This publication may not be reproduced, in whole or in part, without prior expressed written permission from Multi-Tech
Systems, Inc. All rights reserved.
The links we have provided in this manual to other company Web sites cannot be not guaranteed. They are active at the
time of publication, but cannot be guaranteed for any extended period of time.
Record of Revisions
Revision Date Description
A 01/30/04First release for the RF760VPN. The guide combines the RF600VPN and the
RF660VPN user information.
B 11/01/04 & New software – version 3.20 and
01/25/05 New software – version 3.21. POP3 Proxy new. New Rescue Kernel section.
C 04/19/05 New software – Version 3.23 (one new field on the SMTP SPAM screen and one new
field on the Packet Filters > Advanced screen).
D 11/22/05 New software – Version 3.25. A System Scheduler was added to Administration. A User
Authentication section was added to the Proxy > HTTP Proxy screen. A Remote SMTP
Virus Quarantine section was added to Proxy > SMTP Proxy. Maximum Mail Size
Allowed and Message Filtering added to Proxy >SMTP Proxy > SMTP SPAM Filtering.
Remote POP3 Virus Protection section was added to Proxy > POP3 Proxy. A Message
Filtering section was added to Proxy > POP3 Proxy > POP3SPAM Filtering. Adaptive
Message Database Backup was added to the Tracking > Backup screen. The screen
for Statistics & Logs > HTTP Access has been enhanced.
Hardware change: new compact flash.
Patents
This device is covered by one or more of the following U.S. Patent Numbers: 6,219,708; 5,301,274; 5,309,562; 5,355,365;
5,355,653; 5,452,289; 5,453.986.
The modem is covered by one or more of the following U.S. Patent Numbers: 6,031,867; 6,012,113; 6,009,082; 5,905,794;
5,864,560; 5,815,567; 5,815,503; 5,812,534; 5,809,068; 5,790,532; 5,764,628; 5,764,627; 5,754,589; D394,250; 5,724,356;
5,673,268; 5,673,257; 5,644,594; 5,628,030; 5,619,508; 5,617,423; 5,600,649; 5,592,586; 5,577,041; 5,574,725; D374,222;
5,559,793; 5,546,448; 5,546,395; 5,535,204; 5,500,859; 5,471,470; 5,463,616; 5,453,986; 5,452,289; 5,450,425; D361,764;
D355,658; D355,653; D353,598; D353,144; 5,355,365; 5,309,562; 5,301,274 Other Patents Pending
Trademarks
Trademarks of Multi-Tech Systems, Inc.: Multi-Tech, the Multi-Tech logo, and RouteFinder.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
Kaspersky Anti-Virus engine copyright by Kaspersky Labs. Surfcontrol is the registered product of Surfcontrol PLC.
All products or technologies are the trademarks or registered trademarks of their respective holders.
Technical Support
Country By Email By Phone
France: support@multitech.fr (33) 1-64 61 09 81
India: support@multitechindia.com 91 (124) 6340778
U.K.: support@multitech.co.uk (44) 118 959 7774
U.S. and Canada: support@multitech.com (800) 972-2439
Rest of the World: support@multitech.com (763) 717-5863
World Headquarters
Multi-Tech Systems, Inc.
2205 Woodale Drive
Mounds View, Minnesota 55112
(763) 785-3500 or (800) 328-9717
Fax 763-785-9874
Internet Address: http://www.multitech.com
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 2
Table of Contents
Contents
Chapter 1 – Product Description, Features, and Overview............................................................................... 7
Features ............................................................................................................................................................................ 7
Safety Recommendations for Rack Installations ............................................................................................................. 11
RouteFinder Front Panels................................................................................................................................................ 12
RF760/660VPN Front Panel ...................................................................................................................................12
RouteFinder Back Panels ................................................................................................................................................ 14
RF760VPN Back Panel ..........................................................................................................................................14
RF660VPN Back Panel ..........................................................................................................................................14
RF600VPN Back Panel ..........................................................................................................................................14
The Firewall ............................................................................................................................................................17
Network Components That Work with the Firewall .................................................................................................17
Planning and Establishing the Corporate Security Policy .......................................................................................21
Planning the Network..............................................................................................................................................22
Establishing an Address Table ...............................................................................................................................22
System Administrator Required Planning ........................................................................................................................ 22
Setting up a Workstation and Starting the RouteFinder VPN .......................................................................................... 24
Navigating Through the Screens ..................................................................................................................................... 26
Menus and Sub-Menus...........................................................................................................................................27
Second Configuration Step.............................................................................................................................................. 29
The Wizard Setup Screen................................................................................................................................................ 30
Menu Bar ......................................................................................................................................................................... 42
Administration > System Setup...............................................................................................................................43
Administration > Site Certificate..............................................................................................................................49
Administration > System Scheduler........................................................................................................................54
General Information About Proxies.........................................................................................................................65
Proxy > DNS Proxy.................................................................................................................................................82
Change Your Country/Region Code .......................................................................................................................86
DHCP Server > Subnet Settings.............................................................................................................................94
DHCP Server > Fixed Addresses ...........................................................................................................................94
Tracking > Version Control ...................................................................................................................................100
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 4
Introduction to Virtual Private Networks................................................................................................................106
Statistics and Logs > Hardware ............................................................................................................................117
Statistics and Logs > Networks.............................................................................................................................118
Chapter 7 – User Authentication Methods...................................................................................................... 130
Proxy Services and Authentication Methods ........................................................................................................130
Which Method Should You Choose? ....................................................................................................................130
Setting Up RADIUS Authentication.......................................................................................................................131
Setting Up A Microsoft IAS RADIUS Server .........................................................................................................131
Setting Up NT/2000 SAM (SMB) Authentication...................................................................................................132
II. Inbound Access Log .................................................................................................................................................. 143
III. Outbound Access Log .............................................................................................................................................. 145
IV. Access Requests through Firewall Dropped ............................................................................................................ 146
V. Access Requests to Firewall Dropped....................................................................................................................... 146
VI. Administrative Authentication Logs .......................................................................................................................... 147
VII. Admin Port Access Log ........................................................................................................................................... 147
VIII. Startup History Log................................................................................................................................................. 147
IX. User Log................................................................................................................................................................... 147
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 5
XI. ICMP Information ..................................................................................................................................................... 148
Appendix B – The RouteFinder Rescue Kernel.............................................................................................. 149
Method 1 – How to Perform the Install Using No External Server ................................................................................. 150
Method 2 – How to Perform the Install Using an External FTP Server .......................................................................... 151
Method 3 – How to Perform the Install If the Other Methods Fail or If the File Systems Are Corrupted ........................ 152
Overnight Replacement Service .................................................................................................................................... 156
Appendix D – CD-ROM Drive Adapter and Pin Out ....................................................................................... 157
CD-ROM Drive Adapter Pin Out ...........................................................................................................................157
Appendix E – RouteFinder Maintenance ........................................................................................................158
Appendix F – Ordering Accessories ............................................................................................................... 160
Appendix G – Technical Support..................................................................................................................... 161
Technical Support Contacts........................................................................................................................................... 161
Index ................................................................................................................................................................... 186
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 6
Chapter 1 – Product Description, Features, and Overview
Chapter 1 – Product Description,
Features, and Overview
Your Multi-Tech Systems, Inc. RouteFinder Internet security appliance is an integrated VPN gateway/firewall designed to
maximize network security without compromising network performance. It uses data encryption, user authentication, and the
Internet to securely connect telecommuters, remote offices, customers, and suppliers to the corporate office while avoiding
the cost of private leased lines or dial-up charges.
Product Description
All three RouteFinder models provide advanced network firewall (Stateful Packet Inspection and NAT), application firewall
(DMZ, proxies, filter, optional email anti-virus protection), VPN gateway (IPSec, PPTP, 3DES, authentication), and full router
capabilities. Their Ethernet ports provide connectivity to your network, to the Internet access via router, DSL, cable or
dedicated line, and to the DMZ.
The RouteFinder’s DMZ port permits connecting of Voice over IP gateways, like MultiVOIPs, and public servers such as
email and Web to be safely connected. And its full-featured router hardware allows the entire network to share an Internet
link by connecting to an existing cable modem, DSL modem, or router.
An optional email anti-virus update product offered by Multi-Tech with your RouteFinder purchase includes protection against
new virus types and security gaps with automatically transferred updates.
The browser-based interface eases VPN configuration and management. The VPN functionality is based on the IPSec and
PPTP protocols and uses Triple DES 168-bit encryption to ensure that your information remains private. In addition, the
RF760/660VPN includes firewall security utilizing Stateful Packet Inspection and optional email anti-virus protection.
The RouteFinder VPNs can be used on the desktop or mounted in racks.
Features
• Supports IPSec and PPTP VPN tunneling
• Utilizes 168-bit Triple Data Encryption Standard (3DES)
protection, and content filtering in one box. It is a cost-effective, easy to manage solution that is ideal for the small to medium
business looking to add one or all of the following applications to their network:
Remote User VPN. The client-to-LAN VPN application replaces traditional dial-in remote access by allowing a remote user
to connect to the corporate LAN through a secure tunnel over the Internet. The advantage is that a remote user can make a
local call to an Internet Service Provider, without sacrificing the company’s security, as opposed to a long distance call to the
corporate remote access server.
Branch Office VPN. The LAN-to-LAN VPN application sends network traffic over the branch office Internet connection
instead of relying on dedicated leased line connections. This can save thousands of dollars in line costs and reduce overall
hardware and management expenses.
Firewall Security. As businesses move toward always-on broadband Internet connections, the network becomes more
vulnerable to Internet hackers. The RouteFinder provides a full-featured Stateful Packet Inspection firewall to provide
security from intruders attempting to access the office LAN.
Email Anti-Virus Protection. An optional email virus protection subscription ensures the network is protected against the
latest virus outbreaks.
Content Filtering. A free, one-year URL content filtering subscription allows you to automatically manage what Web content
is available.
Plug-and-Play Security Appliance. The RouteFinder plugs in at the Internet connection of each office. It provides three
independent network interfaces (LAN, WAN and DMZ) that separate the protected office network from the Internet while
offering an optional public network for hosting Web, e-mail, or ftp servers. Each network interface is independently monitored
and visually displayed on the front of the RouteFinder.
Secure VPN Connections. The RouteFinder uses IPSec and PPTP industry standard protocols, data encryption, user
authentication, and the Internet to provide high-performance, secure VPN connections. For LAN-to-LAN connectivity, the
RouteFinder utilizes the IPSec protocol with strong 168-bit 3DES encryption using IKE and PSK key management. In
addition, it provides very high performance with 15M bps (RF660VPN) of 3DES encryption throughput. The RF600VPN = 3M
bps and the RF760VPN = 50M bps. For client-to-LAN connectivity, Multi-Tech provides optional IPSec client software. The
RouteFinder also supports remote users that want to use the PPTP VPN client built into the Windows operating system. This
provides 40-bit or 128-bit encryption, user name and password authentication.
State-of-the-Art Firewall Security. The RouteFinder provides network layer security utilizing Stateful Packet Inspection, the
sophisticated firewall technology found in large enterprise firewalls, to protect the network against intruders and Denial of
Service (DoS) attacks. It also uses Network Address Translation (NAT) to hide internal, non-routable IP addresses and
allows internal hosts with unregistered IP addresses to function as Internet-reachable servers. In addition to network layer
security, it provides application level security using SMTP, HTTP, DNS, and SOCKS proxies. The RouteFinder also utilizes
filters to block specific Internet content to protect against viruses, dangerous ActiveX controls, Java, Javascript, and Cookies.
An automatic update feature provides the highest level of security by automatically downloading and installing the latest
system software and security patches protecting against any newly discovered hacker attacks with a single click.
Content Filtering. The RouteFinder includes a one-year URL content filtering subscription. It utilizes SurfControl® content
categorization list, the world's largest database of Internet content, which includes 5 million Web sites covering over 900
million Web pages. Daily updates of categorized sites are available for download. In addition, it includes URL Access and
Deny Reporting. The subscription can easily be renewed on an annual basis.
Automatic Dial Backup. The RouteFinder provides a serial port that, when connected to a dial-up modem or ISDN terminal
adapter, can serve as a backup resource for Internet access and VPN tunneling if your cable or DSL service goes down. In
addition to the serial port, the RouteFinder RF660VPN and RF760VPN models include a built-in modem.
Optional VPN Client Software. Multi-Tech provides an easy-to-use IPSec VPN client software that transparently secures
Internet communications anytime, anywhere. VPN client software is ideal for business users who travel frequently or work
from home. It provides secure remote access through the RouteFinder VPN gateway for applications such as remote
access, file transfer, e-mail, Web browsing, messaging or IP telephony. Encryption and authentication operations are
completely transparent to the end user. In general, IPSec provides stronger encryption than PPTP resulting in better overall
security.
Comprehensive Service and Support. The Multi-Tech commitment to service means we provide a two-year product
warranty and service that includes telephone technical support, 24-hour web site and FTP support.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 8
Chapter 1 – Product Description, Features, and Overview
E-mail Anti-Virus Protection. Computer viruses are one of the leading security threats to Internet-connected networks.
Users can unknowingly download and launch dangerous viruses that can damage data or cause computer crashes. Viruses
can also be used as delivery mechanisms for hacking tools, compromising the security of the network, even if a firewall is
installed. An optional e-mail virus protection subscription utilizes a high-performance, ICSA-tested, anti-virus engine which
checks both incoming and outgoing e-mail for viruses in real-time. Automatic anti-virus updates are downloaded at userdefined intervals to ensure protection is current. The e-mail anti-virus protection can be easily renewed on an annual basis.
Ask about our free 30-day evaluation.
User Authentication. To increase the level of security, user identity can be verified before access to Internet services is
permitted. The RouteFinder supports authentication at a local user database as well as at external user databases, like
Windows 2000 or Radius server.
Robust, Easy-to-Use Management. The RouteFinder includes robust management support allowing a network
administrator to securely manage the devices either through a web browser or at the command line. The browser-based
option uses the HTTP or HTTPS protocol, also known as SSL (Secure Sockets Layer) to provide 128-bit encryption to
secure the management session. The command line interface is accessible via SSH (Secure Shell) and supports SCP
(Secure Copy).
Reporting. The RouteFinder also includes a suite of integrated monitoring and reporting tools that help administrators
troubleshoot the Internet security system and report to management the usage of the Internet. This includes reporting on
system uptime, hardware, and network utilization. HTTP and SMTP proxy reports provide information about any actions
needed to handle virus-infected e-mails. The RouteFinder also disables and logs attempted port scans. In addition, it
provides accounting reports and a self-monitor that sends an e-mail notification of system-level issues.
Ship Kit Contents
The RouteFinder VPN is shipped with the following:
• One Multi-Tech Systems, Inc. RouteFinder VPN
• One Power Cord
• One printed Quick Start Guide
• One external power supply for the RF600VPN
Note: The power supply for the RF660VPN and RF760VPN is internal
• Two Rack Mounting Brackets and four mounting screws
• One RouteFinder VPN documentation CD which contains documentation, license agreements, Adobe Acrobat
Reader, and License keys
•One RouteFinder VPN Software Recovery CD
Note
If any of these items are missing, contact Multi-Tech Systems or your dealer or distributor. Inspect the contents for signs of
any shipping damage. If damage is observed, do not power up the RouteFinder VPN; contact Technical Support at MultiTech Systems, Inc. for advice.
Software Recovery CD Warning
Do not use the Software Recovery CD for any purpose except for re-installing software onto the RouteFinder VPN hard
drive.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 9
Chapter 1 – Product Description, Features, and Overview
License Keys
System License Key
Each RouteFinder VPN ships with a unique individual system License Key, a 20-digit alphanumeric number.
You can enter and view License Key information from the RouteFinder's Web Management software at Administration > License Key > Open System License Key. This screen shows the entered License Key number and indicates
whether it is a valid License Key number.
The License Key number is tied to and tracked with your RouteFinder's serial number. Whenever you require additional
licenses, you must first provide Multi-Tech with your current License Key and serial number information in order for us to
update your RouteFinder. With a valid License Key, you are entitled to use Multi-Tech’s Update service and support.
What to Do if a Trial License Key Expires
If the license key is a trial key, after expiry of the license period, the WAN interface of the RouteFinder will shut down. If
the DHCP client or PPPoE is enabled, they will be disabled. The user can connect to the RouteFinder through the LAN
interface and enter another valid license key to proceed further. The user has to manually enable the DHCP client /
PPPoE after entering another valid license key.
URL Categorization License Key
An 11-digit numeric key Universal Resource Locator (URL) Categorization License Key is also shipped with your
RouteFinder. This Key allows you to set up a URL database that limits clients’ access to places on the Internet by
blocking sites you do not want accessed. In other words, you can deny users access to various categories of Web sites
you select.
AntiVirus License Key
AntiVirus software with its corresponding License Key is available as a special purchase from Multi-Tech.
Where to Find the License Key Number Label
License Key numbers are printed on labels and are located:
• On the bottom of the RouteFinder chassis
• On the hard drive inside the chassis
• On the front cover of the Quick Start Guide.
Additional RouteFinder Documentation
These additional RouteFinder reference documents are included on the system CD and are also posted on the Multi-Tech
Web site.
1. The RouteFinder configured with DNAT and aliases.
2. Setting up a PPTP server and a PPTP remote client.
3. The VPN tunnel configured for manual mode example and IPSec pass-through in manual mode example.
4. A quick start guide for the add-on product IPSec SSH client.
5. Hard-Disk Drive Recovery.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 10
Chapter 1 – Product Description, Features, and Overview
Safety Warnings
Lithium Battery Caution
Danger of explosion if battery is incorrectly replaced. A lithium battery on the RouteFinder VPN PC board provides
backup power for the time-keeping capability. The battery has an estimated life expectancy of ten years. When it starts
to weaken, the date and time may be incorrect. If the battery fails, send the board back to Multi-Tech for battery
replacement.
Ethernet Ports Caution
The Ethernet ports are not designed to be connected to a Public Telecommunication Network.
Software Recovery CD Warning
Do not use the Software Recovery CD for any purpose except for re-installing software onto the RouteFinder VPN hard
drive.
Telecom Warnings for Modem
• Never install telephone wiring during a lightning storm.
• Never install telephone jacks in a wet location unless the jack is specifically designed for wet locations.
• This product is to be used with UL and cUL listed computers.
• Never touch uninsulated telephone wires or terminals unless the telephone line has been disconnected at the
network interface.
•Avoid using a telephone during an electrical storm. There may be a remote risk of electrical shock from
lightening.
• Do not use the telephone to report a gas leak in the vicinity of the leak.
• To reduce the risk of fire, use only No. 26 AWG or larger Telecommunications line cord.
Safety Recommendations for Rack Installations
Ensure proper installation of the ROUTEFINDER in a closed or multi-unit enclosure by following the recommended
installation as defined by the enclosure manufacturer. Do not place the ROUTEFINDER directly on top of other equipment
or place other equipment directly on top of the ROUTEFINDER.
If installing the ROUTEFINDER in a closed or multi-unit enclosure, ensure adequate airflow within the rack so that the
maximum recommended ambient temperature is not exceeded.
Ensure that the ROUTEFINDER is properly connected to earth ground via a grounded power cord. If a power strip is used,
ensure that the power strip provides adequate grounding of the attached apparatus.
Ensure that the main supply circuit is capable of handling the load of the ROUTEFINDER. Refer to the power label on the
equipment for load requirements.
Maximum ambient temperature for the ROUTEFINDER is 50 degrees Celsius (120° F).
This equipment should only be installed by properly qualified service personnel.
Connect like circuits. In other words, connect SELV (Secondary Extra Low Voltage) circuits to SELV circuits and TN
(Telecommunications Network) circuits to TN circuits.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 11
Chapter 1 – Product Description, Features, and Overview
RouteFinder Front Panels
RF760/660VPN Front Panel
The R760VPN and the RF660VPN have 16 LEDs that show device and network operating status.
For the RF760VPN, these LEDs are labeled 10/100/1G.
• When 10, the LED is Off.
• When 100, the LED is Green.
• When 1G, the LED is Orange.
RF760 / 660VPN LED Descriptions
LAN LEDs Description
LINK
ACT
100MB or
10/100/1G
WAN LEDs Description
LINK
ACT
100MB or
10/100/1G
DMZ LEDs Description
LINK
ACT
100MB or
10/100/1G
Modem Description of Modem LEDs
DCD
RD
DTR
TD
System Description of System LEDs
HDD ACT
ALERT
POWER
LAN LINK LED - Indicates link integrity for the LAN Ethernet port. If the Ethernet link is valid at 10 Mbps,
100 Mbps, or 1G (RF760VPN) the LINK LED is lit. If the Ethernet link is invalid, the LINK LED is off.
ACT (Activity) LED - Indicates transmit and receive activity on the LAN Ethernet port. When activity is
present on the LAN Ethernet port, the ACT LED is lit. When no activity is present on the LAN Ethernet
port, the ACT LED is off.
For the RF760VPN: If the Ethernet link is valid at 10 Mbps, the LAN LED is off. If the Ethernet link is
valid at 100 Mbps, the LED is green. If the Ethernet link is valid at 1G, the LED is orange.
For the RF660VPN: The LAN 100MB LED is lit if the LAN Ethernet port is linked at 100 Mbps. The
LAN 100 MB LED is off at 10 Mbps.
WAN LINK LED - Indicates link integrity for the WAN Ethernet port. If the link is valid in either 10 Mbps,
100 Mbps, or 1G (760VPN), the LINK LED is on; if the WAN Ethernet link is invalid, the LINK LED is off.
WAN ACT (Activity) LED - Indicates either transmit or receive activity on the WAN Ethernet port. When
activity is present, the ACT LED is on; when no activity is present, the ACT LED is off.
For the RF760VPN: If the Ethernet link is valid at 10 Mbps, the LED is off. If the Ethernet link is valid at
100 Mbps, the LED is green. If the Ethernet link is valid at 1G, the LED is orange.
For the RF660VPN: The 100MB LED is lit if the LAN Ethernet port is linked at 100 Mbps. The 100 MB
LED is off at 10 Mbps.
DMZ LINK LED - Indicates link integrity for the DMZ Ethernet port. If the link is valid in either 10 Mbps,
100 Mbps, or 1G (760VPN) the LINK LED is on; if the DMZ Ethernet link is invalid, the LINK LED is off.
ACT (Activity) LED - Indicates either transmit or receive activity on the DMZ Ethernet port. When activity
is present, the ACT LED is lit. When no DMZ Ethernet port activity is present, the ACT LED is off.
For the RF760VPN: If the Ethernet link is valid at 10 Mbps, the LED is off. If the Ethernet link is valid at
100 Mbps, the LED is green. If the Ethernet link is valid at 1G, the LED is orange.
For the RF660VPN: The 100MB LED is lit if the LAN Ethernet port is linked at 100 Mbps. The 100 MB
LED is off at 10 Mbps.
DCD (Data Carrier Detect) LED - Lights when the modem detects a valid carrier signal from another
modem; on when the modem is communicating with the other modem and off when the link is broken.
RD (Read Data) LED - Flashes when the modem is receiving data from another modem.
DTR (Data Terminal Ready) LED - Lights when the operating system detects and initializes the modem.
TD (Transmit Data) LED - Flashes when the modem is transmitting data to another modem.
HDD ACT (Hard Disk Drive Activity) LED - Lights when the hard disk drive is accessed.
ALERT LED - Not used.
POWER LED - Off when the RouteFinder is in a reset state. When lit, the RouteFinder is not in a reset
state.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 12
Chapter 1 – Product Description, Features, and Overview
RF600VPN
The RF600VPN has 12 front panel LEDs that show the network operating status.
General LED Descriptions
POWER
STATUS
HDD ACT
LAN, WAN, DMZ LED Descriptions
10MB
ACT
100MB
POWER LED - Off when the RF600VPN is in a reset state. When the POWER LED is lit, the
RF600VPN is not in a reset state.
STATUS LED - Off when the RF600VPN is booting up.
HDD ACT (Hard Disk Drive Activity) LED - Lights when the RF600VPN hard disk drive is accessed.
10MB LED - Lights when the LAN client has a valid link at 10MB.
ACT (Activity) LED - Indicates either transmit or receive activity on the LAN Ethernet port. When
activity is present on the LAN Ethernet port, the ACT LED is lit. When no activity is present on the
LAN Ethernet port, the ACT LED is off.
100MB LED - Lights when the LAN client has a valid link at 100MB.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 13
Chapter 1 – Product Description, Features, and Overview
RouteFinder Back Panels
RF760VPN Back Panel
The RF760VPN back panel has three fans, a power plug, a POWER Switch (| / O), an RJ-11 LINE jack, a DB-9 COM1 jack,
a DB-15 High-density DSUB (VIDEO) jack, a keyboard jack, an Ethernet 10/100/1000 DMZ Port, and an Ethernet
10/100/1000 WAN Port, and an Ethernet 10/100/1000 LAN Port.
RF660VPN Back Panel
The RF660VPN back panel has a fan, a power plug, the POWER Switch (| / O), an RJ-11 LINE jack, a DB-9 COM1 jack, a
DB-15 High-density DSUB (VIDEO) jack, two USB (Revision 1.1 compliant) jacks, an RJ-45 DMZ jack, an RJ-45 (WAN)
jack, and an RJ-45 (LAN) jack.
RF600VPN Back Panel
The RF600VPN back panel has a DB-9 COM1 jack, a DB-15 High-density DSUB (VIDEO) jack, a keyboard jack, an RJ-45
DMZ jack, an RJ-45 WAN jack, an RJ-45 LAN jack, and a POWER jack.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 14
Chapter 1 – Product Description, Features, and Overview
Recommended Number of
Tunnels (IPSec)
Recommended Number of
Tunnels (PPTP)
Firewall Features RF760VPN RF660VPN RF600VPN
Throughput
Anti-Virus Option
Content Filtering
Application Proxies
Port and IP Filtering
Denial of Service Protection
(DoS)
Stateful Packet Inspection
Network Address Translation
(NAT)
Virtual Server
Port Scan
Intrusion Detection/Notification
H.323 Pass Through
Management Features RF760VPN RF660VPN RF600VPN
Email Alert
Local & Remote Management
Logging
Reporting
Web Based (HTTP, HTTPS/SSL)
Secure Shell (SSH)
Syslog
Other Features RF760VPN RF660VPN RF600VPN
Shared Internet Access
Automatic Dial-Backup
Integrated Modem
PPPoE
DHCP Client/Server
User Authentication
Automatic Firmware Downloads
Warranty
3x10/100/1000BaseT
(LAN,WAN, DMZ)
Unlimited Unlimited Unlimited
Both Both Both
32° to 120° F (0-50°C)
Humidity: 25-85%
noncondensing
FCC Part 68
FCC Part 15 (Class A)
CE Mark
UL60950
ICSA Firewall Certified
Dimensions:
17" w × 1.75" h × 10.5" d;
(43.18cm × 4.45cm ×
26.67cm)
Weight: 10 lbs. (4.54 kg)
Temperature Range:
32° to 120° F (0-50°C)
Humidity: 25-85%
noncondensing
FCC Part 68
FCC Part 15 (Class A)
CE Mark
UL60950
ICSA Firewall Certified
Dimensions:
12" w × 1.7" h × 8" d;
(30.4cm × 4.4cm ×
20.3cm)
Weight: 5.8 lbs. (2.6 kg)
Temperature Range:
32° to 120° F (0-50°C)
Humidity: 25-85%
noncondensing
FCC Part 68
FCC Part 15 (Class A)
CE Mark
UL60950
ICSA Firewall Certified
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 16
Chapter 1 – Product Description, Features, and Overview
Overview of RouteFinder VPN Technology
Before we look at how the RouteFinder works and how to use it, we will illustrate why the RouteFinder is necessary for the
protection of networks, as well as show which problems and risks exist without an appropriate security system.
Networks
The systems in the global network communicate via the Internet Protocol Family (IP), including TCP, UDP, or ICMP. The IP
addresses are the basis of this communication. They identify all available units within the network.
The Internet itself is actually just a collection of computer networks around the world of varying shape, size, and speed.
Where two or more networks join, a whole host of tasks arise, which are dealt with by routers, bridges, or gateways. A
special type of connection between two networks is called a firewall.
Generally speaking, three types of networks meet at the firewall:
1. External network/Wide Area Network (WAN)
2. Internal Network/Local Area Network (LAN)
3. De-Militarized Zone (DMZ)
The Firewall
The characteristic tasks of a firewall as a connection between WAN, LAN and DMZ are:
• Protection from unauthorized access
• Access control
• Ensure information integrity
• Perform analysis of protocols
• Alert the administrator of relevant network events
• Conceal internal network structure
• Decoupling of servers and clients via proxies
• Ensure confidentiality
There are several generic network components that, brought together under the heading Firewall, are responsible
for these tasks. The following sections provide a brief look at some of the forms and their derivatives.
Network Components That Work with the Firewall
Network Layer Firewalls: Packet Filter
As the name suggests, the Packet Filter is where IP packets (consisting of address information, some flags, and the
payload) are filtered. With this kind of firewall you can grant or deny access to services, according to different
variables. Some of these variables are:
• The source address
• The target address
• The protocol (e.g. TCP, UDP, ICMP)
• The port number
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 17
Chapter 1 – Product Description, Features, and Overview
The great advantage of a network layer firewall is its independence of both the operating system and the
applications running on the machine.
In more complex network layer firewall implementations, the packet filtering process includes the interpretation of
the packet payload. The status of every current connection is analyzed and recorded. This process is called stateful
inspection.
The packet filter records the state of every connection and lets only those packets pass that meet the current
connection criteria. This is especially useful for establishing connections from a protected network to an unprotected
network.
If a system establishes a connection to a protected network, the Stateful Inspection Packet Filter lets a host’s
answer packet pass back into the protected network. If the original connection is closed, no system from the
unprotected network can send packets into the protected network any longer – unless you explicitly allow it.
Well Known Ports are controlled and assigned by the IANA, and on most systems, can only be used by system (or
root) processes or by programs run by privileged users. Ports are used in TCP (RFC793) to name the ends of
logical connections which carry long term conversations; and, typically, these same port assignments are used with
UDP (RFC768). The assigned ports are in the range 0-1023. IETF RFC 1700 provides a list of the well-known port
number assignments. IETF RFCs are available on the Internet from a number of sources.
Application Layer Gateways: Proxies
A second significant type of firewall is the application layer gateway. It is responsible for buffering connections
between exterior systems and your system. Here, the packets aren’t directly passed on, but a sort of translation
takes place, with the gateway acting as an intermediary stop and translator.
The application gateway buffering processes are called proxy servers, or, for short‚ proxies. Every proxy can offer
further security features for its designed task. Proxies generally offer a wide range of security and protocol options.
Each proxy serves only one or a few application protocols, allowing high-level security and extensive logging and
analysis of the protocol’s usage.
Examples of existing proxies are:
• The SMTP proxy - Responsible for email distribution and virus checking.
• The HTTP proxy - Supporting Java, JavaScript, ActiveX-Filter, and ad banner filtering.
• The SOCKS proxy (the generic circuit-level proxy) - Supporting applications such as FTP clients, ICQ,
IRC, or streaming media.
Application level gateways offer the advantage of physical and logical separation of the protected and unprotected
networks. They make sure that no packet is allowed to flow directly between networks, resulting in higher security.
Protection Mechanisms
Further mechanisms ensure added security. Specifically, the use of private IP addresses in combination with
Network Address Translation (NAT) in the form of:
• Masquerading
• Source NAT (SNAT)
• Destination NAT (DNAT)
These allow a whole network to hide behind one or a few IP addresses, preventing the identification of your network
topology from the outside.
With these protection mechanisms in place, Internet connectivity remains available, but it is no longer possible to
identify individual machines from the outside.
By using Destination NAT (DNAT), it is still possible to place servers within the protected network/DMZ and make
them available for an assigned service.
In the sample graphic above, a user with the IP 5.4.3.2, port 1111 sends a request to the Web server in the DMZ.
Of course, the user knows only the external IP (1.1.1.1, port 80). Using DNAT, the RouteFinder now changes the
external IP address to 10.10.10.99, port 80 and sends the request to the Web server. The Web server then sends
the answer with its IP address (10.10.10.99, port 80) and the user’s IP. The RouteFinder recognizes the packet by
the user address, and it then changes the internal IP (10.10.10.99, port 80) into the external IP address (1.1.1.1,
port 80).
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 18
Chapter 1 – Product Description, Features, and Overview
To satisfy today’s business world needs, the IT infrastructure must offer real-time communication and co-operate
closely with business partners, consultants, and branches. Increasingly, the demand for real-time capability is
leading to the creation of extranets that operate either:
• via dedicated lines, or
• unencrypted lines via the Internet
Each of these methods has advantages and disadvantages, as there is a conflict between the resulting costs and
the security requirements.
Virtual Private Networking (VPN) establishes secure (i.e., encrypted) connections via the Internet, an important
function especially if your organization operates at several locations that have Internet connections. These secure
connections use the IPSec standard derived from the IP protocol IPv6.
ISO Layers and TCP/IP
Once set up, this encrypted connection is used automatically (i.e., without extra configurations or passwords at the client
systems) regardless of the type of data that is to be transferred. This protects the content during the transport. At the
other end of the connection, the transferred data is transparently decoded and is available for the recipient in its original
form.
The RouteFinder VPN uses a hybrid of the above listed basic forms of firewalls and combines the advantages of both
variations: the stateful inspection packet. Stateful inspection packet filter functionality offers platform-independent
flexibility, and the ability to define, enable or disable all necessary services. Existing proxies make the RouteFinder an
application gateway that secures vital client system services, such as HTTP, Mail, and DNS by using a proxy. The
ROUTEFINDER also enables generic circuit-level proxy via SOCKS.
VPN, Source NAT, Destination NAT, masquerading, and the ability to define static routes make the dedicated firewall an
efficient distribution and checkpoint in your network.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 19
Typical Applications
Remote User VPN
The client-to-LAN VPN application
replaces traditional dial-in remote
access by allowing a remote user
to connect to the corporate LAN
through a secure tunnel over the
Internet. The advantage is that a
remote user can make a local call
to an Internet Service Provider,
without sacrificing the company’s
security, as opposed to a long
distance call to the corporate
remote access server.
Branch Office VPN
The LAN-to-LAN VPN application
sends network traffic over the
branch office Internet connection
instead of relying on dedicated
leased line connections. This can
save thousands of dollars in line
costs and reduce overall hardware
and management expenses.
Chapter 1 – Product Description, Features, and Overview
Firewall Security
As businesses shift from dial-up
or leased line connections to
always-on broadband Internet
connections, the network
becomes more vulnerable to
Internet hackers.
The RouteFinder VPN provides a
full-featured firewall based on
Stateful Packet Inspection
technology and NAT protocol to
provide security from intruders
attempting to access the office
LAN.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 20
Chapter 2 – Installation
Pre-Installation Planning
Chapter 2 – Installation
Planning and Establishing the Corporate Security Policy
Having an organization-wide security policy is the first, and perhaps most, important step in general security planning.
Organizations without a well-devised top-level security policy will not have ready answers to questions such as:
• Who is allowed access to which servers?
• Where are the backups stored?
• What is the recovery procedure for a security breach?
These questions must be answered in terms of security costs, usability, compatibility with internal "culture", and
alignment with your site's legal requirements.
Putting a security policy in place and keeping abreast of new security issues as they arise are paramount to securing
your network.
Contents of a Corporate Internet Security Policy
The policy statements should be clear, easy to understand, and supported by management.
All enterprises should have a carefully planned security policy that protects their network. Your security policy
should define both what should be protected as well as how it should be protected. A comprehensive, clear, and
well-communicated security policy is an important first step in protecting any network from the many threats
associated with the power of the Internet.
A corporate Internet security policy should cover at least 6 major areas, including:
1. Acceptable Use – Define the appropriate use of the network and other computing resources by any and all
users. This should include policy statements like: “password sharing is not permitted"; "users may not share
accounts"; and "users may not make copies of copyrighted software.”
2. Remote Access – Outline acceptable (and unacceptable) means of remotely connecting to the internal
network. Cover all
DSL, cable modem, Telnet, and others. Specify who
may obtain remote access. The security policy must also address who is allowed high-speed remote access
and any extra requirements associated with that privilege (e.g., all remote access via DSL requires that a
firewall be installed). You will also want to define users' email security here (e.g., in MS Outlook at Tools >
Options > Security > Zone Settings > Security Settings).
3. Information Protection – Provide guidelines to users that define the use and transmission of sensitive
information to ensure the protection of your enterprise’s key elements of information (e.g., set a standard for
encryption level (such as 3DES) for information sent over the Internet).
4. Firewall Management – Define how firewall hardware and software are managed. This includes change
requests and approval, periodic review of firewall configurations, and firewall access privilege settings.
5. Special Access – Provide guidelines for any special, non-standard needs for access to specialized networks
or systems.
6. Network Connection – Establish policies for adding new devices and new users to the network, with an
approval process, along with the associated security requirements.
of the possible ways that users remotely access the internal network, such as dial-in, ISDN,
is allowed to have remote access as well as how users
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 21
Chapter 2 – Installation
Planning the Network
Before installing, you should plan your network and decide which computer is to have access to which services. This
simplifies configuration and saves you a lot of time that you would otherwise need for corrections and adjustments.
Establishing an Address Table
Enter the configuration information (e.g., the IP addresses used, Net Mask addresses, and the Default Gateway) into the
appropriate field of the Address Table below. Please print this page and use it to fill in your specific ROUTEFINDER and
network information (e.g., the IP address used, email lists, etc.), and keep it for future reference.
Network Card connected
to the internal network
(LAN on eth0)
Network Card connected
to the external network
(WAN on eth1)
Network Card connected
to the DMZ
(eth2)
IP AddressNet MaskDefault Gateway
___.___.___.___
___.___.___.___
___.___.___.___
___.___.___.___
___.___.___.___
___.___.___.___
___.___.___.___
System Administrator Required Planning
The system administrator must complete these setup requirements before installing the ROUTEFINDER software:
• Set the correct configuration of the Default Gateway
• Install an HTTPS-capable browser (e.g., the latest version of Microsoft Internet Explorer or Netscape
Navigator)
• Activate JavaScript and Cascading Style Sheets
• Make sure that no proxies are entered in the browser
• If Secure Shell (SSH) is to be used, you must install an SSH client program (e.g., PuTTY in Windows 2000
or the bundled SSH client in most Linux packages).
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 22
Chapter 2 – Installation
Installation Overview
RouteFinder VPN installation is divided into four steps:
1. Hardware installation
2. Cabling
3. Software initial configuration
4. RouteFinder configuration
Hardware Installation Procedure
The RouteFinder VPN is designed to install either on a desktop or in a standard EIA 19" rack and is shipped with the
mounting hardware to install the RouteFinder VPN in the standard EIA 19" rack. If installing in a rack, use the provided
mounting hardware and follow the rack enclosure manufacturer’s instructions to safely and securely mount the
RouteFinder the rack enclosure. Proceed to the cabling procedure.
Cabling Overview
Cabling your RouteFinder VPN involves making the proper Power, DMZ, WAN and LAN connections as illustrated and
described below.
RF760VPN
RF660VPN
RF600VPN
1. Using an RJ-45 Ethernet cable, connect the DMZ RJ-45 jack to the DMZ device or network (Optional – for example,
a Voice over IP gateway).
2. Using an RJ-45 Ethernet cable, connect the WAN RJ-45 jack to the device for the external network.
3. Using an RJ-45 Ethernet cable, connect the LAN RJ-45 jack to the internal network switch or hub.
Note: Use a cross-over Ethernet cable if connecting to a single device.
4. With the RF760 or RF660 RouteFinder VPN Power switch in the off (Ο) position and using the supplied power cord,
plug one end into the RouteFinder VPN connect power plug and the other end into a live power outlet.
Note: The status LED blinks continuously after power-up.
5. Wait for the RouteFinder VPN to beep five times, indicating that it is ready to be configured with a Web browser.
Shutdown Caution: Never switch off the RouteFinder VPN Power until after you have performed the Shutdown
process. If the RouteFinder VPN is not properly shut down before switching off Power, the next startup may take a little
longer, or in the worst case, data could be lost.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 23
Chapter 2 – Installation
Setting up a Workstation and Starting the
RouteFinder VPN
This section of the Quick Start Guide covers the steps for setting up a workstation that is connected to the RouteFinder VPN,
starting up the RouteFinder VPN, opening the RouteFinder VPN Web Management program, performing the time zone
setup, and using the Menu bar to navigate through the Web Management software screens.
Connections
1. Connect a workstation to the RouteFinder's LAN port via Ethernet. Connections are described on the previous
page.
Note: If not using a hub, use a cross-over cable to connect a PC NIC to the RouteFinder's Ethernet 10/100
LAN Port.
2. Set the workstation IP address to 192.168.2.x subnet.
3. Obtain an Internet Public IP address so it can be assigned to the WAN port.
4. Connect to the Internet at the RouteFinder WAN port.
Power Up
5. Turn on power to the RouteFinder VPN. After several minutes, you will hear 5 beeps signifying the software
has fully booted.
Note: If you hear a continuous beep or no beep, cycle RouteFinder VPN power, connect an external monitor
and check the hard drive.
Open a Web Browser
6. Bring up a Web browser on the workstation. Type the default Gateway address: https://192.168.2.1 and press
the Enter key.
IMPORTANT: Be sure to type https (http will not work).
Note: Make sure your PC’s IP address is in the same network as the router’s IP address. WINIPCFG and
IPCONFIG are tools for finding a computer’s default gateway and MAC addresses. In Windows 98/ME you can type WINIPCFG. In Windows 2000/NT/ME/XP, you can type IPCONFIG.
7. In some environments, one or more Security Alert screen(s) may display. At the initial Security Alert screen,
click Yes and follow any additional on-screen prompts.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 24
Chapter 2 – Installation
Login
8. The Login screen is displayed.
• Type the default User name: admin (all lower-case).
• Tab to the Password field and type the default password: admin (all lower-case).
• Click the Login button.
Note: The User name and Password entries are case-sensitive (both must be
typed in lower-case). The password can be up to 12 characters. Later, you will want
to change the password from the default (admin) to something else. If Windows
displays the AutoComplete screen, you may want to click No to tell Windows OS to
not remember the password for security reasons.
Password Caution: Use a safe password! Your first name spelled backwards is
not a sufficiently safe password; a password such as xfT35$4 is better.
It is recommended that you change the default password. Do not keep this default
password; create your own password.
9. If someone else is already logged onto the RouteFinder VPN or you were logged in recently, the following
message displays.
Do you want to log the user out?
Click Yes.
If you click No, you are returned to the Login screen.
Web Management Software Opens
The Web Management Home screen is displayed. Web Management software is factory-installed on your RouteFinder.
(This is a view of the top part of the Home screen.)
(This is a view of the Multi-Tech Systems, Inc. informational part of the Home screen.)
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 25
Chapter 2 – Installation
t
Navigating Through the Screens
Before using the software, you may find the following information about navigating the screens and the structuring of the
menus helpful.
The Web Management Screen
Menu Bar
Sub Menu
Screen
Buttons
Screen
Name
Work/Inpu
Area
RouteFinder Menu Bar
Menu Selections
AdministrationSet up system parameters, Administrative Access, User Authentication; enter licenses
Networks & Services Define networks, services, and groups to make them available to be used by other
Proxy Set up proxies.
Network Setup Set up the LAN, WAN, and DMZ Ethernet ports; PPP modem link, etc.
DHCP Server Configure the DHCP server settings.
Tracking Set up tracking of all packets through the network ports in the RouteFinder VPN, set up
Packet Filters Define filter rules and ICMP rules.
VPN Virtual Private Network. Set up a secure communication tunnel to specific Internet
Statistics & Logs View and download all the statistics and log files maintained by your system.
and certificates, etc. See entire list of functions on next page.
functions such as allowed networks, packet filters, VPN, and proxies.
automatic download and upgrade of packages from a specified Update server, set up
import/export backup configurations.
systems.
Screen Buttons
Home The main screen.
Wizard Setup Change passwords and quickly set up your RouteFinder VPN with the basic
configuration that will set it up as a firewall.
Help Describes what to do on each screen.
Logout Logout and return to the login screen.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 26
Chapter 2 – Installation
Sub-Menu
Each item on the Menu Bar has its own sub-menu which displays on the left side of the screen.
When you click one of the Menu Bar buttons, the screen that displays is the first sub-menu option. You can choose
other sub-menu screens by clicking the screen name in the sub-menu.
This is an example of the Administration sub-menu. It displays when Administration is clicked on the Menu Bar.
Menus and Sub-Menus
Administration
System Setup
SSH
SNTP Client
Administrative Access
Site Certificate
License Key
Intrusion Detection
Tools
System Scheduler
Factory Defaults
User Authentication
Local Users
Radius & SAM
Restart
Shutdown
Tracking Packet FiltersVPNStatistics & Logs
Accounting
Update Services
Backup
Version Control
Networks & Services Proxy Network Setup DHCP Server
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 27
Chapter 3 – Configuration
Initial Configuration Step
Set Up Your Time Zone
Click Administration on the menu bar. The System Setup screen displays.
Set the following:
• Set System Time by selecting your Time Zone
• Set the current Day, Month, Year, Hour, and Minute
Administration
System Setup
Chapter 3 – Configuration
System Time
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 28
Chapter 3 – Configuration
Second Configuration Step
Using the Wizard Setup is a quick way to enter the basic configuration parameters to allow communication between the
LAN’s workstation(s) and the Internet as shown in the example below.
Important Note: An initial configuration must be completed for each type of RouteFinder functions: firewall configuration,
LAN-to-LAN configuration, a LAN-to-Remote Client configuration.
Note About License Agreements: It is suggested that you read the legal information and license agreement before
beginning the configuration. This information can be found in the Appendix.
RouteFinder VPN Initial Configuration
The addresses used in this example are entered through the Wizard Setup. See the screen example on the next page.
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 29
The Wizard Setup Screen
Click on the Wizard Setup button. The following screen displays.
Chapter 3 – Configuration
1. Enter your Administrator Email Address (can be anything).
Example: admin@yourdomain.com
2. Enter your Hostname for the RouteFinder (can be anything).
Example: routefinder.domainname.com
3. LAN IP Address and Subnet Mask default into the fields. This should be acceptable for your site.
4. Enter the WAN IP Address. This is the PUBLIC STATIC IP address.
Set this option based on information provided by your ISP. Example: 204.26.122.103
5. Change the Gateway IP address; this is the IP address of the router that connects to the Internet.
Example: 204.26.122.1
6. Place a checkmark in the Packet Filter Rule LAN-ANY-ANY-ALLOW box. This will enable the rule.
7. Change Password Settings as appropriate for your network. It is highly recommended that you change all default
passwords. Do not leave them at the defaults.
8. Click Save to save the settings you just entered.
9. The following message displays. Click OK to close the message box and save your changes.
Click OK to save the changes. Please be patient. Wizard
Setup will take a few minutes to implement the changes. Do not
close the Browser.
10. One more message displays. Note that saving your settings will take 1-2 minutes.
Please do not close the browser. Server is saving the values.
After a few minutes you will be redirected to the new IP address.
If you are not redirected, change the address in the location bar
to 192.168.2.1.
11. Test your workstation to see that it can access the Internet. If a connection is established, then the settings have
been entered correctly.
Your Basic Configuration Is Now Complete
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 30
Loading...
+ 159 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.