The information in this document is subject to change without notice. The statements, configurations, technical data, and
recommendations in this document are believed to be accurate and reliable, but are presented without express or implied
warranty. The information in this document is proprietary to Nortel.
Trademarks
Nortel, Nortel (Logo), the Globemark, and This is the way, This is Nortel (Design mark) are trademarks of Nortel.
Microsoft, MS, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
All other trademarks and registered trademarks are the property of their respective owners.
Nortel Business Secure Router 222 Configuration — Basics
Page 28
28 Tables
NN47922-500
Page 29
Preface
Before you begin
This guide assists you through the basic configuration of your Business Secure
Router for its various applications.
Note: This guide explains how to use the WebGUI to configure your
Business Secure Router. See Nortel Business Secure Router 222 Configuration — Advanced (NN47922-501) for how to use the System
Management Terminal (SMT) or the command interpreter interface to
configure your Business Secure Router. Not all features can be
configured through all interfaces.
The WebGUI parts of this guide contain background information on features
configurable by the WebGUI and the SMT. For features not configurable by the
WebGUI, only background information is provided.
29
Text conventions
This guide uses the following text conventions:
Enter means type one or more characters and press the enter key. Select or
Choose means use one of the predefined choices.
The SMT menu titles and labels are written in Bold Times New Roman font.
The choices of a menu choices are written in Bold Arial font.
Nortel Business Secure Router 222 Configuration — Basics
Page 30
30Preface
A single keystroke is written in Arial font and enclosed in square brackets. For
instance, [ENTER] means the Enter key; [ESC] means the escape key and
[SPACE BAR] means the space bar. [UP] and [DOWN] are the up and down
arrow keys.
Mouse action sequences are denoted using a comma. For example, “click the
Apple icon, Control Panels and then Modem” means first click the Apple icon,
then point your mouse pointer to Control Panels and then click Modem.
Related publications
For more information about using the Business Secure Router, refer to the
following publications:
•Nortel Business Secure Router 222 — Fundamentals (NN47922-301)
This guide helps you get up and running right away. It contains connection
information and instructions on getting started.
•Nortel Business Secure Router 222 Configuration — Advanced
(NN47922-501)
This guide covers how to use the SMT menu to configure your Business
Secure Router.
•WebGUI Online Help
Embedded WebGUI help is available to provide descriptions of individual
screens and supplementary information.
Hard copy technical manuals
You can print selected technical manuals and release notes free, directly from the
Internet. Go to www.nortel.com/documentation. Find the product for which you
need documentation. Then locate the specific category and model or version for
your hardware or software product. Use Adobe Reader to open the manuals and
release notes, search for the sections you need, and print them on most standard
printers. Go to the Adobe Systems Web site at www.adobe.com to download a
free copy of Adobe Reader.
NN47922-500
Page 31
How to get Help
This section explains how to get help for Nortel products and services.
Getting Help from the Nortel Web site
The best way to get technical support for Nortel products is from the Nortel
Technical Support Web site:
www.nortel.com/support
This site provides quick access to software, documentation, bulletins, and tools to
address issues with Nortel products. More specifically, the site enables you to:
•download software, documentation, and product bulletins
•search the Technical Support Web site and the Nortel Knowledge Base for
answers to technical issues
•sign up for automatic notification of new software and documentation for
Nortel equipment
•open and manage technical support cases
Preface31
Getting Help over the phone from a Nortel Solutions Center
If you don’t find the information you require on the Nortel Technical Support Web
site, and have a Nortel support contract, you can also get help over the phone from
a Nortel Solutions Center.
In North America, call 1-800-4NORTEL (1-800-466-7835).
Outside North America, go to the following Web site to obtain the phone number
for your region:
www.nortel.com/callus
Nortel Business Secure Router 222 Configuration — Basics
Page 32
32Preface
Getting Help from a specialist by using an Express Routing
Code
Getting Help through a Nortel distributor or reseller
To access some Nortel Technical Solutions Centers, you can use an Express
Routing Code (ERC) to quickly route your call to a specialist in your Nortel
product or service. To locate the ERC for your product or service, go to:
www.nortel.com/erc
If you purchased a service contract for your Nortel product from a distributor or
authorized reseller, contact the technical support staff for that distributor or
reseller.
NN47922-500
Page 33
Chapter 1
Getting to know your Nortel Business Secure
Router 222
This chapter introduces the main features and applications of the Business Secure
Router.
Introducing the Nortel Business Secure Router 222
The Nortel Business Secure Router 222 is an ideal secure gateway for all data
passing between the Internet and the Local Area Network (LAN).
By integrating Network Address Translation (NAT), firewall and Virtual Private
Network (VPN) capability, the Business Secure Router is a complete security
solution that protects your Intranet and efficiently manages data traffic on your
network.
33
Features
The embedded WebGUI assists in easy setup and management of the Business
Secure Router via an Internet browser.
This section lists the key features of the Business Secure Router.
Tabl e 1 Feature Specifications
FeatureSpecification
Number of static routes12
Number of NAT sessions4096
Number of SUA servers12
Nortel Business Secure Router 222 Configuration — Basics
Page 34
34 Chapter 1 Getting to know your Nortel Business Secure Router 222
Tabl e 1 Feature Specifications
FeatureSpecification
Number of address mapping rules10
Maximum number of VPN IP Policies60
Maximum number of VPN Tunnels (Client and/or Branch Office)10
Maximum number of concurrent VPN IPSec Connections60
Number of IP pools can be used to assign IP addresses to remote users
for VPN client termination
Number of configurable split networks for VPN client termination16
Number of configurable inverse split networks for VPN client termination 16
Number of configurable subnets per split network for VPN client
termination
Physical features
4-Port switch
3
64
NN47922-500
A combination of switch and router makes your Nortel Business Secure Router
222 a cost effective and viable network solution. You can connect up to four
computers or phones to the Business Secure Router without the cost of a switch.
Use a switch to add more than four computers or phones to your LAN.
Autonegotiating 10/100 Mb/s Ethernet LAN
The LAN interfaces automatically detect if they are on a 10 or a 100 Mb/s
Ethernet.
Autosensing 10/100 Mb/s Ethernet LAN
The LAN interfaces automatically adjust to either a crossover or straight through
Ethernet cable.
Autonegotiating 10/100 Mb/s Ethernet WAN
The 10/100 Mb/s Ethernet WAN port attaches to the Internet via broadband
modem or router and automatically detects if it is on a 10 or a 100 Mb/s Ethernet.
Page 35
Chapter 1 Getting to know your Nortel Business Secure Router 222 35
Auxiliary port
The Business Secure Router uses the same port for console management and for
an auxiliary WAN backup. The AUX port can be used in reserve as a traditional
dial-up connection when or if ever the broadband connection to the WAN port
fails.
Time and date
Using the Business Secure Router, you can get the current time and date from an
external server when you turn on your Business Secure Router. You can also set
the time manually.
Reset button
The Business Secure Router reset button is built into the rear panel. Use this
button to restart the Business Secure Router or restore the factory default
password to PlsChgMe!, IP address to 192.168.1.1, subnet mask to
255.255.255.0, and DHCP server enabled with a pool of 126 IP addresses starting
at 192.168.1.2.
Nonphysical features
IPSec VPN capability
Establish Virtual Private Network (VPN) tunnels to connect home or office
computers to your company network using data encryption and the Internet; thus
providing secure communications without the expense of leased site-to-site lines.
VPN is based on the IPSec standard and is fully interoperable with other
IPSec-based VPN products.
Nortel Contivity Client Termination
The Business Secure Router supports VPN connections from computers using
Nortel Contivity VPN Client 3.0, 5.01, 5.11, 6.01, 6.02, or 7.01 software.
Nortel Business Secure Router 222 Configuration — Basics
Page 36
36 Chapter 1 Getting to know your Nortel Business Secure Router 222
Certificates
The Business Secure Router can use certificates (also called digital IDs) to
authenticate users. Certificates are based on public-private key pairs. Certificates
provide a way to exchange public keys for use in authentication.
SSH
The Business Secure Router uses the SSH (Secure Shell) secure communication
protocol to provide secure encrypted communication between two hosts over an
unsecured network.
HTTPS
HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL is a
web protocol that encrypts and decrypts web sessions. Use HTTPS for secure
WebGUI access to the Business Secure Router.
IEEE 802.1x for network security
NN47922-500
The Business Secure Router supports the IEEE 802.1x standard for user
authentication. With the local user profile in the Business Secure Router, you can
configure up 32 user profiles without a network authentication server. In addition,
centralized user and accounting management is possible on an optional network
authentication server.
Firewall
The Business Secure Router has a stateful inspection firewall with DoS (Denial of
Service) protection. By default, when the firewall is activated, all incoming traffic
from the WAN to the LAN is blocked unless it is initiated from the LAN. The
Business Secure Router firewall supports TCP/UDP inspection, DoS detection
and protection, real time alerts, reports and logs.
Page 37
Chapter 1 Getting to know your Nortel Business Secure Router 222 37
Brute force password guessing protection
The Business Secure Router has a special protection mechanism to discourage
brute force password guessing attacks on the Business Secure Router’s
management interfaces. You can specify a wait time that must expire before you
can enter a fourth password after entering three incorrect passwords.
Content filtering
The Business Secure Router can block web features such as ActiveX controls,
Java applets, and cookies, as well as disable web proxies. The Business Secure
Router can block specific URLs by using the keyword feature. The administrator
can also define time periods and days during which content filtering is enabled.
Packet filtering
The packet filtering mechanism blocks unwanted traffic from entering or leaving
your network.
Universal Plug and Play (UPnP)
Using the standard TCP/IP protocol, the Business Secure Router and other
UPnP-enabled devices can dynamically join a network, obtain an IP address, and
convey its capabilities to other devices on the network.
Call scheduling
Configure call time periods to restrict and allow access for users on remote nodes.
PPPoE
PPPoE facilitates the interaction of a host with an Internet modem to achieve
access to high-speed data networks via a familiar dial-up networking user
interface.
Nortel Business Secure Router 222 Configuration — Basics
Page 38
38 Chapter 1 Getting to know your Nortel Business Secure Router 222
PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables
secure transfer of data from a remote client to a private server, creating a Virtual
Private Network (VPN) using a TCP/IP-based network.
PPTP supports on-demand, multiprotocol, and virtual private networking over
public networks, such as the Internet. The Business Secure Router supports one
PPTP server connection at any given time.
Dynamic DNS support
With Dynamic DNS (Domain Name System) support, you can have a static host
name alias for a dynamic IP address, so the host is more easily accessible from
various locations on the Internet. You must register for this service with a
Dynamic DNS service provider.
IP Multicast
The Business Secure Router can use IP multicast to deliver IP packets to a specific
group of hosts. IGMP (Internet Group Management Protocol) is the protocol used
to support multicast groups. The Business Secure Router supports versions 1 and
2.
NN47922-500
IP Alias
Using IP Alias, you can partition a physical network into logical networks over
the same Ethernet interface. The Business Secure Router supports three logical
LAN interfaces via its single physical Ethernet LAN interface with the Business
Secure Router itself as the gateway for each LAN network.
Central Network Management
With Central Network Management (CNM), an enterprise or service provider
network administrator can manage your Business Secure Router. The enterprise
or service provider network administrator can configure your Business Secure
Router, perform firmware upgrades, and do troubleshooting for you.
Page 39
Chapter 1 Getting to know your Nortel Business Secure Router 222 39
SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging
management information between network devices. SNMP is a member of the
TCP/IP protocol suite. Your Business Secure Router supports SNMP agent
functionality, which means that a manager station can manage and monitor the
Business Secure Router through the network. The Business Secure Router
supports SNMP versions 1 and 2 (SNMPv1 and SNMPv2).
Network Address Translation (NAT)
NAT (Network Address Translation — NAT, RFC 1631) translate multiple IP
addresses used within one network to different IP addresses known within another
network.
Traffic Redirect
Traffic Redirect forwards WAN traffic to a backup gateway when the Business
Secure Router cannot connect to the Internet, thus acting as an auxiliary backup
when your regular WAN connection fails.
Port Forwarding
Use this feature to forward incoming service requests to a server on your local
network. You can enter a single port number or a range of port numbers to be
forwarded, and the local IP address of the desired server.
DHCP (Dynamic Host Configuration Protocol)
With DHCP (Dynamic Host Configuration Protocol), individual client computers
can obtain the TCP/IP configuration at start-up from a centralized DHCP server.
The Business Secure Router has built in DHCP server capability, enabled by
default, which means it can assign IP addresses, an IP default gateway, and DNS
servers to all systems that support the DHCP client. The Business Secure Router
can also act as a surrogate DHCP server, where it relays IP address assignment
from another DHCP server to the clients.
Nortel Business Secure Router 222 Configuration — Basics
Page 40
40 Chapter 1 Getting to know your Nortel Business Secure Router 222
Full network management
The embedded web configurator is an all platform, web based utility that you can
use to easily manage and configure the Business Secure Router. Most functions of
the Business Secure Router are also software configurable via the SMT (System
Management Terminal) interface. The SMT is a menu driven interface that you
can access from a terminal emulator through the console port or over a Telnet
connection.
Road Runner support
In addition to standard cable modem services, the Business Secure Router
supports Time Warner’s Road Runner Service.
Logging and tracing
The Business Secure Router supports the following logging and tracing functions
to help with management:
•Built in message logging and packet tracing
•Unix syslog facility support
NN47922-500
Upgrade Business Secure Router Firmware
The firmware of the Business Secure Router can be upgraded via the console port
or the LAN.
Embedded FTP and TFTP Servers
The Business Secure Router’s embedded FTP and TFTP Servers enable fast
firmware upgrades, as well as configuration file backups and restoration.
Page 41
Chapter 1 Getting to know your Nortel Business Secure Router 222 41
Applications for the Nortel Business Secure Router 222
Secure broadband internet access and VPN
You can connect a cable, DSL, or other modem to the Nortel Business Secure
Router 222 via Ethernet WAN port for broadband Internet access. The Business
Secure Router also provides IP address sharing and a firewall protected local
network with traffic management.
VPN is an ideal, cost effective way to connect branch offices and business
partners over the Internet without the need (and expense) of leased lines between
sites. The LAN computers can share the VPN tunnels for secure connections to
remote computers.
Figure 1 Secure Internet Access and VPN Application
Business Secure Router
Nortel Business Secure Router 222 Configuration — Basics
Page 42
42 Chapter 1 Getting to know your Nortel Business Secure Router 222
Hardware Setup
Refer to Nortel Business Secure Router 222 — Fundamentals (NN47922-301) for
hardware connection instructions.
Note: To keep the Business Secure Router operating at optimal internal
temperature, keep the bottom, sides, and rear clear of obstructions and
away from the exhaust of other equipment.
After installing your Nortel Business Secure Router 222, continue with the rest of
this guide for configuration instructions.
NN47922-500
Page 43
Chapter 2
Introducing the WebGUI
This chapter describes how to access the Business Secure Router WebGUI and
provides an overview of its screens.
WebGUI overview
The WebGUI is an HTML based management interface that a user can use for
easy setup and management of the Business Secure Router via an Internet
browser.
Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
The recommended screen resolution is 1 024 by 768 pixels.
In order to use the WebGUI you need to allow:
43
•Web browser pop-up windows from your device. Web pop-up blocking is
enabled by default in Windows XP SP (Service Pack) 2.
•JavaScripts (enabled by default).
•Java permissions (enabled by default).
See “Allowing Pop-up Windows, JavaScript and Java Permissions” on page 408 if
you want to make sure these functions are allowed in Internet Explorer.
Accessing the Business Secure Router WebGUI
Make sure your Business Secure Router hardware is properly connected and
prepare your computer and computer network to connect to the Business Secure
Router. Refer to the Nortel Business Secure Router 222 — Fundamentals
(NN47922-301).
Nortel Business Secure Router 222 Configuration — Basics
Page 44
44 Chapter 2 Introducing the WebGUI
1Launch your web browser.
2Type 192.168.1.1 as the URL.
3Type the user name (nnadmin is the default) and the password (PlsChgMe! is
the default) and click Login. Click Reset to clear any information you have
entered in the Username and Password fields.
Figure 2 Login screen
NN47922-500
4A screen asking you to change your password (highly recommended) appears
and is shown in Figure 3. Type a new password (and retype it to confirm) and
click Apply or click Ignore.
Page 45
Chapter 2 Introducing the WebGUI 45
Figure 3 Change password screen
5Click Apply in the Replace Certificate screen to create a certificate using
your Business Secure Router’s MAC address that is specific to this device.
Figure 4 Replace certificate screen
Nortel Business Secure Router 222 Configuration — Basics
Page 46
46 Chapter 2 Introducing the WebGUI
The MAIN MENU screen appears.
Note: The management session automatically times out when the time
period set in the Administrator Inactivity Timer field expires (default
five minutes). Simply log back on to the Business Secure Router if this
happens to you.
Restoring the factory default configuration settings
If you just want to restart the Business Secure Router, press the rear panel RESET
button for one to three seconds.
If you forget your password or cannot access the SMT menu, you must reload the
factory default configuration file or use the RESET button the back of the
Business Secure Router to restore the factory default configuration. Uploading
this configuration file replaces the current configuration file with the factory
default configuration file. All previous configurations are lost, and the speed of
the console port is reset to the default of 9 600 bp/s with 8 data bit, no parity, one
stop bit and flow control set to none. The password is also reset to PlsChgMe!.
Procedure to use the reset button
Uploading a configuration file via console port
NN47922-500
Press the rear panel RESET button for longer than three seconds to return the
Business Secure Router to the factory defaults.
1Download the default configuration file from the Nortel FTP site, unzip it and
save it in a folder.
2Turn off the Business Secure Router, begin a terminal emulation software
session and turn on the Business Secure Router again. When you see the
message Press Any key to enter Debug Mode within 3 seconds, press any key
to enter debug mode.
3Enter y at the prompt to go into debug mode.
4Enter atlc after the Enter Debug Mode message displays.
Page 47
Chapter 2 Introducing the WebGUI 47
5Wait for the Starting XMODEM upload message before activating Xmodem
upload on your terminal. Figure 5 is an example of an Xmodem configuration
upload using HyperTerminal.
6Click Transfer, then Send File to display the screen illustrated in Figure 5.
Figure 5 Example Xmodem Upload
7After the firmware uploads successfully, enter atgo to restart the router.
Navigating the Business Secure Router WebGUI
Follow the instructions in the MAIN MENU screen or click the help icon (located
in the top right corner of most screens) to view online help.
Note: The help icon does not appear in the MAIN MENU screen.
Nortel Business Secure Router 222 Configuration — Basics
Page 48
48 Chapter 2 Introducing the WebGUI
Figure 6 MAIN MENU Screen
NN47922-500
Click the Contact link to display the customer support contact information.
Figure 7 is a sample of what displays.
Page 49
Figure 7 Contact Support
Chapter 2 Introducing the WebGUI 49
Nortel Business Secure Router 222 Configuration — Basics
Page 50
50 Chapter 2 Introducing the WebGUI
NN47922-500
Page 51
Chapter 3
Wizard setup
This chapter provides information on the Wizard screens in the WebGUI.
Wizard overview
The setup wizard in the WebGUI helps you configure your device to access the
Internet. The second screen has three variations, depending on which
encapsulation type you use. Refer to your ISP checklist in the Nortel Business Secure Router 222 — Fundamentals (NN47922-301) to know what to enter in
each field. Leave a field blank if you do not have the required information.
Wizard setup: General Setup and System Name
51
General Setup contains administrative and system related information. System
Name is for identification purposes. However, because some ISPs check this
name, you must enter your Computer Name.
In Windows 95/98, click Start, Settings, Control Panel, Network. Click the
Identification tab, note the entry for the Computer Name field and enter it as the
System Name.
In Windows 2000, click Start, Settings, Control Panel and then double-click
System. Click the Network Identification tab and then the Properties button.
Note the entry for the Computer name field and enter it as the System Name.
In Windows XP, click Start, My Computer, View system information and then
click the Computer Name tab. Note the entry in the Full computer name field
and enter it as the Business Secure Router System Name.
Nortel Business Secure Router 222 Configuration — Basics
Page 52
52 Chapter 3 Wizard setup
Domain Name
The Domain Name entry is what is propagated to the DHCP clients on the LAN.
If you leave this blank, the domain name obtained by DHCP from the ISP is used.
While you must enter the host name (System Name) on each individual computer,
the domain name can be assigned from the Business Secure Router via DHCP.
Click Next to configure the Business Secure Router for Internet access.
Figure 8 Wizard 1
Wizard setup: Screen 2
The Business Secure Router offers three choices of encapsulation. They are
Ethernet, PPTP or PPPoE.
NN47922-500
Page 53
Ethernet
Choose Ethernet when the WAN port is used as a regular Ethernet.
Figure 9 Wizard 2: Ethernet Encapsulation
Chapter 3 Wizard setup 53
Nortel Business Secure Router 222 Configuration — Basics
Page 54
54 Chapter 3 Wizard setup
Table 2 describes the fields in Figure 9.
Tabl e 2 Wizard 2: Ethernet Encapsulation
LabelDescription
PPTP
EncapsulationYou must choose the Ethernet option when the WAN port is used
Service TypeChoose from Standard, RR-Telstra (Telstra authentication
User NameType the user name given to you by your ISP.
PasswordType the password associated with the user name above.
Login Server IP
Address
NextClick Next to continue.
BackClick Back to return to the previous screen.
as a regular Ethernet. Otherwise, choose PPPoE or PPTP for a
dial-up connection.
For ISPs (such as Telstra) that send UDP-heartbeat packets to
verify that the customer is still online, create a WAN-to-WAN/
Business Secure Router firewall rule that allows access for port
1026 (UDP).
The following fields are not applicable (N/A) for the Standard
service type.
Type the authentication server IP address here if your ISP gave
you one.
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables
transfers of data from a remote client to a private server, creating a Virtual Private
Network (VPN) using TCP/IP-based networks.
NN47922-500
PPTP supports on-demand, multiprotocol, and virtual private networking over
public networks, such as the Internet.
Note: The Business Secure Router supports one PPTP server connection
at any given time
Page 55
Figure 10 Wizard 2: PPTP Encapsulation
Chapter 3 Wizard setup 55
Table 3 describes the fields in Figure 10.
Tabl e 3 Wizard 2: PPTP Encapsulation
LabelDescription
ISP Parameters for Internet Access
EncapsulationSelect PPTP from the drop-down list.
User NameType the username given to you by your ISP.
PasswordType the password associated with the username above.
Nailed Up
Connection
Idle TimeoutType the time, in seconds, that elapses before the router
Select Nailed Up Connection if you do not want the connection to
time out.
automatically disconnects from the PPTP server. The default is 45
seconds.
Nortel Business Secure Router 222 Configuration — Basics
Page 56
56 Chapter 3 Wizard setup
Tabl e 3 Wizard 2: PPTP Encapsulation
LabelDescription
PPTP Configuration
My IP AddressType the (static) IP address assigned to you by your ISP.
My IP Subnet Mask Type the subnet mask assigned to you by your ISP (if given).
Server IP AddressType the IP address of the PPTP server.
Connection ID/
Name
NextClick Next to continue.
BackClick Back to return to the previous screen.
PPPoE Encapsulation
Point-to-Point Protocol over Ethernet (PPPoE) functions as a dial-up connection.
PPPoE is an IETF (Internet Engineering Task Force) draft standard specifying
how a host personal computer interacts with a broadband modem (for example,
DSL, cable, or wireless) to achieve access to high-speed data networks. It
preserves the existing Microsoft Dial-Up Networking experience and requires no
new learning or procedures.
Enter the connection ID or connection name in this field. It must
follow the c:id and n:name format. For example, C:12 or N:My ISP.
This field is optional and depends on the requirements of your ISP.
NN47922-500
For the service provider, PPPoE offers an access and authentication method that
works with existing access control systems (for instance, Radius). For the user,
PPPoE provides a logon and authentication method that the existing Microsoft
Dial-Up Networking software can activate, and therefore requires no new learning
or procedures for Windows users.
One of the benefits of PPPoE is the ability to let end users access one of multiple
network services, a function known as dynamic service selection. This means the
service provider can easily create and offer new IP services for specific users.
Operationally, PPPoE saves significant effort for both the subscriber and the ISP
or carrier, as it requires no specific configuration of the broadband modem at the
subscriber site.
Page 57
Chapter 3 Wizard setup 57
By implementing PPPoE directly on the Business Secure Router (rather than
individual computers), the computers on the LAN do not need PPPoE software
installed, since the Business Secure Router does that part of the task. Furthermore,
with NAT, all the computers on the LAN have Internet access.
Figure 11 Wizard2: PPPoE Encapsulation
Table 4 describes the fields in Figure 11.
Tabl e 4 Wizard2: PPPoE Encapsulation
LabelDescription
EncapsulationSelect PPP over Ethernet from the drop-down list.
Service Name Type the name of your service provider.
User NameType the username given to you by your ISP.
Password Type the password associated with the username above.
Nortel Business Secure Router 222 Configuration — Basics
Page 58
58 Chapter 3 Wizard setup
Tabl e 4 Wizard2: PPPoE Encapsulation
Nailed Up
Connection
Idle TimeoutType the time, in seconds, that elapses before the router automatically
NextClick Next to continue.
BackClick Back to return to the previous screen.
Select Nailed Up Connection if you do not want the connection to
time out.
disconnects from the PPPoE server. The default time is 100 seconds.
Wizard setup: Screen 3
Using the third screen you can configure WAN IP address assignment, DNS
server address assignment, and the WAN MAC address.
WAN IP address assignment
Every computer on the Internet must have a unique IP address. If your networks
are isolated from the Internet, for instance, it only connects your two branch
offices, you can assign any IP addresses to the hosts without problems. However,
the Internet Assigned Numbers Authority (IANA) has reserved three blocks of IP
addresses specifically for private networks.
NN47922-500
Tabl e 5 Private IP Address Ranges
10.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255
192.168.0.0-192.168.255.255
Page 59
You can obtain your IP address from the IANA, from an ISP, or have it assigned
by a private network. If you belong to a small organization and your Internet
access is through an ISP, the ISP can provide you with the Internet addresses for
your local networks. If you are part of a much larger organization, consult your
network administrator for the appropriate IP addresses.
Note: Regardless of your particular situation, do not create an arbitrary
IP address; always follow the guidelines above. For more information
about address assignment, refer to Address Allocation for Private
Internets (RFC 1597), and Guidelines for Management of IP Address
Space (RFC 1466).
IP address and Subnet Mask
Similar to the way houses on a street share a common street name, computers on a
LAN share one common network number.
Where you obtain your network number depends on your particular situation. If
your ISP or network administrator assigns you a block of registered IP addresses,
follow their instructions in selecting the IP addresses and the subnet mask.
Chapter 3 Wizard setup 59
If your ISP did not explicitly give you an IP network number, then most likely you
have a single user account and the ISP will assign you a dynamic IP address when
the connection is established. If this is the case, Nortel recommends that you
select a network number from 192.168.0.0 to 192.168.255.0 and you must enable
the Network Address Translation (NAT) feature of the Business Secure Router.
The Internet Assigned Number Authority (IANA) reserved this block of addresses
specifically for private use; do not use any other number unless you are told
otherwise. For example, select 192.168.1.0 as the network number; which covers
254 individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are
reserved). In other words, the first three numbers specify the network number,
while the last number identifies an individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to
remember, for instance, 192.168.1.1, for your Business Secure Router, but make
sure that no other device on your network is using that IP address.
Nortel Business Secure Router 222 Configuration — Basics
Page 60
60 Chapter 3 Wizard setup
The subnet mask specifies the network number portion of an IP address. Your
Business Secure Router computes the subnet mask automatically based on the IP
address that you enter. You do not need to change the subnet mask computed by
the Business Secure Router unless you are instructed to do otherwise.
DNS Server address assignment
Use DNS (Domain Name System) to map a domain name to its corresponding IP
address and vice versa, for instance, the IP address of www.nortel.com is
47.249.48.20. The DNS server is extremely important because without it, you
must know the IP address of a computer before you can access it.
The Business Secure Router can get the DNS server addresses in the following
ways:
•The ISP tells you the DNS server addresses, usually in the form of an
information sheet, when you sign up. If your ISP gives you DNS server
addresses, enter them in the DNS Server fields in DHCP Setup.
•If the ISP did not give you DNS server information, leave the DNS Server
fields in DHCP Setup set to 0.0.0.0 for the ISP to dynamically assign the
DNS server IP addresses.
WAN MAC address
NN47922-500
Every Ethernet device has a unique MAC (Media Access Control) address. The
MAC address is assigned at the factory and consists of six pairs of hexadecimal
characters, for example, 00:A0:C5:00:00:02.
You can configure the MAC address of the WAN port by either using the factory
default or cloning the MAC address from a computer on your LAN. Once the
MAC address of the WAN port is successfully configured, the address is copied to
the rom file (configuration file) and does not change unless you change the setting
or upload a different rom file.
Page 61
Chapter 3 Wizard setup 61
The WAN port of your Business Secure Router is set at half-duplex mode, as most
cable or DSL modems only support half-duplex mode. Make sure your modem is
in half-duplex mode. Your Business Secure Router supports full duplex mode on
the LAN side.
Tabl e 6 Example of network properties for LAN servers with fixed IP addresses
Choose an IP address192.168.1.2-192.168.1.32; 192.168.1.65-192.168.1.254.
Subnet mask 255.255.255.0
Gateway (or default route)192.168.1.1(Business Secure Router LAN IP)
The third wizard screen varies according to the type of encapsulation that you
select in the second wizard screen.
Nortel Business Secure Router 222 Configuration — Basics
Page 62
62 Chapter 3 Wizard setup
Figure 12 Wizard 3
NN47922-500
Table 7 describes the fields in Figure 12.
Tabl e 7 Wizard 3
LabelDescription
WAN IP Address Assignment
Get automatically from
ISP
Use fixed IP addressSelect this option If the ISP assigned a fixed IP address.
IP AddressEnter your WAN IP address in this field if you select Use
Select this option If your ISP did not assign you a fixed IP
address. This is the default selection.
Fixed IP Address.
Page 63
Tabl e 7 Wizard 3
LabelDescription
Chapter 3 Wizard setup 63
IP Subnet MaskEnter the IP subnet mask in this field if you select Use Fixed
Gateway IP Address Enter the gateway IP address in this field if you select Use
DNS Server Address
Assignment
Get automatically from
ISP
Use fixed IP address DNS Server IP Address
IP Address. This field is not available when you select
PPPoE encapsulation in the previous wizard screen.
Fixed IP Address. This field is not available when you select
PPPoE encapsulation in the previous wizard screen.
DNS (Domain Name System) is for mapping a domain name
to its corresponding IP address and vice versa. For example,
the IP address of www.nortel.com is 47.249.48.20. The DNS
server is extremely important because without it, you must
know the IP address of a machine before you can access it.
Select this option if your ISP does not give you DNS server
addresses. This option is selected by default.
Select this option If your ISP provides you a DNS server
address.
System DNS Servers (if applicable)
DNS (Domain Name System) is for mapping a domain name
to its corresponding IP address and vice versa. The DNS
server is extremely important because without it, you must
know the IP address of a machine before you can access it.
The Business Secure Router uses a system DNS server (in
the order you specify here) to resolve domain names for VPN,
DDNS and the time server.
Nortel Business Secure Router 222 Configuration — Basics
Page 64
64 Chapter 3 Wizard setup
Tabl e 7 Wizard 3
LabelDescription
First DNS Server
Second DNS Server
Third DNS Server
WAN MAC AddressIn the MAC Address field, you can configure the MAC
Factory Default Select this option to use the factory assigned default MAC
Spoof this Computer's
MAC address - IP
Address
BackClick Back to return to the previous screen.
FinishClick Finish to complete and save the wizard setup.
Select From ISP if your ISP dynamically assigns DNS server
information (and the Business Secure Router’s WAN IP
address). The field to the right displays the (read-only) DNS
server IP address that the ISP assigns. If you chose From ISP, but the Business Secure Router has a fixed WAN IP
address, From ISP changes to None after you click Finish. If
you chose From ISP for the second or third DNS server, but
the ISP does not provide a second or third IP address, From ISP changes to None after you click Finish.
Select User-Defined if you have the IP address of a DNS
server. Enter the DNS server's IP address in the field to the
right.
Select None if you do not want to configure DNS servers. If
you do not configure a system DNS server, you must use IP
addresses when configuring VPN, DDNS and the time server.
Select Private DNS if the DNS server has a private IP
address and is located behind a VPN peer. Enter the DNS
server's IP address in the field to the right.
With a private DNS server, you must also configure the first
DNS server entry in the LAN IP screen to use DNS Relay.
You must also configure a VPN branch office rule since the
Business Secure Router uses a VPN tunnel when it relays
DNS queries to the private DNS server. One of the rule’s IP
policies must include the LAN IP address of the Business
Secure Router as a local IP address and the IP address of the
DNS server as a remote IP address.
A Private DNS entry with the IP address set to 0.0.0.0
changes to None after you click Apply. A duplicate Private DNS entry changes to None after you click Apply.
address of the WAN port by either using the factory default or
cloning the MAC address from a computer on your LAN.
Address.
Select this option and enter the IP address of the computer on
the LAN whose MAC you are cloning. After it is successfully
configured, the address is copied to the rom file (configuration
file). It does not change unless you change the setting or
upload a different rom file. It is advisable to clone the MAC
address from a computer on your LAN even if your ISP does
not presently require MAC address authentication.
NN47922-500
Page 65
Basic Setup Complete
Well done! You have successfully set up your Business Secure Router to operate
on your network and access the Internet.
Chapter 3 Wizard setup 65
Nortel Business Secure Router 222 Configuration — Basics
Page 66
66 Chapter 3 Wizard setup
NN47922-500
Page 67
Chapter 4
User Notes
General Notes
There are some router functions that, although performing as expected, might
cause some confusion. These are summarized below.
General
1Default Address Mapping Rules When First Enable NAT Full Feature.
When NAT Full Feature is first enabled, two address mapping rules are added to
the address mapping table. This is done to facilitate programming, and matches
the default SUA rule. The rules can be deleted.
2Response to Invalid User ID or Password
67
When the wrong user ID or password is entered into the router login screen, no
error message is displayed. Instead, the login screen is simply displayed again.
3First DHCP Address Reserved for BCM50
The first address of the DHCP Address Pool is reserved for a BCM50 in the
subnet, and will not be assigned to any other equipment. Once assigned to a
BCM50, it is reserved for that BCM50, and will not be assigned to any other. If
the BCM50 is changed, the following command must be used to enable the router
to assign the first address to a different BCM50:
ip dhcp enif0 server m50mac clear
4Login Requires Reboot
Nortel Business Secure Router 222 Configuration — Basics
Page 68
68 Chapter 4 User Notes
If the Administrator Timeout is set to 0, and an administration session is
terminated without logging off, the router needs to be rebooted in order for the
administrator to log in to the WebGUI again. Alternatively, the administrator can
log in using a TelNet session, if TelNet access has been enabled in the Remote
Management menu.
5Clicking Sound
The Business Secure Router will click once every two minutes until an ADSL line
is connected.
Firewall
1Address Range Validation
In the firewall rules, the router does not confirm when given an address range, that
the second address is higher than the first. If this type of address range is entered,
the range is ignored.
2Automatic Firewall Programming
NN47922-500
Configurations to various areas of the router, such as remote management or
adding a SUA Server, do not automatically add the appropriate rules to the
Firewall, to enable the traffic to pass through the router. These need to be added
separately.
Note: Firewall rules do not apply to IPSec tunnels.
NAT
1Deleting NAT Rule Does Not Drop an Existing Connection
If a NAT rule is deleted, the router must be rebooted to apply the change to
existing service connections. This is already noted in the GUI.
2NAT Traversal Status
If NAT Traversal is enabled, but is not needed (because the client is not behind a
NAT router), it will be shown as 'inactive' in the VPN Client Monitor. This may
confuse some users.
Page 69
Chapter 4 User Notes 69
VPN Client Termination
1Change of User Account Does Not Drop Existing Connections
If a VPN Client user account is de-activated, deleted, or changed, and that user is
currently connected, the connection is not automatically dropped. To drop the
connection, the administrator needs to disconnect the user using the 'Disconnect'
function in the VPN/SA Monitor GUI. This is consistent with other Nortel
Contivity products.
2User Name Restrictions
User names are limited to a maximum length of 63 characters.
3VPN Client Account Password Restrictions
The password for a VPN Client user cannot contain the single- or double-quote
characters.
4IP Pool Address Overlap
When defining multiple VPN Client Termination IP pools, the router uses the IP
Subnet mask, and not the pool size, to determine if the pools are overlapping. The
subnet mask of each pool should be appropriate for the size of the VPN Client
Termination IP pool.
5VPN Client Termination - Failure In Specific Addressing Situation
If the Client has an assigned IP address that is the same as the IP address assigned
for the Client Tunnel, the connection will fail to be established.
This router has some restrictions when compared to larger Contivity Routers
(1000 Series and above). In particular,
VPN Clients cannot be added to the LAN subnet. They must have addresses
outside of the LAN subnet.
Nortel Business Secure Router 222 Configuration — Basics
Page 70
70 Chapter 4 User Notes
VPN Clients can have dynamically assigned IP addresses, or they can have a
statically assigned addresses. However, the router does not support both
modes at once. All addresses must either be dynamically assigned, or they
must all be statically assigned.
7Establishing a Client Tunnel From One Business Secure Router to Another
When defining a Client Termination account for another Business Secure Router
that will connect using Contivity Client Emulation, the following configuration is
required:
•Encryption must be Triple DES with SHA1 integrity, or Triple DES with
MD5 integrity.
•IKE Encryption must be Triple DES with Diffie-Hellman Group 2.
•Perfect Forward Secrecy (PFS) must be enabled.
Security
1Exporting or Saving Self-Signed Certificate
To export or save a self-signed certificate, click details (the icon that looks like a
paper note), then click 'Export' or copy the PEM text into the clipboard, and paste
into a file.
NN47922-500
Routing
1RIP Version Advertisement Control
To change the version of generated RIP advertisements, the following CLI
command needs to be used
ip rip mode [enif0|enif1] [in|out] [0|1|2|3]
where:
'enif0' is the LAN side, and 'enif1' is the WAN side
'in' affects recognition of received advertisements, and
'out' applies to generated advertisements
Page 71
The number controls the operating mode:
None (disabled)
RIP-1 only
RIP-2 only
Both RIP-1 and RIP-2
Advanced Router Configuration
The following notes are intended to help with advanced router configuration.
Setting up the router when the system has a server
1If you are using a Full-Feature NAT configuration, first, do the following...
aIn SUA/NAT / Address Mapping, add a 'Server' rule, specifying the
'Public' IP address of the server.
Chapter 4 User Notes 71
2For both SUA-Only and Full-Feature NAT configurations, do the following...
aIn SUA/NAT : SUA Server, add server private IP address and port
number(s) to the SUA/NAT Server table.
bIn FIREWALL, add a WAN-to-LAN rule
cIf the service is not in the list of available services, add it as a 'Custom
Port'.
dAdd the rule, selecting the service, and entering the server IP address as
the destination IP address.
Connecting two sites to establish a virtual private network
The recommended method to do this is through a branch-to-branch IPSec tunnel.
1In VPN / Summary, add a new tunnel by editing an unused rule. Create an
Active, Branch Office tunnel.
aSelect 'Nailed Up' if the tunnel should not be closed while not in use.
Nortel Business Secure Router 222 Configuration — Basics
Page 72
72 Chapter 4 User Notes
bEnter the authentication information, with either a pre-shared key or an
imported certificate.
cEnter the IP Address assigned to the router WAN port. This should be a
static address, or a dynamic DNS name, and the IP address of the remote
router.
dSelect the encryption and authentication algorithms.
eAdd an IP policy, by specifying the IP address ranges of the local and
remote hosts that will use the tunnel.
2Repeat these steps at the other end of the branch.
Note: If VPN Client Termination is used on these sites, the client termination
address range will need to be included in the tunnel policies in order for the
VPN clients to see the other site.
Adding IP telephony to a multi-site network
Scenario 1: A BCM50 in the primary site acting as the gateway for
both sites
NN47922-500
1Ensure that the DHCP Server in the BCM50 is disabled, that the BCM50 is
connected to the router, and both have booted.
2Add the IP phones to the primary site as per BCM50 installation guide.
3Create a tunnel to the remote site, as described above.
4In the remote site, set the S1 and S2 addresses to the IP address of the
BCM50, which is identified in the router DHCP table or in the BCM50. This
is done with a CLI command.
TELNET or SSH to the router. This needs TELNET or SSH enabled on that
router. Select menu 24, select menu 8, and enter the commands:
ip dhcp enif0 server voipserver 1 <BCM50_IP_Address> 7000 1
ip dhcp enif0 server voipserver 2 <BCM50_IP_Address> 7000 1
5Add the IP phones to the remote site, configured for full DHCP client mode.
Page 73
Chapter 4 User Notes 73
Scenario 2: A BCM50 in each site, each acting as the backup call
server for the other site
1At each site,
aEnsure that the DHCP Server in the BCM50 is disabled, that the BCM50
is connected to the router, and both have booted.
bAdd the IP phones to the site as per BCM50 installation guide.
cAt each router, change the S2 address to the IP address of the remote
BCM50, using TELNET or SSH, and the CLI command,
ip dhcp enif0 server voipserver 2 <Remote_BCM50_IP_Address> 7000 1
2Create a tunnel between the sites, as described above.
3Create an H.323 trunk between the BCM50s, as per the BCM50 User Guide.
Configuring the router to act as a Nortel VPN Server (Client
Termination)
1Under VPN / Client Termination,
aEnable Client Termination.
bSelect authentication type and the encryption algorithms supported.
cIf the clients are assigned IP addresses from a pool, define the pool, and
enable it.
2Assuming a Local User Database is used for authentication,
aAdd user name and password to the local user database as an IPSec user,
and activate it. If the hosts will be assigned a static IP address, enter the
address that will be assigned to the user.
Configuring the router to connect to a Nortel VPN Server (Client
Emulation)
1Go to VPN / Summary, and select 'Edit'.
2Select a connection type of Contivity Client, and fill in the web page with the
relevant data.
3If Group authentication or On-Demand Client Tunnels are needed, click the
'Advanced' button to configure this.
Nortel Business Secure Router 222 Configuration — Basics
Page 74
74 Chapter 4 User Notes
Allowing remote management of a LAN-connected BCM50
1Create the appropriate NAT server rules to add the BCM50.
Go to SUA/NAT / SUA Server, and create two server rules for HTTPS and
Element Manager access:
One named BCM_HTTPS, with port number 443, and the IP address of the
BCM50
One named BCM_EM, with the port number 5989, and the IP address of the
BCM50
Note: In DHCP Server mode, the BCM50 IP address will be the lowest
address in the pool.
2Create the appropriate Firewall rules to add BCM50 access.
Go to FIREWALL / Summary, and create two WAN-to-LAN firewall rules:
One rule allowing access from allowed remote computer IP addresses, to the
BCM50 IP address, for service type HTTPS(TCP:443)
NN47922-500
One rule allowing access from allowed remote computer IP addresses, to the
BCM50 IP address, for custom port TCP:5989
Setting up the router for guest access
The recommended approach to provide guest access is by creating an IP Alias,
and using static addressing for the corporate equipment, to make it a member of
the defined Alias subnet. Then use firewall rules to restrict access of the guest
equipment. NOTE: if a BCM50 is used, it will also need to be assigned a static IP
address.
1Go to LAN / IP Alias, and Enable IP Alias 1.
2Define a subnet for the corporate equipment.
3Statically assign addresses to the corporate equipment that are within the IP
Alias subnet.
4Set up LAN / IP to enable DHCP Server, with an address range that will be
used for guest equipment.
Page 75
Chapter 4 User Notes 75
5In the FIREWALL, set up a LAN-to-LAN rule to block traffic between the
guest subnet (DHCP Pool) and the corporate subnet (IP Alias subnet).
Note: If branch tunnels are being used, the policies on these tunnels should
exclude the guest subnet.
Preventing heavy data traffic from impacting telephone calls
To ensure voice quality during heavy data traffic, bandwidth needs to be reserved
for voice traffic.
1Determine your actual WAN up-stream bandwidth by connecting to a web site
such as http://myvoipspeed.visualware.com/.
2On BANDWIDTH MANAGEMENT / Summary, activate WAN bandwidth
management, and fill in your actual uplink speed in the WAN Speed field..
3On BANDWIDTH MANAGEMENT / Class Setup, add a WAN subclass, and
reserve sufficient bandwidth based on the number of telephones, for Protocol
ID 17 (UDP Traffic).
The amount of bandwidth should be based on a reasonable peak number of
simultaneous calls, and the data rate needed by the IP telephony CODECs.
Setting Up a Remote Office with a UNIStim IP Telephone
For a remote office with a PC, and a UNIStim IP telephone behind a Business
Secure Router, Client Emulation is the recommended method to connect to the
main office.
1At the main office Contivity Client Server, establish two user accounts - one
for the telephone, and one for the PC.
2On the remote office Business Secure Router, do the following:
Under WAN / WAN IP, ensure that Network Address Translation is set to
SUA Only (default). Also ensure that the Gateway IP address is set (not
0.0.0.0).
Under VPN / Summary, create an entry for the IP telephone client tunnel.
(Contivity Client, Active, Keep Alive). Fill in the IP address of the Contivity
Client Server, and the name and password of the telephone set user account.
Nortel Business Secure Router 222 Configuration — Basics
Page 76
76 Chapter 4 User Notes
Under VPN / Global Setting, enable Exclusive Mode, and fill in the MAC
address of the telephone set.
Under Bandwidth Management, set up WAN bandwidth management to
reserve 110 kbps of bandwidth for UDP traffic (protocol ID 17). See the
preceding section titled, “Preventing heavy data traffic from impacting
telephone calls.
3Provision the IP set with the corporate call server address.
4On the PC, install Contivity Client Software, and configure it with the PC user
account information.
Inter-Operability With Third-Party Routers
VPN Connections With Cisco Routers
When establishing a VPN Client tunnel or Branch Office Tunnel between the
Business Secure Router and a Cisco router, the following configuration rules
should be followed:
NN47922-500
1Ensure that the WAN IP of the BSR222/252 router and the Cisco router are
not in the same subnet.
2Configure the connection to use DES Encryption and MD5 Authentication.
Page 77
Chapter 5
System screens
This chapter provides information on the System screens.
System overview
This section provides background information on features that you cannot
configure in the Wizard.
DNS overview
There are three places where you can configure DNS (Domain Name System)
setup on the Business Secure Router.
Use the System General screen to configure the Business Secure Router to use a
DNS server to resolve domain names for Business Secure Router system features
like VPN, DDNS, and the time server.
77
Use the LAN IP screen to configure the DNS server information that the Business
Secure Router sends to the DHCP client devices on the LAN.
Use the Remote Management DNS screen to configure the Business Secure
Router to accept or discard DNS queries.
Private DNS server
In cases where you want to use domain names to access Intranet servers on a
remote private network that has a DNS server, you must identify that DNS server.
You cannot use DNS servers on the LAN or from the ISP because these DNS
servers cannot resolve domain names to private IP addresses on the remote private
network.
Nortel Business Secure Router 222 Configuration — Basics
Page 78
78 Chapter 5 System screens
Figure 13 depicts an example where three VPN tunnels are created from Business
Secure Router A; one to branch office 2, one to branch office 3, and another to
headquarters (HQ). In order to access computers that use private domain names
on the HQ network, the Business Secure Router at branch office 1 uses the
Intranet DNS server in headquarters.
Figure 13 Private DNS server example
Note: If you do not specify an Intranet DNS server on the remote
network, then the VPN host must use IP addresses to access the
computers on the remote private network.
Configuring General Setup
Click SYSTEM to open the General screen.
NN47922-500
Page 79
Figure 14 System general setup
Table 8 describes the fields in Figure 14.
Chapter 5 System screens 79
Tabl e 8 System general setup
LabelDescription
System NameChoose a descriptive name for identification purposes. Nortel
Domain NameEnter the domain name (if you know it) here. If you leave this field
Administrator
Inactivity Timer
ApplyClick Apply to save your changes to the Business Secure Router.
ResetClick Reset to begin configuring this screen afresh.
recommends that you enter your computer name in this field. This
name can be up to 30 alphanumeric characters long. Spaces, dashes
(-) and underscores (_) are accepted.
blank, the ISP assigns a domain name via DHCP.
The domain name entered by you is given priority over the
ISP-assigned domain name.
Type how many minutes a management session (either via the
WebGUI or SMT) can be left idle before the session times out. The
default is 5 minutes. After it times out you have to log in with your
password again. Very long idle timeouts can have security risks. A
value of 0 means a management session never times out, no matter
how long it has been left idle (not recommended).
Nortel Business Secure Router 222 Configuration — Basics
Page 80
80 Chapter 5 System screens
Tabl e 8 System general setup
LabelDescription
System DNS
Servers (if
applicable)
First DNS Server
Second DNS
Server
Third DNS Server
DNS (Domain Name System) is for mapping a domain name to its
corresponding IP address and vice versa. The DNS server is
extremely important because without it, you must know the IP
address of a machine before you can access it. The Business Secure
Router uses a system DNS server (in the order you specify here) to
resolve domain names for VPN, DDNS and the time server.
Select From ISP if your ISP dynamically assigns DNS server
information (and the Business Secure Router’s WAN IP address).
The field to the right displays the (read-only) DNS server IP address
that the ISP assigns. If you chose From ISP, but the Business Secure
Router has a fixed WAN IP address, From ISP changes to None
after you click Apply. If you chose From ISP for the second or third
DNS server, but the ISP does not provide a second or third IP
address, From ISP changes to None after you click Apply.
Select User-Defined if you have the IP address of a DNS server. The
IP address can be public or a private address on your local LAN.
Enter the DNS server's IP address in the field to the right.
A User-Defined entry with the IP address set to 0.0.0.0 changes to
None after you click Apply. A duplicate User-Defined entry changes
to None after you click Apply.
Select None if you do not want to configure DNS servers. If you do
not configure a system DNS server, you must use IP addresses when
configuring VPN, DDNS and the time server.
Select Private DNS if the DNS server has a private IP address and is
located behind a VPN peer. Enter the DNS server's IP address in the
field to the right.
With a private DNS server, you must also configure the first DNS
server entry in the LAN IP screen to use DNS Relay.
You must also configure a VPN branch office rule since the Business
Secure Router uses a VPN tunnel when it relays DNS queries to the
private DNS server. One of the rule’s IP policies must include the
LAN IP address of the Business Secure Router as a local IP address
and the IP address of the DNS server as a remote IP address.
A Private DNS entry with the IP address set to 0.0.0.0 changes to
None after you click Apply. A duplicate Private DNS entry changes
to None after you click Apply.
NN47922-500
Page 81
Dynamic DNS
With Dynamic DNS, you can update your current dynamic IP address with one or
many dynamic DNS services so that anyone can contact you (as in NetMeeting or
CU-SeeMe). You can also access your FTP server or Web site on your own
computer using a domain name (for instance, myhost.dhs.org, where myhost is a
name of your choice) that will never change instead of using an IP address that
changes each time you reconnect. Your friends or relatives can always call you
even if they don't know your IP address.
First of all, you must register a dynamic DNS account with, for example
www.dyndns.org. This is for people with a dynamic IP from their ISP or DHCP
server that still wants a domain name. The Dynamic DNS service provider gives
you a password or key.
DYNDNS Wildcard
Enabling the wildcard feature for your host causes *.yourhost.dyndns.org to be
aliased to the same IP address as yourhost.dyndns.org. This feature is useful if you
want to use, for example, www.yourhost.dyndns.org and still reach your host
name.
Chapter 5 System screens 81
Configuring Dynamic DNS
Note: If you have a private WAN IP address, you cannot use Dynamic
DNS.
To change your Business Secure Router’s DDNS, click SYSTEM, then the
DDNS tab. The screen illustrated in Figure 15 appears.
Nortel Business Secure Router 222 Configuration — Basics
Page 82
82 Chapter 5 System screens
Figure 15 DDNS
NN47922-500
Table 9 describes the fields in Figure 15.
Tabl e 9 DDNS
LabelDescription
ActiveSelect this check box to use dynamic DNS.
Service ProviderSelect the name of your Dynamic DNS service provider.
DDNS TypeSelect the type of service that you are registered for from your
Dynamic DNS service provider.
Host Names 1~3Enter the host names in the three fields provided. You can
specify up to two host names in each field separated by a
comma (,).
UserEnter your username (up to 31 characters).
Page 83
Tabl e 9 DDNS
LabelDescription
Chapter 5 System screens 83
PasswordEnter the password associated with your username (up to 31
Enable WildcardSelect the check box to enable DYNDNS Wildcard.
Off LineThis option is available when CustomDNS is selected in the
IP Address Update
Policy:
DDNS Server Auto
Detect IP Address
Use Specified IP
Address
Use IP AddressEnter the IP address if you select the User Specify option.
ApplyClick Apply to save your changes to the Business Secure
ResetClick Reset to return to the previously saved settings.
characters).
DDNS Type field. Check with your Dynamic DNS service
provider to have traffic redirected to a URL (that you can
specify) while you are off line.
Select this option only when there are one or more NAT routers
between the Business Secure Router and the DDNS server.
This feature has the DDNS server automatically detect and use
the IP address of the NAT router that has a public IP address.
Note: The DDNS server not be able to detect the proper IP
address if there is an HTTP proxy server between the Business
Secure Router and the DDNS server.
Select this option to update the IP address of the host names to
the IP address specified below. Use this option if you have a
static IP address.
Router.
Configuring Password
To change the password of your Business Secure Router (recommended), click
SYSTEM, then the Password tab. The screen illustrated in Figure 16 appears. In
this screen, you can change password of the Business Secure Router.
Nortel Business Secure Router 222 Configuration — Basics
Page 84
84 Chapter 5 System screens
Figure 16 Password
NN47922-500
Table 1 0 describes the fields in Figure 16.
Tabl e 1 0 Password
LabelDescription
Administrator SettingThe administrator can access and configure all of the Business
Secure Router's features.
Old PasswordType your existing system administrator password (PlsChgMe! is
the default password).
New PasswordType your new system password (up to 31 characters). Note that
as you type a password, the screen displays a (*) for each
character you type.
Retype to ConfirmRetype your new system password for confirmation.
Page 85
Tabl e 1 0 Password
LabelDescription
Chapter 5 System screens 85
Client User SettingThe client user is the person who uses the Business Secure
User Name Type a username for the client user (up to 31 characters).
New PasswordType a password for the client user (up to 31 characters). Note
Retype to Confirm Retype the client user password for confirmation.
ApplyClick Apply to save your changes to the Business Secure
ResetClick Reset to begin configuring this screen afresh.
Router's Contivity Client VPN tunnel.
The client user can do the following:
•Configure the WAN ISP and IP screens.
•Configure the VPN Contivity Client settings (except the
Advanced screen’s exclusive use mode for client tunnel and
MAC address allowed settings).
•View the SA monitor.
•Configure the VPN Global Setting screen.
•View logs.
•View the Maintenance Status screen.
•Use the Maintenance F/W Upload and Restart screens.
that as you type a password, the screen displays a (*) for each
character you type.
Router.
Predefined NTP time server list
The Business Secure Router uses the predefined list of NTP time servers listed in
Table 11 if you do not specify a time server or if it cannot synchronize with the
time server you specified.
The Business Secure Router can use this predefined list of time servers regardless
of the Time Protocol you select.
Nortel Business Secure Router 222 Configuration — Basics
Page 86
86 Chapter 5 System screens
When the Business Secure Router uses the predefined list of NTP time servers, it
randomly selects one server and tries to synchronize with it. If the synchronization
fails, then the Business Secure Router goes through the rest of the list in order
from the first one tried until either it is successful or all the predefined NTP time
servers have been tried.
Tabl e 11 Default Time Servers
a.ntp.alphazed.net
ntp1.cs.wisc.edu
ntp1.gbg.netnod.se
ntp2.cs.wisc.edu
tock.usno.navy.mil
ntp3.cs.wisc.edu
ntp.cs.strath.ac.uk
ntp1.sp.se
time1.stupi.se
tick.stdtime.gov.tw
tock.stdtime.gov.tw
time.stdtime.gov.tw
Configuring Time and Date
To change your Business Secure Router’s time and date, click SYSTEM, and then
Time and Date. The screen in Figure 17 appears. Use this screen to configure the
Business Secure Router’s time based on your local time zone.
NN47922-500
Page 87
Figure 17 Time and Date
Chapter 5 System screens 87
Nortel Business Secure Router 222 Configuration — Basics
Page 88
88 Chapter 5 System screens
Table 1 2 describes the fields in Figure 17.
Tabl e 1 2 Time and Date
LabelDescription
Current Time and
Date
Current Time This field displays the time on your Business Secure Router.
Current Date This field displays the date on your Business Secure Router.
Time and Date Setup
ManualSelect this radio button to enter the time and date manually. If you
New Time
(hh:mm:ss)
New Date
(yyyy-mm-dd)
Get from Time
Server
Time ProtocolSelect the time service protocol that your time server sends when
Time Server Address Enter the IP address or URL of your time server. Check with your
Synchronize NowClick this button to have the Business Secure Router get the time
Each time you reload this page, the Business Secure Router
synchronizes the time with the time server.
Each time you reload this page, the Business Secure Router
synchronizes the date with the time server.
configure a new time and date, time zone and daylight saving at
the same time, the new time and date you entered has priority and
the Time Zone and Daylight Saving settings do not affect it.
This field displays the last updated time from the time server or the
last time configured manually.
After you set Time and Date Setup to Manual, enter the new time
in this field and then click Apply.
This field displays the last updated date from the time server or the
last date configured manually.
After you set Time and Date Setup to Manual, enter the new date
in this field and then click Apply.
Select this radio button to have the Business Secure Router get
the time and date from the time server that you specified.
you turn on the Business Secure Router. Not all time servers
support all protocols, so you need to check with your ISP or
network administrator or use trial and error to find a protocol that
works.
The main difference between the protocols is the format.
Daytime (RFC 867) format is day/month/year/time zone of the
server.
Time (RFC 868) format displays a 4-byte integer giving the total
number of seconds since 1970/1/1 at 0:0:0.
The default, NTP (RFC 1305), is similar to Time (RFC 868).
ISP or network administrator if you are unsure of this information.
and date from a time server (see the Time Server Address field).
This also saves your changes (including the time server address).
NN47922-500
Page 89
Chapter 5 System screens 89
Tabl e 1 2 Time and Date
LabelDescription
Time Zone Setup
Time ZoneChoose the time zone of your location. This will set the time
difference between your time zone and Greenwich Mean Time
(GMT).
Enable Daylight
Saving
Start DateConfigure the day and time when Daylight Saving Time starts if
End DateConfigure the day and time when Daylight Saving Time ends if you
ApplyClick Apply to save your changes to the Business Secure Router.
ResetClick Reset to begin configuring this screen afresh.
Daylight Saving Time is a period from late spring to early fall when
many countries set their clocks ahead of normal local time by one
hour to give more daytime light in the evening.
Select this option if you use Daylight Saving Time.
you select Enable Daylight Saving. The o'clock field uses the
24-hour format. Here are a couple of examples:
Daylight Saving Time starts in most parts of the United States on
the first Sunday of April. Each time zone in the United States starts
using Daylight Saving Time at 2 a.m. local time. So, in the United
States, select First, Sunday, April and type 2 in the o'clock field.
Daylight Saving Time starts in the European Union on the last
Sunday of March. All of the time zones in the European Union start
using Daylight Saving Time at the same moment (1 a.m. GMT or
UTC). So, in the European Union, select Last, Sunday, March.
The time you type in the o'clock field depends on your time zone.
In Germany, for instance, type 2 because Germany's time zone is
one hour ahead of GMT or UTC (GMT+1).
select Enable Daylight Saving. The o'clock field uses the
24-hour format. Here are a couple of examples:
Daylight Saving Time ends in the United States on the last Sunday
of October. Each time zone in the United States stops using
Daylight Saving Time at 2 a.m. local time. So, in the United States,
select Last, Sunday, October and type 2 in the o'clock field.
Daylight Saving Time ends in the European Union on the last
Sunday of October. All of the time zones in the European Union
stop using Daylight Saving Time at the same moment (1 a.m. GMT
or UTC). So, in the European Union, select Last, Sunday, October. The time you type in the o'clock field depends on your
time zone. In Germany for instance, type 2 because Germany's
time zone is one hour ahead of GMT or UTC (GMT+1).
Nortel Business Secure Router 222 Configuration — Basics
Page 90
90 Chapter 5 System screens
ALG
With Application Layer Gateway (ALG), applications can pass through NAT and
the firewall. You must also configure NAT and firewall rules depending upon the
type of access you want to allow.
Note: You must enable the FTP, H.323 or SIP ALG in order to use
bandwidth management on that application.
Configuring ALG
To change the ALG settings of your Business Secure Router, click SYSTEM and
then ALG. The screen appears as shown in Figure 18.
Figure 18 ALG
NN47922-500
Page 91
Table 1 3 describes the labels in Figure 18.
Tabl e 1 3 ALG
LabelDescription
Chapter 5 System screens 91
Enable FTP
ALG
Enable H.323
ALG
Enable SIP ALG Select this check box to allow SIP (Session Initiation Protocol)
ApplyClick Apply to save your changes to the Business Secure Router.
ResetClick Reset to begin configuring this screen afresh.
Select this check box to allow FTP (File Transfer Protocol) to send and
receive files through the Business Secure Router.
Select this check box to allow applications using H.323 to go through
the Business Secure Router.
H.323 is an application layer control (signaling) protocol that handles
the setting up, altering and tearing down of voice and multimedia
sessions over the Internet. H.323 is used in VoIP (Voice over IP), the
sending of voice signals over the Internet Protocol.
The H.323 ALG does not support H.323 Gatekeeper.
applications to go through the Business Secure Router.
The Session Initiation Protocol (SIP) is an application layer control
(signaling) protocol that handles the setting up, altering and tearing
down of voice and multimedia sessions over the Internet. SIP is used in
VoIP (Voice over IP), the sending of voice signals over the Internet
Protocol.
To avoid retranslating the SIP device's IP address, do not use the SIP
ALG with a SIP device that is using STUN (Simple Traversal of User
Datagram Protocol (UDP) through NAT).
Nortel Business Secure Router 222 Configuration — Basics
Page 92
92 Chapter 5 System screens
NN47922-500
Page 93
Chapter 6
LAN screens
This chapter describes how to configure LAN settings.
LAN overview
Local Area Network (LAN) is a shared communication system to which many
computers are attached. The LAN screens can help you configure a LAN DHCP
server, manage IP addresses, configure RIP and multicast settings, and partition
your physical network into logical networks.
DHCP setup
Using DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132),
individual clients can obtain TCP/IP configuration at start-up from a server. You
can configure the Business Secure Router as a DHCP server or disable it. When
configured as a server, the Business Secure Router provides the TCP/IP
configuration for the clients. If DHCP service is disabled, you must have another
DHCP server on your LAN, or else the computer must be configured manually.
93
IP pool setup
The Business Secure Router is preconfigured with a pool of IP addresses for the
DHCP clients (DHCP Pool). Do not assign static IP addresses from the DHCP
pool to your LAN computers.
Nortel Business Secure Router 222 Configuration — Basics
Page 94
94 Chapter 6 LAN screens
DNS servers
Use the LAN IP screen to configure the DNS server information that the Business
Secure Router sends to the DHCP client devices on the LAN.
LAN TCP/IP
The Business Secure Router has built in DHCP server capability that assigns IP
addresses and DNS servers to systems that support DHCP client capability.
Factory LAN defaults
The LAN parameters of the Business Secure Router are preset in the factory with
the following values:
•IP address of 192.168.1.1 with subnet mask of 255.255.255.0 (24 bits)
•DHCP server enabled with 126 client IP addresses starting from 192.168.1.2.
RIP setup
NN47922-500
These parameters work for the majority of installations. If your ISP gives you
explicit DNS server addresses, read the embedded WebGUI help regarding which
fields need to be configured.
RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to
exchange routing information with other routers. RIP Direction controls the
sending and receiving of RIP packets. When set to Both or Out Only, the
Business Secure Router broadcasts its routing table periodically. When set to Both
or In Only, it incorporates the RIP information that it receives; when set to None,
it does not send any RIP packets and ignores any RIP packets received.
RIP Version controls the format and the broadcasting method of the RIP packets
that the Business Secure Router sends (it recognizes both formats when
receiving). RIP-1 is universally supported; but RIP-2 carries more information.
RIP-1 is probably adequate for most networks, unless you have an unusual
network topology.
Page 95
Both RIP-2B and RIP-2M send routing data in RIP-2 format; the difference
being that RIP-2B uses subnet broadcasting while RIP-2M uses multicasting.
Multicasting can reduce the load on nonrouter machines since they generally do
not listen to the RIP multicast address and so do not receive the RIP packets.
However, if one router uses multicasting, then all routers on your network must
use multicasting, also.
By default, RIP Direction is set to Both and RIP Version to RIP-1.
Multicast
Traditionally, IP packets are transmitted in one of two ways—Unicast (1 sender-1
recipient) or Broadcast (1 sender-everybody on the network). Multicast delivers
IP packets to a group of hosts on the network—not everybody and not just 1.
IGMP (Internet Group Multicast Protocol) is a network layer protocol used to
establish membership in a Multicast group—it is not used to carry user data.
IGMP version 2 (RFC 2236) is an improvement over version 1 (RFC 1112) but
IGMP version 1 is still in wide use. If you want to read more detailed information
about interoperability between IGMP version 2 and version 1, see sections 4 and 5
of Internet Group Management Protocol (RFC 2236). The class D IP address is
used to identify host groups and can be in the range 224.0.0.0 to 239.255.255.255.
The address 224.0.0.0 is not assigned to any group and is used by IP multicast
computers. The address 224.0.0.1 is used for query messages and is assigned to
the permanent group of all IP hosts (including gateways). All hosts must join the
224.0.0.1 group in order to participate in IGMP. The address 224.0.0.2 is assigned
to the multicast routers group.
Chapter 6 LAN screens 95
The Business Secure Router supports both IGMP version 1 (IGMP-v1) and
IGMP version 2 (IGMP-v2). At start up, the Business Secure Router queries all
directly connected networks to gather group membership. After that, the Business
Secure Router periodically updates this information. IP multicasting can be
enabled or disabled on the Business Secure Router LAN, WAN or both interfaces
in the WebGUI (LAN; WAN ). Select None to disable IP multicasting on these
interfaces.
Nortel Business Secure Router 222 Configuration — Basics
IP Pool Starting AddressThis field specifies the first of the contiguous addresses in
Pool SizeThis field specifies the size, or count, of the IP address pool.
DNS Servers Assigned by
DHCP Server
2131 and RFC 2132) individual clients (workstations) can
obtain TCP/IP configuration at startup from a server. Unless
you are instructed by your ISP, leave this field set to
Server. When configured as a server, the Business Secure
Router provides TCP/IP configuration for the clients. When
set as a server, fill in the IP Pool Starting Address and Pool Size fields.
Select Relay to have the Business Secure Router forward
DHCP requests to another DHCP server. When set to
Relay, fill in the DHCP Server Address field.
Select None to stop the Business Secure Router from
acting as a DHCP server. When you select None, you must
have another DHCP server on your LAN, or else the
computers must be manually configured.
the IP address pool. The default is 192.168.1.2.
The default is 126.
The Business Secure Router passes a DNS (Domain Name
System) server IP address (in the order you specify here) to
the DHCP clients. The Business Secure Router only passes
this information to the LAN DHCP clients when you select
the DHCP Server check box. When you clear the DHCP Server check box, DHCP service is disabled and you must
have another DHCP sever on your LAN, or else the
computers must have their DNS server addresses manually
configured.
Nortel Business Secure Router 222 Configuration — Basics
Page 98
98 Chapter 6 LAN screens
Tabl e 1 4 LAN IP
LabelDescription
First DNS Server
Second DNS Server
Third DNS Server
LAN TCP/IP
IP AddressType the IP address of your Business Secure Router in
IP Subnet Mask The subnet mask specifies the network number portion of
RIP DirectionWith RIP (Routing Information Protocol, RFC 1058 and
Select From ISP if your ISP dynamically assigns DNS
server information (and the Business Secure Router's WAN
IP address). The field to the right displays the (read-only)
DNS server IP address that the ISP assigns.
Select User-Defined if you have the IP address of a DNS
server. Enter the DNS server's IP address in the field to the
right.
Select DNS Relay to have the Business Secure Router act
as a DNS proxy. The Business Secure Router's LAN IP
address displays in the field to the right (read-only). The
Business Secure Router tells the DHCP clients on the LAN
that the Business Secure Router itself is the DNS server.
When a computer on the LAN sends a DNS query to the
Business Secure Router, the Business Secure Router
forwards the query to the Business Secure Router's system
DNS server (configured in the SYSTEM General screen)
and relays the response to the computer. You can only
select DNS Relay for one of the three servers.
Select None if you do not want to configure DNS servers. If
you do not configure a DNS server, you must know the IP
address of a machine in order to access it.
an IP address. Your Business Secure Router automatically
calculates the subnet mask based on the IP address that
you assign. Unless you are implementing subnetting, use
the subnet mask computed by the Business Secure Router
255.255.255.0.
RFC 1389) a router can exchange routing information with
other routers. The RIP Direction field controls the sending
and receiving of RIP packets. Select the RIP direction from
Both/In Only/Out Only/None. When set to Both or Out
Only, the Business Secure Router broadcasts its routing
table periodically. When set to Both or In Only, it
incorporates the RIP information that it receives; when set
to None, it does not send any RIP packets and ignores any
RIP packets received. None is the default.
NN47922-500
Page 99
Tabl e 1 4 LAN IP
LabelDescription
Chapter 6 LAN screens 99
RIP VersionThe RIP Version field controls the format and the
Multicast Select IGMP V-1 or IGMP V-2 or None. IGMP (Internet
Windows Networking (NetBIOS over TCP/IP)
Allow between LAN and
WAN
ApplyClick Apply to save your changes to the Business Secure
ResetClick Reset to begin configuring this screen afresh.
broadcasting method of the RIP packets that the Business
Secure Router sends (it recognizes both formats when
receiving). RIP-1 is universally supported but RIP-2 carries
more information. RIP-1 is probably adequate for most
networks, unless you have an unusual network topology.
Both RIP-2B and RIP-2M sends the routing data in RIP-2
format; the difference being that RIP-2B uses subnet
broadcasting while RIP-2M uses multicasting. Multicasting
can reduce the load on nonrouter machines since they
generally do not listen to the RIP multicast address and so
does not receive the RIP packets. However, if one router
uses multicasting, then all routers on your network must use
multicasting, also. By default, RIP direction is set to Both
and the Version set to RIP-1.
Group Multicast Protocol) is a network layer protocol used
to establish membership in a Multicast group—it is not used
to carry user data. IGMP version 2 (RFC 2236) is an
improvement over version 1 (RFC 1112) but IGMP version
1 is still in wide use. If you want to read more detailed
information about interoperability between IGMP version 2
and version 1, see sections 4 and 5 of
Management Protocol
Select this check box to forward NetBIOS packets from the
LAN to the WAN and from the WAN to the LAN. If your
firewall is enabled with the default policy set to block WAN
to LAN traffic, you also need to enable the default WAN to
LAN firewall rule that forwards NetBIOS traffic.
Clear this check box to block all NetBIOS packets going
from the LAN to the WAN and from the WAN to the LAN.
This field does the same as the Allow between WAN and LAN field in the WAN IP screen. Enabling one automatically
enables the other.
Router.
(RFC 2236).
Internet Group
Nortel Business Secure Router 222 Configuration — Basics
Page 100
100 Chapter 6 LAN screens
Configuring Static DHCP
With Static DHCP, you can assign IP addresses on the LAN to specific individual
computers based on their MAC Addresses.
Every Ethernet device has a unique MAC (Media Access Control) address. The
MAC address is assigned at the factory and consists of six pairs of hexadecimal
characters, for example, 00:A0:C5:00:00:02.
To change your Business Secure Router’s Static DHCP settings, click LAN, then
the Static DHCP tab. The screen appears as shown in Figure 20.
Figure 20 Static DHCP
NN47922-500
Table 1 5 describes the fields in Figure 20.
Tabl e 1 5 Static DHCP
LabelDescription
#This is the index number of the Static IP table entry (row).
MAC AddressType the MAC address (with colons) of a computer on your LAN.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.