Draytek VigorPro 5510 User's Guide

Add to my manuals
316 Pages

advertisement

Draytek VigorPro 5510 User's Guide | Manualzz
VigorPro 5510 Series
Unified Threat Management
User’s Guide
Version: 2.1
Firmware: V3.3.4
Date: 08/06/2010
Copyright 2010 All rights reserved.
This publication contains information that is protected by copyright. No part may be reproduced, transmitted,
transcribed, stored in a retrieval system, or translated into any language without written permission from the copyright
holders. The scope of delivery and other details are subject to change without prior notice.
Microsoft is a registered trademark of Microsoft Corp.
Windows, Windows 95, 98, Me, NT, 2000, XP, Vista and Explorer are trademarks of Microsoft Corp.
Apple and Mac OS are registered trademarks of Apple Inc.
Other products may be trademarks or registered trademarks of their respective manufacturers.
ii
VigorPro5510 Series User’s Guide
VigorPro5510 Series User’s Guide
iii
Safety Instructions and Approval
Safety
Instructions
Warranty
z
z
Read the installation guide thoroughly before you set up the router.
The router is a complicated electronic unit that may be repaired only be
authorized and qualified personnel. Do not try to open or repair the router
yourself.
z
Do not place the router in a damp or humid place, e.g. a bathroom.
z
The router should be used in a sheltered area, within a temperature range of +5 to
+40 Celsius.
z
Do not expose the router to direct sunlight or other heat sources. The housing and
electronic components may be damaged by direct sunlight or heat sources.
z
Do not deploy the cable for LAN connection outdoor to prevent electronic shock
hazards.
z
Keep the package out of reach of children.
z
When you want to dispose of the router, please follow local regulations on
conservation of the environment.
We warrant to the original end user (purchaser) that the router will be free from any
defects in workmanship or materials for a period of two (2) years from the date of
purchase from the dealer. Please keep your purchase receipt in a safe place as it serves
as proof of date of purchase. During the warranty period, and upon proof of purchase,
should the product have indications of failure due to faulty workmanship and/or
materials, we will, at our discretion, repair or replace the defective products or
components, without charge for either parts or labor, to whatever extent we deem
necessary tore-store the product to proper operating condition. Any replacement will
consist of a new or re-manufactured functionally equivalent product of equal value, and
will be offered solely at our discretion. This warranty will not apply if the product is
modified, misused, tampered with, damaged by an act of God, or subjected to abnormal
working conditions. The warranty does not cover the bundled or licensed software of
other vendors. Defects which do not significantly affect the usability of the product will
not be covered by the warranty. We reserve the right to revise the manual and online
documentation and to make changes from time to time in the contents hereof without
obligation to notify any person of such revision or changes.
Be a Registered
Owner
Web registration is preferred. You can register your Vigor router via
http://www.draytek.com.
Firmware & Tools
Updates
Please consult the DrayTek web site for more information on newest firmware, tools
and documents. For more detailed information, please refer to http://www.draytek.com
Parts of the anti-virus features are powered by Kaspersky Lab ZAO. For more detailed
information, please refer to http://www.kaspersky.com.
iv
VigorPro5510 Series User’s Guide
European Community Declarations
Manufacturer:
Address:
Product:
DrayTek Corp.
No. 26, Fu Shing Road, HuKou Township, HsinChu Industrial Park, Hsin-Chu, Taiwan 303
VigorPro 5510
DrayTek Corp. declares that VigorPro 5510 Series is in compliance with the following essential requirements and
other relevant provisions of R&TTE Directive 1999/5/EEC.
The product conforms to the requirements of Electro-Magnetic Compatibility (EMC) Directive 2004/108/EC by
complying with the requirements set forth in EN55022/Class A and EN55024/Class A.
The product conforms to the requirements of Low Voltage (LVD) Directive 2006/95/EC by complying with the
requirements set forth in EN60950-1.
Regulatory Information
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio communications. However,
there is no guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the equipment off and
on, the user is encouraged to try to correct the interference by one of the following measures:
z
Reorient or relocate the receiving antenna.
z
Increase the separation between the equipment and receiver.
z
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
z
Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device may accept any interference received, including interference that may cause undesired operation.
Taiwanese BSMI (Bureau of Standards, Metrology and Inspection) A Warning:
Warning: This is a Class A product. In a domestic environment this product may cause radio interference in which
case the user may be required to take adequate measures.
Please visit http://www.draytek.com/user/AboutRegulatory.php.
This product is designed for the ISDN and 2.4GHz WLAN network throughout the EC region and Switzerland
with restrictions in France. Please see the user manual for the applicable networks on your product.
VigorPro5510 Series User’s Guide
v
Table of Contents
1
Preface ...............................................................................................................1
1.1 Web Configuration Buttons Explanation ................................................................................. 1
1.2 LED Indicators and Connectors .............................................................................................. 2
1.2.1 For VigorPro 5510 ............................................................................................................ 2
1.2.2 For VigorPro 5510Gi......................................................................................................... 4
1.3 Hardware Installation .............................................................................................................. 6
1.4 Printer Installation ................................................................................................................... 7
2
Configuring Basic Settings ............................................................................13
2.1 Changing Password .............................................................................................................. 13
2.2 Quick Start Wizard ................................................................................................................ 15
2.2.1 PPPoE ............................................................................................................................ 16
2.2.2 PPTP............................................................................................................................... 18
2.2.3 Static IP........................................................................................................................... 19
2.2.4 DHCP.............................................................................................................................. 20
2.3 Service Activation Wizard...................................................................................................... 21
2.4 Online Status......................................................................................................................... 25
2.5 Saving Configuration............................................................................................................. 27
3
Advanced Web Configuration..................................................................................29
3.1 WAN ...................................................................................................................................... 29
3.1.1 Basics of Internet Protocol (IP) Network......................................................................... 29
3.1.2 Network Connection by 3G USB Modem ....................................................................... 30
3.1.3 General Setup................................................................................................................. 30
3.1.4 Internet Access ............................................................................................................... 33
3.1.5 Load-Balance Policy ....................................................................................................... 42
3.2 LAN ....................................................................................................................................... 45
3.2.1 Basics of LAN ................................................................................................................. 45
3.2.2 General Setup................................................................................................................. 47
3.2.3 Static Route .................................................................................................................... 50
3.2.4 VLAN............................................................................................................................... 52
3.2.5 Bind IP to MAC ............................................................................................................... 53
3.3 NAT ....................................................................................................................................... 55
3.3.1 Port Redirection .............................................................................................................. 55
3.3.2 DMZ Host........................................................................................................................ 59
3.3.3 Open Ports...................................................................................................................... 61
3.3.4 Address Mapping............................................................................................................ 62
3.4 Firewall .................................................................................................................................. 64
vi
VigorPro5510 Series User’s Guide
3.4.1 Basics for Firewall........................................................................................................... 64
3.4.2 General Setup................................................................................................................. 66
3.4.3 Filter Setup ..................................................................................................................... 71
3.4.4 DoS Defense .................................................................................................................. 78
3.5 Objects Settings .................................................................................................................... 81
3.5.1 IP Object ......................................................................................................................... 82
3.5.2 IP Group ......................................................................................................................... 84
3.5.3 Service Type Object ....................................................................................................... 85
3.5.4 Service Type Group........................................................................................................ 86
3.5.5 Keyword Object .............................................................................................................. 87
3.5.6 Keyword Group............................................................................................................... 88
3.5.7 File Extension Object...................................................................................................... 89
3.5.8 IM Object ........................................................................................................................ 91
3.5.9 P2P Object...................................................................................................................... 93
3.5.10 Misc Object ................................................................................................................... 94
3.6 CSM ...................................................................................................................................... 95
3.6.1 APP Enforcement Profile ................................................................................................ 97
3.6.2 URL Content Filter Profile............................................................................................... 97
3.6.3 Web Content Filter Profile............................................................................................. 101
3.7 Defense Configuration ........................................................................................................ 105
3.7.1 Anti-Intrusion................................................................................................................. 105
3.7.2 Anti-Virus ...................................................................................................................... 109
3.7.3 Anti-Spam ..................................................................................................................... 116
3.7.4 Activation for Anti-Intrusion/Anti-Virus/Anti-Spam/Web-Filter Service ......................... 120
3.7.5 AI/AV Auto Block .......................................................................................................... 122
3.7.6 Signature Upgrade........................................................................................................ 124
3.7.7 Status............................................................................................................................ 127
3.8 Bandwidth Management ..................................................................................................... 128
3.8.1 Sessions Limit............................................................................................................... 128
3.8.2 Bandwidth Limit ............................................................................................................ 129
3.8.3 Quality of Service.......................................................................................................... 131
3.9 Applications ......................................................................................................................... 138
3.9.1 Dynamic DNS ............................................................................................................... 138
3.9.2 Schedule ....................................................................................................................... 140
3.9.3 RADIUS/LDAP.............................................................................................................. 142
3.9.4 UPnP............................................................................................................................. 144
3.9.5 IGMP............................................................................................................................. 146
3.9.6 Wake On LAN............................................................................................................... 146
3.10 VPN and Remote Access.................................................................................................. 148
3.10.1 Remote Access Control .............................................................................................. 148
3.10.2 PPP General Setup .................................................................................................... 149
3.10.3 IPSec General Setup .................................................................................................. 150
3.10.4 IPSec Peer Identity ..................................................................................................... 151
3.10.5 Remote Dial-in User ................................................................................................... 153
3.10.6 LAN to LAN................................................................................................................. 158
3.10.7 VPN TRUNK Management......................................................................................... 167
3.10.8 Connection Management ........................................................................................... 178
3.11 Certificate Management .................................................................................................... 179
3.11.1 Local Certificate .......................................................................................................... 179
3.11.2 Trusted CA Certificate ................................................................................................ 183
3.11.3 Certificate Backup....................................................................................................... 184
3.12 ISDN.................................................................................................................................. 185
VigorPro5510 Series User’s Guide
vii
3.12.1 Basic Concept............................................................................................................. 185
3.12.2 General Setup............................................................................................................. 185
3.12.3 Dial to a Single ISP/Dial to Dual ISPs ........................................................................ 185
3.12.4 Virtual TA .................................................................................................................... 189
3.12.5 Call Control ................................................................................................................. 192
3.13 Wireless LAN .................................................................................................................... 194
3.13.1 Basic Concepts........................................................................................................... 194
3.13.2 General Setup............................................................................................................. 197
3.13.3 Security ....................................................................................................................... 199
3.13.4 Access Control............................................................................................................ 201
3.13.5 WDS............................................................................................................................ 202
3.13.6 AP Discovery .............................................................................................................. 206
3.13.7 Station List .................................................................................................................. 207
3.13.8 Station Rate Control ................................................................................................... 208
3.14 VLAN ................................................................................................................................. 208
3.14.1 Wired VLAN ................................................................................................................ 209
3.14.2 Wireless VLAN............................................................................................................ 210
3.14.3 VLAN Cross Setup...................................................................................................... 213
3.14.4 Wireless Rate Control................................................................................................. 215
3.15 SSL VPN ........................................................................................................................... 216
3.15.1 General Setup............................................................................................................. 216
3.15.2 SSL Web Proxy .......................................................................................................... 217
3.15.3 SSL Application .......................................................................................................... 218
3.15.4 User Account .............................................................................................................. 220
3.15.5 Online User Status...................................................................................................... 222
3.16 System Maintenance......................................................................................................... 223
3.16.1 System Status............................................................................................................. 223
3.16.2 TR-069 Setting............................................................................................................ 224
3.16.3 Administrator Password.............................................................................................. 226
3.16.4 Configuration Backup ................................................................................................. 227
3.16.5 Syslog/Mail Alert ......................................................................................................... 228
3.16.6 Time and Date ............................................................................................................ 231
3.16.7 Management............................................................................................................... 232
3.16.8 Reboot System ........................................................................................................... 233
3.16.9 Firmware Upgrade ...................................................................................................... 234
3.17 Diagnostics........................................................................................................................ 235
3.17.1 Dial-out Trigger ........................................................................................................... 235
3.17.2 Routing Table ............................................................................................................. 236
3.17.3 ARP Cache Table ....................................................................................................... 236
3.17.4 DHCP Table................................................................................................................ 237
3.17.5 NAT Sessions Table ................................................................................................... 237
3.17.6 Wireless VLAN Online Station Table.......................................................................... 238
3.17.7 LAN Security Monitor.................................................................................................. 238
3.17.8 Traffic Graph............................................................................................................... 240
3.17.9 Ping Diagnosis............................................................................................................ 241
3.17.10 Trace Route .............................................................................................................. 242
3.17.11 AV/AI Top 10 ............................................................................................................ 243
3.17.12 Web Firewall Syslog ................................................................................................. 244
4
Registration for the Router ...........................................................................245
4.1 Creating and Activating an Account from MyVigor Website................................................ 245
viii
VigorPro5510 Series User’s Guide
4.2 Creating and Activating an Account from Router Web Configurator................................... 249
4.3 Registering Your Vigor Router ............................................................................................ 254
4.4 Activating Anti-Virus/Anti-Intrusion/Anti-Spam/WCF Service .............................................. 257
4.4.1 For Anti-Virus and Anti-Intrusion Service ..................................................................... 257
4.4.2 For Anti-Spam Service.................................................................................................. 262
4.4.3 For WCF (Web Content Filter) Service......................................................................... 266
4.5 Backup and Upgrade Signature for Anti-Intrusion/Anti-Virus .................................................. 270
4.6 Enabling Anti-Virus/Anti-Intrusion/Anti-Spam/WCF............................................................. 271
5
Application and Examples ............................................................................273
5.1 Create a LAN-to-LAN Connection Between Remote Office and Headquarter ................... 273
5.2 Create a Remote Dial-in User Connection Between the Teleworker and Headquarter...... 280
5.3 QoS Setting Example.......................................................................................................... 284
5.4 LAN – Created by Using NAT ............................................................................................. 287
5.5 Upgrade Firmware for Your Router ..................................................................................... 289
5.6 Request a certificate from a CA server on Windows CA Server ......................................... 292
5.7 Request a CA Certificate and Set as Trusted on Windows CA Server ............................... 297
6
Trouble Shooting ...........................................................................................299
6.1 Checking If the Hardware Status Is OK or Not.................................................................... 299
6.2 Checking If the Network Connection Settings on Your Computer Is OK or Not ................. 299
6.3 Pinging the Router from Your Computer ............................................................................. 302
6.4 Checking If the ISP Settings are OK or Not ........................................................................ 303
6.5 Backing to Factory Default Setting If Necessary ................................................................ 305
6.6 Contacting Your Dealer ....................................................................................................... 306
VigorPro5510 Series User’s Guide
ix
1
Preface
VigorPro 5510 is a UTM router with dual-WAN interface. It provides policy-based
load-balance, fail-over and BoD (Bandwidth on Demand), also it integrates IP layer QoS,
NAT session/bandwidth management to help users control works well with large bandwidth.
By adopting hardware-based VPN platform, hardware encryption of AES/DES/3DS and
hardware key hash of SHA-1/MD5, the router increases the performance of VPN greatly,
and offers several protocols (such as IPSec/PPTP/L2TP) with up to 200 VPN tunnels.
The object-originated design used in SPI (Stateful Packet Inspection) firewall allows users to
set firewall policy with ease. CSM (Content Security Management) provides users control
and management in IM (Instant Messenger), P2P (Peer to Peer), Web Content Filter and
URL Content Filter more efficiency than before. By the way, DoS/DDoS prevention and
URL/Web content filter strengthen the security outside and control inside.
1.1 Web Configuration Buttons Explanation
Several main buttons appeared on the web pages are defined as the following:
Save and apply current settings.
Cancel current settings and recover to the previous saved settings.
Clear all the selections and parameters settings, including selection from
drop-down list. All the values must be reset with factory default settings.
Add new settings for specified item.
Edit the settings for the selected item.
Delete the selected item with the corresponding settings.
Note: For the other buttons shown on the web pages, please refer to Chapter 3 for
detailed explanation.
VigorPro5510 Series User’s Guide
1
1.2 LED Indicators and Connectors
Before you use the Vigor router, please get acquainted with the LED indicators and
connectors first.
1.2.1 For VigorPro 5510
LED
Status
Explanation
ACT (Activity)
Blinking
Off
On
(Yellow)
On
(Yellow)
On
On
Blinking
On
On
The router is powered on and running normally.
The router is powered off.
The anti-intrusion function is enabled.
IDP (Intrusion Detection and
Prevention)
Virus
DMZ
USB
Monitor
CSM
The anti-virus function is enabled.
DMZ Host is specified in certain site.
A USB device is connected and active.
The data is transmitting.
LAN traffic monitor is active.
The profile(s) for IM/P2P, Web Content Filter,
and/or URL Content Filter application has been
activated. (It is enabled from Firewall >> General
Setup).
No IM/P2P, Web Content Filter, and/or URL
Content Filter application has been activated.
Off
LED on Connector
10
(left LED)
WAN
100
(right LED)
LAN/Monitor
LAN
100
(left LED)
1000
(right LED)
On
Off
Blinking
On
Off
Blinking
On
Off
Blinking
On
Off
Blinking
The port is connected with 10Mbps.
The port is disconnected.
The data is transmitting.
The port is connected with 100Mbps.
The port is disconnected.
The data is transmitting.
The port is connected with 100Mbps.
The port is disconnected.
The data is transmitting.
The port is connected with 1000Mbps.
The port is disconnected.
The data is transmitting.
Interface
Description
RST
(Factory Reset)
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and keep for
more than 5 seconds. When you see the ACT LED begins to blink rapidly than
usual, release the button. Then the router will restart with the factory default
configuration.
2
VigorPro5510 Series User’s Guide
WAN(1/2)
LAN/Monitor
LAN (1-4)
USB
Connecter for remote networked devices.
Connecter for local networked devices.
Connecter for local networked devices.
Connecter for a USB device.
Connecter for a power cord with 100-240VAC (inlet).
Power Switch. “1” is ON; “0” is OFF.
VigorPro5510 Series User’s Guide
3
1.2.2 For VigorPro 5510Gi
LED
Status
Explanation
ACT (Activity)
Blinking
Off
On
(Yellow)
On
(Yellow)
On
On
Blinking
On
Blinking
Off
On
On
The router is powered on and running normally.
The router is powered off.
The anti-intrusion function is enabled.
IDP (Intrusion Detection and
Prevention)
Virus
DMZ
USB
WLAN
Monitor
CSM
The anti-virus function is enabled.
DMZ Host is specified in certain site.
A USB device is connected and active.
The data is transmitting.
Wireless access point is ready.
Ethernet packets are transmitting over wireless LAN.
The WLAN function is inactive.
LAN traffic monitor is active.
The profile(s) for IM/P2P, Web Content Filter,
and/or URL Content Filter application has been
activated. (It is enabled from Firewall >> General
Setup).
No IM/P2P, Web Content Filter, and/or URL
Content Filter application has been activated.
The ISDN service function is active.
A successful connection on the ISDN BRI B1/B2
channel.
Off
On
Blinking
ISDN
LED on Connector
10
(left LED)
WAN
100
(right LED)
LAN/Monitor
LAN
100
(left LED)
1000
(right LED)
On
Off
Blinking
On
Off
Blinking
On
Off
Blinking
On
Off
Blinking
The port is connected with 10Mbps.
The port is disconnected.
The data is transmitting.
The port is connected with 100Mbps.
The port is disconnected.
The data is transmitting.
The port is connected with 100Mbps.
The port is disconnected.
The data is transmitting.
The port is connected with 1000Mbps.
The port is disconnected.
The data is transmitting.
Interface
Description
RST
(Factory Reset)
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and keep for
more than 5 seconds. When you see the ACT LED begins to blink rapidly than
usual, release the button. Then the router will restart with the factory default
4
VigorPro5510 Series User’s Guide
ISDN
WAN(1/2)
LAN/Monitor
LAN (1-4)
USB
configuration.
Connecter for ISDN line.
Connecter for remote networked devices.
Connecter for local networked devices.
Connecter for local networked devices.
Connecter for a USB device.
Connecter for a power cord with 100-240VAC (inlet).
Power Switch. “1” is ON; “0” is OFF.
VigorPro5510 Series User’s Guide
5
1.3 Hardware Installation
Before starting to configure the router, you have to connect your devices correctly.
1.
Connect a cable Modem/DSL Modem/Media Converter (depends on your requirement)
to any WAN port of router with Ethernet cable (RJ-45). The WAN1/WAN2 LED (Left
or Right) will light up according to the speed (100 or 10) of the device that it
connected.
2.
Connect one end of an Ethernet cable (RJ-45) to one of the LAN ports of the router and
the other end of the cable (RJ-45) into the Ethernet port on your computer. The LAN
LED (Left or Right) will light up according to the speed (100 or 10) of the device that it
connected.
3.
Connect one end of the power adapter to the router’s power port on the rear panel, and
the other side into a wall outlet.
4.
Power on the device by pressing down the power switch on the rear panel.
5.
The system starts to initiate. After completing the system test, the ACT LED will light
up and start blinking.
(For the detailed information of LED status, please refer to section 1.2.)
6
VigorPro5510 Series User’s Guide
1.4 Printer Installation
You can install a printer onto the router for sharing printing. All the PCs connected this
router can print documents via the router. The example provided here is made based on
Windows XP/2000. For Windows 98/SE, please visit www.draytek.com.
Before using it, please follow the steps below to configure settings for connected computers
(or wireless clients).
1.
Connect the printer with the router through USB/parallel port.
2.
Open Start->Settings-> Printer and Faxes.
VigorPro5510 Series User’s Guide
7
3.
Open File->Add a New Computer. A welcome dialog will appear. Please click Next.
4.
Click Local printer attached to this computer and click Next.
5.
In this dialog, choose Create a new port Type of port and use the drop down list to
select Standard TCP/IP Port. Click Next.
8
VigorPro5510 Series User’s Guide
6.
In the following dialog, type 192.168.1.1 (router’s LAN IP) in the field of Printer
Name or IP Address and type IP_192.168.1.1 as the port name. Then, click Next.
7.
Click Standard and choose Generic Network Card.
8.
Then, in the following dialog, click Finish.
VigorPro5510 Series User’s Guide
9
9.
Now, your system will ask you to choose right name of the printer that you installed
onto the router. Such step can make correct driver loaded onto your PC. When you
finish the selection, click Next.
10. For the final stage, you need to go back to Control Panel-> Printers and edit the
property of the new printer you have added.
11. Select "LPR" on Protocol, type p1 (number 1) as Queue Name. Then click OK. Next
please refer to the red rectangle for choosing the correct protocol and UPR name.
The printer can be used for printing now. Most of the printers with different manufacturers
are compatible with vigor router.
10
VigorPro5510 Series User’s Guide
Note 1: Some printers with the fax/scanning or other additional functions are not supported. If you do
not know whether your printer is supported or not, please visit www.draytek.com to find out the
printer list. Open Support >FAQ; find out the link of Printer Server and click it; then click the
What types of printers are compatible with Vigor router? link.
Note 2: Vigor router supports printing request from computers via LAN ports but not WAN
port.
VigorPro5510 Series User’s Guide
11
This page is left blank.
12
VigorPro5510 Series User’s Guide
2
Configuring Basic Settings
For use the router properly, it is necessary for you to change the password of web
configuration for security and adjust primary basic settings.
This chapter explains how to setup a password for an administrator and how to adjust basic
settings for accessing Internet successfully. Be aware that only the administrator can change
the router configuration.
2.1 Changing Password
To change the password for this device, you have to access into the web browse with default
password first.
1.
Make sure your computer connects to the router correctly.
Notice: You may either simply set up your computer to get IP dynamically from the
router or set up the IP address of the computer to be the same subnet as the default
IP address of Vigor router 192.168.1.1. For the detailed information, please refer
to the later section - Trouble Shooting of this guide.
2.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password. Please type “admin/admin” as the
username/password on the window. Next click OK for next screen.
VigorPro5510 Series User’s Guide
13
3.
Now, the Main Screen will pop up.
Note: The home page will change slightly in accordance with the router you have.
4.
Go to System Maintenance page and choose Administrator Password.
5.
Enter the login password (the default is blank) on the field of Old Password. Type a
new one in the field of New Password and retype it on the field of Confirm New
Password. Then click OK to continue.
6.
Now, the password has been changed. Next time, use the new password to access the
Web Configurator for this router.
14
VigorPro5510 Series User’s Guide
2.2 Quick Start Wizard
If your router can be under an environment with high speed NAT, the configuration provide
here can help you to deploy and use the router quickly. The first screen of Quick Start
Wizard is entering login password. After typing the password, please click Next.
On the next page as shown below, please select the WAN interface that you use. Choose
Auto negotiation as the physical type for your router. Then click Next for next step.
On the next page as shown below, please select the appropriate Internet access type
according to the information from your ISP. For example, you should select PPPoE mode if
the ISP provides you PPPoE interface. Then click Next for next step.
VigorPro5510 Series User’s Guide
15
In the Quick Start Wizard, you can configure the router to access the Internet with different
protocol/modes such as PPPoE, PPTP, Static IP or DHCP. The router supports the DSL
WAN interface for Internet access.
2.2.1 PPPoE
PPPoE stands for Point-to-Point Protocol over Ethernet. It relies on two widely accepted
standards: PPP and Ethernet. It connects users through an Ethernet to the Internet with a
common broadband medium, such as a single DSL line, wireless device or cable modem. All
the users over the Ethernet can share a common connection.
PPPoE is used for most of DSL modem users. All local users can share one PPPoE
connection for accessing the Internet. Your service provider will provide you information
about user name, password, and authentication mode.
If your ISP provides you the PPPoE connection, please select PPPoE for this router. The
following page will be shown.
User Name
Assign a specific valid user name provided by the ISP.
Password
Assign a valid password provided by the ISP.
Confirm Password
Retype the password for confirmation.
Click Next for viewing summary of such connection.
16
VigorPro5510 Series User’s Guide
Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
VigorPro5510 Series User’s Guide
17
2.2.2 PPTP
Click PPTP as the protocol. Type in all the information that your ISP provides for this
protocol.
Click Next for viewing summary of such connection.
Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
18
VigorPro5510 Series User’s Guide
2.2.3 Static IP
Click Static IP as the protocol. Type in all the information that your ISP provides for this
protocol.
After finishing the settings in this page, click Next to see the following page.
Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
VigorPro5510 Series User’s Guide
19
2.2.4 DHCP
Click DHCP as the protocol. Type in all the information that your ISP provides for this
protocol.
After finishing the settings in this page, click Next to see the following page.
Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
20
VigorPro5510 Series User’s Guide
2.3 Service Activation Wizard
1. Open Service Activation Wizard.
2.
The screen of Service Activation Wizard will be shown as follows. Choose the one
you need and click Next. In this case, we choose to activate free trail edition.
Free trial edition: if it is the first time that you register the service, please use the
option.
Formal edition with license key: you can extend the license valid time manually.
VigorPro5510 Series User’s Guide
21
3.
In the following page, you can activate the AV/AI, AS and/or Web content filter
service at the same time or individually. When you finish the selection, please click
Next.
4.
Setting confirmation page will be displayed as follows, please click Next.
5.
Wait for a moment till the following page appears.
When such page appears, you can enable or disable these services for your necessity.
Then, click Finish.
22
VigorPro5510 Series User’s Guide
6.
Now, the web page will display the service(s) with valid time that you have activated
according to your selection(s).
7.
Open Defense configuration >>Activation to check the services status.
VigorPro5510 Series User’s Guide
23
If you need to extend the license valid time, you can also use the Service Activation
Wizard again to reach your goal by clicking the radio button of Formal edition
with license key and clicking Next.
24
VigorPro5510 Series User’s Guide
2.4 Online Status
The online status shows the system status, WAN status, ADSL Information and other status
related to this router within one page. If you select PPPoE/PPTP as the protocol, you will
find out a link of Dial PPPoE/PPPoA or Drop PPPoE/PPPoA in the Online Status web
page.
Online status for PPPoE (WAN2)
Online status for PPTP (for WAN2)
Online status for Static IP (for WAN1)
VigorPro5510 Series User’s Guide
25
Online status for DHCP
Detailed explanation is shown below:
Primary DNS
Displays the IP address of the primary DNS.
Secondary DNS
Displays the IP address of the secondary DNS.
LAN Status
IP Address
Displays the IP address of the LAN interface.
TX Packets
Displays the total transmitted packets at the LAN interface.
RX Packets
Displays the total number of received packets at the LAN interface.
WAN1/2 Status
Line
Displays the physical connection (Ethernet) of this interface.
Name
Displays the name set in WAN1/WAN web page.
Mode
Displays the type of WAN connection (e.g., PPPoE).
Up Time
Displays the total uptime of the interface.
IP
Displays the IP address of the WAN interface.
GW IP
Displays the IP address of the default gateway.
TX Packets
Displays the total transmitted packets at the WAN interface.
TX Rate
Displays the speed of transmitted octets at the WAN interface.
RX Packets
Displays the total number of received packets at the WAN
interface.
RX Rate
Displays the speed of received octets at the WAN interface.
Note: The words in green mean that the WAN connection of that interface
(WAN1/WAN2) is ready for accessing Internet; the words in red mean that the WAN
connection of that interface (WAN1/WAN2) is not ready for accessing Internet.
26
VigorPro5510 Series User’s Guide
2.5 Saving Configuration
Each time you click OK on the web page for saving the configuration, you can find
messages showing the system interaction with you.
Ready indicates the system is ready for you to input settings.
Settings Saved means your settings are saved once you click Finish or OK button.
VigorPro5510 Series User’s Guide
27
28
VigorPro5510 Series User’s Guide
3
Advanced Web Configuration
After finished basic configuration of the router, you can access Internet with ease. For the
people who want to adjust more setting for suiting his/her request, please refer to this chapter
for getting detailed information about the advanced configuration of this router. As for other
examples of application, please refer to chapter 4.
3.1 WAN
Quick Start Wizard offers user an easy method to quick setup the connection mode for the
router. Moreover, if you want to adjust more settings for different WAN modes, please go to
WAN group and click the Internet Access link.
3.1.1 Basics of Internet Protocol (IP) Network
IP means Internet Protocol. Every device in an IP-based Network including routers, print
server, and host PCs, needs an IP address to identify its location on the network. To avoid
address conflicts, IP addresses are publicly registered with the Network Information Centre
(NIC). Having a unique IP address is mandatory for those devices participated in the public
network but not in the private TCP/IP local area networks (LANs), such as host PCs under
the management of a router since they do not need to be accessed by the public. Hence, the
NIC has reserved certain addresses that will never be registered publicly. These are known as
private IP addresses, and are listed in the following ranges:
From 10.0.0.0 to 10.255.255.255
From 172.16.0.0 to 172.31.255.255
From 192.168.0.0 to 192.168.255.255
What are Public IP Address and Private IP Address
As the router plays a role to manage and further protect its LAN, it interconnects groups of
host PCs. Each of them has a private IP address assigned by the built-in DHCP server of the
Vigor router. The router itself will also use the default private IP address: 192.168.1.1 to
communicate with the local hosts. Meanwhile, Vigor router will communicate with other
network devices through a public IP address. When the data flow passing through, the
Network Address Translation (NAT) function of the router will dedicate to translate
public/private addresses, and the packets will be delivered to the correct host PC in the local
area network. Thus, all the host PCs can share a common Internet connection.
Get Your Public IP Address from ISP
In ADSL deployment, the PPP (Point to Point)-style authentication and authorization is
required for bridging customer premises equipment (CPE). Point to Point Protocol over
Ethernet (PPPoE) connects a network of hosts via an access device to a remote access
concentrator or aggregation concentrator. This implementation provides users with
significant ease of use. Meanwhile it provides access control, billing, and type of service
according to user requirement.
When a router begins to connect to your ISP, a serial of discovery process will occur to ask
for a connection. Then a session will be created. Your user ID and password is authenticated
via PAP or CHAP with RADIUS authentication system. And your IP address, DNS server,
and other related information will usually be assigned by your ISP.
VigorPro5510 Series User’s Guide
29
3.1.2 Network Connection by 3G USB Modem
For 3G mobile communication through Access Point is popular more and more,
VigorPro5510 adds the function of 3G network connection for such purpose. By connecting
3G USB Modem to the USB port of VigorPro5510, it can support
HSDPA/UMTS/EDGE/GPRS/GSM and the future 3G standard (HSUPA, etc).
VigorPro5510 with 3G USB Modem allows you to receive 3G signals at any place such as
your car or certain location holding outdoor activity and share the bandwidth for using by
more people. Users can use four LAN ports on the router to access Internet. Also, they can
access Internet via SuperG wireless function of VigorPro5510G, and enjoy the powerful
firewall, bandwidth management and VPN features of VigorPro5510 series.
After connecting into the router, 3G USB Modem will be regarded as the second WAN port.
However, the original Ethernet WAN1 still can be used and Load-Balance can be done in the
router. Besides, 3G USB Modem in WAN2 also can be used as backup device. Therefore,
when WAN1 is not available, the router will use 3.5G for supporting automatically. The
supported 3G USB Modem will be listed on Draytek web site. Please visit www.draytek.com
for more detailed information.
Below shows the menu items for WAN.
3.1.3 General Setup
This section will introduce some general settings of Internet and explain the connection
modes for WAN1 and WAN2 in details.
This router supports dual WAN function. It allows users to access Internet and combine the
bandwidth of the dual WAN to speed up the transmission through the network. Each WAN
port can connect to different ISPs, Even if the ISPs use different technology to provide
telecommunication service (such as DSL, Cable modem, etc.). If any connection problem
occurred on one of the ISP connections, all the traffic will be guided and switched to the
normal communication port for proper operation. Please configure WAN1 and WAN2
settings.
This webpage allows you to set general setup for WAN1 and WAN respectively.
Note: In default, WAN1 and WAN2 are enabled.
30
VigorPro5510 Series User’s Guide
Enable
Choose Yes to invoke the settings for this WAN interface.
Choose No to disable the settings for this WAN interface.
Display Name
Type the description for the WAN1/WAN2 interface.
Physical Mode
For WAN1, the physical connection is done and fixed through
Ethernet port; yet the physical connection for WAN2 is done
through an Ethernet port (P1) or USB port. You cannot
change it.
To use 3G network connection through 3G USB Modem,
choose 3G USB Modem as the physical mode in WAN2.
Next, go to WAN>> Internet Access. 3G USB Modem is
available for WAN2. You can choose PPP as the access mode
and click Details Page for further configuration.
Physical Type
VigorPro5510 Series User’s Guide
You can change the physical type for WAN2 or choose Auto
negotiation for determined by the system.
31
Load Balance Mode
If you know the practical bandwidth for your WAN interface,
please choose the setting of According to Line Speed.
Otherwise, please choose Auto Weigh to let the router reach
the best load balance.
Line Speed
If your choose According to Line Speed as the Load
Balance Mode, please type the line speed for downloading
and uploading through WAN1/WAN2. The unit is kbps.
