Page 86 / 95 Scroll up to view Page 81 - 85
EG101
User’s Guide
80
TFTP
Trivial File Transfer Protocol
A protocol for file transfers, TFTP is easier to use than
File Transfer Protocol (FTP) but not as capable or
secure.
TKIP
Temporal Key Integrity Protocol (TKIP) provides WPA
with a data encryption function. It ensures that a unique
master key is generated for each packet, supports
message integrity and sequencing rules and supports
re-keying mechanisms.
Triggers
Triggers are used to deal with application protocols that
create separate sessions. Some applications, such as
NetMeeting, open secondary connections during normal
operations, for example, a connection to a server is
established using one port, but data transfers are
performed on a separate connection. A trigger tells the
device to expect these secondary sessions and how to
handle them.
Once you set a trigger, the embedded IP address of
each incoming packet is replaced by the correct host
address so that NAT can translate packets to the correct
destination. You can specify whether you want to carry
out address replacement, and if so, whether to replace
addresses on TCP packets only, UDP packets only, or
both.
Twisted pair
The ordinary copper telephone wiring used by telephone
companies. It contains one or more wire pairs twisted
together to reduce inductance and noise. Each
telephone line uses one pair. In homes, it is most often
installed with two pairs. For Ethernet LANs, a higher
grade called Category 3 (CAT 3) is used for 10BASE-T
networks, and an even higher grade called Category 5
(CAT 5) is used for 100BASE-T networks. See
10BASE-T, 100BASE-T, Ethernet.
Unnumbered interfaces
An unnumbered interface is an IP interface that does not
have a local subnet associated with it. Instead, it uses a
router-id that serves as the source and destination
address of packets sent to and from the router. Unlike
the IP address of a normal interface, the router-id of an
unnumbered interface is allowed to be the same as the
IP address of another interface. For example, the WAN
unnumbered interface of your device uses the same IP
address of the LAN interface (192.168.1.1).
The unnumbered interface is temporary – PPP or DHCP
will assign a ‘real’ IP address automatically.
Upstream
The direction of data transmission from the user to the
Internet.
VC
Virtual Circuit
A connection from your DSL router to your ISP.
VCI
Virtual Circuit Identifier
Together with the Virtual Path Identifier (VPI), the VCI
uniquely identifies a VC. Your ISP will tell you the VCI
for each VC they provide. See VC.
VDSL
Very High Speed Digital Subscriber Line
It provides faster transmission rate and is capable of
supporting high bandwidth applications like IPTV and
bandwidth consumed applications.
VPI
Virtual Path Identifier
Together with the Virtual Circuit Identifier (VCI), the VPI
uniquely identifies a VC. Your ISP will tell you the VPI
for each VC they provide. See VC.
Page 87 / 95
EG101
User’s Guide
81
WAN
Wide Area Network
Any network spread over a large geographical area,
such as a country or continent. With respect to the
device, WAN refers to the Internet.
Web browser
A software program that uses Hyper-Text Transfer
Protocol (HTTP) to download information from (and
upload to) web sites, and displays the information, which
may consist of text, graphic images, audio, or video, to
the user. Web browsers use Hyper-Text Transfer
Protocol (HTTP). Popular web browsers include
Netscape Navigator and Microsoft Internet Explorer.
See HTTP, web site, WWW.
Web page
A web site file typically containing text, graphics and
hyperlinks (cross-references) to the other pages on that
web site, as well as to pages on other web sites. When a
user accesses a web site, the first page that is displayed
is called the home page. See hyperlink, web site.
Web site
A computer on the Internet that distributes information to
(and gets information from) remote users through web
browsers. A web site typically consists of web pages
that contain text, graphics, and hyperlinks. See
hyperlink, web page.
WEP
Wired Equivalent Privacy (WEP) encrypts data over
WLANs. Data is encrypted into blocks of either 64 bits
length or 128 bits length. The encrypted data can only
be sent and received by users with access to a private
network key. Each PC on your wireless network must be
manually configured with the same key as your device in
order to allow wireless encrypted data transmissions.
Eavesdroppers cannot access your network if they do
not know your private key. WEP is considered to be a
low security option.
Wireless
Wireless is a term used to describe telecommunications
in which electromagnetic waves (rather than some form
of wire) carry the signal over part or the entire
communication path. See wireless LAN.
Wireless LAN
A wireless LAN (WLAN) is one in which a mobile user
can connect to a local area network (LAN) through a
wireless (radio) connection. A standard, IEEE 802.11,
specifies the technologies for wireless LANs.
WPA
Wi-Fi Protected Access
WPA is an initiative by the IEEE and Wi-Fi Alliance to
address the security limitations of WEP. WPA provides
a stronger data encryption method (called Temporal Key
Integrity Protocol (TKIP)). It runs in a special,
easy-to-set-up home mode called Pre-Shared Key
(PSK) that allows you to manually enter a pass phrase
on all the devices in your wireless network. WPA data
encryption is based on a WPA master key. The master
key is derived from the pass phrase and the network
name (SSID) of the device.
It provides improved data encryption and stronger user
authentication. The mode of WPA supported on your
device is called Pre-Shared Key (PSK), which allows
you to manually enter a type of key called a pass
phrase.
WWW
World Wide Web
Also called (the) Web. Collective term for all web sites
anywhere in the world that can be accessed via the
Internet.
Page 88 / 95
X5522r-P3 / X5527r-P3 / X5568r-P3 / X5567r-P3
User’s Guide
82
Appendix D - Specification
A1.
Hardware Specifications
LAN Interface
Four port 10/100BaseT Ethernet Switch (4 * RJ-45 connectors), IEEE 802.3u
with MDI/MDIX auto-detection
Integrated 802.11b/g WLAN Access Point
WAN VDSL2 Line Interface
Compliant with VDSL2 and support 8a/8b/8c/8d, 17a and 30a
Connection Loops: One (pair wire)
Connector: RJ-11
Analog Voice Interface
2 FXS ports (2 * RJ-11 connectors) for analog phone sets
Indicators
PWR – Green LED indicates power and operation. Red LED indicates failure.
WAN – Green LED indicates broadband connection
Internet – Green LED indicates PPP connection and RED indicates PPP failure
or device in BRIDGE mode.
TEL1 – Green LED indicates phone connection
TEL2 – Green LED indicates phone connection
LAN – Green LED indicates LAN connection
WLAN – Green LED indicates wireless AP enabled
OAM&P
Local: Telnet and Web management
Remote: Telnet Web Management
Environment
Operation Temperature: 0
°
C ~ 45
°
C
Operation Humidity: 5% ~ 95%
Storage Temperature: -20 ~ +85
°
C
Storage Humidity: 5%~95%
Power
AC Adapter: Input 110/220VAC, 50/60Hz; Output 12VDC 1.50A
Certificates
CE, CB (TBD)
A2.
Software Specifications
Bridging
Transparent Bridging and spanning(IEEE 802.1D) with at least 32 MAC
addresses
RFC2684 (RFC 1483) Bridged
Bridge filtering with per-port extensions
Routing
IP routing and PPP supported
PAP and CHAP for user authentication in PPP connection
RFC2684 (RFC1483) Routed
MAC Encapsulated Routing (MER)
DHCP client, server and relay agent
DNS relay
Wireless LAN
Supports 802.1x; WEP; WEP2; WPA; WPA2; TKIP; AES; 802.11i
Page 89 / 95
EG101
User’s Guide
83
Hidden SSID
WMM for advanced Quality of Service
Hardware based AES
125 High Speed Mode: Standards-plus performance enhancement delivers best
real-world performance as the client card use the same 125 High Speed Mode
Firewall
Support NAT and DMZ
Stateful Packet Inspection (SPI) with DOS protection - Ping of Death, SYN Flood
LAND
Protection against IP and MAC address spoofing
UPnP NAT traversal and VPN / IPSec pass-through
Voice
Support voice CODECs like G.711, G.726, G.729A/B, BV16, ILBC, T.38 etc
DTMF tone detection / generation, fax / modem detection and pass-through
Adaptive jitter buffer, packet loss concealment (PLC), voice activity detection
(VAD), comfort noise generation (CNG) and Caller ID
Support SIP (RFC3261)
Supports Call Waiting, Call Transfer, Call Forward and so on.
G.168 line echo cancellation with programmable tail
VoIP and Telephone service
Supports SIP (RFC3261), SDP (RFC2327, RFC3264) as well as both TCP and
UDP transport
Supports User Agent Client (UAC) - User Agent Server (UAS) call, or proxy call
routing
Supports SIP and telephone URL addressing
Supports in-band DTMF tone sending / receiving and out-band DTMF signaling
with RTP, as per RFC2833
Bonus services include:
Call Forwarding: Unconditional, No Response, On Busy
Call Waiting: Force Busy, Pickup and Release Old, Pickup and Put Old on
Hold, Switch between two calls
Call Transfer, Call Back busy subscriber, Call Back last number called
(call return)
Enquiry service
Three way conference
Provisioning through TFTP client with configuration profile
Configuration and Network Management Features
SNMP GETs, SETs and TRAPs for four groups in MIB-II
DHCP client and server for IP management
UPnP Internet Gateway Device (IGD) compliance
WEB for local or remote management
HTTP or TFTP for firmware upgrade and configuration
Embedded syslog; SNTP with DHCP options
Support TR-069, TR-104 and with parameters: DeviceInfo, ManagementServer,
Time, IPPingDiagonostic, etc
Note:
The hardware and software specifications are subjected to change without notices.
Page 90 / 95
EG101
User’s Guide
84
Appendix E - Warranties
B1.
Product Warranty
Inteno Broadband Technology AB warrants that the unit will be free from defects in
material and workmanship for a period of twelve (12) months from the date of shipment.
Inteno Broadband Technology AB shall incur no liability under this warranty if
The allegedly defective goods are not returned prepaid to Inteno Broadband
Technology AB within thirty (30) days of the discovery of the alleged defect and in
accordance with Inteno Broadband Technology AB ’ repair procedures; or
Inteno Broadband Technology AB ’ tests disclose that the alleged defect is not due to
defects in material or workmanship.
Inteno Broadband Technology AB liability shall be limited to either repair or replacement
of the defective goods, at Inteno Broadband Technology AB option.
Inteno Broadband Technology AB MARKS NO EXPRESS OR IMPLIED WARRANTIES
REGARDING
THE
QUALITY,
MERCHANTABILITY,
OR
FITNESS
FOR
A
PARTICULAR PURPOSE BEYOND THOSE THAT APPEAR IN THE APPLICABLE
USER’S
DOCUMETATION.
INTENO
SHALL
NOT
BE
RESPONSIBLE
FOR
CONSEQUENTIAL, INCIDENTAL, OR PUNITIVE DAMAGE, INCLUDING, BUT NOT
LIMITED TO, LOSS OF PROFITS OR DAMAGES TO BUSINESS OR BUSINESS
RELATIONS. THIS WARRANTY IS IN LIEU OF ALL OTHER WARRANTIES.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top