User Manual for GRANDSTREAM models including: GCC601x-W Networking, GCC601x-W, Networking

Mokhtar

GCC601X(W) Networking - User Manual - ation Center


File Info : application/pdf, 57 Pages, 16.13MB

PDF preview unavailable. Download the PDF instead.

GCC601XW-Networking-User-Manual
Grandstream Networks, Inc.
GCC601x(W) Series Networking ­ User Manual

OVERVIEW
Overview Page
The overview page provides an overall view of the GCC601X(W)'s information presented in a Dashboard style for easy monitoring. Please refer to the figure and table below:

Overview Page

Network Connection
Network Traffic Alerts APP Traffic Statistics

Displays the current state of the network connection for the selected WAN port and shows the current upload and download speed. Note: the user can select the WAN port from the drop-down list.
Shows network traffic in real time. Note: the user can select the WAN port from the drop-down list or select All WAN ports.
Shows Alerts General, Important or Emergency with details and time.
Displays traffic statistics based on apps usage (%).

Overview page

Port Info
The Port Info page displays an overview of all ports status including the USB Port, Gigabits ports, and SFP ports, indicating the links up with a green color and links down with a grey color, furthermore, the user can click on the port icon to get more info about the select link, refer to the figure below:
Navigate to Overview  Port Info:

NETWORK SETTINGS

Port Info for GCC6010W

Port Configuration
To access port configuration, please access the user interface of the GCC601X(W) and then navigate to Network Settings  Port Configuration.
Port Status
On the top, you can find the status of all the ports.
Purple color: port speed is 2.5Gbps (works only with SFP ports and 2.5Gbps SFP module). Green color: port speed is 1Gbps. Light green color: port speed is 100Mbps/10Mbps. Grey color: link down. White color: port disabled. Internet icon: port connected to the internet (for WAN ports).

Port Configuration

Port configuration ­ part 1

Port configuration page allows the user to configure the settings related to all the ports; this includes the gigabit Ethernet ports as well as the SFP ports. The settings that can be edited include flow control, speed and duplex mode.

Notes:
SFP ports support 2.5G SFP module SFP ports do not support 2.5G auto-negotiation

When the half-duplex mode is selected, traffic control does not take effect When disabling the physical port, all port-based configurations do not take effect.

Port configuration ­ part 2

Port Port enabled Port Type Name Role
Speed/Duplex Flow Control

This field indicates the port number.
Toggle ON or OFF the port. Note: When set to disabled, this physical port is disabled and all port-based configurations do not take effect.
This field indicates the port type.  GE: Stands for Gigabit Ethernet  SFP: Small form-factor Pluggable
This indicates the port name.
This indicates the port role.  LAN  WAN
In this setting, the user can configure the duplex mode as well as the speed of the port. The duplex setting of the port can be set to: Half Duplex and Full Duplex. When the mode is set to Auto Negotiation, the GCC device will determine based on the settings negotiated with the device connected.
The user can enable or disable flow control using this option. Note: When the setting is set to Auto Negotiation, the GCC device will determine based on the settings negotiated with the device connected.

Port configuration ­ part 2 PoE Configuration The user can also control the power limit on each PoE port of the GCC601X(W).

Port configuration ­ PoE configuration

Port

This field indicates the port number.

Power Supply Mode Maximum Power Supply Priority

This option configures the power supply mode.
 Active PoE (802.3af/at)  48V Passive PoE  Off Note: When the 48V passive PoE mode is selected, the GCC601X(W) will always supply power. It is not safe for non-POE powered devices (PD) to access this port. Please ensure that the connected PD devices support 48V passive PoE.
Configures the maximum power supplied. Note: If the power supply mode is Active PoE (802.3af/at) or 48V passive PoE , ensure that the sum of the maximum power supplied to all ports is less than the total power limit.
Specify the priority of the port in terms of the power supply.
 High  Low
Port configuration ­ PoE configuration

WAN
The WAN ports can be connected to a DSL modem or a router. WAN port support also sets up static IPv4/IPv6 addresses and configures PPPoE.
On this page, the user can modify the setting for each WAN port and also can delete or even add another WAN, Adding a WAN port will reduce the LAN ports number. In the case where there is more than one WAN port, load balancing or backup (Failover) can be configured between multiple WAN ports.

Click on

WAN page to add another WAN port or click on the "edit icon" to edit the previously created ones.

Add or Edit WAN

Please refer to the following table for network configuration parameters on the WAN port.

Status WAN Name Port

Basic Information Click to enable or disable the WAN Enter a name for the WAN port Select from the drop-down list the port to be used as a WAN
IPv4 Settings

Connection Type

 Obtain IP automatically (DHCP): When selected, it will act as a DHCP client and acquire an IPv4 address automatically from the DHCP server.
 Enter IP Manually (Static IP): When selected, the user should set a static IPv4 address, IPv4 Subnet Mask, IPv4 Gateway and adding Additional IPv4 Addresses as well to communicate with the web interface, SSH, or other services running on the device.
 Internet Access with PPPoE account (PPPoE): When selected, the user should set the PPPoE account and password, PPPoE Keep alive interval, and Inter-Key Timeout (in seconds).
The default setting is "Obtain IP automatically (DHCP)".

Static DNS

Toggle ON or OFF to enable or disable static DNS

Preferred DNS Server

Enter the preferred DNS Server, ex: 8.8.8.8

Alternative DNS Server

Enter the altenative DNS Server, ex: 1.1.1.1

Maximum Transmission Unit (MTU)

Configures the maximum transmission unit allowed on the wan port.
 When using Ethernet, the valid range that can be set by the user is 576-1500 bytes. The default value is 1500. Please do not change the default value unless you have to.
 When using PPPoE, the valid range that can be set by the user is 576-1492 bytes. The default value is 1492. Please do not change the default value unless you have to.

Tracking IP Address 1

Configures tracking IP address of WAN port to determine whether the WAN port network is normal.

Tracking IP Address 2

Add another alternative address for Tracking IP Address

VLAN Tag

Toggle ON or OFF to enable or disable VLAN Tag

VLAN Tag ID

Enter the VLAN Tag ID with the priority Note: priority is 0~7 with 7 being the highest priority. Default is 0.

Bridge Mode

Toggle ON or OFF to enable or disable Bridge mode (Triple Play)

VLAN Tag ID / Port / Priority

Enter a VLAN Tag ID and the LAN ports to bridge with a priority from 0~7 with 7 being the highest priority. Default is 0 Note: Select the ports to bridge. Each port can be bridged by only one WAN.

Multiple Public IP Address

Toggle ON or OFF to enable or disable Multiple Public IP Address Note: Please use with Port Forward function, so that you can access to router via public IP address.

Public IP Address

Enter a public IP address Note: Click on "Plus" or "minus" icons to add or delete public IP addresses.

VPN

Toggle ON or OFF to enable or disable VPN

VPN Connection Type

 L2TP: Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by internet service providers (ISPs) to enable virtual private networks (VPNs).
 PPTP: Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IPbased data networks.

Username

Enter the username to authenticate into the VPN server.

Password

Enter the password to authenticate into the VPN server.

Server Address

Enter the IP address or the FQDN of the VPN server.

MPEE Encryption (if PPTP is selected)

When PPTP is chosen as the VPN Connection Type, the user can choose to toggle on or off the MPEE Encryption.

IP Type

 Dynamic IP: The IP will be assigned statically using DHCP.  Static IP: The IP will be assigned statically.

VPN Static DNS

Enable this option to use the statically assigned DNS server addresses.

Maximum Transmission Unit (MTU)

This configures the value of the maximum transmit unit. The valid range for this value is 576 - 1460. The default value is 1430. Note: Please do not change this value unless it's necessary.

IPv6 Settings

IPv6

Enable this option to use IPv6 on this specific WAN port.

Connection Type

 Obtain IP automatically (DHCPv6)  Enter the IP manually (static IPv6)

IPv6 Address

When the Connection Type is set to Static IP, the user can can enter the static IP address in this field. Note: This option appears only when the Connection Type is set to Static IPv6.

Prefix Length

Enter the prefix length. Note: This option appears only when the Connection Type is set to Static IPv6.

Default Gateway

Enter the IP address of the default gateway Note: This option appears only when the Connection Type is set to Static IPv6.

Preferred DNS Server

Enter the IP address of the preferred DNS server. Note: This option appears only when the Connection Type is set to Static IPv6.

Alternative DNS Server

Enter the IP address of the alternative DNS server Note: This option appears only when the Connection Type is set to Static IPv6.

Static DNS

Enable this option to enter statically assigned DNS.

Note: This option appears only when the Connection Type is set to DHCPv6.

IPv6 Relay to VLAN

Once enabled, relay IPv6 addresses to clients on the LAN side. Note: This function will take effect only "IPv6 Relay from WAN" is enabled on VLAN.
WAN Settings

Triple Play

Triple Play feature allows the user to benefit from a multi-service plan (depending on ISP provider), and with a single WAN connection each service e.g.: Internet, Voice (VoIP), and IPTV can be separated using VLANs and a specific port.

Navigate to Network Settings  WAN  Edit/Add WAN, then scroll down and search for Bridge Mode, please refer to the figure below:

Triple Play
LAN
To access the LAN configuration page, log in to the GCC601x(w) WebGUI and go to Network Settings  LAN. VLAN configuration such as adding VLANs or setting up a VLAN port can be found here on this page, as well as the ability to add Static IP Bindings, local DNS Records, and Bonjour Gateway.
LAN configuration
VLAN
GCC601X(W) integrates VLAN to enhance security and add more functionalities and features. VLAN tags can be used with SSIDs to separate them from the rest, also the user can allow these VLANs only on specific LANs for more control and isolation and they can be used as well with policy routing.
Add or Edit VLAN To add or edit a VLAN, Navigate to Network Settings  LAN. Click on "Add" button or click on "Edit" icon.

Add or Edit VLAN

VLAN ID

Enter a VLAN ID Note: VLAN ID range is from 3 to 4094.

Name

Enter the VLAN name

Destination

To fast configure the VLAN's single-way data communication with WANs, other VLANs and VPNs. The option selected by default will be based on "Policy Routing" option to keep the default route accessible.

VLAN Port IPv4 Address

IPv4 address

Enter IPv4 Address

Subnet Mask

Enter Subnet Mask

DHCP Server

By default it's "Off", choose "On" to specifiy the IPv4 address Allocation Range

IPv4 Address Allocation Range

Enter the start and the end of the IPv4 address Allocation Range.

Release Time(m)

The default value is 120, and the valid range is 60~2880.

DHCP Option

Select the option, type, service and content for each DHCP option. Click on "Plus" or "Minus" icons to add or delete an entry.
 Option: The range is 2-254, exclude 6, 50-54, 56, 58, 59, 61, 82  Type: three options are possible: ASCII, HEX and IP address  Service: When the option is 43 and the type is an ASCII string, the service can be selected.  Content: "Hexadecimal String", please enter XX:XX:XX format or a valid even-bit hexadecimal string.
"ASCII string" or "Decimal" , the content limit is 1-255 characters.

Preferred DNS Server

Enter the Preferred DNS Server

Alternative DNS Server Enter the Alternative DNS Server

IPv4 Routed Subnet

Once enabled, clients under the VLAN will be allowed to access the Internet using their real IP addresses.

Interface

Select the WAN interface from the drop-down list

VLAN Port IPv6 Address

IPv6 Address Source

Select from the drop-down list the WAN port

Interface ID

Toggle ON or OFF the interface ID

Customize Interface ID

Enter the interface ID

IPv6 Preferred DNS Server

Enter the IPv6 Preferred DNS Server

IPv6 Alternative DNS Server

Enter the IPv6 Alternative DNS Server

IPv6 Relay form WAN

Once enabled, clients will get IPv6 addresses directly from the WAN side. Note: This function will take effect only "IPv6 Relay to VLAN" is enabled on the WAN side.

IPv6 Address Assignment

Select from the drop-down list the IPv6 address assignment
 Disable  SLAAC  Statelss DHCPv6  Stateful DHCPv6
Add/edit VLAN

PBX VLAN
PBX VLAN is a specific VLAN configured on a network to support a PBX system (SIP Trunking). It's a dedicated VLAN used exclusively for the traffic associated with the PBX, separating it from other network traffic for security, performance, and management purposes. This segregation helps ensure that voice traffic from the PBX receives the necessary quality of service (QoS), minimizing potential interference or congestion from other network activities. Additionally, it can enhance security by isolating PBX traffic from other network traffic, reducing the risk of unauthorized access or eavesdropping.
This feature is very helpful in the case where ITSPs/ISPs provide Internet and SIP trunking services on the same network.
To add a PBX VLAN, navigate to Networking module  Networking Settings  LAN page  PBX VLAN tab. Click on "Add" button to add a PBX VLAN.

PBX VLAN Specify a VLAN, name and then select the port as shown below:

Add PBX VLAN

VLAN Port Settings

The user can use LAN ports to allow only specific VLANs on each LAN port and in case there are more than one VLAN then

there is an option to choose one VLAN as the default VLAN ID (PVID or Port VLAN Identifier). Click on

to edit the VLAN

Port Settings or click on to delete that configuration and bring back the default settings which is by default VLAN 1.

Allowed VLANs PVID

VLAN Ports Choose the VLANS to be allowed on this port. Select the Port VLAN Identifier or the default VLAN ID
VLAN Port Settings

Static IP Binding
The user can set IP static binding to devices in which the IP address will be bound to the MAC address. Any traffic that is received by the router that does not have the corresponding IP address and MAC address combination will not be forwarded.
To configure Static IP Binding, please navigate to Network Settings  LAN  Static IP Binding, refer to the figure and table below:

Static IP Binding

VLAN Binding Mode Binding Devices
Client ID Type
MAC Address ASCII Hex Device Name IP Address

Select the VLAN from the drop-down list.
select the binding mode, either using the client MAC address or Client ID.
Select the device MAC address from connected devices list. Note: only available bindind mode is set to MAC Address.
Select the client ID type, either based on:  MAC Address  ASCII  Hex Note: only available bindind mode is set to Client ID.
Enter the MAC Address Note: only available bindind mode or Client ID Type is set to MAC Address
Enter the ASCII Note: only available Client ID Type is set to ASCII
Please enter XX:XX:XX:XX format or a valid even-digit hexadecimal number string, the first two digits need to enter the type value. Note: only available Client ID Type is set to Hex
Enter a name for the device
Enter the static IP address based on the VLAN selected previously.

Static IP Binding

Local DNS Records
Local DNS Records is a feature that allows the user to a DNS records into the GCC601X(W) which can be used to map the domain name to an IP address. This feature can be used when the user needs to access a specific server using a domain name instead of an IP address when they do not want to include the entry in public DNS servers. To add a local DNS record, please navigate to Network Settings  LAN  Local DNS Records, then click "Add"

Add Local DNS Records Enter the domain name in "Domain" Then, enter the IP address to which the domain name will be mapped to. Toggle on the "Status" for the mapping to take effect.
Bonjour Gateway
The Bonjour service is a zero-configuration network that enables the automatic discovery of devices and services on a local network. For example: it can be used on a local network to share printers with Windows® and Apple® devices. Once enabled, Bonjour services (such as Samba) can be provided to Bonjour supporting clients under multiple VLANs. Once enabled, configure the services of the VLANs and proxies that need to intercommunicate. To start using Bonjour Gateway, Toggle ON or OFF the service first, then select the VLAN and the services as shown below:
Bonjour Gateway
IGMP
When IGMP Proxy is enabled, the GWN router can issue IGMP messages on behalf of the clients behind it, then the GCC601X(W) will be able to access any multicast group. To start using IGMP Proxy:
1. Toggle ON IGMP Proxy first. 2. Select the WAN interface to be used from the drop-down list (Note: IGMP proxy cannot be enabled on a WAN port with
bridge mode enabled) 3. Select the version, be default is Auto. The user can also enable IGMP Snooping. Once enabled, multicast traffic will be forwarded to the port belonging to the multicast group member. This configuration will be applied to all LAN ports.

IGMP ­ General Settings On the IGMP Multicast Group Table, all the active multicast groups will be displayed here.
IGMP ­ IGMP Multicast Group Table
Network Acceleration
Network acceleration allows the GCC601X(W) to transfer data at a higher rate when Hardware acceleration is enabled. This ensures a high performance.
Network Acceleration Hardware Acceleration: All the network traffic will use dedicated hardware acceleration. Once enabled, QoS, rate limit, traffic statistic will not take effect. Firewall Acceleration: Only IDS/IPS and app traffic authorize by the firewall will use dedicated hardware acceleration. Once enabled, QoS rate limit will not take effect.
VPN
VPN stands for "Virtual Private Network" and it encrypts data in real-time to establish a protected network connection when using public networks.

VPN allows the GCC601X(W) to be connected to a remote VPN server using PPTP, IPSec, L2TP, OpenVPN®, and WireGuard® protocols, or configure an OpenVPN® server and generate certificates and keys for clients.
GCC601X(W) supports the following VPN functions:
PPTP: Client and server IPSec: Site-to-site and client-to-site (Beta) OpenVPN®: Client and server L2TP: Client WireGuard®: Server
VPN page can be accessed from the GCC601X(W) Web GUI  VPN.
PPTP
A data-link layer protocol for wide area networks (WANs) based on the Point-to-Point Protocol (PPP) and developed by Microsoft enables network traffic to be encapsulated and routed over an unsecured public network such as the Internet. Point-to-Point Tunneling Protocol (PPTP) allows the creation of virtual private networks (VPNs), which tunnel TCP/IP traffic through the Internet.
PPTP Clients
To configure the PPTP client on the GCC601X(W), navigate under VPN  PPTP  PPTP Clients and set the following:
1. Click on "Add" button.

The following window will pop up.

PPTP page

Name

PPTP Client Configuration Enter a name for the PPTP client.

Status Server Address Username Password MPPE Encryption
Interface
Destination
IP Masquerading
Maximum Transmission Unit (MTU)
Remote Subnet

Toggle on/off the VPN client account.
Enter the IP/Domain of the remote PPTP Server.
Enter the Username for authentication with the VPN Server.
Enter the Password for authentication with the VPN Server.
Enable / disable the MPPE for data encryption. By default, it's disabled.
Choose the interfaces. Note: Set forwarding rules in firewall automatically to allow traffic forwarded from VPN to the selected WAN port. If remote device is allowed to access, please set the corresponding forwarding rules in firewall.
Choose to which destination group or WAN to allow traffic from the VPN, this will generate automatically a forwarding rule under the menu Firewall  Traffic Rules  Forward.
This feature is a form of network address translation (NAT) which allows internal computers with no known address outside their network, to communicate to the outside. It allows one machine to act on behalf of other machines.
This indicates the size of the packets sent by the router. Please do not change this value unless necessary.
Configures the remote subnet for the VPN. The format should be "IP/Mask" where IP could be either IPv4 or IPv6 and mask is a number between 1 and 32. example: 192.168.5.0/24
PPTP Client Configuration

PPTP Servers
To add a PPTP Server, please navigate to Web UI  VPN  PPTP page  PPTP Servers tab, then click the "Add" button.

Name

PPTP Server Enter a name for the PPTP Server.

Status

Toggle ON or OFF to enable or disable the PPTP Server VPN.

Server Local Address

Specify the server local address

Client Start Address

specify client start IP address

Client End Address

specify client end IP address

MPPE Encryption

Enable / disable the MPPE for data encryption. By default, it's disabled.

Interface

Select from the drop-down list the exact interface (WAN port).

Destination

Select the Destination from the drop-down list (WAN or VLAN). Note: When selecting "All", subsequent new interfaces will be automatically included.

LCP Echo Interval (sec)

Configures the LCP echo send interval.

LCP Echo Failure Threshold

Set the maximum number of Echo transfers. If it is not answered within the set request frames, the PPTP server will consider that the peer is disconnected and the connection will be terminated.

LCP Echo Adaptive

 Once enabled: LCP Echo request frames will only be sent if no traffic has been received since the last LCP Echo request.
 Once disabled: the traffic will not be checked, and LCP Echoes are sent based on the value of the LCP echo interval

Debug

Toggle On/Off to enable or disable debug.

Maximum Transmission Unit (MTU)

This indicates the size of the packets sent by the router. Please do not change this value unless necessary. By default is 1450.

Maximum Receive Unit (MRU)

MRU indicates the size of the received packets. By default is 1450.

Preferred DNS Server specify the preferred DNS server. Ex: 8.8.8.8

Alternative DNS Server

specify the alternative DNS server. Ex: 1.1.1.1 PPTP Server

Create the remote user credentials:

To create the remote user account which will be required to be entered on the client side and and authenticated on the server side, please refer to the Remote Users section.

To view the clients connected to this server, click on the "Client List" icon as shown below:

Clients connected to this server
IPSec
IPSec or Internet Protocol Security is mainly used to authenticate and encrypt packets of data sent over the network layer. To accomplish this, they use two security protocols ­ ESP (Encapsulation Security Payload) and AH (Authentication Header), the former provides both authentications as well as encryption whereas the latter provides only authentication for the data packets. Since both authentication and encryption are equally desirable, most of the implementations use ESP.
IPSec supports two different encryption modes, they are Tunnel (default) and Transport mode. Tunnel mode is used to encrypt both payloads as well as the header of an IP packet, which is considered to be more secure. Transport mode is used to encrypt only the payload of an IP packet, which is generally used in gateway or host implementations.
IPSec also involves IKE (Internet Key Exchange) protocol which is used to set up the Security Associations (SA). A Security Association establishes a set of shared security parameters between two network entities to provide secure network layer communication. These security parameters may include the cryptographic algorithm and mode, traffic encryption key, and parameters for the network data to be sent over the connection. Currently, there are two IKE versions available ­ IKEv1 and IKEv2. IKE works in two phases:
Phase 1: ISAKMP operations will be performed after a secure channel is established between two network entities.
Phase 2: Security Associations will be negotiated between two network entities.
IKE operates in three modes for exchanging key information and establishing security associations ­ Main, Aggressive, and Quick mode.
· Main mode: is used to establish phase 1 during the key exchange. It uses three two-way exchanges between the initiator and the receiver. In the first exchange, algorithms and hashes are exchanged. In the second exchange, shared keys are generated using the Diffie-Hellman exchange. In the last exchange, verification of each other's identities takes place.
· Aggressive mode: provides the same service as the main mode, but it uses two exchanges instead of three. It does not provide identity protection, which makes it vulnerable to hackers. The main mode is more secure than this.
· Quick mode: After establishing a secure channel using either the main mode or aggressive mode, the quick mode can be used to negotiate general IPsec security services and generate newly keyed material. They are always encrypted under the secure channel and use the hash payload that is used to authenticate the rest of the packet.

IPSec Site-to-Site

To build an IPSec secure tunnel between two sites located in two distant geographical locations, we can use the sample scenario below:

The branch office router needs to connect to the Headquarters office via an IPSec tunnel, on each side we have a GCC601X(W). Users can configure the two devices as follows:

The branch office router runs a LAN subnet 192.168.1.0/24 and the HQ router runs a LAN subnet 192.168.3.0, the public IP of the branch office router is 1.1.1.1 and the IP of the HQ router is 2.2.2.2.

Go under VPN  IPSec  Site-to-Site then click on

to add a VPN Client.

 Phase 1

Add VPN Client ­ IPSec

 Phase 2

Add VPN Client ­ Phase 1

Add VPN Client ­ Phase 2
After this is done, press "Save" and do the same for the HQ Router. The two routers will build the tunnel and the necessary routing information to route traffic through the tunnel back and from the branch office to the HQ network.

Note: After the connection is established, the incoming packets from the remote subnet are automatically released, and it is not necessary to manually configure the firewall forwarding rules from WAN to LAN to release traffic.
Create the remote user credentials: To create the remote user account which will be required to be entered on the client side and and authenticated on the server side, please refer to the Remote Users section.
IPSec Client-to-Site
Note Please note that this feature is still in its beta testing phase.
Go under VPN  IPSec  Client-to-Site then fill in the following information:

OpenVPN®

Branch Office IPSec Configuration

OpenVPN® Client

There are two ways to use the GCC601X(W) as an OpenVPN® client:

1. Upload client certificate created from an OpenVPN® server to the GCC601X(W).

2. Create client/server certificates on the GCC601X(W) and upload the server certificate to the OpenVPN® server.

Go to VPN  OpenVPN®  OpenVPN® Clients and follow the steps below:

Click on

button. The following window will pop up.

Click

after completing all the fields.

OpenVPN® Client

Name Status
Protocol
Interface Destination Local Port Remote OpenVPN® Server OpenVPN® Server Port
Authentication Mode
Encryption Algorithm

Enter a name for the OpenVPN® Client.
Toggle on/off the client account.
Specify the transport protocol used.  UDP  TCP Note: The default protocol is UDP.
Select the WAN port to be used by the OpenVPN® client.
Select the WANs, VLANs and VPNs (clients) destinations that will be used by this OpenVPN® client.
Configures the client port for OpenVPN®.The port between the OpenVPN® client and the client or between the client and the server should not be the same.
Configures the remote OpenVPN® server. Both IP address and domain name are supported.
Configures the remote OpenVPN® server port
Choose the authentication mode.  SSL  User Authentication  SSL + User Authentication  PSK
Choose the encryption algorithm. The encryption algorithms supported are:  DES  RC2-CBC  DES-EDE-CBC  DES-EDE3-CBC  DESX-CBC  BF-CBC

Digest Algorithm
TLS Identity Authentication TLS Identity Authentication Direction TLS Pre-Shared Key Routes Deny Server Push Routes IP Masquerading LZO Compression Allow Peer to Change IP CA Certificates

 RC2-40-CBC  CAST5-CBC  RC2-64-CBC  AES-128-CBC  AES-192-CBC  AES-256-CBC  SEED-CBC
Select the digest algorithm. The digest algorithms supported are:
 MD5  RSA-MD5  SHA1  RSA-SHA1  DSA-SHA1-old  DSA-SHA1  RSA-SHA1-2  DSA  RIPEMD160  RSA-RIPEMD160  MD4  RSA-MD4  ecdsa-with-SHA1  RSA-SHA256  RSA-SHA384  RSA-SHA512  RSA-SHA224  SHA256  SHA384  SHA512  SHA224  whirlpool
Enable TLS identity authentication direction.
Select the indentity authentication direction.
 Server: Indentity authentication is performed on the server side.  Client: Identity authentication is performed on the client side.  Both: Identity authentication is performed on both sides.
Enter the TLS pre-shared key.
Configures IP address and subnet mask of routes, e.g., 10.10.1.0/24.
If enabled, client will ignore routes pushed by the server.
This feature is a form of network address translation (NAT) which allows internal computers with no known address outside their network, to communicate to the outside. It allows one machine to act on behalf of other machines.
Select whether to activate LZO compression or no, if set to "Adaptive", the server will make the decision whether this option will be enabled or no. LZO encoding provides a very high compression ratio with good performance. LZO encoding works especially well for CHAR and VARCHAR columns that store very long character strings.
Allow remote change the IP and/or Port, often applicable to the situation when the remote IP address changes frequently.
Click on "Upload" and select the CA certificate Note: This can be generated in System Settings  Certificates  CA Certificate

Client Certificate Client Private Key Password

Click on "Upload" and select the Client Certificate. Note: This can be generated in System Settings  Certificates  Certificate
Enter the client private key password. Note: This can be configured in VPN  Remote User
OpenVPN® Client

OpenVPN® Server
To use the GCC601X(W) as an OpenVPN® server, you will need to start creating OpenVPN® certificates and remote users. To create a new VPN server, navigate under Web UI  VPN  OpenVPN® page  OpenVPN® Servers tab.

Click

after completing all the fields.

Refer to the table below:

Create OpenVPN® Server

Name Status Protocol Interface Destination Local Port Server Mode

Enter a name for the OpenVPN® server.
Toggle ON or OFF to enable or disable the OpenVPN® Server.
Choose the Transport protocol from the dropdown list, either TCP or UDP. The default protocol is UDP.
Select from the drop-down list the exact interface (WAN).
Select from the drop-down list the destination (WAN or VLAN).
Configure the listening port for OpenVPN® server. The default value is 1194.
Choose the server mode the OpenVPN® server will operate with. 4 modes are available:  SSL: Authentication is made using certificates only (no user/pass authentication). Each user has a
unique client configuration that includes their personal certificate and key. This is useful if clients

Encryption Algorithm
Digest Algorithm
TLS Identicy Authentication
TLS Identity Authentication Direction

should not be prompted to enter a username and password, but it is less secure as it relies only on something the user has (TLS key and certificate).  User Authentication: Authentication is made using only CA, user and password, no certificates. Useful if the clients should not have individual certificates. Less secure as it relies on a shared TLS key plus only something the user knows (Username/password).  SSL + User Authentication: Requires both certificate and username / password. Each user has a unique client configuration that includes their personal certificate and key.  PSK: Used to establish a point-to-point OpenVPN® configuration. A VPN tunnel will be created with a server endpoint of a specified IP and a client endpoint of specified IP. Encrypted communication between client and server will occur over UDP port 1194, the default OpenVPN® port. Most secure as there are multiple factors of authentication (TLS Key and Certificate that the user has, and the username/password they know).
Choose the encryption algorithm from the dropdown list to encrypt data so that the receiver can decrypt it using same algorithm.
Choose digest algorithm from the dropdown list, which will uniquely identify the data to provide data integrity and ensure that the receiver has an unmodified data from the one sent by the original host.
This option uses a static Pre-Shared Key (PSK) that must be generated in advance and shared among all peers. This feature adds extra protection to the TLS channel by requiring that incoming packets have a valid signature generated using the PSK key.
Select from the drop-down list the direction of TLS Identity Authentication, three options are available (Server, Client or Both).

TLS Pre-Shared Key

If TLS Identicy Authentication is enabled, enter the TLS Pre-Shared Key.

Allow Duplicate Client Certificates

Click on "ON" to allow duplicate Client Certificates

Redirect Gateway

When redirect-gateway is used, OpenVPN® clients will route DNS queries through the VPN, and the VPN server will need to handle them.

Push Routes

Specify route(s) to be pushed to all clients. Example: 10.0.0.1/8

LZO Compression Algorithm

Select whether to activate LZO compression or no, if set to "Adaptive", the server will make the decision whether this option will be enabled or no.

Allow Peer to Change IP

Allow remote change the IP and/or Port, often applicable to the situation when the remote IP address changes frequently.

CA Certificate

Select a generated CA from the dropdown list or add one.

Server Certificate

Select a generated Server Certificate from the dropdown list or add one.

IPv4 Tunnel Network/Mask Length

Enter the network range that the GCC601X(W) will be serving from to the OpenVPN® client. Note: The network format should be the following 10.0.10.0/16. The mask should be at least 16 bits.
Create OpenVPN® Server

Create the remote user credentials:

To create the remote user account which will be required to be entered on the client side and and authenticated on the server side, please refer to the Remote Users section.

L2TP

To configure the L2TP client on the GCC601X(W) router, navigate under "VPN  VPN Clients" and set the followings:

1. Click on

button and the following window will pop up.

L2TP Client Configuration

Name Status Interface Destination Server Address Username Password
IP Masquerading
Maximum Transmission Unit (MTU) Remote Subnet

Set a name for this VPN tunnel. Toggle on/off this L2TP account. Select the WAN port to be used by VPN. Select the WANs, VLANs destinations that will be using this VPN. Enter the VPN IP address or FQDN. Enter VPN username that has been configured on the server side. Enter VPN password that has been configured on the server side. This feature is a form of network address translation (NAT) which allows internal computers with no known address outside their network, to communicate to the outside. It allows one machine to act on behalf of other machines.
This indicates the size of the packets sent by the router. Please do not change this value unless necessary.
Enter the remote Subnet that has been configured on the server side.

Click

after completing all the fields.

L2TP Client Configuration

L2TP Client
WireGuard®
WireGuard® is a free and open-source VPN solution that encrypts virtual private networks, easy to use, high performance, and secure. GCC601X(W) series supports WireGuard® VPN with automatic peer generation and QR code scanning for mobile phones and devices with camera support. To start using WireGuard® VPN, please navigate to the Web UI  VPN  WireGuard® page. Click on the "Add" button to add a WireGuard® server as shown below:
WireGuard® tab Please refer to the figure and table below when filling up the fields.

Name Status Interface Monitoring Port Local IP Address Subnet Mask Destination Private Key Public Key

Add/Edit WireGuard®
Specify a name for Wireguard® VPN. Toggle ON or OFF to enable or disable the Wireguard® VPN. Select from the drop-down list the WAN port. Set the local listening port when establishing a WireGaurd® tunnel. Default: 51820 Specify the network that WireGuard® clients (Peers) will get IP address from. Configures the IP address range available to the Peers. Select the Destination(s) from the drop-down list. Note: When selecting "All", subsequent new interfaces will be automatically included. Click on "One-Click Generation" text to generate a private key. The public key will be generated according to the private key.

Click on "Copy" text to copy the public key.

Maximum Transmission Unit (MTU)

This indicates the size of the packets sent by the router. Please do not change this value unless necessary. By default is 1450.
Add/Edit WireGuard®

Once finished configuring WireGuard®, click on the "Automatic peer generation" icon to generate peers very quickly and easily as shown in the figures below:

WireGuard® tab Enter a name and toggle status ON then click on the "Save" button.

WireGuard® Automatic Peer generation ­ part 1
Now, the user can either download the configuration file and share it, or download a QR code for devices like mobile phones to scan.

WireGuard® Automatic Peer generation ­ part 2
Peers
On the peers' tab, the user can create peers manually by clicking on the "Add" button.

WireGuard® ­ Peers tab Please refer to the figure below when filling up the fields.
WireGuard® ­ add/edit peer The user can download the config file after adding the peer.
WireGuard® ­ download peer config Or scanning the QR code for devices with camera support.

WireGuard® ­ scan peer config
Remote Users
To create the VPN user accounts, please navigate to VPN  Remote Users then click "Add". The account configured will be used for the client to authenticate into the VPN server. The remote client user that can be created in this section is for PPTP, IPSec, and OpenVPN.

Add VPN Remote Users

Name Status

Enter a name for the user. This name will not be used to log in. Enable or disable this account. Choose the type of the server.

Server Type

 PPTP  IPSec  OpenVPN

Server Name Username Password Client Subnet

Enter the server's name. Enter the username. This username will be used to log in. Enter the password. Specify the client subnet.

Add VPN Remote Users
To authenticate a remote user into the VPN server successfully, the username and password are used alongside the client certificate. To create a client certificate please refer to the Certificates section.
To configure the VPN clients for each VPN server type, please refer to the respective VPN client configuration above.

ROUTING
Policy Routes
In this section, the user can create a policy route to either load balance or backup (Failover) between 2 or more WAN ports. This feature allows a network administrator to make advanced routing decisions for traffic passing through the router and for high granularity control over policies that dictate what WAN port and even VLAN, traffic should use. Traffic controlled this way can be balanced across multiple VLANs.
Load Balance Pool
To create a load balance rule, navigate to the Routing  Policy Routes page  Load Balance Pool tab, click on the "Add" button, then select the mode (Load Balance or Backup), after selecting the WAN ports from the drop-down list and specify the Weight for each port added. Please refer to the figures below:
Load Balance Pool
Load Balance Pool ­ Load Balance mode
Load Balance Pool ­ Backup mode Note:
For the Weight: The default is 1 and the value can be from 1~10 with 10 being the highest weight. The number of WAN ports depends on the GWN router model.

Policy Route
On the second tab (Policy Routes), the user can specify which Networks (VLAN) can use which Load Balance rule (must be created first), also the user can specify the protocol type, source, and destination IP and even assign a schedule for it. To create a Policy Route, please navigate to Routing  Policy Routes page  Policy Routes tab, then click on the "Add" button as shown below:
Policy Routes page

Add Policy Route
Note: If the Source and Destination IP address field is left empty, the policy route will take any IP address.

Static Routes

Static routing is a form of routing by manually configuring the routing entries, rather than using dynamic routing traffic for any service that requires a static address that never changes.

GCC601X(W) supports setting manually IPv4 or IPv6 Static Routes which can be accessed from GCC601X(W)WebGUI Routing  Static Routing.

To add a new Static Route, the user needs to click on

.

Static Routing Page

Add IPv4 Static Routing

Name Status IP Address Subnet Mask Outgoing Interface Next Hop
Metric

Specify a name for the Static Routing
enable or disable the Static Routing Specify the IP address
Enter the Subnet Mask Select the interface
Specify the next Hop When there are multiple routings in the network that can reach the same destination, the priority of routing rules can be adjusted by setting metric, and the packets will be forwarded according to the path with the smallest metric.

Add IPv4 Static Routing

TRAFFIC MANAGEMENT
Traffic Statistics
When traffic statistics are enabled, the GCC601X(W) will start identifying the traffic and generating statistics. The statistics will be represented graphically as shown in the screenshot below. The feature displays the name and the type of the service generating the traffic to easily identify which services are being used and which clients are using them.
Note The GCC601X(W) supports up to a month of traffic statistics data.

Traffic Statistics and Analysis To enable traffic statistics, navigate to the Traffic Management  Traffic Statistics page, on the top right corner, click on "Traffic Statistics Settings" as shown in the figure above.
Enable Traffic Statistics
QoS
Quality of Service (QoS) is a feature that allows the prioritization of the latency-sensitive traffic exchanged between the WAN and the LAN hosts. This will offer more control over the usage of a limited bandwidth and ensure that all application services are not affected by the amount of traffic exchanged.
General Settings
On this page, the user will be able to allocate a percentage of the download and the upload bandwidth to 4 classes. These classes can be assigned to applications to determine which application traffic will be prioritized, this includes the inbound and the outbound traffic. Also, it's possible to tag outbound traffic with DSCP tags for each class.
QoS ­ General Settings To set Upload/Download bandwidth percentage for each class, click on the edit button .
Note:

If the bandwidth value is incorrect, QoS might not work properly. Before enabling QoS, please check the upload and bandwidth rates of your connection, or contact your ISP to obtain the exact upload and download values. The total sum of the bandwidth percentages cannot exceed 100%.

WAN Port QoS Settings

Status Maximum Upload/Download Bandwidth Class1 (High) Class2 (Medium) Class1 (Low) Class1 (Lowest)

Upload/Download Bandwidth Toggle QoS for the WAN port on/off Specify the maximum upload/download speed for the WAN port. Specify the bandwidth percentage allocated for Class1. Specify the bandwidth percentage allocated for Class2. Specify the bandwidth percentage allocated for Class3. Specify the bandwidth percentage allocated for Class4.

Click on

Edit Bandwidth limit bandwidth statistics icon to get a general overview of the upload/download bandwidth status.

QoS ­ Upload/Download Bandwidth Status
APP Class
GCC601X(W) can prioritize the traffic of each application individually. The priority level can be set in 4 classes, class 1 having the highest priority and class 4 having the lowest priority. To access APP Class settings, please access the web GUI of the router then navigate to Traffic Management  QoS  APP Class.

The user can either set the priority for the individual applications by selecting the priority of the corresponding applications.
QoS ­ APP Class Or, the user can select the applications and application categories and then click "Configure Classes" and then choose the adequate priority.
QoS ­ Apps Class ­ Configure Classes Note App Class may take some time to be applied since the router needs to inspect a sufficient number of packets to identify the traffic generated by the application.
Class Rules
QoS class rules are rules that set the QoS based on source and/or destination IP addresses, and source and destination ports.

Name Status IP Family
Protocol Type Source IP Address
Source Port
Destination IP Address
Destination Port
Priority DSCP

QoS ­ Add Class Rules
Enter the name of the class. The character limit is 1-94 characters.
Enable or disable the class's status.
Choose the IP family:  Any: The IP addresses allowed can either be IPv4 or IPv6.  IPv4: The IP addresses allowed are strictly IPv4.  IPv6: The IP addresses allowed are strictly IPv6.
Choose the protocol type:  TCP/UDP: The QoS class will apply to both TCP and UDP traffic.  TCP: The QoS class will apply only to the TCP traffic.  UDP: The QoS class will apply only to the UDP traffic.
Enter the source IP address/mask length. E.g.,"192.168.122.0/24"
Enter a single port number, multiple port numbers, or a range of ports number. Example: - To enter a single port number, type the port number such as "3074". - To enter multiple port numbers, type the port numbers with a comma in between each port number, such as "3074, 5060, 10000". - To enter a range of port, enter the first port number in the range, then type a dash (-) and enter the last port number in the range. E.g., "10000-20000" Note: The valid range of port numbers that can be entered is 1-65535.
Enter the destination IP address/mask length. E.g.,"192.168.122.0/24"
Enter a single port number, multiple port numbers, or a range of ports number. Example: - To enter a single port number, type the port number such as "3074". - To enter multiple port numbers, type the port numbers with a comma in between each port number, such as "3074, 5060, 10000". - To enter a range of port, enter the first port number in the range, then type a dash (-) and enter the last port number in the range. E.g., "10000-20000" Note: The valid range of port numbers that can be entered is 1-65535.
Select the class of priority.
Choose a DSCP value.

QoS ­ Add Class Rules
VoIP Settings
VoIP Settings in QoS allow the user to identify and prioritize the VoIP traffic that is forwarded by the GCC601X(W). To configure this option, please access the web UI of the GCC601X(W) and navigate to Traffic Management  QoS  VoIP Settings, then toggle on the "VoIP Prioritization", which specifies the SIP UDP port, by default the port number is 5060.
VoIP Settings
Bandwidth Limit
The Bandwidth limit feature helps to limit bandwidth by specifying the maximum upload and download limit, then this limit can be applied to each IP/MAC address or applied to all IP addresses in the IP address range. Navigate to Web UI  Traffic Management  Bandwidth Limit.
Bandwidth Limit page To add a bandwidth rule, please click on the "Add" button or click on the "Edit" icon as shown above. Please refer to the figure below:

Note:

Add/edit Bandwidth rule

Application Mode: Select "Individual" to set the maximum upload bandwidth and maximum download bandwidth that can be used by each IP address, and "shared" to set the sum of the maximum upload bandwidth and maximum download bandwidth that can be used by all IP addresses in the IP address range.
ACCESS CONTROL
SafeSearch
The GCC601X(W) offers a SafeSearch feature on Bing, Google, and YouTube. Enabling this option will hide any inappropriate or explicit search results from being displayed.

Site Control page
EXTERNAL ACCESS
By default, all the requests initiated from the WAN side are rejected by the GCC601X(W) external access features allow hosts located on the WAN side to access the services hosted on the LAN side of the GCC601X(W).

DDNS

1. Access to GCC601X(W) web GUI, navigate to External Access  DDNS, and click

to Add Service.

2. Fill in the domain name created with the DDNS provider under the Service Provider field.

3. Enter your account username and password under the User Name and Password fields.

4. Specify the Domain to which the DDNS Account is applied under Domain.

DDNS Page

Service Provider Username

Select the DDNS provider from the list Enter the Username

Password Domain Interface

Enter the Password Enter the Domain Select the Interface

DDNS Page

Port Forwarding
Port forwarding allows forwarding requests initiated from the WAN side of the GCC601X(W) to a LAN host. This is done by configuring either the port only or the port and the IP address in case we want to restrict access over that specific port to one IP address. Once the GCC601X(W) receives the request on the IP address, the GCC601X(W) will verify the port on which the request has been initiated and will forward the request to the host IP address and the port of the host which is configured as the destination.
Port forwarding can be used in the case when a host on the WAN side wants to access a server on the LAN side.
Navigate to External Access  Port Forward:

Port Forwarding page Refer to the following table for the Port Forwarding option when editing or creating a port forwarding rule:

Name Status Protocol Type Interface Source IP Address Source Port Destination Group Destination IP Address Destination Port

Enter a name for the port forwarding rule. Toggle on/off the rule status. Select a protocol, users can select TCP, UDP or TCP/UDP. Select the WAN port Sets the IP address that external users access to this device. If not set, any IP address on the corresponding WAN port can be used Set a single or a range of Ports. Select VLAN group. Set the destination IP address. Set a single or a range of Ports.

Port Forwarding page
DMZ
Configuring the DMZ, the GCC601X(W) will allow all external access requests to the DMZ host. This is This section can be accessed from Web GUI  External Access  DMZ. GCC601X(W) supports DMZ, where it is possible to specify a Hostname IP Address to be put on the DMZ.

DMZ Page Enabling the DMZ host function, the computer set as the DMZ host can be completely exposed to the Internet, realizing twoway unrestricted communication.
Refer to the below table for DMZ fields:

DMZ Name Status Source Group Destination Group DMZ Hostname IP Address

Enter a name for the DMZ rule. Toggle on/off the status of the DMZ rule. Select the interface to allow access to the DMZ host. Select the VLAN on which the DMZ host belong. Enter the DMZ host IP address.

DMZ Page

UPnP
GCC601X(W) supports UPnP that enables programs running on a host to configure automatically port forwarding.
UPnP allows a program to make the GCC601X(W) open necessary ports, without any intervention from the user, without making any check.
UPnP settings can be accessed from GCC601X(W) Web GUI  External Access  UPnP.

UPnP Settings

UPnP Interface Destination Group

Click on "ON" to enable UPnP. Note: Once enabled UPnP (Universal Plug and Play), computers in the LAN can request the router to do port forwarding automatically
Select the interface (WAN)
Select the LAN Group

UPnP Settings
When UPnP is enabled, the ports will be shown in the section below. The information shown includes the application name, IP address of the LAN host that has requested the opening of the port, the external port number, the internet port number, and the transport protocol used (UDP or TCP).

UPnP ­ Open Ports
TURN Service
TURN stands for Traversal Using Relays around NAT and it's a network service that helps establish peer-to-peer connections between devices that are behind a NAT or Firewall. Real-time communication like video conferencing, Voice over IP, etc benefit from TURN service to establish connections between peers when the NAT or the Firewall blocks or modifies the traffic.
Navigate to Web UI  External Access  TURN Service. The service is OFF by default, toggle Status ON to turn on the service. The default TURN Server Port is 3478, also it's possible to add or remove a username and password by clicking on "minus" and "Plus" icons.

TURN Service
Note: Turn Server port is by default 3478. For Turn Forwarding Port: do not modify the forwarding port range unless necessary. Ensure that the ports used by other services do not conflict with the TURN forwarding ports. TURN service is a NAT traversal solution for UC in a private network and a VoIP media traffic NAT traversal gateway for Grandstream UCM and Wave.
MAINTENANCE
GCC601X(W) offers multiple tools and options for maintenance and debugging to help further troubleshooting and monitoring the GCC601X(W) resources.
TR-069
It is a protocol for communication between CPE (Customer Premise Equipment) and an ACS (Auto Configuration Server) that provides secure auto-configuration as well as other CPE management functions within a common framework. TR-069 stands for a "Technical Report" defined by the Broadband Forum that specifies the CWMP "CPE WAN Management Protocol". It commonly uses HTTP or HTTPS as transport for communication between CPE and the ACS. The message exchange uses SOAP (XML_RPC) for the configuration and management of the device.
Important Note If enabled, GCC601X(W) cannot continue to manage GWN devices.

TR-069 page

TR-069 ACS URL ACS Username ACS Password Periodic Inform Periodic Inform Interval (sec) Connection Request Username
Connection Request Password
Connection Request Port CPE Cert File CPE Cert Key

Enable/disable TR-069
Enter the FQDN or the IP address of the ACS server. Enter the username.
Enter the password. If enabled, the GCC601X(W) will send connection inform packets to ACS regularly.
This configures the time duration between each inform sent by the device to the ACS server. When ACS server sends a connection request to the device, the username that the device authenticates ACS must be consistent with the configuration of ACS side. The password that the device authenticates ACS must be consistent with the configuration of ACS server. The port for ACS to send connection request to the GCC601X(W). This port cannot be occupied by other device features. Enter the certificate that the device needs to use when connecting to ACS through SSL.
Enter the certificate key that the device needs to use when connecting to ACS through SSL.

TR-069 page

SNMP
GCC601X(W) supports SNMP (Simple Network Management Protocol) which is widely used in network management for network monitoring for collecting information about monitored devices.
To configure SNMP settings, go to Web GUI  Maintenance  SNMP, in this page, the user can either enable SNMPv1, SNMPv2c, or enable SNMPv3, and enter all the necessary parameters.

SNMP To configure SNMPv1 or SNMPv2, please refer to the table below:

SNMPv1, SNMPv2 Community String

Enable/disable SNMPv1 and SNMPv2
Enter the shared password of the community. Note:

SNMP ­ SNMPv1 or SNMPv2 To configure SNMPv3, please refer to the table below:

SNMPv3 Username Authentication Mode Authentication Key Encryption Mode Encryption Key

Enable/disable SNMPv3. Enter a username. Select the algorithm used for the authentication. Select the authentication password. Select the encryption protocol used for the encryption of the data. Enter the encryption key.

SNMP ­ SNMPv3
System Diagnostics
Many debugging tools are available on GCC601X(W)'s Web GUI to check the status and troubleshoot GCC601X(W)'s services and networks. To access these tools navigate to "Web UI  System Settings  System Diagnosis"
Ping/Traceroute
Ping and Traceroute are useful debugging tools to verify reachability with other clients across the network (WAN or LAN). The GCC601X(W) offers both Ping and Traceroute tools for IPv4 and IPv6 protocols.

Ping/Traceroute
Core File
When a crash event happens on the unit, it will automatically generate a core dump file that can be used by the engineering team for debugging purposes.

Core File

Capture

This section is used to capture packet traces from the GCC601X(W) interfaces (WAN ports and network groups) for

troubleshooting purposes or monitoring. It's even possible to capture based on MAC address or IP Address, once done the

user can click on

and the file (CAP) will start downloading right away.

Capture
External Syslog
GCC601X(W) supports dumping the Syslog information to a remote server under Web GUI  System Settings  System Diagnosis  External Syslog Tab

Enter the Syslog server Hostname or IP address and select the level for the Syslog information. Nine levels of Syslog are available: None, Emergency, Alert, Critical, Error, Warning, Notice, Information, and Debug.
External Syslog
ARP Cache Table
GCC601X(W) keeps an ARP table record of all the devices that have been assigned an IP address from the GCC601X(W). The record will keep the device's information when the device is offline. To access the ARP Cache Table, please navigate to System Diagnostics  ARP Cache Table.
ARP Cache Table
Link Tracing Table
The Link Tracing Table shows the flow of traffic by displaying the source IP address/Port (the green color) and the reply IP address/port (the blue color), also other information can be displayed like IP Family, Protocol Type, Life Time, Status, Packets/Bytes, etc. Users/Administrators can also delete the flow of certain IP addresses/Ports (Source and Destination) or then click on the "Delete" button to clear the link tracing statistic.

Link Tracing Table
Network Diagnostics
The Network Diagnostics feature allows the user to quickly diagnose the connection link on a specific WAN interface.
Network Diagnostics
PoE Diagnostics
The PoE Diagnostics page offers insight about the ports and their components as well as the power used and the temperature. The information provided can be useful when the user encounters an issue with the PoE function of the GCC601X(W).
Note GCC6010W doesn't support PoE.

Alerts & Notifications

PoE Diagnostics

Alerts
The Alerts page displays alerts about the network, the user can specify to display only certain types like (System, Performance, Security, or Network) or the levels. To check the alerts that have been generated, please navigate to Maintenance  Alerts & Notifications page  Alerts tab.
The alerts can be displayed either by type or level. However, that is not the only way to display them. The user can filter through the alert log using a date interval or search by MAC address or device name.
Alerts Types
The available types are System, Performance, Security, and Network, or the user can choose to display all the types.

Alerts Levels

Alerts Types

The user can filter the alert level by the following levels: All Levels, Emergency, Warning or Notice.

Alert Notification Settings

Alerts Levels

To enable the notifications on the Alerts tab, please click on the "Alert Notification Settings" button as shown below:

Alert Notification Settings The figures below show all the possible alert notifications that the user can enable on the Alerts tab, organized into 4 categories: System Alert, Performance Alert, Security Alert, and Network Alert. Please refer to the figures below:
Alert Notification Settings ­ part 1
Alert Notification Settings ­ part 2

Alert Notification Settings ­ part 3
Alert Notification Settings ­ part 4
E-mail Notifications
On this tab, the user can set up the E-mails that will receive the notifications, once the feature is enabled, then the user can fill up the fields according to SMTP parameters. Refer to the figure below:

Alerts ­ E-mail Notifications It's possible to add more than one receiver E-mail address as shown in the figure above.
Click on the "Minus" icon to delete the receiver's E-mail address. Click on the "Plus" icon to add the receiver's E-mail address. E-mail Notification Settings To select what notifications will be sent to the receiver's E-mail addresses, please click on the "E-mail Notification Settings" button as shown below:
E-mail Notification Settings The figures below show all the possible E-mail notifications that the user can send to the pre-configured receiver E-mail Addresses, organized into 4 categories:
System Performance Security Network

E-mail Notification Settings ­ part 1 E-mail Notification Settings ­ part 2 E-mail Notification Settings ­ part 3

SYSTEM SETTINGS

E-mail Notification Settings ­ part 4

Certificates

CA Certificates
In this section, the user can create a CA certificate. This certificate will authenticate the user when connected to the VPN server created on the device. This authentication will ensure that no identity is being usurped and that the data exchanged remains confidential. To create a certificate, please access the web GUI of the router and access System Settings  Certificates  CA Certificates then click "Add" and fill in the necessary information.

Cert. Name Key Length

Add CA Certificate
Enter the Certificate name for the CA. Note: It could be any name to identify this certificate. Example: "CATest".
Choose the key length for generating the CA certificate. The following values are available:  512: 512-bit keys are not secure and it's better to avoid this option.  1024: 1024-bit keys are no longer sufficient to protect against attacks.  2048: 2048-bit keys are a good minimum. (Recommended).

 4096: 4096-bit keys are accepted by nearly all RSA systems. Using 4096-bit keys will dramatically increase generation time, TLS handshake delays, and CPU usage for TLS operations.

Digest Algorithm

Choose the digest algorithm:
 SHA1: This digest algorithm provides a 160-bit fingerprint output based on arbitrary-length input.  SHA256: This digest algorithm generates an almost unique, fixed-size 256 bit hash. Note: Hash is a one-way function, it cannot be decrypted back.

Expiration (D)

Enter the validity date for the CA certificate in days. The valid range is 1~999999..

Country / Region

Select a country code from the dropdown list. Example: "United Stated of America".

State / Province

Enter a state name or province. Example: "Casablanca".

City

Enter a city name.

Example: "SanBern".

Organization

Enter the organization's name. Example: "GS".

Organizational Unit

This field is the name of the department or organization unit making the request. Example: "GS Sales".

Email

Enter an email address. Example: "EMEAregion@grandstream.com"
Add CA Certificate

Certificate
In this section, the user can create a server or a client certificate. To create a certificate please access the web UI of the device, then navigate to System Settings  Certificates  Add Certificate, click "Add", then enter the necessary information regarding the certificate.

Add Certificate

Cert. Name
Key Length
Digest Algorithm
Expiration (D) SAN Country / Region State / Province City Organization Organization Unit Email

Enter the certificate's name.
Choose the key length for generating the CA certificate.The following values are available:  512: 512-bit keys are not secure and it's better to avoid this option.  1024: 1024-bit keys are no longer sufficient to protect against attacks.  2048: 2048-bit keys are a good minimum. (Recommended).  4096: 4096-bit keys are accepted by nearly all RSA systems. Using 4096-bit keys will dramatically increase
generation time, TLS handshake delays, and CPU usage for TLS operations.
Select the digest algorithm.  SHA1: This digest algorithm provides a 160-bit fingerprint output based on arbitrary-length input.  SHA256: This digest algorithm generates an almost unique, fixed-size 256 bit hash. Note: Hash is a one-way function, it cannot be decrypted back.
Select the duration of validity of the certificate. The number entered represents the days that have to elapse before the certificate is considered as expired. The valid range is 1 - 999999.
Enter the address IP or the domain name of the SAN (Subject Alternate Name).
Select a country from the dropdown list of countries. Example: "United States of America".
Enter a state name or a province. Example: California
Enter a city name. Example: "San Diego"
Enter the organization's name. Example: "GS".
This field is the name of the department or organization unit making the request. Example: "GS Sales".
Enter an email address. Example: "EMEAregion@grandstream.com"

Add Certificate
Certificates Backup and Restore
To back up the created certificates, first select all the desired certificates, then click on the "Backup" button and enter a password to protect it as shown below:

Certificate Backup To restore a certificate, click on the "Restore" button, then upload the file and enter the password.

Certificate Restore
File Sharing
The GCC601X(W) devices have a USB port that can be used for file sharing, either using a USB flash drive or a Hard Drive, enabling clients with Windows, Mac, or Linux to access files easily on the local network. There is also an option to enable a password for security reasons. Navigate to System Settings  File Sharing.
File Sharing
RADIUS
RADIUS is a distributed, client /server information exchange protocol that can protect the network from unauthorized access. It is often used in various network environments that require high security and allow remote users to access it. This protocol defines the UDP-based RADIUS packet format and its transmission mechanism and specifies destination UDP ports 1812 and 1813 as the default authentication and accounting port numbers, respectively. Radius provides access services through authentication and authorization and collects and records the use of network resources by users through accounting. The main features of RADIUS protocol are client/server mode, secure message exchange mechanism, and good expansibility. To add a RADIUS to the GCC Networking module, navigate to Networking  System Settings  RADIUS, then click on the "Add" button to add a new RADIUS.
Note: Multiple RADIUS can be added.

Name
Authentication Server
RADIUS Accounting Server RADIUS NAS ID Attempt Limit RADIUS retry timeout (s) Accounting Update Interval (sec)

Add RADIUS
Defines the name of the RADIUS Server
The "Authentication server" in RADIUS sets the server responsible for verifying user credentials during network access attempts.The authentication server(s) will be used in the displayed order (top to bottom), and RADIUS servers will be used after these authentication servers, you can define the server address , port number and secret key in the authentification server, you can define up to two authentification servers.
The RADIUS accounting server specifies the server responsible for logging and tracking user network usage data. you can define up to two RADIUS Accounting Servers
Configure the RADIUS NAS ID with up to 48 characters. Supports alphanumeric characters, special characters "~! @ # %&* () -+=_" and spaces
Sets the max number of packet sending attempts to the RADIUS server
Sets the max time to wait for RADIUS server response before resending RADIUS packets
Sets the frequency for sending accounting updates to the RADIUS server, measured in seconds. Enter a number from 30 to 604800. If the external splash page has also configured this, that other value will take priority.
Add RADIUS

Return to the main page



References

Adobe Acrobat Pro (32-bit) 24.2.20687