Active Mode
Choose Always On to make the WAN connection
(WAN1/WAN2) being activated always; or choose Active on
demand to make the WAN connection (WAN1/WAN2)
activated if it is necessary.
If you choose Active on demand, the Idle Timeout will be
available for you to set for PPPoE and PPTP access modes in
the Details Page of WAN>>Internet Access. In addition, there
are three selections for you to choose for different purposes.
WAN2 Fail – It means the connection for WAN1 will be
activated when WAN2 is failed.
WAN2 Upload speed exceed XX kbps – It means the
connection for WAN1 will be activated when WAN2 Upload
speed exceed certain value that you set in this box for 15
seconds.
WAN2 Download speed exceed XX kbps– It means the
connection for WAN1 will be activated when WAN2
Download speed exceed certain value that you set in this box
for 15 seconds.
WAN1 Fail – It means the connection for WAN2 will be
activated when WAN1 is failed.
WAN1 Upload speed exceed XX kbps – It means the
connection for WAN2 will be activated when WAN1 Upload
speed exceed certain value that you set in this box for 15
seconds.
WAN1 Download speed exceed XX kbps– It means the
connection for WAN2 will be activated when WAN1
Download speed exceed certain value that you set in this box
for 15 seconds.
32
VigorPro5510 Series User’s Guide
3.1.4 Internet Access
For the router supports dual WAN function, the users can set different WAN settings (for
WAN1/WAN2) for Internet Access. Due to different physical mode for WAN1 and WAN2,
the Access Mode for these two connections also varies slightly.
Index
It shows the WAN modes that this router supports. WAN1 is the
default WAN interface for accessing into the Internet. WAN2 is
the optional WAN interface for accessing into the Internet when
WAN 1 is inactive for some reason.
Display Name
It shows the name of the WAN1/WAN2 that entered in general
setup.
Physical Mode
It shows the physical connection for WAN1 (Ethernet) /WAN2
(Ethernet or 3G USB Modem) according to the real network
connection.
Access Mode
Use the drop down list to choose a proper access mode. The details
page of that mode will be popped up. If not, click Details Page for
VigorPro5510 Series User’s Guide
33
accessing the page to configure the settings.
There are three access modes provided for PPPoE, Static or
Dynamic IP and PPTP.
Details Page
This button will open different web page according to the access
mode that you choose in WAN1 or WAN2.
Details Page for PPPoE
To use PPPoE as the accessing protocol of the internet, please choose Internet Access from
WAN menu. Then, select PPPoE mode for WAN. The following web page will be shown.
PPPoE Client Mode
Click Enable for activating this function. If you click Disable, this
function will be closed and all the settings that you adjusted in this
page will be invalid.
ISP Access Setup
Enter your allocated username, password and authentication
parameters according to the information provided by your ISP. If
you want to connect to Internet all the time, you can check Always
On.
Username – Type in the username provided by ISP in this field.
Password – Type in the password provided by ISP in this field.
Index (1-15) in Schedule Setup - You can type in four sets of time
schedule for your request. All the schedules can be set previously
34
VigorPro5510 Series User’s Guide
in Application >> Schedule web page and you can use the number
that you have set in that web page.
ISDN Dial Backup
Setup
This setting is available for the routers supporting ISDN function
only. Before utilizing the ISDN dial backup feature, you must
create a dial backup profile first. Please click Internet Access
Setup > Dialing to a Single ISP to enter the backup profile.
This setting is available for i model only.
Due to the absence of the ISDN interface in some models, the
ISDN dial backup feature and its associated setup options are not
available to them. Please refer to the previous part for further
information.
None - Disable the backup function.
Packet Trigger -The backup line is not on until a packet from a
local host triggers the router to establish a connection.
WAN Connection
Detection
Such function allows you to verify whether network connection is
alive or not through ARP Detect or Ping Detect.
Mode – Choose ARP Detect or Ping Detect for the system to
execute for WAN detection.
Ping IP – If you choose Ping Detect as detection mode, you have
to type IP address in this field for pinging.
TTL (Time to Live) – Displays value for your reference. TTL
value is set by telnet command.
MTU
Mean maximum transmission unit of one packet. The default value
is 1442.
PPP/MP Setup
PPP Authentication – Select PAP only or PAP or CHAP for
PPP.
Idle Timeout – Set the timeout for breaking down the Internet
after passing through the time without any action. This setting is
active only when the Active on demand option for Active Mode is
selected in WAN>> General Setup page.
IP Address
Assignment Method
(IPCP)
Usually ISP dynamically assigns IP address to you each time you
connect to it and request. In some case, your ISP provides service
to always assign you the same IP address whenever you request.
In this case, you can fill in this IP address in the Fixed IP field.
Please contact your ISP before you want to use this function.
WAN IP Alias - If you have multiple public IP addresses and
would like to utilize them on the WAN interface, please use WAN
IP Alias. You can set up to 8 public IP addresses other than the
current one you are using.
VigorPro5510 Series User’s Guide
35
Fixed IP – Click Yes to use this function and type in a fixed IP
address in the box of Fixed IP Address.
Default MAC Address – You can use Default MAC Address or
specify another MAC address by typing on the boxes of MAC
Address for the router.
Specify a MAC Address – Type the MAC address for the router
manually.
After finishing all the settings here, please click OK to activate them.
Details Page for Static or Dynamic IP
For static IP mode, you usually receive a fixed public IP address or a public subnet, namely
multiple public IP addresses from your DSL or Cable ISP service providers. In most cases, a
Cable service provider will offer a fixed public IP, while a DSL service provider will offer a
public subnet. If you have a public subnet, you could assign an IP address or many IP
address to the WAN interface.
To use Static or Dynamic IP as the accessing protocol of the internet, please choose
Internet Access from WAN menu. Then, select Static or Dynamic IP mode for WAN. The
following web page will be shown.
36
VigorPro5510 Series User’s Guide
Static or Dynamic IP
(DHCP Client)
Click Enable for activating this function. If you click Disable,
this function will be closed and all the settings that you adjusted
in this page will be invalid.
ISDN Dial Backup
Setup
This setting is available for the routers supporting ISDN function
only. Before utilizing the ISDN dial backup feature, you must
create a dial backup profile first. Please click Internet Access
Setup > Dialing to a Single ISP to enter the backup profile.
This setting is available for i model only.
Due to the absence of the ISDN interface in some models, the
ISDN dial backup feature and its associated setup options are not
available to them. Please refer to the previous part for further
information.
None - Disable the backup function.
Packet Trigger -The backup line is not on until a packet from a
local host triggers the router to establish a connection.
Always On - If the broadband connection is no longer available,
the backup line will be activated automatically and always on
until the broadband connection is restored. We recommend you to
enable this feature if you host a web server for your customers’
access.
Keep WAN
VigorPro5510 Series User’s Guide
Normally, this function is designed for Dynamic IP environments
37
Connection
because some ISPs will drop connections if there is no traffic
within certain periods of time. Check Enable PING to keep alive
box to activate this function.
PING to the IP - If you enable the PING function, please specify
the IP address for the system to PING it for keeping alive.
PING Interval - Enter the interval for the system to execute the
PING operation.
WAN Connection
Detection
Such function allows you to verify whether network connection is
alive or not through ARP Detect or Ping Detect.
Mode – Choose ARP Detect or Ping Detect for the system to
execute for WAN detection.
Ping IP – If you choose Ping Detect as detection mode, you have
to type IP address in this field for pinging.
TTL (Time to Live) – Displays value for your reference. TTL
value is set by telnet command.
MTU
Mean maximum transmission unit of one packet. The default value
is 1442.
RIP Protocol
Routing Information Protocol is abbreviated as RIP(RFC1058)
specifying how routers exchange routing tables information. Click
Enable RIP for activating this function.
WAN IP Network
Settings
This group allows you to obtain an IP address automatically and
allows you type in IP address manually.
WAN IP Alias - If you have multiple public IP addresses and
would like to utilize them on the WAN interface, please use WAN
IP Alias. You can set up to 8 public IP addresses other than the
current one you are using. Notice that this setting is available for
WAN1 only.
Obtain an IP address automatically – Click this button to obtain
the IP address automatically if you want to use Dynamic IP mode.
Router Name: Type in the router name provided by ISP.
Domain Name: Type in the domain name that you have assigned.
38
VigorPro5510 Series User’s Guide
Specify an IP address – Click this radio button to specify some
data if you want to use Static IP mode.
IP Address: Type the IP address.
Subnet Mask: Type the subnet mask.
Gateway IP Address: Type the gateway IP address.
Default MAC Address: Click this radio button to use default MAC
address for the router.
Specify a MAC Address: Some Cable service providers specify a
specific MAC address for access authentication. In such cases you
need to click the Specify a MAC Address and enter the MAC
address in the MAC Address field.
DNS Server IP
Address
Type in the primary IP address for the router if you want to use
Static IP mode. If necessary, type in secondary IP address for
necessity in the future.
Details Page for PPTP
To use PPTP as the accessing protocol of the internet, please choose Internet Access from
WAN menu. Then, select PPTP mode for WAN. The following web page will be shown.
PPTP Setup
PPTP Link - Click Enable to enable a PPTP client to establish a
tunnel to a DSL modem on the WAN interface.
PPTP Server - Specify the IP address of the PPTP server.
ISP Access Setup
Username -Type in the username provided by ISP in this field.
Password -Type in the password provided by ISP in this field.
Index (1-15) in Schedule Setup - You can type in four sets of time
schedule for your request. All the schedules can be set previously
in Application >>Schedule web page and you can use the number
that you have set in that web page.
ISDN Dial Backup
Setup
This setting is available for the routers supporting ISDN function
only. Before utilizing the ISDN dial backup feature, you must
create a dial backup profile first. Please click Internet Access
Setup > Dialing to a Single ISP to enter the backup profile.
VigorPro5510 Series User’s Guide
39
This setting is available for i model only.
Due to the absence of the ISDN interface in some models, the
ISDN dial backup feature and its associated setup options are not
available to them. Please refer to the previous part for further
information.
None - Disable the backup function.
Packet Trigger -The backup line is not on until a packet from a
local host triggers the router to establish a connection.
PPP Setup
PPP Authentication - Select PAP only or PAP or CHAP for PPP.
Idle Timeout - Set the timeout for breaking down the Internet after
passing through the time without any action. This setting is active
only when the Active on demand option for Active Mode is
selected in WAN>> General Setup page.
IP Address
Assignment
Method(IPCP)
Fixed IP - Usually ISP dynamically assigns IP address to you each
time you connect to it and request. In some case, your ISP provides
service to always assign you the same IP address whenever you
request. In this case, you can fill in this IP address in the Fixed IP
field. Please contact your ISP before you want to use this function.
Click Yes to use this function and type in a fixed IP address in the
box.
Fixed IP Address -Type a fixed IP address.
WAN IP Alias - If you have multiple public IP addresses and
would like to utilize them on the WAN interface, please use WAN
IP Alias. You can set up to 8 public IP addresses other than the
current one you are using. Notice that this setting is available for
WAN1 only.
40
VigorPro5510 Series User’s Guide
Default MAC Address – Click this radio button to use default
MAC address for the router.
Specify a MAC Address - Some Cable service providers specify a
specific MAC address for access authentication. In such cases you
need to click the Specify a MAC Address and enter the MAC
address in the MAC Address field.
WAN IP Network
Settings
Obtain an IP address automatically – Click this button to obtain
the IP address automatically.
Specify an IP address – Click this radio button to specify some
data.
IP Address – Type the IP address.
Subnet Mask – Type the subnet mask.
Details Page for PPP
To use PPP (for 3G USB Modem) as the accessing protocol of the internet, please choose
Internet Access from WAN menu. Then, select PPP mode for WAN2. The following web
page will be shown.
PPP Client Mode
Click Enable to activate this mode for WAN2.
SIM PIN code
Type PIN code of the SIM card that will be used to access Internet.
Modem Initial String
Such value is used to initialize USB modem. Please use the default
value. If you have any question, please contact to your ISP.
APN Name
APN (Access Point Name) is provided by your ISP for identifying
different access points. Simply click Apply to apply such name.
Finally, you have to click OK to save the setting.
Apply – Activate the function of identification.
Modem Dial String
Such value is used to dial through USB mode. Please use the
default value. If you have any question, please contact to your ISP.
PPP Username
Type the PPP username (optional).
PPP Password
Type the PPP password (optional).
VigorPro5510 Series User’s Guide
41
Index (1-15)
Set the PCs on LAN to work at certain time interval only. You may
choose up to 4 schedules out of the 15 schedules pre-defined in
Applications >> Schedule setup. The default setting of this field is
blank and the function will always work.
3.1.5 Load-Balance Policy
This router supports the function of load balancing. It can assign traffic with protocol type,
IP address for specific host, a subnet of hosts, and port range to be allocated in WAN1 or
WAN2 interface. The user can assign traffic category and force it to go to dedicate network
interface based on the following web page setup. Twenty policies of load-balance are
supported by this router.
Note: Load-Balance Policy is running only when both WAN1 and WAN2 are activated.
Index
Click the number of index to access into the load-balance policy
configuration web page.
Enable
Check this box to enable this policy.
Protocol
Use the drop-down menu to change the protocol for the WAN
interface.
42
VigorPro5510 Series User’s Guide
WAN
Use the drop-down menu to change the WAN interface for such
index.
Src IP Start
Displays the IP address for the start of the source IP.
Src IP End
Displays the IP address for the end of the source IP.
Dest IP Start
Displays the IP address for the start of the destination IP.
Dest IP End
Displays the IP address for the end of the destination IP.
Dest Port Start
Displays the IP address for the start of the destination port.
Dest Port End
Displays the IP address for the end of the destination port.
Move UP/Move Down Use Up or Down link to move the order of the policy.
Click Index 1 to access into the following page for configuring load-balance policy.
Enable
Check this box to enable this policy.
Protocol
Use the drop-down menu to choose a proper protocol for the WAN
interface.
Binding WAN
interface
Choose the WAN interface (WAN1 or WAN2) for binding.
VigorPro5510 Series User’s Guide
43
You can check the box of Auto failover to other WAN to make
a backup WAN connection if the selected WAN interface fails to
connect to Internet.
Src IP Start
Type the source IP start for the specified WAN interface.
Src IP End
Type the source IP end for the specified WAN interface. If this
field is blank, it means that all the source IPs inside the LAN will
be passed through the WAN interface.
Dest IP Start
Type the destination IP start for the specified WAN interface.
Dest IP End
Type the destination IP end for the specified WAN interface. If this
field is blank, it means that all the destination IPs will be passed
through the WAN interface.
Dest Port Start
Type the destination port start for the destination IP.
Dest Port End
Type the destination port end for the destination IP. If this field is
blank, it means that all the destination ports will be passed through
the WAN interface.
44
VigorPro5510 Series User’s Guide
3.2 LAN
Local Area Network (LAN) is a group of subnets regulated and ruled by router. The design
of network structure is related to what type of public IP addresses coming from your ISP.
Note: VLAN menu item is only available for VigorPro 5510.
3.2.1 Basics of LAN
The most generic function of Vigor router is NAT. It creates a private subnet of your own. As
mentioned previously, the router will talk to other public hosts on the Internet by using
public IP address and talking to local hosts by using its private IP address. What NAT does is
to translate the packets from public IP address to private IP address to forward the right
packets to the right host and vice versa. Besides, Vigor router has a built-in DHCP server that
assigns private IP address to each local host. See the following diagram for a briefly
understanding.
In some special case, you may have a public IP subnet from your ISP such as
220.135.240.0/24. This means that you can set up a public subnet or call second subnet that
each host is equipped with a public IP address. As a part of the public subnet, the Vigor
router will serve for IP routing to help hosts in the public subnet to communicate with other
public hosts or servers outside. Therefore, the router should be set as the gateway for public
hosts.
VigorPro5510 Series User’s Guide
45
What is Routing Information Protocol (RIP)
Vigor router will exchange routing information with neighboring routers using the RIP to
accomplish IP routing. This allows users to change the information of the router such as IP
address and the routers will automatically inform for each other.
What is Static Route
When you have several subnets in your LAN, sometimes a more effective and quicker way
for connection is the Static routes function rather than other method. You may simply set
rules to forward data from one specified subnet to another specified subnet without the
presence of RIP.
What are Virtual LANs and Rate Control
You can group local hosts by physical ports and create up to 4 virtual LANs. To manage the
communication between different groups, please set up rules in Virtual LAN (VLAN)
function and the rate of each.
46
VigorPro5510 Series User’s Guide
3.2.2 General Setup
This page provides you the general settings for LAN.
Click LAN to open the LAN settings page and choose General Setup.
1st IP Address
Type in private IP address for connecting to a local private network
(Default: 192.168.1.1).
1st Subnet Mask
Type in an address code that determines the size of the network.
(Default: 255.255.255.0/ 24)
For IP Routing Usage
Click Enable to invoke this function. The default setting is
Disable.
2nd IP Address
Type in secondary IP address for connecting to a subnet.
(Default: 192.168.2.1/ 24)
2nd Subnet Mask
An address code that determines the size of the network.
(Default: 255.255.255.0/ 24)
2nd DHCP Server
You can configure the router to serve as a DHCP server for the 2nd
subnet.
VigorPro5510 Series User’s Guide
47
Start IP Address: Enter a value of the IP address pool for the
DHCP server to start with when issuing IP addresses. If the 2nd IP
address of your router is 220.135.240.1, the starting IP address
must be 220.135.240.2 or greater, but smaller than
220.135.240.254.
IP Pool Counts: Enter the number of IP addresses in the pool. The
maximum is 10. For example, if you type 3 and the 2nd IP address
of your router is 220.135.240.1, the range of IP address by the
DHCP server will be from 220.135.240.2 to 220.135.240.11.
MAC Address: Enter the MAC Address of the host one by one
and click Add to create a list of hosts to be assigned, deleted or
edited IP address from above pool. Set a list of MAC Address for
2nd DHCP server will help router to assign the correct IP address of
the correct subnet to the correct host. So those hosts in 2nd subnet
won’t get an IP address belonging to 1st subnet.
RIP Protocol Control
Disable deactivates the RIP protocol. It will lead to a stoppage of
the exchange of routing information between routers. (Default)
1st Subnet - Select the router to change the RIP information of the
1st subnet with neighboring routers.
2nd Subnet - Select the router to change the RIP information of
the 2nd subnet with neighboring routers.
DHCP Server
Configuration
DHCP stands for Dynamic Host Configuration Protocol. The
router by factory default acts a DHCP server for your network so it
automatically dispatch related IP settings to any local user
configured as a DHCP client. It is highly recommended that you
leave the router enabled as a DHCP server if you do not have a
DHCP server for your network.
If you want to use another DHCP server in the network other than
the Vigor Router’s, you can let Relay Agent help you to redirect the
DHCP request to the specified location.
Enable Server - Let the router assign IP address to every host in
the LAN.
Disable Server – Let you manually assign IP address to every host
in the LAN.
Relay Agent – (1st subnet/2nd subnet) Specify which subnet that
DHCP server is located the relay agent should redirect the DHCP
request to.
Start IP Address - Enter a value of the IP address pool for the
DHCP server to start with when issuing IP addresses. If the 1st IP
address of your router is 192.168.1.1, the starting IP address must
be 192.168.1.2 or greater, but smaller than 192.168.1.254.
IP Pool Counts - Enter the maximum number of PCs that you
want the DHCP server to assign IP addresses to. The default is 50
and the maximum is 253.
Gateway IP Address - Enter a value of the gateway IP address for
the DHCP server. The value is usually as same as the 1st IP address
of the router, which means the router is the default gateway.
48
VigorPro5510 Series User’s Guide
DHCP Server IP Address for Relay Agent - Set the IP address of
the DHCP server you are going to use so the Relay Agent can help
to forward the DHCP request to the DHCP server.
DNS Server
Configuration
DNS stands for Domain Name System. Every Internet host must
have a unique IP address, also they may have a human-friendly,
easy to remember name such as www.yahoo.com. The DNS server
converts the user-friendly name into its equivalent IP address.
Force DNS manual setting - Force router to use DNS servers in
this page instead of DNS servers given by the Internet Access
server (PPPoE, PPTP, L2TP or DHCP server).
Primary IP Address -You must specify a DNS server IP address
here because your ISP should provide you with usually more than
one DNS Server. If your ISP does not provide it, the router will
automatically apply default DNS Server IP address: 194.109.6.66
to this field.
Secondary IP Address - You can specify secondary DNS server IP
address here because your ISP often provides you more than one
DNS Server. If your ISP does not provide it, the router will
automatically apply default secondary DNS Server IP address:
194.98.0.1 to this field.
The default DNS Server IP address can be found via Online Status:
If both the Primary IP and Secondary IP Address fields are left
empty, the router will assign its own IP address to local users as a
DNS proxy server and maintain a DNS cache.
If the IP address of a domain name is already in the DNS cache, the
router will resolve the domain name immediately. Otherwise, the
router forwards the DNS query packet to the external DNS server
by establishing a WAN (e.g. DSL/Cable) connection.
There are two common scenarios of LAN settings that stated in Chapter 4. For the
configuration examples, please refer to that chapter to get more information for your
necessity.
VigorPro5510 Series User’s Guide
49
3.2.3 Static Route
Go to LAN to open setting page and choose Static Route.
Index
The number (1 to 32) under Index allows you to open next page to
set up static route.
Destination Address
Displays the destination address of the static route.
Status
Displays the status of the static route.
Viewing Routing Table Displays the routing table for your reference.
Add Static Routes to Private and Public Networks
Here is an example of setting Static Route in Main Router so that user A and B locating in
different subnet can talk to each other via the router. Assuming the Internet access has been
configured and the router works properly:
z
use the Main Router to surf the Internet.
z
create a private subnet 192.168.10.0 using an internal Router A (192.168.1.2)
z
create a public subnet 211.100.88.0 via an internal Router B (192.168.1.3).
z
have set Main Router 192.168.1.1 as the default gateway for the Router A 192.168.1.2.
50
VigorPro5510 Series User’s Guide
Before setting Static Route, user A cannot talk to user B for Router A can only forward
recognized packets to its default gateway Main Router.
Go to LAN page and click General Setup, select 1st Subnet as the RIP Protocol Control.
Then click the OK button.
Note: There are two reasons that we have to apply RIP Protocol Control on 1st Subnet.
The first is that the LAN interface can exchange RIP packets with the neighboring routers
via the 1st subnet (192.168.1.0/24). The second is that those hosts on the internal private
subnets (ex. 192.168.10.0/24) can access the Internet via the router, and continuously
exchange of IP routing information with different subnets.
1.
Click the LAN - Static Route and click on the Index Number 1. Check the Enable
box. Please add a static route as shown below, which regulates all packets destined to
192.168.10.0 will be forwarded to 192.168.1.2. Click OK.
VigorPro5510 Series User’s Guide
51
2.
Return to Static Route Setup page. Click on another Index Number to add another
static route as show below, which regulates all packets destined to 211.100.88.0 will be
forwarded to 192.168.1.3.
3.
Go to Diagnostics and choose Routing Table to verify current routing table.
3.2.4 VLAN
Virtual LAN function provides you a very convenient way to manage hosts by grouping
them based on the physical port. You can also manage the in/out rate of each port. Go to
LAN page and select VLAN. The following page will appear. Click Enable to invoke
VLAN function.
Note: VLAN menu item is only available for VigorPro 5510.
To add or remove a VLAN, please refer to the following example.
1.
If, VLAN 0 is consisted of hosts linked to P1 and P2 and VLAN 1 is consisted of hosts
linked to P3 and P4.
52
VigorPro5510 Series User’s Guide
2.
After checking the box to enable VLAN function, you will check the table according to
the needs as shown below.
To remove VLAN, uncheck the needed box and click OK to save the results.
3.2.5 Bind IP to MAC
This function is used to bind the IP and MAC address in LAN to have a strengthen control in
network. When this function is enabled, all the assigned IP and MAC address binding
together cannot be changed. If you modified the binding IP or MAC address, it might cause
you not access into the Internet.
Click LAN and click Bind IP to MAC to open the setup page.
VigorPro5510 Series User’s Guide
53
Enable
Click this radio button to invoke this function. However, IP/MAC
which is not listed in IP Bind List also can connect to Internet.
Disable
Click this radio button to disable this function. All the settings on
this page will be invalid.
Strict Bind
Click this radio button to block the connection of the IP/MAC
which is not listed in IP Bind List.
ARP Table
This table is the LAN ARP table of this router. The information
for IP and MAC will be displayed in this field. Each pair of IP
and MAC address listed in ARP table can be selected and added
to IP Bind List by clicking Add below.
Add and Edit
IP Address – Type the IP address that will be used for the
specified MAC address.
Mac Address – Type the MAC address that is used to bind with
the assigned IP address.
Refresh
It is used to refresh the ARP table. When there is one new PC
added to the LAN, you can click this link to obtain the newly
ARP table information.
IP Bind List
It displays a list for the IP bind to MAC information.
Add
It allows you to add the one you choose from the ARP table or
the IP/MAC address typed in Add and Edit to the table of IP
Bind List.
Edit
It allows you to edit and modify the selected IP address and MAC
address that you create before.
Delete
You can remove any item listed in IP Bind List. Simply click
and select the one, and click Delete. The selected item will be
removed from the IP Bind List.
54
VigorPro5510 Series User’s Guide
Note: Before you select Strict Bind, you have to bind one set of IP/MAC address for one
PC. If not, no one of the PCs can access into Internet. And the web configurator of the
router might not be accessed.
3.3 NAT
Usually, the router serves as an NAT (Network Address Translation) router. NAT is a
mechanism that one or more private IP addresses can be mapped into a single public one.
Public IP address is usually assigned by your ISP, for which you may get charged. Private IP
addresses are recognized only among internal hosts.
When the outgoing packets destined to some public server on the Internet reach the NAT
router, the router will change its source address into the public IP address of the router, select
the available public port, and then forward it. At the same time, the router shall list an entry
in a table to memorize this address/port-mapping relationship. When the public server
response, the incoming traffic, of course, is destined to the router’s public IP address and the
router will do the inversion based on its table. Therefore, the internal host can communicate
with external host smoothly.
The benefit of the NAT includes:
z
Save cost on applying public IP address and apply efficient usage of IP address.
NAT allows the internal IP addresses of local hosts to be translated into one public IP
address, thus you can have only one IP address on behalf of the entire internal hosts.
z
Enhance security of the internal network by obscuring the IP address. There are
many attacks aiming victims based on the IP address. Since the attacker cannot be
aware of any private IP addresses, the NAT function can protect the internal network.
Note: On NAT page, you will see the private IP address defined in RFC-1918. Usually we
use the 192.168.1.0/24 subnet for the router. As stated before, the NAT facility can map
one or more IP addresses and/or service ports into different specified services. In other
words, the NAT function can be achieved by using port mapping methods.
Below shows the menu items for NAT.
3.3.1 Port Redirection
Port Redirection is usually set up for server related service inside the local network (LAN),
such as web servers, FTP servers, E-mail servers etc. Most of the case, you need a public IP
address for each server and this public IP address/domain name are recognized by all users.
Since the server is actually located inside the LAN, the network well protected by NAT of
the router, and identified by its private IP address/port, the goal of Port Redirection function
is to forward all access request with public IP address from external users to the mapping
private IP address/port of the server.
VigorPro5510 Series User’s Guide
55
The port redirection can only apply to incoming traffic.
To use this function, please go to NAT page and choose Port Redirection web page. The
Port Redirection Table provides 20 port-mapping entries for the internal hosts.
Press any number under Index to access into next page for configuring port redirection.
56
VigorPro5510 Series User’s Guide
Enable
Check this box to enable such port redirection setting.
Mode
Two options (Single and Range) are provided here for you to
choose. To set a range for the specific service, select Range. In
Range mode, if the public port (start port and end port) and the
starting IP of private IP had been entered, the system will calculate
and display the ending IP of private IP automatically.
Service Name
Enter the description of the specific network service.
Protocol
Select the transport layer protocol (TCP or UDP).
WAN Interface
Chose the WAN interface for applying port redirection. The default
setting is All which means all the incoming data from any port will
be redirected to WAN1 and WAN2 at the same time.
Public Port
Specify which port can be redirected to the specified Private IP
and Port of the internal host. If you choose Range as the port
redirection mode, you will see two boxes on this field. Simply type
the required numbers on these two boxes.
Private IP
Specify the private IP address of the internal host providing the
service. If you choose Range as the port redirection mode, you will
see two boxes on this field. Simply type the IP address in the first
box (as the starting point). The second one is assigned
automatically after you type the private port number below.
Private Port
Specify the private port number of the service offered by the
internal host. After you enter the proper number in this box, the
second box of Private IP address will be assigned accordingly.
Active
Check this box to activate the port-mapping entry you have
defined.
Note that the router has its own built-in services (servers) such as Telnet, HTTP and FTP etc.
Since the common port numbers of these services (servers) are all the same, you may need to
reset the router in order to avoid confliction.
For example, the built-in web configurator in the router is with default port 80, which may
conflict with the web server in the local network, http://192.168.1.13:80. Therefore, you need
to change the router’s http port to any one other than the default port 80 to avoid
conflict, such as 8080. This can be set in the System Maintenance >>Management Setup.
VigorPro5510 Series User’s Guide
57
You then will access the admin screen of by suffixing the IP address with 8080, e.g.,
http://192.168.1.1:8080 instead of port 80.
58
VigorPro5510 Series User’s Guide
3.3.2 DMZ Host
As mentioned above, Port Redirection can redirect incoming TCP/UDP or other traffic on
particular ports to the specific private IP address/port of host in the LAN. However, other IP
protocols, for example Protocols 50 (ESP) and 51 (AH), do not travel on a fixed port. Vigor
router provides a facility DMZ Host that maps ALL unsolicited data on any protocol to a
single host in the LAN. Regular web surfing and other such Internet activities from other
clients will continue to work without inappropriate interruption. DMZ Host allows a defined
internal user to be totally exposed to the Internet, which usually helps some special
applications such as Netmeeting or Internet Games etc.
Note: The inherent security properties of NAT are somewhat bypassed if you set up
DMZ host. We suggest you to add additional filter rules or a secondary firewall.
Click DMZ Host to open the following page:
WAN1
WAN2
VigorPro5510 Series User’s Guide
59
WAN1
This page allows you to configure Private IP or Active True IP as
DMZ host.
WAN2
This page allows you to configure Private IP as DMZ host.
Private IP
If you choose Private IP as DMZ host, you can type a private IP in
this box or use Choose PC button to choose the one you want.
MAC Address of the
True….
If you choose Active True IP as DMZ host, please type the
MAC address of the one you want.
If you previously have set up WAN Alias in Internet Access>>PPPoE, you will find them
in Aux. WAN IP list for your selection.
Enable
Check to enable the DMZ Host function.
Private IP
Enter the private IP address of the DMZ host, or click Choose PC
to select one.
Choose PC
Click this button and then a window will automatically pop up, as
depicted below. The window consists of a list of private IP
addresses of all hosts in your LAN network. Select one private IP
address in the list to be the DMZ host.
When you have selected one private IP from the above dialog, the IP address will be shown
on the following screen. Click OK to save the setting.
60
VigorPro5510 Series User’s Guide
3.3.3 Open Ports
Open Ports allows you to open a range of ports for the traffic of special applications.
Common application of Open Ports includes P2P application (e.g., BT, KaZaA, Gnutella,
WinMX, eMule and others), Internet Camera etc. Ensure that you keep the application
involved up-to-date to avoid falling victim to any security exploits.
Click Open Ports to open the following page:
Index
Indicate the relative number for the particular entry that you want to
offer service in a local host. You should click the appropriate index
number to edit or clear the corresponding entry.
Comment
Specify the name for the defined network service.
WAN Interface
Display the WAN interface for the entry.
Local IP Address
Display the private IP address of the local host offering the service.
Status
Display the state for the corresponding entry. X or V is to represent
the Inactive or Active state.
To add or edit port settings, click one index number on the page. The index entry setup page
will pop up. In each index entry, you can specify 10 port ranges for diverse services.
VigorPro5510 Series User’s Guide
61
Enable Open Ports
Check to enable this entry.
Comment
Make a name for the defined network application/service.
WAN Interface
Specify the WAN interface that will be used for this entry.
Local Computer
Enter the private IP address of the local host or click Choose PC to
select one.
Choose PC
Click this button and, subsequently, a window having a list of
private IP addresses of local hosts will automatically pop up. Select
the appropriate IP address of the local host in the list.
Protocol
Specify the transport layer protocol. It could be TCP, UDP, or ----(none) for selection.
Start Port
Specify the starting port number of the service offered by the local
host.
End Port
Specify the ending port number of the service offered by the local
host.
3.3.4 Address Mapping
This page is used to map specific private IP to specific WAN IP alias.
If you have "a group of IP Addresses" and want to apply to the router, please use WAN IP
alias function to record these IPs first. Then, use address mapping function to map specific
private IP to specific WAN IP alias.
For example, you have IP addresses ranging from 86.123.123.1 ~ 86.123.123.8. However,
your router uses 86.123.123.1, and the rest of the IPs are recorded in WAN IP alias. You
want that private IP 192.168.1.10 can use 86.123.123.2 as source IP when it sends packet out
to Internet. You can use address mapping function to achieve this demand. Simply type
192.168.1.10 as the Private IP; and type 86.123.123.2 as the WAN IP.
62
VigorPro5510 Series User’s Guide
Protocol
Display the protocol used for this address mapping.
Public IP
Display the public IP address selected for this entry, e.g.,
172.16.3.102.
Private IP
Display the private IP set for this address mapping, e.g.,
192.168.1.10
Mask
Display the subnet mask selected for this address mapping.
Status
Display the status for the entry, enable or disable.
Click the index number link to open the configuration page.
Enable
Check to enable this entry.
Protocol
Specify the transport layer protocol. It could be TCP, UDP, or
ALL for selection.
WAN IP
Select an IP address (the selections provided here are set in IP
Alias List of Network >>WAN interface). Local host can use this
IP to connect to Internet.
If you want to choose any one of the Public IP settings, you must
specify some IP addresses in the IP Alias List of the Static/DHCP
Configuration page first. If you did not type in any IP address in
VigorPro5510 Series User’s Guide
63
the IP Alias List, the Public IP setting will be empty in this field.
When you click Apply, a message will appear to inform you.
Private IP
Assign an IP address (e.g., 192.168.1.10) or a subnet to be
compared with the Public IP address for incoming packets.
Subnet Mask
Select a value of subnet mask for private IP address.
3.4 Firewall
3.4.1 Basics for Firewall
While the broadband users demand more bandwidth for multimedia, interactive applications,
or distance learning, security has been always the most concerned. The firewall of the Vigor
router helps to protect your local network against attack from unauthorized outsiders. It also
restricts users in the local network from accessing the Internet. Furthermore, it can filter out
specific packets that trigger the router to build an unwanted outgoing connection.
