
it receives to determine whether it meets criteria set forth in
the rule. The criteria can include the size of the packet, the
network or internet protocol it is carrying, the direction in which
it is traveling (for example, from the LAN to the Internet or vice
versa), the IP address of the sending computer, the destination
IP address, and other characteristics of the packet data.
135
Configuring IP Filters and Blocked Protocols
136
Configuring IP Filters
[Security Level:]
This setting determines which IP filter rules take effect, based on
the security level specified in each rule. For example, when
[High] is selected, only those rules that are assigned a High
security value will be effective. The same is true for the [Medium]
and [Low] settings. When [None] is selected, IP filtering is
disabled.
137
Configuring IP Filters and Blocked Protocols
1. On the [IP Filter Configuration] page, click [Add]. The [IP Filter
138
Configuring IP Filters
2. Enter or select data for each field that applies to your rule.
The following table describes the fields:
Field Description
Rule ID: Each rule must be assigned a sequential ID number. Rules are
processed from lowest to highest on each data packet, until a
match is found. It is recommended that you assign rule IDs in
multiples of 5 or 10 (e.g., 10, 20, 30) so that you leave enough
room between them for inserting a new rule if necessary.
Action: The action that will be taken when a packet matches the rule
criteria. The action can be [Accept] (forward to destination) or
[Deny] (discard the packet).
Direction: This field specifies whether the rule should apply to data packets
that are incoming or outgoing on the selected interface.
[Incoming] refers to packets coming from the LAN.
[Outgoing] refers to packets going to the Internet.
You can use rules that specify the incoming direction to restrict
external computers from accessing your LAN.
139
Configuring IP Filters and Blocked Protocols
Interface: This is the interface on the ADSL Barricade on which the rule will
take effect. See the examples on page 145 for suggestions on
choosing the appropriate interface for various rule types.
In Interface: This is the interface from which packets must have been
forwarded to the interface specified in the previous selection. This
option is valid only for the outgoing direction.
Log Option: When [Enable] is selected, a log entry will be created on the
system each time this rule is invoked. The log entry will include
the time of the violation, the source address of the computer
responsible for the violation, the destination IP address, the
protocol being used, the source and destination ports, and the
number violations occurring in the previous x minutes. (Logging
may be helpful when troubleshooting.) This information can also
be e-mailed to designated administrators. See Configuring
Firewall Settings on page 131 for instructions.
140
Configuring IP Filters
Security This is the security level that must be enabled globally for this rule
Level: to take affect. A rule will be active only if its security level is the
same as the globally configured setting (shown on the main
[IP Filter Configuration] page). For example, if the rule is set to
[Medium] and the global firewall level is set to [Medium], then the
rule will be active; but if the global firewall level is set to [High] or
[Low], then the rule will be inactive.
Blacklist This field specifies whether or not a violation of this rule will result
Status: in the offending computer's IP address being added to the
Blacklist, which blocks the ADSL Barricade from forwarding
packets from that source for a specified period of time. See
Configuring Firewall Settings on page 131 for instructions.
Log Tag: This is a description of up to 16 characters to be recorded in the
log in the event that a packet violates this rule. Be sure to set the
[Log Option] to [Enable] if you configure a Log Tag.
Start Time The time range during which this rule is to be effective, specified
(HH MM SS): in military units.
End Time
(HH MM SS):
141
Configuring IP Filters and Blocked Protocols
142
Configuring IP Filters
Store State: When this option is enabled, packets are monitored for their state
(i.e., whether they are the initiating packet or a subsequent packet
in an ongoing communication, etc). This option provides
a degree of security by blocking/dropping packets that are not
received in the anticipated state. Such packets can signify
unwelcome attempt to gain access to a network.
Source Port: These are the port number criteria for the source computer(s)
Dest Port: (from which the packet originates) and destination computers.
Port numbers identify the type of traffic that the computer or
server can handle and are specified by the Internet Assigned
Numbers Authority (IANA). For example, port number 80
indicates a Web server, 21 indicates an FTP server.
You can choose a port type by name from the drop-down lists or,
if not available in the list, specify the IANA port number in the text
boxes. Select any other port if the criteria will not be used.
These fields will be dimmed (unavailable for entry) unless you
have selected [TCP] or [UDP] as the protocol.
See the description of [Src IP Address] for the statement options
([any], [eq], [gt], etc.)
TCP Flag: This field specifies whether the rule should apply only to TCP
packets that contain the synchronous (SYN) flag, only to those
that contain the non-synchronous (NOT-SYN) flag, or to all TCP
packets. This field will be dimmed (unavailable for entry) unless you
selected [TCP] as the protocol.
ICMP Type: This field specifies whether the value in the type field in ICMP
packet headers will be used as criteria. The code value can be
any decimal value from [0-255]. You can specify that the value
must equal ([eq]) or not equal ([neq]) the specified value,
or you can select [any] to enable the rule to be invoked on
all ICMP packets. This field will be dimmed (unavailable for entry)
unless you specify [ICMP] as the protocol.
ICMP Code: This field specifies whether the value in the code field in ICMP
packet headers will be used as criteria. The code value can be
any decimal value from [0-255]. You can specify that the value
must equal ([eq]) or not equal ([neq]) the specified value,
or you can select [any] to enable the rule to be invoked on
all ICMP packets. This field will be dimmed (unavailable for entry)
unless you specify ICMP as the protocol.
143
Configuring IP Filters and Blocked Protocols
IP Frag Pkt: This field determines how the rule applies to IP packets that
contain fragments. You can choose from the following options:
[Yes]: The rule will be applied only to packets that contain
fragments.
[No]: The rule will be applied only to packets that do not
contain fragments.
[Ignore]: (Default) The rule will be applied to packets whether
or not they contain fragments, assuming that they
match the other criteria.
IP Option Pkt: This field determines whether the rule should apply to IP packets
that have options specified in their packet headers.
[Yes]: The rule will be applied only to packets that contain
header options.
[No]: The rule will be applied only to packets that do not
contain header options.
[Ignore]: (Default) The rule will be applied to packets whether
or not they contain header options, assuming that
they match the other criteria.
Packet Size: This field specifies that the IP filter rule will take affect only on
packets whose size in bytes matches this criterion. ([lt] = less
than, [gt] = greater than, [lteq] = less than or equal to, etc.)
TOD Rule The Time of Day Rule Status determines how the [Start Time] and
Status: [End Time] settings are used.
[Enable]: (Default) The rule is in effect for the specified time
period.
[Disable]: The rule is not effective for the specified time period,
but is effective at all other times.
144
Configuring IP Filters
3. When you have finished selecting the criteria, make sure that
the [Enable] radio button is selected at the top of the page.
Then click [Submit]. After a [Confirmation] page appears, the
[IP Filter Configuration] page will redisplay with the new rule
showing in the table. If the security level of the rule matches
the globally configured setting, a green ball in the [Oper.
Status] column for that rule, indicating that the rule is now
effective. A red ball will display when the rule is disabled or if
its security level is different from the globally configured level.
5. Click the [Admin] tab, and then click [Commit & Reboot] in the
task bar.
Example 1
Blocking a specific computer on your LAN from using accessing
web servers on the Internet:
145
Configuring IP Filters and Blocked Protocols
5. Enable the rule by clicking the radio button at the top of the
page.
Example 2
Blocking Telnet accesses to the ADSL Barricade:
2. Specify that the packet must contain the TCP protocol, and
must be destined for port 23, the well-known port number
used for the Telnet protocol.
3. [Enable] the rule by clicking the radio button at the top of the
page.
146
Configuring IP Filters
147
Configuring IP Filters and Blocked Protocols
You can click [Clear] to reset the count to zero and [Refresh]
to display newly accumulated data.
148
Blocked Protocols
The [IP Filter Session] table displays the following fields for each
current IP session:
Field Description
Session Index This field displays the ID assigned by the system to the IP
session (all sessions, whether or not they are affected by an IP
filter rule, are assigned a session index).
Time to expire This field displays the number of seconds in which the connection
will automatically expire.
Protocol This field displays the underlying IP protocol used on the
connection, such as [TCP], [UDP], [IGMP], etc.
I/F This is the interface on which the IP filter rule is effective.
IP Address This is the IP addresses involved in the communication. The
first one shown is the initiator of the communication.
Port This field displays the hardware addresses of the ports
involved in the communication.
In Rule Index These fields display the number of the IP filter rule that applies
to this session (assigned when the rule was created).
Out Rule Index
In Action This field displays the action ([Accept], [Deny] or [Unknown]),
being taken on data coming into or going out on the interface.
Out Action
This action is specified in the rule definition.
Action(s)
This field provides an icon you can click on ( ) to delete the
IP session. When you delete a session, the communication
between is discontinued.
Blocked Protocols
The [Blocked Protocols] feature enables you to prevent the ADSL
Barricade from passing any data that uses a particular protocol.
Unlike the IP filter feature, you cannot specify additional criteria
for blocked protocols, such as particular users or destinations.
However, when you are certain that a particular protocol is not
149
Configuring IP Filters and Blocked Protocols
150
Blocked Protocols
Protocol Description
PPPoE This is the abbreviation of Point-to-Point Protocol over Ethernet.
Many DSL modems use PPPoE to establish and maintain a
connection with a service provider. PPPoE provides a means of
logging in to the ISPs servers so that they can authenticate you
as a customer and provide you access to the Internet. Check with
your ISP before blocking this protocol.
IP Multicast IP Multicast is an extension to the IP protocol. It enables
individual packets to be sent to multiple hosts on the Internet, and
is often used for handling e-mail, mailing lists and
teleconferencing/videoconferencing.
RARP This is the abbreviation of Reverse Address Resolution Protocol.
This IP protocol provides a way for computers to determine their
own IP addresses when they only know their hardware address
(i.e., MAC addresses). Certain types of computers, such as
diskless workstations, must use RARP to determine their IP
address before communicating with other network devices.
AppleTalk This is a networking protocol used for Apple Macintosh®
networks.
NetBEUI This is the abbreviation of NetBIOS Enhanced User Interface. On
many LAN operating systems, the NetBEUI protocol provides the
method by which computers identify themselves to and
communicate with each other.
IPX This is the abbreviation of Internet work Packet Exchange. A
networking protocol used on Novell Netware-based LANs.
BPDU This is the abbreviation of Bridge Protocol Data Unit. BPDUs are
data messages that are exchanged across the switches between
LANs that are connected by a bridge. BPDU packets contain
information on ports, addresses, priorities and costs, and are
exchanged across bridges to detect and eliminate loops in a
network.
ARP Address Resolution Protocol. Computers on a LAN use ARP to
learn the hardware addresses (i.e., MAC addresses) of other
computers when they only know their IP addresses.
151
Configuring IP Filters and Blocked Protocols
152
VIEWING DSL LINE
INFORMATION
To view configuration parameters and performance statistics
for the ADSL Barricade’s DSL line, log into Configuration
Manager. Then click the [WAN] tab. The [DSL Status] page
appears by default, as shown in Figure 53.
153
Viewing DSL Line Information
Although you generally will not need to view the remaining data,
it may be helpful when troubleshooting connection or performance
problems with your ISP.
You can click [Clear] to reset all counters to zero, and [Refresh]
to display the page with newly accumulated values.
• The [Config Data] table lists various types of error and defects
measurements found on the DSL line. You cannot modify this
data.
154
Viewing DSL Line Information
From the [DSL Status] page, you can click [Stats] to display
DSL line performance statistics, as shown in Figure 55.
155
Viewing DSL Line Information
156
ADMINISTRATIVE TASKS
This section describes the following administrative tasks that you
can perform using Configuration Manager:
• Using Diagnostics.
157
Administrative Tasks
3. Click [Submit].
4. Click the [Admin] tab, and then click [Commit & Reboot] in the
task bar.
158
Viewing System Alarms
Each row in the table displays the time and date that an alarm
occurred, the type of alarm, and a brief statement indicating its
cause.
To remove all entries from the list, click [Clear]. New entries will
begin accumulating and will display when you click [Refresh].
159
Administrative Tasks
2. In the [Upgrade File:] text box, type the path and file name of
the file as provided by your ISP. You can click [Browse...]
to search for it on your hard drive.
The name of the upgrade file must be one of the following:
- TEImage.bin
- TEDsl.gsz
160
Using Diagnostics
- TEAppl.gsz
- Filesys.bin
- TEPatch.bin
Turn power to the unit off, wait a few seconds, and turn it on
again. The new software will now be running. If the system
fails to boot or is not working properly, contact your ISP for
troubleshooting assistance.
