■ Use this PC’s MAC address - This field is automatically filled in with the
MAC address of the PC you are using to configure the Gateway. You
should use this address only if you were previously using this
computer to connect directly to your modem.
■ Enter a new MAC address manually - Use this option if you want to
specify a new MAC address. Enter the new MAC address.
5 Check all settings and click Apply.
PPP over Ethernet
Figure 43 PPPoE Setup Screen
To setup the Gateway for use with a PPP over Ethernet connection, use
the following procedure:
1 Select PPP over Ethernet in the IP Allocation Mode field. (Figure 43
)
2 Enter your Primary DNS Address and Secondary DNS address.
Your ISP may provide you with primary and secondary DNS addresses. If
they have been provided, enter the addresses in the appropriate text
boxes. If not, leave 0.0.0.0 in the boxes.
3 Enter the Host Name (optional).
Some ISPs require a host name. If your ISP has this requirement, enter the
host name in the Host Name text box.
4 Enter your PPP over Ethernet user name in the PPPoE User Name text box.
5 Enter a password in the PPPoE Password text box.
62CHAPTER 5: GATEWAY CONFIGURATION
6 Enter your PPP over Ethernet service name in the PPPoE Service Name text
box. Not all ISPs require a PPPoE service name. Only enter a service name
if your ISP requires this.
7 Select an idle time from the Maximum Idle Time drop-down list.
This value will correspond to the amount of idle time (no Internet activity)
that will pass before the Gateway automatically ends your PPP over
Ethernet session.
Since the Gateway contains its own PPPoE client, you no longer need to
run PPPoE client software on your computer to access the Internet.
PPTP
Figure 44 PPTP Setup Screen
To setup the Gateway for use with a PPTP connection, use the following
procedure:
1 Select PPTP (used by some European providers) in the IP Allocation Mode
field. (Figure 44
)
2 Enter your PPTP server address in the PPTP Server Address text box (this is
typically the address of your modem).
3 Enter your PPTP user name in the PPTP User Name text box.
4 Enter your password in the PPTP Password text box.
Firewall63
5 Enter your Primary DNS Address and Secondary DNS address.
Your ISP may provide you with primary and secondary DNS addresses. If
they have been provided, enter the addresses in the appropriate text
boxes. If not, leave 0.0.0.0 in the boxes.
6 Select an idle time from the Maximum Idle Time drop-down list.
This value will correspond to the amount of idle time (no Internet activity)
that will pass before the Gateway automatically ends your PPTP session.
7 IP settings must be used when establishing a PPTP connection. Fill in the
Initial IP Address and the Initial Subnet Mask fields if your ISP has
provided you with these settings. Alternatively, if the PPTP server is
located in your DSL modem, click Suggest to select an IP address on the
same subnet as the PPTP server.
FirewallOn the main frame of the Firewall setup screen is a menu with five tabs:
Virtual Servers, Special Applications, PCs Privileges, URL Filter, and
Security.
Virtual ServersSelecting the Firewall option on the main menu displays the Virtual
Servers setup screen. (Figure 45
)
Virtual DMZ
Figure 45 Virtual Servers Screen
64CHAPTER 5: GATEWAY CONFIGURATION
DMZ (De-Militarized Zone) Host is a computer without the protection of
the firewall. This feature allows a single computer to be exposed to
unrestricted 2-way communication from outside of your network. This
feature should be used only if the Virtual Server or Special Applications
options do not provide the level of access needed for certain applications.
To configure one of your computers as a DMZ host, enter the last digit(s)
of the IP address of the computer in the IP Address of DMZ Host text box,
and then click Apply.
Virtual Server
Activating and configuring a virtual server allows one or more of the
computers on your network to function as a public server. For example,
one of your computers could be configured as an FTP server, allowing
others outside of your office network to download files of your choosing.
Or, if you have created a Web site, you can configure one of your
computers as a Web server, so that others can view your Web site.
To configure a virtual server:
1 Click New on the right side of the screen to open the Virtual Server
Settings dialogue box. (Figure 46
)
2 Enter the last digit(s) of the IP address of the computer in the Server IP
Address text box.
3 Select the Service from the pull-down list. (Figure 46
Figure 46 Virtual Servers Settings Screen
)
Firewall65
Or select Custom to specify a suitable name for the service and then enter
the port numbers required for that service. (Figure 47
Figure 47 Custom Setup Screen
)
4 Click Add to save the settings.
The port numbers are specified using a comma-separated list, with
hyphens to denote port number ranges. So for example, entering 2, 3, 5-7 would cause ports 2, 3, 5, 6, and 7 to be activated.
Special Applications
Figure 48 Special Applications Screen
Select Special Applications tab to display Authorized Application setup
screen. (Figure 48
)
Some software applications require special or multiple connections to the
Internet and these would normally be blocked by the firewall. For
example Internet Telephony or Video conferences require multiple
connections.
So that these special applications can work properly and are not blocked,
the firewall needs to be told about them. In each instance there will be a
66CHAPTER 5: GATEWAY CONFIGURATION
trigger port and incoming port(s), where traffic on the trigger port tells
the firewall to open the incoming ports.
Each defined Special Application only supports a single computer user,
and up to 10 Special Applications can be defined. Any incoming ports
opened by a Special Application trigger will be closed after five minutes
of inactivity.
To configure special applications:
1 Click New.
2 Select the applications from the pull-down list. (Figure 49
Figure 49 Special Application Settings Screen
)
Or select Other to specify a suitable name for the special application and
then enter a value in the Trigger Port and Incoming Ports text boxes
(Figure 49
). These values correspond to the outbound port numbers
issued by the application.
The port numbers are specified using a comma-separated list, with
hyphens to denote port number ranges. So for example, entering 2, 3,
5-7 would cause ports 2, 3, 5, 6, and 7 to be activated.
The Gateway will automatically allow FTP and NetMeeting sessions. You
do not need to configure these as Special Applications.
Firewall67
PC Privileges
Figure 50
Other Applications Setup Screen
3 Click Add to save your settings.
Only one computer on your network can use the special application at
any one time.
Figure 51 PC Privileges Screen
Select PC Privileges to display the PC Privilege setup screen (Figure 51).
Access from the local network to the Internet can be controlled on a
computer-by-computer basis. In the default configuration the Gateway
will allow all connected computers unlimited access to the Internet.
PC Privileges allows you to assign different access rights for different
computers on your network.
68CHAPTER 5: GATEWAY CONFIGURATION
To use access control for all computers:
1 Click PCs access authorized services only.
2 Select All PCs to setup the access rights for all computers connected to
the Gateway.
3 Select authorized services by clicking in the appropriate check box(es)
(Figure 52
Figure 52 All PCs Setup Screen
).
In addition to the four authorized services listed, you can choose to allow
or block access to other services. You can either:
■ Allow all other services with exceptions, or
■ Block all other services with exceptions
4 To do this, select Allow or Block from the drop down menu and enter the
exceptions into the text box.
The port numbers are specified using a comma-separated list, with
hyphens to denote port number ranges. So for example, entering 2, 3,
5-7 would cause ports 2, 3, 5, 6, and 7 to be activated.
For example, to block access to all services except Web (80) and a service
that uses ports 2,3,5,6 and 7:
1. Tick the Web(80) check box.
2. Select ‘Block’ all other services.
3. Enter ‘2, 3, 5-7’ in the ‘except (specify ports) box. See Figure 53
.
Firewall69
Figure 53 PC Privileges Setup Screen Example
5 Click Modify to save the settings or Close to discard them.
To assign different access rights for different computers:
1 If not already selected, click PCs access authorized services only.
2 Click New to display the PC Privileges setting screen.
3 Enter the last digit(s) of the IP address of the computer in the PC’s IP
Address text box.
4 Select authorized services by clicking in the appropriate check box(es).
In addition to the four authorized services listed, you can choose to allow
or block access to other services. You can either:
■ Allow all other services with exceptions, or
■ Block all other services with exceptions
See step 4 of the previous section for more details.
5 Click Add to save the settings.
URL FilterSelect URL Filter to control your clients’ access to Web sites. The
Gateway’s URL Filter has three settings:
■ Disabled — Users can browse all Web sites. None will be filtered.
■ Deny List — Users can browse all Web sites apart from those sites
listed in the deny list and those whose URLs contain keywords listed in
the deny list. See “
■ Allow List — Users are unable to browse any Web sites except of
Deny List” on page 70.
those listed in the allow list and those whose URLs contain keywords
listed in the allow list. See “
Allow List” on page 71.
70CHAPTER 5: GATEWAY CONFIGURATION
Deny List
To allow users access to all Web sites except for those you choose to
block, choose Deny List in the URL Filter Type drop-down box (Figure 54
Figure 54 URL Filter Screen showing Deny List
).
To filter a specific site, enter the URL for that site. For example, to stop
your users from browsing a site called www.badsite.com, enter
www.badsite.com or badsite.com in one of the fields.
If badsite.com has multiple sub-domains, such as this.badsite.com and
that.badsite.com then you can either:
■ Block them individually by entering this.badsite.com in one field
and that.badsite.com in another.
or
■ Block them by entering the keyword badsite.com into one of the
fields. This will block all URLs containing the string badsite.com. As
well as blocking this.badsite.com and that.badsite.com,
the keyword badsite.com would block searches that mentioned
badsite.com in their domain name, for example
www.notabadsite.com.
To filter a generic keyword enter it into one of the fields. You should
exercise caution when choosing a keyword as many keywords are
Firewall71
contained within other words. For example, filtering the word sex would
filter the following example URLs:
■ www.sussex.com
■ www.thisexample.com
You can filter up to 30 keywords and URLs.
Computers that should not be subject to URL filtering can be excluded by
ticking the Bypass URL Filter checkbox in the PC Privileges setup screen.
PC Privileges” on page 67.
See “
Allow List
To stop users from accessing any Web sites that you have not specifically
allowed, choose Allow List in the URL Filter Type drop-down box
(Figure 55
Figure 55 URL Filter Screen showing Allow List
).
To allow a specific site, enter the URL for that site. For example, to let
your users browse a site called www.goodsite.com, enter
www.goodsite.com or goodsite.com in one of the fields.
If goodsite.com has multiple sub-domains, such as
this.goodsite.com and that.goodsite.com then you can
either:
72CHAPTER 5: GATEWAY CONFIGURATION
■ Allow them individually by entering this.goodsite.com in one
field and that.goodsite.com in another.
or
■ Allow them by entering the keyword goodsite.com into one of the
fields. This will allow all URLs containing the string goodsite.com.
As well as allowing this.goodsite.com and
that.goodsite.com, the keyword goodsite.com would allow
sites that had the string goodsite.com in their URL, for example
xxxgoodsite.com.
To filter a generic keyword enter it into one of the fields. You should
exercise caution when choosing a keyword as sites that you may wish to
block may be allowed if you choose too general a keyword.
The Gateway filters all traffic from domains that have been blocked using
the URL filter. If need to access an external mail server, FTP server or other
named device outside your network, you must list it in one of the allow
fields.
You can filter up to 30 keywords and URLs.
Computers that should not be subject to URL filtering can be excluded by
ticking the Bypass URL Filter checkbox in the PC Privileges setup screen.
PC Privileges” on page 67.
See “
SecuritySelect Security to display the Security screen (Figure 56).
Figure 56 Security Screen
Firewall73
The Internet connects millions of computer users throughout the world.
The vast majority of the computer users on the Internet are friendly and
have no intention of breaking into, stealing from, or damaging your
network. However, there are hackers who may try to break into your
network.
Enable universal plug and playUniversal plug and play allows
compatible software to read and change some the Gateway’s firewall
settings. This reduces the configuration required but lessens your control
of the Gateway’s firewall.
3Com recommends that you leave this feature disabled for maximum
security.
Allow PING from the InternetPING is a utility, which is used to
determine whether a device is active at the specified IP address. PING is
normally used to test the physical connection between two devices, to
ensure that everything is working correctly.
By default the Gateway has PING disabled in order to make the device
more difficult to find on the Internet and less prone to attack.
74CHAPTER 5: GATEWAY CONFIGURATION
This feature is enabled by clicking on the check box so that a tick can be
seen and then select Apply.
3Com recommends that you leave this disabled.
Enabling Remote Administration
It is possible to administer the Gateway remotely. This can be set to one
of four different levels using the following options:
1 Disable Remote Administration - This option is set as default.
2 Enable administration from a single Internet Host - Only the specified IP
address can manage the Gateway. Any other users will be rejected.
3 Enable administration from a whole subnet - This option allows a
number of users within a subnet to administer the Gateway.
4 Enable administration from any Internet Host - This options allows any
host to access the administration pages.
To remotely administer your Gateway, enter
http://xxx.xxx.xxx.xxx:8000 in the location bar of the browser
running on the remote computer, where xxx.xxx.xxx.xxx is the Internet IP
address of the Gateway. You may then login using the administration
password.
Your Internet IP address can be found at the bottom of the screen. See
Figure 56
.
System Tools75
System ToolsThe main frame of the System Tools screen includes four administration
items: Restart, Time Zone, Configuration, and Upgrade (Figure 57
).
Restart
Figure 57 Restart Screen
If your Gateway is not operating correctly, you can choose to restart the
Gateway by selecting Restart the Gateway, simulating the effect of
power cycling the unit. No configuration information will be lost but the
log files will be erased. This function may be of use if you are
experiencing problems and you wish to re-establish your Internet
connection. Any network users who are currently accessing the Internet
will have their access interrupted whilst the restart takes place, and they
may need to reboot their computers when the restart has completed and
the Gateway is operational again.
76CHAPTER 5: GATEWAY CONFIGURATION
Time ZoneFigure 58 Time Zone Screen
Choose the time zone that is closest to your actual location. The time
zone setting is used by the system clock when displaying the correct time
in the log files.
If you use Daylight saving tick the Enable Daylight savings box, and then
click Apply (Figure 58
).
The Gateway reads the correct time from NTP servers on the Internet and
sets its system clock accordingly. The Daylight Savings option merely
advances the system clock by one hour. It does not cause the system
clock to be updated for daylight savings time automatically.
ConfigurationFigure 59 Configuration Screen
Select the Configuration tab to display the Configuration screen
(Figure 59
).
System Tools77
Backup Configuration
Click BACKUP to save the current Gateway configuration. You will be
prompted to download and save a file to disk.
Restore Configuration Data
If you want to reinstate the configuration settings previously saved to a
file, press Browse to locate the backup file on your computer, and then
click RESTORE to copy the data into the Gateway's memory.
The password will remain unchanged.
Reset to Factory Default
If you want to reset the settings on your Gateway to those that were
loaded at the factory, click RESET. You will lose all your configuration
changes. The Gateway LAN IP address will revert to 192.168.1.1, and the
DHCP server on the LAN will be enabled. You may need to reconfigure
and restart your computer to re-establish communication with the
Gateway.
78CHAPTER 5: GATEWAY CONFIGURATION
UpgradeFigure 60 Upgrade Screen
The Upgrade facility allows you to install on the Gateway any new
releases of system software that 3Com may make available. To install
new software, you first need to download the software from the 3Com
support web site to a folder on your computer. Once you have done this,
select Browse to tell your web browser where this file is on your
computer, and then click Apply. The file will be copied to the Gateway,
and once this has completed, the Gateway will restart. Although the
upgrade process has been designed to preserve your configuration
settings, it is recommended that you make a backup of the configuration
beforehand, in case the upgrade process fails for any reason (for
example, the connection between the computer and the Gateway is lost
while the new software is being copied to the Gateway).
The upgrade procedure can take up to two minutes, and is complete
when the Alert LED has stopped flashing and is permanently off. Make
sure that you do not interrupt power to the Gateway during the upgrade
procedure; if you do, the software may be corrupted and the Gateway
may not start up properly afterwards. If the Alert LED comes on
continuously after a failed upgrade, refer to Chapter 6
Troubleshooting”.
“
,
Status and LogsSelecting Status and Logs from the main menu displays the Status, Usage,
and Logs screens in your Web browser window.
Status and Logs79
StatusThe Status screen displays a tabular representation of your network and
Internet connection. (Figure 61
Figure 61 Status Screen
)
UsageUsage displays an approximate count of the traffic since the Gateway was
last reset. (Figure 62
)
The counts are approximate and should be used as a guide only. Contact
your ISP for accurate logging information.
80CHAPTER 5: GATEWAY CONFIGURATION
Figure 62 Usage Screen
LogsLogs will allow you to view both the normal events, and security threats
logged by the Gateway.
Figure 63 Logs Screen
You may be asked to refer to the information on the Status and Logs
screens if you contact your supplier for technical support.
Support/FeedbackSelecting Support/Feedback from the main menu displays the Support
and Feedback screens.
Loading...
+ 46 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.