COMTREND PRT-6351 WiFi 6E TriBand AX7800 Ethernet Gateway User Manual

June 16, 2024
COMTREND

COMTREND PRT-6351 WiFi 6E TriBand AX7800 Ethernet Gateway

COMTREND-PRT-6351-WiFi-6E-TriBand-AX7800-Ethernet-Gateway-
PRODUCT

Specifications

  • Model: PRT-6351 (WR-2412u)
  • Type: Home Gateway
  • User Manual Version: A1.0 May 16, 2023

Preface

This manual provides information related to the installation and operation of the PRT-6351 (WR-2412u) Home Gateway. It is assumed that the reader has a basic understanding of telecommunications terminology and concepts. If you encounter any issues with the product, please contact our technical support for immediate assistance via email at INT-support@comtrend.com. For product updates, new releases, manual revisions, or software upgrades, please visit our website at http://www.comtrend.com.

Important Safety Instructions

When using your telephone equipment for unpacking, installation, use, and maintenance, it is important to follow basic safety precautions to reduce the risk of fire, electric shock, and injury to persons. Please adhere to the following safety guidelines:

  • Do not use this product near water, such as a bathtub or washbowl.
  • Always disconnect all telephone lines from the wall outlet before servicing or disassembling the equipment.
  • Do not stack equipment or place it in tight spaces, drawers, or on carpets. Ensure there is at least 2 inches of air space surrounding the equipment.
  • To prevent interference with cordless phones, ensure that the gateway is at least 5 feet (1.5m) away from the cordless phone base station.
  • If you experience trouble with the equipment, disconnect it from the network until the problem has been resolved or the equipment has been confirmed to be functioning properly.

WARNING

  • Disconnect the power line from the device before servicing.
  • For indoor use only.
  • Do not open the casing.
  • Do not use near water.
  • Keep away from fire.
  • For use in a ventilated environment/space.

Power Specifications (Alimentation)

  • Input: 12Vdc, 2.5A
  • Output: USB 3.0, 900mA

User Information
Any changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment. To ensure proper operation and compliance, please consider the following:

  • Reorient or relocate the receiving antenna.
  • Increase the separation between the equipment and the receiver.
  • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
  • Consult the dealer or an experienced radio/TV technician for assistance.

This device complies with Part 15 of the FCC Rules. It operates under the following conditions:

  1. The device may not cause harmful interference.
  2. The device must accept any interference received, including interference that may cause undesired operation.

This Class B digital apparatus complies with Canadian ICES-003. To reduce potential radio interference to other users, the antenna type and its gain should be chosen so that the equivalent isotropically radiated power (e.i.r.p.) is not more than permitted for successful communication. This device also complies with Part 15 of the FCC Rules and Industry Canada license-exempt RSS standard(s) and operates under the following conditions:

  1. The device may not cause interference.
  2. The device must accept any interference received, including interference that may cause undesired operation.

Installation

  1. Choose a suitable location for the Home Gateway.
  2. Ensure that the Gateway is placed at least 5 feet (1.5m) away from cordless phone base stations.
  3. Make sure there is at least 2 inches of air space surrounding the Gateway.
  4. Connect the power line to the Gateway and plug it into a suitable power outlet.
  5. Connect the necessary cables (e.g., Ethernet, telephone) to the appropriate ports on the Gateway and your devices.Operation

To operate the Home Gateway:

  1. Ensure that all cables are properly connected to the Gateway and your devices.
  2. Power on the Gateway by pressing the power button or plugging it into a power source.
  3. Wait for the Gateway to initialize and establish a connection to your network.
  4. You can now start using the Home Gateway for internet access, networking, and other supported functions.

Maintenance

To ensure the optimal performance and longevity of the Home Gateway:

  1. Regularly check the Gateway’s physical connections and cables for any signs of damage or loose connections. Replace or repair as necessary.
  2. Keep the Gateway in a clean and dust-free environment.
  3. If you encounter any issues or malfunctions, refer to the troubleshooting section of the user manual or contact technicalsupport for assistance.

Resetting the Home Gateway

If you need to reset the Home Gateway to its factory default settings:

  1. Locate the reset button on the Gateway (usually a small hole).
  2. Using a paperclip or similar tool, press and hold the reset button for at least 10 seconds.
  3. The Gateway will restart, and all settings will be reset to their default values.

Updating Firmware

If a firmware update is available for the Home Gateway:

  1. Visit the Comtrend website at http://www.comtrend.com to check for the latest firmware version.
  2. Download the firmware file and save it to your computer.
  3. Access the Gateway’s web-based administration interface by entering its IP address in a web browser.
  4. Navigate to the firmware update section and follow the on-screen instructions to upload and install the downloaded firmware file.
  5. Wait for the firmware update process to complete. Do not interrupt or power off the Gateway during this process.

Factory Support
If you require further assistance or have any questions regarding the Home Gateway, please contact our technical support team via email at INT- support@comtrend.com.

Frequently Asked Questions (FAQ)

Q: Can I use the Home Gateway near water?
A: No, it is not recommended to use the Home Gateway near water to avoid the risk of damage or electric shock.

Q: How far should the Home Gateway be placed from cordless phone base stations?
A: To prevent interference, ensure that the Home Gateway is at least 5 feet (1.5m) away from cordless phone base stations.

Q: How do I reset the Home Gateway to its factory default settings?
A: To reset the Home Gateway, locate the reset button on the Gateway and press and hold it for at least 10 seconds using a paperclip or similar tool.

Q: Where can I find firmware updates for the Home Gateway?
A: Firmware updates for the Home Gateway can be found on the Comtrend website at http://www.comtrend.com. Make sure to download the appropriate firmware version for your device.

Preface
This manual provides information related to the installation and operation of this device. The individual reading this manual is presumed to have a basic understanding of telecommunications terminology and concepts.

If you find the product to be inoperable or malfunctioning, please contact technical support for immediate service by email at INT-support@comtrend.com
For product update, new product release, manual revision, or software upgrades, please visit our website at http://www.comtrend.com

IMPORTANT SAFETY INSTRUCTIONS
When using your telephone equipment (for unpacking, installation, use, and maintenance), basic safety precautions should always be followed to reduce the risk of fire, electric shock and injury to persons, including the following: Do not use this product near water for example, near a bathtub, washbowl,
kitchen sink or laundry tub, in a wet basement or near a swimming pool. Also, do not expose the equipment to rain or damp areas (e.g. a wet basement). Never install telephone wiring during stormy weather conditions. Avoid using a telephone (other than a cordless type) during an electrical storm there may be a remote risk of electric shock from lightning. Do not use the telephone to report a gas leak in the vicinity of the leak Use only the power cord and batteries (or adapter) indicated in this manual. Do not dispose of batteries in a fire. They may explode. Check with local codes for possible special disposal instructions Do not connect the power supply cord on elevated surfaces. Allow it to lie freely. There should be no obstructions in its path and no heavy items should be placed on the cord. In addition, do not walk on, step on, or mistreat the cord. SAVE THESE INSTRUCTIONS

CAUTION: Always disconnect all telephone lines from the wall outlet before servicing or disassembling this equipment. Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. Do not stack equipment or place equipment in tight spaces, in drawers, or on carpets. Be sure that your equipment is surrounded by at least inches of air space. To prevent interference with cordless phones, ensure that the gateway is at least 5 feet ( 1.5m )from the cordless phone base station. If you experience trouble with this equipment, disconnect it from the network until the problem has been corrected or until you are sure that equipment is not malfunctioning.

WARNING
Disconnect the power line from the device before servicing For indoor use only Do NOT open the casing Do NOT use near water Keep away from the fire For use in ventilated environment / space
User Information Any changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment.
Aucune modification apportée à l’appareil par l’utilisateur, quelle qu’en soit la nature. Tout changement ou modification peuvent annuler le droit d’utilisation de l’appareil par l’utilisateur.

Note: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
–Reorient or relocate the receiving antenna. –Increase the separation between the equipment and receiver. –Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. –Consult the dealer or an experienced radio/TV technician for help.

This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This Class B digital apparatus complies with Canadian ICES-003. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that permitted for successful communication. This device complies with Part 15 of the FCC Rules and

Industry Canada licenceexempt RSS standard(s).
Operation is subject to the following two conditions: 1. This device may not cause interference, and 2. This device must accept any interference, including interference that may cause undesired operation of the device.

Radiation Exposure

FCC

The operation of this device is prohibited on oil platforms, cars, trains, boats, and aircraft, except that operation of this device is permitted in large aircraft while flying above 10,000 feet. Operation of transmitters in the 5.925-7.125 GHz band is prohibited for control of or communications with unmanned aircraft systems.
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
2. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 22 cm between the radiator and your body.

ISED
This device complies with the ISED radiation exposure limit set forth for an uncontrolled environment. This device should be installed and operated with minimum distance 22 cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
“This product meets the applicable Innovation, Science and Economic development Canada technical specifications”.
The device for operation in the band 5150­5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems.

This product meets the applicable Industry Canada technical specifications.
The Ringer Equivalence Number (REN) indicates the maximum number of devices allowed to be connected to a telephone interface. The termination of an interface may consist of any combination of devices subject only to the requirement that the sum of the RENs of all the devices not exceed five.
Operation shall be limited to indoor use only; Operation on oil platforms, automobiles, trains, maritime vessels and aircraft shall be prohibited except for on large aircraft flying above 3,048 m (10,000 ft). Devices shall not be used for control of or communications with unmanned aircraft systems.

Part 15E / RSS-248( 6GHz )

Copyright

Copyright©2023 Comtrend Corporation. All rights reserved. The information contained herein is proprietary to Comtrend Corporation. No part of this document may be translated, transcribed, reproduced, in any form, or by any means without prior written consent of Comtrend Corporation.

NOTE:

This document is subject to change without notice.

Open Source Software Notice

Comtrend’s products use open source software to fulfill their function.
Licenses for the open source software are granted under the GNU General Public License in various versions. For further information on the GNU General Public License see http://www.gnu.org/licenses/
You are allowed to modify all open source code (except for proprietary programs) and to conduct reverse engineering for the purpose of debugging such modifications; to the extent such programs are linked to libraries licensed under the GNU Lesser General Public License. You are not allowed to distribute information resulting from such reverse engineering or to distribute the modified proprietary programs.
The rights owners of the open source software require you to refer to the following disclaimer which shall apply with regard to those rights owners:

Warranty Disclaimer
THE OPEN SOURCE SOFTWARE IN THIS PRODUCT IS DISTRIBUTED IN THE HOPE THAT IT WILL BE USEFUL, BUT WITHOUT ANY WARRANTY, WITHOUT EVEN THE IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SEE THE APPLICABLE LICENSES FOR MORE DETAILS. Comtrend’s products will strictly follow the market’s standard requirements. It is not permitted to modify any Wi-Fi parameters, including the Wi-Fi power setting.
Obtain Source Code If you wish to download the open source code please see: https://www.comtrend.com/gplcddl.html
If you do not see the required source code on our website link and wish to be provided with the entire source code for that product, we will provide it to you and any third party with the source code of the software licensed under an open source software license. Please send us a written request by email or mail to one of the following addresses:
Email: Comtrend support team – opensource@comtrend.com
Postal: Comtrend Corporation 3F-1, 10 Lane 609,
5

Chongxin Rd., Section 5, Sanchong Dist, New Taipei City 241405, Taiwan Tel: 886-2-2999-8261 In detail name the product and firmware version for which you request the source code and indicate means to contact you and send you the source code. PLEASE NOTE WE WILL CHARGE THE COSTS OF A DATA CARRIER AND THE POSTAL CHARGES TO SEND THE DATA CARRIER TO YOU.THE AMOUNT WILL VARY ACCORDING TO YOUR LOCATION AND THE COMTREND SUPPORT TEAM WILL NOTIFY THE EXACT COSTS WHEN REVIEWING THE REQUEST. THIS OFFER IS VALID FOR THREE YEARS FROM THE MOMENT WE DISTRIBUTED THE PRODUCT. FOR MORE INFORMATION AND THE OPEN SOURCE LIST (& RESPECTIVE LICENCES) FOR INDIVIDUAL PRODUCTS PLEASE SEE: https://www.comtrend.com/gplcddl.html

Protect Our Environment
This symbol indicates that when the equipment has reached the end of its useful life, it must be taken to a recycling centre and processed separate from domestic waste. The cardboard box, the plastic contained in the packaging, and the parts that make up this router can be recycled in accordance with regionally established regulations. Never dispose of this electronic equipment along with your household waste; you may be subject to penalties or sanctions under the law. Instead, please be responsible and ask for disposal instructions from your local government.

Chapter 1 Introduction
PRT-6351 is a triple band Wi-Fi 6E Gateway with an updated silicon platform. It provides a 2.5 Giga Ethernet WAN port and four Giga Ethernet ports, supporting Wi-Fi 6 (802.11ax) Wireless solution on frequency band of 2.4GHz (4T4R), 5GHz (4T4R) and 6GHz (2T2R). PRT-6351 allows central management (ACS) by following TR-069.The core design concept of PRT-6351 is to enhance the user experience on high speed applications with its high power wireless design, so as to provide better coverage and stable Wi-Fi services.
10

Chapter 2 Installation
2.1 Hardware Setup
Non-stackable This device is not stackable ­ do not place units on top of each other, otherwise damage could occur. Follow the instructions below to complete the hardware setup.
11

2.1.1 Back Panel
The figure below shows the back panel of the device.
WiFi On/Off Button Press the button for more than 5 to enable/disable the WiFi function. WPS Button Press and release the button to enable WPS which will allow 2 minutes for WiFi connection. Ethernet (LAN) Ports Use 1000-BASE-T RJ-45 cables to connect up to four network devices to a Gigabit LAN, or 10/100BASE-T RJ-45 cables for slower networks. As these ports are autosensing MDI/X, either straight-through or crossover cable can be used.

GETH WAN PORT This port is designated to be used for 2.5 Gigabit Ethernet WAN functionality only. Use an Ethernet RJ-45 cable to connect to Gigabit WAN server for standard network usage.
USB Port This port can be used to connect the router to a storage device. It can only be used for SAMBA(storage) and for a Printer Server. Support for other devices may be added in future firmware upgrades.

Reset Button Restore the default parameters of the device by pressing the Reset button for 10 seconds. After the device has rebooted successfully, the front panel should display as expected (see section 2.1.2 Front Panel for details).

NOTE:

If pressed down for more than 60 seconds, the PRT-6351 will go into a firmware update state (CFE boot mode). The firmware can then be updated using an Internet browser pointed to the default IP address.

Power ON Press the power button to the OFF position (OUT). Connect the power adapter to the power port. Attach the power adapter to a wall outlet or other AC source. Press the power button to the ON position (IN). If the Power LED displays as expected then the device is ready for setup (see section ­ LED Indicators).

Caution 1: If the device fails to power up, or it malfunctions, first verify that the power cords are connected securely and then power it on again. If the problem persists, contact technical support.
Caution 2: Before servicing or disassembling this equipment, disconnect all power cords and telephone lines from their outlets.

Front Panel
The front panel LED indicators are shown below and explained in the following table. This information can be used to check the status of the device and its connections.

LED

Color

INTERNET Green

Mode On Off

Function
IP connected and no traffic detected (the device has a WAN IP address from IPCP or DHCP is up or a static IP address is configured, PPP negotiation is successfully complete.)
If the IP or PPPoE session is dropped due to an idle timeout, the light will remain green.
Modem power off, modem in WDS mode or WAN connection not present.

14

2.5GE WAN 6G WiFi 5G WiFi 2.4G WiFi
WPS
ETH 1X4X
USB POWER

Red Green Green Green Green
Green
Green Green Green
Red

Blink
On
On Off Blink On Off Blink On Off Blink On Off Blink On Off Slow Blink Fast Blink On Off Blink On
Off
Blink On Off
On

IP connected and IP Traffic is passing through the device (either direction)
Device attempted to become IP connected and failed (no DHCP response, no PPPoE response, PPPoE authentication failed, no IP address from IPCP, etc.) Ethernet WAN is connected. Ethernet WAN is not connected.
Ethernet WAN is transmitting/ receiving. Wi-Fi enabled.
Wi-Fi disabled.
Data transmitting or receiving over WLAN.
Wi-Fi enabled. Wi-Fi disabled. Data transmitting or receiving over WLAN. Wi-Fi enabled. Wi-Fi disabled. Data transmitting or receiving over WLAN.
WPS connection successful. The LED will stay on for three minutes. No WPS association process ongoing.
WPS connection in progress.
WPS connection unsuccessful. The LED will keep blinking until client is connected. An Ethernet Link is established.
An Ethernet Link is not established. Data transmitting or receiving over Ethernet.
At least one device is connected to any USB ports. No device is connected to the USB port or a device is connected to the USB port but not active. Data TX/RX through the USB port.
The device is powered up. The device is powered down. POST (Power On Self Test) failure or other malfunction. A malfunction is any error of internal sequence or state that will prevent the device from connecting to the DSLAM or passing customer data.

15

Note: A malfunction is any error of internal sequence or state that will prevent the device from connecting to the DSLAM or passing customer data. This may be identified at various times such after power on or during operation through the use of self testing or in operations which result in a unit state that is not expected or should not occur.
16

Chapter 3 Web User Interface
This section describes how to access the device via the web user interface (WUI) using an Internet browser such as Internet Explorer (version 5.0 and later).
3.1 Default Settings
The factory default settings of this device are summarized below. LAN IP address: 192.168.1.1 LAN subnet mask: 255.255.255.0 Administrative access (username: root, password: 12345) WLAN access: enabled
Technical Note During power on, the device initializes all settings to default values. It will then read the configuration profile from the permanent storage section of flash memory. The default attributes are overwritten when identical attributes with different values are configured. The configuration profile in permanent storage can be created via the web user interface or telnet user interface, or other management protocols. The factory default configuration can be restored either by pushing the reset button for more than ten seconds until the power indicates LED blinking or by clicking the Restore Default Configuration option in the Restore Settings screen.
17

IP Configuration

DHCP MODE

When the PRT-6351 powers up, the onboard DHCP server will switch on. Basically, the DHCP server issues and reserves IP addresses for LAN devices, such as your PC.

To obtain an IP address from the DCHP server, follow the steps provided below.

NOTE:

The following procedure assumes you are running Windows. However, the general steps involved are similar for most operating systems (OS). Check your OS support documentation for further details.

STEP 1: From the Network Connections window, open Local Area Connection (You may also access this screen by double-clicking the Local Area Connection icon on your taskbar). Click the Properties button.

STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button.

STEP 3: Select Obtain an IP address automatically as shown below.

STEP 4: Click OK to submit these settings. If you experience difficulty with DHCP mode, you can try static IP mode instead.
18

STATIC IP MODE

In static IP mode, you assign IP settings to your PC manually.

Follow these steps to configure your PC IP address to use subnet 192.168.1.x.

NOTE:

The following procedure assumes you are running Windows. However, the general steps involved are similar for most operating systems (OS). Check your OS support documentation for further details.

STEP 1: From the Network Connections window, open Local Area Connection (You may also access this screen by double-clicking the Local Area Connection icon on your taskbar). Click the Properties button.
STEP 2: Select Internet Protocol (TCP/IP) and click the Properties button.
STEP 3: Change the IP address to the 192.168.1.x (1<x<255) subnet with subnet mask of 255.255.255.0. The screen should now display as shown below.

STEP 4: Click OK to submit these settings. 19

3.3 Login Procedure

Perform the following steps to login to the web user interface. NOTE: The default settings can be found in section 3.1 Default Settings.

STEP 1: Start the Internet browser and enter the default IP address for the device in the Web address field. For example, if the default IP address is 192.168.1.1, type http://192.168.1.1.

NOTE:

For local administration (i.e. LAN access), the PC running the browser must be attached to the Ethernet, and not necessarily to the device. For remote access (i.e. WAN), use the IP address shown on the Device Information screen and login with remote username and password.

STEP 2: A dialog box will appear, such as the one below. Enter the default username and password, as defined in section 3.1 Default Settings.

Click OK to continue. NOTE: The login password can be changed later (see section 8.7.1 Accounts).

20

STEP 3: After successfully logging in for the first time, you will reach this screen.
You can also reach this page by clicking on the following icon located at the top of the screen.

Chapter 4 Device Information
You can reach this page by clicking on the following icon located at the top of the screen.
The web user interface window is divided into two frames, the main menu (on the left) and the display screen (on the right). The main menu has several options and selecting each of these options opens a submenu with more selections. NOTE: The menu items shown are based upon the configured connection(s) and user account privileges. For example, user account has limited access to configuration modification. Device Info is the first selection on the main menu so it will be discussed first. Subsequent chapters will introduce the other main menu options in sequence. The Device Info Summary screen displays at startup.
23

This screen shows hardware, software, IP settings and other related information. 24

4.1 WAN
Select WAN from the Device Info submenu to display the configured PVC(s).

Refresh ­ Click this button to refresh the screen. DHCP Release ­ Click this button to release the IP through IPoE service. DHCP Renew – Click this button to refresh an IP through IPoE service.

Item Interface Description Type VlanMuxId IPv6 Igmp Pxy
Igmp Src Enbl
MLD Pxy
MLD Src Enbl
NAT

Description Name of the interface for WAN
Name of the WAN connection
Shows the connection type
Shows 802.1Q VLAN ID
Shows WAN IPv6 status
Shows Internet Group Management Protocol (IGMP) proxy status
Shows the status of WAN interface used as IGMP source
Shows Multicast Listener Discovery (MLD) proxy status
Shows the status of WAN interface used as MLD source
Shows Network Address Translation (NAT) status

Firewall IPv4 Status
IPv4 Address PPP connect/disconnect IPv6 Status
IPv6 Address

Shows the status of Firewall Lists the status of IPv4 connection if WAN enabled IPv4 Shows the WAN IPv4 address Shows the PPP connection status
Lists the status of IPv6 connection if WAN enabled IPv6 Shows the WAN IPv6 address

For your reference, if Manual Mode is enabled in PPP service as shown here.

Manual PPP connect/disconnect option will become available on the WAN Info page (as shown here).

Statistics
This selection provides LAN and WAN statistics. NOTE: These screens are updated automatically every 15 seconds.
Click Reset Statistics to perform a manual update.
4.2.1 LAN Statistics
This screen shows data traffic statistics for each LAN interface.

Item
Interface
Received/Transmitted: – Bytes – Pkts – Errs – Drops

Description
LAN interface(s)
Number of Bytes Number of Packets Number of packets with errors Number of dropped packets

WAN Service
This screen shows data traffic statistics for each WAN interface.

Item
Interface
Description
Received/Transmitted – Bytes – Pkts – Errs – Drops

Description
WAN interfaces
WAN service label
Number of Bytes Number of Packets Number of packets with errors Number of dropped packets

Route
Choose Route to display the routes that the PRT-6351 has found.

Item

Description

Destination Destination network or destination host

Gateway

Next hop IP address

Subnet Mask

Subnet Mask of Destination

Flag

U: route is up !: reject route G: use gateway H: target is a host R: reinstate route for dynamic routing D: dynamically installed by daemon or redirect M: modified from routing daemon or redirect

Metric

The ‘distance’ to the target (usually counted in hops). It is not used by recent kernels, but may be needed by routing daemons.

Service

Shows the WAN connection label

Interface

Shows connection interfaces

ARP
Click ARP to display the ARP information.

Item IP address Flags HW Address Device

Description Shows IP address of host PC Complete, Incomplete, Permanent, or Publish Shows the MAC address of host PC Shows the connection interface

DHCP
Click DHCP to display all DHCP Leases.

Item Hostname
MAC Address IP Address
Address Source
Interface Type Status
Expires In
Tx bytes
Rx bytes

Description Shows the device/host/PC network name Shows the Ethernet MAC address of the device/host/PC
Shows IP address of device/host/PC Shows IP type of device/host/PC, could be DHCP/Static
Shows interface type of device/host/PC, could be Ethernet/802.11 Show status of device/host/PC, could be active/inactive Shows how much time is left for each DHCP Lease Show total Tx bytes of device/host/PC Show total Rx bytes of device/host/PC

NAT Session
This page displays all NAT connection session including both UPD/TCP protocols passing through the device.
Click the “Show All” button to display the following.

Item Source IP
Source Port
Destination IP Destination Port

Description
The source IP from which the NAT session is established
The source port from which the NAT session is established
The IP which the NAT session was connected to
The port which the NAT session was connected to

Protocol Timeout

The Protocol used in establishing the particular NAT session
The time remaining for the TCP/UDP connection to be active

IGMP Info
Click IGMP Info to display the list of IGMP entries broadcasting through the IGMP proxy enabled WAN connection.

Item Interface
WAN
Groups Member
Timeout Last Report Time Total Time(sec) Total Joins
Total Leaves

Description The Source interface from which the IGMP report was received
The WAN interface from which the multicast traffic is received
The destination IGMP group address
The Source IP from which the IGMP report was received
The time remaining before the IGMP report expires
The time of the last received IGMP report
Total time that the IGMP stream has been played
Total IGMP join packets received for this IGMP address for this client
Total IGMP leave packets received for this IGMP address for this client

CPU & Memory
Displays the system performance graphs. Shows the current loading of the CPU and memory usage with dynamic updates.

Network Map
The network map is a graphical representation of router’s wan status and LAN devices.

Wireless
Station Info
This page shows authenticated wireless stations and their status.

Consult the table below for descriptions of each column heading.

Item MAC Address Association Time
Authorized WMM Link Power Save
Spec BW

Description
Lists the MAC address of all the stations.
Lists all the stations that are associated with the Access Point, along with the amount of time since packets were transferred to and from each station. If a station is idle for too long, it is removed from this list.
Lists those devices with authorized access
Lists those devices that utilize WMM
Lists those devices that utilize the Power Save Feature
Wi-Fi Spec
Bandwidth

Lists the devices that utilize Dynamic WDS Received Signal Strength Indicator

4.10.2 WiFi Insight
This page allows you to configure the WiFi Insight system. The WiFi Insight system allows the wireless interface to collect beacon data from nearby devices and analyze traffic on the connected stations. This data collection requires memory storage and therefore needs to be configured prior to use. To begin, click on the “Start Data Collection” button if no change is needed.

Sample Interval Select a desired sample interval (time interval) to collect sampling data with the WiFi insight system. Start/Stop Data Collection Check the checkbox of Start collecting data every (then select days & times). Database Size Define the dedicated database size to be used for the WiFi insight system (default is 2MB). Once the database size has reached its limit, select if you wish to overwrite older data or to stop data collection. Counters All counter options are selected (checked) by default. Uncheck any counters that that you do not want collected by the WiFi insight system. Click the Submit button to save your settings. Export Database Click the Save Database to File button to export and save the collected Wi-Fi data information file.

Site Survey
The graph displays wireless APs found in your neighborhood by channel collected under the WiFi insight system.
Select the wireless network (2.4GHz in above example) that you wish to monitor from the drop-down menu.
1. Select the channel that you wish to monitor from the drop-down menu. 2. Select a bandwidth of the wireless network from the drop-down menu. 3. Click the Scan button to run the scan and display the results based on
your selected preferences.

Consult the table below for descriptions of each column heading.

Item
Network Name
Network Address

Description SSIDs in the vicinity MAC address which belongs to SSIDs in the vicinity

40

Signal [dBm] SNR [dB] Bandwidth [MHz] Center Channel
Control Channel
Max PHY Rate [Mbps] 802.11
Security

Signal Strength of each SSID Signal-to-Noise Ratio of each SSID Bandwidth of each SSID
Center Channel of each SSID Control Channel of each SSID
Max PHY Rate of each SSID
802.11 type of each SSID Wi-Fi password encryption type of each SSID

Channel Statistics This page allows you to see the Wi-Fi and Non Wi-Fi interference, and also the available capacity. This page is broken down into individual parts below. Click on the drop-down menu to select 2.4GHz or 5GHz interface. 2.4 GHz
Shows the bandwidth that is available for use in each channel.
Shows interference level in each channel. Shows the highest RSSI (Received Signal Strength Indicator) on each adjacent channel. Adjacent AP and associated stations are displayed for checking interference on those channels

Shows interference level in each channel.
Shows the highest RSSI (Received Signal Strength Indicator) on each adjacent channel. Adjacent AP and associated stations are displayed for checking interference on those channels.
For each AP, the graph shows the control channel and extension channels. Extension channel is any channel spanned by the AP that is not a control channel.

4.10.2.3 Metrics (Advanced Troubleshooting) In this page you will see most of the counters like AMPDU(if available), Glitch, Chanim and Packet Queue Statistics. This page is broken down into individual parts below.
Click on the drop-down menu to select 2.4GHz or 5GHz interface. Shows the rx glitch counters, bad frame check sequence counters received from air over time.
Select the counter of interest to monitor the statistics received over time in the chanim statistics graph.
Lists the associated station to the wireless interface.

Configure This page allows you to configure the WiFi Insight system. The WiFi Insight system allows the wireless interface to collect beacon data from nearby devices and analyze traffic on the connected stations. This data collection requires memory storage and therefore needs to be configured prior to use. To begin, click on the “Start Data Collection” button if no change is needed.
Sample Interval Select a desired sample interval (time interval) to collect sampling data with the WiFi insight system. Start/Stop Data Collection Check the checkbox of Start collecting data every (then select days & times). Database Size Define the dedicated database size to be used for the WiFi insight system (default is 2MB). Once the database size has reached its limit, select if you wish to overwrite older data or to stop data collection.
47

Counters All counter options are selected (checked) by default. Uncheck any counters that that you do not want collected by the WiFi insight system. Click the Submit button to save your settings. Export Database Click the Save Database to File button to export and save the collected Wi-Fi data information file.

4.11 Topology
This displays the arrangement of devices of the communication network. The dotted line represents a wireless connection, whereas a solid line represents a wired connection.

Click the Device Scan button to scan for the network topology. Consult the table below for descriptions of each column heading.

Item Topology ID
Hostname MAC Address IP Address Backhaul

Description
This shows different IDs for different host devices: Master AP: Host device is a gateway Node AP: Slave AP And it remains empty for Client devices
Displays the name of the device
Displays the MAC address of the device
Displays the IP address of the device
Shows the type of link for only Node AP; Ethernet: Connected by wired Ethernet PLC: Connected by Power Line WLan802.11: Connected by 802.11

49

RSSI
Device Connected Ping

Displays the received signal strength indicator (signal strength) for the device Displays the number of devices connected
Click the button and follow the onscreen instructions to ping a device.

50

Chapter 5 Basic Setup
You can reach this page by clicking on the following icon located at the top of the screen. This will bring you to the following screen.
51

5.1 WAN Setup
Click WAN Setup on the on the left of your screen. Add or remove ETH WAN interface connections here.
Click Add to create a new Layer 2 Interface (see Appendix F – Connection Setup). To remove a connection, click the Remove button.
52

5.1.1 WAN Service Setup
This screen allows for the configuration of WAN interfaces.
Click the Add button to create a new connection. For connections on ATM or PTM or ETH WAN interfaces see Appendix F – Connection Setup.

To remove a connection, select its Remove column radio button and click Remove.

Item Interface Description Type Vlan8021p VlanMuxId VlanTpid IGMP Proxy
IGMP Source NAT Firewall IPv6 MLD Proxy Mld Source Manual Mode
Remove

Description Name of the interface for WAN Name of the WAN connection Shows the connection type VLAN ID is used for VLAN Tagging (IEEE 802.1Q) Shows 802.1Q VLAN ID VLAN Tag Protocol Identifier Shows Internet Group Management Protocol (IGMP) Proxy status Shows the status of WAN interface used as IGMP source Shows Network Address Translation (NAT) status Shows the Security status Shows the WAN IPv6 address Shows Multicast Listener Discovery (MLD) Proxy status Shows the status of WAN interface used as MLD source Indicates the status of the PPP manual connect/disconnect button Select interfaces to remove

53

Edit

Click the Edit button to make changes to the WAN

interface

To remove a connection, select its Remove column radio button and click Remove.
NOTE: Up to 16 PVC profiles can be configured and saved in flash memory.

54

5.2 NAT
For NAT features under this section to work, NAT must be enabled in at least one PVC.
5.2.1 Virtual Servers
Virtual Servers allow you to direct incoming traffic from the WAN side (identified by Protocol and External port) to the internal server with private IP addresses on the LAN side. The Internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side. A maximum of 32 entries can be configured.
To add a Virtual Server, click Add. The following will be displayed.
Click Apply/Save to apply and save the settings. 55

Consult the table below for item descriptions.

Item Use Interface
Select a Service Or Custom Service Server IP Address Enable NAT Loopback External Port Start
External Port End
Protocol Internal Port Start
Internal Port End

Description
Select a WAN interface from the drop-down menu. If you choose All Interface, server rules will be created for all WAN interfaces.
User should select the service from the list. Or User can enter the name of their choice.
Enter the IP address for the server.
Allows local machines to access virtual server via WAN IP Address
Enter the starting external port number (when you select Custom Server). When a service is selected, the port ranges are automatically configured.
Enter the ending external port number (when you select Custom Server). When a service is selected, the port ranges are automatically configured.
TCP, TCP/UDP, or UDP.
Enter the internal port starting number (when you select Custom Server). When a service is selected the port ranges are automatically configured
Enter the internal port ending number (when you select Custom Server). When a service is selected, the port ranges are automatically configured.

56

Port Triggering

Some applications require that specific ports in the firewall be opened for access by the remote parties. Port Triggers dynamically ‘Open Ports’ in the firewall when an application on the LAN initiates a TCP/UDP connection to a remote party using the ‘Triggering Ports’. The Router allows the remote party from the WAN side to establish new connections back to the application on the LAN side using the ‘Open Ports’. A maximum 32 entries can be configured.
To add a Trigger Port, click Add. The following will be displayed.
Click Save/Apply to save and apply the settings. 57

Consult the table below for item descriptions.

Item Use Interface Select an Application Or Custom Application Trigger Port Start
Trigger Port End
Trigger Protocol Open Port Start
Open Port End
Open Protocol

Description
Select a WAN interface from the drop-down menu.
User should select the application from the list. Or User can enter the name of their choice.
Enter the starting trigger port number (when you select custom application). When an application is selected, the port ranges are automatically configured.
Enter the ending trigger port number (when you select custom application). When an application is selected, the port ranges are automatically configured.
TCP, TCP/UDP, or UDP.
Enter the starting open port number (when you select custom application). When an application is selected, the port ranges are automatically configured.
Enter the ending open port number (when you select custom application). When an application is selected, the port ranges are automatically configured.
TCP, TCP/UDP, or UDP.

58

5.2.3 DMZ Host
The DSL router will forward IP packets from the WAN that do not belong to any of the applications configured in the Virtual Servers table to the DMZ host computer.
To Activate the DMZ host, enter the DMZ host IP address and click Save/Apply. To Deactivate the DMZ host, clear the IP address field and click Save/Apply. Enable NAT Loopback: Check the checkbox to allow local machines to access virtual server via WAN IP Address.
59

5.2.4 ALG/Pass-Through
Support ALG Pass-through for the listed protocols.
To allow/deny the corresponding ALG protocol, select Enable / Disable and then click the Save button. After reboot, the protocol will be added/removed to/from the system module.
60

5.3 LAN
Configure the LAN interface settings and then click Apply/Save.

The settings shown above are described below.

GroupName: Select an Interface Group.

1st LAN INTERFACE Enable DHCP Client: Enable by checking the checkbox .

IP Address: Enter the IP address for the LAN port.

Subnet Mask: Enter the subnet mask for the LAN port.

Enable IGMP Snooping: Enable by checking the checkbox .

Standard Mode: In standard mode, multicast traffic will flood to all bridge ports when no client subscribes to a multicast group ­ even if IGMP snooping is enabled.

Blocking Mode: In blocking mode, the multicast data traffic will be

blocked and not flood to all bridge ports when there

are

no client subscriptions to any multicast group.

61

Enable LAN side firewall: Enable by ticking the checkbox .

DHCP Server:

To enable DHCP, select Enable DHCP server and enter Start and End IP addresses and the Leased Time. This setting configures the router to automatically assign IP, default gateway and DNS server addresses to every PC on your LAN.

Setting TFTP Server: Enable by ticking the checkbox . Then, input the TFTP server address or an IP address.

Static IP Lease List: A maximum of 32 entries can be configured.

To add an entry, enter MAC address and Static IP and then click Apply/Save.

To remove an entry, tick the corresponding checkbox in the Remove column and then click the Remove Entries button, as shown below.

62

5.3.1 Lan VLAN Setting
The CPE will tag VLAN on specific LAN port(s) when this feature is used.

To enable VLAN Mode, check the checkbox and click the Apply/Save button. Click the Add button to display the following.

Item Vlan ID pbits Remove

Description The VLAN ID to be supported on the LAN port. The VLAN priority bit to be supported on the LAN port.
Tick the checkbox and click the Remove button to delete entries.

63

5.3.2 LAN IPv6 Autoconfig
Configure the LAN interface settings and then click Save/Apply.

The settings shown above are described below. Static LAN IPv6 Address Configuration

Item
Interface Address (prefix length is required):

Description
Configure static LAN IPv6 address and subnet prefix length

64

IPv6 LAN Applications
Item Stateless Stateful Start interface ID:
End interface ID:
Leased Time (hour):

Description
Use stateless configuration
Use stateful configuration
Start of interface ID to be assigned to dhcpv6 client
End of interface ID to be assigned to dhcpv6 client
Lease time for dhcpv6 client to use the assigned IP address

Item Enable RADVD
Enable ULA Prefix Advertisement
Randomly Generate

Description Enable use of router advertisement daemon
Allow RADVD to advertise Unique Local Address Prefix
Use a Randomly Generated Prefix

Statically Configure Prefix

Specify the prefix to be used

Preferred Life Time (hour) The preferred life time for this prefix

Valid Life Time (hour)

The valid life time for this prefix

Enable MLD Snooping Standard Mode
Blocking Mode

Enable/disable IPv6 multicast forward to LAN ports
In standard mode, IPv6 multicast traffic will flood to all bridge ports when no client subscribes to a multicast group even if MLD snooping is enabled
In blocking mode, IPv6 multicast data traffic will be blocked and not flood to all bridge ports when there are no client subscriptions to any multicast group

65

5.3.3 UPnP
Select the checkbox provided and click Apply/Save to enable UPnP protocol.
66

5.4 Parental Control
This selection provides WAN access control functionality.
5.4.1 Time Restriction
This feature restricts access from a LAN device to an outside network through the device on selected days at certain times. Make sure to activate the Internet Time server synchronization as described in section 8.6 Internet Time, so that the scheduled times match your local time. Clicking on the checkbox in the Enable field allows the user to select all / none entries for Enabling/Disabling.
Click Add to display the following screen.
See below for item descriptions. Click Apply/Save to add a time restriction. User Name: A user-defined label for this restriction. Browser’s MAC Address: MAC address of the PC running the browser.
67

Other MAC Address: MAC address of another LAN device. Days of the Week: The days the restrictions apply. Start Blocking Time: The time the restrictions start. End Blocking Time: The time the restrictions end.
5.4.2 URL Filter
This screen allows for the creation of a filter rule for access rights to websites based on their URL address and port number.
Select URL List Type: Exclude or Include. Tick the Exclude radio button to deny access to the websites listed. Tick the Include radio button to restrict access to only those listed websites. Then click Add to display the following screen.
Enter the URL address and port number then click Apply/Save to add the entry to the URL filter. URL Addresses begin with “www”, as shown in this example.
68

A maximum of 100 entries can be added to the URL Filter list. 69

5.6 Home Networking
5.6.1 Print Server
This page allows you to enable or disable printer support.
Please reference Appendix E to see the procedure for enabling the Printer Server.
5.6.2 DLNA
Enabling DLNA allows users to share digital media, like pictures, music and video, to other LAN devices from the digital media server. Insert the USB drive into the USB host port on the back of the router. Click Enable on-board digital media server, a dropdown list of directories found on the USB driver will be available for selection. Select media path from the dropdown list or manually modify the media library path and click Apply/Save to enable the DLNA media server.
70

Storage Service

The Storage service allows you to use Storage devices with modem to be more easily accessed. 5.6.3.1 Storage Device Info This page also displays storage devices attached to the USB host.
Display after storage device attached (for your reference).
71

5.6.3.2 Storage User Accounts Add a storage account to access the USB device for the samba access system.
Click the Add button to display the following. volumeName would be disk1_1 if only 1 USB has been plugged into the device.
In the boxes provided, enter the user name, password and volume name on which the home directory is to be created. Then click the Apply/Save button.
72

In any windows folder, enter the address \192.168.1.1 to access the samba folder created. A password prompt will show. Enter username password as configured. Access \192.168.1.1 again (or refresh the screen), the user folder will now be available for access.
5.7 Wireless
5.7.1 SSID
This page allows you to configure the Virtual interfaces for each Physical interface.
73

Click the Apply button to apply your changes. The settings shown above are described below.

Item Wireless Interface BSS-MAC (SSID) BSS Enabled Network Name (SSID) Network Type
AP Isolation
L2 Isolation BSS Max Associations Limit

Description
Select which wireless interface to configure
Select desired BSS to configure
Enable or disable this SSID
Sets the network name (also known as SSID) of this network
Selecting Closed hides the network from active scans. Selecting Open reveals the network from active scans.
Selecting On enables AP Isolation mode. When enabled, STAs associated with the AP will not be able to communicate with each other.
Wireless clients on the guest network cannot access hardwired LAN clients
Sets the maximum associations for this BSS
74

WMM Advertise
WMF
MAC Address Association Time
Signal Strength Authorized WMM Link Power Save Spec BW Dwds Rssi

When WMM is enabled for the radio, selecting On allows WMM to be advertised in beacons and probes for this BSS. Off disables advertisement of WMM in beacons and probes.
Choose On to enable Wireless Multicast Forwarding on this BSS. Off disables this feature.
Lists the MAC address of all the stations.
Lists all the stations that are associated with the Access Point, along with the amount of time since packets were transferred to and from each station. If a station is idle for too long, it is removed from this list.
Wi-Fi connection signal strength icon
Lists those devices with authorized access
Lists those devices that utilize WMM
Lists those devices that utilize the Power Save Feature
Wi-Fi Spec
Bandwidth
Lists the devices that utilize Dynamic WDS
Received Signal Strength Indicator

75

5.7.2 Security
This page allows you to configure security for the wireless LAN interfaces.

Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).

Item Wireless Interface WPA
WPA-PSK
WPA2

Description Select which wireless interface to configure
Enable/disable WPA authenticated key management suite
Enable/disable WPA-PSK authenticated key management suite
Enable/disable WPA2 authenticated key management suite
76

WPA2-PSK
WPA3-SAE
WPA3
OWE
DPP
WPA2 Preauthentication WPA3-SuiteB WPA Encryption RADIUS Server
RADIUS Port
RADIUS Key WPA passphrase Protected Management Frames Network Key Rotation Interval Pairwise Key Rotation Interval Network Reauth Interval

Enable/disable WPA2-PSK authenticated key management suite
Enable/disable WPA3-SAE authenticated key management suite
Enable/disable WPA3 authenticated key management suite
Enable/disable OWE authenticated key management suite
Enable/disable DPP authenticated key management suite
Enable/disable WPA2 Preauthenticated key management suite
Enable/disable WPA3-SuiteB key management suite
Select the WPA encryption algorithm
Set the IP of the RADIUS (Remote Authentication Dial In User Service) to use for authentication and dynamic key derivation
Set the UDP port number of the RADIUS server. The port number is usually 1812 or 1645 and depends upon the server.
Set the shared secret for the RADIUS connection
Set the WPA passphrase
Wi-Fi CERTIFIED WPA2 with Protected Management Frames provides a WPA2-level of protection for unicast and multicast management action frames.
Set the Network Key Rotation interval in seconds. Leave blank or set to zero to disable the rotation.
Set the Pairwise Key Rotation interval in seconds. Leave blank or set to zero to disable the rotation.
Set the Network Key Re-authentication interval in seconds. Leave blank or set to zero to disable

77

periodic network re-authentication.
5.8 AutoXtend
AutoXtend is a function to construct and optimize a mesh-network. To select information to synchronize with all mesh-network nodes, please check the desired item and click the Apply/Save button.
To enable the AutoXtend features, check the required checkboxes and click the Apply/Save button.
78

Chapter 6 Advanced Setup
You can reach this page by clicking on the following icon located at the top of the screen.
6.1 Security
For detailed descriptions, with examples, please consult Appendix A – Firewall.
6.1.1 IP Filtering
This screen sets filter rules that limit IP traffic (Outgoing/Incoming). Multiple filter rules can be set and each applies at least one limiting condition. For individual IP packets to pass the filter all conditions must be fulfilled. NOTE: This function is not available when in WDS mode. Instead, MAC
Filtering performs a similar function. OUTGOING IP FILTER By default, all outgoing IP traffic is allowed, but IP traffic can be blocked with filters.
To add a filter (to block some outgoing IP traffic), click the Add button. On the following screen, enter your filter criteria and then click Apply/Save.
79

Click the Apply/Save button to apply and save your changes. Consult the table below for item descriptions.

Item Filter Name IP Version Protocol
Source IP address Source Port (port or port:port)
Destination IP address
Destination Port (port or port:port)

Description
The filter rule label (user defined)
Select from the drop down menu
Set the traffic type (TCP, TCP/UDP, UDP, or ICMP) that the rule will apply to
Enter source IP address for the IP filter
Enter source port number or range for the IP filter
Enter destination IP address for the IP filter
Enter destination port number or range for the IP filter

80

INCOMING IP FILTER By default, all incoming IP traffic is blocked, but IP traffic can be allowed with filters.
To add a filter (to allow incoming IP traffic), click the Add button. On the following screen, enter your filter criteria and then click Apply/Save.
Consult the table below for item descriptions. 81

Item Filter Name IP Version Protocol
Source IP address
Source Port (port or port:port)
Destination IP address
Destination Port (port or port:port)

Description
The filter rule label (user defined)
Select from the drop down menu
Set the traffic type (TCP, TCP/UDP, UDP, or ICMP) that the rule will apply to
Enter source IP address for the IP filter
Enter source port number or range for the IP filter
Enter destination IP address for the IP filter
Enter destination port number or range for the IP filter

At the bottom of this screen, select the WAN and LAN Interfaces to which the filter rule will apply. You may select all or just a subset. WAN interfaces in WDS mode or without firewall enabled are not available.

82

6.1.2 MAC Filtering
NOTE: This option is only available in WDS mode. Other modes use IP Filtering to perform a similar function.
Each network device has a unique 48-bit MAC address. This can be used to filter (block or forward) packets based on the originating device. MAC filtering policy and rules for the PRT-6351 can be set according to the following procedure. The MAC Filtering Global Policy is defined as follows. FORWARDED means that all MAC layer frames will be FORWARDED except those matching the MAC filter rules. BLOCKED means that all MAC layer frames will be BLOCKED except those matching the MAC filter rules. The default MAC Filtering Global policy is FORWARDED. It can be changed by clicking the Change Policy button.
Choose Add or Remove to configure MAC filtering rules. The following screen will appear when you click Add. Create a filter to identify the MAC layer frames by specifying at least one condition below. If multiple conditions are specified, all of them must be met.
83

Click Save/Apply to save and activate the filter rule. Consult the table below for detailed item descriptions.

Item Protocol Type
Destination MAC Address Source MAC Address Frame Direction WAN Interfaces

Description Select from the drop down menu the protocol (PPPoE, IPv4, IPv6, AppleTalk, IPX, NetBEUI, IGMP) that will apply to this rule. Defines the destination MAC address
Defines the source MAC address Select the incoming/outgoing packet interface Applies the filter to the selected bridge interface

84

6.2 Quality of Service (QoS)

NOTE:

QoS must be enabled in at least one PVC to display this option. (See Appendix F – Connection Setup for detailed PVC setup instructions).

To Enable QoS tick the checkbox and select a Default DSCP Mark. Click Apply/Save to activate QoS.

QoS and DSCP Mark are defined as follows: Quality of Service (QoS): This provides different priority to different users or data flows, or guarantees a certain level of performance to a data flow in accordance with requests from Queue Prioritization.
Default Differentiated Services Code Point (DSCP) Mark: This specifies the per hop behavior for a given flow of packets in the Internet Protocol (IP) header that do not match any other QoS rule.
85

6.2.1 QoS Queue
6.2.1.1 QoS Queue Configuration Configure queues with different priorities to be used for QoS setup. In ATM mode, a maximum of 16 queues can be configured. In PTM mode, a maximum of 8 queues can be configured. For each Ethernet interface, a maximum of 8 queues can be configured. For each Ethernet WAN interface, a maximum of 8 queues can be configured. (Please see the screen on the following page).
86

87

To remove queues, check their remove-checkboxes (for user created queues), then click the Remove button. The Enable button will scan through every queue in the table. Queues with the enable-checkbox checked will be enabled. Queues with the enable-checkbox unchecked will be disabled. The enable-checkbox also shows status of the queue after page reload. Note that if WMM function is disabled in the Wireless Page, queues related to wireless will not take effect. This function follows the Differentiated Services rule of IP QoS. Enable and assign an interface and precedence on the next screen. Click Apply/Save on this screen to activate it. To add a queue, click the Add button to display the following screen.
Name: Identifier for this Queue entry. Enable: Enable/Disable the Queue entry. Interface: Assign the entry to a specific network interface (QoS enabled). Drop Algorithm: Select the algorithm to be used to ensure that the QoS rule is enforced if the traffic exceeds the configured limit. Drop Tail: Packets are sent in first come first serve fashion, the tailing traffic would be dropped if they exceed the handling limit. Random Early Detection: Packets are monitored by configured queue threshold and serving proportion.
88

WRED: Weighted RED, the assigned monitoring queue would be given different priority and threshold to ensure various priority queues would be served fairly. After selecting an Interface the following will be displayed.
The precedence list shows the scheduler algorithm for each precedence level. Queues of equal precedence will be scheduled based on the algorithm. Queues of unequal precedence will be scheduled based on SP. Shaping Rate: Specify a shaping rate limit to the defined queue. Click Apply/Save to apply and save the settings.
89

6.2.1.2 Wlan Queue Displays the list of available wireless queues for WMM and wireless data transmit priority.
90

6.2.2 QoS Classification
The network traffic classes are listed in the following table.
Click Add to configure a network traffic class rule and Enable to activate it. To delete an entry from the list, click Remove. This screen creates a traffic class rule to classify the upstream traffic, assign queuing priority and optionally overwrite the IP header DSCP byte. A rule consists of a class name and at least one logical condition. All the conditions specified in the rule must be satisfied for it to take effect.
Click Apply/Save to save and activate the rule. 91

Consult the table below for detailed item descriptions.

Item

Description

Traffic Class Name

Enter a name for the traffic class.

Rule Order

Last is the only option.

Rule Status

Disable or enable the rule.

Classification Criteria

Ingress Interface

Select an interface: (i.e. LAN, WAN, local, ETH1, ETH2, ETH3, wl0)

Ether Type

Set the Ethernet type (e.g. IP, ARP, IPv6).

Source MAC Address

A packet belongs to SET-1, if a binary-AND of its source MAC address with the Source MAC Mask is equal to the binary-AND of the Source MAC Mask and this field.

Source MAC Mask

This is the mask used to decide how many bits are checked in Source MAC Address.

Destination MAC Address

A packet belongs to SET-1 then the result that the Destination MAC Address of its header binary-AND to the Destination MAC Mask must equal to the result that this field binary-AND to the Destination MAC Mask.

Destination MAC Mask

This is the mask used to decide how many bits are checked in the Destination MAC Address.

Classification Results

Specify Egress Interface

Choose the egress interface from the available list.

Specify Egress Queue
Mark Differentiated Service Code Point
Mark 802.1p Priority

Choose the egress queue from the list of available for the specified egress interface.
The selected Code Point gives the corresponding priority to packets that satisfy the rule.
Select between 0-7. – Class non-vlan packets egress to a non-vlan interface will be tagged with VID 0 and the class rule p-bits.

92

Set Rate Limit

– Class vlan packets egress to a non-vlan interface will have the packet p-bits re-marked by the class rule p-bits. No additional vlan tag is added. – Class non-vlan packets egress to a vlan interface will be tagged with the interface VID and the class rule p-bits. – Class vlan packets egress to a vlan interface will be additionally tagged with the packet VID, and the class rule p-bits.
The data transmission rate limit in kbps.

93

6.2.3 QoS Port Shaping
QoS port shaping supports traffic shaping of the Ethernet interface. Input the shaping rate and burst size to enforce QoS rule on each interface. If “Shaping Rate” is set to “-1”, it means no shaping and “Burst Size” will be ignored.
Click Apply/Save to apply and save the settings.
94

6.3 Routing
The following routing functions are accessed from this menu: Default Gateway, Static Route, Policy Routing and RIP. NOTE: In WDS mode, the RIP menu option is hidden while the other menu
options are shown but ineffective.
6.3.1 Default Gateway
The default gateway interface list can have multiple WAN interfaces served as system default gateways but only one will be used according to the priority with the first being the highest and the last one the lowest priority if the WAN interface is connected. Priority order can be changed by removing all and adding them back in again.
Click Apply/Save to apply and save the settings.
95

6.3.2 Static Route
This option allows for the configuration of static routes by destination IP. Click Add to create a static route or click Remove to delete a static route.
After clicking Add the following will display.
IP Version: Select the IP version to be IPv4 or IPv6. Destination IP address/prefix length: Enter the destination IP address. Interface: Select the proper interface for the rule. Gateway IP Address: The next-hop IP address. Metric: The metric value of routing. After completing the settings, click Apply/Save to add the entry to the routing table.
96

6.3.3 Policy Routing
This option allows for the configuration of static routes by policy. Click Add to create a routing policy or Remove to delete one.
On the following screen, complete the form and click Apply/Save to create a policy.
Consult the table below for detailed item descriptions. 97

Item Policy Name Physical LAN Port Source IP Use Interface Default Gateway IP

Description Name of the route policy Specify the port to use this route policy IP Address to be routed Interface that traffic will be directed to IP Address of the default gateway

6.3.4 RIP
To activate RIP, configure the RIP version/operation mode and select the Enabled checkbox for at least one WAN interface before clicking Apply/Save.
98

99

6.4 DNS
6.4.1 DNS Server
Select DNS Server Interface from available WAN interfaces OR enter static DNS server IP addresses for the system. In ATM mode, if only a single PVC with IPoA or static IPoE protocol is configured, Static DNS server IP addresses must be entered. DNS Server Interfaces can have multiple WAN interfaces served as system DNS servers but only one will be used according to the priority with the first being the highest and the last one the lowest priority if the WAN interface is connected. Priority order can be changed by removing all and adding them back in again.
Click Apply/Save to save the new configuration. 100

6.4.2 Dynamic DNS
The Dynamic DNS service allows you to map a dynamic IP address to a static hostname in any of many domains, allowing the PRT-6351 to be more easily accessed from various locations on the Internet.
To add a dynamic DNS service, click Add. The following screen will display.

Click Apply/Save to save your settings.

Consult the table below for item descriptions.

Item

Description

101

D-DNS provider Hostname Interface Username
Password

Select a dynamic DNS provider from the list
Enter the name of the dynamic DNS server
Select the interface from the list
Enter the username of the dynamic DNS server
Enter the password of the dynamic DNS server

6.4.3 DNS Entries
The DNS Entry page allows you to add domain name and IP address pairs desired to be resolved by the DSL router.

Choose Add or Remove to configure a DNS Entry. The entries will become active after save/reboot.
Enter the domain name and IP address that needs to be resolved locally, and click the Add Entry button.
102

6.5 DNS Proxy
DNS proxy receives DNS queries and forwards DNS queries to the Internet. After the CPE gets answers from the DNS server, it replies to the LAN clients. Configure DNS proxy with the default setting, when the PC gets an IP via DHCP, the domain name, Home, will be added to PC’s DNS Suffix Search List, and the PC can access route with “Comtrend.Home”.
103

6.8 Interface Grouping
Interface Grouping supports multiple ports to PVC and bridging groups. Each group performs as an independent network. To use this feature, you must create mapping groups with appropriate LAN and WAN interfaces using the Add button. The Remove button removes mapping groups, returning the ungrouped interfaces to the Default group. Only the default group has an IP interface.
To add an Interface Group, click the Add button. The following screen will appear. It lists the available and grouped interfaces. Follow the instructions shown onscreen.
104

Automatically Add Clients With Following DHCP Vendor IDs:
Add support to automatically map LAN interfaces to PVC’s using DHCP vendor ID (option 60). The local DHCP server will decline and send the requests to a remote DHCP server by mapping the appropriate LAN interface. This will be turned on when Interface Grouping is enabled.
For example, imagine there are 4 PVCs (0/33, 0/36, 0/37, 0/38). VPI/VCI=0/33 is for PPPoE while the other PVCs are for IP set-top box (video). The LAN interfaces are ETH1, ETH2, ETH3, and ETH4.
105

The Interface Grouping configuration will be: 1. Default: ETH1, ETH2, ETH3, and ETH4. 2. Video: nas_0_36, nas_0_37, and nas_0_38. The DHCP vendor ID is “Video”. If the onboard DHCP server is running on “Default” and the remote DHCP server is running on PVC 0/36 (i.e. for set-top box use only). LAN side clients can get IP addresses from the CPE’s DHCP server and access the Internet via PPPoE (0/33). If a set-top box is connected to ETH1 and sends a DHCP request with vendor ID “Video”, the local DHCP server will forward this request to the remote DHCP server. The Interface Grouping configuration will automatically change to the following: 1. Default: ETH2, ETH3, and ETH4 2. Video: nas_0_36, nas_0_37, nas_0_38, and ETH1.
106

6.7 IP Tunnel
6.7.1 IPv6inIPv4
Configure 6in4 tunneling to encapsulate IPv6 traffic over explicitly- configured IPv4 links.
Click the Add button to display the following.

Click Apply/Save to apply and save the settings.

Item Tunnel Name Mechanism

Description Input a name for the tunnel Mechanism used by the tunnel deployment

107

Associated WAN Interface Associated LAN Interface
Manual/Automatic
IPv4 Mask Length
6rd Prefix with Prefix Length Border Relay IPv4 Address

Select the WAN interface to be used by the tunnel
Select the LAN interface to be included in the tunnel
Select automatic for point-to-multipoint tunneling / manual for point-to-point tunneling
The subnet mask length used for the IPv4 interface
Prefix and prefix length used for the IPv6 interface
Input the IPv4 address of the other device

108

6.7.2 IPv4inIPv6
Configure 4in6 tunneling to encapsulate IPv4 traffic over an IPv6-only environment.
Click the Add button to display the following.

Click Apply/Save to apply and save the settings.

Item Tunnel Name Mechanism Associated WAN Interface

Description Input a name for the tunnel
Mechanism used by the tunnel deployment
Select the WAN interface to be used by the tunnel

109

Associated LAN Interface Manual/Automatic AFTR

Select the LAN interface to be included in the tunnel
Select automatic for point-to-multipoint tunneling / manual for point-to-point tunneling
Address of Address Family Translation Router

6.7.3 MAP
This page allows you to configure MAP-T and MAP-E entries.

Click the Add button to display the following.

110

Click Apply/Save to apply and save the settings. The settings shown above are described below.

Item

Description

Mechanism

Choose whether to encapsulate with MAP-E or MAP-T to be used for NAT64 translation

Associated WAN Interface

Lists the LAN interfaces available to be used for IP MAP

Associated LAN Interface

Lists the LAN interfaces available to be used for IP MAP

Manual Automatic

Configure the prefix and relative PSID settings manually The prefix settings will be configured automatically from the mapping interfaces

BR IPv6 Prefix

Configure the border relay IPv6 Prefix

BMR IPv6 Prefix

Configure the basic mapping rule IPv6 Prefix

BMR IPv4 Prefix

Configure the basic mapping rule IPv4 Prefix

PSID Offset

Port Set ID offset assigned to the IP MAP

PSID Length

Define the port set ID length

PSID Value

Define the port set ID value

6.8 IPSec
6.8.1 IPSec Tunnel Mode Connections
You can add, edit or remove IPSec tunnel mode connections from this page.

111

Click Add New Connection to add a new IPSec termination rule. The following screen will display.

Heading IPSec Connection Name IP Version
Tunnel Mode

Description
User-defined label
Select the corresponding IPv4 / IPv6 version for the IPSEC connection
Select tunnel protocol, AH (Authentication Header) or ESP (Encapsulating Security Payload) for this tunnel.

112

Local Gateway Interface
Remote IPSec Gateway Address
Tunnel access from local IP addresses
IP Address/Subnet Mask for VPN
Tunnel access from remote IP addresses
IP Address/Subnet Mask for VPN
Key Exchange Method

Select from the list of wan interface to be used as gateway for the IPSEC connection
The location of the Remote IPSec Gateway. IP address or domain name can be used.
Specify the acceptable host IP on the local side. Choose Single or Subnet.
If you chose Single, please enter the host IP address for VPN. If you chose Subnet, please enter the subnet information for VPN.
Specify the acceptable host IP on the remote side. Choose Single or Subnet.
If you chose Single, please enter the host IP address for VPN. If you chose Subnet, please enter the subnet information for VPN.
Select from Auto(IKE) or Manual

For the Auto(IKE) key exchange method, select Pre-shared key or Certificate (X.509) authentication. For Pre-shared key authentication you must enter a key, while for Certificate (X.509) authentication you must select a certificate from the list.
See the tables below for a summary of all available options.

Auto(IKE) Key Exchange Method
Pre-Shared Key / Certificate (X.509) Perfect Forward Secrecy
Advanced IKE Settings

Input Pre-shared key / Choose Certificate
Enable or Disable Select Show Advanced Settings to reveal the advanced settings options shown below.

113

Advanced IKE Settings
Phase 1 / Phase 2
Mode Encryption Algorithm Integrity Algorithm Select Diffie-Hellman Group Key Life Time

Select Hide Advanced Settings to hide the advanced settings options shown above. Choose settings for each phase, the available options are separated with a “/” character. Main / Aggressive
DES / 3DES / AES 128,192,256
MD5 / SHA1
768 ­ 8192 bit
Enter your own or use the default (1 hour)

The Manual key exchange method options are summarized in the table below. Manual Key Exchange Method

114

Encryption Algorithm Encryption Key Authentication Algorithm Authentication Key SPI (default is 101)

DES / 3DES / AES (aes-cbc) DES: 16 digit Hex, 3DES: 48 digit Hex MD5 / SHA1 MD5: 32 digit Hex, SHA1: 40 digit Hex Enter a Hex value from 100-FFFFFFFF

115

6.9 Certificate
A certificate is a public key, attached with its owner’s information (company name, server name, personal real name, contact e-mail, postal address, etc) and digital signatures. There will be one or more digital signatures attached to the certificate, indicating that these entities have verified that this certificate is valid.
6.9.1 Local
116

CREATE CERTIFICATE REQUEST
Click Create Certificate Request to generate a certificate-signing request.
The certificate-signing request can be submitted to the vendor/ISP/ITSP to apply for a certificate. Some information must be included in the certificate- signing request. Your vendor/ISP/ITSP will ask you to provide the information they require and to provide the information in the format they regulate. Enter the required information and click Apply to generate a private key and a certificatesigning request. The contents of this application form do not affect the basic parameter settings of the product.

The following table is provided for your reference.

Item Certificate Name Common Name Organization Name State/Province Name Country/Region Name

Description
A user-defined name for the certificate.
Usually, the fully qualified domain name for the machine.
The exact legal name of your organization. Do not abbreviate.
The state or province where your organization is located. It cannot be abbreviated.
The two-letter ISO abbreviation for your country.

117

IMPORT CERTIFICATE Click Import Certificate to paste the certificate content and the private key provided by your vendor/ISP/ITSP into the corresponding boxes shown below.
Enter a certificate name and click the Apply button to import the certificate and its private key.
118

6.9.2 Trusted CA
CA is an abbreviation for Certificate Authority, which is a part of the X.509 system. It is itself a certificate, attached with the owner information of this certificate authority; but its purpose is not encryption/decryption. Its purpose is to sign and issue certificates, in order to prove that these certificates are valid.
Click Import Certificate to paste the certificate content of your trusted CA. The CA certificate content will be provided by your vendor/ISP/ITSP and is used to authenticate the Auto-Configuration Server (ACS) that the CPE will connect to.
Enter a certificate name and click Apply to import the CA certificate. 119

6.10 Multicast
Input new IGMP or MLD protocol configuration fields if you want modify default values shown. Then click Apply/Save.
Multicast Precedence: Select precedence of multicast packets. Multicast Strict Grouping Enforcement: Enable/Disable multicast strict grouping.
120

Item Default Version Query Interval
Query Response Interval
Last Member Query Interval
Robustness Value
Maximum Multicast Groups Maximum Multicast Data Sources (for IGMPv3) Maximum Multicast Group Members Fast Leave Enable

Description
Define IGMP using version with video server.
The query interval is the amount of time in seconds between IGMP General Query messages sent by the router (if the router is the querier on this subnet). The default query interval is 125 seconds.
The query response interval is the maximum amount of time in seconds that the IGMP router waits to receive a response to a General Query message. The query response interval is the Maximum Response Time field in the IGMP v2 Host Membership Query message header. The default query response interval is 10 seconds and must be less than the query interval.
The last member query interval is the amount of time in seconds that the IGMP router waits to receive a response to a Group-Specific Query message. The last member query interval is also the amount of time in seconds between successive Group-Specific Query messages. The default last member query interval is 10 seconds.
The robustness variable is a way of indicating how susceptible the subnet is to lost packets. IGMP can recover from robustness variable minus 1 lost IGMP packets. The robustness variable should be set to a value of 2 or greater. The default robustness variable value is 2.
Setting the maximum number of Multicast groups.
Define the maximum multicast video stream number.
Setting the maximum number of groups that ports can accept.
When you enable IGMP fast-leave processing, the switch immediately removes a port when it detects an IGMP version 2 leave message on that port.
121

IGMP Group Exception List / MLD Group Exception List

Item Group Address
Mask/Mask Bits
Remove

Description
This is the delimited list of ignored multicast addresses being queried when sending a GroupSpecific or Group-and-Source-Specific Query.
This is the delimited list of ignored multicast mask being queried when sending a GroupSpecific or Group-and-Source-Specific Query.
Allows a user to remove a specific item in the exception list.

122

6.11 Wireless
6.11.1 SSID
This page allows you to configure the Virtual interfaces for each Physical interface.

Click the Apply button to apply your changes. The settings shown above are described below.

Item Wireless Interface BSS-MAC (SSID) BSS Enabled Network Name (SSID) Network Type
AP Isolation

Description
Select which wireless interface to configure
Select desired BSS to configure
Enable or disable this SSID
Sets the network name (also known as SSID) of this network
Selecting Closed hides the network from active scans. Selecting Open reveals the network from active scans.
Selecting On enables AP Isolation mode. When enabled, STAs associated with the AP will not be able to communicate with each other.

123

L2 Isolation BSS Max Associations Limit WMM Advertise
WMF MAC Address Association Time
Authorized WMM Link Power Save Spec BW Dwds Rssi

Wireless clients on the guest network cannot access hardwired LAN clients
Sets the maximum associations for this BSS
When WMM is enabled for the radio, selecting On allows WMM to be advertised in beacons and probes for this BSS. Off disables advertisement of WMM in beacons and probes.
Choose On to enable Wireless Multicast Forwarding on this BSS. Off disables this feature.
Lists the MAC address of all the stations.
Lists all the stations that are associated with the Access Point, along with the amount of time since packets were transferred to and from each station. If a station is idle for too long, it is removed from this list.
Lists those devices with authorized access
Lists those devices that utilize WMM
Lists those devices that utilize the Power Save Feature
Wi-Fi Spec
Bandwidth
Lists the devices that utilize Dynamic WDS
Received Signal Strength Indicator

124

6.11.2 Security
This page allows you to configure security for the wireless LAN interfaces.

Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).

The descriptions are also shown below.

Item Wireless Interface WPA
WPA-PSK

Description
Select which wireless interface to configure
Enable/disable WPA authenticated key management suite
Enable/disable WPA-PSK authenticated key management suite

125

WPA2
WPA2-PSK
WPA3-SAE
WPA3
OWE
DPP
WPA2 Preauthentication WPA3-SuiteB WPA Encryption RADIUS Server
RADIUS Port
RADIUS Key WPA passphrase Protected Management Frames Network Key Rotation Interval Pairwise Key Rotation Interval

Enable/disable WPA2 authenticated key management suite
Enable/disable WPA2-PSK authenticated key management suite
Enable/disable WPA3-SAE authenticated key management suite
Enable/disable WPA3 authenticated key management suite
Enable/disable OWE authenticated key management suite
Enable/disable DPP authenticated key management suite
Enable/disable WPA2 Preauthenticated key management suite
Enable/disable WPA3-SuiteB key management suite
Select the WPA encryption algorithm
Set the IP of the RADIUS (Remote Authentication Dial In User Service) to use for authentication and dynamic key derivation
Set the UDP port number of the RADIUS server. The port number is usually 1812 or 1645 and depends upon the server.
Set the shared secret for the RADIUS connection
Set the WPA passphrase
Wi-Fi CERTIFIED WPA2 with Protected Management Frames provides a WPA2-level of protection for unicast and multicast management action frames.
Set the Network Key Rotation interval in seconds. Leave blank or set to zero to disable the rotation.
Set the Pairwise Key Rotation interval in seconds. Leave blank or set to zero to disable the rotation.

126

Network Reauth Interval

Set the Network Key Re-authentication interval in seconds. Leave blank or set to zero to disable periodic network re-authentication.

127

6.11.3 WPS
This page allows you to configure WPS.

Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).

The descriptions are also shown below.

Item Wireless Interface WPS Current Mode

Description Select which wireless interface to configure Displays WPS current mode

128

WPS Configuration Device WPS UUID Device PIN
Configure by External Registrar Current SSID

Enable/Disable Wi-Fi simple config mode
Displays the WPS UUID number of this device
Displays the PIN number for this device. Click the Generate button to change a unique Device PIN number. Set Allow/Deny wireless external registrar to get/configure AP security through AP PIN Displays the current SSID

Current Authentication Type
Current Encryption Type
Current PSK

Displays the current authentication type Displays the current encryption type Displays the current PSK by clicking

SSID
Authentication Type Encryption Type WPA passphrase
Station PIN
Authorized Station MAC

Set the network name (also known as the SSID) of this network
Select the authentication type from the drop-down menu
Select the encryption type from the drop-down menu
Set the WPA passphrase. Click the Save Credentials button to save the Wi-Fi access password.
Click the Reset To OOB (Out of Box configure) button to restore SSID/ Authentication Type / Encryption Type / WPA passphrase default setting.
Input the station PIN to verify expected station. Note: Empty for PBC method.
Input the authorized station MAC address. Click the Add Enrollee button to start a WPS process. This WPS process is only for the client whose MAC is typed in this field.

129

WPS Current Status
List Wifi-Invite enabled STAs
Wifi-Invite enabled STAs

Displays the WPS current status
Click the Refresh button to find WiFi-Invite enabled STAs Displays the list of WiFi-Invite enabled STAs

6.11.4 MAC Filtering
This page allows you to configure the MAC Filtering for each Physical interface.

Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).

The descriptions are also shown below.

Item Wireless Interface

Description Select which wireless interface to configure

130

BSS-MAC (SSID)
MAC Restrict Mode
MAC filter based Probe Response
MAC Addresses

Select desired BSS to configure
Select whether clients with the specified MAC address are allowed or denied wireless access
Enable/Disable MAC filter based probe response mode
Allow/Deny wireless access to clients with the specified MAC addresses. The MAC address format is xx:xx:xx:xx:xx:xx.

131

6.11.5 WDS
The wireless distribution system supports extended networking of wireless access points and can be configured as described below.

Click the Apply button to apply your changes. For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).

The descriptions are also shown below.

Item Wireless Interface Peer MAC address
Restriction

Description
Select which wireless interface to configure
Enter the peer wireless MAC addresses of any member that should be part of the Wireless Distribution System (WDS)
Select Disabled to disable the WDS restriction. Any WDS (including the ones listed in Remote Bridges) will be granted access. Select Enabled to enable WDS restriction. Only those bridges listed in Remote Bridges will be granted access.

132

Link Direction Interval

Set the WDS link detection interval in seconds. Leave blank or set to zero to disable the detection.

Note: With reference to the above setup, please ensure that the conditions below are met, and both devices are rebooted afterwards:
1. Ensure that the first Comtrend device (home router) does not use the same IP address as the second Comtrend wireless device (wireless bridge). See section 5.3 LAN, for details on how to change the IP address.

133

2. Both devices need to have the same fixed channel. See section 6.11.6 Advanced for details.
3. Both devices need to have a (different) fixed access SSID (Network Name). See section 6.11.1 SSID for details.
134

4. Both devices need to have WPA2-PSK enabled. See section 6.11.2 Security for details.
135

5. Both devices (A & B) need to have each other’s MAC address. See section 6.11.5 WDS for details.
6. Now make sure to reboot both devices. See section 8.9 Reboot for details.
136

6.11.6 Advanced
This page allows you to configure the Physical Wireless interfaces. 2.4GHz
137

5GHz 138

6GHz

Click the Apply button to apply your changes.
For information on each parameter, move the cursor over the parameter that you are interested in (as shown here).

The descriptions are also shown below.

Item Wireless Interface

Description Select which wireless interface to configure
139

Interface 802.11 Band Channel Specification Bandwidth VLAN Priority Support OBSS Coexistence Transmit Power Max Associations Limit Xpress Technology Beamforming transmission (BFR)
Beamforming reception (BFE)

Enable/Disable the wireless interface
Select the 802.11 band to use
Select a channel specification
Select channel bandwidth
Advertise packet priority using VLAN tag
Enable/Disable overlapping BSS coexistence aka 20/40 coex
Select the transmit power percentage
Set the number of associations the driver should accept
Enable/Disable Xpress mode
This is a versatile technique for signal transmission from a number of antennas to one or multiple users. In wireless networks it increases signal power for the intended user and reduces interference to nonintended users.
VHT MU BFR: Wi-Fi 5 Multi User Beamforming transmission
HE MU BFR: Wi-Fi 6 Multi User Beamforming transmission
VHT MU + HE MU BFR: Wi-Fi 5 & Wi-Fi 6 Multi User Beamforming transmission
Disabled – Disables beamforming transmission
This is a versatile technique for signal reception from a number of antennas to one or multiple users. In wireless networks it increases signal power for the intended user and reduces interference to nonintended users.
VHT MU BFE: Wi-Fi 5 Multi User Beamforming reception
HE MU BFE: Wi-Fi 6 Multi User
140

MU-MIMO TX
Wifi 6 (11ax) RIFS Mode Advertisement WMM Support No-Acknowledgement APSD Support Enable IGMP Proxy BandSteering Deamon

Beamforming reception VHT MU + HE MU BFE: Wi-Fi 5 & Wi-Fi 6 Multi User Beamforming reception Disabled – Disables beamforming reception
(MU) Multi-user MIMO transmission is a set of multiple-input and multiple- output technologies for multipath wireless communication, in which multiple users or terminals, each radioing over one or more antennas, communicate with one another. Client devices that support Wi-Fi 6 are highly recommended to enable this feature. Disabled: Disables MU-MIMO transmission Note: Disabling MU-MIMO TX, will also disable HE (Wi-Fi 6) MU-MIMO Enabled: Enables MU-MIMO transmission Auto: In this mode of operation, the Access Point will detect the wireless stations currently present in the network to determine the operation mode
Control Wifi 6 features
Select the RIFS (Reduced Inter-Frame Spacing) mode to advertise in beacons and probe responses
Enable/Disable WMM support
Enable/Disable EMM No-acknowledgement
Enable/Disable Automatic Power Save Technology
Enable/Disable IGMP Proxy
This is a function that automatically steers anyone connecting to a wireless network to the best available frequency band (e.g. from 5G to 2.4G or vice versa) providing an
141

Airtime Fairness Enable 802.11ax

optimized performance for the client. Please note that this feature is not supported in this software version.
Default is Disable
Select Standalone to enable BandSteering
Enable/Disable airtime fairness between multiple links
Enabled by default. Select Off to disable AX mode

142

AutoXtend

AutoXtend is a function to construct and optimize a mesh-network. To select information to synchronize with all mesh-network nodes, please check the desired item and click the Apply/Save button.
To enable the AutoXtend features, check the required checkboxes and click the Apply/Save button.
143

Chapter 7 Diagnostics
You can reach this page by clicking on the following icon located at the top of the screen.

Diagnostics ­ Individual Tests
The first Diagnostics screen is a dashboard that shows overall connection status.
Click the Diagnostics Menu item on the left side of the screen to display the individual connections.

References

Read User Manual Online (PDF format)

Loading......

Download This Manual (PDF format)

Download this manual  >>

Related Manuals