Using Diagnostics
The diagnostics feature executes a series of tests of your system
software and hardware connections. Use this feature when
working with your ISP to troubleshoot problems.
161
Administrative Tasks
2. From the [ATM VC:] drop-down list, select the name of the
ATM interface currently defined on your system.
3. Click [Submit].
162
Modifying Port Settings
163
Administrative Tasks
164
Modifying Port Settings
3. Click [Commit & Reboot] in the task bar, and click [Commit]
to save your changes to the permanent memory.
165
APPENDIX A
IP Addresses
Note: This section pertains only to IP addresses
for IPv4 (version 4 of the Internet Protocol).
IPv6 addresses are not covered.
This section assumes basic knowledge of
binary numbers, bits, and bytes. For details
on this subject, see Appendix B on page 173.
Structure of an IP address
IP addresses have a hierarchical design similar to that of
telephone numbers. For example, a 7-digit telephone number
starts with a 3-digit prefix that identifies a group of thousands
of telephone lines, and ends with four digits that identify one
specific line in that group.
167
Appendix A
The first part of every IP address contains the network ID, and
the rest of the address contains the host ID. The length of the
network ID depends on the network's class (see following
section). Figure 62 shows the structure of an IP address.
168
Network classes
Network classes
The three commonly used network classes are A, B and C.
(There is also a class D but it has a special use beyond the
scope of this discussion.) These classes have different uses
and characteristics.
Class B networks are smaller but still quite large, each capable
to hold over 65,000 hosts. There can be up to 16,384 class B
networks in existence. A class B network might be appropriate
for a large organization such as a business or government
agency.
Class C networks are the smallest, only able to hold 254 hosts at
most, but the total possible number of class C networks exceeds
2 million (2,097,152 to be exact). LANs connected to the Internet
are usually class C networks.
169
Appendix A
Subnet masks
Definition: A mask looks like a regular IP address, but
contains a pattern of bits that tells what parts
of an IP address are the network ID and what
parts are the host ID:
- bits set to 1 means "this bit is part of the network
ID"
- bits set to 0 means "this bit is part of the host ID."
Subnet masks are used to define subnets (what you get after
dividing a network into smaller pieces). A subnet's network ID is
created by "borrowing" one or more bits from the host ID portion
of the address. The subnet mask identifies these host ID bits.
As with any class C address, all of the bits in field1 through field3
are part of the network ID, but note how the mask specifies that
the first bit in field4 is also included. Since this extra bit has only
two values (0 and 1), this means there are two subnets. Each
subnet uses the remaining 7 bits in field4 for its host IDs, which
range from 0 to 127 (instead of the usual 0 to 255 for a class C
address).
Similarly, to split a class C network into four subnets, the mask is:
255.255.255.192 or 11111111.11111111.11111111.11000000
The two extra bits in field4 can have four values (00, 01, 10, 11),
so there are four subnets. Each subnet uses the remaining six
bits in field4 for its host IDs, ranging from 0 to 63.
170
Subnet masks
- Class A: 255.0.0.0
- Class B: 255.255.0.0
- Class C: 255.255.255.0
171
APPENDIX B
Binary Numbers
In everyday life, we use the decimal system of numbers.
In decimal, numbers are written using the ten digits 0, 1,
2, 3, 4, 5, 6, 7, 8, and 9. Computers, however, do not use
decimal. Instead, they use binary.
Decimal Binary
Also, since binary uses only two digits to represent all numbers, a
binary number has more digits than the same number in decimal.
In the example above, you can see that the decimal number 13 is
the same as the binary number 1101 (8 + 4 + 1 = 13).
173
Appendix B
The following shows the values of the eight digits in a byte along
with a sample value:
174
TROUBLESHOOTING
This troubleshooting suggests solutions for problems you may
encounter in installing or using the ADSL Barricade, and provides
instructions for using several IP utilities to diagnose problems.
Contact Customer Support if these suggestions do not resolve
the problem.
LEDs
o Verify that you are using the power cable provided with the
device and that it is securely connected to the ADSL
Barricade and a wall socket/power strip.
175
Troubleshooting
Internet Access
176
Troubleshooting
177
Troubleshooting
o ping
Ping is a command you can use to check whether your PC
can recognize other computers on your network and the
Internet. A ping command sends a message to the computer
you specify. If the computer receives the message, it sends
messages in reply. To use it, you must know the IP address
of the computer with which you are trying to communicate.
178
Troubleshooting
o Nslookup
You can use the nslookup command to determine the IP
address associated with an internet site name. You specify
the common name, and the nslookup command looks up the
name in on your DNS server (usually located with your ISP).
If that name is not an entry in your ISP's DNS table, the
request is then referred to another higher-level server, and
so on, until the entry is found. The server then returns the
associated IP address.
179
Troubleshooting
180
TECHNICAL
SPECIFICATIONS
Interface Ports:
- Internet (WAN): ADSL RJ11 (pin 3 and 4)
ADSL Features:
- Embedded full-rate ADSL Modem Compliant with ANSI
T1.413 Issue 2 , ITU G.992.1 (G.DMT) and ITU G.992.2
(G.Lite).
Software:
- ATM Subsystem:
- Data Subsystem:
181
Technical Specifications
- Bridging/Routing Functionality:
• Up to 1000 hosts
• Transparent bridging as specified in IEEE 802.1D
• Bridged PDU encapsulation
• Provides up to 1024 NAT translation sessions
• Dynamic IP address allocation is supported through
DHCP or IPCP
• Point-to-Point Protocol: PPPoA, PPPoE, PAP, and
CHAP
• Routing Information Protocol (RIP) v1 and v2
• Embedded firewall prevents DOS, IP spoofing, and other
common types of attacks
• TFTP client/server
• DHCP client/server
• Telnet server
• HTTP server
• FTP client/server
- Network Management:
182
Technical Specifications
Standards Compliance:
- ADSL :
- Ethernet :
Windows Me
Windows 2000
Windows XP
Windows NT
Power Dissipation
The typical approximated power dissipation is as below:
183
Technical Specifications
Power Input
12V/1.2A
Weight
545g
Dimensions
20 x 14.8 x 3.9 cm (LxWxH)
Electromagnetic Compatibility
CE R&TTE, FCC part 15 class B and FCC part 68
Safety
CSA,UL 1950, EN60950
184
TERMINOLOGY
10BASE-T
A designation for the type of wiring used by Ethernet networks
with a data rate of 10 Mbps. Also known as Category 3 (CAT 3)
wiring. See also data rate, Ethernet.
100BASE-T
A designation for the type of wiring used by Ethernet networks
with a data rate of 100 Mbps. Also known as Category 5 (CAT 5)
wiring. See also data rate, Ethernet.
analog
Of data, having a form is analogous to the data's original waveform.
The voice component in DSL is an analog signal. See also digital.
authenticate
To verify a user's identity, such as by prompting for a password.
185
Terminology
binary
The base two system of numbers, that uses only two digits,
0 and 1, to represent all numbers. In binary, the number 1 is
written as 1, 2 as 10, 3 as 11, 4 as 100, etc. Although expressed
as decimal numbers for convenience, IP addresses in actual
use are binary numbers; e.g., the IP address 209.191.4.240
is 11010001.10111111.00000100.11110000 in binary. See
also bit, IP address, network mask.
bit
Short for binary digit. A bit is a number that can have two values,
0 or 1. See also binary.
bps
Bits per second
bridging
Passing data from your network to your ISP and vice versa using
the hardware addresses of the devices at each location. Bridging
contrasts with routing, which can add more intelligence to data
transfers by using network addresses instead. The ADSL
Barricade can perform both routing and bridging. Typically, when
both functions are enabled, the device routes IP data and bridges
all other types of data. See also routing.
broadband
A telecommunications technology that can send different types of
data over the same medium. DSL is a broadband technology.
broadcast
To send data to all computers on a network.
CO (Central Office)
A circuit switch that terminates all the local access lines in a
particular geographic serving area. It is a physical building where
the local switching equipment is found. xDSL lines running from
a subscriber's home connect at their serving central office.
186
Terminology
digital
Of data, having a form based on discrete values expressed as
binary numbers (0's and 1's). The data component in DSL is a
digital signal. See also analog.
187
Terminology
domain name
A domain name is a user-friendly name used in place of its
associated IP address.
For example, www.globespan.net is the domain name associated
with the IP address 209.191.4.240. Domain names must be
unique. Their assignment is controlled by the Internet
Corporation for Assigned Names and Numbers (ICANN). Domain
names are a key element of URLs, which identify a specific file at
a web site, e.g., http://www.globespan.net/index.html.
See also DNS.
download
To transfer data in the downstream direction, i.e., from the
Internet to the user.
Ethernet
The most commonly installed computer network technology, usually
using twisted pair wiring. Ethernet data rates are 10 Mbps and
100 Mbps. See also BASE-T,100BASE-T, twisted pair.
filtering
To screen out selected types of data, based on filtering rules.
Filtering can be applied in one direction (upstream or downstream),
or in both directions.
filtering rule
A rule that specifies what kinds of data a routing device will accept
and/or reject. Filtering rules are defined to operate on an interface
(or multiple interfaces) and in a particular direction (upstream,
downstream, or both).
188
Terminology
firewall
Any method of protecting a computer or LAN connected to the
Internet from intrusion or attack from the outside. Some firewall
protection can be provided by packet filtering and Network
Address Translation services.
Gbps
Abbreviation for Gigabits (GIG-uh-bits) per second, or one billion
bits per second. Internet data rates are often expressed in Gbps.
hop
When you send data through the Internet, it is sent first from your
computer to a router, and then from one router to another until it
finally reaches a router that is directly connected to the recipient.
Each individual "leg" of the data's journey is called a hop.
hop count
The number of hops that data has taken on its route to its
destination. Alternatively, the maximum number of hops that a
packet is allowed to take before being discarded. See also TTL.
189
Terminology
host
A device (usually a computer) connected to a network.
in-line filter
See Microfilter.
Internet
The global collection of interconnected networks used for both
private and business communications.
intranet
A private, company-internal network that looks like part of the
Internet (users access information using web browsers), but
is accessible only by employees.
IP
See TCP/IP.
190
Terminology
191
Terminology
mask
See network mask.
Mbps
Abbreviation for Megabits per second, or one million bits per
second. Network data rates are often expressed in Mbps.
Microfilter
In splitterless deployments, a microfilter is a device that removes
the data frequencies in the DSL signal, so that telephone users
do not experience interference (noise) from the data signals.
Microfilter types include in-line (installs between phone and jack)
and wall-mount (telephone jack with built-in microfilter). See also
splitterless.
NAT rule
A defined method for translating between public and private
IP addresses on your LAN.
network
A group of computers that are connected together, allowing them
to communicate with each other and share resources, such as
software, files, etc.A network can be small, such as a LAN, or
very large, such as the Internet.
192
Terminology
network mask
A network mask is a sequence of bits applied to an IP address
to select the network ID while ignoring the host ID. Bits set to 1
mean "select this bit" while bits set to 0 mean "ignore this bit." For
example, if the network mask 255.255.255.0 is applied to the IP
address 100.10.50.1, the network ID is 100.10.50, and the host
ID is 1. See also binary, IP address, subnet.
packet
Data transmitted on a network consists of units called packets.
Each packet contains a payload (the data), plus overhead
information such as where it came from (source address)
and where it should go (destination address).
port
A physical access point to a device such as a computer or router,
through which data flows into and out of the device.
193
Terminology
POTS splitter
See splitter.
protocol
A set of rules governing the transmission of data. In order for
a data transmission to work, both ends of the connection have
to follow the rules of the protocol.
remote
In a physically separate location. For example, an employee away
on travel who logs in to the company's intranet is a remote user.
194
Terminology
routing
Forwarding data between your network and the Internet on the
most efficient route, based on the data's destination IP address
and current network conditions. A device that performs routing
is called a router.
rule
See filtering rule, NAT rule.
splitter
A device that splits off the voice component of the DSL signal
to a separate line, so that data and telephone service each
have their own wiring and jacks. The splitter is installed by your
telephone company where the DSL line enters your home.
The CO also contains splitters that separate the voice and data
signals, sending voice to the PSTN and data on high-speed lines
to the Internet. See also CO, PSTN, splitterless, microfilter.
splitterless
A type of DSL installation where no splitter is installed, saving
the cost of a service call by the telephone company. Instead,
195
Terminology
each jack in the home carries both voice and data, requiring
a microfilter for each telephone to prevent interference from
the data signal. ADSL is usually splitterless; if you are unsure
if your installation has a splitter, ask your DSL provider.
See also splitter, microfilter.
subnet
A subnet is a portion of a network. The subnet is distinguished
from the larger network by a subnet mask which selects some
of the computers of the network and excludes all others. The
subnet's computers remain physically connected to the rest of
the parent network, but they are treated as though they were
on a separate network. See also network mask.
subnet mask
A mask that defines a subnet. See also network mask.
TCP
See TCP/IP.
196
Terminology
Telnet
An interactive, character-based program used to access a remote
computer. While HTTP (the web protocol) and FTP only allow
you to download files from a remote computer, Telnet allows
you to log into and use a computer from a remote location.
twisted pair
The ordinary copper telephone wiring long used by telephone
companies. It contains one or more wire pairs twisted together to
reduce inductance and noise. Each telephone line uses one pair.
In homes, it is most often installed with two pairs. For Ethernet
LANs, a higher grade called Category 3 (CAT 3) is used for
10BASE-T networks, and an even higher grade called Category
5 (CAT 5) is used for 100BASE-T networks. See also 10BASE-T,
100BASE-T, Ethernet.
upstream
The direction of data transmission from the user to the Internet.
VC (Virtual Circuit)
A connection from your ADSL routers to your ISP.
197
Terminology
Web browser
A software program that uses Hyper-Text Transfer Protocol
(HTTP) to download information from (and upload to) web sites,
and displays the information, which may consist of text, graphic
images, audio, or video, to the user. Web browsers use
Hyper-Text Transfer Protocol (HTTP). Popular web browsers
include Netscape Navigator and Microsoft Internet Explorer. See
also HTTP, web site, WWW.
Web page
A web site file typically containing text, graphics and hyperlinks
(cross-references) to the other pages on that web site, as well as
to pages on other web sites. When a user accesses a web site,
the first page that is displayed is called the Home page. See also
hyperlink, web site.
198
Terminology
Web site
A computer on the Internet that distributes information to (and
gets information from) remote users through web browsers. A
web site typically consists of web pages that contain text,
graphics, and hyperlinks. See also hyperlink, web page.
199
COMPLIANCES
FCC - Class B
This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with instructions,
may cause harmful interference to radio communications. However, there is no
guarantee that the interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception,
which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following
measures:
Note: In order to maintain compliance with the limits for a Class B digital
device, you are required to use a quality interface cable when connecting to
this device. Changes or modifications not expressly approved by our company
could void the user's authority to operate this equipment.
FCC - Part 68
This equipment complies with Part 68 of the FCC rules. This equipment comes
with a label attached to it that contains, among other information, the FCC
registration number and ringer equivalence number (REN) for this equipment. If
requested, this information must be provided to the telephone company.
The REN is used to determine the quantity of devices that may be connected to
the telephone line. Excessive RENs on the telephone line may result in the
devices not ringing in response to an incoming call. In most, but not all areas,
the sum of the RENs should not exceed five (5.0.) To be certain of the number
i
Compliances
of devices that may be connected to the line, as determined by the total RENs,
contact the telephone company to determine the maximum REN for the calling
area.
• Remain on the line and briefly explain to the dispatcher the reason for the
call.
• Perform such activities in off-peak hours such as early morning or late
evenings.
The Telephone Consumer Protection Act of 1991 makes it unlawful for any
person to use a computer or other electronic device to send any message via a
telephone facsimile machine unless such message clearly contains, in a margin
at the top or bottom of each transmitted page or on the first page of the
transmission the date and time it is sent and an identification of the business,
other entity, or individual sending the message and the telephone number of
the sending machine or such business, other entity, or individual.
ii
Compliances
RFI Emission:
Immunity:
LVD:
iii
Compliances
Safety Compliance
Wichtige Sicherheitshinweise (Germany)
1. Bitte lesen Sie diese Hinweise sorgfältig durch.
2. Heben Sie diese Anleitung für den späteren Gebrauch auf.
3. Vor jedem Reinigen ist das Gerät vom Stromnetz zu trennen.
Verwenden Sie keine Flüssigoder Aerosolreiniger. Am besten
eignet sich ein angefeuchtetes Tuch zur Reinigung.
4. Die Netzanschlu ßsteckdose soll nahe dem Gerät angebracht
und leicht zugänglich sein.
5. Das Gerät ist vor Feuchtigkeit zu schützen.
6. Bei der Aufstellung des Gerätes ist auf sicheren Stand zu achten.
Ein Kippen oder Fallen könnte Beschädigungen hervorrufen.
7. Die Belüftungsöffnungen dienen der Luftzirkulation, die das Gerät
vor Überhitzung schützt. Sorgen Sie dafür, daß diese Öffnungen
nicht abgedeckt werden.
8. Beachten Sie beim Anschluß an das Stromnetz die Anschlußwerte.
9. Verlegen Sie die Netzanschlußleitung so, daß niemand darüber
fallen kann. Es sollte auch nichts auf der Leitung abgestellt werden.
10. Alle Hinweise und Warnungen, die sich am Gerät befinden, sind zu
beachten.
11. Wird das Gerät über einen längeren Zeitraum nicht benutzt, sollten
Sie es vom Stromnetz trennen. Somit wird im Falle einer Überspannung
eine Beschädigung vermieden.
12. Durch die Lüftungsöffnungen dürfen niemals Gegenstände
oder Flüssigkeiten in das Gerät gelangen. Dies könnte einen
Brand bzw. elektrischen Schlag auslösen.
13. Öffnen sie niemals das Gerät. Das Gerät darf aus Gründen der
elektrischen Sicherheit nur von authorisiertem Servicepersonal
geöffnet werden.
14. Wenn folgende Situationen auftreten ist das Gerät vom Stromnetz
zu trennen und von einer qualifizierten Servicestelle zu überprüfen:
a. Netzkabel oder Netzstecker sind beschädigt.
b. Flüssigkeit ist in das Gerät eingedrungen.
c. Das Gerät war Feuchtigkeit ausgesetzt.
d. Wenn das Gerät nicht der Bedienungsanleitung entsprechend
funktioniert oder Sie mit Hilfe dieser Anleitung keine
iv
Compliances
Verbesserung erzielen.
e. Das Gerät ist gefallen und/oder das Gehäuse ist beschädigt.
f. Wenn das Gerät deutliche Anzeichen eines Defektes aufweist.
15. Stellen Sie sicher, daß die Stromversorgung dieses
Gerätes nach der EN 60950 geprüft ist. Ausgangswerte der
Stromversorgung sollten die Werte von AC 7,5-8V, 50-60Hz nicht
über oder unterschreiten sowie den minimalen Strom von 1A nicht
unterschreiten. Der arbeitsplatzbezogene Schalldruckpegel nach
DIN 45 635 Teil 1000 beträgt 70dB(A) oder weniger.
v
LEGAL INFORMATION
AND CONTACTS
vii
Legal Information and Contacts
* Under the limited lifetime warranty, internal and external power supplies, fans,
and cables are covered by a standard one-year warranty from date of purchase.
viii
Legal Information and Contacts
Contact SMC
Contact details for your relevant countries are available on www.smc-europe.com
for EMEA and www.smc.com for North America.
Statement of Conditions
In line with our continued efforts to improve internal design, operational function, and/
or reliability, SMC reserves the right to make changes to the product(s) described
in this document without notice. SMC does not assume any liability that may occur
due to the use or application of the product(s) described herein. In order to obtain
the most accurate knowledge of installation, bug-fixes and other product related
information we advise to visit the relevant product support page at
www.smc-europe.com for EMEA and www.smc.com for North America before you
start installing the equipment. All information
is subject to change without notice.
Limitation of Liability
In no event, whether based in contract or tort (including negligence), shall SMC be
liable for incidental, consequential, indirect, special or punitive damages of any
kind, or for loss of revenue, loss of business or other financial loss arising out of
or in connection with the sale, installation, maintenance, use, performance, failure
or interruption of its products, even if SMC or its authorized reseller has been
adviced of the possiblity of such damages.
Copyright
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate
and reliable. However, no responsibility is assumed by SMC for its use, nor for
any infringements of patents or other rights of third parties which may result from
its use. No license is granted by implication or otherwise under any patent or
patent rights of SMC. SMC reserves the right to change specifications at any
time without notice.
Trademarks
SMC is a registered trademark and Barricade is a trademark of SMC Networks,
Inc. Other product and company names are trademarks or registered trademarks
of their respective holders.
ix