IPv4/IPv6Get the URL for this explanation.
IPv4 and IPv6 are used to connect networks and PCs to each other.
Both IPv4 (Internet Protocol Version 4) and IPv6 (Internet Protocol Version 6) are used for Internet communication.
Because most IPv4 addresses have already been distributed, it has become difficult to acquire new addresses. This is why plans are underway to transition to IPv6.
IPv6 multicastingGet the URL for this explanation.
With IPv6 multicasting, you can use the IPv6 protocol to send data to multiple specified PCs.
IPv6 multicasting enables efficient delivery by making it possible for multiple PCs to receive the data sent in a single transmission from the sending side.
Yamaha routers offer the following IPv6 multicasting functions.
MLDv1/v2, MLD proxy
VLANGet the URL for this explanation.
You can use VLANs to create virtual groups on a single physical network and configure multiple LANs.
VLAN tagsGet the URL for this explanation.
You can attach headers to packets that control the range within which communication can take place. These headers are referred to as tags.
LAN divisionGet the URL for this explanation.
In a LAN interface that has a switching hub, you can use LAN division to assign a different network to each port and use the ports as multiple virtual LAN interfaces.
LAN1 port divisionGet the URL for this explanation.
In a LAN interface that has a switching hub, you can use LAN1 port division to split ports into multiple groups and refuse communications from outside the groups.
This enables you to secure communications with a WAN while preventing communications between LAN terminals. This increases each terminal's independence, improves resistance to viruses, and improves overall security within the LAN.
NATGet the URL for this explanation.
Network Address Translation
You can use NAT to convert the address section of an IPv4 header. NAT is primarily used to convert a private address within a company or household into a global address that can be used to connect to the Internet.
Masquerade NATGet the URL for this explanation.
You can use masquerade NAT, which is an expansion of NAT, to share one global address between multiple PCs. To accomplish masquerade NAT, the router converts the UDP/TCP port number in addition to the address.
SNMPGet the URL for this explanation.
Simple Network Management Protocol
You can use SNMP to manage devices and monitor operational states over a network. There are manager and agent functions. The manager monitors the agent. Yamaha routers support agent functions.
UPnPGet the URL for this explanation.
Universal Plug and Play
UPnP can be used to transfer the information necessary for communication between a network device and a terminal. When NAT is used, the ports for each application must be opened and registered, but UPnP can be used to configure these settings automatically.
BackupGet the URL for this explanation.
You can use the backup function with multiple lines to establish alternate routes for use when there is a problem with the main line.
VRRPGet the URL for this explanation.
Virtual Router Redundancy Protocol
You can use VRRP to establish redundant default gateway devices. Even if there is a problem with the main gateway device, the router will automatically switch to a backup gateway device and continue communication.
Floating static routesGet the URL for this explanation.
You can use floating static routes to assign preferences to dynamic route information and static route information when performing backup. If some type of problem prevents the acquisition of dynamic route information, the router will refer to the static route information and create an alternative path for communication.
Network backupGet the URL for this explanation.
In network backup, the router regularly pings the opposing device to confirm reachability, and if reachability cannot be confirmed because of an error or some other problem, the router redirects communications through a separate preset route. This function eliminates the need for the exchange of dynamic route information and provides a backup structure with a light load.
RIP/RIP2Get the URL for this explanation.
Routing Information Protocol/RIP Version 2
You can use RIP/RIP2 to dynamically exchange route information. The number of hops (the number of routers that the information is passed through before it reaches the target network) is used as an index for selecting the optimum route information.
RIP2 is an expanded version of RIP that has added support for VLSM, etc.
OSPFGet the URL for this explanation.
Open Shortest Path First
You can use OSPF to dynamically exchange route information. The cost value (the numerical representation of the network bandwidth that is traversed to reach the target network) is used as an index for selecting the optimum route information.
BGP4Get the URL for this explanation.
Border Gateway Protocol version 4
You can use BGP4 to dynamically exchange route information. BGP4 is primarily used in cases where high reliability is required, such as when providers exchange route information. BGP4 enables you to precisely control how the route that is used is chosen from the received route information.
RIPngGet the URL for this explanation.
RIP next generation
This is a version of RIP that supports IPv6. RIPng is fundamentally the same as RIP2.
IPsecGet the URL for this explanation.
IP Security Architecture
You can use IPsec to encrypt IP packets. IPsec is primarily used as a method for communicating safely over the Internet by encrypting all the original packets and attaching a new IP header.
PPTPGet the URL for this explanation.
Point to Point Tunneling Protocol
PPTP is an encryption protocol proposed by Microsoft.
IPIPGet the URL for this explanation.
IPv4 over IPv4
You can use IPIP to add additional IP headers to IP packets. IPIP does not offer encryption, so it should be used in closed network services and other environments in which safe communications are provided. Because IPIP does not make the router perform encryption processing, which imposes a heavy load on a router, it makes high-speed communication possible.
L2TP/IPsecGet the URL for this explanation.
You can access to LAN securely through L2TP/IPsec with Smartphone & Tablets.
FirewallGet the URL for this explanation.
A firewall is an apparatus that is placed in a location in contact with unspecified communication destinations, such as devices for connecting to the Internet, and that blocks unnecessary external communications.
Static packet filteringGet the URL for this explanation.
Static packet filtering enables you to specify the communication type of a packet passing through a network device using the IP address, port number, etc., and pass or block the packet in accordance with preset conditions.
Dynamic packet filteringGet the URL for this explanation.
In dynamic packet filtering, the router automatically determines whether communication is from an already trusted source, such as a terminal on the LAN side, and generates and removes packet filters as necessary.
IDSGet the URL for this explanation.
Intrusion Detection System (unauthorized access detection)
You can use IDS to detect attacks and intrusion from unauthorized packets that use IP, ICMP, UDP, TCP, FTP, SMTP, etc., and discard the packets as necessary.
MAC address filteringGet the URL for this explanation.
You can use MAC address filtering to allow packets to pass or discard them according to their MAC addresses.
DHCP client authenticationGet the URL for this explanation.
You can use DHCP client authentication to control the networks that terminals can access by distinguishing between terminals on the LAN for which communication with a specific network is permitted and those for which communication is not permitted.
DHCP clinet authentication enables you to prevent a terminal brought in from the outside that doesn't have permission from connecting to a network.
URL filteringGet the URL for this explanation.
URL filtering enables you to control Web access. When URL filtering is performed using an internal database, the router determines whether to allow a connection to a particular URL based on the URL character string.
P2P detection protectionGet the URL for this explanation.
You can use P2P detection protection to detect and block communications by the filesharing software Winny.
- This function is compatible with Winny Version 2 & Share Version 1.
Examples of logs from when Winny filtering is used
Unauthorized access detection history
Priority QueuingGet the URL for this explanation.
You can use priority control to send packets with higher priorities from the router first. The router can identify packets by their IP addresses, port numbers, etc., and prioritize the transmission of data that it is important to send in real time and data whose loss you want to minimize as much as possible.
ShapingGet the URL for this explanation.
You can use bandwidth control to control the amount of traffic for each type of data sent from the router.
The router can identify packets by their IP addresses, port numbers, etc., and transmit the packets such that each type of traffic remains below its specified limit.
This enables you to use multiple services in a network environment while minimizing the influence that the services have on each other.
DTC(Dynamic Traffic Control) QueingGet the URL for this explanation.
Dynamic traffic control is an expanded version of bandwidth control. When the traffic on a line is heavy, communication is performed so as to protect the specified bandwidths, but when the traffic on a line is light, communication is allowed to exceed the specified bandwidths.
Dynamic traffic control enables you to use a line's bandwidth effectively.
Dynamic Class ControlGet the URL for this explanation.
Dynamic class control is an expanded version of bandwidth control. You can use dynamic class control to identify communication that is taking up line bandwidth and dynamically change the bandwidth that the communication can use.
When a terminal is infected with a virus and is generating massive levels of traffic or when a terminal is using filesharing software and taking up too much bandwidth, dynamic class control can be used to dynamically reduce the bandwidth that is available to the terminal and reduce its impact on other terminals.
Bandwidth detectionGet the URL for this explanation.
Bandwidth detection enables more accurate QoS control for changing bandwidths
In bandwidth detection, routers that are connected over the Internet send and receive bandwidth detection packets to measure the effective bandwidth at different points in time.
You can use the effective bandwidth as a guide for performing efficient communication by linking QoS functions to the measured effective bandwidth.
Problems with conventional QoS configuration
The transfer bandwidth between the center and the other locations is set using intuition.
QoS using bandwidth detection
The effective bandwidth between the center and the other locations is measured regularly, and the results affect the transfer bandwidth.
Load notificationGet the URL for this explanation.
More reliable reception is possible, even during instances of concentrated communication traffic.
When a center location connected to multiple other locations is subjected to a high load, it can use load notification to send a control packet to the routers at the other locations that instructs the routers to reduce their traffic levels, and the routers that receive the control packets will reduce their traffic levels in accordance with the load condition of the center location.
By maintaining the stability of the center location, where the load is concentrated, you can create an environment that supplies stable service.
Problems with conventional traffic concentration
The sum of the traffic from the other locations exceeds the capacity of the center router.
Load notification results in appropriate traffic control.
The traffic from the other locations is limited according to the capacity of the center router.
CLIGet the URL for this explanation.
Character-based User Interface
You can use CLI to connect to the router's setup screen through a console connection, Telnet, SSH, etc., and enter commands directly.
For details about the commands, see the command reference.
Telnet/SSHGet the URL for this explanation.
You can use Telnet or SSH to remotely control a terminal on the network through TCP/IP.
In Telnet, the packets that are sent over the network and used for remote control are not encrypted, but in SSH, the packets are encrypted.
GUIGet the URL for this explanation.
Graphical user interface
You can use a terminal's Web browser to connect to the router's Web interface and configure settings mostly using the mouse.
Custom GUIGet the URL for this explanation.
Users can prepare their own HTML files to display unique GUIs. You can use custom GUIs to simplify configuration by arranging all of the desired settings on a single page and to add settings that are not supported by the standard GUI.
Management and operationExpand
Multiple configurationsGet the URL for this explanation.
You can save multiple configurations in the router's internal memory. You can determine which configuration to use by using commands or by selecting a configuration when you start the router.
By saving multiple configurations, you can easily switch between configurations for testing and operation.
External memory supportGet the URL for this explanation.
External memory support (microSD cards and USB flash drives)
External memory support includes maintenance and support functions that use external memory devices such as USB flash drives and microSD cards. External memory support includes:
- The saving and copying of logs, firmware, config files, and Lua scripts.
- Starting a router using firmware and config files saved on external memory.
List of supported memory devices and functions
|Supported memory devices||microSD||Yes|
|USB flash drive||Yes|
|Supported functions||Saving log files||Yes|
|Copying of setup files||Yes|
|Copying of firmware||Yes|
|Output of statistics||Yes|
|Starting from the external memory||Yes|
Power-off log savingGet the URL for this explanation.
In power-off log saving, when you turn off the power using the power switch, the router saves the operation log in its memory to non-volatile memory and then switches to standby mode. This enables you to view the operation log from before you turned off the power the next time you turn on the router.
When the router is operating unstably, you can remedy the situation quickly by restarting the router, and because the operation log is saved, you can also ascertain the cause of the router's unstable operation.
DOWNLOAD buttonGet the URL for this explanation.
The DOWNLOAD button makes updating the firmware easy.
The DOWNLOAD button is for updating the router's firmware.
You can easily use the most recent version of the firmware by simply pressing the DOWNLOAD button.
NetVolante DNSGet the URL for this explanation.
The NetVolante DNS service offered by Yamaha opens up a new horizon of possibilities.
NetVolante DNS is a unique dynamic DNS service supported by Yamaha routers.
What is the NetVolante DNS service?
To set up a server and make a Webpage available on the Internet or share files over the Internet, you need to make sure that the people who you want to use the services you are providing know your global IP address. However, if you are using a service that does not provide you with a fixed global IP address, even if you have a permanent Internet connection, the global IP address that is assigned to you may change each time you connect to the Internet and as time passes, and it will be difficult for you to make your server available. As a means of solving this problem, Yamaha operates and offers a dynamic DNS service called the NetVolante DNS service free of charge. If you use this service, it will report your global IP address each time it changes and enable you to use a fixed host name. Even if you have not purchased a fixed IP address service, you can operate any type of server from your home using a unique domain and make it available to the public, or you can use PPTP to create a VPN and exchange data with an outside source. The NetVolante DNS service may be terminated without warning.
SchedulerGet the URL for this explanation.
You can use the scheduler to enter a command into a specified time slot and change the settings or perform a specific operation. You can change the filtering settings depending on the time or synchronize the time to an NTP server.
Lua scriptGet the URL for this explanation.
You can run Lua scripts on the router. By using a Lua script to specify operating conditions that match the usage environment of each user, you can monitor the network condition, send e-mails to the administrator when there is a problem, and automatically change the router's settings depending on the situation.
USB data communication device Get the URL for this explanation.
You can connect a USB data communication terminal to a USB port and transfer data. This enables you to construct a broadband network in an area where wired Internet is not available or at a construction site or temporary storefront where no lines have been installed.
"L2 Smart Switch SWX2200" controlGet the URL for this explanation.
Router cooperation enables centralized management through integrated operation with compatible routers.
You can control SWX2200s using a Yamaha router. You can manage the SWX2200 settings and status from the router's GUI. You can also monitor and dynamically control the SWX2200 using the router's built-in SNMP functions and its Lua script functions.