Home
English Manual
Contents
1. IKE Mode Main Pre sharedKey 12345678 Local IO Type Default l E lO Content i Remote ID Type Default lO Content Hash Function MDS w Encryption 3DES v DH roup MODP1024 DH2 w IPSec Proposal ESF Authentication MDS Encryption 3DES vi C AH Authentication MDS w Perfect Forward Secrecy None v Phase 1 IKEJSA Lifetime 480 Phase 2 IPSec 60 mints minis PING for keepalive None ee 0 0 0 Interval 10 seconds 0 0 0 0 MEVER Disconnection Time after Taan 1850 seconds 180 atleast Reconnection Time 3 mines 3 atleast VPN Tunnels Edit Active Mame Local Subnet Remote Subnet Remote Gateway IPSec Proposal Delete i Description Name IPSec_Branch Given a name of IPSec connection Office Select Subnet from Local Network drop Local Network Subnet Sawer ens IP Address 192 168 0 0 N E E 255 255 255 0 Remote Secure Gateway IP 69 12113 IP address of the head office router in WAN or Hostname side Remote Network na Subnet from Remote Network drop own menu IP Address 192 168 1 0 255 255 255 0 29 ice network Authentication Encryption 3DES Prefer Forward Security Security plan Pre shared Key 12345678 28 Chapter 4 Configuration English Manual Example Configuring a IPSec Host to LAN VPN Connection Head Office Public IP Public IP i 69 121 1 30 69 121 1 3 192 168 1 254 E lt gt Internet kd
2. English Manual Configure a WON device Give your network a name Choose a name that pecple who connect te your network will recognize Network name SSID wps_test You can type up te 32 letters or numbers Step 4 Enter the Passphrase and apply Next button Configure a WCN device Help make your network more secure with a passphrase Windows will use the passphrase provided below to generate a WPA security key for you The first time that people connect to this network they will need the passphrase Passphrase ndhwWkrIFuPsOFcEzvry55 The passphrase must be at least amp characters and cannot begin or end with a space W Display characters Create a different passphrase for me Show advanced network security options Cancel Step 5 WCN set up complete And you have set up security enabled Wi Fi networks 96 Chapter 4 Configuration English Manual e Configure a WCN device Configured the selected device for wps_test Ff this can be used wirelessly you can disconnect the cable To use this with other network computers you might need to install the appropriate drivers first Chose Chapter 4 Configuration 57 English Manual Adding a new WPS device wireless client to a network Use PBC Method Step 1 Push AP s WPS button more than one second and you will see AP s WLAN led will flashing per second Step 2 Open wireless client s WPS utility select Join a
3. Rule Mame Helper Time schedule Source IP Address es Destination IP Address es Type source Port Destination Port Inbound Outbound Edit Delete 2 Choose the radio button you want to delete the existing HTTP rule delete the existing HTTP rule f Configuration Packet Filter Parameters Fule Mame Helper Time Schedule Source F Addresses Destination IP Address es Type source Port Destination Fort Inbound Outbound Source IF f Metmask Edit Rule Name Time Schedule Protocol 1 Destination IP f Metmask Destination portis g 0 0 0 0 0 0 0 0 O 65535 lei http Always On TOP 0 0 0 0 0 0 0 0 80 80 0 0 0 0 7 0 0 0 0 0 65535 O lei_dns Always On UDP 0 0 0 0 7 0 0 0 0 Aa 54 Chapter 4 Configuration eo Select oa Always On 3 0 0 0 0 Metmask 0 0 0 0 Metmask Toe R LIDP tt Protocol Number F TCPRIUDP Lise Protocol Number Alloys Allow zx Select v lei http Always Or i 0 0 0 0 Metmask 0 0 0 0 Netmask ka Protocol Number ii A gr O jes w Block s UE Allows Source portis 0 0 0 0 0 0 0 0 I ae Click Edit Delete button to 0 0 0 0 Inbound Outbound Block Alloy Block Alloy O O Delete 02 English Manual 3 Input the Rule Name Time Schedule Source Destination IP Type Source Destination Port Inbound and Outbound Example Application Cindy HTTP Time Sched
4. This equipment has been tested and found to comply with the limits for a Class B Digital device pursuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures e Reorient or relocate the receiving antenna e Increase the separation between the equipment and receiver e Connect the equipment into an outlet on a circuit different from that to which the receiver is connected e Consult the dealer or an experienced technician for help You are cautioned that changes or modifications not expressly approved by the party responsible for compliance could void your authority to operate the equipment This device complies with part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 This device must accept any interference received including interference that may cau
5. A company s office establishes a PPTP VPN connection with a file server located at a separate location The router is installed in the office connected to a couple of PCs and Servers Office LAN Public IP 69 12 1 1 33 192 168 1254 Server Router Encryption Data PPTP Client PPTP Server VPN Connection Dial out oe 192 168 1 0 24 PPTP VPN Remote Access Dial out d Chapter 4 Configuration English Manual Configuring the PPTP VPN in the Office Click Configuration VPN PPTP Choose Remote Access from Connect Type drop down menu You can either input the IP address 69 1 121 33 in this case or hostname to reach the server Configuration ae aj PPTP Parameters Name 1 Connection Type 2 Type 3 server IP Address or Domain Name 69 121 1 33 Usemame 4 Password Cee gt Auth Type ChaptAuto Data Encryption Key Length Mode stateful Active as default route Enable Edit Active Name Connection Type Type Delete Description VPN_PPTP Given name of PPTP connection Connection Type Peemot Access Select Remote Access from Connection Type drop down menu Select Dial out from Type drop down menu 4 Address or 69 121 1 33 An Dialed server IP omain name Aore enea 7 canine aaa Keep as default value in most of the cases PPTP server amp client will determine the value automatically Refer to manual for details if you want to change the setting IGS Chapter 4 Configu
6. BIND Ye CONNECTION PERFECTION 3G ADSL2 802 119 VPN Router User Manual English LINDY No 52043 www LiINDY com C For Home and Office Use Tested to Comply wi ee ae LINDY ELECTRONICS LIMITED amp LINDY ELEKTRONIK GMBH FIRST EDITION Apr 2010 English Manual Table of Content INTRODUCTION TO YOUR ROUTER ko tetas a oder EET AT 3 FEATURE oases sis cst hn ise sane se setion E E EE EE AS 3 IMPORTANT NOTE FOR USING THIS ROUTER u ccc ee ccseccsscessceesscescensscescens 6 CRG COIN TEIN Wise cst atc es EE EAE E EAEE EAE 7 THE FRONT LEDS eee te caerewoderectnses seuss cktecdunateacisevedeusdsqatelcos E AN E EAE Ea EAEAN 8 THE RP PARTOR TS oer E EE 9 CABEN oe EEEE E E 10 CONNECTING YOUR ROUTER ccc eccccecccscccesccesscessccesccessscesscessceesscesseeesseesscessseencs 12 FACTORY DEFAULT SETTINGS woe icc cecccscccesccessccesccescceesseesccesceesceesceeesseeceueeees 21 Web Interface Username and Password vcssesvesesavcaneataviencortassvennddeeexoviwenanstarvovedebastvesedeewvelavensestens 21 DECE LAN I SO S o E E S N O E E E A 2l ra a 17 E E A E E N A E E E E 2d POT T SIV e E E E 21 LAN and WAN PON Addes SCS erran rE EE Eai 21 INFORMATION FROM YOUR ISP sectors essere EOE ENE NEATE 22 CONFIGURING WITH YOUR WEB BROWSER aaeenssensensssserssessssssrssssssrssesserssrssesserssrsseoserseresese 23 STATU e A A 25 AD E O eE E E E E E caress oSeae oe aeasee 25 IIS EEEE anos ESAE E NEA AE E E A TEE AE 26 E SIG e AE A 27 S S a
7. Channel ID Select the ID channel that you would like to use Security Mode You can disable or enable with WPA or WEP for protecting wireless network The default mode of wireless security is Disable 7 Wait for the configuration 39 Chapter 4 Configuration English Manual i Quick Start WAN Port WAN gt Wireless Save configuration Save Config to FLASH Please wait for 5 seconds Bf ouics Start amp WAN Port WAN gt Wireless Process finished Success The Quick Start process is finished Your device has been successfully configured 8 When ADSL is synchronic it will appear check i Status Device Information Physical Port Status Model Name SG ADSL 2 802 119 VPN Firewall Ethernet Router w E EWAN System Up Time 3 days 3 hours ADSL re Z ks Hardware Version Solos USB ADSL MAVG v1 00 Software Version 5 53 56 b1 dg4 Wireless p 3G WAN Port Protocol VPIVCI Connection IP Address Subnet Mask Default Gateway Primary DNS Checking username and password ADSL PPPoE 6 35 0 0 0 0 0 0 0 0 0 0 0 0 Disconnect 40 Chapter 4 Configuration English Manual Configuration When you click this item you get following sub items to configure the ADSL router LAN WAN System Firewall VPN QoS Virtual Server Wake on LAN Time Schedule and Advanced These functions are described below in the following sections 41 Chapter 4 Configuration English Manual
8. L2ZTP Parameters Name Connection Type Rem ate Access E Type Dial out w sewer IF Address or Domain Name p Username o Password Auth Type Chap auto vl Active as Tunnel c authentication H Enable Betiz default Enable route Remote Host _ ye Name Local Host NameiOptional Optional IPSec Enable Authentication Encryption Perfect Forward Fre shared Key Secrecy Edit Active Name Connection Type Type Delete Connection Type Remote Access or LAN to LAN Name A given name for the connection e g connection to office Active This function activates or deactivates the L2TP connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active checkbox is checked the function of Edit and Delete will not be available Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server When configuring your router as a Client enter the remote Server IP Address or Hostname you wish to connection to When configuring your router as a server enter the Private IP Address Assigned to Dial in User address Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user server enter your own username Password If you are a Dial Out user client enter the pas
9. LAN Local Area Network Here are the items within the LAN section Bridge Interface Ethernet IP Alias Ethernet Client Filter Wireless Wireless Security Wireless Client Filter WPS Port Setting and DHCP Server Bridge Interface 1 Configuration i Xe aj t Bridge Interface Parameters Bridge Interface WYLAN Port ethernet Flr Flp lP3 P4 ethernet Fi F2 P3 P4 ethernet F1 P P3 P4 ethernet3 F1 F2 Pa P4 Device Management hlanagement Interface ethernet You can setup member ports for each VLAN group under Bridge Interface section From the example two VLAN groups need to be created Ethernet P1 Port 1 Ethernet1 P2 P3 and P4 Port 2 3 4 Uncheck P2 P3 P4 from Ethernet VLAN port first Note You should setup each VLAN group with caution Each Bridge Interface is arranged in this order Bridge Interface VLAN Port Always starts with ethernet Pi P2 P3 P4 etherneti P2 P3 P4 ethernet2 P3 P4 ethernet3 Management Interface To specify which VLAN group has possibility to do device management like doing web management Note NAT NAPT can be applied to management interface only 42 Chapter 4 Configuration English Manual Ethernet Configuration t Ethernet Primary IP Address Subnet Mask 255 265 as o RIP O RP O RIP C RIF v Multicast Primary IP Address IP Address The default IP on this router Subnet Mask The default subnet mask
10. Block suiting by IP address Domains Filtering Restrict URL Features Apply Exception List Enable Disable To enable or disable URL Filter feature Block Mode A list of the modes that you can choose to check the URL filter rules The default is set to Always On Disabled No action will be performed by the Block Mode Always On Action is enabled URL filter rules will be monitoring and checking at all hours of the day TimeSloti TimeSlot16 It is self defined time period You may specify the time period to check the URL filter rules i e during working hours For setup and detail refer to Time Schedule section Keywords Filtering Allows blocking by specific keywords within a particular URL rather than having to specify a complete URL e g to block any image called advertisement gif When enabled your specified keywords list will be checked to see if any keywords are present in URLs accessed to determine if the connection attempt should be blocked Please note that the URL filter blocks web browser HTTP connection attempts using port 80 only For example if the URL is htip Awww abc com abcde html it will be dropped as the keyword abcde occurs in the URL nO Chapter 4 Configuration English Manual i Configuration Keywords Filtering Create Block WEB URLs which contain these keywords Name Keyword Delete Return p Domains Filtering This function checks the whole URL not the IP
11. C2684 VPI VCI VC LLC based multiplexing IP address Subnet mask Gateway IPoA RFC1577 address and Domain Name System DNS IP address it is a fixed IP address Pure Bridge VPI VCI VC LLC based multiplexing to use Bridged Mode 22 Chapter 3 Basic Installation English Manual Configuring with your Web Browser Open your web browser enter the IP address of your router which by default is 192 168 1 254 and click Go a user name and password window prompt will appear The default username and password are admin and admin respectively See Figure 3 14 Connect to 197 168 1 254 User name CF admin Ww Remember my password Figure 3 14 User name amp Password Prompt Window Congratulations You are now successfully logon to the Router 23 Chapter 3 Basic Installation English Manual Chapter 4 Configuration At the configuration homepage the left navigation pane where bookmarks are provided links you directly to the desired setup page including Status ADSL Status 3G Status EWAN Status iBurst Status ARP Table DHCP Table Routing Table NAT Sessions UPnP Portmap PPTP Status IPSec Status L2TP Status Email Status Event Log Error Log Diagnostic e Quick Start Configuration LAN WAN System Firewall VPN QoS Virtual Server Wake on LAN Time Schedule Advanced e Language provides user interface in E
12. Configuration Device Management Device Host Name Host Name Embedded Web Server HTTP Port Management IF Address Management IF Netmask Management IF Addressi2 Management IF Netmask Expire to auto logout Universal Plug and Play UPnP UPnP UPnP Port SNMP Access Control SNMP SNMP V1 and V2 Read Community Write Community Trap Community SNMP V3 Username Access Right home gateway 60 is default HTTP part 0 0 0 0 means Any 255 255 255 255 seconds Enable Disable 2800 Enable Disable IP Address 0 0 0 0 IP Address 0 0 0 0 Read Read Write IP Address Oo This seling will become efective aler you save to fash and restart the router When you enable remote access please disadlefenadle the remote access to update the HTTP por Device Host Name Host Name Give a name for it The Host Name cannot be used with one word only There are two words should be connected with a at least Example Host Name homegateway gt Incorrect Host Name home gateway or my home gateway gt Correct dG Chapter 4 Configuration English Manual Embedded Web Server 2 Management IP Accounts HTTP Port This is the port number the router s embedded web server for web based configuration will use The default value is the standard HTTP port 80 Users may specify an alternative if for example they are running a web server on a PC within their LAN
13. IfMIB v ifMIBObjects Group From RFC1695 atmMIB M atmMIBObjects From RFC 1907 SNMPv2 M only snmpSetSerialNo OID IGMP IGMP known as Internet Group Management Protocol is used to management hosts from multicast group Configuration ng a FIGMP Parameters IGMP Forwarding Enable Disable IGMP Snooping OQEnable Disable Apply IGMP Forwarding Accepting multicast packet Default is set to Enable IGMP Snooping Allowing switched Ethernet to check and make correct forwarding decisions Default is set to Disable VLAN Bridge This section allows you to create VLAN group and specify the member i Configuration i ws aj VLAN Bridge Parameters Mame VLAN ID Tagged Ports UnTagged Parts Edit Delete Detaultylan 1 Mone ethernet wireless wireless w lt ds wireless wads wireless wds3 wireless wds4 Edit Create WLAN Edit Edit your member ports in selected VLAN group Create VLAN To create another VLAN group ed Chapter 4 Configuration English Manual Logout To exit the routers web interface choose Logout Please ensure that you have saved the configuration settings before you logout Be aware that the router is restricted to only one PC accessing the configuration web pages at a time Once a PC has logged into the web interface other PCs cannot get access until the current PC has logged out of the web interface If the previous PC forgets to logout the second PC can access the page after a
14. The input format is in HEX style 10 and 26 HEX codes are required for WEP64 and WEP128 respectively 49 Chapter 4 Configuration English Manual Wireless Client MAC Address Filter The MAC Address supports up to 16 wireless network machines and helps you manage your network control to accept traffic from specific authorized machines or to restrict unwanted machine s to access your LAN There are no pre define MAC Address filter rules you can add the filter rules to meet your requirements f coutiguration 1 Wireless Client MAC Address Filter Filtering Rules Filter Action Disable Allowed Blocked MAC Address List Candidates gt sd isd Apply Wireless Client Filter Default setting is set to Disable Allowed To authorize specific device accessing your LAN by insert the MAC Address in the space provided or click 4 4 5 Make sure your PC s MAC is listed Blocked To prevent unwanted device accessing the LAN by insert the MAC Address in the space provided or click 4235 Make sure your PC s MAC is not listed The maximum client is 16 The MAC addresses are 6 bytes long they are presented only in hexadecimal characters The number 0 9 and letters a f are acceptable Note Follow the MAC Address Format xx xx xx xx xx xx Semicolon must be included Candidates it automatically detects devices connected to the router through the Wireless candidates _ Associated
15. WinNuke Port 135 137 139 Scan Scan M D ne E E 5 D O O O O O n O U U U U U U U Flag URG ICMP type 8 Des IP is broadcast Land attack SrcIP DstIP UDP Echo Port and Echo CharGen Scan CharGen Port UDP T Port Echo 7 UDP Dst Port CharGen Scan CharGen 19 TCP Flag SYN FIN DstPort IMAP 143 SrcPort 0 or 65535 TCP SYN FIN RST ACK _ No Existing session Scan And Scan Hosts more than five TCP No Existing session met BUS SCAN DstPort Net Bus 12345 12346 3456 UDP DstPort Back Orifice Scan Orifice port 31337 Max TCP Open SYN Flood Handshaking Count Default 100 c sec Max ICMP Count ae GOS Default 100 c sec Max PING Count A SOMG Default 15 c sec po Src IP Source IP Src Port Source Port Dst Port Destination Port Dst IP Destination IP IMAP SYN FIN Scan 06 Chapter 4 Configuration English Manual URL Filter URL Uniform Resource Locator e g an address in the form of http Awww abcde com or http Awww example com filter rules allow you to prevent users on your network from accessing particular websites by their URL There are no pre defined URL filter rules you can add filter rules to meet your requirements i Configuration we ai URL Filter Configuration URL Filtering O Enable Disable Black Mode Keywords Filtering C Enable Details C Enable Details gt C Disable all WEB traffic excepttor Trusted Domains L Block Java Applet _
16. Windows XP Router Encryption Data IPSec a IPSec VPN Connection eai IPSec VPN Host to LAN S S Chapter 4 Configuration English Manual Configuring IPSec VPN in the Office Configuration 4 AS a PSec Parameters Name Pse O Local Network Subnet IP Address 192 468 4 0 Netmask 255 255 255 0 Remote Secure Gateway IF 69 12 1 1 30 Remote Network Single Address v IP Address 69 12 121 1 30 IKE Mode Main js Pre shared Key 12345678 Local ID Type Default v IDContent Remote ID Type Defaut ID Content Hash Function mos w Encryption 3DES v DH Group MODP 1024 DH2 l IPSec Proposal ESF Authentication MDS Encryption 3DE v C 4H Authentication MDS w Perfect Forward Secrecy MODP1024 DH E Phase 1 KE SA Lifetime 80 phase 2 Psec 60 mints min s PING for keepalive None aaora Le Jinteval 10 seconds meee ici E s0 e seconds 180 atleast Reconnection Time o minis 3 atleast VPN Tunnels Edit Active Name Local Subnet Remote Subnet Remote Gateway IPSec Proposal Delete Item f Function Description 1 Name IPSec Given a name of IPSec connection Local Network Subnet Select Subnet from Network drop down menu IP Address 192 168 1 0 Netmask DEE DEE DBB O Head office network Remote Secure Gateway IP 69 194 1 30 Remote worker s IP address or H
17. AP s MAC Address 3 Peer WDS MAC Address It is the third associated AP s MAC Address 46 Chapter 4 Configuration English Manual 4 Peer WDS MAC Address It is the fourth associated AP s MAC Address Note For MAC Address Semicolon must be included Chapter 4 Configuration 47 English Manual Wireless Security You can disable or enable with WPA or WEP for protecting wireless network The default mode of wireless security is disabled i Configuration 1 a Wireless Security Parameters Security ode Disable v WPA PSK WPA2 PSK WEP Configuration 4 y Wireless Security Parameters Security bode WPA PSK w Group Key Renewal laoo 5econgs Security Mode You can disable or enable with WPA or WEP for protecting wireless network The default mode of wireless security is Disable WPA Algorithms There are two types of the WPA PSK WPA PSK and WPA2 PSK The WPA PSK adapts the TKIP Temporal Key Integrity Protocol encrypted algorithms which incorporates Message Integrity Code MIC to provide protection against hackers The WPA2 PSK adapts CCMP Cipher Block Chaining Message Authentication Code Protocol of the AES Advanced Encryption Security algorithms WPA Shared Key The key for network authentication The input format is in character style and key size should be in the range between 8 and 63 characters Group Key Renewal The period of renewal time for changing the security key autom
18. Ackiwity Aeceiwed Bptez l 1 749 Figure 3 2 LAN Connection Status 4 Select Internet Protocol TCP IP and click Properties Local Area Connection Properties See Figure 3 3 General Authentication Advanced __ Connect using BS 4SUSTeK Broadcom 440x 10 100 Integrated Controller This connection uses the following items v Client for Microsoft Networks wi i File and Printer Sharing for Microsoft Networks i x QoS Packet Scheduler Internet Protocol TCP IP Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected Figure 3 3 TCP IP Internet Protocol TCP IP Properties General Alternate Configuration 5 Select the Obtain an IP address automatically and Obtain DNS server address automatically radio buttons See Figure 3 4 6 Click OK to finish the configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses L Se Figure 3 4 IP Address amp DNS Configur
19. Add Edit Application Time Schedule Protocol External Fot RedirectPort IP Address Interface Delete HTIP_Server Always On icp 80 80 80 80 192 166 1 101 ipwan C Intrusion Detection i Configuration AE Intrusion Detection Parameters Intrusion Detection victim Protection Block Duration stan Attack Block Duration DOS Attack Block Duration Maximum TCF Open Handshaking Count Waximum Ping Count Maximum ICMP Count Enable Disable seconds 06400 seconds 1800 seconds Oo per second 5 per second 100 per second Apply Clear Blacklist The router s Intrusion Detection System IDS is used to detect hacker attacks and intrusion attempts from the Internet If the IDS function of the firewall is enabled inbound packets are filtered and blocked depending on whether they are detected as possible hacker attacks intrusion attempts or other connections that the router determines to be suspicious Blacklist If the router detects a possible attack the source IP or destination IP address will be added to the Blacklist Any further attempts using this IP address will be blocked for the time period specified as the Block Duration The default setting for this function is false disabled Some attack types are denied immediately without using the Blacklist function such as Land attack and Echo CharGen scan Intrusion Detection If enabled IDS will block Smurf attack attempts Default is false Block Duration V
20. Edit Delete to save your changes a 9 40 Chapter 4 Configuration English Manual Example Configuring a IPSec LAN to LAN VPN Connection Branch Office Head Office Public IP Public IP 192 168 0 254 69 127 17 1 30 69 121 1 3 192 168 1 254 Router Router Encryption Data IPSec lt 1 S IPSec VPN Connection 192 168 0 0 24 192 168 1 024 IPSec VPN LAN to LAN Table 3 Network Configuration and Security Plan Branch ice Head fice Remote Network ID 192 168 0 0 24 Security Algorithm Both office LAN networks MUST in different subnet with LAN to LAN application Functions of Pre shared Key VPN Connection Type and Security Algorithm Attention MUST BE identically set up on both sides 2G Chapter 4 Configuration English Manual Configuring IPSec VPN in the Head Office E Configuration 4 a ie IPSec Parameters Mame IPSec _HeadoOffice Local Network Subnet IP Address 192 168 1 0 Netmask 255 255 255 0 Remote Secure Gateway IP 69 1 71 41 30 Remote Network Subnet IP Address 192 168 0 0 Netmask 255 255 255 0 KE Mode Man w Presharedkey 1224567 LocalID Type Default v lDOContent l Remote ID Type Default Ib Content Hash Function MDs v Encryption DES v DHGroup MODP1024 DH2 v IPSec Proposal ES
21. GMT Time GMT Greenwich Mean Time v 4 carl css gov 2 india colorado edu SNTP Server IP Address l ns 3 Itime nist gov AL time b nist gov Daylight Saving Enabled Resync Period mints W The router does not have a real time clock on board instead it uses the Simple Network Time Protocol SNTP to get the current time from an SNTP server outside your network Choose your local time zone click Enable and click the Apply button After a successful connection to the Internet the router will retrieve the correct local time from the SNTP server you have specified If you prefer to specify an SNTP server other than those in the list simply enter its IP address as shown above Your ISP may provide an SNTP server for you to use Daylight Saving is also known as Summer Time Period Many places in the world adapt it during summer time to move one hour of daylight from morning to the evening in local standard time Check Automatic box to auto set your local time Resync Period in minutes is the periodic interval the router will wait before it re synchronizes the router s time with that of the specified SNTP server In order to avoid unnecessarily increasing the load on your specified SNTP server you should keep the poll interval as high as possible at the absolute minimum every few hours or even days 86 Chapter 4 Configuration English Manual Remote Access
22. Management IP Address You may specify an IP address allowed to logon and access the router s web server Setting the IP address to 0 0 0 0 will disable IP address restrictions allowing users to login from any IP address Expire to auto logout Specify a time frame for the system to auto logout the user s configuration session For Example User A changes HTTP port number to 100 specifies their own IP address of 192 168 1 55 and sets the logout time to be 100 seconds The router will only allow User A access from the IP address 192 168 1 55 to logon to the Web GUI by typing http 192 168 1 254 100 in their web browser After 100 seconds the device will automatically logout User A Universal Plug and Play UPnP UPnP offers peer to peer network connectivity for PCs and other network devices along with control and data transfer between devices UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings removing the need for the user to control advanced configuration of their device Both the user s Operating System and the relevant application must support UPnP in addition to the router Windows XP and Windows Me natively support UPnP when the component is installed and Windows 98 users may install the Internet Connection Sharing client from Windows XP in order to support UPnP Window
23. Provider ISP automatically In the LAN site the DHCP server can allocate a range of client IP addresses and distribute them including IP address subnet mask as well as DNS IP address to local computers It provides an easy way to manage the local IP network Static and RIP1 2 Routing It has routing capability and supports easy static routing table or RIP1 2 routing protocol Simple Network Management Protocol SNMP lt is an easy way to remotely manage the router via SNMP Web based GUI lt supports web based GUI for configuration and management It is user friendly and comes with on line help It also supports remote management capability for remote users to configure and manage this product Firmware Upgradeable Device can be upgraded to the latest firmware through the WEB based GUI Rich Management Interfaces It supports flexible management interfaces with local console port LAN port and WAN port Users can use terminal applications through the console port to configure and manage the device or Telnet WEB GUI and SNMP through LAN or WAN ports to configure and manage the device Chapter1 Introduction 5 English Manual Chapter 2 Installing the Router Important note for using this router Do net use the router in high humidity or high temperatures Do not use the same power source for the router as other equipment A Do not open or repair the case yourself lf the router is too hot turn off the Warning powe
24. Second Se ATM Class UBR ka Username oo Fassword oOo O service Name eoo o NAT C Enable IP 0 0 0 0 Auto Auth Protocol Idle Timeout minis MTU RIP LJ RIP vi LJ RIP v2 U RIP v2 Multicast TCP MSS Clamp Enable z A i Automatic Primary Secondary t Multipe Session Third Session _ Enable Connection Always On t Multipe Session Fourth Session C Enable Edit Name Description Creator VPI YEI Delete wanlink PPPoE WAN Link Factory Defaults 8 35 Configure the detailed information for your second connection like the previous one 11 Chapter 4 Configuration English Manual EWAN Obtain an IP Address Automatically When connecting to the ISP This router also functions as a DHCP client It can automatically obtain an IP address netmask gateway address and DNS server addresses if the ISP assigns this information via DHCP i Configuration YWAN Connection Obtain an IP Address Automatically Profile Port EWAN 3 WAN Port Ethernet Pot 41 Frotocol Obtain DNS Automatic Primary jo000 secondary Profile Port Select the profile port as EWAN Protocol Select Obtain an IP Address Automatically a gt NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing the single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled Obtain DNS Select Autom
25. a E E cance cee eaescsesees nam tcte ood dec oacseeeaeeacmenees 28 PRI TOU AE E EE EE 29 D E O sess das EA E E E A 30 E a TOC EEE E EE A EE E EE E E 31 NAL OOS OS ea AE ENOR 32 TAFTO e A AE E ere ee E ee ree 32 PPIP S Er E E E E EEE EO 33 C E E E E T E 33 LLP 0111 a A E E E EAE AE E E EA 34 A S E E EEE E E A T aie uectneaeasiaseeee 34 E LON eria N E E E E E E 35 D E E ET AEE E IE A AE E A E E A E ere 35 DOS e A E E E E E E E E eee ds 36 OUIRE T ET e E E E nescence adorn 37 CONFIGURA TKIN NEE EEE E 41 LAN LOCO ATUN IWON aa E 42 VAN SWIC FON CIV OG airea TE 64 SV SPOIL x quvetustscostnes S E E E E E E E SO PUOW A Access CONTO osser neces onacet mone EEE ETER 94 VPN Virtaal Private NetWOTKS sccdsnsutssdisecesetaswiavaddsvsslecdsviestdducbeuielendewndiavesbacddudessdetnbereabesaauonsebves 112 QoS Quality of Service a ssawiderscipsvonisacdasscatasawts anbaganconsnw bbs cnldssacdnanedbdabusascosaandb aediessaenarediedeievaccand 144 Virtual Server known AS Port Forwarding ccccccccssecccccceceeeeeseeeeeeaeeeeeeeeee ae neeeeeeeaaaeeeeeeesaaaneeeeeeeas 153 WY OP TAIN aarp cst pace sees ss ean eae eis si gests cis E A EA ET 161 TUE DS CCQ aa cb sccnc sete osnnsesesadessneascascvesieetisinaseed case sdanewadaeesavasieteneosens acaseeasecnoee 162 VEN GAY G1 1G 0 RRR EE ROR EOT TR OT PI TRE nT Oo nay eee oe nae ee eee eee ee 164 LOGOUT oee eee ren re yr restr nmr ene er ne ere enemy me EA re 172 PROBLEMS STARTING UP THE ROUTER ec ceccccsccc
26. address in URLs accessed against your list of domains to block or allow If it is matched the URL request will be sent Trusted or dropped Forbidden For this function to be activated both check boxes must be checked Here is the checking procedure 1 Check the domain in the URL to determine if it is in the trusted list If yes the connection attempt is sent to the remote web server 2 If not check if it is listed in the forbidden list If yes then the connection attempt will be dropped 3 If the packet does not match either of the above two items it is sent to the remote web server 4 Please be note that the completed URL www domain name shall be specified For example to block traffic to www qoogle com au enter www qoogle or www google com In the example below the URL request for www abc com will be sent to the remote web server because it Is listed in the trusted list whilst the URL request for www google or www google com will be dropped because www google is in the forbidden list IB Chapter 4 Configuration English Manual i Configuration Domains Filtering Domain Name ee ti ts sizC Type Forbidden Domain Trusted Domain Mame Domain Delete itemo www abe P Forbidden Domain Name Domain Delete itemi www google O Return p Example Andy wishes to disable all WEB traffic except for ones listed in the trusted domain which would prevent Bobby from accessing other web sites
27. address will be sent SNMP Traps SNMP V3 Specify a name and password for authentication And define the access right from identified IP address Once the authentication has succeeded users from this IP address will be able to view and modify the data S E 0 Chapter 4 Configuration English Manual SNMP Version SNMPv2c and SNMPv3 SNMPv2c is the combination of the enhanced protocol features of SNMPv2 without the SNMPv2 security The c comes from the fact that SNMPv2c uses the SNMPv1 community string paradigm for security but is widely accepted as the SNMPv2 standard SNMPv3 is a strong authentication mechanism authorization with fine granularity for remote monitoring Traps supported Cold Start Authentication Failure The following MIBs are supported From RFC 1213 MIB Il M System group Interfaces group Address Translation group IP group ICMP group TCP group N WN N N A AW UDP group x EGP not applicable N Transmission m SNMP group From RFC1650 EtherLike MIB M dot3Stats From RFC 1493 Bridge MIB M dot1dBase group M dotidTp group v dot1dStp group if configured as spanning tree From RFC 1471 PPP LCP MIB M pppLink group pppLar group not applicable From RFC 1472 PPP Security MIB M PPP Security Group G O A 0 Chapter 4 Configuration English Manual From RFC 1473 PPP IP MIB M PPP IP Group From RFC 1474 PPP Bridge MIB M PPP Bridge Group From RFC1573
28. automatically detect capability of your ADSL line mode Please keep the factory setting unless ADSL is detected as the symptom of synchronization problem Profile Type Please keep the factory settings unless ADSL is detected as the symptom of low link rate or unstable problems You may need to change the profile setting to reach the best ADSL line rate it depends on the different DSLAM and location Activate Line Aborting false your ADSL line and making it active true again for taking effect with setting of Connect Mode Coding Gain It reduces routers transmit power which will effect to routers downstream performance Higher the gain will increase the downstream rate but it sometimes causes unstable ADSL line The configurable ADSL coding gain is from 0 dB to 7dB or automatic Tx Attenuation It is the amount of power that modem upstream or DSLAM downstream Is using The lower the power the better the performance will be in modem upstream Elapsed Time This is the ADSL connection uptime 85 Chapter 4 Configuration English Manual System Here are the items within the System section Time Zone Remote Access Firmware Upgrade Backup Restore Restart User Management and Mail Alert Time Zone l Configuration Ii Time Zone Parameters Time Zone Enable Disable Time Zone List By City By Time Difference Local Time Zone
29. check the 2 octet of each IP packet If the value in the TOS field matches the checked values in the table O to 63 this packet will be treated as high priority a 9 Y Chapter 4 Configuration English Manual DHCP Server You can disable or enable the DHCP Dynamic Host Configuration Protocol server or enable the routers DHCP relay functions The DHCP protocol allows your router to dynamically assign IP addresses to PCs on your network if they are configured to obtain IP addresses automatically f contiguration 1 a t DHCP Server Configuration Disable DHCP Serer Mode DHCP Server DHCP Relay Agent Mext DHCP Server Status Allow Bootp true Allow Unknown Clients true Enable true Subnet Definitions Subnet Value 192 168 1 0 Subnet Mask 255 255 255 0 bWaximnum Lease Time SH400 seconds Default Lease Time 43700 seconds Use local host address as ONS server true Use local host address as default gateway true Get subnet trom IP interface iplan IP Range 792 768 7 700 792 768 7 799 Option domainname serers 0 0 0 0 To disable the router s DHCP Server check Disabled and click Next then click Apply When the DHCP Server is disabled you will need to manually assign a fixed IP address to each PCs on your network and set the default gateway for each PCs to the IP address of the router by default this is 192 168 1 254 To configure the router s DHCP Server check DHCP Server and click Next You can then conf
30. connecting to the router You can easily by checking the box next to the IP address to be blocked or allowed Then Add to insert to the Ethernet Client Filter table The maximum Ethernet client is 16 Wireless l Configuration 1 VVireless Parameters WLAN Service Enable Disable Mode AO 11b q ESSID Broadcast Enable Disable Regulation Domain Channel ID Channel 1 2 412 GHz Tx PowerLevel 1 127 Connected true AF MAC address 00 04 ed a3 1b 45 AP Firmware Version 2 17 33 0 WMM OcEnable Disable Wireless Distribution System WDS WDS Service OcEnable Disable 1 Peer WDS MAC address 00 00 00 00 00 00 2 Peer WDS MAC address 00 00 00 00 00 00 3 Peer WDS MAC address 00 00 00 00 00 00 4 Feer WDS MAC address 00 00 00 00 00 00 Parameters WLAN Service Default setting is set to Enable If you do not have any wireless both 802 11g and 802 11b device in your network select Disable Mode The default setting is 802 11b g Mixed mode If you do not Know or have both 11g and 11b devices in your network then keep the default in mixed mode From the drop down manual you can select 802 11g if you have only 11g card If you have only 11b card then select 802 11b ESSID The ESSID is the unique name of a wireless access point AP to be distinguished from another For security purpose change the default wlan ap to a unique ID name to the AP which is already built in to the router s wireless
31. extends the VPN negotiation time Diffie Hellman is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups Pre shared Key This is for the Internet Key Exchange IKE protocol a string from 4 to 128 characters Both sides should use the same key IKE is used to establish a shared security policy and authenticated keys for services such as IPSec that require a key Before any IPSec traffic can be passed each router must be able to verify the identity of its peer This can be done by manually entering the pre shared key into both sides router or hosts R EG Yo Chapter 4 Configuration English Manual Click Edit Delete to save your changes Example Configuring a L2TP VPN Remote Access Dial in Connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft s VPN Adapter included with Windows XP 2000 ME etc The router is installed in the head office connected to a couple of PCs and Servers Office LAN Public IP 61 56 158 112 197 168 1254 Remote Worker Encryption Data L2TP Client VPN Connection 192 168 1 0 24 L2TP VPN Remote Access Dial in 434 Chapter 4 Configuration English Manual Configuring L2TP VPN in the Office The input IP addres
32. i Configuration aj Remote Access You may temporarily permit remote administration of this network device Allow Access for 30 minutes 0 means allowed always To temporarily permit remote administration of the router i e from outside your LAN select a time period the router will permit remote access for and click Enable You may change other configuration options for the web administration interface using Device Management options in the Advanced section of the GUI If you wish to permanently enable remote access choose a time period of 0 minute 8 Chapter 4 Configuration English Manual Firmware Upgrade f Configuration Firmware Upgrade You may upgrade the system software on your network device New Firmware Image o Ee Your router s firmware is the software that allows it to operate and provides all its functionality Think of your router as a dedicated computer and the firmware as the software it runs Over time this software may be improved and revised and your router allows you to upgrade the software it runs to take advantage of these changes Clicking on Browse will allow you to select the new firmware image file you have downloaded to your PC Once the correct file is selected click Upgrade to update the firmware in your router Don t power down the router or interrupt the firmware while itis still in process Improper opteration could damage the router Warning 88 Chapter 4 Config
33. interface It is case sensitive and must not excess 32 45 Chapter 4 Configuration English Manual characters Make sure your wireless clients have exactly the ESSID as the device in order to get connected to your network Note It is case sensitive and must not excess 32 characters ESSID Broadcast It is function in which transmits its ESSID to the air so that when wireless client searches for a network router can then be discovered and recognized Default setting is Enabled Disable If you do not want broadcast your ESSID Any client uses any wireless setting cannot discover the Access Point AP of your router Enable Any client that using the any setting can discover the Access Point AP in Regulation Domain There are seven Regulation Domains for you to choose from including North America N America Europe France etc The Channel ID will be different based on this setting Channel ID Select the wireless connection ID channel that you would like to use Note Wireless performance may degrade if select ID channel is already being occupied by other AP s TX PowerLevel It is a function that enhances the wireless transmitting signal strength User may adjust this power level from minimum 1 up to maximum 127 Note The Power Level maybe different in each access network user premises environment and choose the most suitable level for your network Connected Representing in true or false That it is the c
34. interface which also provides details on the number of new messages waiting See the Status section of this manual for more information Configuration y AS ej Check Email Parameters Check Email OQEnable Disable Account Mame Password POPS Mail Server Period BO minutes Dial out for Checking Emails C Automatic Check Email Disable Check to disable the router s Email checking function Enable Check to enable the routers Email checking function The following fields will be activated and required Account Name Enter the name login of the POP3 account you wish to check Normally it is the text in your email address before the symbol If you have trouble with it please contact your ISP Password Enter the account s password POP3 Mail Server Enter your POP mail server name You Internet Service Provider ISP or network administrator will be able to supply you with this Period Enter the value in minutes between periodic mail checks Dial out for checking emails When the function is enabled your ADSL router will connect to your ISP automatically to check emails if your Internet connection dropped Please be careful when using this feature if your ADSL service is charged by time online S E 0 6 Chapter 4 Configuration English Manual Device Management The Device Management advanced configuration settings allow you to control your router s security options and device monitoring features
35. of transmission count for this call Current RX Bytes Packets The statistics of receive count for this call Total TX Bytes Packets The statistics of transmission count from system ready Total RX Bytes Packets The statistics of receive count from system ready 26 Chapter 4 Configuration English Manual EWAN Status Besides using 3G ADSL to get connected to the Internet the router offers its Ethernet port 1 as a WAN port to be used to connect to Cable Modems and fiber optic lines This alternative yet faster method to connect to the internet will provide users more flexibility to get online i Status Ti ay EWAN Status Parameters Total TX Bytes Packets 07M 1194 Total RX Bytes Packets O 1M 682 Total TX Bytes Packets The statistics of total data transmission in bytes packets since system ready Total RX Bytes Packets The statistics of total data received in bytes packets since system ready 21 Chapter 4 Configuration English Manual iBurst Status Displays additional information of the 3G status when iBurst function is enabled in the 3G configuration such as its signal strength card name connection status and port class Ethernet li Status 41 amp iBurst USB status Parameters Version 1 00 Fort Class Ethernet trug Modem Attached false Connected false Card Name MA signal strength NA otatus iBurst Card not found MAC 00 04 ed a3 1b 46 Tx Error Packets 0 Rx Error Pa
36. security level of data protection and access control via Wireless LAN Fast Ethernet Switch A 4 port 10 100Mbps fast Ethernet switch is built in with automatic switching between MDI and MDI X for 10Base T and 100Base TX ports An Ethernet straight or crossover cable can be used directly for auto detection Chapter1 Introduction 3 English Manual Multi Protocol to Establish a Connection lt supports PPPoA RFC 2364 PPP over ATM Adaptation Layer 5 RFC 1483 encapsulation over ATM bridged or routed PPP over Ethernet RFC 2516 and IPoA RFC1577 to establish a connection with the ISP The product also supports VC based and LLC based multiplexing Quick Installation Wizard lt supports a WEB GUI page to install this device quickly With this wizard end users can enter the information easily which they get from their ISP then surf the Internet immediately Universal Plug and Play UPnP and UPnP NAT Traversal This protocol is used to enable simple and robust connectivity among stand alone devices and PCs from many different vendors It makes network simple and affordable for users UPnP architecture leverages TCP IP and the Web to enable seamless proximity networking in addition to control and data transfer among networked devices With this feature enabled users can now connect to Net meeting or MSN Messenger seamlessly Network Address Translation NAT Allows multi users to access outside resources such as the Internet simultaneou
37. t Time Schedule Mame Day Clsun Mon H Tue ved Thu lv Fri C Sat Start Time os w 00 End Time 18 m 00 iv Time Slot Edit ID Mame Day in a week Start Time End Time Delete TimeSloatt SMTVVTFs 08 00 18 00 O C 2 Timeslot2 SMTVYTFs 0s 00 18 00 ry cr a TimeSlotg SMTVVTFs 08 00 18 00 Fy C 4 TimeSlot4 SMTVVTFs 08 00 18 00 E C 5 TimeSlots SMTVVTFs 08 00 18 00 5O C Bi Time slots SMTVYTF Ss 08 00 18 00 O T TimeSlot SMTVVTFs 08 00 18 00 O C 5 Time Slot SMTVVTFs 08 00 18 00 O Fl q TimeSlotg SMTVVTFs 08 00 18 00 Cy C 10 TimeSloti 0 SMTVVTFs 08 00 18 00 O C 11 TimeSloti 1 SMTVYTFs 0s 00 18 00 O OC 12 TimeSlott 2 SMTVVTFs 08 00 18 00 n OC 13 TimeSloti 3 SMTVVTFs 08 00 18 00 Cy na 14 TimeSloti 4 SMTVVTFs 08 00 18 00 O O 15 Time stot 4 SMTVYTFS 08 00 18 00 O ng 16 TimeSlott 6 SMTVVTFs 08 00 18 00 O nn Chapter 4 Configuration English Manual Configuration of Time Schedule Edit a Time Slot 1 Choose any Time Slot ID 1 to ID 16 to edit click Edit radio button f conttauration we amp Time Schedule Mame Timesloti Day Osun M mon Tue Ml ved Thu Ml Fri C Sat Start Time 0e gl p b Edit Delete Time Slot Exit ID Mame Day in a week Start Time End Time Delete TimeSloti SMTVWTF E 08 00 16 00 C 2 TimeSlot2 ShMTVWTF 08 00 18 00 C 3 TimeSlot3 shiTVTF s 08 00 18 00 GC Note Watch it carefully the days you have selected will present
38. wireless network and apply next button Note After you push AP s WPS button below steps should be completed between 2 minutes is Jompstart Wi Fi Protected Setup Welcome to Jumpstart Wi Fi Protected Setup This application wall vide vou through the wireless network configuration process What do vou want to do Configure a wireless network Add another device to my wireless network JUMPSTART Step 3 Select Push the button on my access point and apply next button Pa Jumpstart Wi Fi Protected Setup Join a Wireless Network Jumpstart i preparing to join vour computer to a wireless network Which setup method do you want to use Enter a PIN into my access point or a registar C Enter the PIN from my access point Push the button on your access point and click Next to continue Automatically select the network Step 4 New WPS device have join into the wireless network 58 Chapter 4 Configuration English Manual Js Jumpstart Wi Fi Protected Setup Jumpstart for Wireless Confituranon Successfully Done Configuration Information sell WirlsNHetworklSa0 Chapter 4 Configuration 59 English Manual Adding a new WPS device wireless client to a network Use PIN Method Step 1 Open wireless client s WPS utility select Join a wireless network and apply next button is Jumpstart Wi Fi Protected Setup Welcome to Jumpstart Wi Fi Protected Setu
39. 0 0 Auto Auth Protocol Connection Always On Idle Timeout mints MTU RIP LJ RIF vi CJ RIP v2 O RIP v2 Multicast TCP MSS Clamp Enable z Enable oo oo _ oo _ oo__ foo 00 Obtain DNS Automatic Primary joooo secondary joo0o0 Edit Name Description Creator VPI VC Delete wanlink PPPoE WAN Link Factory Defaults 0 a3 Profile Port Select the profile port as ADSL Protocol The ATM protocol will be used in the device Description A given name for the connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer Username Enter the username provided by your ISP You can input up to 128 alphanumeric characters case sensitive This is in the format of username ispname instead of simply username Password Enter the password provided by your ISP You can input up to 128 alphanumeric characters case sensitive Service Name This item is for identification purposes If it is required your ISP provides you the information Maximum input is 15 alphanumeric characters NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing the single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled 66 Chapter 4 Configuration English Manual IP 0 0 0 0 Auto Your WAN IP address Leave thi
40. 0 Allow 0 0 0 0 7 0 0 0 0 0 65535 Block O mei_dns Always On UDP O 0 0 0 0 7 0 0 0 0 5353 Allow j 97 Chapter 4 Configuration English Manual Example Predefined Port Filters Rules The predefined port filter rules for High Medium and Low security levels are listed See Table 1 Note Firewall All Blocked User defined you must define and create the port filter rules yourself No predefined rule is being preconfigured Table 1 Predefined Port Filter Shale Firewall Low Firewall Medium Firewall High Application Protocol Start end Inbound Outbound Inbound Outbound Inbound jOutbound HTTP 0 TOPE oe amp fs alc e ED Telnet 23 2E O YE O U Cp SMTP 25 TCP 6 PoPa NCPC fe NEWS NNTP Network News TCP 6 Transfer Protocol me fn RealAudio RealVideo UDP 17 7070 7070 7070 pina _ ICMPCr R 32301720 TCP I E aE a pen VEDIO Inbound Internet to LAN Outbound LAN to Internet ms 4 Q O vj y Scc ma 98 Chapter 4 Configuration English Manual YES Allowed NO Blocked N A Not Applicable Packet Filter Add TCP UDP Filter i Configuration t Packet Filter Parameters Rule Mame Helper Je 5elect w Time Schedule Always On w Source IP Address es 0000 e Metmask 0000 Destination IP Addresses 0000 Metmask 0000 Type TCRUDP Protocol Number Source Part fr 65535 Destination Pott lose Inbound Allow Ou
41. 50 Usemame username Password wane Auth Type Chap Auto iv Tunnel manne Active as f Enable Secret E Enable Authentication default route Remote Host es Name Optional Local Host Name Optional IPsec Enable Authentication MDS Encryption 3DES ow Pee eee None wv Pre shared Key 42345678 i Secrecy Oo LS Edit Active Name Connection Type Type Delete __ Function Description _ Type Dialout______ Select Dial out from drop down menu IP Address or Hostname Peer Network IP Nemak Head office network Input username amp password to authenticate head Otice NOWO 6 Auth Type Chap Auto Keep as default value in most of the cases Both sites should use the same value 43 Chapter 4 Configuration English Manual QoS Quality of Service QoS function helps you to control your network traffic for each application from LAN Ethernet and or Wireless to WAN Internet It facilitates you to control the different quality and speed of through put for each application when the system is running with full loading of upstream Here are the items within the QoS section Prioritization and Outbound Inbound IP Throttling bandwidth management Prioritization There are three priority settings to be provided in the Router High Normal The default is normal priority for
42. Andy selects both functions in the Domain Filtering and thinks that it will stop Bobby But Bobby knows this function Domain Filtering ONLY disables all WEB traffic except for Trusted Domain BUT not its IP address If this is the situation Block surfing by IP address function can be handy and helpful to Andy Now Andy can prevent Bobby from accessing other sites Restrict URL Features This function enhances the restriction to your URL rules Block Java Applet This function can block Web content that includes the Java Applet It is to prevent someone who wants to damage your system via standard HTTP protocol Block surfing by IP address Preventing someone who uses the IP address as URL for skipping Domains Filtering function Activates only and if Domain Filtering enabled S E 01 Chapter 4 Configuration English Manual IM P2P Blocking IM short for Instant Message is required to use client program software that allows users to communicate in exchanging text message with other IM users in real time over the Internet A P2P application Known as Peer to peer is group of computer users who share file to specific groups of people across the Internet Both Instant Message and Peer to peer applications make communication faster and easier but your network can become increasingly insecure at the same time IM and P2P blocking helps users to restrict LAN PCs to access to the commonly used IM Yahoo and MSN and P2P BitTorrent a
43. Description Transport Control Protocol Intemet Protocol The default wide area network protocol that provides communication across erse interconnected networks Lok __ cma Figure 3 12 TCP IP 3 Select the Obtain an IP address from a DHCP server radio reper button and click OK See Figure 3 13 P Aditess DNS WINS Addex Ronal n IF address can be automaticaly assigned bo this network card by a DHICP server IF your retak doss mot have a DHCP server ask pour nebvork adovnistrator for an address and then bene Itin the space below w Obtain an lP address from a GHCP server Specity an IP addes Peders Ei eles Figure 3 13 IP Address 20 Chapter 3 Basic Installation English Manual Factory Default Settings Before configuring your you need to know the following default settings Web Interface Username and Password h Username admin Password admin The default username and password are admin and admin respectively If you ever forget the username password to login to the router you may press the RESET button up to 6 seconds to restore the factory default settings Caution After pressing the RESET button for more than 6 seconds to be sure you Attention power cycle the device again Device LAN IP settings hm IP Address 192 168 1 254 lh Subnet Mask 255 255 255 0 ISP setting in WAN site h PPPoE DHCP server lm DHCP server is ena
44. Deutschland Die Europaische Union hat mit der WEEE Direktive umfassende Regelungen fur die Verschrottung und das Recycling von Elektro und Elektronikprodukten geschaffen Diese wurden von der Bundesregierung im Elektro und Elektronikgerategesetz ElektroG in deutsches Recht umgesetzt Dieses Gesetz verbietet vom 24 Marz 2006 an das Entsorgen von Elektro und Elektronikgeraten Uber die Hausmulltonne Diese Ger te m ssen den lokalen Sammelsystemen bzw rtlichen Sammelstellen zugef hrt werden Dort werden sie kostenlos entgegen genommen Die Kosten fur den weiteren Recyclingprozess bernimmt die Gesamtheit der Geratehersteller C LINDY No 52043 1 Edition April 2010 FC www lindy com
45. E F HeadOffice lantolan dialin E G F BranchOffice lantolan dialout O Name BranchOffice Given a name of PPTP connection Connection Type LAN to LAN oe LAN to LAN from Connection Type drop down Select Dial out from Type drop down menu 69 121 1 33 IP address of the head office router in WAN side IP Address or Domain name Peer Network IP 192 168 1 0 o a oce nonon 255 255 255 0 Input username amp password to authenticate head office 123456 network Auth Type Chap Auto Keep as default value in most of the cases PPTP Data Encryption server amp client will determine the value automatically Key Length Refer to manual for details if you want to change the stateful Ser 20 Chapter 4 Configuration English Manual IPSec IP Security Protocol i Configuration PSec Parameters Name Local Network single Address Remote Secure Gateway IP Po Remote Network single Address IKE Mode Local ID Type Remote ID Type Hash Function IPSec Proposal ESP JAH Perfect Forward Secrecy Phase 4 IKE SA Lifetime MODP1024 DH2 mints FING for kKeepalive Disconnection Time after 480 no traffic Reconnection Time 3 minis 2 atleast VPN Tunnels Edit Active Name Local Subnet Remote Subnet IF Address IF Address Pre shared Key lDContent ID Content tM 3DES Encryption DH Group Encryption 3DES w MODP1024 DH2 MOS w Authenti
46. Fort Mode Parameters WAN WAN Time schedule Keep Backup Interface Connected Connectivity Decision Failover Probe Cycle Fallback Probe Cycle Detect Rule either one Main Port Select Dual WAN a gt W ADSL Current Main Port ADSL ADSL Dual WAN Dual WAN Current Main Port ADSL Failover Always On LJ Enable Notin service when probing failed afterl5 consecutive times Every 12 seconds Every 3 seconds 1 ADSL Down 2 Ping Fail O No Ping O Fing Gateway OPingHost o Mode Failover Set to trigger ADSL 3G failover function ready Chapter 4 Configuration 64 English Manual WAN1 Select ADSL EWAN or 3G mode for WAN1 WAN2 Select the left WAN mode for WAN2 as backup port eg If 3G is set for main port then there can be no option for failover failback Time Schedule A self defined time period You may specify a time schedule for your prioritization policy For setup and detail refer to Time Schedule section Keep Backup Interface Connected Select Enable this function the backup WAN port will connect always Connectivity Decision Set how many times of probing failed to switch backup port Failover Probe Cycle Set the time duration for the Failover Probe Cycle to determine when the router will switch to the backup connection backup port once the main connection main port fails Note The time set is for each probe cycle but the decision to
47. Forward Mone Both sites should use the same value Secrecy Pre shared Key 12345678 3 Chapter 4 Configuration English Manual Example Configuring your Router to Dial in to the Server Currently Microsoft Windows operation system does not support L2TP incoming service Additional software may be required to set up your L2TP incoming service L2TP Connection LAN to LAN a VA Configuration y AS gy L2TP Parameters Name ag Connection Type LAN to LAN hey Type Dial out w server IF Addresstor Domain Name o Feer Network race IP Lisername username Password Auth Type Chapt Auto w Active as Tunnel AC Authentication Enable Secret default Enable route Remote Host p Name Local Host NamefOptional Optional IPsec F Enable Authentication Encryption Perfect Forward Pre shared Key Secrecy Add Edit Active Name Connection Type Type Delete L2TP VPN Connection Name A given name of the connection Connection Type Remote Access or LAN to LAN Active This function activates or deactivates the L2TP connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active checkbox is checked the function of Edit and Delete will not be available Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check D
48. NAT The device can be configured as a virtual server so that remote users accessing services such as Web or FTP services via the public WAN IP address can be automatically redirected to local servers in the LAN network Depending on the requested service TCP UDP port number the device redirects the external service request to the appropriate server within the LAN network f Configuration 1 a Port Forwarding Add Virtual Server in pwan IP interface Virtual Server Entry Application e zg Protocal tcp ka Time Schedule External Port fom he0 Redirect Port from o deb Internal IF Address el Selete w Edit Delete Edit Application Time Schedule Protocol External Port Redirect Port IF Address Interface Delete S S 6 Chapter 4 Configuration English Manual Add Virtual Server Because NAT can act as a natural Internet firewall your router protects your network from being accessed by outside users when using NAT as all incoming connection attempts will point to your router unless you specifically create Virtual Server entries to forward those ports to a PC on your network When your router needs to allow outside users to access internal servers e g a web server FTP server Email server or game server the router can act as a virtual server You can set up a local server with a specific port number for the service to use e g web HTTP port 80 FIP port 21 Telnet port 23 SMTP port 25 or POPS po
49. P Authentication MDS w Encryption 3DES M C AH Authentication MDS w Perfect Forward Secrecy Mone v Phase 1 KE SA Lifetime 480 Phase 2 PSec 60 mines mings SSS PING for keepalive None l een 10 0 0 Interval 10 seconds O 0 0 0 WEVER Disconnection Time after 180 seconds 180 at least no traffic Reconnection Time 3 mints 3 atleast VPN Tunnels Edit Active Mame Local Subnet Remote Subnet Remote Gateway IPSec Proposal Delete po Function Description _ IPSec_HeadOffice Given a name of IPSec connection Local Network Select Subnet from Local Network drop down menu IP Address 192 168 1 0 255 255 2568 0___ 108d office network Remote Secure Gateway IP 69 121 1 30 IP address of the branch office router in or Hostname acid WAN side Select Subnet from Remote Network IP Address 192 168 0 0 Beanch otieenenvonk 255 255 255 0 Authentication Encryption 3DES Prefer Forward Securily a Oe Pre shared Key 12345678 2 Chapter 4 Configuration English Manual Configuring IPSec VPN in the Branch Office Bf corian ation i we IPSec Parameters Mame IPSec_B BranchOfice Local Netwark Subnet T IP Address 192 168 0 0 Netmask 255 255 255 0 _ Remote Secure Gateway IP 59 121 1 d Remote Network Subnet IP Address 192 168 1 0 Metmask 255 255 255 0
50. Table Note To be sure the router s in the backbones network have the capability in executing and checking the DSCP through out the QoS network Table 4 DSCP Mapping Table Gold serve L Sold sonics M Gold service H Silver service L Silver service M Silver service H Bronze service L Bronze service M Bronze service H IAS Chapter 4 Configuration English Manual Outbound IP Throttling LAN to WAN IP Throttling allows you to limit the speed of IP traffic The value entered will limit the speed of the application that you set to the specified value s multiple of 32kbps Configuration 4 a a F Outbound IP Throttling Configuration from LAN to WAN packet Mame Time Schedule Always On v Protocol Rate Limit 1 Pa kbps Source F Address Range Source portis 0 Destination IP Address Range Destination ports bo Ho Edit Application Time Schedule Protocal Rate Limit Delete Name User define description to identify this new policy name Time Schedule Scheduling your prioritization policy Refer to Time Schedule for more information Protocol The name of supported protocol Rate Limit To limit the speed of outbound traffic Source IP Address Range The source IP address or range of packets to be monitored Source Port s The source port of packets to be monitored Destination IP Address Range The destination IP address or range of packets to be monitored Destination Port s The destin
51. Wireless Clients Z hitp 192 168 1 254 Associated fa O fX Associated Wireless Clients 00 1 8 de 04 9d e8 Add Associate Wireless Client displays a list of individual wireless device s MAC Address that currently connects to the router You can easily by checking the box next to the MAC address to be blocked or allowed Then Add to insert to the Wireless Client MAC Address Filter table The maximum Wireless client is 16 50 Chapter 4 Configuration English Manual WPS WPS feature is follow Wi Fi Alliance WPS standard and it easily set up security enabled Wi Fi networks in the home and small office environment It is reduced by half the user steps to configure a network and supports two methods that are familiar to most consumers to configure a network and enable security i Configuration WPS Parameters WPS Serice O Enable Disable Role Registrar Enrollee WPS PIN fo 4g Enrollee s PIN Set up of security enabled Wi Fi network Step 1 Note down the AP s PIN from Web Ex 78749887 Step 2 Open wireless client s WPS utility Ex Atheros Jumpstart WPS utility select Configure a wireless network and apply next button Jumpstart Wi Fi Protected Setup Welcome to Jumpstart Wi Fi Protected Setup Thiz application will suide you through the wireles network configurathon process What do won want to do d C Join a wireless network C Add another device to my wireless netwo
52. al out Connection A company s office establishes a L2TP VPN connection with a file server located at a separate location The router is installed in the office connected to a couple of PCs and Servers Office LAN Public IP oe 69 12 L133 192 168 1 254 ie Sm Sa lt Server Router Encrption Data L TP Server L TP Client VPN Connection Dial out 192 168 1 0 24 L 2TP VPN Remote Access Dial out 86 Chapter 4 Configuration English Manual Configuring the L2TP VPN in the Office i Configuration LZTP Parameters Name VPN_L2TP Connection Type Remote Access Type Server F Address or Domain Name 69 121 1 33 Username Fassword Auth Type ChaptAuto Active as default Enable Tunnel Authentication L Enable Secret Remote Host Name Oooo Local Host NamefOptional Optional IPsec Enable Authentication MDS p Encryption 3DES we Perfect Forward Pre shared Key 12345678 Secrecy Add Edit Delete Edit Active Name Connection Type Type Delete O Function _ __ _ _ Description VPN_L2TP Given name of L2TP connection Connection Type Remote Access Select Remote Access from Connection Type drop down menu Select Dial out from Type drop down menu IP Address or 69 121 1 33 An Dialed server IP Hostname a peame me o o o o i Aa Keep as default value in most of the cases Enable for enhancing your L2TP VPN security Perfect
53. all of traffic without setting Low And the balances of utilization for each priority are High 60 Normal 80 and Low 10 To delete the application you can choose Delete option and then click Edit Delete i Configuration ye Prioritization Configuration from LAN to WAN packet Mame Time Schedule Always On Priority Protocol source IP Address Range Source Port loo Destination IP Address Range Destination Port loo DSCP Marking Edit Name Time Schedule Protocal Priority DSP Marking Delete Name User define description to identify this new policy application Time Schedule Scheduling your prioritization policy Priority The priority given to each policy application Its default setting is set to High you may adjust this setting to fit your policy application Protocol The name of supported protocol Source IP Address Range The source IP address or range of packets to be monitored Source Port The source port of packets to be monitored Destination IP address Range The destination IP address or range of packets to be monitored mA Chapter 4 Configuration English Manual Destination Port The destination port of packets to be monitored DSCP Marking Differentiated Services Code Point DSCP it is the first 6 bits in the ToS byte DSCP Marking allows users to assign specific application traffic to be executed in priority by the next Router based on the DSCP value See Table 4 The DSCP Mapping
54. an be disabled Obtain DNS Select Automatic to use DNS Primary DNS Secondary DNS Enter the IP addresses of the DNS servers The DNS servers arepassed to the DHCP clients along with the IP address and the subnet mask 79 Chapter 4 Configuration English Manual PPPoE PPPoE PPP over Ethernet provides access control in a manner which is similar to dial up services using PPP Configuration TE WAN Connection PPPoE Routed Profile Port WAN Port Ethernet Port 1 Username Password service Name IP 0 0 0 0 Auta Auth Protocol Chap Auto Connection AlwaysOn M Idle Timeout o mings MTU 1492 MAC Spoofing L Enable loo oo oo oo too oo Obtain DNS M Automatic Primary 0 0 0 0 Seconday foo00 Profile Port Select the profile port as EWAN Username Enter the username provided by your ISP You can input up to 128 alphanumeric characters case sensitive This is in the format of username ispname instead of simply username Password Enter the password provided by your ISP You can input up to 128 alphanumeric characters case sensitive Service Name Enter a name for this connection IP Your WAN IP address Leave this at 0 0 0 0 to automatically obtain an IP address from your ISP Connection Always on If you want the router to establish a PPPoE session when starting up and to automatically re establish the PPPoE session when disconnected by the ISP Connec
55. andwidth Voice application Voice is latency sensitive application Most VoIP devices are use SIP protocol and the port number will be assigned by SIP module automatically Better to use fixed IP address for catching VolP packets as high priority i Configuration Prioritization Configuration from LAN to WAN packet Mame Time Schedule Priority Protocal any Source IP Address Range Source Port Destination IP Address Range Destination Port al DSCP Marking Gold service iLi Ww Edit Delete Edit Mame Time Schedule Protocal Priority DSCP Marking Delete O PPTP Always On GRE High Gold service Li OC VoIP Always Or Ary High Gold service iLi CO Above settings will help to improve quality of your VoIP service when traffic is full loading Restricted Application a EO Chapter 4 Configuration English Manual Some of companies will setup FTP server for customer downloading or home user sharing their files by using FTP Configuration Prioritization Configuration from LAN to WAN packet Name Time Schedule Timesilotl Priority Protocol any Spurte IF Address Range Source Port Destination IP Address Range Destination Port DSCP Marking Edit Name Time Schedule Protocal Priority DSP Marking Delete b Ale le Always On GRE High Gold service Li C 3 YolP Always On Any High Gold service Li Restricted Time Slot Ary High Gold service Li O With above seitings that help to limit utilizati
56. aning that all inbound Internet to LAN and outbound LAN to Internet packets will be blocked Users have to add their own filter rules for further access to the Internet High Medium Low security level the predefined port filter rules for High Medium and Low security are displayed in Port Filters of Packet Filter select either High Medium or Low security level to enable the Firewall The only difference between these three security levels is the preset port filter rules in the Packet Filter Firewall functionality is the same for all levels it is only the list of preset port filters that changes between each setting For more detailed on level of preset port filter information refer to Table 1 Predefined Port Filter lf you choose of the preset security levels and add custom filters this level of filter rules will be saved even and do not need to re configure the rules again if you disable or switch to other firewall level The Block WAN Request is a stand alone function and not relate to whether security enable or disable Mosily it is for preventing any scan tools from WAN site by hacker i Configuration tT ai General Settings Firewall Security Security Enable Disable All blocked Lser defined High security level Policy i Medium security level Low security level LAr Fsome applications c Japik a er en ee Firewall please check the Packet Filter especially Port Filter rules rexample adding TC a ou
57. assigned automatically if your network supports Then click OK to exit the setting this capability Otherwise you need to ask your network administrator 7 Click OK again in the Local Area for the appropriate IP settings Connection Properties window to apply the new configuration Obtain an IP address automatically 6 Use the following IP address Internet Protocol Version 4 TCP TPv4 Properties Obtain DNS server address automatically 6 Use the following DNS server addresses Prerren H i i rl ee Advanced 16 Chapter 3 Basic Installation English Manual Configuring PCs in Windows XP 1 Goto Start Control Panel in Classic View In the Control Panel double click Network Connections 2 Double click Local Area Connection See Figure 3 1 amp Control Panel File Edit View Favorites Tools Help z wi J gt Search gt Folders Ei Address B Control Panel Vg Control Panel el Network Phone and Power Options Connections Modem See Also JaA gt Printers and Regional and Scanners and 2 Windows Update Faxes Language Cameras Help and Support 7 o OD g Scheduled Sounds and Speech Tasks Audio Devices E Switch to Category View 3 In the LAN Area Connection Status window click Properties See Figure 3 2 Local Area Connection Status General Support Connection Duration Speed Status Connected 00 05 34 100 0 Mbps
58. atic to use DNS Primary DNS Secondary DNS Enter the IP addresses of the DNS servers The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask Chapter 4 Configuration 78 English Manual Fixed IP Address select this option to set static IP information You will need to enter in the Connection type IP address netmask and gateway address provided to you by your ISP Each IP address entered in the fields must be in the appropriate IP form which is four IP octets separated by a dot x x x x The Router will not accept the IP address if it is not in this format i Configuration 1 VAN Connection Fixed IP Address Profile Port Protocal Fixed IP Address Ww IP 0 0 0 0 Auto Netmask Gateway Obtain DNS Automatic Primary secondary Profile Port Select the profile port as EWAN Protocol Select Fixed IP Address IP Your WAN IP address Leave this at 0 0 0 0 to automatically obtain an IP address from your ISP Netmask The default is 0 0 0 0 User can change it to other such as 255 255 255 0 Type the netmask assigned to you by your ISP if given Gateway You must specify a gateway IP address supplied by your ISP NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing the single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function c
59. atically between wireless client and Access Point AP Default value is 600 seconds 48 Chapter 4 Configuration English Manual WEP Configuration 1 aj Wireless Security Parameters Security hade WEP w WEP Authentication WEP Encryption WEPs4 O WEP128 Fassphrase Generate Default Used WEP Key ooo a nd Key 4 0000000000 sd HINT Input 10 hexadecimal digits 0 9 a f in Key WEP Authentication To prevent unauthorized wireless stations from accessing data transmitted over the network the router offers secure data encryption Known as WEP If you require high security for transmissions there are two options to select from Open System Share key WEP Encryption To prevent unauthorized wireless stations from accessing data transmitted over the network the router offers highly secure data encryption known as WEP If you require high security for transmissions there are two alternatives to select from WEP 64 and WEP 128 WEP 128 will offer increased security over WEP 64 Passphrase This is used to generate WEP keys automatically based upon the input string and a pre defined algorithm in WEP64 or WEP128 Default Used WEP Key Select the encryption key ID please refer to Key 1 4 below Key 1 4 Enter the key to encrypt wireless data To allow encrypted data transmission the WEP Encryption Key values on all wireless stations must be the same as the router There are four keys for your selection
60. ation 17 Chapter 3 Basic Installation English Manual Configuring PCs in Windows 2000 1 Go to Start Settings Control Panel In the Control Panel mmer ziga double click Network and Dial up Connections Fle gdt wew Favortes Tools Advanced Help E 2 Double click Local Area LAN Connection See Figure ap O oe e E 3 5 a o Network and Dial up Connections Local Area Connection Type LAN Connection Status Fnahled xi Figure 3 5 LAN Area Connection Local 4rea Connection Status 4 x 3 In the LAN Area Connection Status window click Properties See Figure 3 6 General Connection Statue Connected Duration 06 16 26 Speed 100 0 Mbps Avctryiky me Sent S71 Received L atk Packets 12 215 105 427 Properties Disable Figure 3 6 LAN Connection Status 21x General 4 Select Internet Protocol TCP IP and click Properties ae See Fi gure 3 7 ip ASUSTeK Broadcom 440x 10 100 Integrated Controller EA Components checked are used by this connection Client for Microsoft Networks W B File and Printer Sharing for Microsoft Networks Internet Protocol TCP IP Install Uninstall Properties Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks l Show i
61. ation English Manual Example Configuring L2TP LAN to LAN VPN Connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet The routers are installed in the head office and branch office accordingly Branch Office Head Office Public IF 192 168 0 2 69 121 1 33 192 168 1 2 es Internet kaai es gh Router Router E tian Dat L2TP Client ae ae eer VPN Connection 192 168 0 0 24 192 168 1 0 24 L2TP VPN LAN to LAN Both office LAN networks MUST in different subnet with LAN to LAN application Functions of Pre shared Key VPN Connection Type and Security Algorithm Attention MUST BE identically set up on both sides ees A Chapter 4 Configuration English Manual Configuring L2TP VPN in the Head Office The IP address 192 168 1 200 will be assigned to the router located in the branch office Please make sure this IP is not used in the head office LAN l Configuration y VAS 4 L2TP Parameters Name HeadOffice Connection Type LAN to LAN w Type Dialin i Private IP Address Assigned to Dialin user 192 168 1 200 TA Se pn O Netmask 255 255 255 0 Usemame usemame Password seeees qj Auth Type Chap Auto Active as Tunnel 7 l uinensicakon Enable Secret a oo default Enable route Remo
62. ation English Manual Packet Filter Add Raw IP Filter Go to Type drop down menu select Use Protocol Number f contauration t Packet Filter Parameters Rule Mame Helper fe zz Time Schedule Source F Address es Metmask Destination IP Addressfesi Metmask Type Use Protocol Wumber Protocol Number Source Port Destination Port Inbound Allow Outbound Allow Add Edit Delete Rule Name Helper Users define description to identify this entry or choosing Select drop down menu to select existing predefined rules Time Schedule It is self defined time period You may specify a time schedule for your prioritization policy For setup and detail refer to Time Schedule section Protocol Number Insert the port number i e GRE 47 Inbound Outbound Select Allow or Block the access to the Internet Outbound or from the Internet Inbound Click Add button to apply your changes S E Chapter 4 Configuration English Manual Example Configuring your firewall to allow a publicly accessible web server on your LAN The predefined port filter rule for HTTP TCP port 80 is the same no matter whether the firewall is set to a high medium or low security level To setup a web server located on the local network when the firewall is enabled you have to configure the Port Filters setting for HTTP As you can see from the diagram below when the firewall is enabled with one o
63. ation port of packets to be monitored dG Chapter 4 Configuration English Manual Inbound IP Throttling WAN to LAN IP Throttling allows you to limit the speed of IP traffic The value entered will limit the speed of the application that you set to the specified value s multiple of 32kbps Configuration i AS a Finbound IP Throttling Configuration from WAN to LAN packet Mame Time Schedule Always On Protocol Fate Limit 1 ba kbps Source IF Address Range Source potis bo Ho Destination IF Address Range Destination portis bo Ho Edit Application Time Schedule Protocol Fate Limit Delete Name User define description to identify this new policy application Time Schedule Scheduling your prioritization policy Refer to Time Schedule for more information Protocol The name of supported protocol Rate Limit To limit the speed of for inbound traffic Source IP Address Range The source IP address or range of packets to be monitored Source Port s The source port of packets to be monitored Destination IP Address Range The destination IP address or range of packets to be monitored Destination Port s The destination port of packets to be monitored n Chapter 4 Configuration English Manual Example QoS for your Network Connection Diagram Restricted Information and Settings Upstream 928 kbps Downstream 8 Mbps VolP User 192 168 1 1 Normal Users 192 168 1 2 192 168 1 5 Restri
64. authenticate both the L2TP remote and L2TP host This is only valid when L2TP remote supports this feature Secret The secure password length should be 16 characters which may include numbers and characters Active as default route As the connection type is LAN to LAN this function will become to disable Remote Host Name Optional Enter hostname of remote VPN device It is a tunnel identifier from the Remote VPN device matches with the Remote hostname provided If remote hostname matches tunnel will be connected otherwise it will be dropped Cautious This is only when the router performs as a VPN server This option should be used by advanced users only Local Host Name Optional Enter hostname of Local VPN device that is connected establishes a VPN tunnel As default Router s default Hostname is home gateway IPSec Enable for enhancing your L2TP VPN security Authentication Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit There are three options Message Digest 5 MD5 Secure Hash Algorithm SHA1 or NONE SHA 1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that produces a 128 bit hash SHAT A one way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are four options DES 3DES AES and NULL NULL means it is a tunnel only with no e
65. bled Start IP Address 192 168 1 100 IP pool counts 100 LAN and WAN Port Addresses The parameters of LAN and WAN ports are pre set in the factory The default values are shown as below IP address 192 168 1 254 Subnet Mask 239 293 239 0 The PPPoE function is enabled DHCP server function Enabled to automatically get the WAN port configuration from the ISP IP addresses for 100 IP addresses continuing from distribution to PCs 192 168 1 100 through 192 168 1 199 21 Chapter 3 Basic Installation English Manual Information from your ISP Before configuring this device you have to check with your ISP Internet Service Provider to find out what kind of service is provided such as DHCP Obtain an IP Address Automatically Static IP Fixed IP Address and PPPoE Gather the information as illustrated in the following table and keep it for reference VPI VCI VC LLC based multiplexing Username Password Service Name and Domain Name System DNS IP address it can be automatically PPPoE RFC2516 assigned by your ISP when you connect or be set manually VPI VCI VC LLC based multiplexing Username Password and Domain PPPoA RFC2364 Name System DNS IP address it can be automatically assigned by your ISP when you connect or be set manually VPI VCI VC LLC based multiplexing IP address Subnet mask Gateway address and Domain Name System DNS IP address it is a fixed IP address MPoA RFC1483 RF
66. by the named bridge interface All Allows all types of ethernet packets through the port Allows only IP ARP types of ethernet packets through the port Allows only PPPoE types of ethernet packets through the port 82 Chapter 4 Configuration English Manual 3G The router allows you to insert a 3G HSDPA card to its USB slot enabling you to use a 3G HSDPA UMTS EDGE GPRS or GSM Internet connection makes downstream rates of to 14 4 Mbps Configuration TE aj YWAN Connection Parameters Profile Port 36 w iBurst _ Enable Username o Password Ps Auth Protocal MTU 1500 PIN Connection Always On Keep Alive _ Enable NAT Enable Obtain DNS automatically Enable Primary DNS Secondary DNS oooo oooo Warning Entering the wrong PIN code three times will lock the SIM Profile Port Select the profile port as 3G iBurst Enable or Disable the router s iBurst functionality TEL No The dial string to make a GPRS 3G user internetworking call It may be provided by your mobile service provider APN An APN is similar to a URL on the WWW it is what the unit makes a GPRS UMTS call The service provider is able to attach anything to an APN to create a data connection Requirements for APN assignment varies between different service providers Most service providers have an internet portal which they connect a DHCP Server to giving you access to the internet i e Some 3G operators use the APN in
67. c OS Windows 98 NT 2000 XP Me etc The product provides an easy and user friendly interface for configuration Please check your PC s network components The TCP IP protocol stack and Ethernet network adapter must be installed If not please refer to your Windows related or other operating system manuals There are ways to connect with the router either through an external repeater hub to the router or directly connecting with PCs However to be sure PCs have an Ethernet interface installed properly prior to connecting to the router device You ought to configure your PCs to obtain an IP address through a DHCP server or a fixed IP address that must be in the same subnet as the router The default IP address of the router is 192 168 1 254 and the subnet mask is 255 255 255 0 i e any attached PC must be in the same subnet and have an IP address in the range of 192 168 1 1 to 192 168 1 253 The best and easiest way is to configure the PC to get an IP address automatically from the router using DHCP If you encounter any problem accessing the router s web interface it may also be advisable to uninstall any kind of software firewall on your PCs as they can cause problems accessing the 192 168 1 254 IP address of the router Users should make their own decisions on how to best protect their network Please follow the steps below for your PC s network environment installation Any TCP IP capable workstation can be used to communicate with or th
68. cation Authentication Phase 2 IPSec min s PING to the IP 0 0 0 0 NEVER 0 0 0 0 J Interval seconds seconds 180 atleast Delete Remote Gateway IPSec Proposal Active This function activates or deactivates the IPSec connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active checkbox is checked the function of Edit and Delete will not be available Name This is a given name of the connection Local Subnet Displays IP address and subnet of the local network Remote Subnet Displays IP address and subnet of the remote network Remote Gateway This is the IP address or Domain Name of the remote VPN device that is connected and established a VPN tunnel ZZ Chapter 4 Configuration English Manual IPSec Proposal This is selected IPSec security method IPSec VPN Connection Configuration PSec Parameters Local Network single Address IF Address Remote Secure Gateway IP fs Remote Network single Address IF Address IKE Mode Wain Pre shared Key LocalID Type Default DContent Remote ID Type Default DContent Hash Function MDS Encryption 3DES ka DH Group MODP1024 DH2 IPsec Proposal W ESP Authentication Encryption 3DES wt 4H Authentication MD5 Perfect Forward Secrecy MODP1024 DH Phase 1 IKE SA Lifetime 2S Phase 2 IPSec minis mints oe PING to the IP i Ba i nti dan
69. change to the backup port is determined by Probe Cycle duration multiplied by connection Decision amount e g From the image above it will be 60 seconds multiplied by 5 consecutive fails Failback Probe Cycle Set the time duration for the Failback Probe Cycle to determine when the router will switch back to the main connection main port from the backup connection backup port once the main connection is communicating again Note The time set is for each probe cycle but the decision to change to the backup port is determined by Probe Cycle duration multiplied by Connection Decision amount e g From the image above it will be 60 seconds multiplied by 5 consecutive fails Detect Rule Rule 1 Ping Fail No Ping It will not send any ping packet to determine the connection It means to disable the ping fail detection Ping Gateway It will send ping packet to gateway and wait response from gateway in every Probe Cycle Ping Host It will send ping packet to specific host and wait response in every Probe Cycle The host must be an IP address 65 Chapter 4 Configuration English Manual WAN Profile ADSL PPPoE Connection PPPoE PPP over Ethernet provides access control in a manner which is similar to dial up services using PPP Configuration 1 YWAN Connection PPPoE Routed Profile Port Protocol ret Description al VPIVCI ATM Class UBR w Usemame o O Fassword o O service Name o NAT Enae IP 0 0
70. cify the type of ethernet filtering performed by the named bridge interface All Allows all types of ethernet packets through the port Ip Allowsonly IP ARP types of ethernet packets through the port Allows only PPPoE types of ethernet packets through the port Obtain DNS A Domain Name System DNS contains a mapping table for domain name and IP addresses DNS helps to find the IP address for the specific domain name Check the checkbox to obtain DNS automatically Primary DNS Enter the primary DNS Secondary DNS Enter the secondary DNS 74 Chapter 4 Configuration English Manual Multiple Session with PPPoE pass through Configuration YWAN Connection PPPoE Routed Profile Port Protocol Multiple Session with PPPoE pass through a gt g Description Multiple Session with P VPUVCI ATM Class UBR sv Usemame fs Password fs service Name fs NAT Enable IP 0 0 0 0 Auto Auth Protocol w idle Timeout o mins MTU RIF LJ RP v O RIP v2 O RIP v2 Multicast TCF MSS Clamp Enable Obtain DNS X Automatic primary 0000 Seconday o000 l Multipe Session Second Session _ Enable Connection Always On t Multipe Session Third Session L Enable e Multipe Session Fourth Session C Enable Edit Name Description Creator VPI YEI Delete wanlink PPPoE WAN Link Factory Defaults 0 33 Profile Port Select the profile port as ADSL Protocol The Multiple Session protocol will be used i
71. ckets 0 Current TX Bytes Packets O 0 Current RX Bytes Packets O 0 Total TX Bytes Packets O 0 Total RX Bytes Packets O 0 Card Name The name of the card Signal Strength The signal strength bar indicates the current signal strength Current TX Bytes Packets The statistics of data transmission in bytes packets during a call Current RX Bytes Packets The statistics of data received in bytes packets during a call Total TX Bytes Packets The statistics of total data transmission in bytes packets since system ready Total RX Bytes Packets The statistics of total data received in bytes packets since system ready 28 Chapter 4 Configuration English Manual ARP Table This section displays the routers ARP Address Resolution Protocol Table which shows the mapping of Internet IP addresses to Ethernet MAC addresses This is useful as a quick way of determining the MAC address of the network interface of your PCs to use with the router s Firewall MAC Address Filter function See the Firewall section of this manual for more information on this feature i status a ARP Table Wired IP Address MAC Address Interface Static 192 168 1 110 00 1a a0 ad 1f 21 iplan no Wireless IP Address WAC IP Address A list of IP addresses of devices on your LAN Local Area Network MAC Address The MAC Media Access Control addresses for each device on your LAN Interface The interface name on the router
72. con in taskbar when connected OK Cancel Figure 3 7 TCP IP 5 Select the Obtain an IP address automatically and Obtain cere DNS server address automatically radio buttons See You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for Fi g u re 3 f 8 the appropriate IP settings Obtain an IP address automatically 6 Click OK to finish the configuration e bnaiariie IP address iPr an Subnet mast fa eet eel Default gateway Par Obtain DNS server address automatically C Use the following DNS server addresses Preferred DNS server Altemate DHS server ae a Advanced Figure 3 8 IP Address amp DNS 18 Chapter 3 Basic Installation English Manual Configuring PC in Windows 95 98 ME 1 Go to Start Settings Control Panel In the Control Panel double click Network and choose the Configuration tab 2 Select TCP IP gt NE2000 Compatible or the name of any Network Interface Card NIC in your PC See Figure 3 9 3 Click Properties 4 Select the IP Address tab In this page click the Obtain an IP address automatically radio button See Figure 3 10 5 Then select the DNS Configuration tab See Figure 3 11 6 Select the Disable DNS radio button and click OK to finish the configuration Chapter 3 Basic Installation Network 21 xi Configuration Identification Acc
73. cted User 192 168 1 100 Configuration ws ay Prioritization Configuration from LAN to WAN packet Mame Time Schedule Priority High Protocal source IP Address Range 0 0 0 0 Source Port loo Destination IP Address Range Destination Port b fo DSCP Marking igl Edit Delete Edit Mame Time Schedule Protocal Priority DSCP Marking Delete CO PPTP Always On GRE High Gold service iL O VoIP Always On Any High Gold service Li O CO Restricted Time Slot Ary High Gold service Li O dB Chapter 4 Configuration English Manual Throughput m VoIP VPN HIGH m Others NORMAL o Restricted LOW VoIP VPN Others Restricted HIGH NORMAL LOW a K SS Chapter 4 Configuration English Manual Mission critical application Mostly the VPN connection is mission critical application for doing data exchange between head and branch office Configuration N a a Prioritization Configuration from LAN to WAN packet Mame Time Schedule Priority Protocal gre Source IF Address Range Source Port b Ho Destination IP Address Range 0 0 0 0 0 0 0 0 Destination Port b Ho DSCP Marking Gold service iLi Ww Edit Delete Edit Mame Time Schedule Protocal Priority DSP Marking Delete E PIP ie Always On GRE High Gold service Li CO The mission critical application must be sent out smoothly without any dropping Set priority as high level for preventing any other applications to saturate the b
74. d It activates your DMZ function Disabled As set in default setting it disables the DMZ function Internal IP Address Give a static IP address to the DMZ Host when Enabled radio button is checked Be aware that this IP will be exposed to the WAN Internet set _ List all existing PCs connecting to the network You may assign a PC with IP address and MAC from this list Select the Apply button to apply your changes nn Chapter 4 Configuration English Manual Edit One to One NAT Network Address Translation One to One NAT maps a specific private local IP address to a global public IP address If you have multiple public WAN IP addresses from you ISP you are eligible for One to One NAT to utilize these IP addresses Go to Configuration gt Virtual Server gt Edit One to one NAT i Configuration 1 ai t Global IP Pool in pwan IP interface Global Address Pool MAT Type Disable Public to Private Subnet Public to OMZ Zone Subnet IP Address Netmask OIP Range IPAddress End IP O Global IF Addresses Apply One to one MAT Table NAT Type Select desired NAT type As set in default setting it disables the One to One NAT function Global IP Address Subnet The subnet of the public WAN IP address given by your ISP If your ISP has provided this information you may insert it here Otherwise use IP Range method IP Range The IP address range of your public WAN IP addresses F
75. djust screen resolution Network and Internet Views network ctat nel ri VIEW network status ang tasks Choose homegroup and sharing options Hardware and Sound ge View devices and printers Add a device Adjust commonly used mobility settings Clock Language and Region Change keyboards or other input methods Ease of Access Let Windows suggest settings Optimize visual display Go FF Programs Uninstall a program Sex Search Control Pane p amp 55 Network and Internet Network and Sharing Center Control Panel Home n r a View your basic network information and set up connections Manage wireless networks R c pvc Change adapter settings Change advanced sharing settings See full map e TEST PC BGSLON CNC Internet This computer View your active networks Connect or disconnect SS BGS10N CNC Public network Access type Internet Connections Il Wireless Network Connection BGSLON CNC Change your networking settings ts Set up a new connection or network lt Set up a wireless broadband dial up ad hoc or VPN connection or set up a router or access point g Connect to a network Connect or reconnect to a wireless wired dial up or VPN network connection to select Encima g Search Network Connections p GU F Network and Internet Network Connections gt Organize v Disable this network device Diagnose this c
76. dynamic IP address which changes from time to time This dynamic IP address is the WAN IP address of the router which is assigned to you by your ISP Configuration 1 a t Dynamic ONS Parameters Dynamic DMS QEnable Disable Dynamic ONS Server www dyndns org dynamic w Wildcard C Enable You will first need to register and establish an account with the Dynamic DNS provider using their website for example http www dyndns org There are more than 5 DDNS services supported Dynamic DNS Disable Check to disable the Dynamic DNS function GS Chapter 4 Configuration English Manual Enable Check to enable the Dynamic DNS function The following fields will be activated and required Dynamic DNS Server Select the DDNS service you have established an account with Domain Name Username and Password Enter your registered domain name and your username and password for this service Period Set the time period between updates for the Router to exchange information with the DDNS server In addition to updating periodically as per your settings the router will perform an update when your dynamic IP address changes Check Email This function allows you to have the router check your POP3 mailbox for new Email messages The Mail LED on your router will light when it detects new messages waiting for download You may also view the status of this function using the Status Email Checking section of the web
77. e Delete radio button of the account you want to delete 2 Then click the Edit Delete to confirm the deletion Dg Confirm Password s s Delete Note You can delete any user account except for the default admin account Thus there isno delete radio button available for this account i Configuration User Management Current Defined Users Valid User Comment Password Fl Edit Delete Edit Valid User comment C true admin Default admin user C true Test Test Chapter 4 Configuration M m Confirm Password Delete 92 English Manual Mail Alert Mail alert is designed to keep system administrator or other relevant personnels alerted of any unexpected events that might have occured to the network computers or server for monitoring efficiency With this alert system appropriate solutions may be tackled to fix problems that may have arisen so that the server can be properly maintained i Configuration 1 a Mail Alert Server Information Profile Port ADSL Apply the same settings to LI3G EWAN SMTP Server fF O Username fs Password fs Senders E mail ust be o yyy zzz Failover Fallback Recipients E mail ust be cx yyy zz Recipients E mail ust be cx yyy zz WAN IP Change Alert SMTP Server Enter the SMTP server that you would like to use for sending emails Username Enter the username of your email account to be used by the SMTP server Password Enter the password o
78. e Ethernet MAC address filter rules you can add the filter rules to meet your requirements Configuration t Ethernet Client Filter Filtering Rules Ethernet Client Filter MAC Address List Candidates WAC Address Format is SAKANAK a gt Disable Allowed Blocked E E Ethernet Client Filter Default setting is set Disable Allowed check to authorize specific device accessing your LAN by insert the MAC Address in the space provided or click 5 Make sure your PC s MAC is listed Blocked check to prevent unwanted device accessing your LAN by insert the MAC Address in the space provided or click 5 Make sure your PC s MAC is not listed The maximum client is 16 The MAC addresses are 6 bytes long they are presented only in hexadecimal characters The number 0 9 and letters a f are acceptable Note Follow the MAC Address Format xx xx xx xx xx xx Semicolon must be included Candidates automatically detects devices connected to the router through the Ethernet Candidates Active PC in LAN Z hitp 192 168 1 254 Active PC in LAN Micro Active PC in LAN IF Address MAC Address 192 169 1 14 00 05 50 71 92 69 Add Chapter 4 Configuration 44 English Manual Active PC in LAN displays a list of individual Ethernet device s IP Address amp MAC Address which
79. e IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled Encap mode Choose whether you want the packets in WAN interface as bridged packet or routed packet MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface IP 0 0 0 0 Auto Your WAN IP address Leave this at 0 0 0 0 to obtain automatically an IP address from your ISP Netmask The default is 255 255 255 0 User can change it to other such as 255 255 255 128 Type the subnet mask assigned to you by your ISP if given Gateway Enter the IP address of the default gateway if given RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function TCP MSS Clamp This option helps to discover the optimal MTU size automatically Default is enabled 70 Chapter 4 Configuration English Manual MAC Spoofing This option is required by some service providers You must fill in the MAC address that specify by service provider when it is required Default is disabled Obtain DNS A Domain Name System DNS contains a mapping table for domain name and IP addresses DNS helps to find the IP address for the specific domain name Check the checkbox to obtain DNS automatically Primary DNS Enter the primary DNS Secondary DNS Enter the secondary DNS 71 Chapter 4 Configuration English Manual IPoA Rou
80. e Network VPN It allows user to make a tunnel with a remote site directly to secure the data transmission among the connection User can use embedded PPTP and L2TP client server IKE and IPSec which are supported by this router to make a VPN connection or users can run the PPTP client in PC and the router already provides IPSec and PPTP pass through function to establish a VPN connection if the user likes to run the PPTP client in his local computer EWAN Besides using 3G ADSL to get connected to the Internet the router offers its Ethernet port 1 as a WAN port to be used to connect to Cable Modems and fiber optic lines This alternative yet faster method to connect to the internet will provide users more flexibility to get online Dual WAN Dual WAN is a new way of getting connected to the internet which is to use each two of the 3G ADSL EWAN to deal with the unexpected case and balance traffic load That is a way of improving greatly the robustness 802 119 Wireless AP with WPA Support With integrated 802 11g Wireless Access Point in the router the device offers a quick and easy access among wired network wireless network and broadband connection ADSL with single device simplicity and as a result mobility to the users In addition to 54 Mbps 802 11g data rate it also interoperates backward with existing 802 11b equipment The Wireless Protected Access WPA1 and WPA2 and Wireless Encryption Protocol WEP supported features enhance the
81. e on LAN Wake on LAN WOL sometimes WoL is an Ethernet computer networking standard that allows a computer to be turned on or woken up remotely by a network message i Configuration 1 j Wake on LAN Parameters MAC Address f Select lttype or select from listbox Edit Action MAC Address Ready Delete Select Select MAC address of the computer that you want to wake up or turn on remotely Add After selecting click Add then you can perform the Wake up action Edit Delete Click to edit or delete the selected MAC address Ready Yes indicating the remote computer is ready for your waking up No indicating the machine is not ready for your waking up Delete Delete the selected MAC address nn Chapter 4 Configuration English Manual Time Schedule The Time Schedule supports up to 16 time slots which helps you to manage your Internet connection In each time profile you may schedule specific day s i e Monday through Sunday to restrict or allowing the usage of the Internet by users or applications This Time Schedule correlates closely with router s time since router does not have a real time clock on board it uses the Simple Network Time Protocol SNTP to get the current time from an SNTP server from the Internet Refer to Time Zone for details You router time should correspond with your local time If the time is not set correctly your Time Schedule will not function properly Configuration
82. encryption type used for this VPN connection IPSec Status This shows details of your configured IPSec VPN Connections Status Ti ay PSec Status VPN Tunnels Name Active Connection State Statistics Local Subnet Remote Subnet Remote Gateway SA Name The name you assigned to the particular VPN entry Active Whether the VPN Connection is currently Active Connection State Whether the VPN is Connected or Disconnected Statistics Statistics for this VPN Connection Local Subnet The local IP Address or Subnet used 33 Chapter 4 Configuration English Manual Remote Subnet The Subnet of the remote site Remote Gateway The Remote Gateway IP address SA The Security Association for this VPN entry L2TP Status This shows details of your configured L2TP VPN Connections i status LZTP Status VPN L2TP for Remote Access Application Tunnel Call Name Type Enable Active ee Caneda Encryption VPN L2TP for LAN to LAN Application yeas TR Tunnel Call E Name Type Enable Active TE T Encryption Name The name you assigned to the particular L2 TP connection in your VPN configuration Type The type of connection dial in dial out Enable Whether the connection is currently enabled Active Whether the connection is currently active Tunnel Connected Whether the VPN Tunnel is currently connected Call Connected If the Call for this VPN entry is currently connected Encryption The encryption type used for th
83. esccesscessccesccesceesccessceesseuacs 173 PROBLEMS WITH THE WAN INTERFACE 1 0 ccc cceeccecccesccesccessccesccesceesscescceesseesceees 173 PROBLEMS WITH THE LAN INTERFACE Q occ ccecccscccesccesccessccesscessceesscesscesseeencs 173 Table of content 2 English Manual Chapter 1 Introduction Introduction to your Router Welcome to the 3G ADSL2 802 11g VPN Firewall Router The router is an all in one ADSL router combining an ADSL modem ADSL router and Ethernet network switch functionalities providing everything you need to get the machines on your network connected to the Internet over your ADSL broadband connection With features such as an ADSL Quick Start wizard and DHCP Server you can be online in no time at all and with a minimum of fuss and configuration catering for first time users to the guru requiring advanced features and control over their Internet connection and network Features Express Internet Access The router complies with ADSL worldwide standards It supports downstream rate up to 12 24 Mbps with ADSL2 2 8Mbps with ADSL Users enjoy not only high speed ADSL services but also broadband multimedia applications such as interactive gaming video streaming and real time audio much easier and faster than ever It is compliant with Multi Mode standard ANSI 71 413 Issue 2 G dmt ITU G 992 1 G lite ITU G 992 2 G hs ITU G994 1 G dmt bis ITU G 992 3 G dmt bis plus ITU G 992 5 Virtual Privat
84. ess Control The following network components are installed Microsoft Family Logon aM ASUSTeK Broadcom 440 10 100 Integrated Controller a Dial Up Adapter Y TCP IP gt ASUSTeK Broadcom 440x 10 100 Integrated Lt amp TCP IP gt Dial Up Adapter Add Remove f Primary Network Logon Microsoft Family Logon File and Print Sharing Description TCP IP is the protocol you use to connect to the Internet and wide area networks Figure 3 9 TCP IP TCP IP Properties x Bindings Advanced NetBIOS DNS Configuration Gateway WINS Configuration IP Address An IP address can be automatically assigned to this computer If your network does not automatically assign IP addresses ask your network administrator for an address and then type it in the space below Cancel Figure 3 10 IP Address TCP IP Properties 21x Bindings Advanced NetBIOS DNS Configuration Gateway WINS Configuration IP Address Cancel Figure 3 11 DNS Configuration 19 English Manual Configuring PC in Windows NT4 0 1 Go to Start Settings Control Panel In the Control Panel pee FTF double click Network and choose the Protocols tab aa ea e a 2 Select TCP IP Protocol and click Properties See Figure Network Protocols 3 1 2 Y NetBEUI Protocol Y NWLink IPX SPX Compatible Transport Y NWLink NetBIOS Aii _ Bemove _ CPropaties
85. ess of the default gateway if given RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function TCP MSS Clamp This option helps to discover the optimal MTU size automatically Default is enabled 12 Chapter 4 Configuration English Manual Obtain DNS A Domain Name System DNS contains a mapping table for domain name and IP addresses DNS helps to find the IP address for the specific domain name Check the checkbox to obtain DNS automatically Primary DNS Enter the primary DNS Secondary DNS Enter the secondary DNS 73 Chapter 4 Configuration English Manual Pure Bridge i Configuration a WAN Connection RFC 1483 Bridged Profile Port ADSL lw Protocol Pure Bridge we Description RFC 1483 bridged mod VPIVCI ATM Class Encap Method LLC Bridged Acceptable Frame Type acceptall Filter Type 1 Edit Delete Edit Name Description Creator VPI Vl Delete wanlink PPPoE WAN Link Factory Defaults 0 43 Profile Port Select the profile port as ADSL Protocol The ATM protocol will be used in the device Description A given name for this connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer Encap mode Choose whether you want the packets in WAN interface as bridged packet or routed packet Acceptable Frame Type Specify which kind of traffic goes through this connection all traffic or only VLAN tagged Filter Type Spe
86. et up security enabled Wi Fi networks 93 Chapter 4 Configuration English Manual 3 Jumpstart Wi Fi Protected Setup Jumpstart for Wireless Confiiguranon Successfully Done Configuration Information me WirelessWetwork1 630 Chapter 4 Configuration 54 English Manual Set up of security enabled Wi Fi network using WCN in Vista Step 1 Note down the AP s PIN from Web Ex 78749887 Step 2 In Vista s Control Panel select Network and Internet and choose View network computers and devices Double click the ADSL Firewall Router icon and enter the AP s PIN code then click Next re gt Network gt S ee les Organize G Views Gr Network and Sharing Center Addaprinter W Add a wireless device E Documents E Pictures ie Music More Folders BB Desktop IGP FAE d Public j Computer KY Network pM FAE PC J MERLIN El Control Panel Recycle Bin Name Category Workgroup Network location sy ADSL Firewall Router FAE PC amp Configure a WCN device Type the PIN for the selected device To configure this device for use on your network type the PIN You can find the PIN in the information that came with the device or on a sticker on the device PIN 79749887 V Display characters Cancel a ADSL Firewall Router Categories Network Infrastructure Step 3 Enter the AP SSID and apply Next button Chapter 4 Configuration 55
87. f the three presets Low Medium High inbound HTTP access is not allowed which means remote access through HTTP to your router is not allowed Note Inbound indicates accessing from Internet to LAN and Outbound is from LAN to the Internet t Packet Filter Parameters eo Select at Rule Name Helper Time Schedule Always On v Source IP Address es 0 0 0 0 Metmask 0 0 0 0 Destination IP Addressfes 0 0 0 0 Metmask 0 0 0 0 Type TOP w Protocol Mumber oOo Source Port i E 65535 Destination Port 65535 Inbound Allow v Outbound Allow v Edit Delete Source IP Netmask Source portis Inbound Rule Name Time Schedule Protocal Destination IP fNetmask Destination ports Outbound 0 0 0 0 0 0 0 0 0 65535 mei_htt Always On Q or 0 0 0 0 0 0 0 0 a Al 0 WU UU O O OO UDP T e OIL kK O mej_dns ways On 7 7 0 0 0 0 0 0 0 0 5353 Allow 0 0 0 0 7 0 0 0 0 0 65535 Block mei_tdns Always On TEE O 0 0 0 0 0 0 0 0 53 53 Allow O setts E 0 0 0 0 0 0 0 0 Fee 0 65535 Block O zE 4 0 0 0 0 0 0 0 0 21 721 Allow nn Chapter 4 Configuration English Manual Configuring Packet Filter 1 Click Packet Filters You will then be presented with the predefined port filter rules screen in this case for the low security level shown below Note You may click Edit the predefined rule instead of Delete it This is an example to show to how you add a filter on your own f contiguration t Packet Filter Parameters
88. f your email account Sender s Email Enter your email address Recipient s Email Failover Failback Enter the email address that will receive the alert message once a computer network server failover occurs Recipient s Email WAN IP Change Alert Enter the email address that will receive the alert message once an WAN IP change has been detected 93 Chapter 4 Configuration English Manual Firewall and Access Control Your router includes a full SPI Stateful Packet Inspection firewall for controlling Internet access from your LAN as well as helping to prevent attacks from hackers Besides when using NAT the router acts as a natural Internet firewall as all PCs on your LAN will use private IP addresses that cannot be directly accessed from the Internet vcd ea _ l amp ea Internet F ye a E _ e Router Firewall Access Control a NAT Packet filter 3 ae Packet filter Unauthorized users amp f BA USETE a ie Intrusion Detection applications jl masantedebeie ner Blacklisting Malicious attacks ACCESS Firewall amp Filter Firewall Prevents access from outside your network The router provides three levels of security support NAT natural firewall This masks LAN users IP addresses which is invisible to outside users on the Internet making it much more difficult for a hacker to target a machine on your network This natural firewall is o
89. find the IP address for the specific domain name Check the checkbox to obtain DNS automatically Primary DNS Enter the primary DNS Secondary DNS Enter the secondary DNS 6 7 Chapter 4 Configuration English Manual PPPoA Connection l Configuration VAN Connection PPPoA Routed Profile Port Protocol ALS Description aa VPUVCI ATM Class UBR w Username Password NAT F Enable IP 0 0 0 0 Auto 0 0 0 0 Auth Protocol Chap Auto Connection AlwaysOn Ml Idle Timeout o ming MTU 1500 RIP CJ RIP v1 O RIF v2 CJ RIP v2 Multicast TCP MSS Clamp Enable Obtain DNS Automatic oe 0 0 0 0 Secondary ooo Edit Delete Edit Name Description Creator VPI VO Delete wanlink PPPoE WAN Link Factory Defaults 0 AS Profile Port Select the profile port as ADSL Protocol The ATM protocol will be used in the device Description A given name for the connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer Username Enter the username provided by your ISP You can input up to 128 alphanumeric characters case sensitive This is in the format of username ispname instead of simply username Password Enter the password provided by your ISP You can input up to 128 alphanumeric characters case sensitive Service Name This item is for identification purposes If it is required your ISP provides you the information Maximum input is 15 al
90. gs with your ISP Frequent loss of Ensure that all other devices connected to the same telephone line as your ADSL linesync router e g telephones fax machines analogue modems have a line filter disconnections connected between them and the wall socket unless you are using a Central Splitter or Central Filter installed by a qualified and licensed electrician and ensure that all line filters are correctly installed and the right way around Missing line filters or line filters installed the wrong way around can cause problems with your ADSL connection including causing frequent disconnections Problems with the LAN Interface Corrective Action Can t ping any PCs on Check the Ethernet LEDs on the front panel The LED should be on for a the LAN port that has a PC connected If it is off check the cables between your router and the PC Make sure you have uninstalled any software firewall for troubleshooting Verify that the IP address and the subnet mask are consistent between the router and the workstations 73 Chapter 5 Troubleshooting English Manual APPENDIX A Product Support and Contact Information Most problems can be solved by referring to the Troubleshooting section in the User s Manual If you cannot resolve the problem with the Troubleshooting chapter please contact the dealer where you purchased this product 74 Chapter 5 Troubleshooting Radio Frequency Energy Certifications FCC Warning
91. he appropriate IP settings 6 Click OK again in the Local Area Connection Properties window to apply the new configuration Obtain an IP address automatically 6 Use the following IP address Obtain DNS server address automatically 6 Use the following DNS server addresses Preferred DNS server ate DAS server Validate settings upon exit a 14 Chapter 3 Basic Installation English Manual Configuring PCs in Windows Vista 1 Go to Start Click on Network 2 Then click on Network and Sharing Center at the top bar 3 When the Network and Sharing Center window pops up select and click on Manage network connections on the left window column 4 Select the Local Area Connection and right click the icon Properties to select e E E Organize ara bar Views or Network and 4 Shering Center sa Adda printer W Add awire This computer is not connected to a network Click to connect Favorited ants Name Category Workgroup Network location E Documents E Pictures i Music Af Recently Changed BS Searches 55 Network and Internet Network and Sharing Center Network and Sharing Center View computers and devices Connect to a network Set up a connection or network L x iy Manage network connections TEST1 WHQL Internet Diagnose and repair This computer L Not connected amp You are currently not connected to any networks Con
92. he largest datagram excluding media specific headers that IP will attempt to send through the interface RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function TCP MSS Clamp This option helps to discover the optimal MTU size automatically Default is enabled Obtain DNS A Domain Name System DNS contains a mapping table for domain name and IP addresses DNS helps to find the IP address for the specific domain name Check the checkbox to obtain DNS automatically Primary DNS Enter the primary DNS Secondary DNS Enter the secondary DNS lf you want to establish several connections at the same time check Enable to enable the second third or fourth connection t Multipe Session Second Session _ Enable e Multipe Session Third Session _ Enable e Multipe Session Fourth Session _ Enable Before this you need to configure your second third or fourth connection firstly Click Multiple Session Second Session the following screen will appear 76 Chapter 4 Configuration English Manual f Configuration WAN Connection PPPoE Routed Profile Port Protocal Multiple Session with PPPoE pass through Description Multiple Session with P YP IVC ATM Class UBR ka NAT Enable IP 0 0 0 0 Auto 0 0 0 0 Auth Protocol ChaptAuto Connection Always On wt Idle Timeout mints MTU 1492 RIP C RiPvi OI RIP v2 L RIP v2 Multicast TCP MSS Clamp Enable Obtain Description Multipe Session
93. heckbox is checked the function of Edit and Delete will not be available Click Edit Delete button to save your changes iF Chapter 4 Configuration English Manual Example Configuring a PPTP LAN to LAN VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet The routers are installed in the head office and branch offices accordingly Branch Office Head Office Public IPF j 192 168 0 2 69 121 1 33 192 168 1 254 Router Encryption Data PPTP Client PPTP Server VPN Connection 192 168 0 0 24 192 168 1 0 24 PPTP VPN LAN to LAN Both office LAN networks MUST in different subnet with LAN to LAN application Attention a B E Chapter 4 Configuration English Manual Configuring PPTP VPN in the Head Office The IP address 192 168 1 201 will be assigned to the router located in the branch office Please make sure this IP is not used in the head office LAN f Configuration TE PPTP Parameters Name 1 Connection Type 2 Type 3 Private IP Address Assigned to Dialin user PeerNetworkIP 4 192 168 0 0 255 255 255 0 Username 5 Password Auth Type Data Encryption Key Length Mode Active as default route Enable Netmask Edit Active Name Connection Type Type Delete Function Description S Name HeadOffice Given a name of PPTP connection Connection Type LAN to LAN Select LAN to LAN from Connectio
94. ial In operates as a VPN server When configuring your router establish the connection to a remote LAN enter the remote Server IP Address or Hostname you wish to connection to When configuring your router as a server to accept incoming connections enter the Private IP Address Assigned to Dial in User address Peer Network IP Enter Peer network IP address od EG T Chapter 4 Configuration English Manual Netmask Enter the subnet mask of peer network based on the Peer Network IP setting Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user server enter your own username Password If you are a Dial Out user client enter the password provided by your Host If you are a Dial In user Server enter your own password Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you Know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using PAP the password is sent unencrypted whilst CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder Tunnel Authentication This enables router to
95. ice s configuration interface E we i Configuration User Management Current Defined Users Valid User Comment Password Confirm Password a Edit Valid true admin User comment Delete Default admin user Edit Account Information You can change the informations of any account whether the account is active or valid 1 To edit an account select the Edit radio button of the account to be edited Once selected all information of that account will be displayed 2 Delete the information to be edited and replace it with the new one 3 When it is done simply click on the Edit Delete button to save your changes Note It is recommended that you change the password immediately to prevent security breach to your GUI w Configuration User Management Current Defined Users Confirm Password Valid User Comment Password admin Default admin user esses esses Edit Delete Edit Valid User Comment Delete O true admin Default admin user To Add an Account 1 Check the Valid checkbox fill in all the information User name Comment optional Password Confirm Password 91 Chapter 4 Configuration English Manual 2 When it is done click the Add button i Configuration User Management Current Defined Users Valid User Comment Password Test Test ess sas Est Derete Edit valid User comment true admin Default admin user To delete a user account 1 Click on th
96. ictim Protection Block Duration This is the duration for blocking Smurf attacks Default value is 600 seconds m4 Chapter 4 Configuration English Manual Scan Attack Block Duration This is the duration for blocking hosts that attempt a possible scan attack Scan attack types include X mas scan IMAP SYWN FIN scan and similar attempts Default value is 86400 seconds DoS Attack Block Duration This is the duration for blocking hosts that attempt a possible Denial of Service DoS attack Possible DoS attacks this attempts to block include Ascend kill and WinNuke Default value is 1800 seconds Max TCP Open Handshaking Count This is a threshold value to decide whether a SYN Flood attempt is occurring or not Default value is 100 TCP SYN per seconds Max PING Count This is a threshold value to decide whether an ICMP Echo Storm is occurring or not Default value is 15 ICMP Echo Requests PING per second Max ICMP Count This is a threshold to decide whether an CMP flood is occurring or not Default value is 100 ICMP packets per seconds except ICMP Echo Requests PING For SYN Flood ICMP Echo Storm and ICMP flood IDS will just warn the user in the Event Log It cannot protect against such attacks IS Chapter 4 Configuration English Manual Table 2 Hacker attack types recognized by the IDS Type of Block Intrusion Name Detect Parameter Pe of Blocklorop Packet Show Log Ascend Kill data pa TCP Victim Protection
97. ie _ 0 0 0 0 NEVER 0000 inen 10 seconds Disconnection Time after no traffic Reconnection Time 3 min s 3 at least I tM 180 seconds 180 atleast Name A given name for the connection e g connection to office Local Network Set the IP address subnet or address range of the local network Single Address The IP address of the local host Subnet The subnet of the local network For example IP 192 168 1 0 with netmask 255 255 255 0 specifies one class C subnet starting from 192 168 1 1 i e 192 168 1 1 through to 192 168 1 254 IP Range The IP address range of the local network For example IP 192 168 1 1 end IP 192 168 1 10 Remote Secure Gateway Address or Domain Name The IP address or hostname of the remote VPN device that is connected and establishes a VPN tunnel Remote Network Set the IP address subnet or address range of the remote network 172 Chapter 4 Configuration English Manual IKE Internet key Exchange Mode Select IKE mode to Main mode or Aggressive mode This IKE provides secured key generation and key management Hash Function It is a Message Digest algorithm which coverts any length of a message into a unique set of bits It is widely used MD5 Message Digest and SHA 1 Secure Hash Algorithm algorithms SHA1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that produces a 128 bit hash SHAT A o
98. igure parameters of the DHCP Server including the IP pool starting IP address and ending IP address to be allocated to PCs on your network lease time for each assigned IP address the period of time the IP address assigned will be valid DNS IP address and the gateway IP address These details are sent to the DHCP client i e your PC when it requests an IP address from the DHCP server Click Apply to enable this function If you check Use Router as a DNS Server the ADSL Router will perform the domain name lookup find the IP address from the outside network automatically and forward it back to the requesting PC in the LAN your Local Area Network lf you check DHCP Relay Agent and click Next then you will have to enter the IP address of the DHCP server which will assign an IP address back to the DHCP client in the LAN Use this function only if advised to do so by your network administrator or ISP Click Apply to enable this function 63 Chapter 4 Configuration English Manual WAN Wide Area Network WAN refers to your Wide Area Network connection i e your router s connection to your ISP and the Internet Here are the items within the WAN section WAN Interface WAN Profile and ADSL Mode WAN Interface The factory default has the Connection Mode as ADSL and the Protocol as PPPoE i Configuration YWAN Interface WAN Interface Main Port Main Port Dual WAN i Configuration WAN Interface WAN Interface Main
99. ile connecting to the Internet as well allowing users to tweak the performance of their network gt E 1i Configuration Port Setting Parameters Foti Connection Type Auta v Port Connection Type Auto wf Ports Connection Type Auto ww Fort4 Connection Type Auto IPv4 TOS Priority Control Enable Disable set High Priority TOS Eles 620161 60 O59 Oss O s7 C156 C1550 540 153 L152 151 C50 O49 C 48 Dar Oss Oas Ou Os Oe Oa Oa O39 0O38 L137 L136 Oas O34033 032 F31 F20 M29 28 Ear 26 2524 Mz Nz m21 20 Elis Elis Ear L116 Mas HNO On Nrs 0s 0r 0s 05014030201 Ao Port Connection Type There are Six options to choose from Auto disable 10M half duplex 10M full duplex 100M half duplex 100M full duplex and Disable Sometimes there are Ethernet compatibility problems with legacy Ethernet devices and you can configure different types to solve compatibility issues The default is Auto which users should keep unless there are specific problems with PCs not being able to access your LAN IPv4 TOS priority Control Advanced users TOS Type of Services is the 2 octet of an IP packet Bits 6 7 of this octet are reserved and bit 0 5 are used to specify the priority of the packet This feature uses bits 0 5 to classify the packet s priority If the packet is high priority it will flow first and will not be constrained by the Rate Limit Therefore when this feature is enabled the router s Ethernet switch will
100. in capital letter Lower case letter shows the day s is not selected and no rule will apply on this day s 2 A detailed setting of this Time Slot will be shown f contiguration 1 a TimeSsilott Olsun won Tue vved Thu Fri C Sat 08 00 18w Edit Delete Time Slot Edit Day in a week Start Time O 2 TimeSlot2 sMTATFS 08 00 18 00 O O 3 Timedlot3 SMTVTFs 08 00 18 00 O ID This is the index of the time slot Name A user define description to identify this time portfolio Day in a week The default is set from Monday through Friday You may specify the days for the schedule to be applied Start Time The default is set at 8 00 AM You may specify the start time of the schedule End Time The default is set at 18 00 6 00PM You may specify the end time of the schedule Choose Edit radio button and click Edit Delete button to apply your changes S E 0 XG Chapter 4 Configuration English Manual Delete a Time Slot Choose Delete radio button and click Delete button to delete the existing Time profile i e erase the Day and back to default setting of Start Time End Time Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router Users who do not understand the features should not attempt to reconfigure their router unless advised to do so by support staff Here are the items within the Adva
101. ing up Enabling Always On will give you an option of Keep Alive Keep Alive Set Enable to keep the router on line and prevent to be disconnected by the ISP when they think there is no activity on the line Connect to Demand If you want to make UMTS GPRS call only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet In this mode you must set Idle Timeout value at same time Enabling Connect on Demand will give you an option of Idle Timeout Idle Timeout Auto disconnect the connection when there is no activity on this call for a predetermined period of time The default value is 10 min s Obtain DNS Automatically Select this checkbox to use DNS Primary DNS Secondary DNS Enter the IP addresses of the DNS servers The DNS servers arepassed to the DHCP clients along with the IP address and the subnet mask Note If you don t know how to set these values and please keep them untouched 84 Chapter 4 Configuration English Manual ADSL Mode f contiguration ws a i ADSL Mode Parameters Connect Mode Modulation Profile Type Activate Line Coding Gain Tx Attenuation Elapsed Time 0 day 1hr26 min 14 sec Connect Mode This mode will automatically detect your ADSL line code ADSL2 ADSL42 AnnexM2 and AnnexM2 ADSL All Please keep the factory setting unless ADSL is detected as the symptom of synchronization problem Modulation It will
102. ireless ADSL Line Is Ready Scanning Please waitfor 3 seconds 4 The list below has different mode applied for your choice Choose 0 33 PPPoE Recommended and click Apply i S T G Chapter 4 Configuration English Manual foc Start a pa Auto Scan T OBSFPPOE 2 OSS RF C1483 SNAPILLC Bridged 5 Please enter Username and Password as supplied by your ISP Internet Service Provider and click Apply to continue Bf ouics Start a aj WAN Port WAN Wireles on Connection Profile Port Protocol WPIC Lisername Password Service Name Auth Protocol ChapiAuto MTU 1492 IP Address co aa i 0 0 0 0 means Obtain an IP address automatically Obtain DNS automatically Enable Primary DNS Secondary DNS oooo foo Mr Prease note This change will clear all setings that related to WAN interface like Virtual Server If you wantto keep the setting please switch to Advanced mode Profile Port Select the connection mode There are ADSL EWAN and 3G Protocol Select the protocol mode The default mode is PPPoE VPI VCI Enter the VPI and VCI information provided by your ISP Username Enter the username provided by your ISP Password Enter the password provided by your ISP Service Name This item is for identification purposes If it is required your ISP provides you the information Authentication Protocol Default is Auto Your ISP advises on using Chap or Pa
103. is Rate Limit Ad ae 32 kbps bo Hoe po Ho Delete O 2 Chapter 4 Configuration English Manual Virtual Server known as Port Forwarding In TCP IP and UDP networks a port is a 16 bit number used to identify which application program usually a server incoming connections should be delivered to Some ports have numbers that are pre assigned to them by the IANA the Internet Assigned Numbers Authority and these are referred to as well known ports Servers follow the well known port assignments so clients can locate them lf you wish to run a server on your network that can be accessed from the WAN i e from other machines on the Internet that are outside your local network or any application that can accept incoming connections e g Peer to peer P2P software such as instant messaging applications and P2P file sharing applications and are using NAT Network Address Translation then you will usually need to configure your router to forward these incoming connection attempts using specific ports to the PC on your network running the application You will also need to use port forwarding if you want to host an online game server The reason for this is that when using NAT your publicly accessible IP address will be used by and point to your router which then needs to deliver all traffic to the private IP addresses used by your PCs Please see the WAN configuration section of this manual for more information on
104. is VPN connection Email Status Details and status for the Email Account you have configured the router to check Please see the Advanced section of this manual for details on this function Status Ti amp Email Status Email Account No accounts specified 34 Chapter 4 Configuration English Manual Event Log This page displays the router s Event Log entries Major events are logged to this window such as when the router s ADSL connection is disconnected as well as Firewall events when you have enabled Intrusion or Blocking Logging in the Configuration Firewall section of the interface Please see the Firewall section of this manual for more details on how to enable Firewall logging i Status TE a Event Log system log buffer head 01 00 00 00 home gateway ipsecinone INFO Start IPSEC Initialize 01 00 00 00 home gateway ipzecinone INFO Start IPSEC Initialize 0i 00 00 11 home gateway im none Changed iplan IP address to 192 168 1 254 03 00 00 01 home gateway im none Reset SNMP community to factory default settings Error Log Any errors encountered by the router e g invalid names given to entries are logged to this window i status 4 aj Error Log Error Log times are in seconds since last reboot When Process Error Log 35 Chapter 4 Configuration English Manual Diagnostic It tests the connection to computer s which is connected to LAN ports and also the WAN Internet c
105. it green when there are emails in the Inbox Lit Green when the device is successfully connected to an ADSL DSLAM line sync Lit green when IP connected Flashes green when IP connected and IP traffic is passing through the 7 device Lit red when device attempted to become IP connected and failed Lit off when device in bridged mode or when connection WAN is absent Chapter 2 Installing the router English Manual The Rear Ports a Antdnna 2 GH nS ee ia A DSL Power w ae et w 0 C Ethernet D ALOFF WOTE The Ethernet Port 4 can be used as a console port You need a special console tool which already includes in the package to connect with LAN 7A port 4 and PC s RS 232 port 9 pin serial port D Connect the detachable antenna to this port DSL Connect the supplied RJ 11 telephone cable on this port when connecting to the ADSL telephone network ape Connect the USB cable on this port Connect a UTP Ethernet cable Cat 5 or Cat 5e to one of the LAN ports when connecting to a PC or an ita ait network 1X 4X of 10Mbps or 100Mbps RJ 45 connector Caution Port 4 can be either a LAN or Console port at a time but not both ps wes Push WPS button to trigger Wi Fi Protected Setup function To be sure the device is being turned on Press RESET button for 1 3 seconds quick reset the device 6 seconds above and power off power on the device RESET rest
106. l detect the remote IPSec peer has lost or not by pinging specify IP address DPD Dead peer detection DPD is a keeping alive mechanism that enables the router to be detected lively when the connection between the router and a remote IPSec peer has lost Please be noted it must be enabled on the both sites PING to the IP It is able to IP Ping the remote PC with the specified IP address and alert when the connection fails Once alter message is received Router will drop this tunnel connection Re establish of this connection is required Default setting is 0 0 0 0 which disables the function Interval This sets the time interval between Pings to the IP function to monitor the connection status Default interval setting is 10 seconds Time interval can be set from O to 3600 second O second disables the function md Chapter 4 Configuration English Manual Ping to the IP Interval sec Ping to the IP Action XXX XXX XXX XXX A valid IP Address 2000 Yes activate it in every 2000 second Disconnection Time after no traffic It is the NO Response time clock When no traffic stage time is beyond the Disconnection time set Router will automatically halt the tunnel connection and re establish it base on the Reconnection Time set 180 seconds is minimum time interval for this function Reconnection Time It is the reconnecting time interval after NO TRAFFIC is initiated 3 minutes is minimum time interval for this function Click
107. mber on the Remote WAN side used when accessing the virtual server Redirect Port The Port number used by the Local server in the LAN network Internal IP Address The private IP in the LAN network which will be providing the virtual server application List all existing PCs connecting to the network You may assign a PC with IP address and MAC from this list Select the Add button to apply your changes E 0 Chapter 4 Configuration English Manual Example List of some well known and registered port numbers The Internet Assigned Numbers Authority IANA is the central coordinator for the assignment of unique parameter values for Internet protocols Port numbers range from 0 to 65535 but only ports numbers O to 1023 are reserved for privileged services and are designated as well known ports Please refer to Table 5 The registered ports are numbered from 1024 through 49151 The remaining ports referred to as dynamic or private ports are numbered from 49152 through 65535 For further information please see IANA s website at htip www iana org assignments port numbers Table 5 Well known and registered Ports TCP FTP Data 20 25 TCP SMTP imple Mall Transfer Protoco SS e i se Tf moo o oe 110 119 NTP Rear Time Protocol SNTP SnD Network Time Protocol C C C C C TC TC C C C C P P P amp P amp P P P DP S E Chapter 4 Configuration English Manual Wak
108. n TCP MSS Clamp This option helps to discover the optimal MTU size automatically Default is enabled Obtain DNS A Domain Name System DNS contains a mapping table for domain name and IP addresses DNS helps to find the IP address for the specific domain name Check the checkbox to obtain DNS automatically Primary DNS Enter the primary DNS Secondary DNS Enter the secondary DNS 69 Chapter 4 Configuration English Manual MPoA Connection i Configuration WAN Connection RFC 1483 Routed Profile Port Protocol MPoAL RFC463 RFC2664 Multiprotocol Encapsulation over AALS Description RFC 1463 routed mode VPIAICI 0 ATM Class LIBR wr NAT Enable Encap Method MTU 1500 IP 0 0 0 0 Auto 0 0 0 0 Netmask jo000 Gateway oOo RIF CO RP v O RIP v2 O RIP v2 Multicast TCP MSS Clamp Enable MAC Spoofing Enable lo o o bloo Obtain DNS F Automatic Primary 1 0 Secondary o Addj Edit Delete Edit Mame Description Creator VPI Vel Delete Ce wanlink PPPoE WAN Link Factory Defaults 0 a3 Profile Port Select the profile port as ADSL Protocol The ATM protocol will be used in the device Description A given name for the connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing a singl
109. n Type drop down menu Select Dial in from Type drop down menu IP Address 192 168 1 200 IP address assigned to branch office network pa Peer Network IP 192 168 0 0 Branch office network 255 255 255 0 fo Input username amp password to authenticate branch 123456 office network Auth Type Chap Auto Keep as default value in most of the cases PPTP Data Encryption server amp client will determine the value automatically Key Length Refer to manual for details if you want to change the stateful a B ES Chapter 4 Configuration English Manual Configuring PPTP VPN in the Branch Office The IP address 69 1 121 30 is the Public IP address of the router located in head office If you registered the DDNS please refer to the DDNS section of this manual you can also use the domain name instead of the IP address to reach the router Configuration a PPTP Parameters Name 1 BranchOffice Connection Type 2 LAN to LAN w Type 3 Dial out server IF Addressior Domain Name 69 121 1 33 PeerNetworkIP 4 1921681 0 Netmask 255 255 2550 Username 9 username Password assess 6 Auth Type Chapiauto w Data Encryption Auto l Key Length Auto Mode stateful Active as default route Enable Add Eait Delete Edit Active Name Connection Type Type Delete O d VPN_PPTP remoteaccess dialout
110. n the device Description A given name for this connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer Username Enter the username provided by your ISP You can input up to 128 alpha numeric characters case sensitive Password Enter the password provided by your ISP You can input up to 128 alpha numeric characters case sensitive NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing the single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled IP 0 0 0 0 Auto Your WAN IP address Leave this at 0 0 0 0 to obtain automatically an IP 75 Chapter 4 Configuration English Manual address from your ISP Auth Protocol Default is Auto Your ISP should advise you on whether to use Chap or Pap Connection Always on If you want the router to establish a PPPoA session when starting up and to automatically re establish the PPPoA session when disconnected by the ISP Connect on Demand If you want to establish a PPPoA session only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet Idle Timeout Auto disconnect the router when there is no activity on the line for a predetermined period of time MTU Maximum Transmission Unit The size of t
111. n when NAT function is enabled WOTE d When using Virtual Servers your PCs will be exposed to the degree specified in your Virtual Server settings provided the ports specified are opened in your firewall packet filter settings Firewall Security and Policy General Settings Inbound direction of Packet Filter rules to prevent unauthorized computers or applications accessing your local network from the Internet Intrusion Detection Enable Intrusion Detection to detect prevent and log malicious attacks Access Control Prevents access from PCs on your local network Firewall Security and Policy General Settings Outbound direction of Packet Filter rules to prevent unauthorized computers or applications accessing the Internet URL Filter To block PCs on your local network from unwanted websites 94 Chapter 4 Configuration English Manual Here are the items within the Firewall section General Settings Packet Filter Intrusion Detection URL Filter IM P2P Blocking and Firewall Log General Settings You can choose not to enable Firewall and still able to access to URL Filter and IM P2P Blocking or enable the Firewall using preset filter rules and modify the port filter rules as required The Packet Filter is used to filter packets based on Applications Port or IP addresses There are four options when you enable the Firewall they are All blocked User defined no pre defined port or address filter rules by default me
112. nced section Static Route Static ARP Dynamic DNS Check Email Device Management IGMP and VLAN Bridge Static Route Go to Configuration Advanced Static Route Configuration 1 amp t Static Routing Static Routing Apply Edit Delete Edit Valid Destination Metmask Gatewayilntertace Delete Destination This is the destination subnet IP address Netmask Subnet mask of the destination IP addresses based on above destination subnet IP Gateway This is the gateway IP address to which packets are to be forwarded Interface Select the interface through which packets are to be forwarded Cost This is the same meaning as Hop This should usually be left at 1 Static ARP Go to Configuration Advanced Static Route md Chapter 4 Configuration English Manual i Configuration Static ARP Parameters IF Address MAC Address Edit IPF Address MAC Address Delete IP Address Fill in the IP address of the host computer that is sending the data packet MAC Address Fill in the MAC address of the computer that the incoming data packets are to be forwarded Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname allowing users whose ISP does not assign them a static IP address to use a domain name This is especially useful for hosting servers via your ADSL connection so that anyone wishing to connect to you may use your domain name rather than having to use your
113. ncryption 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 56 3 bits as an encryption method AES Stands for Advanced Encryption Standards it uses 128 bits as an encryption method Perfect Forward Secrecy Choose whether to enable PFS using Diffie Hellman public key cryptography to change encryption keys during the second phase of VPN negotiation This function a EG be Chapter 4 Configuration English Manual will provide better security but extends the VPN negotiation time Diffie Hellman is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups Pre shared Key This is for the Internet Key Exchange IKE protocol a string from 4 to 128 characters Both sides should use the same key IKE is used to establish a shared security policy and authenticated keys for services such as IPSec that require a key Before any IPSec traffic can be passed each router must be able to verify the identity of its peer This can be done by manually entering the pre shared key into both sides router or hosts Click Edit Delete to save your changes A K O Chapter 4 Configur
114. nd eDonkey applications over the Internet 4 Configuration 1 ay FINM P2P Blocking Configuration Instant Message Blocking Yahoo Messenger C Black MSN Messenger C Block Feer to Peer Blocking BitTorrent BitTorrent Bitcomet C Black eDonkey eDonkey ehule C Black Instant Message Blocking The default is set to Disabled Disabled Instant Message blocking is not triggered No action will be performed Always On Action is enabled TimeSlot1 TimeSlot16 This is the self defined time period You may specify the time period to trigger the blocking i e during working hours For setup and detail refer to Time Schedule section Yahoo MSN Messenger Check the box to block either or both Yahoo or and MSN Messenger To be sure you enabled the Instant Message Blocking first Peer to Peer Blocking The default is set to Disabled Disabled Instant Message blocking is not triggered No action will be performed Always On Action is enabled TimeSlot1 TimeSlot16 This is the self defined time period You may specify the time period to trigger the blocking i e during working hours For setup and detail refer to Time Schedule section BitTorrent eDonkey Check the box to block either or both Bit Torrent or and eDonkey To be sure you enabled the Peer to Peer Blocking first a O E O Chapter 4 Configuration English Manual Firewall Log Configuration 1 aj Firewall Log Event willbe shown i
115. ne way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are several options DES 3DES and AES 128 192 and 256 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 56 3 bits as an encryption method AES Stands for Advanced Encryption Standards you can use 128 192 or 256 bits as encryption method DH Group It is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups IPSec Proposal Select the IPSec security method There are two methods of checking the authentication information AH authentication header and ESP Encapsulating Security Payload Use ESP for greater security so that data will be encrypted and authenticated Using AH data will be authenticated but not encrypted Authentication Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit There are three options Message Digest 5 MD5 Secure Hash Algorithm SHA1 or NONE SHA1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that p
116. nect to a network TO Status ee R Connecianly TERE Cate Dial up 2 A Se Network Extender k Standalone Metwork Extende E Oo Disconnected i Disconnected K Network Extender SSLVPN A LAN or High Speed Internet 1 Lorm Area PONNEE HoR 4 ae Disable Status op ISDN WAN Device Diagnose Bridge Connections Create Shortcut Delete Rename Properties 15 Chapter 3 Basic Installation English Manual ToT ETE 5 Select Internet Protocol Version 4 ioral Ares Connection Propertios TCP IPv4 then click Properties Networking Connect using amp Intel R 82565DM Gigabit Network Connection This connection uses the following items o Client for Microsoft Networks fl GoS Packet Scheduler amp File and Printer Sharing for Microsott Networks wis Intemet Protocol Version 6 TCP IPv6 S Intemet Protocol Version 4 TCP Py4 wi Link Layer Topology Discovery Mapper 1 0 Driver wi Link Layer Topology Discovers Responder Install Uninstall Properties Description Transmission Control Protocol Intemet Protocol The default wide area network protocol that provides communication across diverse interconnected networks a S 8 8 IS s a OK Canes 6 In the TCP IPv4 properties window select the Obtain an IP address r automatically and Obtain DNS Server General Alternate Configuration address automatically radio buttons You can get IP settings
117. nglish and French languages Chapter 4 Configuration 24 English Manual Status ADSL Status This section displays the ADSL overall status which shows a number of helpful information such as DSP firmware version i Status 1 ay ADSL Status Parameters DSP Firmware Version E 25 41 55 A Connected false Operational Mode Inactive Annex Type Upstream 0 Downstream o Elapsed Time SNR Marginf Upstream SNR Margin Downstream Line Attenuation Upstream Line Attenuation Downstream CRC Errors Upstream 0 CRC Errors Downstream 0 LatencyiUpstream LatencyiDownstream 25 Chapter 4 Configuration English Manual 3G Status This section displays the 3G Card s overall status which shows you a number of helpful information such as the current signal strength and statistics on current and total bytes transferred and received i Status Ti a 3G Status Parameters Status 3G Card not found signal Strength NA Network Name MA Card Name MA Card Firmware NEA Card IMEI NA Current TX Bytes Packets O 0 Current RX Bytes Packets O 0 Total TX Bytes Packets O 0 Total RX Bytes Packets O 0 Status The current status of the 3G card Signal Strength The signal strength bar indicates current 3G signal strength Network Name The network name that the device is connected to Card Name The name of the 3G card Card Firmware The current firmware for the 3G card Current TX Bytes Packets The statistics
118. nnection Type Type server IP Address or Domain Name fs Username Oo Password fs Auth Type Data Encryption Key Length Mode Active as default route Enable Edit Active Name Connection Type Type Delete Name A given name for the connection e g connection to office Connection Type Remote Access or LAN to LAN Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server a B Chapter 4 Configuration English Manual When configuring your router as a Client enter the remote Server IP Address or Domain Name you wish to connect to When configuring your router as a server enter the Private IP Address Assigned to Dial in User address Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user server enter your own username Password If you are a Dial Out user client enter the password provided by your Host If you are a Dial In user Server enter your own password Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you Know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a ser
119. nthe Status Event Log Filtering Log Enable Disable Intrusion Log Enable Disable URL Blocking Log Enable Disable Apply Firewall Log display log information of any unexpected action with your firewall settings Check the Enable box to activate the logs Log information can be seen in the Status Event Log after enabling n Chapter 4 Configuration English Manual VPN Virtual Private Networks Virtual Private Networks is ways to establish secured communication tunnels to an organization s network via the Internet Your router supports three main types of VPN Virtual Private Network PPTP IPSec and L2TP PPTP Point to Point Tunneling Protocol There are two types of PPTP VPN supported Remote Access and LAN to LAN please refer below for more information Click Configuration VPN PPTP Edit Active Name Connection Type Type Delete Test remoteactess dialout Name A given name for the connection Active This function activates or deactivates the PPTP connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active checkbox is checked the function of Edit and Delete will not be available Connection Type It informs your PPTP tunnel connection condition Type This refers to your router operates as a client or a server Dialout or Dialin respectively PPTP Connection Remote Access i Configuration TE aj PPTP Parameters Name Co
120. on of upstream of FTP Time schedule also help you to only limit utilization at daytime Advanced setting by using IP throttling With IP throttling you can specify more detail for allocating bandwidth even the applications are located in the same level Upstream 928kbps 29 32kbps Mission critical Application 192kbps 6 32kbps Voice Application 128kbps 4 32kbps Restricted Application 160kbps 5 32kbps Other Applications 448kbps 14 32kbps 6 4 14 5 29 29 32kbps 928kbps nn Chapter 4 Configuration English Manual i Configuration Outbound IF Throttling Configuration from LAN to WAN packet Protocal Source IP Address Range Destination IP Address Range Edit Mame Time Schedule Frotocol PPTP Always On GRE b VoIP Always On Ary C Restricted TimeSloti ANY CO Others TimeSlott Any Time Schedule Rate Limit Source portis Destination portis Rate Limit G 4 5 14 W 1532 kbps e Ho e Ho Delete COTO Te Sometime your customers or friends may upload their files to your FTP server and that will saturate your downstream bandwidth The settings below help you to limit bandwidth for the restricted application f Configuration Y Outbound IP Throttling Configuration from LAN to WAN packet Protocal Source IP Address Range Destination IP Address Range Edit Mare Time Schedule Protocal Restricted TimeSlott Any Time Schedule Rate Limit Source portis Destination port
121. on this router RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function IP Alias This function creates multiple virtual IP interfaces on this router It helps to connect two or more local networks to the ISP or remote node In this case an internal router is not required i Configuration y IP Alias Parameters IP Address Metmask Security Interface i Edit IP Address Subnet Mask Security Interface Delete IP Address Specify an IP address on this virtual interface SubNetmask Specify a subnet mask on this virtual interface Security Interface Specify the firewall setting on this virtual interface Internal The network is behind NAT All traffic will do network address translation when sending out to Internet if NAT is enabled External There is no NAT on this IP interface and connected to the Internet directly Mostly it will be used when providing multiple public IP addresses by ISP In this case you can use public IP address in local network which gateway IP address point to the IP address on this interface DMZ Specify this network to DMZ area There is no NAT on this interface 43 Chapter 4 Configuration English Manual Ethernet Client Filter The Ethernet Client Filter supports up to 16 Ethernet network machines that helps you to manage your network control to accept traffic from specific authorized machines or can restrict unwanted machine s to access your LAN There are no pre defin
122. onnection If PING www google com is shown FAIL and the rest is PASS you ought to check your PC s DNS settings is set correctly i Status TE aj Diagnostic LAN Connection Testing Ethernet LAN connection PASS Testing Wireless LAN connection PASS WAN Connection Testing ADSL Synchronization FAIL Testing WAN connection FAIL Ping Primary Domain Name Server FAIL PING www google com FAIL 36 Chapter 4 Configuration English Manual Quick Start 1 Click Quick Start Select the connect mode you want There are three options you can choose ADSL EWAN and 3G Select ADSL from Connect Mode drop down menu and click Continue a gt Quick Start WAN Port WAN Wireless Select WAN Port Connect Mode ADSL Jump to Wireless setting 2 If your ADSL line is not ready you need to check your ADSL line has been set or not yi ADSL Line Is Not Ready Please Check your ADSL Line and wait for a while f Quick Start WAN Port WAN Wireless Jump to Wireless setting 3 If your ADSL line is ready the screen appears ADSL Line is Ready Choose Auto radio button and click Apply It will automatically scan the recommended mode for you Manually mode makes you to set the ADSL line by manual If you choose Manually you will directly go to step 5 a gt fonics Start WAN Port WAN Wireless ADSL Line Is Ready Auto Scan Auto Manually i Quick Start WAN Port WAN gt W
123. onnection Rename this connection s Hil A Local Area Connection w Network Extender A Standalone Network Extender k i 7 a am Net a n i Disconnected Disconnected ae Network Extender SSLVPN Adapter Pa Standalone Network Extender SSL Wireless Network Connection 3 Not connected Microsoft Virtual WiFi Miniport A Diagnose A Athe Bridge Connections Create Shortcut Delete Rename Properties 13 English Manual 4 Select Internet Protocol Version 4 TCP IPv4 then click Properties i Local Area Connection Properties Networking Connect using a Broadcom 570x Gigabit Integrated Controller This connection uses the following items Client for Microsoft Networks aos Facket Scheduler Fie File and Printer for Maon Networks apper I O Driver wi Link soe Topology Discovery Responder Description Transmission Control Protocol Intemet Protocol The default wide area network protocol that provides communication across diverse interconnected networks 5 In the TCP IPv4 properties window select the Obtain an IP address automatically and Obtain DNS Server address automatically radio buttons Then click OK to exit the setting Internet Protocol Version 4 TCP IPv4 Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for t
124. onnection status between the system and the build in wireless card AP MAC Address It is a unique hardware address of the Access Point AP Firmware Version The Access Point firmware version WMM This feature works concurrently with QoS that enables the system to prioritize the flow of data packets according to 4 categories Voice Video Best Efforts and Background Enable Click to activate WMM feature Disable Click to deactivate WMM feature Wireless Distribution System WDS It is a wireless access point mode that enables wireless link and communication with other access point It is easy to be installed simply to define peer s MAC address of the connected AP WDS takes advantages of cost saving and flexibility which no extra wireless client device is required to bridge between two access points and extending an existing wired or wireless infrastructure network to create a larger network It can connect up to 4 wireless APs for extending cover range at the same time In addition WDS enhances its link connection security in WEP mode WEP key encryption must be the same for both access points WDS Service The default setting is Disabled Check Enable radio button to activate this function 1 Peer WDS MAC Address It is the associated AP s MAC Address It is important that your peer s AP must include your MAC address in order to acknowledge and communicate with each other 2 Peer WDS MAC Address It is the second associated
125. or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you Know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using PAP the password is sent unencrypted whilst CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder eS B E 9 Chapter 4 Configuration English Manual Data Encryption Data sent over the VPN connection can be encrypted by an MPPE algorithm Default is Auto so that this setting is negotiated when establishing a connection or else you can manually Enable or Disable encryption Key Length The data can be encrypted by MPPE algorithm with 40 bits or 128 bits Default is Auto it is negotiated when establishing a connection 128 bit keys provide stronger encryption than 40 bit keys Mode You may select Stateful or Stateless mode The key will be changed every 256 packets when you select Stateful mode If you select Stateless mode the key will be changed in each packet Active as default route As the connection type is LAN to LAN this function will become to disable Active This function activates or deactivates the PPTP connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active c
126. or example IP 192 168 1 1 end IP 192 168 1 10 Select the Apply button to apply your changes Check to create a new One to One NAT rule dB Chapter 4 Configuration English Manual i Configuration Add Virtual Server IP interface One to one NAT Table Virtual Server Entry Protocol Time Schedule Always On External Port from o tofo Redirect Port from o tofo Internal IF Address oOo O za Return Edit Application Time Schedule Protocol External Fot Redirect Fot IF Address Interface Delete Application Users defined description to identify this entry or click 5 drop down menu to select existing predefined rules Selet _ 20 predefined rules are available Application Protocol and External Redirect Ports will be filled after the selection Protocol It is the supported protocol for the virtual server In addition to specifying the port number to be used you will also need to specify the protocol used The protocol used is determined by the particular application Most applications will use TCP or UDP Time Schedule User defined time period to enable your virtual server You may specify a time schedule or Always on for the usage of this Virtual Server Entry For setup and detail refer to Time Schedule section Global IP Define a public WAN IP address for this Application to use This Global IP address must be defined in the Global IP Address External Port The Port nu
127. ore to factory default settings Cannot login to the router or forgot your Username Password Press the button for more than 6 seconds Caution After pressing the RESET button for more than 6 seconds to be sure you power cycle the device again 7 Power Connect the supplied power adapter to this jack Oe Goes Chapter 2 Installing the router English Manual Cabeling One of the most common causes of problems is the bad cabling or ADSL line s Make sure that all connected devices are turned on On the front of the product is a bank of LEDs Verify that the LAN Link and ADSL line LEDs are lit If they are not verify that you are using the proper cables Ensure that all other devices connected to the same telephone line as your router e g telephones fax machines analogue modems have a line filter connected between them and the wall socket unless you are using a Central Splitter or Central Filter installed by a qualified and licensed electrician and ensure that all line filters are correctly installed and the right way around Missing line filters or line filters installed the wrong way around can cause problems with your ADSL connection including causing frequent disconnections 10 Chapter 2 Installing the router English Manual Chapter 3 Basic Installation The router can be configured with your web browser A web browser is included as a standard application in the following operating systems Windows 7 Linux Ma
128. ormation move through the router ay lightning speed even under heavy load The QoS features are configurable by source IP address destination IP address protocol and port You can throttle the speed at which different types of outgoing data pass through the router to ensure P2P users don t saturate upload bandwidth or office browsing doesn t bring client web serving to a halt In addition or alternatively you can simply change the priority of different types of upload data and let the router sort out the actual speeds Virtual Server port forwarding Users can specify some services to be visible from outside users The router can detect incoming service requests and forward either a single port or a range of ports to the specific local computer to handle it For example a user can assign a PC in the LAN acting as a WEB server inside and expose it to the outside network Outside users can browse inside web servers directly while it is protected by NAT A DMZ host setting is also provided to a local computer exposed to the outside network Internet Chapter 1 Introduction 4 English Manual Rich Packet Filtering Not only filters the packet based on IP address but also based on Port numbers It will filter packets from and to the Internet and also provides a higher level of security control Dynamic Host Configuration Protocol DHCP Client and Server In the WAN site the DHCP client can get an IP address from the Internet Service
129. ostname etwork drop LONN menu a 30 Chapter 4 Configuration English Manual L2TP Layer Two Tunneling Protocol i Configuration 4 we a L2ZTP Parameters Name i connection Type Remote Access v Type Dial out server IP Addresstor Domain Name 2 i Username i Password Auth Type Chap auto Active as Tunnel _ Pie Authentication H Enable oe default Enable route Remote Host _ iz Name Local Host NametOptional Optional IPSec _ Enable Authentication Encryption Perfect Forward Fre shared Key Secrecy Edit Active Name Connection Type Type Delete Two types of L2TP VPN are supported Remote Access and LAN to LAN please refer below for more information Fill in the blank with information you need and click Add to create a new VPN connection account Active This function activates or deactivates the L2TP connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active checkbox is checked the function of Edit and Delete will not be available Name This is a given name of the connection Connection Type It informs your L2TP tunnel connection condition Type This refers to your router operates as a client or a server Dialout or Dialin in respectively ee EG A Chapter 4 Configuration English Manual L2TP Connection Remote Access f Configuration n ws
130. oviding the virtual server application List all existing PCs connecting to the network You may assign a PC with IP address and MAC from this list Example If you like to remote accessing your Router through the Web HTTP at all time you would need to enable port number 80 Web HTTP and map to Router s IP Address Then all incoming HTTP requests from you Remote side will be forwarded to the Router with IP address of 192 168 1 254 Since port number 80 has already been predefined next to the Application click Helper A list of oredefined rules window will pop and select HTTP_Sever Application HT TP_Sever Time Schedule Always On Protocol tcp External Port 80 80 Redirect Port 80 80 IP Address 192 168 1 254 i Configuration Port Forwarding Atd Virtual Server in pwan IP interface Virtual Server Entry Application zz Protocol Time Schedule External Port from s0 talgo Redirect Port Internal IP Address 192 168 1 254 e Select Edit Application Time Schedule Protocol External Port Redirect Port HTTP_Server Always Oni tcp o0 80 o0 a0 Add Click it to apply your settings IF Address Interace Delete 192 168 1 254 pwan CO 5 5 Chapter 4 Configuration English Manual Edit Delete Click it to edit or delete this virtual server application Using port forwarding does have security implications as outside users will be able to connect to PCs on your network For this reason you a
131. p 38 Chapter 4 Configuration English Manual IP Address Your WAN IP address Leave this at 0 0 0 0 to obtain automatically an IP address from your ISP 6 Configure the Wireless LAN setting Quick Start Wireless WAN gt Wireless Parameters WLAN Service Enable Disable ESSID Broadcast Enable Disable Regulation Domain Channel ID Channel 1 2 412 GHz Security Parameters Security Mode WLAN Service Default setting is set to Enable If you want to use wireless both 802 119 and 802 11b device in your network you can select Enable ESSID The ESSID is the unique name of a wireless access point AP to be distinguished from another For security propose change to a unique ID name to the AP which is already built in to the router s wireless interface It is case sensitive and must not excess 32 characters Make sure your wireless clients have exactly the ESSID as the device in order to get connected to your network ESSID Broadcast It is function in which transmits its ESSID to the air so that when wireless client searches for a network router can then be discovered and recognized Default setting is Enable Enable When Enable is selected you can allow anybody with a wireless client to be able to locate the Access Point AP of your router Disable Select Disable if you do not want broadcast your ESSID When select Disable no one will be able to locate the Access Point AP of your router
132. p Thi application will svide you through the wireless network configuration process What do wou want to do Configure a wireless network gt Add another device to my wireless network JUMPSTART Step 2 Note down the wireless client s PIN Ex 41538142 and apply Start button for active wireless client WPS PIN method Le Jumpstart Wi Fi Protected Setup Join a Wireless Network Jumpstart it preparing to yom your computer to a wireless network Which setup method do you want to use C Push the button on my access point Enter the PIN from my access point Enter the PIN 41536142 into sour access point or extemal recistrar and click Ment to Conte Automatically select the network Step 3 Enter wireless client s PIN into Enrollee s PIN of Web and apply Start button 60 Chapter 4 Configuration English Manual i Configuration WPS Parameters WPS Serice Enable O Disable Role Registrar Enrollee WPS PIN for 4955 Enrollee s PIN Step 4 New WPS device have join into the wireless network v Jumpstart Wi Fi Protected Setup Jumpstart for Wireless onfituraton Successfully Done Confirzuraton Information bell WairelessWetwork1 S80 61 Chapter 4 Configuration English Manual Port Setting This section allows you to configure the settings for the router s Ethernet ports to solve some of the compatibility problems that may be encountered wh
133. phanumeric characters NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing the single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled IP 0 0 0 0 Auto Your WAN IP address Leave this at 0 0 0 0 to obtain automatically an IP address from your ISP Auth Protocol Default is Auto Your ISP should advise you on whether to use Chap or Pap Connection 68 Chapter 4 Configuration English Manual Always on If you want the router to establish a PPP session when starting up and to automatically re establish the PPP session when disconnected by the ISP Connect on Demand If you want to establish a PPP session only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet Idle Timeout Auto disconnect the broadband firewall gateway when there is no activity on the line for a predetermined period of time Detail You can define the destination port and packet type TCP UDP without checking by timer It allows you to set which outgoing traffic will not trigger and reset the idle timer MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP functio
134. quire a key Before any IPSec traffic can be passed each router must be able to verify the identity of its peer This can be done by manually entering the pre shared key into both sides router or hosts Local ID Content Input ID s information like domain name www ipsectest com Remote ID Identifier Inout remote ID s information like domain name www ipsectest com SA Lifetime Specify the number of minutes that a Security Association SA will stay active before new encryption and authentication key will be exchanged There are two kinds of SAs IKE and IPSec IKE negotiates and establishes SA on behalf of IPSec an IKE SA is used by IKE Phase 1 IKE To issue an initial connection request for a new VPN tunnel The range can be from 5 to 15 000 minutes and the default is 480 minutes Phase 2 IPSec To negotiate and establish secure authentication The range can be from 5 to 15 000 minutes and the default is 60 minutes A short SA time increases security by forcing the two parties to update the keys However every time the VPN tunnel re negotiates access through the tunnel will be temporarily disconnected PING for Keep Alive None The default setting is None To this mode it will not detect the remote IPSec peer has been lost or not It only follows the policy of Disconnection time after no traffic which the remote IPSec will be disconnected after the time you set in this function PING This mode wil
135. r immediately and have it repaired at a qualified service center Avoid using this product and all accessories outdoors Place the router on a stable surface Only use the power adapter that comes with the package Using a different Attention voltage rating power adaptor may damage the router Chapter 2 Installing the router English Manual Package Contents 3G ADSL2 802 11g VPN Firewall Router CD containing the online manual RJ 11 ADSL telephone Cable Ethernet Cable Console tool kit Power adapter A detachable antenna Quick Start Guide Cin the CD Nd ADSL2 Router Quick Start Guide Console Kit Chapter 2 Installing the router English Manual The Front LEDs Antenna m Etherent Power 1 2 3 4 USB Wireless Mail DSL Interent Lit when power turns ON Lit in red means the system is failed To restart the device or connect service provider for support LAN Port Lit when one of LAN ports connected to an Ethernet device en The speed of transmission hits 100Mbps appears Green 1X 4X RJ 45 connector The speed of transmission hits 10Mbps appears Orange Blinking when data is Transmitted Received Lit when the device connected to a USB device Flash when the device is sending receiving data Lit green when the wireless connection is established Wireless Flashes when the device is sending receiving data Flash once per second while wi fi protected setup is in progress fit L
136. ration English Manual PPTP Connection LAN to LAN Click Configuration VPN PPTP Choose LAN to LAN from Connect Type drop down menu Configuration TE a PPTP Parameters Name fd Connection Type Type Server IF Addressfor Domain Name fs Peer Network IP Netmask fs Username oo Password Ys Auth Type Data Encryption Key Length Mode Active as default route Enable Edit Active Name Connection Type Type Delete Name A given name of the connection Connection Type Remote Access or LAN to LAN Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server When configuring your router as a Client enter the remote Server IP Address or Domain name you wish to connect to When configuring your router as a server enter the Private IP Address Assigned to Dial in User address Peer Network IP Enter Peer network IP address Netmask Enter the subnet mask of peer network based on the Peer Network IP setting Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user server enter your own username Password If you are a Dial Out user client enter the password provided by your Host If you are a Dial In user Server enter your own password Authentication Type Default is Auto if you want the router to determine the authentication type to use
137. re advised to use specific Virtual Server entries just for the ports your application requires instead of using DMZ As doing so will result in all connections from the WAN attempt to access to your public IP of the DMZ PC specified If you have disabled the NAT option in the WAN ISP section the Virtual Server function will hence be invalid If the DHCP server option is enabled you have to be very careful in assigning the IP addresses of the virtual servers in order to avoid conflicts The easiest Attention way of configuring Virtual Servers is to manually assign static IP address to each virtual server PC with an address that does not fall into the range of IP addresses that are to be issued by the DHCP server You can configure the virtual server IP address manually but it must still be in the same subnet as the router ee S Chapter 4 Configuration English Manual Edit DMZ Host The DMZ Host is a local computer exposed to the Internet When setting a particular internal IP address as the DMZ Host all incoming packets will be checked by the Firewall and NAT algorithms then passed to the DMZ host when a packet received does not use a port number used by any other Virtual Server entries Cautious This Local computer exposing to the Internet may face varies of security risks Go to Configuration gt Virtual Server gt Edit DMZ Host Configuration i i al Edit DMZ Host DMZ Host O Enabled Disabled Enable
138. reated using the Backup function with the most current firmware version Settings files saved to your PC should not be manually edited in any way 89 Chapter 4 Configuration English Manual Restart Router Click Restart with option Current Settings to reboot your router and restore your last saved configuration j Configuration 1 a t Restart Router After restarting please watt for afew seconds for system to come up if you would like to reset all configuration to factory default settings please select the Factory Default Settings option Restart Router with Current Settings O Factory Default Settings lf you wish to restart the router using the factory default settings for example after a firmware upgrade or if you have saved an incorrect configuration select Factory Default Settings to reset to factory default settings You may also reset your router to factory settings by holding the small Reset pinhole button more than 6 seconds on the back of your router Caution After pressing the RESET button for more than 6 seconds to be sure you power cycle the device again 90 Chapter 4 Configuration English Manual User Management In order to prevent unauthorized access to your router s configuration interface it requires all users to login with a password You can set up multiple user accounts each with their own password You are able to Edit existing users and Add new users who are able to access the dev
139. rk JUMPSTART FFOR WIRELESS Step 3 Enter AP s PIN into the utility and click on the next button 51 Chapter 4 Configuration English Manual E Jumpstart Wi Fi Protected Setup Ed Configure a Wireless Network Jumpstart i preparing to configure your wireless network What is the PIN value for your access point JUMPSTART FOR WIRELESS E A Ee a E eareanrn Automatically select the network v Step 4 These are two ways to trigger AP as Enrolee role you can choose one to do it Push AP s WPS button 1 second and release it Inthe AP s WPS configuration page change Role to Enrollee and apply Start button Configuration Ti a WPS Parameters WPS Serice Enable Disable Role Registrar Enrollee WPS PIN for 49eo Mode FIN Step 5 Jumpstart WPS utility search WPS AP 52 Chapter 4 Configuration English Manual E Jumpstart Wi Fi Protected Setup Aa mearc hinge for a network Curent PIN 70749007 Step 6 SSID and security will be generated automatically You can change it and apply next button E Jumpstart Wi Fi Protected Setup Network Settings Enter the network ttines which your network will be configured to Which secunty type do you want to ue CO None Secure Enter a WPRASW PAS passphrase 6 to 63 ASCI or 64 hex characters wo a OO i ai Step 7 WPS set up complete And you have s
140. roduces a 128 bit hash SHAT A one way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are several options DES 3DES AES 128 192 and 256 and NULL NULL means it is a tunnel only with no encryption 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 56 3 bits as an encryption method AES Stands for Advanced Encryption Standards you can use 128 192 or 256 bits as encryption method Perfect Forward Secrecy Choose whether to enable PFS using Diffie Hellman public key cryptography to change encryption keys during the second phase of VPN negotiation This function will provide better security but extends the VPN negotiation time Diffie Hellman is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups a A Chapter 4 Configuration English Manual Pre shared Key This is for the Internet Key Exchange IKE protocol a string from 4 to 128 characters Both sides should use the same key IKE is used to establish a shared security policy and authenticated keys for services such as IPSec that re
141. rough A OFF the router To configure other types of workstations please consult the manufacturer s documentation 11 Chapter 3 Basic Installation English Manual Connecting Your Router 1 Connect this router to a LAN Local Area Network and the ADSL telephone ADSL network Power on the device Make sure the Power is lit steadily and that the LAN LED is lit Connect RJ 11 cable to LINE Port when connecting to the telephone wall jack Connect USB 2 0 cable oR VN Antenna ji Led i SEE h Cable ernet Cable t Cabl t Cabl USB C ectio I eli pmr Switching A HUB o a Line ADSL T a Splitter 3G Moden 12 Chapter 3 Basic Installation English Manual Configuring PCs in Windows 7 1 Go to Start Click on Control Panel Then click on Network and Internet 2 When the Network and Sharing Center window pops up select and click on Change adapter settings on the left window panel 3 Select the Local Area Connection and right click the icon Properties Chapter 3 Basic Installation OW E gt Control Panel gt gt Search Contro Pane p Adjust your computer s settings View by System and Security User Accounts and Family Safety x 4 Review your computer s status W Add or remove user accounts 2 Back up your computer Set up parental controls for any user Find and fix problems Appearance and Personalization Change the theme Change desktop background A
142. rt 110 When an incoming access request to the router for a specified port is received it will be forwarded to the corresponding internal server i Configuration TE aj Port Forwarding Virtual Server Entry Protocol icp Ww Time Schedule Conley k Edit Application Time Schedule Protocol External Fot Redirect Fot IP Address Interface Delete HTTP_Server Always On icp 60 80 80 60 192 166 1 101 ipwan O Application Users define description to identify this entry or click drop down menu to select existing predefined rules set Yi 20 predefined rules are available Application Protocol and External Redirect Ports will be filled after the selection Protocol It is the supported protocol for the virtual server In addition to specifying the port number to be used you will also need to specify the protocol used The protocol used is determined by the particular application Most applications will use TCP or UDP Time Schedule User defined time period to enable your virtual server You may specify a time schedule or Always on for the usage of this Virtual Server Entry For setup and detail refer to Time Schedule section External Port The Port number on the Remote WAN side used when accessing the virtual server Redirect Port The Port number used by the Local server in the LAN network md Chapter 4 Configuration English Manual Internal IP Address The private IP in the LAN network which will be pr
143. s 192 168 1 200 will be assigned to the remote worker Please make sure this IP is not used in the Office LAN Configuration WAS a LZTP Parameters Name VPN_L2TP Connection Type Remote Access y Type Dialin Private IP Address Assigned to Dialin user 492 168 1200 Sees usemame Password eeeeee Auth Type ChaptAuto Active as Tunnel c Authentication H Enable default Enable route Remote Host _ _ Name Local Host NameiOptional Optional IPSec Enable Authentication MDS Encryption 3DES w Perfect oes None l F eshmediey F Secrecy i Add Edit Active Name connection Type Type Delete Description aio VPN_L2TP Given a name of L2TP connection 2 Connection Type Remo Aces Select Remote Access from Connection Type drop down menu Select Dial in from Type drop down menu IP Address 192 168 1 200 An assigned IP address for the remote worker a pame ens o Input username amp password to authenticate remote worker 5 Auth Type Chap Auto _ Keep as default value in most of the cases Perfect Forward None Both sites should use the same value Secrecy Pre shared Key 12345678 35 Chapter 4 Configuration English Manual Example Configuring a Remote Access L2TP VPN Di
144. s 2000 does not support UPnP Disable Check to disable the router s UPnP functionality Enable Check to enable the router s UPnP functionality UPnP Port Its default setting is 2800 It is highly recommended for users to use this port value If this value conflicts with other ports already being used you may wish to change the port SNMP Access Control Software on a PC within the LAN is required in order to utilize this function Simple Network Management Protocol Disable Check to disable the routers SNMP functionality Enable Check to enable the router s SNMP functionality SNMP V1 and V2 Read Community Specify a name to be identified as the Read Community and an IP address This community string will be checked against the string entered in the configuration file Once the string name is matched user obtains this IP address will be able to view the data dB Chapter 4 Configuration English Manual Write Community Specify a name to be identified as the Write Community and an IP address This community string will be checked against the string entered in the configuration file Once the string name is matched users from this IP address will be able to view and modify the data Trap Community Specify a name to be identified as the Trap Community and an IP address This community string will be checked against the string entered in the configuration file Once the string name is matched users from this IP
145. s at 0 0 0 0 to obtain automatically an IP address from your ISP Auth Protocol Default is Auto Your ISP should advise you on whether to use Chap or Pap Connection Always on If you want the router to establish a PPP session when starting up and to automatically re establish the PPP session when disconnected by the ISP Connect on Demand If you want to establish a PPP session only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet Idle Timeout Auto disconnect the broadband firewall gateway when there is no activity on the line for a predetermined period of time Detail You can define the destination port and packet type TCP UDP without checking by timer It allows you to set which outgoing traffic will not trigger and reset the idle timer MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function TCP MSS Clamp This option helps to discover the optimal MTU size automatically Default is enabled MAC Spoofing This option is required by some service providers You must fill in the MAC address that specify by service provider when it is required Default is disabled Obtain DNS A Domain Name System DNS contains a mapping table for domain name and IP addresses DNS helps to
146. s route will use Cost The number of hops counted as the cost of the route 31 Chapter 4 Configuration English Manual NAT Sessions This section lists all current NAT sessions between interface of types external WAN and internal LAN i Status 1i aj HAT Sessions No active NAT sessions between interfaces of types external and internal UPnP Portmap The section lists all port mapping established using UPnP Universal Plug and Play See Advanced section of this manual for more details on UPnP and the router s UPnP configuration options ii status 1 ay UPnP Portmap UPnP Portmap Table Name Protocol External Port Redirect Port IF Address Duration s 32 Chapter 4 Configuration English Manual PPTP Status This shows details of your configured PPTP VPN Connections l Status wa a PPTP Status VPN PPTP for Remote Access Application cee pS ames Tunnel Call ee Mame Type Enable Active el ree Encryption VPH PPTP for LAN to LAN Application TI IS mE Tunnel Call ETSIA Name Type Enable Active EE aoe Encryption Name The name you assigned to the particular PPTP connection in your VPN configuration Type The type of connection dial in dial out Enable Whether the connection is currently enabled Active Whether the connection is currently active Tunnel Connected Whether the VPN Tunnel is currently connected Call Connected If the Call for this VPN entry is currently connected Encryption The
147. se undesired operation CE Statement EMC Compatibilty This device complies with EN Standards EN55022 and EN55024 according to the relevant EC EMC Directive It must be used with shielded cables only to maintain EMC compatibility Dieses Produkt entspricht den einschl gigen EMV Richtlinien der EU und darf nur zusammen mit abgeschirmten Kabeln verwendet werden LINDY Herstellergarantie LINDY gewahrt fur dieses Produkt Uber die gesetzliche Regelung hinaus eine zweijahrige Herstellergarantie ab Kaufdatum Die detaillierten Bedingungen dieser Garantie finden Sie auf der LINDY Website aufgelistet bei den AGBs WEEE Waste of Electrical and Electronic Equipment Recycling of Electronic Products In 2006 the European Union introduced regulations WEEE for the collection and recycling of all waste electrical and electronic equipment The wheelie bin symbol shown indicates that this product must not be disposed of with household waste Instead the product must be recycled in a manner that is environmentally friendly For more information on how to dispose of this product please contact your local recycling centre or your household waste disposal service Each individual EU member state has implemented the WEEE regulations into national law in slightly different ways Please follow your national law when you want to dispose of any electrical or electronic products More details can be obtained from your national WEEE recycling agency Germany
148. sly with one IP address one Internet access account Many application layer gateway ALG are supported such as web browser ICQ FTP Telnet E mail News Net2phone Ping NetMeeting IP phone and others SOHO Firewall Security with DoS and SPI Along with the built in NAT natural firewall feature the router also provides advanced hacker pattern filtering protection It can automatically detect and block Denial of Service DoS attacks The router is built with Stateful Packet Inspection SPI to determine if a data packet is allowed through the firewall to the private LAN Domain Name System DNS Relay lt provides an easy way to map the domain name a friendly name for users such as www yahoo com and IP address When a local machine sets its DNS server with this router s IP address every DNS conversion request packet from the PC to this router will be forwarded to the real DNS in the outside network Dynamic Domain Name System DDNS The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname This dynamic IP address is the WAN IP address For example to use the service you must first apply for an account from a DDNS service like http www dyndns org More than 5 DDNS servers are supported Quality of Service QoS QoS gives you full control over which types of outgoing data traffic should be given priority by the router ensuring important data like gaming packets customer information or management inf
149. sword provided by your Host If you are a Dial In user Server enter your own password Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you Know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using PAP the password is sent unencrypted whilst CHAP encrypts the password S EG 72 Chapter 4 Configuration English Manual before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder Tunnel Authentication This enables router to authenticate both the L2TP remote and L2TP host This is only valid when L2TP remote supports this feature Secret The secure password length should be 16 characters which may include numbers and characters Active as default route Commonly used by the Dial out connection which all packets will route through the VPN tunnel to the Internet therefore active the function may degrade the Internet performance Remote Host Name Optional Enter hostname of remote VPN device It is a tunnel identifier from the Remote VPN device matches with the Remote hostname provided If remote hostname matches tunnel will be connected otherwise it will be dropped Cautio
150. t on Demand If you want to establish a PPPoE session only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet Idle Timeout Auto disconnect the router when there is no activity on the line for a predetermined period of time MTU Maximum Transmission Unit The size of the largest datagram excluding media specificheaders that IP will attempt to send through the interface 80 Chapter 4 Configuration English Manual Auth Protocol Default is Auto Your ISP advises on using Chap or Pap MAC Spoofing Select Enable and enter a MAC address that will temporarily change your router s MAC address to the one you have specified in this field Leave it as Disabled if you do not wish to change the MAC address of your router Obtain DNS Select Automatic to use DNS Primary DNS Secondary DNS Enter the IP addresses of the DNS servers The DNS servers arepassed to the DHCP clients along with the IP address and the subnet mask 81 Chapter 4 Configuration English Manual Pure Bridge i Configuration WAN Connection Pure Bridge Profile Port EWAN WAN Port Acceptable Frame Type Filter Type Profile Port Select the profile port as EWAN Protocol Select Pure Bridge Acceptable Frame Type Specify which kind of traffic goes through this connection all traffic oronly VLAN tagged Filter Type Specify the type of ethernet filtering performed
151. tbound Allow Rule Name Users define description to identify this entry or click Select drop down menu to select existing predefined rules The maximum name length is 32 characters Time Schedule It is self defined time period You may specify a time schedule for your prioritization policy For setup and detail refer to Time Schedule section Source IP Address es Destination IP Address es This is the Address Filter used to allow or block traffic to from particular IP address es Selecting the Subnet Mask of the IP address range you wish to allow block the traffic to or form set IP address and Subnet Mask to 0 0 0 0 to inactive the Address Filter rule Tip To block access to from a single IP address enter that IP address as the Host IP Address and use a Host Subnet Mask of 255 255 255 255 Source Port This Port or Port Ranges defines the port allowed to be used by the Remote WAN to connect to the application Default is set from range 0 65535 It is recommended that this option be configured by an advanced user Destination Port This is the Port or Port Ranges that defines the application Type It is the packet protocol type used by the application select TCP UDP or both TCP UDP Protocol Number Insert the port number Inbound Outbound Select Allow or Block the access to the Internet Outbound or from the Internet Inbound Click Add button to apply your changes 99 Chapter 4 Configur
152. tbound allowed will let HT TPS data go through Firewall Block WAN Request Enable aaa Mr Enable for preventing any ping test from interet such as hacker attack SIP ALG Enable Disable FTP ALG Enable Disable 95 Chapter 4 Configuration English Manual ROTE Any remote user who is attempting to perform this action may result in blocking all the accesses to configure and manage of the device from the Internet 96 Chapter 4 Configuration English Manual Packet Filter This function is only available when the Firewall is enabled and one of these four security levels is chosen All blocked High Medium and Low The preset port filter rules in the Packet Filter must modify accordingly to the level of Firewall which is selected See Table1 Predefined Port Filter for more detail information Configuration Packet Filter Parameters Rule Name Helper lt lt Select Time Schedule Always On v Source IP Address es 0 0 0 0 A Netmask 0 0 0 0 Destination IP Address es 0 0 0 0 Netmask 0 0 0 0 Type TCP iz v Protocol Number Source Port fo es535 Destination Port 0 es635 Inbound Allow v Outbound Allow v Add Edit Delete Source IP Netmask Source ports Inbound Edit Rule Name Time Schedule Protocol Delete Destination IP Netmask Destination ports Outbound 0 0 0 0 0 0 0 0 0 65535 Block O mei_http Always On TCP O 0 0 0 0 7 0 0 0 0 a0 38
153. te Host _ Name Local Host Name optional Optional ii IPSec MeEnable Authentication MDS Encryption 3DES kad Perfect gs a be perp see Forward None Pre shared Key 12345678 Secrecy a a ies ii Edit Active Name Connection Type Type Delete Item Function Description 1 Name _ HeadOffice Given a name of L2TP connection 2 Connection Type LAN to LAN wipe LAN to LAN from Connection Type drop down a an ee a ta mpe dop doen Mi oaao a feet eee Branch office network os peran __ pee Input username amp password to authenticate branch office network 6 AuthType Chap Auto Keep as default value in most of the cases Perfect Forward hone Both sites should use the same value Secrecy Pre shared Key 12345678 42 Chapter 4 Configuration English Manual Configuring L2TP VPN in the Branch Office The IP address 69 1 121 30 is the Public IP address of the router located in head office If you registered the DDNS please refer to the DDNS section of this manual you can also use the domain name instead of the IP address to reach the router Configuration n AS a L2TP Parameters Name Branch Offi ce Connection Type LAN to LAN w Type Dial out l serwer F Address tor Domain Name 69 121 1 33 a Peer NetworkiP 192 1681 0 Netmask 255 255 25
154. ted Connection i Configuration YWAN Connection IPoA Routed Profile Port ADSL Protocal ATM Class UBR E Description IPoA routed VPIACI 33 NAT Enable MTU IP 0 0 0 0 Auto 0 0 0 0 Netmask 0 0 0 0 Gateway fs RIP LJ RiPwi CJ RIP v2 CI RIP v2 Multicast TCP MSS Clamp Enable Obtain DNS m Automatic Primary joo00 O Secondary Add Edit Delete Edit Name Description Creator VPI VOI Delete C wanlink PPPoE WAN Link Factory Defaults 0 33 Profile Port Select the profile port as ADSL Protocol The ATM protocol will be used in the device Description A given name for the connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing a single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface IP 0 0 0 0 Auto Your WAN IP address Leave this at 0 0 0 0 to obtain automatically an IP address from your ISP Netmask The default is 255 255 255 0 User can change it to other such as 255 255 255 128 Type the subnet mask assigned to you by your ISP if given Gateway Enter the IP addr
155. ternet for their portal The default value of APN is internet Username Enter the username provided by your service provider Password Enter the password provided by your service provider 83 Chapter 4 Configuration English Manual Auth Protocol Manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you Know which authentication type the server is using when acting as a Client or the authentication type you want the clients to use when tehy are connecting to you when acting as a server When using PAP the password is sent unencrypted while CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that an intruder has not replaced the client MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface PIN PIN stands for Personal Identification Number A PIN code is a numeric value used in certain systems as a password to gain access and authentication In mobile phones a PIN code locks the SIM card until you enter the correct code If you enter the PIN code incorrectly into the phone 3 times in a row then the SIM card will be blocked and a PUK code will be required from your network service provider to unlock tt Connection Connection Keep Alive Enable Always On The router will make UMTS GPRS call when start
156. that this IP Address connects to Static Static status of the ARP table entry no for dynamically generated ARP table entries yes for static ARP table entries added by the user 29 Chapter 4 Configuration English Manual DHCP Table i Status DHCP Table Type Leased Expired Permanent Leased Table IF Address WAC Address Client Host Name Expiry Leased The DHCP assigned IP addresses information Expired The expired IP addresses information Permanent The fixed host mapping information Leased Table IP Address The IP address that assigned to client MAC Address The MAC address of client Client Host Name The Host Name Computer Name of client Expiry The current lease time of client 30 Chapter 4 Configuration English Manual Routing Table Status Routing Table Routing Table Valid Destination Netmask Gateway lntertace Cost RIP Routing Table Destination Netmask Gateway Cost Routing Table Valid It indicates a successful routing status Destination The IP address of the destination network Netmask The destination Netmask address Gateway Interface The IP address of the gateway or existing interface that this route will use Cost The number of hops counted as the cost of the route RIP Routing Table Destination The IP address of the destination network Netmask The destination Netmask address Gateway The IP address of the gateway that thi
157. ule Always On Source Destination IP Address es 0 0 0 0 I do not wish to active the address filter instead use the port filter Type TCP Please refer to Table1 Predefined Port Filter Source Port 0 65535 I allow all ports to connect with the application Redirect Port 80 80 This is Port defined for HTTP Inbound Outbound Allow j Configuration n AS t Packet Filter by Farameters Rule Mame Helper Cindy HTTP Time Schedule yw Metmask 0 0 0 0 Metmask 0 0 0 0 Source IP Addressies Destination IP Addressfesi Se WS ojal z am eae bo ojll D 5 Type TOP w Protocol Number e Source Port o 65536 Destination Part o iaa Inbound Outbound Add Edit Delete Source IP MNetmask source portis Inbound Rule Mame Time Schedule Protocol Destination IP f Wetmask Destination portis Outbound 4 The new port filter rule for HTTP is shown below 0 0 0 0 7 0 0 0 0 O 65535 Alloy O Cindy HTTP Always On cle 3 O 0 0 07 0 0 0 0 20 80 Allow Configure your Virtual Server port forwarding settings so that incoming HTTP requests on port 80 will be forwarded to the PC running your web server Note For how to configure the HTTP in Virtual Server go to Add Virtual Server in Virtual Server section for more details S E OG Chapter 4 Configuration English Manual I Configuration T Port Forwarding Virtual Server Entry Protocol tcp ww Time Schedule Internal IF Address
158. uration English Manual Backup Restore i Configuration Ti a Backup Restore Allows youto backup the configuration settings to your computer or restore configuration from your computer Backup Configuration Backup configuration to your computer Restore Configuration Restore Wil ovenvrite the current configuration and restart the device IOL want to seep the current configuration pease Use Backup first to save current configuration This function allows you to save a backup of the current configuration of your router to a file on your PC or to restore a previously saved configuration This is very useful if you wish to customize the setting of the router Knowing in advance that you can always restore the setting if any mistakes do occur Therefore It is advisable that you create a backup of the configuration of your router before customizing its configuration Create a Router Configuration Backup To create a backup of the setting simply press the Backup button and specify the location on where to save your configuration file You may also change the name of the file if you wish to keep multiple backups Restoring the Router Configuration To restore the configuration of the router press Browse to locate the configuration file from your PC Once the file has been located click on the file then click on the Restore button to load the setting Note You should only restore the setting with the files that have been c
159. us This is only when the router performs as a VPN server This option should be used by advanced users only Local Host Name Optional Enter hostname of Local VPN device that is connected establishes a VPN tunnel As default Router s default Hostname is home gateway IPSec Enable for enhancing your L2TP VPN security Authentication Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit There are three options Message Digest 5 MD5 Secure Hash Algorithm SHA1 or NONE SHA1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that produces a 128 bit hash SHAT A one way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are four options DES 3DES AES and NULL NULL means it is a tunnel only with no encryption 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 56 3 bits as an encryption method AES Stands for Advanced Encryption Standards it uses 128 bits as an encryption method Perfect Forward Secrecy Choose whether to enable PFS using Diffie Hellman public key cryptography to change encryption keys during the second phase of VPN negotiation This function will provide better security but
160. user defined period by default 3 minutes You can modify this value using the Advanced Device Management section of the web interface Please see the Advanced section of this manual for more information EF 2 Chapter 4 Configuration English Manual Chapter 5 Troubleshooting If the router is not functioning properly first check this chapter for simple troubleshooting before contacting your service provider for support Problems starting up the router Problem Corrective Action None of the LEDs are Check the connection between the adapter and the router If the error on when you turn on persists you may have a hardware problem In this case you should the router contact technical support You have forgotten Try the default username admin and password admin If this fails you your router login can restore your router to its factory settings by holding the Reset button and or password on the back of your router more than 6 seconds Problems with the WAN Interface Problem Corrective Action Initialization of the Ensure that the telephone cable is connected properly from the ADSL port PVC connection to the wall jack The ADSL LED on the front panel of the router should be linesync failed on Check that your VPI VCI encapsulation type and type of multiplexing settings are the same as those provided by your ISP Reboot the router GE If you still have problems you may need to verify these settin
161. ver When using PAP the password is sent unencrypted whilst CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that an intruder has not replaced the client Data Encryption Data sent over the VPN connection can be encrypted by an MPPE algorithm Default is Auto so that this setting is negotiated when establishing a connection or else you can manually Enable or Disable encryption Key Length The data can be encrypted by MPPE algorithm with 40 bits or 128 bits Default is Auto it is negotiated when establishing a connection 128 bit keys provide stronger encryption than 40 bit keys Mode You may select Stateful or Stateless mode The key will be changed every 256 packets when you select Stateful mode If you select Stateless mode the key will be changed in each packet Active as default route Commonly used by the Dial out connection which all packets will route through the VPN tunnel to the Internet therefore active the function may degrade the Internet performance Active This function activates or deactivates the PPTP connection Check Active checkbox if you want the protocol of tunnel to be activated and vice versa Note When the Active checkbox is checked the function of Edit and Delete will not be available Click Edit Delete button to save your changes a IG Chapter 4 Configuration English Manual Example Configuring a Remote Access PPTP VPN Dial out Connection
Download Pdf Manuals
Related Search
Related Contents
ML1020 Neptune Betriebsanleitung - Terratec Cinergy Hybrid XE 321 Studios 1650 PSI Electric pressure Washer 69488 Owner's Manual Copyright © All rights reserved.
Failed to retrieve file