Time Settings
  Password Settings
  Remote Management
  ATM Interface
  Clone MAC Address
  DHCP Client Lists
  Address Mapping
  Virtual Server
  Special Application
  NAT Mapping Table
  Static Route
  Routing Table
  Access Control
  MAC Filter
  URL Blocking
  Schedule Rule
  Intrusion Detection
  ADSL Parameters
  Configuration Tools
  Firmware Upgrade
  Traffic Statistic
  DHCP Client Log
  Security Log

Advanced Setup | System
Configure the system parameters, including time zone, password and remote management.

Advanced Setup | System | Time Settings
Set the time zone of the system. This time is used for log entries and firewall settings. When daylight savings is enabled, user needs to enter the starting and ending time for daylight savings.

Advanced Setup | System | Password Settings
Use this menu to restrict management access based on a specific password. By default, the password is empty. So please assign another password to the Administrator as soon as possible, and store it in a safe place.
Passwords can contain from 0 to 12 alphanumeric characters, and are case sensitive.

Advanced Setup | System | Remote Management
Set the WAN port remote management of Device. Remote management from WAN port can be prohibited, allowed or even restricted to a specified remote host. IP address indicates any host.

Advanced Setup | System | DNS
A Domain Name Server (DNS) is an index of IP addresses and Web addresses. Every domain name must be translated to its corresponding and unique IP address. Most ISP's provide a DNS server for speed and convenience. Since your Service Provider may connect to the Internet with dynamic IP settings, it is likely that the DNS server IP's are also provided dynamically. However, if there is a DNS server that you would rather use, you need to specify the IP address here.
The primary DNS will be used first. In the case of the primary DNS access failure, the secondary DNS will be used.

Advanced Setup | WAN
Wide Area Network. A network that connects computers located in geographically separate areas, (i.e., different buildings, cities, countries). The Internet is a wide area network.

Advanced Setup | WAN | ATM PVC
VoIP Router uses ATM as its layer 2 protocol. ATM PVC is a virtual connection which acts as a WAN interface. Protocols including 1483 Routing, 1483 Bridging, MAC Encapsulated Routing (MER), PPPoA and PPPoE with LLC-SNAP and VCMux encapsulations are supported for each ATM PVC. The Gateway supports up to 8 ATM PVCs.
To configure an ATM PVC, just click the hyperlink of each ATM PVC.

Advanced Setup | WAN | ATM Interface
ATM Interface page provides parameters configuration for the specified ATM PVC. ATM related parameters are applied to all ATM PVCs as following:

  • VC Parameters - VPI (Virtual Path Identifier) and VCI (Virtual Circuit Identifier) numbers that were provided by your Service Provider.
  • Encapsulation - Both LLC (LLC-SNAP) and VCMUX (VC Multiplexing) are supported.
  • QoS Class - ATM QoS classes including CBR, UBR and VBR.
  • QoS Parameters - PCR (Peak Cell Rate), SCR (Sustainable Cell Rate) and MBS (Maximum Burst Size) are configurable.

For each ATM PVC the following protocols are supported:

  • 1483 Bridging - RFC1483/2684 bridged encapsulation in bridging mode. The transparent bridging function with address learning is enabled.
  • 1483 Routing - RFC1483/2684 routed encapsulation in routing mode. It is to carry IP datagrams directly over ATM. DHCP client function can also be enabled to obtain an IP address dynamically.
  • MAC Encapsulated Routing - RFC1483/2684 bridged encapsulation in routing mode. MER uses the same encapsulation as 1483 Bridging but with bridging function disabled. DHCP client function can also be enabled to obtain an IP address dynamically.
  • PPPoA/PPPoE - PPP service provides three connection types - Always Connected, Auto and Manual. If Auto mode is selected, the PPP connection will only be initialized when there is request to Internet access from local clients; after an Idle Timeout, when no Internet traffic is requested, the PPP connection will be torn down automatically. For Manual mode three startup states are provided to specify the PPP state at the first time the VoIP Router boots up. If the PPP connection is broken for some reasons, it won't re-connected until user do it from management interface. The Username and Password are for PPP authentication and should be assigned by your Service Provider. The Idle Time (in minutes) is to define a maximum period of time for which the Internet connection is maintained during inactivity. If the connection is inactive for longer than the Idle Time, then it will be dropped. Whether the connection will be rebuilt depends on the Connect Type. The MTU can also be configured.