Firewall Facilities
The users on the LAN are provided with secured protection by the following firewall
facilities:
z
User-configurable IP filter (Call Filter/ Data Filter).
z
Stateful Packet Inspection (SPI): tracks packets and denies unsolicited incoming data
z
Selectable Denial of Service (DoS) /Distributed DoS (DDoS) attacks protection
z
URL Content Filter
IP Filters
Depending on whether there is an existing Internet connection, or in other words “the WAN
link status is up or down”, the IP filter architecture categorizes traffic into two: Call Filter
and Data Filter.
z
Call Filter - When there is no existing Internet connection, Call Filter is applied to all
traffic, all of which should be outgoing. It will check packets according to the filter
rules. If legal, the packet will pass. Then the router shall “initiate a call” to build the
Internet connection and send the packet to Internet.
z
Data Filter - When there is an existing Internet connection, Data Filter is applied to
incoming and outgoing traffic. It will check packets according to the filter rules. If legal,
the packet will pass the router.
The following illustrations are flow charts explaining how router will treat incoming traffic
and outgoing traffic respectively.
64
VigorPro5510 Series User’s Guide
Stateful Packet Inspection (SPI)
Stateful inspection is a firewall architecture that works at the network layer. Unlike legacy
static packet filtering, which examines a packet based on the information in its header,
stateful inspection builds up a state machine to track each connection traversing all interfaces
of the firewall and makes sure they are valid. The stateful firewall of Vigor router not just
examine the header information also monitor the state of the connection.
Denial of Service (DoS) Defense
The DoS Defense functionality helps you to detect and mitigate the DoS attack. The attacks
are usually categorized into two types, the flooding-type attacks and the vulnerability attacks.
The flooding-type attacks will attempt to exhaust all your system's resource while the
vulnerability attacks will try to paralyze the system by offending the vulnerabilities of the
protocol or operation system.
The DoS Defense function enables the Vigor router to inspect every incoming packet based
on the attack signature database. Any malicious packet that might duplicate itself to paralyze
the host in the secure LAN will be strictly blocked and a Syslog message will be sent as
warning, if you set up Syslog server.
Also the Vigor router monitors the traffic. Any abnormal traffic flow violating the pre-defined
parameter, such as the number of thresholds, is identified as an attack and the Vigor router
will activate its defense mechanism to mitigate in a real-time manner.
The below shows the attack types that DoS/DDoS defense function can detect:
VigorPro5510 Series User’s Guide
65
1. SYN flood attack
2. UDP flood attack
3. ICMP flood attack
4. TCP Flag scan
5. Trace route
6. IP options
7. Unknown protocol
8. Land attack
9. Smurf attack
10. SYN fragment
11. ICMP fragment
12. Tear drop attack
13. Fraggle attack
14. Ping of Death attack
15. TCP/UDP port scan
Anti-Virus and Anti-Intrusion
Users might have much more confidence about the security in the network for data
transmission if the functions of anti-virus and anti-intrusion are activated. The VigorPro
router offers the mechanism of anti-virus and anti-intrusion. What you have to do is to set the
proper profiles and invoke them. The anti-virus profile and anti-intrusion configuration can
be set in Anti-Virus menu (refer to section 3.7) and Anti-Intrusion menu (refer to section 3.6).
However, the mechanism must be enabled either in Firewall>>General Setup or
Firewall>>Filter Setup web page. After you choose proper Anti-Virus profile and check
Anti-Intrusion box, the Anti-Virus and Anti-Intrusion LEDs on the front panel will light up.
Below shows the menu items for Firewall.
3.4.2 General Setup
General Setup allows you to adjust settings of IP Filter and common options. Here you can
enable or disable the Call Filter or Data Filter. Under some circumstance, your filter set can
be linked to work in a serial manner. So here you assign the Start Filter Set only. Also you
can configure the Log Flag settings, Apply IP filter to VPN incoming packets, and Accept
incoming fragmented UDP packets.
Important: When some packet does not fit the rule configured in Filter Setup web page,
the filtering action configured in general setup web page will apply to that packet.
Click Firewall and click General Setup to open the general setup page.
66
VigorPro5510 Series User’s Guide
Call Filter
Check Enable to activate the Call Filter function. Assign a start
filter set for the Call Filter.
Data Filter
Check Enable to activate the Data Filter function. Assign a start
filter set for the Data Filter.
Filter
Select Pass or Block for the packets that do not match with the
filter rules.
IM/P2P Filter
Select an IM/P2P profile for global IM/P2P application blocking.
All the hosts in LAN must follow the standard configured in the
IM/P2P profile selected here. For detailed information, refer to
the section of IM/P2P profile setup. For troubleshooting needs,
you can specify to record information for IM/P2P by checking
the Log box. It will be sent to Syslog server. Please refer to
section 3.13.4 Syslog/Mail Alert for more detailed information.
URL Content Filter
Select one of the URL Content Filter profile settings (created in
CSM>> URL Content Filter) for applying with this router. Please
set at least one profile for choosing in CSM>> URL Content
Filter web page first. For troubleshooting needs, you can specify to
record information for URL Content Filter by checking the Log
box. It will be sent to Syslog server. Please refer to section 3.13.4
Syslog/Mail Alert for more detailed information.
Web Content Filter
Select one of the Web Content Filter profile settings (created in
CSM>> Web Content Filter) for applying with this router. Please
set at least one profile for anti-virus in CSM>> Web Content
VigorPro5510 Series User’s Guide
67
Filter web page first. For troubleshooting needs, you can specify to
record information for Web Content Filter by checking the Log
box. It will be sent to Syslog server. Please refer to section 3.13.4
Syslog/Mail Alert for more detailed information.
Anti-Virus
Select one of the anti-virus profile settings (created in
Anti-Virus>>Profile Setting) for applying with this router. Please
set at least one profile for anti-virus in Anti-Virus-> Profile
Setting web page first. For troubleshooting needs, you can specify
to record information for Anti-Virus by checking the Log box. It
will be sent to Syslog server. Please refer to section 3.13.4
Syslog/Mail Alert for more detailed information.
Anti-Intrusion
Check the Enable box to invoke anti-intrusion filter function. For
troubleshooting needs, you can specify to record information for
Anti-Intrusion by checking the Log box. It will be sent to Syslog
server. Please refer to section 3.13.4 Syslog/Mail Alert for more
detailed information.
Accept large
incoming…
Some on-line games (for example: Half Life) will use lots of
fragmented UDP packets to transfer game data. Instinctively as a
secure firewall, Vigor router will reject these fragmented packets
to prevent attack unless you enable “Accept large incoming
fragmented UDP or ICMP Packets”. By checking this box, you
can play these kinds of on-line games. If security concern is in
higher priority, you cannot enable “Accept large incoming
fragmented UDP or ICMP Packets”.
Enable Transparent
Mode
Check this box to enable transparent function for such router. It
is not necessary for users to re-organize the network or configure
the subnet settings for each PC connected under such router.
However, the configured Anti-Virus and Anti-Intrusion profiles
can be applied to PCs connected behind vigor router to have the
best security. The following picture explains the basic structure
for using transparent mode for vigor router.
PCs with subnet “172.16.x.x” connected under VigorPro 5510
will be protected by security settings enabled and configured on
the web pages of Vigor router. When the transparent mode has
been checked, hackers from Internet do not sense the existence of
vigor router, therefore they cannot attack the router.
68
VigorPro5510 Series User’s Guide
Advance Setting
Click Edit to open the following window. However, it is
strongly recommended to use the default settings here.
Codepage - This function is used to compare the characters
among different languages. Choose correct codepage can help
the system obtaining correct ASCII after decoding data from
URL and enhance the correctness of URL Content Filter. The
default value for this setting is ANSI 1252 Latin I. If you do not
choose any codepage, no decoding job of URL will be processed.
Please use the drop-down list to choose a codepage.
If you do not have any idea of choosing suitable codepage,
please open Syslog. From Codepage Information of Setup dialog,
you will see the recommended codepage listed on the dialog box.
Window size – It determines the size of TCP protocol
(0~65535). The more the value is, the better the performance will
be. However, if the network is not stable, small value will be
proper.
Session timeout /Queue timeout–Setting timeout for sessions
can make the best utilization of network resources. However,
Queue timeout is configured for TCP protocol only; session
timeout is configured for the data flow which matched with the
firewall rule.
Max. Queue length - When the network connection is not
stable, you can set large number for this setting to get better
performance. Yet large value will consume large resource.
Retransmission queue length – Type the number here as a base
VigorPro5510 Series User’s Guide
69
for the router to verify if the retransmitted data is the same as the
old one.
Advertisement Enable – Check this box to display the words –
[Powered by Draytek] on the unreachable web page
Strict Security
Checking
For the sake of security, you might want the router executing
strict security checking for data transmission. The router
performance will be affected if you invoke strict security
checking.
Anti-Virus – Check this box to execute the critical checking for
virus.
Anti-Spam – Check this box to execute the critical checking for
e-mails.
In sequence – Check this box to execute the critical checking for
all the files in sequence.
70
VigorPro5510 Series User’s Guide
3.4.3 Filter Setup
Click Firewall and click Filter Setup to open the setup page.
To edit or add a filter, click on the set number to edit the individual set. The following page
will be shown. Each filter set contains up to 7 rules. Click on the rule number button to edit
each rule. Check Active to enable the rule.
Filter Rule
Click a button numbered (1 ~ 7) to edit the filter rule. Click the
button will open Edit Filter Rule web page. For the detailed
information, refer to the following page.
Active
Enable or disable the filter rule.
Comment
Enter filter set comments/description. Maximum length is
23–character long.
Move Up/Down
Use Up or Down link to move the order of the filter rules.
Next Filter Set
Set the link to the next filter set to be executed after the current
filter run. Do not make a loop with many filter sets.
To edit Filter Rule, click the Filter Rule index button to enter the Filter Rule setup page.
VigorPro5510 Series User’s Guide
71
Check to enable the
Filter Rule
Check this box to enable the filter rule.
Comments
Enter filter set comments/description. Maximum length is 14character long.
Index (1-15)
Set PCs on LAN to work at certain time interval only. You may
choose up to 4 schedules out of the 15 schedules pre-defined in
Applications >> Schedule setup. The default setting of this field is
blank and the function will always work.
Direction
Set the direction of packet flow (LAN->WAN/WAN->LAN). It is
for Data Filter only. For the Call Filter, this setting is not
available since Call Filter is only applied to outgoing traffic.
Source/Destination IP Click Edit to access into the following dialog to choose the
source/destination IP or IP ranges.
72
VigorPro5510 Series User’s Guide
To set the IP address manually, please choose Any Address/Single
Address/Range Address/Subnet Address as the Address Type
and type them in this dialog. In addition, if you want to use the IP
range from defined groups or objects, please choose Group and
Objects as the Address Type.
From the IP Group drop down list, choose the one that you want
to apply. Or use the IP Object drop down list to choose the object
that you want.
Service Type
Click Edit to access into the following dialog to choose a suitable
service type.
To set the service type manually, please choose User defined as
the Service Type and type them in this dialog. In addition, if you
want to use the service type from defined groups or objects, please
VigorPro5510 Series User’s Guide
73
choose Group and Objects as the Service Type.
Protocol - Specify the protocol(s) which this filter rule will apply to.
Source/Destination Port (=) – when the first and last value are the same, it indicates one
port; when the first and last values are different, it indicates a range
for the port and available for this service type.
(!=) – when the first and last value are the same, it indicates all
the ports except the port defined here; when the first and last
values are different, it indicates that all the ports except the range
defined here are available for this service type.
(>) – the port number greater than this value is available.
(<) – the port number less than this value is available for this
profile.
Service Group/Object - Use the drop down list to choose the one
that you want.
Fragments
Specify the action for fragmented packets. And it is used for Data
Filter only.
Don’t care -No action will be taken towards fragmented packets.
Unfragmented -Apply the rule to unfragmented packets.
Fragmented - Apply the rule to fragmented packets.
Too Short - Apply the rule only to packets that are too short to
contain a complete header.
Filter
Specifies the action to be taken when packets match the rule.
Block Immediately - Packets matching the rule will be dropped
immediately.
Pass Immediately - Packets matching the rule will be passed
immediately.
Block If No Further Match - A packet matching the rule, and that
does not match further rules, will be dropped.
Pass If No Further Match - A packet matching the rule, and that
does not match further rules, will be passed through.
Branch to other Filter If the packet matches the filter rule, the next filter rule will branch
to the specified filter set. Select next filter rule to branch from the
Set
drop-down menu. Be aware that the router will apply the
specified filter rule for ever and will not return to previous filter
rule any more.
IM/P2P Filter
Select a IM/P2P profile for global IM/P2P application blocking.
All the hosts in LAN must follow the standard configured in the
IM/P2P profile selected here. For detailed information, refer to
the section of IM/P2P profile setup. For troubleshooting needs,
you can specify to record information for IM/P2P by checking the
Log box. It will be sent to Syslog server. Please refer to section
Syslog/Mail Alert for more detailed information.
URL Content Filter
Select one of the URL Content Filter profile settings (created in
CSM>> URL Content Filter Profile) for applying with this
router. Please set at least one profile for choosing in CSM>>
URL Content Filter Profile web page first. For troubleshooting
needs, you can specify to record information for URL Content
74
VigorPro5510 Series User’s Guide
Filter by checking the Log box. It will be sent to Syslog server.
Please refer to section Syslog/Mail Alert for more detailed
information.
Web Content Filter
Select one of the Web Content Filter profile settings (created in
CSM>> Web Content Filter Profile) for applying with this
router. Please set at least one profile for anti-virus in CSM>>
Web Content Filter Profile web page first. For troubleshooting
needs, you can specify to record information for Web Content
Filter by checking the Log box. It will be sent to Syslog server.
Please refer to section Syslog/Mail Alert for more detailed
information.
Anti-Virus
Select one of the anti-virus profile settings (created in Defense
Configuration>>Anti-Virus>>Profile Setting) for applying
with this router. Please set at least one profile for anti-virus in
Defense Configuration>>Anti-Virus-> Profile Setting web
page first. For troubleshooting needs, you can specify to record
information for Anti-Virus by checking the Log box. It will be
sent to Syslog server. Please refer to section Syslog/Mail Alert
for more detailed information.
Anti-Intrusion
Check the Enable box to invoke anti-intrusion filter function. For
troubleshooting needs, you can specify to record information for
Anti-Intrusion by checking the Log box. It will be sent to Syslog
server. Please refer to section Syslog/Mail Alert for more detailed
information.
Anti-Spam
Select one of the anti-spam profile settings (created in Defense
Configuration>>Anti-Spam>>Profile Setting) for applying
with this router. Please set at least one profile for anti-spam in
Defense Configuration>>Anti-Spam>>Profile Setting web
page first. For troubleshooting needs, you can specify to record
information for Anti-Spam by checking the Log box. It will be
sent to Syslog server. Please refer to section Syslog/Mail Alert
for more detailed information.
Advance Setting
Click Edit to open the following window. Click Edit to open the
following window. However, it is strongly recommended to use
the default settings here.
Codepage - This function is used to compare the characters
among different languages. Choose correct codepage can help
the system obtaining correct ASCII after decoding data from
URL and enhance the correctness of URL Content Filter. The
VigorPro5510 Series User’s Guide
75
default value for this setting is ANSI 1252 Latin I. If you do not
choose any codepage, no decoding job of URL will be processed.
Please use the drop-down list to choose a codepage.
If you do not have any idea of choosing suitable codepage,
please open Syslog. From Codepage Information of Setup dialog,
you will see the recommended codepage listed on the dialog box.
Window size – It determines the size of TCP protocol
(0~65535). The more the value is, the better the performance will
be. However, if the network is not stable, small value will be
proper.
Session timeout /Queue timeout–Setting timeout for sessions
can make the best utilization of network resources. However,
Queue timeout is configured for TCP protocol only; session
timeout is configured for the data flow which matched with the
firewall rule.
Max. Queue length - When the network connection is not
stable, you can set large number for this setting to get better
performance. Yet large value will consume large resource.
Retransmission queue length – Type the number here as a base
for the router to verify if the retransmitted data is the same as the
old one.
DrayTek Banner – Please uncheck this box and the following
screen will not be shown for the unreachable web page. The
default setting is Enabled.
76
VigorPro5510 Series User’s Guide
Example
As stated before, all the traffic will be separated and arbitrated using on of two IP filters: call
filter or data filter. You may preset 12 call filters and data filters in Filter Setup and even
link them in a serial manner. Each filter set is composed by 7 filter rules, which can be
further defined. After that, in General Setup you may specify one set for call filter and one
set for data filter to execute first.
VigorPro5510 Series User’s Guide
77
3.4.4 DoS Defense
As a sub-functionality of IP Filter/Firewall, there are 15 types of detect/defense function in
the DoS Defense setup. The DoS Defense functionality is disabled for default.
Click Firewall and click DoS Defense to open the setup page.
Enable Dos Defense
Check the box to activate the DoS Defense Functionality.
Enable SYN flood
defense
Check the box to activate the SYN flood defense function. Once
detecting the Threshold of the TCP SYN packets from the
Internet has exceeded the defined value, the Vigor router will start
to randomly discard the subsequent TCP SYN packets for a
period defined in Timeout. The goal for this is prevent the TCP
SYN packets’ attempt to exhaust the limited-resource of Vigor
router. By default, the threshold and timeout values are set to 50
packets per second and 10 seconds, respectively.
Enable UDP flood
defense
Check the box to activate the UDP flood defense function. Once
detecting the Threshold of the UDP packets from the Internet has
exceeded the defined value, the Vigor router will start to
randomly discard the subsequent UDP packets for a period
defined in Timeout. The default setting for threshold and timeout
are 150 packets per second and 10 seconds, respectively.
Enable ICMP flood
defense
Check the box to activate the ICMP flood defense function.
Similar to the UDP flood defense function, once if the Threshold
of ICMP packets from Internet has exceeded the defined value, the
router will discard the ICMP echo requests coming from the
Internet. The default setting for threshold and timeout are 50
packets per second and 10 seconds, respectively.
78
VigorPro5510 Series User’s Guide
Enable PortScan
detection
Port Scan attacks the Vigor router by sending lots of packets to
many ports in an attempt to find ignorant services would respond.
Check the box to activate the Port Scan detection. Whenever
detecting this malicious exploration behavior by monitoring the
port-scanning Threshold rate, the Vigor router will send out a
warning. By default, the Vigor router sets the threshold as 150
packets per second.
Block IP options
Check the box to activate the Block IP options function. The Vigor
router will ignore any IP packets with IP option field in the
datagram header. The reason for limitation is IP option appears to
be a vulnerability of the security for the LAN because it will carry
significant information, such as security, TCC (closed user group)
parameters, a series of Internet addresses, routing messages...etc.
An eavesdropper outside might learn the details of your private
networks.
Block Land
Check the box to enforce the Vigor router to defense the Land
attacks. The Land attack combines the SYN attack technology with
IP spoofing. A Land attack occurs when an attacker sends spoofed
SYN packets with the identical source and destination addresses, as
well as the port number to victims.
Block Smurf
Check the box to activate the Block Smurf function. The Vigor
router will ignore any broadcasting ICMP echo request.
Block trace router
Check the box to enforce the Vigor router not to forward any trace
route packets.
Block SYN fragment
Check the box to activate the Block SYN fragment function. The
Vigor router will drop any packets having SYN flag and more
fragment bit set.
Block Fraggle Attack
Check the box to activate the Block fraggle Attack function. Any
broadcast UDP packets received from the Internet is blocked.
Activating the DoS/DDoS defense functionality might block some
legal packets. For example, when you activate the fraggle attack
defense, all broadcast UDP packets coming from the Internet are
blocked. Therefore, the RIP packets from the Internet might be
dropped.
Block TCP flag scan
Check the box to activate the Block TCP flag scan function. Any
TCP packet with anomaly flag setting is dropped. Those scanning
activities include no flag scan, FIN without ACK scan, SYN FINscan,
Xmas scan and full Xmas scan.
Block Tear Drop
Check the box to activate the Block Tear Drop function. Many
machines may crash when receiving ICMP datagrams (packets) that
exceed the maximum length. To avoid this type of attack, the Vigor
router is designed to be capable of discarding any fragmented ICMP
packets with a length greater than 1024 octets.
Block Ping of Death
Check the box to activate the Block Ping of Death function. This
attack involves the perpetrator sending overlapping packets to the
target hosts so that those target hosts will hang once they
re-construct the packets. The Vigor routers will block any packets
realizing this attacking activity.
Block ICMP Fragment Check the box to activate the Block ICMP fragment function. Any
ICMP packets with more fragment bit set are dropped.
VigorPro5510 Series User’s Guide
79
Block Unknown
Protocol
Check the box to activate the Block Unknown Protocol function.
Individual IP packet has a protocol field in the datagram header to
indicate the protocol type running over the upper layer. However,
the protocol types greater than 100 are reserved and undefined at
this time. Therefore, the router should have ability to detect and
reject this kind of packets.
Warning Messages
We provide Syslog function for user to retrieve message from Vigor
router. The user, as a Syslog Server, shall receive the report sending
from Vigor router which is a Syslog Client.
All the warning messages related to DoS defense will be sent to user
and user can review it through Syslog daemon. Look for the
keyword DoS in the message, followed by a name to indicate what
kind of attacks is detected.
80
VigorPro5510 Series User’s Guide
3.5 Objects Settings
For IPs in a range, service ports in a limited range and keywords usually will be applied for
configuring router’s settings, we can define them with objects and bind them with groups for
using conveniently. Later, we can select that object/service for applying. For example, all the
IPs in the same department can be defined with an IP object (a range of IP address).
VigorPro5510 Series User’s Guide
81
3.5.1 IP Object
You can set up to 192 sets of IP Objects with different conditions.
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Name
Type a name for this profile. Maximum 15 characters are
allowed.
Interface
Choose a proper interface (WAN, LAN or Any).
For example, the Direction setting in Edit Filter Rule will
ask you specify IP or IP range for WAN or LAN or any IP
address. If you choose LAN as the Interface here, and choose
LAN as the direction setting in Edit Filter Rule, then all the
IP addresses specified with LAN interface will be opened for
you to choose in Edit Filter Rule page.
82
VigorPro5510 Series User’s Guide
Address Type
Determine the address type for the IP address.
Select Single Address if this object contains one IP address
only.
Select Range Address if this object contains several IPs
within a range.
Select Subnet Address if this object contains one subnet for
IP address.
Select Any Address if this object contains any IP address.
Start IP Address
Type the start IP address for Single Address type.
End IP Address
Type the end IP address if the Range Address type is selected.
Subnet Mask
Type the subnet mask if the Subnet Address type is selected.
Invert Selection
If it is checked, all the IP addresses except the ones listed
above will be applied later while it is chosen.
Below is an example of IP objects settings.
VigorPro5510 Series User’s Guide
83
3.5.2 IP Group
This page allows you to bind several IP objects into one IP group.
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Name
Type a name for this profile. Maximum 15 characters are
allowed.
Interface
Choose WAN, LAN or Any to display all the available IP
objects with the specified interface.
Available IP Objects
All the available IP objects (created in IP Object web page)
with the specified interface chosen above will be shown in this
box.
Selected IP Objects
Click
button to add the selected IP objects in this box.
84
VigorPro5510 Series User’s Guide
3.5.3 Service Type Object
You can set up to 96 sets of Service Type Objects with different conditions.
Set to Factory Default
Clear all profiles.
Click the number under Index column for settings in detail.
Name
Type a name for this profile.
Protocol
Specify the protocol(s) which this profile will apply to.
Source/Destination Port
Source Port and the Destination Port column are available
for TCP/UDP protocol. It can be ignored for other protocols.
The filter rule will filter out any port number.
(=) – when the first and last value are the same, it indicates
one port; when the first and last values are different, it
indicates a range for the port and available for this profile.
(!=) – when the first and last value are the same, it indicates
VigorPro5510 Series User’s Guide
85
all the ports except the port defined here; when the first
and last values are different, it indicates that all the ports
except the range defined here are available for this service
type.
(>) – the port number greater than this value is available.
(<) – the port number less than this value is available for this
profile.
Below is an example of service type objects settings.
3.5.4 Service Type Group
This page allows you to bind several service types into one group.
Set to Factory Default
Clear all profiles.
Click the number under Index column for setting in detail.
86
VigorPro5510 Series User’s Guide
Name
Type a name for this profile.
Available Service Type
Objects
You can add IP objects from IP Object page. All the
available IP objects will be shown in this box.
Selected Service Type
Objects
button to add the selected IP objects in this
Click
box.
3.5.5 Keyword Object
You can set 200 keyword object profiles for choosing as black /white list in Anti-Spam
>>Profile Setting.
Set to Factory Default
Clear all profiles.
Click the number under Index column for setting in detail.
VigorPro5510 Series User’s Guide
87
Name
Type a name for this profile, e.g., game.
Contents
Type the content for such profile. For example, type gambling
as Contents. When you browse the webpage, the page with
gambling information will be watched out and be
passed/blocked based on the configuration on Firewall
settings.
3.5.6 Keyword Group
This page allows you to bind several keyword objects into one group. The keyword groups
set here will be chosen as black /white list in Anti-Spam >>Profile Setting.
Set to Factory Default
Clear all profiles.
Click the number under Index column for setting in detail.
88
VigorPro5510 Series User’s Guide
Name
Type a name for this group.
Available Keyword
Objects
You can gather keyword objects from Keyword Object page
within one keyword group. All the available Keyword
objects that you have created will be shown in this box.
Selected Keyword Objects
Click
this box.
button to add the selected Keyword objects in
3.5.7 File Extension Object
This page allows you to set eight profiles which will be applied in CSM>>URL Content
Filter and Defense Configuration>>Anti-Virus. All the files with the extension names
specified in these profiles will be processed according to the chosen action.
Profile 1 with name of “default” is the default profile, some files with the file extensions
specified in this profile will be ignored and not be scanned by Vigor router.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details.
VigorPro5510 Series User’s Guide
89
Profile Name
Type a name for this profile.
Type a name for such profile and check all the items of file extension that will be processed
in the router. Finally, click OK to save this profile.
90
VigorPro5510 Series User’s Guide
3.5.8 IM Object
This page allows you to set 32 profiles for Instant Messenger. These profiles will be applied
in Firewall>>IM/P2P Filter Profile for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. There are several types
of Instant Messenger (IM) provided here for you to choose to disallow people using. Simple
check the box (es) and then click OK. Later, in the CSM>>IM/P2P Filter Profile page, you
can use IM Object drop down list to choose the proper profile configured here as the
standard for the host(s) to follow.
VigorPro5510 Series User’s Guide
91
Profile Name
Type a name for this profile.
Type a name for such profile and check all the items that not allowed to be used in the host.
Finally, click OK to save this profile.
92
VigorPro5510 Series User’s Guide
3.5.9 P2P Object
This page allows you to set 32 profiles for peer-to-peer application. These profiles will be
applied in Firewall>>IM/P2P Filter Profile for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. There are several items
for P2P protocols provided here for you to choose to disallow people using. Simple check
the box (es) and then click OK. Later, in the CSM>>IM/P2P Filter Profile page, you can
use P2P Object drop down list to choose the proper profile configured here as the standard
for the host(s) to follow.
Profile Name
VigorPro5510 Series User’s Guide
Type a name for this profile.
93
Type a name for such profile and check all the protocols that not allowed to be used in the
host. Finally, click OK to save this profile.
3.5.10 Misc Object
This page allows you to set 32 profiles for miscellaneous applications. These profiles will be
applied in Firewall>>IM/P2P Filter Profile for filtering.
Set to Factory Default
Clear all profiles.
Click the number under Profile column for configuration in details. Applications for
tunneling and streaming are listed in the page for you to choose to disallow people using.
Simple check the box (es) and then click OK. Later, in the CSM>>IM/P2P Filter Profile
page, you can use Misc Object drop down list to choose the proper profile configured here
as the standard for the host(s) to follow.
94
VigorPro5510 Series User’s Guide
Profile Name
Type a name for this profile.
Type a name for such profile and check all the protocols that not allowed to be used in the
host. Finally, click OK to save this profile.
3.6 CSM
CSM is an abbreviation of Content Security Management which is used to control IM/P2P
usage, filter the web content and URL content to reach a goal of security management.
IM/P2P Filtering
As the popularity of all kinds of instant messenger application arises, communication cannot
become much easier. Nevertheless, while some industry may leverage this as a great tool to
connect with their customers, some industry may take reserve attitude in order to reduce
employee misusage during office hour or prevent unknown security leak. It is similar
situation for corporation towards peer-to-peer applications since file-sharing can be
convenient but insecure at the same time.
Content Filtering
To provide an appropriate cyberspace to users, Vigor router equips with URL Content Filter
not only to limit illegal traffic from/to the inappropriate web sites but also prohibit other web
feature where malicious code may conceal.
Once a user type in or click on an URL with objectionable keywords, URL keyword blocking
facility will decline the HTTP request to that web page thus can limit user’s access to the
website. You may imagine URL Content Filter as a well-trained convenience-store clerk
who won’t sell adult magazines to teenagers. At office, URL Content Filter can also provide
a job-related only environment hence to increase the employee work efficiency. How can
URL Content Filter work better than traditional firewall in the field of filtering? Because it
checks the URL strings or some of HTTP data hiding in the payload of TCP packets while
legacy firewall inspects packets based on the fields of TCP/IP headers only.
VigorPro5510 Series User’s Guide
95
On the other hand, Vigor router can prevent user from accidentally downloading malicious
codes from web pages. It’s very common that malicious codes conceal in the executable
objects, such as ActiveX, Java Applet, compressed files, and other executable files. Once
downloading these types of files from websites, you may risk bringing threat to your system.
For example, an ActiveX control object is usually used for providing interactive web feature.
If malicious code hides inside, it may occupy user’s system.
Web Filtering
We all know that the content on the Internet just like other types of media may be
inappropriate sometimes. As a responsible parent or employer, you should protect those in
your trust against the hazards. With Web filtering service of the Vigor router, you can protect
your business from common primary threats, such as productivity, legal liability, network and
security threats. For parents, you can protect your children from viewing adult websites or
chat rooms.
Once you have activated your Web Filtering service in Vigor router and chosen the categories
of website you wish to restrict, each URL address requested (e.g.www.bbc.co.uk) will be
checked against our server database. This database is updated as frequent as daily by a global
team of Internet researchers. The server will look up the URL and return a category to your
router. Your Vigor router will then decide whether to allow access to this site according to the
categories you have selected. Please note that this action will not introduce any delay in your
Web surfing because each of multiple load balanced database servers can handle millions of
requests for categorization.
Note: The priority of URL Content Filter is higher than Web Content Filter.
96
VigorPro5510 Series User’s Guide
3.6.1 APP Enforcement Profile
You can define policy profiles for IM (Instant Messenger)/P2P (Peer to Peer)/Protocol
application. This page allows you to set 32 profiles for different requirements. The APP
Enforcement Profile will be applied in Default Rule of Firewall>>General Setup for
filtering.
Set to Factory Default
Clear all profiles.
Profile
Display the number of the profile which allows you to click to
set different policy.
Name
Display the name of the APP Enforcement Profile.
Click the number under Index column for settings in detail.
Profile Name
Type a name for the CSM profile.
Each profile can contain three objects settings, IM Object, P2P Object and Misc Object.
Such profile can be applied in the Firewall>>General Setup and Firewall>>Filter Setup
pages as the standard for the host(s) to follow.
3.6.2 URL Content Filter Profile
Based on the list of user defined keywords, the URL Content Filter facility in Vigor router
inspects the URL string in every outgoing HTTP request. No matter the URL string is found
VigorPro5510 Series User’s Guide
97
full or partial matched with a keyword, the Vigor router will block the associated HTTP
connection.
For example, if you add key words such as “sex”, Vigor router will limit web access to web
sites or web pages such as “www.sex.com”, ”www.backdoor.net/images/sex/p_386.html”.
Or you may simply specify the full or partial URL such as “www.sex.com” or “sex.com”.
Also the Vigor router will discard any request that tries to retrieve the malicious code.
Click CSM and click URL Content Filter to open the profile setting page.
You can set eight profiles as URL content filter. Simply click the index number under Profile
to open the following web page.
Profile Name
Type the name for such profile.
Priority
It determines the action that this router will apply.
Both: Pass – The router will let all the packages that match with
the conditions specified in URL Access Control and Web Feature
below passing through. When you choose this setting, both
98
VigorPro5510 Series User’s Guide
configuration set in this page for URL Access Control and Web
Feature will be inactive.
Both:Block –The router will block all the packages that match
with the conditions specified in URL Access Control and Web
Feature below. When you choose this setting, both configuration
set in this page for URL Access Control and Web Feature will be
inactive.
Either: URL Access Control First – When all the packages
matching with the conditions specified in URL Access Control and
Web Feature below, such function can determine the priority for
the actions executed. For this one, the router will process the
packages with the conditions set below for URL first, then Web
feature second.
Either: Web Feature First –When all the packages matching with
the conditions specified in URL Access Control and Web Feature
below, such function can determine the priority for the actions
executed. For this one, the router will process the packages with
the conditions set below for web feature first, then URL second.
Log
None – There is no log file will be recorded for this profile.
Pass – Only the log about Pass will be recorded in Syslog.
Block – Only the log about Block will be recorded in Syslog.
All – All the actions (Pass and Block) will be recorded in Syslog.
URL Access Control
Enable URL Access Control - Check the box to activate URL
Access Control. Note that the priority for URL Access Control is
higher than Restrict Web Feature. If the web content match the
setting set in URL Access Control, the router will execute the
action specified in this field and ignore the action specified under
Restrict Web Feature.
Prevent web access from IP address - Check the box to deny any
web surfing activity using IP address, such as http://202.6.3.2. The
reason for this is to prevent someone dodges the URL Access
Control. You must clear your browser cache first so that the URL
content filtering facility operates properly on a web page that you
visited before.
Action – This setting is available only when Either: URL Access
Control First or Either: Web Feature First is selected. Pass Allow accessing into the corresponding webpage with the
keywords listed on the box below.
Block - Restrict accessing into the corresponding webpage with the
keywords listed on the box below.
If the web pages do not match with the keyword set here, it will be
processed with reverse action.
VigorPro5510 Series User’s Guide
99
Group/Object Selections – The Vigor router provides several
frames for users to define keywords and each frame supports
multiple keywords. The keyword could be a noun, a partial noun,
or a complete URL string. Multiple keywords within a frame are
separated by space, comma, or semicolon. In addition, the maximal
length of each frame is 32-character long. After specifying
keywords, the Vigor router will decline the connection request to
the website whose URL string matched to any user-defined
keyword. It should be noticed that the more simplified the blocking
keyword list, the more efficiently the Vigor router perform.
Web Feature
Enable Restrict Web Feature - Check this box to make the
keyword being blocked or passed.
Action - This setting is available only when Either : URL Access
Control First or Either : Web Feature Firs is selected. Pass
allows accessing into the corresponding webpage with the
keywords listed on the box below.
Pass - Allow accessing into the corresponding webpage with the
keywords listed on the box below.
Block - Restrict accessing into the corresponding webpage with the
keywords listed on the box below.
If the web pages do not match with the specified feature set here, it
will be processed with reverse action.
Cookie - Check the box to filter out the cookie transmission from
inside to outside world to protect the local user's privacy.
Proxy - Check the box to reject any proxy transmission. To control
efficiently the limited-bandwidth usage, it will be of great value to
100
VigorPro5510 Series User’s Guide
provide the blocking mechanism that filters out the multimedia
files downloading from web pages.
Upload – Check the box to reject any file upload job.
File Extension Profile – Choose one of the profiles that you
configured in Object Setting>> File Extension Objects
previously for passing or blocking the file downloading.
3.6.3 Web Content Filter Profile
There are three ways to activate WCF on vigor router, using Service Activation Wizard, by
means of CSM>>Web Content Filter Profile or via System Maintenance>>Activation.
Service Activation Wizard allows you to use trial version or update the license of WCF
directly without accessing into the server (MyVigor) located on http://myvigor.draytek.com.
However, if you use the Web Content Filter Profile page to activate WCF feature, it is
necessary for you to access into the server (MyVigor) located on http://myvigor.draytek.com.
Therefore, you need to register an account on http://myvigor.draytek.com for using
corresponding service. Please refer to section 4.1 for more information of creating MyVigor
account.
Note: If you have used Service Activation Wizard to activate WCF service, you
can skip this section.
WCF adopts the mechanism developed and offered by certain service provider (e.g.,
DrayTek). No matter activating WCF feature or getting a new license for web content filter,
you have to click Activate to satisfy your request. Be aware that service provider matching
with VigorPro5510 currently offers a period of time for trial version for users to experiment.
If you want to purchase a formal edition, simply contact with the channel partner or your
dealer.
Click CSM and click Web Content Filter Profile to open the profile setting page. The
default setting for Setup Query Server /Setup Test Server is auto-selected. You can choose
another server for your necessity by clicking Find more to open http://myvigor.draytek.com
for searching another qualified and suitable one. Next, click the link of Test a site to verify
whether it is categorized to do the verification.
VigorPro5510 Series User’s Guide
101
Activate
Click it to access into MyVigor for activating WCF service.
Setup Query Server
It is recommend for you to use the default setting, auto-selected.
You need to specify a server for categorize searching when you
type URL in browser based on the web content filter profile.
Setup Test Server
It is recommend for you to use the default setting, auto-selected.
By the way, you can click the link of Test a site to verify
whether it is categorized to access into the test server selected.
Find more
Click it to open http://myvigor.draytek.com for searching
another qualified and suitable server.
Set to Factory Default
Click this link to retrieve the factory settings.
Cache
None – the router will check the URL that the user wants to
access via WCF precisely, however, the processing rate is
normal. Such item can provide the most accurate URL
matching.
L1 – the router will check the URL that the user wants to access
via WCF. If the URL has been accessed previously, it will be
stored for a short time (about 1 second) in the router to be
accessed quickly if required. Such item can provide accurate
URL matching with faster rate.
L2 – the router will check the URL that the user wants to access
via WCF. If the data has been accessed previously, the IP
addresses of source and destination IDs will be memorized for a
short time (about 1 second) in the router. When the user tries to
access the same destination ID, the router will check it by
comparing the record stored. If it matches, the page will be
retrieved quickly. Such item can provide URL matching with
the fastest rate.
L1+L2 Cache – the router will check the URL with fast
102
VigorPro5510 Series User’s Guide
processing rate combining the feature of L1 and L2.
Eight profiles are provided here as Web content filters. Simply click the index number under
Profile to open the following web page. The items listed in Categories will be changed
according to the different service providers. If you have and activate another web content
filter license, the items will be changed simultaneously. All of the configuration made for
web content filter will be deleted automatically. Therefore, please backup your data before
you change the web content filter license.
Profile Name
VigorPro5510 Series User’s Guide
Type a name for such profile.
103
Log
None – There is no log file will be recorded for this profile.
Pass – Only the log about Pass will be recorded in Syslog.
Block – Only the log about Block will be recorded in Syslog.
All – All the actions (Pass and Block) will be recorded in Syslog.
White/Black List
Enable – Activate white/black list function for such profile.
Group/Object Selections – Click Edit to choose the group or
object profile as the content of white/black list.
Pass - allow accessing into the corresponding webpage with the
characters listed on Group/Object Selections. If the web pages do
not match with the specified feature set here, they will be
processed with the categories listed on the box below.
Block - restrict accessing into the corresponding webpage with the
characters listed on Group/Object Selections.
If the web pages do not match with the specified feature set here,
they will be processed with the categories listed on the box below.
Action
Pass - allow accessing into the corresponding webpage with the
categories listed on the box below.
Block - restrict accessing into the corresponding webpage with the
categories listed on the box below.
If the web pages do not match with the specified feature set here, it
will be processed with reverse action.
104
VigorPro5510 Series User’s Guide
3.7 Defense Configuration
This menu allows you to set profiles for, activate and upgrade the service of
Anti-Intrusion/Anti-Virus in your system.
3.7.1 Anti-Intrusion
Anti-Intrusion allows you to prevent the intrusion from hackers while accessing into Internet.
It can detect the intrusion and execute basic defense.
There are more than 200 basic rules for anti-intrusion and anti-virus for this router. To
acquire more rules for anti-intrusion, it is suggested for you to register your router by
entering www.vigorpro.com. When you finished the registration, you can get and activate a
wide range of anti-intrusion rules from the website. In addition, you will be allowed to
download/update new rules (if they are released) from the websites lately (during the valid
time of the license key you purchased) after completing the registration.
You are allowed to use trial version with anti-intrusion and anti-virus features for 30 days
after you register for the router. And you will be noticed with an e-mail while it is going to
expire.
3.7.1.1 Basic Setup
Basic Setup page lets you to enable the anti-intrusion service and choose the suitable level
for the detection.
VigorPro5510 Series User’s Guide
105
Anti-Intrusion Control
Setup
This field will display the signature version of this router.
The default signature version is “basic”. In this version, you
can modify the settings for Anti-Intrusion rules in Defense
Configuration>>Anti-Intrusion >>Advanced Setup page.
However, if you restart/reset the router, all the modified
configurations for the rules will not be available and return to
the default settings. Except “basic”, the modified
configurations for other signature versions are available all
the time after you saved them in Defense
Configuration>>Anti-Intrusion >>Advanced Setup page.
Enable Anti-Intrusion
Service
Check this box to enable the anti-intrusion function.
High Security
Click this radio button to activate the anti-intrusion service
with overall detecting conditions. That is, the router will
detect and block the incoming/outgoing packets which match
all the severity rules, including high, medium and low. The
degree of severity for each rule is defined in Advance Setup.
Medium Security
Click this radio button to activate the anti-intrusion service
with medium detecting conditions. That is, the router will
detect and block the incoming/outgoing packets which match
the highest and medium severity rules. The degree of severity
for each rule is defined in Advance Setup.
Low Security
Click this radio button to activate the anti-intrusion service
with minimum detecting conditions. That is, the router will
detect and block the incoming/outgoing packets which match
the highest severity rules. The degree of severity for each rule
is defined in Advanced Setup.
Enable Pass processing
Click this radio button to detect if there is any intrusion
occurrence for your reference. The system will not do any
advanced action for such condition.
Enable Disallow processing Click this radio button to block the incoming/outgoing packets
with possible intrusion actions transmitting through the router.
106
VigorPro5510 Series User’s Guide
Enable Reset procession
Click this radio button to break down the communication
between your computer and specific link which might have
intrusion actions.
3.7.1.2 Advanced Setup
This page lists all the available types and allows you to adjust the rule setting for each type.
The rules will be applied by the options chosen in the page of Defense
Configuration>>Anti-Intrusion>>Basic Setup for Anti-Intrusion.
SID/Name
To find the specific type of anti-intrusion, you can type its
SID number or name in this field if you know, and then click
Search. The system will locate that type for you.
Search
It can help the user to find out specific anti-intrusion rule
quickly.
Type links
Click any anti-intrusion type link to access into next page for
configuring the rules settings. Here we provide several rules
for each type. The factory types and rules for anti-intrusion are
shown in this page. If you want to acquire more types and
rules, please go to www.vigorpro.com and finish the
registration work. Later, the wide range of anti-intrusion types
will be added into this page.
After you click any one of type links, you can access into the rules setup page for activating
rules. We take the type of BO as an example. Below is the rules setup page for BO type.
For the detailed information about the full name, meaning of each rule and/or type, you can
click the name link list on the Anti-Intrusion Rules Setup page to connect VigorPro webpage
for viewing.
VigorPro5510 Series User’s Guide
107
Enable
Check to enable this rule. If you uncheck this box, the
corresponding settings for the rule will not be executed.
SID
The number for each anti-intrusion rule is displayed in this
field.
Name
A brief description name for the anti-intrusion rule is shown in
this field. Click the name link to access into VigorPro website
for checking the detailed information for the specified antiintrusion.
Severity
It means the degree of the influence for this type to the
computer, machine, network and environment.
H: representing that this type will cause severest effect which
must crash/destroy your computer.
M: representing that this type will cause severer effect which
might crash your computer.
L: representing that this type will cause small effect which
might not crash your computer.
Log
In order to show the detection log with such rule on the
window of Draytek Syslog, you have to check the log box
here and enable the SysLog Access Setup from System
Maintenance >> Syslog/Mail Alert.
Action
Pass - Click this radio button to detect if there is any intrusion
occurrence for your reference. The system will not do any
advanced action for such condition.
Disallow - Click this radio button to block the
incoming/outgoing packets with possible intrusion actions
transmitting through the router.
Reset - Click this radio button to break down the
communication between your computer and specific link
which might have intrusion actions.
Default - Click this radio button to execute the anti-intrusion
detection according to the setting that you set in Basic Setup.
108
VigorPro5510 Series User’s Guide
Page
Type the page number in this field (if there is more than one
page of anti-virus detail view displayed on this page). Then
click Go to the specified page. Or you can click ⏐>, >>, << or
>⏐ button on the right side of the Go button to access to the
home/previous/next/end page.
3.7.2 Anti-Virus
Vigor router can offer basic virus scanning, destroying and cut off the connection between
questionable link and your computer for the files transmitted through specified protocol. In
addition, several types of compressed file formats such as .zip, .gzip, .bzip2 are supported
and can be scanned with this router. There is no limitation in the file size for the transmitted
(incoming or outgoing) file. With this feature, all the files processed with the protocol
specified in Anti-Virus web page will be scanned for finding out virus while passing through
the router.
Note: Files with three-layer compression (the files are compressed with three times) also
can be scanned by this router.
3.7.2.1 Profile Setting
This page allows you to set eight profiles for anti-virus scanning. These profiles can be
invoked through firewall configuration. It is recommended to build one profile at least. Thus
you will have selectable anti-virus profile setting in Firewall->General Setup.
The Administration Message box allows you to fill in important notification directly for
SMTP and POP3 protocols. It will be saved as a file. While receiving an e-mail, the user will
receive an attached file with the content listed in this box.
To edit a profile setting, please click the number link under Profile. You can see the
following screen. You can check the boxes listed below for different operation respectively.
If you uncheck this box, the corresponding settings for the protocol will not be performed.
VigorPro5510 Series User’s Guide
109
Profile Name
Type a name for the profile.
Protocol
Currently, only the files transmitted through the protocols
listed in this page including SMTP, POP3, IMAP, HTTP
and FTP will be scanned by this router.
Action
Choose the action that you want to apply to the protocols of
each operation.
Pass - Detect if there is any virus for your reference. The
system will not do any advanced action for such condition.
Destroy- Destroy the infected file found by the router system.
However, the file will be downloaded still.
Reset - Break down the communication between your
computer and specific link which might have virus included.
Enable Virus Scan
Check this box to enable the general virus scan procedure for
different protocols.
Enable Log
In order to show the virus detection log on the window of
Draytek Syslog, you have to check the log box here and
enable the SysLog Access Setup from System Maintenance
>> Syslog/Mail Alert.
110
VigorPro5510 Series User’s Guide
Detect Macro Attachment
The file with macro attachment will be passed/destroyed/reset
under different protocols. The system will detect it
automatically if you set corresponding configuration here.
Detect Encrypted Zipped
Files
The file zipped with encryption will be detected and then be
passed/destroyed/reset according to the configuration set
here.
Detect Suspicious
Compression
The file with suspicious or non-support compression format
will be detected and then be passed/destroyed/reset according
to the configuration set here.
Compression Ratio
Threshold
Choose one of the compression ration selections as the
threshold for the system to block or pass the file compressed
with the ratio specified here.
Append Message
This function is available for SMTP and POP3 protocols. If
you check it, the message typed under the box of
Administration Message will be sent out with e-mail.
File Filter
Click this link to open Defense Configuration>>Anti-Virus
>>File Pattern List for viewing current settings.
Block Fragmented Mail
The file with fragmentations will be passed/destroyed/reset
under different protocols. The router cannot execute the
scanning job for some mail fragmentation if you check the
boxes here.
Block Multiple Sessions
Download
The file with multiple sessions which are created by HTTP
will be detected and then be passed/destroyed/reset according
to the configuration set here.
3.7.2.2 Virus List
This page displays the virus list ordered by digits (0-9) and letters (A-Z). Each number after
the letter link indicates the total types of the virus collected.
VigorPro5510 Series User’s Guide
111
SID/NAME
To find the specific type of anti-virus, you can type its SID
number or name in this field if you know, and then click
Search. The system will locate that rule for you.
Search
Click this button to find out all the virus rules related to the
SID/NAME that you entered. The page of the searching result
will be shown as the following picture.
Click each name link to check the detailed information of the
anti-virus rule.
Detailed View for Anti-Virus
From the fourteen types of anti-virus list, click any one of them to access into next page. The
detailed view list for anti-virus rule will be shown as below.
112
VigorPro5510 Series User’s Guide
NAME
A brief description name for the anti-virus rule is shown in
this field. Click the name link to access into VigorPro website
for checking the detailed information for the specified
anti-virus.
SID
The number for each anti-virus rule is displayed in this field.
Page
Type the page number in this field (if there is more than one
page of anti-virus detail view displayed on this page). Then
click Go to the specified page. Or you can click ⏐>, >>, << or
>⏐ button on the right side of the Go button to access to the
home/previous/next/end page.
3.7.2.3 File Filter Profile
To avoid confidential file being leaked out by someone else through network and cause
severe consequence, you can specify the file name in this page and determine to destroy or
scan or pass it while the file passes through the router.
Before activating the File Filter Profile, you have to set one Anti-Virus profile on Defense
Configuration>>Anti-Virus>>Profile Setting. Also you can specify file names without
virus appended to be ignored by anti-virus server to improve the performance.
This page allows you to set 32 entries (rules) of file names to be filtered by the router. In
such case, the file format is ignored. The router will destroy, scan or non-scan the specified
filename according to the configuration that you set here.
VigorPro5510 Series User’s Guide
113
Click any number link to open the configuration page. Below is the page of File Filter
Profile. The priority of each entry is determined by the index number. That is, the entry of
Index 1 has the highest priority in file name filtering; the entry of Index 32 has the lowest
priority in filtering.
Profile Name
Type a name for such profile.
Priority
Such item determines which profile will be executed first. If
you choose File Extension First, Vigor router will filter the
virus based on the file extension profile selected first, next
filter the virus based on the keyword later; vice versa.
Default Action
Choose one of the actions (Scan, Non-Scan, Destroy) as the
default action if the file does not meet the conditions
configured below.
Keyword
You can set three sets of keywords for this profile.
Action Choose the action that you want to apply to the selected
keyword.
Destroy- Destroy the file with name specified here which is
found by the router system.
Non-Scan –The file will not be scanned and will not be
processed by using general rules set in Anti-Virus profile.
Scan – Just scan the file with name specified here which is
found by the router system, and be processed by using general
rules set in Anti-Virus profile.
Group/Object Selections - Click Edit to choose the preset
keyword groups and/or objects.
File Extension
Determine the filtering condition for downloading files.
Action Choose the action that you want to apply to the selected file
extension profile.
Destroy- Destroy the file with name specified here which is
114
VigorPro5510 Series User’s Guide
found by the router system.
Non-Scan –The file will not be scanned and will not be
processed by using general rules set in Anti-Virus profile.
Scan – Just scan the file with name specified here which is
found by the router system, and be processed by using general
rules set in Anti-Virus profile.
Profile – Use the drop down list to specify one profile to be
executed as filtering condition.
Destroy the file if the file
name is over length
Check this box to destroy the file with filename over 76
characters.
Syslog/Mail Alert
Specify the condition for the system to send Syslog/Mail
Alert for the default action.
None – No action will be recorded in Syslog.
Match Only- Only the log that matching with the above
condition will be recorded in Syslog.
No-Match Only – Only the log that not matching with the
above condition will be recorded in Syslog.
Both – All the actions will be recorded in Syslog.
Click OK to finish the page configuration.
VigorPro5510 Series User’s Guide
115
3.7.3 Anti-Spam
Many people suffer with unwanted mails coming from everywhere. Such device offers a
mechanism, named Anti-Spam, to do basic scanning for filtering unnecessary mails and
sorting the mails.
To activate function of Anti-Spam, you have to configure profile(s) for your computer
first.
3.7.3.1 Profile Setting
Open Defense Configuration>>Anti- Spam>>Profile Setting menu to access into the
following page. There are sixteen profiles provided by this system for you to define.
Profile (1 ~16)
Name
There are sixteen profiles provided for you to define. Simply
click the number link under Profile, the setting page for that
number will be open for you to configure.
List the name for the profile setting.
Simply click number under Profile item. The detailed page will be shown right away. The
following graphic is the web page for the profile marked with number 1.
116
VigorPro5510 Series User’s Guide
Profile Name
Type a name for such profile setting.
Choose Protocol to Scan
Spam
Spam files usually come with protocol of SMTP or POP3.
Please check the box that you want to avoid. It would be
better to check both protocols. In addition, you can check
Log All Mail Events to send record of all mail events to
syslog.
Enable SPAM Grey List
Defense
Grey List is a method for e-mail against spam. A mail
transfer agent (MTA) using grey list will "temporarily
reject" any email from a sender it does not recognize. If the
mail is legal, the server will check it again and the email will
be accepted. If the mail is from a spammer, it will probably
not be retried since a spammer goes through thousands of
email addresses and can not afford the time delay to retry.
Check this button to enable SPAM grey list defense
function.
In addition, you can check Log Grey List Events to send
record of events to syslog.
Enable Black/White List
Check this box to enable black and white list settings.
Priority Selection – Choose Pass First for passing the
mails matching with Black and White List first, or choose
Destroy First for destroying the content of mail matching
with Black and White List first.
Log Matched Events - Check this box to record all the
matched events of mails on Syslog.
Action – Determines the action (Pass or Destroy) for the
VigorPro5510 Series User’s Guide
117
emails coming from the sender, or for the emails sending out
from the receiver, or for the subject with the keyword
selected here.
Group/Object Selections – Choose a suitable group or
object for passing or blocking. Click Edit to open the
following dialog. The keyword/group that you have set on
Object Settings>>Keyword Object/ Object
Settings>>Keyword Group will be displayed here for you
to choose.
Destroy Tag Message (Max 30 characters) – Type the
character(s) as a tag for destroying.
Enable Anti-Spam Server
Query (Need license)
Mails would be judged and categorized into Spam, Bulk or
normal mails. For the one that is confirmed as spam will be
processed with the rule of Spam; and the one that is
probably spam will be processed with the rule of Bulk.
Please set different process action for Spam and Bulk
respectively.
Action –When the system fails due to system timeout or
network problem, you can specify specific action (Pass or
Tag) for the system to execute immediately. Choose the
action (Pass, Tag or Reset) for the spam, bulk and time out
emails.
Pass – Choose this action to make all mails passing
through.
Tag - Choose this action to make all mails be tagged with
certain words for you to identify easily. For example, type
“SPAM” on the box of Message. If the subject of some mail
is “license page” and it is judged as spam, then it will be
118
VigorPro5510 Series User’s Guide
shown as “***SPAM*** license page” in your mail box.
Such tag can help users to identify which mail is useful or
useless quickly.
Reset – Choose this action to disconnect the network. It is
mainly applied on SMTP server.
Log - Check the box to have the process record stated on
Syslog.
Message - Type words which will be placed before the
subject of mail and help you to identify.
Clear
Delete the settings configured above and reset to default
settings.
Cancel
Delete the settings configured above and return to previous
page.
Click OK to finish the page configuration.
3.7.3.2 Grey List Detail Setting
Grey List is a method for e-mail against spam. A mail transfer agent (MTA) using grey list
will "temporarily reject" any email from a sender it does not recognize. If the mail is legal,
the server will check it again and the email will be accepted. If the mail is from a spammer, it
will probably not be retried since a spammer goes through thousands of email addresses and
can not afford the time delay to retry.
This page allows user to set conditions to block mails coming from outside. Basically, the
incoming mails will be regarded as malice and must be blocked. However, mails sent out by
the host will be regarded as normal and no limitation will be set for them.
Sender E-Mail Address
Type the e-mail address of the sender.
Receiver E-Mail Address
Type the e-mail address of the receiver.
Sender IP
Specify the sender’s IP for blocking with grey list.
Initial Delay Time
Type the time of initial delay for mail checking.
White List Accept Time
Type the time for mail tracing with white list.
VigorPro5510 Series User’s Guide
119
White List Timeout (sec)
Type the timeout for mail checking with white list.
Set
Click to save and invoke the timer setting.
3.7.4 Activation for Anti-Intrusion/Anti-Virus/Anti-Spam/Web-Filter
Service
After you have finished the profile settings, it is the time to activate the mechanism for your
computer. Click Defense Configuration>>Activation to open the following page for
accessing http://myvigor.draytek.com.
Activate via interface Choose WAN interface used by such device for activating Web
Content Filter.
Activate
The Activate link brings you accessing into www.vigorpro.com to
finish the activation of the account and the router.
Authentication
Message
As for authentication information of web filter,
Anti-Intrusion/Anti-Virus/Anti-Spam, the process of
authenticating will be displayed on this field for your reference.
Below shows the successful activation of AI/AV/AS/Web Content Filter:
120
VigorPro5510 Series User’s Guide
VigorPro5510 Series User’s Guide
121
3.7.5 AI/AV Auto Block
This page can determine the block standard for data transmission based on the AI/AV auto
block setting. In another word, when the host is attacked over the count number set here, the
system will block the data transmission from the source IP automatically for security.
Limitation List displays the specific limitations that you set in this web page.
Enable/Disable
Click Enable to activate AI/AV Count Setting. The AI/AV auto
block setting result will be seen in Diagnostics>>LAN Security
Monitor. Default setting is Disable.
General Setup
Settings configured here will be applied for most of the defense
events (intrusion/virus) except settings configured in Specific
Limitation.
AI Count – type the number for the system to block the connection
of the source IP for AI events.
Severity – choose Low, Medium or High for the system to block
the connection of the source IP for AI and AV events.
AV Count – type the number for the system to block the connection
of the source IP for AV events.
122
VigorPro5510 Series User’s Guide
Time Interval – type the time for the system to wait and execute the
action of blocking,
Limitation List
This field displays the information for specific limitation.
Specific Limitation
Users can specify clients on LAN and let the router count AI/AV
event in certain range by specifying start IP, end IP, AI count, AV
count, time interval and etc.
Start IP/End IP – Specify the range for specific limitation (starting
IP and ending IP).
AI Count – type the number for the system to block the connection
of the source IP (within the range of specific limitation) for AI
events.
AV Count – type the number for the system to block the connection
of the source IP (within the range of specific limitation) for AV
events.
Time Interval – type the time for the system to wait and execute the
action of blocking,
Add – Click this button to add one new condition for AI/AV count
to the list above.
Edit – Click this button to modify selected item listed on Limitation
List.
Delete – Click this button to delete the selected item listed on
Limitation List.
Index (1-15) in
Schedule Setup
You can type in four sets of time schedule for your request. All the
schedules can be set previously in Application >> Schedule web
page and you can use the number that you have set in that web
page.
VigorPro5510 Series User’s Guide
123
3.7.6 Signature Upgrade
You can get the most updated signature from DrayTek’s server if the license key of
anti-virus/anti-intrusion for the VigorPro 5510 is not expired. Before you upgrade the
signature, please check the validation information either from WEB user interface of
VigorPro 5510 or account information from www.vigorpro.com.
Signature Upgrade
Setting
It displays the signature version for your reference. There are three
levels for the signature:
basic – If you did not register and activate your account, you can
just own the default 200 (or more) anti-intrusion and anti-virus
rules for your router.
DT-DT/DT-KL_XXXXXX – If you have registered and activated
your AI/AV account, and downloaded the newest rules from
www.vigorpro.com, you can see DT-DT/DT-KL in this field that
means you have obtained the latest signature information.
Upgrade via
Interface
Choose WAN interface used by such device for upgrading
signature.
Setup download
server/Setup query
server
The default setting is auto-selected. You can change the setting if it
is required to be. Click the find more link to get more information.
124
VigorPro5510 Series User’s Guide
It displays the message of signature authentication or download
Signature
authentication/downl procedure.
oad message
Upgrade Manually
The buttons in this field are only available when you finished the
registration and activation for new account and your router. If not,
these buttons do not have any effect even if you click them.
Import – You can import a saved file to manually upgrade the
signature. Click Browse to choose the right file with .sig file
format. Next, click Upgrade.
Backup - You can backup current signature information with the
filename vigorpro.sig.
Download Now!!! – This button will download newly update
anti-intrusion and anti-virus from VigorPro website. While
downloading the file, a progress bar will be shown as follows.
After downloading is finished, the signature version will be
upgraded and displayed on the web page.
VigorPro5510 Series User’s Guide
125
Upgrade
Automatically
Specify certain time for executing the upgrade automatically.
Remember to check the Scheduled Update box to activate the time
settings.
Every – It means the downloading procedure will be executed
automatically whenever passing through the time (hours and
minutes) that you set here.
Daily - It means the downloading procedure will be automatically
executed every day at the time (hours and minutes) that you set
here.
Weekly - It means the downloading procedure will be
automatically executed at the time (hours and minutes) that you set
here every week.
126
VigorPro5510 Series User’s Guide
Below shows an example with DT-KL signature used.
3.7.7 Status
This field will shows the status for the license, start date and expire date for
Anti-Intrusion/Anti-Virus service. If your account or router is still not activated, the word
Not Activated will be displayed here to inform you.
VigorPro5510 Series User’s Guide
127
Below is a sample page with valid license.
3.8 Bandwidth Management
Below shows the menu items for Bandwidth Management.
3.8.1 Sessions Limit
A PC with private IP address can access to the Internet via NAT router. The router will
generate the records of NAT sessions for such connection. The P2P (Peer to Peer)
applications (e.g., BitTorrent) always need many sessions for procession and also they will
occupy over resources which might result in important accesses impacted. To solve the
problem, you can use limit session to limit the session procession for specified Hosts.
In the Bandwidth Management menu, click Sessions Limit to open the web page.
128
VigorPro5510 Series User’s Guide
To activate the function of limit session, simply click Enable and set the default session
limit.
Enable
Click this button to activate the function of limit session.
Disable
Click this button to close the function of limit session.
Default session limit
Defines the default session number used for each computer in
LAN.
Limitation List
Displays a list of specific limitations that you set on this web
page.
Start IP
Defines the start IP address for limit session.
End IP
Defines the end IP address for limit session.
Maximum Number
Defines the available session number for each host in the
specific range of IP addresses. If you do not set the session
number in this field, the system will use the default session
limit for the specific limitation you set for each index.
Add
Adds the specific session limitation onto the list above.
Edit
Allows you to edit the settings for the selected limitation.
Delete
Delete the selected settings existing on the limitation list.
Index (1-15) in Schedule
Setup
You can type in four sets of time schedule for your request.
All the schedules can be set previously in Application >>
Schedule web page and you can use the number that you
have set in that web page.
3.8.2 Bandwidth Limit
The downstream or upstream from FTP, HTTP or some P2P applications will occupy large
of bandwidth and affect the applications for other programs. Please use Limit Bandwidth to
make the bandwidth usage more efficient.
VigorPro5510 Series User’s Guide
129
In the Bandwidth Management menu, click Bandwidth Limit to open the web page.
To activate the function of limit bandwidth, simply click Enable and set the default upstream
and downstream limit.
Enable
Click this button to activate the function of limit bandwidth.
Apply to 2nd Subnet – if bandwidth limit function is
enabled, please check this box to apply to second subnet.
Disable
Click this button to close the function of limit bandwidth.
Default TX limit
Define the default speed of the upstream for each computer
in LAN.
Default RX limit
Define the default speed of the downstream for each
computer in LAN.
Allow auto adjustment to Router will detect if there is enough bandwidth remained for
make the best utilization of using according to the bandwidth limit set by the user. If yes,
the router will adjust the available bandwidth for users to
available bandwidth.
enhance the total utilization.
Limitation List
Display a list of specific limitations that you set on this web
page.
Start IP
Define the start IP address for limit bandwidth.
End IP
Define the end IP address for limit bandwidth.
Each/Shared
Select Each to make each IP within the range of Start IP and
End IP having the same speed defined in TX limit and RX
limit fields; select Shared to make all the IPs within the
range of Start IP and End IP share the total bandwidth of TX
130
VigorPro5510 Series User’s Guide
limit and RX limit.
TX limit
Define the limitation for the speed of the upstream. If you do
not set the limit in this field, the system will use the default
speed for the specific limitation you set for each index.
RX limit
Define the limitation for the speed of the downstream. If you
do not set the limit in this field, the system will use the
default speed for the specific limitation you set for each
index.
Add
Add the specific speed limitation onto the list above.
Edit
Allow you to edit the settings for the selected limitation.
Delete
Delete the selected settings existing on the limitation list.
Index (1-15) in Schedule
Setup
You can type in four sets of time schedule for your request.
All the schedules can be set previously in Application >>
Schedule web page and you can use the number that you
have set in that web page.
3.8.3 Quality of Service
Deploying QoS (Quality of Service) management to guarantee that all applications receive
the service levels required and sufficient bandwidth to meet performance expectations is
indeed one important aspect of modern enterprise network.
One reason for QoS is that numerous TCP-based applications tend to continually increase
their transmission rate and consume all available bandwidth, which is called TCP slow start.
If other applications are not protected by QoS, it will detract much from their performance in
the overcrowded network. This is especially essential to those are low tolerant of loss, delay
or jitter (delay variation).
Another reason is due to congestions at network intersections where speeds of
interconnected circuits mismatch or traffic aggregates, packets will queue up and traffic can
be throttled back to a lower speed. If there’s no defined priority to specify which packets
should be discarded (or in another term “dropped”) from an overflowing queue, packets of
sensitive applications mentioned above might be the ones to drop off. How this will affect
application performance?
There are two components within Primary configuration of QoS deployment:
z
Classification: Identifying low-latency or crucial applications and marking them for
high-priority service level enforcement throughout the network.
z
Scheduling: Based on classification of service level to assign packets to queues and
associated service types
The basic QoS implementation in Vigor routers is to classify and schedule packets based on
the service type information in the IP header. For instance, to ensure the connection with the
headquarter, a teleworker may enforce an index of QoS Control to reserve bandwidth for
HTTPS connection while using lots of application at the same time.
One more larger-scale implementation of QoS network is to apply DSCP (Differentiated
Service Code Point) and IP Precedence disciplines at Layer 3. Compared with legacy IP
Precedence that uses Type of Service (ToS) field in the IP header to define 8 service classes,
DSCP is a successor creating 64 classes possible with backward IP Precedence compatibility.
In a QoS-enabled network, or Differentiated Service (DiffServ or DS) framework, a DS
domain owner should sign a Service License Agreement (SLA) with other DS domain
owners to define the service level provided toward traffic from different domains. Then each
VigorPro5510 Series User’s Guide
131
DS node in these domains will perform the priority treatment. This is called
per-hop-behavior (PHB). The definition of PHB includes Expedited Forwarding (EF),
Assured Forwarding (AF), and Best Effort (BE). AF defines the four classes of delivery (or
forwarding) classes and three levels of drop precedence in each class.
Vigor routers as edge routers of DS domain shall check the marked DSCP value in the IP
header of bypassing traffic, thus to allocate certain amount of resource execute appropriate
policing, classification or scheduling. The core routers in the backbone will do the same
checking before executing treatments in order to ensure service-level consistency throughout
the whole QoS-enabled network.
However, each node may take different attitude toward packets with high priority marking
since it may bind with the business deal of SLA among different DS domain owners. It’s not
easy to achieve deterministic and consistent high-priority QoS traffic throughout the whole
network with merely Vigor router’s effort.
In the Bandwidth Management menu, click Quality of Service to open the web page.
This page displays the QoS settings result of the WAN interface. Click the Setup link to
access into next page for the general setup of WAN (1/2) interface. As to class rule, simply
click the Edit link to access into next for configuration.
You can configure general setup for the WAN interface, edit the Class Rule, and edit the
Service Type for the Class Rule for your request.
General Setup for WAN Interface
When you click Setup, you can configure the bandwidth ratio for QoS of the WAN interface.
There are four queues allowed for QoS control. The first three (Class 1 to Class 3) class rules
can be adjusted for your necessity. Yet, the last one is reserved for the packets which are not
suitable for the user-defined class rules.
132
VigorPro5510 Series User’s Guide
Enable the QoS Control
The factory default for this setting is checked.
Please also define which traffic the QoS Control settings will
apply to.
IN- apply to incoming traffic only.
OUT-apply to outgoing traffic only.
BOTH- apply to both incoming and outgoing traffic.
Check this box and click OK, then click Setup link again.
You will see the Online Statistics link appearing on this page.
WAN Inbound Bandwidth It allows you to set the connecting rate of data input for WAN.
For example, if your ADSL supports 1M of downstream and
256K upstream, please set 1000kbps for this box. The default
value is 10000kbps.
WAN Outbound Bandwidth It allows you to set the connecting rate of data output for
WAN. For example, if your ADSL supports 1M of
downstream and 256K upstream, please set 256kbps for this
box. The default value is 10000kbps.
Note: The rate of outbound/inbound must be smaller than the real bandwidth to ensure
correct calculation of QoS. It is suggested to set the bandwidth value for inbound/outbound
as 80% - 85% of physical network speed provided by ISP to maximize the QoS
performance.
Reserved Bandwidth Ratio It is reserved for the group index in the form of ratio of
reserved bandwidth to upstream speed and reserved
bandwidth to downstream speed.
Enable UDP Bandwidth
Control
Check this and set the limited bandwidth ratio on the right
field. This is a protection of TCP application traffic since
UDP application traffic such as streaming video will exhaust
lots of bandwidth.
Outbound TCP ACK
Prioritize
The difference in bandwidth between download and upload
are great in ADSL2+ environment. For the download speed
might be impacted by the uploading TCP ACK, you can
check this box to push ACK of upload faster to speed the
network traffic.
VigorPro5510 Series User’s Guide
133
Limited_bandwidth Ratio
The ratio typed here is reserved for limited bandwidth of UDP
application.
Online Statistics
Display an online statistics for quality of service for your
reference. This link will be seen only if you click OK in
WAN1/WAN2 General Setup web page and click Setup again
(for WAN1/WAN2) on the Bandwith
Management>>Quality of Service.
Edit the Class Rule for QoS
The first three (Class 1 to Class 3) class rules can be adjusted for your necessity. To add, edit
or delete the class rule, please click the Edit link of that one.
After you click the Edit link, you will see the following page. Now you can define the name
for that Class. In this case, “Test” is used as the name of Class Index #1.
134
VigorPro5510 Series User’s Guide
For adding a new rule, click Add to open the following page.
ACT
Check this box to invoke these settings.
Local Address
Click the Edit button to set the local IP address (on LAN) for
the rule.
Remote Address
Click the Edit button to set the remote IP address (on
LAN/WAN) for the rule.
Edit
It allows you to edit source address information.
Address Type – Determine the address type for the source
address.
For Single Address, you have to fill in Start IP address.
For Range Address, you have to fill in Start IP address and
End IP address.
For Subnet Address, you have to fill in Start IP address and
Subnet Mask.
DiffServ CodePoint
All the packets of data will be divided with different levels
and will be processed according to the level type by the
system. Please assign one of the level of the data for
processing with QoS control.
Service Type
It determines the service type of the data for processing with
QoS control. It can also be edited. You can choose the
predefined service type from the Service Type drop down list.
Those types are predefined in factory. Simply choose the one
that you want for using by current QoS.
By the way, you can set up to 20 rules for one Class. If you want to edit an existed rule,
please select the radio button of that one and click Edit to open the rule edit page for
modification.
VigorPro5510 Series User’s Guide
135
Edit the Service Type for Class Rule
To add a new service type, edit or delete an existed service type, please click the Edit link
under Service Type field.
After you click the Edit link, you will see the following page.
136
VigorPro5510 Series User’s Guide
For adding a new service type, click Add to open the following page.
Service Name
Type in a new service for your request.
Service Type
Choose the type (TCP, UDP or TCP/UDP) for the new
service.
Port Configuration
Click Single or Range. If you select Range, you have to type
in the starting port number and the end porting number on the
boxes below.
Port Number – Type in the starting port number and the end
porting number here if you choose Range as the type.
By the way, you can set up to 40 service types. If you want to edit/delete an existed service
type, please select the radio button of that one and click Edit/Edit for modification.
VigorPro5510 Series User’s Guide
137
3.9 Applications
Below shows the menu items for Applications.
3.9.1 Dynamic DNS
The ISP often provides you with a dynamic IP address when you connect to the Internet via
your ISP. It means that the public IP address assigned to your router changes each time you
access the Internet. The Dynamic DNS feature lets you assign a domain name to a dynamic
WAN IP address. It allows the router to update its online WAN IP address mappings on the
specified Dynamic DNS server. Once the router is online, you will be able to use the
registered domain name to access the router or internal virtual servers from the Internet. It is
particularly helpful if you host a web server, FTP server, or other server behind the router.
Before you use the Dynamic DNS feature, you have to apply for free DDNS service to the
DDNS service providers. The router provides up to three accounts from three different
DDNS service providers. Basically, Vigor routers are compatible with the DDNS services
supplied by most popular DDNS service providers such as www.dyndns.org,
www.no-ip.com, www.dtdns.com, www.changeip.com, www.dynamic- nameserver.com.
You should visit their websites to register your own domain name for the router.
Enable the Function and Add a Dynamic DNS Account
1.
Assume you have a registered domain name from the DDNS provider, say
hostname.dyndns.org, and an account with username: test and password: test.
2.
In the DDNS setup menu, check Enable Dynamic DNS Setup.
Set to Factory Default
Clear all profiles and recover to factory settings.
Enable Dynamic DNS Setup Check this box to enable DDNS function.
Index
Click the number below Index to access into the setting
page of DDNS setup to set account(s).
WAN Interface
Display current WAN interface used for accessing
Internet.
138
VigorPro5510 Series User’s Guide
3.
Domain Name
Display the domain name that you set on the setting page
of DDNS setup.
Active
Display if this account is active or inactive.
View Log
Display DDNS log status.
Force Update
Force the router updates its information to DDNS server.
Select Index number 1 to add an account for the router. Check Enable Dynamic DNS
Account, and choose correct Service Provider: dyndns.org, type the registered
hostname: hostname and domain name suffix: dyndns.org in the Domain Name block.
The following two blocks should be typed your account Login Name: test and
Password: test.
Enable Dynamic
DNS Account
Check this box to enable the current account. If you did
check the box, you will see a check mark appeared on the
Active column of the previous web page in step 2).
WAN Interface
Select the WAN interface order to apply settings here.
Service Provider
Select the service provider for the DDNS account.
Service Type
Select a service type (Dynamic, Custom, Static). If you choose
Custom, you can modify the domain that is chosen in the
Domain Name field.
Domain Name
Type in the domain name that you applied previously. Use the
drop down list to choose the desired domain.
Login Name
Type in the login name that you set for applying domain.
Password
Type in the password that you set for applying domain.
Wildcards
It is not supported for all Dynamic DNS providers. Please get
more detailed information from its website.
Backup MX
It is not supported for all Dynamic DNS providers. Please get
more detailed information from its website.
Mail Extender
It allows you to control the delivery of mails for a given
domain or subdomain. The entry you type here can be
specified as a secondary mail exchanger. It means that
delivery will be attempted to your host first, and then to the
host you specify here if that fails.
VigorPro5510 Series User’s Guide
139
4.
Click OK button to activate the settings. You will see your setting has been saved.
The Wildcard and Backup MX features are not supported for all Dynamic DNS providers.
You could get more detailed information from their websites.
Disable the Function and Clear all Dynamic DNS Accounts
In the DDNS setup menu, uncheck Enable Dynamic DNS Setup, and push Clear All button
to disable the function and clear all accounts from the router.
Delete a Dynamic DNS Account
In the DDNS setup menu, click the Index number you want to delete and then push Clear
All button to delete the account.
3.9.2 Schedule
The Vigor router has a built-in real time clock which can update itself manually or
automatically by means of Network Time Protocols (NTP). As a result, you can not only
schedule the router to dialup to the Internet at a specified time, but also restrict Internet
access to certain hours so that users can connect to the Internet only during certain hours, say,
business hours. The schedule is also applicable to other functions.
You have to set your time before set schedule. In System Maintenance>> Time and Date
menu, press Inquire Time button to set the Vigor router’s clock to current time of your PC.
The clock will reset once if you power down or reset the router. There is another way to set
up time. You can inquiry an NTP server (a time server) on the Internet to synchronize the
router’s clock. This method can only be applied when the WAN connection has been built
up.
Set to Factory Default
Clear all profiles and recover to factory settings.
Index
Click the number below Index to access into the setting page
of schedule.
Status
Display if this schedule setting is active or inactive.
You can set up to 15 schedules. Then you can apply them to your Internet Access or VPN
and Remote Access >> LAN-to-LAN settings.
To add a schedule, please click any index, say Index No. 1. The detailed settings of the call
schedule with index 1 are shown below.
140
VigorPro5510 Series User’s Guide
Enable Schedule Setup
Check to enable the schedule.
Start Date (yyyy-mm-dd)
Specify the starting date of the schedule.
Start Time (hh:mm)
Specify the starting time of the schedule.
Duration Time (hh:mm)
Specify the duration (or period) for the schedule.
Action
Specify which action Call Schedule should apply during the
period of the schedule.
Force On -Force the connection to be always on.
Force Down -Force the connection to be always down.
Enable Dial-On-Demand -Specify the connection to be
dial-on-demand and the value of idle timeout should be
specified in Idle Timeout field.
Disable Dial-On-Demand -Specify the connection to be up
when it has traffic on the line. Once there is no traffic over
idle timeout, the connection will be down and never up again
during the schedule.
Idle Timeout
Specify the duration (or period) for the schedule.
How often -Specify how often the schedule will be applied
Once -The schedule will be applied just once
Weekdays -Specify which days in one week should perform
the schedule.
Example
Suppose you want to control the PPPoE Internet access connection to be always on (Force
On) from 9:00 to 18:00 for whole week. Other time the Internet access connection should be
disconnected (Force Down).
Office
Hour:
(Force On)
Mon - Sun
9:00 am
to
6:00 pm
1.
Make sure the PPPoE connection and Time Setup is working properly.
2.
Configure the PPPoE always on from 9:00 to 18:00 for whole week.
VigorPro5510 Series User’s Guide
141
3.
Configure the Force Down from 18:00 to next day 9:00 for whole week.
4.
Assign these two profiles to the PPPoE Internet access profile. Now, the PPPoE
Internet connection will follow the schedule order to perform Force On or Force
Down action according to the time plan that has been pre-defined in the schedule
profiles.
3.9.3 RADIUS/LDAP
Remote Authentication Dial-In User Service (RADIUS) is a security authentication
client/server protocol that supports authentication, authorization and accounting, which is
widely used by Internet service providers. It is the most common method of authenticating
and authorizing dial-up and tunneled network users.
The built-in RADIUS client feature enables the router to assist the remote dial-in user or a
wireless station and the RADIUS server in performing mutual authentication. It enables
centralized remote access authentication for network management.
Lightweight Directory Access Protocol (LDAP) is a communication protocol for using in
TCP/IP network. It defines the methods to access distributing directory server by clients,
work on directory and share the information in the directory by clients. The LDAP standard
is established by the work team of Internet Engineering Task Force (IETF).
As the name described, LDAP is designed as an effect way to access directory service
without the complexity of other directory service protocols. For LDAP is defined to perform ,
inquire and modify the information within the directory, and acquire the data in the directory
securely, therefore users can apply LDAP to search or list the directory object, inquire or
manage the active directory.
Enable
Check to enable RADIUS client feature
Server IP Address
Enter the IP address of RADIUS server.
Destination Port
The UDP port number that the RADIUS server is using. The
default value is 1812, based on RFC 2138.
142
VigorPro5510 Series User’s Guide
Shared Secret
The RADIUS server and client share a secret that is used to
authenticate the messages sent between them. Both sides
must be configured to use the same shared secret.
Confirm Shared Secret
Re-type the Shared Secret for confirmation.
Common Name Identifier
Type or edit the common name identifier for the LDAP
server. The common name identifier for most LDAP server
is cn.
Distinguished Name
Type or edit the distinguished name used to look up entries
on the LDAP server.
VigorPro5510 Series User’s Guide
143
3.9.4 UPnP
The UPnP (Universal Plug and Play) protocol is supported to bring to network connected
devices the ease of installation and configuration which is already available for directly
connected PC peripherals with the existing Windows 'Plug and Play' system. For NAT
routers, the major feature of UPnP on the router is “NAT Traversal”. This enables
applications inside the firewall to automatically open the ports that they need to pass through
a router. It is more reliable than requiring a router to work out by itself which ports need to
be opened. Further, the user does not have to manually set up port mappings or a DMZ.
UPnP is available on Windows XP and the router provides the associated support for MSN
Messenger to allow full use of the voice, video and messaging features.
Enable UPNP Service
Accordingly, you can enable either the Connection Control
Service or Connection Status Service.
After setting Enable UPNP Service setting, an icon of IP Broadband Connection on
Router on Windows XP/Network Connections will appear. The connection status and
control status will be able to be activated. The NAT Traversal of UPnP enables the
multimedia features of your applications to operate. This has to manually set up port
mappings or use other similar methods. The screenshots below show examples of this
facility.
The UPnP facility on the router enables UPnP aware applications such as MSN Messenger to
discover what are behind a NAT router. The application will also learn the external IP
address and configure port mappings on the router. Subsequently, such a facility forwards
packets from the external ports of the router to the internal ports used by the application.
144
VigorPro5510 Series User’s Guide
The reminder as regards concern about Firewall and UPnP
Can't work with Firewall Software
Enabling firewall applications on your PC may cause the UPnP function not working
properly. This is because these applications will block the accessing ability of some
network ports.
Security Considerations
Activating the UPnP function on your network may incur some security threats. You
should consider carefully these risks before activating the UPnP function.
¾ Some Microsoft operating systems have found out the UPnP weaknesses and hence
you need to ensure that you have applied the latest service packs and patches.
¾ Non-privileged users can control some router functions, including removing and
adding port mappings.
The UPnP function dynamically adds port mappings on behalf of some UPnP-aware
applications. When the applications terminate abnormally, these mappings may not be
removed.
VigorPro5510 Series User’s Guide
145
3.9.5 IGMP
IGMP is the abbreviation of Internet Group Management Protocol. It is a communication
protocol which is mainly used for managing the membership of Internet Protocol multicast
groups. For invoking IGMP Snooping function, you have to check the Enable IGMP Proxy
box first for activating the IGMP proxy function.
Enable IGMP Proxy
Check this box to enable this function. The application of
multicast will be executed through WAN port.
Enable IGMP Snooping
Check this box to enable this function. The application of
multicast will be executed for the clients in LAN.
Group ID
This field displays the ID port for the multicast group. The
available range for IGMP starts from 224.0.0.0 to
239.255.255.254.
P1 to P4
It indicates the LAN port used for the multicast group.
Refresh
Click this link to renew the working multicast group status.
If you check Enable IGMP Proxy, you will get the following page. All the multicast groups
will be listed and all the LAN ports (P1 to P4) are available for use.
3.9.6 Wake On LAN
A PC client on LAN can be woken up by the router it connects. When a user wants to wake
up a specified PC through the router, he/she must type correct MAC address of the specified
PC on this web page of Wake On LAN of this router.
In addition, such PC must have installed a network card supporting WOL function. By the
way, WOL function must be set as “Enable” on the BIOS setting.
146
VigorPro5510 Series User’s Guide
Wake by
Two types provide for you to wake up the binded IP. If you
choose Wake by MAC Address, you have to type the correct
MAC address of the host in MAC Address boxes. If you
choose Wake by IP Address, you have to choose the correct IP
address.
IP Address
The IP addresses that have been configured in LAN>>Bind
IP to MAC will be shown in this drop down list. Choose the
IP address from the drop down list that you want to wake up.
MAC Address
Type any one of the MAC address of the binded PCs.
Wake Up
Click this button to wake up the selected IP. See the following
figure. The result will be shown on the box.
VigorPro5510 Series User’s Guide
147
3.10 VPN and Remote Access
A Virtual Private Network (VPN) is the extension of a private network that encompasses
links across shared or public networks like the Internet. In short, by VPN technology, you
can send data between two computers across a shared or public network in a manner that
emulates the properties of a point-to-point private link.
Below shows the menu items for VPN and Remote Access.
3.10.1 Remote Access Control
Enable the necessary VPN service as you need. If you intend to run a VPN server inside your
LAN, you should disable the VPN service of Vigor Router to allow VPN tunnel pass through,
as well as the appropriate NAT settings, such as DMZ or open port.
The Vigor router will not accept the ISDN dial-in connection if the box of Enable ISDN
Dial-in is not checked.
148
VigorPro5510 Series User’s Guide
3.10.2 PPP General Setup
This submenu only applies to PPP-related VPN connections, such as PPTP, L2TP, L2TP
over IPSec.
Select this option to force the router to authenticate dial-in
Dial-In PPP
Authentication PAP Only users with the PAP protocol.
PAP or CHAP
Selecting this option means the router will attempt to
authenticate dial-in users with the CHAP protocol first. If the
dial-in user does not support this protocol, it will fall back to
use the PAP protocol for authentication.
Dial-In PPP Encryption
(MPPE Optional MPPE
This option represents that the MPPE encryption method will
be optionally employed in the router for the remote dial-in
user. If the remote dial-in user does not support the MPPE
encryption algorithm, the router will transmit “no MPPE
encrypted packets”. Otherwise, the MPPE encryption scheme
will be used to encrypt the data.
Require MPPE (40/128bits) - Selecting this option will force
the router to encrypt packets by using the MPPE encryption
algorithm. In addition, the remote dial-in user will use 40-bit
to perform encryption prior to using 128-bit for encryption.
In other words, if 128-bit MPPE encryption method is not
available, then 40-bit encryption scheme will be applied to
encrypt the data.
Maximum MPPE - This option indicates that the router will
use the MPPE encryption scheme with maximum bits
(128-bit) to encrypt the data.
Mutual Authentication
(PAP)
The Mutual Authentication function is mainly used to
communicate with other routers or clients who need
bi-directional authentication in order to provide stronger
security, for example, Cisco routers. So you should enable
this function when your peer router requires mutual
authentication. You should further specify the User Name
and Password of the mutual authentication peer.
Assigned IP Address
Enter an IP address for the dial-in PPP connection. You
VigorPro5510 Series User’s Guide
149
should choose an IP address from the local private network.
For example, if the local private network is
192.168.1.0/255.255.255.0, you could choose 192.168.1.200
as the Start IP Address. But, you have to notice that the first
two IP addresses of 192.168.1.200 and 192.168.1.201 are
reserved for ISDN remote dial-in user.
3.10.3 IPSec General Setup
In IPSec General Setup, there are two major parts of configuration.
There are two phases of IPSec.
¾
Phase 1: negotiation of IKE parameters including encryption, hash, Diffie-Hellman
parameter values, and lifetime to protect the following IKE exchange, authentication of
both peers using either a Pre-Shared Key or Digital Signature (x.509). The peer that
starts the negotiation proposes all its policies to the remote peer and then remote peer
tries to find a highest-priority match with its policies. Eventually to set up a secure
tunnel for IKE Phase 2.
¾
Phase 2: negotiation IPSec security methods including Authentication Header (AH) or
Encapsulating Security Payload (ESP) for the following IKE exchange and mutual
examination of the secure tunnel establishment.
There are two encapsulation methods used in IPSec, Transport and Tunnel. The Transport
mode will add the AH/ESP payload and use original IP header to encapsulate the data
payload only. It can just apply to local packet, e.g., L2TP over IPSec. The Tunnel mode will
not only add the AH/ESP payload but also use a new IP header (Tunneled IP header) to
encapsulate the whole original IP packet.
Authentication Header (AH) provides data authentication and integrity for IP packets passed
between VPN peers. This is achieved by a keyed one-way hash function to the packet to
create a message digest. This digest will be put in the AH and transmitted along with packets.
On the receiving side, the peer will perform the same one-way hash on the packet and
compare the value with the one in the AH it receives.
Encapsulating Security Payload (ESP) is a security protocol that provides data
confidentiality and protection with optional authentication and replay detection service.
150
VigorPro5510 Series User’s Guide
IKE Authentication
Method
This usually applies to those are remote dial-in user or node
(LAN-to-LAN) which uses dynamic IP address and
IPSec-related VPN connections such as L2TP over IPSec and
IPSec tunnel.
Certificate for Dial-in – Choose the local certificate that
generated or imported on Certificate Management>>Local
Certificate.
Pre-Shared Key -Currently only support Pre-Shared Key
authentication.
Pre-Shared Key- Specify a key for IKE authentication.
Confirm Pre-Shared Key-Confirm the pre-shared key.
IPSec Security Method
Medium - Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High - Encapsulating Security Payload (ESP) means payload
(data) will be encrypted and authenticated. You may select
encryption algorithm from Data Encryption Standard (DES),
Triple DES (3DES), and AES.
3.10.4 IPSec Peer Identity
To use digital certificate for peer authentication in either LAN-to-LAN connection or
Remote User Dial-In connection, here you may edit a table of peer certificate for selection.
As shown below, the router provides 200 entries of digital certificates for peer dial-in users.
Set to Factory Default
Click it to clear all indexes.
Index
Click the number below Index to access into the setting page
of IPSec Peer Identity.
Name
Display the profile name of that index.
VigorPro5510 Series User’s Guide
151
Click each index to edit one peer digital certificate. There are three security levels of digital
signature authentication: Fill each necessary field to authenticate the remote peer. The
following explanation will guide you to fill all the necessary fields.
Profile Name
Type in a name in this file.
Accept Any Peer ID
Click to accept any peer regardless of its identity.
Accept Subject Alternative Click to check one specific field of digital signature to accept
the peer with matching value. The field can be IP Address,
Name
Domain, or E-mail address. The box under the Type will
appear according to the type you select and ask you to fill in
corresponding setting.
Accept Subject Name
Click to check the specific fields of digital signature to accept
the peer with matching value. The field includes Country
(C), State (ST), Location (L), Organization (O),
Organization Unit (OU), Common Name (CN), and Email
(E).
152
VigorPro5510 Series User’s Guide
3.10.5 Remote Dial-in User
You can manage remote access by maintaining a table of remote user profile, so that users
can be authenticated to dial-in via ISDN or build the VPN connection. You may set
parameters including specified connection peer ID, connection type (VPN connection including PPTP, IPSec Tunnel, and L2TP by itself or over IPSec) and corresponding security
methods, etc.
The router provides 200 access accounts for dial-in users. Besides, you can extend the user
accounts to the RADIUS server through the built-in RADIUS client function. The following
figure shows the summary table.
Set to Factory Default
Click to clear all indexes.
Index
Click the number below Index to access into the setting page
of Remote Dial-in User.
User
Display the username for the specific dial-in user of the
LAN-to-LAN profile. The symbol ??? represents that the
profile is empty.
Status
Display the access state of the specific dial-in user. The
symbol V and X represent the specific dial-in user to be active
and inactive, respectively.
Click each index to edit one remote user profile. Each Dial-In Type requires you to fill the
different corresponding fields on the right. If the fields gray out, it means you may leave it
untouched. The following explanation will guide you to fill all the necessary fields.
VigorPro5510 Series User’s Guide
153
Enable this account
Check the box to enable this function.
Idle Timeout- If the dial-in user is idle over the limitation of
the timer, the router will drop this connection. By default, the
Idle Timeout is set to 300 seconds.
ISDN
Allow the remote ISDN dial-in connection. You can further
set up Callback function below. You should set the User
Name and Password of remote dial-in user below. This
feature is for i model only.
PPTP
Allow the remote dial-in user to make a PPTP VPN
connection through the Internet. You should set the User
Name and Password of remote dial-in user below.
IPSec Tunnel
Allow the remote dial-in user to make an IPSec VPN
connection through Internet.
L2TP
Allow the remote dial-in user to make a L2TP VPN
connection through the Internet. You can select to use L2TP
alone or with IPSec. Select from below:
None - Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
154
VigorPro5510 Series User’s Guide
Nice to Have - Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-in VPN connection
becomes one pure L2TP connection.
Must -Specify the IPSec policy to be definitely applied on the
L2TP connection.
SSL Tunnel
It allows the remote dial-in user to make an SSL VPN
Tunnel connection through Internet, suitable for the
application through network accessing (e.g.,
PPTP/L2TP/IPSec)
If you check this box, the function of SSL Tunnel for this
account will be activated immediately.
To check if SSL Tunnel is activated or not, please open
Draytek SSL VPN portal interface. From the web page, you
will see the message to indicate the SSL Tunnel is activated.
Specify Remote Node
Check the checkbox-You can specify the IP address of the
remote dial-in user, ISDN number or peer ID (used in IKE
aggressive mode).
Uncheck the checkbox-This means the connection type you
select above will apply the authentication methods and
security methods in the general settings.
Netbios Naming Packet
Pass – click it to have an inquiry for data transmission
between the hosts located on both sides of VPN Tunnel while
connecting.
Block – When there is conflict occurred between the hosts on
both sides of VPN Tunnel in connecting, such function can
block data transmission of Netbios Naming Packet inside the
tunnel.
VigorPro5510 Series User’s Guide
155
SSL VPN
Set SSL Web Proxy - It allows the remote dial-in user to
access internal web over SSL VPN, suitable for the
application through web only (e.g., HTTP). Click SSL
VPN>> SSL Web Proxy to set profiles.
If you haven’t set any SSL VPN web proxy profiles, you will
see a link here. Click this link to access into the configuration
page of SSL VPN.
Note: SSL VPN can be applied in browser (e.g., IE) which
supports ActivateX only.
If you have set several profiles beforehand, you can check
SSL Web Proxy and choose the one(s) you need as SSL VPN.
To check if SSL Web Proxy is activated or not, please open
Draytek SSL VPN portal interface. From the web page, you
will see the message to indicate that you have the privilege for
the SSL Web Proxy.
Set SSL Application - If you've already set up SSL
application profiles, you'll see some check boxes here. Please
check the profiles that you want to enable for this account.
If you haven't set any SSL application yet, you'll see a
hyperlink here. Click the link, the system will lead you to
access SSL VPN > SSL Application for advanced
configuration.
User Name
This field is applicable when you select ISDN, PPTP or L2TP
with or without IPSec policy above.
Password
This field is applicable when you select ISDN, PPTP or L2TP
156
VigorPro5510 Series User’s Guide
with or without IPSec policy above.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and L2TP
with IPSec Policy when you specify the IP address of the
remote node. The only exception is Digital Signature (X.509)
can be set when you select IPSec tunnel either with or without
specify the IP address of the remote node.
Pre-Shared Key - Check the box of Pre-Shared Key to
invoke this function and type in the required characters (1-63)
as the pre-shared key.
Digital Signature (X.509) – Check the box of Digital
Signature to invoke this function and Select one predefined
Profiles set in the VPN and Remote Access >>IPSec Peer
Identity.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP
with IPSec Policy when you specify the remote node. Check
the Medium, DES, 3DES or AES box as the security method.
Medium - Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option is
invoked. You can uncheck it to disable it.
High-Encapsulating Security Payload (ESP) means payload
(data) will be encrypted and authenticated. You may select
encryption algorithm from Data Encryption Standard (DES),
Triple DES (3DES), and AES.
Local ID - Specify a local ID to be used for Dial-in setting in
the LAN-to-LAN Profile setup. This item is optional and can
be used only in IKE aggressive mode.
Callback Function
The callback function provides a callback service only for the
ISDN dial-in user (for i model only). The remote user will be
charged the connection fee by the telecom.
Check to enable Callback function-Enables the callback
function.
Specify the callback number-The option is for extra
security. Once enabled, the router will ONLY call back to the
specified Callback Number.
Check to enable callback budget control-By default, the
callback function has a time restriction. Once the callback
budget has been exhausted, the callback mechanism will be
disabled automatically.
Callback Budget (Unit: minutes)- Specify the time budget
for the dial-in user. The budget will be decreased
automatically per callback connection.
VigorPro5510 Series User’s Guide
157
3.10.6 LAN to LAN
Here you can manage LAN-to-LAN connections by maintaining a table of connection
profiles. You may set parameters including specified connection direction (dial-in or
dial-out), connection peer ID, connection type (VPN connection - including PPTP, IPSec
Tunnel, and L2TP by itself or over IPSec) and corresponding security methods, etc.
The router provides up to 200 profiles, which also means supporting 200 VPN tunnels
simultaneously. The following figure shows the summary table.
Set to Factory Default
Click to clear all indexes.
Name
Indicate the name of the LAN-to-LAN profile. The
symbol ??? represents that the profile is empty.
Status
Indicate the status of individual profiles. The symbol V and X
represent the profile to be active and inactive, respectively.
Click each index to edit each profile and you will get the following page. Each LAN-to-LAN
profile includes 4 subgroups. If the fields gray out, it means you may leave it untouched. The
following explanations will guide you to fill all the necessary fields.
For the web page is too long, we divide the page into several sections for explanation.
158
VigorPro5510 Series User’s Guide
Profile Name
Specify a name for the profile of the LAN-to-LAN
connection.
Enable this profile
Check here to activate this profile.
VPN Connection Through
Use the drop down menu to choose a proper WAN interface
for this profile. This setting is useful for dial-out only.
WAN1 First - While connecting, the router will use WAN1
VigorPro5510 Series User’s Guide
159
as the first channel for VPN connection. If WAN1 fails, the
router will use another WAN interface instead.
WAN1 Only - While connecting, the router will use WAN1
as the only channel for VPN connection.
WAN2 First - While connecting, the router will use WAN2
as the first channel for VPN connection. If WAN2 fails, the
router will use another WAN interface instead.
WAN2 Only - While connecting, the router will use WAN2
as the only channel for VPN connection.
Netbios Naming Packet
Pass – click it to have an inquiry for data transmission
between the hosts located on both sides of VPN Tunnel
while connecting.
Block – When there is conflict occurred between the hosts
on both sides of VPN Tunnel in connecting, such function
can block data transmission of Netbios Naming Packet
inside the tunnel.
Call Direction
Specify the allowed call direction of this LAN-to-LAN
profile.
Both:-initiator/responder
Dial-Out- initiator only
Dial-In- responder only.
Always On or Idle Timeout Always On-Check to enable router always keep VPN
connection.
Idle Timeout: The default value is 300 seconds. If the
connection has been idled over the value, the router will
drop the connection.
Enable PING to keep alive This function is to help the router to determine the status of
IPSec VPN connection, especially useful in the case of
abnormal VPN IPSec tunnel disruption. For details, please
refer to the note below. Check to enable the transmission of
PING packets to a specified IP address.
PING to the IP
ISDN
Enter the IP address of the remote host that located at the
other-end of the VPN tunnel.
Enable PING to Keep Alive is used to handle abnormal
IPSec VPN connection disruption. It will help to provide
the state of a VPN connection for router’s judgment of
redial.
Normally, if any one of VPN peers wants to disconnect
the connection, it should follow a serial of packet
exchange procedure to inform each other. However, if the
remote peer disconnect without notice, Vigor router will
by no where to know this situation. To resolve this
dilemma, by continuously sending PING packets to the
remote host, the Vigor router can know the true existence
of this VPN connection and react accordingly. This is
independent of DPD (dead peer detection).
Build ISDN LAN-to-LAN connection to remote network.
160
VigorPro5510 Series User’s Guide
You should set up Link Type and identity like User Name
and Password for the authentication of remote server. You
can further set up Callback (CBCP) function below. This
feature is useful for i model only.
PPTP
Build a PPTP VPN connection to the server through the
Internet. You should set the identity like User Name and
Password below for the authentication of remote server.
IPSec Tunnel
Build an IPSec VPN connection to the server through
Internet.
L2TP with IPSec Policy
Build a L2TP VPN connection through the Internet. You
can select to use L2TP alone or with IPSec. Select from
below:
None: Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
Nice to Have: Apply the IPSec policy first, if it is
applicable during negotiation. Otherwise, the dial-out VPN
connection becomes one pure L2TP connection.
Must: Specify the IPSec policy to be definitely applied on
the L2TP connection.
Dial Number for ISDN or
Server IP/Host Name for.
You can specify the IP address of the remote dial-out user.
Link Type
Link Type – There are three link types provided here
for different purpose. Disable disables the ISDN
connection function. 64Kbps allows you to use one ISDN
channel for Internet access. 128Kbps allows you to use both
ISDN B channels for Internet access. BOD stands for
bandwidth-on-demand. The router will use only one B
channel in low traffic situations. Once the single B channel
bandwidth is fully used, the other B channel will be
activated automatically through the dialup. For more
detailed BOD parameter settings, please refer to the section
of Call Control.
User Name
This field is applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above.
Password
This field is applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above.
PPP Authentication
This field is applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above. PAP/CHAP is the
most common selection due to wild compatibility.
VJ compression
This field is applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above. VJ Compression
is used for TCP/IP protocol header compression. Normally
VigorPro5510 Series User’s Guide
161
set to Yes to improve bandwidth utilization.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and
L2TP with IPSec Policy.
Pre-Shared Key-Input 1-63 characters as pre-shared key.
Digital Signature (X.509) – This setting will be available
when IPSec Tunnel is selected. Click this radio button to
invoke this function and select one predefined profile in the
Peer ID (set from VPN and Remote Access>>IPSec Peer
Identity).
Peer ID – Display the IPSec Peer Identity profiles. Use the
drop down menu to choose any one desired.
Local ID – There are two selections offered here. Choose
Alternative Subject Name First or choose Subject Name
First based on the local certificate selected below.
Local Certificate - When the router (served as the client)
executes LAN to LAN dial out with IPSec mode, it will
transfer the certificate to the server based on the setting
selected here. Please use the drop down list to choose one of
the certificates configured in Certificate
Management>>Local Certificate.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP
with IPSec Policy.
Medium (AH - Authentication Header) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High (ESP-Encapsulating Security Payload)- means
payload (data) will be encrypted and authenticated. Select
from below:
DES without Authentication -Use DES encryption
algorithm and not apply any authentication scheme.
DES with Authentication-Use DES encryption algorithm
and apply MD5 or SHA-1 authentication algorithm.
3DES without Authentication-Use triple DES encryption
algorithm and not apply any authentication scheme.
3DES with Authentication-Use triple DES encryption
algorithm and apply MD5 or SHA-1 authentication
algorithm.
AES without Authentication-Use AES encryption
algorithm and not apply any authentication scheme.
AES with Authentication-Use AES encryption algorithm
and apply MD5 or SHA-1 authentication algorithm.
Advanced - Specify mode, proposal and key life of each
IKE phase, Gateway etc. The window of advance setup is
shown as below:
162
VigorPro5510 Series User’s Guide
IKE phase 1 mode -Select from Main mode and
Aggressive mode. The ultimate outcome is to exchange
security proposals to create a protected secure channel.
Main mode is more secure than Aggressive mode since
more exchanges are done in a secure channel to set up the
IPSec session. However, the Aggressive mode is faster. The
default value in Vigor router is Main mode.
IKE phase 1 proposal-To propose the local available
authentication schemes and encryption algorithms to the
VPN peers, and get its feedback to find a match. Two
combinations are available for Aggressive mode and nine
for Main mode. We suggest you select the combination that
covers the most schemes.
IKE phase 2 proposal-To propose the local available
algorithms to the VPN peers, and get its feedback to find a
match. Three combinations are available for both modes.
We suggest you select the combination that covers the most
algorithms.
IKE phase 1 key lifetime-For security reason, the lifetime
of key should be defined. The default value is 28800
seconds. You may specify a value in between 900 and
86400 seconds.
IKE phase 2 key lifetime-For security reason, the lifetime
of key should be defined. The default value is 3600 seconds.
You may specify a value in between 600 and 86400
seconds.
Perfect Forward Secret (PFS)-The IKE Phase 1 key will
be reused to avoid the computation complexity in phase 2.
The default value is inactive this function.
Local ID - In Aggressive mode, Local ID is on behalf of the
IP address while identity authenticating with remote VPN
server. The length of the ID is limited to 47 characters.
Callback Function
(for i models only)
The callback function provides a callback service as a part of
PPP suite only for the ISDN dial-in user. The router owner
will be charged the connection fee by the telecom.
Require Remote to Callback-Enable this to let the router to
require the remote peer to callback for the connection
afterwards.
Provide ISDN Number to Remote-In the case that the
VigorPro5510 Series User’s Guide
163
remote peer requires the Vigor router to callback, the local
ISDN number will be provided to the remote peer. Check
here to allow the Vigor router to send the ISDN number to
the remote router. This feature is useful for i model only.
Allowed Dial-In Type
Determine the dial-in connection with different types.
ISDN
Allow the remote ISDN LAN-to-LAN connection. You
should set the User Name and Password of remote dial-in
user below. This feature is useful for i model only. In
addition, you can further set up Callback function below.
PPTP
Allow the remote dial-in user to make a PPTP VPN
connection through the Internet. You should set the User
Name and Password of remote dial-in user below.
164
VigorPro5510 Series User’s Guide
IPSec Tunnel
Allow the remote dial-in user to trigger an IPSec VPN
connection through Internet.
L2TP
Allow the remote dial-in user to make a L2TP VPN
connection through the Internet. You can select to use L2TP
alone or with IPSec. Select from below:
None- Do not apply the IPSec policy. Accordingly, the VPN
connection employed the L2TP without IPSec policy can be
viewed as one pure L2TP connection.
Nice to Have- Apply the IPSec policy first, if it is applicable
during negotiation. Otherwise, the dial-in VPN connection
becomes one pure L2TP connection.
Must- Specify the IPSec policy to be definitely applied on
the L2TP connection.
Specify CLID or Remote
VPN Gateway
You can specify the IP address of the remote dial-in user or
peer ID (should be the same with the ID setting in dial-in
type) by checking the box. Enter Peer ISDN number if you
select ISDN above (This feature is useful for i model only.).
Also, you should further specify the corresponding security
methods on the right side.
If you uncheck the checkbox, the connection type you select
above will apply the authentication methods and security
methods in the general settings.
User Name
This field is applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above.
Password
This field is applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above.
VJ Compression
VJ Compression is used for TCP/IP protocol header
compression. This field is applicable when you select ISDN,
PPTP or L2TP with or without IPSec policy above.
IKE Authentication
Method
This group of fields is applicable for IPSec Tunnels and
L2TP with IPSec Policy.
Pre-Shared Key-Input 1-63 characters as pre-shared key.
Digital Signature (X.509) – This setting will be available
when IPSec Tunnel is selected. Click this radio button to
invoke this function and select one predefined profile in the
Peer ID (set from VPN and Remote Access>>IPSec Peer
Identity).
Peer ID – Display the IPSec Peer Identity profiles. Use the
drop down menu to choose any one desired.
Local ID – There are two selections offered here. Choose
Alternative Subject Name First or choose Subject Name
First based on the local certificate selected below.
IPSec Security Method
This group of fields is a must for IPSec Tunnels and L2TP
with IPSec Policy when you specify the remote node.
Medium- Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option is
active.
VigorPro5510 Series User’s Guide
165
High- Encapsulating Security Payload (ESP) means payload
(data) will be encrypted and authenticated. You may select
encryption algorithm from Data Encryption Standard (DES),
Triple DES (3DES), and AES.
Callback Function
The callback function provides a callback service only for
the ISDN LAN-to-LAN connection (this feature is useful for
i model only). The remote user will be charged the
connection fee by the telecom.
Enable Callback function-Enables the callback function.
Use the Following Number to Callback – Check this box to
use the number typed below for callback.
Callback Number -The option is for extra security. Once
enabled, the router will ONLY call back to the specified
Callback Number.
Callback Budget (Unit: minutes)- By default, the callback
function has limitation of callback period. Once the callback
budget is exhausted, the function will be disabled
automatically. Specify the time budget for the dial-in user.
The budget will be decreased automatically per callback
connection. The default value 0 means no limitation of
callback period.
GRE over IPSec Settings
Enable IPSec Dial-Out function GRE over IPSec: Check
this box to verify data and transmit data in encryption with
GRE over IPSec packet after configuring IPSec Dial-Out
setting. Both ends must match for each other by setting same
virtual IP address for communication.
Logical Traffic: Such technique comes from RFC2890.
Define logical traffic for data transmission between both
sides of VPN tunnel by using the characteristic of GRE.
Even hacker can decipher IPSec encryption, he/she still
cannot ask LAN site to do data transmission with any
information. Such function can ensure the data transmitted
on VPN tunnel is really sent out from both sides. This is an
optional function. However, if one side wants to use it, the
peer must enable it, too.
My GRE IP: Type the virtual IP for router itself for verified
by peer.
Peer GRE IP: Type the virtual IP of peer host for verified
by router.
My WAN IP
This field is only applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above. The default value
is 0.0.0.0, which means the Vigor router will get a PPP IP
address from the remote router during the IPCP negotiation
phase. If the PPP IP address is fixed by remote side, specify
the fixed IP address here. Do not change the default value if
you do not select ISDN, PPTP or L2TP.
Remote Gateway IP
This field is only applicable when you select ISDN, PPTP or
L2TP with or without IPSec policy above. The default value
is 0.0.0.0, which means the Vigor router will get a remote
166
VigorPro5510 Series User’s Guide
Gateway PPP IP address from the remote router during the
IPCP negotiation phase. If the PPP IP address is fixed by
remote side, specify the fixed IP address here. Do not change
the default value if you do not select ISDN, PPTP or L2TP.
Remote Network IP/
Remote Network Mask
Add a static route to direct all traffic destined to this Remote
Network IP Address/Remote Network Mask through the
VPN connection. For IPSec, this is the destination clients IDs
of phase 2 quick mode.
More
Add a static route to direct all traffic destined to more
Remote Network IP Addresses/ Remote Network Mask
through the VPN connection. This is usually used when you
find there are several subnets behind the remote VPN router.
RIP Direction
The option specifies the direction of RIP (Routing
Information Protocol) packets. You can enable/disable one of
direction here. Herein, we provide four options: TX/RX
Both, TX Only, RX Only, and Disable.
From first subnet to
remote network, you have
to do
If the remote network only allows you to dial in with single
IP, please choose NAT, otherwise choose Route.
Check this box to change the default route with this VPN
Change default route to
tunnel. Be aware that this setting is available only for one
this VPN tunnel (Only
single WAN supports this ) WAN interface is enabled. It is not available when both
WAN interfaces are enabled.
3.10.7 VPN TRUNK Management
VPN trunk includes four features - VPN Backup, VPN load balance, GRE over IPSec, and
Binding tunnel policy.
Features of VPN TRUNK – VPN Backup Mechanism
VPN TRUNK Management is a backup mechanism which can set multiple VPN tunnels as
backup tunnel. It can assure the network connection not to be cut off due to network
environment blocked by any reason.
¾
VPN TRUNK-VPN Backup mechanism can judge abnormal situation for the
environment of VPN server and correct it to complete the backup of VPN Tunnel in
real-time.
VigorPro5510 Series User’s Guide
167
¾
VPN TRUNK-VPN Backup mechanism is compliant with all WAN modes
(single/multi)
¾
Dial-out connection types contain IPSec, PPTP, L2TP, L2TP over IPSec and ISDN
(depends on hardware specification)
¾
The web page is simple to understand and easy to configure
¾
Fully compliant with VPN Server LAN Side Single/Multi Network
¾
Mail Alert support, please refer to System Maintenance >> SysLog / Mail Alert for
detailed configuration
¾
Syslog support, please refer to System Maintenance >> SysLog / Mail Alert for
detailed configuration
¾
Specific ERD (Environment Recovery Detection) mechanism which can be operated by
using Telnet command
VPN TRUNK-VPN Backup mechanism profile will be activated when initial connection
of single VPN tunnel is off-line. Before setting VPN TRUNK -VPN Backup mechanism
backup profile, please configure at least two sets of LAN-to-LAN profiles (with fully
configured dial-out settings) first, otherwise you will not have selections for grouping
Member1 and Member2.
Features of VPN TRUNK – VPN Load Balance Mechanism
VPN Load Balance Mechanism can set multiple VPN tunnels for using as traffic load
balance tunnel. It can assist users to do effective load sharing for multiple VPN tunnels
according to real line bandwidth. Moreover, it offers three types of algorithms for load
balancing and binding tunnel policy mechanism to let the administrator manage the network
more flexibly.
¾
Three types of load sharing algorithm offered, Round Robin, Weighted Round Robin
and Fastest
¾
Binding Tunnel Policy mechanism allows users to encrypt the data in transmission or
specified service function in transmission and define specified VPN Tunnel for having
effective bandwidth management.
¾
Dial-out connection types contain IPSec, PPTP, L2TP, L2TP over IPSec and
GRE over IPSec
¾
The web page is simple to understand and easy to configure
¾
The TCP Session transmitted by using VPN TRUNK-VPN Load Balance
mechanism will not be lost due to one of VPN Tunnels disconnected. Users do
not need to reconnect with setting TCP/UDP Service Port again. The VPN Load
Balance function can keep the transmission for internal data on tunnel stably.
168
VigorPro5510 Series User’s Guide
Backup Profile List
Set to Factory Default - Click to clear all VPN TRUNK-VPN
Backup mechanism profile.
No-The order of VPN TRUNK-VPN Backup mechanism
profile.
Status (on Backup Profile field) - “v” means such profile is
enabled; ”x” means such profile is disabled.
Name (on Backup Profile field) - Display the name of VPN
TRUNK-VPN Backup mechanism profile.
Member1 (on Backup Profile field) - Display the dial-out
profile selected from the Member1 drop down list below.
Active (on Backup Profile field) - “Yes” means normal
condition. ”No” means the state might be disabled or that
profile currently is set with Dial-in mode (for call direction) in
LAN-to-LAN.
Type (on Backup Profile field) - Display the connection type
for that profile, such as IPSec, PPTP, L2TP, L2TP over IPSec
(NICE), L2TP over IPSec(MUST) and so on.
Member2 (on Backup Profile field) - Display the dial-out
profile selected from the Member2 drop down list below.
Advanced – This button is only available when there is one
VigorPro5510 Series User’s Guide
169
profile (or more) created in this page
Detailed information for this dialog, see later section Advanced Load Balance and Backup.
Load Balance Profile List
Set to Factory Default - Click to clear all VPN TRUNK-VPN
Load Balance mechanism profile.
No - The order of VPN TRUNK-VPN Load Balance
mechanism profile.
Status - “v” means such profile is enabled; ”x” means such
profile is disabled.
Name - Display the name of VPN TRUNK-VPN Load
Balance mechanism profile.
Member1 - Display the dial-out profile selected from the
Member1 drop down list below.
Active - “Yes” means normal condition. ”No” means the state
might be disabled or that profile currently is set with Dial-in
mode (for call direction) in LAN-to-LAN.
Type - Display the connection type for that profile, such as
IPSec, PPTP, L2TP, L2TP over IPSec (NICE), L2TP over
IPSec(MUST) and so on.
Member2 - Display the dial-out profile selected from the
Member2 drop down list below.
Advanced – This button is only available when there is one or
more profiles created in this page.
170
VigorPro5510 Series User’s Guide
Detailed information for this dialog, see later section Advanced Load Balance and Backup.
General Setup
Status- After choosing one of the profile listed above, please
click Enable to activate this profile. If you click Disable, the
selected or current used VPN TRUNK-Backup/Load Balance
mechanism profile will not have any effect for VPN tunnel.
Profile Name- Type a name for VPN TRUNK profile. Each
profile can group two VPN connections set in LAN-to-LAN.
The saved VPN profiles in LAN-to-LAN will be shown on
Member1 and Member2 fields.
Member 1/Member2 - Display the selection for LAN-to-LAN
dial-out profiles (configured in VPN and Remote Access >>
LAN-to-LAN) for you to choose for grouping under certain
VPN TRUNK-VPN Backup/Load Balance mechanism profile.
No - Index number of LAN-to-LAN dial-out profile.
Name - Profile name of LAN-to-LAN dial-out profile.
Connection Type - Connection type of LAN-to-LAN dial-out
profile.
VPN ServerIP (Private Network) - VPN Server IP of
LAN-to-LAN dial-out profiles.
Attribute Mode - Display available mode for you to choose.
Choose Backup or Load Balance for your router.
Add
VigorPro5510 Series User’s Guide
Add and save new profile to the backup profile list. The
corresponding members (LAN-to-LAN profiles) grouped in
such new VPN TRUNK – VPN Backup mechanism profile
will be locked. The profiles in LAN-to-LAN will be displayed
171
in red. VPN TRUNK – VPN Load Balance mechanism profile
will be locked. The profiles in LAN-to-LAN will be displayed
in blue.
Edit
Click this button to save the changes to the Status (Enable or
Disable), profile name, member1 or member2.
Delete
Click this button to delete the selected VPN TRUNK profile.
The corresponding members (LAN-to-LAN profiles) grouped
in the deleted VPN TRUNK profile will be released and that
profiles in LAN-to-LAN will be displayed in black.
Time for activating VPN TRUNK – VPN Backup mechanism profile
VPN TRUNK – VPN Backup mechanism will be activated automatically after the initial
connection of single VPN Tunnel off-line. The content in Member1/2 within VPN
TRUNK – VPN Backup mechanism backup profile is similar to dial-out profile configured
in LAN-to-LAN web page. VPN TRUNK – VPN Backup mechanism backup profile will
process and handle everything unless it is off-line once it is activated.
Time for activating VPN TRUNK – VPN Load Balance mechanism profile
After finishing the connection for one tunnel, the other tunnel will dial out automatically
within two seconds. Therefore, you can choose any one of members under VPN Load
Balance for dialing out.
Time for activating VPN TRUNK –Dial-out when VPN Load Balance
Disconnected
For there is one Tunnel created and connected successfully, to keep the load balance effect
between two tunnels, auto-dial will be executed within two seconds.
To close two tunnels of load balance after connecting, please click Disable for Status in
General Setup field.
How can you set a VPN TRUNK-VPN Backup/Load Balance mechanism
profile?
1.
First of all, go to VPN and Remote Access>>LAN-to-LAN. Set two or more
LAN-to-LAN profiles first that will be used for Member1 and Member2. If you do not
set enough LAN-to-LAN profiles, you cannot operate VPN TRUNK – VPN Backup
/Load Balance mechanism profile management well.
2.
Access into VPN and Remote Access>>VPN TRUNK Management.
3.
Set one group of VPN TRUNK – VPN Backup/Load Balance mechanism backup
profile by choosing Enable radio button; type a name for such profile (e.g., 071023);
choose one of the LAN-to-LAN profiles from Member1 drop down list; choose one of
the LAN-to-LAN profiles from Member2 drop down list; and click Add at last.
172
VigorPro5510 Series User’s Guide
4.
Take a look for LAN-to-LAN profiles. Index 1 is chosen as Member1; index 2 is chosen
as Member2. For such reason, LAN-to-LAN profiles of 1 and 2 will be expressed in red
to indicate that they are fixed. If you delete the VPN TRUNK – VPN Backup/Load
Balance mechanism profile, the selected LAN-to-LAN profiles will be released and
expressed in black.
How can you set a GRE over IPSec profile?
1.
Please go to LAN to LAN to set a profile with IPSec.
2.
If the router will be used as the VPN Server (i.e., with virtual address 192.168.50.200).
Please type 192.168.50.200 in the field of My GRE IP. Type IP address (192.168.50.100)
of the client in the field of Peer GRE IP. See the following graphic for an example.
VigorPro5510 Series User’s Guide
173
3.
Later, on peer side (as VPN Client): please type 192.168.50.100 in the field of My
GRE IP and type IP address of the server (192.168.50.200) in the field of Peer GRE
IP.
Advanced Load Balance and Backup
After setting profiles for load balance, you can choose any one of them and click Advance
for more detailed configuration. The windows for advanced load balance and backup are
different. Refer to the following explanation:
Advanced Load Balance
Profile Name
List the load balance profile name.
Load Balance Algorithm
Round Robin – Based on packet base, both tunnels will send
the packet alternatively. Such method can reach the balance
of packet transmission with fixed rate.
Weighted Round Robin –Such method can reach the
174
VigorPro5510 Series User’s Guide
balance of packet transmission with flexible rate. It can be
divided into Auto Weighted and According to Speed Ratio.
Auto Weighted can detect the device speed
(10Mbps/100Mbps) and switch with fixed value ratio (3:7)
for packet transmission. If the transmission rate for packets
on both sides of the tunnels is the same, the value of Auto
Weighted should be 5.5. According to Speed Ratio allows
user to adjust suitable rate manually. There are 100 groups of
rate ratio for Member1:Member2 (range from 1:99 to 99:1).
Fastest – Based on available bandwidth that integrated and
considered by DrayOS system, the system can adjust
dynamically for bandwidth of both VPN tunnels. In most
cases, VPN Tunnel with high rate will use the WAN
interface which has more available bandwidth.
VPN Load Balance –
Binding Tunnel Policy
Below shows the algorithm for Load Balance.
Create – Click this radio button for assign a blank table for
configuring Binding Tunnel.
After insert – Click this radio button to adding a new
binding tunnel table.
Tunnel Bind Table Index- 400 binding tunnel tables are
provided by this device. Choose any one of them for such
Load Balance profile.
Active – In-active/Delete can delete this binding tunnel table.
Active can activate this binding tunnel table.
Binding Dial Out Index – Specify connection type for
transmission by choosing the index (LAN to LAN Profile
Index) for such binding tunnel table.
Binding Set IP Start /End– Specify source IP addresses as
starting point and ending point.
Binding Dest IP Start/End – Specify destination IP
addresses as starting point and ending point.
Binding Dest Port Start /End– Specify destination service
port as starting point and ending point.
Binding Fragmented – Non fragmented packets will be
bound with such tunnel table if you choose No. Fragmented
packets will be bound with such tunnel table if you choose
Yes.
Binding Protocol – Any means when the source IP,
destination IP, destination port and fragment conditions
match with the settings specified here, such binding tunnel
table can be established for TCP Service Port/UDP Service
Port/ICMP/IGMP specified here.
TCP means when the source IP, destination IP, destination
port and fragment conditions match with the settings
specified here and TCP Service Port also fits the number
here, such binding tunnel table can be established. UDP
means when the source IP, destination IP, destination port
and fragment conditions match with the settings specified
here and UDP Service Port also fits the number here, such
VigorPro5510 Series User’s Guide
175
binding tunnel table can be established. TCP/UPD means
when the source IP, destination IP, destination port and
fragment conditions match with the settings specified here
and TCP/UDP Service Port also fits the number here, such
binding tunnel table can be established. ICMP means when
the source IP, destination IP, destination port and fragment
conditions match with the settings specified here and ICMP
Service Port also fits the number here, such binding tunnel
table can be established. IGMP means when the source IP,
destination IP, destination port and fragment conditions
match with the settings specified here and IGMP Service
Port also fits the number here, such binding tunnel table can
be established. Other means when the source IP, destination
IP, destination port and fragment conditions match with the
settings specified here with different TCP Service Port/UDP
Service Port/ICMP/IGMP, such binding tunnel table can be
established.
Detail Information
This field will display detailed information for Binding
Tunnel Policy. Below shows a successful binding tunnel
policy for load balance:
Note : To configure a successful binding tunnel, you have
to:
z
Type Binding Src IP range (Start and End) and
Binding Des IP range (Start and End) Choose YES or
NO for Binding Fragmented. If you choose YES for
Binding Fragmented, you don’t need to choose
Binding Protocol.
z
Type Binding Src IP range (Start and End) and
Binding Des IP range (Start and End). Choose YES or
176
VigorPro5510 Series User’s Guide
NO for Binding Fragmented. If you choose NO for
Binding Fragmented, please choose TCP/UDP,
IGMP/ICMP or Other as Binding Protocol.
Advanced Backup
Profile Name
List the backup profile name.
ERD Mode
ERD means “Environment Recovers Detection”.
Normal – choose this mode to make all dial-out VPN
TRUNK backup profiles being activated alternatively.
Recover Timer – choose this mode to detect VPN
connection periodically and type the value for it (the unit is
second). If VPN server for Member 1 has completed the
network connection, current VPN Tunnel backup connection
will be off.
Resume – when VPN connection breaks down or
disconnects, Member 1 will be the top priority for the system
to do VPN connection.
Detail Information
VigorPro5510 Series User’s Guide
This field will display detailed information for Environment
Recovers Detection.
177
3.10.8 Connection Management
You can find the summary table of all VPN connections. You may disconnect any VPN
connection by clicking Drop button. You may also aggressively Dial-out by using Dial-out
Tool and clicking Dial button.
Dial
Click this button to execute dial out function with general
mode, backup mode or load balance mode.
Refresh Seconds
Choose the time for refresh the dial information among 5, 10,
and 30.
Refresh
Click this button to refresh the whole connection status.
178
VigorPro5510 Series User’s Guide
3.11 Certificate Management
A digital certificate works as an electronic ID, which is issued by a certification authority
(CA). It contains information such as your name, a serial number, expiration dates etc., and
the digital signature of the certificate-issuing authority so that a recipient can verify that the
certificate is real. Here Vigor router support digital certificates conforming to standard
X.509.
Any entity wants to utilize digital certificates should first request a certificate issued by a CA
server. It should also retrieve certificates of other trusted CA servers so it can authenticate
the peer with certificates issued by those trusted CA servers.
Here you can manage generate and manage the local digital certificates, and set trusted CA
certificates. Remember to adjust the time of Vigor router before using the certificate so that
you can get the correct valid period of certificate.
Below shows the menu items for Certificate Management.
3.11.1 Local Certificate
This page allows users to adopt single certificate or mutliple certificates for certification
through generating or importing. Users can generate up to three local certificats or they can
import the third-party certificate(s) to fit different requests.
GENERATE
Click this button to open Generate Certificate Signing Request window. Type in all the
information that the window request such as certifcate name (used for identifying different
certificate), subject alternative name type and relational settings for subject name. Then click
GENERATE again.
VigorPro5510 Series User’s Guide
179
Note: Please be noted that “Common Name” must be configured with rotuer’s WAN IP or
domain name.
After clicking GENERATE, the generated information will be displayed on the window
below:
IMPORT
Vigor router allows you to generate a certificate request and submit it the CA server, then
import it as “Local Certificate”. If you have already gotten a certificate from a third party,
you may import it directly. The supported types are PKCS12 Certificate and Certificate with
a private key.
Click this button to import a saved file as the certification information. There are three types
of local certificate supported by Vigor router.
180
VigorPro5510 Series User’s Guide
Upload Local Certificate
It allows users to import the certificate which is generated by
vigor router and signed by CA server.
If you have done well in certificate generation, the Status of
the certificate will be shown as “OK”.
Upload PKCS12
Certificate
It allows users to import the certificate whose extensions are
usually .pfx or .p12. And these certificates usually
need passwords.
Note: PKCS12 is a standard for storing private keys and
certificates securely. It is used in (among other things)
Netscape and Microsoft Internet Explorer with their import
and export options.
Upload Certificate and
Private Key
It is useful when users have separated certificates and private
keys. And the password is needed if the private key is
encrypted.
REFRESH
Click this button to refresh the information listed below.
View
Click this button to view the detailed settings for certificate request.
VigorPro5510 Series User’s Guide
181
Note: You have to copy the certificate request information from above window. Next,
access your CA server and enter the page of certificate request, copy the information into
it and submit a request. A new certificate will be issued to you by the CA server. You can
save it.
182
VigorPro5510 Series User’s Guide
3.11.2 Trusted CA Certificate
Trusted CA certificate lists three sets of trusted CA certificate.
To import a pre-saved trusted CA certificate, please click IMPORT to open the following
window. Use Browse… to find out the saved text file. Then click Import. The one you
imported will be listed on the Trusted CA Certificate window. Then click Import to use the
pre-saved file.
For viewing each trusted CA certificate, click View to open the certificate detail information
window. If you want to delete a CA certificate, choose the one and click Delete to remove all
the certificate information.
VigorPro5510 Series User’s Guide
183
3.11.3 Certificate Backup
Local certificate and Trusted CA certificate for this router can be saved within one file.
Please click Backup on the following screen to save them. If you want to set encryption
password for these certificates, please type characters in both fields of Encrypt password
and Retype password.
Also, you can use Restore to retrieve these two settings to the router whenever you want.
184
VigorPro5510 Series User’s Guide
3.12 ISDN
3.12.1 Basic Concept
ISDN means integrated services digital network that is an international communications
standard for sending voice, video, and data over digital telephone lines or normal telephone
wires.
Below shows the menu items for ISDN.
3.12.2 General Setup
This web page allows you to enable ISDN function.
Country Code
For proper operation on your local ISDN network, you
should choose the correct country code.
D-Channel Mode
It allows you to configure ISDN layer2 protocol as:
Point-to-Point - Configure ISDN port to use static TEI
(Terminal Endpoint Identifier).
Point-to-Multipoint - Configure ISDN port to use Dynamic
TEI.
3.12.3 Dial to a Single ISP/Dial to Dual ISPs
Select Dialing to a Single ISP if you access the Internet via a single ISP.
VigorPro5510 Series User’s Guide
185
ISP Access Setup
ISP Name - Enter your ISP name such as Seednet, Hinet and
so on.
Dial Number -Enter the ISDN access number provided by
your ISP.
Username - Enter the username provided by your ISP.
Password - Enter the password provided by your ISP.
Require ISP Callback (CBCP) -If your ISP supports the
callback function, check this box to activate the Callback
Control Protocol during the PPP negotiation.
Scheduler (1-15) - Enter the index of schedule profiles to
control the Internet access according to the preconfigured
schedules. Refer to section 3.9.2 Schedule for detailed
configuration.
PPP/MP Setup
Link Type – There are three link types provided here for
different purpose. Link Disable disables the ISDN dial-out
function. Dialup 64Kbps allows you to use one ISDN B
channel for Internet access. Dialup 128Kbps allows you to
use both ISDN B channels for Internet access. Dialup BOD
stands for bandwidth-on-demand. The router will use only
one B channel in low traffic situations. Once the single B
channel bandwidth is fully used, the other B channel will be
activated automatically through the dialup. For more detailed
BOD parameter settings, please refer to the section of Call
Control.
PPP Authentication - PAP only allows you to configure the
PPP session to use the PAP protocol to negotiate the
username and password with the ISP. PAP or CHAP is to
configure the PPP session to use the PAP or CHAP protocols
to negotiate the username and password with the ISP.
Idle Timeout - Idle timeout means the router will be
disconnect after being idle for a preset amount of time. The
default is 180 seconds. If you set the time to 0, the ISDN
connection to the ISP will always remain on.
IP Address Assignment
In most environments, you should not change these settings as
186
VigorPro5510 Series User’s Guide
Method (IPCP)
most ISPs provide a dynamic IP address for the router when it
connects to the ISP. If your ISP provides a fixed IP address,
check Yes and enter the IP address in the field of Fixed IP
Address.
Select Dialing to Dual ISPs if you have more than one ISP. You will be able to dial to both
ISPs at the same time. This is mainly for those ISPs that do not support Multiple-Link PPP
(ML-PPP). In such cases, dialing to two ISPs can increase the bandwidth utilization of the
ISDN channels to 128kbps data speed.
Common Settings
Enable Dual ISPs Function - Check to enable the Dual ISPs
function. Require ISP Callback (CBCP) -If your ISP
supports the callback function, check this box to activate the
Callback Control Protocol during the PPP negotiation.
PPP/MP Setup
Link Type – There are three link types provided here for
different purpose. Link Disable disables the ISDN dial-out
function. Dialup 128Kbps allows you to use both ISDN B
channels for Internet access. Dialup BOD (for detailed
information of configuration, please refer to section 3.10.5)
stands for bandwidth-on-demand. The router will use only one
B channel in low traffic situations. Once the single B channel
bandwidth is fully used, the other B channel will be activated
automatically through the dialup.
PPP Authentication - PAP only allows you to configure the
PPP session to use the PAP protocol to negotiate the
username and password with the ISP. PAP or CHAP can
configure the PPP session to use the PAP or CHAP protocols
to negotiate the username and password with the ISP.
Idle Timeout - Idle timeout means the router will be
disconnect after being idle for a preset amount of time. The
default is 180 seconds. If you set the time to 0, the ISDN
connection to the ISP will always remain on.
VigorPro5510 Series User’s Guide
187
Primary ISP Setup
ISP Name - Enter your ISP name.
Dial Number -Enter the ISDN access number provided by
your ISP.
Username - Enter the username provided by your ISP.
Password - Enter the password provided by your ISP.
IP Address Assignment
Method (IPCP) for
primary ISP setup
In most environments, you should not change these settings as
most ISPs provide a dynamic IP address for the router when it
connects to the ISP. If your ISP provides a fixed IP address,
check Yes and enter the IP address in the field of Fixed IP
Address.
Secondary ISP Setup
ISP Name - Enter the secondary ISP name.
Dial Number -Enter the ISDN access number provided by the
ISP.
Username - Enter the username provided by your ISP.
Password - Enter the password provided by your ISP.
IP Address Assignment
Method (IPCP) for
secondary ISP setup
In most environments, you should not change these settings
as most ISPs provide a dynamic IP address for the router
when it connects to the ISP. If your ISP provides a fixed IP
address, check Yes and enter the IP address in the field of
Fixed IP Address.
After entering the necessary settings and clicking OK, you will see Goto ISDN Diagnostic
link appears on the bottom of the webpage. To have an ISDN connection, please click this
link.
Now, the system will guide you to click Dial ISDN. Wait for a moment after clicking the
dial link. Then, a successful ISDN connection will be shown as the following.
188
VigorPro5510 Series User’s Guide
3.12.4 Virtual TA
Virtual TA means the local hosts or PCs in the network that uses popular CAPI-based
software such as RVS-COM or BVRP to access the router as a local ISDN TA for sending or
receiving FAX messages over the ISDN line. Basically, it is a client/server network model.
The built-in Virtual TA server handles the establishment and release of connections. The
Virtual TA client, which is installed on the local hosts or PCs, creates a CAPI-based driver to
relay all CAPI messages between the applications and the router CAPI module. Before
describing the configuration of Virtual TA in the Vigor routers, please notice the following
limitations.
As depicted in the above application scenario, the Virtual TA client can make an outgoing
call or accept an incoming call to/from a peer FAX machine or ISDN TA, etc. Click the
Virtual TA(Remote CAPI) Setup tab in the Quick Setup field to configure the Virtual TA
features.
VigorPro5510 Series User’s Guide
189
Before describing the configuration of Virtual TA in the Vigor routers, please heed the
following limitations.
z
The Virtual TA client only supports MicrosoftTM Windows 98/SE/2000/XP platforms.
z
The Virtual TA client only supports the CAPI 2.0 protocol and has no built-in FAX
engine.
z
One ISDN BRI interface has two B channels. The maximum number of active clients is
also 2.
Before you configure the Virtual TA, you must set the correct country code in ISDN Setup.
Virtual TA Server
Enable - Select it to activate the server.
Disable - Select it to deactivate the server. All Virtual TA
applications will be terminated.
Virtual TA User Profiles
Username - Enter the username of a specific client.
Password - Enter the password of a specific client.
MSN 1/2/3 - MSN stands for Multiple Subscriber Number.
It means you can apply to more than one ISDN lines number
over a single subscribed line. Note that the service must be
acquired from your telecom. Specify the MSN numbers for a
specific client. If you have no MSN services, leave this field
blank.
Active - Check it to enable the client to access the server.
Install a Virtual TA Client
1.
Insert the CD-ROM bundled with your Vigor router. Find VTA Client tool in the
Utility menu and click on the Install button.
2.
Follow the on-screen instructions of the installer. The last step will ask you to restart
your computer. Click OK to restart your computer.
3.
After the computer restarts, you will see a VT icon in the taskbar (usually in the
bottom-right of the screen, near the clock) as shown below.
When the icon text is GREEN, the Virtual TA client is connected to the Virtual TA server and
you can launch your CAPI-based software to use the client to access the router. If the icon
190
VigorPro5510 Series User’s Guide
text is RED, it means the client has lost the connection to the server. This time, please check
the physical Ethernet connection.
Configure a Virtual TA Client/ Server
Since the Virtual TA application is a client/server network model, you must configure it on
both ends to run properly your Virtual TA application.
By default, the Virtual TA server is enabled and the Username/Password fields are left blank.
Any Virtual TA client may login to the server. Once a single Username/Password field has
been filled in, the Virtual TA server will only allow clients with a valid Username/Password
to login. The screen of Virtual TA configuration is presented below.
User Profile
Note that creating a single user access account will limit the access to the Virtual TA server
to only the specified account holders.
Assume you did not acquire any MSN service from your ISDN network provider.
On the server - Click Virtual TA (Remote CAPI) Setup link, and fill in the Username and
Password fields. Check the Active box to enable the account.
On the client - Right-click the mouse on the VT icon. The following pop-up menu will be
shown.
VigorPro5510 Series User’s Guide
191
Click the Virtual TA Login tab to launch the login box.
Enter the Username/Password and then click OK. After a short time, the VT icon text will
turn green.
MSN Configuration
If you have applied to an MSN number service, the Virtual TA server can assign which client
has the specified MSN number. When an incoming call arrives, the server will inform the
appropriate client. Now we set an example to describe the configuration of the MSN number.
Suppose that you could assign the MSN number 123 to the client “alan”.
Type the specified MSN number in the CAPI-based software. When the Virtual TA server
sends an alert signal to the specified Virtual TA client, the CAPI-based software will also
receive the action, the software will not accept the incoming call.
3.12.5 Call Control
Some applications require that the router (only for the ISDN models) be remotely activated,
or be able to dial up to the ISP via the ISDN interface. Vigor routers provide this feature by
allowing user to make a phone call to the router and then ask it to dial up to the ISP.
Accordingly, a teleworker can access the remote network to retrieve resources. Of course, a
fixed IP address is required for WAN connection and some internal network resource has to
be exposed for remote users, such as FTP, WWW.
192
VigorPro5510 Series User’s Guide
Call Control Setup
Dial Retry - It specifies the dial retry counts per triggered
packet. A triggered packet is the packet whose destination is
outside the local network. The default setting is no dial retry.
If set to 5, for each triggered packet, the router will dial 5
times until it is connected to the ISP or remote access router.
Dial Delay Interval - It specifies the interval between dialup
retries. By default, the interval is 0 second.
Remote Activation – It can help users who would like to
access the server which is off the Internet in the head office.
To remotely make the server to be available on the Internet,
i.e. make the router in the head office activating its Internet
access either by dialing-up or starting broadband connection,
users can make a regular phone call (the number is set in the
Remote Activation field) to the router as signaling it for
activation. The phone call will be soon disconnected once the
router is on line.
Basic Setup
Note that Dialing to a Single ISP should be
pre-configured properly.
Link Type - Because ISDN has two B channels (64Kbps/per
channel), you can specify whether you would like to have
single B channel, two B channels or BOD (Bandwidth on
Demand). Four options are available: Link Disable, Dialup
64Kbps, Dialup 128Kbps, Dialup BOD.
PPP Authentication - It specifies the PPP authentication
method for PPP/MP connections. Normally you can set it to
PAP/CHAP for better compatibility.
TCP Header Compression - VJ Compression: It is used
for TCP/IP protocol header compression. Normally it is set
to Yes to improve bandwidth utilization.
VigorPro5510 Series User’s Guide
193
Idle Timeout - Because our IDSN link type is Dial On
Demand, the connection will be initiated only when needed.
Bandwidth-On-Demand
(BOD) Setup
Bandwidth-On-Demand is for Multiple-Link PPP \(ML-PPP
or MP). The parameters are only applied when you set the
Link Type to Dialup BOD. The ISDN usually use one B
channel to access the Internet or remote network when you
choose the Dialup BOD link type. The router will use the
parameters here to decide on when you activate/drop the
additional B channel. Note that cps (characters-per-second)
measures the total link utilization.
High Water Mark and High Water Time - These
parameters specify the situation in which the second channel
will be activated. With the first connected channel, if its
utilization exceeds the High Water Mark and such a channel
is being used over the High Water Time, the additional
channel will be activated. Thus, the total link speed will be
128kbps (two B channels).
Low Water Mark and Low Water Time - These parameters
specify the situation in which the second channel will be
dropped. In terms of the two B channels, if their utilization is
under the Low Water Mark and these two channels are being
used over the High Water Time, the additional channel will be
dropped. As a result, the total link speed will be 64kbps (one
B channel).
3.13 Wireless LAN
This function is used for G models only.
3.13.1 Basic Concepts
Over recent years, the market for wireless communications has enjoyed tremendous growth.
Wireless technology now reaches or is capable of reaching virtually every location on the
surface of the earth. Hundreds of millions of people exchange information every day via
wireless communication products. The Vigor G model, a.k.a. Vigor wireless router, is
designed for maximum flexibility and efficiency of a small office/home. Any authorized
staff can bring a built-in WLAN client PDA or notebook into a meeting room for conference
without laying a clot of LAN cable or drilling holes everywhere. Wireless LAN enables high
mobility so WLAN users can simultaneously access all LAN facilities just like on a wired
LAN as well as Internet access.
The Vigor wireless routers are equipped with a wireless LAN interface compliant with the
standard IEEE 802.11g protocol. To boost its performance further, the Vigor Router is also
loaded with advanced wireless technology Super G TM to lift up data rate up to 108 Mbps*.
Hence, you can finally smoothly enjoy stream music and video.
Note: * The actual data throughput will vary according to the network conditions
and environmental factors, including volume of network traffic, network
overhead and building materials.
In an Infrastructure Mode of wireless network, Vigor wireless router plays a role as an
Access Point (AP) connecting to lots of wireless clients or Stations (STA). All the STAs will
share the same Internet connection via Vigor wireless router. The General Settings will set
up the information of this wireless network, including its SSID as identification, located
channel etc.
194
VigorPro5510 Series User’s Guide
Security Overview
Real-time Hardware Encryption: Vigor Router is equipped with a hardware AES
encryption engine so it can apply the highest protection to your data without influencing user
experience.
Complete Security Standard Selection: To ensure the security and privacy of your wireless
communication, we provide several prevailing standards on market.
WEP (Wired Equivalent Privacy) is a legacy method to encrypt each frame transmitted via
radio using either a 64-bit or 128-bit key. Usually access point will preset a set of four keys
and it will communicate with each station using only one out of the four keys.
WPA(Wi-Fi Protected Access), the most dominating security mechanism in industry, is
separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK),
and WPA-Enterprise or called WPA/802.1x.
In WPA-Personal, a pre-defined key is used for encryption during data transmission. WPA
applies Temporal Key Integrity Protocol (TKIP) for data encryption while WPA2 applies
AES. The WPA-Enterprise combines not only encryption but also authentication.
Since WEP has been proved vulnerable, you may consider using WPA for the most secure
connection. You should select the appropriate security mechanism according to your needs.
No matter which security suite you select, they all will enhance the over-the-air data
protection and /or privacy on your wireless network. The Vigor wireless router is very
flexible and can support multiple secure connections with both WEP and WPA at the same
time.
Example 1
VigorPro5510 Series User’s Guide
195
Example 2
Example 3
Separate the Wireless and the Wired LAN- WLAN Isolation enables you to isolate your
wireless LAN from wired LAN for either quarantine or limit access reasons. To isolate
means neither of the parties can access each other. To elaborate an example for business use,
you may set up a wireless LAN for visitors only so they can connect to Internet without
hassle of the confidential information leakage. For a more flexible deployment, you may add
filters of MAC addresses to isolate users’ access from wired LAN.
Manage Wireless Stations - Station List will display all the station in your wireless
network and the status of their connection.
Below shows the menu items for Wireless LAN.
196
VigorPro5510 Series User’s Guide
3.13.2 General Setup
By clicking the General Settings, a new web page will appear so that you could configure
the SSID and the wireless channel. Please refer to the following figure for more information.
Enable Wireless LAN
Check the box to enable wireless function.
Mode
Select an appropriate wireless mode.
Mixed (11b+11g+SuperG) - The radio can support
IEEE802.11b, IEEE802.11g and SuperG protocols
simultaneously.
Mixed (11b+11g) - The radio can support both
IEEE802.11b and IEEE802.11g protocols simultaneously.
SuperG - The radio only supports SuperG.
11g only - The radio only supports IEEE802.11g.
11b only - The radio only supports IEEE802.11b.
Index(1-15)
Set the wireless LAN to work at certain time interval
only. You may choose up to 4 schedules out of the 15
schedules pre-defined in Applications >> Schedule
setup. The default setting of this field is blank and the
function will always work.
SSID
The default SSID is "default". We suggest you change it
to a particular name. It is the identification of the wireless
LAN. SSID can be any text numbers or various special
characters.
Channel
The channel of frequency of the wireless LAN. The
default channel is 6. You may switch channel if the
VigorPro5510 Series User’s Guide
197
selected channel is under serious interference.
Hide SSID
Check it to prevent from wireless sniffing and make it
harder for unauthorized clients or STAs to join your
wireless LAN. Depending on the wireless utility, the user
may only see the information except SSID or just cannot
see any thing about Vigor wireless router while site
surveying.
Long Preamble This option is to define the length of the sync field in an 802.11 packet.
Most modern wireless network uses short preamble with 56 bit sync field instead of long
preamble with 128 bit sync field. However, some original 11b wireless network devices only
support long preamble. Check it to use Long Preamble if needed to communicate with this
kind of devices.
198
VigorPro5510 Series User’s Guide
3.13.3 Security
By clicking the Security Settings, a new web page will appear so that you could configure
the settings of WEP and WPA.
Mode
There are several modes provided for you to choose.
Disable - Turn off the encryption mechanism.
WEP Only - Accepts only WEP clients and the
encryption key should be entered in WEP Key.
WEP/802.1x Only - Accept WEP clients with 802.1x
authentication. Since the key will be auto-negotiated
during authentication, the field of key setting below will
be not available for input.
WEP or WPA/PSK - Accepts WEP and WPA clients
with legal key accordingly. Only Mixed (WPA+WPA2)
is applicable if you select WPA/PSK.
WEP/802.1x or WPA/802.1x - Accept WEP or WPA
clients with 802.1x authentication. Only
Mixed(WPA+WPA2) is applicable if you select
WPA/PSK. Since the key will be auto-negotiated during
authentication, the field of key setting below will be not
available for input.
VigorPro5510 Series User’s Guide
199
WPA/PSK Only - Accepts WPA clients and the
encryption key should be entered in PSK. Remember to
select WPA type to define either Mixed or WPA2 only in
the field below.
WPA/802.1x Only - Accept WPA clients with 802.1x
authentication. Remember to select WPA type to define
either Mixed or WPA2 only in the field below. Since the
key will be auto-negotiated during authentication, the
field of key setting below will be not available for input.
WPA
The WPA encrypts each frame transmitted from the radio
using the key, which either PSK entered manually in this
field below or automatically negotiated via 802.1x
authentication.
Type - Select from Mixed (WPA+WPA2) or WPA2 only.
Pre-Shared Key (PSK) - Either 8~63 ASCII characters,
such as 012345678..(or 64 Hexadecimal digits leading by
0x, such as "0x321253abcde...").
WEP
64-Bit - For 64 bits WEP key, either 5 ASCII characters,
such as 12345 (or 10 hexadecimal digitals leading by 0x,
such as 0x4142434445.)
128-Bit - For 128 bits WEP key, either 13 ASCII
characters, such as ABCDEFGHIJKLM (or 26
hexadecimal digits leading by 0x, such as
0x4142434445464748494A4B4C4D).
All wireless devices must support the same WEP
encryption bit size and have the same key. Four keys can
be entered here, but only one key can be selected at a
time. The keys can be entered in ASCII or Hexadecimal.
Check the key you wish to use.
200
VigorPro5510 Series User’s Guide
3.13.4 Access Control
For additional security of wireless access, the Access Control facility allows you to restrict
the network access right by controlling the wireless LAN MAC address of client. Only the
valid MAC address that has been configured can access the wireless LAN interface. By
clicking the Access Control, a new web page will appear, as depicted below, so that you
could edit the clients' MAC addresses to control their access rights.
Enable Access Control
Select to enable the MAC Address access control feature.
Policy
Select to enable any one of the following policy. Choose
Activate MAC address filter to type in the MAC
addresses for other clients in the network manually.
Choose Isolate WLAN from LAN will separate all the
WLAN stations from LAN based on the MAC Address
list. Choose Blocked MAC address filter will block all
the WLAN stations from LAN based on the MAC
Address list.
MAC Address Filter
Display all MAC addresses that are edited before. Four
buttons (Add, Remove,
Client’s MAC Address - Manually enter the MAC
address of wireless client.
Attribute
s - select to isolate the wireless connection of the wireless
client of the MAC address from LAN.
VigorPro5510 Series User’s Guide
201
Add
Add a new MAC address into the list.
Delete
Delete the selected MAC address in the list.
Edit
Edit the selected MAC address in the list.
Cancel
Give up the access control set up.
OK
Click it to save the access control list.
Clear All
Clean all entries in the MAC address list.
3.13.5 WDS
WDS means Wireless Distribution System. It is a protocol for connecting two access points
(AP) wirelessly. Usually, it can be used for the following application:
y
y
Provide bridge traffic between two LANs through the air.
Extend the coverage range of a WLAN.
To meet the above requirement, two WDS modes are implemented in Vigor router. One is
Bridge, the other is Repeater. Below shows the function of WDS-bridge interface:
The application for the WDS-Repeater mode is depicted as below:
202
VigorPro5510 Series User’s Guide
The major difference between these two modes is that: while in Repeater mode, the packets
received from one peer AP can be repeated to another peer AP through WDS links. Yet in
Bridge mode, packets received from a WDS link will only be forwarded to local wired or
wireless hosts. In other words, only Repeater mode can do WDS-to-WDS packet forwarding.
In the following examples, hosts connected to Bridge 1 or 3 can communicate with hosts
connected to Bridge 2 through WDS links. However, hosts connected to Bridge 1 CANNOT
communicate with hosts connected to Bridge 3 through Bridge 2.
Click WDS from Wireless LAN menu. The following page will be shown.
VigorPro5510 Series User’s Guide
203
Mode
Choose the mode for WDS setting. Disable mode will not
invoke any WDS setting. Bridge mode is designed to fulfill
the first type of application. Repeater mode is for the second
one.
Security
There are three types for security, Disable, WEP and
Pre-shared key. The setting you choose here will make the
following WEP or Pre-shared key field valid or not. Choose
one of the types for the router.
WEP
Check this box to use the same key set in Security Settings
page. If you did not set any key in Security Settings page,
this check box will be dimmed.
Settings
Encryption Mode - If you checked the box of Use the same
WEP key …, you do not need to choose 64-bit or 128-bit as
the Encryption Mode. If you do not check that box, you can
set the WEP key now in this page.
Key Index - Choose the key that you want to use after
selecting the proper encryption mode.
Key - Type the content for the key.
204
VigorPro5510 Series User’s Guide
Pre-shared Key
Type 8 ~ 63 ASCII characters or 64 hexadecimal digits
leading by “0x”.
Bridge
If you choose Bridge as the connecting mode, please type in
the peer MAC address in these fields. Six peer MAC
addresses are allowed to be entered in this page at one time.
Yet please disable the unused link to get better performance.
If you want to invoke the peer MAC address, remember to
check Enable box in the front of the MAC address after
typing.
Repeater
If you choose Repeater as the connecting mode, please type in
the peer MAC address in these fields. Two peer MAC
addresses are allowed to be entered in this page at one time.
Similarly, if you want to invoke the peer MAC address,
remember to check Enable box in the front of the MAC
address after typing.
Access Point Function
Click Enable to make this router serving as an access point;
click Disable to cancel this function.
Status
It allows user to send “hello” message to peers. Yet, it is valid
only when the peer also supports this function.
VigorPro5510 Series User’s Guide
205
3.13.6 AP Discovery
Vigor router can scan all regulatory channels and find working APs in the neighborhood.
Based on the scanning result, users will know which channel is clean for usage. Also, it can
be used to facilitate finding an AP for a WDS link. Notice that during the scanning process
(about 5 seconds), no client is allowed to connect to Vigor.
This page is used to scan the existence of the APs on the wireless LAN. Yet, only the AP
which is in the same channel of this router can be found. Please click Scan to discover all the
connected APs.
If you want the found AP applying the WDS settings, please type in the AP’s MAC address
on the bottom of the page and click Bridge or Repeater. Next, click Add to. Later, the MAC
address of the AP will be added to Bridge or Repeater field of WDS settings page.
206
VigorPro5510 Series User’s Guide
3.13.7 Station List
Station List provides the knowledge of connecting wireless clients now along with its status
code. There is a code summary below for explanation. For convenient Access Control, you
can select a WLAN station and click Add to Access Control below.
Refresh
Click this button to refresh the status of station list.
Add
Click this button to add current selected MAC address
into Access Control.
VigorPro5510 Series User’s Guide
207
3.13.8 Station Rate Control
This page allows you to control the upload and download rate of each wireless client (station)
and SSID1-4. Please check the box of Enable to invoke this setting. The range for the rate is
between 100 ~ 100,000 kbps.
SSID rate control controls the data transmission rate through wireless connection.
Enable
Check Enable for typing upload and download rate.
Upload
Type the transmitting rate for data upload. Default value
is 1,000 kbps.
Download
Type the transmitting rate for data download. Default
value is 1,000 kbps.
3.14 VLAN
Virtual LAN function provides you a very convenient way to manage hosts by grouping
them based on the physical port. Such menu is available for Vigor5510Gi only.
208
VigorPro5510 Series User’s Guide
3.14.1 Wired VLAN
PCs connected to Ethernet ports of the router can be divided into different groups and
formed VLAN. PCs under the same groups can share each other information through the
router and will not be peeked by other groups.
The VLAN >> Wired VLAN allows you to configure VLAN settings through wired
connection to achieve the above intention. Simply check P1 and P2 boxes on the line of
VLAN0; and check P3 and P4 boxes on the line of VLAN1.
Enable
Check this box to enable this function (for VLAN
Configuration).
P1 – P4
Check the box to make the computer connecting to the port
being grouped in specified VLAN. Be aware that each port
can be grouped in different VLAN at the same time only if
you check the box. For example, if you check the boxes of
VLAN0-P1 and VLAN1-P1, you can make P1 to be grouped
under VLAN0 and VLAN1 simultaneously.
VLAN0-3
This router allows you to set 4 groups of virtual LAN.
VigorPro5510 Series User’s Guide
209
3.14.2 Wireless VLAN
PCs (equipped with wireless network cards) connected to the router through wireless
interface can be divided into different groups and formed W_VLAN. PCs under the same
groups can share each other information through the router and will not be peeked by other
groups.
PCs under the same groups can use same Login ID and password to access into Internet. For
example, see the following graphic. Both A and B use the same login ID (City) and
password (1234). Therefore, they are grouped in the same W_VLAN.
The VLAN >> Wireless VALN allows you to configure Wireless VLAN settings through
wireless connection to achieve the above intention. Simply type Login ID and password with
City and 1234 in the boxes of W_VLAN0. And type Login ID and password with Home and
7890 in the boxes of W_VLAN1. Users can configure fifteen groups of wireless VLAN in
this page.
210
VigorPro5510 Series User’s Guide
Enable
Check this box to invoke wireless VLAN function.
Login ID
Type Login ID for different groups of W_VLAN with 1 to 11
characters.
Password
Type password for different groups of W_VLAN with 1 to 11
characters.
Details
Click this button to set additional attributes settings for
W_VLAN.
Activated Date – Use the drop down lists to set the activated
date for the wireless VLAN. The wireless VLAN function will
be available when the time is arrival.
Expired Date – Use the drop down lists to set the expired
date for the wireless VALN. This function will be invalid
when the time is arrival.
Connect all WDS links with this VALN group – Check this
box to activate this connection.
Isolate each member in this VLAN group – Check this box
to isolate all the members in this VLAN group and not allow
the information sharing among them.
Disable broadcast and
multicast traffic
VigorPro5510 Series User’s Guide
Check this box to prevent broadcast and multicast traffic
forwarding to all W_VLAN.
211
How can you (wireless client) access into Internet?
After finishing the configuration of wireless VLAN, the wireless clients connecting to this
router must do the following steps to access into Internet.
1. Open a browser and type http://www.draytek.vlan/login.htm or http://(vigor router’s IP
address)/login.htm on the address line.
2. The following screen will appear.
3. Type in Login ID and Password that was configured in Wireless VLAN Setup page. In
this case, we choose the configuration set in first group of W_VLAN (City and 1234).
4. When the accessing is successful, the following screen will appear.
Note: The floating window with connection time will be shown on the screen
till you logout.
212
VigorPro5510 Series User’s Guide
5. You can go to Diagnostics>>Wireless VLAN Online Station for viewing the
connection status whenever you want.
3.14.3 VLAN Cross Setup
This function allows the router to integrate VLAN and W_VLAN for managing different
computers (notebooks). See the following picture for an example. With VLAN Cross Setup,
notebook A/B and PCs on VLAN0 can share resources without difficulty.
The VLAN >> VLAN Cross Setup allows you to set a communication bridge between
computers in Wireless VLAN and wired VLAN. To achieve the intention of the above
illustration, simply check the box under VLAN0 on the line of W_VLAN0.
VigorPro5510 Series User’s Guide
213
Enable
Check this box to invoke VLAN Cross Setup function.
VLAN0-3
It represents the groups of virtual LAN connected by Ethernet
interface.
W_VLAN0-15
It represents the groups of wireless VLAN communicated by
wireless interface.
214
VigorPro5510 Series User’s Guide
3.14.4 Wireless Rate Control
Rate Control manages the transmission rate of data in and out through the router. You can
also manage the in/out rate of each wireless VLAN. Go to VLAN menu and select Wireless
Rate Control. The following page will appear. Click Enable to invoke VLAN function.
For the rate control of wireless connection, please open VLAN menu and choose Wireless
Rate Control. The following page will be shown for you to adjust.
Enable
Check this box to enable this function (for Rate Control). The
rate control will limit the transmission rate for upload and
download.
Upload Rate
It decides the rate of data transmission for output. The default
setting is 300. The range must be between 100 kbps to
20,000kbps. Adjust the values according to your necessity.
Download Rate
It decides the rate of data transmission for input. The default
setting is 300. The range must be between 100 kbps to
20,000kbps. Adjust the values according to your necessity.
VigorPro5510 Series User’s Guide
215
3.15 SSL VPN
An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be
used with a standard Web browser.
There are two benefits that SSL VPN provides:
¾
It is not necessary for users to preinstall VPN client software for executing SSL VPN
connection.
¾
There are less restrictions for the data encrypted through SSL VPN in comparing with
traditional VPN.
3.15.1 General Setup
This page determines the general configuration for SSL VPN Server and SSL Tunnel.
Port
Such port is set for SSL VPN server. It will not affect the
HTTPS Port configuration set in System
Maintenance>>Management. In general, the default
setting is 443.
Server Certificate
When the client does not set any certificate, default
certificate will be used for HTTPS and SSL VPN server.
Choose any one of the user-defined certificates from the
drop down list if users set several certificates previously.
Otherwise, choose Self-signed to use the router’s built-in
default certificate. The default certificate can be used in SSL
VPN server and HTTPS Web Proxy.
Encryption Key Algorithm Choose the encryption level for the data connection in SSL
VPN server.
216
VigorPro5510 Series User’s Guide
3.15.2 SSL Web Proxy
SSL Web Proxy will allow the remote users to access the internal web sites over SSL.
It is used to access web servers on LAN side from browser. With such function, user(s) or
administrator (s) can register and access the specified web server on LAN behind the router
through any web browser.
Such page allows you to set interior web server profiles.
Name
Display the name of the profile that you create.
URL
Display the URL.
Active
Display current status (active or inactive) of such profile.
Click number link under Index field to set detailed configuration.
Name
Type name of the profile.
URL
Type the address (function variation or IP address) or path
of the proxy server.
Host IP Address
If you type function variation as URL, you have to type
VigorPro5510 Series User’s Guide
217
corresponding IP address in this field. Such field must match
with URL setting.
Access Method
There are three modes for you to choose.
Disable – the profile will be inactive. If you choose Disable,
all the web proxy profile appeared under VPN remote dial-in
web page will disappear.
Secured Port Redirection – such technique applies private
port mapping to random WAN port. There are two
restrictions for proxy web server for such selection: 1) it is
only used for WAN to LAN access, the web server must be
configured behind vigor router; 2) web server gateway must
be indicated to vigor router. In addition, users must execute
“Connect” manually in SSL Client Portal page.
SSL – if you choose such selection, web proxy over SSL
will be applied for VPN.
3.15.3 SSL Application
It provides a secure and flexible solution for network resources, including VNC (Virtual
Network Computer) /RDP (Remote Desktop Protocol) /SAMBA, to any remote user with
access to Internet and a web browser.
Name
Display the application name of the profile that you create.
Host Address
Display the IP address for VNC/RDP or SAMBA path.
Service
Display the type of the service selected, e.g.,
VNC/RDP/SAMBA.
Active
Display current status (active or inactive) of the selected
profile.
Click number link under Index field to make detailed configuration.
218
VigorPro5510 Series User’s Guide
Enable Application
Service
Check this box to enable this application.
Application Name
Type the profile name for the application.
Application
Use the drop down list to choose an application applied to
this profile.
Different application type will lead different web pages.
Refer to the following:
z
Virtual Network Computing – Choose this item for accessing and controlling a
remote PC through VNC protocol.
IP Address
Type the IP address for this protocol.
Port
Specify the port used for this protocol. The default setting is
5900.
Scaling
Chose the percentage (100%, 80%, 60%) for such
application.
VigorPro5510 Series User’s Guide
219
z
z
Remote Desktop Protocol - Choose this item for accessing and controlling a remote
PC through RDP protocol.
IP Address
Type the IP address for this protocol.
Port
Specify the port used for this protocol. The default setting is
3389.
Screen Size
Chose the screen size for such application.
Samba Application - Any remote user can upload/download/delete certain files on a
local Samba server through web browser with this application.
Samba Path
Specify the path for this application.
3.15.4 User Account
For SSL VPN, identity authentication and power management are implemented through
deploying user accounts. Therefore, the user account for SSL VPN must be set together with
remote dial-in user web page. Such menu item will guide to access into VPN and Remote
Access>>Remote Dial-in user. For the detailed configuration of user account, please refer
to section of Remote Dial-in user.
220
VigorPro5510 Series User’s Guide
You can find out the link of Set SSL Web Proxy on the profile setting page. If you haven’t
set any SSL Web Proxy Profile in SSL VPN>> SSL Web Proxy web page, there is no
check box but a link appeared below.
However, if you have set several SSL Web Proxy Profiles in SSL VPN>> SSL Web Proxy
web page:
The SSL Web Proxy profile names will be displayed (together with check box) as shown
below.
VigorPro5510 Series User’s Guide
221
3.15.5 Online User Status
If you have finished the configuration of SSL Web Proxy (server), users can find out
corresponding settings when they access into Draytek SSL VPN portal interface.
Next, users can open SSL VPN>> Online Status to view login status of SSL VPN.
Active User
Display current user who visit SSL VPN server.
Host IP
Displays the IP address for the host.
Time out
Display the time remaining for logging out.
Action
You can click Drop to drop certain login user from the
router's SSL Portal UI.
222
VigorPro5510 Series User’s Guide
3.16 System Maintenance
For the system setup, there are several items that you have to know the way of configuration:
Status, Administrator Password, Configuration Backup, Syslog, Time setup, Reboot System,
Firmware Upgrade.
Below shows the menu items for System Maintenance.
3.16.1 System Status
The System Status provides basic network settings of Vigor router. It includes LAN and
WAN interface information. Also, you could get the current running firmware version or
firmware related information from this presentation.
Model Name
Display the model name of the router.
Firmware Version
Display the firmware version of the router.
Build Date/Time
Display the date and time of the current firmware build.
System --CPU Usage
Display current usage of CPU.
Total Memory
Display the total memory of your hard disk.
Memory Usage
Display current usage of memory.
VigorPro5510 Series User’s Guide
223
LAN --MAC Address
st
Display the MAC address of the LAN Interface.
1 IP Address
Display the IP address of the LAN interface.
1st Subnet Mask
Display the subnet mask address of the LAN interface.
DHCP Server
Display the current status of DHCP server of the LAN
interface.
DNS
Display the assigned IP address of the primary DNS.
WAN1/WAN2 --Link Status
Display the connection status.
MAC Address
Display the MAC address of the WAN Interface.
Connection
Display the connection mode used currently.
IP Address
Display the IP address of the WAN interface.
Default Gateway
Display the assigned IP address of the default gateway.
Wireless LAN --MAC Address
Display the MAC address of the wireless LAN.
Frequency Domain
It can be Europe (13 usable channels), USA (11 usable
channels) etc. The available channels supported by the
wireless products in different countries are various.
Firmware Version
Display information about equipped WLAN miniPCi
card. This also helps to provide availability of some
features that are bound with some WLAN miniPCi card.
SSID
Display the identification name for the WLAN.
3.16.2 TR-069 Setting
Vigor router with TR-069 is available for matching with VigorACS server. Such page
provides VigorACS and CPE settings under TR-069 protocol. All the settings configured
here is for CPE to be controlled and managed with VigorACS server. Users need to type
URL, username and password for the VigorACS server that such device will be connected.
However URL, username and password under CPE client are fixed that users cannot change
it. The default CPE username and password are "vigor" and "password". You will
need it when you configure VigorACS server.
224
VigorPro5510 Series User’s Guide
ACS Server
Such data must be typed according to the ACS (Auto
Configuration Server) you want to link. Please refer to
VigorACS user’s manual for detailed information.
URL - Type the URL for VigorACS server.
If the connected CPE needs to be authenticated, please
set URL as the following and type username and
password for VigorACS server:
http://{IP address of
VigorACS}:8080/ACSServer/services/ACSServlet
If the connected CPE does not need to be authenticated
please set URL as the following:
http://{IP address of
VigorACS}:8080/ACSServer/services/UnAuthACSServ
let
Username/Password - Type username and password for
ACS Server for authentication. For example, if you want
to use such CPE with VigorACS, you can type as the
following:
Username: acs
Password: password
CPE Client
VigorPro5510 Series User’s Guide
It is not necessary for you to type them. Such information
is useful for Auto Configuration Server.
225
Enable/Disable – Sometimes, port conflict might be
occurred. To solve such problem, you might want to
change port number for CPE. Please click Enable and
change the port number.
Periodic Inform Settings
Disable – The system will not send inform message to
ACS server.
Enable – The system will send inform message to ACS
server periodically (with the time set in the box of
interval time).
The default setting is Enable. Please set interval
time or schedule time for the router to send
notification to CPE. Or click Disable to close the
mechanism of notification.
STUN Settings
Disable – The system will not send connection request
binding message to STUN server. The default setting is
Disable.
Enable –The system will send connection request
binding message to STUN server.
Server IP – Type the domain name or IP address of the
STUN server.
Server Port –Type the server port. The default setting is
3478.
Minimum Keep Alive Period – The default setting is 60
seconds. It determines the minimum period that the
STUN binding request must be sent by the CPE to
maintain the binding.
Maximum Keep Alive Period - It determines the
maximum period that the STUN binding request must be
sent by the CPE to maintain the binding.
3.16.3 Administrator Password
This page allows you to set new password.
Old Password
Type in the old password. The factory default setting for
password is blank.
New Password
Type in new password in this field.
Confirm Password
Type in the new password again.
226
VigorPro5510 Series User’s Guide
When you click OK, the login window will appear. Please use the new password to access
into the web configurator again.
3.16.4 Configuration Backup
Backup the Configuration
Follow the steps below to backup your configuration.
1.
Go to System Maintenance >> Configuration Backup. The following windows will
be popped-up, as shown below.
2.
Click Backup button to get into the following dialog. Click Save button to open
another dialog for saving configuration as a file.
3.
In Save As dialog, the default filename is config.cfg. You could give it another name
by yourself.
VigorPro5510 Series User’s Guide
227
4.
Click Save button, the configuration will download automatically to your computer as a
file named config.cfg.
The above example is using Windows platform for demonstrating examples. The Mac or
Linux platform will appear different windows, but the backup function is still available.
Note: Backup for Certification must be done independently. The Configuration
Backup does not include information of Certificate.
Restore Configuration
1.
Go to System Maintenance >> Configuration Backup. The following windows will
be popped-up, as shown below.
2.
Click Browse button to choose the correct configuration file for uploading to the
router.
3.
Click Restore button and wait for few seconds, the following picture will tell you that
the restoration procedure is successful.
3.16.5 Syslog/Mail Alert
SysLog function is provided for users to monitor router. There is no bother to directly get
into the Web Configurator of the router or borrow debug equipments.
228
VigorPro5510 Series User’s Guide
SysLog Access Setup
Enable (Syslog Access…)
Check “Enable” to activate function of syslog.
Router Name
Assign a name for the router.
Server IP Address
The IP address of the Syslog server.
Destination Port
Assign a port for the Syslog protocol.
Enable syslog message
Check the box listed on this web page to send the
corresponding message of firewall, VPN, User Access,
Call, WAN, Router/DSL information to Syslog.
AI/AV AlertLog Setup
Enable (Alert Setup…)
Check “Enable” to activate function of AI/AV attack log.
AlertLog Port
Type the port number for the alertlog and Check the box
to send the corresponding message of AI/AV Attack Log,
Access Block Log to Syslog.
Mail Alert Setup
Enable (Alert Setup…)
Check “Enable” to activate function of mail alert.
Send a test e-mail
Make a simple test for the e-mail address specified in this
page. Please assign the mail address first and click this
button to execute a test for verify the mail address is
available or not
SMTP Server
The IP address of the SMTP server.
Mail To
Assign a mail address for sending mails out.
Specify an e-mail address of another mailbox to accept
all returned messages if some fatal problems occur at the
recipient mailbox. The e-mail address typed in this field
VigorPro5510 Series User’s Guide
229
also acts as Sender address while Vigor router sends out
the alert e-mails.
Authentication
Check this box to activate this function while using
e-mail application.
User Name
Type the user name for authentication.
Password
Type the password for authentication.
Enable E-Mail Alert
Check the box to send alert message to the e-mail box
while the router detecting the item(s) you specify here.
Click OK to save these settings.
For viewing the Syslog, please do the following:
1.
Just set your monitor PC’s IP address in the field of Server IP Address
2.
Install the Router Tools in the Utility within provided CD. After installation, click on
the Router Tools>>Syslog from program menu.
3.
From the Syslog screen, select the router you want to monitor. Be reminded that in
Network Information, select the network adapter used to connect to the router.
Otherwise, you won’t succeed in retrieving information from the router.
230
VigorPro5510 Series User’s Guide
3.16.6 Time and Date
It allows you to specify where the time of the router should be inquired from.
Current System Time
Click Inquire Time to get the current time.
Use Browser Time
Select this option to use the browser time from the remote
administrator PC host as router’s system time.
Use Internet Time
Select to inquire time information from Time Server on the
Internet using assigned protocol.
Time Protocol
Select a time protocol.
Server IP Address
Type the IP address of the time server.
Time Zone
Select the time zone where the router is located.
Automatically Update
Interval
Select a time interval for updating from the NTP server.
Click OK to save these settings.
VigorPro5510 Series User’s Guide
231
3.16.7 Management
This page allows you to manage the settings for access control, access list, port setup, and
SNMP setup. For example, as to management access control, the port number is used to
send/receive SIP message for building a session. The default value is 5060 and this must
match with the peer Registrar when making VoIP calls.
Allow management from
the Internet
Enable the checkbox to allow system administrators to login
from the Internet. There are several servers provided by the
system to allow you managing the router from Internet. Check
the box(es) to specify.
Disable PING from the
Internet
Check the checkbox to reject all PING packets from the
Internet. For security issue, this function is enabled by default.
External Device Auto
Discovery
Check the checkbox to detect external devices connected to
current router automatically.
Access List
You could specify that the system administrator can only
login from a specific host or network defined in the list. A
maximum of three IPs/subnet masks is allowed.
List IP - Indicate an IP address allowed to login to the router.
Subnet Mask - Represent a subnet mask allowed to login to
the router.
User Define Ports
Check to specify user-defined port numbers for the Telnet and
HTTP servers.
Default Ports
Check to use standard port numbers for the Telnet and HTTP
servers.
Enable SNMP Agent
Check it to enable this function.
Get Community
Set the name for getting community by typing a proper
character. The default setting is public.
232
VigorPro5510 Series User’s Guide
Set Community
Set community by typing a proper name. The default setting is
private.
Manager Host IP
Set one host as the manager to execute SNMP function.
Please type in IP address to specify certain host.
Trap Community
Set trap community by typing a proper name. The default
setting is public.
Notification Host IP
Set the IP address of the host that will receive the trap
community.
Trap Timeout
The default setting is 10 seconds.
3.16.8 Reboot System
The Web Configurator may be used to restart your router. Click Reboot System from
System Maintenance to open the following page.
If you want to reboot the router using the current configuration, check Using current
configuration and click OK. To reset the router settings to default values, check Using
factory default configuration and click Reboot Now. The router will take 5 seconds to
reboot the system.
In addition, you can enter the index of schedule profiles to reboot your system according to
the preconfigured schedules. When you finish the reboot time schedule, please click OK to
save it. For detailed configuration of time schedule, please refer to section Schedule.
VigorPro5510 Series User’s Guide
233
3.16.9 Firmware Upgrade
Before upgrading your router firmware, you need to install the Router Tools. The Firmware
Upgrade Utility is included in the tools. The following web page will guide you to upgrade
firmware by using an example. Note that this example is running over Windows OS
(Operating System).
