User's manual MH-3400 - PLANET Technology Corporation.

User's manual MH-3400 - PLANET Technology Corporation.
Gigabit Multi-Homing VPN Security Router User’s Manual
User’s Manual
MH-3400
Gigabit Multi-Homing VPN
Security Router
1
Gigabit Multi-Homing VPN Security Router User’s Manual
Copyright
Copyright© 2012 by PLANET Technology Corp. All rights reserved. No part of this publication may be
reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer
language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or
otherwise, without the prior written permission of PLANET.
PLANET makes no representations or warranties, either expressed or implied, with respect to the contents
hereof and specifically disclaims any warranties, merchantability or fitness for any particular purpose. Any
software described in this manual is sold or licensed "as is". Should the programs prove defective following
their purchase, the buyer (and not this company, its distributor, or its dealer) assumes the entire cost of all
necessary servicing, repair, and any incidental or consequential damages resulting from any defect in the
software. Further, this company reserves the right to revise this publication and to make changes from time
to time in the contents hereof without obligation to notify any person of such revision or changes.
All brand and product names mentioned in this manual are trademarks and/or registered trademarks of their
respective holders.
Disclaimer
PLANET Technology does not warrant that the hardware will work properly in all environments and
applications, and makes no warranty and representation, either implied or expressed, with respect to the
quality, performance, merchantability, or fitness for a particular purpose.
PLANET has made every effort to ensure that this User’s Manual is accurate; PLANET disclaims liability
for any inaccuracies or omissions that may have occurred.
Information in this User’s Manual is subject to change without notice and does not represent a commitment
on the part of PLANET. PLANET assumes no responsibility for any inaccuracies that may be contained in
this User’s Manual. PLANET makes no commitment to update or keep current the information in this User’s
Manual, and reserves the right to make improvements to this User’s Manual and/or to the products described
in this User’s Manual, at any time without notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate your
comments and suggestions.
Trademarks
The PLANET logo is a trademark of PLANET Technology.
This documentation may refer to numerous hardware and software products by their trade names. In most, if
not all cases, these designations are claimed as trademarks or registered trademarks by their respective
companies.
CE mark Warning
This is a class B device, in a domestic environment; this product may cause radio interference, in which case the user
may be required to take adequate measures.
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can
be determined by turning the equipment off and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4. Consult the dealer or an experienced radio technician for help.
2
Gigabit Multi-Homing VPN Security Router User’s Manual
FCC Caution:
To assure continued compliance (example-use only shielded interface cables when connecting to computer or
peripheral devices). Any changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the Following two conditions: (1)
This device may not cause harmful interference, and (2) this Device must accept any interference received,
including interference that may cause undesired operation.
R&TTE Compliance Statement
This equipment complies with all the requirements of DIRECTIVE 1999/5/EC OF THE EUROPEAN
PARLIAMENT AND THE COUNCIL OF 9 March 1999 on radio equipment and telecommunication
terminal Equipment and the mutual recognition of their conformity (R&TTE)
The R&TTE Directive repeals and replaces in the directive 98/13/EEC (Telecommunications Terminal
Equipment and Satellite Earth Station Equipment) As of April 8, 2000.
WEEE Caution
To avoid the potential effects on the environment and human health as a result of the presence of hazardous
substances in electrical and electronic equipment, end users of electrical and electronic equipment should
understand the meaning of the crossed-out wheeled bin symbol. Do not dispose of WEEE as unsorted
municipal waste and have to collect such WEEE separately.
Safety
This equipment is designed with the utmost care for the safety of those who install and use it. However,
special attention must be paid to the dangers of electric shock and static electricity when working with
electrical equipment. All guidelines of this and of the computer manufacture must therefore be allowed at all
times to ensure the safe use of the equipment.
Customer Service
For information on customer service and support for the Gigabit Multi-Homing VPN Security Router, please refer to the
following Website URL:
http:// www.planet.com.tw
H
Before contacting customer service, please take a moment to gather the following information:
Gigabit Multi-Homing VPN Security Router serial number and MAC address
Any error messages that displayed when the problem occurred
Any software running when the problem occurred
Steps you took to resolve the problem on your own
♦
♦
♦
♦
Revision
User’s Manual for PLANET Gigabit Multi-Homing VPN Security Router
Model: MH-3400
Rev: 1.0 (January, 2012)
3
Gigabit Multi-Homing VPN Security Router User’s Manual
Table of Contents
U
CHAPTER 1: INTRODUCTION ........................................................................................................................ 1
U
U
1.1 FEATURES................................................................................................................................................................1
U
1.2 PACKAGE CONTENTS ............................................................................................................................................. 2
U
U
1.3 PHYSICAL SPECIFICATION ...................................................................................................................................... 2
U
U
1.4 SPECIFICATION ....................................................................................................................................................... 4
U
U
CHAPTER 2: INSTALLATION PROCEDURE .................................................................................................. 6
U
U
2.1 SYSTEMATIC SETTING PROCESS ........................................................................................................................... 6
U
U
2.2 SETTING FLOW CHART ........................................................................................................................................... 7
U
U
CHAPTER 3: HARDWARE INSTALLATION ................................................................................................... 9
U
U
3.1 VPN ROUTER NETWORK CONNECTION ................................................................................................................. 9
U
U
CHAPTER 4: LOGIN VPN SECURITY ROUTER ...........................................................................................11
U
U
CHAPTER 5: SYSTEM STATUS .................................................................................................................... 13
U
U
5.1 HOME PAGE .......................................................................................................................................................... 13
U
U
5.1.1 WAN Status ................................................................................................................................................ 13
U
U
5.1.2 Physical Port Status ................................................................................................................................ 14
U
U
5.1.3 System Information ................................................................................................................................. 15
U
U
5.1.4 Firewall Status .......................................................................................................................................... 15
U
U
5.1.5 VPN Status ................................................................................................................................................. 16
U
U
5.1.6 Log Setting Status ................................................................................................................................... 16
U
U
5.2 CHANGE AND SET LOGIN PASSWORD AND TIME ................................................................................................. 16
U
U
5.2.1 Password Setting ..................................................................................................................................... 16
U
U
5.2.2 Time ............................................................................................................................................................. 18
U
U
CHAPTER 6: NETWORK ............................................................................................................................... 20
U
U
6.1 NETWORK CONNECTION ....................................................................................................................................... 20
U
U
6.1.1 Host Name and Domain Name .............................................................................................................. 20
U
U
6.1.2 LAN Setting ............................................................................................................................................... 21
U
U
6.1.3 WAN & DMZ Settings .............................................................................................................................. 23
U
U
6.2 MULTI- WAN SETTING .......................................................................................................................................... 36
U
U
6.2.1 Load Balance Mode ................................................................................................................................. 36
U
U
6.2.2 Network Detection Service .................................................................................................................... 43
U
U
6.2.3 Protocol Binding ...................................................................................................................................... 45
U
U
4
..1
Gigabit Multi-Homing VPN Security Router User’s Manual
CHAPTER 7: PORT MANAGEMENT ............................................................................................................ 54
U
U
7.1 SETUP ................................................................................................................................................................... 54
U
U
7.2 PORT STATUS ....................................................................................................................................................... 55
U
U
7.3 IP/ DHCP ............................................................................................................................................................. 56
U
U
7.4 DHCP STATUS ..................................................................................................................................................... 58
U
U
7.5 IP & MAC BINDING .............................................................................................................................................. 59
U
U
7.6 IP GROUPING ........................................................................................................................................................ 62
U
U
7.7 PORT GROUP MANAGEMENT ............................................................................................................................... 65
U
U
CHAPTER 8: QOS (QUALITY OF SERVICE) ............................................................................................... 66
U
U
8.1 BANDWIDTH MANAGEMENT ................................................................................................................................. 66
U
U
8.1.1 The Maximum Bandwidth provided by ISP ....................................................................................... 67
U
U
8.1.2 QoS .............................................................................................................................................................. 68
U
U
8.1.3 Smart QoS ................................................................................................................................................. 71
U
U
8.1.4 Exception IP address .............................................................................................................................. 73
U
U
8.2 SESSION CONTROL ............................................................................................................................................... 74
U
U
CHAPTER 9 : FIREWALL .............................................................................................................................. 76
U
U
9.1 GENERAL POLICY ................................................................................................................................................. 76
U
U
9.2 ACCESS RULE ...................................................................................................................................................... 79
U
U
9.2.1 Default Rule ............................................................................................................................................... 79
U
U
9.2.2 Add New Access Rule............................................................................................................................. 80
U
U
9.3 URL FILTER .......................................................................................................................................................... 82
U
U
CHAPTER 10 : VPN (VIRTUAL PRIVATE NETWORK) ................................................................................ 86
U
U
10.1. DISPLAY ALL VPN SUMMARY ........................................................................................................................... 86
U
U
10.1.1. Add a New VPN Tunnel ....................................................................................................................... 89
U
U
10.1.1.1 Gateway to Gateway Setting ............................................................................................................. 89
U
U
10.1.1.2 Client to Gateway Setting .................................................................................................................. 99
U
U
10.1.2. PPTP Setting ........................................................................................................................................ 105
U
U
10.1.3. VPN Pass Through ............................................................................................................................. 107
U
U
11.1 DMZ HOST/ PORT RANGE FORWARDING ........................................................................................................ 108
U
U
11.2 UPNP ................................................................................................................................................................ 111
U
U
11.3 ROUTING ........................................................................................................................................................... 112
U
U
11.3.1 Dynamic Routing ................................................................................................................................. 112
U
U
11.3.2 Static Routing ....................................................................................................................................... 113
U
U
11.4 ONE TO ONE NAT ............................................................................................................................................ 115
U
U
11.5 DDNS- DYNAMIC DOMAIN NAME SERVICE ..................................................................................................... 118
U
U
11.6 MAC CLONE ..................................................................................................................................................... 120
U
U
CHAPTER 12: SYSTEM TOOL .................................................................................................................... 121
U
U
5
Gigabit Multi-Homing VPN Security Router User’s Manual
12.1 DIAGNOSTIC ...................................................................................................................................................... 121
U
U
12.2 FIRMWARE UPGRADE ....................................................................................................................................... 122
U
U
12.3 CONFIGURATION BACKUP ................................................................................................................................ 122
U
U
12.4 SNMP ............................................................................................................................................................... 123
U
U
12.5 SYSTEM RECOVER ........................................................................................................................................... 124
U
U
12.6 HIGH AVAILABILITY ........................................................................................................................................... 124
U
U
CHAPTER 13. LOG ...................................................................................................................................... 129
U
U
13.1 SYSTEM LOG .................................................................................................................................................... 129
U
U
13.2 SYSTEM STATISTIC ........................................................................................................................................... 134
U
U
13.3 TRAFFIC STATISTIC ........................................................................................................................................... 135
U
U
13.4 IP/ PORT STATISTIC .......................................................................................................................................... 137
U
U
APPENDIX A : CONFIGURE THE 3G USB INTERFACE ........................................................................... 139
U
U
STEP 1: USB/3G CONNECTION SETTING ................................................................................................................ 140
U
U
STEP 2: CHECK IP ADDRESS FOR USB/3G CONNECTION. .................................................................................... 143
U
U
STEP 3: CHECK 3G INFO FROM SERVICE PROVIDER .............................................................................................. 144
U
U
STEP 4: CONFIGURE ADVANCE SETTING ................................................................................................................. 147
U
U
STEP 5: SEND SYSTEM LOG VIA SMS MESSAGE .................................................................................................... 150
U
U
6
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 1: Introduction
0B
As Internet becomes essential for your business, the only way to prevent your Internet connection from failure
is to have more than one connection. PLANET’s Gigabit Multi-Homing VPN Security Router, MH-3400,
reduces the risks of potential shutdown if one of the Internet connections fails. Moreover, it allows you to
perform load-balancing by distributing the traffic through three or four WAN connections.
In addition to a multi-homing device, PLANET’s Gigabit Multi-Homing VPN Security Router provides a
complete security solution in a box. The policy-based firewall, content filtering function and VPN connectivity
with 3DES and AES encryption make it a perfect product for your network security. No more complex
connection and settings for integrating different security products on the network is required.
Bandwidth management function is also supported to offers network administrators an easy yet powerful
means to allocate network resources based on business priorities, and to shape and control bandwidth
usage.
1.1 Features
13B
‹
Multi-WAN Auto Backup: The MH-3400 can monitor each WAN link status and automatically activate
backup links when a failure is detected. The detection is based on the configurable target Internet
addresses.
‹
Outbound Load Balancing: The network sessions are assigned based on the user configurable load
balancing mode, including “Auto Load Balance”, “Unbinding WAN Balance” and “Strategy Routing”,.
User can also configure which IP or TCP/UDP type of traffic use which WAN port to connect.
‹
Inbound Load Balancing: The MH-3400 provides the Inbound Load Balancing for enterprise’s internal
server. The Inbound Load Balancing can reduce the server loading and system crash risks, in order to
improve the server working efficiency.
‹
Policy-based Firewall: The built-in policy-based firewall prevent many known hacker attack including
Ping of Death, SYN Flooding, Land attack, IP Spoofing, etc. The access rule function allowed only
specified WAN or LAN users to use only allowed network services on specified time.
‹
VPN Connectivity: The security gateway support PPTP and IPSec VPN. With DES, 3DES and AES
encryption and SHA-1 / MD5 authentication, the network traffic over public Internet is secured.
‹
Content Filtering: The security gateway can block network connection based on URLs, Scripts (The
Java Applet, cookies and Active X), Restrict Application (MSN, Yahoo Messenger, QQ, PPSTREAM and
PPTV) and Download/Upload blocking.
‹
Multiple DHCP Server: The multi DHCP server support 4 sets of Class C IP address, each server can
allocate up to 253 client IP addresses and distribute them including IP address, subnet mask as well as
DNS IP address to local computers. It provides an easy way to manage the local IP network.
‹
QoS Bandwidth Management: Featured Smart QoS with dynamic bandwidth management to
automatically control P2P and video downloading and other bandwidth hogging to avoid bandwidth
insufficient. Prioritizing different person/group or applications in bandwidth using for a better reasonable
management.
-1-
Gigabit Multi-Homing VPN Security Router User’s Manual
‹
Dynamic Domain Name System (DDNS): The Dynamic DNS service allows users to alias a dynamic
IP address to a static hostname.
‹
Multiple NAT: Multiple NAT allows local port to set multi-subnet and connect to the Internet through
different WAN IP addresses.
‹
Port Range Forwarding (Virtual Server): The Port Forwarding and DMZ function can let you setup
your servers in the Intranet and still provide services to the Internet users.
‹
Easy Management: Embedded Mirror Port to connect with monitoring devices to monitor online
behavior. It also supporting remote management by web browser with user name and password to
realize router management from remote places.
‹
Log Feature: The log and traffic statistic function can helping administrators to record the
change/abnormal of the whole network status and take actions according to the log information.
1.2 Package Contents
14B
The following items should be included:
„
MH-3400 x 1
„
Power Cord x 1
„
Quick Installation Guide x 1
„
User’s Manual CD x 1
„
Cat5 Cable x 1
If any of the contents are missing or damaged, please contact your dealer or distributor immediately.
1.3 Physical Specification
15B
Front Panel
Rear View
-2-
Gigabit Multi-Homing VPN Security Router User’s Manual
LED definition
LED
Color
Status
Description
Green
Steady
Power On
Off
Off
Power Off
Steady on
System is crashed.
Blinking
System is on self-test after power on the device.
Off
System is ready.
Steady on
Port has been connected & Get IP
Blinking
Transmit data.
Off
Not get the IP address, even the port has been connected.
Steady on
LAN port has been connected.
Blinking
Transmit data.
Green
Steady On
Works on 1000M
Amber
Steady On
Works on 100M.
Off
Off
Works on 10M.
Steady on
USB is connected and the device is supported.
Blinking
Packets are transmitting through USB port
Off
Not connect with any USB device
PWR
Amber
DIAG
WAN/ DMZ:
Green
Link/Act
Green
LAN: Link/Act
LAN/WAN/DMZ:
Speed
USB:
Green
Link/Connect
/Act
Off
Button definition
Button
Description
Reset
Push 5 seconds for “Warm Start”, and push 10 seconds for Factory Default.
Power
Rocker switch ,Internal 12V/1.65A
-3-
Gigabit Multi-Homing VPN Security Router User’s Manual
1.4 Specification
16B
Product
Model
Hardware
Gigabit Multi-Homing VPN Security Router
MH-3400
Ethernet
LAN
1~2 x 10/100/1000Mbps RJ-45 with LAN 1 configurable as LAN 1 / Mirror Port
WAN
3~4 x 10/100/1000Mbps RJ-45 with WAN 4 configurable as WAN 4 / LAN2 / DMZ
DMZ
1 x 10/100Mbps RJ-45 (WAN 4)
Reset
Power
Button
USB
1 x Reset button for reset to factory default setting
1 x Power on/off Switch
1 x USB 2.0 Host
Software
z
z
z
z
Routing
z
z
z
z
System Performance
z
z
z
z
Bandwidth Management
z
z
z
z
z
z
z
z
Firewall Security
z
z
z
z
z
z
z
z
Multi-WAN Function
Networking
USB Feature
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
Inbound / Outbound Load Balance: by session and by IP
Protocol Binding
Network Service Detection
Dynamic Route RIP v1/v2
Static Route
Strategic Route
Concurrent session :50000
Firewall performance :1Gbps
Corporation Size: SMB(clients 200~250)
3DES performance:154Mbps
Session Limit
Priority QoS
Port-based QoS
QoS Schedule
NAT
One-to-One NAT
Multiple-to-One NAT
Stateful Packet Inspection(SPI) Firewall
Denial of Service (DoS) prevention
IP & Port filtering
Block Website by Keyword, Content Filter
Firewall detection: Ping of Death, SYN Flooding, Land attack, IP Spoofing
Email Alert for Hacker Attack
IP&MAC Binding
Support DMZ to protect your network: DMZ Host
Prevent ARP Attack on LAN
Configurable DMZ
DHCP Server (support class C), client, dynamic IP, static IP,IP Grouping
support
Multiple DHCP Server (support 4 sets of Class C)
PPPoE / Static IP/ DHCP Client
LAN MAC Clone
Multiple Subnet
Protocol: TCP /IP, ARP, ICMP, FTP/TFTP, IPv4
NAT with popular ALG support
Port forwarding(Virtual Server)
DNS Relay
DDNS: Support DynDNS,3322
Password protected configuration or management sessions for web access
Port Management – Speed/Duplex/Auto Negotiation/VLAN
Transparent Bridge
3G/3.5G Internet Access
3G as WAN interface
Automatic failover between 3G and WAN
-4-
Gigabit Multi-Homing VPN Security Router User’s Manual
z
z
z
z
z
z
z
z
Network Management
z
z
z
VPN tunnel
z
z
z
z
z
z
z
VPN Support IPSec VPN z
z
z
z
z
z
z
z
PPTP VPN z
Load balancing between 3G and WAN
Auto/ manual throughput and time calculation mechanism for cost or dial-on
demand (Cellular cost Control)
Signal strength display on front panel
Throughput measurement
APN and PIN code Support
Comprehensive web based management and policy setting
SNMP v1/v2c
Monitoring, Logging, and Alarms of system activities
Firmware upgrade through Web browser
Supports max 200 IPSec VPN Tunnels
Supports max 60 PPTP VPN Tunnels
IPSec H/W acceleration
Up to 2 Group VPNs support
Friendly VPN Tunnel Management
IKE: Pre-Shared keys
IPSec Encryption DES/3DES/AES128/AES192/AES256
IPSec Authentication MD5/SHA1
Support PMTU
NAT Traversal
Connect on Demand
DPD detection
VPN Hub
IP by DNS Resolved
View Log
IPSec, PPTP Pass through
PPTP Dial-in VPN 60 users
-5-
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 2: Installation Procedure
1B
In this chapter we are going to introduce hardware installation. Through the understanding of multi-WAN
setting process, users can easily setup and manage the network, making VPN Router functioning and having
best performance.
2.1 Systematic Setting Process
17B
Users can set up and enable the network by utilizing bandwidth efficiently. The network can achieve the ideal
efficientness, block attacks, and prevent security risks at the same time. Through the process settings, users
can install and operate VPN Router easily. This simplifies the management and maintenance, making the
user network settings be done at one time. The main process is as below:
Step 1. Hardware installation
Step 2. Login
Step 3. Verify device specification and set up password and time
Step 4. Set WAN connection
Step 5. Set LAN connection: physical port and IP address settings
Step 6. Set QoS bandwidth management: avoid bandwidth occupation
Step 7. Set Firewall: prevent attack and improper access to network resources
Step 8. Other settings: UPnP, DDNS, MAC Clone
Step 9. Management and maintenance settings: Syslog, SNMP, and configuration backup
Step 10. VPN (Virtual Private Network)function setting
Step 11. Logout
-6-
Gigabit Multi-Homing VPN Security Router User’s Manual
2.2 Setting Flow Chart
18B
Below is the description for each setting process, and the correspondent contents and purposes.
#
Setting
Content
Purpose
1
Hardware installation
user’s demand.
Install VPN Router hardware based on
user physical requirements.
2
Login
Login the device with
Login VPN Router web-based UI.
Web Browser.
3
Verify device
Verify Firmware version
Verify VPN Router specification, Firmware
specification
and working status.
version and working status.
Set password and time
Set time and re-new
Modify the login password considering safe
password.
issue.
Synchronize the VPN Router time with WAN.
4
Set WAN connection
Verify WAN connection
Connect to WAN. Configure bandwidth to
setting, bandwidth
optimize data transmission.
allocation, and protocol
binding.
5
Set LAN connection:
Set mirror port and
Provide mirror port, port management and VLAN
physical port and IP
VLAN. Allocate and
setting functions. Support Static/DHCP IP
address settings
manage LAN IP.
allocation to meet different needs. IP group will
simplize the management work.
6
7
Set QoS bandwidth
Restrict bandwidth and
To assure transmission of important information,
management: avoid
session of WAN ports,
manage and allocate the bandwidth further to
bandwidth occupation
LAN IP and application.
achieve best efficiency.
Set Firewall: prevent
Block attack, Set
Administrators can block BT to avoid bandwidth
attack and improper
Access rule and restrict
occupation, and enable access rules to restrict
access to network
Web access.
employee accessing internet improperly or using
MSN, QQ and Skype during working time. They
resources
can also protect network from Worm or ARP
attacking.
8
9
Advanced
DMZ/Forwarding,
DMZ/Forwarding, UpnP, Routing Mode, multiple
Settings:DMZ/Forwardin
UpnP, Routing Mode,
WAN IP, DDNS and MAC Clone
g, UPnP, DDNS, MAC
multiple WAN IP, DDNS
Clone
and MAC Clone
Management and
Monitor VPN Router
Administrators can look up system log and
maintenance settings:
working status and
monitor system status and inbound/outbound
Syslog, SNMP, and
configuration backup.
flow in real time.
Configure VPN tunnels,
Configure different types of VPN to meet
configuration backup
10
VPN Virtual Private
-7-
Gigabit Multi-Homing VPN Security Router User’s Manual
11
Network function setting
e.g. PPTP.
different application environment.
Logout
Close configuration
Logout VPN Router web-based UI.
window.
We will follow the process flow to complete the network setting in the following chapters.
-8-
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 3: Hardware Installation
2B
In this chapter we are going to introduce hardware interface as well as physical installation. Safety Instruction
3.1 VPN Router Network Connection
19B
-9-
Gigabit Multi-Homing VPN Security Router User’s Manual
WAN Connection: A WAN port can be connected with xDSL Modem, Fiber Modem,
Switching Hub, or through an external router to connect to the Internet.
LAN Connection: The LAN port can be connected to a Switching Hub or directly to a PC.
Users can use servers for monitoring or filtering through the port after “Physical Port
Mangement” configuration is done.
DMZ : The DMZ port can be connected to servers that have legal IP addresses, such as
Web servers, mail servers, etc.
- 10 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 4: Login VPN Security Router
3B
This chapter is mainly introducing Web-based UI after connecting VPN Router.
First, check up VPN Router IP address by connecting to DOS through the LAN PC under VPN Security
Router. Go to Start → Run, enter cmd to commend DOS, and enter ipconfig for getting Default Gateway
address, as the graphic below, 192.168.1.1. Make sure Default Gateway is also the default IP address of VPN
QoS Router.
"
Attention
When not getting IP address and default gateway by using “ipconfig”, or the received IP address
is 0.0.0.0 and 169.X.X.X, we recommend that users should check if there is any problem with the
circuits or the computer network card is connected nicely.
Then, open webpage browser, IE for example, and key in 192.168.1.1 in the website column. The login
window will appear as below:
- 11 -
Gigabit Multi-Homing VPN Security Router User’s Manual
VPN Router default username and password are both “admin”. Users can change the login password in the
setting later.
"
Attention
For security, we strongly suggest that users must change password after login. Please keep the
password safe, or you can not login to VPN Router. Press Reset button for more than 10 sec, all
the setting will return to default.
After login, VPN Router web-based UI will be shown.
- 12 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 5: System Status
4B
This chapter introduces the device specification and status after login as well as change password and
system time settings for security.
5.1 Home Page
20B
In the Home page, all VPN Security Router parameters and status are listed for users’ reference.
5.1.1 WAN Status
58B
Item
Description
WAN IP Address
Indicates the current IP configuration for WAN port.
Default Gateway
Indicates current WAN gateway IP address from ISP.
DNS
Indicates the current DNS IP configuration.
Downstream Bandwidth
Indicates the current downstream bandwidth usage (%) for each WAN.
Usage(%)
Upstream Bandwidth
Indicates the current upstream bandwidth usage (%) for each WAN.
Usage(%)
DDNS Setup
Indicates if Dynamic Domain Name is activated. The default configuration is
“Off”.
Quality of Service
Indicates how many QoS rules are set.
Manual Connect
When “Obtain an IP automatically” is selected, two buttons (Release and
Renew) will appear. If a WAN connection, such as PPPoE or PPTP, is
selected, “Disconnect” and “Connect” will appear.
- 13 -
Gigabit Multi-Homing VPN Security Router User’s Manual
5.1.2 Physical Port Status
59B
The status of all system ports, including each connected and enabled port, will be shown on this Home page
(see above table). Click the respective status button and a separate window will appeare to show detailed
data (including setting status summary and statisitcs) of the selected port.
The current port setting status information will be shown in the Port Information Table. Examples: type
(10Base-T/100Base-TX/1000Base-T), iniferface (WAN/ LAN/ DMZ), link status (Up/ Down), physical port
status (Port Enabled/ Port Disabled), priority (high or normal), speed status (10Mbps or 100Mbps), duplex
status (Half/ Full), auto negotiation (Enabled or Disabled). The tabble also shows statistics of Receive/
Transmit Packets, Receive/Transmit Packets Byte Count as well as Error Packets Count.
- 14 -
Gigabit Multi-Homing VPN Security Router User’s Manual
5.1.3 System Information
60B
Item
Description
LAN IP Address/ Subnet
Identifies the current device IP address and subnet mask. The default is
Mask
192.168.1.1 and 255.255.255.0
Working Mode
Indicates the current working mode. Can be Gateway or Router mode. The
default is “Gateway” mode
System active time:
Indicates how long the device has been running.
Serial Number:
This number is the device serial number.
Firmware Version
Information about the device present software version.
Current Time
Indicates the device present time.
"
Note
To have the correct time, users must synchronize the device with
the remote NTP server first.
5.1.4 Firewall Status
61B
Item
Description
- 15 -
Gigabit Multi-Homing VPN Security Router User’s Manual
SPI (Stateful Packet
Indicates whether SPI (Stateful Packet Inspection) is on or off. The default
Inspection)
configuration is “On”.
DoS (Denial of Service)
Indicates if DoS attack prevention is activated.The default configuration is “On”.
Block WAN Request
Indicates that denying the connection from Internet is activated. The default
configuration is “On”.
Prevent ARP Virus
Indicates that preventing Arp virus attack is acitvated. The default configuration
Attack
is “Off”.
Remote Management
Indicates if remote management is activated (on or off). Click the hyperlink to
enter and manage the configuration. The default configuration is “Off”.
Access Rule
Indicates the number of access rule applied in VPN Security Router.
5.1.5 VPN Status
62B
Item
Description
VPN Setting Status
Indicates VPN setting information in VPN Router.
Tunnel(s) Used
Indicates number of tunnels that have been configured in VPN (Virtual Private
Network).
Tunnel(s) Available
Indicates number of tunnels that are available for VPN (Virtual Private
Network).
5.1.6 Log Setting Status
63B
Item
Description
Sent Log To
Indicates if Syslog Server is Enabled or Disabled.
5.2 Change and Set Login Password and Time
21B
5.2.1 Password Setting
64B
- 16 -
Gigabit Multi-Homing VPN Security Router User’s Manual
When you login VPN Router setting window every time, you must enter the password. The default value for
VPN Router username and password are both “admin”. For security reasons, we strongly recommend that
you must change your password after first login. Please keep the password safe, or you might not login to
VPN Router. You can press Reset button for more than 10 sec, VPN Router will return back to default.
- 17 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
User Name
The default is “admin”.
Old Password
Input the original password.(The default is “admin”.)
New User Name
Input the new user name. e.x. Planet
New Password
Input the new password.
Confirm New Password
Input the new password again for verification.
Apply
Click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change. This action will be
effective before ”Apply” to save the configuration.
If users have already changed username and password, they should login with current username and
password and input “admin” as new username and password if they have to return back to default.
5.2.2 Time
65B
VPN Router can adjust time setting. Users can know the exact time of event occurrences that are recorded in
the System Log, and the time of closing or opening access for Internet resources. You can either select the
embedded NTP Server synchronization function or set up a time reference.
Set system time using a NTP server : VPN Router has embedded NTP server, which will update the time
spontaneously.
- 18 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Time Zone
Select your location from the pull-down time zone list to show correct local time.
Daylight Saving
If there is Daylight Saving Time in your area, input the date range. The device
will adjust the time for the Daylight Saving period automatically.
NTP Server
If you have your own preferred time server, input the server IP address.
Apply
After the changes are completed, click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change. This action will be
effective before ”Apply” to save the configuration.
Select System Time Manually: Input the correct time, date, and year in the boxes.
After the changes are completed, click “Apply” to save the configuration. Click “Cancel" to leave without
making any change. This action will be effective before ”Apply” to save the configuration.
- 19 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 6: Network
5B
This Network page contains the basic settings. For most users, completing this general setting is enough for
connecting with the Internet. However, some users need advanced information from their ISP. Please refer to
the following descriptions for specific configurations.
6.1 Network Connection
22B
6.1.1 Host Name and Domain Name
66B
Device name and domain name can be input in the two boxes. Though this configuration is not necessary in
most environments, some ISPs in some countries may require it.
- 20 -
Gigabit Multi-Homing VPN Security Router User’s Manual
6.1.2 LAN Setting
67B
LAN setting is shown and can be configured in this page. The LAN MAC can be modified. When a new router
replaces an old one, LAN MAC can be changed as MAC of the original device. Gateway ARP binding with
LAN PCs won’t need to be configured again. Click “Unified IP Management” to setup.
This is configuration information for the device current LAN IP address. The default configuration is
192.168.1.1 and the default Subnet Mask is 255.255.255.0. It can be changed according to the actual network
structure.
Unified IP Management
LAN IP and IP segment group (DHCP) can be configured here.
LAN Setting
This is configuration information for the device current LAN IP address. The default configuration is
192.168.1.1 and the default Subnet Mask is 255.255.255.0. It can be changed according to the actual network
structure.
- 21 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Multiple-Subnet Setting
Click “Add/Edit” to enter the configuration page, as shown in the following figure. Input the respective IP
addresses and subnet masks.
This function enables users to input IP segments that differ from the router network segment to the multi-net
segment configuration; the Internet will then be directly accessible. In other words, if there are already
different IP segment groups in the Intranet, the Internet is still accessible without making any changes to
internal PCs. Users can make changes according to their actual network structure.
Dynamic IP
There are four set of Class C DHCP server. The defaults are enable. LAN PCs can get IP automatically
without configured and recorded.
Item
Description
IP Range Start
The four default IP segments initial from 192.168.1.100, 192.168.2.100,
192.168.3.100, 192.168.4.100. Users can configure according actual demand.
IP Range End
The four default IP segments end at 192.168.1.149, 192.168.2.149,
192.168.3.149, 192.168.4.149. It means there are 50 IPs in one of segments.
Users can configure according actual demand.
- 22 -
Gigabit Multi-Homing VPN Security Router User’s Manual
6.1.3 WAN & DMZ Settings
68B
WAN Setting
Item
Description
Interface
An indication of which port is connected.
Connection Type
Obtain an IP automatically, Static IP connection, PPPoE (Point-to-Point
Protocol over Ethernet), PPTP (Point-to-Point Tunneling Protocol) or
Transparent Bridge.
Config
A modification in an advanced configuration: Click Edit to enter the advanced
configuration page.
Obtain an Automatic IP automatically
This mode is often used in the connection mode to obtain an automatic DHCP IP. This is the device
system default connection mode. It is a connection mode in which DHCP clients obtain an IP address
automatically. If having a different connection mode, please refer to the following introduction for selection of
appropriate configurations. Users can also set up their own DNS IP address. Check the options and input the
user-defined DNS IP addresses.
- 23 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Use the following DNS
Select a user-defined DNS server IP address.
Server Addresses:
DNS Server:
Input the DNS IP address set by ISP. At least one IP group should be input.
The maximum acceptable groups is two IP groups.
Enable Line-Dropped
The WAN disconnection schedule will be activated by checking this option. In
Scheduling:
some areas, there is a time limitation for WAN connection service. For
example:
The optical fiber service will be disconnected from 0:00 am to 6:00 am.
Although there is a standby system in the device, at the moment of WAN
disconnection, all the external connections that go through this WAN will be
disconnected too. Only after the disconnected lines are reconnected can they
go through the standby system to connect with the Internet.
Therefore, to avoid a huge number of disconnection, users can activate this
function to arrange new connections to be made through another WAN to the
Internet. In this way, the effect of any disconnection can be minimized.
Line-Dropped Period
Input the time rule for disconnection of this WAN service.
Line-Dropped
Input how long the WAN service may be disconnected before the newly added
Scheduling
connections should go through another WAN to connect with the Internet.
Link Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Shared- Circuit WAN
If your WAN connects to a Switch, select “Enabled” to filter broadcast packets.
environment
The default is “Disabled”.
MTU:
MTU is abbreviation of Maximum Transmission Unit. “Auto” and “Manual” can
be chosen. The default value is 1500. Different value could be set in different
network environment. (e.g. ADSL PPPoE MTU: 1492) .The default is “Auto”.
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any changes.
Static IP
If an ISP issues a static IP (such as one IP or eight IP addresses, etc.), please select this connection mode
and follow the steps below to input the IP numbers issued by an ISP into the relevant boxes.
- 24 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
WAN IP address
Input the available static IP address issued by ISP.
Subnet Mask
Input the subnet mask of the static IP address issued by ISP, such as:
Issued eight static IP addresses: 255.255.255.248
Issued 16 static IP addresses: 255.255.255.240
Default Gateway
Input the default gateway issued by ISP. For ADSL users, it is usually an
ATU-R IP address. As for optical fiber users, please input the optical fiber
switching IP.
DNS Server
Input the DNS IP address issued by ISP. At least one IP group should be input.
The maximum acceptable is two IP groups.
Enable Line-Dropped
The WAN disconnection schedule will be activated by checking this option. In
Scheduling
some areas, there is a time limitation for WAN connection service. For
example: the optical fiber service will be disconnected from 0:00 am to 6:00 am.
Although there is a standby system in the device, at the moment of WAN
disconnection, all the external connections that go through this WAN will be
disconnected too. Only after the disconnected lines are reconnected can they
go through the standby system to connect with the Internet. Therefore, to avoid
a huge number of disconnections, users can activate this function to arrange
new connections to be made through another WAN to the Internet. In this way,
the effect of any disconnection can be minimized.
- 25 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Line-Dropped Period
Input the time rule for the disconnection of this WAN service.
Line-Dropped
Input how long the WAN service may be disconnected before the newly added
Scheduling
connections should go through another WAN to connect with the Internet.
Link Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Shared- Circuit WAN
If your WAN connects to a Switch, select “Enabled” to filter broadcast packets.
environment
The default is “Disabled”.
MTU
MTU is abbreviation of Maximum Transmission Unit. “Auto” and “Manual” can
be chosen. The default value is 1500. Different value could be set in different
network environment. (e.g. ADSL PPPoE MTU: 1492) The default is “Auto”.
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any changes.
PPPoE
This option is for an ADSL virtual dial-up connection (suitable for ADSL PPPoE). Input the user connection
name and password issued by ISP. Then use the PPP Over-Ethernet software built into the device to connect
with the Internet. If the PC has been installed with the PPPoE dialing software provided by ISP, remove it. This
software will no longer be used for network connection.
- 26 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
User Name
Input the user name issued by ISP.
Password
Input the password issued by ISP.
Connect on Demand
This function enables the auto-dialing function to be used in a PPPoE dial
connection. When the client port attempts to connect with the Internet, the
device will automatically make a dial connection. If the line has been idle for a
period of time, the system will break the connection automatically. (The default
time for automatic break-off resulting from no packet transmissions is five
minutes).
Keep Alive
This function enables the PPPoE dial connection to keep connected, and to
automatically redial if the line is disconnected. It also enables a user to set up a
time for redialing. The default is 30 seconds.
Enable Line-Dropped
The WAN disconnection schedule will be activated by checking this option. In
Scheduling
some areas, there is a time limitation for WAN connection service. For
example: the optical fiber service will be disconnected from 0:00 am to 6:00 am.
Although there is a standby system in the device, at the moment of WAN
disconnection, all the external connections that go through this WAN will be
disconnected too. Only after the disconnected lines are reconnected can they
go through the standby system to connect with the Internet. Therefore, to avoid
a huge number of disconnections, users can activate this function to arrange
new connections through another WAN to the Internet. In this way, the effect of
any disconnection can be minimized.
Line-Dropped Period
Input the time rule for the disconnection of this WAN service.
Line-Dropped
Input how long the WAN service may be disconnected before the newly added
Scheduling
connections should go through another WAN to connect with the Internet.
Link Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Shared- Circuit WAN
If your WAN connects to a Switch, select “Enabled” to filter broadcast packets.
environment
The default is “Disabled”.
MTU
MTU is abbreviation of Maximum Transmission Unit. “Auto” and “Manual” can
be chosen. The default value is 1500. Different value could be set in different
network environment. (e.g. ADSL PPPoE MTU: 1492) .The default is “Auto”.
- 27 -
Gigabit Multi-Homing VPN Security Router User’s Manual
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any change.
PPTP
This option is for the PPTP time counting system. Input the user’s connection name and password issued by
ISP, and use the built-in PPTP software to connect with the Internet.
Item
Description
WAN IP Address
This option is to configure a static IP address. The IP address to be configured
could be one issued by ISP. (The IP address is usually provided by the ISP
when the PC is installed. Contact ISP for relevant information).
Subnet Mask
Input the subnet mask of the static IP address issued by ISP, such as:
Issued eight static IP addresses: 255.255.255.248
Issued 16 static IP addresses: 255.255.255.240
Default Gateway Address
Input the default gateway of the static IP address issued by ISP. For ADSL
users, it is usually an ATU-R IP address.
User Name
Input the user name issued by ISP.
- 28 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Password
Input the password issued by ISP.
Connect on Demand
This function enables the auto-dialing function to be used for a PPTP dial
connection. When the client port attempts to connect with the Internet, the
device will automatically connect with the default ISP auto dial connection;
when the network has been idle for a period of time, the system will break the
connection automatically. (The default time for automatic break off when no
packets have been transmitted is five minutes).
Keep Alive
This function enables the PPTP dial connection to redial automatically when
the connection has been disconnected. Users can set up the redialing time.
The default is 30 seconds.
Enable Line-Dropped
The WAN disconnection schedule will be activated by checking this option. In
Scheduling
some areas, there is a time limitation for WAN connection service. For
example: the optical fiber service will be disconnected from 0:00 am to 6:00 am.
Although there is a standby system in the device, at the moment of WAN
disconnection, all the external connections that go through this WAN will be
disconnected too. Only after the disconnected lines are reconnected can they
go through the standby system to connect with the Internet. Therefore, to avoid
a huge number of disconnection, users can activate this function to arrange
new connections to be made through another WAN to the Internet. In this way,
the effect of any disconnection can be minimized.
Line-Dropped Period
Input the time rule for the disconnection of this WAN service.
Line-Dropped
Input how long the WAN service may be disconnected before the newly added
Scheduling
connections should go through another WAN to connect with the Internet.
Link Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Shared- Circuit WAN
If your WAN connects to a Switch, select “Enabled” to filter broadcast packets.
environment
The default is “Disabled”.
MTU
MTU is abbreviation of Maximum Transmission Unit. “Auto” and “Manual” can
be chosen. The default value is 1500. Different value could be set in different
network environment. (e.g. ADSL PPPoE MTU: 1492)
The default is “Auto”.
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any changes.
- 29 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Transparent Bridge
If all Intranet IP addresses are applied as Internet IP addresses, and users don’t want to substitute private
network IP addresses for all Intranet IP addresses (ex. 192.168.1.X), this function will enable users to
integrate existing networks without changing the original structure. Select the Transparent Bridge mode for
the WAN connection mode. In this way, users will be able to connect normally with the Internet while keeping
the original Internet IP addresses in Intranet IP configuration.
If there are two WANs configured, users still can select Transparent Bridge mode for WAN connection mode,
and load balancing will be achieved as usual.
Item
Description
WAN IP Address
Input one of the static IP addresses issued by ISP.
Subnet Mask
Input the subnet mask of the static IP address issued by ISP, such as:
Issued eight static IP addresses: 255.255.255.248 Issued 16 static IP
addresses: 255.255.255.240
Default Gateway Address
Input the default gateway of the static IP address issued by ISP. For ADSL
users, it is usually an ATU-R IP address.
- 30 -
Gigabit Multi-Homing VPN Security Router User’s Manual
DNS Server
Input the DNS IP address set by ISP. At least one IP group should be input.
The maximum acceptable is two IP groups.
Internal LAN IP Range
Input the available IP range issued by ISP. If ISP issued two discontinuous IP
address ranges, users can input them into Internal LAN IP Range 1 and
Internal LAN IP Range 2 respectively.
Enable Line-Dropped
The WAN disconnection schedule will be activated by checking this option. In
Scheduling
some areas, there is a time limitation for WAN connection service. For
example: the optical fiber service will be disconnected from 0:00 am to 6:00 am.
Although there is a standby system in the device, at the moment of WAN
disconnection, all the external connections that go through this WAN will be
disconnected too. Only after the disconnected lines are reconnected can they
go through the standby system to connect with the Internet. Therefore, to avoid
a huge number of disconnections, users can activate this function to arrange
new connections through another WAN to the Internet. In this way, the effect of
any disconnection can be minimized.
Line-Dropped Period:
Input the time rule for the disconnection of this WAN service.
Line-Dropped
Input how long the WAN service may be disconnected before the newly added
Scheduling:
connections should go through another WAN to connect with the Internet.
Link Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Shared- Circuit WAN
If your WAN connects to a Switch, select “Enabled” to filter broadcast packets.
environment
The default is “Disabled”.
MTU
MTU is abbreviation of Maximum Transmission Unit. “Auto” and “Manual” can
be chosen. The default value is 1500. Different value could be set in different
network environment. (e.g. ADSL PPPoE MTU: 1492) .The default is “Auto”.
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any changes.
- 31 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Router Plus NAT Mode:
When you apply a public IP address as your default gateway, you can setup this public IP address into a LAN
PC, and this PC can use this public IP address to reach the Internet. Others PCs can use NAT mode to reach
the Internet.
If this WAN network is enabled the Router plus NAT mode, you can still use load balancing function in this
WAN network.
Item
Description
WAN IP address
Enter the public IP address.
Subnet mask
Enter the public IP address subnet mask.
- 32 -
Gigabit Multi-Homing VPN Security Router User’s Manual
WAN default gateway
Enter the WAN default gateway, which provided by your ISP.
DNS Servers
Enter the DNS server IP address, you must have to enter a DNS server IP
address, maximum two DNS servers IP addresses available..
Intranet routing default
Enter one of IP addresses that provide by the ISP as your default gateway.
gateway
Intranet IP addresses
Enter your IP addresses range, which IP addresses are provided by ISP. If you
range
have multiple IP ranges, you need setup group1 and group 2.
You can also setup the default gateway and IP range in the group 2.
Enable Line-Dropped
The WAN disconnection schedule will be activated by checking this option. In
Scheduling
some areas, there is a time limitation for WAN connection service. For
example: the optical fiber service will be disconnected from 0:00 am to 6:00 am.
Although there is a standby system in the device, at the moment of WAN
disconnection, all the external connections that go through this WAN will be
disconnected too. Only after the disconnected lines are reconnected can they
go through the standby system to connect with the Internet. Therefore, to avoid
a huge number of disconnection, users can activate this function to arrange
new connections to be made through another WAN to the Internet. In this way,
the effect of any disconnection can be minimized.
Line-Dropped Period
Input the time rule for disconnection of this WAN service.
Line-Dropped
Input how long the WAN service may be disconnected before the newly added
Scheduling
connections should go through another WAN to connect with the Internet.
Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Link Backup Interface
Select another WAN port as link backup when port binding is configured. Users
should select the port that employs the same ISP.
Shared- Circuit WAN
If your WAN connects to a Switch, select “Enabled” to filter broadcast packets.
environment:
The default is “Disabled”.
MTU
MTU is abbreviation of Maximum Transmission Unit. “Auto” and “Manual” can
be chosen. The default value is 1500. Different value could be set in different
network environment. (e.g. ADSL PPPoE MTU: 1492)
The default is “Auto”.
Click “Apply” to save the configuration, or click “Cancel" to leave without making any changes.
- 33 -
Gigabit Multi-Homing VPN Security Router User’s Manual
DMZ Setting
For some network environments, an independent Configurable DMZ port may be required to set up externally
connected servers such as WEB and Mail servers. Therefore, the device supports a set of independent
Configurable DMZ ports for users to set up connections for servers with real IP addresses. The DMZ ports act
as bridges between the Internet and LANs.
Item
Description
IP address
Indicates the current default static IP address.
Config.
Indicates an advanced configuration modification: Click Edit to enter the
advanced configuration page.
The DMZ configuration can be classified by Subnet and Range:
Subnet
The DMZ and WAN located in different Subnets .For example: If the ISP issued 16 real IP addresses:
220.243.230.1-16 with Mask 255.255.255.240, users have to separate the 16 IP addresses into two groups:
220.243.230.1-8 with Mask 255.255.255.248, and 220.243.230.9-16 with Mask 255.255.255.248 and then set
the device and the gateway in the same group with the other group in the DMZ.
- 34 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Range
DMZ and WAN are within same Subnet
Item
Description
IP Range
Input the IP range located at the DMZ port.
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any changes.
DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode:
Item
Description
LAN Default Gateway
Enter the LAN Default Gateway that you configured at Router Plus NAT Mode
LAN IP Range
Enter the usable static IP range that provide by ISP into the DMZ service IP
range. If you have other IP range, you can setup the default gateway and IP
range into group 2.
After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without
making any changes
- 35 -
Gigabit Multi-Homing VPN Security Router User’s Manual
6.2 Multi- WAN Setting
23B
6.2.1 Load Balance Mode
69B
Auto Load Balance Mode
When Auto Load Balance mode is selected, the device will use sessions or IP and the WAN bandwidth
automatically allocate connections to achieve load balancing for external connections. The network
bandwidth is set by what users input for it. For example, if the upload bandwidth of both WANs is 512Kbit/sec,
the automatic load ratio will be 1:1; if one of the upload bandwidths is 1024Kbit/sec while the other is
512Kbit/sec, the automatic load ratio will be 2:1. Therefore, to ensure that the device can balance the actual
network load, please input real upload and download bandwidths.
Item
Description
Session Balance
If “By Session” is selected, the WAN bandwidth will automatically allocate
connections based on session number to achieve network load balance.
IP Session Balance
If “By IP” is selected, the WAN bandwidth will automatically allocate
connections based on IP amount to achieve network load balance.
For either session balancing or IP connection balancing, collocation with Protocol Binding will
provide a more flexible application for bandwidth. Users can assign a specific Intranet IP to go
through a specific service provider for connection, or assign an IP for a specific destination to go
"
Note
through the WAN users assign to connect with the Internet.
For example, if users want to assign IP 192.168.1.100 to go through WAN 1 when connecting with
the Internet, or assign all Intranet IP to go through WAN 2 when connecting with servers with port
80, or assign all Intranet IP to go through WAN 1 when connecting with IP 211.1.1.1, users can do
that by configuring “Protocol Binding”.
"
Attention
When the Auto Load Balance mode is collocated with Protocol Binding, only IP addresses or
servers that are configured in the connection rule will follow the rule for external connections;
those which are not configured in the rule will still follow the device Auto Load Balance system.
- 36 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Please refer to the explanations in 6.2.3 Configuring Protocol Binding for setting up Protocol
Binding and for examples of collocating router modes with Protocol Binding.
Unbinding WAN Balance Mode
This mode enables users to assign specific intranet IP addresses, destination application service ports or
destination IP addresses to go through an assigned WAN for external connection. After being assigned, the
specific WAN will only support those assigned Intranet IP addresses, specific destination application service
ports, or specific destination IP addresses. Intranet IP, specific destination application service ports and
specific destination IP that is not configured under the rules will go through other WANs for external
connection. For unassigned WANs, users can select Load Balance mode and select session or IP for load
balancing.
Item
Description
Session Balance:
If “By Session” is selected, the WAN bandwidth will automatically allocate
connections based on session number to achieve network load balance.
If “By IP” is selected, the WAN bandwidth will automatically allocate
IP Balance:
connections based on the number of IP addresses to achieve network load
balance.
.
Only when a device assignment is collocated with Protocol Binding can the balancing function be
"
Note
brought into full play. For example, an assignment requiring all Intranet IP addresses to go through
WAN 1 when connecting with service port 80, or go through WAN 1 when connecting with IP
211.1.1.1, must be set up in the Protocol Binding Configuration.
When assigning mode is selected, as in the above example, the IP(s) or service provider(s)
configured in the connection rule will follow the rule for external connections, but those which are
"
not configured in the rule will still follow the device Load Balance system to go through other WAN
ports to connect with the Internet.
Attention
Please refer to the explanations in 6.2.3 Configuring Protocol Binding for setting up Protocol
Binding and for examples of collocating router mode with Protocol Binding
Strategy Routing Mode
If strategy Routing is selected, the device will automatically allocate external connections based on routing
policy (Division of traffic between Telecom and Netcom is to be used in China) embedded in the device. All
you have to do is to select the WAN (or WAN group) which is connected with Netcom; the device will then
automatically dispatch the traffic for Netcom through that WAN to connect with the Internet and dispatch traffic
for Telecom to go through the WAN connected with Telecom to the Internet accordingly. In this way, the traffic
- 37 -
Gigabit Multi-Homing VPN Security Router User’s Manual
for Netcom and Telecom can be divided.
Set WAN Grouping
If more than one WAN is connected with Netcom, to apply a similar division of traffic policy to these WANs, a
combination for the WANs must be made. Click “Set WAN Grouping”; an interactive window as shown in the
figure below will be displayed.
Item
Name
Description
To define a name for the WAN grouping in the box, such as “Education” etc.
The name is for recognizing different WAN groups.
Interface
Check the boxes for the WANs to be added into this combination.
Add To List
To add a WAN group to the grouping list.
Delete selected Item
To remove selected WANs from the WAN grouping.
Apply
Click “Apply” to save the modification.
Close
Click “Cancel” to cancel the modification. This only works before “Apply” is
clicked.
After the configuration is completed, in the China Netcom Policy window users can select WANs in
combination to connect with Netcom.
- 38 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Import Strategy
A division of traffic policy can be defined by users too. In the “Import Strategy” window, select the WAN or
WAN group (ex. WAN 1) to be assigned and click the “Import IP Range” button; the dialogue box for
document importation will be displayed accordingly.
A policy document is an editable text document. It may contain a destination IP users designated. After the
path for document importation has been selected, click “Import”, and then at the bottom of the configuration
window click “Apply”. The device will then dispatch the traffic to the assigned destination IP through the WAN
(ex. WAN 1) or WAN grouping users designated to the Internet.
To build a policy document users can use a text-based editor, such as Notepad, which is included with
Windows system. Follow the text format in the figure below to key in the destination IP addresses users want
to assign.
For example, if the destination IP address range users want to designate is 140.115.1.1 ~ 140.115.1.255, key
in 140.115.1.1 ~ 140.115.1.255 in Notepad. The next destination IP address range should be keyed in the
next line. Attention! Even if only one destination IP address is to be assigned, it should follow the same format.
For example, if the destination IP address is 210.66.161.54, it should be keyed in as
210.66.161.54~210.66.161.54. After the document has been saved (the extension file name is .txt), users can
import the IP range of self-defined strategy.
- 39 -
Gigabit Multi-Homing VPN Security Router User’s Manual
China Netcom strategy and self-defined strategy can coexist. However, if a destination IP is
"
assigned by both China Netcom strategy and self-defined strategy, China Netcom strategy will
Note
take priority. In other words, traffic to that destination IP will be transmitted through the WAN (or
WAN group) under China Netcom strategy.
Session Balance Advanced Function
In general, session balance is to equally and randomly distribute the session connections of each intranet IP.
For some special connections, for example, web banking encrypted connection (Https or TCP443), is required
to connect from the same WAN IP. If one intranet IP visits web banking website and the connection is
distributed into different WAN IP addresses, there will be disconnection or failure. Session balance advanced
function targets at solving this issue.
Session balance advanced function can set the same intranet IP keeps having sessions from the same WAN
IP for some specific service protocols. Other service protocols can still adopt the original balance mechanism
to distribute the sessions equally and randomly. With the original session balance efficiency, advanced
function can ensure the connection running without error for some special service protocols.
Click “Advanced Function” to enter the setting window:
- 40 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Destination Auto Binding
Indicates that the session will be connected with the same WAN IP when the
destination IP is in the same Class B range.
For example, there are WAN1-1 200.10.10.1 and WAN2- 200.10.10.2, and two intranet IP addresses. When
192.168.1.100 visits Internet 61.222.81.100 for the first time, the connection is through WAN1- 200.10.10.1. If
the next destination is to 61.222.81.101 (in the same Class B range), the connection will also be through
WAN1- 200.10.10.1. If the destination is to other IP not in the same Class B range as 61.222.81.100, the
session will be distributed in the original session balance mechanism.
When the other intranet IP 192.168.1.101 visits 61.222.81.101 for the first time, the connection is through
WAN2- 200.10.10.2. If the next destination is to 61.222.81.100 (in the same Class B range), the connection
will also be through WAN2 200.10.10.2. If the destination is to other IP not in the same Class B range as
61.222.81.100), the session will be distributed in the original session balance mechanism.
- 41 -
Gigabit Multi-Homing VPN Security Router User’s Manual
"
Note
Not all intranet IP will visit the same Class B range with the same WAN IP. It depends on which
WAN the first connection goes to. If the destination IP is in the same Class B range, the
connection will go through with the same WAN IP based on the first time learning.
Item
Description
User Define Dis. Or Port
Indicates that the intranet IP will connect through the same WAN IP when the
Auto Binding
service ports are self- defined. You can self- define the service ports and
destination IP. (If the destination IP is set as 0.0.0.0 to 0, this represents that
the destination is to any IP range.)
"
Note
You can only choose either Destination Auto Binding or User
Define Dis. Or Port Auto Binding.
Take default rules for example:
- 42 -
Gigabit Multi-Homing VPN Security Router User’s Manual
When any intranet IP connects with TCP443 port or any destination (0.0.0.0 to 0 represents any destination),
it will go through the same WAN IP. As for which WAN will be selected, this follows the first- chosen WAN IP
distributed by the original session balance mechanism.
For example, there are two intranet IP- 192.168.100.1 and 192.168.100.2. When these intranet IPs first
connects with TCP443 port, 192.168.100.1 will go through WAN1, and 192.168,100.2 will go through WAN2.
Afterwards, 192.168.100.1 will go through WAN1 when there are TCP443 port connections. 192.168.100.2
will go through WAN2 when there are TCP443 port connections. This rule is by default. You can delete or add
rules to meet your connection requirement.
6.2.2 Network Detection Service
70B
This is a detection system for network external services. If this option is selected, information such “Retry” or
“Retry Timeout” will be displayed. If two WANs are used for external connection, be sure to activate the NSD
system, so as to avoid any unwanted break caused by the device misjudgment of the overload traffic for the
WAN.
Item
Description
Interface
Select the WAN Port that enables Network Service Detection.
Retry
This selects the retry times for network service detection. The default is five
times. If there is no feedback from the Internet in the configured “Retry Times",
it will be judged as “External Connection Disconnected”.
Retry Timeout
Delay time for external connection detection latency. The default is 30 seconds.
After the retry timeout, external service detection will restart.
When Fail
(1) Generate the Error Condition in the System Log: If an ISP connection
failure is detected, an error message will be recorded in the System Log. This
line will not be removed; therefore, the some of the users on this line will not
have normal connections.
- 43 -
Gigabit Multi-Homing VPN Security Router User’s Manual
This option is suitable under the condition that one of the WAN connections has
failed; the traffic going through this WAN to the destination IP cannot shift to
another WAN to reach the destination.
For example, if users want the traffic to 10.0.0.1 ~ 10.254.254.254 to go only
through WAN1, while WAN2 is not to support these destinations, users should
select this option. When the WAN1 connection is disconnected, packets for
10.0.0.1~10.254.254.254 cannot be transmitted through WAN 2, and there is
no need to remove the connection when WAN 1 is disconnected.
(2) Keep System Log and Remove the Connection: If an ISP connection
failure is detected, no error message will be recorded in the System Log. The
packet transmitted through this WAN will be shifted to the other WAN
automatically, and be shifted back again when the connection for the original
WAN is repaired and reconnected.
This option is suitable when one of the WAN connections fails and the traffic
going through this WAN to the destination IP should go through the other WAN
to reach the destination. In this way, when any of the WAN connections is
broken, other WANs can serve as a backup; traffic can be shifted to a WAN that
is still connected.
Default Gateway
The local default communication gateway location, such as the IP address of
an ADSL router, will be input automatically by the device. Therefore, users just
need to check the option if this function is needed. Attention! Some gateways of
an ADSL network will not affect packet detection. If users have an optical fiber
box, or the IP issued by ISP is a public IP and the gateway is located at the port
of the net café rather than at the IP provider’s port, do not activate this option.
ISP Host
This is the detected location for the ISP port, such as the DNS IP address of
ISP. When configuring an IP address for this function, make sure this IP is
capable of receiving feedback stably and speedily. (Please input the DNS IP of
the ISP port)
Remote Host
This is the detected location for the remote Network Segment. This Remote
Host IP should better be capable of receiving feedback stably and speedily.
(Please input the DNS IP of the ISP port).
DNS Lookup
This is the detect location for DNS. (Only a web address such as
Host
www.hinet.net is acceptable here. Do not input an IP address.) In addition, do
not input the same web address in this box for two different WANs.
- 44 -
Gigabit Multi-Homing VPN Security Router User’s Manual
In the load balance mode for Assigned Routing, the first WAN port (WAN1) will be saved for the
traffic of the IP addresses or the application service ports that are not assigned to other WANs
(WAN2, WAN3, and WAN4). Therefore, in this mode, we recommend assigning one of the
"
Note
connections to the first WAN. When other WANs (WAN2, WAN3, or WAN4) are broken and
connection error remove (Remove the Connection) has been selected for the connection detection
system, traffic will be shifted to the first WAN (WAN1). In addition, if the first WAN (WAN1) is
broken, the traffic will be shifted to other WANs in turn. For example, the traffic will be shifted to
WAN2 first; if WAN2 is broken too, the traffic will be shifted to WAN3, and so on.
6.2.3 Protocol Binding
71B
The VPN router can set up to four WAN interface, the bandwidth and whether can connect to the internet will
effect the router load-balancing feature for each WAN, so the bandwidth setting and line detect is must be
correct for each WAN interface.
In “ WAN Setting, click “Edit” to enter the WAN interface configure window. In “ Bandwidth Management “ can
adjust the bandwidth for each WAN interface.
WAN Setting
Bandwidth Management
- 45 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Protocol Binding
Users can define specific IP addresses or specific application service ports to go through a user-assigned
WAN for external connections. For any other unassigned IP addresses and services, WAN load balancing will
still be carried out.
In the load balance mode of Assigned Routing, the first WAN (WAN1) cannot be assigned. It is to be
saved for the IP addresses and the application Service Ports that are not assigned to other WANs
"
Note
(WAN2, WAN3, and WAN4) for external connections. In other words, the first WAN (WAN1) cannot
be configured with the Protocol Binding rule. This is to avoid a condition where all WANs are
assigned to specific Intranet IP or Service Ports and destination IP, no more WAN ports will be
available for other IP addresses and Service Ports.
Item
Description
Service
This is to select the Binding Service Port to be activated. The default (such as
ALL-TCP&UDP 0~65535, WWW 80~80, FTP 21 to 21, etc.) can be selected
from the pull-down option list. The default Service is All 0~65535.
- 46 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Option List for Service Management: Click the button to enter the
Service Port configuration page to add or remove default Service
Ports on the option list.
Users can assign packets of specific Intranet virtual IP to go through a specific
Source IP
WAN port for external connection. In the boxes here, input the Intranet virtual IP
address range; for example, if 192.168.1.100~150 is input, the binding range
will be 100~150. If only specific Service Ports need to be designated, while
specific IP designation is not necessary, input “0” in the IP boxes.
Destination IP
In the boxes, input an external static IP address. For example, if connections to
destination IP address 210.11.1.1 are to be restricted to WAN1, the external
static IP address 210.1.1.1 ~ 210.1.1.1 should be input. If a range of
destinations is to be assigned, input the range such as 210.11.1.1 ~
210.11.255.254. This means the Class B Network Segment of 210.11.x.x will
be restricted to a specific WAN. If only specific Service Ports need to be
designated, while a specific IP destination assignment is not required, input “0”
into the IP boxes.
Interface
Select the WAN for which users want to set up the binding rule.
Enable
To activate the rule.
Add To List
To add this rule to the list.
Delete selected
To remove the rules selected from the Service List.
application
Moving Up & Down
The priority for rule execution depends on the rule order in the list. A rule
located at the top will be executed prior to those located below it. Users can
arrange the order according to their priorities.
"
Note
The rules configured in Protocol Binding will be executed by the device according to their priorities
too. The higher up on the list, the higher the priority of execution.
- 47 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Show Table
Click the “Show Table” button. A dialogue box as shown in the following figure will be displayed. Users can
choose to sort the list by priorities or by interface. Click “Refresh” and the page will be refreshed; click “Close”
and the dialogue box will be closed.
Add or Remove Service Port
If the Service Port users want to activate is not in the list, users can add or remove service ports from
“Service Port Management” to arrange the list, as described in the following:
Item
Description
Service Name
In this box, input the name of the Service Port which users want to activate,
such as BT, etc.
Protocol
This option list is for selecting a packet format, such as TCP or UDP for the
Service Ports users want to activate.
Port range
In the boxes, input the range of Service Ports users want to add.
Add To List
Click the button to add the configuration into the Services List. Users can add
- 48 -
Gigabit Multi-Homing VPN Security Router User’s Manual
up to 100 services into the list.
Delete selected service
To remove the selected activated Services.
Apply
Click the “Apply” button to save the modification.
Cancel
Click the “Cancel” button to cancel the modification. This only works before
“Apply” is clicked.
Auto Load Balancing mode when enabled
The collocation of the Auto Load Balance Mode and the Auto Load Mode will enable more flexible use of
bandwidth. Users can assign specific Intranet IP addresses to specific destination application service ports or
assign specific destination IP addresses to a WAN users choose for external connections.
Example 1:How do I set up Auto Load Balance Mode to assign the Intranet IP 192.168.1.100 to WAN2
for the Internet?
As in the figure below, select “All Traffic” from the pull-down option list “Service”, and then in the boxes of
“Source IP” input the source IP address “192.168.1.100” to “100”. Retain the original numbers “0.0.0.0” in the
boxes of “Destination IP” (which means to include all Internet IP addresses). Select WAN2 from the pull-down
option list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode.
- 49 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Example 2:How do I set up Auto Load Balance Mode to keep Intranet IP 192.168.1.150 ~ 200 from
going through WAN2 when the destination port is Port 80?
As in the figure below, select “HTTP [TCP/80~80]” from the pull-down option list “Service”, and then in the
boxes for “Source IP” input “192.168.1.150” to “200”. Retain the original numbers “0.0.0.0” in the boxes of
“Destination IP” (which means to include all Internet IP addresses). Select WAN2 from the pull-down option
list “Interface”, and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode.
Example 3:How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going
through WAN2 when the destination port is Port 80 and keep all other services from going through
WAN1?
As in the figure below, there are two rules to be configured. The first rule: select “HTTP [TCP/80~80]” from the
pull-down option list “Service”, and then in the boxes of Source IP input “192.168.1.0” to “0” (which means to
include all Intranet IP addresses). Retain the original numbers “0.0.0.0” in the boxes of “Destination IP”
(Which means to include all Internet IP addresses). Select WAN2 from the pull-down option list “Interface”,
and then click “Enable”. Finally, click “Add New” and the rule will be added to the mode. The device will
transmit packets to Port 80 through WAN2. However, with only the above rule, packets that do not go to Port
80 may be transmitted through WAN2; therefore, a second rule is necessary. The second rule: Select “All
Ports [TCP&UDP/1~65535]” from the pull-down option list “Service”, and then input “192.168.1.2 ~ 254” in the
boxes of “Source IP”. Retain the original numbers “0.0.0.0” in the boxes of “Destination IP” (which means to
- 50 -
Gigabit Multi-Homing VPN Security Router User’s Manual
include all Internet IP addresses). Select WAN1 from the pull-down option list “Interface”, and then click
“Enable”. Finally, click “Add New” and the rule will be added to the mode. The device will transmit packets that
are not going to Port 80 to the Internet through WAN1.
Configuring “Assigned Routing Mode” for load Balance
IP Group: This function allows users to assign packets from specific Intranet IP addresses or to specific
destination Service Ports and to specific destination IP addresses through an assigned WAN to the Internet.
After being assigned, the specific WAN will only support those assigned Intranet IP addresses, destination
Service Ports, or destination IP addresses. Those which are not configured will go through other WANs for
external connection. Only when this mode is collocated with “Assigned Routing” can it bring the function into
full play.
Example 1:How do I set up the Assigned Routing Mode to keep all Intranet IP addresses from going
through WAN2 when the destination is Port 80, and keep all other services from going through
WAN1?
As in the figure below, select “HTTP[TCP/80~80]” from the pull-down option list “Service”, and then in the
boxes of “Source IP” input “192.168.1.0 ~ 0” (which means to include all Intranet IP addresses). Retain the
original numbers “0.0.0.0” in the boxes of “Destination IP” (Which means to include all Internet IP addresses).
- 51 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Select WAN2 from the pull-down option list “Interface”, and then click “Enable”. Finally, click “Add New” and
the rule will be added to the mode. After the rule is set up, only packets that go to Port 80 will be transmitted
through WAN2, while other traffics will be transmitted through WAN1.
Example 2:How do I configure Protocol Binding to keep traffic from all Intranet IP addresses from
going through WAN2 when the destinations are IP 211.1.1.1 ~ 211.254.254.254 as well as the whole
Class A group of 60.1.1.1 ~ 60.254.254.254, while traffic to other destinations goes through WAN1?
As in the following figure, there are two rules to be configured. The first rule: Select “All Port
[TCP&UDP/1~65535]” from the pull-down option list “Service”, and then in the boxes of “Source IP” input
“192.168.1.0 ~ 0” (which means to include all Intranet IP addresses). In the boxes for “Destination IP” input
“211.1.1.1 ~ 211.254.254.254”. Select WAN2 from the pull-down option list “Interface”, and then click “Enable”.
Finally, click “Add New” and the rule will be added to the mode. The second rule: Select “All Port
[TCP&UDP/1~65535]” from the pull-down option list “Service”, and then in the boxes of “Source IP” input
“192.168.1.0 ~ 0” (which means to include all Intranet IP addresses). In the boxes of “Destination IP” input
“211.1.1.1 ~ 60,254,254,254”. Select WAN2 from the pull-down option list “Interface”, and then click “Enable”.
Finally, click “Add New”, and the rule will be added to the mode. After the rule has been set up, all traffic that is
not going to the assigned destinations will only be transmitted through WAN1.
- 52 -
Gigabit Multi-Homing VPN Security Router User’s Manual
- 53 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 7: Port Management
6B
This chapter introduces how to configure ports and understand how to configure intranet IP addresses.
7.1 Setup
24B
Through the device, users can easily manage the setup for WAN ports, LAN ports and the DMZ port by
choosing the number of ports, speed, priority, duplex and enable/disable the auto-negotiation feature for
connection setting of each port.
Mirror Port : Users can configure LAN 1 as mirror port by choosing “Enable Port 1 as Mirror Port”. All the
traffic from LAN to WAN will be copied to mirror port. Administrator can control or filter the traffic through
mirror port. Once this function is enabled, LAN 1 will be shown as Mirror Port in Physical Port Status, Home
page.
Item
Description
Disabled
This feature allows users turn on/off the Ethernet port. If selected, the Ethernet
port will be shut down immediately and no connection can be made. The
default value is "on".
Priority
This feature allows users to set the high/low priority of the packet delivery for
the Ethernet port. If it is set as High, the port has the first priority to deliver the
packet. The default value is “Normal”.
Speed
This feature allows users to select the network hardware connection speed for
the Ethernet port. The options are 10Mbps and 100Mbps.
Duplex Status
This feature allows users to select the network hardware connection speed
working mode for the Ethernet. The options are full duplex and half duplex.
Auto Neg.
The Auto-Negotiation mode can enable each port to automatically adjust and
gather the connection speed and duplex mode. Therefore, if Enabled
- 54 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Auto-Neg. selected, the ports setup will be done without any manual setting by
administrators.
VLAN
This feature allows administrators to set the LAN port to be one or more
disconnected network sessions. All of them will be able to log on to the Internet
through the device.
Members in the same network session (within the same VLAN) can see and
communicate with each other. Members in different VLAN will not know the
existence of other members.
VLAN All
Set VLAN All port to be the public area of VLAN so that it can be connected to
other VLAN networks. A server should be constructed for the intranet so that all
VLAN group can visit this server. Set one of the network ports as VLAN All.
Connect the server to VLAN All so that computers of different VLAN groups can
be connected to this server. Moreover, the port where the administrator locates
must be set as VLAN All so that it can be connected to the entire network to
facilitate network management.
7.2 Port Status
25B
- 55 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Summary
There are Network Connection Type, Interface, Link Status (Up/Down), Port Activity (Port Enabled), Priority
Setting (High or Normal), Speed Status (10Mbps, 100Mbps or 1000Mbps), Duplex Status (half duplex or full
duplex), Auto Neg. (Enabled/Disabled), and VLAN.
Statistics
The packet data of this specific port will be displayed. Data include receive/ transmit packet count, receive/
transmit packet Byte count and error packet count. Users may press the refresh button to update all real-time
messages.
7.3 IP/ DHCP
26B
With an embedded DHCP server, it supports automatic IP assignation for LAN computers. (This function is
similar to the DHCP service in NT servers.) It benefits users by freeing them from the inconvenience of
recording and configuring IP addresses for each PC respectively. When a computer is turned on, it will
acquire an IP address from the device automatically. This function is to make management easier.
- 56 -
Gigabit Multi-Homing VPN Security Router User’s Manual
DHCP Dynamic IP
Item
Description
Enable DHCP Server
Check the option to activate the DHCP server automatic IP lease function. If the
function is activated, all PCs will be able to acquire IP automatically. Otherwise,
users should configure static virtual IP for each PC individually.
Client lease Time
This is to set up a lease time for the IP address which is acquired by a PC. The
default is 1440 minutes (a day). Users can change it according to their needs.
The time unit is minute.
Range Start
This is an initial IP automatically leased by DHCP. It means DHCP will start the
lease from this IP. The default initial IP is 192.168.1.100.
Range End
This is the end IP automatically leased by DHCP. The default initial IP is
192.168.1.149.
DNS (Domain Name Service)
This is for checking the DNS from which an IP address has been leased to a PC port. Input the IP address of
this server directly.
Item
Description
DNS (Required) 1
Input the IP address of the DNS server.
DNS (Optional) 2
Input the IP address of the DNS server.
WINS:
If there is a WIN server in the network, users can input the IP address of that server directly.
Item
Description
WINS Server
Input the IP address of WINS.
Apply
Click “Apply” to save the network configuration modification.
Cancel
Click “Cancel" to leave without making any changes.
- 57 -
Gigabit Multi-Homing VPN Security Router User’s Manual
7.4 DHCP Status
27B
This is an indication list of the current status and setup record of the DHCP server. The indications are for the
administrator’s reference when a network modification is needed.
Item
Description
DHCP Server
This is the current DHCP IP.
Dynamic IP Used
The amount of dynamic IP leased by DHCP.
Static IP Used
The amount of static IP assigned by DHCP.
IP Available
The amount of IP still available in the DHCP server.
Total IP
The total IP which the DHCP server is configured to lease.
Host Name
The name of the current computer.
IP Address
The IP address acquired by the current computer.
MAC Address
The actual MAC network location of the current computer.
Client Lease Time
The lease time of the IP released by DHCP.
Delete
Remove a record of an IP lease.
- 58 -
Gigabit Multi-Homing VPN Security Router User’s Manual
7.5 IP & MAC Binding
28B
Administrators can apply IP & MAC Binding function to make sure that users can not add extra PCs for
Internet access or change private IP addresses.
There are two methods for setting up this function:
Block MAC address not on the list
This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet
access. When this method is applied, please fill out Static IP with 0.0.0.0, as the figure below:
- 59 -
Gigabit Multi-Homing VPN Security Router User’s Manual
IP & MAC Binding
- 60 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Static IP:
Description
There are two ways to input static IP:
1. If users want to set up a MAC address to acquire IP from DHCP, but the IP
need not be a specific assigned IP, input 0.0.0.0 in the boxes. The boxes
cannot be left empty.
2. If users want DHCP to assign a static IP for a PC every single time, users
should input the IP address users want to assign to this computer in the boxes.
The server or PC which is to be bound will then acquire a static virtual IP
whenever it restarts.
MAC Address:
Input the static real MAC (the address on the network card) for the server or PC
which is to be bound.
Name:
For distinguishing clients, input the name or address of the client that is to be
bound. The maximum acceptable characters are 12.
Enabled:
Activate this configuration.
Add to list:
Add the configuration or modification to the list.
Delete selected item:
Remove the selected binding from the list.
Add:
Add new binding.
Block MAC address on the list with wrong IP address: When this option is activated, MAC addresses which
are not included in the list will not be able to connect with the Internet.
Show New IP user:
This function can reduce administrator’s effort on checking MAC addresses one by one for the binding.
Furthermore, it is easy to make mistakes to fill out MAC addresses on the list manually. By checking this list,
administrator can see all MAC addresses which have traffic and are not bound yet. Also, if administrators find
that one specific bound MAC address is shown on the list, it means that the user changes the private IP
address.
Item
Name
Description
Input the name or address of the client that is to be bound. The maximum
acceptable characters are 12.
Enabled
Choose the item to be bound.
Apply
Activate the configuration.
Select All
Choose all items on the list for binding.
Refresh
Refresh the list.
Close
Close the list.
- 61 -
Gigabit Multi-Homing VPN Security Router User’s Manual
7.6 IP Grouping
29B
IP Group function can combine several IP addresses or IP address ranges into several groups. When you
manage user internet access privileges by IP address, you can set up every management functions for users
who have same internet access privileges in the same IP group in order to decrease the effort of setting rules
for each IP address. For example, you can choose to set up QoS or Access Rule by IP grouping. Thus, you
will simplify setting rules.
IP Grouping consists of Local IP Group and Remote IP Group. Local IP Group refers to LAN IP groups, and
remote IP Group refers to WAN IP groups. Local IP Group list will automatically learn IP addresses having
packets that pass through firewall. Moreover, if user changes the IP address, the IP in the list will change
accordingly well. For IP information which is in group list, it won't update automatically along with IP list of the
left side. Administrators need to modify it manually.
Item
User Edit IP
Description
The IP list will show the list which learns the IP addresses automatically on the
left under side. You can also modify IP addresses manually.
Name
Input the name of IP address (or range) showed below.
IP Address
Input IP address (or range). For example, 192.168.1.200 ~ 250.
Add to IP List
After setting name and IP address, push this button to add the information into
the IP list below. If this IP (or range) is already in the list, you can not add it
again.
- 62 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Local Group Set
You can choose from the IP list on the left side to set up a local IP group.
IP Group
Choose IP Group that you would like to modify. If you would like to add new
groups, please push “Add new group” button.
Group Name
When you add new groups, please note if the group name is in the column.
Delete Group
Choose the group that you would like to delete from the pull- down list, and
push the “Delete Group” button. System will ask you again if you would like to
delete the group. After pushing the confirmation button, the group will be
deleted.
You can choose several IPs from IP list on the left side, and push this button to
button
have them added into the group the right side.
Delete
Delete self- defined IP or IP range.
Apply
Click “Apply” to save the network configuration modification
Cancel
Click “Cancel" to leave without making any changes.
- 63 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Remote IP Group Management:
Basically, Remote IP Group setups are exactly the same as Local IP Group setups. However, remote IP
group does not have automatically learning functions. Instead, you need to define addresses, ranges and
groups manually. For example, 220.130.188.1 to 200 (range).
It is the same setting methods. You should set the IP address or the range of remote IP from the left side first,
and choose to add IP address information from the left side into the remote group.
- 64 -
Gigabit Multi-Homing VPN Security Router User’s Manual
7.7 Port Group Management
30B
Service ports can be grouping as IP grouping. It is convenient to set QoS, firewall access rules, and other
functions.
Item
Description
User edit port
Input the name, protocol, and port range for the specific service port.
Name
Name the Port in order to identify its property. For example, Virus 135.
Protocol
Choose the port protocol form the pull down list like TCP, UDP or TCP and
UDP.
Port Range
Input the port range. For example, 135 to 135.
Add to Port List
After setting name, protocol and port range, push this button to add the
information into the Port list below. This port can be from some port groups.
Group Name
When you add new groups, please note if the group name is in the column. For
example, Virus.
Delete Group
Choose the group that you would like to delete from the pull- down list, and
push the “Delete Group” button. System will ask you again if you would like to
delete the group. After pushing the confirmation button, the group will be
deleted.
You can choose several ports from Port list on the left side, and push this
button
button to have them added into the group the right side.
Delete
Delete self- defined port or port range.
Apply
Click “Apply” to save the network configuration modification
- 65 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 8: QoS (Quality of Service)
7B
QoS is an abbreviation for Quality of Service. The main function is to restrict bandwidth usage for
some services and IP addresses to save bandwidth or provide priority to specific applications or
services, and also to enable other users to share bandwidth, as well as to ensure stable and reliable
network transmission. To maximize the bandwidth efficiency, network administrators should take
account of the practical requirements of a company, a community, a building, or a café, etc., and
modify bandwidth management according to the network environment, application processes or
services.
8.1 Bandwidth Management
31B
- 66 -
Gigabit Multi-Homing VPN Security Router User’s Manual
8.1.1 The Maximum Bandwidth provided by ISP
72B
In the boxes for WAN1 and WAN2 bandwidth, input the upstream and downstream bandwidth which users
applied for from bandwidth supplier. The bandwidth QoS will make calculations according to the data users
input. In other words, it will guarantee a minimum rate of upstream and downstream for each IP and Service
Port based on the total actual bandwidth of WAN1 and WAN2. For example, if the upstream bandwidths of
both WAN1 and WAN2 are 512Kbit/Sec, the total upstream bandwidth will be: WAN1 + WAN2 = 1024Kbit/Sec.
Therefore, if there are 50 IP addresses in the Intranet, the minimum guaranteed upstream bandwidth for each
IP would be 1024Kbit/50=20Kbit/Sec. Thus, 20Kbit/Sec can be input for “Mini. Rate” Downstream bandwidth
can be calculated in the same way.
- 67 -
Gigabit Multi-Homing VPN Security Router User’s Manual
The rules configured in Protocol Binding will be executed by the device according to their
"
priorities too. The higher up on the list, the higher the priority of execution. The unit of calculation
Attention in this example is Kbit. Some software indicates the downstream/upstream speed with the unit
KB. 1KB = 8Kbit.
8.1.2 QoS
73B
To satisfy the bandwidth requirements of certain users, the device enables users to set up QoS with Rate
Control method.
Rate Control
The network administrator can set up bandwidth or usage limitations for each IP or IP range according to the
actual bandwidth. The network administrator can also set bandwidth control for certain Service Ports. A
guarantee bandwidth control for external connections can also be configured if there is an internal server.
- 68 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Interface
Description
Select on which WAN the QoS rule should be executed. It can be a single
selection or multiple selections.
Service Port
Select what bandwidth control is to be configured in the QoS rule. If the
bandwidth for all services of each IP is to be controlled, select “All (TCP&UDP)
1~65535”. If only FTP uploads or downloads need to be controlled, select “FTP
Port 21~21”. Refer to the Default Service Port Number List.
IP Address
This is to select which user is to be controlled. If only a single IP is to be
restricted, input this IP address, such as “192.168.1.100 to 100”. The rule will
control only the IP 192.168.1.100. If an IP range is to be controlled, input the
range, such as “192.168.1.100 ~ 150”. The rule will control IP addresses from
192.168.1.100 to 150. If all Intranet users that connect with the device are to be
controlled, input “0” in the boxes of IP address. This means all Intranet IP
addresses will be restricted. QoS can also control the range of Class B.
Direction
Upstream: Means the upload bandwidth for Intranet IP.
Downstream: Means the download bandwidth for Intranet IP.
Server in LAN, Upstream: If a Server for external connection has been built in
the device, this option is to control the bandwidth for the traffic coming from
outside to this Server.
Server in LAN, Downstream: If there are web sites built in the Intranet, this
option is to control the upload bandwidth for the connections from outside to
this Server. For example, game servers have been built in many Internet cafés.
This rule can be used to control the bandwidth for connections from outside to
the game server of a café to update data. In this way, game players inside the
café will not be affected.
Min. & Max.
The minimum bandwidth: The rule is to guarantee minimum available
Rate(Kbit/Sec)
bandwidth.
The maximum bandwidth: This rule is to restrict maximum available
bandwidth. The maximum bandwidth will not exceed the limit set up under this
rule.
"
The unit of calculation used in this rule is Kbit. Some software
Attention indicates download/upload speed by the unit KB. 1KB = 8Kbit.
Bandwidth Assign Type
Sharing total bandwidth with all IP addresses: If this option is selected, all IP
addresses or Service Ports will share the bandwidth range (from minimum to
maximum bandwidth).
Assign bandwidth for each IP address: If this option is selected, every IP or
Service Port in this range can have this bandwidth (minimum to maximum.). For
- 69 -
Gigabit Multi-Homing VPN Security Router User’s Manual
example, If the rule is set for the IP of each PC, the IP of each PC will have the
same bandwidth.
If “Share-Bandwidth” is selected, be aware of the actual usage
conditions and avoid an improper configuration that might cause a
malfunction of the network when the bandwidth is too small.
"
Attention For example, if users do not want an FTP to occupy too much
bandwidth, users can select the “Share-Bandwidth Mode”, so that
no matter how much users use FTPs to download information, the
total occupied bandwidth is fixed.
Enable
Activate the rule.
Add to list
Add this rule to the list.
Move up & Move down
QoS rules will be executed from the bottom of the list to the top of the list. In
other words, the lower down the list, the higher the priority of execution. Users
can arrange the sequence according to their priorities. Usually the service ports
which need to be restricted, such as BT, e-mule, etc., will be moved to the
bottom of the list. The rules for certain IP addresses would then be moved
upward.
Delete selected items
Remove the rules selected from the Service List.
Show Table
Display all the Rate Control Rules users made for the bandwidth. Click “Edit” to
modify.
Apply
Click “Apply” to save the configuration
Cancel
Click “Cancel" to leave without making any change.
Show Table
- 70 -
Gigabit Multi-Homing VPN Security Router User’s Manual
8.1.3 Smart QoS
74B
Item
Description
Enabled QoS
Choose to apply QoS function.
When the usage of any WAN’s
Input the required rate value into the column. The default is 60%.
bandwidth is over___%, Enable Smart
QoS
Each IP’s upstream bandwidth
Input the max. upstream rate for intranet IPs.
threshold (for all WAN)
Each IP’s downstream bandwidth
Input the max. downstream rate for intranet IPs.
threshold (for all WAN)
If any IP’s bandwidth is over maximum
When any IP uses more bandwidth than the above upstream or
threshold, its maximum bandwidth will
downstream settings, the IP will be restricted for the following
remain
upstream or downstream bandwidth settings.
Enabled Penalty Mechanism
After choosing “Enabled Penalty Mechanism”, the device will
enable the penalty conditions internally. When the IP still uses
more upstream or downstream bandwidth than the setting, the
device will execute the penalty conditions automatically.
Show Penalty List
The IPs which are under penalty mechanism will be shown on
the list.
Scheduling
If “Always” is selected, the rule will be executed around the clock.
If “From…” is selected, the rule will be executed according to the
configured time range. For example, if the time control is from
- 71 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Monday to Friday, 8:00am to 6:00pm, users can refer to the
following figure to set up the rule.
Item
Description
When the usage of certain WAN's
When the usage of certain WAN’s bandwidth is under __%, will
bandwidth is under__%, then stop to
stop to punish the IP which is over the limit. While the bandwidth
add new punished IP
is over the certain percentage, penalty mechanism will be
actived.
Every __ second to detect whether
Detect usage of internal IP’s bandwidth every __ secend.
internal IP's bandwidth are over than
limit
If the punished IP still keep upper
If the punished IP still keep over the limit, the limit badwidth will
bounded limit on, then decrease its
be decrase to __%.
bandwidth to__%
When the usage of all WANs' bandwith
Smart QoS will be disabled when the usage of bandwidth is
are lower than__% disable Smart Qos,
lower than __%. Punished IP will be released after __minute.
and after__minutes to release
punished IP
- 72 -
Gigabit Multi-Homing VPN Security Router User’s Manual
8.1.4 Exception IP address
75B
If some users are allowed to avoid traffic management control, you can use this function to fulfill the
requirement.
Item
Description
WAN
Select WAN ports.
Source IP
Enter the exempted IP range, or select the exempted IP group.
Do not control
Select do not control upload, download, or both of them.
Direction
Enabled
Enable this policy.
Add to List
Add this policy into the exempted list.
Delete Selected item
Delete selected list.
Apply
Click “Apply” button to saving configuration.
Cancel
Click “Cancel” button to reject modification.
- 73 -
Gigabit Multi-Homing VPN Security Router User’s Manual
8.2 Session control
32B
Session management controls the acceptable maximum simultaneous sessions of Intranet PCs. This function
is very useful for managing connection quantity when P2P software such as BT, Thunder, or emule is used in
the Intranet causing large numbers of sessions. Setting up proper limitations on sessions can effectively
control the sessions created by P2P software. It will also have a limiting effect on bandwidth usage.
In addition, if any Intranet PC is attacked by a virus like Worm.Blaster and sends a huge number of session
requests, session control will restrict that as well.
Session Control and Scheduling
Item
Description
Disabled
Disable Session Control function.
Single IP cannot
This option enables the restriction of maximum external sessions to each Intranet
exceed __ session
PC. When the number of external sessions reaches the limit, to allow new
sessions to be built, some of the existing sessions must be closed. For example,
when BT or P2P is being used to download information and the sessions exceed
the limit, the user will be unable to connect with other services until either BT or
P2P is closed.
When single IP exceed
__
If this function is selected, when the user’s port session reach the limit, this user
will not be able to make a new session for five minutes. Even if the previous
session has been closed, new sessions cannot be made until the setting time
ends.
If this function is selected, when the user’s port connections reach the limit, all the
- 74 -
Gigabit Multi-Homing VPN Security Router User’s Manual
lines that this user is connected with will be removed, and the user will not be able
to connect with the Internet for five minutes. New connections cannot be made
until the delay time ends.
Scheduling
If “Always” is selected, the rule will be executed around the clock.
If “From…” is selected, the rule will be executed according to the configured time
range. For example, if the time control is from Monday to Friday, 8:00am to
6:00pm, users can refer to the following figure to set up the rule.
Apply
Click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change.
Exempted Service Port or IP Address
Item
Description
Service Port
Choose the service port.
IP Address
Input the IP address range or IP group.
Enabled
Activate the rule.
Add to list
Add this rule to the list.
Delete seleted item
Remove the rules selected from the Service List.
Apply
Click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change.
- 75 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 9 : Firewall
8B
This chapter introduces firewall general policy, access rule, and content filter settings to ensure network
security.
9.1 General Policy
33B
The firewall is enabled by default. If the firewall is set as disabled, features such as SPI, DoS, and outbound
packet responses will be turned off automatically. Meanwhile, the remote management feature will be
activated. The network access rules and content filter will be turned off.
Item
Description
Firewall
This feature allows users to turn on/off the firewall.
SPI (Stateful Packet
This enables the packet automatic authentication detection technology. The
Inspection)
Firewall operates mainly at the network layer. By executing the dynamic
authentication for each connection, it will also perform an alarming function for
application procedure. Meanwhile, the packet authentication firewall may decline
the connections which use non-standard communication protocol.
DoS (Denial of Service)
This averts DoS attacks such as SYN Flooding, Smurf, LAND, Ping of Death, IP
Spoofing and so on.
Block WAN request
If set as Enabled, then it will shut down outbound ICMP and abnormal packet
responses in connection. If users try to ping the WAN IP from the external, this
will not work because the default value is set as activated in order to decline the
outbound responses.
Remote Management
To enter the device web- based UI by connecting to the remote Internet, this
feature must be activated. In the field of remote browser IP, a valid external IP
address (WAN IP) for the device should be filled in and the modifiable default
control port should be adjusted (the default is set to 80, modifiable).
Multicast Pass
There are many audio and visual streaming media on the network. Broadcasting
- 76 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Through
may allow the client end to receive this type of packet message format. This
feature is off by default.
Prevent ARP Virus
This feature is designed to prevent the intranet from being attacked by ARP
Attack
spoofing, causing the connection failure of the PC. This ARP virus cheat mostly
occurs in Internet cafes. When attacked, all the online computers disconnect
immediately or some computers fail to go online. Activating this feature may
prevent the attack by this type of virus.
Advanced Setting
- 77 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Packet Type
Description
This device provides three types of data packet transmission: TCP-SYN-Flood,
UDP-Flood and ICMP-Flood.
WAN Threshold
When all packet values from external attack or from single external IP attack
reach the maximum amount (the default is 15000 packets/Sec and 2000
packets/Sec respectively), if these conditions above occurs, the IP will be blocked
for 5 minutes ( the default is 5 minutes OBJ 176 ). Users can adjust the threshold
value and the blocking duration to effectively deal with external attack. The
threshold value should be adjusted from high to low.
LAN Threshold
When all packet values from internal attack or from single internal IP attack reach
the maximum amount (the default is 15000 packets/Sec and 2000 packets/Sec
respectively), if these conditions above occurs, the IP will be blocked for 5
minutes (the default is 5 minutes). Users can adjust the threshold value and the
blocking duration to effectively deal with external attack. The threshold value
should be adjusted from high to low.
Exempted Source IP
Input the exempted source IP.
Exempted Dest. IP
Input the exempted Destination IP addresses.
Apply
Click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change.
Firewall / DoS Log
Show the Firewall/Log.
Show Blocked IP
Show the blocked IP list and the remained blocked time.
- 78 -
Gigabit Multi-Homing VPN Security Router User’s Manual
9.2 Access Rule
34B
Users may turn on/off the setting to permit or forbid any packet to access internet. Users may select to set
different network access rules: from internal to external or from external to internal. Users may set different
packets for IP address and communication port numbers to filter Internet access rules.
Network access rule follows IP address, destination IP address, and IP communications protocol status to
manage the network packet traffic and make sure whether their access is allowed by the firewall.
9.2.1 Default Rule
76B
The device has a user-friendly network access regulatory tool. Users may define network access rules. They
can select to enable/ disable the network so as to protect all internet access. The following describes the
internet access rules:
z
All traffic from the LAN to the WAN is allowed - by default.
z
All traffic from the WAN to the LAN is denied - by default.
z
All traffic from the LAN to the DMZ is allowed - by default.
z
All traffic from the DMZ to the LAN is denied - by default.
z
All traffic from the WAN to the DMZ is allowed - by default.
z
All traffic from the DMZ to the WAN is allowed - by default.
Users may define access rules and do more than the default rules. However, the following four extra service
items are always on and are not affected by other user-defined settings.
* HTTP Service (from LAN to Device) is on by default (for management)
* DHCP Service (from LAN to Device) is set to on by default (for the automatic IP retrieval)
* DNS Service (from LAN to Device) is on by default (for DNS service analysis)
* Ping Service (from LAN to Device) is on by default (for connection and test)
In addition to the default rules, all the network access rules will be displayed as illustrated above. Users may
follow or self-define the priority of each network access rule. The device will follow the rule priorities one by
one, so please make sure the priority for all the rules can suit the setting rules.
- 79 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Edit:
Define the network access rule item
Delete:
Remove the item.
Add New Rule:
Create a new network access rule
Return to Default Rule:
Restore all settings to the default values and delete all the self-defined settings.
9.2.2 Add New Access Rule
77B
Item
Action
Description
Allow: Permits the pass of packets compliant with this control rule.
Deny: Prevents the pass of packets not compliant with this control rule.
Service Port
From the drop-down menu, select the service that users grant or do not give
permission.
Service Port
If the service that users wish to manage does not exist in the drop-down menu, press –
Management
Service Management to add the new service.
From the pop-up window, enter a service name and communications protocol and port,
and then click the “Add to list” button to add the new service.
Log
No Log: There will be no log record.
Create Log when matched: Event will be recorded in the log.
Interface
Select the source port whether users are permitted or not (for example: LAN, WAN1,
- 80 -
Gigabit Multi-Homing VPN Security Router User’s Manual
WAN2 or Any). Select from the drop-down menu.
Source IP
Select the source IP range (for example: Any, Single, Range, or preset IP group name).
If Single or Range is selected, please enter a single IP address or an IP address within
a session.
Dest. IP
Select the destination IP range (such as Any, Single, Range, or preset IP group name)
If Single or Range is selected; please enter a single IP address or an IP address within
a session.
Scheduling
Select “Always” to apply the rule on a round-the-clock basis. Select “from”, and the
operation will run according to the defined time.
Apply this rule
Select "Always" to apply the rule on a round-the-clock basis.
If “From” is selected, the activation time is introduced as below
… to …
This control rule has time limitation. The setting method is in 24-hour format, such as
08:00 ~ 18:00 (8 a.m. to 6 p.m.)
Day Control
”Everyday” means this period of time will be under control everyday. If users only
certain days of a week should be under control, users may select the desired days
directly.
Apply
Click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change.
- 81 -
Gigabit Multi-Homing VPN Security Router User’s Manual
9.3 URL Filter
35B
The device supports two webpage restriction modes: one is to block certain forbidden domains, and the other
is to give access to certain web pages. Only one of these two modes can be selected.
Block Forbidden Domain
Fill in the complete website such as www.sex.com to have it blocked.
Item
Description
Domain Name
Enter the websites to be controlled such as www.playboy.com
Add to list
Click ”Add to list” to create a new website to be controlled.
Delete selected item
Click to select one or more controlled websites and click this option to delete.
- 82 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Website Blocking by Keywords
Item
Enabled
Description
Click to activate this feature. The default setting is disabled. For example: If users
enter the string ”sex”, any websites containing ”sex” will be blocked.
Keywords(Only for
Enter keywords.
English keyword)
Add to List
Add this new service item content to the list.
Delete selected item
Delete the service item content from the list
Apply
Click “Apply” to save the modified parameters.
Cancel
Click “Cancel” to cancel all the changes made to the parameters.
- 83 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Accept Allowed Domains
In some companies or schools, employees and students are only allowed to access some specific websites.
This is the purpose of the function.
Item
Description
Enabled
Activate the function. The default setting is “Disabled.”
Domain Name
Input the allowed domain name, etc. www.google.com
Add to list
Add the rule to list.
Delete selected item
Users can select one or more rules and click to delete.
Apply
Activate the function. The default setting is “Disabled.”
Content Filter Scheduling
Select “Always” to apply the rule on a round-the-clock basis. Select “from”, and the operation will run
according to the defined time. For example, if the control time runs from 8 a.m. to 6 p.m., Monday to Friday,
users may control the operation according to the following illustrated example.
- 84 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Always:
Description
Select “Always” to apply the rule on a round-the-clock basis. Select “from”, and
the operation will run according to the defined time.
…to…:
Select "Always" to apply the rule on a round-the-clock basis.
If “From” is selected, the activation time is introduced as below
Day Control:
This control rule has time limitation. The setting method is in 24-hour format, such
as 08:00 ~ 18:00 (8 a.m. to 6 p.m.)
- 85 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 10 : VPN (Virtual Private Network)
9B
10.1. Display All VPN Summary
36B
This VPN Summary displays the real-time data with regard to VPN status. These data include: all tunnel
numbers, setting parameters and Group VPN and so forth.
Detail: Push this button to display the following information with regard to all current VPN configurations to
facilitate VPN connection management.
- 86 -
Gigabit Multi-Homing VPN Security Router User’s Manual
VPN Tunnel Status:
The following describes VPN Tunnel Status, the current status of VPN tunnel in detail:
Item
Description
Previous Page/Next
Click Previous page or Next page to view the desired VPN tunnel page. Or users
Page, Jump to __/__
can select the page number directly to view all VPN tunnel statuses, such as 3, 5,
Page, __ Entries Per
10, 20 or All.
Page
Tunnel No.
To set the embedded VPN feature, please select the tunnel number. It supports
up to 300 IPSec VPN tunnel Setting (gateway to gateway as well as client to
gateway).
Status
Successful connection is indicated as-(Connected).
Failing hostname resolution is indicated as - (Hostname Resolution Failed).
Resolving hostname is indicated as -(Resolving Hostname)
Waiting to be connected is indicated as - (Waiting for Connection).
If users select Manual setting for IPSec setup, the status message will display as
“Manual” and there is no Tunnel test function available for this manual setting.
Account ID:
Displays the current VPN tunnel connection name, such as XXX Office. Users are
well-advised to give them different names to avoid confusion should users have
more than one tunnel settings.
If this tunnel is to be connected to other VPN device (not this device),
"
Note
some device requires that the tunnel name is identical to the name of
the host end to facilitate verification. This tunnel can thus be
successfully enabled.
Phase2
Displays settings such as encryption (DES/3DES), authentication (MD5/SHA1)
Encrypt/Auth/Group:
and Group (1/2/5). If users select Manual setting for IPSec, Phase 2 DH group
will not display.
Local Group
Displays the setting for VPN connection secure group of the local end.
Remote Group
Displays the setting for remote VPN connection secure group.
- 87 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Remote Gateway
Set the IP address to connect the remote VPN device. Please set the VPN device
with a valid IP address or domain name.
Control
Click “Connect” to verify the tunnel status. The test result will be updated. To
disconnect, click “Disconnect” to stop the VPN connection.
Config
Setting items include Edit and Delete icon.
Click on Edit to enter the setting items and users may change the settings. Click
on the trash bin icon and all the tunnel settings will be deleted.
__ Tunnel(s) Enabled
This displays how many tunnels are enabled and how many tunnels are set.
__ Tunnel(s) Defined
VPN Group Status:
If there is no setting for Group VPN, there will be no display of VPN Group status.
Item
Description
Group Name
Displays the tunnel name of the Group VPN that is connected.
Connected Tunnels
Displays the VPN Groups tunnel numbers.
Phase2
Displays settings such as encryption (DES/3DES), authentication
Encrypt/Auth/DH
(MD5/SHA1) and Group (1/2/5).If users select Manual setting for IPSec, Phase 2
DH group will not be displayed.
Local Group
Displays the VPN connection secure setting for the local group.
Remote Client
Displays the name of this group for remote VPN Connection secure
group setting.
Remote Client
Click on Detail List, and more information such as Group Name,
Status
IP address and the connection time will be displayed.
Control
Click Connect to verify the status of the tunnel. The test result will
be updated in this status.
Config
As illustrated below, configurations include Edit and Delete icon.
Click on Edit to enter the setting items to be changed. Click on the
trash bin icon , and all the tunnel settings will be deleted.
- 88 -
Gigabit Multi-Homing VPN Security Router User’s Manual
10.1.1. Add a New VPN Tunnel
78B
The device supports Gateway to Gateway tunnel or Client to Gateway tunnel.
The VPN tunnel connections are done by 2 VPN devices via the Internet. When a new tunnel is added, the
setting page for Gateway to Gateway or Client to Gateway will be displayed.
Gateway to Gateway
Click “Add” to enter the setting page of Gateway to Gateway.
Client to Gateway
Click “Add” to enter the setting page of Client to Gateway.
The following instructions will guide users to set a VPN tunnel between two devices.
10.1.1.1 Gateway to Gateway Setting
- 89 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Tunnel No.
Set the embedded VPN feature, please select the Tunnel number.
Tunnel Name
Displays the current VPN tunnel connection name, such as XXX Office. Users are
well-advised to give them different names to avoid confusion.
"
Note
If this tunnel is to be connected to the other VPN device, some device
requires that the tunnel name is identical to the name of the host end
to facilitate verification. This tunnel can thus be successfully enabled.
Interface
From the pull-down menu, users can select the Interface for this VPN tunnel.
Enabled
Click to activate the VPN tunnel. This option is set to activate by default.
Afterwards, users may select to activate this tunnel feature.
Local VPN Group Setting
This Local Security Gateway Type must be identical with that of the remote type (Remote Security Gateway
Type).
Item
Description
Local Security
This local gateway authentication type comes with five operation modes, which are:
Gateway Type
IP only IP + Domain Name (FQDN) Authentication
IP + E-mail Addr. (USER FQDN) Authentication Dynamic IP + Domain Name (FQDN)
Authentication Dynamic IP + E-mail Addr. (USER FQDN) Authentication. Dynamic IP
address + Email address name
(1) IP only:
If users decide to use IP only, entering the IP address is the only way to gain access to
this tunnel. The WAN IP address will be automatically filled into this space. Users don't
need to do further settings.
(2) IP + Domain Name(FQDN) Authentication:
If users select IP + domain name type, please enter the domain name and IP address.
The WAN IP address will be automatically filled into this space. Users don't need to do
- 90 -
Gigabit Multi-Homing VPN Security Router User’s Manual
further settings. FQDN refers to the combination of host name and domain name and
can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain
name must be identical to those of the VPN secure gateway setting type to establish
successful connection.
(3) IP + E-mail Addr. (USER FQDN) Authentication.
If users select IP address and E-mail, enter the IP address and E-mail address to gain
access to this tunnel and the WAN IP address will be automatically filled into this space.
Users don't need to do further settings.
(4) Dynamic IP + Domain Name(FQDN) Authentication:
If users use dynamic IP address to connect to the device, users may select this option
to link to VPN. If the remote VPN gateway requires connection to the device for VPN
connection, this device will start authentication and respond to this VPN tunnel
connection; if users select this option to link to VPN, please enter the domain name.
(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.
If users use dynamic IP address to connect to the device, users may select this option
to connect to VPN without entering IP address. When VPN Gateway requires for VPN
connection, the device will start authentication and respond to VPN tunnel connection; If
users select this option to link to VPN, enter E-Mail address to the empty field for E-Mail
authentication.
Local Security
This option allows users to set the local VPN connection access type. The following
Group Type
offers a few items for local settings. Please select and set appropriate parameters:
1. IP address This option allows the only IP address which is entered to build the VPN
tunnel.
Reference: When this VPN tunnel is connected, computers with the IP address of
192.168.1.0 can establish connection.
- 91 -
Gigabit Multi-Homing VPN Security Router User’s Manual
2. Subnet
This option allows local computers in this subnet can be connected to the VPN tunnel.
Reference: When this VPN tunnel is connected, only computers with the session of
192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.
- 92 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Remote Group Setup
This remote gateway authentication type (Remote Security Gateway Type) must be identical to the
remotely-connected local security gateway authentication type (Local Security Gateway Type).
Item
Description
Remote Security
This remote gateway authentication type comes with five operation modes, which are:
Gateway Type
IP only-Authentication by use of IP only IP + Domain Name (FQDN) Authentication,
-IP + Domain name IP + E-mail Addr. (USER FQDN) Authentication, -IP + Email
address Dynamic IP + Domain Name (FQDN) Authentication, -Dynamic IP address +
Domain name Dynamic IP + E-mail Addr. (USER FQDN) Authentication. Dynamic IP
address + Email address name
(1) IP only:
If users select the IP Only type, entering this IP allows users to gain access to this
tunnel.
If the IP address of the remote client is unknown, choose IP by DNS Resolved, allowing
DNS to translate IP address. When users finish the setting, the corresponding IP
address will be displayed under the remote gateway of Summary.
(2) IP + Domain Name(FQDN) Authentication:
If users select IP + domain name, please enter IP address and the domain name to be
verified. FQDN refers to the combination of host name and domain name. Users may
enter any name that corresponds to the domain name of FQDN. This IP address and
domain name must be identical to those of the remote VPN security gateway setting
type to establish successful connection.
- 93 -
Gigabit Multi-Homing VPN Security Router User’s Manual
If the remote IP address is unknown, choose IP by DNS Resolved, allowing DNS to
translate the IP address. This domain name must be available on the Internet. When
users finish the setting, the corresponding IP address will be displayed under the
remote gateway of Summary.
(3) IP + E-mail Addr. (USER FQDN) Authentication:
If users select IP address and E-mail type, entering the IP address and the E-mail
allows users to gain access to this tunnel.
If the remote IP address is unknown, choose IP by DNS Resolved, allowing DNS to
translated the IP address. This domain name must be available on the Internet. When
users finish the setting, the corresponding IP address will be displayed under the
remote gateway of Summary.
(4) Dynamic IP + Domain Name(FQDN) Authentication:
If users use dynamic IP address to connect with the device, users may select the
combination of the dynamic IP address, host name and domain name.
(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.
If users use dynamic IP address to connect with the device, users may select this type
to link to VPN. When the remote VPN gateway requires connection to facilitate VPN
connection, the device will start authentication and respond to the VPN tunnel
connection; Please enter the E-Mail to the empty space.
Remote Security
This option allows users to set the remote VPN connection access type. The following
- 94 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Group Type
offers a few items for remote settings. Please select and set appropriate parameters:
(1) IP address
This option allows the only IP address which is entered to build the VPN tunnel.
Reference: When this VPN tunnel is connected, computers with the IP address of
192.168.2.1 can establish connection.
(2) Subnet
This option allows local computers in this subnet can be connected to the VPN tunnel.
Reference: When this VPN tunnel is connected, only computers with the session of
192.168.2.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.
IPSec Setup
If there is any encryption mechanism, the encryption mechanism of these two VPN tunnels must be identical
in order to create connection. And the transmission data must be encrypted with IPSec key, which is known
as the encryption "key". The device provides the IKE automatic encryption mode- IKE with Preshared Key
(automatic).
Encryption Management Protocol
When users set this VPN tunnel to use authentication mode, users must set the parameter of this exchange
password with that of the remote
- 95 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Use IKE Protocol
Click the shared key generated by IKE to encrypt and authenticate the remote user. If PFS (Perfect Forward
Secrecy) is enabled, the Phase 2 shared key generated during the IKE coordination will conduct further
encryption and authentication. When PFS is enabled, hackers using brute force to capture the key will not be
able to get the Phase 2 key in such a short period of time.
Item
Description
Perfect Forward
When users check the PFS option don't forget to activate the PFS function of the VPN
Secrecy:
device and the VPN Client as well.
Phase 1/ Phase 2
This option allows users to select Diffie-Hellman groups: Group 1/ Group 2/ Group 5.
DH Group
Phase 1/ Phase 2
This option allows users to set this VPN tunnel to use any encryption mode. Note that
Encryption
this parameter must be identical to that of the remote encryption parameter: DES (64-bit
encryption mode), 3DES (128-bit encryption mode), AES (the standard of using security
code to encrypt information). It supports 128-bit, 192-bit, and 256-bit encryption keys.
Phase 1/Phase 2
This authentication option allows users to set this VPN tunnel to use any authentication
Authentication
mode. Note that this parameter must be identical to that of the remote authentication
mode: “MD5” or “SHA1”.
Phase 1 SA Life
The life time for this exchange code is set to 28800 seconds (or 8hours) by default. This
Time
allows the automatic generation of other exchange password within the valid time of the
VPN connection so as to guarantee security.
Phase2 SA Life
The life time for this exchange code is set to 3600 seconds (or 1hours) by default. This
Time
allows the automatic generation of other exchange password within the valid time of the
- 96 -
Gigabit Multi-Homing VPN Security Router User’s Manual
VPN connection so as to guarantee security.
Preshared Key
For the Auto (IKE) option, enter a password of any digit or characters in the text of
“Pre-shared Key” (the example here is set as test), and the system will automatically
translate what users entered as exchange password and authentication mechanism
during the VPN tunnel connection. This exchange password can be made up of up to
30 characters.
Advanced Setting- for IKE Protocol Only
The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is
set to VPN operation mode. The connection is the same to most of the VPN devices.
Item
Aggressive Mode
Description
This mode is mostly adopted by remote devices. The IP connection is designed to
enhance the security control if dynamic IP is used for connection.
Keep Alive
If this option is selected, VPN tunnel will keep this VPN connection. This is mostly used
to connect the remote node of the branch office and headquarter or used for the remote
dynamic IP address.
NAT Traversal
This option allowed the VPN connection can penetrate the NAT which in front of the
router.
Dead Peer
If this option is selected, the connected VPN tunnel will regularly transmit HELLO/ACK
Detection (DPD)
message packet to detect whether there is connection between the two ends of the
VPN tunnel. If one end is disconnected, the device will disconnect the tunnel
automatically and then create new connection. Users can define the transmission time
for each DPD message packet, and the default value is 10 seconds.
Heart Beat
If this option is selected, the system periodically sends ICMP to the VPN tunnel remote
server host, the remote server will receive a packet after packet response. If the number
of detected more than the value you set, and VPN remote server did not respond, the
- 97 -
Gigabit Multi-Homing VPN Security Router User’s Manual
system will determine the VPN tunnel is disconnected. If you create a VPN tunnel for
the active side, the system will automatically rebuild the VPN tunnel again; and if you
are a passive one, the system will wait for the other re-establish the VPN tunnel.
Remote Host:Remote network nodes to detect the location, the server address is best
to be fast and stable response (proposal can fill in the VPN remote Sever LAN IP,
please do not enter the server address which can not respond to ICMP).
Time interval: External connection detect ping timeout (seconds), default is 30
seconds. When the VPN tunnel established, every 30 seconds send ICMP detect the
connection status with the server.
Retry Count: Ping retries, default is five. If the ping retry count exceeds the number of
the remote server is not responding, then determine the VPN line break.
- 98 -
Gigabit Multi-Homing VPN Security Router User’s Manual
10.1.1.2 Client to Gateway Setting
The following describes how an administrator builds a VPN tunnel between devices. Users can set this VPN
tunnel to be used by one client. Only one tunnel will be set and used by a group of clients, which allows easy
setting.
Situation in Tunnel
Item
Description
Tunnel No.
Set the embedded VPN feature, please select the Tunnel number.
Tunnel Name
Displays the current VPN tunnel connection name, such as XXX Office. Users are
well-advised to give them different names to avoid confusion.
"
Note
Interface
If this tunnel is to be connected to the other VPN device, some device
requires that the tunnel name is identical to the name of the host end to
facilitate verification. This tunnel can thus be successfully enabled.
Users may select which port to be the node for this VPN channel. They can be applied
for VPN connections.
Enabled
Click to Enable to activate the VPN tunnel. This option is set to Enable by default. After
users set up, users may select to activate this tunnel feature.
Local VPN Group Setting
This local gateway authentication type (Local Security Gateway Type) must be identical with that of the
remote type (Remote Security Gateway Type).
Item
Description
Local Security
This local gateway authentication type comes with five operation modes, which are: IP
Gateway Type:
only - Authentication by the use of IP only IP + Domain Name (FQDN)
Authentication, -IP + Domain name IP + E-mail Addr. (USER FQDN)
Authentication,-IP + Email address Dynamic IP + Domain Name (FQDN)
Authentication, -Dynamic IP address + Domain name Dynamic IP + E-mail Addr.
(USER FQDN) Authentication. Dynamic IP address + Email address name
(1) IP only:
If users decide to use IP only, entering the IP address is the only way to gain access to
- 99 -
Gigabit Multi-Homing VPN Security Router User’s Manual
this tunnel. The WAN IP address will be automatically filled into this space. Users don't
need to do further settings.
(2) IP + Domain Name(FQDN) Authentication:
If users select IP + domain name type, please enter the domain name and IP address.
The WAN IP address will be automatically filled into this space. Users don't need to do
further settings. FQDN refers to the combination of host name and domain name and
can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain
name must be identical to those of the VPN secure gateway setting type to establish
successful connection.
(3) IP + E-mail Addr. (USER FQDN) Authentication.
If users select IP address and E-mail, enter the IP address and E-mail address to gain
access to this tunnel and the WAN IP address will be automatically filled into this space.
Users don't need to do further settings.
(4) Dynamic IP + Domain Name(FQDN) Authentication:
If users use dynamic IP address to connect to the device, users may select this option
to link to VPN. If the remote VPN gateway requires connection to the device for VPN
connection, this device will start authentication and respond to this VPN tunnel
connection; if users select this option to link to VPN, please enter the domain name.
(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.
If users use dynamic IP address to connect to the device, users may select this option
to connect to VPN without entering IP address. When VPN Gateway requires for VPN
connection, the device will start authentication and respond to VPN tunnel connection; if
users select this option to link to VPN, enter E-Mail address to the empty field for E-Mail
authentication.
Local Security
This option allows users to set the local VPN connection access type. The following
Group Type:
offers a few items for local settings. Please select and set appropriate parameters:
- 100 -
Gigabit Multi-Homing VPN Security Router User’s Manual
1. IP address This option allows the only IP address which is entered to build the VPN
tunnel.
Reference: When this VPN tunnel is connected, computers with the IP address of
192.168.1.0 can establish connection.
Reference: When this VPN tunnel is connected, computers with the IP address of
192.168.1.0 can establish connection.
2. Subnet
This option allows local computers in this subnet to be connected to the VPN tunnel.
Reference: When this VPN tunnel is connected, only computers with the session of
192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.
- 101 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Remote VPN Group Setting
This remote gateway authentication type (Remote Security Gateway Type) must be identical to the
remotely-connected local security gateway authentication type (Local Security Gateway Type).
Item
Description
Remote Security
This local gateway authentication type comes with five operation modes, which are: IP
Gateway Type:
only IP + Domain Name (FQDN) Authentication IP + E-mail Addr. (USER FQDN)
Authentication Dynamic IP + Domain Name (FQDN) Authentication
Dynamic IP + E-mail Addr. (USER FQDN) Authentication
(1) IP only:
If users decide to use IP only, entering the IP address is the only way to gain access to
this tunnel. The WAN IP address will be automatically filled into this space. Users don't
need to do further settings.
(2) IP + Domain Name(FQDN) Authentication:
If users select IP + domain name type, please enter the domain name and IP address.
The WAN IP address will be automatically filled into this space. Users don't need to do
further settings. FQDN refers to the combination of host name and domain name and
can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain
name must be identical to those of the VPN secure gateway setting type to establish
successful connection.
(3) IP + E-mail Addr. (USER FQDN) Authentication.
If users select IP address and E-mail, enter the IP address and E-mail address to gain
access to this tunnel and the WAN IP address will be automatically filled into this space.
Users don't need to do further settings.
(4) Dynamic IP + Domain Name(FQDN) Authentication:
If users use dynamic IP address to connect to the device, users may select this option
to link to VPN. If the remote VPN gateway requires connection to the device for VPN
- 102 -
Gigabit Multi-Homing VPN Security Router User’s Manual
connection, this device will start authentication and respond to this VPN tunnel
connection; if users select this option to link to VPN, please enter the domain name.
(5) Dynamic IP + E-mail Addr. (USER FQDN) Authentication.
If users use dynamic IP address to connect to the device, users may select this option
to connect to VPN without entering IP address. When VPN Gateway requires for VPN
connection, the device will start authentication and respond to VPN tunnel connection; if
users select this option to link to VPN, enter E-Mail address to the empty field for E-Mail
authentication.
IPSec Setup
If there is any encryption mechanism, the encryption mechanism of these two VPN tunnels must be identical
in order to create connection. And the transmission data must be encrypted with IPSec key, which is known
as the encryption "key". The device provides the IKE automatic encryption mode- IKE with Preshared Key
(automatic).
Encryption Management Protocol
When users set this VPN tunnel to use authentication mode, users must set the parameter of this exchange
password with that of the remote
- 103 -
Gigabit Multi-Homing VPN Security Router User’s Manual
IKE Protocol
Click the shared key generated by IKE to encrypt and authenticate the remote user. If PFS (Perfect Forward
Secrecy) is enabled, the Phase 2 shared key generated during the IKE coordination will conduct further
encryption and authentication. When PFS is enabled, hackers using brute force to capture the key will not be
able to get the Phase 2 key in such a short period of time.
Item
Description
Perfect Forward
When users check the PFS option, don't forget to activate the PFS function of the VPN
Secrecy
device and the VPN Client as well.
Phase 1/ Phase 2
This option allows users to select Diffie-Hellman groups: Group 1/ Group 2/ Group 5.
DH Group
Phase 1/ Phase 2
This option allows users to set this VPN tunnel to use any encryption mode. Note that
Encryption
this parameter must be identical to that of the remote encryption parameter: DES (64-bit
encryption mode), 3DES (128-bit encryption mode), AES (the standard of using security
code to encrypt information). It supports 128-bit, 192-bit, and 256-bit encryption keys.
Phase 1/Phase 2
This authentication option allows users to set this VPN tunnel to use any authentication
Authentication
mode. Note that this parameter must be identical to that of the remote authentication
mode: “MD5” or “SHA1”.
Phase 1 SA Life
The life time for this exchange code is set to 28800 seconds (or 8hours) by default. This
Time
allows the automatic generation of other exchange password within the valid time of the
VPN connection so as to guarantee security.
Phase2 SA Life
The life time for this exchange code is set to 3600 seconds (or 1hours) by default. This
Time
allows the automatic generation of other exchange password within the valid time of the
VPN connection so as to guarantee security.
Advanced Setting- for IKE Preshareed Key Only
The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is
set to VPN operation mode. The connection is the same to most of the VPN devices.
- 104 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Aggressive Mode:
Description
This mode is mostly adopted by remote devices. The IP connection is designed to
enhance the security control if dynamic IP is used for connection.
NAT Traversal
This option allowed the VPN connection can penetrate the NAT which in front of the
router.
Dead Peer
If this option is selected, the connected VPN tunnel will regularly transmit HELLO/ACK
Detection (DPD)
message packet to detect whether there is connection between the two ends of the
VPN tunnel. If one end is disconnected, the device will disconnect the tunnel
automatically and then create new connection. Users can define the transmission time
for each DPD message packet, and the default value is 10 seconds
10.1.2. PPTP Setting
79B
It supports the PPTP of Window XP/ 2000 to create point-to-point tunnel protocol for single- device users to
create VPN connection.
- 105 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Enabled PPTP Server
Description
When this option is selected, the point-to-point tunnel protocol PPTP server can be
enabled.
PPTP IP Address
Please enter PPTP IP address range so as to provide the remote users with an
Range
entrance IP into the local network.
Enter Range Start: Enter the value into the last field. Enter Range End: Enter the
value into the last field.
Username
Please enter the name of the remote user.
New Password
Enter the password.
Confirm Password
Confirm again by entering the new password.
Add to list
Add a new account and password.
Delete selected item
Delete Selected Item.
All PPTP Status
Displays all successfully connected users, including username, remote IP address, and PPTP address.
- 106 -
Gigabit Multi-Homing VPN Security Router User’s Manual
10.1.3. VPN Pass Through
80B
Item
Description
IPSec Pass
If this option is enabled, the PC is allowed to use VPN-IPSec packet to pass in order to
Through
connect to external VPN device.
PPTP Pass
If this option is enabled, the PC is allowed to use VPN- PPTP packet to pass in order to
Through
connect with external VPN device.
L2TP Pass
If this option is enabled, the PC end is allowed to use VPN- L2TP packet to pass in
Through
order to connect with external VPN device.
After modification, push “Apply” button to save the network setting or push “Cancel” to keep the settings
unchanged.
- 107 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 11: Advanced Function
11.1 DMZ Host/ Port Range Forwarding
37B
11.1.1 DMZ Host
When the NAT mode is activated, sometimes users may need to use applications that do not support virtual
IP addresses such as network games. We recommend that users map the device actual WAN IP addresses
directly to the Intranet virtual IP addresses, as follows:
If the “DMZ Host” function is selected, to cancel this function, users must input "0” in the following “DMZ
Private IP”. This function will then be closed. After the changes are completed, click “Apply” to save the
network configuration modification, or click “Cancel" to leave without making any changes.
- 108 -
Gigabit Multi-Homing VPN Security Router User’s Manual
11.1.2 Port Range Forwarding
Setting up a Port Forwarding Virtual Host: If the server function (which means the server for an external
service such as WWW, FTP, Mail, etc) is contained in the network, we recommend that users use the firewall
function to set up the host as a virtual host, and then convert the actual IP addresses (the Internet IP
addresses) with Port 80 (the service port of WWW is Port 80) to access the internal server directly. In the
configuration page, if a web server address such as 192.168.1.50 and the Port 80 has been set up in the
configuration, this web page will be accessible from the Internet by keying in the device actual IP address
such as, http://211.243.220.43.
At this moment, the device actual IP will be converted into “192.168.1.50” by Port 80 to access the web page.
In the same way, to set up other services, please input the server TCP or UDP port number and the virtual
host IP addresses.
- 109 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Service
Description
To select from this option the default list of service ports of the virtual host that users
want to activate.
Such as: All (TCP&UDP) 0~65535, 80 (80~80) for WWW, and 21~21 for FTP. Please
refer to the list of default service ports.
IP Address
Input the virtual host IP address.
Interface
Select the WAN port.
Enabled
Activate this function.
Service
Add or remove service ports from the list of service ports.
Management
Add to list
Add to the active service content.
Service Port Management
The services in the list mentioned above are frequently used services. If the service users want to activate is
not in the list, we recommend that users use “Service Port Management” to add or remove ports, as follows:
Item
Service Name
Description
Input the name of the service port users want to activate on the list, such as E-donkey,
etc.
Protocol
To select whether a service port is TCP or UDP.
Port Range
To activate this function, input the range of the service port locations users want to
- 110 -
Gigabit Multi-Homing VPN Security Router User’s Manual
activate.
Add to list
Add the service to the service list.
Delete selected
To remove the selected services.
item
Apply
Click the “Apply” button to save the modification.
Cancel
Click the “Cancel” button to cancel the modification. This only works before “Apply” is
clicked.
Close
Quit this configuration window.
11.2 UPnP
38B
UPnP (Universal Plug and Play) is a protocol set by Microsoft. If the virtual host supports UPnP system (such
as Windows XP), users could also activate the PC UPnP function to work with the device.
Item
Service Port
Description
Select the UPnP service number default list here; for example, WWW is 80~80, FTP is
21~21. Please refer to the default service number list.
Host Name or IP
Input the Intranet virtual IP address or name that maps with UPnP such as
Address
192.168.1.100.
Enabled
Activate this function.
Service Port
Add or remove service ports from the management list.
Management
- 111 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Add to List
Add to active service content.
Delete Selected
Remove selected services.
Item
Show Table
This is a list which displays the current active UPnP functions.
Apply
Click “Apply” to save the network configuration modification.
11.3 Routing
39B
In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing Information
Protocol.
11.3.1 Dynamic Routing
81B
The abbreviation of Routing Information Protocol is RIP. There are two kinds of RIP in the IP environment –
RIP I and RIP II. Since there is usually only one router in a network, ordinarily just
- 112 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Static Routing will be used. RIP is used when there is more than one router in a network, and if an
administrator doesn’t want to assign a path list one by one to all of the routers, RIP can help refresh the paths.
RIP is a very simple routing protocol, in which Distance Vector is used. Distance Vector determines
transmission distance in accordance with the number of routers, rather than based on actual session speed.
Therefore, sometimes it will select a path through the least number of routers, rather than through the fastest
routers.
Item
Description
Working Mode
Select the working mode of the device: NAT mode or Router mode.
RIP
Click “Enabled” to open the RIP function.
Receive RIP
Use Up/Down button to select one of “None, RIPv1, RIPv2,Both RIPv1 and v2” as
versions
the “TX” function for transmitting dynamic RIP.
Transmit RIP
Use Up/Down button to select one of “None,RIPv1, RIPv2-Broadcast,
versions
RIPv2-Multicast” as the “RX” function for receiving dynamic RIP.
11.3.2 Static Routing
82B
When there are more than one router and IP subnets, the routing mode for the device should be configured as
static routing. Static routing enables different network nodes to seek necessary paths automatically. It also
enables different network nodes to access each other. Click the button “Show Routing Table” (as in the
figure) to display the current routing list.
- 113 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Dest. IP
Input the remote network IP locations and subnet that is to be routed. For example, the
Subnet Mask
IP/subnet is 192.168.2.0/255.255.255.0.
Gateway
The default gateway location of the network node which is to be routed.
Hop Count
This is the router layer count for the IP. If there are two routers under the device, users
should input “2” for the router layer; the default is “1”. (Max. is 15.)
Interface
This is to select “WAN port” or “LAN port” for network connection location.
Add to List
Add the routing rule into the list.
Delete Selected
Remove the selected routing rule from the list.
Item
Show Table
Show current routing table.
Apply
Click “Apply” to save the network configuration modification
Cancel
Click “Cancel" to leave without making any changes.
- 114 -
Gigabit Multi-Homing VPN Security Router User’s Manual
11.4 One to One NAT
40B
As both the device and ATU-R need only one actual IP, if ISP issued more than one actual IP (such as eight
ADSL static IP addresses or more), users can map the remaining real IP addresses to the intranet PC virtual
IP addresses. These PCs use private IP addresses in the Intranet, but after having One to One NAT mapping,
these PCs will have their own public IP addresses.
For example, if there are more than 2 web servers requiring public IP addresses, administrators can map
several public IP addresses directly to internal private IP addresses.
Example :Users have five available IP addresses - 210.11.1.1~5, one of which, 210.11.1.1, has been
configured as a real IP for WAN, and is used in NAT. Users can respectively configure the other four real IP
addresses for Multi-DMZ, as follows:
210.11.1.2 192.168.1.3
210.11.1.3 192.168.1.4
210.11.1.4 192.168.1.5
210.11.1.5 192.168.1.6
"
The device WAN IP address can not be contained in the One-to-One NAT IP configuration.
Attention
- 115 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Enabled One to
Description
To activate or close the One-to-One NAT function. (Check to activate the function).
One NAT
Private IP Range
Input the Private IP address for the Intranet One-to-One NAT function.
Begin
Public IP Range
Input the Public IP address for the Internet One-to-One NAT function.
Begin
Range Length
The numbers of final IP addresses of actual Internet IP addresses. (Please do not
include IP addresses in use by WANs.)
Add to List
Add this configuration to the One-to-One NAT list.
Delete Selected
Remove a selected One-to-One NAT list.
Item
Apply
Click “Apply” to save the network configuration modification.
Cancel
Click “Cancel" to leave without making any changes.
- 116 -
Gigabit Multi-Homing VPN Security Router User’s Manual
One-to-One NAT mode will change the firewall working mode. If this function has been set up,
"
the Internet IP server or PC which is mapped with a LAN port will be exposed on the Internet.
Attention To prevent Internet users from actively connecting with the One-on-One NAT server or PC,
please set up a proper denial rule for access, as described Firewall.
Multiple to One NAT
Item
Enable Multiple
Description
Click to enable multiple to one NAT function.
to One NAT
Private IP Range
Input intranet IPs for NAT mapping.
Respective
Input the respective public IP addresses. This should go along with the following
Public IP
interface selection. If the IP address is not within the interface ranges, the setting will
not work.
Interface
Select the mapping interface. If the WAN IP above is not within the interface range, the
setting will not work.
Add to List
Add this configuration to the One-to-One NAT list.
Delete selected
Remove a selected One-to-One NAT list.
- 117 -
Gigabit Multi-Homing VPN Security Router User’s Manual
range
Apply
Click “Apply” to save the network configuration modification.
Cancel
Click “Cancel" to leave without making any changes.
11.5 DDNS- Dynamic Domain Name Service
41B
DDNS supports the dynamic web address transfer for 3322.org、DynDNS.org and DtDNS.com. This is for
VPN connections to a website that is built with dynamic IP addresses, and for dynamic IP remote control. For
example, the actual IP address of an ADSL PPPoE time-based system or the actual IP of a cable modem will
be changed from time to time. To overcome this problem for users who want to build services such as a
website, it offers the function of dynamic web address transfer. This service can be applied from
www.3322.org, www.dyndns.org, or www.dtdns.com, and these are free.
Also, in order to solve the issue that DDNS server is not stable, the device can update the dynamic IP address
with different services at the same time.
Select the WAN port to which the configuration is to be edited, for example, WAN 1. Click the hyperlink to
enter and edit the settings.
- 118 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Interface
This is an indication of the WAN port the user has selected.
DDNS
Check either of the boxes before DynDNS.org, 3322.org and DtDNS.com to select one
of the four DDNS website address transfer functions.
Username
The name which is set up for DDNS.
Input a complete website address such as abc.abcddns.org.cn as a user name for
abcDDNS.
Password
The password which is set up for DDNS.
Host Name
Input the website address which has been applied from DDNS. Examples are
abc.dyndns.org or xyz.3322.org.
Internet IP
Input the actual dynamic IP address issued by the ISP.
Address
Status
An indication of the status of the current IP function refreshed by DDNS.
Apply
After the changes are completed, click “Apply” to save the network configuration
modification.
Cancel
Click “Cancel" to leave without making any changes.
- 119 -
Gigabit Multi-Homing VPN Security Router User’s Manual
11.6 MAC Clone
42B
Some ISP will request for a fixed MAC address (network card physical address) for distributing IP address,
which is mostly suitable for cable mode users. Users can input the network card physical address (MAC
address: 00-xx-xx-xx-xx-xx) here. The device will adopt this MAC address when requesting IP address from
ISP.
Select the WAN port to which the configuration is to be edited; click the hyperlink to enter and edit its
configuration. Users can input the MAC address manually. Press “Apply” to save the setting, and press
“Cancel” to remove the setting. Default MAC address is the WAN MAC address.
- 120 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 12: System Tool
10B
System Tool
This chapter introduces the management tool for controlling the device and testing network connection.
For security consideration, we strongly suggest to change the password. Password and Time setting is in
Chapter 5.2.
12.1 Diagnostic
43B
The device provides a simple online network diagnostic tool to help users troubleshoot network-related
problems. This tool includes DNS Name Lookup (Domain Name Inquiry Test) and Ping (Packet
Delivery/Reception Test).
DNS Name lookup
On this test screen, please enter the host name of the network users want to test. For example, users may
enter www.yahoo.com.tw and press "Go" to start the test. The result will be displayed on this page.
Ping
This item informs users of the status quo of the outbound session and allows the user to know the existence
of computers online.
On this test screen, please enter the host IP that users want to test such as 168.95.1.1 Press "Go" to
start the test. The result will be displayed on this screen.
- 121 -
Gigabit Multi-Homing VPN Security Router User’s Manual
12.2 Firmware Upgrade
44B
Users may directly upgrade the device firmware on the Firmware Upgrade page. Please confirm all
information about the software version in advance. Select and browse the software file, click "Firmware
Upgrade Right Now" to complete the upgrade of the designated file.
"
Please read the warning before firmware upgrade. Users must not exit this screen during
Attention upgrade. Otherwise, the upgrade may fail.
1
45B
12.3 Configuration Backup
Import Configuration File
This feature allows users to integrate all backup content of parameter settings into the device. Before upgrade,
confirm all information about the software version. Select and browse the backup parameter file: "config.exp."
Select the file and click "Import" to import the file.
Export Configuration File
This feature allows users to backup all parameter settings. Click "Export" and select the location to save the
"config.exp" file.
- 122 -
Gigabit Multi-Homing VPN Security Router User’s Manual
12.4 SNMP
46B
Simple Network Management Protocol (SNMP) refers to network management communications protocol and
it is also an important network management item. Through this SNMP communications protocol, programs
with network management (i.e. SNMP Tools-HP Open View) can help communications of real-time
management. The device supports standard SNMP v1/v2c and is consistent with SNMP network
management software so as to get hold on to the operation of the online devices and the real-time network
information.
Item
Description
Enabled
Activate SNMP feature. The default is activated.
System Name
Set the name of the device such as Planet.
System Contact
Set the name of the person who manages the device (i.e. John).
System Location
Define the location of the device (i.e. Taipei).
Get Community
Set the name of the group or community that can view the device SNMP data. The
Name
default setting is "Public".
Set Community
Set the name of the group or community that can receive the device SNMP data. The
Name
default setting is "Private".
Trap Community
Set user parameters (password required by the Trap-receiving host computer) to
Name
receive Trap message.
Send SNMP Trap to
Set one IP address or Domain Name for the Trap-receiving host computer.
Apply
Press “Apply” to save the settings.
Cancel
Press “Cancel” to keep the settings unchanged.
- 123 -
Gigabit Multi-Homing VPN Security Router User’s Manual
12.5 System Recover
47B
Users can restart the device with System Recover button.
Restart
As the figure below, if clicking “Restart Router” button, the dialog block will pop out, confirming if users would
like to restart the device.
Return to Factory Default Setting
If clicking “Return to Factory Default Setting, the dialog block will pop out, if the device will return to factory
default. It’s recommended to save the current configuration before upgrading firmware. After firmware
upgraded, import the configuration file after returning to factory default to ensure system stable. (Please refer
to 12.3)
12.6 High Availability
48B
High Availability is adopted in the network that requires fault tolerance and backup mechanism. Two similar
devices are used to be the backup for each other. One of these devices is employed for major network
transmitting, and the other redundant device will take over when the master device fails to assure that network
transmitting and services never break down. Therefore, administrators will have more opportunity and time to
deal with the master device problems.
- 124 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Besides general HA, Planet also provides advanced HA function that enables two devices to operate
simultaneously. It brings full cost efficiency without making another device idle. It does not have to be the
same model. All of Planet devices which support HA can achieve the function.
Item
High Availability
Description
Enable: Activate HA function.
Disable: Disable HA function.
Mode
(1) Hardware Backup Mode
It is the general backup mode. The master device takes responsibility of network
transmitting and the other one is set as idle. When the master device fails
transmitting, it will send out the message to the idle device for taking over network
transmitting immediately.
(2) Two devices are operating simultaneously
Two devices operate outbound linking simultaneously, but they are still separated as
Master device and Backup device. In normal situation, Master device is major DHCP
IP issuer, and Backup device will disable DHCP issuing automatically. When Master
device fails transmitting, the Backup device will take over all outbound links and
enable DHCP server to provide IP addresses.
- 125 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Following is the description of the two different modes.
Item
Operation-Master Mode
Description
Indicates the master device will operate for all outbound links. When the master
device fails transmitting, the backup device will take over.
Status
“Status- Normal” indicates the device operates well.
Status of the backup
Indicates status of backup device. If the status is normal, administrators can login
device
the device remotely to manage. (Remote Management should be enabled).
“Status- Abnormal” indicates the backup device can not be detected or does
exist, and need to inspect the backup device actual status.
Item
Description
Operation-Backup
Indicates the backup device will take over when the master fails transmitting.
Mode
WAN and LAN IP setting in backup device should be the same as those of master
device. The backup device should not be in charge of network transmitting and
DHCP server.
※ If the original LAN IP addresses are issued by Master device, DHCP server
setting of Backup device should be the same as Master device. The Backup
- 126 -
Gigabit Multi-Homing VPN Security Router User’s Manual
device can keep DHCP functioning and there will be no LAN disconnection.
LAN IP of the backup
Input LAN IP of Master mode, which is backed up.
device
MAC Address of the
Input Master device MAC address, which is backed up.
backup device
Status
“Status- Normal” indicates the status is idle. Master device operates normally.
“Status- Backup” indicates the device takes over all the network transmitting. The
status will return to “Normal” when Master device boots normally and send a
message to the backup device. Then, the status will return to Normal, which the
backup device remains idle.
Two devices are operating simultaneously:
Item
Operation-Master Mode
Description
Besides operating network with another device, Master device is also the DHCP
server to issue LAN IP addresses. Although Slave device also supports outbound
linking, its DHCP server is disabled.
WAN Backup
The checked WANs will works in the other device. For an example, if WAN1 and
(The Checked WANs
WAN2 work in this device, and WAN3 and WAN4 work in the other device, WAN3
are not working in this
and WAN4 should be checked.
device.)
LAN Gateway Backup
Input LAN IP of Slave device. The IP should be different from LAN IP of Master
device.
MAC Address of the
Input LAN MAC of Slave device. It should be different from LAN MAC of Master
- 127 -
Gigabit Multi-Homing VPN Security Router User’s Manual
backup device
device.
Status
“Status-Normal” means both two devices operate normally. “Status-Backup”
indicates Slave mode has problems, and the device enables backup to take over
WAN
Item
Operation-Slave Mode
Description
Although working with master device, Backup device’s DHCP server is disabled.
LAN users need to transmit traffic through the WAN on Slave device. You should
add LAN IP of Slave device into Master device DHCP server default gateway,
which is DHCP server IP address.
For example, if the DHCP server’s IP of Master device is 192.168.1.1, and the
subnet mask is 255.255.255.0, Salve device should be in the same subnet, ex.
192.168.1.2.
WAN Backup
The checked WANs will works in another device. For an example, if WAN1 and
(The Checked WANs
WAN2 work in this device, and WAN3 and WAN4 work in another, WAN3 and
are not working in this
WAN4 should be checked.
device.)
LAN Gateway Backup
Input the LAN IP of Master device. It should be different from Slave device’s IP.
(Must be in the same subnet.)
MAC Address of the
Input the LAN MAC of Master device. It should be different from Salve device’s
backup device
LAN MAC.
Status
“Status-Normal” indicates both devices work normally; “Status-Backup” indicates
the Backup device is enabled for backing up Master device to take over WAN
connection and DHCP issuing function.
- 128 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Chapter 13. Log
11B
From the log management and look up, we can see the relevant operation status, which is convenient for us
to facilitate the setup and operation.
13.1 System Log
49B
Its system log offers three options: system log, E-mail alert, and log setting.
System Log
- 129 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
Description
Enabled
If this option is selected, the System Log feature will be enabled.
Syslog Server
The device provides external system log servers with log collection feature.
System log is an industrial standard communications protocol. It is designed to
dynamically capture related system message from the network. The system log
provides the source and the destination IP addresses during the connection,
service number, and type. To apply this feature, enter the system log server
name or the IP address into the empty "system log server" field.
Log Setting
Alert Log
The device provides the following warning message. Click to activate these features: Syn Flooding, IP
Spoofing, Win Nuke, Ping of Death / Unauthorized Login Attempt.
Item
Syn Flooding
Description
Bulky syn packet transmission in a short time causes the overload of the system
storage of record in connection information.
IP Spoofing
Through the packet sniffing, hackers intercept data transmitted on the network.
After they access the information, the IP address from the sender is changed so
that they can access the resource in the source system.
Win Nuke
Servers are attacked or trapped by the Trojan program.
Ping of Death
The system fails because the sent data exceeds the maximum packet that can be
handled by the IP protocol.
Unauthorized Login
If intruders into the device are identified, the message will be sent to the system
log.
- 130 -
Gigabit Multi-Homing VPN Security Router User’s Manual
General Log
The device provides the following warning message. Click to activate the feature. System error message,
blocked regulations, regulation of passage permission, system configuration change and registration
verification.
Item
System Error Message
Description
Provides the system log with all kinds of error messages. For example, wrong
settings, occurrence of abnormal functions, system reactivation, disconnection of
PPPoE and so on.
Deny Policies
If remote users fail to enter the system because of the access rules; for instance,
message will be recorded in the system log.
Allow Policies
If remote users enter the system because of compliance with access rules; for
instance, message will be recorded in the system log.
Configuration Change
When the system settings are changed, this message will be sent back to the
system log.
Authorized Login
Successful entry into the system includes login from the remote end or from the
LAN into this device. These messages will be recorded in the system log.
The following is the description of the four buttons allowing online inquiry into the log.
- 131 -
Gigabit Multi-Homing VPN Security Router User’s Manual
View System Log
This option allows users to view system log. The message content can be read online via the device. They
include All Log, System Log, Access Log, Firewall Log, and VPN log, which is illustrated as below.
Outgoing Packet Log
View system packet log which is sent out from the internal PC to the Internet. This log includes LAN IP,
destination IP, and service port that is applied. It is illustrated as below.
- 132 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Incoming Packet Log
View system packet log of those entering the firewall. The log includes information about the external source
IP addresses, destination IP addresses, and service ports. It is illustrated as below.
Clear Log Now
This feature clears all the current information on the log.
- 133 -
Gigabit Multi-Homing VPN Security Router User’s Manual
13.2 System Statistic
50B
The device has the real-time surveillance management feature that provides system current operation
information such as port location, device name, current WAN link status, IP address, MAC address, subnet
mask, default gateway, DNS, number of received/ sent/ total packets , number of received/ sent/ total Bytes,
Received and Sent Bytes/Sec., total number of error packets received, total number of the packets dropped,
number of session, number of the new Session/Sec., and upstream as well as downstream broadband usage
(%).
- 134 -
13.3 Traffic Statistic
51B
Six messages will be displayed on the Traffic Statistic page to provide better traffic management and
control.
By Inbound IP Address
The figure displays the source IP address, bytes per second, and percentage.
By outbound IP Address
The figure displays the source IP address, bytes per second, and percentage.
By Outbound Port
The figure displays the network protocol type, destination IP address, bytes per second, and percentage.
Gigabit Multi-Homing VPN Security Router User’s Manual
By Inbound Port
The figure displays the network protocol type, destination IP address, bytes per second, and percentage.
By Outbound Session
The figure displays the source IP address, network protocol type, source port, destination IP address,
destination port, bytes per second and percentage.
By Inbound Session
The figure displays the source IP address, network protocol type, source port, destination IP address,
destination port, bytes per second and percentage.
- 136 -
Gigabit Multi-Homing VPN Security Router User’s Manual
13.4 IP/ Port Statistic
52B
The device allows administrators to inquire a specific IP (or from a specific port) about the addresses that this
IP had visited, or the users (source IP) who used this service port. This facilitates the identification of websites
that needs authentication but allows a single WAN port rather than Multi-WANs. Administrators may find out
the destination IP for protocol binding to solve this login problem. For example, when certain port software is
denied, inquiring about the IP address of this specific software server port may apply this feature. Moreover,
to find out BT or P2P software, users may select this feature to inquire users from the port.
Specific IP Status:
Enter the IP address that users want to inquire, and then the entire destination IP connected to remote
devices as well as the number of ports will be displayed.
- 137 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Specific Port Status
Enter the service port number in the field and IP that are currently used by this port will be displayed.
- 138 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Appendix A : Configure the 3G USB Interface
12B
Before configure the 3G USB interface, please prepare those device as below:
z
USB 3G (WCDMA) Device
z
NK Series Router
z
3G SIM & Configuration
For Example: AT&T 3G connection, the parameter as below:
z
APN: wap.cingular
z
Dialup Number : *99#
z
Username: [email protected] (all-uppercase)
z
Password: CINGULAR1 (all-uppercase)
Please follow the configure step as below:
Step 1: USB/3G Connection Setting
Step 2: Check IP Address for USB/3G Connection
Step 3: Check 3G Info from Service Provider
Step 4: Configure Advance Setting
Step 5: Send System log via SMS Message
- 139 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Step 1: USB/3G Connection Setting
[Sidebar Menu] Network > Network Connection
[WAN Setting]
Select USB port for 3G/4G connection, and enter detail setting after click hyper-link “Edit” at USB port column.
- 140 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Item
PIN CODE
Description
Entry PIN code when the PIN protection is enabled at your 3G SIM, but it is not
necessary when the function was disabled.
"
Attention
USB Connect Status
The SIM card will be locked and displays “[PUK] PIN
Unlocked Key” when entering incorrect PIN code more than 3
times.
The status filed will display specific description:
z
3G modem is connected and works normally.
z
3G modem is connected, but it requires the PIN code to enable the 3G
service.
z
3G modem is connected, but there is no SIM card available. Please
insert the SIM card for 3G service.
z
3G modem is connected, but the SIM card is locked. Please enter the
- 141 -
Gigabit Multi-Homing VPN Security Router User’s Manual
PUK code to unlock.
z
DNS Server:
3G modem is not available.
Router is forced to use assigned DNS Server manually, which is not from ISP
settings.
3G Setting :
APN(Access Point Network): most carriers use “Internet ” as default value. Need
to check with carrier provider for the correct value.
Dial Number: Default value is *99# for WCDMA-UMTS system.
User name & Password: Enter suitable authenticated contents if need.
※Tip : For Example: AT&T 3G connection
APN: wap.cingular
Dialup Number: *99#
Username: [email protected] (all-uppercase)
Password: CINGULAR1 (all-uppercase)
- 142 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Step 2: Check IP Address for USB/3G Connection.
54B
[Sidebar Menu] Home
[WAN Status]
Item
Description
WAN IP Address
Indicates the current IP configuration for USB port.
Default Gateway
Indicates gateway IP address from ISP.
Domain Name Server
Indicates the current DNS IP configuration.
Downstream
Indicates the current downstream bandwidth usage(%) for USB port.
Bandwidth Rate
Upstream Bandwidth
Indicates the current upstream bandwidth usage(%) for USB Port.
Rate
DDNS Setup
Indicates if Dynamic Domain Name is activated.
The default configuration is “Disabled”.
QoS
Indicate how many QoS rules are set.
Manual Connect
Disconnect: Stop current connection status. Connect: Change the disconnection
to connection.
- 143 -
Gigabit Multi-Homing VPN Security Router User’s Manual
[Physical Port Status]
Status cell indicted current connection status for USB Port
Item
Description
Connected
This 3G/4G device just still connected via USB Port
Enabled
This 3G/4G deice still available & wait to connect
Step 3: Check 3G Info from Service Provider
55B
[Sidebar Menu] USB Setting
Item
Description
Interface
Indicated Current USB Port
Connection Type
Specify Connection Type. Default value is ” 3G Modem ”
System Provider
Indicated current Service Provider name
Indicated current Signal Strength
Signal Quality
- 144 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Push
Charge count
button to get the updated s tatus.
Default value is disabled.
3G service charge by traffic usage
Item
Description
Premium
The basic service fee for 3G traffic usage
Extra charge
The additional fee after exceeding the preimum.
Auto Disconnect
Auto isconnection function when user defines max accumulated traffic to aviod
paying unplanned 3G service fee.
Previous Total Traffic
Previous traffic usage record after clean button is pushed.
Current Total Traffic
Current Accumulated traffic usage
Charge
Calculated fee based on current total traffic usage
Restart the count
Auto-flush on the specific date every month
Flush accumulated record manually
- 145 -
Gigabit Multi-Homing VPN Security Router User’s Manual
3G service charge by time usage
Item
Description
Premium
The basic service fee for 3G time usage
Extra Charge
Billing Rate by Over-basic connected time
Auto-disconnect
Auto isconnection function when user defines max accumulated time to aviod
paying unplanned 3G service fee.
Previous Cumulative
Previous accumulated time record after clean button is pushed.
Time
Current Cumulative
Current Accumulated time
Time
Charge
Calculated fee based on current total time
Restart the count
Auto-flush on the specific date every month
Flush accumulated record manually
- 146 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Step 4: Configure Advance Setting
56B
The VPN Security Router supports four USB 3G/4G connection modes.
z
Performance Mode: 3G service is always connected.
z
Backup mode: supports WAN failover.
z
Smart mode: detect the WAN connection status to decide which mode 3G dongle should be in,
including active mode, power saving mode, and power off mode.
z
Scheduling mode: 3G services can be automatically connected following the pre-set time.
Performance mode
The performance mode will keep 3G/4G service connected. The power consumption is higher than other
modes.
Backup Mode
The 3G dongle keeps on power-saving mode if all the WAN connections work normally. However, when all the
wired WAN connections fail or are disconnected, the 3G services will be connected automatically until any
wired WAN connection recovers.
Trigger Condition
- 147 -
Gigabit Multi-Homing VPN Security Router User’s Manual
NSD- Start Failover
1. The selected wired WAN port is detected failing the connection.
Administrator has to select at least one wired WAN port here. If several wired WAN ports are selected, the 3G
dongle will be connected automatically when the selected wired WAN ports all fail the connections.
2. Failover
When the router detects the selected wired WAN ports are all connected, the router will return the 3G dongle
back to power saving mode.
Auto self test
Item
Interface:USB
Description
Display USB interface
USB 3G/4G dongle will be activated and run the connection test on a
daily basis.
Add log for auto self test
Checkbox for added record to system log for auto self test
Smart Mode
The router will keep the 3G dongle on power-saving mode based on the idle time set. If all the wired WAN
connections work normally, the router will stop providing power for the 3G dongle after the pre-set idle time.
However, if all the wired WAN connections fail or are disconnected, the 3G services will return connected
automatically until any wired WAN connection recovers.
- 148 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Threshold- Start Load Balance
After administrator chooses which WAN ports are required for 3G service backup, the administrators can set
up bandwidth setting in the threshold- Start Load Balance columns.
In addition to backup WAN port failures, administrators can decide when the traffic is over the bandwidth
setting, 3G dongle can be connected for load balance.
"
Note
Administrators must click NSD- Start Failover checkbox before configuring the Threshold- Start
Load Balance settings.
1. Configure Threshold- Start Load Balance:
Take the above GUI screenshot for example, when the router detects that WAN1 traffic is over 10000Kbits, 3G
services will be connected for load balance.
2. Return to power Saving mode:
During 3G dongle is connected for load balance, the router will keep detecting WAN1 traffic usage. If the
WAN1 traffic is lower than 90000Kbits (10% of 10000Kbits), the router will return the 3G dongle back to power
saving mode.
Scheduling Mode
In Schedule mode, administor can set up time table for USB 3G/4G device connection.
- 149 -
Gigabit Multi-Homing VPN Security Router User’s Manual
Step 5: Send System log Via SMS Message
57B
[Sidebar Menu] Log > System Log
[Send SMS]
Router can send system log to mobile phones via SMS when events are triggered.
- 150 -
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement