all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Abridged user manual | Users Manual | 377.14 KiB | July 11 2007 | |||
1 | Cover Letter(s) | July 11 2007 | ||||||
1 | Cover Letter(s) | July 11 2007 | ||||||
1 | External Photos | July 11 2007 | ||||||
1 | ID Label/Location Info | July 11 2007 | ||||||
1 | Internal Photos | July 11 2007 | ||||||
1 | ID Label/Location Info | July 11 2007 | ||||||
1 | RF Exposure Info | July 11 2007 | ||||||
1 | Test Setup Photos | July 11 2007 | ||||||
1 | Test Report | July 11 2007 |
1 | Abridged user manual | Users Manual | 377.14 KiB | July 11 2007 |
Table of Contents Table of Contents Copyright
. 2 CHAPTER 1 Introduction
. 13
. 13 Whats New in 7.7 About Netopia Documentation
. 15 Intended Audience . 15
. 16 Documentation Conventions General . 16 Internal Web Interface . 16 Command Line Interface . 16
. 18
. 18 Organization A Word About Example Screens CHAPTER 2 Basic Mode Setup
. 19 Important Safety Instructions
. 20 POWER SUPPLY INSTALLATION . 20 TELECOMMUNICATION INSTALLATION. 20 PRODUCT VENTILATION . 20 Wichtige Sicherheitshinweise . 21 NETZTEIL INSTALLIEREN . 21 INSTALLATION DER TELEKOMMUNIKATION . 21
. 22 Microsoft Windows: . 22 Macintosh MacOS 8 or higher or Mac OS X: . 23
. 25 MiAVo VDSL and Ethernet WAN models Quickstart . 26 PPPoE Quickstart . 27 Set up the Netopia Pocket Gateway . 29
. 31 Netopia Gateway Status Indicator Lights Configuring the Netopia Gateway Setting up the Netopia Gateway 3 Table of Contents Home Page - Basic Mode . 32 Manage My Account. 34 Status Details . 35 Enable Remote Management. 36 Expert Mode . 37 Update Firmware . 38 Factory Reset . 39 CHAPTER 3 Expert Mode
. 41 Restart Help Configure Toolbar Navigating the Web Interface Accessing the Expert Web Interface . 41 Open the Web Connection . 41 Home Page - Expert Mode . 43 Home Page - Information . 43
. 45
. 45 Breadcrumb Trail . 45
. 46 Alert Symbol . 47
. 48
. 49 Quickstart . 49 How to Use the Quickstart Page . 49 Setup Your Gateway using a PPP Connection . 49 LAN. 51 Wireless . 56 Privacy . 57 Advanced . 60 About Closed System Mode . 62 WPA Version Allowed . 64 Multiple SSIDs . 65 WiFi Multimedia . 67 Wireless MAC Authorization . 69 Use RADIUS Server . 71 WAN . 73 PPP over Ethernet interface . 73 Advanced: . 76 Ethernet WAN interface . 78 WAN Ethernet and VDSL Gateways . 81 ADSL Gateways . 82 Advanced . 87 4 Table of Contents IP Static Routes. 88 IP Static ARP. 90 Pinholes. 90 Configure Specific Pinholes . 90 Planning for Your Pinholes . 90 Example: A LAN Requiring Three Pinholes . 91 Pinhole Configuration Procedure . 93 IPMaps . 96 Configure the IPMaps Feature . 97 FAQs for the IPMaps Feature . 97 What are IPMaps and how are they used? . 97 What types of servers are supported by IPMaps? . 97 Can I use IPMaps with my PPPoE or PPPoA connection? . 97 Will IPMaps allow IP addresses from different subnets to be assigned to my Gateway? . 97 IPMaps Block Diagram. 98 Default Server . 99 Configure a Default Server . 99 Typical Network Diagram . 100 NAT Combination Application . 101 IP-Passthrough . 101 A restriction . 102 Differentiated Services . 103 DNS . 106 DHCP Server. 106 RADIUS Server . 108 SNMP . 109 IGMP (Internet Group Management Protocol) . 112 UPnP . 115 LAN Management . 116 Ethernet Bridge . 117 Configuring for Bridge Mode . 118 VLAN . 121 Example #1 . 129 Example #2 . 132 System. 135 Syslog Parameters . 135 Log Event Messages. 137 Internal Servers . 140 Software Hosting . 141 List of Supported Games and Software . 142 Rename a User(PC) . 143 Ethernet MAC Override . 144 Clear Options. 145 5 Table of Contents Security Firewall Tutorial Time Zone. 145
. 146 Passwords . 147 Create and Change Passwords . 147 Firewall . 149 Use a Netopia Firewall . 149 BreakWater Basic Firewall . 149 Configuring for a BreakWater Setting . 149 TIPS for making your BreakWater Basic Firewall Selection . 151 Basic Firewall Background . 151 IPSec . 154 SafeHarbour IPSec VPN . 155 Configuring a SafeHarbour VPN . 156 Parameter Descriptions . 160 Stateful Inspection . 164 Stateful Inspection Firewall installation procedure . 164 Exposed Addresses . 165 Stateful Inspection Options. 168 Open Ports in Default Stateful Inspection Installation . 169
. 170 General firewall terms. 170 Basic IP packet components . 170 Basic protocol types . 171 Firewall design rules . 172 Firewall Logic. 172 Implied rules . 173 Example filter set page . 174 Filter basics. 175 Example network . 175 Example filters . 176 Example 1 . 176 Example 2 . 176 Example 3 . 176 Example 4 . 177 Example 5 . 177 Packet Filter . 178 Whats a filter and whats a filter set? . 179 How filter sets work. 179 Filter priority. 180 How individual filters work . 180 A filtering rule. 181 Parts of a filter . 181 Port numbers . 182 6 Table of Contents Working with IP Filters and Filter Sets Associating a Filter Set with an Interface Policy-based Routing using Filtersets Port number comparisons . 182 Other filter attributes. 183 Putting the parts together. 183 Filtering example #1 . 184 Filtering example #2 . 186 Design guidelines . 187 An approach to using filters . 187
. 188 Adding a filter set. 188 Adding filters to a filter set . 189 Viewing filters . 193 Modifying filters . 194 Deleting filters. 194 Moving filters . 194 Deleting a filter set. 194
. 194
. 197 TOS field matching . 197 Security Log. 200 Using the Security Monitoring Log . 200 Timestamp Background . 202
. 203 Install Software . 204 Updating Your Gateways Netopia Firmware Version . 204 Step 1: Required Files. 205 Step 2: Netopia firmware Image File . 205 Install Key . 209 Use Netopia Software Feature Keys . 209 Obtaining Software Feature Keys . 209 Procedure - Install a New Feature Key File . 209 To check your installed features: . 211 Install Certificate . 213 Install CHAPTER 4 Basic Troubleshooting
. 215 Status Indicator Lights
. 216 LED Function Summary Matrix . 225
. 228 Factory Reset Switch 7 Table of Contents CHAPTER 5 Advanced Troubleshooting
. 231 Home Page. 232 Expert Mode . 234 System Status. 235 Ports: Ethernet . 236 Ports: DSL . 237 IP: Interfaces. 238 DSL: Circuit Configuration . 239 System Log: Entire . 240 Diagnostics . 241 Network Tools. 242 CHAPTER 6 Command Line Interface