Download the newest firmware from DrayTek's web site or FTP site. The DrayTek web site
is www.draytek.com (or local DrayTek's web site) and FTP site is ftp.draytek.com.
Click System Maintenance>> Firmware Upgrade to launch the Firmware Upgrade Utility.
Click OK. The following screen will appear. Please execute the firmware upgrade utility
first.
For the detailed information about firmware update, please go to Chapter 4.
234
VigorPro5510 Series User’s Guide
3.17 Diagnostics
Diagnostic Tools provide a useful way to view or diagnose the status of your Vigor router.
Below shows the menu items for Diagnostics.
3.17.1 Dial-out Trigger
Click Diagnostics and click Dial-out Trigger to open the web page. The internet connection
(e.g., ISDN, PPPoE, PPPoA, etc) is triggered by a package sending from the source IP
address.
Decoded Format
It shows the source IP address (local), destination IP (remote)
address, the protocol and length of the package.
Refresh
Click it to reload the page.
VigorPro5510 Series User’s Guide
235
3.17.2 Routing Table
Click Diagnostics and click Routing Table to open the web page.
Refresh
Click it to reload the page.
3.17.3 ARP Cache Table
Click Diagnostics and click ARP Cache Table to view the content of the ARP (Address
Resolution Protocol) cache held in the router. The table shows a mapping between an
Ethernet hardware address (MAC Address) and an IP address.
Refresh
Click it to reload the page.
Clear
Click it to clear the whole table.
236
VigorPro5510 Series User’s Guide
3.17.4 DHCP Table
The facility provides information on IP address assignments. This information is helpful in
diagnosing network problems, such as IP address conflicts, etc.
Click Diagnostics and click DHCP Table to open the web page.
Index
It displays the connection item number.
IP Address
It displays the IP address assigned by this router for specified
PC.
MAC Address
It displays the MAC address for the specified PC that DHCP
assigned IP address for it.
Leased Time
It displays the leased time of the specified PC.
HOST ID
It displays the host ID name of the specified PC.
Refresh
Click it to reload the page.
3.17.5 NAT Sessions Table
Click Diagnostics and click NAT Sessions Table to open the setup page.
Private IP:Port
It indicates the source IP address and port of local PC.
#Pseudo Port
It indicates the temporary port of the router used for NAT.
VigorPro5510 Series User’s Guide
237
Peer IP :Port
It indicates the destination IP address and port of remote host.
Interface
It indicates the interface of the WAN connection.
Refresh
Click it to reload the page.
3.17.6 Wireless VLAN Online Station Table
Click Diagnostics and click Wireless VLAN Online Station Table to open the web page. It
will display the IP address, MAC address and Login ID information for all the Wireless
VLAN stations.
IP Address
Display the IP address of the wireless station.
MAC Address
Display the MAC address of the wireless station.
Login ID
Display the login ID that the wireless station belongs to.
Note: Such feature is available for Vigor5510Gi only.
3.17.7 LAN Security Monitor
This page displays the running procedure for the IP address monitored and refreshes the data
in an interval of several seconds. The IP address listed here is configured in Bandwidth
Management. You have to enable IP bandwidth limit and IP session limit before invoke Data
Flow Monitor. If not, a notification dialog box will appear to remind you enabling it.
Click Diagnostics and click Data Flow Monitor to open the web page. You can click IP
Address, TX rate, RX rate or Session link for arranging the data display.
238
VigorPro5510 Series User’s Guide
LAN Security Monitor
Check this box to enable this function.
Refresh Seconds
Use the drop down list to choose the time interval of
refreshing data flow that will be done by the system
automatically.
Refresh
Click this link to refresh this page manually.
Index
Display the number of the data flow.
IP Address
Display the IP address of the monitored device.
TX rate (kbps)
Display the transmission speed of the monitored device.
RX rate (kbps)
Display the receiving speed of the monitored device.
Sessions
Display the session number that you specified in Limit
Session web page.
Action
Block - can prevent specified PC accessing into Internet
within 5 minutes.
VigorPro5510 Series User’s Guide
239
Unblock – the device with the IP address will be blocked in
five minutes. The remaining time will be shown on the session
column.
Current /Peak/Speed
Current means current transmission rate and receiving rate
for WAN1/WAN2.
Peak means the highest peak value detected by the router in
data transmission.
Speed means line speed specified in WAN>>General. If you
do not specify any rate at that page, here will display Auto for
instead.
3.17.8 Traffic Graph
Click Diagnostics and click Traffic Graph to pen the web page. Choose WAN1
Bandwidth/WAN2 Bandwidth, Sessions, daily or weekly for viewing different traffic graph.
Click Refresh to renew the graph at any time. The following two figures display different
charts by daily and weekly.
240
VigorPro5510 Series User’s Guide
The horizontal axis represents time. Yet the vertical axis has different meanings. For
WAN1/WAN2 Bandwidth chart, the numbers displayed on vertical axis represent the
numbers of the transmitted and received packets in the past.
For Sessions chart, the numbers displayed on vertical axis represent the numbers of the NAT
sessions during the past.
3.17.9 Ping Diagnosis
Click Diagnostics and click Ping Diagnosis to pen the web page.
Ping through
VigorPro5510 Series User’s Guide
Use the drop down list to choose the WAN interface that you
want to ping through or choose Unspecified to be determined
by the router automatically.
241
Ping to
Use the drop down list to choose the destination that you want
to ping.
IP Address
Type in the IP address of the Host/IP that you want to ping.
Run
Click this button to start the ping work. The result will be
displayed on the screen.
Clear
Click this link to remove the result on the window.
3.17.10 Trace Route
Click Diagnostics and click Trace Route to open the web page. This page allows you to
trace the routes from router to the host. Simply type the IP address of the host in the box and
click Run. The result of route trace will be shown on the screen.
Trace through
Use the drop down list to choose the WAN interface that you want
to ping through or choose Unspecified to be determined by the
router automatically.
Protocol
Use the drop down list to choose suitable protocol.
Host/IP Address
It indicates the IP address of the host.
242
VigorPro5510 Series User’s Guide
Run
Click this button to start route tracing work.
Clear
Click this link to remove the result on the window.
3.17.11 AV/AI Top 10
This page provides information for the Top 10 of Anti-Virus and Anti-Intrusion signatures
used frequently.
VigorPro5510 Series User’s Guide
243
3.17.12 Web Firewall Syslog
This page displays the time and message for firewall settings. You can check Enable Web
Firewall Syslog and choose the display mode you want. Later, the event of firewall will be
shown for your reference.
244
VigorPro5510 Series User’s Guide
4
Registration for the Router
To use the anti-intrusion, anti-virus, anti-spam and WCF features of VigorPro series router,
you have to create a new account, finish the registration for that account by using the router
and complete the registration for the Vigor router. After finishing the registration of the
router, you can download the newly update types and rules of anti-intrusion, anti-virus,
anti-spam and WCF during the valid time of the license key you purchased.
There are two ways to create and activate new account. One is created by accessing
http://myvigor.draytek.com (refer to section 4.1), the other is from router’s web configurator
(refer to section 4.2).
After activating the new account, you have to register your router from router’s web
configurator (refer to section 4.3). Follow the steps listed below to finish the registration and
activation.
Note: The website of MyVigor (a server located on http://myvigor.draytek.com) provides
several useful services (such as Anti-Spam, Web Content Filter, Anti-Intrusion, and etc.)
to filtering the web pages for the sake of protecting your system.
4.1 Creating and Activating an Account from MyVigor Website
Follow the steps below to create an account for MyVigor.
1.
Access into http://myvigor.draytek.com. Find the line of Not registered yet?. Then,
click the link Click here! to access into next page.
VigorPro5510 Series User’s Guide
245
2.
Check to confirm that you accept the Agreement and click Accept.
3.
Type your personal information in this page and then click Continue.
246
VigorPro5510 Series User’s Guide
4.
Choose proper selection for your computer and click Continue.
5.
Now you have created an account successfully. Click START.
6.
Check to see the confirmation email with the title of New Account Confirmation
Letter from myvigor.draytek.com.
VigorPro5510 Series User’s Guide
247
7.
Click the Activate my Account link to enable the account that you created. The
following screen will be shown to verify the register process is finished. Please click
Login.
8.
When you see the following page, please type in the account and password (that you
just created) in the fields of UserName and Password. Then type the code in the box
of Auth Code according to the value displayed on the right side of it.
9.
Now, click Login. Your account has been activated. You can access into MyVigor
server to activate the service (e.g., WCF) that you want.
248
VigorPro5510 Series User’s Guide
4.2 Creating and Activating an Account from Router Web
Configurator
You can also create and register a new account from the web configurator of the VigorPro
router.
1.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password. Do not type any word on the window and click
OK.
2.
From the router’s web page, please open Defense Configuration >>Activation. Or,
Click CSM>> Web Content Filter Profile.
or
3.
You will get the following page. Click the Activate link from the Activation web page.
Or
VigorPro5510 Series User’s Guide
249
4.
Click the Activate link. A login page for MyVigor web site will pop up automatically.
5.
Click the link of Create an account now.
6.
Check to confirm that you accept the Agreement and click Accept.
250
VigorPro5510 Series User’s Guide
7.
Type your personal information in this page and then click Continue.
8.
Choose proper selection for your computer and click Continue.
VigorPro5510 Series User’s Guide
251
9.
Now you have created an account successfully. Click START.
10. Check to see the confirmation email with the title of New Account Confirmation
Letter from myvigor.draytek.com.
11. Click the Activate my Account link to enable the account that you created. The
following screen will be shown to verify the register process is finished. Please click
Login.
252
VigorPro5510 Series User’s Guide
12. When you see the following page, please type in the account and password (that you
just created) in the fields of UserName and Password.
13. Now, click Login. Your account has been activated. You can access into MyVigor
server to activate the service (e.g., WCF) that you want.
VigorPro5510 Series User’s Guide
DrayTek will maintain a database of MAC address/serial number of shipped
goods. Only products with shipping records can be registered. If your
VigorPro 5510 cannot hook up to your account, please contact your reseller
or DrayTek’s technical support.
253
4.3 Registering Your Vigor Router
You have activated the new account for the router. Now, it is the time for you to register
your vigor router. Open Defense Configuration >>Activation. Registering Vigor router
should be done just for once. If the router has been registered previously, the system will
not allow you to register the router again. After finishing the router registration, you can
activate Anti-Virus, Anti-Intrusion, Anti-Spam and Web Content Filter respectively.
1.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password. Do not type any word on the window and click
OK.
2.
From the router’s web page, please open Defense Configuration >>Activation.
3.
You will see the following web page. Click one of the Activate links from the
Activation web page.
254
VigorPro5510 Series User’s Guide
4.
A Login page will be shown on the screen. Please type the account and password that
you created previously. And click Login.
5.
The following page will be displayed after you logging in VigorPro server. From this
page, please click Add.
VigorPro5510 Series User’s Guide
255
6.
When the following page appears, please type in Nick Name (for the router) and choose
the right purchase date from the popup calendar (it appears when you click on the box
of Purchase Date).
7.
After adding the basic information for the router, please click Submit.
8.
Now, your router information has been added to the database. Click OK to leave this
web page and return to My Product web page.
256
VigorPro5510 Series User’s Guide
9.
Now, you have finished the procedure for registering your router.
4.4 Activating Anti-Virus/Anti-Intrusion/Anti-Spam/WCF Service
After registering your vigor router, you have to follow the steps listed below to activate
anti-virus/anti-intrusion/anti-spam/web content filter (WCF) service to obtain full security
for your computer.
4.4.1 For Anti-Virus and Anti-Intrusion Service
1.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password.
2.
From the router’s web page, please open Defense Configuration >>Activation. You
will see the following web page.
3.
Click the Activate link from Anti-Intrusion/Anti-Virus License to activate
Anti-Intrusion/Anti-Virus service.
VigorPro5510 Series User’s Guide
257
4.
A Login page will be shown on the screen. Please type the account and password that
you created previously. And click Login.
5.
On the web page of My Product, you can find a list of the devices that you add with
the above steps. Currently, you just have added VigorPro 5510. Please click the serial
number link.
258
VigorPro5510 Series User’s Guide
6.
From the Device’s Service section, click the Trial button for AI-AV (Anti-Intrusion &
Anti-Virus) service with provider DT-DT.
Rename
It allows you to change the account name.
Delete
It allows you to delete account name used currently.
Transfer
It allows you to transfer the VigorPro device together with
applied license to someone who has already registered another
account in www.vigorpro.com. Be sure to press this button to
transfer the product to whom you want to give. Otherwise
he/she might not be able to maintain the license hooked up to
the VigorPro device.
Back
It allows you to return to the previous account.
VigorPro5510 Series User’s Guide
259
7.
In the following page, check the box of “I have read and accept the above
Agreement”. The system will find out the date for you to activate this version of
service. Then, click Next.
Note: DT-DT means you can acquire the anti-intrusion and anti-virus services
from DrayTek Corporation.
8.
When this page appears, click Register.
9.
Next, the DrayTek Service Activation screen will be shown as the following:
260
VigorPro5510 Series User’s Guide
(Above figure supposes you have not activated Anti-Spam and Web Content Filter
yet.)
10. Click Close.
11. Open Defense Configuration>>Activation page of the router’s web configurator. The
start date and expire date for the license are shown in this page.
12. Click Activate to access into VigorPro website again. Open the following page. You
will see the AI-AV (with provider DT-DT) service as been activated and in use.
Now, you have finished Anti-Intrusion/Anti-Virus configuration.
VigorPro5510 Series User’s Guide
261
4.4.2 For Anti-Spam Service
Please follow the steps below to activate Anti-Spam Service for your system.
Getting 30 Days of Free Charge
1.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password.
2.
From the router’s web page, please open Defense Configuration >>Activation. You
will see the following web page.
3.
Click the Activate link from Anti-Spam License to activate Anti-Spam service.
262
VigorPro5510 Series User’s Guide
4.
A Login page will be shown on the screen. Please type the account and password that
you created previously. And click Login.
5.
On the web page of My Product, click the Trial button for AS (Anti-Spam) service.
VigorPro5510 Series User’s Guide
263
6.
In this page, check the box of “I have read and accept the above Agreement”. The
system will find out the date for you to activate this version of service. Then, click
Next.
Note: CTCH means you can acquire anti-spam service from Commtouch.
7.
When this page appears, click Register.
8.
Next, the DrayTek Service Activation screen will be shown as the following.
264
VigorPro5510 Series User’s Guide
9.
Click Close.
10. Open Defense Configuration>>Activation page of the router’s web configurator. The
start date and expire date for the license are shown in this page.
Now, you have finished all the procedure for activating Anti-Spam service for your router.
Note: You are allowed to use this version (with anti-spam feature) for 30 days after
registration for your router. In addition, you will be informed with an e-mail before expire
date of this version.
VigorPro5510 Series User’s Guide
265
4.4.3 For WCF (Web Content Filter) Service
Please follow the steps below to activate WCF Service for your system.
1.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password.
2.
From the router’s web page, please open Defense Configuration >>Activation. You
will see the following web page.
3.
Click the Activate link from Web-Filter License to activate WCF service.
266
VigorPro5510 Series User’s Guide
4.
A Login page will be shown on the screen. Please type the account and password that
you created previously. And click Login.
5.
On the web page of My Product, click the Trial button for WCF (Web Content Filter)
service.
VigorPro5510 Series User’s Guide
267
6.
In this page, check the box of “I have read and accept the above Agreement”. The
system will find out the date for you to activate this version of service. Then, click
Next.
7.
When this page appears, click Register.
8.
Next, the DrayTek Service Activation screen will be shown as the following.
268
VigorPro5510 Series User’s Guide
9.
Click Close.
10. Open Defense Configuration>>Activation page of the router’s web configurator. The
start date and expire date for the license are shown in this page.
Now, you have finished all the procedure for activating WCF service for your router.
Note: You are allowed to use this version (with WCF feature) for few days after
registration for your router. In addition, you will be informed with an e-mail before expire
date of this version.
VigorPro5510 Series User’s Guide
269
4.5 Backup and Upgrade Signature for Anti-Intrusion/Anti-Virus
You can get the most updated signature from DrayTek’s server if the license key of
anti-virus/anti-intrusion for the VigorPro 5510 is not expired. Before you upgrade the
signature, please check the validation information either from WEB user interface of
VigorPro 5510 or account information from www.vigorpro.com.
1.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password. Do not type any word on the window and click
OK.
2.
From the router’s web page, please open Defense Configuration >>Signature
Upgrade. You will see the following web page.
3.
On Signature Upgrade web page, locate Backup and Download Now!!!.
Time for Backup
Before changing other license, it is suggested for you to backup the original signature first.
To backup current signature with the filename vigorpro.sig, click Backup.
Time for Download
After changing other license, it is suggested for you to download newly update signature for
your router. To download newly update anti-intrusion and anti-virus from VigorPro website,
please click Download Now!!!.
270
VigorPro5510 Series User’s Guide
Time for Import
Backup files can be imported whenever you want. To use a saved signature information,
please click Import.
In addition, users can specify certain time for executing the upgrade automatically by the
router. Remember to check the Schedule Update box and click OK to activate the time
settings.
4.6 Enabling Anti-Virus/Anti-Intrusion/Anti-Spam/WCF
After applying an account, registering your account and router, you have to access into the
web page of Vigor router to enable Anti-Virus/Anti-Intrusion/Anti-Spam/Web Content Filter
(WCF) functions. There are two ways to enable it.
A. For the default rule of firewall, please open Firewall>>General Setup page. Check the
box of Enable for Anti-Intrusion and choose proper action (profile) from the drop down
list of Anti-Virus. Next, click OK to finish the procedure of activation.
VigorPro5510 Series User’s Guide
271
B. For specified filter rule (there are twelve filter sets in Firewall, and each set is allowed to
set seven filter rules), please check the box of Enable for Anti-Intrusion and choose
proper action (profile) from the drop down list of Anti-Virus/Anti-Spam/Web Content
Filter. Next, click OK to finish the procedure of activation.
If you did not check the Anti-Intrusion box and choose a proper profile for
Anti-Virus/Anti-Spam/Web Content Filter, you still cannot use the
Anti-Intrusion/Anti-Virus/Anti-Spam/Web Content Filter function even if you finished all
the relational profiles.
272
VigorPro5510 Series User’s Guide
5
Application and Examples
5.1 Create a LAN-to-LAN Connection Between Remote Office
and Headquarter
The most common case is that you may want to connect to network securely, such as the
remote branch office and headquarter. According to the network structure as shown in the
below illustration, you may follow the steps to create a LAN-to-LAN profile. These two
networks (LANs) should NOT have the same network address.
Settings in Router A in headquarter:
1.
Go to VPN and Remote Access and select Remote Access Control to enable the
necessary VPN service and click OK.
2.
Then,
For using PPP based services, such as PPTP, L2TP, you have to set general settings in
PPP General Setup.
VigorPro5510 Series User’s Guide
273
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to
set general settings in IPSec General Setup, such as the pre-shared key that both
parties have known.
3.
Go to LAN-to-LAN. Click on one index number to edit a profile.
4.
Set Common Settings as shown below. You should enable both of VPN connections
because any one of the parties may start the VPN connection.
5.
Set Dial-Out Settings as shown below to dial to connect to Router B aggressively with
the selected Dial-Out method.
If an IPSec-based service is selected, you should further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-Out
connection.
274
VigorPro5510 Series User’s Guide
If a PPP-based service is selected, you should further specify the remote peer IP
Address, Username, Password, PPP Authentication and VJ Compression for this
Dial-Out connection.
6.
Set Dial-In settings to as shown below to allow Router B dial-in to build VPN
connection.
If an IPSec-based service is selected, you may further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-In
connection. Otherwise, it will apply the settings defined in IPSec General Setup above.
VigorPro5510 Series User’s Guide
275
If a PPP-based service is selected, you should further specify the remote peer IP
Address, Username, Password, and VJ Compression for this Dial-In connection.
7.
At last, set the remote network IP/subnet in TCP/IP Network Settings so that Router
A can direct the packets destined to the remote network to Router B via the VPN
connection.
Settings in Router B in the remote office:
1.
Go to VPN and Remote Access and select Remote Access Control to enable the
necessary VPN service and click OK.
276
VigorPro5510 Series User’s Guide
2.
Then, for using PPP based services, such as PPTP, L2TP, you have to set general
settings in PPP General Setup.
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to
set general settings in IPSec General Setup, such as the pre-shared key that both
parties have known.
3.
Go to LAN-to-LAN. Click on one index number to edit a profile.
4.
Set Common Settings as shown below. You should enable both of VPN connections
because any one of the parties may start the VPN connection.
5.
Set Dial-Out Settings as shown below to dial to connect to Router B aggressively with
the selected Dial-Out method.
If an IPSec-based service is selected, you should further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-Out
VigorPro5510 Series User’s Guide
277
connection.
If a PPP-based service is selected, you should further specify the remote peer IP
Address, Username, Password, PPP Authentication and VJ Compression for this
Dial-Out connection.
6.
Set Dial-In settings to as shown below to allow Router A dial-in to build VPN
connection.
If an IPSec-based service is selected, you may further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-In
connection. Otherwise, it will apply the settings defined in IPSec General Setup above.
278
VigorPro5510 Series User’s Guide
If a PPP-based service is selected, you should further specify the remote peer IP
Address, Username, Password, and VJ Compression for this Dial-In connection.
7.
At last, set the remote network IP/subnet in TCP/IP Network Settings so that Router
B can direct the packets destined to the remote network to Router A via the VPN
connection.
VigorPro5510 Series User’s Guide
279
5.2 Create a Remote Dial-in User Connection Between the
Teleworker and Headquarter
The other common case is that you, as a teleworker, may want to connect to the enterprise
network securely. According to the network structure as shown in the below illustration, you
may follow the steps to create a Remote User Profile and install Smart VPN Client on the
remote host.
Settings in VPN Router in the enterprise office:
1.
Go to VPN and Remote Access and select Remote Access Control to enable the
necessary VPN service and click OK.
2.
Then, for using PPP based services, such as PPTP, L2TP, you have to set general
settings in PPP General Setup.
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to
set general settings in IKE/IPSec General Setup, such as the pre-shared key that both
parties have known.
280
VigorPro5510 Series User’s Guide
3.
Go to Remote Dial-In Users. Click on one index number to edit a profile.
4.
Set Dial-In settings to as shown below to allow the remote user dial-in to build VPN
connection.
If an IPSec service is selected, you may further specify the remote peer IP Address,
IKE Authentication Method and IPSec Security Method for this Dial-In connection.
Otherwise, it will apply the settings defined in IPSec General Setup above.
If a PPTP service is selected, you should further specify the remote peer IP Address,
Username, Password, and VJ Compression for this Dial-In connection.
VigorPro5510 Series User’s Guide
281
Settings in the remote host:
1.
For Win98/ME, you may use "Dial-up Networking" to create the PPTP tunnel to Vigor
router. For Win2000/XP, please use "Network and Dial-up connections" or “Smart
VPN Client”, complimentary software to help you create PPTP, L2TP, and L2TP over
IPSec tunnel. You can find it in CD-ROM in the package or go to www.draytek.com
download center. Install as instructed.
2.
After successful installation, for the first time user, you should click on the Step 0.
Configure button. Reboot the host.
3.
In Step 2. Connect to VPN Server, click Insert button to add a new entry.
282
VigorPro5510 Series User’s Guide
If an IPSec-based service is selected as shown below,
You may further specify the method you use to get IP, the security method, and
authentication method. If the Pre-Shared Key is selected, it should be consistent with
the one set in VPN router.
If a PPP-based service is selected, you should further specify the remote VPN server IP
address, Username, Password, and encryption method. The User Name and Password
should be consistent with the one set up in the VPN router. To use default gateway on
remote network means that all the packets of remote host will be directed to VPN
server then forwarded to Internet. This will make the remote host seem to be working
in the enterprise network.
VigorPro5510 Series User’s Guide
283
4.
Click Connect button to build connection. When the connection is successful, you will
find a green light on the right down corner.
5.3 QoS Setting Example
Assume a teleworker sometimes works at home and takes care of children. When working
time, he would use Vigor router at home to connect to the server in the headquarter office
downtown via either HTTPS or VPN to check email and access internal database.
Meanwhile, children may chat on Skype in the restroom.
1.
Go to Bandwidth Management>>Quality of Service.
2.
Click Setup link for WAN1. Make sure the QoS Control on the left corner is checked.
And select BOTH as the Direction.
3.
Set Inbound/Outbound bandwidth.
284
VigorPro5510 Series User’s Guide
Note: The rate of outbound/inbound must be smaller than the real bandwidth to
ensure correct calculation of QoS. It is suggested to set the bandwidth value for
inbound/outbound as 80% - 85% of physical network speed provided by ISP to
maximize the QoS performance.
4.
Return to previous page. Enter the Name of Index Class 1 by clicking Edit link. Type
the name “E-mail” for Class 1.
5.
For this index, the user will set reserved bandwidth (e.g., 25%) for Email using
protocol POP3 and SMTP.
6.
Return to previous page. Enter the Name of Index Class 2 by clicking Edit link. In this
index, the user will set reserved bandwidth (e.g., 25%) for HTTP.
7.
Click Setup link for WAN1.
VigorPro5510 Series User’s Guide
285
8.
Check Enable UDP Bandwidth Control on the bottom to prevent enormous UDP
traffic of VoIP influent other application, and click OK.
9.
If the worker has connected to the headquarter using host to host VPN tunnel. (Please
refer to Chapter 3 VPN for detail instruction), he may set up an index for it. Enter the
Class Name of Index 3. In this index, he will set reserve bandwidth for 1 VPN tunnel.
10. Click edit to open a new window.
286
VigorPro5510 Series User’s Guide
11. First, check the ACT box. Then click Edit of Local Address to set a worker’s subnet
address. Click Edit of Remote Address to set headquarter’s subnet address. Leave
other fields and click OK.
5.4 LAN – Created by Using NAT
An example of default setting and the corresponding deployment are shown below. The
default Vigor router private IP address/Subnet Mask is 192.168.1.1/255.255.255.0. The
built-in DHCP server is enabled so it assigns every local NATed host an IP address of
192.168.1.x starting from 192.168.1.10.
You can just set the settings wrapped inside the red rectangles to fit the request of NAT
usage.
VigorPro5510 Series User’s Guide
287
To use another DHCP server in the network rather than the built-in one of Vigor Router, you
have to change the settings as show below.
You can just set the settings wrapped inside the red rectangles to fit the request of NAT
usage.
288
VigorPro5510 Series User’s Guide
5.5 Upgrade Firmware for Your Router
Before upgrading your router firmware, you need to install the Router Tools. The Firmware
Upgrade Utility is included in the tools.
1. Go to www.draytek.com.
2. Access into Support >> Downloads. Please find out Firmware menu and click it.
Search the model you have and click on it to download the newly update firmware for
your router.
3. Access into Support >> Downloads. Please find out Utility menu and click it.
4. Click on the link of Router Tools to download the file. After downloading the files,
please decompressed the file onto your host.
VigorPro5510 Series User’s Guide
289
5. Double click on the icon of router tool. The setup wizard will appear.
6. Follow the onscreen instructions to install the tool. Finally, click Finish to end the
installation.
7. From the Start menu, open Programs and choose Router Tools XXX >> Firmware
Upgrade Utility.
8. Type in your router IP, usually 192.168.1.1.
9. Click the button to the right side of Firmware file typing box. Locate the files that you
download from the company web sites. You will find out two files with different
extension names, xxxx.all (keep the old custom settings) and xxxx.rst (reset all the
custom settings to default settings). Choose any one of them that you need.
290
VigorPro5510 Series User’s Guide
10. Click Send.
Now the firmware update is finished.
VigorPro5510 Series User’s Guide
291
5.6 Request a certificate from a CA server on Windows CA
Server
1.
Go to Certificate Management and choose Local Certificate.
292
VigorPro5510 Series User’s Guide
2.
You can click GENERATE button to start to edit a certificate request. Enter the
information in the certificate request.
3.
Copy and save the X509 Local Certificate Requet as a text file and save it for later use.
VigorPro5510 Series User’s Guide
293
4.
Connect to CA server via web browser. Follow the instruction to submit the request.
Below we take a Windows 2000 CA server for example. Select Request a Certificate.
Select Advanced request.
Select Submit a certificate request a base64 encoded PKCS #10 file or a renewal
request using a base64 encoded PKCS #7 file
Import the X509 Local Certificate Requet text file. Select Router (Offline request) or
IPSec (Offline request) below.
294
VigorPro5510 Series User’s Guide
Then you have done the request and the server now issues you a certificate. Select Base
64 encoded certificate and Download CA certificate. Now you should get a certificate
(.cer file) and save it.
5.
Back to Vigor router, go to Local Certificate. Click IMPORT button to open next
page.
6.
Browse the file to import the certificate (.cer file) into Vigor router.
VigorPro5510 Series User’s Guide
295
7.
When the file is imported successfully, the following dialog will appear.
8.
You may review the detail information of the certificate by clicking View button.
296
VigorPro5510 Series User’s Guide
5.7 Request a CA Certificate and Set as Trusted on Windows
CA Server
1.
Use web browser connecting to the CA server that you would like to retrieve its CA
certificate. Click Retrive the CA certificate or certificate recoring list.
VigorPro5510 Series User’s Guide
297
2.
In Choose file to download, click CA Certificate Current and Base 64 encoded, and
Download CA certificate to save the .cer. file.
3.
Back to Vigor router, go to Trusted CA Certificate. Click IMPORT button and
browse the file to import the certificate (.cer file) into Vigor router. When finished,
click refresh and you will find the below illustration.
4.
You may review the detail information of the certificate by clicking View button.
Note: Before setting certificate configuration, please go to System Maintenance >>
Time and Date to reset current time of the router first.
298
VigorPro5510 Series User’s Guide
6
Trouble Shooting
This section will guide you to solve abnormal situations if you cannot access into the Internet
after installing the router and finishing the web configuration. Please follow sections below
to check your basic installation status stage by stage.
z
Checking if the hardware status is OK or not.
z
Checking if the network connection settings on your computer are OK or not.
z
Pinging the router from your computer.
z
Checking if the ISP settings are OK or not.
z
Backing to factory default setting if necessary.
If all above stages are done and the router still cannot run normally, it is the time for you to
contact your dealer for advanced help.
6.1 Checking If the Hardware Status Is OK or Not
Follow the steps below to verify the hardware status.
1.
Check the power line and WLAN/LAN cable connections.
Refer to “1.3 Hardware Installation” for details.
2.
Turn on the router. Make sure the ACT LED blink once per second and the
correspondent LAN LED is bright.
3.
If not, it means that there is something wrong with the hardware status. Simply back to
“1.3 Hardware Installation” to execute the hardware installation again. And then, try
again.
6.2 Checking If the Network Connection Settings on Your
Computer Is OK or Not
Sometimes the link failure occurs due to the wrong network connection settings. After trying
the above section, if the link is stilled failed, please do the steps listed below to make sure
the network connection settings is OK.
VigorPro5510 Series User’s Guide
299
For Windows
The example is based on Windows XP. As to the examples for other operation
systems, please refer to the similar steps or find support notes in
www.draytek.com.
1.
Go to Control Panel and then double-click on Network Connections.
2.
Right-click on Local Area Connection and click on Properties.
3.
Select Internet Protocol (TCP/IP) and then click Properties.
300
VigorPro5510 Series User’s Guide
4.
Select Obtain an IP address automatically and Obtain DNS server address
automatically.
For MacOs
1.
Double click on the current used MacOs on the desktop.
2.
Open the Application folder and get into Network.
3.
On the Network screen, select Using DHCP from the drop down list of Configure
IPv4.
VigorPro5510 Series User’s Guide
301
6.3 Pinging the Router from Your Computer
The default gateway IP address of the router is 192.168.1.1. For some reason, you might
need to use “ping” command to check the link status of the router. The most important
thing is that the computer will receive a reply from 192.168.1.1. If not, please check the
IP address of your computer. We suggest you setting the network connection as get IP
automatically. (Please refer to the section 6.2)
Please follow the steps below to ping the router correctly.
For Windows
1.
Open the Command Prompt window (from Start menu> Run).
2.
Type command (for Windows 95/98/ME) or cmd (for Windows NT/ 2000/XP/Vista).
The DOS command dialog will appear.
3.
Type ping 192.168.1.1 and press [Enter]. If the link is OK, the line of “Reply from
192.168.1.1:bytes=32 time<1ms TTL=255” will appear.
4.
If the line does not appear, please check the IP address setting of your computer.
For MacOs (Terminal)
1.
Double click on the current used MacOs on the desktop.
2.
Open the Application folder and get into Utilities.
3.
Double click Terminal. The Terminal window will appear.
4.
Type ping 192.168.1.1 and press [Enter]. If the link is OK, the line of “64 bytes from
192.168.1.1: icmp_seq=0 ttl=255 time=xxxx ms” will appear.
302
VigorPro5510 Series User’s Guide
6.4 Checking If the ISP Settings are OK or Not
Click WAN>> Internet Access and then check whether the ISP settings are set correctly.
Click Details Page of WAN1/WAN2 to review the settings that you configured previously.
For PPPoE Users
1.
Check if the Enable option is selected.
2.
Check if Username and Password are entered with correct values that you got from
your ISP.
VigorPro5510 Series User’s Guide
303
For Static/Dynamic IP Users
1.
Check if the Enable option is selected.
2.
Check if IP address, Subnet Mask and Gateway are entered with correct values that
you got from your ISP.
For PPTP Users
1.
Check if the Enable option for PPTP Link is selected.
304
VigorPro5510 Series User’s Guide
2.
Check if PPTP Server, Username, Password and WAN IP address are set correctly
(must identify with the values from your ISP).
6.5 Backing to Factory Default Setting If Necessary
Sometimes, a wrong connection can be improved by returning to the default settings. Try to
reset the router by software or hardware.
Warning: After pressing factory default setting, you will loose all
settings you did before. Make sure you have recorded all useful settings
before you pressing. The password of factory default is null.
Software Reset
You can reset the router to factory default via Web page.
Go to System Maintenance and choose Reboot System on the web page. The following
screen will appear. Choose Using factory default configuration and click OK. After few
seconds, the router will return all the settings to the factory settings.
VigorPro5510 Series User’s Guide
305
Hardware Reset
While the router is running (ACT LED blinking), press the RST button and hold for more
than 5 seconds. When you see the ACT LED blinks rapidly, please release the button. Then,
the router will restart with the default configuration.
After restore the factory default setting, you can configure the settings for the router again to
fit your personal request.
6.6 Contacting Your Dealer
If the router still cannot work correctly after trying many efforts, please contact your dealer
for further help right away. For any questions, please feel free to send e-mail to
[email protected].
306
VigorPro5510 Series User’s Guide

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement