Bipac 8900X R3

Total Page:16

File Type:pdf, Size:1020Kb

Bipac 8900X R3 BiPAC 8900X R3 3G/4G LTE VDSL2/ADSL2+ VPN Firewall Router User Manual Version Released: 2.50a.d16 Last revised date: December 18, 2017 Table of Contents Chapter 1: Introduction .................................................................................................................................. 1 Introduction to your Router..................................................................................................................... 1 Features ................................................................................................................................................... 3 VDSl2/ADSL2+ Compliance ............................................................................................................... 3 Network Protocols and Features ...................................................................................................... 4 Firewall.............................................................................................................................................. 4 Quality of Service Control ................................................................................................................. 4 ATM, PTM and PPP Protocols ........................................................................................................... 5 IPTV Applications .............................................................................................................................. 5 USB Application Server ..................................................................................................................... 5 Virtual Private Network .................................................................................................................... 5 Virtual Private Network (VPN) .......................................................................................................... 5 Management..................................................................................................................................... 6 Hardware Specifications .......................................................................................................................... 7 Physical Interface.............................................................................................................................. 7 Power Requirements ........................................................................................................................ 7 Operating Environment .................................................................................................................... 7 Chapter 2: Installing the Router...................................................................................................................... 8 Package Contents..................................................................................................................................... 8 Important note for using this router ....................................................................................................... 9 Device Description ................................................................................................................................. 10 The Front LEDs ................................................................................................................................ 10 The Rear Ports................................................................................................................................. 11 Cabling.................................................................................................................................................... 12 Chapter 3: Basic Installation ......................................................................................................................... 13 Connecting Your Router......................................................................................................................... 14 Network Configuration .......................................................................................................................... 16 Configuring a PC in Windows 7/ 8/ 10............................................................................................ 16 Configuring a PC in Windows Vista................................................................................................. 19 Configuring a PC in Windows XP..................................................................................................... 22 Factory Default Settings......................................................................................................................... 24 Information from your ISP ..................................................................................................................... 26 Easy Sign On (EZSO) ...................................................................................................................................... 27 Chapter 4: Configuration .............................................................................................................................. 31 Configuration via Web Interface............................................................................................................ 31 Status ..................................................................................................................................................... 33 Summary ......................................................................................................................................... 34 WAN ................................................................................................................................................ 35 Statistics .......................................................................................................................................... 36 LAN........................................................................................................................................... 36 WAN Service............................................................................................................................. 37 xTM .......................................................................................................................................... 38 xDSL.......................................................................................................................................... 39 Bandwidth Usage ............................................................................................................................ 42 LAN........................................................................................................................................... 42 WAN Service............................................................................................................................. 44 3G/4G LTE Status ............................................................................................................................ 46 Route............................................................................................................................................... 47 ARP.................................................................................................................................................. 48 DHCP ............................................................................................................................................... 49 VPN.................................................................................................................................................. 50 IPSec......................................................................................................................................... 50 PPTP ......................................................................................................................................... 51 L2TP.......................................................................................................................................... 52 OpenVPN.................................................................................................................................. 53 GRE........................................................................................................................................... 54 Log................................................................................................................................................... 55 System Log ............................................................................................................................... 55 Security Log.............................................................................................................................. 56 Quick Start.............................................................................................................................................. 57 Quick Start....................................................................................................................................... 57 Configuration ......................................................................................................................................... 61 LAN ‐ Local Area Network ............................................................................................................... 62 Ethernet ................................................................................................................................... 62 IPv6 Autoconfig.......................................................................................................................
Recommended publications
  • IPV6 MIGRATION and ADOPTION in INDIA by Shweta Satao
    Episteme: an online interdisciplinary, multidisciplinary & multi-cultural journal Bharat College of Arts and Commerce, Badlapur, MMR, India Volume 8, Issue 3 December 2019 IPV6 MIGRATION AND ADOPTION IN INDIA By Shweta Satao Abstract One of the major reasons for the IPv6 transition is because the allocation of IPv4 address space is running out of control and is gradually being exhausted. Though the Regional Internet Registries of all the continents are still allocating IPv4 addresses. Annually hundreds of millions of new smart phones that require internet connectivity are being sold. These demands for mobile phone have made the demand for internet connectivity to be increasing exponentially. We are in the age of smart mobile devices, social networking, and cloud computing and other new internet developments that are linked to the internet. There is need for Service Providers to ensure there is good, smooth and reliable internet connectivity via IP addresses. These makes IP addresses critical resources that sustain the business growth of service providers and also sustains an exponential economic growth generated through the internet. As hundreds of millions of mobile users are connected to the internet, there is need for a network that is ready for an internet that have both IPv4 and IPv6 addresses “IPv4 and IPv6 networks are not directly interoperable but the technologies used in the transition mechanisms allow hosts on either network to be involved in networking with opposing networks”. The transition mechanisms include: - Dual Stack Techniques - IPv6 over IPv4 tunneling techniques: 6to4 tunnel, Tunnel broker, Manually Configured Tunnel, ISATAP tunnels, IPv6 over IPv4 GRE tunnel.
    [Show full text]
  • Ipv6, a Passport to the Future Internet
    AFNIC’s Issue Papers IPv6, A Passport For The Future Internet 1 - Background 2 - Specification for the new version of IP (v6) Executive 3 - What’s new with IPv6? summary 4 - What "exhaustion of IPv4 space" After a historical review situating the means, and what lies behind it? exhaustion of the IPv4 address space, this paper underlines the real issues involved 5 - The integration of IPv6: how, who in this phenomenon and in the inevitable and where? transition from IPv4 to IPv6. It then briefly highlights the contributions of IPv6, recalls 6 - IPv6 integration: communication the roles of the various Internet stakeholders models, classification and describes the communication models for which IPv6 integration should be prioritized. 7 - A few examples of transition A set of illustrative but non-limitative mechanisms examples of transition mechanisms are given in order to show IPv6 integration in practice 8 - A few practical recommendations within various technical contexts. Finally, this for IPv6 integration paper makes operational recommendations to support the deployment of IPv6 and 9 - Seize the IPv6 opportunity – now! launches an appeal for stakeholders to seize – immediately – the opportunities provided 10 - Useful references by IPv6, in order to make the "The Future Internet" an open field for innovation. 1/10 IPv6, A Passport For The Future Internet Copyright AFNIC 2011 Reproduction of the texts authorized subject to acknowledgement of source: www.afnic.fr 1 Background The Internet was invented in the early 1970s in exceptional allocation of "Class B"1, address blocks, the United States and grew quite slowly until the the reuse of Class C blocks2, then the abolition of late 1980s.
    [Show full text]
  • Ortizjuarezmiguel.Pdf (5.402Mb)
    U N I V E R S I D A D V E R A C R U Z A N A FACULTAD DE INGENIERÍA REGIÓN VERACRUZ P O S G R A D O PROYECTO DE INTERVENCIÓN PROFESIONAL Modalidad Tesis SIMULACIÓN DEL PROTOCOLO IPV6 EN SISTEMAS HETEROGÉNEOS QUE PARA OBTENER EL GRADO DE: MAESTRIA EN INGENIERÍA APLICADA PRESENTA: LIC. MIGUEL ANTONIO ORTIZ JUÁREZ DIRECTOR DE TESIS: MTRO. CARLOS ARTURO CERÓN ÁLVAREZ BOCA DEL RÍO, VERACRUZ JUNIO 2015 AGRADECIMIENTOS A mis padres. Con la mayor gratitud por los esfuerzos realizados para que yo lograra terminar mi carrera profesional siendo para mí la mejor herencia. A mi madre que es el ser más maravilloso de todo el mundo. Gracias por el apoyo moral, tu cariño y comprensión que desde niño me has brindado, por guiar mi camino y estar junto a mí en los momentos más difíciles. A mi padre porque desde pequeño ha sido para mí un gran hombre maravilloso al que siempre he admirado. Gracias por todo. A mis hermanos y abuelo. Por el apoyo moral y el ánimo que siempre he recibido de ustedes y con el cual he logrado culminar mi esfuerzo, terminando así ́ mi maestría. Al Mtro. Carlos Arturo Cerón. Gracias por su asesoría en esta Tesis, por su apoyo en este trabajo, ya que sin su ayuda no hubiera sido posible la realización. A mis amigos y compañeros de la maestría que siempre estuvieron apoyando en todo, en especial a mi amigo Antonio, que siempre fue el compañero de proyectos. ÍNDICE RESUMEN ............................................................................................................................ 1 CAPITULO 1.
    [Show full text]
  • Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Ipv6 Tunneling Ipv6 Host Ipv4/V6
    Business Service Management for Performance I’m Running IPv6: How Do I Access??? Share Session 12150 Laura Knapp WW Business Consultant [email protected] 01/15/2013 © Applied Expert Systems, Inc. 2013 1 Business Service Management for Performance What is IPv6 Updated version of the Internet Protocol (IPv4) Defined in RFC 1752 New features Larger address space Encapsulation Class of service for audio, video, etc. Multicast support Authentication Encryption Automatic configuration/reconfiguration Support for non-IP protocols 01/15/2013 © Applied Expert Systems, Inc. 2013 2 Business Service Management for Performance IPv6 Technology Scope IP Service IPv4 Solution IPv6 Solution 32-bit, Network Addressing Range 128-bit, Multiple Address Translation Scopes Serverless, Auto configuration DHCP Reconfiguration, DHCP Security IPSec IPSec Mandated, works End-to-End Mobile IP with Direct Mobility Mobile IP Routing Differentiated Service, Differentiated Service, Quality-of-Service Integrated Service Integrated Service IP Multicast IGMP/PIM/Multicast MLD/PIM/Multicast BGP BGP,Scope Identifier 01/15/2013 © Applied Expert Systems, Inc. 2013 3 Business Service Management for Performance IPv6 Transition Paths – ISP Focus 01/15/2013 © Applied Expert Systems, Inc. 2013 4 Business Service Management for Performance IPv6 in the Enterprise 01/15/2013 © Applied Expert Systems, Inc. 2013 5 Business Service Management for Performance Types of IPv6 Node Types IPv4 only node – a node running only IPv4 IPv6/IPv4 node – a node running dual stack IPv6 only node – a node running only IPv6 IPv6 node – node running IPv6 and it may also run IPv4 IPv4 node – node running IPv4 and it may also run IPv6 01/15/2013 © Applied Expert Systems, Inc.
    [Show full text]
  • ETSI White Paper on Ipv6 Best Practices, Benefits, Transition
    ETSI White Paper No. 35 IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward First edition – August 2020 ISBN No. 979-10-92620-31-1 ETSI 06921 Sophia Antipolis CEDEX, France Tel +33 4 92 94 42 00 [email protected] www.etsi.org Contributing organizations and authors CAICT Zhiruo Liu China Telecom Chongfeng Xie, Cong Li Cisco Patrick Wetterwald, Pascal Thubert, Francois Clad Hewlett-Packard Enterprise Yanick Pouffary Huawei Giuseppe Fioccola, Xipeng Xiao, Georgios Karagiannis, Shucheng(Will) Liu KPN Eduard Metz Luxembourg University Latif Ladid PT Telecom Jose Cananao, Jose Palma Post Luxembourg Sébastien Lourdez Telefonica Luis M. Contreras IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward 2 Contents Contributing organizations and authors 2 Contents 3 Executive Summary 6 1 Background 8 1.1 Why should IPv6 become a priority again? 8 1.2 Goals of this White Paper 9 2 IPv6 progress in the last 5 years 10 2.1 Devices supporting IPv6 10 2.2 Content (web sites, cloud services) supporting IPv6 11 2.3 Networks supporting IPv6 12 2.4 Number of IPv6 users 12 2.5 Amount of IPv6 traffic 13 2.6 IPv6 standardization progress 14 3 IPv6 service design for Mobile, Fixed broadband and enterprises 14 3.1 IPv6 transition solutions from operator perspective 15 3.1.1 For IPv6 introduction 16 3.1.2 For IPv6-only service delivery 17 3.2 IPv6 prefix and address assignment at the CPEs 22 3.2.1 For MBB UEs 23 3.2.2 For FBB RGs 23 3.2.3 For Enterprise CPEs 23 3.3 IPv6 Packet Transport 24 3.4 IPv6 deployment inside enterprise
    [Show full text]
  • Migration to a New Internet Protocol in Operator Network
    Jarkko Mäntysaari Migration to a New Internet Protocol in Operator Network Aalto University School of Electrical Engineering Thesis submitted for examination for the degree of Master of Science in Technology Espoo 14.01.2013 Supervisor: Professor Raimo Kantola Instructor: M.Sc. (Tech.) Zahed Iqbal Abstract AALTO YLIOPISTO MASTER’S THESIS SÄHKÖTEKNIIKAN ABSTRACT KORKEAKOULU Author: Jarkko Mäntysaari Title of the Thesis: IPv4 to IPv6 Migration in Operator Network Date: 14.01.2013 Number of pages: 56 Department of Communications and Networking Professorship: S-38 Networking Technology Supervisor: Professor Raimo Kantola Instructor: M.Sc. (Tech.) Zahed Iqbal This thesis explains the differences between IPv4 and IPv6. Another important part of the thesis is to review the current readiness of IPv6 for worldwide production use. The status (in terms of readiness, adaptability, compatibility and co-existence) of IPv6 in TeliaSonera is discussed in more detail. The most important reason for migrating to IPv6 is the address exhaustion of IPv4. This may not be a big problem in the developed countries but in developing countries the growth of Internet is fast and lots of more addresses are needed. The need for addresses is not only from computers but from many devices connected to the Internet. Attempts to slow down the exhaustion of free addresses have been made but current solutions are not enough. IPv6 will solve the problem by using much longer addresses. It will also add security features and simplify headers to speed up routing. TeliaSonera has started to roll out IPv6 services. At the beginning the corporate customers will receive IPv6 connectivity and consumers will follow later.
    [Show full text]
  • NIST SP 800-119, Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • [::] Ipv6 Para Operadores De Red
    [::] IPv6 para operadores de Red Alejandro Acosta Santiago Aggio Guillermo Cicileo Tomas Lynch Antonio M. Moreiras Mariela Rocha Arturo Servin Sofía Silva Berenguer :: Agradecimientos A Internet Society (www.isoc.org.) por haber donado los fondos que han permitido la realización de este Proyecto y su constante apoyo para estimular la continuidad y relevancia de los Capítulos. A LACNIC (www.lacnic.net) por sus aportes al contenido de este libro así como también por las tareas de capacitación orientadas a la toma de conciencia, que en torno a IPv6 vienen desarrollando en Latinoamérica y Caribe. A todos los autores y colaboradores que han posibilitado con su dedicación y trabajo la concreción de este Proyecto, que tiene por objeto contribuir a la Comunidad de Internet en la adopción e implementación del nuevo Protocolo IPv6. La Comisión Directiva ISOC-AR Capítulo Argentina de Internet Society IPv6 para Operadores de Red, 1ª Edición. 2014 Ebook ISBN 978-987-45725-0-9 IPv6 para Operadores de Red por ISOC-Ar Asociación Civil de Argentinos por Internet se distribuye bajo una Licencia Creative Commons Atribución- NoComercial-CompartirIgual 4.0 Internacional. 2014. ISOC-Ar Asociación Civil de Argentinos en Internet (Capítulo Argenti- na de ISOC) Suipacha 128 3° piso F Ciudad de Buenos Aires, Argentina Diseño Integral: Transversal Branding Comité Editor: Christian O’Flaherty y Carlos M. Martínez :: Indice de contenidos :: Plan de direccionamiento .1 Alejandro Acosta y Arturo Servin pag_15 :: Monitoreo en IPv6 .2 Mariela Rocha pag_37 :: Centros de datos y virtualización en IPv6 .3 Santiago Aggio y Arturo Servin pag_49 :: Ruteo externo en IPv6 .4 Guillermo Cicileo pag_87 :: IPv6 en redes móviles .5 Tomas Lynch pag_103 :: Mecanismos de transición .6 Antonio M.
    [Show full text]
  • Network Performance Metrics for Transition From
    NETWORK PERFORMANCE METRICS FOR TRANSITION FROM IPv4 TO IPv6 NETWORKS Samuel Wafula Barasa A thesis submitted in partial fulfilment for the requirements of the award of degree of Doctor of Philosophy in Information Technology of Kibabii University November 2019 DECLARATION This thesis is my original work prepared with no other than indicated sources support and has not been presented for a degree or any other award. Signature ……………………………………. Date………………………………… Samuel W. Barasa PhD/IT/011/14 CERTIFICATION The undersigned certify that we have read and hereby recommend for acceptance of Kibabii University a thesis entitled “Network Performance Metrics for Transition from IPv4 to IPv6 Networks”. Signature ……………………………………. Date………………………………… Prof. Samuel Mbugua, PhD Department of Information Technology (IT) Kibabii University Signature ……………………………………. Date………………………………… Prof. Simon Karume, PhD Department of Computing and Informatics Laikipia University ii COPYRIGHT This thesis is copyright materials protected under the Berne Convection, the copyright act 2001 and other international and national enactments in that behalf, on intellectual property. It may not be reproduced by any means in full or in part except for short extracts in fair dealing for research or private study, critical scholarly review or discourse with acknowledgement, with written permission of the Dean School of Graduate Studies on behalf of both the author and Kibabii University. iii DEDICATION I dedicate this work to my loving wife Isabella Tabani and my son Macmorris Muyonga. iv ACKNOWLEDGEMENT First of all, the glory be to the Almighty God who has made it possible for me to come this far. I wish to thank my supervisors Prof. Samuel Mbuguah and Prof.
    [Show full text]
  • Ipv4-In-Ipv6: Una Nuova Strategia Per La Transizione a Ipv6
    IPv4-in-IPv6: una nuova strategia per la transizione a IPv6 Massimo Vellucci2, Massimo Bernaschi1, Luca Vollero2 1 CNR-IAC, Istituto per la Applicazioni del Calcolo 2 Università Campus Bio-Medico di Roma Abstract. IPv4 è il protocollo di comunicazione adottato dalla maggioranza dei dispositivi collegati a Internet. Tut- tavia, essendo un protocollo definito nelle prime fasi dello sviluppo di Internet, il suo utilizzo pone problemi legati all’esaurimento degli indirizzi IPv4 disponibili e ad altre sue limitazioni costitutive. IPv6 è la nuova versione del protocollo Internet, definita con l’obiettivo di superare i limiti di IPv4. La sfida principale nella diffusione di IPv6 è data dalla disponibilità di meccanismi efficaci per l’integrazione dei servizi attivi in reti IPv4 su reti IPv6, minimizzando i costi ed i rischi connessi alla migrazione. Il presente lavoro propone un nuovo meccanismo basato sul tunneling dinamico di pacchetti IPv4 in IPv6 e deno- minato, per questo, IPv4-in-IPv6. L’approccio proposto è rivolto agli operatori di rete che vogliono semplificare la configurazione e la gestione del loro backbone IPv6, mantenendo il pieno supporto di IPv4 sulle reti di accesso. 1. Introduzione nuovo meccanismo basato sul tunneling dinamico IPv4, (1) è il protocollo di comunicazione adottato di pacchetti IPv4 in IPv6 e denominato, per que- dalla maggioranza dei dispositivi collegati a Inter- sto, IPv4-in-IPv6. Tale meccanismo si aggiunge net. Tuttavia, essendo un protocollo definito nelle a quelli disponibili nel suddetto “transition tool- prime fasi dello sviluppo di Internet, il suo utilizzo box”. L’approccio proposto è rivolto agli operatori pone dei problemi legati all’esaurimento degli in- di rete che vogliono semplificare la configurazione dirizzi IPv4 disponibili e ad altre sue limitazioni e la gestione del loro backbone IPv6, mantenendo costitutive in ambito di mobilità e sicurezza.
    [Show full text]
  • Comprehensive Survey of Ipv6 Transition Technologies: a Subjective Classification for Security Analysis
    IEICE TRANS. COMMUN., VOL.Exx–??, NO.xx XXXX 200x 1 SURVEY PAPER Comprehensive Survey of IPv6 Transition Technologies: A Subjective Classification for Security Analysis Gábor LENCSE†a) and Youki KADOBAYASHI††b), Members SUMMARY Due to the depletion of the public IPv4 address pool, the conducting a comprehensive survey of the IPv6 transition transition to IPv6 became inevitable. However, this ongoing transition is technologies (including any protocols that can be used to en- taking a long time, and the two incompatible versions of the Internet Pro- able communication in any scenario despite the incompati- tocol must coexist. Different IPv6 transition technologies were developed, which can be used to enable communication in various scenarios, but they bility of IPv4 and IPv6) and identifying those of them, which also involve additional security issues. In this paper, first, we introduce would be worth submitting to a detailed security analysis. To our methodology for analyzing the security of IPv6 transition technologies achieve this goal, first, we give a short introduction to our in a nutshell. Then, we develop a priority classification method for the methodology for the security analysis of IPv6 transition tech- ranking of different IPv6 transition technologies and their most important implementations, so that the vulnerabilities of the most crucial ones may be nologies [6], then we develop a priority classification method examined first. Next, we conduct a comprehensive survey of the existing for both the technologies and their most important implemen- IPv6 transition technologies by describing their application scenarios and tations, and after that, we present an exhaustive overview of the basics of their operation and we also determine the priorities of their the existing IPv6 transition technologies together with their security analysis according to our ranking system.
    [Show full text]