Advanced Setup | WAN | Clone MAC Address
Some ISPs require you to register your MAC address with them. If you have done this, the MAC address of the Gateway must be changed to the MAC address that you supplied to your ISP. All ATM PVCs with Ethernet encapsulation use the same WAN MAC address.
Three options are provided for the MAC address to clone:

  • Gateway's default MAC address,
  • MAC address of the current managing host,
  • Manually configured MAC address

Advanced Setup | LAN
Device needs to have an IP address for the other PC in the Local Area Network (LAN) to access it through web-browser. User can also enable DHCP server feature to allow automatically allocation of IP addresses to the LAN client PCs. Note that the network address of the address pool must be the same as the IP address of the device, otherwise an error message will show up and the modification will be denied.

VLAN Binding
VLAN Binding is to define the port-based VLAN belonging of the physical ports. Each physical port can be assigned to any configured VLAN profile.

Advanced Setup | LAN | VLAN
VLANs or Virtual LANs can be configured as separate router ports on the gateway. By default, all ports are assigned to the default VLAN 1, with port address, and the DHCP server enabled. All stations on this default VLAN, VLAN 1, reside in this IP subnet.

The user can add VLANs, adding a separate IP Interface to the Gateway. Each IP Interface added, must be on a distinct IP Subnet, and no DHCP server will be available from the Gateway.

Each VLAN can be assigned to one or more of the physical Ethernet ports on the gateway. The Gateway will route ip packets between the VLANs and all VLANs can be configured as either public (real IP routing with the WAN interface) or private with NAT enabled to hide the internal IP stations from the internet.

This feature is typically used in IP Television, and other services that may be offered by your ISP.

  • Description: detail description of the VLAN.
  • IP Address: IP address of the VLAN virtual interface on the gateway.
  • Subnet Mask: subnet mask of the VLAN virtual interface.
  • NAT Domain: NAT addressing domain to define the NAPT operation of the VLAN virtual interface. Public means that this VLAN will be visible to the Internet. Private means NAT is enabled to protect the subnet from visibility to the Internet.
  • IGMP Snooping: enable/disable the feature to block unnecessary IP multicast traffic flooding among VLAN ports without the specific multicast membership. This feature is working based on snooping IGMP Join/Leave messages among the VLAN ports to update the bridging forwarding database. IGMP Snooping is extremely useful in saving bandwidth of low-speed interfaces (ex. WLAN) to improve the network utilization.
  • IGMP Querier: enable/disable IGMP querying to the VLAN virtual interface. The option is to control whether to behave as an IGMP querier on the VLAN bridging network. If IGMP Querier option is disabled, the router will act as an IP multicast compliant host and send IGMP reports for its own joined IP multicast groups. No IGMP query messages will be sent to the specific VLAN.

Advanced Setup | LAN | DHCP Client Lists
This page displays information on all DHCP clients and fixed associations DHCP clients on your network. Only clients that have requested an IP address since the Router's last reboot and fixed associations are displayed in this list. Check Fix to fix an existing address for a dedicated MAC address, or click New to allocate an IP address to a MAC address. The Client Type field of fixed association entry is displayed as Wireless if it is for a wireless client, otherwise, it might be a wired client or even not connected.

Advanced Setup | NAT
Network Address Translation. This process allows all of the computers on your home network to use one IP address. Using the NAT capability of the HomeConnect home network gateway, you can access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP.

Advanced Setup | NAT | Address Mapping
Network Address Translation (NAT) allows multiple users at your local site to access the Internet through a single public IP address or multiple public IP addresses. All the local IP addresses will map to the WAN IP address by default; Device supports special mapping between a particular global IP (which is not the IP address of the WAN port) and a group of local IPs. This feature is particular useful when user has multiple global IPs and can divide local users in different groups.

Advanced Setup | NAT | Virtual Server
You can configure Device as a virtual server so that remote users accessing services such as the Web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses. In other words, depending on the requested service (TCP/UDP port number), Device redirects the external service request to the appropriate server (located at another internal IP address).
Some of the applications and protocol/port numbers mapping are defined below:

Application Protocol Port Number
Telnet TCP 23
POP3 TCP 110
H.323 TCP 1720
SNMP Trap UDP 162
PC Anywhere TCP 5631
PC Anywhere UDP 5632

Advanced Setup | NAT | Special Applications
Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony, and others. These applications cannot work when Network Address Translation (NAT) is enabled. If you need to run applications that require multiple connections, specify the port normally associated with an application in the "Trigger Port" field, select the protocol type as TCP or UDP, then enter the public ports associated with the trigger port to open them for inbound traffic.
Note: The range of the Trigger Port is 0 to 65535.


    ID Trigger Port Trigger Type Public Port Public Type Comment
    1 28800 UDP 2300-2400,
    UDP MSN Game Zone
    2 28800 UDP 2300-2400,
    TCP MSN Game Zone
    3 6112 UDP 6112 UDP

Advanced Setup | NAT | NAT Mapping Table
NAT Mapping Table displays the current NAPT address mappings. The NAT address mappings are listed 20 lines per page, click the control buttons to move forwards and backwards. As the NAT mapping is dynamic, a Refresh button is provided to refresh the NAT Mapping Table with the most updated values.

The content of the NAT Mapping Table is described as followings,

  • Protocol - protocol of the flow.
  • Local IP - local (LAN) host's IP address for the flow.
  • Local Port - local (LAN) host's port number for the flow.
  • Pseudo IP - translated IP address for the flow.
  • Pseudo Port - translated port number for the flow.
  • Peer IP - remote (WAN) host's IP address for the flow.
  • Peer Port - remote (WAN) host's port number for the flow.

Advanced Setup | Routing | Static Route
The device supports static route function. The static routing related parameters is described as followings,

  • Index - the index of the entry. Check the index button to delete or modify the entry.
  • Network Address - the network address of the route. Network address and Subnet mask indicate the default route.
  • Subnet Mask - the subnet mask of the route. Network address and Subnet mask indicate the default route.
  • Gateway - the gateway used to route this packet specified in this entry
Use the button below the table for adding, deleting, or to modify the static route entries. After making any change to the static routing table, use APPLY or CANCEL to let the change take effect.

Advanced Setup | Routing | RIP
The device supports Routing Information Protocol (RIP) v1 and v2 to dynamically exchange routing information with adjacent routers. The RIP related parameters are described as followings,

  • RIP mode - the operation mode. The overall RIP function can be enabled and disabled.
  • Auto Summary - the automatic route merging. With this option several routes to subnets under a same supernet can be replaced with a single route to that supernet in order to save routing table space.
  • Operation Mode - the RIP functionality. The RIP function can be disabled (Disable), enabled for full function (Enable) or just for receiving only (Silent).
  • Version - the RIP version. Both version 1 and 2 are supported.
  • Poison Reverse - the Poison Reversion option. With this option the VoIP Router will put routes learned from each neighbour into the updating RPDU with metric of 16 for better network convergence.
  • Authentication Required - the RIP authentication. With RIP version 2 authentication mechanism can be used to secure the routing exchange.
  • Authentication Code - the RIP authentication key
Except global RIP mode and Auto Summary parameters, the others are network-interface-wise.

Advanced Setup | Routing | Routing Table
The run-time routing table. Several types of route are supported. The Flag code is to identify different types of route,

  • C - directly connected.
  • R - RIP.
  • I - ICMP redirect.
  • S - static.

Advanced Setup | Firewall
Device provides a stateful inspection firewall which is designed to protect against Denial of Service attacks when activated. Its purpose is to allow a private local area network (LAN) to be securely connected to the Internet. It covers the following features:
1.Access control list - allows users to define the traffic type permitted or not-permitted for outgoing traffic. Users can specify the traffic type by network/session layer header like source or destination IP address, port number etc.
2.Stateful Packet Inspection (SPI) - allows users to specify the incoming traffic permitted or not-permitted based on the application type. Such as TCP/UDP session, FTP session or H.323 session.
3.Denial of Service (DoS) Attack prevention - defends and protects local network (LAN) resources against common attacks such as Ping fragment flood and SYN flood.
4.Real-time logging - allows users to record the real-time firewall information for further use.

Advanced Setup | Firewall | Access Control
Access Control allows users to define the outgoing traffic permitted or not-permitted for the WAN interface. The default is to permit all the outgoing traffic. The rules defined under access control can limit the access of different types of traffic. Device can also limit the access of hosts within the local area network (LAN). The MAC Filtering Table allow Device to define up to 10 hosts which are not allowed to access to the WAN port.

Advanced Setup | Firewall | MAC Filter
This section helps provides MAC Filter configuration. When enabled, only MAC addresses configured will have access to your network. All other client devices will get denied access. This security feature can support up to 32 devices and applies to clients.

Advanced Setup | Firewall | URL Blocking site
Device allows the user to block access to certain Web sites from a particular PC by entering either a full URL address or just a keyword of the Web site. User can enter the full URL address or some keywords of the Web site, Device will examine all the HTTP packets to block the access to those particular sites. This feature can be used to protect children from accessing certain violent or sexual web sites.

Advanced Setup | Firewall | Schedule Rule
Each access control rule can be activated at a pre-defined scheduled time. User defines schedule in the "Schedule Rule" page, and apply the rule in the "Access Control" page.

Advanced Setup | Firewall | Intrusion Detection
Intrusion Detection feature include two important part. One is Stateful Packet Inspection (SPI), and the other is Hacker Prevention.
The Stateful Packet Inspection (SPI) feature of Device limits the access of the incoming traffic from the WAN port. When SPI feature is turned on, all the incoming packets will be blocked unless certain traffic types are checked by users. When the user checks certain types of traffic, only the particular type of traffic initiated from Internal LAN will be allowed. For example, if user only check "FTP service" from the Stateful Packet Inspection page, all the incoming traffic will be blocked except the FTP connection initiated from the local LAN.
For the Hacker Prevention feature. Device inspects packets at the application layer, and maintains TCP and UDP session information, including timeouts and number of active sessions, provides the ability to detect and prevent certain types of network attacks such as DoS attacks.
Network attacks that deny access to a network device are called denial-of-service (DoS) attacks. Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resource.
By using above inspected information and timeout/threshold criteria, Device provide following DOS attacks prevention: Ping of Death (Ping flood) attack, SYN flood attack, IP fragment attack (Tear drop attack), Brute-force attack, Land attack, IP Spoofing attack, IP with zero length, TCP null scan (Port Scan attack), UDP port loopback, Snork attack etc..

Advanced Setup | Firewall | DMZ
If you have a client PC that cannot run Internet application properly from behind the NAT firewall , then you can open the client up to unrestricted two-way Internet access.
Enter the IP address of a DMZ hosts to this screen. Adding a client to the DMZ (Demilitarized Zone) may expose your local network to a variety of security risks, so only use this option as a last resort.

Advanced Setup | SNMP
The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.

Advanced Setup | ADSL
ADSL (Asymmetric Digital Subscriber Line) is used to deliver high-rate digital data over existing ordinary phone-lines. Using a new modulation technology called Discrete Multitone (DMT), ADSL facilitates the simultaneous use of normal telephone services, ISDN, and high speed data transmission, e.g. video.

Advanced Setup | ADSL | ADSL Parameters
This page allows you to specify the ADSL standards to operate with. You may explicitly set a specific standard, or choose "Automatic" to automatically negotiate with remote DSLAM.

Advanced Setup | UPnP
The Universal Plug and Play architecture offers pervasive peer-to-peer network connectivity of PCs of all form factors, intelligent appliances, and wireless devices. UPnP enables seamless proximity networking in addition to control and data transfer among networked devices in the home, office and everywhere in between.

The Device also supports MSN Messenger for systems without UPnP. You must enable UPnP function to activate the pass-through support.

Advanced Setup | DDNS
This DNS feature is powered by With DDNS enabled, you can host your own web site, email server, FTP site and more at your own location even if you have a dynamic IP address. You may sign-up for a free 30-day trial.

Server Configuration provides a simple way to setup virtual servers. You can map several types of services to the server on your network.

Advanced Setup | Tools
This page includes the basic configuration tools, such as save or restore configuration settings, or upgrade system firmware.

Advanced Setup | Tools | Configuration Tools
Use the "Backup" tool to save Device's current configuration to a file named "backup.bin" on your PC. You can then use the "Restore" tool to restore the saved configuration to Device. Alternatively, you can use the "Restore to Factory Defaults" tool to force Device to perform a power reset and restore the original factory settings.

Advanced Setup | Tools | Firmware Upgrade
This tool allows you to upgrade Device system firmware using a file provided by . To upgrade the firmware of your Device, you need to download the files to your local hard disk, and enter the file name in the appropriate field in this page. does not recommend you do the firmware upgrade unless it's really necessary.

Advanced Setup | Tools | Reset
In the event that the system stops responding correctly or in some way stops functioning, you can perform a reset. Your settings will not be changed. To perform the reset, click on the APPLY button below. You will be asked to confirm your decision. The reset will be complete when the power light stops blinking.

Advanced Setup | Status
You can use the Status to see the connection status for Device's WAN/LAN interfaces, firmware and hardware version numbers, any illegal attempts to access your network, as well as information on all DHCP client PCs currently connected to your network.

On the top of this page, the current time is displayed, which reflects the time and date of the page displayed. The<Refresh> button at the end will refresh this page.
The <Release> and <Renew> button under Internet section will release and renew the WAN port IP address. When the WAN port is Dynamic IP, <Release> and <Renew> will cause Device to release and get another IP address from the DHCP server; when the WAN port is PPPoE, <Release> will disconnect the PPP session, and <Renew> will initialize another PPP session.
The firewall status under Device section is enabled if any of the firewall features is enabled, either access control, Stateful Packet Inspection or Hacker Prevention is enabled.
At the bottom of the page, the security log can be saved to a local file for further processing or the log in Device can be cleared. When the system is powered down, the security log will disappear if not saved to a local file

The following items are included in this screen:
INTERNET - Displays WAN connection type and status.
GATEWAY - Displays system IP settings, as well as DHCP, NAT and Firewall status.
Renew - Renew the IP address and lease time manually.
Release - Release the IP address manually.
INFORMATION - Displays the number of connected clients, as well as Device's hardware and firmware version numbers. 

Advanced Setup | Status | Traffic Statistic
This page shows the traffic statistics. The Online Period is the PPPoE connection time. If the connection lost then this Online Period would be reset to 0 Hour 0 mins. Once the device becomes online, the Online Period would be started to count the duration. The Traffic Monitor Period is the time interval that the device monitors the incoming and outgoing traffic. Use the Clear to reset these data to zero. All the data are for guidance only and not for billing purposes.

Advanced Setup | Status | DHCP Client Log
Displays information on all DHCP clients on your network.

Advanced Setup | Status | Security Log
Displays any illegal attempts to access your network.
Date Time Log Message
12/17/2001 10:01:21 NTP Date/Time updated
12/17/2001 10:01:11 login success
12/17/2001 10:01:09 User from timed out
12/17/2001 09:47:17 NTP Date/Time updated
01/01/1970 00:01:13 DHCP Client: Receive Ack from,Lease time=300
01/01/1970 00:01:13 DHCP Client: Send Request, Request IP=
01/01/1970 00:01:13 DHCP Client: Receive Offer from
01/01/1970 00:01:13 DHCP Client: Send Discover
01/01/1970 00:00:25 login success


1. Check your ADSL and WLAN link light to verify good connections for ADSL and Wireless LAN
2. Check your Gateway to verify power is connected
3. Check your Gateway to verify the cable or DSL line is connected
4. Reboot your Gateway
5. If your ISP does not support automatically assigned modem settings, then enter your modem setting information into the Setup

Client Privileges Your Device can block certain services to computers on your network, using the Client Privileges page in Setup. For example, you can block Internet access to your child's computer during times when you are not able to supervise his/her computer use. See the User Guide for more information

1. Check your connection to the phoneline jack to the gateway
2. Verify that all modem settings have been entered in the Setup for that connection
3. Check your time out settings
4. By default the Cable/DSL modem that you may have attached externally will be your primary connection. Therefore, to use your 56k modem you need to disable your Cable/DSL modem

NETWORK: Phoneline and Ethernet
1. Check all connections to the gateway
2. Check all connections to each attached device on the network
3. Ensure that all devices' TCP/IP settings are correct (either assigned automatically via DHCP or manually configured)
4. Ensure that you have an Ethernet or home phoneline interface for each networked computer
5. Each computer must have either Microsoft Windows 95 (or higher) or Mac OS 8.5 (or higher)

DHCP Dynamic Host Configuration Protocol. This protocol automatically configures the TCP/IP settings of every computer on your home network.

DNS Server Address DNS stands for Domain Name System, which allows Internet host computers to have a domain name and one or more IP addresses. A DNS server keeps a database of host computers and their respective domain names and IP addresses, so that when a domain name is requested, the user is sent to the proper IP address. The DNS server address used by the computers on your home network is the location of the DNS server your ISP has assigned.

DSL Modem DSL stands for Digital Subscriber Line. A DSL modem uses your existing phone lines to transmit data at high speeds.

Ethernet A standard for computer networks. Ethernet networks are connected by special cables and hubs, and move data around at up to 10 million bits per second (Mbps).

HPNA Home Phoneline Networking Alliance, which is an association of corporations (including ) working to ensure the adoption of a single, unified phoneline networking standard. Your HomeConnect home network gateway is compliant with HPNA Specification 2.0, which allows networking speeds of up to 1 million bits per second (Mbps) using your existing home phonelines.

IP Address IP stands for Internet Protocol. An IP address consists of a series of four numbers separated by periods that identifies an single, unique Internet computer host. Example:

ISP Gateway Address (see ISP for definition). The ISP Gateway Address is an IP address for the Internet router located at the ISP's office. This address is required only when using a cable or DSL modem.

ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations.

LAN Local Area Network. A LAN is a group of computers and devices connected together in a relatively small area (such as a house or an office). Your home network is considered a LAN.

MAC Address MAC stands for Media Access Control. A MAC address is the hardware address of a device connected to a network.

NAT Network Address Translation. This process allows all of the computers on your home network to use one IP address. Using the NAT capability of the HomeConnect home network gateway, you can access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP.

PPPoE Point-to-Point Protocol over Ethernet. Point-to-Point Protocol is a method of secure data transmission originally created for dial-up connections; PPPoE is for Ethernet connections.

Secondary Dial-Up A secondary dial-up phone number is used by your ISP in case your primary dial-up number has too many other customers accessing it. The secondary dial-up phone number will be used if your primary dial-up phone number cannot be accessed.

SPI Stateful Packet Inspection. SPI is the type of corporate-grade Internet security provided by your HomeConnect home network gateway. Using SPI, the gateway acts as a "firewall," protecting your network from computer hackers.

Subnet Mask A subnet mask, which may be a part of the TCP/IP information provided by your ISP, is a set of four numbers configured like an IP address. It is used to create IP address numbers used only within a particular network (as opposed to valid IP address numbers recognized by the Internet, which must assigned by InterNIC).

TCP/IP Transmission Control Protocol/Internet Protocol. This is the standard protocol for data transmission over the Internet.

WAN Wide Area Network. A network that connects computers located in geographically separate areas, (i.e., different buildings, cities, countries). The Internet is a wide area network.