SparkLAN Communications WVTR141 Wi-Fi 802.11g SIP Analog Telephone Adapter User Manual Manual

SparkLAN Communications, Inc. Wi-Fi 802.11g SIP Analog Telephone Adapter Manual

Manual

    Wireless ATA User Manual             Version 1.0       Model Name: WVTR-141       Brand Name: SparkLAN
Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording, or otherwise without the prior writing of the publisher.  Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.    These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.  This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user.
Table of Contents PART I INTRODUCTIONS................................................................1 Ch. 1 Introduction to VoIP ............................................................................................................2 1.1 Advantages of VoIP to Businesses ...................................................................................2 1.2 SIP – Most Popular VoIP Protocol.....................................................................................3 1.2.1 SIP Identities ..................................................................................................................................3 1.2.2 Servers in SIP World......................................................................................................................3 1.3 VoIP-Friendly Networking Concepts .................................................................................4 1.3.1 NAT, Network Address Translation..........................................................................................................4 1.3.2 STUN, Simple Traversal of UDP through NAT.............................................................................5 1.3.3 Voice Codec...................................................................................................................................5 Ch. 2 Introduction to Network application....................................................................................6 2.1 Operation Modes................................................................................................................6 2.2 Wireless Modes..................................................................................................................6 2.3 Topologies of Network Application ....................................................................................7 Ch. 3 Knowing WIFI-ATA.............................................................................................................9 3.1 Overview of WIFI-ATA........................................................................................................9 3.2 Key Features of WIFI-ATA...............................................................................................10 3.3 Outlook of WIFI-ATA ........................................................................................................11 3.4 Web Configuration Environment......................................................................................13 PART II ATA SETTINGS.................................................................14 Ch. 4 Configuring WIFI-ATA ......................................................................................................15 4.1 Quickly Setup (Setup Wizard)..........................................................................................16 4.2 Operation Mode................................................................................................................21 4.3 TCP/IP Settings ................................................................................................................22 4.4 VoIP Settings ....................................................................................................................27 4.5 Wireless settings...............................................................................................................34 4.6 Firewall settings ................................................................................................................42 4.7 Management.....................................................................................................................45 PART III ILLUSTRATIONS.................................................................................. 49 Ch. 5    FAQ & Troubleshooting........................................................................................................50 5.1 How can I make a phone call?.........................................................................................50 5.2 How can I pick up the call waiting while I’m on the phone? ...........................................50 5.3 How can I make a 3-way conference call? .....................................................................51 5.4 How can I transfer a call to others? .................................................................................51 5.5 Why can’t I login to the WIFI-ATA?..................................................................................51 5.6 Why can’t I access the Internet?......................................................................................51 5.7 Why can’t I make VoIP phone calls to others? ...............................................................52 5.8 WIFI-ATA doesn’t respond correctly to key press sometimes.......................................52
Part I  Introductions  Topics in Part I:  z Ch. 1 Introduction to VoIP z Ch. 2 Introduction to Network application z Ch. 3 Knowing WIFI-ATA
Ch. 1  Introduction to VoIP VoIP stands for Voice over Internet Protocol, which means transmitting voice over the most widely accepted network protocol around the world. Internet Protocol networking is widely supported by almost all kinds of networks. VoIP, however, can also be implemented inside LAN only without Internet involved if proper LAN environment is ready. In addition, with improvements, business class VoIP system can integrate data, voice, and video in the same network. This takes simplified management rules into three different systems / networks and results in enhanced performance for all kinds of organizations. Later on, this chapter will guide you through the basic elements of the VoIP and some related terms involved as below: z  Advantages of VoIP to Businesses z  SIP – Most Popular VoIP Protocol z VoIP-Friendly Networking Concepts 1.1  Advantages of VoIP to Businesses Telephony system was invented around 100 years ago by Alexander Graham Bell. Though telephones expedite the business communications, it’s expensive especially for international phone calls. Internet Protocol has become the world wide standard. With remarkable improvements in broadband access, VoIP technology and IP Telephony, it is about time to provide businesses high quality IP phone calls at comparably low cost with good reliability. Since voice is transmitted over the Internet there is no demarcation of any physical boundary, this dissolves any need of being charged at very high rate for making international phone calls. IP Telephony focuses on using your existing telephony resources to build a vibrant communications network that enhances productivity. A common business class VoIP system provides all the features you’ve been familiar with—voicemail, call waiting, call forwarding, to name a few—as well as many new exciting features such as making LOCAL calls at whatever location you may be in the world. Business world needs reliability and productivity as well. In conventional way, telephony system and computer-based system are two different networks. Hence, the two different networks require normally two times of man-power to manage, and they are hardly managed under a set of unified managing principles. Business class VoIP  2
