COMTREND PRT-6351 WiFi 6E TriBand AX7800 Ethernet Gateway User Manual
- June 16, 2024
- COMTREND
Table of Contents
- COMTREND PRT-6351 WiFi 6E TriBand AX7800 Ethernet Gateway
- Specifications
- Preface
- Important Safety Instructions
- Power Specifications (Alimentation)
- Installation
- Maintenance
- Resetting the Home Gateway
- Updating Firmware
- Frequently Asked Questions (FAQ)
- FCC
- Open Source Software Notice
- Description
- Port Triggering
- Storage Service
- AutoXtend
- References
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
COMTREND PRT-6351 WiFi 6E TriBand AX7800 Ethernet Gateway
Specifications
- Model: PRT-6351 (WR-2412u)
- Type: Home Gateway
- User Manual Version: A1.0 May 16, 2023
Preface
This manual provides information related to the installation and operation of the PRT-6351 (WR-2412u) Home Gateway. It is assumed that the reader has a basic understanding of telecommunications terminology and concepts. If you encounter any issues with the product, please contact our technical support for immediate assistance via email at INT-support@comtrend.com. For product updates, new releases, manual revisions, or software upgrades, please visit our website at http://www.comtrend.com.
Important Safety Instructions
When using your telephone equipment for unpacking, installation, use, and maintenance, it is important to follow basic safety precautions to reduce the risk of fire, electric shock, and injury to persons. Please adhere to the following safety guidelines:
- Do not use this product near water, such as a bathtub or washbowl.
- Always disconnect all telephone lines from the wall outlet before servicing or disassembling the equipment.
- Do not stack equipment or place it in tight spaces, drawers, or on carpets. Ensure there is at least 2 inches of air space surrounding the equipment.
- To prevent interference with cordless phones, ensure that the gateway is at least 5 feet (1.5m) away from the cordless phone base station.
- If you experience trouble with the equipment, disconnect it from the network until the problem has been resolved or the equipment has been confirmed to be functioning properly.
WARNING
- Disconnect the power line from the device before servicing.
- For indoor use only.
- Do not open the casing.
- Do not use near water.
- Keep away from fire.
- For use in a ventilated environment/space.
Power Specifications (Alimentation)
- Input: 12Vdc, 2.5A
- Output: USB 3.0, 900mA
User Information
Any changes or modifications not expressly approved by the party responsible
for compliance could void your authority to operate the equipment. To ensure
proper operation and compliance, please consider the following:
- Reorient or relocate the receiving antenna.
- Increase the separation between the equipment and the receiver.
- Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
- Consult the dealer or an experienced radio/TV technician for assistance.
This device complies with Part 15 of the FCC Rules. It operates under the following conditions:
- The device may not cause harmful interference.
- The device must accept any interference received, including interference that may cause undesired operation.
This Class B digital apparatus complies with Canadian ICES-003. To reduce potential radio interference to other users, the antenna type and its gain should be chosen so that the equivalent isotropically radiated power (e.i.r.p.) is not more than permitted for successful communication. This device also complies with Part 15 of the FCC Rules and Industry Canada license-exempt RSS standard(s) and operates under the following conditions:
- The device may not cause interference.
- The device must accept any interference received, including interference that may cause undesired operation.
Installation
- Choose a suitable location for the Home Gateway.
- Ensure that the Gateway is placed at least 5 feet (1.5m) away from cordless phone base stations.
- Make sure there is at least 2 inches of air space surrounding the Gateway.
- Connect the power line to the Gateway and plug it into a suitable power outlet.
- Connect the necessary cables (e.g., Ethernet, telephone) to the appropriate ports on the Gateway and your devices.Operation
To operate the Home Gateway:
- Ensure that all cables are properly connected to the Gateway and your devices.
- Power on the Gateway by pressing the power button or plugging it into a power source.
- Wait for the Gateway to initialize and establish a connection to your network.
- You can now start using the Home Gateway for internet access, networking, and other supported functions.
Maintenance
To ensure the optimal performance and longevity of the Home Gateway:
- Regularly check the Gateway’s physical connections and cables for any signs of damage or loose connections. Replace or repair as necessary.
- Keep the Gateway in a clean and dust-free environment.
- If you encounter any issues or malfunctions, refer to the troubleshooting section of the user manual or contact technicalsupport for assistance.
Resetting the Home Gateway
If you need to reset the Home Gateway to its factory default settings:
- Locate the reset button on the Gateway (usually a small hole).
- Using a paperclip or similar tool, press and hold the reset button for at least 10 seconds.
- The Gateway will restart, and all settings will be reset to their default values.
Updating Firmware
If a firmware update is available for the Home Gateway:
- Visit the Comtrend website at http://www.comtrend.com to check for the latest firmware version.
- Download the firmware file and save it to your computer.
- Access the Gateway’s web-based administration interface by entering its IP address in a web browser.
- Navigate to the firmware update section and follow the on-screen instructions to upload and install the downloaded firmware file.
- Wait for the firmware update process to complete. Do not interrupt or power off the Gateway during this process.
Factory Support
If you require further assistance or have any questions regarding the Home
Gateway, please contact our technical support team via email at INT-
support@comtrend.com.
Frequently Asked Questions (FAQ)
Q: Can I use the Home Gateway near water?
A: No, it is not recommended to use the Home Gateway near water to avoid the
risk of damage or electric shock.
Q: How far should the Home Gateway be placed from cordless phone base
stations?
A: To prevent interference, ensure that the Home Gateway is at least 5 feet
(1.5m) away from cordless phone base stations.
Q: How do I reset the Home Gateway to its factory default settings?
A: To reset the Home Gateway, locate the reset button on the Gateway and press
and hold it for at least 10 seconds using a paperclip or similar tool.
Q: Where can I find firmware updates for the Home Gateway?
A: Firmware updates for the Home Gateway can be found on the Comtrend website
at http://www.comtrend.com. Make sure to download the appropriate firmware
version for your device.
Preface
This manual provides information related to the installation and operation of
this device. The individual reading this manual is presumed to have a basic
understanding of telecommunications terminology and concepts.
If you find the product to be inoperable or malfunctioning, please contact
technical support for immediate service by email at INT-support@comtrend.com
For product update, new product release, manual revision, or software
upgrades, please visit our website at http://www.comtrend.com
IMPORTANT SAFETY INSTRUCTIONS
When using your telephone equipment (for unpacking, installation, use, and
maintenance), basic safety precautions should always be followed to reduce the
risk of fire, electric shock and injury to persons, including the following:
Do not use this product near water for example, near a bathtub, washbowl,
kitchen sink or laundry tub, in a wet basement or near a swimming pool. Also,
do not expose the equipment to rain or damp areas (e.g. a wet basement). Never
install telephone wiring during stormy weather conditions. Avoid using a
telephone (other than a cordless type) during an electrical storm there may be
a remote risk of electric shock from lightning. Do not use the telephone to
report a gas leak in the vicinity of the leak Use only the power cord and
batteries (or adapter) indicated in this manual. Do not dispose of batteries
in a fire. They may explode. Check with local codes for possible special
disposal instructions Do not connect the power supply cord on elevated
surfaces. Allow it to lie freely. There should be no obstructions in its path
and no heavy items should be placed on the cord. In addition, do not walk on,
step on, or mistreat the cord. SAVE THESE INSTRUCTIONS
CAUTION: Always disconnect all telephone lines from the wall outlet before servicing or disassembling this equipment. Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. Do not stack equipment or place equipment in tight spaces, in drawers, or on carpets. Be sure that your equipment is surrounded by at least inches of air space. To prevent interference with cordless phones, ensure that the gateway is at least 5 feet ( 1.5m )from the cordless phone base station. If you experience trouble with this equipment, disconnect it from the network until the problem has been corrected or until you are sure that equipment is not malfunctioning.
WARNING
Disconnect the power line from the device before servicing For indoor use only
Do NOT open the casing Do NOT use near water Keep away from the fire For use
in ventilated environment / space
User Information Any changes or modifications not expressly approved by the
party responsible for compliance could void your authority to operate the
equipment.
Aucune modification apportée à l’appareil par l’utilisateur, quelle qu’en soit
la nature. Tout changement ou modification peuvent annuler le droit
d’utilisation de l’appareil par l’utilisateur.
Note: This equipment has been tested and found to comply with the limits for a
Class B digital device, pursuant to part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio
frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to radio communications. However,
there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one or more
of the following measures:
–Reorient or relocate the receiving antenna. –Increase the separation between
the equipment and receiver. –Connect the equipment into an outlet on a circuit
different from that to which the receiver is connected. –Consult the dealer or
an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This Class B digital apparatus complies with Canadian ICES-003. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that permitted for successful communication. This device complies with Part 15 of the FCC Rules and
Industry Canada licenceexempt RSS standard(s).
Operation is subject to the following two conditions: 1. This device may not
cause interference, and 2. This device must accept any interference, including
interference that may cause undesired operation of the device.
Radiation Exposure
FCC
The operation of this device is prohibited on oil platforms, cars, trains,
boats, and aircraft, except that operation of this device is permitted in
large aircraft while flying above 10,000 feet. Operation of transmitters in
the 5.925-7.125 GHz band is prohibited for control of or communications with
unmanned aircraft systems.
1. This Transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
2. This equipment complies with FCC RF radiation exposure limits set forth
for an uncontrolled environment. This equipment should be installed and
operated with a minimum distance of 22 cm between the radiator and your body.
ISED
This device complies with the ISED radiation exposure limit set forth for an
uncontrolled environment. This device should be installed and operated with
minimum distance 22 cm between the radiator & your body. This transmitter must
not be co-located or operating in conjunction with any other antenna or
transmitter.
“This product meets the applicable Innovation, Science and Economic
development Canada technical specifications”.
The device for operation in the band 51505250 MHz is only for indoor use to
reduce the potential for harmful interference to co-channel mobile satellite
systems.
This product meets the applicable Industry Canada technical specifications.
The Ringer Equivalence Number (REN) indicates the maximum number of devices
allowed to be connected to a telephone interface. The termination of an
interface may consist of any combination of devices subject only to the
requirement that the sum of the RENs of all the devices not exceed five.
Operation shall be limited to indoor use only; Operation on oil platforms,
automobiles, trains, maritime vessels and aircraft shall be prohibited except
for on large aircraft flying above 3,048 m (10,000 ft). Devices shall not be
used for control of or communications with unmanned aircraft systems.
Part 15E / RSS-248( 6GHz )
Copyright
Copyright©2023 Comtrend Corporation. All rights reserved. The information contained herein is proprietary to Comtrend Corporation. No part of this document may be translated, transcribed, reproduced, in any form, or by any means without prior written consent of Comtrend Corporation.
NOTE:
This document is subject to change without notice.
Open Source Software Notice
Comtrend’s products use open source software to fulfill their function.
Licenses for the open source software are granted under the GNU General Public
License in various versions. For further information on the GNU General Public
License see http://www.gnu.org/licenses/
You are allowed to modify all open source code (except for proprietary
programs) and to conduct reverse engineering for the purpose of debugging such
modifications; to the extent such programs are linked to libraries licensed
under the GNU Lesser General Public License. You are not allowed to distribute
information resulting from such reverse engineering or to distribute the
modified proprietary programs.
The rights owners of the open source software require you to refer to the
following disclaimer which shall apply with regard to those rights owners:
Warranty Disclaimer
THE OPEN SOURCE SOFTWARE IN THIS PRODUCT IS DISTRIBUTED IN THE HOPE THAT IT
WILL BE USEFUL, BUT WITHOUT ANY WARRANTY, WITHOUT EVEN THE IMPLIED WARRANTY OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SEE THE APPLICABLE
LICENSES FOR MORE DETAILS. Comtrend’s products will strictly follow the
market’s standard requirements. It is not permitted to modify any Wi-Fi
parameters, including the Wi-Fi power setting.
Obtain Source Code If you wish to download the open source code please see:
https://www.comtrend.com/gplcddl.html
If you do not see the required source code on our website link and wish to be
provided with the entire source code for that product, we will provide it to
you and any third party with the source code of the software licensed under an
open source software license. Please send us a written request by email or
mail to one of the following addresses:
Email: Comtrend support team – opensource@comtrend.com
Postal: Comtrend Corporation 3F-1, 10 Lane 609,
5
Chongxin Rd., Section 5, Sanchong Dist, New Taipei City 241405, Taiwan Tel: 886-2-2999-8261 In detail name the product and firmware version for which you request the source code and indicate means to contact you and send you the source code. PLEASE NOTE WE WILL CHARGE THE COSTS OF A DATA CARRIER AND THE POSTAL CHARGES TO SEND THE DATA CARRIER TO YOU.THE AMOUNT WILL VARY ACCORDING TO YOUR LOCATION AND THE COMTREND SUPPORT TEAM WILL NOTIFY THE EXACT COSTS WHEN REVIEWING THE REQUEST. THIS OFFER IS VALID FOR THREE YEARS FROM THE MOMENT WE DISTRIBUTED THE PRODUCT. FOR MORE INFORMATION AND THE OPEN SOURCE LIST (& RESPECTIVE LICENCES) FOR INDIVIDUAL PRODUCTS PLEASE SEE: https://www.comtrend.com/gplcddl.html
Protect Our Environment
This symbol indicates that when the equipment has reached the end of its
useful life, it must be taken to a recycling centre and processed separate
from domestic waste. The cardboard box, the plastic contained in the
packaging, and the parts that make up this router can be recycled in
accordance with regionally established regulations. Never dispose of this
electronic equipment along with your household waste; you may be subject to
penalties or sanctions under the law. Instead, please be responsible and ask
for disposal instructions from your local government.
Chapter 1 Introduction
PRT-6351 is a triple band Wi-Fi 6E Gateway with an updated silicon platform.
It provides a 2.5 Giga Ethernet WAN port and four Giga Ethernet ports,
supporting Wi-Fi 6 (802.11ax) Wireless solution on frequency band of 2.4GHz
(4T4R), 5GHz (4T4R) and 6GHz (2T2R). PRT-6351 allows central management (ACS)
by following TR-069.The core design concept of PRT-6351 is to enhance the user
experience on high speed applications with its high power wireless design, so
as to provide better coverage and stable Wi-Fi services.
10
Chapter 2 Installation
2.1 Hardware Setup
Non-stackable This device is not stackable do not place units on top of each
other, otherwise damage could occur. Follow the instructions below to complete
the hardware setup.
11
2.1.1 Back Panel
The figure below shows the back panel of the device.
WiFi On/Off Button Press the button for more than 5 to enable/disable the WiFi
function. WPS Button Press and release the button to enable WPS which will
allow 2 minutes for WiFi connection. Ethernet (LAN) Ports Use 1000-BASE-T
RJ-45 cables to connect up to four network devices to a Gigabit LAN, or
10/100BASE-T RJ-45 cables for slower networks. As these ports are autosensing
MDI/X, either straight-through or crossover cable can be used.
GETH WAN PORT This port is designated to be used for 2.5 Gigabit Ethernet WAN
functionality only. Use an Ethernet RJ-45 cable to connect to Gigabit WAN
server for standard network usage.
USB Port This port can be used to connect the router to a storage device. It
can only be used for SAMBA(storage) and for a Printer Server. Support for
other devices may be added in future firmware upgrades.
Reset Button Restore the default parameters of the device by pressing the Reset button for 10 seconds. After the device has rebooted successfully, the front panel should display as expected (see section 2.1.2 Front Panel for details).
NOTE:
If pressed down for more than 60 seconds, the PRT-6351 will go into a firmware update state (CFE boot mode). The firmware can then be updated using an Internet browser pointed to the default IP address.
Power ON Press the power button to the OFF position (OUT). Connect the power adapter to the power port. Attach the power adapter to a wall outlet or other AC source. Press the power button to the ON position (IN). If the Power LED displays as expected then the device is ready for setup (see section LED Indicators).
Caution 1: If the device fails to power up, or it malfunctions, first verify
that the power cords are connected securely and then power it on again. If the
problem persists, contact technical support.
Caution 2: Before servicing or disassembling this equipment, disconnect all
power cords and telephone lines from their outlets.
Front Panel
The front panel LED indicators are shown below and explained in the following
table. This information can be used to check the status of the device and its
connections.
LED
Color
INTERNET Green
Mode On Off
Function
IP connected and no traffic detected (the device has a WAN IP address from
IPCP or DHCP is up or a static IP address is configured, PPP negotiation is
successfully complete.)
If the IP or PPPoE session is dropped due to an idle timeout, the light will
remain green.
Modem power off, modem in WDS mode or WAN connection not present.
14
2.5GE WAN 6G WiFi 5G WiFi 2.4G WiFi
WPS
ETH 1X4X
USB POWER
Red Green Green Green Green
Green
Green Green Green
Red
Blink
On
On Off Blink On Off Blink On Off Blink On Off Blink On Off Slow Blink Fast
Blink On Off Blink On
Off
Blink On Off
On
IP connected and IP Traffic is passing through the device (either direction)
Device attempted to become IP connected and failed (no DHCP response, no PPPoE
response, PPPoE authentication failed, no IP address from IPCP, etc.) Ethernet
WAN is connected. Ethernet WAN is not connected.
Ethernet WAN is transmitting/ receiving. Wi-Fi enabled.
Wi-Fi disabled.
Data transmitting or receiving over WLAN.
Wi-Fi enabled. Wi-Fi disabled. Data transmitting or receiving over WLAN. Wi-Fi
enabled. Wi-Fi disabled. Data transmitting or receiving over WLAN.
WPS connection successful. The LED will stay on for three minutes. No WPS
association process ongoing.
WPS connection in progress.
WPS connection unsuccessful. The LED will keep blinking until client is
connected. An Ethernet Link is established.
An Ethernet Link is not established. Data transmitting or receiving over
Ethernet.
At least one device is connected to any USB ports. No device is connected to
the USB port or a device is connected to the USB port but not active. Data
TX/RX through the USB port.
The device is powered up. The device is powered down. POST (Power On Self
Test) failure or other malfunction. A malfunction is any error of internal
sequence or state that will prevent the device from connecting to the DSLAM or
passing customer data.
15
Note: A malfunction is any error of internal sequence or state that will
prevent the device from connecting to the DSLAM or passing customer data. This
may be identified at various times such after power on or during operation
through the use of self testing or in operations which result in a unit state
that is not expected or should not occur.
16
Chapter 3 Web User Interface
This section describes how to access the device via the web user interface
(WUI) using an Internet browser such as Internet Explorer (version 5.0 and
later).
3.1 Default Settings
The factory default settings of this device are summarized below. LAN IP
address: 192.168.1.1 LAN subnet mask: 255.255.255.0 Administrative access
(username: root, password: 12345) WLAN access: enabled
Technical Note During power on, the device initializes all settings to default
values. It will then read the configuration profile from the permanent storage
section of flash memory. The default attributes are overwritten when identical
attributes with different values are configured. The configuration profile in
permanent storage can be created via the web user interface or telnet user
interface, or other management protocols. The factory default configuration
can be restored either by pushing the reset button for more than ten seconds
until the power indicates LED blinking or by clicking the Restore Default
Configuration option in the Restore Settings screen.
17
IP Configuration
DHCP MODE
When the PRT-6351 powers up, the onboard DHCP server will switch on. Basically, the DHCP server issues and reserves IP addresses for LAN devices, such as your PC.
To obtain an IP address from the DCHP server, follow the steps provided below.
NOTE:
The following procedure assumes you are running Windows. However, the general steps involved are similar for most operating systems (OS). Check your OS support documentation for further details.
STEP 1: From the Network Connections window, open Local Area Connection (You may also access this screen by double-clicking the Local Area Connection icon on your taskbar). Click the Properties button.
STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button.
STEP 3: Select Obtain an IP address automatically as shown below.
STEP 4: Click OK to submit these settings. If you experience difficulty with
DHCP mode, you can try static IP mode instead.
18
STATIC IP MODE
In static IP mode, you assign IP settings to your PC manually.
