Dynamix UM-S User manual

DYNAMIX UM-S
SHDSL ROUTER
User Manual

G.shdsl Router User Manual 152
1
Table ofContents
Descriptions..............................................................................................................4
Features.......................................................................................................................4
Specification................................................................................................................4
Applications.................................................................................................................7
Yours Firewall .........................................................................................................8
Types of Firewall.........................................................................................................8
PacketFiltering..............................................................................................8
Circuit Gateway...........................................................................................10
Application Gateway ...................................................................................10
Denialof ServiceAttack.............................................................................................11
Yours VLAN (Virtual Local Area Network) ............................................14
Specification..............................................................................................................14
Frame Specification...................................................................................................14
Applications...............................................................................................................15
Getting to know about the router ..................................................................17
Front Panel.................................................................................................................17
Rear Panel..................................................................................................................18
SHDSLLineConnector.............................................................................................19
Console Cable............................................................................................................19
Configuration to the router ..............................................................................20
Step 1:Checkthe EthernetAdapter inPCorNB........................................................20
Step 2:ChecktheWebBrowser inPC or NB.............................................................20
Step 3:ChecktheTerminalAccess Program...............................................................20
Step 4:Determine ConnectionSetting........................................................................20
Step 5:Install the SHDSLRouter...............................................................................21
Configuration via Web Browser ....................................................................23
Basic Setup .............................................................................................................25
BridgeMode..............................................................................................................26
RoutingMode............................................................................................................28

G.shdsl Router User Manual 152
2
DHCPServer...............................................................................................29
DHCPClient ................................................................................................30
DHCPrelay..................................................................................................31
PPPoE or PPPoA........................................................................................32
IPoAorEoA .................................................................................................34
Advanced Setup....................................................................................................36
SHDSL .........................................................................................................37
WAN .............................................................................................................38
Bridge ...........................................................................................................40
VLAN ............................................................................................................41
Route............................................................................................................43
NAT/DMZ .....................................................................................................45
Virtual Server...............................................................................................47
Firewall.........................................................................................................48
Administration ......................................................................................................54
Security ........................................................................................................55
SNMP ...........................................................................................................56
Time Sync ....................................................................................................58
Utility........................................................................................................................59
System Info..................................................................................................60
Config Tool...................................................................................................61
Upgrade .......................................................................................................62
Logout ..........................................................................................................63
Restart..........................................................................................................64
Status.........................................................................................................................65
LAN-to-LAN connection with bridge Mode ...........................................66
CO side ........................................................................................................66
CPE Side .....................................................................................................67
LAN to LAN Connection with Routing Mode .......................................68
CO side ........................................................................................................68
CPE side ......................................................................................................70
Configuration via Serial Console orTelnet with Manu Driven

G.shdsl Router User Manual 152
3
Interface ...................................................................................................................71
SerialConsole............................................................................................................71
Telnet.........................................................................................................................71
OperationInterface....................................................................................................72
Windowstructure.......................................................................................................73
MenuDriven Interface Commands.............................................................................74
Menu Tree..................................................................................................................74
Configuration.............................................................................................................76
Status.........................................................................................................................77
Show..........................................................................................................................78
Write..........................................................................................................................79
Reboot.......................................................................................................................80
Ping...........................................................................................................................81
Administration...........................................................................................................82
UserProfile ..................................................................................................82
Security ........................................................................................................83
SNMP ...........................................................................................................83
SupervisorPasswordand ID .....................................................................84
SNTP............................................................................................................84
Utility........................................................................................................................86
Exit............................................................................................................................86
Setup..........................................................................................................................87
Mode ............................................................................................................87
SHDSL .........................................................................................................87
WAN .............................................................................................................88
Bridge ...........................................................................................................89
VLAN ............................................................................................................90
Route............................................................................................................91
LAN...............................................................................................................93
IPshare........................................................................................................93
Firewall.........................................................................................................97
DHCP ...........................................................................................................99
DNSproxy .................................................................................................100
Hostname .................................................................................................100
Default........................................................................................................100

G.shdsl Router User Manual 152
4
Descriptions
The SHDSL (Single-Paired High Speed Digital Subscriber Loop) routerscomplywith G.991.2
standard with 10/100 Base-T auto-negotiation. It provides business-class, multi-range form
64Kbpsto2.304Mbps (for2-wire mode) or 128kbpsto4.608Mbps (for 4-wire mode) payloadrates
over exiting single-paircopper wire. The SHDSL routersare designed not onlyto optimize the
service bit rate fromcentral office to customerpremisesalso it integrates high-end
Bridging/Routing capabilities with advanced functionsof Multi-DMZ, virtual server mapping and
VPN pass-through.
Because of rapid growth of network, virtual LAN has become one of the major newareas in
internetworking industry. The SHDSL routers support port-based and IEEE 802.1q VLAN over
ATM network.
The firewall routers provide not onlyadvanced functions, Multi-DMZ, virtual servermapping and
VPN pass-through but advanced firewall, SPI, NAT, DoS protection serving as a powerful firewall
to protect from outside intruders of secure connection.
The 4-port routerssupport four ports 10Base-T /100Base-T auto-negotiation and auto-MDIX
switching portsto meet the enterprise need.
The SHDSLroutersallow customersto leveragethe latest in broadband technologies to meet their
growing data communication needs. Through the power of SHDSL products, you can access
superior manageabilityand reliability.
Features
² Easyconfiguration and management with password control for various application
environments
² Efficient IProuting and transparent learning bridge to support broadband Internet services
² VPN pass-through for safeguarded connections
² Virtual LANs(VLANs) offer significant benefit in terms of efficient use of bandwidth, flexibility,
performance and security
² Build-in advanced SPI firewall(Firewall router)
² Four10/100MbpsAuto-negotiation and Auto-MDIX switching port for flexible local area
networkconnectivity(4-port router)
² DMZ host/Multi-DMZ/Multi-NATenables multiple workstationson the LAN to access the
Internet forthe cost of IPaddress
² FullyATM protocol stackimplementation overSHDSL
² PPPoAand PPPoEsupport user authentication with PAP/CHAP/MS-CHAP
² SNMPmanagement with SNMPv1/SNMPv2 agent and MIB II
² Getting enhancementsand new features via Internet software upgrade
Specification
Routing
Ø Support IP/TCP/UDP/ARP/ICMP/IGMPprotocols
Ø IProuting with static routing and RIPv1/RIPv2 (RFC1058/2453)
Ø IPmulticast and IGMPproxy(RFC1112/2236)
Ø Networkaddress translation (NAT/PAT)(RFC1631)
Ø NATALGsfor ICQ/Netmeeting/MSN/Yahoo Messenger
Ø DNS relayand caching (RFC1034/1035)
Ø DHCPserver, client and relay(RFC2131/2132)

G.shdsl Router User Manual 152
5
Bridging
Ø IEEE 802.1D transparent learning bridge
Ø IEEE 802.1q VLAN
Ø Port-based VLAN (4-port router)
Ø Spanning tree protocol
Security
Ø DMZ host/Multi-DMZ/Multi-NATfunction
Ø Virtual server mapping (RFC1631)
Ø VPN pass-through for PPTP/L2TP/IPSectunneling
Ø Natural NATfirewall
Ø Advanced Stateful packet inspection (SPI)firewall (Firewall Router)
Ø Application level gatewayfor URLand keyword blocking (Firewall Router)
Ø Useraccess control: denycertain PCsaccessto Internet service (FirewallRouter)
Management
Ø Easy-to-use web-based GUI forquicksetup, configuration and management
Ø Menu-driven interface/Command-line interface (CLI) for local console and Telnet
access
Ø Password protected management and accesscontrol list foradministration
Ø SNMPmanagement with SNMPv1/SNMPv2 (RFC1157/1901/1905)agent and MIB II
(RFC1213/1493)
Ø Software upgrade via web-browser/TFTPserver
ATM
Ø Up to 8 PVCs
Ø OAM F5 AIS/RDI and loopback
Ø AAL5
ATM QoS
Ø UBR (Unspecified bit rate)
Ø CBR (Constant bit rate)
Ø VBR-rt (Variable bit rate real-time)
Ø VBR-nrt (Variable bit rate non-real-time)
AAL5 Encapsulation
Ø VC multiplexing and SNAP/LLC
Ø Ethernet over ATM (RFC 2684/1483)
Ø PPP over ATM (RFC 2364)
Ø Classical IPover ATM (RFC 1577)
PPP
Ø PPP over Ethernet forfixed and dynamic IP(RFC 2516)
Ø PPP over ATM forfixed and dynamic IP(RFC 2364)
Ø Userauthentication with PAP/CHAP/MS-CHAP
WAN Interface
Ø SHDSL: ITU-TG.991.2 (AnnexA, Annex B)
Ø Encoding scheme: 16-TCPAM
Ø Data Rate (2-wire mode): N x64Kbps(N=0~36, 0 foradaptive)
Ø Data Rate (4-wire mode): N x128kbps(N=0~36, 0 foradaptive)
Ø Impedance: 135 ohms

G.shdsl Router User Manual 152
6
LAN Interface
Ø 4-ports switching hub (4-port router)
Ø 10/100 Base-Tauto-sensing and auto-negotiation
Ø Auto-MDIX (4-port router)
Hardware Interface
Ø WAN: RJ-11
Ø LAN: RJ-45 x4 (4-port router)
Ø LAN: RJ-45 x1 (1-port router)
Ø Console: RS232 female
Ø RST: Reset button forfactorydefault
Indicators
Ø General: PWR
Ø WAN: LNK, ACT
Ø LAN: 10M/ACT, 100M/ACT(1-port router)
Ø LAN: 1, 2, 3, 4 (4-port router)
Ø SHDSL: ALM
Physical/Electrical
Ø Dimensions: 18.7 x 3.3 x 14.5cm (WxHxD)
Ø Power: 100~240VAC (via power adapter)
Ø Power consumption: 9 watts max
Ø Temperature: 0~45 C
Ø Humidity: 0%~95%RH (non-condensing)
Memory
Ø 2MB Flash Memory, 8MB SDRAM
Products Information
G.shdsl 2-wire router/bridge with 1-port LAN
G.shdsl 2-wire router/bridge with 1-port LAN VLAN and business class firewall
G.shdsl 2-wire router/bridge with 4-port switching hub LAN
G.shdsl 2-wire router/bridge with 4-port switching hub LAN, VLAN and business classfirewall
G.shdsl 4-wire router/bridge with 4-port switching hub LAN
G.shdsl 4-wire router/bridge with 4-port switching hub LAN, VLAN and business classfirewall

G.shdsl Router User Manual 152
7
Applications
Internet
SHDSL
Router
SHDSL Ethernet
DSLAM
LAN
Connectionwith DSLAM
SHDSL Router
SHDSLEthernet
SHDSL Router
Ethernet
LAN LAN
LAN to LAN Connection

G.shdsl Router User Manual 152
8
Yours Firewall
Afirewall protectsnetworked computersfrom intentional hostile intrusion that could compromise
confidentialityor result in data corruption or denial of service. It must have at least two network
interfaces, one for the network it isintended to protect, and one for the networkit is exposed to. A
firewall sits at the junction point orgatewaybetween the two networks, usuallya private network
and a publicnetworksuch as the Internet.
Afirewall examinesall traffic routed between the two networksto see if it meets certain criteria. If it
does, it isrouted between the networks, otherwise it is stopped. A firewall filtersboth inbound and
outbound traffic. It can also manage public accessto private networked resources such ashost
applications. It can be used to log all attempts to enter the private networkand trigger alarms when
hostile or unauthorized entryis attempted. Firewalls can filterpacketsbased on theirsource and
destination addresses and port numbers. This is known asaddressfiltering. Firewallscan also
filterspecific types of networktraffic. This is also known as protocol filtering because the decision
to forward or reject trafficisdependant upon the protocol used, for example HTTP, ftp or telnet.
Firewallscan also filter trafficbypacket attribute orstate.
An Internet firewall cannot prevent individual userswith modems from dialling into or out of the
network. Bydoing so theybypassthe firewall altogether. Employee misconduct or carelessness
cannot be controlled byfirewalls. Policies involving the use and misuse of passwordsand user
accountsmust be strictlyenforced. These are management issues that should be raised during
the planning of anysecuritypolicy, but that cannot be solved with Internet firewalls alone.
Internet
Internet
Local User Internet
Allowed Traffic
Restricted Traffic
Out to Internet
Specified Allowed Traffic
Unknown Traffic
Accessto Specific
Destination
Firewall
Types of Firewall
There are three types of firewall:
Packet Filtering
In packet filtering, onlythe protocol and the address information of each packet isexamined. Its
contents and context (its relationto otherpacketsand tothe intended application)are ignored. The
firewall pays no attention to applications on the host or local networkand it "knows" nothing about
the sourcesof incoming data. Filtering consistsof examining incoming oroutgoing packets and
allowing or disallowing theirtransmission or acceptance on the basisof a set of configurablerules.
NetworkAddressTranslation (NAT) routers offer the advantagesof packet filtering firewalls but
can also hide the IPaddressesof computersbehind the firewall, and offera level of circuit-based
filtering.

G.shdsl Router User Manual 152
9
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Protocol
Source/Destinationaddress
Source/destination port
IPoptions
connectionstatus
192.168.0.5 172.16.3.4UDP
SP=3264
SA=192.168.0.5
DP=1525
DA=172.16.3.4
Filter rememberthis
information
UDP
SP=1525
SA=172.16.3.4
DP=3264
DA=192.168.0.5
Matches outgoingso allows in
UDP
SP=1525
SA=172.168.3.4
DP=2049
DA=192.168.0.5
Nomatches so disallows in
Stateful Inspection
Internet
192.168.0.10
192.168.0.11
192.120.8.5
Firewall
Internal/Protected NetworkExternal/UnprotectedNetwork
NAT(Network Address Translation)
192.168.0.10
192.168.0.11
192.120.8.5
192.120.8.5
Internal IP External IP

G.shdsl Router User Manual 152
10
Internet
192.168.0.10:1025
192.168.0.11:4406
192.120.8.5
Firewall
Internal/ProtectedNetworkExternal/Unprotected Network
PAT(Port Address Translation)
192.168.0.10
192.168.0.11
1025
4406
Client IP Internal Port External Port
2205
2206
192.120.8.5:2205
192.120.8.5:2206
CircuitGateway
Also called a "Circuit Level Gateway," this is a firewall approach that validatesconnectionsbefore
allowing data to be exchanged. What this means is that the firewall doesn't simply allowor disallow
packets but also determineswhether the connection between both endsisvalid according to
configurable rules, then opens a session and permitstraffic onlyfrom the allowed source and
possiblyonlyfora limited period of time.
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
destination IP address and/orport
source IP address and/or port
time of day
protocol
user
password
ApplicationGateway
The Application Level Gatewayacts asa proxyfor applications, performing all data exchanges
with the remote system in their behalf. This can rendera computerbehind the firewall all but
invisible to the remote system. It can allow ordisallow trafficaccording to veryspecificrules, for
instancepermitting somecommands to aserverbut not others, limiting file access to certaintypes,
varying rulesaccording to authenticated usersand so forth. Thistype of firewallmayalso perform
verydetailed logging of traffic and monitoring of eventson the host system, and can often be
instructed to sound alarms or notifyan operator under defined conditions. Application-level
gatewaysare generallyregarded as the most secure type of firewall. Theycertainlyhave the most
sophisticated capabilities.

G.shdsl Router User Manual 152
11
Level 5: Application
Level 4: TCP
Level 3: IP
Level 2: Data Link
Level 1: Physical
Telnet
FTP
Http
SMTP
Host PC Proxy Server Public Server
Request Page
Check URL
Request Page
Return Page
Return Page
Filter Content
External
Interface
Internal
Interface
ProxyApplication
Denial of Service Attack
Denial of service (DoS) attacks typicallycome in two
flavors: resource starvation and resource overload. DoS
attackscan occur when there isa legitimate demand for
a resource that is greater than the supply(i.e. too many
web requests to an alreadyoverloaded web server).
Software vulnerabilitiesor system misconfigurationscan also cause DoS situations. The
difference between a malicious denial of service and simple systemoverload is the requirement of
an individual with maliciousintent (attacker) using or attempting to use resources specificallyto
denythose resources to otherusers.
Ping of death- On the Internet, ping of death is a kind of denial of service (DoS) attackcaused by
an attacker deliberatelysending an IPpacket larger than the 65,536 bytesallowed bythe IP
protocol. One of the featuresof TCP/IPisfragmentation; it allowsa single IPpacket to be broken
down into smaller segments. Attackersbegan to take advantage of that feature when theyfound
that a packet broken down into fragments could add up to more than the allowed 65,536 bytes.
Manyoperating systems didn't know what to do when theyreceived an oversized packet, so they
froze, crashed, or rebooted. Other known variants of the ping of death include teardrop, bonkand
nestea.
Inturruption

G.shdsl Router User Manual 152
12
Hacker 's
System Target
System
Ping of Death Packet (112,000 bytes)
Normal IP Packet (Maximun65,536bytes)
Normal reassembled Packets
bytes from 1~1500bytes from1501~3000bytes from 3000~4500
Reassembled teardrop packets
bytes from1~1700
bytes from 1300~3200bytes from2800~4800
SYN Flood- The attacker sends TCPSYN packet which start connectionsveryfast, leaving the
victimwaiting to complete a huge numberof connections, causing it to run out of resources and
dropping legitimate connections.A new defense against this is the SYN cookies”. Each side of a
connection has itsown sequence number. In response to a SYN, the attacked machine creates a
special sequence numberthat is a cookie”of the connection then forgetseverything it knows
about the connection. It can then recreate the forgotten information about the connection where
the next packets come in from a legitimate connection.
Hacker 's
System Target
System
Internet
TCPSYN
requests
Backing
quene
TCP SYN-ACK
Packets
ICMPFlood- The attacker transmits a volume of ICMPrequest packets to cause all CPU
resourcesto be consumed serving the phonyrequests.
UDP Flood- The attacker transmits a volume of requestsfor UDPdiagnosticservices whichcause
all CPU resourcesto be consumed serving the phonyrequests.
Land attack- The attacker attempts to slowyournetworkdown bysending a packet with identical
source and destination addresses originating from your network.
Smurfattack- Where the source address of a broadcast ping isforged so that a huge numberof
machines respond backto victim indicated bythe address, overloading it.
Hacker 's
System Multiple network
Subnet
Internet
Broadcast ping
request from spoofed
IP address
Target Router
Ping response

G.shdsl Router User Manual 152
13
Fraggle Attack- A perpetrator sends a large amount of UDPecho packetsat IPbroadcast
addresses, allof it having a spoofed source address of a victim.
IP Spoofing- IP Spoofing is amethod of masking the identity of an intrusion by making it appeared
that the traffic came from a different computer.This isused byintruders to keep their anonymity
and can be used in a Denial of Service attack.

G.shdsl Router User Manual 152
14
Yours VLAN (Virtual Local Area Network)
Virtual LAN (VLAN) isdefined asa group of deviceson one or more LANs that are configured so
that theycan communicate as if theywere attached tothe same wire, when in fact theyare located
on a number of different LAN segments. Because VLAN isbased on logical instead of physical
connections, it isextremelyflexible.
The IEEE 802.1Q defines the operation of VLAN bridges that permit the definition, operation, and
administration of VLAN topologieswithin a bridged LAN infrastructure. VLAN architecture benefits
include:
1. Increased performance
2. Improved manageability
3. Networktuning and simplification of software configurations
4. Physical topologyindependence
5. Increased securityoptions
AsDSL (overATM) links are deployed more and more extensivelyand popularly, it is rising
progressivelyto implement VLAN (VLAN-to-PVC) over DSL linksand, hence, it is possible to be a
requirement of ISPs.
We discuss the implementation of VLAN-to-PVC onlyfor bridge mode operation, i.e., the VLAN
spreadsover both the COE and CPE sides, where there is no layer3 routing involved.
Specification
1. The unit supportsup to 8 active VLANswith shared VLAN learning (SVL) bridge out of 4096
possible VLANsspecified in IEEE 802.1Q.
2. Each port always belongsto a default VLAN with itsport VID (PVID)asan untagged member.
Also, a port can belong to multiple VLANs and be tagged members of these VLANs.
3. Aport must not be a tagged memberof its default VLAN.
4. If a non-tagged or null-VID tagged packet isreceived, itwill be assigned with the default PVID
of the ingress port.
5. If the packet istagged with non-nullVID, the VID in the tag willbe used.
6. The lookup process startswith VLAN lookup to determine whether the VID isvalid. If the VID
is not valid, the packet will be dropped and its address will not be learned. If the VID is valid,
the VID, destination address, and source address lookupsare performed.
7. The VID and destination addresslookup determinesthe forwarding ports. If it fails, the packet
will be broadcasted to all members of the VLAN, except the ingress port.
8. Frames are sent outtagged or untagged depend on if the egressport isatagged or untagged
member of the VLAN that frames belong to.
9. If VID and source address lookup fails, the source addresswill be learned.
Frame Specification
An untagged frame or a priority-tagged frame does not carryanyidentification of the VLAN to
which it belongs. Such framesare classified asbelonging to a particular VLAN based on
parameters associated with the receiving port. Also, prioritytagged frames, which, bydefinition,
carryno VLAN identification information, are treated the same as untagged frames.
A VLAN-tagged frame carriesan explicit identification of the VLAN to which it belongs; i.e., it
carriesa tag header that carries a non-null VID. Thisresultsin a minimum tagged frame length of
68 octets. Such a frame is classified asbelonging to a particular VLAN based on the value of the
VID that isincluded in the tag header. The presence of the tag headercarrying a non-null VID

G.shdsl Router User Manual 152
15
meansthat some other device, either the originator of the frame or a VLAN-aware bridge, has
mapped this frame into a VLAN and hasinserted the appropriate VID.
The following figure shows the difference between a untagged frame and VLAN tagged frame,
where the Tag ProtocolIdentifier (TPID) is of 0x8100and it identifiesthe frame asa tagged frame.
The Tag Control Information (TCI) consistsof the following elements: 1) User priorityallows the
tagged frame to carryuser priorityinformation across bridged LANsin which individual LAN
segments maybe unable to signal priorityinformation (e.g., 802.3/Ethernet segments). 2) The
Canonical Format Indicator (CFI)is used to signal the presence or absence of a Routing
Information Field (RIF) field, and, in combination with the Non-canonical Format Indicator (NCFI)
carried in the RIF, to signal the bit order of addressinformation carried in the encapsulated frame.
3)The VID uniquelyidentifiesthe VLAN to which the frame belongs.
Applications
WANLAN1LAN2LAN3LAN4
Group 1
Group 2
Group3
Port-based VLAN
18
PWR
OK
WIC0
ACT/CH0
ACT/CH1
WIC0
ACT/CH0
ACT/CH1
ETH
ACT
COL
PWR
OK
WIC0
ACT/CH0
ACT/CH1
WIC0
ACT/CH0
ACT/CH1
ETH
ACT
COL
SHDSLconnection
with 2PVC
LAN1
LAN1
LAN2 LAN2
LAN3 LAN3
LAN4LAN4
COCPE
SERVER
SERVER
123
456
789
*
8#
123
456
789
*8#
VoIPVoIP
802.1q VLAN

G.shdsl Router User Manual 152
16
POWER FAULT DATA ALARM
LAN1LAN2LAN3LAN4
WAN1
WAN2
WAN3
WAN4WAN5
WAN6
WAN7
WAN8
Backbone
ATM
Switch
VID30
VID10
SHDSL
Router
VID20
VID20
VID10 VID30

G.shdsl Router User Manual 152
17
Getting to knowaboutthe router
This section will introduce hardware of the router.
Front Panel
The front panel contains LED which showstatusof the router.
SHDSL
PWRLNKACT
12 3 4
ALM
WAN
LAN
SHDSL
PWRLNKACT
10M/ACT100M/ACT
ALM
WAN
LAN
Front Panelof SHDSL 4-wire/4-port router/bridge
Front Panelof SHDSL 2-wire/1-portrouter/bridge
LED status of 4-wire/4-portrouter
LEDs ActiveDescription
PWR On Power on
On SHDSLline connection is established
LNK Blink SHDSLhandshake
WAN
ACT On Transmit orreceived data over SHDSLlink
On Ethernet cable is connectedtoLAN 1
1 Blink Transmit orreceived data over LAN 1
On Ethernet cable is connectedtoLAN 2
2 Blink Transmit orreceived data over LAN 2
On Ethernet cable is connectedtoLAN 3
3 Blink Transmit orreceived data over LAN 3
On Ethernet cable is connectedtoLAN 4
LAN
4 Blink Transmit orreceived data over LAN 4
On SHDSLline connection is dropped
ALM Blink SHDSLselftest
LED status of 2-wire/1-portrouter
LEDs ActiveDescription
PWR On Poweradaptoris connected tothe router
On SHDSLline connection is established
LNK Blink SHDSLhandshake
WAN
ACTBlink Transmit or receiveddata over SHDSLlink
On LAN port connect with10M NIC
10M/ACT Blink LAN port acts in10M
On LAN port connect with100MNIC
LAN
100M/ACT Blink LAN port acts in100M
On SHDSLline connection is dropped
ALM Blink SHDSLselftest

G.shdsl Router User Manual 152
18
RearPanel
The rear panel of SHDSL router is where all of the connectionsare made.
DC-IN LAN CONSOLE
1234
LINE
DC-INLAN CONSOLE LINE
RearPanel of SHDSL4-wire/4-port router/bridge
RearPanel of SHDSL2-wire/1-port router/bridge
RST
RST
Connectors Description of 2-wire/1-port router
DC-INPoweradaptorinlet: Input voltage 9VDC
LAN Ethernet 10BaseTforLAN port (RJ-45)
CONSOLE RS-232C (DB9)forsystem configuration and maintenance
LINE SHDSLinterface for WAN port (RJ-11)
RST Reset button for reboot or load factorydefault
Connectors Description of 4-wire/4-port router
DC-INPoweradaptorinlet: Input voltage 9VDC
LAN (1,2,3,4) 10/100BaseTauto-sensing andauto- MDIX forLAN port (RJ-45)
CONSOLE RS-232C (DB9)forsystem configuration and maintenance
LINE SHDSLinterface for WAN port (RJ-11)
RST Reset button for reboot or load factorydefault
!The reset button can be used onlyin one of two ways.
(1)Press the Reset Button for one second will cause system reboot.
(2)Pressing the Reset Button for four secondswill cause the product loading the factory
default setting and losing all of yours configuration. When you want to change its
configuration but forget the username or password, or if the product ishaving
problemsconnecting to the Internet and you want to configure it again clearing all
configurations, press the Reset Button for four seconds with a paper clip orsharp
pencil.

G.shdsl Router User Manual 152
19
SHDSLLine Connector
2-wire4-wire
TopView
FrontView
LoopA
LoopB
Loop B
LoopA
14
14
TopView
FrontView
Loop
Loop
14
14
Console Cable
Pin Number
Description Fuigure
1No connection
2RxD (O)
3TxD (I)
4No connection
5GND
6No connection
7CTS (O)
8RTS (I)
9No connection
12345
6789
Table of contents
Other Dynamix Network Router manuals

Dynamix
Dynamix HP-30/S User manual

Dynamix
Dynamix HP-20C User manual

Dynamix
Dynamix ANEXX A User manual

Dynamix
Dynamix UM-A4 Plus User manual

Dynamix
Dynamix M-A4W User manual

Dynamix
Dynamix UM-SB User manual

Dynamix
Dynamix UM-A4W User manual

Dynamix
Dynamix UM-A User manual

Dynamix
Dynamix HP-51/S User manual

Dynamix
Dynamix UM-S4FB User manual

Dynamix
Dynamix UM-A User manual

Dynamix
Dynamix UM-A User manual

Dynamix
Dynamix UM-AI User manual

Dynamix
Dynamix Tiger 2Plus User manual

Dynamix
Dynamix UM-A Plus/PL User manual

Dynamix
Dynamix DV-24 User manual

Dynamix
Dynamix UM-A User manual

Dynamix
Dynamix Dynamix HP-30 Coax User manual

Dynamix
Dynamix UM-A Plus User manual