Page 296 / 351 Scroll up to view Page 291 - 295
296
Wireless MAC Address Authorization Settings
set wireless mac-auth option { on | off }
Enabling this feature limits the MAC addresses that are allowed to access the LAN as well
as the WAN to specified MAC (hardware) addresses.
set wireless mac-auth wrlss-MAC-list mac-address
MAC-address_string
Enters a new MAC address into the MAC address authorization table. The format for an
Ethernet MAC address is six hexadecimal values between 00 and FF inclusive separated by
colons or dashes (e.g., 00:00:C5:70:00:04).
set wireless mac-auth wrlss-MAC-list mac-address
MAC-address_string
” allow-access { on | off }
Designates whether the MAC address is enabled or not for wireless network access. Dis-
abled MAC addresses cannot be used for access until enabled.
RADIUS Server Settings
set radius radius-name "
server_name_string
"
Specifies the default RADIUS server name or IP address.
set radius radius-secret "
shared_secret
"
Specifies the RADIUS secret key used by this server. The shared secret should have the
same characteristics as a normal password.
set radius alt-radius-name "
server_name_string
"
Specifies an alternate RADIUS server name or IP address to be used if the primary server
is unreachable.
set radius alt-radius-secret "
shared_secret
"
Specifies the secret key used by the alternate RADIUS server.
Page 297 / 351
297
CONFIG Commands
set radius radius-port
port_number
Specifies the port on which the RADIUS server is listening. The default value is 1812.
VLAN Settings
These settings are supported beginning with Firmware Version 7.4.2.
You can create up to 32 VLANs, and you can also restrict any VLAN, and the computers on
it, from administering the Gateway. See
VLAN
” on page
106
for more information.
set vlan name
string
Sets the descriptive name for the VLAN. If no name is specified, displays a selection list of
node names to select for editing.
Once a new VLAN name is specified, presents the list of VLAN characteristics to define:
id
– numerical range of possible IDs is 1 - 4095
type
[
by-port
] – currently the only selection is
by-port
admin-restricted
[
off
|
on
] – default is
off
. If you select
on
, administrative access to
the Gateway is blocked from this VLAN.
port
– VLAN’s physical port or wireless SSID.
You must save the changes, exit out of configuration mode, and restart the Gateway for the
changes to take effect.
Example:
Navigate to the VLAN item:
Netopia-3000/9459252 (top)>>
vlan
Netopia-3000/9459252 (vlan)>>
set
vlan
name
(name) node list ...
Select (name) node to modify from list,
or enter new (name) to create.
name (?):
vlan1
(vlan1) has been added to the (name) list
"vlan1"
Page 298 / 351
298
id (1) [ 1 - 4095 ]:
52
type (by-port) [ by-port ]:
admin-restricted (off) [ off | on ]:
off
port
(port) node list ...
Select (port) node to modify from list,
or enter new (port) to create.
At this point you have created a VLAN. It is called
vlan1
, with
vlan-id 52
, without any
admin restrictions.
Next, add the port
ethernet0
port to this VLAN:
port (?):
1
(1) has been added to the (port) list
1
interface ()
[ lan-uplink | ethernet0 | vcc1 ]:
ethernet0
Netopia-3000/9459252 (vlan)>>
To make the VLAN vlan1 routable add the port
lan-uplink
:
Netopia-3000/9459252 (vlan)>>
name vlan1
Netopia-3000/9459252 (vlan name "vlan1")>>
set
"vlan1"
id (52) [ 1 - 4095 ]:
type (by-port) [ by-port ]:
admin-restricted (off) [ off | on ]:
port
(port) node list ...
1
Select (port) node to modify from list,
or enter new (port) to create.
port (?): 2
(2) has been added to the (port) list
2
interface ()
[ lan-uplink | ethernet0 | vcc1 ]:
lan-uplink
Netopia-3000/9459252 (vlan name "vlan1")>>
Page 299 / 351
299
CONFIG Commands
Note:
To make a set of VLANs non-routable, the lan-uplink port must be included in
at least one VLAN and must be excluded from any VLANs that are non-
routable.
UPnP settings
set upnp option [ on | off ]
PCs using UPnP can retrieve the Gateway’s WAN IP address, and automatically create NAT
port maps. This means that applications that support UPnP, and are used with a UPnP-
enabled Netopia Gateway, will not need application layer gateway support on the Netopia
Gateway to work through NAT. The default is
on
.
You can disable UPnP, if you are not using any UPnP devices or applications.
DSL Forum settings
TR-064 is a LAN-side DSL CPE configuration specification and TR-069 is a WAN-side DSL
CPE Management specification.
TR-064.
DSL Forum LAN Side CPE Configuration (TR-064) is an extension of UPnP. It
defines more services to locally manage the Netopia Gateway. While UPnP allows open
access to configure the Gateway's features, TR-064 requires a password to execute any
command that changes the Gateway's configuration.
set dslf-lanmgmt option [ off | on ]
Turns TR-064 LAN side management services on or off. The default is
on
.
Page 300 / 351
300
TR-069.
DSL Forum CPE WAN Management Protocol (TR-069) provides services similar to
UPnP and TR-064. The communication between the Netopia Gateway and management
agent in UPnP and TR-064 is strictly over the LAN, whereas the communication in TR-069 is
over the WAN link for some features and over the LAN for others. TR-069 allows a remote
Auto-Config Server (ACS) to provision and manage the Netopia Gateway. TR-069 protects
sensitive data on the Gateway by not advertising its presence, and by password protection.
set dslf-cpewan option [ off | on ]
set dslf-cpewan acs-url "
acs_url:port_number
"
set dslf-cpewan acs-user-name “
acs_username
set dslf-cpewan acs-user-password “
acs_password
set dslf-cpewan acs-filter1-ip
filter1-ip_addr
set dslf-cpewan acs-filter1-mask
filter1-mask
set dslf-cpewan acs-filter2-ip
filter2-ip_addr
set dslf-cpewan acs-filter2-mask
filter2-mask
set dslf-cpewan acs-filter3-ip
filter3-ip_addr
set dslf-cpewan acs-filter3-mask
filter3-mask
Turns TR-069 WAN side management services on or off. For 3300-Series Gateways, the
default is
off
; for 2200-Series Gateways, the default is
on
. If TR-069 WAN side manage-
ment services are enabled, specifies the auto-config server URL and port number. A user-
name and password must also be supplied, if TR-069 is enabled.
The auto-config server is specified by URL and port number. The format for the ACS URL is
as follows:
http://
some_url.com
:
port_number
or
http://
123.45.678.910
:
port_number

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top