Follow these steps to configure your PC IP address to use subnet 192.168.1.x.
NOTE:
The following procedure assumes you are running Windows. However, the general steps involved are similar for most operating systems (OS). Check your OS support documentation for further details.
STEP 1: From the Network Connections window, open Local Area Connection (You
may also access this screen by double-clicking the Local Area Connection icon
on your taskbar). Click the Properties button.
STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button.
STEP 3: Change the IP address to the 192.168.1.x (1<x<255) subnet with subnet
mask of 255.255.255.0. The screen should now display as shown below.
STEP 4: Click OK to submit these settings. 19
3.3 Login Procedure
Perform the following steps to login to the web user interface. NOTE: The default settings can be found in section 3.1 Default Settings.
STEP 1: Start the Internet browser and enter the default IP address for the device in the Web address field. For example, if the default IP address is 192.168.1.1, type http://192.168.1.1.
NOTE:
For local administration (i.e. LAN access), the PC running the browser must be attached to the Ethernet, and not necessarily to the device. For remote access (i.e. WAN), use the IP address shown on the Device Information screen and login with remote username and password.
STEP 2: A dialog box will appear, such as the one below. Enter the default username and password, as defined in section 3.1 Default Settings.
Click OK to continue. NOTE: The login password can be changed later (see section 8.7.1 Accounts).
20
STEP 3: After successfully logging in for the first time, you will reach this
screen.
You can also reach this page by clicking on the following icon located at the
top of the screen.
Chapter 4 Device Information
You can reach this page by clicking on the following icon located at the top
of the screen.
The web user interface window is divided into two frames, the main menu (on
the left) and the display screen (on the right). The main menu has several
options and selecting each of these options opens a submenu with more
selections. NOTE: The menu items shown are based upon the configured
connection(s) and user account privileges. For example, user account has
limited access to configuration modification. Device Info is the first
selection on the main menu so it will be discussed first. Subsequent chapters
will introduce the other main menu options in sequence. The Device Info
Summary screen displays at startup.
23
This screen shows hardware, software, IP settings and other related information. 24
4.1 WAN
Select WAN from the Device Info submenu to display the configured PVC(s).
Refresh Click this button to refresh the screen. DHCP Release Click this button to release the IP through IPoE service. DHCP Renew – Click this button to refresh an IP through IPoE service.
Item Interface Description Type VlanMuxId IPv6 Igmp Pxy
Igmp Src Enbl
MLD Pxy
MLD Src Enbl
NAT
Description Name of the interface for WAN
Name of the WAN connection
Shows the connection type
Shows 802.1Q VLAN ID
Shows WAN IPv6 status
Shows Internet Group Management Protocol (IGMP) proxy status
Shows the status of WAN interface used as IGMP source
Shows Multicast Listener Discovery (MLD) proxy status
Shows the status of WAN interface used as MLD source
Shows Network Address Translation (NAT) status
Firewall IPv4 Status
IPv4 Address PPP connect/disconnect IPv6 Status
IPv6 Address
Shows the status of Firewall Lists the status of IPv4 connection if WAN
enabled IPv4 Shows the WAN IPv4 address Shows the PPP connection status
Lists the status of IPv6 connection if WAN enabled IPv6 Shows the WAN IPv6
address
For your reference, if Manual Mode is enabled in PPP service as shown here.
Manual PPP connect/disconnect option will become available on the WAN Info page (as shown here).
Statistics
This selection provides LAN and WAN statistics. NOTE: These screens are
updated automatically every 15 seconds.
Click Reset Statistics to perform a manual update.
4.2.1 LAN Statistics
This screen shows data traffic statistics for each LAN interface.
Item
Interface
Received/Transmitted: – Bytes – Pkts – Errs – Drops
Description
LAN interface(s)
Number of Bytes Number of Packets Number of packets with errors Number of
dropped packets
WAN Service
This screen shows data traffic statistics for each WAN interface.
Item
Interface
Description
Received/Transmitted – Bytes – Pkts – Errs – Drops
Description
WAN interfaces
WAN service label
Number of Bytes Number of Packets Number of packets with errors Number of
dropped packets
Route
Choose Route to display the routes that the PRT-6351 has found.
Item
Description
Destination Destination network or destination host
Gateway
Next hop IP address
Subnet Mask
Subnet Mask of Destination
Flag
U: route is up !: reject route G: use gateway H: target is a host R: reinstate route for dynamic routing D: dynamically installed by daemon or redirect M: modified from routing daemon or redirect
Metric
The ‘distance’ to the target (usually counted in hops). It is not used by recent kernels, but may be needed by routing daemons.
Service
Shows the WAN connection label
Interface
Shows connection interfaces
ARP
Click ARP to display the ARP information.
Item IP address Flags HW Address Device
Description Shows IP address of host PC Complete, Incomplete, Permanent, or Publish Shows the MAC address of host PC Shows the connection interface
DHCP
Click DHCP to display all DHCP Leases.
Item Hostname
MAC Address IP Address
Address Source
Interface Type Status
Expires In
Tx bytes
Rx bytes
Description Shows the device/host/PC network name Shows the Ethernet MAC
address of the device/host/PC
Shows IP address of device/host/PC Shows IP type of device/host/PC, could be
DHCP/Static
Shows interface type of device/host/PC, could be Ethernet/802.11 Show status
of device/host/PC, could be active/inactive Shows how much time is left for
each DHCP Lease Show total Tx bytes of device/host/PC Show total Rx bytes of
device/host/PC
NAT Session
This page displays all NAT connection session including both UPD/TCP protocols
passing through the device.
Click the “Show All” button to display the following.
Item Source IP
Source Port
Destination IP Destination Port
Description
The source IP from which the NAT session is established
The source port from which the NAT session is established
The IP which the NAT session was connected to
The port which the NAT session was connected to
Protocol Timeout
The Protocol used in establishing the particular NAT session
The time remaining for the TCP/UDP connection to be active
IGMP Info
Click IGMP Info to display the list of IGMP entries broadcasting through the
IGMP proxy enabled WAN connection.
Item Interface
WAN
Groups Member
Timeout Last Report Time Total Time(sec) Total Joins
Total Leaves
Description The Source interface from which the IGMP report was received
The WAN interface from which the multicast traffic is received
The destination IGMP group address
The Source IP from which the IGMP report was received
The time remaining before the IGMP report expires
The time of the last received IGMP report
Total time that the IGMP stream has been played
Total IGMP join packets received for this IGMP address for this client
Total IGMP leave packets received for this IGMP address for this client
CPU & Memory
Displays the system performance graphs. Shows the current loading of the CPU
and memory usage with dynamic updates.
Network Map
The network map is a graphical representation of router’s wan status and LAN
devices.
Wireless
Station Info
This page shows authenticated wireless stations and their status.
Consult the table below for descriptions of each column heading.
Item MAC Address Association Time
Authorized WMM Link Power Save
Spec BW
Description
Lists the MAC address of all the stations.
Lists all the stations that are associated with the Access Point, along with
the amount of time since packets were transferred to and from each station. If
a station is idle for too long, it is removed from this list.
Lists those devices with authorized access
Lists those devices that utilize WMM
Lists those devices that utilize the Power Save Feature
Wi-Fi Spec
Bandwidth
Lists the devices that utilize Dynamic WDS Received Signal Strength Indicator
4.10.2 WiFi Insight
This page allows you to configure the WiFi Insight system. The WiFi Insight
system allows the wireless interface to collect beacon data from nearby
devices and analyze traffic on the connected stations. This data collection
requires memory storage and therefore needs to be configured prior to use. To
begin, click on the “Start Data Collection” button if no change is needed.
Sample Interval Select a desired sample interval (time interval) to collect sampling data with the WiFi insight system. Start/Stop Data Collection Check the checkbox of Start collecting data every (then select days & times). Database Size Define the dedicated database size to be used for the WiFi insight system (default is 2MB). Once the database size has reached its limit, select if you wish to overwrite older data or to stop data collection. Counters All counter options are selected (checked) by default. Uncheck any counters that that you do not want collected by the WiFi insight system. Click the Submit button to save your settings. Export Database Click the Save Database to File button to export and save the collected Wi-Fi data information file.
Site Survey
The graph displays wireless APs found in your neighborhood by channel
collected under the WiFi insight system.
Select the wireless network (2.4GHz in above example) that you wish to monitor
from the drop-down menu.
1. Select the channel that you wish to monitor from the drop-down menu. 2.
Select a bandwidth of the wireless network from the drop-down menu. 3. Click
the Scan button to run the scan and display the results based on
your selected preferences.
Consult the table below for descriptions of each column heading.
Item
Network Name
Network Address
Description SSIDs in the vicinity MAC address which belongs to SSIDs in the vicinity
40
Signal [dBm] SNR [dB] Bandwidth [MHz] Center Channel
Control Channel
Max PHY Rate [Mbps] 802.11
Security
Signal Strength of each SSID Signal-to-Noise Ratio of each SSID Bandwidth of
each SSID
Center Channel of each SSID Control Channel of each SSID
Max PHY Rate of each SSID
802.11 type of each SSID Wi-Fi password encryption type of each SSID
Channel Statistics This page allows you to see the Wi-Fi and Non Wi-Fi
interference, and also the available capacity. This page is broken down into
individual parts below. Click on the drop-down menu to select 2.4GHz or 5GHz
interface. 2.4 GHz
Shows the bandwidth that is available for use in each channel.
Shows interference level in each channel. Shows the highest RSSI (Received
Signal Strength Indicator) on each adjacent channel. Adjacent AP and
associated stations are displayed for checking interference on those channels
Shows interference level in each channel.
Shows the highest RSSI (Received Signal Strength Indicator) on each adjacent
channel. Adjacent AP and associated stations are displayed for checking
interference on those channels.
For each AP, the graph shows the control channel and extension channels.
Extension channel is any channel spanned by the AP that is not a control
channel.
4.10.2.3 Metrics (Advanced Troubleshooting) In this page you will see most of
the counters like AMPDU(if available), Glitch, Chanim and Packet Queue
Statistics. This page is broken down into individual parts below.
Click on the drop-down menu to select 2.4GHz or 5GHz interface. Shows the rx
glitch counters, bad frame check sequence counters received from air over
time.
Select the counter of interest to monitor the statistics received over time in
the chanim statistics graph.
Lists the associated station to the wireless interface.
Configure This page allows you to configure the WiFi Insight system. The WiFi
Insight system allows the wireless interface to collect beacon data from
nearby devices and analyze traffic on the connected stations. This data
collection requires memory storage and therefore needs to be configured prior
to use. To begin, click on the “Start Data Collection” button if no change is
needed.
Sample Interval Select a desired sample interval (time interval) to collect
sampling data with the WiFi insight system. Start/Stop Data Collection Check
the checkbox of Start collecting data every (then select days & times).
Database Size Define the dedicated database size to be used for the WiFi
insight system (default is 2MB). Once the database size has reached its limit,
select if you wish to overwrite older data or to stop data collection.
47
Counters All counter options are selected (checked) by default. Uncheck any counters that that you do not want collected by the WiFi insight system. Click the Submit button to save your settings. Export Database Click the Save Database to File button to export and save the collected Wi-Fi data information file.
4.11 Topology
This displays the arrangement of devices of the communication network. The
dotted line represents a wireless connection, whereas a solid line represents
a wired connection.
Click the Device Scan button to scan for the network topology. Consult the table below for descriptions of each column heading.
Item Topology ID
Hostname MAC Address IP Address Backhaul
Description
This shows different IDs for different host devices: Master AP: Host device is
a gateway Node AP: Slave AP And it remains empty for Client devices
Displays the name of the device
Displays the MAC address of the device
Displays the IP address of the device
Shows the type of link for only Node AP; Ethernet: Connected by wired Ethernet
PLC: Connected by Power Line WLan802.11: Connected by 802.11
49
RSSI
Device Connected Ping
Displays the received signal strength indicator (signal strength) for the
device Displays the number of devices connected
Click the button and follow the onscreen instructions to ping a device.
50
Chapter 5 Basic Setup
You can reach this page by clicking on the following icon located at the top
of the screen. This will bring you to the following screen.
51
5.1 WAN Setup
Click WAN Setup on the on the left of your screen. Add or remove ETH WAN
interface connections here.
Click Add to create a new Layer 2 Interface (see Appendix F – Connection
Setup). To remove a connection, click the Remove button.
52
5.1.1 WAN Service Setup
This screen allows for the configuration of WAN interfaces.
Click the Add button to create a new connection. For connections on ATM or PTM
or ETH WAN interfaces see Appendix F – Connection Setup.
To remove a connection, select its Remove column radio button and click Remove.
Item Interface Description Type Vlan8021p VlanMuxId VlanTpid IGMP Proxy
IGMP Source NAT Firewall IPv6 MLD Proxy Mld Source Manual Mode
Remove
Description Name of the interface for WAN Name of the WAN connection Shows the connection type VLAN ID is used for VLAN Tagging (IEEE 802.1Q) Shows 802.1Q VLAN ID VLAN Tag Protocol Identifier Shows Internet Group Management Protocol (IGMP) Proxy status Shows the status of WAN interface used as IGMP source Shows Network Address Translation (NAT) status Shows the Security status Shows the WAN IPv6 address Shows Multicast Listener Discovery (MLD) Proxy status Shows the status of WAN interface used as MLD source Indicates the status of the PPP manual connect/disconnect button Select interfaces to remove
53
Edit
Click the Edit button to make changes to the WAN
interface
To remove a connection, select its Remove column radio button and click
Remove.
NOTE: Up to 16 PVC profiles can be configured and saved in flash memory.
54
5.2 NAT
For NAT features under this section to work, NAT must be enabled in at least
one PVC.
5.2.1 Virtual Servers
Virtual Servers allow you to direct incoming traffic from the WAN side
(identified by Protocol and External port) to the internal server with private
IP addresses on the LAN side. The Internal port is required only if the
external port needs to be converted to a different port number used by the
server on the LAN side. A maximum of 32 entries can be configured.
To add a Virtual Server, click Add. The following will be displayed.
Click Apply/Save to apply and save the settings. 55
Consult the table below for item descriptions.
Item Use Interface
Select a Service Or Custom Service Server IP Address Enable NAT Loopback
External Port Start
External Port End
Protocol Internal Port Start
Internal Port End
Description
Select a WAN interface from the drop-down menu. If you choose All Interface,
server rules will be created for all WAN interfaces.
User should select the service from the list. Or User can enter the name of
their choice.
Enter the IP address for the server.
Allows local machines to access virtual server via WAN IP Address
Enter the starting external port number (when you select Custom Server). When
a service is selected, the port ranges are automatically configured.
Enter the ending external port number (when you select Custom Server). When a
service is selected, the port ranges are automatically configured.
TCP, TCP/UDP, or UDP.
Enter the internal port starting number (when you select Custom Server). When
a service is selected the port ranges are automatically configured
Enter the internal port ending number (when you select Custom Server). When a
service is selected, the port ranges are automatically configured.
56
Port Triggering
Some applications require that specific ports in the firewall be opened for
access by the remote parties. Port Triggers dynamically ‘Open Ports’ in the
firewall when an application on the LAN initiates a TCP/UDP connection to a
remote party using the ‘Triggering Ports’. The Router allows the remote party
from the WAN side to establish new connections back to the application on the
LAN side using the ‘Open Ports’. A maximum 32 entries can be configured.
To add a Trigger Port, click Add. The following will be displayed.
Click Save/Apply to save and apply the settings. 57
Consult the table below for item descriptions.
Item Use Interface Select an Application Or Custom Application Trigger Port
Start
Trigger Port End
Trigger Protocol Open Port Start
Open Port End
Open Protocol
Description
Select a WAN interface from the drop-down menu.
User should select the application from the list. Or User can enter the name
of their choice.
Enter the starting trigger port number (when you select custom application).
When an application is selected, the port ranges are automatically configured.
Enter the ending trigger port number (when you select custom application).
When an application is selected, the port ranges are automatically configured.
TCP, TCP/UDP, or UDP.
Enter the starting open port number (when you select custom application). When
an application is selected, the port ranges are automatically configured.
Enter the ending open port number (when you select custom application). When
an application is selected, the port ranges are automatically configured.
TCP, TCP/UDP, or UDP.
58
5.2.3 DMZ Host
The DSL router will forward IP packets from the WAN that do not belong to any
of the applications configured in the Virtual Servers table to the DMZ host
computer.
To Activate the DMZ host, enter the DMZ host IP address and click Save/Apply.
To Deactivate the DMZ host, clear the IP address field and click Save/Apply.
Enable NAT Loopback: Check the checkbox to allow local machines to access
virtual server via WAN IP Address.
59
5.2.4 ALG/Pass-Through
Support ALG Pass-through for the listed protocols.
To allow/deny the corresponding ALG protocol, select Enable / Disable and then
click the Save button. After reboot, the protocol will be added/removed
to/from the system module.
60
5.3 LAN
Configure the LAN interface settings and then click Apply/Save.
The settings shown above are described below.
GroupName: Select an Interface Group.
1st LAN INTERFACE Enable DHCP Client: Enable by checking the checkbox .
IP Address: Enter the IP address for the LAN port.
Subnet Mask: Enter the subnet mask for the LAN port.
Enable IGMP Snooping: Enable by checking the checkbox .
Standard Mode: In standard mode, multicast traffic will flood to all bridge ports when no client subscribes to a multicast group even if IGMP snooping is enabled.
Blocking Mode: In blocking mode, the multicast data traffic will be
blocked and not flood to all bridge ports when there
are
no client subscriptions to any multicast group.
61
Enable LAN side firewall: Enable by ticking the checkbox .
DHCP Server:
To enable DHCP, select Enable DHCP server and enter Start and End IP addresses and the Leased Time. This setting configures the router to automatically assign IP, default gateway and DNS server addresses to every PC on your LAN.
Setting TFTP Server: Enable by ticking the checkbox . Then, input the TFTP server address or an IP address.
Static IP Lease List: A maximum of 32 entries can be configured.
To add an entry, enter MAC address and Static IP and then click Apply/Save.
To remove an entry, tick the corresponding checkbox in the Remove column and then click the Remove Entries button, as shown below.
62
5.3.1 Lan VLAN Setting
The CPE will tag VLAN on specific LAN port(s) when this feature is used.
To enable VLAN Mode, check the checkbox and click the Apply/Save button. Click the Add button to display the following.
Item Vlan ID pbits Remove
Description The VLAN ID to be supported on the LAN port. The VLAN priority bit
to be supported on the LAN port.
Tick the checkbox and click the Remove button to delete entries.
63
5.3.2 LAN IPv6 Autoconfig
Configure the LAN interface settings and then click Save/Apply.
The settings shown above are described below. Static LAN IPv6 Address Configuration
Item
Interface Address (prefix length is required):
Description
Configure static LAN IPv6 address and subnet prefix length
64
IPv6 LAN Applications
Item Stateless Stateful Start interface ID:
End interface ID:
Leased Time (hour):
Description
Use stateless configuration
Use stateful configuration
Start of interface ID to be assigned to dhcpv6 client
End of interface ID to be assigned to dhcpv6 client
Lease time for dhcpv6 client to use the assigned IP address
Item Enable RADVD
Enable ULA Prefix Advertisement
Randomly Generate
Description Enable use of router advertisement daemon
Allow RADVD to advertise Unique Local Address Prefix
Use a Randomly Generated Prefix
Statically Configure Prefix
Specify the prefix to be used
Preferred Life Time (hour) The preferred life time for this prefix
Valid Life Time (hour)
The valid life time for this prefix
Enable MLD Snooping Standard Mode
Blocking Mode
Enable/disable IPv6 multicast forward to LAN ports
In standard mode, IPv6 multicast traffic will flood to all bridge ports when
no client subscribes to a multicast group even if MLD snooping is enabled
In blocking mode, IPv6 multicast data traffic will be blocked and not flood to
all bridge ports when there are no client subscriptions to any multicast group
65
5.3.3 UPnP
Select the checkbox provided and click Apply/Save to enable UPnP protocol.
66
5.4 Parental Control
This selection provides WAN access control functionality.
5.4.1 Time Restriction
This feature restricts access from a LAN device to an outside network through
the device on selected days at certain times. Make sure to activate the
Internet Time server synchronization as described in section 8.6 Internet
Time, so that the scheduled times match your local time. Clicking on the
checkbox in the Enable field allows the user to select all / none entries for
Enabling/Disabling.
Click Add to display the following screen.
See below for item descriptions. Click Apply/Save to add a time restriction.
User Name: A user-defined label for this restriction. Browser’s MAC Address:
MAC address of the PC running the browser.
67
Other MAC Address: MAC address of another LAN device. Days of the Week: The
days the restrictions apply. Start Blocking Time: The time the restrictions
start. End Blocking Time: The time the restrictions end.
5.4.2 URL Filter
This screen allows for the creation of a filter rule for access rights to
websites based on their URL address and port number.
Select URL List Type: Exclude or Include. Tick the Exclude radio button to
deny access to the websites listed. Tick the Include radio button to restrict
access to only those listed websites. Then click Add to display the following
screen.
Enter the URL address and port number then click Apply/Save to add the entry
to the URL filter. URL Addresses begin with “www”, as shown in this example.
68
A maximum of 100 entries can be added to the URL Filter list. 69
5.6 Home Networking
5.6.1 Print Server
This page allows you to enable or disable printer support.
Please reference Appendix E to see the procedure for enabling the Printer
Server.
5.6.2 DLNA
Enabling DLNA allows users to share digital media, like pictures, music and
video, to other LAN devices from the digital media server. Insert the USB
drive into the USB host port on the back of the router. Click Enable on-board
digital media server, a dropdown list of directories found on the USB driver
will be available for selection. Select media path from the dropdown list or
manually modify the media library path and click Apply/Save to enable the DLNA
media server.
70
Storage Service
The Storage service allows you to use Storage devices with modem to be more
easily accessed. 5.6.3.1 Storage Device Info This page also displays storage
devices attached to the USB host.
Display after storage device attached (for your reference).
71
5.6.3.2 Storage User Accounts Add a storage account to access the USB device
for the samba access system.
Click the Add button to display the following. volumeName would be disk1_1 if
only 1 USB has been plugged into the device.
In the boxes provided, enter the user name, password and volume name on which
the home directory is to be created. Then click the Apply/Save button.
72
In any windows folder, enter the address \192.168.1.1 to access the samba
folder created. A password prompt will show. Enter username password as
configured. Access \192.168.1.1 again (or refresh the screen), the user folder
will now be available for access.
5.7 Wireless
5.7.1 SSID
This page allows you to configure the Virtual interfaces for each Physical
interface.
73
Click the Apply button to apply your changes. The settings shown above are described below.
Item Wireless Interface BSS-MAC (SSID) BSS Enabled Network Name (SSID) Network
Type
AP Isolation
L2 Isolation BSS Max Associations Limit
Description
Select which wireless interface to configure
Select desired BSS to configure
Enable or disable this SSID
Sets the network name (also known as SSID) of this network
Selecting Closed hides the network from active scans. Selecting Open reveals
the network from active scans.
Selecting On enables AP Isolation mode. When enabled, STAs associated with the
AP will not be able to communicate with each other.
Wireless clients on the guest network cannot access hardwired LAN clients
Sets the maximum associations for this BSS
74
WMM Advertise
WMF
MAC Address Association Time
Signal Strength Authorized WMM Link Power Save Spec BW Dwds Rssi
When WMM is enabled for the radio, selecting On allows WMM to be advertised in
beacons and probes for this BSS. Off disables advertisement of WMM in beacons
and probes.
Choose On to enable Wireless Multicast Forwarding on this BSS. Off disables
this feature.
Lists the MAC address of all the stations.
Lists all the stations that are associated with the Access Point, along with
the amount of time since packets were transferred to and from each station. If
a station is idle for too long, it is removed from this list.
Wi-Fi connection signal strength icon
Lists those devices with authorized access
Lists those devices that utilize WMM
Lists those devices that utilize the Power Save Feature
Wi-Fi Spec
Bandwidth
Lists the devices that utilize Dynamic WDS
Received Signal Strength Indicator
75
5.7.2 Security
This page allows you to configure security for the wireless LAN interfaces.
Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).
Item Wireless Interface WPA
WPA-PSK
WPA2
Description Select which wireless interface to configure
Enable/disable WPA authenticated key management suite
Enable/disable WPA-PSK authenticated key management suite
Enable/disable WPA2 authenticated key management suite
76
WPA2-PSK
WPA3-SAE
WPA3
OWE
DPP
WPA2 Preauthentication WPA3-SuiteB WPA Encryption RADIUS Server
RADIUS Port
RADIUS Key WPA passphrase Protected Management Frames Network Key Rotation
Interval Pairwise Key Rotation Interval Network Reauth Interval
Enable/disable WPA2-PSK authenticated key management suite
Enable/disable WPA3-SAE authenticated key management suite
Enable/disable WPA3 authenticated key management suite
Enable/disable OWE authenticated key management suite
Enable/disable DPP authenticated key management suite
Enable/disable WPA2 Preauthenticated key management suite
Enable/disable WPA3-SuiteB key management suite
Select the WPA encryption algorithm
Set the IP of the RADIUS (Remote Authentication Dial In User Service) to use
for authentication and dynamic key derivation
Set the UDP port number of the RADIUS server. The port number is usually 1812
or 1645 and depends upon the server.
Set the shared secret for the RADIUS connection
Set the WPA passphrase
Wi-Fi CERTIFIED WPA2 with Protected Management Frames provides a WPA2-level of
protection for unicast and multicast management action frames.
Set the Network Key Rotation interval in seconds. Leave blank or set to zero
to disable the rotation.
Set the Pairwise Key Rotation interval in seconds. Leave blank or set to zero
to disable the rotation.
Set the Network Key Re-authentication interval in seconds. Leave blank or set
to zero to disable
77
periodic network re-authentication.
5.8 AutoXtend
AutoXtend is a function to construct and optimize a mesh-network. To select
information to synchronize with all mesh-network nodes, please check the
desired item and click the Apply/Save button.
To enable the AutoXtend features, check the required checkboxes and click the
Apply/Save button.
78
Chapter 6 Advanced Setup
You can reach this page by clicking on the following icon located at the top
of the screen.
6.1 Security
For detailed descriptions, with examples, please consult Appendix A –
Firewall.
6.1.1 IP Filtering
This screen sets filter rules that limit IP traffic (Outgoing/Incoming).
Multiple filter rules can be set and each applies at least one limiting
condition. For individual IP packets to pass the filter all conditions must be
fulfilled. NOTE: This function is not available when in WDS mode. Instead, MAC
Filtering performs a similar function. OUTGOING IP FILTER By default, all
outgoing IP traffic is allowed, but IP traffic can be blocked with filters.
To add a filter (to block some outgoing IP traffic), click the Add button. On
the following screen, enter your filter criteria and then click Apply/Save.
79
Click the Apply/Save button to apply and save your changes. Consult the table below for item descriptions.
Item Filter Name IP Version Protocol
Source IP address Source Port (port or port:port)
Destination IP address
Destination Port (port or port:port)
Description
The filter rule label (user defined)
Select from the drop down menu
Set the traffic type (TCP, TCP/UDP, UDP, or ICMP) that the rule will apply to
Enter source IP address for the IP filter
Enter source port number or range for the IP filter
Enter destination IP address for the IP filter
Enter destination port number or range for the IP filter
80
INCOMING IP FILTER By default, all incoming IP traffic is blocked, but IP
traffic can be allowed with filters.
To add a filter (to allow incoming IP traffic), click the Add button. On the
following screen, enter your filter criteria and then click Apply/Save.
Consult the table below for item descriptions. 81
Item Filter Name IP Version Protocol
Source IP address
Source Port (port or port:port)
Destination IP address
Destination Port (port or port:port)
Description
The filter rule label (user defined)
Select from the drop down menu
Set the traffic type (TCP, TCP/UDP, UDP, or ICMP) that the rule will apply to
Enter source IP address for the IP filter
Enter source port number or range for the IP filter
Enter destination IP address for the IP filter
Enter destination port number or range for the IP filter
At the bottom of this screen, select the WAN and LAN Interfaces to which the filter rule will apply. You may select all or just a subset. WAN interfaces in WDS mode or without firewall enabled are not available.
82
6.1.2 MAC Filtering
NOTE: This option is only available in WDS mode. Other modes use IP Filtering
to perform a similar function.
Each network device has a unique 48-bit MAC address. This can be used to
filter (block or forward) packets based on the originating device. MAC
filtering policy and rules for the PRT-6351 can be set according to the
following procedure. The MAC Filtering Global Policy is defined as follows.
FORWARDED means that all MAC layer frames will be FORWARDED except those
matching the MAC filter rules. BLOCKED means that all MAC layer frames will be
BLOCKED except those matching the MAC filter rules. The default MAC Filtering
Global policy is FORWARDED. It can be changed by clicking the Change Policy
button.
Choose Add or Remove to configure MAC filtering rules. The following screen
will appear when you click Add. Create a filter to identify the MAC layer
frames by specifying at least one condition below. If multiple conditions are
specified, all of them must be met.
83
Click Save/Apply to save and activate the filter rule. Consult the table below for detailed item descriptions.
Item Protocol Type
Destination MAC Address Source MAC Address Frame Direction WAN Interfaces
Description Select from the drop down menu the protocol (PPPoE, IPv4, IPv6,
AppleTalk, IPX, NetBEUI, IGMP) that will apply to this rule. Defines the
destination MAC address
Defines the source MAC address Select the incoming/outgoing packet interface
Applies the filter to the selected bridge interface
84
6.2 Quality of Service (QoS)
NOTE:
QoS must be enabled in at least one PVC to display this option. (See Appendix F – Connection Setup for detailed PVC setup instructions).
To Enable QoS tick the checkbox and select a Default DSCP Mark. Click Apply/Save to activate QoS.
QoS and DSCP Mark are defined as follows: Quality of Service (QoS): This
provides different priority to different users or data flows, or guarantees a
certain level of performance to a data flow in accordance with requests from
Queue Prioritization.
Default Differentiated Services Code Point (DSCP) Mark: This specifies the per
hop behavior for a given flow of packets in the Internet Protocol (IP) header
that do not match any other QoS rule.
85
6.2.1 QoS Queue
6.2.1.1 QoS Queue Configuration Configure queues with different priorities to
be used for QoS setup. In ATM mode, a maximum of 16 queues can be configured.
In PTM mode, a maximum of 8 queues can be configured. For each Ethernet
interface, a maximum of 8 queues can be configured. For each Ethernet WAN
interface, a maximum of 8 queues can be configured. (Please see the screen on
the following page).
86
87
To remove queues, check their remove-checkboxes (for user created queues),
then click the Remove button. The Enable button will scan through every queue
in the table. Queues with the enable-checkbox checked will be enabled. Queues
with the enable-checkbox unchecked will be disabled. The enable-checkbox also
shows status of the queue after page reload. Note that if WMM function is
disabled in the Wireless Page, queues related to wireless will not take
effect. This function follows the Differentiated Services rule of IP QoS.
Enable and assign an interface and precedence on the next screen. Click
Apply/Save on this screen to activate it. To add a queue, click the Add button
to display the following screen.
Name: Identifier for this Queue entry. Enable: Enable/Disable the Queue entry.
Interface: Assign the entry to a specific network interface (QoS enabled).
Drop Algorithm: Select the algorithm to be used to ensure that the QoS rule is
enforced if the traffic exceeds the configured limit. Drop Tail: Packets are
sent in first come first serve fashion, the tailing traffic would be dropped
if they exceed the handling limit. Random Early Detection: Packets are
monitored by configured queue threshold and serving proportion.
88
WRED: Weighted RED, the assigned monitoring queue would be given different
priority and threshold to ensure various priority queues would be served
fairly. After selecting an Interface the following will be displayed.
The precedence list shows the scheduler algorithm for each precedence level.
Queues of equal precedence will be scheduled based on the algorithm. Queues of
unequal precedence will be scheduled based on SP. Shaping Rate: Specify a
shaping rate limit to the defined queue. Click Apply/Save to apply and save
the settings.
89
6.2.1.2 Wlan Queue Displays the list of available wireless queues for WMM and
wireless data transmit priority.
90
6.2.2 QoS Classification
The network traffic classes are listed in the following table.
Click Add to configure a network traffic class rule and Enable to activate it.
To delete an entry from the list, click Remove. This screen creates a traffic
class rule to classify the upstream traffic, assign queuing priority and
optionally overwrite the IP header DSCP byte. A rule consists of a class name
and at least one logical condition. All the conditions specified in the rule
must be satisfied for it to take effect.
Click Apply/Save to save and activate the rule. 91
Consult the table below for detailed item descriptions.
Item
Description
Traffic Class Name
Enter a name for the traffic class.
Rule Order
Last is the only option.
Rule Status
Disable or enable the rule.
Classification Criteria
Ingress Interface
Select an interface: (i.e. LAN, WAN, local, ETH1, ETH2, ETH3, wl0)
Ether Type
Set the Ethernet type (e.g. IP, ARP, IPv6).
Source MAC Address
A packet belongs to SET-1, if a binary-AND of its source MAC address with the Source MAC Mask is equal to the binary-AND of the Source MAC Mask and this field.
Source MAC Mask
This is the mask used to decide how many bits are checked in Source MAC Address.
Destination MAC Address
A packet belongs to SET-1 then the result that the Destination MAC Address of its header binary-AND to the Destination MAC Mask must equal to the result that this field binary-AND to the Destination MAC Mask.
Destination MAC Mask
This is the mask used to decide how many bits are checked in the Destination MAC Address.
Classification Results
Specify Egress Interface
Choose the egress interface from the available list.
Specify Egress Queue
Mark Differentiated Service Code Point
Mark 802.1p Priority
Choose the egress queue from the list of available for the specified egress
interface.
The selected Code Point gives the corresponding priority to packets that
satisfy the rule.
Select between 0-7. – Class non-vlan packets egress to a non-vlan interface
will be tagged with VID 0 and the class rule p-bits.
92
Set Rate Limit
– Class vlan packets egress to a non-vlan interface will have the packet
p-bits re-marked by the class rule p-bits. No additional vlan tag is added. –
Class non-vlan packets egress to a vlan interface will be tagged with the
interface VID and the class rule p-bits. – Class vlan packets egress to a vlan
interface will be additionally tagged with the packet VID, and the class rule
p-bits.
The data transmission rate limit in kbps.
93
6.2.3 QoS Port Shaping
QoS port shaping supports traffic shaping of the Ethernet interface. Input the
shaping rate and burst size to enforce QoS rule on each interface. If “Shaping
Rate” is set to “-1”, it means no shaping and “Burst Size” will be ignored.
Click Apply/Save to apply and save the settings.
94
6.3 Routing
The following routing functions are accessed from this menu: Default Gateway,
Static Route, Policy Routing and RIP. NOTE: In WDS mode, the RIP menu option
is hidden while the other menu
options are shown but ineffective.
6.3.1 Default Gateway
The default gateway interface list can have multiple WAN interfaces served as
system default gateways but only one will be used according to the priority
with the first being the highest and the last one the lowest priority if the
WAN interface is connected. Priority order can be changed by removing all and
adding them back in again.
Click Apply/Save to apply and save the settings.
95
6.3.2 Static Route
This option allows for the configuration of static routes by destination IP.
Click Add to create a static route or click Remove to delete a static route.
After clicking Add the following will display.
IP Version: Select the IP version to be IPv4 or IPv6. Destination IP
address/prefix length: Enter the destination IP address. Interface: Select the
proper interface for the rule. Gateway IP Address: The next-hop IP address.
Metric: The metric value of routing. After completing the settings, click
Apply/Save to add the entry to the routing table.
96
6.3.3 Policy Routing
This option allows for the configuration of static routes by policy. Click Add
to create a routing policy or Remove to delete one.
On the following screen, complete the form and click Apply/Save to create a
policy.
Consult the table below for detailed item descriptions. 97
Item Policy Name Physical LAN Port Source IP Use Interface Default Gateway IP
Description Name of the route policy Specify the port to use this route policy IP Address to be routed Interface that traffic will be directed to IP Address of the default gateway
6.3.4 RIP
To activate RIP, configure the RIP version/operation mode and select the
Enabled checkbox for at least one WAN interface before clicking Apply/Save.
98
99
6.4 DNS
6.4.1 DNS Server
Select DNS Server Interface from available WAN interfaces OR enter static DNS
server IP addresses for the system. In ATM mode, if only a single PVC with
IPoA or static IPoE protocol is configured, Static DNS server IP addresses
must be entered. DNS Server Interfaces can have multiple WAN interfaces served
as system DNS servers but only one will be used according to the priority with
the first being the highest and the last one the lowest priority if the WAN
interface is connected. Priority order can be changed by removing all and
adding them back in again.
Click Apply/Save to save the new configuration. 100
6.4.2 Dynamic DNS
The Dynamic DNS service allows you to map a dynamic IP address to a static
hostname in any of many domains, allowing the PRT-6351 to be more easily
accessed from various locations on the Internet.
To add a dynamic DNS service, click Add. The following screen will display.
Click Apply/Save to save your settings.
Consult the table below for item descriptions.
Item
Description
101
D-DNS provider Hostname Interface Username
Password
Select a dynamic DNS provider from the list
Enter the name of the dynamic DNS server
Select the interface from the list
Enter the username of the dynamic DNS server
Enter the password of the dynamic DNS server
6.4.3 DNS Entries
The DNS Entry page allows you to add domain name and IP address pairs desired
to be resolved by the DSL router.
Choose Add or Remove to configure a DNS Entry. The entries will become active
after save/reboot.
Enter the domain name and IP address that needs to be resolved locally, and
click the Add Entry button.
102
6.5 DNS Proxy
DNS proxy receives DNS queries and forwards DNS queries to the Internet. After
the CPE gets answers from the DNS server, it replies to the LAN clients.
Configure DNS proxy with the default setting, when the PC gets an IP via DHCP,
the domain name, Home, will be added to PC’s DNS Suffix Search List, and the
PC can access route with “Comtrend.Home”.
103
6.8 Interface Grouping
Interface Grouping supports multiple ports to PVC and bridging groups. Each
group performs as an independent network. To use this feature, you must create
mapping groups with appropriate LAN and WAN interfaces using the Add button.
The Remove button removes mapping groups, returning the ungrouped interfaces
to the Default group. Only the default group has an IP interface.
To add an Interface Group, click the Add button. The following screen will
appear. It lists the available and grouped interfaces. Follow the instructions
shown onscreen.
104
Automatically Add Clients With Following DHCP Vendor IDs:
Add support to automatically map LAN interfaces to PVC’s using DHCP vendor ID
(option 60). The local DHCP server will decline and send the requests to a
remote DHCP server by mapping the appropriate LAN interface. This will be
turned on when Interface Grouping is enabled.
For example, imagine there are 4 PVCs (0/33, 0/36, 0/37, 0/38). VPI/VCI=0/33
is for PPPoE while the other PVCs are for IP set-top box (video). The LAN
interfaces are ETH1, ETH2, ETH3, and ETH4.
105
The Interface Grouping configuration will be: 1. Default: ETH1, ETH2, ETH3,
and ETH4. 2. Video: nas_0_36, nas_0_37, and nas_0_38. The DHCP vendor ID is
“Video”. If the onboard DHCP server is running on “Default” and the remote
DHCP server is running on PVC 0/36 (i.e. for set-top box use only). LAN side
clients can get IP addresses from the CPE’s DHCP server and access the
Internet via PPPoE (0/33). If a set-top box is connected to ETH1 and sends a
DHCP request with vendor ID “Video”, the local DHCP server will forward this
request to the remote DHCP server. The Interface Grouping configuration will
automatically change to the following: 1. Default: ETH2, ETH3, and ETH4 2.
Video: nas_0_36, nas_0_37, nas_0_38, and ETH1.
106
6.7 IP Tunnel
6.7.1 IPv6inIPv4
Configure 6in4 tunneling to encapsulate IPv6 traffic over explicitly-
configured IPv4 links.
Click the Add button to display the following.
Click Apply/Save to apply and save the settings.
Item Tunnel Name Mechanism
Description Input a name for the tunnel Mechanism used by the tunnel deployment
107
Associated WAN Interface Associated LAN Interface
Manual/Automatic
IPv4 Mask Length
6rd Prefix with Prefix Length Border Relay IPv4 Address
Select the WAN interface to be used by the tunnel
Select the LAN interface to be included in the tunnel
Select automatic for point-to-multipoint tunneling / manual for point-to-point
tunneling
The subnet mask length used for the IPv4 interface
Prefix and prefix length used for the IPv6 interface
Input the IPv4 address of the other device
108
6.7.2 IPv4inIPv6
Configure 4in6 tunneling to encapsulate IPv4 traffic over an IPv6-only
environment.
Click the Add button to display the following.
Click Apply/Save to apply and save the settings.
Item Tunnel Name Mechanism Associated WAN Interface
Description Input a name for the tunnel
Mechanism used by the tunnel deployment
Select the WAN interface to be used by the tunnel
109
Associated LAN Interface Manual/Automatic AFTR
Select the LAN interface to be included in the tunnel
Select automatic for point-to-multipoint tunneling / manual for point-to-point
tunneling
Address of Address Family Translation Router
6.7.3 MAP
This page allows you to configure MAP-T and MAP-E entries.
Click the Add button to display the following.
110
Click Apply/Save to apply and save the settings. The settings shown above are described below.
Item
Description
Mechanism
Choose whether to encapsulate with MAP-E or MAP-T to be used for NAT64 translation
Associated WAN Interface
Lists the LAN interfaces available to be used for IP MAP
Associated LAN Interface
Lists the LAN interfaces available to be used for IP MAP
Manual Automatic
Configure the prefix and relative PSID settings manually The prefix settings will be configured automatically from the mapping interfaces
BR IPv6 Prefix
Configure the border relay IPv6 Prefix
BMR IPv6 Prefix
Configure the basic mapping rule IPv6 Prefix
BMR IPv4 Prefix
Configure the basic mapping rule IPv4 Prefix
PSID Offset
Port Set ID offset assigned to the IP MAP
PSID Length
Define the port set ID length
PSID Value
Define the port set ID value
6.8 IPSec
6.8.1 IPSec Tunnel Mode Connections
You can add, edit or remove IPSec tunnel mode connections from this page.
111
Click Add New Connection to add a new IPSec termination rule. The following screen will display.
Heading IPSec Connection Name IP Version
Tunnel Mode
Description
User-defined label
Select the corresponding IPv4 / IPv6 version for the IPSEC connection
Select tunnel protocol, AH (Authentication Header) or ESP (Encapsulating
Security Payload) for this tunnel.
112
Local Gateway Interface
Remote IPSec Gateway Address
Tunnel access from local IP addresses
IP Address/Subnet Mask for VPN
Tunnel access from remote IP addresses
IP Address/Subnet Mask for VPN
Key Exchange Method
Select from the list of wan interface to be used as gateway for the IPSEC
connection
The location of the Remote IPSec Gateway. IP address or domain name can be
used.
Specify the acceptable host IP on the local side. Choose Single or Subnet.
If you chose Single, please enter the host IP address for VPN. If you chose
Subnet, please enter the subnet information for VPN.
Specify the acceptable host IP on the remote side. Choose Single or Subnet.
If you chose Single, please enter the host IP address for VPN. If you chose
Subnet, please enter the subnet information for VPN.
Select from Auto(IKE) or Manual
For the Auto(IKE) key exchange method, select Pre-shared key or Certificate
(X.509) authentication. For Pre-shared key authentication you must enter a
key, while for Certificate (X.509) authentication you must select a
certificate from the list.
See the tables below for a summary of all available options.
Auto(IKE) Key Exchange Method
Pre-Shared Key / Certificate (X.509) Perfect Forward Secrecy
Advanced IKE Settings
Input Pre-shared key / Choose Certificate
Enable or Disable Select Show Advanced Settings to reveal the advanced
settings options shown below.
113
Advanced IKE Settings
Phase 1 / Phase 2
Mode Encryption Algorithm Integrity Algorithm Select Diffie-Hellman Group Key
Life Time
Select Hide Advanced Settings to hide the advanced settings options shown
above. Choose settings for each phase, the available options are separated
with a “/” character. Main / Aggressive
DES / 3DES / AES 128,192,256
MD5 / SHA1
768 8192 bit
Enter your own or use the default (1 hour)
The Manual key exchange method options are summarized in the table below. Manual Key Exchange Method
114
Encryption Algorithm Encryption Key Authentication Algorithm Authentication Key SPI (default is 101)
DES / 3DES / AES (aes-cbc) DES: 16 digit Hex, 3DES: 48 digit Hex MD5 / SHA1 MD5: 32 digit Hex, SHA1: 40 digit Hex Enter a Hex value from 100-FFFFFFFF
115
6.9 Certificate
A certificate is a public key, attached with its owner’s information (company
name, server name, personal real name, contact e-mail, postal address, etc)
and digital signatures. There will be one or more digital signatures attached
to the certificate, indicating that these entities have verified that this
certificate is valid.
6.9.1 Local
116
CREATE CERTIFICATE REQUEST
Click Create Certificate Request to generate a certificate-signing request.
The certificate-signing request can be submitted to the vendor/ISP/ITSP to
apply for a certificate. Some information must be included in the certificate-
signing request. Your vendor/ISP/ITSP will ask you to provide the information
they require and to provide the information in the format they regulate. Enter
the required information and click Apply to generate a private key and a
certificatesigning request. The contents of this application form do not
affect the basic parameter settings of the product.
The following table is provided for your reference.
Item Certificate Name Common Name Organization Name State/Province Name Country/Region Name
Description
A user-defined name for the certificate.
Usually, the fully qualified domain name for the machine.
The exact legal name of your organization. Do not abbreviate.
The state or province where your organization is located. It cannot be
abbreviated.
The two-letter ISO abbreviation for your country.
117
IMPORT CERTIFICATE Click Import Certificate to paste the certificate content
and the private key provided by your vendor/ISP/ITSP into the corresponding
boxes shown below.
Enter a certificate name and click the Apply button to import the certificate
and its private key.
118
6.9.2 Trusted CA
CA is an abbreviation for Certificate Authority, which is a part of the X.509
system. It is itself a certificate, attached with the owner information of
this certificate authority; but its purpose is not encryption/decryption. Its
purpose is to sign and issue certificates, in order to prove that these
certificates are valid.
Click Import Certificate to paste the certificate content of your trusted CA.
The CA certificate content will be provided by your vendor/ISP/ITSP and is
used to authenticate the Auto-Configuration Server (ACS) that the CPE will
connect to.
Enter a certificate name and click Apply to import the CA certificate. 119
6.10 Multicast
Input new IGMP or MLD protocol configuration fields if you want modify default
values shown. Then click Apply/Save.
Multicast Precedence: Select precedence of multicast packets. Multicast Strict
Grouping Enforcement: Enable/Disable multicast strict grouping.
120
Item Default Version Query Interval
Query Response Interval
Last Member Query Interval
Robustness Value
Maximum Multicast Groups Maximum Multicast Data Sources (for IGMPv3) Maximum
Multicast Group Members Fast Leave Enable
Description
Define IGMP using version with video server.
The query interval is the amount of time in seconds between IGMP General Query
messages sent by the router (if the router is the querier on this subnet). The
default query interval is 125 seconds.
The query response interval is the maximum amount of time in seconds that the
IGMP router waits to receive a response to a General Query message. The query
response interval is the Maximum Response Time field in the IGMP v2 Host
Membership Query message header. The default query response interval is 10
seconds and must be less than the query interval.
The last member query interval is the amount of time in seconds that the IGMP
router waits to receive a response to a Group-Specific Query message. The last
member query interval is also the amount of time in seconds between successive
Group-Specific Query messages. The default last member query interval is 10
seconds.
The robustness variable is a way of indicating how susceptible the subnet is
to lost packets. IGMP can recover from robustness variable minus 1 lost IGMP
packets. The robustness variable should be set to a value of 2 or greater. The
default robustness variable value is 2.
Setting the maximum number of Multicast groups.
Define the maximum multicast video stream number.
Setting the maximum number of groups that ports can accept.
When you enable IGMP fast-leave processing, the switch immediately removes a
port when it detects an IGMP version 2 leave message on that port.
121
IGMP Group Exception List / MLD Group Exception List
Item Group Address
Mask/Mask Bits
Remove
Description
This is the delimited list of ignored multicast addresses being queried when
sending a GroupSpecific or Group-and-Source-Specific Query.
This is the delimited list of ignored multicast mask being queried when
sending a GroupSpecific or Group-and-Source-Specific Query.
Allows a user to remove a specific item in the exception list.
122
6.11 Wireless
6.11.1 SSID
This page allows you to configure the Virtual interfaces for each Physical
interface.
Click the Apply button to apply your changes. The settings shown above are described below.
Item Wireless Interface BSS-MAC (SSID) BSS Enabled Network Name (SSID) Network
Type
AP Isolation
Description
Select which wireless interface to configure
Select desired BSS to configure
Enable or disable this SSID
Sets the network name (also known as SSID) of this network
Selecting Closed hides the network from active scans. Selecting Open reveals
the network from active scans.
Selecting On enables AP Isolation mode. When enabled, STAs associated with the
AP will not be able to communicate with each other.
123
L2 Isolation BSS Max Associations Limit WMM Advertise
WMF MAC Address Association Time
Authorized WMM Link Power Save Spec BW Dwds Rssi
Wireless clients on the guest network cannot access hardwired LAN clients
Sets the maximum associations for this BSS
When WMM is enabled for the radio, selecting On allows WMM to be advertised in
beacons and probes for this BSS. Off disables advertisement of WMM in beacons
and probes.
Choose On to enable Wireless Multicast Forwarding on this BSS. Off disables
this feature.
Lists the MAC address of all the stations.
Lists all the stations that are associated with the Access Point, along with
the amount of time since packets were transferred to and from each station. If
a station is idle for too long, it is removed from this list.
Lists those devices with authorized access
Lists those devices that utilize WMM
Lists those devices that utilize the Power Save Feature
Wi-Fi Spec
Bandwidth
Lists the devices that utilize Dynamic WDS
Received Signal Strength Indicator
124
6.11.2 Security
This page allows you to configure security for the wireless LAN interfaces.
Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).
The descriptions are also shown below.
Item Wireless Interface WPA
WPA-PSK
Description
Select which wireless interface to configure
Enable/disable WPA authenticated key management suite
Enable/disable WPA-PSK authenticated key management suite
125
WPA2
WPA2-PSK
WPA3-SAE
WPA3
OWE
DPP
WPA2 Preauthentication WPA3-SuiteB WPA Encryption RADIUS Server
RADIUS Port
RADIUS Key WPA passphrase Protected Management Frames Network Key Rotation
Interval Pairwise Key Rotation Interval
Enable/disable WPA2 authenticated key management suite
Enable/disable WPA2-PSK authenticated key management suite
Enable/disable WPA3-SAE authenticated key management suite
Enable/disable WPA3 authenticated key management suite
Enable/disable OWE authenticated key management suite
Enable/disable DPP authenticated key management suite
Enable/disable WPA2 Preauthenticated key management suite
Enable/disable WPA3-SuiteB key management suite
Select the WPA encryption algorithm
Set the IP of the RADIUS (Remote Authentication Dial In User Service) to use
for authentication and dynamic key derivation
Set the UDP port number of the RADIUS server. The port number is usually 1812
or 1645 and depends upon the server.
Set the shared secret for the RADIUS connection
Set the WPA passphrase
Wi-Fi CERTIFIED WPA2 with Protected Management Frames provides a WPA2-level of
protection for unicast and multicast management action frames.
Set the Network Key Rotation interval in seconds. Leave blank or set to zero
to disable the rotation.
Set the Pairwise Key Rotation interval in seconds. Leave blank or set to zero
to disable the rotation.
126
Network Reauth Interval
Set the Network Key Re-authentication interval in seconds. Leave blank or set to zero to disable periodic network re-authentication.
127
6.11.3 WPS
This page allows you to configure WPS.
Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).
The descriptions are also shown below.
Item Wireless Interface WPS Current Mode
Description Select which wireless interface to configure Displays WPS current mode
128
WPS Configuration Device WPS UUID Device PIN
Configure by External Registrar Current SSID
Enable/Disable Wi-Fi simple config mode
Displays the WPS UUID number of this device
Displays the PIN number for this device. Click the Generate button to change a
unique Device PIN number. Set Allow/Deny wireless external registrar to
get/configure AP security through AP PIN Displays the current SSID
Current Authentication Type
Current Encryption Type
Current PSK
Displays the current authentication type Displays the current encryption type Displays the current PSK by clicking
SSID
Authentication Type Encryption Type WPA passphrase
Station PIN
Authorized Station MAC
Set the network name (also known as the SSID) of this network
Select the authentication type from the drop-down menu
Select the encryption type from the drop-down menu
Set the WPA passphrase. Click the Save Credentials button to save the Wi-Fi
access password.
Click the Reset To OOB (Out of Box configure) button to restore SSID/
Authentication Type / Encryption Type / WPA passphrase default setting.
Input the station PIN to verify expected station. Note: Empty for PBC method.
Input the authorized station MAC address. Click the Add Enrollee button to
start a WPS process. This WPS process is only for the client whose MAC is
typed in this field.
129
WPS Current Status
List Wifi-Invite enabled STAs
Wifi-Invite enabled STAs
Displays the WPS current status
Click the Refresh button to find WiFi-Invite enabled STAs Displays the list of
WiFi-Invite enabled STAs
6.11.4 MAC Filtering
This page allows you to configure the MAC Filtering for each Physical
interface.
Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).
The descriptions are also shown below.
Item Wireless Interface
Description Select which wireless interface to configure
130
BSS-MAC (SSID)
MAC Restrict Mode
MAC filter based Probe Response
MAC Addresses
Select desired BSS to configure
Select whether clients with the specified MAC address are allowed or denied
wireless access
Enable/Disable MAC filter based probe response mode
Allow/Deny wireless access to clients with the specified MAC addresses. The
MAC address format is xx:xx:xx:xx:xx:xx.
131
6.11.5 WDS
The wireless distribution system supports extended networking of wireless
access points and can be configured as described below.
Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).
The descriptions are also shown below.
Item Wireless Interface Peer MAC address
Restriction
Description
Select which wireless interface to configure
Enter the peer wireless MAC addresses of any member that should be part of the
Wireless Distribution System (WDS)
Select Disabled to disable the WDS restriction. Any WDS (including the ones
listed in Remote Bridges) will be granted access. Select Enabled to enable WDS
restriction. Only those bridges listed in Remote Bridges will be granted
access.
132
Link Direction Interval
Set the WDS link detection interval in seconds. Leave blank or set to zero to disable the detection.
Note: With reference to the above setup, please ensure that the conditions
below are met, and both devices are rebooted afterwards:
1. Ensure that the first Comtrend device (home router) does not use the same
IP address as the second Comtrend wireless device (wireless bridge). See
section 5.3 LAN, for details on how to change the IP address.
133
2. Both devices need to have the same fixed channel. See section 6.11.6
Advanced for details.
3. Both devices need to have a (different) fixed access SSID (Network Name).
See section 6.11.1 SSID for details.
134
4. Both devices need to have WPA2-PSK enabled. See section 6.11.2 Security
for details.
135
5. Both devices (A & B) need to have each other’s MAC address. See section
6.11.5 WDS for details.
6. Now make sure to reboot both devices. See section 8.9 Reboot for details.
136
6.11.6 Advanced
This page allows you to configure the Physical Wireless interfaces. 2.4GHz
137
5GHz 138
6GHz
Click the Apply button to apply your changes.
For information on each parameter, move the cursor over the parameter that you
are interested in (as shown here).
The descriptions are also shown below.
Item Wireless Interface
Description Select which wireless interface to configure
139
Interface 802.11 Band Channel Specification Bandwidth VLAN Priority Support
OBSS Coexistence Transmit Power Max Associations Limit Xpress Technology
Beamforming transmission (BFR)
Beamforming reception (BFE)
Enable/Disable the wireless interface
Select the 802.11 band to use
Select a channel specification
Select channel bandwidth
Advertise packet priority using VLAN tag
Enable/Disable overlapping BSS coexistence aka 20/40 coex
Select the transmit power percentage
Set the number of associations the driver should accept
Enable/Disable Xpress mode
This is a versatile technique for signal transmission from a number of
antennas to one or multiple users. In wireless networks it increases signal
power for the intended user and reduces interference to nonintended users.
VHT MU BFR: Wi-Fi 5 Multi User Beamforming transmission
HE MU BFR: Wi-Fi 6 Multi User Beamforming transmission
VHT MU + HE MU BFR: Wi-Fi 5 & Wi-Fi 6 Multi User Beamforming transmission
Disabled – Disables beamforming transmission
This is a versatile technique for signal reception from a number of antennas
to one or multiple users. In wireless networks it increases signal power for
the intended user and reduces interference to nonintended users.
VHT MU BFE: Wi-Fi 5 Multi User Beamforming reception
HE MU BFE: Wi-Fi 6 Multi User
140
MU-MIMO TX
Wifi 6 (11ax) RIFS Mode Advertisement WMM Support No-Acknowledgement APSD
Support Enable IGMP Proxy BandSteering Deamon
Beamforming reception VHT MU + HE MU BFE: Wi-Fi 5 & Wi-Fi 6 Multi User
Beamforming reception Disabled – Disables beamforming reception
(MU) Multi-user MIMO transmission is a set of multiple-input and multiple-
output technologies for multipath wireless communication, in which multiple
users or terminals, each radioing over one or more antennas, communicate with
one another. Client devices that support Wi-Fi 6 are highly recommended to
enable this feature. Disabled: Disables MU-MIMO transmission Note: Disabling
MU-MIMO TX, will also disable HE (Wi-Fi 6) MU-MIMO Enabled: Enables MU-MIMO
transmission Auto: In this mode of operation, the Access Point will detect the
wireless stations currently present in the network to determine the operation
mode
Control Wifi 6 features
Select the RIFS (Reduced Inter-Frame Spacing) mode to advertise in beacons and
probe responses
Enable/Disable WMM support
Enable/Disable EMM No-acknowledgement
Enable/Disable Automatic Power Save Technology
Enable/Disable IGMP Proxy
This is a function that automatically steers anyone connecting to a wireless
network to the best available frequency band (e.g. from 5G to 2.4G or vice
versa) providing an
141
Airtime Fairness Enable 802.11ax
optimized performance for the client. Please note that this feature is not
supported in this software version.
Default is Disable
Select Standalone to enable BandSteering
Enable/Disable airtime fairness between multiple links
Enabled by default. Select Off to disable AX mode
142
AutoXtend
AutoXtend is a function to construct and optimize a mesh-network. To select
information to synchronize with all mesh-network nodes, please check the
desired item and click the Apply/Save button.
To enable the AutoXtend features, check the required checkboxes and click the
Apply/Save button.
143
Chapter 7 Diagnostics
You can reach this page by clicking on the following icon located at the top
of the screen.
Diagnostics Individual Tests
The first Diagnostics screen is a dashboard that shows overall connection
status.
Click the Diagnostics Menu item on the left side of the screen to display the
individual connections.
References
- Select Your Location
- Licenses - GNU Project - Free Software Foundation
- Comtrend | Leading the Communication Trend