![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Contents:EasyConfigurator Advanced Features Web User Interface |
USRobotics SureConnect
ADSL
|
PWR | On Green | Power is being received from the AC power adapter. |
Off | No power is detected. | |
WAN IP | On Green | The gateway gets a public IP Address from the Internet Service Provider (ISP), in PPP mode. |
Flashing Green | IP connected and passing data. | |
Red | Failed to get IP Address from ISP. | |
Off | ADSL is not synchronized or in bridge mode. | |
WLAN | On Green | Wireless client connected to the gateway. |
Flashing Green | Wireless data is flowing. | |
Off | No wireless client connected to the gateway. | |
Ethernet 1,2,3,4 | On Green | A physical connection between the gateway and the computer has been established and detected through the Ethernet cable. |
Flashing Green | Data traffic is flowing. | |
Off | A physical connection between the gateway and the computer has not been established through the Ethernet cable. | |
ADSL | On Green | A DSL link has been established. |
Flashing Green | A DSL link is being negotiated. | |
Off | The DSL link has failed. |
Begin Quick Setup allows the user to configure the ADSL gateway for DSL connectivity and Internet access. It also guides the user through the ISP network setup first and then the home or office network setup. The USRobotics SureConnect ADSL Wireless Gateway supports the following five ISP network operating modes over gateway ADSL interface:
The ISP network operating mode depends on the service provider's configuration on the Central Office side and Broadband Access Server (BRAS) for your ADSL line.
Your ISP should be able to provide the following, if needed:
The following configuration considerations apply:
The Connection Type screen allows you to select the type of network protocol over the ATM PVC supported by the Internet Service Provider. Refer to the beginning of this section for a bridge description of these protocols.
Select the protocol as assigned by your ISP and proceed to the matching sections in this manual for further instructions.
The screen provides fields to enter the PPP Username and the PPP Password. The password requirement is dependent on the particular settings of the ISP or the ADSL service provider.
The WUI allows a maximum of 256 characters in the PPP user name and a maximum of 32 characters in PPP password.
Authentication Method is default to Auto. It is recommended that you leave the Authentication Method in Auto, however, you may select PAP or CHAP if necessary.
The Wireless Gateway can be configured to disconnect if there is no activity for a specific period of time by selecting the Disconnect if no activity check box.
The entered value must be between 1 minute to 4320 minutes. Default is 30 minutes. The PPP IP Extension is a special feature deployed by some service providers. Unless your service provider specifically requires this setup, do not select it.
The PPP IP Extension supports the following conditions:
This page allows the user
to Enable IGMP Multicast, enable WAN service, and Enable Quality of
Service. Quality of Service is not enabled by default. Refer to your
ISP to determine if Quality of Service should be enabled. After verifying
and entering your settings, click Next. The following screen
appears:
The secondary LAN IP supports public and private IP addresses and doesn't use Network Address Translation (NAT).You may wish to configure the secondary IP Address for LAN interface with one of the configuration scenarios below:
Note: Enable Wireless is checked by default. Deselect this if you are not using the router as a wireless device in order to minimize the risk of security breeches. Also, you can change the Wireless SSID now or you can do it later from the Wireless AP menu.
After clicking Finish, the gateway will save the configuration to the memory and reboot. The WUI will not respond until the system is brought up again. After the system is up, close the Web browser and relaunch another Web browser session.
To configure MER, do the following:
The values that must be entered in the fields should be provided by the ISP.
If DNS server addresses can be obtained automatically through the DHCP, select Obtain DNS server address automatically; otherwise, the user must enter the preferred DNS server address and the optional alternative DNS server address and click Next. The following screen appears:
Note that the gateway's default IP address is 192.168.1.1 and the default private address range provided by the DHCP server in the gateway is 192.168.1.2 through 192.168.1.254.
Note:
Enable Wireless
is checked by default. Deselect this if you are not using the router
as a wireless device in order to minimize the risk of security breeches.
Also, you can change the Wireless SSID now or you can do it later from
the Wireless AP menu.
When the configuration is completed and the unit has rebooted, the Wireless Gateway is ready for operation and the LEDs display as described in the LED description tables.
To configure IP over ATM (IPoA), do the following.
Notice that DHCP client is
not supported over IPoA. The user must enter the WAN interface IP address,
the remote end IP address for the default gateway setup, and the DNS
server addresses provided by the ISP and click Next. The following
screen appears:
Assuming you prefer to use both the Enable NAT and Enable Firewall settings, click Next. The following screen appears.
Note that the gateway's default IP address is 192.168.1.1 and the default private address range provided by the DHCP server in the gateway is 192.168.1.2 through 192.168.1.254.
After completion, click Next. The following screen appears:
Note: Enable Wireless is checked by default. Deselect this if you are not using the router as a wireless device in order to minimize the risk of security breeches. Also, you can change the Wireless SSID now or you can do it later from the Wireless AP menu.
Select the bridge operating mode if it is instructed by your ADSL service provider.
To configure Bridging, do the following:
Note:
Enable Wireless
is checked by default. Deselect this if you are not using the router
as a wireless device in order to minimize the risk of security breeches.
Also, you can change the Wireless SSID now or you can do it later from
the Wireless AP menu.
After having completed the Quick Setup, you should be able to browse the Internet and no additional configuration is needed.
The DSL Settings dialog box allows you to select an appropriate modulation mode.
Option |
Description |
Auto Mode (G.Dmt, G.lite or T1.413) |
Sets the system auto-sense between G.Dmt, G.lite, or T1.413. |
G.Dmt/G.lite |
Sets G.Dmt/G.lite if you want the system to use either G.Dmt or G.lite mode. |
T1.413 |
Sets the T1.413 if you want the system to use only T1.413 mode. |
G.Dmt |
Sets the system to use only G.Dmt mode. |
G.lite |
Sets the system to use only G.lite mode. |
Note: In most cases, automode will suffice and should only be changed at the request of your ISP.
This release supports ADSL2 connection. Check with your ISP to make use of this higher rate connection standad.
The DSL Advanced Settings dialog box allows you to select an appropriate test mode.
Warning!! These tests are for your ISP to perform DSL line testing. Running these tests may render your DSL service inoperable.
Option | Description |
Normal | Normal mode of operation. |
Reverb | Send Reverb signal only. |
Medley | Send Medley signal only. |
No retrain | Stay in showtime even after the modem is disconnected. |
All three of these modes enable PSD measurements for each phase of training and showtime.
The Tone Selection button prompts the ADSL Tone Settings dialog box. This allows you to select an appropriate number of upstream and downstream tones. Click Apply after you have made your selections.
The WAN Setup dialog box allows you to Edit or Remove your ISP configuration that was configured either by EasyConfigurator or during the Quick Setup step. Changes will take effect only after you choose Finish and reboot your gateway.
Select Services under the Access Control section. This screen allows for the control of device management to specify protocol for the LAN and WAN sides.
Select IP Addresses under the Access Control section. Select Disable or Enable here to either activate or deactivate the Access Control Mode (Device Management) by user's IP address. To add an IP Address to the list select Add. To remove an IP Address from the list, select Remove.
Select Passwords under the Access Control section. Use this screen to change or create Device Management passwords. When complete, click Apply.
The Quality of Service (QoS) tab is useful only when all of the following conditions are met:
IP QoS is executed in the IP layer. It will classify traffic according to the classification rules. Each rule may contain a combination of the following conditions: protocol (TCP/UDP/ICMP), source IP address/subnet mask, destination IP address/subnet mask, source port (one or range), destination port (one or range). The result of matching a classification rule will produce a priority (high, medium, low) and a type of service (don’t care, Normal Service, Minimum Cost, Maximum Reliability, Maximum Throughput, Minimum Delay).
The IP Type of Service (TOS) of the matching rule will overwrite the original IP header TOS field if “don’t care” is not selected.
The priority of the matching rule determines which ATM TX queue to send over the PVC if the packet is routed to this PVC. The ATM SAR scheduler transmits the packet according to the following order:
IP QoS will only take effect if the packet is routed to a QoS-enabled PVC. If it is routed to a regular QoS-disabled PVC, it will be transmitted at the same priority level as the low priority of a QoS enabled PVC of the same ATM service category.
Configure the DSL gateway IP Management Address and Subnet Mask for LAN interface and DHCP Server.
The Default Gateway Configuration dialog box allows you to configure a static default gateway IP address.
If deselecting the Automatically Assigned Default Gateway checkbox, the following screen appears:
If you are configuring your gateway for either Routed Mode (IPoA) or Static MER Mode, you should enter a static Default Gateway IP Address in the corresponding field and use the appropriate WAN interface.
Note: It is significant that both of these fields are compatible with each other. The WAN interface check box should report the same value as found in the Service Name field box on the WAN Setup screen.
These settings will take affect only after you click Apply. If changing the Automatic Assigned Default Gateway from deselected to selected, you must reboot the gateway to get the automatically assigned default gateway.
The DNS Server Configuration dialog box allows you to configure a static DNS server IP Address.
If deselecting the Enable Automatic Assigned DNS check box, the following screen appears:
DNS (Domain Name Service) is
responsible for resolving an Internet name such as www.usr.com into an
IP address for your ISP's equipment to find and serve you with it's Web
contents. If we reverse the process, you use a Dynamic DNS Service. By
registering with these Dynamic DNS Service providers, and programing your
router, you router's public address will be resolved.
The Routing dialog box allows you to configure Static Route entry.
Pressing Add will open the following screen and you can add static routes
The MAC address has the following format "xx:xx:xx:xx:xx:xx" where xx are hexidecimal numbers.
Firewalls use one or more of three methods to control traffic flowing in and out of the network:
The firewall blocks internal users from accessing the Internet. There are two ways to accomplish this:
Using the TCP/UDP port to block internal users from accessing the Internet (also known as Port Filtering).
Using the source or destination or source or destination port or protocol or any combination of any IP address to block a specific user from accessing the Internet (also known as Address Filtering), the Firewall dialog box allows you to configure outgoing packet types to be sent using either TCP or UDP (or a combination of both) from specific ports.
The following screen appears after you click Add.
Firewall Outgoing - Port Filter Screen Fields
Option |
Description |
Protocol |
Selects TCP, UDP, or a combination of TCP/UDP. |
Source IP address (LAN) |
Enter the IP address you do not want to have access to the destination IP. |
Source Port (LAN) |
Enter the source port number, or range of ports, you want to block access (for source IP). |
Destination IP address |
Enter the IP address you do not want the source IP address to have access to. |
Destination Subnet Mask: |
Enter the subnet mask for the destination IP address. |
Destination Port (port or port:port) |
Enter the destination port number, or range of port numbers, you want to block access (for destination IP). |
The screen allows inbound IP addresses to reach your computer. To add an IP address to the inbound filter list, click Add. To remove an IP address from the inbound filter list, click Remove.
IP Filtering - Inbound Filters
Option |
Description |
Protocol |
Selects TCP, UDP, or a combination of TCP/UDP. |
Source IP address (WAN) |
Enter the IP address you want to have access to the destination IP. |
Source Port (WAN) |
Enter the source port number, or range of ports, you do not want to block access (for source IP). |
Destination IP address (LAN) |
Enter the IP address you want the source IP address to have access to. |
Destination Subnet Mask: |
Enter the subnet mask for the destination IP address. |
Destination Port (port or port:port) |
Enter the destination port number, or range of port numbers, you want to allow access (for destination IP). |
Network Address and Port Translation (NAPT) allows a single device, such as a gateway, to act as an agent between the Internet (or "public network") and a local (or "private") network. This means that only a single, unique IP address is required to represent an entire group of computers.
Implementing dynamic NAPT automatically creates a firewall between your internal network and outside networks, or between your internal network and the Internet. NAPT only allows connections that originate inside the sub-domain. Essentially, this means that a computer on an external network cannot connect to your computer unless your computer has initiated the contact. You can browse the Internet and connect to a site, and even download a file; but somebody else cannot latch onto your IP address and use it to connect to a port on your computer.
Under the NAPT environment, all computers behind the NAPT are not accessible from outside (i.e., the WAN). However, if public services, such as web servers, ftp servers or e-mail servers, are needed from your private network, a virtual server can be configured to set up permit secured access. A virtual server setup enables a connection from outside to be redirected to a host running the services on the private subnet. This host running the services is called a virtual server (a virtual server is synonymous with IP forwarding).
The Virtual Servers Setup dialog box allows you to configure Virtual Servers and DMZ Host settings by adding, removing, and saving.
Selecting the Add button prompts the following screen:
Option | Description |
Service Name | Allows the selection of an existing service from a drop-down-menu (web, FTP, e-mail). |
Custom Server | Allows for an entry of a customer service where the name is known, but not listed in the Select a Service drop-down. |
Server IP Address | The IP address of your computer that functions as a server. |
Protocol | Allows the selection of a transport protocol (UDP, TCP, or both). |
External Port (start/end) | Allows the entry of an individual external port or range of ports. |
Internal Port (start/end) | Allows the entry of an individual internal port or range of ports. |
Internal server IP address | The IP address of your computer that functions as a server. |
Enter the application name, outgoing protocol, outgoing port range, incoming protocol, incoming port range, and click Apply to forward IP packets for this application to the specified ports.
Note: A port trigger is available to a single active session and can not support multiple triggers to multiple outgoing clients.
The DeMilitarized Zone (DMZ) Host option is used to forward IP packets from the WAN that do not belong to any of the applications configured in the virtual servers table, to the DMZ host computer. While virtual server can only forward (redirect) a limited number of services (ports), DMZ hosting allows all the services (ports) running on the DMZ host, to be accessible externally.
Selecting the DMZ Host button prompts the following screen.
To configure the DMZ, type in the address of your computer that will function as a DMZ Host.
By default, UPNP is enabled. To disable, deselect Enable UPNP and click Apply.
The Wireless dialog box allows you to enable the wireless capability, hide the access point, set the wireless network name, enable wireless security, and restrict the channel set.
Option | Description |
Enable Wireless | A checkbox that enables or disables the wireless LAN interface. When selected, the WUI displays Disable SSID Broadcast and SSID. The default is Enable Wireless. |
Disable SSID Broadcast |
Select Disable SSID Broadcast to protect the ADSL gateway access point from detection by wireless active scans. If you do not want the access point to be automatically detected by a wireless station, this checkbox should be deselected. The station will not discover this access point. To connect a station to the access point, the station must manually add this access point name in its wireless configuration. In Windows XP, go to the Network Properties function to view all of the available access points. You can also use other software programs such as NetStumbler to view available access points. |
SSID |
Sets the wireless network name. SSID stands for Service Set Identifier. All stations must be configured with the correct SSID to access the WLAN. If the SSID does not match, that user will not be granted access. The naming conventions are: minimum is one character and maximum number of characters is 32. The default name is USR9106. |
The Wireless Security Screen allows you to configure security features of the LAN interface.
Note: For wireless connectivity, the same settings applied here must also be applied to each wireless client.
Option | Description |
Network Authentication |
The gateway supports three different types of security settings for your network: 802.1x, Wi-Fi Protected Access (WPA), Wi-Fi Protected Access Pre-Shared Key (WPA-PSK) and Wire Equivalence Protection (WEP). WPA Pre-Shared Key: There are two encryption options for WPA Pre-Shared Key, Temporal Key Integrity Protocol (TKIP) and Advanced Encryption System (AES). If Network Authentication is disabled, you can still utilize WEP encryption. There are two levels of WEP encryption, 64-bit and 128-bit. The higher the encryption, the more secure the network. Speed may be compromised for the higher security, however. |
Shared Key Authentication | When Data Encryption is set for WEP, you need to specify the encryption key used for authentication to the wireless network. There are two subtypes of network authentication services: Optional and required. If shared key authentication is chosen as optional, open system authentication might take place (dependent on setting of client). |
Encryption Strength | A session’s key strength is proportional to the number of binary bits comprising the session key file. This means that session keys with a greater number of bits have a greater degree of security, and are considerably more difficult to forcibly decode. This drop-down menu sets either a 64 8-bit (5-character or 10-character hexidecimal) or 128 8-bit (13-character or 26-character) key. If you set a minimum 128-bit key strength, users attempting to establish a secure communications channel with your server must use a browser capable of communicating with a 128-bit session key. The Encryption Strength settings do not display unless WEP Encryption is selected. |
Set Encryption Keys | Once the Encryption Strength has been chosen, select the Apply button, then select the Set Encryption Keys button to prompt the Encryption Keys screen. A maximum of four keys are permitted. An example of a possible encryption key for 128 bit encryption is given in the Wireless Settings - Encryption Keys section of this User Guide. |
WPA Pre-Shared Key: There are two encryption options for WPA Pre-Shared Key, TKIP and AES. TKIP stands for Temporal Key Integrity Protocol. TKIP utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers. AES stands for Advanced Encryption System, which utilizes a symmetric 128-bit clock data encryption.
To use WPA Pre-Shared Key, enter a password in the WPA Pre-Shared Key field between 8 and 63 characters long. You may also enter a Group Key Renewal Interval time between 0 and 99,999 seconds.
WPA Radius: WPA Radius uses an external Radius server to perform user authentication. To use WPA Radius, enter the IP Address of the Radius server, the Radius port (default is 1812) and the shared secret from the Radius server.
802.1x Radius: Radius utilizes either a Radius server for authentication or WEP for data encryption. To utilize Radius, enter the IP Address of the Radius server and its shared secret. Select the desired encryption bit (64 or 128) for WEP and enter either a passphrase or a manual WEP key.
A network key is a key used for network encryption using the WEP algorithm. Under 802.11, a wireless station can be configured with up to four network keys, with the key index values being 0, 1, 2, and 3. When an access point or a wireless station transmits an encrypted message using a key that is stored in a specific key index, the transmitted message indicates the key index that was used to encrypt the message body. The receiving access point or wireless station can then retrieve the key that is stored at the key index and use it to decode the encrypted message body.
Encryption Keys are also known as WEP passwords. These are hexadecimal pass-keys that can consist of any combination of 10 of the following 16 characters: 0 1 2 3 4 5 6 7 8 9 a b c d e f
An illegal entry prompts an error message.
The intent of this screen is to have up to four available network keys (key indexes) that can be matched with the network keys on the client station. The drop down menu allows the selection on one of the four network keys.
The Associated Clients screen displays all of the clients associated to your wireless router.
All NICs have a unique 48-bit MAC address burned into the ROM chip on the card. When MAC address filtering is enabled, you are restricting the NICs that are allowed to connect to your access point. Therefore, an access point will grant access to any wireless device whose MAC address is on its "allow" list.
Wi-Fi routers and access points that support MAC filtering let you specify a list of MAC addresses that may connect to the access point, and thus dictate what devices are authorized to access the wireless network. When a device is using MAC filtering, any address not explicitly defined will be denied access.
Option | Description |
MAC Restrict Mode | Radio buttons that allow settings of: Off: MAC filtering function is disabled. Allow: Permits wireless clients with listed MAC addresses to connect to the access point. Deny: Prevents wireless clients with listed MAC from connecting to the access point. |
MAC Address | Lists the MAC addresses subject to the Off, Allow or Deny instruction. The Add button prompts an entry field that requires you to type in a MAC address in a two character, six-byte convention: xx:xx:xx:xx:xx:xx where xx are hexidecimal numbers. The maximum number of MAC addresses that can be added is 60. For an example of setting up MAC Filtering, refer to the Case Studies section of this User Guide. |
Option | Description |
Channel | Drop-down menu that allows selection of specific channel. |
Rate |
Drop-down menu that specifies the following fixed rates:
|
Basic Rate | You have the option of supporting all rates as listed in the Rate section above or using the 1, 2 Mbps rates which will support only older 802.11b implementations. |
Fragmentation Threshold | A threshold, specified in bytes, that determines whether packets will be fragmented and at what size. On an 802.11 WLAN, packets that exceed the fragmentation threshold are fragmented, i.e., split into, smaller units suitable for the circuit size. Packets smaller than the specified fragmentation threshold value are not fragmented. Enter a value between 256 and 2346. If you experience a high packet error rate, try to slightly increase your Fragmentation Threshold. The value should remain at its default setting of 2346. Setting the Fragmentation Threshold too low may result in poor performance. |
RTS Threshold | Request to Send, when set in bytes, specifies the packet size beyond which the WLAN Card invokes its RTS/CTS mechanism. Packets that exceed the specified RTS threshold trigger the RTS/CTS mechanism. The NIC transmits smaller packets without using RTS/CTS. The default setting of 2347 (maximum length) disables RTS Threshold. |
DTIM Interval | Delivery Traffic Indication Message (DTIM), also known as Beacon Rate. The entry range is a value between 1 and 65535. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. When the AP has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. AP Clients hear the beacons and awaken to receive the broadcast and multicast messages. The default is 100. |
Beacon Interval | The amount of time between beacon transmissions. Each beacon transmission identifies the presence of an access point. By default, radio NICs passively scan all RF channels and listen for beacons coming from access points to find a suitable access point. Before a station enters power save mode, the station needs the beacon interval to know when to wake up to receive the beacon (and learn whether there are buffered frames at the access point). The entered value is represented in ms. Default is 100. Acceptable entry range is 1 to 0xffff (65535). |
54g+ (Xpress) | 54g+ is a technology that utilizes standards based on framebursting to achieve higher throughput. With 54g+ enabled, aggregate throughput (the sum of the individual throughput speeds of each client on the network) can improve by up to 25% in 802.11g only networks and up to 75% in mixed networks comprised of 802.11g and 802.11b equipment. |
54g Mode | This will ensure you are connecting to 802.11g devices only. Set the mode to 54g Auto for the widest compatibility. Set the mode to 54g Performance for the fastest performance among 54g certified equipment. |
54g Protection | The 802.11g standards provide a protection method so 802.11g and 802.11b devices can co-exist in the same network without “speaking” at the same time. Do not disable 54g Protection if there is a possibility that a 802.11b device may need to use your wireless network. In Auto Mode, the wireless device will use RTS/CTS to improve 802.11g performance in mixed 802.11g/802.11b networks. Turn protection off to maximize 802.11g throughput under most conditions. |
The Update Software screen allows you to obtain an updated software image file from your ISP. Manual software upgrades from a locally stored file can be performed using the following screen.
Restore to Defaults
The original factory installed settings can be restored by clicking the Restore Default Configuration option in the Restore Settings screen.
Note: This entry has the same effect as the hardware reset-to-default button. The Wireless Gateway hardware and the boot loader software supports the "reset to default" button. If the reset button is continuously pushed for more than 5 seconds, the boot loader will erase all the configuration data saved in the "Permanent Storage" section on the flash memory.
Note: If you hold the switch for more than 30 seconds, the gateway boots into recovery mode. Simply power cycle to go back to normal boot mode.
The Wireless Gateway default settings are:
After the Restore Default Configuration button is selected, the following screen appears.
To save your DSL Gateway configuration settings, click Backup Configuration and select a folder on your hard drive.
NOTE: You must have Explorer 6.0 or greater to successfully save your configuration settings.
To update your DSL Gateway configuration settings, follow the steps provided on the screen.
NOTE: You must have Explorer 6.0 or greater to successfully update your configuration settings.
The Reboot Gateway dialog box allows you to reboot the gateway. The reboot takes two minutes.
The Diagnostics menu provides feedback on the connection status of the Wireless Gateway and the ADSL link. A description of each test can be obtained by clicking the Help button associated with the test.
Without an active ADSL connection, many of the tests will not be activated, as shown in the following screen.
When the current network operating mode is in bridge, the default gateway and DNS server tests will not be activated.
There are two buttons at the bottom of the screen:
When either of the Rerun Diagnostic Tests buttons are clicked, all the diagnostic tests are repeated. Normally, if one or more tests return a failure status, the user should rerun all the tests again to more thoroughly diagnose the problems encountered.
When you click Rerun Diagnostic Tests With OAM F4, ATM OAM F4 loopback cells are also transmitted, in addition to OAM F5 cells. It is possible that the ATM OAM F4 loopback or segment tests may not be supported by the ATM devices in the DSL service provider's network. For this reason, the OAM F4 test is separated from the general diagnostics tests. When an OAM F4 failure is encountered, the output screen will appear as an F4 Fail. The graphic below shows an example of diagnostics results when the PVC is configured in the PPPoE operating mode.
Diagnostic Test Description
Test | Description |
Ethernet Connection |
|
ADSL Synchronization |
|
ATM OAM Segment Ping |
The modem transmits OAM F4/F5 (if you rerun the test with OAM F4, both F4 and F5 are sent, otherwise only F5 is sent) segment loopback requests and expects a reply within 5 seconds. This test verifies that ATM continuity exists between the virtual channel link segment from the modem to the DSL provider network (typically this is a DSLAM at the DSL provider site).
|
ATM OAM End-to-end Ping |
The modem transmits OAM F4/F5 (if you rerun the test with OAM F4, both F4 and F5 are sent, otherwise only F5 is sent) end to end loopback requests and expects a reply within 5 seconds. This test verifies ATM connectivity of the virtual channel link with the ATM PVC endpoint, such as a remote broadband access router located at the DSL provider or ISP site.
|
PPP server |
For PPPoA operating mode, the modem checks if PPP (LCP and IPCP) is connected to the remote PPP server. For PPPoE operating mode, this test verifies that the modem can detect a PPPoE server by checking if it can receive a PADO (PPPoE Active Discovery Offer) packet from a PPPoE server after sending a PADI (PPPoE Active Discovery Initiation) broadcast packet.
|
Authentication with ISP |
Verifies that the provided PPP username and password stored in the DSL modem have been authenticated by the PPP server within the ISP network.
|
Assigned IP address |
Verifies that the DSL modem has a valid IP address (here, a PPP WAN IP address) from the PPP server.
|
Ping default gateway |
|
Ping Primary Domain Name Server |
Verifies that the DSL modem can communicate with the primary domain name server (DNS).
|
The LAN Statistics screen shows the byte transfer, packet transfer, and error statistics for the Ethernet interface.
The WAN Statistics screen shows the byte transfer, packet transfer, and error statistics for the service settings.
ATM Layer Statistics over ADSL interface
Field | Description |
InOctets | Number of received octets over the interface. |
OutOctets | Number of transmitted octets over the interface. |
InErrors | Number of cells dropped due to uncorrectable HEC errors. |
InUnknown | Number of received cells discarded during cell header validation, including cells with unrecognized VPI/VCI values, and cells with invalid cell header patterns. If cells with undefined PTI values are discarded, they are also counted here. |
InHecErrors | Number of cells received with an ATM Cell header HEC error. |
InInvalidVpiVciErrors | Number of cells received with an unregistered VCC address. |
InPortNotEnabledErrors | Number of cells received on a port that has not been enabled. |
InPtiErrors | Number of cells received with an ATM header Payload Type Indicator (PTI) error. |
InIdleCells | Number of idle cells received. |
InCircuitTypeErrors | Number of cells received with an illegal circuit type. |
InOamRmCrcErrors | Number of OAM and RM cells received with CRC errors. |
InGfcErrors | Number of cells received with a non-zero GFC. |
ATM AAL5 Layer Statistics over ADSL Interface
Field | Description |
InOctets | Number of received AAL5/AAL0 CPCS PDU octets. |
OutOctets | Number of AAL5/AAL0 CPCS PDU octets transmitted. |
InUcastPkts | Number of received AAL5/AAL0 CPCS PDUs passed to a higher layer. |
OutUcastPkts | Number of AAL5/AAL0 CPCS PDUs received from a higher layer for transmission. |
InErrors | Number of AAL5/AAL0 CPCS PDUs received that contain an error. The types of errors counted include CRC-32 errors, SAR timeout errors, and oversized SDU errors. |
OutErrors | Number of AAL5/AAL0 CPCS PDUs that could not be transmitted due to errors. |
InDiscards | Number of AAL5/AAL0 CPCS PDUs discarded due to an input buffer overflow condition. |
OutDiscards | This field is not currently used. |
ATM AAL5 Layer Statistics for each VCC over ADSL Interface
Field | Description |
CrcErrors | Number of PDUs received with CRC-32 errors. |
SarTimeOuts | Number of partially reassembled PDUs which were discarded because they were not fully reassembled within the required time period. If the re-assembly timer is not supported, then this object contains a zero value |
OverSizedSDUs | Number of PDUs discarded because the corresponding SDU was too large. |
ShortPacketErrors | Number of PDUs discarded because the PDU length was less than the size of the AAL5 trailer. |
LengthErrors | Number of PDUs discarded because the PDU length did not match the length in the AAL5 trailer. |
Field | Description |
Mode | Modulation protocol G.DMT or T1.413 |
Type | Channel type Interleave or Fast |
Line Coding | Trellis coding off or on |
SNR Margin (dB) | Signal to Noise Ratio (SNR) margin |
Attenuation (dB) | Estimate of average loop attenuation in the downstream direction |
Status | Lists the status of the DSL link |
Output Power (dBm) | Total upstream output power |
Attainable downstream bit rate | Maximum achievable downstream rate |
Rate (Kbps) | The rate at which data is flowing. |
K | Number of data bytes in ADSL data frame (DMT symbol) |
S | Length of Reed-Solomon code word in data frames |
R | Number of redundant check bytes per Reed-Solomon code word |
D | Interleaver depth |
Super Frames | Total number of super frames |
Super Frame Errors | Number of super frames received with errors |
RS Words | Total number of Reed-Solomon code words |
RS Correctable Errors | Number of RS words with correctable errors |
RS Uncorrectable Errors | Number of RS words with uncorrectable errors |
HEC Errors | Total number of Header Error Checksum errors |
LCD Errors | Errors total number of Loss of Cell Delineation |
Within the ADSL Statistics window, a Bit Error Rate Test can be started using the ADSL BER Test button. The windows associated with this test include a start/configuration window, and in-process window and a results window.
The System Log screen allows you to view the system events log or to configure the System Log options.
The System Log feature allows you to enable or disable System Log options.
System Log - Configuration Options
Option | Description |
Log Status | Log Status indicates whether the system is currently recording events. The user can enable or disable event logging. By default, it is disabled. To enable it, click Enable and then Apply. |
Log Level |
Log Level allows you to configure the event level and filter out unwanted events below this level. The events ranging from the highest critical level "Emergency" down to this configured level will be recorded to the log buffer on the Wireless Gateway SDRAM. When the log buffer is full, the newer event will wrap up to the top of the log buffer and overwrite the old event. By default, the log level is "Debugging," which is the lowest critical level. The following log levels are:
Emergency is the most serious event level, whereas Debugging is the least important. For instance, if the log level is set to Debugging, all the events from the lowest Debugging level to the most critical level Emergency level will be recorded. If the log level is set to Error, only Error and the level above will be logged. |
Display Level | Display Level allows the user to select the logged events and display on the "View System Log" page for events of this level and above to the highest Emergency level. |
Mode | Mode allows you to specify whether events should be stored in the local memory or be sent to a remote syslog server, or both simultaneously. If "remote" mode is selected, view system log will not be able to display events saved in the remote syslog server. There are several types of syslog server software available for Windows and Linux operation systems. A free syslog server for Windows is Kiwi Syslog Daemon which can be obtained from www.kiwisyslog.com. When either Remote mode or Both mode is configured, the WUI will prompt the user to enter the Server IP address and Server UDP port. |
Server IP Address | Field that appears when Remote or Both is selected in the Mode field. |
Server UDP Port | Field that appears when Remote or Both is selected in the Mode field. Prompts the user to enter UDP port number of the SysLog server. A well known UDP port number, 514, is normally assigned to syslog. However, the user can overwrite with another UDP port number if a different UDP port is used by that particular syslog server. |