Friday 3 July 2015

There are only few PCs connected to ZyWALL 110, but the number of active sessions is almost at the limit.

Scenario

When I logged in to the device, I found that the number of active sessions was almost at the limit,






But when I go to the monitor page, only three client on the ZW110,



How to check where do these session come from?

Step

1.SSH/console access to device.
2. Use this CLI to dump the conntrack on the ZW
     Router> debug system show conntrack
3.Check the IP address to find out who keep create conntrack through ZW.
4.When you found which specific IP address keeps flooding the network, power off the PC and then monitor the ZW again.


We saw this kind of contrack kept showing in the ZyWALL

tcp      6 115 SYN_SENT src=10.10.10.23 dst=AA.AA.AA.AA sport=22372 dport=80 packets=1 bytes=985 [UNREPLIED] src=XX.XX.XX.XX dst=OO.OO.OO.OO sport=80 dport=22372 packets=0 bytes=0 mark=0 use=2
So we power off that PC (10.10.10.23) then the session on the ZW decrease from 79878 to 217 directly.

How to configure ownCloud for remote access via myZyXELcloud?

Scenario

How to configure ownCloud for remote access via myZyXELcloud?


Step

  • Topology


  • Install ownCloud and myZyXELcloud-Agent from the Package Management.
  • Log into the NAS by  using a  web browser



  • Select the administrator logo to  access advanced setting  of the ownCloud and myZyXELcloud-Agent package.



  • Click System Setting > Firmware/Packages > Package.
  • Click Retrieve List From Internet, select ownCloud and myZyXELcloud-Agent packages from the list. Click theInstall/Upgrade button.




  • After installing  myZyXELcloud-Agent, click Application > myZyXELcloud-Agent to configure an account.


  • Click the provided myZyXELcloud-Agent link to go to the myZyXELcloud-Agent login page. Enter your account information or use your  Facebook or Google account to log into the NSA520/540.

What is the effect of default user session limit in N-4100 (Hotspot) and how/when to adjust it?

Model Number: ZyXEL N-4100

Problem 

Sometimes network traffic drop constantly or even unable to access website while browsing, no matter from LAN or WLAN

Solution

It is caused by default user session limit of N4100, which is 128
You can adjust it according to your network utilization policy to match specific needs
Said symptom is that N4100 has running out of sessions, the ping ICMP packets will not get response from 8.8.8.8.
If similiar phenomenon happens, please adjust user session, it can ease the symptom





Procedure

The N4100 is at factory default setting
GW------------------N4100---------[Ethernet or WLAN]----------------PC
To browse websites and ping 8.8.8.8 at the same time, found ping lost very often while doing quick web browse
(switch website before page completely loading)
I can see ping loss and web page loading fail very often, sometimes the website will even become unavailable.
To ease the symptom you just need to idle the device for a moment




Sunday 31 May 2015

What is the procedure to implement VLANs in GS1910 Switch (firmware V2.00) ?

Understanding how to implement VLANs on GS1910

It’s easy to implement VLANs on GS1910, Go to Configuration > VLANs
Please refer the table below
The default VLAN setting is shown in table 1-1


  1. Port VLAN: This field indicates the port belong to which VLAN, also this feature is the sameas the PVID.
     
  2. Ingress Acceptance: This field indicates the ingress rule.      
    2.1 Tagged and Untagged: This rule means that the switch received the packets which are tagged and untagged.
    2.2 Tagged only: This rule means that the switch only received packet,  which is tagged.
    2.3 Untagged only: This rule means that the  switch only received packet, which is untagged.
     
  3. Egress tagging: This field indicates the Egress rule.
    3.1 Tagged all: This rule means that the packet is always tagged
    3.2 Untagged all: This rule means that the packet is always untagged
    3.3 Untagged port VLAN: This rule means that the packet will be untagged with the Port VLAN, but other VLANs will not be affected.
     
  4. Allowed VLANs: This field indicates that this port allows specific VLANs

Example1


Port 1 and 2, which is with PVID 10. Packets that are tagged and untagged will be received.
The Egress rule for Port 1 is “untag all” which means that all of the packet will be untagged.
The Egress rule for Port 2 is “tag all” which means that all of the packet will be tagged.
Both Port 1 and 2 allow VLAN 1,3,5-7 and forbid VLAN 2,4,8-10.

Setup the IP address for VLAN 10, Go to Configuration > System > IP

Scenario
PC A belongs to VLAN 10 on switch A,  and PC B belongs to VLAN 20 on switch A
PC C belongs to VLAN 10 on switch B and PC D belong to vlan 20 on switch B
PCA is able to communicate with PC C but not PC B and D.
PCB is able to communicate to PC D, but not PC A and PC C

The topology is below;

Both GS1910 have the same configuration.


Verification
PC A ping PC C

c:\>ping 10.10.10.2

Pinging 10.10.10.2 with 32 bytes of data:
Reply from 10.10.10.2: bytes=32 time=1ms TTL=64
Reply from 10.10.10.2: bytes=32 time<1ms TTL=64
Reply from 10.10.10.2: bytes=32 time<1ms TTL=64
Reply from 10.10.10.2: bytes=32 time<1ms TTL=64

PC B ping PC D
 
c:\>ping 10.10.20.2

Pinging 10.10.20.2 with 32 bytes of data:
Reply from 10.10.20.2: bytes=32 time=1ms TTL=64
Reply from 10.10.20.2: bytes=32 time<1ms TTL=64
Reply from 10.10.20.2: bytes=32 time<1ms TTL=64
Reply from 10.10.20.2: bytes=32 time<1ms TTL=64

To use the command “show mad address-table” to confirm that the MAC address is listed on the correct VLAN and port.
GS1910-1
GS1910-1# show mac address-table
Type    VID  MAC Address        Ports
Dynamic 10   0c:4d:e9:a4:ed:a4  GigabitEthernet 1/3
Dynamic 10   d8:50:e6:11:05:93  GigabitEthernet 1/1
Dynamic 20   00:23:54:2e:98:b9  GigabitEthernet 1/3
Dynamic 20   fc:4d:d4:35:5a:d2  GigabitEthernet 1/2

GS1910-2
GS1910-2# show mac address-table
Type    VID  MAC Address        Ports
Dynamic 10   0c:4d:e9:a4:ed:a4  GigabitEthernet 1/1
Dynamic 10   d8:50:e6:11:05:93  GigabitEthernet 1/3
Dynamic 20   00:23:54:2e:98:b9  GigabitEthernet 1/2
Dynamic 20   fc:4d:d4:35:5a:d2  GigabitEthernet 1/3

What is the procedure to block "Spotify" on ZyXEL USG-100 ?

SCENARIO DESCRIPTION:

Spotify is a popular software for music sharing in our country. In the USG's App-Patrol function, there is no related information to block Spotify. And on the USG20/20W we do not have App-Patrol,

What is the procdure to block Spotify?

SCENARIO DESCRIPTION:

Spotify is a popular software for music sharing in our country. In the USG's App-Patrol function, there is no related information to block Spotify. And on the USG20/20W we do not have App-Patrol,
What is the procdure to block Spotify?

Method 2. Create a custom IDP to block DNS query packet if this packet includes the Spotify signature.
The Spotify's software signature is "|73||70||6F||74||69||66||79|", please create a new IDP rule as shown below.

After create a custom IDP rule, please remember to modify the Activation, Log, Action settings in the profile tab.
Create a IDP policy then apply the IDP profile.

VERIFICATION:

When configuring the IP address of the USG as the DNS server, the Spotify software will get the 0.0.0.0 IP address as the Spotify URL. If you have configured a public DNS server, you will see the log message in the Monitor page.

Sunday 24 May 2015

WAN Load balancing on ZyXEL USG-60/ USG-60W

1.1 Application Scenario

The company has two WAN connections for sharing outbound internet traffic . WAN1 uses a static IP address, and WAN2 uses a PPPoE connection. Since WAN1 ISP is also the company's VOIP provider, the network administrator wants VoIP traffic primarily sent out over WAN1. In case WAN1 is down, the VoIP can still go out over WAN2 PPPoE connection. The network administrator also wants HTTP traffic sent over WAN2 PPPoE connection primarily. In case WAN2 PPPoE is down, LAN users can still surf internet over WAN1. For all other types of traffic, administrator needs the WAN connection to share the outbound traffic load, performing load balancing.


1.2 Configuration Guide

Goal to achieve:

1) VoIP traffic goes out primarily through WAN1. In case WAN1 is down, it will go out via WAN2 PPPoE connection.

2) HTTP traffic goes out primarily through WAN2 PPPoE connection. In case WAN2 PPPoE is down, it will go out via WAN1.

3) All other traffic goes out via WAN trunk performing Load balancing with Least Load Balancing algorithm.


USG configuration:
Step 1. Configure a PPPoE account on WAN2 interface.
          (1) Go to CONFIGURATION > Object > ISP Account, add a PPPoE account:


          (2) Go to CONFIGURATION > Network > Interface > PPP, add a new PPP interface, which is                 based on WAN2 interface,




Step-2: Go to CONFIGURATION > Network>Interface>Trunk. Add WAN Trunks.

            (1) Add WAN trunks for VoIP traffic - Set WAN1 as Active mode, while setting WAN_ppp                     as Passive mode.




                (2) Add WAN trunk for HTTP traffic- Set WAN2_ppp as Active mode, while setting                                 WAN1 as Passive mode.

       
                (3) Use SYSTEM_DEFAULT_WAN_TRUNK to perform load balancing for all other                               traffic.


Step-3. Go to CONFIGURATION > Network > Routing > Policy Route, add policy routes for VoIP               and HTTP traffic.

(1) Add a policy route for VoIP traffic:

Source: LAN1_subnet
Destination: Any
Service: SIP
Next Hop: select the newly created WAN trunk WAN_Trunk_VoIP
     

Please note that to make sure this policy route applies to all VoIP traffic, including both the SIP signaling and RTP (voice data), we need to enable SIP ALG.

Go to CONFIGURATION > Network > ALG, enable SIP ALG.



(2)  Add a policy route for HTTP traffic:

Source: LAN1_subnet
Destination: Any
Service: HTTP
Next Hop: select the newly created WAN trunk WAN_Trunk_HTTP.


(3) For all other traffic, use SYSTEM_DEFAULT_WAN_TRUNK to perform load balancing. Go to CONFIGURATION >Network> Interface >Trunk. Click on Show Advance Settings.


Make sure Default SNAT is enabled. Select SYSTEM_DEFAULT_WAN_TRUNK in Default Selection.



General Wireless FaQ............................


What is a Wireless LAN?

Wireless LANs provide all the functionality of wired LANs, without the need for physical connections (wires). Data is modulated onto a radio frequency carrier and transmitted through the ether. Typical bit-rates are 11Mbps and 54Mbps, although in practice data throughput is half of this. Wireless LANs can be formed simply by equipping PC's with wireless NICs. If connectivity to a wired LAN is required an Access Point (AP) is used as a bridging device. AP's are typically located close to the centre of the wireless client population.

What are the advantages of Wireless LAN? 

Mobility: Wireless LAN systems can provide LAN users with access to real-time information anywhere in their organization. This mobility supports productivity and service opportunities not possible with wired networks.

Installation Speed and Simplicity: Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings.

Installation Flexibility: Wireless technology allows the network to go where wire cannot go. Reduced Cost-of-Ownership: While the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring frequent moves and changes.

Scalability: Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area.

What is the disadvantage of Wireless LAN? 

The speed of Wireless LAN is still relatively slower than wired LAN. The setup cost of Wireless LAN is relative high because the equipment cost including access point and PCMCIA Wireless LAN card is higher than hubs and CAT 5 cables.


What is an Access Point? 

The AP (access point also known as a base station) is the wireless server that with an antenna and a wired Ethernet connection that broadcasts information using radio signals. AP typically acts as a bridge for the clients. It can pass information to wireless LAN cards that have been installed in computers or laptops allowing those computers to connect to the campus network and the Internet without wires.

Is it possible to use wireless products from a variety of vendors? 

Yes. As long as the products comply with the same IEEE 802.11 standard. The Wi-Fi logo is used to define 802.11b compatible products. Wi-Fi5 is a compatibility standard for 802.11a products running in the 5GHz band.

What is Wi-Fi? 

The Wi-Fi logo signifies that a product is interoperable with wireless networking equipment from other vendors. A Wi-Fi logo product has been tested and certified by the Wireless Ethernet Compatibility Alliance (WECA). The Socket Wireless LAN Card is Wi-Fi certified, and that means that it will work (interoperate) with any brand of Access Point that is also Wi-Fi certified.

What types of devices use the 2.4GHz Band? 

Various spread spectrum radio communication applications use the 2.4 GHz band. This includes WLAN systems (not necessarily of the type IEEE 802.11b), cordless phones, wireless medical telemetry equipment and Bluetooth™ short-range wireless applications, which include connecting printers to computers and connecting modems or hands-free kits to mobile phones.

Does the 802.11 interfere with Bluetooth device? 

Any time devices are operated in the same frequency band; there is the potential for interference. Both the 802.11b/g and Bluetooth devices occupy the same2.4-to-2.483-GHz unlicensed frequency range-the same band. But a Bluetooth device would not interfere with other 802.11 devices much more than another 802.11 device would interfere. While more collisions are possible with the introduction of a Bluetooth device, they are also possible with the introduction of another 802.11 device, or a new 2.4 GHz cordless phone for that matter. But, Bluetooth devices are usually low-power, so the effects that a Bluetooth device may have on an 802.11 network, if any, aren't far-reaching.

Can radio signals pass through wall? 

Transmitting through a wall is possible depending upon the material used in its construction. In general, metals and substances with high water content do not allow radio waves to pass through. Metals reflect radio waves and concrete attenuates radio waves. The amount of attenuation suffered in passing through concrete will be a function of its thickness and amount of metal re-enforcement used.

What are potential factors that may causes interference among WLAN products?

Factors of interference:
(1) Obstacles: walls, ceilings, furniture… etc.
(2) Building Materials: metal door, aluminum studs.
(3) Electrical devices: microwaves, monitors, electric motors.

Solution:
(1) Minimizing the number of walls and ceilings
(2) Antenna is positioned for best reception
(3) Keep WLAN products away from electrical devices, eg: microwaves, monitors, electric motors,…, etc.
(4) Add additional APs if necessary.

What's the difference between a WLAN and a WWAN? 

WLANs are generally privately owned, wireless systems that are deployed in a corporation, warehouse, hospital, or educational campus setting. Data rates are high and there are no per-packet charges for data transmission. WWANs are generally publicly shared data networks designed to provide coverage in metropolitan areas and along traffic corridors. WWANs are owned by a service provider or carrier. Data rates are low and charges are based on usage. Specialized applications are characteristically designed around short, burst messaging.

What is Ad Hoc mode? 

A wireless network consists of a number of stations without using an access point or any connection to a wired network.

What is Infrastructure mode? 

Infrastructure mode implies connectivity to a wired communications infrastructure. If such connectivity is required the Access Points must be used to connect to the wired LAN backbone. Wireless clients have their configurations set for "infrastructure mode" in order to utilize access points relaying.

How many Access Points are required in a given area? 

This depends on the surrounding terrain, the diameter of the client population, and the number of clients. If an area is large with dispersed pockets of populations then extension points can be used for extend coverage.

What is Direct-Sequence Spread Spectrum Technology – (DSSS)? 

DSSS spreads its signal continuously over a wide frequency band. DSSS maps the information bearing bit-pattern at the sending station into a higher data rate bit sequence using a "chipping" code. The chipping code (also known as processing gain) introduces redundancy which allows data recovery if certain bit errors occur during transmission. The FCC rules the minimum processing gain should be 10, typical systems use processing gains of 20. IEEE 802.11b specifies the use of DSSS.


What is Frequency-hopping Spread Spectrum Technology – (FHSS)? 

FHSS uses a narrowband carrier which hops through a predefined sequence of several frequencies at a specific rate. This avoids problems with fixed channel narrowband noise and simple jamming. Both transmitter and receiver must have their hopping sequences synchronized to create the effect of a single "logical channel". To an unsynchronized receiver an FHSS transmission appears to be short-duration impulse noise. 802.11 may use FHSS or DSSS.

Do I need the same kind of antenna on both sides of a link? 

No. Provided the antenna is optimally designed for 2.4GHz or 5GHz operation. WLAN NICs often include an internal antenna which may provide sufficient reception.


Why the 2.4 GHZ Frequency range? 

This frequency range has been set aside by the FCC, and is generally labeled the ISM band. A few years ago Apple and several other large corporations requested that the FCC allow the development of wireless networks within this frequency range. What we have today is a protocol and system that allows for unlicensed use of radios within a prescribed power level. The ISM band is populated by Industrial, Scientific and Medical devices that are all low power devices, but can interfere with each other.

What is Server Set ID (SSID)? 

SSID is a configurable identification that allows clients to communicate to the appropriate base station. With proper configuration, only clients that are configured with the same SSID can communicate with base stations having the same SSID. SSID from a security point of view acts as a simple single shared password between base stations and clients.


What is an ESSID? 

ESSID stands for Extended Service Set Identifier and identifies the wireless LAN. The ESSID of the mobile device must match the ESSID of the AP to communicate with the AP. The ESSID is a 32-character maximum string and is case-sensitive.

What is WEP? 

Wired Equivalent Privacy. WEP is a security mechanism defined within the 802.11 standard and designed to make the security of the wireless medium equal to that of a cable (wire). WEP data encryption was designed to prevent access to the network by "intruders" and to prevent the capture of wireless LAN traffic through eavesdropping. WEP allows the administrator to define a set of respective "Keys" for each wireless network user based on a "Key String" passed through the WEP encryption algorithm. Access is denied by anyone who does not have an assigned key. Note, WEP has shown to have fundamental flaws in its key generation processing.

What is WPA-PSK?

WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) can be used if user do not have a Radius server but still want to benefit from it. Because WPA-PSK only requires a single password to be entered on wireless AP/gateway and wireless client. As long as the passwords match, a client will be granted access to the WLAN.

What is a WEP key? 

A WEP key is a user defined string of characters used to encrypt and decrypt data.

Will 128-bit WEP communicate with 64-bit WEP? 

No. 128-bit WEP will not communicate with 64-bit WEP. Although 128 bit WEP also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users need to use the same encryption level in order to make a connection.


FaQ.......ZyXEL AMG1202-T10B/AMG1302-T10B

How do I access the AMG1202-T10B/AMG1302-T10B Command Line Interface (CLI)? 

The Command Line Interface is for the Administrator use only, and it could be accessed via telnet session. Note: It is protected by super password, ‘1234’ by factory default.

How do I update the firmware and configuration file? 

You can do this via accessing web GUI of AMG1202-T10B/AMG1302-T10B as Administrator. Firmware update function is under Maintanance -> Firmware Upgrade. Configuration update function is under Maintanance -> Backup/Restore.

What should I do if I forget the system password?

 In case you forget the system password, you can erase the current configuration and restore factory defaults this way:Use the RESET button on the rear panel of AMG1202-T10B/AMG1302-T10B to reset the router. After the router is reset, the LAN IP address will be reset to '192.168.1.1', the common user password will be reset to '1234', and the Administrator password will be reset to ‘1234’.

How to use the Reset button? 

a. Turn your AMG1202-T10B/AMG1302-T10Bon. Make sure the POWER led is on (not blinking) b. Press the RESET button for longer than one second and shorter than five seconds and release it. c. Press the RESET button for six seconds and then release it. If the POWER LED begins to blink, the default configuration has been restored and the AMG1202-T10B/AMG1302-T10B restarts.

What is SUA? 

When should I use SUA? SUA (Single User Account) is a unique feature supported by Prestige router which allows multiple people to access Internet concurrently for the cost of a single user account. When Prestige acting as SUA receives a packet from a local client destined for the outside Internet, it replaces the source address in the IP packet header with its own address and the source port in the TCP or UDP header with another value chosen out of a local pool. It then recomputed the appropriate header checksums and forwards the packet to the Internet as if it is originated from Prestige using the IP address assigned by ISP. When reply packets from the external Internet are received by Prestige, the original IP source address and TCP/UDP source port numbers are written into the destination fields of the packet (since it is now moving in the opposite direction), the checksums are recomputed, and the packet is delivered to its true destination. This is because SUA keeps a table of the IP addresses and port numbers of the local systems currently using it.

 Is it possible to access a server running behind SUA from the outside Internet? 

How can I do it? Yes, it is possible because AMG1202-T10B/AMG1302-T10B delivers the packet to the local server by looking up to a SUA server table. Therefore, to make a local server accessible to the outside users, the port number and the inside IP address of the server must be configured. (You can configure it in Web Configurator, Advanced Setup, Network Setting-> NAT -> Port Forwarding).


What IP/Port mapping does Multi-NAT support?

 Multi-NAT supports five types of IP/port mapping: One to One, Many to One, Many to Many Overload, Many to Many No Overload and Server. The details of the mapping between ILA and IGA are described as below. Here we define the local IP addresses as the Internal Local Addresses (ILA) and the global IP addresses as the Inside Global Address (IGA),

 One to One: In One-to-One mode, the AMG1202-T10B/AMG1302-T10B maps one ILA to one IGA.
 Many to One: In Many-to-One mode, the AMG1202-T10B/AMG1302-T10B maps multiple ILA to one IGA. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature (the SUA is optional in today's Prestige routers).
 Many to Many Overload: In Many-to-Many Overload mode, the AMG1202-T10B/AMG1302-T10B maps the multiple ILA to shared IGA.
 Many One-to-One: In Many One-to-One mode, the AMG1202-T10B/AMG1302-T10B maps each ILA to unique IGA.
  Server: In Server mode, the AMG1202-T10B/AMG1302-T10B maps multiple inside servers to one global IP address. This allows us to specify multiple servers of different types behind the NAT for outside access. Note; if you want to map each server to one unique IGA please use the One-to-One mode.

How many network users can the SUA/NAT support?

 The Prestige does not limit the number of the users but the number of the sessions. The AMG1202-T10B/AMG1302-T10B supports 8192 sessions.

What are Device filters and Protocol filters? 

The filters have been separated into two groups. One group is called 'device filter group', and the other is called 'protocol filter group'. Generic filters belong to the 'device filter group', TCP/IP and IPX filters belong to the 'protocol filter group'. You can configure the filter rule in CLI.


How can I protect against IP spoofing attacks? 

The AMG1202-T10B/AMG1302-T10B’s filter sets provide a means to protect against IP spoofing attacks. The basic scheme is as follows: For the input data filter:

 Deny packets from the outside that claim to be from the inside
 Allow everything that is not spoofing us Filter rule setup:
 Filter type =TCP/IP Filter Rule
 Active =Yes
 Source IP Addr =a.b.c.d
 Source IP Mask =w.x.y.z
 Action Matched =Drop
 Action Not Matched =Forward Where a.b.c.d is an IP address on your local network and w.x.y.z is your netmask: For the output data filters:
 Deny bounce back packet
 Allow packets that originate from us Filter rule setup:
 Filter Type =TCP/IP Filter Rule  Active =Yes
 Destination IP Addr =a.b.c.d  Destination IP Mask =w.x.y.z
 Action Matched =Drop  Action Not Matched =Forward Where a.b.c.d is an IP address on your local network and w.x.y.z is your netmask.

What is the default password for Web Configurator? 

There are two different accounts for AMG1202-T10B/AMG1302-T10B Web Configurator: Common User Account and Administrator Account. By factory default the password for the two accounts are:  Common User Account: 1234
 Administrator Account: 1234. You can change the password after you logging in the Web Configurator.
Please record your new password whenever you change it. The system will lock you out if you have forgotten your password.


How do I know the AMG1202-T10B/AMG1302-T10B’s WAN IP address assigned by the ISP? 

You can view "My WAN IP : x.x.x.x" shown in Web Configurator ‘Status->Device Information ->WAN Information’ to check this IP address.


The AMG1202-T10B/AMG1302-T10B supports Bridge and Router mode, what's the difference between them? 

When the ISP limits some specific computers to access Internet, that means only the traffic to/from these computers will be forwarded and the other will be filtered. In this case, we use bridge mode which works as an ADSL modem to connect to the ISP. The ISP will generally give one Internet account and limit only one computer to access the Internet. For most Internet users having multiple computers want to share an Internet account for Internet access, they have to add another Internet sharing device, like a router. In this case, we use the router mode which works as a general Router plus an ADSL Modem.


How do I know I am using PPPoE? 

PPPoE requires a user account to login to the provider's server. If you need to configure a user name and password on your computer to connect to the ISP you are probably using PPPoE. If you are simply connected to the Internet when you turn on your computer, you probably are not. You can also check your ISP or the information sheet given by the ISP. Please choose PPPoE as the encapsulation type in the AMG1202-T10B/AMG1302-T10B if the ISP uses PPPoE.

When do I need DDNS service? 

When you want your internal server to be accessed by using DNS name rather than using the dynamic IP address, we can use the DDNS service. The DDNS server allows to alias a dynamic IP address to a static hostname. Whenever the ISP assigns you a new IP, the AMG1202-T10B/AMG1302-T10B sends this IP to the DDNS server for its updates.

 What is content filter?

Internet Content filter allows you to create and enforce Internet access policies tailored to your needs. Content filter gives you the ability to block web sites that contain key words (that you specify) in the URL. You can set a schedule for when the AMG1302-T10B /AMG1202-T10B performs content filtering. You can also specify trusted IP Addresses on LAN for which the AMG1302-T10B /AMG1202-T10B will not perform content filtering. You can configure the details about it in Web Configurator, Advanced setup, Security -> Filter.


How does the AMG1302-T10B /AMG1202-T10B work on a noisy ADSL?

 Depending on the line quality, the AMG1302-T10B /AMG1202-T10B uses "Fall Back" and "Fall Forward" to automatically adjust the date rate.

Does the VC-based multiplexing perform better than the LLC-based multiplexing? 

Though the LLC-based multiplexing can carry multiple protocols over a single VC, it requires extra header information to identify the protocol being carried on the virtual circuit (VC). The VC-based multiplexing needs a separate VC for carrying each protocol but it does not need the extra headers. Therefore, the VC-based multiplexing is more efficient.

What makes AMG1302-T10B /AMG1202-T10B secure? 

The AMG1302-T10B/AMG1202-T10B is pre-configured to automatically detect and thwart Denial of Service (DoS) attacks such as Ping of Death, SYN Flood, LAND attack, IP Spoofing, etc. It also uses stateful packet inspection to determine if an inbound connection is allowed through the firewall to the private LAN. The AMG1302-T10B /AMG1202-T10B supports Network Address Translation (NAT), which translates the private local addresses to one or multiple public addresses. This adds a level of security since the clients on the private LAN are invisible to the Internet.

Why can't I upload the firmware and configuration file using FTP over WAN?

(1) When the firewall is turned on, all connections from WAN to LAN are blocked by the default ACL rule. To enable FTP from WAN, you must turn the firewall off or create a firewall rule to allow FTP connection from WAN. The WAN-to-LAN ACL summary will look like as shown below.

Source IP= FTP host
Destination IP= AMG1302-T10B/AMG1202-T10B’s WAN IP 
Service= FTP TCP/21, TCP/20
Action=Forward

(2) You have disabled FTP service in Web Configurator, Advanced setup, Maintenance -> RemoteMGNT.
(3) FTP service is enabled but your host IP is not the secured host entered in Web Configurator, Advanced setup, Maintenance -> RemoteMGNT.
(4) A filter set which blocks FTP from WAN is applied to WAN node.

How do I view the firewall log?

All logs generated in AMG1302-T10B/AMG1202-T10B, including firewall logs, IPSec logs, system logs are migrated to centralized logs. So you can view firewall logs in Centralized logs: Web Configurator, Advanced setup, Maintenance -> Logs ->View Log.

The log keeps 128 entries; the new entries will overwrite the old entries when the log has over 128 entries.

Before you can view firewall logs there are two steps you need to do:
(1) Enable log function in Centralized logs setup via either one of the following methods,  Web configuration: Advanced Setup, Maintenance -> Logs -> Log Settings, check Access Control and Attacks options depending on your real situation.

(2) Enable log function in firewall default policy or in firewall rules.

After the above two steps, you can view firewall logs via  Web Configurator: Advanced setup, Maintenance -> Logs ->View Log.

You can also view Centralized logs via mail or syslog, please configure mail server or Unix Syslog server in Web configuration: Advanced Setup, Maintenance -> Logs -> Log Settings.


What are potential factors that may causes interference among WLAN products? 

Factors of interference:
(1) Obstacles: walls, ceilings, furniture… etc.
 (2) Building Materials: metal door, aluminum studs.
(3) Electrical devices: microwaves, monitors, electric motors.

Solution:
(1) Minimizing the number of walls and ceilings
(2) Antenna is positioned for best reception
(3) Keep WLAN products away from electrical devices, eg: microwaves, monitors, electric motors,…, etc.
(4) Add additional APs if necessary.


What wireless security mode does AMG1302-T10B /AMG1202-T10B support? 

The wireless security modes supported on AMG1302-T10B/AMG1202-T10B are: Static WEP, WPA-PSK, WPA, WPA2-PSK, and WPAPSKMixed.