system will be able to provide easy-to-manage, business-driven architecture at a cost that is competitive with your current expenditures. 1.2  SIP – Most Popular VoIP Protocol SIP stands for Session Initiation Protocol which an application-layer is signaling protocol that handles the VoIP phone calls over the Internet. Unlike other VoIP protocols, SIP handles signaling only, and leverages other SIP-related protocols to co-work with media sessions accordingly. The simple and flexible enough architecture brings great chances to SIP for expanding, such as Video phone calls. Later on, we’ll introduce some terminologies that are common in the VoIP worlds, especially SIP related. In addition, we strongly recommend the system administrator to read other VoIP related documents, textbooks to have better understanding in order to construct a VoIP-friendly network. 1.2.1 SIP Identities A SIP identity (a.k.a. SIP address or SIP Account) is similar to an email address which is used for identifying who’s who in the SIP world just like email address used for identifying the owner. The format of a SIP identity is like an email address, presented as SIP-Number@SIP-Service-Domain. As the expression shows, there are two major parts in the SIP account; the SIP-Number and SIP-Service-Domain. z  The SIP number is the first part of the SIP URI that is located in front of the “@” symbol. A SIP number can be alphabet characters just like in an e-mail address (johndoe@ITSP-XYZ.com for example) or numeric digits like a regular telephone number (1234567@ITSP-ABC.com for example). z  The SIP-Service-Domain is the domain name in a SIP URI. It is used to identify who the service provider is. Normally, it will be the ITSP or the Internet domain name which your company has. 1.2.2  Servers in SIP World The architecture of SIP protocol is client-server based. Every SIP device or application program will act as SIP client and SIP server as well. The SIP device acts as client when sending out SIP requests, and acts as SIP server once responding to the SIP requests. The Servers we talk about here aim only at the device, and / or application program which are used to provide VoIP services or application program which is used by  3
SIP-Service-Domain owner to provide its services to its subscribers. Sometimes, the SIP Registration Server will be used for distinguishing purpose. There are three kinds of the server: z SIP Proxy Server; it relays call signaling, i.e. acts as both client and server operating in a transactional manner, i.e., it keeps no session state z SIP Redirect Server; it redirects caller to other servers z SIP Registrar; it accepts registration requests from users and maintains user’s whereabouts at a Location Server. 1.3  VoIP-Friendly Networking Concepts There are many common features from regular router which will block your VoIP communications, or make your network environment very VoIP-unfriendly. Here are some topics which you need to take care of, or might be helpful in making a VoIP-friendly network. 1.3.1  NAT, Network Address Translation One of the most common features which router provides in order to provide Internet access to all the computers in your LAN environment is “NAT”. In the simplest case, NAT changes the source IP address of a packet received from a device to another IP address before forwarding the packet towards its destination. When the response comes back, NAT translates the destination address back to the device's IP address and forwards it to the device. NAT routers are commonly used to translate private (or internal) IP addresses in packet headers to public (or external) IP addresses and vice versa. A NAT router maps a private IP address & port; pairs it to a public IP address & port and whenever the NAT router receives a packet with that public IP address & port, it knows how to reroute the packet back to the private IP address & port. The WIFI-ATA must know the public IP address which you get from your ISP in order to provide its services. If there is a NAT router between the WIFI-ATA and your broadband modem then your WIFI-ATA probably has a private IP address. In this case, the SIP session will not be able to establish properly, and you must configure the NAT router to forward traffic with the correct IP address & SIP port number to solve this problem.  4
1.3.2  STUN, Simple Traversal of UDP through NAT STUN can be used to help your, WIFI-ATA, to find the present types of NAT routers and/or firewalls between it and the public Internet. STUN also allows the WIFI-ATA to find the public IP address that NAT has assigned, so that the WIFI-ATA can embed it in the SIP data stream. However, STUN does not work with symmetric NAT routers or firewalls. For more information, please refer to RFC 3489 on STUN. 1.3.3 Voice Codec A codec (coder/decoder) converts analog voice signals into digital signals and decodes the digital signals back into voice signals. Each codec has its positive part, good voice quality and bad part, bandwidth consumption. WIFI-ATA supports the following codecs. z ITU-T G.711:  G.711 is a Pulse Code Modulation (PCM) waveform codec. G.711 provides very good voice quality but requires 64 K bit/s of bandwidth. z ITU-T G.729: G.729 is an Analysis-by-Synthesis (ABS) hybrid waveform codec that uses a filter based information about how the human vocal tract produces sounds. G.729 provides good voice quality and reduces the required bandwidth to 8 K bit/s.  5
Ch. 2  Introduction to Network application The WIFI-ATA is an 802.11b/g compatible wireless network device. It can act as the following roles:. z Bridge z Gateway z WISP z Access Point  z AP Client 2.1 Operation Modes The device provides 3 different operation modes. The operation mode is about the communication mechanism between the wired Ethernet NIC and wireless NIC, the following is the types of operation mode. z Gateway mode :The wired Ethernet (WAN) port is used to connect with ADSL/Cable modem and the wireless NIC is used for your private WLAN. The NAT is existed between the 2 NIC and all the wireless clients share the same public IP address through the WAN port to ISP. You can access the web server of device through wireless, the default LAN IP address “192.168.1.254” and modify the setting base on your ISP requirement. z Bridge mode:The wired Ethernet and wireless NIC are bridged together. Once the mode is selected, all the WAN related functions will be disabled. z WISP (Wireless ISP) mode:This mode can let you access the AP of your wireless ISP and share the same public IP address from your ISP to the PCs connecting with the wired Ethernet port of the device. To use this mode, first you must set the wireless radio to be client mode and connect to the AP of your ISP then you can configure the WAN IP configuration to meet your ISP requirement. 2.2 Wireless Modes The wireless radio of the device acts as the following roles. z AP (Access Point):The wireless radio of device serves as communications “HUB” for wireless clients and provides a connection to a wired LAN.  6
z AP Client:This mode provides the capability to connect with the other AP using infrastructure/Ad-hoc networking types. With bridge operation mode, you can directly connect the wired Ethernet port to your PC and the device becomes a wireless adapter. And with WISP operation mode, you can connect the wired Ethernet port to a hub/switch and all the PCs connecting with hub/switch can share the same public IP address from your ISP. The following table shows the supporting combination of operation and wireless radio modes.  Bridge  Gateway  WISP AP  V  V  X AP Client  V  V  V 2.3 Topologies of Network Application Hereafter are some topologies of network application for your reference. Gateway mode topology:   7
Bridge mode topology:   WISP (Wireless ISP) mode topology:     8
Ch. 3  Knowing WIFI-ATA In this chapter, we’ll go through the following topics in order to learn more about what 1FXS Wireless ATA WIFI-ATA can provide, and familiarize ourselves with WIFI-ATA. The topics are as follows: z Overview of WIFI-ATA z  Key Features of WIFI-ATA z  Outlook of WIFI-ATA z Web Configuration Environment 3.1  Overview of WIFI-ATA The 1FXS Wireless ATA WIFI-ATA user guide provides instructions for administering the WIFI-ATA. WIFI-ATA is a device converting analog phones into VoIP-ready devices which support most popular VoIP protocol - SIP (Session Initiation Protocol). WIFI-ATA can instantly convert your existing PSTN phones into VoIP-ready devices and enjoy the inexpensive IP telephony services without purchasing extra IP phones. It features two RJ-45 Ethernet port for sharing the Internet accessibility with your PC simultaneously while making IP calls. With built-in NAT function, business persons and/or travelers can use their WIFI-ATA and computer at the same time with the capability of accessing Internet through broadband Internet service which hotels provide under single IP architecture, especially web authentication is required.         9
3.2  Key Features of WIFI-ATA 1FXS Wireless ATA WIFI-ATA is a state-of-the-art design featuring several cutting-edge functions, and it provides users a small box with many things such as combining data communication and voice communications. The key features are shown as below. z  Supporting SIP v2 (RFC 3261) Standard z  Auto-Provisioning Function Ensures Easy Configuration with IP PBX z  Supporting Multiple Codecs z  One RJ-45 Port z  802.11g Wireless AP / AP Client z  Supporting Multiple IP Assignment: PPPoE, DHCP, PPTP, and Static IP z  Supporting VAD (Voice Activity Detection) and CNG (Comfortable Noise Generation) z  Adaptive Jitter Buffer z  Acoustic Echo Cancellation z DTMF Tone Generation  10
3.3  Outlook of WIFI-ATA  4a 4b  1   2   3   LED Status  Description On  WIFI-ATA is receiving power. 1 (Power LED)  Off  WIFI-ATA is not receiving power. Blinking  Wireless network is enabled. 2 (Wireless LED)  Off  Wireless network is disabled. On  Ethernet port is connected to your network environment. Blinking  Ethernet port is transmitting / receiving data. 3 (Ethernet LED) Off  Ethernet port is disconnected. On  Phone is registered successfully. 4a VoIP Status  Off  Phone failed the registration. On  Phone is off-hook. Blinking  Phone has an incoming VoIP call. 4b Phone Status Off  Phone is on-hook.   11
 Item Description Power  Connection of WIFI-ATA power adaptor Phone  Connection port to analog phone Ethernet  For connecting to your networking environment Reset Reset button of WIFI-ATA.   z  Press 0~4 sec:reboot the system. z  Press longer than 5 sec:reset all settings to default. z  When you press the Reset button, the 4a, 4b LED will turn on. After 5 sec, these LED will be blinking. Antenna  Wireless antenna. NOTE: If configure as gateway mode, do remember to connect Ethernet port to your networking environment and use wireless for connecting to your PC or laptop computer. Otherwise, WIFI-ATA might interference the behavior of your LAN environment. For more information, please refer to Chapter 4.    12
3.4  Web Configuration Environment Configuring WIFI-ATA is very simple and as easy as normal networking devices. Simply use your web browser to do the configuration. Detailed information and configuration way will be discussed in the following sections.    13
Part II  ATA Settings  Topics in Part II: z  Ch. 4  Configuring WIFI-ATA    14
Ch. 4  Configuring WIFI-ATA To configure WIFI-ATA, you must connect to the web configuration page first. When you get a new WIFI-ATA or reset the system to default, the default network mode of WIFI-ATA is gateway, the default Ethernet WAN IP is 172.1.1.1, and the default wireless LAN IP is 192.168.1.254, and the DHCP server is on. The default Wireless SSID is “WIFI-ATA”. You could connect to the LAN side using Wireless adapter cards.  If you connect by wired, please get to the setup page by WAN IP.                 If you connect by wireless, please get to the setup page by wireless LAN IP.     Following is the variation of Ethernet port IP in each Operation mode.  Operation Mode  Default IP    Ethernet IP  172.1.1.1 Gateway WLAN IP  192.168.1.254 Bridge     Ethernet IP  192.168.1.254 WISP Ethernet IP 192.168.1.254 Client Ethernet IP 172.1.1.1         15
Turn on your web browser, ex: Internet Explorer, Netscape or Firefox are all OK, and enter http://<ip address>. Then, you’ll see the page like below.  In this chapter, this guide will lead you through all the functions of WIFI-ATA, including the following topics: z  Quickly Setup (Setup Wizard). z Operation Mode z TCP/IP Settings z VoIP Settings z Wireless z Firewall z VPN Setting z Management 4.1  Quickly Setup (Setup Wizard) The Setup Wizard is used to first time and quickly configure the WIFI-ATA. It will configure all the most basically settings about the TCP/IP Network, Wireless Network, and VoIP SIP account step by step. The following descriptions show the steps to configure the setup wizard. Step 1: Select Operation Mode  16
The operation modes have been described in section 2.1. Select the most suitable operation mode according to your network environment. You could click the miniature to see the topology of each mode. Click “Next>>” to continue.   Gateway topology:   17
Step 2: Configure Time Zone If you enable the NTP client update, select the time zone of your location and the NTP server to update the system time simultaneity. Click “Next>>” to continue.   Step 3: Configure LAN Network Configure the static IP address of the LAN interface. This setup may effect according to the mode you choose. If you choose gateway mode, this step will change the IP of wireless LAN interface. (Please refer to P.6 table) If you want to change it to DHCP client, you can change it in the “TCP/IP Settings -> LAN interface” later. The DHCP server will auto turn on if you configure the operation mode as Gateway or WISP mode, otherwise it will auto turn off. Click “Next>>” to continue.   18
Step 4: Configure WAN network If you configure the operation mode as Bridge mode, ignore this step. Configure the WAN interface as static IP, DHCP client, PPPoE, or PPTP according to your network environment. If you want to access the webpage from WAN side, enable Web Server Access on WAN. Click “Next>>” to continue.   Step 5: Configure Wireless Basic Settings Configure the wireless mode, SSID, and channel. You can click “Show Site Survey” button to see how many access points are deployed in your environment, and avoid to use the same SSID and the same channel that are already in used by other AP. Click “Next>>” to continue.   19
Step 6: Configure Wireless Security Configure the wireless encryption method. It can configure as None, WEP, WPA(TKIP) PSK, WPA2(AES) PSK and WPA mixed PSK. Click “Next>>” to continue.  Step 7: Configure VoIP SIP account Configure the account which is for activating your VoIP service. Fill in the information you get from ITSP and enter into fields accordingly. Basically, you will have the VoIP subscription information which are “Register Name,” “Register Password,” “Proxy Server,” and “Outbound Proxy”. Click “Finish” to finish.  After you click the “Finish” button, please wait some time period to let all settings come into force. If IP address was changed, you have to re-connect the web server with the new address.  20
4.2 Operation Mode You could only change the operation mode in this page. The operation mode had been described in session 2.1. This page is very the same with the setup wizard step 1 page, please reference to session 4.1.   21
4.3 TCP/IP Settings The third feature set of WIFI-ATA is about the TCP/IP networking which contains “LAN interface” and “WAN interface“. If the operation mode is “Bridge”, only the LAN interface settings are available. That means LAN/PC port, WAN port, and Wireless network all use the LAN interface settings in bridge mode. If the operation mode is “Gateway”, the LAN interface is to configure LAN port and Wireless network; the WAN interface is to configure WAN port. If the operation mode is “WISP”, the LAN interface is to configure WAN and LAN port; the WAN interface is to configure the Wireless network. 4.3.1 LAN Interface The LAN interface supports “Static IP”, “DHCP Client”, and “DHCP Server”. If you want to use PPPoE connection, configure the operation mode to “Gateway” and set the PPPoE account in the WAN Interface page.  The IP Address / Subnet Mask / Default Gateway fields are only available when you use a static IP. It may be provide from the MIS or network provider. IP Address:Configure the Internet Protocol(IP) address of your local network. Subnet Mask:It is used to identify the IP subnet network, indicating whether the IP address can be recognized. Default Gateway:If you have a gateway device in your local network, you could configure the gateway’s IP address here.    22
The DHCP / DHCP Client Range fields are used to “configure the DHCP Server in static IP” or “use DHCP Client not static IP”. DHCP:It can be configure as “Server”, “Client”, or “Disabled”. If you want to use DHCP client instead of static IP, select “Client”. If you want to enable the DHCP server, select “Server” and configure the DHCP Client Range. If you want to disable DHCP server, select “Disabled.”  DHCP Client Range:It is used to configure the IP address range that the DHCP server will deliver to the DHCP client. So it can only configure when the DHCP server is enabled. It should be avoid letting your IP address inside the range.  802.1d Spanning Tree:Spanning-Tree Protocol is a link management protocol that provides path redundancy while preventing undesirable loops in the network. For an Ethernet network to function properly, only one active path can exist between two stations. If your network environment contains a loop, enable it.  23
Clone MAC Address:If you want to use a specific MAC address instead of the default MAC address in the LAN port, configure the specific MAC address here. 4.3.2 WAN interface The WAN interface supports “Static IP”, “DHCP client”, “PPPoE”, and “PPTP”. It will be unavailable if the operation mode is bridge. Static IP Fill in all the information needed, such as IP address, subnet mask, default gateway, and the IP address of DNS Server.   DNS(Domain Name Server) is used to map domain names to IP addresses. DNS maintain central lists of domain name/IP addresses and map the domain names in your Internet requests to other servers on the Internet until the specified web site is found.  Note: Most of cases, you don’t need to take care of the Clone MAC Address field. If you’ve found other networking devices can not work properly which are connected to the LAN environment through WIFI-ATA, then you probably need to fill the MAC address into MAC field.   24
DHCP Client If WAN Access type chosen as DHCP Client, you can specify the IP address of DNS server manually or attain from DHCP server.    PPPoE If you connect your WIFI-ATA directly to your broadband modem, you probably need to use PPPoE as IP type. Then, you need to enter the User Name and Password that provided by the ITSP into the fields accordingly. There are three connection type “Continuous”, “Connect on demand”, and “Manual”.   Continuous:Always connect if the line is available. Connect on Demand:Only connect when it needs to access internet. Manual:Manual connect / disconnect by click the “Connect” / “Disconnect” button. Idle Time:The expiry time of the connection, it is only available when “Connect on Demand” type is selected. MTU Size:Maximum transmission Unit, 1412 is the default setting; you may need to change the MTU for optimal performance with your specific ITSP.   25
PPTP PPTP(Point to Point Tunneling Protocol) is designed as an extension of PPP, it encapsulates PPP packets into IP datagram for transmission over the Internet or other public TCP/IP based networks. Please contact with the ITSP for detail settings.  Others Enable uPNP:Allow the device to be found and configured automatically by the system. (Ex. Window XP) Enable Web Server Access on WAN :Allow others to access the web configuration page from internet. IPsec / PPTP / L2PT pass through on VPN connection:Just as the literal description, they are only available on VPN connection.   26
4.4 VoIP Settings The fourth feature set of WIFI-ATA is about the VoIP related settings which contains “SIP Basic settings”, “SIP Advanced settings”, “NAT Traversal”, “Call Settings” and “Dial Settings“. 4.4.1 SIP Basic settings This is the most important part of WIFI-ATA which is for activating your VoIP service. Fill in the information you have from ITSP and enter into fields accordingly.  Basically, you will have the VoIP subscription information from ITSP which are “Register Name”, “Register Password”, “Proxy Server”, and “Outbound Proxy”.  27
4.4.2 SIP Advanced settings SIP Advanced settings contain many other SIP parameters. Some will influence the voice quality, like “Codec Priority” and “VAD”. Some must collocate with the SIP server, like “Reg Expire” and “DTMF relay”. And some must collocate with the analog phone, like “Volume”, “Gain”, “Flash Time”, and “Country”.  Codec Priority:Codec stands for Coder / Decoder which converting your voice into VoIP packets. Through codec, it can compress the size of your voice and transmitting on the Internet efficiently. WIFI-ATA supports ITU-T standards, G.711 u-law, G-711 a-law, and G.729. If G.711u-law or G.711 u-law is in use, the voice quality will be very good. However, you need a plenty of bandwidth. If you find the voice is discontinued all the time, probably the bandwidth is not enough for support G.711 u-law or a-law. In such case, please set G.729 as higher priority. If you want to limit to use only specific codec, just set all codec priorities as the same. For example:Set all codec priorities as G.729 to use G.729 codec only. VAD:Voice Activity Detection, is used for saving the bandwidth consumption. Normally, enabling VAD function can save around 50% traffic. Turn on the VAD function can effectively solve the bandwidth problem. Reg Expire:It is about how long the registration is valid, and when the time interval is expired, WIFI-ATA will resubmit the registration again to the SIP server.  28
SIP / Media Port:Configure the local SIP / Media Port. In most cases, you don’t need to change it. DTMF Relay:Dial Tone Multi Frequency(DTMF), which is used for sending to the SIP server in ITSP. Basically, there are three kinds of DTMF type used in VoIP world. Choose the one your ITSP allow you to use, otherwise you might encounter problems. SIP / Voice Qos:Quality of Service(QoS), which is used for prioritizing the packets based on urgency which is set in part of the packet. It’s very important in the VoIP communication environment since data can always be re-sent so it’s not urgency at all. Please note that selecting QoS can not guarantee the voice transmitting will be expedited all the way. It just can ensure the packets through WIFI-ATA will be filtered based on QoS type. If your router or other network devices do not support QoS, your voice packet will be queued somewhere between caller and callee. For more information about the QoS, please check IETF RFC documentaries about IP ToS. Handset Volume:The volume you hear from the headset if it’s a VoIP call. Handset Gain:The volume you talk to the headset if it’s a VoIP call. Caller ID Mode:It is for selecting which kind of Caller ID system your phone supports. Flash Time:Configure the flash hook time of your phone. Country:Configure the country of your phone. In most case, it will be the same as your current location country.    29
4.4.3 NAT Traversal For sharing the Internet access, routers provide a function called NAT, Network Address Translation. It helps many computers / network devices can use just one public IP address. However, it’s not friendly to VoIP devices. NAT Traversal can help VoIP devices to get through the NAT successfully in order to complete the voice communication. WIFI-ATA supports two NAT traversal method “STUN” and “Manual mapping”. STUN has been described in section 1.3.2 . Manual mapping is to manual configure the external address and correspond external SIP and RTP port of local SIP and Media port. It must also configure the port and address mappings in the upper router. The local SIP and Media port was described in section 4.4.3 .   30
4.4.4 Call Settings This page contains call forward and call waiting settings.  Call Forward is used for the situations which you can’t receive the calls in front of the phone and you don’t want to miss the calls. By setting the Call Forward, all the incoming calls will be forwarded to the phone number you set according to the situation. There are three types of forwarding; “Unconditional Forward,” “Busy Forward,” and “No Answer Forward.”   “Unconditional Forward” will forward all the incoming calls to the phone number you set immediately, and make the other two types useless. “Busy Forward” will be activated if you are on the phone and there’s an incoming call. In this case, the incoming call will be forwarded to the phone number you set, such as your colleague’s or your mobile phone. “No Answer Forward” means the incoming calls will be forwarded to the phone number you set if you can not pick up the call in time. The “timeout” period depends on what you set in the field of “timeout” in this page The “Call Waiting” function brings you the alternative to take the other phone call while you are on the phone already. If the Call Waiting has set, you will hear the call waiting tone during your conversation with someone else. If you want to pick up this incoming call without stop current conversation, simply press the flash key your analog phone provides or using the phone hook to simulate the flash which describe in previous section. Once this call is finished, simply press the flash key again, you will be able to continue the call on hold.  31
4.4.5 Dial Settings This page contains speed dial and dial plan rule settings.  Speed Dial is a bit like shortcut. Through setting the speed dials, you can call anyone in the speed dial list simply by dialing “0#” to “9#” instead of entering the complete phone numbers. Dial Plan is used for setting the specific kind of dialing pattern. Any number you dial not matching the pattern won’t work. You can place calls in a short way as the rules define. The rules can be only one rule or a set of rules “rule 1|rule 2|rule 3”. Maximum length is 59 words. Each rule should be started with <prefix number> then followed a regular rule. Fields definition: Field Description <01155> prefix number 01155 [2-6]  A number between 2~6 [3478]  A number 3 or 4 or 7 or 8 X  A number 0~9 0,1,2,3,4,5,6,7,8,9 A specific number 0,1,2,3,4,5,6,7,8,9 For example :    <01155>[1-9]12xx <01155> means prefix number 01155, [1-9]12xx is a regular rule with total 5 digits, first number “1~9”, second number “1”, and third number “2”. When you dialed 5 digits that accord with the regular rule (ex : 11267),it will add the prefix “01155” automatically and dial out.(Really dialed out:0115511267)   32
4.4.6 Auto Provision The function is only applicable when your WIFI-ATA needs to get the configuration file that is provided by specific service providers, like IP-PBX or UTStarcom. If it is the case, then you don’t need to configure the SIP related settings. For more information, please contact with your service provider.  Service Provider:Select the service provider. (only for ZT-9050.) or UTStarcom (UTSI profile). Provision Type:Select how to get the configuration file. TFTP first: Get configuration file from TFTP server. If failed, get configuration file from HTTP server later. HTTP first: Get configuration file from HTTP server. If failed, get configuration file from TFTP server later. Disable: Do not get configuration file by provision. TFTP Server Address:The IP address or URL with file path of the TFTP provision server. TFTP Server Port:The port of the TFTP provision server. HTTP Server Address:The IP address or URL with file path of the HTTP provision server. HTTP Server Port:The port of the HTTP provision server. Provision Expiry Time:The system will get configuration file again after expiry time.  33
4.5 Wireless settings This feature set of WIFI-ATA is about the Wireless related settings which contains “Wireless Basic settings”, “Wireless Advanced settings”, “Security”, “Access Control” and “Site Survey“. 4.5.1 Wireless Basic Settings This page contains the basic settings of the wireless device.  Disable Wireless LAN Interface:Shut down the wireless interface of the device. Band:The device supports 2.4GHz(B), 2.4GHz(G), and 2.4GHz(B+G) mixed modes. Mode:The radio of the device supports AP and client mode. AP mode:The radio acts as an Access Point to serves all wireless clients to join a wireless local network. Client mode:The radio acts as a wireless adapter. Network Type:This setting is only available at client mode. It supports Infrastructure and Ad-hoc. In Infrastructure type, it can only connect to the Access Point. In Ad-hoc type, it provides a peer-to-peer communication between wireless stations. It can only connect with other Ad-hoc clients. All the Ad-hoc clients that want to connect together must use the same SSID. SSID:The SSID is a unique identifier that wireless networking devices use to establish and maintain wireless connectivity. Multiple access point/bridges on a network or sub-network can use the same SSID. SSIDs are case sensitive and can contain up to 32 alphanumeric characters. Do not include spaces in your SSID.  34
Channel Number:The following table is the available frequencies (in MHz) for the 2.4-GHz radio:   Channel No.  Frequency (Hz) Country Domain 1  2412  Americas, EMEA, Japan, Taiwan and China 2  2417  Americas, EMEA, Japan, Taiwan and China 3  2422  Americas, EMEA, Japan, Israel, Taiwan and China 4  2427  Americas, EMEA, Japan, Israel, Taiwan and China 5  2432  Americas, EMEA, Japan, Israel, Taiwan and China 6  2437  Americas, EMEA, Japan, Israel, Taiwan and China 7  2442  Americas, EMEA, Japan, Israel, Taiwan and China 8  2447  Americas, EMEA, Japan, Israel, Taiwan and China 9  2452  Americas, EMEA, Japan, Israel, Taiwan and China 10  2457  Americas, EMEA, Japan, Taiwan and China 11  2462  Americas, EMEA, Japan, Taiwan and China 12  2467  EMEA and Japan 13  2472  EMEA and Japan 14 2484 Japan only  EMEA (Europe, the Middle East and Africa).※ When set to “Auto”, the device will find the least-congested channel for use. Associated Clients:Show the information of active wireless client stations that connected to the device. Enable Mac Clone:It is only available in the AP bridge client mode and the Ethernet has only linked with one computer. When you enable this function, the device will act as your computer’s wireless adapter card.   4.5.2 Wireless Advanced Settings This page contains many wireless performance related parameters. These settings should not be changed unless you know what effect the changes will have on your device. The default setting is optimized for the normal operation.   35
Authentication Type:The device supports two Authentication Types “Open system” and “Shared Key”. When you select “Share Key”, you need to setup “WEP” key in “Security” page (See the next section). The default setting is “Auto”. The wireless client can associate with the device by using one of the two types. Fragment Threshold:The fragment threshold determines the size at which packets are fragmented (sent as several pieces instead of as one block). Use a low setting in areas where communication is poor or where there is a great deal of radio interference. This function will help you to improve the network performance. RTS Threshold:The RTS threshold determines the packet size at which the radio issues a request to send (RTS) before sending the packet. A low RTS Threshold setting can be useful in areas where many client devices are associating with the device, or in areas where the clients are far apart and can detect only the device and not each other. You can enter a setting ranging from 0 to 2347 bytes. Beacon Interval:The beacon interval is the amount of time between access point beacons in mini-seconds. The default beacon interval is 100. Data Rate:The standard IEEE 802.11b/11g supports 1, 2, 5.5, 11 / 6, 9, 12, 18, 24, 36, 48 and 54 Mbps data rates. You can choose the rate that the device uses for data transmission. The default value is “auto”. The device will use the highest possible selected transmission rate. Preamble Type:A long preamble basically gives the receiver more time to process the preamble. All 802.11 devices support a long preamble. The short preamble is designed to improve efficiency. Broadcast SSID:Broadcasting the SSID will let your wireless clients find the device automatically. If you are building a public Wireless Network, disable this function can provide better security. Every wireless stations located within the coverage of the device must connect this device by manually configure the SSID in your client settings. IAPP :This function will let Wireless Stations roam among a network environment with multiple devices. Wireless Stations are able to switch from one device to another as they move between the coverage areas. Users can have more wireless working range.  36
802.11g Protection:Protection is the protocol feature the gives 802.11g compatibility with older 802.11b equipment. It does slow down 802.11g stations, but not by forcing them to use slower 802.11b data rates. When an access point activates protection, it "wraps" faster 802.11g transmissions with a slower, backwards-compatible frame. The slowdown comes from the backwards-compatibility wrapper, not a reduction in the data rate of the frame. 4.5.3 Security This device provides complete wireless security function include WEP, 802.1x, WPA, WPA2 and WPA2-Mixed in different mode (see the Security Support Table). The default security setting of the encryption function is disabled. Choose your preferred security setting depending on what security function you need.  WEP Encryption Setting:Wired Equivalent Privacy (WEP) is implemented in this device to prevent unauthorized access to your wireless network. The WEP setting must be as same as each client in your wireless network. For more secure data transmission, you can change encryption type to “WEP” and click the “Set WEP Key” button to open the “Wireless WEP Key setup” page.   37
When you decide to use the WEP encryption to secure your WLAN, please refer to the following setting of the WEP encryption: z  64-bit WEP Encryption:64-bit WEP keys are as same as the encryption method of 40-bit WEP. You can input 10 hexadecimal digits (0~9, a~f or A~F) or 5 ACSII chars. z  128-bit WEP Encryption:128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars. The Default Tx Key field decides which of the four keys you want to use in your WLAN environment.   38
WEP Encryption with 802.1x Setting:The device supports external RADIUS Server that can secure networks against unauthorized access. If you use the WEP encryption, you can also use the RADIUS server to check the admission of the users. By this way every user must use a valid account before accessing the Wireless LAN and requires a RADIUS or other authentication server on the network. An example is shown as following.       You should choose WEP 64 or 128 bit encryption to fit with your network environment first. Then add user accounts and the target device to the RADIUS server. In the device , you need to specify the IP address、Password (Shared Secret) and Port number of the target RADIUS server.  WPA / WPA2 / WPA2 Mixed Encryption Setting:WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and access to their network restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode.  39
WPA Authentication Mode:This device supports two WPA modes. For personal user, you can use the Pre-shared Key to enhance your security setting. This mode requires only an access point and client station that supports WPA-PSK. For Enterprise, authentication is achieved via WPA RADIUS Server. You need a RADIUS or other authentication server on the network. WPA / WPA2 Cipher Suite:Choose the cipher type of the WPA / WPA2 encryption. Enterprise (RADIUS):When WPA Authentication mode is Enterprise (RADIUS), you have to add user accounts and the target device to the RADIUS Server. In the device , you need to specify the IP address、Password (Shared Secret) and Port number of the target RADIUS server.  Pre-Share Key:This mode requires only an access point and client station that supports WPA-PSK. The WPA-PSK settings include Key Format, Length and Value. They must be as same as each wireless client in your wireless network. When Key format is Passphrase, the key value should have 8~63 ACSII chars. When Key format is Hex, the key value should have 64 hexadecimal digits (0~9, a~f or A~F).   40
4.5.4 Access Control Access Control is used to manage whose clients can connect to this Access Point. Allowed Listed:Only those clients whose wireless MAC addresses are in the list will be able to connect to this Access Point. Deny Listed:These wireless clients on the list will not be able to connect to this Access Point.  4.5.5 Site Survey Site Survey is used to show how many wireless access points are deployed in this environment. If current wireless mode is client mode, you could choose one access point and click “connect” button to connect to this specific AP.    41
4.6 Firewall settings This feature set of WIFI-ATA is about firewall functions which contain “Port Filtering”, “IP Filtering”, “MAC Filtering”, “Port Forwarding”, “URL Filtering”, and “DMZ” These are all only available in Gateway mode or WISP mode. 4.6.1 Port Filtering When you enable the Port Filtering function, you can specify a single port or port ranges in filter table. Once the source port of outgoing packets match the port definition or within the port ranges in the table, they will be blocked by the firewall.  4.6.2 IP Filtering When you enable the IP Filtering function, you can specify local IP Addresses in filter table. Once the source IP address of outgoing packets match the IP address definition in the table, they will be blocked by the firewall.   42
4.6.3 MAC Filtering When you enable the MAC Filtering function, you can specify the MAC Addresses in filter table. Once the source MAC Address of outgoing packets matches the MAC Address definition in the table, they will be blocked by the firewall.  4.6.4 Port Forwarding This function allows you to automatically redirect common network services to a specific machine behind the NAT firewall. These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind the device's NAT firewall.   43
4.6.5 URL Filtering When you enable the URL Filtering function, you can specify some HTTP URLs in filter table. If the PCs in the local private network want to access these webpage in the filter table, it will be blocked by the firewall.  4.6.6 DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. So that all inbound packets will be redirected to the computer you set. It also is useful while you run some applications (ex. Internet game) that use uncertain incoming ports.   44
4.7 Management This feature set of WIFI-ATA is about the system related information and management settings which contains “Status”, “Statistics”, “DDNS”, “Time Zone Setting”, “Log”, “Upgrade Firmware”, “Save/Reload Settings” and “Password“. 4.7.1 Access Point Status This page shows the information about the firmware version, current wireless status, current network settings, and VoIP version.  4.7.2 Statistics This page statistics how many packets are sent or received in each network device.
4.7.3 Dynamic DNS Setting Dynamic DNS is a service, that provides you with a valid, unchanging, internet domain name (an URL) to go with that (possibly ever changing) IP-address. If you are not using a fixed IP, you might have to configure the DDNS to let the internet domain name of this device can connect to this device correctly.  4.7.4 Time Zone Setting This page is used to configure current system time. And you could enable the NTP to adjust the system time with NTP server synchronously.
4.7.5 System log This page shows the system event logs if you enable it. If you want to put these logs to remote log server to restore these logs, enable the remote log and fill the remote log server address.  4.7.6 Upgrade Firmware This page is used to upgrade firmware. Be sure that you had got the correct model firmware, or you might damage the system.
4.7.7 Save / Reload Settings You could restore current device settings as a config file to your computer, upload this config file to another device, and reset all settings to default value in this page.  4.7.8 Password Setup This page is used to configure the user name and password for login to the webpage. The default user name and password are empty. For more security, you could configure     48
Part III  Illustrations  Topics in Part III:  z  Ch. 5  FAQ & Troubleshooting  49
Ch. 5  FAQ & Troubleshooting This following highlights some potential problems and the corresponding reactions. 5.1  How can I make a phone call? Make sure you have done all the settings of your WIFI-ATA, and the Register LED is on. Just pick up the phone and dial the number and ending with the pound key “#”, then you can talk the counter part you’re party once he/she answers the call. 5.2  How can I pick up the call waiting while I’m on the phone? If you enable this function, it means the Call Waiting function has been turned on. When there’s a new incoming call while you are on the phone with the other person, you can press the Flash button to switch to the new call. Once you’ve switched the phone conversation to the 2nd person, the first person you talked with will be put on-hold. You can press the Flash button again to switch back to the first one.  50
5.3  How can I make a 3-way conference call? Making 3-way conference call is pretty similar to making phone call; just follow the steps below, and your 3-way conference will be there for you. 1.  Make a phone call to the first phone number. 2.  After the call is established, press the Flash button. You will hear the Dial tone, and then make the other phone call to the second phone number. 3.  When the second call is established, press the Flash button again. Then, all the 3 parties can enjoy the conference call. 5.4  How can I transfer a call to others? For using “Blind Transfer” function, you just need to dial "*"+ "1" to hold the current call, and then dial the extension number where you like the call to be transferred. For using “Ringing Transfer” function, you just need to press the Flash to hold the current call, and then dial the extension number where you like the call to be transferred. After hearing the ring back tone, press pound key “#” to transfer. For using “Consultant Transfer” function, you just need to press the Flash to hold the current call, and then dial the extension number where you like the call to be transferred. After the conversation has established, press pound key “#” to transfer. 5.5  Why can’t I login to the WIFI-ATA? Make sure you set the correct IP address of WIFI-ATA. If you’ve confirmed the WAN IP address of WIFI-ATA is correct but you still can not access the webpage of WIFI-ATA from the WAN side, you probably did not enable “Web Server Access on WAN”. In this situation, you can only access the webpage from the LAN side. 5.6  Why can’t I access the Internet? Please check which network mode, “Bridge Mode”, “Gateway Mode”, or “WISP mode” your WIFI-ATA is set and check if the Ethernet ports are used correctly.
5.7  Why can’t I make VoIP phone calls to others? Please check the “VoIP Basic Settings” webpage, and compared if all the information your ITSP gave you has been entered into WIFI-ATA correctly. 5.8  WIFI-ATA doesn’t respond correctly to key press sometimes. If the behavior of WIFI-ATA is not so properly especially you need to dial the number after the phone connection has established, such as dialing the extension numbers, the DTMF setting is probably wrong. Please enter the “VoIP Advanced Settings” webpage, and check the DTMF settings. The setting should be absolutely the same as what ITSP told you; otherwise, you WIFI-ATA might have some troubles while you need to dial again during the phone calls.   52

Navigation menu