. 247 SHELL Commands Using the CLI Help Facility About SHELL Commands Overview . 248 Starting and Ending a CLI Session . 250 Logging In. 250 Ending a CLI Session . 251 Saving Settings. 251
. 251
. 251 SHELL Prompt . 251 SHELL Command Shortcuts. 252
. 252 Common Commands . 252 WAN Commands . 263
. 265 CONFIG Mode Prompt . 265 Navigating the CONFIG Hierarchy . 265 Entering Commands in CONFIG Mode . 266 Guidelines: CONFIG Commands . 267 Displaying Current Gateway Settings. 267 Step Mode: A CLI Configuration Technique . 267 Validating Your Configuration . 268
. 269 Remote ATA Configuration Commands . 269 DSL Commands . 272 ATM Settings . 272 Bridging Settings. 274 About CONFIG Commands CONFIG Commands 8 Table of Contents Common Commands . 274 DHCP Settings . 275 Common Commands . 275 DHCP Option Filtering . 277 Example . 278 DMT Settings. 279 DSL Commands . 279 Domain Name System Settings. 280 Common Commands . 280 Dynamic DNS Settings. 280 IGMP Settings . 281 IP Settings . 284 Common Settings. 284 ARP Timeout Settings . 284 DSL Settings . 284 Ethernet LAN Settings . 287 Additional subnets . 288 Default IP Gateway Settings . 289 IP-over-PPP Settings . 289 Static ARP Settings . 293 IGMP Forwarding . 293 IPsec Passthrough . 293 IP Prioritization . 294 Differentiated Services (DiffServ) . 294 Packet Mapping Configuration . 296 Queue Configuration . 298 Basic Queue. 299 Weighted Fair Queue . 300 Priority Queue . 301 Funnel Queue. 302 Interface Queue Assignment . 302 SIP Passthrough . 303 Static Route Settings . 303 IPMaps Settings . 305 Network Address Translation (NAT) Default Settings . 305 Network Address Translation (NAT) Pinhole Settings . 306 PPPoE /PPPoA Settings . 307 Configuring Basic PPP Settings . 307 Configuring Port Authentication . 309 PPPoE with IPoE Settings. 311 Ethernet WAN platforms. 311 ADSL platforms . 312 Ethernet Port Settings . 314 Command Line Interface Preference Settings . 314 9 Table of Contents Port Renumbering Settings . 315 Security Settings. 316 Firewall Settings (for BreakWater Firewall) . 316 SafeHarbour IPSec Settings . 316 Internet Key Exchange (IKE) Settings. 321 Stateful Inspection. 322 Example: . 323 Packet Filtering Settings . 324 Example: . 327 SNMP Settings . 328 SNMP Notify Type Settings . 329 System Settings . 329 Syslog . 333 Default syslog installation procedure. 334 Wireless Settings (supported models) . 336 Wireless Multi-media (WMM) Settings . 340 Wireless Privacy Settings . 343 Wireless MAC Address Authorization Settings . 345 RADIUS Server Settings . 345 VLAN Settings . 346 Example: . 347 UPnP settings . 348 DSL Forum settings. 348 TR-064 . 348 TR-069 . 349 CHAPTER 7 Glossary
. 351
-----A----- . 351
-----B----- . 352
-----C----- . 353
-----D----- . 354
-----E----- . 356
-----F----- . 356
-----H----- . 357
-----I----- . 358
-----K----- . 359
-----L-----. 359
-----M----- . 359
-----N----- . 360
-----P----- . 361
-----Q----- . 362
-----R----- . 362 10 Table of Contents
-----S----- . 363
-----T----- . 365
-----U-----. 365
-----V----- . 366
-----W----- . 366
-----X----- . 367 CHAPTER 8 Technical Specifications and Safety Information
. 369 Description Agency approvals
. 369 Dimensions: . 369 Communications interfaces: . 369 Power requirements . 369 Environment . 369 Operating temperature: . 369 Storage temperature: . 369 Relative storage humidity: . 370 Software and protocols . 370 Software media: . 370 Routing: . 370 WAN support: . 370 Security: . 370 Management/configuration methods: . 370 Diagnostics: . 370
. 371 North America . 371 International . 371 Regulatory notices. 371 European Community. 371 Manufacturers Declaration of Conformance . 372 United States . 372 Service requirements . 372 Canada . 373 Declaration for Canadian users . 373 Caution . 373
. 374 Australian Safety Information . 374 Caution . 374 Caution . 374 Telecommunication installation cautions . 374
. 375 FCC Requirements . 375 Important Safety Instructions 47 CFR Part 68 Information 11 Table of Contents FCC Statements . 375
. 376 Electrical Safety Advisory CHAPTER 9 Overview of Major Capabilities
. 377 Security Management Wide Area Network Termination
. 378 PPPoE/PPPoA (Point-to-Point Protocol over Ethernet/ATM) . 378 Instant-On PPP. 378 Simplified Local Area Network Setup . 379 DHCP (Dynamic Host Configuration Protocol) Server . 379 DNS Proxy . 379
. 380 Embedded Web Server . 380 Diagnostics . 380
. 381 Remote Access Control . 381 Password Protection . 381 Network Address Translation (NAT) . 381 Netopia Advanced Features for NAT . 383 Internal Servers . 383 Pinholes. 383 Default Server . 384 Combination NAT Bypass Configuration. 384 IP-Passthrough . 385 VPN IPSec Pass Through . 385 VPN IPSec Tunnel Termination. 386 Stateful Inspection Firewall . 386 SSL Certificate Support. 386 VLANs . 386 Index . 389 12 Whats New in 7.7 CHAPTER 1 Introduction Whats New in 7.7 New in Netopia Firmware Version 7.7 are the following features:
Internet Group Management Protocol (IGMP) Version 3 support. See IGMP (Internet Group Management Protocol) on page 112. TR-101 Support:
Concurrent support for PPPoE and IPoE connections on the WAN. See WAN on page 73. Multiple LAN IP Subnet support. See LAN on page 51. Additional DHCP range support. These ranges are associated with the additional LAN subnets on a 1-to-1 basis. DHCP option ltering support. Allows DHCP option data to be used to determine the desired DHCP address range. See DHCP Option Filtering on page 277. Support for additional WAN settings to control multicast forwarding as well as if See Advanced: on page 76. Support for unnumbered interfaces. For IP interfaces, this allows the address to be set to PPPoE/DHCP Autosensing. See WAN on page 73. Wireless Multimedia Mode (WMM) support. See WiFi Multimedia on page 67. Support of VLAN ID 0 on the Ethernet WAN and support for setting p-bits on a segment/
port basis. See VLAN on page 121 and CLI VLAN Settings on page 346. Firewall: ClearSailing is automatically enabled on all 2200-Series ADSL2+ platforms.
(Explicit exceptions: bonded and VDSL2, 3341, and 3387WG.) See Firewall on page 149. and the DHCP client also to be disabled. See page 79. is used as the source address for IGMP packets. 0.0.0.0 0 13 TR-069 Remote device management is automatically enabled by default for 2200-
Series Gateways. (Explicit exceptions: bonded and VDSL2, 3341, 3387WG). See TR-
069 on page 349. Corresponding commands have been added to the Command Line Interface (CLI). See Command Line Interface on page 247. Reset WAN port counter and CLI command to display individual Ethernet port statistics. See reset enet [ all ] on page 257 and show enet [ all ] on page 259. CLI for Netopia ATA Remote Management. See Remote ATA Conguration Commands on page 269. Provide Bandwidth Management using Weighted Fair Queueing for VDSL2 Platforms. See Queue Conguration on page 298. 14 About Netopia Documentation About Netopia Documentation NOTE:
This guide describes the wide variety of features and functionality of the Neto-
pia Gateway, when used in Router mode. The Netopia Gateway may also be delivered in Bridge mode. In Bridge mode, the Gateway acts as a pass-through device and allows the workstations on your LAN to have public addresses directly on the Internet. Netopia, Inc. provides a suite of technical information for its 2200- and 3300-series family of intelligent enterprise and consumer Gateways. It consists of:
Software User Guide Dedicated Quickstart guides Specic White Papers The documents are available in electronic form as Portable Document Format (PDF) les. They are viewed (and printed) from Adobe Acrobat Reader, Exchange, or any other applica-
tion that supports PDF les. They are downloadable from Netopias website:
http://www.netopia.com/
Intended Audience This guide is targeted primarily to residential service subscribers. Expert Mode sections may also be of use to the support staffs of broadband service pro-
viders and advanced residential service subscribers. See Expert Mode on page 41. 15 Documentation Conventions General This manual uses the following conventions to present information:
Convention (Typeface) Description bold italic monospaced bold italic sans serif terminal bold terminal Italic Menu commands Web GUI page links and button names Computer display text User-entered text Italic type indicates the complete titles of manuals. Internal Web Interface Convention (Graphics) Description blue rectangle or line Denotes an excerpt from a Web page or the visual truncation of a Web page Denotes an area of emphasis on a Web page solid rounded rectangle with an arrow Command Line Interface Syntax conventions for the Netopia Gateway command line interface are as follows:
Convention straight ([ ]) brackets in cmd line Description Optional command arguments 16 Documentation Conventions curly ({ }) brackets, with values sep-
arated with vertical bars (|). bold terminal type face italic terminal type face Alternative values for an argument are pre-
sented in curly ({ }) brackets, with values separated with vertical bars (|). User-entered text Variables for which you supply your own val-
ues 17 Organization This guide consists of nine chapters, including a glossary, and an index. It is organized as follows:
Chapter 1, Introduction Describes the Netopia document suite, the purpose of, the audience for, and structure of this guide. It gives a table of conventions. Chapter 2, Basic Mode Setup Describes how to get up and running with your Netopia Gateway. Chapter 3, Expert Mode Focuses on the Expert Mode Web-based user inter-
face for advanced users. It is organized in the same way as the Web UI is organized. As you go through each section, functions and procedures are discussed in detail. Chapter 4, Basic Troubleshooting Gives some simple suggestions for trouble-
shooting problems with your Gateways initial conguration. Chapter 5, Advanced Troubleshooting Gives suggestions and descriptions of expert tools to use to troubleshoot your Gateways conguration. Chapter 6, Command Line Interface Describes all the current text-based com-
mands for both the SHELL and CONFIG modes. A summary table and individual com-
mand examples for each mode is provided. Chapter 7, Glossary Chapter 8, Technical Specications and Safety Information Chapter 9, Overview of Major Capabilities Presents a product description sum-
mary. Index A Word About Example Screens This manual contains many example screen illustrations. Since Netopia 2200- and 3300 Series Gateways offer a wide variety of features and functionality, the example screens shown may not appear exactly the same for your particular Gateway or setup as they appear in this manual. The example screens are for illustrative and explanatory purposes, and should not be construed to represent your own unique environment. 18 Description CHAPTER 8 Technical Specifications and Safety Information Description Dimensions:
Smart Modems: 13.5 cm (w) x 13.5 cm (d) x 3.5 cm (h); 5.25 (w) x 5.25 (d) x 1.375 (h) Wireless Models: 19.5 cm (w) x 17.0 cm (d) x 4.0 cm (h); 7.6 (w) x 6.75 (d) x 1.5 (h) 3342/3342N/3352/3352N: 8.5 cm (w) x 4.5 cm (d) x 2 cm (h); 3.375 (w) x 1.75 (d) x .875 (h) 2200-Series Modems: 1.06"(2.69 cm) H, 4.36" (11.07 cm) W, 5.71"(14.50 cm) L 2200-Series Wireless Models: 1.2"(3.0cm) H, 8.7" (22.0 cm) W, 5.2"(13.2cm) L Communications interfaces: The Netopia Gateways have an RJ-11 jack for DSL line connections or an RJ-45 jack for cable/DSL modem connections and 1 or 4port 10/100Base-T Ethernet switch for your LAN connections. Some models have a USB port that can be used to connect to your PC; in some cases, the USB port also serves as the power source. Some models contain an 802.11b or 802.11g wireless LAN transmitter. Power requirements 12 VDC input USB-powered models only: For Use with Listed I.T.E. Only Environment Operating temperature: 0 to +40 C Storage temperature: 0 to +70 C 369 Relative storage humidity: 20 to 80% noncondensing Software and protocols Software media: Software preloaded on internal ash memory; eld upgrades done via download to internal ash memory via TFTP or web upload. (does not apply to 3342/3352) Routing: TCP/IP Internet Protocol Suite, RIP WAN support: PPPoA, PPPoE, DHCP, static IP address Security: PAP, CHAP, UI password security, IPsec, SSL certicate Management/conguration methods: HTTP (Web server), Telnet, SNMP, TR-069 DSL Forum CPE WAN Management Protocol Diagnostics: Ping, event logging, routing table displays, statistics counters, web-based management, traceroute, nslookup, and diagnostic commands. 370 Agency approvals Agency approvals North America Safety Approvals:
United States UL 60950, Third Edition Canada CSA: CAN/CSA-C22.2 No. 60950-00 EMC:
United States FCC Part 15 Class B Canada ICES-003 Telecom:
United States 47 CFR Part 68 Canada CS-03 International Safety Approvals:
Low Voltage (European directive) 73/23 EN60950 (Europe) EMI Compatibility:
89/336/EEC (European directive) EN55022:1994 CISPR22 Class B EN300 386 V1.2.1 (non-wireless products) EN 301-489 (wireless products) Regulatory notices European Community. This Netopia product conforms to the European Community CE Mark standard for the design and manufacturing of information technology equipment. This standard covers a broad area of product design, including RF emissions and immunity from electrical disturbances. 371 The Netopia Firmware Version 7.7 complies with the following EU directives:
Low Voltage, 73/23/EEC EMC Compatibility, 89/336/EEC, conforming to EN 55 022 Manufacturers Declaration of Conformance Warnings:
This is a Class B product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures. Ade-
quate measures include increasing the physical distance between this product and other electrical devices. Changes or modications to this unit not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. United States. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio TV technician for help. Service requirements. In the event of equipment malfunction, all repairs should be performed by our Company or an authorized agent. Under FCC rules, no customer is authorized to repair this equipment. This restriction applies regardless of whether the equipment is in or our of warranty. It is the responsibility of users requiring service to report the need for service to our Company or to one of our authorized agents. Service can be obtained at Netopia, Inc., 6001 Shellmound Street, Emeryville, California, 94608. Telephone: 510-597-5400. 372 Manufacturers Declaration of Conformance Important This product was tested for FCC compliance under conditions that included the use of shielded cables and connectors between system components. Changes or modica-
tions to this product not authorized by the manufacturer could void your authority to operate the equipment. Canada. This Class B digital apparatus meets all requirements of the Canadian Interference -
Causing Equipment Regulations. Cet appareil numrique de la classe B respecte toutes les exigences du Rglement sur le matriel brouilleur du Canada. Declaration for Canadian users NOTICE: The Canadian Industry Canada label identies certied equipment. This certication means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Department does not guarantee the equipment will operate to the users satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the companys inside wiring associated with a single line individual service may be extended by means of a certied connector assembly (telephone extension cord). The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to the certied equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. Caution Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate. The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5. 373 Important Safety Instructions Australian Safety Information The following safety information is provided in conformance with Australian safety requirements:
Caution DO NOT USE BEFORE READING THE INSTRUCTIONS: Do not connect the Ethernet ports to a carrier or carriage service providers telecommunications network or facility unless: a) you have the written consent of the network or facility manager, or b) the connection is in accordance with a connection permit or connection rules. Connection of the Ethernet ports may cause a hazard or damage to the telecommunication network or facility, or persons, with consequential liability for substantial compensation. Caution The direct plug-in power supply serves as the main power disconnect; locate the direct plug-in power supply near the product for easy access. For use only with CSA Certied Class 2 power supply, rated 12VDC. Telecommunication installation cautions Never install telephone wiring during a lightning storm. Never install telephone jacks in wet locations unless the jack is specically designed for wet locations. Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the network interface. Use caution when installing or modifying telephone lines. Avoid using a telephone (other than a cordless type) during an electrical storm. There may be a remote risk of electric shock from lightning. Do not use the telephone to report a gas leak in the vicinity of the leak. 374 47 CFR Part 68 Information 47 CFR Part 68 Information FCC Requirements 1. 2. 3. 4. The Federal Communications Commission (FCC) has established Rules which permit this device to be directly connected to the telephone network. Standardized jacks are used for these connections. This equipment should not be used on party lines or coin phones. If this device is malfunctioning, it may also be causing harm to the telephone network; this device should be disconnected until the source of the problem can be determined and until repair has been made. If this is not done, the telephone company may temporarily disconnect service. The telephone company may make changes in its technical operations and procedures; if such changes affect the compatibility or use of this device, the telephone company is required to give adequate notice of the changes. You will be advised of your right to le a complaint with the FCC. If the telephone company requests information on what equipment is connected to their lines, inform them of:
a. The telephone number to which this unit is connected. b. The ringer equivalence number. [0.XB]
c. The USOC jack required. [RJ11C]
d. The FCC Registration Number. [XXXUSA-XXXXX-XX-E]
Items (b) and (d) are indicated on the label. The Ringer Equivalence Number (REN) is used to determine how many devices can be connected to your telephone line. In most areas, the sum of the REN's of all devices on any one line should not exceed ve (5.0). If too many devices are attached, they may not ring properly. FCC Statements a) This equipment complies with Part 68 of the FCC rules and the requirements adopted by the ACTA. On the bottom of this equipment is a label that contains, among other information, a product identier in the format US:AAAEQ##TXXXX. If requested, this number must be provided to the telephone company. b) List all applicable certication jack Universal Service Order Codes (USOC) for the equipment:
RJ11. c) A plug and jack used to connect this equipment to the premises wiring and telephone network must comply with the applicable FCC Part 68 rules and requirements adopted by the ACTA. A compliant telephone cord and modular plug is provided with this product. It is designed to be connected to a compatible modular jack that is also compliant. See installation instructions for details. 375 d) The REN is used to determine the number of devices that may be connected to a telephone line. Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming call. In most but not all areas, the sum of RENs should not exceed ve (5.0). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. For products approved after July 23, 2002, the REN for this product is part of the product identier that has the format US:AAAEQ##TXXXX. The digits represented by ## are the REN without a decimal point (e.g., 03 is a REN of 0.3). For earlier products, the REN is separately shown on the label. e) If this equipment, the Netopia 3300- or 2200-Series router, causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. But if advance notice isnt practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right to le a complaint with the FCC if you believe it is necessary. f) The telephone company may make changes in its facilities, equipment, operations or procedures that could affect the operation of the equipment. If this happens the telephone company will provide advance notice in order for you to make necessary modications to maintain uninterrupted service. g) If trouble is experienced with this equipment, the Netopia 3300- or 2200-Series router, for repair or warranty information, please contact:
Netopia Technical Support 510-597-5400 www.netopia.com. If the equipment is causing harm to the telephone network, the telephone company may request that you disconnect the equipment until the problem is resolved. h) This equipment not intended to be repaired by the end user. In case of any problems, please refer to the troubleshooting section of the Product User Manual before calling Netopia Technical Support. i) Connection to party line service is subject to state tariffs. Contact the state public utility commission, public service commission or corporation commission for information. j) If your home has specially wired alarm equipment connected to the telephone line, ensure the installation of this Netopia 3300- or 2200-Series router does not disable your alarm equipment. If you have questions about what will disable alarm equipment, consult your telephone company or qualied installer. RF Exposure Statement:
NOTE: Installation of the wireless models must maintain at least 20 cm between the wireless router and any body part of the user to be in compliance with FCC RF exposure guidelines. Electrical Safety Advisory Telephone companies report that electrical surges, typically lightning transients, are very destructive to customer terminal equipment connected to AC power sources. This has been identied as a major nationwide problem. Therefore it is advised that this equipment be connected to AC power through the use of a surge arrestor or similar protection device. 376 CHAPTER 9 Overview of Major Capabilities The Netopia Gateway offers simplied setup and management features as well as advanced broadband router capabilities. The following are some of the main features of the Netopia Gateway:
Wide Area Network Termination on page 378 The Gateway combines an ADSL modem with an Internet router. It translates protocols used on the Internet to protocols used by home personal computers and eliminates the need for special desktop software (i.e. PPPoE). Simplied Local Area Network Setup on page 379 Built-in DHCP and DNS proxy features minimize or eliminate the need to program any network conguration into your home personal computer. Management on page 380 A Web server built into the Netopia Operating System makes setup and maintenance easy using standard browsers. Diagnostic tools facilitate troubleshooting. Security on page 381 Network Address Translation (NAT), password protection, Stateful Inspection rewall and other built-in security features prevent unauthorized remote access to your network. Pinholes, default server, and other features permit access to computers on your home network that you can specify. 377 Wide Area Network Termination PPPoE/PPPoA (Point-to-Point Protocol over Ethernet/ATM) The PPPoE specication, incorporating the PPP and Ethernet standards, allows your com-
puter(s) to connect to your Service Providers network through your Ethernet WAN connec-
tion. The Netopia-series Gateway supports PPPoE, eliminating the need to install PPPoE client software on any LAN computers. Service Providers may require the use of PPP authentication protocols such as Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP). CHAP and PAP use a username and password pair to authenticate users with a PPP server. A CHAP authentication process works as follows:
1. The password is used to scramble a challenge string. 2. The password is a shared secret, known by both peers. 3. The unit sends the scrambled challenge back to the peer. PAP, a less robust method of authentication, sends a username and password to a PPP server to be authenticated. PAPs username and password pair are not encrypted, and are therefore sent unscrambled. Instant-On PPP You can congure your Gateway for one of two types of Internet connections:
Always On Instant On These selections provide either an uninterrupted Internet connection or an as-needed con-
nection. While an Always On connection is convenient, it does leave your network permanently con-
nected to the Internet, and therefore potentially vulnerable to attacks. Netopia's Instant On technology furnishes almost all the benets of an Always-On connec-
tion while providing two additional security benets:
Your network cannot be attacked when it is not connected. 378 Simplified Local Area Network Setup Your network may change address with each connection making it more difcult to attack. When you congure Instant On access, you can also congure an idle time-out value. Your Gateway monitors trafc over the Internet link and when there has been no trafc for the congured number of seconds, it disconnects the link. When new trafc that is destined for the Internet arrives at the Gateway, the Gateway will instantly re-establish the link. Your service provider may be using a system that assigns the Internet address of your Gateway out of a pool of many possible Internet addresses. The address assigned varies with each connection attempt, which makes your network a moving target for any attacker. Simplied Local Area Network Setup DHCP (Dynamic Host Conguration Protocol) Server DHCP Server functionality enables the Gateway to assign to your LAN computer(s) a pri-
vate IP address and other parameters that allow network communication. The default DHCP Server conguration of the Gateway supports up to 253 LAN IP addresses. This feature simplies network administration because the Gateway maintains a list of IP address assignments. Additional computers can be added to your LAN without the hassle of conguring an IP address. DNS Proxy Domain Name System (DNS) provides end users with the ability to look for devices or web sites by typing their names, rather than IP addresses. For web surfers, this technology allows you to enter the URL (Universal Resource Locator) as text to surf to a desired web-
site. The Netopia DNS Proxy feature allows the LAN-side IP address of the Gateway to be used for proxying DNS requests from hosts on the LAN to the DNS Servers congured in the gateway. This is accomplished by having the Gateway's LAN address handed out as the DNS Server to the DHCP clients on the LAN. 379 NOTE:
The Netopia DNS Proxy only proxies UDP DNS queries, not TCP DNS queries. Management Embedded Web Server There is no specialized software to install on your PC to congure, manage, or maintain your Netopia Gateway. Web pages embedded in the operating system provide access to the following Gateway operations:
Setup System and security logs Diagnostics functions Once you have removed your Netopia Gateway from its packing container and powered the unit up, use any LAN attached PC or workstation running a common web browser applica-
tion to congure and monitor the Gateway. Diagnostics In addition to the Gateways visual LED indicator lights, you can run an extensive set of diagnostic tools from your Web browser. Two of the facilities are:
Automated Multi-Layer Test The Run Diagnostics link initiates a sequence of tests. They examine the entire functionality of the Gateway, from the physical connections to the data trafc. Network Test Tools Three test tools to determine network reachability are available:
Ping - tests the reachability of a particular network destination by sending an ICMP echo request and waiting for a reply. NSLookup - converts a domain name to its IP address and vice versa. 380 Security TraceRoute - displays the path to a destination by showing the number of hops and the router addresses of these hops. The system log also provides diagnostic information. NOTE:
Your Service Provider may request information that you acquire from these var-
ious diagnostic tools. Individual tests may be performed at the command line.
(See Command Line Interface on page 247.). Security Remote Access Control You can determine whether or not an administrator or other authorized person has access to conguring your Gateway. This access can be turned on or off in the Web interface. Password Protection Access to your Netopia device can be controlled through two access control accounts, Admin or User. The Admin, or administrative user, performs all conguration, management or mainte-
nance operations on the Gateway. The User account provides monitor capability only. A user may NOT change the conguration, perform upgrades or invoke maintenance functions. Account usernames can now be changed for the Admin and User accounts. Network Address Translation (NAT) The Netopia Gateway Network Address Translation (NAT) security feature lets you conceal the topology of a hard-wired Ethernet or wireless network connected to its LAN interface 381 from routers on networks connected to its WAN interface. In other words, the end com-
puter stations on your LAN are invisible from the Internet. Only a single WAN IP address is required to provide this security support for your entire LAN. LAN sites that communicate through an Internet Service Provider typically enable NAT, since they usually purchase only one IP address from the ISP. When NAT is ON, the Netopia Gateway proxies for the end computer stations on your network by pretending to be the originating host for network communications from non-
originating networks. The WAN interface address is the only IP address exposed. The Netopia Gateway tracks which local hosts are communicating with which remote hosts. It routes packets received from remote networks to the correct computer on the LAN (Ethernet) interface. When NAT is OFF, a Netopia Gateway acts as a traditional TCP/IP router, all LAN com-
puters/devices are exposed to the Internet. A diagram of a typical NAT-enabled LAN follows:
Internet Netopia Gateway WAN Ethernet Interface NAT LAN Ethernet Interface NAT-protected LAN stations Embedded Admin Services:
HTTP-Web Server and Telnet Server Port 382 Security NOTE:
1. The default setting for NAT is ON. 2. Netopia uses Port Address Translation (PAT) to implement the NAT facility. 3. NAT Pinhole trafc (discussed below) is always initiated from the WAN side. Netopia Advanced Features for NAT Using the NAT facility provides effective LAN security. However, there are user applications that require methods to selectively by-pass this security function for certain types of Inter-
net trafc. Netopia Gateways provide special pinhole conguration rules that enable users to estab-
lish NAT-protected LAN layouts that still provide exible by-pass capabilities. Some of these rules require coordination with the units embedded administration ser-
vices: the internal Web (HTTP) Port (TCP 80) and the internal Telnet Server Port (TCP 23). Internal Servers The internal servers are the embedded Web and Telnet servers of the Gateway. You would change the internal server ports for Web and Telnet of the Gateway if you wanted to have these services on the LAN using pinholes or the Default server. Pinholes This feature allows you to:
Transparently route selected types of network trafc using the port forwarding facility. FTP requests or HTTP (Web) connections are directed to a specic host on your LAN. Setup multiple pinhole paths. Up to 32 paths are supported Identify the type(s) of trafc you want to redirect by port number. 383 Common TCP/IP protocols and ports are:
FTP (TCP 21) SMTP (TCP 25) SNMP (TCP 161, UDP 161) telnet (TCP 23) HTTP (TCP 80) See page 90 for How To instructions. Default Server This feature allows you to:
Direct your Gateway to forward all externally initiated IP trafc (TCP and UDP protocols only) to a default host on the LAN. Enable it for certain situations:
Where you cannot anticipate what port number or packet protocol an in-bound applica-
tion might use. For example, some network games select arbitrary port numbers when a connection is opened. When you want all unsolicited trafc to go to a specic LAN host. Combination NAT Bypass Conguration Specic pinholes and Default Server settings, each directed to different LAN devices, can be used together. WARNING:
Creating a pinhole or enabling a Default Server allows inbound access to the specied LAN station. Contact your Network Administrator for LAN security questions. 384 Security IP-Passthrough Netopia OS now offers an IP passthrough feature. The IP passthrough feature allows a sin-
gle PC on the LAN to have the Gateways public address assigned to it. It also provides PAT
(NAPT) via the same public IP address for all other hosts on the private LAN subnet. VPN IPSec Pass Through This Netopia service supports your independent VPN client software in a transparent man-
ner. Netopia has implemented an Application Layer Gateway (ALG) to support multiple PCs running IP Security protocols. This feature has three elements:
1. On power up or reset, the address mapping function (NAT) of the Gate-
ways WAN conguration is turned on by default. 2. When you use your third-party VPN application, the Gateway recognizes the trafc from your client and your unit. It allows the packets to pass through the NAT protection layer via the encrypted IPSec tunnel. 3. The encrypted IPSec tunnel is established through the Gateway. A typical VPN IPSec Tunnel pass through is diagrammed below:
Netopia Gateway 385 NOTE:
Typically, no special conguration is necessary to use the IPSec pass through feature. In the diagram, VPN PC clients are shown behind the Netopia Gateway and the secure server is at Corporate Headquarters across the WAN. You cannot have your secure server behind the Netopia Gateway. When multiple PCs are starting IPSec sessions, they must be started one at a time to allow the associations to be created and mapped. VPN IPSec Tunnel Termination This Netopia service supports termination of VPN IPsec tunnels at the Gateway. This per-
mits tunnelling from the Gateway without the use of third-party VPN client software on your client PCs. Stateful Inspection Firewall Stateful inspection is a security feature that prevents unsolicited inbound access when NAT is disabled. You can congure UDP and TCP no-activity periods that will also apply to NAT time-outs if stateful inspection is enabled on the interface. Technical details are discussed in Expert Mode on page 41. SSL Certicate Support On selected models, you can also install a Secure Sockets Layer (SSL V3.0) certicate from a trusted Certication Authority (CA) for authentication purposes. If this feature is available on your Gateway, an additional link will appear in the Install page. Netopia Firmware Version 7.7 uses SSL certicates for TR-069 support. See Install Certicate on page 213. VLANs Netopia's VGx technology allows a single Netopia VGx-enabled broadband gateway to act as separate virtual gateways, treating each individual service as a single service "chan-
nel." The VGx-enabled gateway applies specic policies, routing, and prioritization parame-
ters to each service channel, ensuring delivery of that service to the appropriate peripheral 386 Security device with the requisite level of QoS and correct feature sets making it ideal for deliv-
ery of triple play voice, video, and data services. VGx was developed to ensure that subscribers receive the quality of voice, video, and data services they expect to prevent a large data download from causing jittery video or poor voice quality. VGx achieves this goal by providing superior service segmentation and QoS features obtained by mapping multiple local virtual local area networks (VLANs) to one or more specic permanent virtual circuits (PVCs) for DSL, or wide area network VLANs for a ber network. Trafc prioritization is determined through the Institute of Electrical Engineering (IEEE) standard 802.1p, which species QoS algorithms to prioritize trafc based on protocol and source. This insures that each service receives the QoS treatment it requires; for example, video is free from latency, VoIP service is prioritized to insure aural quality, and data is securely and efciently routed. 387 388 Index Symbols
!! command 252 A Access the GUI 41 Address resolution table 260 Administrative restrictions 290 Administrator password 41, 147, 250 Arguments, CLI 266 ARP Command 252, 263 ATA configuration 269 Authentication 309 Authentication trap 328 auto-channel mode 336 AutoChannel Setting 61, 336 B Bridging 274 Broadcast address 284, 287 C CLI 247
!! command 252 Arguments 266 Command shortcuts 252 Command truncation 265 Configuration mode 265 Keywords 266 Navigating 265 Prompt 251, 265 Restart command 252 SHELL mode 251 View command 267 Command ARP 252, 263 Ping 255 Telnet 262 Command line interface (see CLI) Community 328 Compression, protocol 308 Concurrent Routing 119, 274 CONFIG Bridging/
Command List 249 Configuration mode 265 D D. port 184 Default IP address 41 denial of service 364 designing a new filter set 187 DHCP 275 DHCP filtering 277 DHCP lease table 257 Diagnostic log 257, 261 Level 330 Diagnostics 380 DNS 280 DNS Proxy 379 Documentation conventions 16 389 Name Domain
(DNS) 280 DSL Forum settings 348 System E Echo request 308 echo-period 308 Embedded Web Server 380 Ethernet address 274 Ethernet statistics 257 F Feature Keys Obtaining 209 filter parts 181 parts of 181 filter priority 180 filter set adding 188 display 183 filter sets adding 188 defined 179 deleting 194 disadvantages 178 using 188 filtering example #1 184 filters actions a filter can take 180 adding to a filter set 190 defined 179 deleting 194 390 input 189 modifying 194 output 189 using 187, 188 viewing 193 firewall 261 FTP 305 H Hardware address 274 hijacking 364 Hop count 304 HTTP traffic 315 I ICMP Echo 255 IGMP Snooping 113, 281 Install 203 Install Certificate 213 IP address 284, 287 Default 41 IP interfaces 260 IP routes 261 IPMap table 261 IPSec Tunnel 260 K Keywords, CLI 266 L LAN Table 261 latency 197 Host Discovery LCP echo request 308 Link Install Software 203 Quickstart 49, 51, 73 Local Area Network 379 Location, SNMP 328 Log 261 Logging in 250 lost echoes 308 M Magic number 308 Memory 261 Metric 304 multi-cast 312 Multiple SSIDs 65 multiple subnets 53 Multiple Wireless SSIDs Wireless 65, 337 forwarding 285, N Nameserver 280 NAT 291, 305, 381 Traffic rules 101 NAT Default Server 384 Netmask 287 Network Translation 381 Network Test Tools 380 NSLookup 380 Address O set upnp option 348 Operating Mode Wireless 60, 337 P PAP 378 Password 147 Administrator 41, 250 User 41, 147, 250 persistent-log 330 Ping 380 Ping command 255 Pinholes 305, 383 Planning 90 147, policy-based routing 197 Port authentication 309 port number comparisons 182 port numbers 182 Port renumbering 315 PPP 264 PPPoE 378 Primary nameserver 280 Prompt, CLI 251, 265 Protocol compression 308 Q qos max-burst-size 273 qos peak-cell-rate 272 qos service-class 272 qos sustained-cell-rate 273 quality of service 181, 197 391 R Restart 258 Restart command 252 Restart timer 309 Restrictions 290 RIP 286, 288 Routing Information Protocol
(RIP) 286, 288 S Secondary nameserver 280 Secure Sockets Layer 213 Security filters 178 ip static-routes command 272, Security log 201 Set bncp 273, 274 Set bridge commands 274 Set DMT commands 279 Set dns commands 280 Set commands 303 Set ppp module port authenti-
cation command 310 Set command 314 Set command 314 set security state-insp 322 Set servers command 315 Set servers command 315 Set snmp sysgroup location command 328 preference preference telnet-tcp verbose more name system heartbeat Set snmp traps authentifica-
tion-traps ip-address command 328 Set system diagnostic-level command 330 Set system command 331 Set command 329 Set command 332 Set system command 331 set system syslog 333 Set command 336 Set wireless user-auth option command 345 SHELL password wireless system option NTP Command Shortcuts 252 Commands 251 Prompt 251 SHELL level 265 SHELL mode 251 show config 258 Show ppp 264 Simple Network Management Protocol (SNMP) 328 SMTP 305 SNMP 109, 305, 328 SNMP settings 329 src. port 184 Notify Type SSL certificates 213 392 view config 263 VLAN ID 124 VLAN Settings 346 VLANs 121 VPN IPSec Pass Through 385 IPSec Tunnel Termination 386 W Weighted Fair Queue 300 Wide Area Network 378 Wireless 56 Z Zero Touch 332 Stateful Inspection 164 stateful inspection 261 Static route 303 Step mode 267 Subnet mask 287 subnets multiple 53 Syslog 135 System contact, SNMP 328 System diagnostics 330 system idle-timeout 330 T Telnet 250, 305 Telnet command 262 Telnet traffic 315 TFTP 305 TFTP server 254 Toolbar 45 TOS bit 181, 197 TraceRoute 242, 381 Trap 328 Trivial Protocol 254 Truncation 265 File Transfer U UPnP 115 User name 250 User password 41, 147, 250 V set atm 272, 273 View command 267 393 394 Netopia 2200 and 3300 series by Netopia Netopia, Inc. 6001 Shellmound Street Emeryville, CA 94608 August 18, 2006
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2007-11-07 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2007-11-07
|
||||
1 | Applicant's complete, legal business name |
ARRIS
|
||||
1 | FCC Registration Number (FRN) |
0023147978
|
||||
1 | Physical Address |
2500 Walsh Ave.
|
||||
1 |
Santa Clara, California 95051
|
|||||
1 |
United States
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
T******@intertek.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
GZ5
|
||||
1 | Equipment Product Code |
3347
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
W******** W******
|
||||
1 | Title |
Hardware Engineer
|
||||
1 | Telephone Number |
(408)********
|
||||
1 | Fax Number |
(408)********
|
||||
1 |
w******@arris.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
Intetek Testing Services
|
||||
1 | Name |
D**** C****
|
||||
1 | Physical Address |
1365 Adams Court
|
||||
1 |
Menlo Park, 94025
|
|||||
1 |
United States
|
|||||
1 | Telephone Number |
650-4******** Extension:
|
||||
1 | Fax Number |
650-4********
|
||||
1 |
d******@intertek.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
Intertek Testing Services
|
||||
1 | Name |
D**** C******
|
||||
1 | Physical Address |
1365 Adams Court
|
||||
1 |
Menlo Park, 94025
|
|||||
1 |
United States
|
|||||
1 | Telephone Number |
650-4******** Extension:
|
||||
1 | Fax Number |
650-4********
|
||||
1 |
d******@intertek.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11b/g ADSL Router | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Output is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. This device must transmit with a source-based time-averaging duty factor not exceeding 40 %. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Intertek Testing Services NA Inc.
|
||||
1 | Name |
J**** Q********
|
||||
1 | Telephone Number |
949-4********
|
||||
1 | Fax Number |
650-4********
|
||||
1 |
j******@intertek.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 68 | 2412.00000000 | 2462.00000000 | 0.4000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC