Home

User's manual MH-3400 - PLANET Technology Corporation.

image

Contents

1. Dynamic IP Domain NamefFODN Authentication ho 7 5 Dynamic IP E mail Addr USER FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to connect to VPN without entering IP address When VPN Gateway requires for VPN connection the device will start authentication and respond to VPN tunnel connection If users select this option to link to VPN enter E Mail address to the empty field for E Mail authentication This option allows users to set the local VPN connection access type The following offers a few items for local settings Please select and set appropriate parameters 1 IP address This option allows the only IP address which is entered to build the VPN tunnel me 09 1 e Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 can establish connection 91 Gigabit Multi Homing VPN Security Router User s Manual 2 Subnet This option allows local computers in this subnet can be connected to the VPN tunnel Reference When this VPN tunnel is connected only computers with the session of 192 168 1 0 and with subnet mask as 255 255 255 0 can connect with remote VPN 92 Gigabit Multi Homi
2. ha e Networking amp Communication H Ria mise WA i 7 v P y aw L TS paer Jur na T Na mar MH 3400 Gigabit Multi Homing VPN Security Router User s Manual Copyright Copyright 2012 by PLANET Technology Corp All rights reserved No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language or computer language in any form or by any means electronic mechanical magnetic optical chemical manual or otherwise without the prior written permission of PLANET PLANET makes no representations or warranties either expressed or implied with respect to the contents hereof and specifically disclaims any warranties merchantability or fitness for any particular purpose Any software described in this manual is sold or licensed as is Should the programs prove defective following their purchase the buyer and not this company its distributor or its dealer assumes the entire cost of all necessary servicing repair and any incidental or consequential damages resulting from any defect in the software Further this company reserves the right to revise this publication and to make changes from time to time in the contents hereof without obligation to notify any person of such revision or changes All brand and product names mentioned in this manual are trademarks and or registered trademarks of their respective
3. 17 TESTI connection DESMDSM 255255 255 0 255 255 255 0 192 168 1 1 Add Tunnel s Previous Page Next Click Previous page or Next page to view the desired VPN tunnel page Or users Page Jump to _ __ can select the page number directly to view all VPN tunnel statuses such as 3 5 Page __ Entries Per 10 20 or All Page Tunnel No To set the embedded VPN feature please select the tunnel number It supports up to 300 IPSec VPN tunnel Setting gateway to gateway as well as client to gateway Status Successful connection is indicated as Connected Phase2 Displays settings such as encryption DES 3DES authentication MD5 SHA1 Failing hostname resolution is indicated as Hostname Resolution Failed Resolving hostname is indicated as Resolving Hostname Waiting to be connected is indicated as Waiting for Connection If users select Manual setting for IPSec setup the status message will display as Manual and there is no Tunnel test function available for this manual setting Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid confusion should users have more than one tunnel settings If this tunnel is to be connected to other VPN device not this device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can thus be successfully enabled En
4. LX You can only choose either Destination Auto Binding or User Define Dis Or Port Auto Binding Take default rules for example Destination Auto Binding User Define Dest IP or Port Auto Binding service All Traffic TCP amp UDP 1 65535 pear ALTO Enable Add to list HTTPS TCP 443 443 gt 0 0 0 0 0 0 0 0 Delete selected Entry 42 Gigabit Multi Homing VPN Security Router User s Manual When any intranet IP connects with TCP443 port or any destination 0 0 0 0 to O represents any destination it will go through the same WAN IP As for which WAN will be selected this follows the first chosen WAN IP distributed by the original session balance mechanism For example there are two intranet IP 192 168 100 1 and 192 168 100 2 When these intranet IPs first connects with TCP443 port 192 168 100 1 will go through WAN1 and 192 168 100 2 will go through WANZ Afterwards 192 168 100 1 will go through WAN1 when there are TCP443 port connections 192 168 100 2 will go through WAN2 when there are TCP443 port connections This rule is by default You can delete or add rules to meet your connection requirement 6 2 2 Network Detection Service This is a detection system for network external services If this option is selected information such Retry or Retry Timeout will be displayed If two WANs are used for external connection be sure to activate the NSD system so as to avoid
5. Status Normal indicates the device operates well Status of the backup Indicates status of backup device If the status is normal administrators can login device the device remotely to manage Remote Management should be enabled Status Abnormal indicates the backup device can not be detected or does exist and need to inspect the backup device actual status High Availability Enable C Disable Mode Hardware Backup Mode C Two devices are operating simultaneously Ope ration C Master Mode 3 Backup Mode Master Slave Mode setting Of two devices must be different LAN IP of the backup device 2 fe h E unc anno evap oc PF Status Normal Operation Backup Indicates the backup device will take over when the master fails transmitting Mode WAN and LAN IP setting in backup device should be the same as those of master device The backup device should not be in charge of network transmitting and DHCP server x If the original LAN IP addresses are issued by Master device DHCP server setting of Backup device should be the same as Master device The Backup 126 Gigabit Multi Homing VPN Security Router User s Manual H device can keep DHCP functioning and there will be no LAN disconnection LAN IP of the backup Input LAN IP of Master mode which is backed up device MAC Address of the Input Master device MAC address which is backed up backup device Status Normal indicates the status is idle
6. and then click Enable Finally click Add New and the rule will be added to the mode Protocol Binding sevice All Traffic TCP amp UDP 1 655351 a Interface WAN Enabled Update this Application to 8 HEE EEE Ao All Traffic TCP amp UDPM 65535 gt 192 168 1 100 100 0 0 0 0 0 0 0 0JWAN 2 Delete selected tem Add 49 Gigabit Multi Homing VPN Security Router User s Manual Example 2 How do set up Auto Load Balance Mode to keep Intranet IP 192 168 1 150 200 from going through WAN2 when the destination port is Port 80 As in the figure below select HTTP TCP 80 80 from the pull down option list Service and then in the boxes for Source IP input 192 168 1 150 to 200 Retain the original numbers 0 0 0 0 in the boxes of Destination IP which means to include all Internet IP addresses Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode Protocol Binding Semice HTTP TCP 80 80 Service Management Enabled HTTP TCP 80 80 gt 192 168 1 150 200 0 0 0 0 0 0 0 0 WAN 2 Delete selected tem Add Snow Takie PERE ELI Genzel Example 3 How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going through WAN2 when the destination port is Port 80 and keep all other services from going through
7. are a passive one the system will wait for the other re establish the VPN tunnel Remote Host Remote network nodes to detect the location the server address is best to be fast and stable response proposal can fill in the VPN remote Sever LAN IP please do not enter the server address which can not respond to ICMP Time interval External connection detect ping timeout seconds default is 30 seconds When the VPN tunnel established every 30 seconds send ICMP detect the connection status with the server Retry Count Ping retries default is five If the ping retry count exceeds the number of the remote server is not responding then determine the VPN line break 98 Gigabit Multi Homing VPN Security Router User s Manual 10 1 1 2 Client to Gateway Setting The following describes how an administrator builds a VPN tunnel between devices Users can set this VPN tunnel to be used by one client Only one tunnel will be set and used by a group of clients which allows easy setting Situation in Tunnel Tunnel No Set the embedded VPN feature please select the Tunnel number Tunnel Name Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid confusion If this tunnel is to be connected to the other VPN device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can
8. 75 Gigabit Multi Homing VPN Security Router User s Manual Chapter 9 Firewall This chapter introduces firewall general policy access rule and content filter settings to ensure network security 9 1 General Policy The firewall is enabled by default If the firewall is set as disabled features such as SPI DoS and outbound packet responses will be turned off automatically Meanwhile the remote management feature will be activated The network access rules and content filter will be turned off General Policy O Enabled Disabled O Enabled Disabled Enabled ODisabled Advanced Function Enabled O Disabled OEnabled Disabled Porno O Enabled Disabled Enabled Disabled Router sends ARP 5 himes per second Apar Caneel Firewall This feature allows users to turn on off the firewall SPI Stateful Packet This enables the packet automatic authentication detection technology The Inspection Firewall operates mainly at the network layer By executing the dynamic authentication for each connection it will also perform an alarming function for application procedure Meanwhile the packet authentication firewall may decline the connections which use non standard communication protocol DoS Denial of Service This averts DoS attacks such as SYN Flooding Smurf LAND Ping of Death IP Spoofing and so on Block WAN request If set as Enabled then it will shut d
9. Auto Neg selected the ports setup will be done without any manual setting by administrators This feature allows administrators to set the LAN port to be one or more disconnected network sessions All of them will be able to log on to the Internet through the device Members in the same network session within the same VLAN can see and communicate with each other Members in different VLAN will not know the existence of other members Set VLAN All port to be the public area of VLAN so that it can be connected to other VLAN networks A server should be constructed for the intranet so that all VLAN group can visit this server Set one of the network ports as VLAN All Connect the server to VLAN All so that computers of different VLAN groups can be connected to this server Moreover the port where the administrator locates must be set as VLAN All so that it can be connected to the entire network to facilitate network management Port Enabled 1000 Mbps Full Statistics 7079145 Re resth 55 Gigabit Multi Homing VPN Security Router User s Manual Summary There are Network Connection Type Interface Link Status Up Down Port Activity Port Enabled Priority Setting High or Normal Speed Status 10Mbps 100Mbps or 1000Mbps Duplex Status half duplex or full duplex Auto Neg Enabled Disabled and VLAN Statistics The packet data of this specifi
10. Ca FE Verify device specification user s demand Login the device with Verify Firmware version Set time and re new password Verify WAN connection setting bandwidth allocation and protocol binding Set mirror port and VLAN Allocate and manage LAN IP Restrict bandwidth and session of WAN ports LAN IP and application Block attack Set Access rule and restrict Web access DMZ Forwarding UpnP Routing Mode multiple WAN IP DDNS and MAC Clone Monitor VPN Router working status and configuration backup Install VPN Router hardware based on user physical requirements Login VPN Router web based UI Verify VPN Router specification Firmware version and working status Modify the login password considering safe issue Synchronize the VPN Router time with WAN Connect to WAN Configure bandwidth to optimize data transmission Provide mirror port port management and VLAN setting functions Support Static DHCP IP allocation to meet different needs IP group will simplize the management work To assure transmission of important information manage and allocate the bandwidth further to achieve best efficiency Administrators can block BT to avoid bandwidth occupation and enable access rules to restrict employee accessing internet improperly or using MSN QQ and Skype during working time They can also protect network from Worm or ARP attacking DMZ Forwarding UpnP Routing
11. Deny All Traffic 1 WANS Any Any Always Add New Rule Restore Default Rules In addition to the default rules all the network access rules will be displayed as illustrated above Users may follow or self define the priority of each network access rule The device will follow the rule priorities one by one so please make sure the priority for all the rules can suit the setting rules 79 Gigabit Multi Homing VPN Security Router User s Manual Define the network access rule item Delete Remove the item Add New Rule Create a new network access rule Return to Default Rule Restore all settings to the default values and delete all the self defined settings 9 2 2 Add New Access Rule Service Allow All Traffic TCP amp UDP 1 65535 Scheduling Service Management Apply this rule Always ml to OO 24 Hour Format Everyday sun Mon Tue Wed Thu Fri Sal Beck C Amy Cameel Allow Permits the pass of packets compliant with this control rule Deny Prevents the pass of packets not compliant with this control rule Service Port From the drop down menu select the service that users grant or do not give permission Service Port If the service that users wish to manage does not exist in the drop down menu press Management Service Management to add the new service From the pop up window enter a service name and communications protocol and port and then click the Add to list b
12. If an ISP connection failure is detected no error message will be recorded in the System Log The packet transmitted through this WAN will be shifted to the other WAN automatically and be shifted back again when the connection for the original WAN is repaired and reconnected This option is suitable when one of the WAN connections fails and the traffic going through this WAN to the destination IP should go through the other WAN to reach the destination In this way when any of the WAN connections is broken other WANs can serve as a backup traffic can be shifted to a WAN that is still connected Default Gateway The local default communication gateway location such as the IP address of an ADSL router will be input automatically by the device Therefore users just need to check the option if this function is needed Attention Some gateways of an ADSL network will not affect packet detection If users have an optical fiber box or the IP issued by ISP is a public IP and the gateway is located at the port of the net caf rather than at the IP provider s port do not activate this option This is the detected location for the ISP port such as the DNS IP address of ISP When configuring an IP address for this function make sure this IP is capable of receiving feedback stably and speedily Please input the DNS IP of the ISP port Remote Host This is the detected location for the remote Network Segment This Remote Host IP should be
13. The network administrator can also set bandwidth control for certain Service Ports A guarantee bandwidth control for external connections can also be configured if there is an internal server Quality of Service Interface C WAN LJ wana O wana O wana LJ USB Serice All Traffic TCP amp UDP M 65535 jo LP b to o Mini Rate Kbitsec Max Rate Kbit sec Share total bandwidth with all IP addresses Assign bandwidth for each IP address IP Address i Bandwidth sharing Enabled 68 Gigabit Multi Homing VPN Security Router User s Manual Select on which WAN the QoS rule should be executed It can be a single selection or multiple selections Service Port Select what bandwidth control is to be configured in the QoS rule If the bandwidth for all services of each IP is to be controlled select All TCP amp UDP 1 65535 If only FTP uploads or downloads need to be controlled select FTP Port 21 21 Refer to the Default Service Port Number List IP Address This is to select which user is to be controlled If only a single IP is to be restricted input this IP address such as 192 168 1 100 to 100 The rule will control only the IP 192 168 1 100 If an IP range is to be controlled input the range such as 192 168 1 100 150 The rule will control IP addresses from 192 168 1 100 to 150 If all Intranet users that connect with the device are to be controlled input
14. Through the process settings users can install and operate VPN Router easily This simplifies the management and maintenance making the user network settings be done at one time The main process is as below Step 1 Hardware installation Step 2 Login Step 3 Verify device specification and set up password and time Step 4 Set WAN connection Step 5 Set LAN connection physical port and IP address settings Step 6 Set QoS bandwidth management avoid bandwidth occupation Step 7 Set Firewall prevent attack and improper access to network resources Step 8 Other settings UPnP DDNS MAC Clone Step 9 Management and maintenance settings Syslog SNMP and configuration backup Step 10 VPN Virtual Private Network function setting Step 11 Logout 2 2 Setting Flow Chart Gigabit Multi Homing VPN Security Router User s Manual Below is the description for each setting process and the correspondent contents and purposes Hardware installation N Set password and time Set WAN connection Set LAN connection physical port and IP address settings Set QoS bandwidth management avoid bandwidth occupation Set Firewall prevent attack and improper access to network resources Advanced Settings DMZ Forwardin g UPnP DDNS MAC Clone Management and maintenance settings Syslog SNMP and configuration backup 10 VPN Virtual Private Configure VPN tunnels Configure different types of VPN to meet Te
15. e iii gt LAN Default Gateway 2 LAN Public IP Range 1 o LAN Public IP Range 2 a her og gga oge GEE EAE GEE AIBA COE GEE 38 gt LAN Default Gateway 3 a LAN Public IP Range 1 a LAN Public IP Range 2 a ll m Shared Circuit WAN environment Yes N Filter broadcast packets from WAN MTU Auto Manual 1500 bytes _ Enabled Line Dropped Scheduling Line Dropped Period from 0 0 _ to do 24 Hour Format Line Dropped Scheduling minutes ahead line dropped to start new session transferring Backup Interface WAN IP address Enter the public IP address Enter the public IP address subnet mask a Gigabit Multi Homing VPN Security Router User s Manual WAN default gateway Enter the WAN default gateway which provided by your ISP DNS Servers Enter the DNS server IP address you must have to enter a DNS server IP address maximum two DNS servers IP addresses available Intranet routing default Enter one of IP addresses that provide by the ISP as your default gateway gateway Intranet IP addresses Enter your IP addresses range which IP addresses are provided by ISP If you range have multiple IP ranges you need setup group1 and group 2 You can also setup the default gateway and IP range in the group 2 Enable Line Dropped The WAN disconnection schedule will be activated by checking this option In Scheduling some areas there is a time limi
16. to link to VPN If the remote VPN gateway requires connection to the device for VPN 102 Gigabit Multi Homing VPN Security Router User s Manual connection this device will start authentication and respond to this VPN tunnel connection if users select this option to link to VPN please enter the domain name Dynamic P Domain Namel FQDN Authentication 5 Dynamic IP E mail Addr USER FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to connect to VPN without entering IP address When VPN Gateway requires for VPN connection the device will start authentication and respond to VPN tunnel connection if users select this option to link to VPN enter E Mail address to the empty field for E Mail authentication Dynamic IP E mail User FQDN Authentication ka IPSec Setup If there is any encryption mechanism the encryption mechanism of these two VPN tunnels must be identical in order to create connection And the transmission data must be encrypted with IPSec key which is known as the encryption key The device provides the IKE automatic encryption mode IKE with Preshared Key automatic Encryption Management Protocol When users set this VPN tunnel to use authentication mode users must set the parameter of this exchange password with that of the remote E seconds Group 1 s MD5 w seconds dela 103 Gi
17. 192 168 1 100 100 i 101 192 168 1 101 101 IL 2 192 168 1 2 2 il ill MM lt lt A IP list will show the list which learns the IP addresses automatically on the left under side You can also modify IP addresses manually Name Input the name of IP address or range showed below Input the name Input the name of IP address or range showed below gt gt IP address or range showed below IP Address Input IP address or range For example 192 168 1 200 250 Add to IP List After setting name and IP address push this button to add the information into the IP list below If this IP or range is already in the list you can not add it again 62 Gigabit Multi Homing VPN Security Router User s Manual Local Group Set You can choose from the IP list on the left side to set up a local IP group Choose IP Group that you would like to modify If you would like to add new groups please push Add new group button Group Name When you add new groups please note if the group name is in the column Delete Group Choose the group that you would like to delete from the pull down list and push the Delete Group button System will ask you again if you would like to delete the group After pushing the confirmation button the group will be deleted 3355 You can choose several IPs from IP list on the left side and push this button to button have them added into the group the right side Delet
18. 255 255 0 It can be changed according to the actual network structure Unified IP Management LAN IP and IP segment group DHCP can be configured here LAN Setting Device IP Address 192 res 1 Je Subnet Mask255 255 255 o L Multiple Subnet LANIPAddress SubnetMask Add to list Delete selected Subnet LAN Setting This is configuration information for the device current LAN IP address The default configuration is 192 168 1 1 and the default Subnet Mask is 255 255 255 0 It can be changed according to the actual network structure 21 Gigabit Multi Homing VPN Security Router User s Manual Multiple Subnet Setting Click Add Edit to enter the configuration page as shown in the following figure Input the respective IP addresses and subnet masks This function enables users to input IP segments that differ from the router network segment to the multi net segment configuration the Internet will then be directly accessible In other words if there are already different IP segment groups in the Intranet the Internet is still accessible without making any changes to internal PCs Users can make changes according to their actual network structure Dynamic IP There are four set of Class C DHCP server The defaults are enable LAN PCs can get IP automatically without configured and recorded Dynamic IP Enable DHCP Server Subnet Subnet Subnet3 Subnetd Enable Ll E
19. 6 06 27 54 2006 violation TCP 192 168 1 1 80 gt 192 168 1 100 1224 on ixp Connection Refused Policy Feb 6 08 18 58 2006 i violation TCP 192 166 1 101 186195 163 253 104 1486 1234 on ixp1 Connection Refused Policy Feb 6 08 19 53 2006 violation TCP 192 168 1 101 51671 gt 3 139 58 12 1234 on ixp1 132 Gigabit Multi Homing VPN Security Router User s Manual Incoming Packet Log View system packet log of those entering the firewall The log includes information about the external source IP addresses destination IP addresses and service ports It is illustrated as below Incoming Log Table Current Time Fri Mar 4 20 14 20 2011 Feb 6 02 34 31 2006 ra Refused Policy UDP 192 168 2 1 67 gt 255 255 255 255 68 on ixp2 Connection Refused Policy Feb 6 02 57 54 2006 violation UDP 192 168 1 100 137 192 168 1 255 137 on ixp0 Connection Refused Policy Feb6 03 06 39 2006 violation UDP 192 168 2 1 67 192 1686 2 102 68 on ixp2 Connection Refused Policy Feb 6 03 15 31 2006 violation UDF 192 163 2 1 67 gt 192 168 2 100 63 on ixp4 Connection Refused Policy Feb 6 03 45 58 2006 violation UDP 192 168 1 100 7464 gt 75 128 47 253 27220 on ixp Connection Refused Policy Feb603 46 00 2006 h violation UDF 192 168 1 100 7464 gt 91 153 161 189 27310 on ixp0 Connection Refused Policy Feb 6 03 46 02 2006 b violation UDP 192 162 1 100 7464 24 160 250 156 1
20. Factory Default Setting Return to Factory Default Setting If clicking Return to Factory Default Setting the dialog block will pop out if the device will return to factory default Its recommended to save the current configuration before upgrading firmware After firmware upgraded import the configuration file after returning to factory default to ensure system stable Please refer to 12 3 12 6 High Availability High Availability is adopted in the network that requires fault tolerance and backup mechanism Two similar devices are used to be the backup for each other One of these devices is employed for major network transmitting and the other redundant device will take over when the master device fails to assure that network transmitting and services never break down Therefore administrators will have more opportunity and time to deal with the master device problems 124 Gigabit Multi Homing VPN Security Router User s Manual Besides general HA Planet also provides advanced HA function that enables two devices to operate simultaneously It brings full cost efficiency without making another device idle lt does not have to be the same model All of Planet devices which support HA can achieve the function High Availability High Availability O Enable 2 Disable CIWAN Network Service Detection Mode 2 Hardware Backup Mode Two devices are operating simultaneously Operation 2 Master Mode Backup Mode M
21. IP address each server can allocate up to 253 client IP addresses and distribute them including IP address subnet mask as well as DNS IP address to local computers It provides an easy way to manage the local IP network QoS Bandwidth Management Featured Smart QoS with dynamic bandwidth management to automatically control P2P and video downloading and other bandwidth hogging to avoid bandwidth insufficient Prioritizing different person group or applications in bandwidth using for a better reasonable management Gigabit Multi Homing VPN Security Router User s Manual Dynamic Domain Name System DDNS The Dynamic DNS service allows users to alias a dynamic IP address to a static hostname Multiple NAT Multiple NAT allows local port to set multi subnet and connect to the Internet through different WAN IP addresses Port Range Forwarding Virtual Server The Port Forwarding and DMZ function can let you setup your servers in the Intranet and still provide services to the Internet users Easy Management Embedded Mirror Port to connect with monitoring devices to monitor online behavior It also supporting remote management by web browser with user name and password to realize router management from remote places Log Feature The log and traffic statistic function can helping administrators to record the change abnormal of the whole network status and take actions according to the log information 1 2 Package Contents The follow
22. Master device operates normally Status Backup indicates the device takes over all the network transmitting The status will return to Normal when Master device boots normally and send a message to the backup device Then the status will return to Normal which the backup device remains idle Two devices are operating simultaneously High Availability Enable C Disable Mode Hardware Backup Mode Two devices are operating simultaneously s ts Master Mode C Slave Mode Operation Da DHCP Enable DHCP Disable Master Slave Mode setting Of two devices must be different WAN 17 WAN 2 M wan 3 Y WAN 4 WAN Backup 2 WANS The checked WAN are not working in this device LAN Gateway Backup Bz le H 5 MAC Address of the backup device bpo p P po po po Status Mormal Operation Master Mode Besides operating network with another device Master device is also the DHCP server to issue LAN IP addresses Although Slave device also supports outbound linking its DHCP server is disabled WAN Backup The checked WANs will works in the other device For an example if WAN1 and The Checked WANs WAN2 work in this device and WAN3 and WAN4 work in the other device WAN3 are not working in this and WAN4 should be checked device LAN Gateway Backup Input LAN IP of Slave device The IP should be different from LAN IP of Master device MAC Address of the Input LAN MAC of Slave device It should be differ
23. Setting up a Port Forwarding Virtual Host If the server function which means the server for an external service such as WWW FTP Mail etc is contained in the network we recommend that users use the firewall function to set up the host as a virtual host and then convert the actual IP addresses the Internet IP addresses with Port 80 the service port of WWW is Port 80 to access the internal server directly In the configuration page if a web server address such as 192 168 1 50 and the Port 80 has been set up in the configuration this web page will be accessible from the Internet by keying in the device actual IP address such as http 211 243 220 43 At this moment the device actual IP will be converted into 192 168 1 50 by Port 80 to access the web page In the same way to set up other services please input the server TCP or UDP port number and the virtual host IP addresses Port Range Forwarding Service IP Address L ei 1 1 Interface ANY ka Enabled Add to list 109 Gigabit Multi Homing VPN Security Router User s Manual L To select from this option the default list of service ports of the virtual host that users want to activate Such as All TCP amp UDP 0 65535 80 80 80 for WWW and 21 21 for FTP Please refer to the list of default service ports IP IP Address gt Input the virtual host IP address Interface Select the WAN port Interface Select the WAN port gt
24. VPN Security Router User s Manual 9 3 URL Filter The device supports two webpage restriction modes one is to block certain forbidden domains and the other is to give access to certain web pages Only one of these two modes can be selected Block Forbidden Domains Accept Allowed Domains O Forbidden Domains Enabled L_ Enable Website Blocking by Domain Keywords Block Forbidden Domain Fill in the complete website such as www sex com to have it blocked s Block Forbidden Domains Accept Allowed Domains Forbidden Domains Enabled Forbidden Domains Exception P acaress J o 0 J P jols Domain Name Enter the websites to be controlled such as www playboy com Add to list Click Add to list to create a new website to be controlled Delete selected item Click to select one or more controlled websites and click this option to delete 82 Gigabit Multi Homing VPN Security Router User s Manual Website Blocking by Keywords Enable Website Blocking by Domain Keywords Website Blocking by Domain Keywords Add o Exception IP address i b jo jo fo tole Group lesi IP Grouping Add to list Delete selected keywords Enabled Click to activate this feature The default setting is disabled For example If users enter the string sex any websites containing sex will be blocked Keywords Only for Enter keywords English keyword Add to List Add this ne
25. a a e lt on C m e s o o 4 0000000 gt 4 peee0eee eee coo o 20 9000 Networking amp Communication 11 Gigabit Multi Homing VPN Security Router User s Manual VPN Router default username and password are both admin Users can change the login password in the setting later For security we strongly suggest that users must change password after login Please keep the BES password safe or you can not login to VPN Router Press Reset button for more than 10 sec all Attention the setting will return to default After login VPN Router web based UI will be shown TPE Gigabit Multi Homing VPN Security Router User s Manual Chapter 5 System Status This chapter introduces the device specification and status after login as well as change password and system time settings for security 5 1 Home Page In the Home page all VPN Security Router parameters and status are listed for users reference 5 1 1 WAN Status WAN Status WAN 1 WAN 2 WAN 3 WAN 4 USB 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 oo 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 oo 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 z oo Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled 3322 Disabled 3322 Disabled 3322 Disabled 3322 Disabled 3322 Disabled Orules set Orules set rules set rules set Reales Rele Feel et Se Feel ese Rena Renew Renew Renew WAN IP Ad
26. address to the empty field for E Mail authentication Dynamic IP E mail User FQDN Authentication J E This option allows users to set the local VPN connection access type The following Group Type offers a few items for local settings Please select and set appropriate parameters 100 Gigabit Multi Homing VPN Security Router User s Manual 1 IP address This option allows the only IP address which is entered to build the VPN tunnel IP Address Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 can establish connection Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 can establish connection 2 Subnet This option allows local computers in this subnet to be connected to the VPN tunnel 97 Ba EP Pa a Reference When this VPN tunnel is connected only computers with the session of 192 168 1 0 and with subnet mask as 255 255 255 0 can connect with remote VPN a tal Ta 59 255 101 Gigabit Multi Homing VPN Security Router User s Manual Remote VPN Group Setting Remote VPN Group Setting rte This remote gateway authentication type Remote Security Gateway Type must be identical to the remotely connected local security gateway authentication type Local Security Gateway Type Remote Security This local gateway authentication type comes with five operation modes wh
27. advanced information from their ISP Please refer to the following descriptions for specific configurations 6 1 Network Connection WAH 1LAW PSec VPH Router Required by some ISPs smb com Required by some ISPs LAN Setting so se eo se Bso Bso Device IP Address 192 168 1 1 subnet Mask 255 255 255 0 Multiple Subnet Setting Disabled Unified IP Management WAN Setting Please choose how many WAN ports you prefer to use Default 4 l Enable DMZ 6 1 1 Host Name and Domain Name 4NAN_1LAN IPsec YPM Router Required by some ISPs anb com Required by some ISPs Device name and domain name can be input in the two boxes Though this configuration is not necessary in most environments some ISPs in some countries may require it D lt Gigabit Multi Homing VPN Security Router User s Manual 6 1 2 LAN Setting LAN setting is shown and can be configured in this page The LAN MAC can be modified When a new router replaces an old one LAN MAC can be changed as MAC of the original device Gateway ARP binding with LAN PCs won t need to be configured again Click Unified IP Management to setup LAN Setting 5 Ee ON Eki Device IP Address 192 168 1 1 Subnet Mask 255 255 255 0 Multiple Subnet Setting Disabled Unified IF Management This is configuration information for the device current LAN IP address The default configuration is 192 168 1 1 and the default Subnet Mask is 255
28. and Manual can be chosen The default value is 1500 Different value could be set in different network environment e g ADSL PPPoE MTU 1492 The default is Auto soe Gigabit Multi Homing VPN Security Router User s Manual After the changes are completed click Apply to save the configuration or click Cancel to leave without making any change PPTP This option is for the PPTP time counting system Input the user s connection name and password issued by ISP and use the built in PPTP software to connect with the Internet Interface MAN 1 WAN Connection Type PPTP e WAN IP Address MC ME ME AEA Subnet Mask Default Gateway l UserName Password Connect on Demand Max Idle Time Min Keep Alive Redial Period Sec Shared Circuit WAN environment Yes NO Filter broadcast packets from WAN MTU 2 Auto Manual 1500 pytes L Enabled Line Dropped Scheduling Line Dropped Period from 9 jo to 0 24 Hour Format Line Dropped Scheduling minutes ahead line dropped to start new session transferring Backup Interface WAN IP Address This option is to configure a static IP address The IP address to be configured could be one issued by ISP The IP address is usually provided by the ISP when the PC is installed Contact ISP for relevant information Input the subnet mask of the static IP address issued by ISP such as Issued eight static IP address
29. any unwanted break caused by the device misjudgment of the overload traffic for the WAN Network Service Detection Interface Enable Retry count Retry timeout z When Fail Remove the Connection When In OR Y Out bandwidth is over Pa regarded as normal Default Gateway ISP Host O Remote Host O DNS Lookup Host DOJO e Retry Timeout Delay time for external connection detection latency The default is 30 seconds After the retry timeout external service detection will restart When Fail 1 Generate the Error Condition in the System Log If an ISP connection failure is detected an error message will be recorded in the System Log This line will not be removed therefore the some of the users on this line will not have normal connections A Gigabit Multi Homing VPN Security Router User s Manual This option is suitable under the condition that one of the WAN connections has failed the traffic going through this WAN to the destination IP cannot shift to another WAN to reach the destination For example if users want the traffic to 10 0 0 1 10 254 254 254 to go only through WAN1 while WANZ2 is not to support these destinations users should select this option When the WAN1 connection is disconnected packets for 10 0 0 1 10 254 254 254 cannot be transmitted through WAN 2 and there is no need to remove the connection when WAN 1 is disconnected 2 Keep System Log and Remove the Connection
30. cccccesceccsceecesceccecescnscnccecesenscncescnsenseneesensenseeeesensesensensenensensaas 9 3 1 VPN ROUTER NETWORK CONNECTION ccseccdcccsascessuccedccsveusdedeevscddaccenstsssssecseusseesdesassecddessavecssasseccesavecsdedeuseccdsacsoveans 9 CHAPTER 4 LOGIN VPN SECURITY ROUTER 0 ccccccescecceccecesceccecescesenscecesensensencesenseneesensenseneeseneesensensss 11 CHAPTER 5 SYSTEM STATUS ec 13 Es R D 8 1 PAGE APA 9 0 A seas 13 SA1 WAN OA US ic TS 13 S V 2 Physical Port STAU Susi lali caccavedeusestutencestece toetieenseecetenecees 14 DAS OY Stemi IN rmac aia 15 5 V4 FIrewall STATUS sa dit 15 5 1 5 VPN Std Sian anna 16 DEO E olo SEUNG E r UUS AO OS 16 5 2 CHANGE AND SET LOGIN PASSWORD AND TIME ccccscscccssssssccccccsccccccccsccccccccccccccccccccccccccccccccccccccsccsscecccces 16 5 2 1 P SSWOrd SENNO niise aa 16 522 A O N 18 CHAPTER 6 NETWORK iii oi 20 6 1 NETWORK CONNECTION sico raid 20 6 1 1 Host Name and Domain Na Mein did 20 62 LAN SEY O ai N E 21 6 1 3 WAN amp DMZ SCtINO Sivad 23 6 2 MULETI WAN SETTING usina inicia 36 6 21 oad Balance M606 ni cola AERE 36 6 2 2 Network Detection Service 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 43 6 2 3 Protocol BINAN uscar ren Tare ay sr PEPIN ser er ne rm Pl ero 45 Gigabit Multi Homing VPN Security Router User s Manual CHAPTER Z PORT MANAGEMEN Tis 54 oN SETUP An E O 54 2 PORT OTAT
31. compliance could void the user s authority to operate the equipment This device complies with Part 15 of the FCC Rules Operation is subject to the Following two conditions 1 This device may not cause harmful interference and 2 this Device must accept any interference received including interference that may cause undesired operation R amp TTE Compliance Statement This equipment complies with all the requirements of DIRECTIVE 1999 5 EC OF THE EUROPEAN PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication terminal Equipment and the mutual recognition of their conformity R amp TTE The R amp TTE Directive repeals and replaces in the directive 98 13 EEC Telecommunications Terminal Equipment and Satellite Earth Station Equipment As of April 8 2000 WEEE Caution To avoid the potential effects on the environment and human health as a result of the presence of hazardous substances in electrical and electronic equipment end users of electrical and electronic equipment should understand the meaning of the crossed out wheeled bin symbol Do not dispose of WEEE as unsorted municipal waste and have to collect such WEEE separately Safety This equipment is designed with the utmost care for the safety of those who install and use it However special attention must be paid to the dangers of electric shock and static electricity when working with electrical equipment All guidelines of this and of the computer manuf
32. holders Disclaimer PLANET Technology does not warrant that the hardware will work properly in all environments and applications and makes no warranty and representation either implied or expressed with respect to the quality performance merchantability or fitness for a particular purpose PLANET has made every effort to ensure that this User s Manual is accurate PLANET disclaims liability for any inaccuracies or omissions that may have occurred Information in this User s Manual is subject to change without notice and does not represent a commitment on the part of PLANET PLANET assumes no responsibility for any inaccuracies that may be contained in this User s Manual PLANET makes no commitment to update or keep current the information in this User s Manual and reserves the right to make improvements to this User s Manual and or to the products described in this User s Manual at any time without notice If you find information in this manual that is incorrect misleading or incomplete we would appreciate your comments and suggestions Trademarks The PLANET logo is a trademark of PLANET Technology This documentation may refer to numerous hardware and software products by their trade names In most if not all cases these designations are claimed as trademarks or registered trademarks by their respective companies CE mark Warning This is a class B device in a domestic environment this product may cause radio interference
33. is Disabled MTU MTU is abbreviation of Maximum Transmission Unit Auto and Manual can be chosen The default value is 1500 Different value could be set in different network environment e g ADSL PPPoE MTU 1492 The default is Auto Click Apply to save the configuration or click Cancel to leave without making any changes z Z Gigabit Multi Homing VPN Security Router User s Manual DMZ Setting For some network environments an independent Configurable DMZ port may be required to set up externally connected servers such as WEB and Mail servers Therefore the device supports a set of independent Configurable DMZ ports for users to set up connections for servers with real IP addresses The DMZ ports act as bridges between the Internet and LANs DMZ Setting DMZ 0 0 0 0 Edit apap Genea IP address Indicates the current default static IP address Config Indicates an advanced configuration modification Click Edit to enter the advanced configuration page The DMZ configuration can be classified by Subnet and Range Subnet The DMZ and WAN located in different Subnets For example If the ISP issued 16 real IP addresses 220 243 230 1 16 with Mask 255 255 255 240 users have to separate the 16 IP addresses into two groups 220 243 230 1 8 with Mask 255 255 255 248 and 220 243 230 9 16 with Mask 255 255 255 248 and then set the device and the gateway in the same group with t
34. number Tunnel Name Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid confusion If this tunnel is to be connected to the other VPN device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can thus be successfully enabled From the pull down menu users can select the Interface for this VPN tunnel Enabled Click to activate the VPN tunnel This option is set to activate by default Afterwards users may select to activate this tunnel feature Local VPN Group Setting Local VPN Group Setting 12 re e as 5 This Local Security Gateway Type must be identical with that of the remote type Remote Security Gateway Type Local Security This local gateway authentication type comes with five operation modes which are Gateway Type IP only IP Domain Name FQDN Authentication IP E mail Addr USER FQDN Authentication Dynamic IP Domain Name FQDN Authentication Dynamic IP E mail Addr USER FQDN Authentication Dynamic IP address Email address name 1 IP only If users decide to use IP only entering the IP address is the only way to gain access to this tunnel The WAN IP address will be automatically filled into this space Users don t need to do further settings an ppp 2 IP Domain Name FQDN Authentication If users select IP
35. to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly added Scheduling connections should go through another WAN to connect with the Internet Link Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP Shared Circuit WAN If your WAN connects to a Switch select Enabled to filter broadcast packets environment The default is Disabled MTU is abbreviation of Maximum Transmission Unit Auto and Manual can be chosen The default value is 1500 Different value could be set in different network environment e g ADSL PPPoE MTU 1492 The default is Auto After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes Static IP If an ISP issues a static IP Such as one IP or eight IP addresses etc please select this connection mode and follow the steps below to input the IP numbers issued by an ISP into the relevant boxes 24 Gigabit Multi Homing VPN Security Router User s Manual Interface MAN 1 WAN Connection Ty
36. 4 STEP 4 CONFIGURE ADVANCE SETTING cccccccssssccccccssccccccccsccccccccsccccccccsccccccccscccccccccccccccccscscccsccccccccsccccsccsscccccces 147 STEP 5 SEND SYSTEM LOG VIA SMS MESSAGE cccccssssccccsssssccccccssccccccccsccccccccscccccccccccccccccccccccscsccsccsscecccces 150 Gigabit Multi Homing VPN Security Router User s Manual Chapter 1 Introduction As Internet becomes essential for your business the only way to prevent your Internet connection from failure is to have more than one connection PLANET s Gigabit Multi Homing VPN Security Router MH 3400 reduces the risks of potential shutdown if one of the Internet connections fails Moreover it allows you to perform load balancing by distributing the traffic through three or four WAN connections In addition to a multi homing device PLANET s Gigabit Multi Homing VPN Security Router provides a complete security solution in a box The policy based firewall content filtering function and VPN connectivity with 3DES and AES encryption make it a perfect product for your network security No more complex connection and settings for integrating different security products on the network is required Bandwidth management function is also supported to offers network administrators an easy yet powerful means to allocate network resources based on business priorities and to shape and control bandwidth usage 1 1 Features Multi WAN Auto Backup The MH 3400 can monit
37. 4 10000 10000 USB 256 bJ a ma qu In the boxes for WAN1 and WAN2 bandwidth input the upstream and downstream bandwidth which users applied for from bandwidth supplier The bandwidth QoS will make calculations according to the data users input In other words it will guarantee a minimum rate of upstream and downstream for each IP and Service Port based on the total actual bandwidth of WAN1 and WANZ2 For example if the upstream bandwidths of both WAN1 and WANZ2 are 512Kbit Sec the total upstream bandwidth will be WAN1 WAN2 1024Kbit Sec Therefore if there are 50 IP addresses in the Intranet the minimum guaranteed upstream bandwidth for each IP would be 1024Kbit 50 20Kbit Sec Thus 20Kbit Sec can be input for Mini Rate Downstream bandwidth can be calculated in the same way Ay ee Gigabit Multi Homing VPN Security Router User s Manual The rules configured in Protocol Binding will be executed by the device according to their priorities too The higher up on the list the higher the priority of execution The unit of calculation Attention in this example is Kbit Some software indicates the downstream upstream speed with the unit KB 1KB 8Kbit 8 1 2 QoS To satisfy the bandwidth requirements of certain users the device enables users to set up QoS with Rate Control method Rate Control The network administrator can set up bandwidth or usage limitations for each IP or IP range according to the actual bandwidth
38. 9343 on ixp0 Clear Log Now This feature clears all the current information on the log 133 Gigabit Multi Homing VPN Security Router User s Manual 13 2 System Statistic The device has the real time surveillance management feature that provides system current operation information such as port location device name current WAN link status IP address MAC address subnet mask default gateway DNS number of received sent total packets number of received sent total Bytes Received and Sent Bytes Sec total number of error packets received total number of the packets dropped number of session number of the new Session Sec and upstream as well as downstream broadband usage System Statistic Mex Page 50 56 4D 32 30 32 50 56 4D 32 30 33 50 56 4D 32 30 34 Test Succeeded Test Failed Test Failed Test Failed Ca r t T e 3388 352661 134 13 3 Traffic Statistic Six messages will be displayed on the Traffic Statistic page to provide better traffic management and control Traffic Statistic inbound IP Address Enabled Traffic Statistic 192 168 1 100 294 100 By Inbound IP Address The figure displays the source IP address bytes per second and percentage Traffic Statistic Inbound IP Address Enabled Traffic Statistic 192 168 1 100 294 100 By outbound IP Address The figure displays the source IP address bytes per second and percentage Traffic Sta
39. ADSL PPPoE Input the user connection name and password issued by ISP Then use the PPP Over Ethernet software built into the device to connect with the Internet If the PC has been installed with the PPPoE dialing software provided by ISP remove it This software will no longer be used for network connection Interface WAN l WAN Connection Type PPPoE Connect on Demand Max Idle Time Min Keep Alive Redial Period Sec Shared Circuit WAN environment O Yes MO Filter broadcast packets from WAN MTU Auto Manual 1500 bytes _ Enabled Line Dropped Scheduling Line Dropped Period from 9 jo to 0 24 Hour Format Line Dropped Scheduling 5 minutes ahead line dropped to start new session transferring Backup Interface Gigabit Multi Homing VPN Security Router User s Manual UserName Input the user name issued by ISP input the password issued by ISP Connect on Demand This function enables the auto dialing function to be used in a PPPoE dial connection When the client port attempts to connect with the Internet the device will automatically make a dial connection If the line has been idle for a period of time the system will break the connection automatically The default time for automatic break off resulting from no packet transmissions is five minutes Keep Alive This function enables the PPPoE dial connection to keep connected and to automatically redial if the line is
40. ANI 74 120 121 33 80 8 33 192 168 1 100 TCP 3576 WANI 203 69 113 18 80 0 0 138 Gigabit Multi Homing VPN Security Router User s Manual Appendix A Configure the 3G USB Interface Before configure the 3G USB interface please prepare those device as below eo USB 3G WCDMA Device NK Series Router eo 3G SIM amp Configuration For Example AT amp T 3G connection the parameter as below APN wap cingular eo Dialup Number 99 eo Username WAP CINGULARGPRS COM all uppercase eo Password CINGULAR1 all uppercase Please follow the configure step as below Step 1 USB 3G Connection Setting Step 2 Check IP Address for USB 3G Connection Step 3 Check 3G Info from Service Provider Step 4 Configure Advance Setting Step 5 Send System log via SMS Message 139 Gigabit Multi Homing VPN Security Router User s Manual Step 1 USB 3G Connection Setting Sidebar Menu Network gt Network Connection USE QoS IP DHCP Traffic Management Protocol Binding WAN Setting Select USB port for 3G 4G connection and enter detail setting after click hyper link Edit at USB port column WAN Setting Please choose how many WAN ports you prefer to use 4 35 Default 4 WAN 1 Obtain an IP automatically Edit WAN 2 Obtain an IP automatically Edit WAN 3 Obtain an IF automatically Edit WAN 4 Obtain an IF automatically Edit 140 Gigabit Multi Homing VPN Security Router User s Manual In
41. Browse Warning 1 Choosing previous frmware versions wil restore al settings to defaut 2 Firmware upgrading may take a few minutes dont tum off power or press 3 Dont close the window or disconnect during upgrading process 4 Please suspend on me traffics when upgrading the new firmware Fimware Version v1 0 0 04 Mar 3 2071 17 05 09 q 12 3 Configuration Backup Import Configuration File Export Configuration File Import Configuration File This feature allows users to integrate all backup content of parameter settings into the device Before upgrade confirm all information about the software version Select and browse the backup parameter file config exp Select the file and click Import to import the file Export Configuration File This feature allows users to backup all parameter settings Click Export and select the location to save the config exp file 122 Gigabit Multi Homing VPN Security Router User s Manual 12 4 SNMP Simple Network Management Protocol SNMP refers to network management communications protocol and it is also an important network management item Through this SNMP communications protocol programs with network management i e SNMP Tools HP Open View can help communications of real time management The device supports standard SNMP v1 v2c and is consistent with SNMP network management software so as to get hold on to the operation of the online devices and the real time network infor
42. General Log Gigabit Multi Homing VPN Security Router User s Manual The device provides the following warning message Click to activate the feature System error message blocked regulations regulation of passage permission system configuration change and registration verification System Error Message Deny Policies Allow Policies Configuration Change Authorized Login Provides the system log with all kinds of error messages For example wrong settings occurrence of abnormal functions system reactivation disconnection of PPPoE and so on If remote users fail to enter the system because of the access rules for instance message will be recorded in the system log If remote users enter the system because of compliance with access rules for instance message will be recorded in the system log When the system settings are changed this message will be sent back to the system log Successful entry into the system includes login from the remote end or from the LAN into this device These messages will be recorded in the system log The following is the description of the four buttons allowing online inquiry into the log 131 Gigabit Multi Homing VPN Security Router User s Manual View System Log This option allows users to view system log The message content can be read online via the device They include All Log System Log Access Log Firewall Log and VPN log which is illustrated as below System
43. IP we a Interface WAN 2 Enabled HTTP TCP 80 80 gt 192 168 1 0 0 0 0 0 0 0 0 0 0 WAN 2 All Traffic TOCP amp UDP A 65535 192 168 1 2 254 0 0 0 0 0 0 0 04 WAN 1 Delete selected item Add Configuring Assigned Routing Mode for load Balance IP Group This function allows users to assign packets from specific Intranet IP addresses or to specific destination Service Ports and to specific destination IP addresses through an assigned WAN to the Internet After being assigned the specific WAN will only support those assigned Intranet IP addresses destination Service Ports or destination IP addresses Those which are not configured will go through other WANs for external connection Only when this mode is collocated with Assigned Routing can it bring the function into full play Example 1 How do set up the Assigned Routing Mode to keep all Intranet IP addresses from going through WAN2 when the destination is Port 80 and keep all other services from going through WAN1 As in the figure below select HTTP TCP 80 80 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses Retain the original numbers 0 0 0 0 in the boxes of Destination IP Which means to include all Internet IP addresses 51 Gigabit Multi Homing VPN Security Router User s Manual Select WAN2 from the pull down opti
44. Log Current Time Fri Mar 4 20 10 49 2011 All Log w Mar 4 15 27 59 2011 System Log AVAN ALAN IPSec VPN_ Router System is up a i h EE system Log HTTP Basic authentication success for user admin aa i 16 16 34 system Log AVWAN_1LAN_IPSec_VPN_Router System is up me E h ME RRR System Log HTTP Basic authentication success for user admin 72 162545 system Log 4WAN_1LAN_IPSec_VPN_Router System is up a a system Log HTTP Basic authentication success for user admin aa a system Log HTTP Basic authentication success for user admin a E ma system Log HTTP Basic authentication success for user admin aE i gt M system Log HTTP Basic authentication success for user admin ae i H a system Log HTTP Basic authentication success for user admin eel CE system Log HTTP Basic authentication success for user admin ms a bt system Log HTTP Basic authentication success for user admin n EEE system Log HTTP Basic authentication success for user admin me y See System Log recvfrom Network is down Outgoing Packet Log View system packet log which is sent out from the internal PC to the Internet This log includes LAN IP destination IP and service port that is applied It is illustrated as below Feb 6 03 46 03 2006 _onnection Naet EDIE UDP 192 168 1 100 7464 gt 77 239 233 64 20301 on ixp2 Connection Refused Policy E Feb603 46 06 2006 violation UDF 192 168 1 100 7464 84 10 118 17 10682 on ixp Connection Refused Policy Feb
45. M Half Full Z Enabled 2 WAN 1 O 10M 100M Half Full Enabled 3 WAN 2 O 10M 100M Half Full Enabled 4 WAN 3 O 10M 100M Half Full Enabled 5 DMZ O 10M 100M Half Full Enabled Mirror Port Users can configure LAN 1 as mirror port by choosing Enable Port 1 as Mirror Port All the traffic from LAN to WAN will be copied to mirror port Administrator can control or filter the traffic through mirror port Once this function is enabled LAN 1 will be shown as Mirror Port in Physical Port Status Home page Disabled This feature allows users turn on off the Ethernet port If selected the Ethernet port will be shut down immediately and no connection can be made The default value is on Priority This feature allows users to set the high low priority of the packet delivery for the Ethernet port If it is set as High the port has the first priority to deliver the packet The default value is Normal Speed This feature allows users to select the network hardware connection speed for Duplex Status This feature allows users to select the network hardware connection speed NS working mode for the Ethernet The options are full duplex and half duplex Auto Neg The Auto Negotiation mode can enable each port to automatically adjust and Neres gather the connection speed and duplex mode Therefore if Enabled 54 VLAN All 7 2 Port Status Summary Gigabit Multi Homing VPN Security Router User s Manual
46. MZ link status Up Down physical port status Port Enabled Port Disabled priority high or normal speed status 10Mbps or 100Mbps duplex status Half Full auto negotiation Enabled or Disabled The tabble also shows statistics of Receive Transmit Packets Receive Transmit Packets Byte Count as well as Error Packets Count 14 Gigabit Multi Homing VPN Security Router User s Manual 5 1 3 System Information System Information 192 168 1 1 255 255 255 0 v1 0 0 01 Mar 2 2011 20 30 04 Thu Mar 3 2011 16 53 41 0 Days0 Hours Minutes seconds Days0 Hours Minutes seconds Total Session Na OOO Gateway LAN IP Address Subnet Identifies the current device IP address and subnet mask The default is Mask 192 168 1 1 and 255 255 255 0 Working Mode Indicates the current working mode Can be Gateway or Router mode The default is Gateway mode System active time Indicates how long the device has been running Serial Number This number is the device serial number Firmware Version Information about the device present software version Current Time Indicates the device present time To have the correct time users must synchronize the device with the remote NTP server first 5 1 4 Firewall Status Security Status n Of rules set 15 Gigabit Multi Homing VPN Security Router User s Manual SPI St
47. Mode multiple WAN IP DDNS and MAC Clone Administrators can look up system log and monitor system status and inbound outbound flow in real time Gigabit Multi Homing VPN Security Router User s Manual Network function setting e g PPTP different application environment 11 Logout Close configuration Logout VPN Router web based UI window We will follow the process flow to complete the network setting in the following chapters Gigabit Multi Homing VPN Security Router User s Manual Chapter 3 Hardware Installation In this chapter we are going to introduce hardware interface as well as physical installation Safety Instruction 3 1 VPN Router Network Connection Vendor Branch Office Firewall Estay Firevall Gateway i BERBER ERE EE TTE IPsec VPN Tunnel ing EEE BEER ER Ee ee ET Headquarters Action Office DE PP ee Ba 1008ace TX UTF l G SGHz S02 lasin E st ton ot oe ho he hel he et oe le hel ee lel Gigabit Multi Homing VPN Security Router User s Manual WAN Connection A WAN port can be connected with xDSL Modem Fiber Modem Switching Hub or through an external router to connect to the Internet LAN Connection The LAN port can be connected to a Switching Hub or directly to a PC Users can use servers for monitoring or filtering through the port after Physical Port Mangement configuration is done DMZ The DMZ port can be connected to
48. NET Secondary TCP 8023 8023 Service Name In this box input the name of the Service Port which users want to activate such as BT etc Protocol This option list is for selecting a packet format such as TCP or UDP for the Poet Service Ports users want to activate 48 Gigabit Multi Homing VPN Security Router User s Manual Po up to 100 services into the list Delete selected service To remove the selected activated Services Apply Click the Apply button to save the modification Cancel Click the Cancel button to cancel the modification This only works before Apply is clicked Auto Load Balancing mode when enabled The collocation of the Auto Load Balance Mode and the Auto Load Mode will enable more flexible use of bandwidth Users can assign specific Intranet IP addresses to specific destination application service ports or assign specific destination IP addresses to a WAN users choose for external connections Example 1 How do set up Auto Load Balance Mode to assign the Intranet IP 192 168 1 100 to WAN2 for the Internet As in the figure below select All Traffic from the pull down option list Service and then in the boxes of Source IP input the source IP address 192 168 1 100 to 100 Retain the original numbers 0 0 0 0 in the boxes of Destination IP which means to include all Internet IP addresses Select WAN2 from the pull down option list Interface
49. O in the boxes of IP address This means all Intranet IP addresses will be restricted QoS can also control the range of Class B Upstream Means the upload bandwidth for Intranet IP Downstream Means the download bandwidth for Intranet IP Server in LAN Upstream If a Server for external connection has been built in the device this option is to control the bandwidth for the traffic coming from outside to this Server Server in LAN Downstream If there are web sites built in the Intranet this option is to control the upload bandwidth for the connections from outside to this Server For example game servers have been built in many Internet caf s This rule can be used to control the bandwidth for connections from outside to the game server of a caf to update data In this way game players inside the caf will not be affected Min amp Max The minimum bandwidth The rule is to guarantee minimum available Rate Kbit Sec bandwidth The maximum bandwidth This rule is to restrict maximum available bandwidth The maximum bandwidth will not exceed the limit set up under this rule ES The unit of calculation used in this rule is Kbit Some software Attention indicates download upload speed by the unit KB 1KB 8Kbit Bandwidth Assign Type Sharing total bandwidth with all IP addresses If this option is selected all IP addresses or Service Ports will share the bandwidth range from minimum to maximum bandwidth Assig
50. P 21 to 21 etc can be selected Service from the pull down option list The default Service is All 0 65535 46 Gigabit Multi Homing VPN Security Router User s Manual Option List for Service Management Click the button to enter the Service Port configuration page to add or remove default Service Ports on the option list Users can assign packets of specific Intranet virtual IP to go through a specific WAN port for external connection In the boxes here input the Intranet virtual IP address range for example if 192 168 1 100 150 is input the binding range will be 100 150 If only specific Service Ports need to be designated while specific IP designation is not necessary input O in the IP boxes Destination IP In the boxes input an external static IP address For example if connections to destination IP address 210 11 1 1 are to be restricted to WAN1 the external static IP address 210 1 1 1 210 1 1 1 should be input If a range of destinations is to be assigned input the range such as 210 11 1 1 210 11 255 254 This means the Class B Network Segment of 210 11 x x will be restricted to a specific WAN If only specific Service Ports need to be designated while a specific IP destination assignment is not required input O into the IP boxes Interface Select the WAN for which users want to set up the binding rule Add To List To add this rule to the list Delete selected To remove the rul
51. P 443 443 HTTPS secondary TOP 8443 8443 TFTP UDP 69 69 IMAP TCP 143 143 NNTP TCP 119 119 E POP3 TCP 110 110 SNMP UDP 161 161 SMTP TCP 25 25 3 z User edit port Input the name protocol and port range for the specific service port Name the Port in order to identify its property For example Virus 135 Protocol Choose the port protocol form the pull down list like TCP UDP or TCP and UDP Port Range Input the port range For example 135 to 135 Add to Port List After setting name protocol and port range push this button to add the information into the Port list below This port can be from some port groups Group Name When you add new groups please note if the group name is in the column For example Virus Delete Group Choose the group that you would like to delete from the pull down list and push the Delete Group button System will ask you again if you would like to delete the group After pushing the confirmation button the group will be deleted inn You can choose several ports from Port list on the left side and push this button button to have them added into the group the right side Apply sd Click Apply to save the network configuration modification 65 Gigabit Multi Homing VPN Security Router User s Manual Chapter 8 QoS Quality of Service QoS is an abbreviation for Quality of Service The main function 1s to restrict bandwidth usage for some services and IP addres
52. P IP This is the current DHCPIP S O Static IP Used The amount of static IP assigned by DHCP 58 Gigabit Multi Homing VPN Security Router User s Manual 7 5 IP 8 MAC Binding Administrators can apply IP amp MAC Binding function to make sure that users can not add extra PCs for Internet access or change private IP addresses IP amp MAC binding Siatic IP o fo f fo MAC Address Name l Enabled C Block MAC address on the list with wrong IP address C Block MAC address not on the list There are two methods for setting up this function Block MAC address not on the list This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet access When this method is applied please fill out Static IP with 0 0 0 0 as the figure below 59 Gigabit Multi Homing VPN Security Router User s Manual IP amp MAC binding Show mew IP user Static IP MAC Address O EC Name Enabled Add to list Delete selected item C Block MAC address on the list with wrong IP address Block MAC address not on the list app o Cemesl IP amp MAC Binding Show new IP user IP amp MAC binding static IF MAC Address Mame po Enabled Delete selected item Block MAC address on the list with wrong IP address Block MAC address not on the list 60 Gigabit Mult
53. PN connection secure setting for the local group Remote Client cid the name of this group for remote VPN Connection secure e aia Remote Client Click on Detail List and more information such as Group Name OS Click Connect to verify the status of the tunnel The test result will e 7 77 M Config As illustrated below configurations include Edit and Delete icon Click on Edit to enter the setting items to be changed Click on the trash bin icon and all the tunnel settings will be deleted 88 Gigabit Multi Homing VPN Security Router User s Manual 10 1 1 Add a New VPN Tunnel The device supports Gateway to Gateway tunnel or Client to Gateway tunnel The VPN tunnel connections are done by 2 VPN devices via the Internet When a new tunnel is added the setting page for Gateway to Gateway or Client to Gateway will be displayed Gateway to Gateway Click Add to enter the setting page of Gateway to Gateway Gateway to Gateway REMOTE VPN Device LOCAL Gateway to Gateway VPN Device Client to Gateway Click Add to enter the setting page of Client to Gateway Client to Gateway CLIENT A ee Mobile Users LOCAL Client to Gateway VPN Device Add The following instructions will guide users to set a VPN tunnel between two devices 10 1 1 1 Gateway to Gateway Setting 89 Gigabit Multi Homing VPN Security Router User s Manual Set the embedded VPN feature please select the Tunnel
54. This tool includes DNS Name Lookup Domain Name Inquiry Test and Ping Packet Delivery Reception Test O DNS Lookup Ping DNS Name lookup On this test screen please enter the host name of the network users want to test For example users may enter www yahoo com tw and press Go to start the test The result will be displayed on this page DNS Lookup OPing Mame Www yahoo com tw Address 203 864 219 114 Ping O DNS Lookup Ping Ping host or IP address 168 95 1 1 status Test Succeeded Packets 4 4 transmitted 4 4 received 0 loss Minimum 3 2 ms Round Trip Time Maximum 3 7 ms Average 3 4 ms This item informs users of the status quo of the outbound session and allows the user to know the existence of computers online On this test screen please enter the host IP that users want to test such as 168 95 1 1 Press Go to start the test The result will be displayed on this screen 121 Gigabit Multi Homing VPN Security Router User s Manual 12 2 Firmware Upgrade Users may directly upgrade the device firmware on the Firmware Upgrade page Please confirm all information about the software version in advance Select and browse the software file click Firmware Upgrade Right Now to complete the upgrade of the designated file Please read the warning before firmware upgrade Users must not exit this screen during Attention upgrade Otherwise the upgrade may fail Firmware Upgrade
55. US coire E E T N Ee 55 LSD E E E iS 56 Po DIAG STATUS till 58 7 5 1P amp MAC BINDING coi iii il aa e aai 59 ZOP GROUPING RRA 62 T T PORT GROUP MANAGEMENT lt a 2856506566000406 ooieoe aeea aa oeae caos cae 65 CHAPTER 8 QOS QUALITY OF SERVICE iii 66 8 1 BANDWIDTH MANAGEMENT la 66 8 1 1 The Maximum Bandwidth provided by ISP ooooooooccoononcconnonccononoccconacncconnacoconaracocanaocccoanacocos 67 O RA 68 O 1o be e cen E nnn ET REO ENE E E E E E een Ten e CT H 71 0 1 4 Exception IP Address ii ea aciendo i 73 6 2 SESSION CONTROL ect cocdaccsinsteccceeecduacsiet coauusexduacsvecevsewesceasesnet stessuse loatenedsaastesdentcvest nani 74 CHAPTER 9 FIREWALL arias io 76 9 V OGENERAL POLICY AA PI O 76 92 ACCESS UE o dd 79 WD WA CN 8 21 A 79 9 2 2 Add NEW ACCESS FUNG acceda 80 9 3 URL FITER iia 82 CHAPTER 10 VPN VIRTUAL PRIVATE NETWORK coccooccccoccccnoncccnoncccnonocononoconanoconancnnanecnnnnrrnnnnrenanarenananos 86 101 DISPLAY ALE VPN SUMMARY usas idas AEE deed 86 10 1 1 Add a New VPN Tunnel aise sevsccscsexsvesecsccnoasetecstdcavecovasasecetessvecssavatesesasovesenaseousesensvesteapsscasacaseciveentadsosess 89 10 1 1 1 Gateway to Gat way Setting css ii a os 89 10 1 1 2 Cllentio Gateway SEMINO cauca eto ci lic eii aci 99 IS A RA 105 1053 VPN Pass TRG OUGM nociaiinn initial idas 107 11 1 DMZ HosT PORT RANGE FORWARDING ccccccccccccocccoccccococcooccoocccooccooccoocsoscsoscososesosecsoscsesccssscssscsosscsssesescs
56. WAN1 As in the figure below there are two rules to be configured The first rule select HTTP TCP 80 80 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 to 0 which means to include all Intranet IP addresses Retain the original numbers 0 0 0 0 in the boxes of Destination IP Which means to include all Internet IP addresses Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode The device will transmit packets to Port 80 through WAN2 However with only the above rule packets that do not go to Port 80 may be transmitted through WAN2 therefore a second rule is necessary The second rule Select All Ports TCP amp UDP 1 65535 from the pull down option list Service and then input 192 168 1 2 254 in the boxes of Source IP Retain the original numbers 0 0 0 0 in the boxes of Destination IP which means to BO Gigabit Multi Homing VPN Security Router User s Manual include all Internet IP addresses Select WAN1 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode The device will transmit packets that are not going to Port 80 to the Internet through WANT Protocol Binding Semice HTTP TCP 80 80 Service Management Dest
57. a PC The default is 1440 minutes a day Users can change it according to their needs The time unit is minute Range Start This is an initial IP automatically leased by DHCP It means DHCP will start the lease from this IP The default initial IP is 192 168 1 100 Range End This is the end IP automatically leased by DHCP The default initial IP is DNS Domain Name Service This is for checking the DNS from which an IP address has been leased to a PC port Input the IP address of this server directly DNS Required 1 Input the IP address of the DNS server DNS Optional 2 Input the IP address of the DNS server WINS If there is a WIN server in the network users can input the IP address of that server directly WINS Server Input the IP address of WINS Apply Click Apply to save the network configuration modification cancel si Click Cancel to leave without making any changes 57 Gigabit Multi Homing VPN Security Router User s Manual 7 4 DHCP Status This is an indication list of the current status and setup record of the DHCP server The indications are for the administrator s reference when a network modification is needed status Subnet subnet2 subnet3 subnetd 192 168 1 1 192 168 2 1 192 168 3 1 192 168 4 1 1 0 0 D 0 0 0 0 49 50 50 50 50 50 50 50 Client Table NB97008 192 168 1 100 00 1f c6 7b 8a bd 4 Minutes 42 Seconds m Reel DHCP Server This is the current DHC
58. acture must therefore be allowed at all times to ensure the safe use of the equipment Customer Service For information on customer service and support for the Gigabit Multi Homing VPN Security Router please refer to the following Website URL http www planet com tw Before contacting customer service please take a moment to gather the following information Gigabit Multi Homing VPN Security Router serial number and MAC address Any error messages that displayed when the problem occurred Any software running when the problem occurred Steps you took to resolve the problem on your own Revision User s Manual for PLANET Gigabit Multi Homing VPN Security Router Model MH 3400 Rev 1 0 January 2012 Gigabit Multi Homing VPN Security Router User s Manual Table of Contents CHAPTER T INTRODUCTION a 1 VA FEATURES A a to en TRE SO 1 1 2 PACKAGE CONTENTS cua ai 2 13 PHYSICAL SPECIFICATION manina A AAA AA AAA Ad o 2 TA SPECIEICA TON iS 4 CHAPTER 2 INSTALLATION PROCEDURE 0ccesceccscescesceccscescnscuccscescnscnccscnsenscncesensensesensensesensensenensenseas 6 2 1 SYSTEMATIC SETTING PROCESS seseeesssscecssssecccssceccsssccccssccecossecccoseecccosececcssececossscccosescccssececcosececossscecsssseccssseecosse 6 2 2 SETTING FLOW CHAR Viet scicecesceszn test ocacusiicasaceosesusaveivedsasnscasacsicdecdecsoetsceuseucasulousieteecedectadunsicuaavoisess eomsteueswedeceacs estes 7 CHAPTER 3 HARDWARE INSTALLATION 2
59. ailover between 3G and WAN LAN m teh q Gigabit Multi Homing VPN Security Router User s Manual Load balancing between 3G and WAN Auto manual throughput and time calculation mechanism for cost or dial on demand Cellular cost Control Signal strength display on front panel Throughput measurement APN and PIN code Support Comprehensive web based management and policy setting SNMP v1 v2c Monitoring Logging and Alarms of system activities Firmware upgrade through Web browser IPSec H W acceleration Up to 2 Group VPNs support Friendly VPN Tunnel Management IKE Pre Shared keys IPSec Encryption DES 3DES AES128 AES192 AES256 IPSec Authentication MD5 SHA1 Support PMTU NAT Traversal Connect on Demand DPD detection VPN Hub IP by DNS Resolved View Log IPSec PPTP Pass through PPTP VPN PPTP Dial in VPN 60 users Gigabit Multi Homing VPN Security Router User s Manual Chapter 2 Installation Procedure In this chapter we are going to introduce hardware installation Through the understanding of multi WAN setting process users can easily setup and manage the network making VPN Router functioning and having best performance 2 1 Systematic Setting Process Users can set up and enable the network by utilizing bandwidth efficiently The network can achieve the ideal efficientness block attacks and prevent security risks at the same time
60. and domain name must be identical to those of the remote VPN security gateway setting type to establish successful connection 93 Gigabit Multi Homing VPN Security Router User s Manual IP Domain Name FOQDN Authentication IP Address aE L I If the remote IP address is unknown choose IP by DNS Resolved allowing DNS to translate the IP address This domain name must be available on the Internet When users finish the setting the corresponding IP address will be displayed under the remote gateway of Summary IP Domain NamefFODN Authentication IPbyDNSResoved vV gt a 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail type entering the IP address and the E mail allows users to gain access to this tunnel OTTO Lo Jer If the remote IP address is unknown choose IP by DNS Resolved allowing DNS to translated the IP address This domain name must be available on the Internet When users finish the setting the corresponding IP address will be displayed under the remote gateway of Summary IP E mail User FQDN Authentication bl del o E 4 Dynamic IP Domain Name FQDN Authentication If users use dynamic IP address to connect with the device users may select the combination of the dynamic IP address host name and domain name Dynamic IF Domain Namel FOON Authentication 5 Dynamic IP E
61. asic connected time Auto disconnect Auto isconnection function when user defines max accumulated time to aviod paying unplanned 3G service fee Previous Cumulative Previous accumulated time record after clean button is pushed Time Current Cumulative Current Accumulated time Time Calculated fee based on current total time Restart the count Auto flush on the specific date every month Clean Flush accumulated record manually 146 Gigabit Multi Homing VPN Security Router User s Manual Step 4 Configure Advance Setting The VPN Security Router supports four USB 3G 4G connection modes o Performance Mode 3G service is always connected e Backup mode supports WAN failover 0 Smart mode detect the WAN connection status to decide which mode 3G dongle should be in including active mode power saving mode and power off mode e Scheduling mode 3G services can be automatically connected following the pre set time Mode Selection Disabled Performance Mode Always connected Backup Mode Smart Mode Scheduling Mode Performance mode Idle ti me Mi nutes The performance mode will keep 3G 4G service connected The power consumption is higher than other modes Backup Mode The 3G dongle keeps on power saving mode if all the WAN connections work normally However when all the wired WAN connections fail or are disconnected the 3G services will be connected automatically until a
62. aster Slave Mode setting Of two devices must be different Status Disable Apply D Caneel High Availability Enable Activate HA function Disable Disable HA function 1 Hardware Backup Mode It is the general backup mode The master device takes responsibility of network transmitting and the other one is set as idle When the master device fails transmitting it will send out the message to the idle device for taking over network transmitting immediately 2 Two devices are operating simultaneously Two devices operate outbound linking simultaneously but they are still separated as Master device and Backup device In normal situation Master device is major DHCP IP issuer and Backup device will disable DHCP issuing automatically When Master device fails transmitting the Backup device will take over all outbound links and enable DHCP server to provide IP addresses 125 Gigabit Multi Homing VPN Security Router User s Manual Following is the description of the two different modes High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously Operation s Master Moce C Backup Mode Masters Slave Mode setting Of two devices must be different Status Mormal Status of the backup device Normal Operation Master Mode Indicates the master device will operate for all outbound links When the master device fails transmitting the backup device will take over
63. ateful Packet Indicates whether SPI Stateful Packet Inspection is on or off The default E configuration is On DoS Denial of DoS Denial of Service Indicates if DoS attack prevention is activated The default configuration is On Block WAN Request Indicates that denying the connection from Internet is activated The default configuration is On Prevent ARP Virus Indicates that preventing Arp virus attack is acitvated The default configuration Attack is Off Remote Management Indicates if remote management is activated on or off Click the hyperlink to enter and manage the configuration The default configuration is Off Access Rule Indicates the number of access rule applied in VPN Security Router 5 1 5 VPN Status VPN Status Status 100 VPN a Status Indicates VPN setting in VPN Router venens Used Indicates number of tunnels that have been configured in VPN Virtual Private Network Tunnel s Available Available Indicates number of tunnels that are available for VPN Virtual Private Network 5 1 6 Log Setting Status _ Log ___ Disabled Sent Log To Indicates ECT Syslog Server is Enabled or Disabled 5 2 Change and Set Login Password and Time 5 2 1 Password Setting 16 Gigabit Multi Homing VPN Security Router User s Manual When you login VPN Router setting window every time you must enter the password The default value for VPN Ro
64. ation IP addresses to go through an assigned WAN for external connection After being assigned the specific WAN will only support those assigned Intranet IP addresses specific destination application service ports or specific destination IP addresses Intranet IP specific destination application service ports and specific destination IP that is not configured under the rules will go through other WANs for external connection For unassigned WANs users can select Load Balance mode and select session or IP for load balancing Session Balance If By Session is selected the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance IP Balance If By IP is selected the WAN bandwidth will automatically allocate connections based on the number of IP addresses to achieve network load balance Only when a device assignment is collocated with Protocol Binding can the balancing function be brought into full play For example an assignment requiring all Intranet IP addresses to go through WAN 1 when connecting with service port 80 or go through WAN 1 when connecting with IP 211 1 1 1 must be set up in the Protocol Binding Configuration When assigning mode is selected as in the above example the IP s or service provider s configured in the connection rule will follow the rule for external connections but those which are not configured in the rule will still follow the dev
65. ation of Routing Information Protocol is RIP There are two kinds of RIP in the IP environment RIP and RIP II Since there is usually only one router in a network ordinarily just 112 Gigabit Multi Homing VPN Security Router User s Manual Static Routing will be used RIP is used when there is more than one router in a network and if an administrator doesn t want to assign a path list one by one to all of the routers RIP can help refresh the paths RIP is a very simple routing protocol in which Distance Vector is used Distance Vector determines transmission distance in accordance with the number of routers rather than based on actual session speed Therefore sometimes it will select a path through the least number of routers rather than through the fastest routers Dynamic Routing Gateway Router O Enabled Disabled Working Mode Select the working mode of the device NAT mode or Router mode Click Enabled to open the RIP function Receive RIP Use Up Down button to select one of None gt RIPv1 gt RiPv2 gt Both RIPv1 and v2 as versions the TX function for transmitting dynamic RIP Transmit RIP Use Up Down button to select one of None gt RIPv1 gt RIPv2 Broadcast gt versions RIPv2 Multicast as the RX function for receiving dynamic RIP 11 3 2 Static Routing When there are more than one router and IP subnets the routing mode for the device should be configure
66. ble as WAN 4 LAN2 DMZ 1 x 10 100Mbps RJ 45 WAN 4 x Reset button for reset to factory default setting x Power on off Switch x USB 2 0 Host Inbound Outbound Load Balance by session and by IP MAHAN Funcion Protocol Binding Network Service Detection aad Dynamic Route RIP v1 v2 Static Route Strategic Route Concurrent session 50000 Firewall performance 1Gbps Corporation Size SMB clients 200 250 3DES performance 154Mbps Session Limit Priority QoS Port based QoS QoS Schedule NAT One to One NAT Multiple to One NAT Stateful Packet Inspection SPI Firewall Denial of Service DoS prevention IP amp Port filtering Block Website by Keyword Content Filter Firewall detection Ping of Death SYN Flooding Land attack IP Spoofing Email Alert for Hacker Attack IP amp MAC Binding Support DMZ to protect your network DMZ Host Prevent ARP Attack on LAN Configurable DMZ DHCP Server support class Cj client dynamic IP static IP IP Grouping support Multiple DHCP Server support 4 sets of Class C PPPoE Static IP DHCP Client LAN MAC Clone Multiple Subnet Protocol TCP IP ARP ICMP FTP TFTP IPv4 NAT with popular ALG support Port forwarding Virtual Server DNS Relay DDNS Support DynDNS 3322 Password protected configuration or management sessions for web access Port Management Speed Duplex Auto Negotiation VLAN Transparent Bridge 3G 3 5G Internet Access 3G as WAN interface Automatic f
67. c port will be displayed Data include receive transmit packet count receive transmit packet Byte count and error packet count Users may press the refresh button to update all real time messages 7 3 1P DHCP With an embedded DHCP server it supports automatic IP assignation for LAN computers This function is similar to the DHCP service in NT servers It benefits users by freeing them from the inconvenience of recording and configuring IP addresses for each PC respectively When a computer is turned on it will acquire an IP address from the device automatically This function is to make management easier Enabled DHCP Server DHCP Dynamic IP Client Lease Time Minutes E Sube Subnet Enabled Disabled Disabled Disabled 192168 1 100 192168 2 100 192 168 3 100 192 168 4 100 192 168 2149 192 168 4 149 NA E A De A E E Pool Table Table Pool Table Table Pool Table Table Pool Table Table Unified IP Management DNS WINS 56 Gigabit Multi Homing VPN Security Router User s Manual DHCP Dynamic IP Enable DHCP Server Check the option to activate the DHCP server automatic IP lease function If the function is activated all PCs will be able to acquire IP automatically Otherwise users should configure static virtual IP for each PC individually Client lease Time This is to set up a lease time for the IP address which is acquired by
68. crypt Auth Group and Group 1 2 5 If users select Manual setting for IPSec Phase 2 DH group will not display Local Group Displays the setting for VPN connection secure group of the local end Remote Group Displays the setting for remote VPN connection secure group 87 Gigabit Multi Homing VPN Security Router User s Manual Remote Gateway Set the IP address to connect the remote VPN device Please set the VPN device with a valid IP address or domain name Control Click Connect to verify the tunnel status The test result will be updated To disconnect click Disconnect to stop the VPN connection Config Setting items include Edit and Delete icon Click on Edit to enter the setting items and users may change the settings Click on the trash bin icon and all the tunnel settings will be deleted __ Tunnel s Enabled This displays how many tunnels are enabled and how many tunnels are set __ Tunnel s Defined VPN Group Status If there is no setting for Group VPN there will be no display of VPN Group status VPNGroup Status AddTunnel s Group Name Displays the tunnel name of the Group VPN that is connected Connected Tunnels Displays the VPN Groups tunnel numbers Phase2 Displays settings such as encryption DES 3DES authentication Encrypt Auth DH MD5 SHA1 and Group 1 2 5 If users select Manual setting for IPSec Phase 2 DH group will not be displayed Local Group DM A edna nan in the V
69. d as static routing Static routing enables different network nodes to seek necessary paths automatically It also enables different network nodes to access each other Click the button Show Routing Table as in the figure to display the current routing list 113 Gigabit Multi Homing VPN Security Router User s Manual Static Routing Dest IP I I Subnet Mask T Y M M Default Gateway Hop Count l Interface LAN Dest IP Input the remote network IP locations and subnet that is to be routed For example the Subnet Mask IP subnet is 192 168 2 0 255 255 255 0 Hop Count This is the router layer count for the IP If there are two routers under the device users should input 2 for the router layer the default is 1 Max is 15 Interface gt gt gt This is to select WAN port or LAN port for network connection location Add to List Add the routing rule into the list Delete Selected Remove the selected routing rule from the list Item Show Table Show current routing table Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes 114 Gigabit Multi Homing VPN Security Router User s Manual 11 4 One to One NAT As both the device and ATU R need only one actual IP if ISP issued more than one actual IP such as eight ADSL static IP addresses or more users can map the remaining real IP ad
70. d to List Add this Add this configuration to the One to One NAT list gt gt gt gt gt gt gt to the Add this configuration to the One to One NAT list gt gt gt gt gt gt gt to One NAT list Delete selected Remove a selected One to One NAT list 117 Gigabit Multi Homing VPN Security Router User s Manual Click Apply to save the network configuration modification Click Cancel to leave without making any changes 11 5 DDNS Dynamic Domain Name Service DDNS supports the dynamic web address transfer for 3322 org gt DynDNS org and DtDNS com This is for VPN connections to a website that is built with dynamic IP addresses and for dynamic IP remote control For example the actual IP address of an ADSL PPPOE time based system or the actual IP of a cable modem will be changed from time to time To overcome this problem for users who want to build services such as a website it offers the function of dynamic web address transfer This service can be applied from www 3322 0rg www dyndns org or www dtdns com and these are free Also in order to solve the issue that DDNS server is not stable the device can update the dynamic IP address with different services at the same time _ DONS Setup Interface staus HostName Config aN oe gt Eon wan nny Eon wan e a Eon wan 4 E Eon use ae ca Select the WAN port to which the configuration is to be edited for example WAN 1 Click the hype
71. disconnected It also enables a user to set up a time for redialing The default is 30 seconds Enable Line Dropped The WAN disconnection schedule will be activated by checking this option In Scheduling some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnections users can activate this function to arrange new connections through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for the disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly added Scheduling connections should go through another WAN to connect with the Internet Link Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP Shared Circuit WAN If your WAN connects to a Switch select Enabled to filter broadcast packets environment The default is Disabled MTU is abbreviation of Maximum Transmission Unit Auto
72. do not include IP addresses in use by WANS Add to List Add this configuration to the One to One NAT list Delete Selected Remove a selected One to One NAT list ltem Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes 116 Gigabit Multi Homing VPN Security Router User s Manual One to One NAT mode will change the firewall working mode If this function has been set up the Internet IP server or PC which is mapped with a LAN port will be exposed on the Internet Attention To prevent Internet users from actively connecting with the One on One NAT server or PC please set up a proper denial rule for access as described Firewall Multiple to One NAT Enable Multiple to One NAT Multiple to One NAT Private IP Range W tof U Representative Public IP L L 1 Interface WAN 1 Enable BM eee to enable multiple to one NAT function n One NAT Private IP Private IP Range Input intranet IPs for NAT mapping gt intranet IPs Input intranet IPs for NAT mapping gt NAT mapping Respective Input the respective public IP addresses This should go along with the following Public IP interface selection If the IP address is not within the interface ranges the setting will not work Select the mapping interface If the WAN IP above is not within the interface range the setting will not work Ad
73. domain name type please enter the domain name and IP address The WAN IP address will be automatically filled into this space Users don t need to do 90 Local Security Group Type Gigabit Multi Homing VPN Security Router User s Manual further settings FQDN refers to the combination of host name and domain name and can be retrieved from the Internet e vpn server com This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection IF Domain NamefFoODN Authentication m a p 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail enter the IP address and E mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space Users don t need to do further settings IP E mail User FQDN Authentication a D L o sd 4 Dynamic IP Domain Name FQDN Authentication lf users use dynamic IP address to connect to the device users may select this option to link to VPN If the remote VPN gateway requires connection to the device for VPN connection this device will start authentication and respond to this VPN tunnel connection if users select this option to link to VPN please enter the domain name
74. dress A Indicates the current IP configuration for WAN port Default Gateway Indicates current WAN gateway IP address from ISP Indicates the current DNS IP configuration Downstream Bandwidth Indicates the current downstream bandwidth usage for each WAN Usage Upstream Bandwidth Usage Indicates the current upstream bandwidth usage for each WAN Indicates if Dynamic Domain Name is activated The default configuration is Off Indicates how many QoS rules are set When Obtain an IP automatically is selected two buttons Release and Manual Connect Renew will appear If a WAN connection such as PPPoE or PPTP is selected Disconnect and Connect will appear S43 Gigabit Multi Homing VPN Security Router User s Manual 5 1 2 Physical Port Status Physical Port Status 1 LAN Connect Internet lntemet lntemet USB WAN 1 WAN 2 WAN 3 WAN 4 Enabled Enabled Enabled Enabled Enabled The status of all system ports including each connected and enabled port will be shown on this Home page see above table Click the respective status button and a separate window will appeare to show detailed data including setting status summary and statisitcs of the selected port WAN 1 Information Summary Enabled The current port setting status information will be shown in the Port Information Table Examples type 10Base T 100Base TX 1000Base T iniferface WAN LAN D
75. dresses to the intranet PC virtual IP addresses These PCs use private IP addresses in the Intranet but after having One to One NAT mapping these PCs will have their own public IP addresses For example if there are more than 2 web servers requiring public IP addresses administrators can map several public IP addresses directly to internal private IP addresses Example Users have five available IP addresses 210 11 1 1 5 one of which 210 11 1 1 has been configured as a real IP for WAN and is used in NAT Users can respectively configure the other four real IP addresses for Multi DMZ as follows 210 11 1 2 192 168 1 3 210 11 1 3 192 168 1 4 210 11 1 4 192 168 1 5 210 11 1 5 192 168 1 6 BS The device WAN IP address can not be contained in the One to One NAT IP configuration Attention 115 Gigabit Multi Homing VPN Security Router User s Manual Enable One to One NAT One to One NAT Add Range Private Range Beginj182 168 Public Range Begin OPI Range Length Enable Multiple to One NAT C Enabled One to One NAT Private IP Range Input the Private IP address for the Intranet One to One NAT function Begin A Public IP Range Input the Public IP address for the Internet One to One NAT function rr nera nne omeo To activate or close the One to One NAT function Check to activate the function Range Length The numbers of final IP addresses of actual Internet IP addresses Please
76. dth will automatically allocate connections based on IP amount to achieve network load balance For either session balancing or IP connection balancing collocation with Protocol Binding will provide a more flexible application for bandwidth Users can assign a specific Intranet IP to go through a specific service provider for connection or assign an IP for a specific destination to go through the WAN users assign to connect with the Internet For example if users want to assign IP 192 168 1 100 to go through WAN 1 when connecting with the Internet or assign all Intranet IP to go through WAN 2 when connecting with servers with port 80 or assign all Intranet IP to go through WAN 1 when connecting with IP 211 1 1 1 users can do that by configuring Protocol Binding When the Auto Load Balance mode is collocated with Protocol Binding only IP addresses or servers that are configured in the connection rule will follow the rule for external connections those which are not configured in the rule will still follow the device Auto Load Balance system 36 Gigabit Multi Homing VPN Security Router User s Manual Please refer to the explanations in 6 2 3 Configuring Protocol Binding for setting up Protocol Binding and for examples of collocating router modes with Protocol Binding Unbinding WAN Balance Mode This mode enables users to assign specific intranet IP addresses destination application service ports or destin
77. dwidth for each WAN interface WAN Setting WAN Setting Please choose how many WAN ports you prefer to use Default 4 WAN 1 Obtain an IF automatically Edit WAN 2 Obtain an IP automatically Edit WAN 3 Obtain an IP automatically Edit WAN 4 Obtain an IP automatically Edit USB 36 356 Edit Bandwidth Management The Maximum Bandwidth provided by ISP TE TE TY USB 258 Gigabit Multi Homing VPN Security Router User s Manual Protocol Binding Users can define specific IP addresses or specific application service ports to go through a user assigned WAN for external connections For any other unassigned IP addresses and services WAN load balancing will still be carried out In the load balance mode of Assigned Routing the first WAN WAN1 cannot be assigned It is to be saved for the IP addresses and the application Service Ports that are not assigned to other WANs WAN2 WAN3 and WANA4 for external connections In other words the first WAN WAN1 cannot be configured with the Protocol Binding rule This is to avoid a condition where all WANs are assigned to specific Intranet IP or Service Ports and destination IP no more WAN ports will be available for other IP addresses and Service Ports Protocol Binding Show Priority gA Interface WAN1 Enabled Shay Table raray Caneel This is to select the Binding Service Port to be activated The default Such as ALL TCP amp UDP 0 65535 WWW 80 80 FT
78. e Delete self defined IP or IP range Apply Click Apply to save the network configuration modification Cancel gt gt gt gt Click Cancel to leave without making any changes Gigabit Multi Homing VPN Security Router User s Manual Remote IP Group Management Basically Remote IP Group setups are exactly the same as Local IP Group setups However remote IP group does not have automatically learning functions Instead you need to define addresses ranges and groups manually For example 220 130 188 1 to 200 range r Remote Group Set User Edit IP Name IP Group yl Ad x H H H W IP List Group Name po Name tp Address V EdtDelete Name IPAddress A Delete Y It is the same setting methods You should set the IP address or the range of remote IP from the left side first and choose to add IP address information from the left side into the remote group 64 Gigabit Multi Homing VPN Security Router User s Manual 7 7 Port Group Management Service ports can be grouping as IP grouping It is convenient to set QoS firewall access rules and other functions user edit port Port Group Set Port List Group Name po Name Protocol Port Delete Name Protocol Port Delete All Traffic BOTH 1 65535 DNS UDP 53 53 FTP TCP 21 21 HTTP TCP 30 80 a TCP 8080 8080 l HTTPS TC
79. e LAN IP of Master device It should be different from Slave device s IP A rA MAC Address of the Input the LAN MAC of Master device It should be different from Salve device s Status Normal indicates both devices work normally Status Backup indicates the Backup device is enabled for backing up Master device to take over WAN connection and DHCP issuing function 128 Gigabit Multi Homing VPN Security Router User s Manual Chapter 13 Log From the log management and look up we can see the relevant operation status which is convenient for us to facilitate the setup and operation 13 1 System Log Its system log offers three options system log E mail alert and log setting Send SMS _ Enable USB Link UP Link Down Authentication Fail System Startup Syslog Configuration Enable Syslog Syslog Server Po Mame or IF Address Log Setting d Syn Flooding d IP Spoofing F Win Nuke L Ping Of Death Unauthorized Login Attempt C Deny Policies C Allow Policies Authorized Login View System Log Outgoing Log Table Incoming Log Table Clear Log Now System Log Syslog Configuration Enable Syslog syslog Server Po Mame orlP Address 129 Gigabit Multi Homing VPN Security Router User s Manual Enabled If this option is selected the System Log feature will be enabled Syslog Server The device provides external system log servers with log collection feature System log i
80. e configuration Cancel Click Cancel to leave without making any change Show Table Summary Rule Interface Baie 70 Gigabit Multi Homing VPN Security Router User s Manual 8 1 3 Smart QoS Each IF s upstream bandwidth threshold Kbit sec Each IF s downstream bandwidth threshold 1000 Kbitisec Each IF s Maximum bandwith Upstream WAN 1 Kbit sec WAN 2 Kbit sec WAN 3 Kbit sec WAN 4 Kbit sec USB Kbitisec Downstrearn WAN 1 400 Kbit sec WAN 2 Kbilisec WAN 3 Kbitisec WAN 4 Kbit sec USB Kbitisec F Fenalty mechanism Show Penalty IP Enabled QoS Choose to apply QoS function When the usage of any WAN s Input the required rate value into the column The default is 60 bandwidth is over __ Enable Smart QoS Each IP s upstream bandwidth Input the max upstream rate for intranet IPs threshold for all WAN Each IP s downstream bandwidth Input the max downstream rate for intranet IPs threshold for all WAN If any IP s bandwidth is over maximum When any IP uses more bandwidth than the above upstream or threshold its maximum bandwidth will downstream settings the IP will be restricted for the following remain upstream or downstream bandwidth settings Enabled Penalty Mechanism After choosing Enabled Penalty Mechanism the device will enable the penalty conditions internally When the IP still uses more upstream or downstream bandwidth than the setting t
81. e other IP range you can setup the default gateway and IP range into group 2 After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes 35 Gigabit Multi Homing VPN Security Router User s Manual 6 2 Multi WAN Setting 6 2 1 Load Balance Mode Mode Auto Load Balance Mode By Session Advanced Function O By IP Unbinding WAN Balance Un binding WAN Balance Mode O By Session Ginebra cue O By IP Strategy Routing Mode O By Session Meu e O By IP strategy Routing Import IP Range Self defined Strategy 1 Self defined Strategy 2 Auto Load Balance Mode When Auto Load Balance mode is selected the device will use sessions or IP and the WAN bandwidth automatically allocate connections to achieve load balancing for external connections The network bandwidth is set by what users input for it For example if the upload bandwidth of both WANs is 512Kbit sec the automatic load ratio will be 1 1 if one of the upload bandwidths is 1024Kbit sec while the other is 512Kbit sec the automatic load ratio will be 2 1 Therefore to ensure that the device can balance the actual network load please input real upload and download bandwidths Session Balance If By Session is selected the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance IP Session Balance If By IP is selected the WAN bandwi
82. efault value Need to check with carrier provider for the correct value Dial Number Default value is 99 for WCDMA UMTS system User name amp Password Enter suitable authenticated contents if need Dial Number Username fs Tip For Example AT amp T 3G connection APN wap cingular Dialup Number 99 Username WAP CINGULARGPRS COM all uppercase Password CINGULAR1 all uppercase 1490 Gigabit Multi Homing VPN Security Router User s Manual Step 2 Check IP Address for USB 3G Connection Sidebar Menu Home WAN Status WAN Status WAN 1 WAN 2 WAN 3 WAN 4 192 168 4 141 0 0 0 0 0 0 0 0 0 0 0 0 192 168 4 1 0 0 0 0 0 0 0 0 0 0 0 0 192 168 5 121 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled 3327 Disabled 3327 Disabled 3322 Disabled i 3322 Disabled I 3322 Disabled O rules set O rules set O rules set O rules set WAN IP Address Indicates the current IP configuration for USB port Default Gateway Indicates gateway IP address from ISP Domain Name Server Indicates the current DNS IP configuration Downstream Indicates the current downstream bandwidth usage for USB port Bandwidth Rate Upstream Bandwidth Indicates the current upstream bandwidth usage for USB Port Rate DDNS Setup Indicates if Dynamic Domain Name is activated The default configuration is Disabled Indicate how many QoS rul
83. el to use any authentication Authentication mode Note that this parameter must be identical to that of the remote authentication mode MD5 or SHA1 Phase 1 SA Life The life time for this exchange code is set to 28800 seconds or 8hours by default This Time allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security Phase2 SA Life The life time for this exchange code is set to 3600 seconds or 1hours by default This Time allows the automatic generation of other exchange password within the valid time of the 96 Gigabit Multi Homing VPN Security Router User s Manual VPN connection so as to guarantee security Preshared Key For the Auto IKE option enter a password of any digit or characters in the text of Pre shared Key the example here is set as test and the system will automatically translate what users entered as exchange password and authentication mechanism during the VPN tunnel connection This exchange password can be made up of up to 30 characters Advanced Setting for IKE Protocol Only Advanced Aggressive Mode Keep Alive NAT Traversal Dead Peer Detection DPD Interval 19 seconds Ol Heart Beat Remote Host o o o lo Interval seconds Retry count The advanced settings include Main Mode and Aggressive mode For the Main mode the default setting is set to VPN operation mode The connection i
84. ent from LAN MAC of Master 127 Gigabit Multi Homing VPN Security Router User s Manual backup device Status Normal means both two devices operate normally Status Backup indicates Slave mode has problems and the device enables backup to take over WAN High Availability 2 Enable Disable Mode Hardware Backu p Mode Two devices are operating Simultaneously SPE Master Mode 2 Slave Mode DHCP Enable DHCP Disable Master Slave Mode setting Of two devices must be different OO wan 1 Owan 2 wan 3 2 WAN 4 WAN Backup The checked WAN are not working in this device LAN Gateway Backup gt gt gt ie S MAC Address of the backup device o lo Lo lo o Wo Status Normal Operation Slave Mode Although working with master device Backup device s DHCP server is disabled LAN users need to transmit traffic through the WAN on Slave device You should add LAN IP of Slave device into Master device DHCP server default gateway which is DHCP server IP address For example if the DHCP server s IP of Master device is 192 168 1 1 and the subnet mask is 255 255 255 0 Salve device should be in the same subnet ex 192 168 1 2 WAN Backup The checked WANSs will works in another device For an example if VVAN1 and The Checked WANs WAN2 work in this device and WAN3 and WAN4 work in another WAN3 and are not working in this WAN4 should be checked device LAN Gateway Backup Input th
85. es 255 255 255 248 Issued 16 static IP addresses 255 255 255 240 Default Gateway Address Input the default gateway of the static IP address issued by ISP For ADSL 28 Gigabit Multi Homing VPN Security Router User s Manual Password Input the password issued by ISP Connect on Demand This function enables the auto dialing function to be used for a PPTP dial connection When the client port attempts to connect with the Internet the device will automatically connect with the default ISP auto dial connection when the network has been idle for a period of time the system will break the connection automatically The default time for automatic break off when no packets have been transmitted is five minutes Keep Alive This function enables the PPTP dial connection to redial automatically when the connection has been disconnected Users can set up the redialing time The default is 30 seconds Enable Line Dropped The WAN disconnection schedule will be activated by checking this option In Scheduling some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Theref
86. es are set Manual Connect Disconnect Stop current connection status Connect Change the disconnection to connection TRE Gigabit Multi Homing VPN Security Router User s Manual Physical Port Status Status cell indicted current connection status for USB Port C Connected This 3G 4G device just still connected via USB Port Enabled This 3G 4G deice still available amp wait to connect Physical Port Status 1 LAN Internet Internet Internet Internet LSB WAN 1 WAN 2 WAN 3 WAN 4 USB Connect Enabled Enabled Enabled Enabled Step 3 Check 3G Info from Service Provider Sidebar Menu USB Setting 005 1P TD HCP USE Power Saving Interface USB Connection Type 36 Modern System Provider Signal Quality Charge count Disabled Bytraffic KBytes By time Minutes Restart the count on ft th day every month caah Cancel Indicated Current USB Port Connection Type Specify Connection Type Default value is 3G Modem System Provider Indicated current Service Provider name Indicated current Signal Strength Signal Quality 144 Gigabit Multi Homing VPN Security Router User s Manual Refresh Push Refresh button to get the updated s tatus Charge count Default value is disabled 3G service charge by traffic usage Charge count Disabled By traficiKBytes By time Minutes Extra Charge Dollars KBytes Stop connection when tota
87. es selected from the Service List application Moving Up amp Down The priority for rule execution depends on the rule order in the list A rule located at the top will be executed prior to those located below it Users can arrange the order according to their priorities The rules configured in Protocol Binding will be executed by the device according to their priorities too The higher up on the list the higher the priority of execution A7 Gigabit Multi Homing VPN Security Router User s Manual Show Table Click the Show Table button A dialogue box as shown in the following figure will be displayed Users can choose to sort the list by priorities or by interface Click Refresh and the page will be refreshed click Close and the dialogue box will be closed Priority Interface Add or Remove Service Port If the Service Port users want to activate is not in the list users can add or remove service ports from Service Port Management to arrange the list as described in the following Service Management Windows Internet Explorer E 192 165 1 1 service Name All Traffic TCPAUDPM 65535 DNS UDP 53 53 FTP TCGP 21 21 HTTP TCP 80 80 er HTTP Secondary TCP 8080 8080 HTTPS TCP 443 443 HTTPS Secondary TCP 8443 8443 TFTP UDP 69 69 Port Range IMAP TCP 143 143 tof NNTP TCP 119 119 POP3 TCPM10 110 SNMP UDP 161 161 SMTP TCP 25 25 TELNET TCP 23 23 TEL
88. esses When 192 168 1 100 visits Internet 61 222 81 100 for the first time the connection is through WAN1 200 10 10 1 If the next destination is to 61 222 81 101 in the same Class B range the connection will also be through WAN 1 200 10 10 1 If the destination is to other IP not in the same Class B range as 61 222 81 100 the session will be distributed in the original session balance mechanism When the other intranet IP 192 168 1 101 visits 61 222 81 101 for the first time the connection is through WAN2 200 10 10 2 If the next destination is to 61 222 81 100 in the same Class B range the connection will also be through WAN2 200 10 10 2 If the destination is to other IP not in the same Class B range as 61 222 81 100 the session will be distributed in the original session balance mechanism 41 Gigabit Multi Homing VPN Security Router User s Manual Not all intranet IP will visit the same Class B range with the same WAN IP It depends on which WAN the first connection goes to If the destination IP is in the same Class B range the connection will go through with the same WAN IP based on the first time learning User Define Dis Or Port Indicates that the intranet IP will connect through the same WAN IP when the Auto Binding service ports are self defined You can self define the service ports and destination IP If the destination IP is set as 0 0 0 0 to O this represents that the destination is to any IP range
89. g website and the connection is distributed into different WAN IP addresses there will be disconnection or failure Session balance advanced function targets at solving this issue Session balance advanced function can set the same intranet IP keeps having sessions from the same WAN IP for some specific service protocols Other service protocols can still adopt the original balance mechanism to distribute the sessions equally and randomly With the original session balance efficiency advanced function can ensure the connection running without error for some special service protocols Mode Auto Load Balance Mode By Session Advanced Function By IP Unbinding WAN Balance Un binding WAN Balance Mode By Session EWM By IP Strategy Routing Mode O By Session Advanced Function O By IP strategy Routing Self defined Strategy 1 Self defined Strategy 2 Click Advanced Function to enter the setting window 40 Gigabit Multi Homing VPN Security Router User s Manual 2 Destination Auto Binding User Define Dest IP or Port Auto Binding No Aging Time Protocol Port Range to TCOP 1863 1863 TCP 5050 5050 UDP s000 8005 Dalate selected Entry Destination Auto Binding Indicates that the session will be connected with the same WAN IP when the destination IP is in the same Class B range For example there are WAN1 1 200 10 10 1 and WAN2 200 10 10 2 and two intranet IP addr
90. gabit Multi Homing VPN Security Router User s Manual IKE Protocol Click the shared key generated by IKE to encrypt and authenticate the remote user If PFS Perfect Forward Secrecy is enabled the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication When PFS is enabled hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time Perfect Forward When users check the PFS option don t forget to activate the PFS function of the VPN Secrecy device and the VPN Client as well Phase 1 Phase 2 This option allows users to select Diffie Hellman groups Group 1 Group 2 Group 5 DH Group Phase 1 Phase 2 This option allows users to set this VPN tunnel to use any encryption mode Note that Encryption this parameter must be identical to that of the remote encryption parameter DES 64 bit encryption mode 3DES 128 bit encryption mode AES the standard of using security code to encrypt information It supports 128 bit 192 bit and 256 bit encryption keys Phase 1 Phase 2 This authentication option allows users to set this VPN tunnel to use any authentication Authentication mode Note that this parameter must be identical to that of the remote authentication mode MD5 or SHA Phase 1 SA Life The life time for this exchange code is set to 28800 seconds or 8hours by default This Time allows the automatic generat
91. gh another WAN to connect with the Internet Link Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP Shared Circuit WAN If your WAN connects to a Switch select Enabled to filter broadcast packets environment The default is Disabled MTU is abbreviation of Maximum Transmission Unit Auto and Manual can be chosen The default value is 1500 Different value could be set in different network environment e g ADSL PPPoE MTU 1492 The default is Auto After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes 2312 Gigabit Multi Homing VPN Security Router User s Manual Router Plus NAT Mode When you apply a public IP address as your default gateway you can setup this public IP address into a LAN PC and this PC can use this public IP address to reach the Internet Others PCs can use NAT mode to reach the Internet If this WAN network is enabled the Router plus NAT mode you can still use load balancing function in this WAN network Interface MAN 1 WAN Connection Type WAN IP Address 0 Subnet Mask 255 Default Gateway o DNS Server Required o DNSServer Optional 2 LAN Default Gateway 1 LAN Public IP Range 1 LAN Public IP Range 2 e e 255 255 Ee o e e e p p p p
92. h connect to external VPN device PPTP Pass If this option is enabled the PC is allowed to use VPN PPTP packet to pass in order to L2TP Pass If this option is enabled the PC end is allowed to use VPN L2TP packet to pass in Through order to connect with external VPN device After modification push Apply button to save the network setting or push Cancel to keep the settings unchanged 107 Gigabit Multi Homing VPN Security Router User s Manual Chapter 11 Advanced Function 11 1 DMZ Host Port Range Forwarding DMZ Host DMZ Private IP Address 1921681 o Port Range Forwarding service All Traffic TCP amp UDP 1 65535 Service Management IP Address L i 1 1 Interface Enabled Add to list 11 1 1 DMZ Host When the NAT mode is activated sometimes users may need to use applications that do not support virtual IP addresses such as network games We recommend that users map the device actual WAN IP addresses directly to the Intranet virtual IP addresses as follows If the DMZ Host function is selected to cancel this function users must input 0 in the following DMZ Private IP This function will then be closed After the changes are completed click Apply to save the network configuration modification or click Cancel to leave without making any changes 108 Gigabit Multi Homing VPN Security Router User s Manual 11 1 2 Port Range Forwarding
93. he device will execute the penalty conditions automatically Show Penalty List The IPs which are under penalty mechanism will be shown on the list If Always is selected the rule will be executed around the clock If From is selected the rule will be executed according to the configured time range For example if the time control is from 71 Gigabit Multi Homing VPN Security Router User s Manual Monday to Friday 8 00am to 6 00pm users can refer to the following figure to set up the rule Advanced When the usage of certain WANs bandwidth is j under 50 o then stop to add new punished IF Enabled Session Control Mechanism Every 2o erone to detect whether internal IF s bandwidth are over than fine punished IP still keep upper bounded limit on then decrease its bandwidth to50 OH When the usage of all WANs bandwith are lower than S0 disable Smart Gos and after 180 minutes to release punished IP Apply D Camel When the usage of certain WAN s When the usage of certain WAN s bandwidth is under _ will bandwidth is under__ then stop to stop to punish the IP which is over the limit While the bandwidth add new punished IP is over the certain percentage penalty mechanism will be actived Every __ second to detect whether Detect usage of internal IP s bandwidth every __ secend internal IP s bandwidth are over than limit If the punished IP still keep upper If the punished IP still
94. he other group in the DMZ Interface DMZ DMZ IP ranges are the same with WAN IP Subnet Range DMZ amp WAN within same subnet ranges in Router Plus NAT mode Specify DMZ IP Address 0 o o o Subnet Mask 255 255 255 0 Beck Apply 0 Genedl 34 Gigabit Multi Homing VPN Security Router User s Manual Range DMZ and WAN are within same Subnet Interface ONE Subnet Range DMZ amp WAN within same subnet Interface IP Range for DMZ poto jo p jo to DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode IP Range Input the IP range located at the DMZ port After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode Interface DMZ Subnet Range DMZ amp WAN within same subnet Interface LAN Default Gateway1 0 o o e LAN Public IP Range o o o bo LAN Default Gateway2 0 o o o LAN Public IP Range 0 o o o o LAN Default Gateway3 0 o o o LAN Public IP Range 0 o o o bo DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode Back C Apy Cancel LAN Default Gateway Enter the LAN Default Gateway that you configured at Router Plus NAT Mode LAN IP Range Enter the usable static IP range that provide by ISP into the DMZ service IP range If you hav
95. i Homing VPN Security Router User s Manual A AA are two ways to input static IP 1 If users want to set up a MAC address to acquire IP from DHCP but the IP need not be a specific assigned IP input 0 0 0 0 in the boxes The boxes cannot be left empty 2 If users want DHCP to assign a static IP for a PC every single time users should input the IP address users want to assign to this computer in the boxes The server or PC which is to be bound will then acquire a static virtual IP aan Address Input the static real MAC the address on the network card for the server or PC which is to be bound For AO clients input the name or address of the client that is to be See ee selected item Remove the selected Remove the selected binding from thelis gt gt gt gt gt gt Darne di A AN the list ET Add new binding 0 Add new binding Block MAC address on the list with wrong IP address When this option is activated MAC addresses which are not included in the list will not be able to connect with the Internet Show New IP user This function can reduce administrator s effort on checking MAC addresses one by one for the binding Furthermore it is easy to make mistakes to fill out MAC addresses on the list manually By checking this list administrator can see all MAC addresses which have traffic and are not bound yet Also if administrators find that one specific bound MAC address is shown
96. ice Load Balance system to go through other WAN BS Attention ports to connect with the Internet Please refer to the explanations in 6 2 3 Configuring Protocol Binding for setting up Protocol Binding and for examples of collocating router mode with Protocol Binding Strategy Routing Mode If strategy Routing is selected the device will automatically allocate external connections based on routing policy Division of traffic between Telecom and Netcom is to be used in China embedded in the device All you have to do is to select the WAN or WAN group which is connected with Netcom the device will then automatically dispatch the traffic for Netcom through that WAN to connect with the Internet and dispatch traffic for Telecom to go through the WAN connected with Telecom to the Internet accordingly In this way the traffic sa Gigabit Multi Homing VPN Security Router User s Manual for Netcom and Telecom can be divided Set WAN Grouping If more than one WAN is connected with Netcom to apply a similar division of traffic policy to these WANs a combination for the WANs must be made Click Set WAN Grouping an interactive window as shown in the figure below will be displayed Mame e Interface CIWAN 1 CIWAN 2 LI wan 3 Juss i To define a name for the WAN grouping in the box such as Education etc The name is for recognizing different WAN groups Interface Check the boxes for the WANs to be added i
97. ich are IP Gateway Type only IP Domain Name FQDN Authentication IP E mail Addr USER FQDN Authentication Dynamic IP Domain Name FQDN Authentication Dynamic IP E mail Addr USER FQDN Authentication 1 IP only If users decide to use IP only entering the IP address is the only way to gain access to this tunnel The WAN IP address will be automatically filled into this space Users don t need to do further settings OJO 2 IP Domain Name FQDN Authentication If users select IP domain name type please enter the domain name and IP address The WAN IP address will be automatically filled into this space Users don t need to do further settings FQDN refers to the combination of host name and domain name and can be retrieved from the Internet e vpn server com This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection IP Domain NametFODN Authentication IF Address 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail enter the IP address and E mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space Users don t need to do further settings IP E mail User FQDN Authentication IPF Address Ww 4 Dynamic IP Domain Name FQDN Authentication lf users use dynamic IP address to connect to the device users may select this option
98. identification of websites that needs authentication but allows a single WAN port rather than Multi WANs Administrators may find out the destination IP for protocol binding to solve this login problem For example when certain port software is denied inquiring about the IP address of this specific software server port may apply this feature Moreover to find out BT or P2P software users may select this feature to inquire users from the port IP Port Statistic Enabled IP Port Statistic F Address 0 o o o Specific IP Status Enter the IP address that users want to inquire and then the entire destination IP connected to remote devices as well as the number of ports will be displayed IP Port Statistic Enabled IP Port Statistic IP address 0 o o lo 192 168 1 100 TCP 2959 WANA 74 120 121 3 80 8 32 192 168 1 100 TCP 2940 WANA 192 168 5 126 1144 11 20 a 192 168 1 100 TCP 3036 WAN 192 168 5 27 445 1 1 192 168 1 100 TCP 2958 WAN 65 54 1689 156 1863 0 0 192 168 1 100 TCP 2942 WAPA 192 168 5 121 49156 192 168 1 100 TCP 3128 WAN 118 160 195 248 1894 0 0 192 168 1 100 TCP 2947 WAN 192 168 5 120 49157 0 0 Rae triers tl 137 Gigabit Multi Homing VPN Security Router User s Manual Specific Port Status Enter the service port number in the field and IP that are currently used by this port will be displayed IP Port Statistic V Enabled IP Port Statistic Port Search 192 168 1100 TCP 2959 W
99. igurations Users can also set up their own DNS IP address Check the options and input the user defined DNS IP addresses Interface MAN 1 WAN Connection Type Obtain an IP automatically LJ Use the Following DNS Server Addresses DNSServer Required 0 o o Jp DNSServer Optional o fo fo o Shared Circuit WAN environment Yes NO Filter broadcast packets from WAN MTU Auto Manual 1500 bytes C Enabled Line Dropped Scheduling Line Dropped Period from 0 jo to Jo 24 Hour Format Line Dropped Scheduling minutes ahead line dropped to start new session transferring Backup Interface Berk daal Cancel ee Gigabit Multi Homing VPN Security Router User s Manual Use the following DNS Select a user defined DNS server IP address Sem fn DNS Server Input the DNS IP address set by ISP At least one IP group should be input Enable Line Dropped The WAN disconnection schedule will be activated by checking this option In Scheduling some areas there is a time limitation for WAN connection service For example The optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore
100. in which case the user may be required to take adequate measures Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio technician for help Gigabit Multi Homing VPN Security Router User s Manual FCC Caution To assure continued compliance example use only shielded interface cables when connecting to computer or peripheral devices Any changes or modifications not expressly approved by the party responsible for
101. ing items should be included MH 3400 x 1 Power Cord x 1 Quick Installation Guide x 1 User s Manual CD x 1 Cat5 Cable x 1 If any of the contents are missing or damaged please contact your dealer or distributor immediately 1 3 Physical Specification Front Panel MH 3400 Rear View i 100 240V AC S0 G0H2z FUSE T2 0A 250V Gigabit Multi Homing VPN Security Router User s Manual LED definition Steady on System is crashed Amber Blinking System is on self test after power on the device cof system is ready Steady on Port has been connected amp Get IP reen l Link Act inking ransmit data lor Not get the IP address even the port has been connected Steady on LAN port has been connected LAN Link Act Green Blinking Transmit data Green Steady On Works on 1000M LAN WAN DMZ Amber Steady On Works on 100M Speed cof Works on 10M Steady on USB is connected and the device is supported USB Green Link Connect Blinking Packets are transmitting through USB port Act Not connect with any USB device Button definition Push 5 seconds for Warm Start and push 10 seconds for Factory Default Rocker switch Internal 12V 1 65A Gigabit Multi Homing VPN Security Router User s Manual 1 4 Specification Gigabit Multi Homing VPN Security Router MH 3400 1 2 x 10 100 1000Mbps RJ 45 with LAN 1 configurable as LAN 1 Mirror Port 3 4 x 10 100 1000Mbps RJ 45 with WAN 4 configura
102. ing networks without changing the original structure Select the Transparent Bridge mode for the WAN connection mode In this way users will be able to connect normally with the Internet while keeping the original Internet IP addresses in Intranet IP configuration If there are two WANs configured users still can select Transparent Bridge mode for WAN connection mode and load balancing will be achieved as usual Ra Interface MAR WAN Connection Type Transpare WAN IP Address Subnet Mask Default bateway DNS Server Required DNS Server Optional Internal LAN IP Range 1 Internal LAN IP Range 2 internal LAN IP Range 3 internal LAN IP Range 4 internal LAN IP Range 5 Shared Circuit WAN environment Yes MTU Auto Th i 1 CL O iT 4 ba ba ba L b IEEE MA MEME MINE E PIPPI 6 Ad fad l Gad hh E i a bal bal Lal Ane NO Filter broadcast packets from WAN Manual 1500 bytes O Enabled Line Dropped Scheduling Line Dropped Period from 9 jo to 0 24 Hour Format Line Dropped Scheduling minutes ahead line dropped to start new session transferring Backup Interface WAN IP Address Input one of the static IP addresses issued by ISP Input the subnet mask of the static IP address issued by ISP such as Issued eight static IP addresses 255 255 255 248 Issued 16 static IP addresses 255 255 255 240 Default Gateway Address Inpu
103. ingle IP packet Si 5000 aia far Parkets Sec single Source IP Threshold 5000 Packets Sec Block this IP when reach threshold Minutes Block this IP when reach threshold 1 Minutes Threshold counted by all packets Threshold counted by all packets Packets Sec Packets Sec Single Destination IP Threshold Packets Sec Threshold counted by single IP packet si 5000 e fcr Packets Sec single Source IP Threshold 5o00 Packets Sec Block this IP when reach threshold Minutes Block this IP when reach threshold Minutes Threshold counted by all packets Threshold counted by all packets Packets S5ec Packels Sec Single Destination IP Threshold Packets Sec Threshold counted by single IP packet aj 50 ta Packets Sec single Source IP Threshold Packets Sec Block this IP when reach threshold 5 Minutes Block this IP when reach threshold Minutes 17 adds o jo o tesGroup tes 77 Gigabit Multi Homing VPN Security Router User s Manual Packet Type This device provides three types of data packet transmission TCP SYN Flood UDP Flood and ICMP Flood WAN Threshold When all packet values from external attack or from single external IP attack reach the maximum amount the default is 15000 packets Sec and 2000 packets Sec respectively if these conditions above occurs the IP will be blocked for 5 minutes the default is 5 minutes OBJ 176 Users can adjust the threshold value and the blocking duration to effecti
104. ion of other exchange password within the valid time of the VPN connection so as to guarantee security Phase2 SA Life The life time for this exchange code is set to 3600 seconds or 1hours by default This Time allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security Advanced Setting for IKE Preshareed Key Only Advanced Agaressive Mode C NAT Traversal Dead Peer Detection DPD Interval 19 _ seconds all Cancel The advanced settings include Main Mode and Aggressive mode For the Main mode the default setting is set to VPN operation mode The connection is the same to most of the VPN devices 104 Gigabit Multi Homing VPN Security Router User s Manual Aggressive Mode This mode is mostly adopted by remote devices The IP connection is designed to enhance the security control if dynamic IP is used for connection NAT Traversal This option allowed the VPN connection can penetrate the NAT which in front of the router Dead Peer If this option is selected the connected VPN tunnel will regularly transmit HELLO ACK Detection DPD message packet to detect whether there is connection between the two ends of the VPN tunnel If one end is disconnected the device will disconnect the tunnel automatically and then create new connection Users can define the transmission time for each DPD message packet and the default value is 10 second
105. ions that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnections users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Gigabit Multi Homing VPN Security Router User s Manual Line Dropped Period Input the time rule for the disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly added Scheduling connections should go through another WAN to connect with the Internet Link Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP Shared Circuit WAN If your WAN connects to a Switch select Enabled to filter broadcast packets environment The default is Disabled MTU is abbreviation of Maximum Transmission Unit Auto and Manual can be chosen The default value is 1500 Different value could be set in different network environment e g ADSL PPPoE MTU 1492 The default is Auto After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes PPPoE This option is for an ADSL virtual dial up connection suitable for
106. keep over the limit the limit badwidth will bounded limit on then decrease its be decraseto _ bandwidth to When the usage of all WANs bandwith Smart QoS will be disabled when the usage of bandwidth is are lower than__ disable Smart Qos lower than __ Punished IP will be released after minute and after__minutes to release punished IP 77 e Gigabit Multi Homing VPN Security Router User s Manual 8 1 4 Exception IP address If some users are allowed to avoid traffic management control you can use this function to fulfill the requirement Exception IP address Interface wand O wan2 O wan 3 O wana O use JL I fto Group Direction Do not control upstream bandwidth Do not control downstream bandwidth O Do not control bi direction bandwidth Enabled selected item ina Vella al Enter the exempted IP range or select the exempted IP group Do not control Select do not control upload download or both of them Direction Enabled UU U Enable this policy Add to Lit Add this policy into the exempted list Delete Selected item Delete selected list Apply Click Apply button to saving configuration Click Cancel button to reject modification Gigabit Multi Homing VPN Security Router User s Manual 8 2 Session control Session management controls the acceptable maximum simultaneous sessions of Intranet PCs This function is very useful for managing co
107. l traffic reaches Po KBytes Previous Total Traffic KBytes Current total Traffic KBytes Charge Restart the count on ho th day every month The basic service fee for 3G traffic usage Extra charge The additional fee after exceeding the preimum Auto Disconnect Auto isconnection function when user defines max accumulated traffic to aviod paying unplanned 3G service fee Previous Total Traffic Previous traffic usage record after clean button is pushed Current Total Traffic Total Traffic Current Total Traffic Current Accumulated traffic usage gt gt gt gt gt gt gt Accumulated traffic Current Accumulated traffic usage gt gt gt gt gt Calculated fee based on current total traffic usage Restart the count the count Restart the count Auto Auto flush on the specific date every month on the Auto flush on the specific date every month date every month Flush accumulated record manually 145 Gigabit Multi Homing VPN Security Router User s Manual 3G service charge by time usage Charge count O Disabled Bytraffic KBytes By time Minutes Premium Minutes __ Dollars Extra Charge _ Dollars Minutes Stop connection when its over minutes Previous Cumulative Time Current Cumulative Time Charge Restart the count on FE day every month Premium U The basic service fee for 3G time usage Extra Charge Billing Rate by Over b
108. le time set If all the wired WAN connections work normally the router will stop providing power for the 3G dongle after the pre set idle time However if all the wired WAN connections fail or are disconnected the 3G services will return connected automatically until any wired WAN connection recovers Mode Selection Disabled Performance Mode Always connected Backu p Mode Smart Mode Idle time 12 Minutes Scheduling Mode Trigger Condition NSD Start Failover Threshold Start Load Balance WAN 1 Enable Failover Over 10000 kbits Under 10 WAN 2 Enable Failover Dover kbits Under WAN 3 Enable Failover Over kbits Under WAN 4 Enable Failover Over kbits Under 148 Gigabit Multi Homing VPN Security Router User s Manual Threshold Start Load Balance After administrator chooses which WAN ports are required for 3G service backup the administrators can set up bandwidth setting in the threshold Start Load Balance columns In addition to backup WAN port failures administrators can decide when the traffic is over the bandwidth setting 3G dongle can be connected for load balance Administrators must click NSD Start Failover checkbox before configuring the Threshold Start Load Balance settings 1 Configure Threshold Start Load Balance Take the above GUI screenshot for example when the router detects that WAN1 traffic is over 10000Kbits 3G services will be co
109. mail Addr USER FQDN Authentication If users use dynamic IP address to connect with the device users may select this type to link to VPN When the remote VPN gateway requires connection to facilitate VPN connection the device will start authentication and respond to the VPN tunnel connection Please enter the E Mail to the empty space Dynamic P E mail User FQDN Authentication Remote Security This option allows users to set the remote VPN connection access type The following 94 Gigabit Multi Homing VPN Security Router User s Manual Group Type offers a few items for remote settings Please select and set appropriate parameters 1 IP address This option allows the only IP address which is entered to build the VPN tunnel IP Address Reference When this VPN tunnel is connected computers with the IP address of 192 168 2 1 can establish connection 2 Subnet 192 168 2 0 and with subnet mask as 255 255 255 0 can connect with remote VPN IPSec Setup If there is any encryption mechanism the encryption mechanism of these two VPN tunnels must be identical in order to create connection And the transmission data must be encrypted with IPSec key which is known as the encryption key The device provides the IKE automatic encryption mode IKE with Preshared Key automatic Encryption Management Protocol When users set this VPN tunnel to use a
110. mation SNMP Setup Enabled SNMP 4MAN_1LAN PSec VPN Router public private public Apay o Cemeal Mem Description A Enabled Activate SNMP feature The default is activated Get So Set the name of the group or community that can view the device SNMP data The Name default setting is Public Set Community Set the name of the group or community that can receive the device SNMP data The Name default setting is Private Trap Community Set user parameters password required by the Trap receiving host computer to Name receive Trap message Send SNMP Send SNMP Trap to to Send SNMP Trap to Set one IP address or Domain Name for the Trap receiving host computer gt one IP address or Domain Name for the Set one IP address or Domain Name for the Trap receiving host computer gt receiving host computer Apply Press Apply to save the settings Press Cancel to keep the settings unchanged 123 Gigabit Multi Homing VPN Security Router User s Manual 12 5 System Recover Users can restart the device with System Recover button Restart Restart Router Factory Default Return to Factory Default Setting Restart As the figure below if clicking Restart Router button the dialog block will pop out confirming if users would like to restart the device Restart Message from webpage J Are YOU sure YOU want to restart router Factory Default Return to
111. n modification Cancel Cancel Click Cancel to leave without making any changes 119 Gigabit Multi Homing VPN Security Router User s Manual 11 6 MAC Clone Some ISP will request for a fixed MAC address network card physical address for distributing IP address which is mostly suitable for cable mode users Users can input the network card physical address MAC address 00 xx xx xx xx xx here The device will adopt this MAC address when requesting IP address from ISP MAC Clone AN 50 56 4D 32 30 31 WAN 50 56 4D 32 30 32 WANS 50 56 4D 32 30 33 50 56 4D 32 30 34 Select the WAN port to which the configuration is to be edited click the hyperlink to enter and edit its configuration Users can input the MAC address manually Press Apply to save the setting and press Cancel to remove the setting Default MAC address is the WAN MAC address Interface HAN 1 so se Haw Hae Hao Llar Default 50 56 4D 3 2 30 31 O 00 1F C6 7B 84 BD 120 Gigabit Multi Homing VPN Security Router User s Manual Chapter 12 System Tool System Tool This chapter introduces the management tool for controlling the device and testing network connection For security consideration we strongly suggest to change the password Password and Time setting is in Chapter 5 2 12 1 Diagnostic The device provides a simple online network diagnostic tool to help users troubleshoot network related problems
112. n bandwidth for each IP address If this option is selected every IP or Service Port in this range can have this bandwidth minimum to maximum For 69 Gigabit Multi Floming VPN Security Router Users Manual Multi Homing VPN Security Router User s Manual example If the rule is set for the IP of each PC the IP of each PC will have the same bandwidth If Share Bandwidth is selected be aware of the actual usage conditions and avoid an improper configuration that might cause a malfunction of the network when the bandwidth is too small A For example if users do not want an FTP to occupy too much bandwidth users can select the Share Bandwidth Mode so that no matter how much users use FTPs to download information the total occupied bandwidth is fixed Add to list Add this rule to the list Move up 8 Move down QoS rules will be executed from the bottom of the list to the top of the list In other words the lower down the list the higher the priority of execution Users can arrange the sequence according to their priorities Usually the service ports which need to be restricted such as BT e mule etc will be moved to the bottom of the list The rules for certain IP addresses would then be moved upward Delete selected items Remove the rules selected from the Service List Show Table Display all the Rate Control Rules users made for the bandwidth Click Edit to modify Apply Click Apply to save th
113. n reach the limit this user will not be able to make a new session for five minutes Even if the previous session has been closed new sessions cannot be made until the setting time ends O block this IP s all sessions for minutes If this function is selected when the user s port connections reach the limit all the 74 Gigabit Multi Homing VPN Security Router User s Manual lines that this user is connected with will be removed and the user will not be able to connect with the Internet for five minutes New connections cannot be made until the delay time ends If Always is selected the rule will be executed around the clock If From is selected the rule will be executed according to the configured time range For example if the time control is from Monday to Friday 8 00am to 6 00pm users can refer to the following figure to set up the rule Exempted Service Port or IP Address Exempted Service Port or IP Address Service Service Management sorer ML e Jep LJ Enabled Maximum connections limit Unlimited Not exceed 200 o Service Port Choose the service port IP Address Input the IP address range or IP group Enabled Activate the rule Add to list Add this rule to the list Delete seleted item Remove the rules selected from the Service List Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change
114. nable Enable Enable IP Range Start The four default IP segments initial from 192 168 1 100 192 168 2 100 192 168 3 100 192 168 4 100 Users can configure according actual demand IP Range End The four default IP segments end at 192 168 1 149 192 168 2 149 192 168 3 149 192 168 4 149 It means there are 50 IPs in one of segments Users can configure according actual demand VY Gigabit Multi Homing VPN Security Router User s Manual 6 1 3 WAN amp DMZ Settings WAN Setting WAN Setting Please choose how many WAN ports you prefer to use Default 4 WAN 1 Obtain an IF automatically Edit WAN 2 Obtain an IF automatically Edit WAN 3 Obtain an IF automatically Edit WAN 4 Obtain an IF automatically Edit USB 3G 356 Edit Interface An indication of which port is connected Connection Type Obtain an IP automatically Static IP connection PPPoE Point to Point Protocol over Ethernet PPTP Point to Point Tunneling Protocol or Transparent Bridge A modification in an advanced configuration Click Edit to enter the advanced configuration page Obtain an Automatic IP automatically This mode is often used in the connection mode to obtain an automatic DHCP IP This is the device system default connection mode It is a connection mode in which DHCP clients obtain an IP address automatically If having a different connection mode please refer to the following introduction for selection of appropriate conf
115. nage the network packet traffic and make sure whether their access is allowed by the firewall 9 2 1 Default Rule The device has a user friendly network access regulatory tool Users may define network access rules They can select to enable disable the network so as to protect all internet access The following describes the internet access rules eo All traffic from the LAN to the WAN is allowed by default All traffic from the WAN to the LAN is denied by default All traffic from the LAN to the DMZ is allowed by default All traffic from the DMZ to the LAN is denied by default All traffic from the WAN to the DMZ is allowed by default All traffic from the DMZ to the WAN is allowed by default Users may define access rules and do more than the default rules However the following four extra service items are always on and are not affected by other user defined settings HTTP Service from LAN to Device is on by default for management DHCP Service from LAN to Device is set to on by default for the automatic IP retrieval DNS Service from LAN to Device is on by default for DNS service analysis Ping Service from LAN to Device is on by default for connection and test Access Rule Jump tol 1 Page 5 entries per page Next Page gt gt Allow All Traffic 1 LAN Any Any Always Deny All Traffic 1 USB Any Any Always Deny All Traffic 1 WANA Any Any Always Deny All Traffic 1 WAN Any Any Always
116. ng VPN Security Router User s Manual Remote Group Setup Remote VPN Group Setting Pony LH IL JL ONO E s 0 This remote gateway authentication type Remote Security Gateway Type must be identical to the remotely connected local security gateway authentication type Local Security Gateway Type Remote Security This remote gateway authentication type comes with five operation modes which are Gateway Type IP only Authentication by use of IP only IP Domain Name FQDN Authentication IP Domain name IP E mail Addr USER FQDN Authentication IP Email address Dynamic IP Domain Name FQDN Authentication Dynamic IP address Domain name Dynamic IP E mail Addr USER FQDN Authentication Dynamic IP address Email address name 1 IP only If users select the IP Only type entering this IP allows users to gain access to this tunnel Pony IP Only e BEE If the IP address of the remote client is unknown choose IP by DNS Resolved allowing DNS to translate IP address When users finish the setting the corresponding IP address will be displayed under the remote gateway of Summary IP Only ay 2 IP Domain Name FQDN Authentication If users select IP domain name please enter IP address and the domain name to be verified FQDN refers to the combination of host name and domain name Users may enter any name that corresponds to the domain name of FQDN This IP address
117. nnected for load balance 2 Return to power Saving mode During 3G dongle is connected for load balance the router will keep detecting WAN1 traffic usage If the WAN 1 traffic is lower than 90000Kbits 10 of 10000Kbits the router will return the 3G dongle back to power saving mode Scheduling Mode In Schedule mode administor can set up time table for USB 3G 4G device connection Scheduling Mode 00 00 03 00 06 00 09 00 42 00 15 00 18 00 21 00 to to to to to to to to 02 59 05 59 06 59 11 59 14 59 17 59 20 59 23 59 mon T Tue lala Wed Fri Sat USB Active state Power saving state Apply 149 Gigabit Multi Homing VPN Security Router User s Manual Step 5 Send System log Via SMS Message Sidebar Menu Log gt System Log System Statistic Traffic Statistic IP Port Statistic Send SMS Router can send system log to mobile phones via SMS when events are triggered Send SMS LJ Enable Link UP Link Down Authentication Fail System Startup 150
118. nnection quantity when P2P software such as BT Thunder or emule is used in the Intranet causing large numbers of sessions Setting up proper limitations on sessions can effectively control the sessions created by P2P software It will also have a limiting effect on bandwidth usage In addition if any Intranet PC is attacked by a virus like Worm Blaster and sends a huge number of session requests session control will restrict that as well Session Control and Scheduling Session Control Disabled Single IP cannot exceed Session Single IP cannot exceed TCP hoo UDP Session When single IP exceed Session block this IF s new sessions for 5 minutes block this IF s all sessions for 5 minutes Scheduling AAA NN Apply this rule oo 00 to 23 58 24 Hour Format Everday Sun Man Tue Wed Thu Fri Sat Disabled Disable Session Control function Single IP cannot This option enables the restriction of maximum external sessions to each Intranet exceed _ session PC When the number of external sessions reaches the limit to allow new sessions to be built some of the existing sessions must be closed For example when BT or P2P is being used to download information and the sessions exceed the limit the user will be unable to connect with other services until either BT or P2P is closed When single IP exceed block this IF s new sessions for minutes If this function is selected when the user s port sessio
119. nto this combination Add To List To add a WAN group to the grouping list Delete selected Item To remove selected WANs from the WAN grouping Apply Click Apply to save the modification Close Click Cancel to cancel the modification This only works before Apply is clicked After the configuration is completed in the China Netcom Policy window users can select WANs in combination to connect with Netcom 38 Gigabit Multi Homing VPN Security Router User s Manual Import Strategy A division of traffic policy can be defined by users too In the Import Strategy window select the WAN or WAN group ex WAN 1 to be assigned and click the Import IP Range button the dialogue box for document importation will be displayed accordingly A policy document is an editable text document It may contain a destination IP users designated After the path for document importation has been selected click Import and then at the bottom of the configuration window click Apply The device will then dispatch the traffic to the assigned destination IP through the WAN ex WAN 1 or WAN grouping users designated to the Internet s Strategy Routing Self defined Strategy 1 Self defined Strategy 2 EST To build a policy document users can use a text based editor such as Notepad which is included with Windows system Follow the text format in the figure below to key in the destination IP addres
120. ny wired WAN connection recovers Trigger Condition Mode Selection Disabled Interface Performance Mode Always connected 2 Backup Mode Smart Mode Schedulin g Mode Trigger Condition NSD Start Failover WAN 1 Enable WAN 2 Enable WAN 3 Enable WAN 4 Enable Fai Fai Fai Fai lover lover lover lover Idle time _ Minutes Threshold Start Load Balance Over kbits Under Over _ kits Under Over 10000 kbits Under 10 Over 10000 kbits Under 10 Add log for auto selftest Apply Gencal 147 Gigabit Multi Homing VPN Security Router User s Manual NSD Start Failover 1 The selected wired WAN port is detected failing the connection Administrator has to select at least one wired WAN port here If several wired WAN ports are selected the 3G dongle will be connected automatically when the selected wired WAN ports all fail the connections 2 Failover When the router detects the selected wired WAN ports are all connected the router will return the 3G dongle back to power saving mode Auto self test Interface USB Display USB interface USB 3G 4G dongle will be activated and run the connection test on a Auto Self test ajoo 00 everyday daily basis Add log for auto self test Checkbox for added record to system log for auto self test Smart Mode The router will keep the 3G dongle on power saving mode based on the id
121. ock basis If From is selected the activation time is introduced as below Day Control This control rule has time limitation The setting method is in 24 hour format such as 08 00 18 00 8 a m to 6 p m 85 Gigabit Multi Homing VPN Security Router User s Manual Chapter 10 VPN Virtual Private Network 10 1 Display All VPN Summary Summary lo Tunnels Used 60 Tunnel s Available E Tunnel s Used 200 Tunnels Available VPNTunnel s Status Jump to 1 se Fage 5 entries per page This VPN Summary displays the real time data with regard to VPN status These data include all tunnel numbers setting parameters and Group VPN and so forth Summary lo Tunnel s Used 60 Tunnel s Available lo Tunnel s Used 200 Tunnel s Available Detail Push this button to display the following information with regard to all current VPN configurations to facilitate VPN connection management WANT IP 0 0 0 0 WAN IP 0 0 0 0 WANSIP 0 0 0 0 WAN IP 0 0 0 0 WANS IP 0 0 0 0 waiting for ee 192 168 1 0 192 168 1 0 mo connection emia 255 255 255 0 255 255 255 0 dd 86 Gigabit Multi Homing VPN Security Router User s Manual VPN Tunnel Status The following describes VPN Tunnel Status the current status of VPN tunnel in detail VPN Tunnel s Status 1 Tunnel s Enabled f Tunnel s Defined Jump to 1 e Page 5 entries per page Edit m waiting for a 192 168 1 0 19216810
122. of host name and domain name and can be retrieved from the Internet e vpn server com This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection F Domain Name FOQDN Authentication lo lo a la 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail enter the IP address and E mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space Users don t need to do further settings IP E mail User FQDN Authentication ppp da 4 Dynamic IP Domain Name FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to link to VPN If the remote VPN gateway requires connection to the device for VPN connection this device will start authentication and respond to this VPN tunnel connection if users select this option to link to VPN please enter the domain name Dynamic P Domain Name FQADM Authentication 5 Dynamic IP E mail Addr USER FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to connect to VPN without entering IP address When VPN Gateway requires for VPN connection the device will start authentication and respond to VPN tunnel connection if users select this option to link to VPN enter E Mail
123. on list Interface and then click Enable Finally click Add New and the rule will be added to the mode After the rule is set up only packets that go to Port 80 will be transmitted through WAN2 while other traffics will be transmitted through WAN1 Protocol Binding Semice HTTP TCP 80 80 Service Management ie fis jo Jwofo ej 7 6 e r Interface WAN 2 e Enabled Update this Application HTTP TCP 60 80 gt 192 166 1 0 0 0 0 0 0 0 0 0 0 WAN 2 Delete selected item Add Example 2 How do configure Protocol Binding to keep traffic from all Intranet IP addresses from going through WAN2 when the destinations are IP 211 1 1 1 211 254 254 254 as well as the whole Class A group of 60 1 1 1 60 254 254 254 while traffic to other destinations goes through WAN1 As in the following figure there are two rules to be configured The first rule Select All Port TCP amp UDP 1 65535 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses In the boxes for Destination IP input 211 1 1 1 211 254 254 254 Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode The second rule Select All Port TCP amp UDP 1 65535 from the pull down option list Service and then in the b
124. on the list it means that the user changes the private IP address IP amp MAC binding List 192 168 1 100 00 1f c6 7b 8a bd 2 O Input the name or address Pe the client that is to be bound The maximum acceptable characters are 12 Enabled Choose the item to be bound 61 Gigabit Multi Homing VPN Security Router User s Manual 7 6 IP Grouping IP Group function can combine several IP addresses or IP address ranges into several groups When you manage user internet access privileges by IP address you can set up every management functions for users who have same internet access privileges in the same IP group in order to decrease the effort of setting rules for each IP address For example you can choose to set up QoS or Access Rule by IP grouping Thus you will simplify setting rules IP Grouping consists of Local IP Group and Remote IP Group Local IP Group refers to LAN IP groups and remote IP Group refers to WAN IP groups Local IP Group list will automatically learn IP addresses having packets that pass through firewall Moreover if user changes the IP address the IP in the list will change accordingly well For IP information which is in group list it won t update automatically along with IP list of the left side Administrators need to modify it manually Local Group Set User Edit IP O IP List Group Name test Name IPAddress Y Edit Delete A SAE 101 192 168 1 101 101 T 00 192 168 1 100 100 i 100
125. or each WAN link status and automatically activate backup links when a failure is detected The detection is based on the configurable target Internet addresses Outbound Load Balancing The network sessions are assigned based on the user configurable load balancing mode including Auto Load Balance Unbinding WAN Balance and Strategy Routing User can also configure which IP or TCP UDP type of traffic use which WAN port to connect Inbound Load Balancing The MH 3400 provides the Inbound Load Balancing for enterprise s internal server The Inbound Load Balancing can reduce the server loading and system crash risks in order to improve the server working efficiency Policy based Firewall The built in policy based firewall prevent many known hacker attack including Ping of Death SYN Flooding Land attack IP Spoofing etc The access rule function allowed only specified WAN or LAN users to use only allowed network services on specified time VPN Connectivity The security gateway support PPTP and IPSec VPN With DES 3DES and AES encryption and SHA 1 MD5 authentication the network traffic over public Internet is secured Content Filtering The security gateway can block network connection based on URLs Scripts The Java Applet cookies and Active X Restrict Application MSN Yahoo Messenger QQ PPSTREAM and PPTV and Download Upload blocking Multiple DHCP Server The multi DHCP server support 4 sets of Class C
126. ore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for the disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly added Scheduling connections should go through another WAN to connect with the Internet Link Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP Shared Circuit WAN If your WAN connects to a Switch select Enabled to filter broadcast packets environment The default is Disabled MTU is abbreviation of Maximum Transmission Unit Auto and Manual can be chosen The default value is 1500 Different value could be set in different network environment e g ADSL PPPoE MTU 1492 The default is Auto After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes 29 Gigabit Multi Homing VPN Security Router User s Manual Transparent Bridge If all Intranet IP addresses are applied as Internet IP addresses and users don t want to substitute private network IP addresses for all Intranet IP addresses ex 192 168 1 X this function will enable users to integrate exist
127. own outbound ICMP and abnormal packet responses in connection If users try to ping the WAN IP from the external this will not work because the default value is set as activated in order to decline the outbound responses Remote Management To enter the device web based UI by connecting to the remote Internet this feature must be activated In the field of remote browser IP a valid external IP address WAN IP for the device should be filled in and the modifiable default control port should be adjusted the default is set to 80 modifiable Multicast Pass There are many audio and visual streaming media on the network Broadcasting 76 Gigabit Multi Homing VPN Security Router User s Manual Through may allow the client end to receive this type of packet message format This feature is off by default Prevent ARP Virus This feature is designed to prevent the intranet from being attacked by ARP Attack spoofing causing the connection failure of the PC This ARP virus cheat mostly occurs in Internet cafes When attacked all the online computers disconnect immediately or some computers fail to go online Activating this feature may prevent the attack by this type of virus Advanced Setting Advance DoS Settings WAN Threshold LAN Threshold Threshold counted by all packets Threshold counted by all packets 15000 Packets Sec 50000 Packets Sec Single Destination IP Threshold Packets Sec Threshold counted by s
128. oxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses In the boxes of Destination IP input 211 1 1 1 60 254 254 254 Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode After the rule has been set up all traffic that is not going to the assigned destinations will only be transmitted through WAN 1 52 Gigabit Multi Homing VPN Security Router User s Manual Protocol Binding Show Priority service All Traffic TCP UDPA 65535 Service Management Dest IF Interface Enabled Move Up Update this Application All Traffic TCP24UDPA 65535 192 168 1 0 0 211 1 1 1 211 254 254 254JWAN 2 All Traffic TCP amp UDP M 65535 192 168 1 0 0 60 1 1 1 60 254 254 254JVAN 2 Delete selected item 53 Gigabit Multi Homing VPN Security Router User s Manual Chapter 7 Port Management This chapter introduces how to configure ports and understand how to configure intranet IP addresses 7 1 Setup Through the device users can easily manage the setup for WAN ports LAN ports and the DMZ port by choosing the number of ports speed priority duplex and enable disable the auto negotiation feature for connection setting of each port Port Setup Please choose how many WAN ports you prefer to use Default 4 F Enable Fort 1 as Mirror Port 1 LAN 10M 100
129. pe Static IF WAN IP Address 0 o jo Subnet Mask 255 250 205 Default Gateway o e e DNSServer Required 0 Jo jo DNSServer Optional 0 o jo Shared Circuit WAN environment Yes NO Filter broadcast packets from WAN MTU 2 Auto Manual 1500 bytes Enabled Line Dropped Scheduling Line Dropped Period from 0 _ 2 to o 24 Hour Format Line Dropped Scheduling minutes ahead line dropped to start new session transferring Backup Interface tem Description S O WAN IP address Input the available static IP address issued by ISP Input the subnet mask of the static IP address issued by ISP such as Issued eight static IP addresses 255 255 255 248 Issued 16 static IP addresses 255 255 255 240 Default Gateway Input the default gateway issued by ISP For ADSL users it is usually an ATU R IP address As for optical fiber users please input the optical fiber switching IP DNS Server Input the DNS IP address issued by ISP At least one IP group should be input The maximum acceptable is two IP groups Enable Line Dropped The WAN disconnection schedule will be activated by checking this option In Scheduling some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connect
130. rlink to enter and edit the settings 118 Gigabit Multi Homing VPN Security Router User s Manual Interface HAN 1 DynDN S org FL L ee 0 0 0 0 DONS function Is disabled or No Internet connection Register gl m er 0 0 0 0 3322 0rg DONS function is disabled or No Internet connection Apay o Gemeel Interface This is an indication of the WAN port the user has selected Check either of the boxes before DynDNS org 3322 org and DtDNS com to select one of the four DDNS website address transfer functions Username The name which is set up for DDNS Input a complete website address such as abc abcddns org cn as a user name for abcDDNS The password which is set up for DDNS Input the website address which has been applied from DDNS Examples are abc dyndns org or xyz 3322 org Internet IP Input the actual dynamic IP address issued by the ISP Address Status U Status An indication of the status of the current IP function refreshed by DDNS Apply After the changes are completed click Apply to save the network configuratio
131. s 10 1 2 PPTP Setting It supports the PPTP of Window XP 2000 to create point to point tunnel protocol for single device users to create VPN connection 105 Gigabit Multi Homing VPN Security Router User s Manual Enable PPTP Server PPTP IP Address Range IP Range starts 192 168 1 150 IP Range Ends 192 168 1 179 Unified IP Management New User Account User s Defined Confirm Password IP Address 2 Automatically Assign IP Address E E ll Enabled PPTP Server When this option is selected the point to point tunnel protocol PPTP server can be enabled PPTP IP Address Please enter PPTP IP address range so as to provide the remote users with an Range entrance IP into the local network Enter Range Start Enter the value into the last field Enter Range End Enter the value into the last field All PPTP Status Displays all successfully connected users including username remote IP address and PPTP address 106 Gigabit Multi Homing VPN Security Router User s Manual Connection List o Tunnel s Used lso Tunnel s Available Analy Cancel 10 1 3 VPN Pass Through VPN Pass Through Enabled Disabled Enabled Disabled Enabled Disabled pp Cenes ttem Description A IPSec Pass If this option is enabled the PC is allowed to use VPN IPSec packet to pass in order to Throug
132. s an industrial standard communications protocol It is designed to dynamically capture related system message from the network The system log provides the source and the destination IP addresses during the connection service number and type To apply this feature enter the system log server name or the IP address into the empty system log server field Log Setting Log Setting L Syn Flooding IF Spoofing _ vin Nuke L Ping Of Death Unauthorized Login Attempt LC Deny Policies Ll Allow Policies Authorized Login View System Log Outgoing Log Table Incoming Log Table Clear Log Now Alert Log The device provides the following warning message Click to activate these features Syn Flooding IP Spoofing Win Nuke Ping of Death Unauthorized Login Attempt Syn Flooding Bulky syn packet transmission in a short time causes the overload of the system storage of record in connection information IP Spoofing Through the packet sniffing hackers intercept data transmitted on the network After they access the information the IP address from the sender is changed so that they can access the resource in the source system Win Nuke Servers are attacked or trapped by the Trojan program Ping of Death The system fails because the sent data exceeds the maximum packet that can be handled by the IP protocol Unauthorized Login If intruders into the device are identified the message will be sent to the system log 130
133. s configuration window 11 2 UPnP UPnP Universal Plug and Play is a protocol set by Microsoft If the virtual host supports UPnP system such as Windows XP users could also activate the PC UPnP function to work with the device UPnP Setup Service DNS UDP 53 53 Name ar IFP Address Enabled Service Management Add to list Service Port Select the UPnP service number default list here for example WWW is 80 80 FTP is 21 21 Please refer to the default service number list Host Name or IP Input the Intranet virtual IP address or name that maps with UPnP such as Address 192 168 1 100 Enabled Activate this function Service Port Add or remove service ports from the management list Management 111 Gigabit Multi Homing VPN Security Router User s Manual Add to List Add to active service content Delete Selected Remove selected services ltem Show Table This is a list which displays the current active UPnP functions Apply Click Apply to save the network configuration modification 11 3 Routing In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing Information Protocol Dynamic Routing Gateway Router O Enabled Disabled Static Routing pesti subnet Mask OP III Default Gateway IU HU Hop Count Interface LAN Show Tello C Apay Cancel 11 3 1 Dynamic Routing The abbrevi
134. s the same to most of the VPN devices Aggressive Mode This mode is mostly adopted by remote devices The IP connection is designed to enhance the security control if dynamic IP is used for connection Keep Alive If this option is selected VPN tunnel will keep this VPN connection This is mostly used to connect the remote node of the branch office and headquarter or used for the remote dynamic IP address NAT Traversal This option allowed the VPN connection can penetrate the NAT which in front of the router Dead Peer If this option is selected the connected VPN tunnel will regularly transmit HELLO ACK Detection DPD message packet to detect whether there is connection between the two ends of the VPN tunnel If one end is disconnected the device will disconnect the tunnel automatically and then create new connection Users can define the transmission time for each DPD message packet and the default value is 10 seconds Heart Beat If this option is selected the system periodically sends ICMP to the VPN tunnel remote server host the remote server will receive a packet after packet response If the number of detected more than the value you set and VPN remote server did not respond the Of Gigabit Multi Homing VPN Security Router User s Manual system will determine the VPN tunnel is disconnected If you create a VPN tunnel for the active side the system will automatically rebuild the VPN tunnel again and if you
135. servers that have legal IP addresses such as Web servers mail servers etc 10 Gigabit Multi Homing VPN Security Router User s Manual This chapter is mainly introducing Web based Ul after connecting VPN Router First check up VPN Router IP address by connecting to DOS through the LAN PC under VPN Security Router Go to Start Run enter cmd to commend DOS and enter ipconfig for getting Default Gateway address as the graphic below 192 168 1 1 Make sure Default Gateway is also the default IP address of VPN QoS Router C Documents and Settings XPMB1 gt ipconf ig Windows IP Configuration Ethernet adapter Local Area Connection Connection specific DNS Suffix smb com IP Address Sy n E 192 168 1 168 Subnet Mask SA 255 255 255 0 IP Address O gt fe8B 222 19ff febB6 hb981 9 Default Gateway PP 192 168 1 1 C Documents and Settings PMOL gt When not getting IP address and default gateway by using ipconfig or the received IP address ES Attention circuits or the computer network card is connected nicely is 0 0 0 0 and 169 X X X we recommend that users should check if there is any problem with the Then open webpage browser IE for example and key in 192 168 1 1 in the website column The login window will appear as below 0 PS i 266 Y f 7 e CII JA i se gt i L 2 4442 6 4 ER GE pooo oo 0000000 vi so Y 4 gt gc ese i o o
136. ses to save bandwidth or provide priority to specific applications or services and also to enable other users to share bandwidth as well as to ensure stable and reliable network transmission To maximize the bandwidth efficiency network administrators should take account of the practical requirements of a company a community a building or a caf etc and modify bandwidth management according to the network environment application processes or Services 8 1 Bandwidth Management The Maximum Bandwidth provided by ISP WAN 4 10000 10000 WAN 2 10000 10000 WAN 3 10000 vee WAN 4 10000 10000 he a i mo USB 256 Quality of Service Interface C wani O wana Ol wana Ol wan a D use Service All Traffic TCP amp UDPM 65535 P address V P Je le Jt P Mini Rate Kbitsec Max Rate Kbit sec Share total bandwidth with all IP addresses o Assign bandwidth for each IP address Enabled Bandwidth sharing O Enabled Smart QoS 66 Gigabit Multi Homing VPN Security Router User s Manual Exception IP address Interface wand O wana O wana O wana O USB Direction Do not control upstream bandwidth Do not control downstream bandwidth O Do not control bi direction bandwidth Enabled Show Tabla C Apay Cancel 8 1 1 The Maximum Bandwidth provided by ISP The Maximum Bandwidth provided by ISP WAN 4 10000 10000 WAN 2 10000 10000 WAN 3 10000 10000 WAN
137. ses users want to assign For example if the destination IP address range users want to designate is 140 115 1 1 140 115 1 255 key in 140 115 1 1 140 115 1 255 in Notepad The next destination IP address range should be keyed in the next line Attention Even if only one destination IP address is to be assigned it should follow the same format For example if the destination IP address is 210 66 161 54 it should be keyed in as 210 66 161 54 210 66 161 54 After the document has been saved the extension file name is txt users can import the IP range of self defined strategy Selfdefinedstratepy txt Notepad Sel File Edit Format View Help 148 115 1 1148 115 1 255 148 116 11 11468 116 11 31 218 66 161 5472168 66 161 5 4 Gigabit Multi Homing VPN Security Router User s Manual China Netcom strategy and self defined strategy can coexist However if a destination IP is assigned by both China Netcom strategy and self defined strategy China Netcom strategy will take priority In other words traffic to that destination IP will be transmitted through the WAN or WAN group under China Netcom strategy Session Balance Advanced Function In general session balance is to equally and randomly distribute the session connections of each intranet IP For some special connections for example web banking encrypted connection Https or TCP443 is required to connect from the same WAN IP If one intranet IP visits web bankin
138. sses 108 A O E AERA 111 113 ROUTING lira 112 1TE3 1 Dynamic ROUNO vesical einen iniciadas 112 RSZ SIC ROUN G suse dee CAN CACA SOAR EGS ences tates O coca TOE O 113 T1 4 ONE TO ONE NA Tit iaa liliana aitor asias 115 11 5 DDNS DYNAMIC DOMAIN NAME SERVICE ccccccceccocccocccoccocccoccoccooccoscooccooceosceosceocoosceocsososocesscsooeosoosceescssvses 118 AU MACCLONE aviat iii iicids 120 GHAPTER 12 SYSTEM FOOL sona 121 Gigabit Multi Homing VPN Security Router User s Manual A2 MA A AA A IA 22 14 112 140 201221000 20 75 1051 74 121 12 2 FIRMWARE UPGRADE lt a osos 122 12 3 CONFIGURATION BACKUP souls 122 TZASNMP si A 102700192 004 A2 EET 123 129 SYSTEM RECOVER a as 124 12 6 HIGH AVAILABILITY ui A A AAA AAA AAA AAA AA a 124 COHARTERAS TO id do e a lo a MEE e do ER A do es ee 129 TS ES STE MED AA A EA A Ad di 129 13 2 SYSTEM STATIS TAC id 134 13 3 TRAFFIC STATIS it iod s 135 TAIP PORT STAMNS TIC ls 137 APPENDIX A CONFIGURE THE 3G USB INTERFACE u 0 ccccccescesceccecescesceccscescnscnseecnscneesensensensesenseaes 139 STEP 1 USB 3G CONNECTION SETTING ccccccsssssssssccccccccsscccccccccccccsccscsccccccccscccscccccccccscccccccccccccssccscccesccsccccsccces 140 STEP 2 CHECK IP ADDRESS FOR USB 3G CONNECTION ccccccsssssscccsssssscccccsssccccccsscscccccsssccccccssccsccscssscccsscscccces 143 STEP 3 CHECK 3G INFO FROM SERVICE PROVIDER cccccccssscccccssscsccccccsccccccccsccccccccscccccccccccccccccccccccccscccccssceccsces 14
139. t the default gateway of the static IP address issued by ISP For ADSL users it is usually an ATU R IP address 30 Gigabit Multi Homing VPN Security Router User s Manual DNS Server Input the DNS IP address set by ISP At least one IP group should be input pee PON Internal LAN IP Range Input the available IP range issued by ISP If ISP issued two discontinuous IP address ranges users can input them into Internal LAN IP Range 1 and Internal LAN IP Range 2 respectively Enable Line Dropped The WAN disconnection schedule will be activated by checking this option In Scheduling some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnections users can activate this function to arrange new connections through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for the disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly added Scheduling connections should go throu
140. tation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Line Dropped Period Input the time rule for disconnection of this WAN service the time rule Input the time rule for disconnection of this WAN service disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly added Scheduling connections should connections should go through another WAN to connect with the Internet through another WAN to connect with the Internet Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP Link Backup Interface Select another WAN port as link backup when port binding is configured Users e rr Shared Circuit WAN If your WAN connects to a Switch select Enabled to filter broadcast packets The default
141. terface USE Connection Type 36 3 56 Reconfirm PIN CODE fs USB Connection Status 36 modem is not available APN o Dial Number UserName fs Password fs Dl Use the Following DNS Server Addresses DNSServer Required 0 o o Jo DNS Server Optional o o o a MTU Auto 2 Manual 1500 bytes PIN CODE Entry PIN code when the PIN protection is enabled at your 3G SIM but it is not necessary when the function was disabled Reconfirm PIN CODE fs The SIM card will be locked and displays PUK PIN BS Unlocked Key when entering incorrect PIN code more than 3 Attention es USB Connect Status The status filed will display specific description USB Connection Status 36 modem is not available 3G modem is connected and works normally 3G modem is connected but it requires the PIN code to enable the 3G service 3G modem is connected but there is no SIM card available Please insert the SIM card for 3G service 3G modem is connected but the SIM card is locked Please enter the 141 DNS Server Gigabit Multi Homing VPN Security Router User s Manual PUK code to unlock Oo 3G modem is not available Router is forced to use assigned DNS Server manually which is not from ISP settings Use the Following DNS server Addresses DNSServer Required 0 o jo Je DNSServer Optional 2 p e 1 8 APN Access Point Network most carriers use Internet as d
142. the WAN port Enabled Activate this function Service Add or remove service ports from the list of service ports Management Add to list Add to the active service content Service Port Management The services in the list mentioned above are frequently used services If the service users want to activate is not in the list we recommend that users use Service Port Management to add or remove ports as follows Service Name All Traffic TCP amp UDP 1 65535 DNS UDP 53 53 FTP TCP 21 21 HTTP TCP 80 80 ees HTTP Secondary TCP 8080 8080 HTTPS TCP 443 443 HTTPS Secondary TCP 8443 8443 TFTP UDP 69 69 Port Range IMAP TCP 143 143 to NNTP TCP 119 119 POPS TCP 110 110 A SNMP UDP 161 161 SMTP TCP 25 25 TELNET TCP 23 23 TELNET Secondary TCP 8023 8023 Ul 4 senen Input the name of the service port users want to activate on the list such as E donkey etc Protocol To select whether a service port is TCP or UDP Port Range To activate this function input the range of the service port locations users want to 110 Gigabit Multi Homing VPN Security Router User s Manual Oo o o Add to list Add the service to the service list Delete selected To remove the selected services item Apply Click the Apply button to save the modification Cancel Click the Cancel button to cancel the modification This only works before Apply is clicked Quit thi
143. thus be successfully enabled Users may select which port to be the node for this VPN channel They can be applied ee E Enabled Click to Enable to activate the VPN tunnel This option is set to Enable by default After po erra d Local VPN Group Setting This local gateway authentication type Local Security Gateway Type must be identical with that of the remote type Remote Security Gateway Type Local Security This local gateway authentication type comes with five operation modes which are IP Gateway Type only Authentication by the use of IP only IP Domain Name FQDN Authentication IP Domain name IP E mail Addr USER FQDN Authentication IP Email address Dynamic IP Domain Name FQDN Authentication Dynamic IP address Domain name Dynamic IP E mail Addr USER FQDN Authentication Dynamic IP address Email address name 1 IP only If users decide to use IP only entering the IP address is the only way to gain access to Local Security Gigabit Multi Homing VPN Security Router User s Manual this tunnel The WAN IP address will be automatically filled into this space Users don t need to do further settings Yee e on Y O r 2 IP Domain Name FQDN Authentication If users select IP domain name type please enter the domain name and IP address The WAN IP address will be automatically filled into this space Users don t need to do further settings FQDN refers to the combination
144. tistic Outbound IP Address Enabled Traffic Statistic 192 168 1 100 31 100 By Outbound Port The figure displays the network protocol type destination IP address bytes per second and percentage Gigabit Multi Homing VPN Security Router User s Manual Traffic Statistic Outbound Service Enabled Traffic Statistic TCP http 80 32 56 TCP 1144 17 30 TCP 1863 3 6 UDP 137 2 4 TCP netbios 139 2 By Inbound Port The figure displays the network protocol type destination IP address bytes per second and percentage Traffic Statistic Inbound Service e Enabled Traffic Statistic TCP 1863 37 65 TCP 1144 11 20 TCP htip 80 3 14 By Outbound Session The figure displays the source IP address network protocol type source port destination IP address destination port bytes per second and percentage By Inbound Session The figure displays the source IP address network protocol type source port destination IP address destination port bytes per second and percentage Traffic Statistic Inbound Session Enabled Traffic Statistic 192 168 1 100 TCP 2940 192 168 5 126 1144 9 100 136 Gigabit Multi Homing VPN Security Router User s Manual 13 4 IP Port Statistic The device allows administrators to inquire a specific IP or from a specific port about the addresses that this IP had visited or the users source IP who used this service port This facilitates the
145. tter be capable of receiving feedback stably and speedily Please input the DNS IP of the ISP port www hinet net is acceptable here Do not input an IP address In addition do not input the same web address in this box for two different WANs 44 Gigabit Multi Homing VPN Security Router User s Manual In the load balance mode for Assigned Routing the first WAN port WAN1 will be saved for the traffic of the IP addresses or the application service ports that are not assigned to other WANs WAN2 WANS and WAN4 Therefore in this mode we recommend assigning one of the connections to the first WAN When other WANs WAN2 WANS or WAN4 are broken and connection error remove Remove the Connection has been selected for the connection detection system traffic will be shifted to the first WAN WAN1 In addition if the first WAN WAN1 is broken the traffic will be shifted to other WANSs in turn For example the traffic will be shifted to WANZ2 first if WAN2 is broken too the traffic will be shifted to WAN3 and so on 6 2 3 Protocol Binding The VPN router can set up to four WAN interface the bandwidth and whether can connect to the internet will effect the router load balancing feature for each WAN so the bandwidth setting and line detect is must be correct for each WAN interface In WAN Setting click Edit to enter the WAN interface configure window In Bandwidth Management can adjust the ban
146. usly Metwork Time Set system time using a NTF server O set system time manually Beijing GMT 05 00 Ol Enabled from 0 Saal Cancel 18 Gigabit Multi Homing VPN Security Router User s Manual TimeZone Select your location from the pull down time zone list to show correct local time Daylight Saving If there is Daylight Saving Time in your area input the date range The device will adjust the time for the Daylight Saving period automatically NTP Server If you have your own preferred time server input the server IP address Apply After the changes are completed click Apply to save the configuration Cancel Click Cancel to leave without making any change This action will be effective before Apply to save the configuration Select System Time Manually Input the correct time date and year in the boxes Set system time using a NTF server Set system time manually Hours jo Minutes seconds Month Day Year After the changes are completed click Apply to save the configuration Click Cancel to leave without making any change This action will be effective before Apply to save the configuration 19 Gigabit Multi Homing VPN Security Router User s Manual Chapter 6 Network This Network page contains the basic settings For most users completing this general setting is enough for connecting with the Internet However some users need
147. uter username and password are both admin For security reasons we strongly recommend that you must change your password after first login Please keep the password safe or you might not login to VPN Router You can press Reset button for more than 10 sec VPN Router will return back to default 47 Gigabit Multi Homing VPN Security Router User s Manual Password Setup admin gt fF Amay Gemcel CA Password Input the original password The default is admin New User Name Input the new user name e x Planet New Password Input the new password Confirm New Password Input the new password again for verification Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change This action will be effective before Apply to save the configuration If users have already changed username and password they should login with current username and password and input admin as new username and password if they have to return back to default 5 2 2 Time VPN Router can adjust time setting Users can know the exact time of event occurrences that are recorded in the System Log and the time of closing or opening access for Internet resources You can either select the embedded NTP Server synchronization function or set up a time reference Set system time using a NTP server VPN Router has embedded NTP server which will update the time spontaneo
148. uthentication mode users must set the parameter of this exchange password with that of the remote 95 Gigabit Multi Homing VPN Security Router User s Manual IPSec Setting IKE with Preshared Key D E Ti k lt C m on 4 MD5 seconds I pl aj Group 1 s m on 4 MDS seconds Use IKE Protocol Click the shared key generated by IKE to encrypt and authenticate the remote user If PFS Perfect Forward Secrecy is enabled the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication When PFS is enabled hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time Perfect Forward When users check the PFS option don t forget to activate the PFS function of the VPN Secrecy device and the VPN Client as well Phase 1 Phase 2 This option allows users to select Diffie Hellman groups Group 1 Group 2 Group 5 DH Group Phase 1 Phase 2 This option allows users to set this VPN tunnel to use any encryption mode Note that Encryption this parameter must be identical to that of the remote encryption parameter DES 64 bit encryption mode 3DES 128 bit encryption mode AES the standard of using security code to encrypt information It supports 128 bit 192 bit and 256 bit encryption keys Phase 1 Phase 2 This authentication option allows users to set this VPN tunn
149. utton to add the new service No Log There will be no log record Create Log when matched Event will be recorded in the log Select the source port whether users are permitted or not for example LAN WAN1 80 Gigabit Multi Homing VPN Security Router User s Manual WAN2Z or Any Select from the drop down menu Select the source IP range for example Any Single Range or preset IP group name If Single or Range is selected please enter a single IP address or an IP address within a session Select the destination IP range such as Any Single Range or preset IP group name If Single or Range is selected please enter a single IP address or an IP address within a session Select Always to apply the rule on a round the clock basis Select from and the operation will run according to the defined time Apply this rule Select Always to apply the rule on a round the clock basis If From is selected the activation time is introduced as below This control rule has time limitation The setting method is in 24 hour format such as 08 00 18 00 8 a m to 6 p m Day Control Everyday means this period of time will be under control everyday If users only certain days of a week should be under control users may select the desired days directly Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change 81 Gigabit Multi Homing
150. vely deal with external attack The threshold value should be adjusted from high to low LAN Threshold When all packet values from internal attack or from single internal IP attack reach the maximum amount the default is 15000 packets Sec and 2000 packets Sec respectively if these conditions above occurs the IP will be blocked for 5 minutes the default is 5 minutes Users can adjust the threshold value and the blocking duration to effectively deal with external attack The threshold value should be adjusted from high to low Exempted Source IP Input the exempted source IP Exempted Dest IP Input the exempted Destination IP addresses Cancel Click Cancel to leave without making any change Firewall DoS Log System Log Current Time Fri Mar 4 17 36 25 2011 Firewall DoS Log Show the Firewall Log Show Blocked IP Summary rPAddress Timelsecj Show the blocked IP list and the remained blocked time 78 Gigabit Multi Homing VPN Security Router User s Manual 9 2 Access Rule Users may turn on off the setting to permit or forbid any packet to access internet Users may select to set different network access rules from internal to external or from external to internal Users may set different packets for IP address and communication port numbers to filter Internet access rules Network access rule follows IP address destination IP address and IP communications protocol status to ma
151. w service item content to the list Delete selected item Delete the service item content from the list Apply Click Apply to save the modified parameters Cancel gt gt Click Cancel to cancel all the changes made to the parameters LBS Gigabit Multi Homing VPN Security Router User s Manual Accept Allowed Domains In some companies or schools employees and students are only allowed to access some specific websites This is the purpose of the function Block Forbidden Domains Accept Allowed Domains Allowed Domains Enabled Allowed Domains Enabled Activate the function The default setting is Disabled Input the allowed domain name etc www google com Add to list Add the rule to list Delete selected item Users can select one or more rules and click to delete Apply Activate the function The default setting is Disabled Content Filter Scheduling Select Always to apply the rule on a round the clock basis Select from and the operation will run according to the defined time For example if the control time runs from 8 a m to 6 p m Monday to Friday users may control the operation according to the following illustrated example Scheduling Apply this rule Always 00 JOC ud J0 24 Hour Format Everyday Wed Thu Fri Sal 84 Gigabit Multi Homing VPN Security Router User s Manual Select Always to apply the rule on a round the cl

Download Pdf Manuals

image

Related Search

Related Contents

manual de instalación Revestimiento del Stûv 30  PEG Balloon Replacement Tube PEG  Philips Cable management mouse SPM5900B  Velleman VTSSC70  UM Series Tiller Manual  istruzioni d'uso per lavatrici con microprocessore im6 directions for  GM32 Analizador de gas "in situ" Versión cross-duct  HD Cube Network Camera User`s Manual  Samsung RSG5 User's Manual  

Copyright © All rights reserved.
Failed to retrieve file