Beruflich Dokumente
Kultur Dokumente
Version 1.0
ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: doc@zte.com.cn
LEGAL INFORMATION
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
Revision History
Document
ZXA10 F420 Optical Network Terminal User Manual
Name
Document Revision
Product Version V1.0 R1.0
Number
Equipment
Serial No. sjzl20082748
Installation Date
Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
Good
Fair
Average
Poor
Bad
N/A
Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good
Fair
Average
Poor
Bad
N/A
Please check the suggestions which you feel can improve this documentation:
Improve the overview/introduction
Make it more concise/brief
Improve the Contents
Add more step-by-step procedures/tutorials
Improve the organization
Add more troubleshooting information
Include more figures
Make it less technical
Your
Add more examples
Add more/better quick reference aids
suggestions for
Add more detail
Improve the index
improvement of
this
Other suggestions
documentation __________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.
If you wish to be contacted regarding your comments, please complete the following:
Name Company
Postcode Address
Telephone E-mail
This page is intentionally blank.
Contents
Chapter 1.......................................................................... 1
Overview .......................................................................... 1
Introduction ...................................................................1
Component List...............................................................2
Product Features.............................................................2
Product Outline ...............................................................3
Front Panel .......................................................................... 3
Back Panel ........................................................................... 4
System Requirements......................................................5
Chapter 2.......................................................................... 7
Chapter 3.......................................................................... 9
Chapter 4........................................................................ 19
Basic Configuration........................................................19
IP Address Configuration ................................................ 19
PON Interface Configuration ........................................... 20
Switch Configuration ..................................................... 20
Port Mode ..........................................................................21
MAC Address Management....................................................21
VLAN Configuration .............................................................25
Priority Configuration ...........................................................27
Rate Limit ..........................................................................30
Storm Control .....................................................................31
Multicast ............................................................................33
Port Isolation ......................................................................33
New Connection............................................................ 34
Chapter 5........................................................................ 37
Chapter 6........................................................................ 41
Operation Tools.............................................................. 53
System Commands ....................................................... 53
Ping ............................................................................ 54
User Management ......................................................... 54
System Update ............................................................. 55
System Log .................................................................. 56
Chapter 8........................................................................ 59
Chapter 9........................................................................ 65
Chapter 10...................................................................... 75
FAQs ............................................................................... 75
Terms ............................................................................. 77
Figures............................................................................ 81
Tables ............................................................................. 85
Index .............................................................................. 87
This page is intentionally blank.
About This Manual
Purpose
This manual provides procedures and guidelines that support the
operation of ZXA10 F420 Optical Network Terminal.
Intended Audience
This manual is intended for engineers and technicians who
perform operation activities on the ZXA10 F420 Optical Network
Terminal.
Chapter Summary
Chapter 1, Overview Introduces overall information of the F420.
Chapter 2, System Describes the application environment and
Connection hardware connection.
Chapter 3, Describes the installation and configuration
Configuration of TCP/IP, configuration checking, device
Preparations login.
Chapter 4, Basic Describes the configuration of the IP
Configuration address, PON, and switch.
Chapter Summary
Chapter 5, Advanced Describes static route configuration and
Configuration TR069 configuration.
Chapter 6, VoIP Describes the VoIP protocol configuration.
Configuration
Chapter 7, Operation Describes system commands, ping, user
Tools management, system update, and system
logs.
Chapter 8, Device Describes the system status, PPP status,
Status and Statistics network statistics, PON status, and PON
Checking alarms.
Chapter 9, Typical Describes configuration wizard and voice
Application application.
Configuration
Chapter 10, FAQs Provides answers to frequently asked
questions.
Conventions
Typographical ZTE documents employ the following typographical conventions.
Conventions
TABLE 2 – TYPOGRAPHIC AL CONVENTIONS
Typeface Meaning
Italics References to other Manuals and documents.
“Quotes” Links on screens.
Bold Menus, menu options, function names, input
fields, radio button names, check boxes, drop-
down lists, dialog box names, and window
names.
CAPS Keys on the keyboard and buttons on screens
and company name.
Constant width Text that you type, program code, files and
directory names, and function names.
[] Optional parameters.
{} Mandatory parameters.
| Select one of the parameters that are delimited
by it.
Note: Provides additional information about a
certain topic.
Checkpoint: Indicates that a particular step needs
to be checked before proceeding further.
Tip: Indicates a suggestion or hint to make things
easier or more productive for the reader.
Overview
Introduction
The ZXA10 F420 (F420 for short) is an integrated gateway
product for passive optical access network.
The F420 is a modularized access device connected to the client.
It uses the computer network technology and broadband optical
network access technology to build the family network center. It
connects family network devices to share the Internet and
provides various personalized services with high security and
efficiency.
Figure 1 shows the F420.
F I G U R E 1 – Z X A1 0 F 4 2 0
Component List
Make sure that the F420 package contains the components as
listed in Table 5.
Component Quantity
F420 host 1
AC-DC power supply adapter 1
RJ-45 straight-through cable 1
RJ-11 telephone cable 2
ZXA10 F420 Optical Network Terminal User Manual 1
Product Features
The F420 features are as follows:
Interface features
f PON interface: complies with the PON standard and
SC/UPC.
f Ethernet interfaces: four FE interfaces (RJ-45, 10/100
Mbps) that comply with the IEEE802.3 and IEEE802.3u
standards.
f POTS interfaces: two POTS interfaces (RJ-11).
Technology features
The F420 complements the functions of data access and IP
voice.
Data access realizes the functions of the second-layer data
exchange and transfer. IP voice is realized by cooperating
with related network devices according to two signaling
protocols MGCP and SIP.
Besides the above mentioned functions, the F420 focuses on
security, QoS, and network management. It provides various
authentication levels based on devices, users, and services.
It also provides encryption of data channels. According to
different service requirements, the F420 can meet the QoS
requirements that are consistent between the local devices
Product Outline
This topic includes the following:
Front Panel
Back Panel
Front Panel
Figure 2 shows the F420 front panel.
The front panel has nine indicators. Table 6 lists the indicator
details.
Back Panel
Figure 3 shows the F420 back panel.
The back panel has a PON interface, four RJ-45 LAN interfaces,
two RJ-11 telephone interfaces, RST button, ON/OFF button, and
power supply jack.
Table 7 lists the interfaces and buttons on the back panel.
Interface
Description
and Button
PON SC/UPC single-mode optical fiber. Internet access
using the PON access (broadband) mode.
LAN1 – LAN4 RJ-45 LAN interface, connecting to the local network
by RJ-45 network cables.
POTS1, RJ-11 telephone interface, connecting to telephones
POTS2 by RJ-11 telephone cables.
PWR Power supply jack, connecting to the power supply
adapter, DC 12 V.
RST Reset button. When the device is powered ON, press
the button for more than 10 seconds, the device
configuration is restored to the factory defaults.
System Requirements
The F420 system requirements are as follows:
An ISP is needed so that the user can access to the services
using the PON access (broadband) mode.
The computer should be installed with a 10 Mbps Ethernet
card, 100 Mbps Ethernet card, or 10 Mbps/100 Mbps
Ethernet card.
Medium or small enterprise LANs can be set up by adding
Ethernet hub and Ethernet cables.
The computer connected to the network can run Windows
98/Me/2000/NT/XP or Linux. It must be installed with the
network card drivers and TCP/IP.
The computer should have the Web explorer, such as the
Microsoft Internet Explorer (IE) 6.0 or above or Netscape
Communicator 4.0 or above.
System Connection
Application Environment
The F420 is an indoor device. It complements the application of
Fiber to The Home (FTTH) by cooperating with passive optical
network devices.
The application of Fiber to The Office (FTTO) or Fiber to The
Building (FTTB) can be implemented by using the F420 multi-
channel user interfaces or by cooperating with a HUB or Ethernet
switch.
Figure 4 shows the F420 application environment.
Warning:
Do not insert the telephone cable to any one of the RJ-45
network interfaces; otherwise the device can be damaged.
Use the Ethernet cables that meet the GE standard and have
RJ-45 connectors.
Connecting Telephone
Connect the telephone to a POTS interface of the F420 by using
the telephone cables with RJ-11 connectors.
Configuration
Preparations
Overview
Generally, the ISP has configured the device before the user
uses it. The user can use the device after connecting it. In some
circumstances, the user may have to configure the device.
Before configuring the device, the user has to make sure the
following:
Use a crossover or straight-through Ethernet cable to
connect a computer to the Ethernet interface of the device.
Check whether the TCP/IP settings of the computer are
correct or not.
Disable any firewall or security software that is running.
Disable the proxy server of the IE.
If some data provided by the ISP are needed, the user can
consult the ISP.
Installing TCP/IP
If the computer is not installed with TCP/IP, perform the
following steps to install it (take Windows 2000 as an example):
1. Select start ´ Settings ´ Network and Dial-up
Connections, as shown in Figure 5.
Configuring TCP/IP
To access the Internet with the device, the user must configure
the computer in the LAN to be in the same subnet segment as
the device. The default network configuration of the device is as
follows:
IP address: 192.168.1.0
Subnet mask: 255.255.255.0
Default gateway address: 192.168.1.1
For computers with no TCP/IP installed, select Use the
following IP address. The operation steps are as follows:
1. In the Local Area Connection Properties interface, select
Internet Protocol (TCP/IP).
2. Click Properties. The Internet Protocol (TCP/IP)
Properties interface is displayed, as shown in Figure 10.
FIGURE 11 – RUN
If the user can ping through the device successfully, the user
is well prepared to access the Internet.
If the following information is displayed,
Pinging 192.168.1.1 with 32 bytes of data:
Request timed out.
it indicates that errors have occurred in the installation.
Check the following items:
f The Ethernet cable between the device and the computer
is correctly connected.
f The network adapter driver on the computer is correctly
installed.
f The indicators of the LAN interface in the device and
those of the network card in the computer are both ON.
f The TCP/IP configuration of the computer is correctly set
as follows:
If the IP address of the device is 192.168.1.1, the IP
address of the computer must be within the range from
192.168.1.2 to 192.168.1.254, the subnet mask should
be 255.255.255.0, and the default gateway should be
192.168.1.1.
FIGURE 12 – LOGIN
2. Enter the user name and password (The default user name
and password are admin and admin). Click Submit to access
General Functions
The general function page displays all the configuration
description, including the wizard, setup configuration, VOIP
configuration, tools, and status. It also displays the basic status
information of the device, including the software version, version
date, powering ON time of the device, EPON status, EPON MAC
address, and Ethernet MAC address, as shown in Figure 13.
Basic Configuration
IP Address Configuration
Click IP Configuration on the left of the Web page to configure
the IP address of the device.
The user can configure the Internet for the device by using the
IP address. The default IP address is 192.168.1.1 and the
subnet mask is 255.255.255.0, as shown in Figure 14.
Click Submit.
When the OLT is selected to authenticate the ONU ID, enter the
correct ONU ID on the OLT network management platform. Then
the ONU can pass the authentication and access normal service
communication.
Click Submit.
Switch Configuration
Click Switch Configuration on the left of the Web page to
access the switch configuration page. This topic includes the
following:
Port Mode
MAC Address Management
VLAN Configuration
Priority Configuration
Rate Limit
Storm Control
Multicast
Port Isolation
Port Mode
Select Port Mode to access the port mode configuration page,
as shown in Figure 16.
The page is used to configure the Ethernet port mode, and can
display the connection and negotiation results.
FI G U R E 1 7 – S E T T I N G AG I N G TIM E
f Enable Filter
Select Enable Filter. Click Submit to enable MAC
filtering of the port. The MAC Address field is refreshed
to the editable state.
f MAC Address
Add the MAC addresses to be filtered.
f VLAN ID
The value range of VLAN ID is from 1 - 4094.
f Action
Click Add to add the MAC address to the MAC Address
table.
From the drop-down list, select a LAN port that requires
MAC address filtering, and then select Enable Filter.
Click Submit to enable MAC address filtering, and the
MAC Address field is refreshed to the editable state.
In the MAC Address text box, enter the MAC address to
be filtered and the relevant VLAN ID. Click Add to add
the MAC address to the filtering table. Click Delete to
remove the added MAC address from the table, as shown
in Figure 20.
Enable Binding
Select Enable Binding. Click Submit to enable MAC
binding for the port. The MAC Address field is refreshed
to the editable state.
f MAC Address
Add the MAC address to be bound.
f VLAN ID
The value range of VLAN ID is from 1 - 4094.
f Action
Click Add to add the MAC address to the MAC Address
table.
From the drop-down list, select a LAN port that requires
MAC address binding, and then select Enable Binding.
Click Submit to enable MAC address binding, and the
MAC Address field is refreshed to the editable state.
In the MAC Address text box, enter the MAC address to
be bound and the relevant VLAN ID. Click Add to add the
MAC address to the binding table. Click Delete to remove
the added MAC address from the table, as shown in
Figure 22.
VLAN Configuration
Select VLAN Config to access the VLAN configuration page. The
user can set the PVID, VLAN mode, and VLAN ID on this page,
as shown in Figure 23 and Figure 24.
FIGURE 24 – VL AN ID SETTING
Priority Configuration
Select Priority Config to access the priority configuration page.
The 802.1p protocol defines the Ethernet message priority.
When the data flow is large, the device forwards the data packet
with the high priority first.
The configuration items are as follows:
COS Config
Select COS Config to access the COS configuration interface,
as shown in Figure 25. Map the priority (0 – 7) to the four
COS columns in the device.
Priority match
It is used to set the mapping relationship.
VLAN priority can be divided into eight levels (PRIO0 –
PRIO7). There are four switch levels (COS0 – COS3). The
default relationship is listed in Table 8.
Click Submit.
Port Priority Config
Select Port Priority Config to access the port priority
configuration page, as shown in Figure 26.
Click Submit.
802.1p Mapping
Select 802.1p Mapping to access the port mapping
configuration page, as shown in Figure 27.
Rate Limit
Select Rate Limit to access the rate limit configuration page, as
shown in Figure 29.
On this page, the user can set the ingress and egress rate of the
Ethernet port.
Storm Control
Select Storm Control to access the storm control configuration
page, as shown in Figure 30. On this page, the user can set the
number of continuous broadcast or other information packets for
each port.
The information packets are stored in the buffer, and then they
are transferred to other ports one by one. When the number of
stored packets exceeds 64, the device discards the coming
information packets.
Flow Control
The user can set the flow control of an Ethernet port.
Click Submit.
Multicast
Select Multicast to access the multicast configuration page, as
shown in Figure 32.
Port Isolation
Select Port Isolate to access the port isolation configuration
page, as shown in Figure 33.
On this page, the user can choose to enable port isolation for
Ethernet ports. Port isolation is used to isolate the
communication between Ethernet ports.
New Connection
Click New Connection on the left of the Web page to configure
PPPoE, static, and DHCP connections, as shown in Figure 34,
Figure 35, and Figure 36.
Connection name.
Type
Connection type.
Username
Authenticated user name.
Password
Authenticated password.
Authentication Type
The authentication type can be AUTO, CHAP, or PAP.
Mode
The connection mode can be Always on, On demand, or
Manual.
Idle Time out
If the connection is idle for a while, the PPPoE connection
should be interrupted.
Gateway
Whether to set the peer IP address of the PPP dialing to the
default gateway or not.
Priority
The priority of the 802.1p protocol of the connection.
Click Connect to set up the connection. Click Submit to submit
the settings.
The user can set the F420 to the DHCP client and use the DHCP
server to assign IP addresses to access the IP voice network.
In the Type drop-down list, select DHCP. Configure the
following parameters for DHCP connection:
Project Name
Connection name.
Type
Connection type.
Advanced Configuration
TR069 Configuration
The user can use the TR069 protocol to manage the F420
remotely. Click TR069 on the left of the page to access the
TR069 configuration page, as shown in Figure 38.
On this page, the user can configure the URL and user name and
password used to connect the auto configuration server (ACS)
and customer premises equipment (CPE). Here, the CPE refers
to the I532D terminal. The configuration items are as follows:
ACS URL
Username
ACS user name.
Password
ACS password.
CPE URL
Username
CPE user name.
Password
CPE password.
Default WAN
Enable Periodic Inform
Periodic Inform Interval
VoIP Configuration
General Configuration
Click General on the left of the Web page to access the general
configuration page, as shown in Figure 39.
Select the protocol used by VoIP and the service status of the
two ports.
Voice Configuration
Click Voice on the left of the Web page to access the voice
configuration page, as shown in Figure 40.
CNG
To enable or disable comfortable noise generation.
FAX Configuration
f T.38: Not supported at present.
f Pass Through: Includes No Control, RTCP negotiated
mode, and Controlled by SS.
Jitterbuf Configuration
f Adaptive
f Non-Adaptive
RTP Start Port
Starts from 4000 by default.
f Outbound Proxy
IP address or domain name of the outgoing proxy server.
f Port
Port number of the secondary proxy server. The default
port number of the SIP protocol is 5060. In general, use
the default value.
Account Information
f VoIP
Line index.
f Account
User telephone number.
f Password
Registered password.
f Auth UserName
Authenticated user name.
f Enable
To enable the VoIP account. If it is not selected, the
account is disabled.
Test Link Flag
To enable or disable the test link flag.
Peer Call Flag
Peer-to-peer call flag.
Click Submit.
Fax media
f Enable
To enable or disable this media configuration.
f Codec
Coding type of the media. The coding type can be G711U
or G711A.
f Type
Media type. The basic media type is voice or fax.
f Payloadvalue
Message payload value of the media. It is fixed for some
coding types. For example, the payload value of G711A is
8, and that of G711U is 0.
f Packet_time
Packaging interval, indicating the time duration of the
media that is packaged in the UDP message to transfer.
f Clockrate
Sampling rate of the media during generation.
Click Submit.
Service Setup
Click Service Setup on the left of the Web page to access the
service setup configuration page, as shown in Figure 45.
Note: The H.248 and MGCP versions are different from the
SIP version. The complementary services of the H.248 and
MGCP protocols are implemented on the Softswitch. This section
takes the SIP protocol as an example. The following
complementary services can be configured only when the
internal line is selected. The complementary services of the VoIP
external line are configured on the Softswitch.
Hot line
f Instant hot line
f Delayed hot line
f Hot line number
Only the VoIP external line can be selected at present.
f Hot line phone number
Others
f One number (Ring all Ext) flag
f Call waiting flag
f CID flag
f Call reverse flag
f CID restrict flag
f Call transfer flag
Operation Tools
System Commands
Click System Commands on the left of the Web page to access
the page, as shown in Figure 47. The user can save the existing
configuration, restart the device, or restore the default
configuration.
When the user clicks Save All, all the current settings are
saved.
When the user clicks Restart, the Web page may stop
responding for a while, as the restarting process needs some
time.
When the user clicks Restore Defaults, the system restores
the current settings to the default ones.
Ping
Click Ping on the left of the Web page to access the page, as
shown in Figure 48. The user can use the ping command to test
network connection.
User Management
Click User Management on the left of the Web page to access
the user management page, as shown in Figure 49. User
management includes modifying user rights and modifying the
passwords of the administrator and normal users.
System Update
Click Update Gateway on the left of the Web page to access
the system update page, as shown in Figure 50.
System Log
Click System Log on the left of the Web page to access the
system log page, as shown in Figure 51, Figure 52, and Figure
53. On this page, the user can set logs and view system logs
and security logs.
System Status
Click System Status on the left of the Web page to display the
basic system status, including power ON time, memory, CPU
usage, and MAC address usage of EPON and Ethernet, as shown
in Figure 54.
PPP Status
Click PPP Status on the left of the Web page to display the PPP
connection status, including the IP address and online time of
the PPP connection, as shown in Figure 55.
Network Statistics
Click Network Statistics on the left of the Web page to display
the statistics information of packet receiving and sending by the
interfaces, as shown in Figure 56, Figure 57, Figure 58, and
Figure 59.
FIGURE 57 – O AM STATUS
PON Status
Click PON Status on the left of the Web page to display the
PON interface status, as shown in Figure 60.
Registered
Indicates whether the ONU is registered or not on the OLT.
Failure indicates not registered, and Success indicates
successfully registered.
OAM_Link
Status of the OAM channel between the ONU and OLT.
Established indicates successfully established, and Not
Established indicates failed to establish.
Loopback
f Not In MAC loop-back mode
PON Alarm
Click PON Alarm on the left of the page to display the alarm
information of the PON interface, as shown in Figure 61.
FI G U R E 6 1 – P ON AL AR M
Typical Application
Configuration
Configuration Wizard
Click Wizard on the Web page to access the configuration
wizard. The wizard guides the user to configure the WAN
interface parameters, LAN connection parameters, and some key
wireless parameters.
1. Set the VLAN.
On the Step 1 page, set VLAN ID. The value range is from 2
– 4094, as shown in Figure 62.
FIGURE 62 – STEP 1
FIGURE 63 – STEP 2
FIGURE 64 – STEP 3
FIGURE 65 – STEP 4
FIGURE 66 – STEP 5
6. Configuration succeeds.
The system prompts that the configuration is successful, as
shown in Figure 67.
FIGURE 67 – STEP 6
FIGURE 68 – STEP 7
Voice Application
This topic includes the following:
MGCP Protocol Configuration
H.248 Protocol Configuration
Besides the SIP protocol, the H.248 and MGCP protocol versions
are also available. The following is the configuration of the MGCP
and H.248 protocols.
FIGURE 69 - MGCP
FAQs
1. 10Base-T/100Base-TX
Adaptive version of the Ethernet standard. 10Base-T uses a
twisted pair at the longest length of 100 m, with the maximum
transmission rate of 10 Mbps. 100Base-TX is similar to 10Base-T,
but it uses two high-quality twisted pairs, with the maximum
data transmission rate of 100 Mbps.
2. Adapter
A device connected to a network segment, such as Ethernet,
modem card, or adapter
3. WEP
Wired Equivalent Privacy (WEP) is a data encryption mode based
on 64-bit shared key coding, which is described in the 802.11b
standard.
4. Bandwidth
The quantity of data that can be transmitted in a fixed length of
time.
5. DDNS
Network server that provides a fixed domain name to bind with
dynamic IP addresses.
6. DHCP
Dynamic Host Configuration Protocol (DHCP) can allocate
dynamic IP addresses to the devices on network. Dynamic
address means that the device can obtain a different IP address
each time when it connects the network.
7. DNS
Domain Name Server (DNS) translates the network node names
in the Internet into network addresses.
8. Domain Name
Domain name identifies one or multiple host names in Internet.
For example, the domain name www.yahoo.com represents lots
of IP addresses. As one part in the URL, domain name is used to
identify the address of the specific Web page. For example, the
domain name in http://www.zte.com.cn/index.jsp is
www.zte.com.cn.
9. DoS
Denial of Service (DoS) is triggered when the computer or
network fails to work normally. For example, a hacker may use a
false IP address to accumulate quantities of connections and
attack the target server.
10. Ethernet
As one of the most common LAN protocols, it supports bus
technology, with the transmission rate of 10 Mbps – 1000 Mbps.
11. Explorer
An application used to find and display Web pages, such as
Netscape Navigator and Microsoft Internet Explorer.
12. Firewall
Secure barrier between the internal network and external
network. Specifically, firewall refers to the combination of a
series of components set between different networks or network
security domains. By monitoring, limiting, and changing data
flows of different domains, firewall can shield the information,
structure, and running status of the customer network to protect
the customer network.
13. IEEE
Institute of Electrical and Electronic Engineers (IEEE) is one of
the most famous organizations formulating standards for the
electronic and electrical industries.
14. Internet
A global network that is used by millions of computers to
exchange data, news, and viewpoints.
15. IP Address
32-bit address in TCP/IP used to identity the host. There are five
categories of IP addresses (A, B, C, D, and E), which are in the
8-bit data format with 4 separations, such as 2.1.1.2. Each
address covers the network address, optional subnet address,
and host address. Network address and subnet address are
combined for routing, host address is used to identify the
independent host in the network or subnet, and subnet mask is
used to obtain network and subnet information from the IP
address. CIDR provides a new method for resolving IP address
and subnet mask, which is also called the Internet address.
16. IPSec
A virtual private network protocol widely supported in the
industry. The user can set up IPSec VPN to enhance security and
reliability in data transmission.
17. ISP
Internet Service Provider (ISP) provides Internet access services
for individuals and companies.
18. LAN
A networking environment connecting some communication
devices (computers, terminals, and printers) in the limited areas
such as a room and campus.
19. MAC Address
Media Access Control (MAC) address is the second-layer address
parameter of network nodes. Each network device (such as the
network adapter, hub, and switch) has its specific MAC address
ID, and the second-layer switch sends data to the correct
destination node by identifying the destination MAC address of
the packet.
20. NAT
Network Address Translation (NAT) is used to translate the
private network address into the public network address of WAN
port when multiple computers in the LAN share one IP address
to access the Internet.
21. PPP
Point-to-Point Protocol (PPP) provides a standard mode for
transmitting data message over the point-to-point link (such as
the telephone cable).
22. PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) provides point-to-
point connection in the Ethernet (user authentication required)
and sets up user-oriented session channels.
23. PPTP
A virtual private network protocol that ensures reliable
transmission of the PPP encapsulated packet at the IP layer.
24. Protocol
It specifically refers to communication protocol, which is a set of
rules defining the data formats observed between network
devices to transmit, send, and receive data between the devices.
25. Router
A device that connects different types of networks through a
remote WAN. Generally, the long-distance data transmission is
implemented by the connection of the ISP line and the peer
router of the WAN or other network. During data transmission,
the path to the destination is selected according to the address
information in the packet, and this process is called “routing”.
26. SPI
Stateful Packet Inspection (SPI) inspects both the packet header
and the packet body. It determines the packet source and
destination addresses and other information. In addition, the
state inspection firewall closes the port, till the specific port
request comes.
27. TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is the
basic communication protocol cluster of network communication,
but it actually defines a group of protocols, not limited to TCP
and IP.
28. TR069
CPE WAN Management Technical Report 069 (TR069) is one of
the MAN user terminal management protocols. Based on the
TR069 technology standard, the carrier and the home gateway
perform security interaction to implement initial configuration
and automatic upgrade for the home gateway deice, improve
efficiency, and reduce expenses and risks.
29. VPN
Virtual Private Network (VPN) provides a mode for securely
transmitting data in the Internet through access control and
encryption. Its actual effect reaches or is close to the data
transmission security level of private networks.
30. WAN
A geographically dispersed telecommunications network. Some
WANs are privately owned, but they are regarded as networks
for public access.