IAD (DV-2010) : USER Manual
IAD (DV-2010) : USER Manual
IAD (DV-2010) : USER Manual
IAD (DV-2010)
USER Manual
COPYRIGHT
This manual is proprietary to DAVOLINK Co., Ltd. and is protected by copyright. No information contained herein may be copied, translated, transcribed or duplicated for any commercial purposes or disclosed to third parties in any form without the prior written consent of DAVOLINK Co., Ltd.
TRADEMARKS
Product names mentioned in this document may be trademarks and/or registered trademarks of their respective companies.
This manual should be read before the installation and operation, and the operator should correctly install and operate the product by using this manual.
This manual may be changed for the system improvement, standardization and other technical reasons without prior notice. For further information on the updated manual or have a question the content of manual, contact Document Center at the address below . Address : 1591-9, Anyang K-Center, Burim-dong, Dongan-gu, Anyang-si, Gyeonggi-do, Korea e-mail : kubs15@davolink.co.kr
Or contact Call Center at the telephone below if you have any questions or concerns regarding the operation of your system. Phone : 81-31-387-3240. ext 206
htDV-2010://www.davolink.com
SAFETY CONCERNS
Introduction
This document is User Manual of DV-2010S IAD. This manual describes how to operate and maintain the DV-2010 (Integration Access Device).
Structure
This document is composed of three chapters as follows :
Chapter 1. Introduction
System feature is outlined. Hardware specification and Software specification (i.e., interface type, service diagram, H/W function and S/W function) are in the DV-2010.
Chapter 2. Installation
It is a procedure for installation of DV-2010. It shows how to connect each cable to proper port of IAD. This chapter describes how to read the front LED for system status as well.
Chapter 4. Maintenance
Methods of checking and Maintain the service in the DV-2010 are described in this chapter.
Page
Conventions
For product safety and correct operation, the following information must be given to the operator/user and shall be read before the installation and operation. This information may be set-off from the surrounding text, but is always preceded by a bold title in capital letters.
WARNING Indicate a potentially hazardous situation which if not avoided, could result in death or serious injury.
CAUTION Indicate a potentially hazardous situation which if not avoided, may result in minor or moderate injury. It may also be used to alert against unsafe practices and give a general caution
Revision History
EDITION DATE OF ISSUE April, .2005 REMARKS
SAFETY CONCERNS
For product safety and correct operation, the following information must be given to the operator/user and shall be read before the installation and operation.
Symbols
Caution Indication of a general caution
Page 1
TABLE OF CONTENTS
INTRODUCTION Introduction ............................................................................................................... 1 Structure .................................................................................................................... 1 Conventions ............................................................................................................... 2 Revision History ........................................................................................................ 2 Symbols ..................................................................................................................... 3 CHAPTER 1. INTRODUCTION 1 System Overview .............................................................................................................. 3 1.1 DV-2010 Overview ..................................................................................................... 3 1.1.1 System Feature ......................................................................................................... 3 1.2 System Specification.................................................................................................... 4 1.2.1 Basic Specification ................................................................................................... 4 1.2.2 Operation Environment Conditions ........................................................................... 4 Software Features .............................................................................................................. 5 2.1 IP fucntion ................................................................................................................... 5 2.2 Qos Functions.............................................................................................................. 5 2.3 Voice Functions ........................................................................................................... 5 2.4 DSL Interface .............................................................................................................. 5 2.5 WLAN Interface .......................................................................................................... 6 2.6 Security Functions ....................................................................................................... 6 2.7 Management Function ................................................................................................. 6
CHAPTER 2. INSTALLATION 1 Installation ........................................................................................................................ 7 1.1 Hardware Installation ................................................................................................... 7 1.1.1 Before Start .............................................................................................................. 7 1.1.2 Safety Recommendations .......................................................................................... 7 1.2 Hardware Installation Procedure .................................................................................. 8 1.2.1 DV-2010 Installation steps.............................................................................. 8 1.3 Cable connection ......................................................................................................... 9 1.3.1 Connecting Ethernet cable ............................................................................... 10 1.3.2 FXS port.......................................................................................................... 11 1.3.3 ADSL port....................................................................................................... 12 1.3.4 Cable Length ................................................................................................... 12 LED Status ...................................................................................................................... 13
CHAPTER 3. CONFIGURATION
Basic configuration.......................................................................................................... 15 1.1 IP configuration on PC............................................................................................... 15 1.2 Connect to IAD through WEB ................................................................................... 20 1.2.1 Device information .......................................................................................... 22 Advanced Setup .............................................................................................................. 23 2.1 NAT (Network Address Translation) ......................................................................... 23 2.1.1 Virtual Servers ................................................................................................ 23 2.1.2 Port Triggering ................................................................................................ 24 2.1.3 DMZ Hosting .................................................................................................. 27 2.2 Security ..................................................................................................................... 28 2.2.1 IP Filtering ................................................................................................ 29 2.2.2 Parental Control ..................... ! . Wireless Configuration .................................................................................................... 30 3.1 Wireless Basic ........................................................................................................... 30 3.2 Security ..................................................................................................................... 31 3.3 Access Control using MAC Filter ..................................................................... 34 3.4 Wireless Advanced ........................................................................................... 35 3.5 Station Info ....................................................................................................... 37 3.6 Wireless environment ....................................................................................... 37
CHAPTER 1. INTRODUCTION
1 System Overview
DV-2010 is a kind of Home gateway for Triple Play service at home and SOHO environment. This device works like a central gateway for all the service enabling devices such as the VOIP, Internet and IP-TV functions. The IAD is a doorway where all services find their outlet to the service platforms, such as Internet Access concentrator, Call Switch and Media Farm.
Power
DC +12V/1.2A
Humidity
Software Features
2.1 IP Function
Bridge Function PPPOE(LLC/SNAP) DHCP(Client, Server) IPCP Static IP Routing IP Filtering / MAC Filtering ICMP Proxy DNS UPnP SNMP (Agent & Tool) IGMP Proxy NAPT ALG (Application Layer Gateway)
MGCP(RFC3435) G.711a/u-law, G.729A, G.723.1 Echo cancellation : G.165, G.168 Fax Relay : Bypass fax and T.38 DTMF Relay : Bypass, RFC2833 Call Progress Tone Generation VoIP/PSTN selective or Prefix Dialing, Emergency call routing etc. Emergency call transfer (Power fail, CA connection fail etc.) IVR for announcement of system and call status
CHAPTER 2. INSTALLATION
1 Installation
Welcome to the DV-2010 which is based on Residential Gateway with integrated VoIP terminal and ADSL modem, router, firewall, and 54g AP (Access Point) all in one compact hardware and firmware platform. This section contains instructions that would allow you to configure user security setting and pleasant wireless setting quickly. DV-2010 works like PnP (Plug & Play) in order to get rid of complex setting for user convenience. Auto provisioning and Auto Software upgrade functions are enabled on DV-2010. IAD downloads all user specific setting as soon as it connects to the high-speed ADSL line,
(7) Check the electric quality, especially when the device is located by a big motor (8) Be sure all ventilation chambers are not obstructed at all times. (8) Do not put on heavy equipment and machinery on the system. (9) Keep away from IAD at least 5cm in normal condition.
Instruction Read the manual before you connect the system to its power source
CAUTION Connect the TEL port to a telephone only, never to a telephone wall jack
. NOTE The telephone must be switched to tone setting (not pulse) for the DV-2010 to operate properly.
Step 4. Connect a straight-through Ethernet cable from your PC and STB to the 10/100 PC RJ-45 LAN port and STB ports on DV-2010.
CAUTION LAN port 1 and 2 are only dedicated for STB. So do not connect PC to these ports. PC can only connect to LAN 3 and 4 port for the Internet.
Step 5.
Insert the power adaptor cable into the power connector on the DV-2010.
Step 6. Connect the plug end of the 12V DC power adaptor cord into an electrical power outlet. Step 7. When the DV-2010 is properly connected and powered up, the green power (PWD) lights and the green status (STS) LED flashes to indicate that DV-2010 is in initial processing.
CAUTION Do not cover or block the air vents on either the top or the bottom surface of DV2010 when IAD is in horizontal location. Overheating can cause permanent damage to the IAD . NOTE Power LED and INET LED are orange color blinking at the same time when IAD is on software downloading process.
Instruction LAD 1,2 port is dedicated for STB. Dont connect PC to these ports. PC cant get any IP address from IAD if PC is connected to STB port.
because DV-2010 supports Auto MDI-X function on LAN port. Maximum length of RJ-45 should be less than 85m.
P C P o rt 1 2 3 4 5 6 7 8
1 2 3 6
: : : :
Rx + Rx Tx + Tx -
connect
RJ-45 Plug (PC Port) Pin Signal 1 TX+ 2 TX3 RX+ 4 NC 5 NC 6 RX7 NC 8 NC
Connect Pin 1 2 3 4 5 6
Connect Pin 1 2 3 4 5 6
Pin 1 2 3 4 5 6
1 ) Ethernet Maximum length of 10/100BaseT Ethernet is 330 feets/100 meters. (complies with IEEE802.3 Recommendation) 2 ) Analog line Maximum length of analog line is defined by loop resistance. Maximum loop resistance is up to 600 (included telephone/voice switch).
LED Status
When LED
OFF Solid Red Flashing Orange Blink per 0.1 sec
DV-2010 comes up, you can judge the operation status of system by LED status. State
ON (Green)
PWR
Description When power is present, When power is not present or fatal error POST failure or device malfunction Updating S/W image
Running system, not starting VoIP service yet Start VoIP service, not registered yet Registered to VoIP Server and can make VoIP call In Sync with DSL line Modem power off Attempting to sync with DSL line DSL connection failure DSL is up and get IP address per PVC Modem power off or ADSL link down Provision is completed and Data traffic is going through Provision is completed but there is a PVC not allocated IP address. Traffic is on the available PVC. Updating S/W image Provision is not completed OFF-Hook phase ON-Hook phase Ethernet connection is established Data is transmitting or receiving data USB is connected to a host PC Data is being transferred over the USB connection Wireless Access Point(AP) is enabled Data is being transferred over the WLAN connection
STS
Blink per 1 sec 3 sec ON, 1 sec OFF Solid Green OFF Blink per 0.1 sec Solid Red Solid Green OFF Blinking Green
ADSL
INET
Blinking Orange Solid Red
If there is no LED light, check the power cable connection. Device will be restarted when you push the Init button at the rear of DV-2010. - Power LED will be OFF When you keep pushing init button about 2~3 sec, It will reload Factory default value.
Power LED and PPP LED will be ON concurrently. Power LED and INET LED are orange blinking at the same time during S/W updating IAD booting time (all services up) : approximately one minute. IAD configuration file download time: approximately 2 seconds. IAD software image file download time: approximately 10 minute. IAD software image file burning time: approximately 2 minutes.
CHAPTER 3. CONFIGURATION
1 Basic configuration
After installing system as like service network diagram 1, you should have to assigne IP address on the connected PC between 192.168.1.2 and 192.168.1.253 to access the DV-2010 using Web browser. But DHCP Server is enabled by default on IAD so user does not need to set IP address on PC manually.
1.1 IP configuration on PC
DV-2010 supports DHCP server function to assign private IP to PCs. User can assign an IP address manually as like 192.168.1.XXX. The default LAN IP address is 192.168.1.1 1. Open Control Panel and double click Network and Dial-up connection icon.
3.
5. Select IP address automatically and DNS address automatically in internet protocol attribute window.
If you want to get a dynamic IP address from DV-2010, Click the obtain an IP address automatically. Otherwise you should select the Use the following IP address when you want to set an static IP on your computer.
Instruction Do not assign the first 4 IP addresses for PC. The first four IP addresses are dedicated for STB.
6. Click OK button in internet protocol attribute window and then close all windows opened.
NOTE Windows XP and 2000 do not need to restart PC for reloading the new IP address. Other Windows OS have to restart for activation the changes.
7. Open COMMAND PROMPT window and Execute ipconfig command to make sure that your PC is assigned IP address, subnet mask and default gateway value.
Remember the IP Address value should be in 192.168.1.2~ 192.168.1.254, subnet mask should be 255.255.255.0, and Default Gateway should be 192.168.1.1
8. From windows system, go to run. Type in command. From Command Prompt screen, typ e ping 192.168.1.1 and press Enter. If the following message is displayed, your computer is properly connected to the PC port of DV-2010. [c:\]ping 192.168.1.1 Pinging 192.168.1.1 with 32 bytes of data: Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Reply from 192.168.1.1: bytes=32 time<1ms TTL=255 Ping statistics for 192.168.1.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 1ms, Maximum = 3ms, Average = 2ms [c:\]
Instruction Before accessing Web Manager, verify the state of the DV-2010 LED is blinking properly. This indicates that the DV-2010 is ready to be configured
1. In order to configure this device, you should understand port forwarding, DMZ and port triggering. If you dont understand properly, contact service center. 2. Open a new Web browser window and enter the DV-2010s IP address, Enter ht DV2010://192.168.1.1 for the URL At this point, the PC should present an authentication window similar to this one
user
Instruction User can change this default password using management menu on the WEB UI (User Interface)
You can change the LAN IP address of IAD. IAD is enabled DHCP server by default to give IP addresses to its Host network devices from the next IP address you set on LAN interface. User can not disable DHCP server function for STB. The leased IP address from DHCP server will be refreshed after the leased time. Click on the Next button to setup Wireless LAN.
2 Advanced Setup
There are many advanced router features and Internet Telephony features supported by the DV-2010. These features are documented in this section, and include: 1. Various NAT Function(Virtual Servers, Port Triggering, DMZ Host) 2. Security(LAN IP address, port number filtering, Parental Control)
Virtual Server allows you to direct incoming traffic from WAN side (identified by Protocol and External port) to internal server which has a private IP address on the LAN side. The Internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side. A maximum 32 entries can be configured. Click on the Add button to configure virtual server.
There are many famous service names on the Service list. Select a service name, and enter the local IP address and click "Save/Apply" to forward IP packets for this service to the specified server. If there is no matched service name on the list, set service name at the custom server and put the service specific port number at the below column. After clicking on the save/apply button, the virtual server list will be come up.
Click on the Add button to set up port triggering. A maximum 32 entries can be configured. Some applications such as games, video conferencing, remote access applications and others require that specific ports in the Router's firewall be opened for access by the applications. You can configure the port settings from this screen by selecting an existing application or creating your own (Custom application)and click "Save/Apply" to add it. Port Triggering should be set up for commonly used special applications requiring bidirectional communications on specific port numbers in order to operate correctly. One of the most common applications that require this is video conferencing applications that require separate IP ports for video and audio transmissions to management servers in the public (WAN) network.
Above is an example setup that allows a special application to communicate with any PC on the Private LAN that tries to first connect with outgoing port numbers in the range of 1024 through 5180 and consequently triggers an opening of ports 1024 through 58,600 for bi-directional traffic for both TCP and UDP. This operation can only be effective for a single PC at a time, but can be used for any PC at a later time after the trigger times out. This is a very effective method for allowing various users on the Private LAN to use a common application at different times without the security risk of leaving IP ports open all the time and the directed PCs unprotected.
You may configure one PC to be the DMZ host. This setting is generally used for PCs using problem applications that use random port numbers and do not function correctly with specific port triggers or port forwarding setups mentioned earlier. If a specific PC is set as a DMZ Host, remember to set this back to 0 when finished with the needed application, since this PC will be effectively exposed to the public Internet, though still protected from Denial of Service (DoS) attacks via the Firewall. Enter the computer's IP address and click "Apply" to activate the DMZ host. Clear the IP address field and click "Apply" to deactivate the DMZ host.
With some problem applications (using random port numbers that may be undefined), the user may have to DMZ the Specific Host PC in order to get the application to work correctly. This allows a guarantee that any application can work behind the firewall/NAT application in the DV-2010.
In the example above, the PC with the IP address 192.168.1.8 has all of its IP Ports exposed to the WAN just as a PC on a bridging data mode would. However, the firewall is still activated here for specific DoS attacks, etc.
2.2 Security
The Web Filter page has various settings related to blocking or exclusively allowing different
types of data through the DV-2010 from the WAN to the LAN.
2.2.1 IP Filtering
The DV-2010 can be configured to prevent local PCs from getting access the WAN by specifying those IP addresses that should be filtered. It is also possible to control outgoing IP traffic from LAN. This can be done from the IP Filtering page in the Advanced Security Menu. The IP Filtering page shows below.
By default, all outgoing IP traffic from LAN is allowed, but some IP traffic can be BLOCKED by setting up filters. You can configure which local PCs are denied access to the WAN. By default, all incoming IP traffic from the WAN is blocked when the firewall is enabled. However, some IP traffic can be ACCEPTED by setting up filters. Note that you only need to enter the LSB (Least-significant byte) of the IP address; the upper bytes of the IP address are set automatically from the DV-2010 IP address. To activate the IP address filter, you must also click on the Save/Apply button. The new filter rule will be applied without system reboot.
3 Wireless Configuration
The DV-2010 also serves as an 802.11b/g access point (AP). If DV-2010 has an 802.11 interface card installed, it can be configured using the web interface. If the wireless card is not installed, the Wireless menu on the left column of the web interface will not be present.
This page allows you to configure basic features of the wireless LAN interface. You can enable or disable the wireless LAN interface, hide the network from active scans, set the wireless network name (also known as SSID). The 802.11 radio can also be shut down to disable the wireless network if desired. This is the safest way to prevent unwanted wireless network intrusion when wireless access is not needed. The Service Set Identifier (SSID) is a text description of the Access Point and is entered as a string of ASCII characters. The Network Type can be selected and Opened or Hided. In an open network, the AP broadcasts its SSID in each periodic beacon packet so all clients can anonymously discover its SSID. If you choose Hide Access Point, the SSID broadcast is silenced and a client that wished to connect to the AP must already have knowledge of the SSID in order to gain access. This provides an additional layer of security to gaining access to the wireless network. The country selection is used to properly alter the 802.11 network transmissions to match the operating frequency bands allowed in each area.
Description Sets the Network Name (also known as SSID) of this network. Selecting hides the network from active scans. Selecting Hide to reveals the network from active scans. Restricts the channel set based on country requirements.
Value List or Range up to 32 character string containing ASCII characters any keyboard character Check or Leave
Default DV201AM
Leave (open)
Country
Worldwide, Thailand, Israel, Jordan, China, Japan, USA, Europe, All channels
ALL
3.2 Security
Click on the Security sub menu to bring up the 802.11 Encryption page shown below. 12 describes the settings on this page. Table
This page allows you to configure security features of the wireless LAN interface. You can set the network authentication method, selecting data encryption, specify whether a network key is required to authenticate to this wireless network and specify the encryption strength.
Description Sets the network authentication method. 802.1X and WPA require that valid RADIUS parameters be set. WPA-PSK requires a valid WPA PreShared Key to be set. Null authentication algorithm Require static encryption key Provides the link layer with extensible authentication Wi-Fi Protected Access Using counter mode with CCMP Sets the WPA Pre-Shared Key (PSK).
Default Open
Grant any request for authentication 64bit or 128bit strength RADIUS server TKIP, AES or both TKIP, AES or both Depends on Network Authentication setting. See <.
Shared
802.1x
WPA
WPA-PSK Either a 64-digit hexadecimal number *or* a 8 to 63 character ASCII string. 0 to 232-1 Disabled Disabled Disabled TKIP, AES Disabled
Disabled
Disabled
Disabled
WPA Group Rekey nterval RADIUS Server RADIUS Port RADIUS Key Data Encryption Network Key 1 thru Network Key
Disabled IP v.4 address 0 to 65535 0 to 255 character ASCII string WEP (128-bit) 2
0 to 232-1 IP v.4 address 0 to 65535 0 to 255 character ASCII string TKIP, AES Disabled
Data Enc Setting PassPhrase Disabled up to 32 character string containing ASCII characters with codes between 0x20 and 0x7e 5 or 13 ASCII characters or 10 or 26 hexadecimal digits Off WEP TKIP, AES, or TKIP + AES
Disabled
Disabled
Disabled
Disabled
1 to 4
Disabled
Description Sets the network authentication method. 802.1X and WPA require that valid RADIUS parameters be set. WPA-PSK requires a valid WPA PreShared Key to be set. Sets the WPA Pre-Shared Key (PSK).
Default Disabled
WPA PreShared Key WPA Group Rekey Interval RADIUS Server RADIUS Port
Depends on Network Authentication setting. See <. Depends on Network Authentication setting. See <. Depends on Network Authentication setting. See <. Depends on Network Authentication setting. See <. Depends on Network Authentication setting. See <. Depends on Network Authentication setting. See <.
<NULL>
Sets the WPA Group Rekey Interval in seconds. Set to zero to disable periodic rekeying. Sets the IP address of the RADIUS server to use for authentication and dynamic key derivation. Sets the UDP port number of the RADIUS server. The port number is usually 1812 or 1645 and depends upon the server. Sets the shared secret for the RADIUS connection. Selecting Off disables data encryption. Selecting WEP enables WEP data encryption and requires that a valid network key be set and selected unless 802.1X is enabled.
<NULL>
1812
RADIUS Key
<NULL>
Data Encryption
Sets whether shared key authentication is required to associate. A valid network key must be set and selected if required. Sets the text to use for WEP keys generation. Enter 5 ASCII characters or 10 hexadecimal digits for a 64-bit key. Enter 13 ASCII characters or 26 hexadecimal digits for a 128-bit key. Selects which network key is used for encrypting outbound data and/or authenticating clients.
Depends on Network Authentication setting. See <. Depends on Data Encryption setting.. Depends on Data Encryption setting..
Optional
<NULL> <NULL>
GUI: 16 addresses; Non-Vol: 32 addresses. Customers can display more in GUI, if desired.
<NULL>
The Beacon and DTIM Intervals should be left at 100 ms and 1 ms respectfully for successful operation with most client cards and WiFi operation compliance. The Beacon Interval specifies how often packets are sent by the Access Point (AP) to synchronize a wireless network and its clients. The DTIM (Delivery Traffic Indication Message) Interval is a countdown informing the wireless clients of the next window for listening to broadcast and multicast messages. When the AP has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value. AP clients hear the beacons and awaken to receive the broadcast and multicast messages. Fragmentation and RTS Thresholds should be set to 2346 bytes and 2347 bytes respectfully. Lesser settings can hurt data throughput as large frames could be fragmented or collisions could occur, especially when set below 1536 bytes, which could cause fragmentation of maximum size Ethernet frames.
Setting
Description
Default
Sets the network mode. Max Compatibility interoperates with the widest variety of 54g and 802.11b clients. 54g Only accepts only 54g clients. Max performance provides the highest throughout and accepts only 54g clients; nearby 802.11b networks may have degraded performance. In Auto mode the AP will use RTS/CTS to improve 802.11g performance in mixed 802.11g/802.11b networks. Turn protection Off to maximize 802.11g throughput under most conditions. Forces the transmission rate for the AP to a particular speed.
Max Compatibility
54g Protection
Off, Auto
Auto
Rate
Auto, 1 Mbps, 2 Mbps, 5.5 Mbps, 6 Mbps, 9 Mbps, 11 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, 54 Mbps 1..65535 1..255 256..2346 1..2347
Auto
Sets the beacon interval for the AP. Sets the wakeup interval for clients in power-save mode. Sets the fragmentation threshold. Sets the RTS threshold.
Should be away from Micro wave at least 5M. If there is no way to avoid from microwave, set channel 1,2,12,13 When IAD is located at the same place with Plasma lamp, set Should be away from Bluetooth at least 5M channel 11~13
If there is a walkie-talkie near IAD, should set the channel which is not covered the same Frequency. - Channel 1 : 2410HHz - Channel 2 : 2430HHz - Channel 3 : 2450HHz - Channel 4 : 2470HHz If more than 2 AP are used at the same location, add channel interval like below to avoid channel duplication. 1,6,11 or 1,5,9,13