Your Netopia equipment offers advanced configuration features accessed through the Main Menu of the Telnet
configuration screen. This
security, monitoring, and configuration. This
Quickstart Guide
Guide
before reading this
11
and the
nn
covers the advanced features of the Netopia 3300-Series Router family.
Firmware User Guide
Getting Started Guide
Firmware User Guide
documents the advanced features, including advanced testing,
Firmware User Guide
. You should read the
.
should be used as a companion to the
Quickstart Guide
and the
Getting Started
What’s New in 8.4
New in Netopia Firmware Version 8.4 are the following features:
•
IPSec MTU Support
See “Advanced IPsec Options” on page 5-11.
•
TACACS+ Support
See “TACACS+ server authentication” on page 9-8.
•
GRE Tunneling Support
See “About GRE Tunnels” on page 4-11.
•
Session Initiation Protocol ALG support setting in the CLI.
(The SIP ALG supports only SIP over UDP, not TCP.)
See the
Command Line Interface Commands Reference
available on the Netopia website.
1-2 Firmware User Guide
Telnet-based Management
Telnet-based management is a fast menu-driven interface for the capabilities built into the Netopia Firmware
Version 8.4. Telnet-based management provides access to a wide variety of features that the Router supports.
You can customize these features for your individual setup. This chapter describes how to access the
Telnet-based management screens. This section covers the following topics:
•
“Netopia Telnet Menus” on page 1-2
•
“Netopia Models” on page 1-3
•
“Connecting through a Telnet Session” on page 1-3
•
“
Navigating through the Telnet Screens” on page 1-4
Netopia Telnet Menus
Telnet-based management screens contain the main entry points to the Netopia Firmware Version 8.4
configuration and monitoring features. The entry points are displayed in the Main Menu shown below:
Netopia 3366 V 8.4
Easy Setup...
WAN Configuration...
System Configuration...
Utilities & Diagnostics...
Statistics & Logs...
Quick Menus...
Quick View...
•
The
Easy Setup
You can use Easy Setup to initially configure the Router directly through a Telnet session.
Easy Setup menus contain up to five descendant screens for viewing or altering these values. The number
of screens depends on whether you have optional features installed.
The
Quickstart Guide
•
The
WAN Configuration
Networks (VPNs) and default profile, creating or deleting additional connection profiles, and configuring or
reconfiguring the manner in which you may be using the Router to connect to more than one ser vice
menus display and permit changing the values contained in the default connection profile.
describes the Easy Setup menus to get you up and running quickly.
menu displays and permits changing your connection profile(s), Vir tual Private
Introduction 1-3
provider or remote site. See “WAN Configuration,” beginning on page 2-1. See also Chapter 4, “Virtual
Private Networks (VPNs).”
•
The
System Configuration
• IP Setup• Filter Sets
• IP Address Serving• Network Address Translation (NAT)
• Date and Time• SNMP (Simple Network Management Protocol)
• Security• Upgrade Feature Set
• Change Device to a Bridge• Logging
and more. See “System Configuration Screens,” beginning on page 2-22.
•
The
Utilities & Diagnostics
the Router's behavior, as well as for updating the firmware and rebooting the system. See Chapter 10,
“Utilities and Diagnostics.”
•
The
Statistics & Logs
your Router, your network, and their history. See “Statistics & Logs,” beginning on page 8-4.
•
The
Quick Menus
menus that are accessed through the other menu entr y points.
•
The
Quick View
“Quick View Status Overview” on page 8-1.
screen is a shortcut entry point to a variety of the most commonly used configuration
menu displays at a glance current real-time operating information about your Router. See
menus display and permit changing:
menus provide a selection of the various tools for monitoring and diagnosing
menus display several sets of tables and device logs that show information about
Netopia Models
This
Firmware User Guide
this guide will only apply to a specific model.
covers all of the Netopia 3300-Series Router models. However some information in
Screen differences
Because different Netopia 3300-Series models offer many different features and interfaces, the options shown
on some screens in this
These differences are noted throughout the manual.
Firmware User Guide
may not appear on your own particular model’s Telnet screen.
Connecting through a Telnet Session
Features of the Netopia Firmware Version 8.4 can be configured through the Telnet screens.
Before you can access the console screens through Telnet, you must have:
•
A network connection locally to the Router or IP access to the Router.
•
Telnet software installed on the computer you will use to configure the Router
1-4 Firmware User Guide
Configuring Telnet software
If you are configuring your device using a Telnet session, your computer must be running a Telnet software
program.
•
If you connect a PC with Microsoft Windows, you can use a Windows Telnet application or run Telnet from
the Start menu.
•
If you connect a Macintosh computer running Classic Mac OS, you can use the NCSA Telnet program
supplied on the Netopia CD. You install NCSA Telnet by dragging the application from the CD to your hard
disk.
Mac OS X users can use the Terminal application that comes with Mac OS X in the Utilities folder.
Navigating through the Telnet Screens
Use your keyboard to navigate the Netopia Firmware Version 8.4’s configuration screens, enter and edit
information, and make choices. The following table lists the keys to use to navigate through the Telnet screens.
To...Use These Keys...
Move through selectable items in a screen or pop-up menuUp, Down, Left, and Right Arrow
Set a change to a selected item or open a pop-up menu of
options for a selected item like entering an upgrade key
Change a toggle value (Yes/No, On/Off)Tab
Restore an entry or toggle value to its previous valueEsc
Move one item upUp arrow or Control + K
Move one item downDown arrow or Control + O
Display a dump of the device event logControl + E
Display a dump of the WAN event logControl + F
Refresh the screenControl + L
Return or Enter
Introduction 1-5
To help you find your way to particular screens, some sections in this guide begin with a graphical path guide
similar to the following example:
Main
Menu
This particular path guide shows how to get to the Network Protocols Setup screens. The path guide represents
these steps:
1.Beginning in the Main Menu, select
screen appears.
2.Select
To go back in this sequence of screens, use the Escape key.
This chapter describes how to use the Telnet-based management screens to access and configure advanced
features of your equipment. You can customize these features for your individual setup. These menus provide a
powerful method for experienced users to set up their Router’s connection profiles and system configuration.
This section covers the following topics:
•
“WAN Configuration” on page 2-1
•
“WAN Ethernet Configuration screen” on page 2-2
•
“ADSL Line Configuration screen” on page 2-4
•
“Creating a New Connection Profile” on page 2-9
•
“
Advanced Connection Options” on page 2-14
•
“Configuration Changes Reset WAN Connection” on page 2-14
•“Scheduled Connections” on page 2-15
•“Backup Configuration” on page 2-20
•“System Configuration Screens” on page 2-22
22
nn
•“System configuration features” on page 2-22
WAN Configuration
To configure your Wide Area Network (WAN) connection, navigate to the WAN Configuration screen from the Main
Menu and select WAN (Wide Area Network) Setup.
Main
Menu
The Line Configuration screen appears. The Line Configuration screen will be appropriate to the type of WAN
interface supported by your particular Router model.
WAN
Configuration
WAN
Setup
2-2 Firmware User Guide
WAN Ethernet Configuration screen
The WAN Ethernet Configuration screen appears as follows:
WAN Ethernet Configuration
Address Translation Enabled: Yes
Local WAN IP Address: 0.0.0.0
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
NAT Options...
Stateful Inspection Enabled: No
Filter Set...
Remove Filter Set
Enable PPP over Ethernet: Off
WAN Ethernet Speed Setting... Auto-Negotiation
Wan Ethernet MAC Address: 00:fc:de:fa:dd:02
DHCP Client Mode: Standards-Based
RIP Options...
Set up the basic IP attributes of your Ethernet Module in this screen.
•Address Translation Enabled allows you to specify whether or not the router performs Network Address
Translation (NAT) on the Ethernet WAN port. NAT is enabled by default.
•Local WAN IP Address allows you to manually configure an IP address for use on the Ethernet WAN port.
The value 0.0.0.0 indicates that the device will act as a DHCP client on the Ethernet WAN port and attempt
to acquire an address from a DHCP ser ver. By default, the router acts as a DHCP client on the Ethernet
WAN port.
•The Local WAN IP Mask field becomes visible if you specify a Local WAN IP Address. This allows you to
manually configure an IP subnet mask for use on the Ethernet WAN port. This item is visible only if you
have configured a non-zero Ethernet IP Address; other wise, the router obtains a subnet mask via DHCP.
•The NAT Map List and NAT Server List options are set to the defaults, Easy-PAT List and Easy-Servers.
These provide standard NAT mappings. For more advanced NAT configurations, see “Multiple Network
Address Translation” on page 3-1.
•NAT Options allows you to specify IP Passthrough, allowing a single PC on the LAN to have the router’s
public address assigned to it. See “IP Passthrough” on page 3-27.
•If you set Stateful Inspection Enabled to Yes , you can enable a security feature for computers on your LAN
when NAT is disabled. See “Stateful Inspection” on page 2-23.
•The Filter Set pop-up allows you to associate an IP filter set with the Ethernet WAN port. See “About Filters
and Filter Sets” on page 9-17.
•Remove Filter Set allows you to remove a previously associated filter set.
•Enable PPP over Ethernet is Off by default. If your ser vice provider uses PPPoE authentication toggle this
to On.
WAN and System Configuration 2-3
•The WAN Ethernet Speed Setting is now configurable via a pop-up menu. Options are: Auto-Negotiation
(the default), 100 Mbps Full Duplex, 100 Mbps Half Duplex, 10 Mbps Full Duplex, and 10 Mbps Half
Duplex. This may be useful in mixed networks, where multiple routers have different ethernet speed
capability. If you want to maintain a single speed setting for compatibility with multiple routers on your LAN,
you can select a speed/duplex combination that all of your routers can match.
•The Wan Ethernet MAC Address is the hardware address of the Netopia device. Some service providers
require a specific MAC address as par t of their authentication process. In such a case, you can enter the
MAC address that your service provider requires. If your ser vice provider doesn’t use this method, you
don’t need to change this field.
•The DHCP Client Mode setting depends on the type of access concentrator equipment your service
provider uses. Most use Standards-Based. Alternatively, your provider may instruct you to select Copper Mountain Specific.
•The RIP Options selection displays the WAN Ethernet RIP Parameters screen.
WAN Ethernet RIP Parameters
+----------------+
+----------------+
Receive RIP: | Off |
| v1 |
Transmit RIP: | v2 |
| Both |
+----------------+
•The Receive RIP pop-up menu controls the reception and transmission of Routing Information Protocol
(RIP) packets on the Ethernet WAN port. The default is Both.
The Transmit RIP pop-up menu is hidden if NAT is enabled.
Routing Information Protocol (RIP) is needed if there are IP routers on other segments of your Ethernet
network that the Netopia Firmware Version 8.4 needs to recognize. Set to “Both” (the default) the Netopia
Firmware Version 8.4 will accept information from either RIP v1 or v2 routers. Alternatively, select Receive RIP and select v1 or v2 from the popup menu. With Receive RIP set to “v1,” the Netopia Router’s Ethernet
port will accept routing information provided by RIP packets from other routers that use the same subnet
mask. Set to “v2,” the Netopia Firmware Version 8.4 will accept routing information provided by RIP
packets from other routers that use different subnet masks.
2-4 Firmware User Guide
If you want the Netopia Router to advertise its routing table to other routers via RIP, select Transmit RIP
and select v1, v2 (broadcast), or v2 (multicast) from the popup menu. With Transmit RIP v1 selected, the
Netopia Firmware Version 8.4 will generate RIP packets only to other RIP v1 routers. With Transmit RIP v2
(broadcast) selected, the Netopia Firmware Version 8.4 will generate RIP packets to all other hosts on the
network. With Transmit RIP v2 (multicast) selected, the Netopia Firmware Version 8.4 will generate RIP
packets only to other routers capable of recognizing RIP v2 packets.
ADSL Line Configuration screen
The ADSL Line Configuration screen is shown below:
ADSL Line Configuration
Circuit Type... Multimode
Trellis Coding Enabled: On
Signaling Mode... FDM
Fast Retrain Enabled: On
Wiring Type... AutoSense
Data Link Encapsulation... RFC1483
1.Select Circuit Type and from the pop-up menu choose the type of circuit to which you will be connecting:
Multimode, T1.413, G.dmt, or G.lite.
2.Select Trellis Coding Enabled. Toggle it to On (the default) or Off.
3.Select Signaling Mode and choose Echo Cancellation or FDM (the default).
4.If you selected Multimode Circuit Type, the Fast Retrain Enabled field appears. Toggle it to On (the default)
or Off.
5.The Wiring Type pop-up menu allows you to choose the type of copper pair wiring in use at your location.
Usually, the default AutoSense will detect the type and adjust itself accordingly. If you want to set it
yourself, and you know the type of wiring you have, choose either Tip/Ring (Inner Pair) or A/A1 (Outer Pair)
from the pop-up menu.
6.Select Data Link Encapsulation and press Return. The pop-up menu will offer you the choice of PPP or
RFC1483.
ATM Circuit Configuration
On ADSL WAN interfaces, the Asynchronous Transfer Mode (ATM) connection between the router and the
central office equipment (DSLAM) is divided logically into one or more virtual circuits (VCs). A virtual circuit may
be either a permanent vir tual circuit (PVC) or a switched vir tual circuit (SVC). Netopia Routers support PVCs.
WAN and System Configuration 2-5
VCs are identified by a Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI). A VPI is an 8-bit value
between 0 and 255, inclusive, while a VCI is a 16-bit value between 0 and 65535, inclusive.
•Circuits support attributes in addition to their VPI and VCI values. When configuring a circuit, you can
specify an optional circuit name of up to 14 characters. The circuit name is used only to identify the circuit
for management purposes as a convenience to aid in selecting circuits from lists. The default circuit name
is “Circuit <n>”, where <n> is some number between one and eight corresponding to the circuit’s position
in the list of up to eight circuits.
•You can also individually enable or disable a circuit without deleting it. This is useful for temporarily
removing a circuit without losing the configured attributes.
•In order to function, each circuit must be bound to a Connection Profile or to the Default Profile. Among
other attributes, the profile binding specifies the IP addressing information for use on the circuit. Each
circuit must be bound to a distinct Connection Profile.
ATM VPI/VCI Autodetection. You can bind multiple circuits to the same Connection Profile. Netopia Firmware
Version 8.4 allows you to have a standard configuration that uses, for example, four VCs (0/35, 0/38, 8/35,
8/38) pointing to the same profile.
The unit will now automatically select the active VC on networks with a VPI/VCI of any of these four values
without any custom configuration of the unit. You must, however, manually create these VCs and associate
them with the profile you desire.
You configure Virtual Circuits in the Add/Change Circuit screen.
7.To add a circuit, select Add Circuit and press Return. The Add Circuit screen appears.
2-6 Firmware User Guide
Add Circuit
Circuit Name: Circuit 2
Circuit Enabled: Yes
Circuit VPI (0-255): 0
Circuit VCI (32-65535): +-------------+
+-------------+
QoS... | UBR |
Peak Cell Rate (0 = line rate): | CBR |
| VBR |
+-------------+
Use Connection Profile... Default Profile
Use Default Profile for Circuit
ADD Circuit NOW CANCEL
•Enter a name for the circuit in the Circuit Name field.
•Toggle Circuit Enabled to Yes.
•Enter the Virtual Path Identifier and the Virtual Channel Identifier in the Circuit VPI and Circuit VCI
fields, respectively.
•The Peak Cell Rate field is editable. Netopia Firmware Version 8.4 supports three ATM classes of ser-
vice for data connections: Unspecified Bit Rate (UBR), Constant Bit Rate (CBR), and Variable Bit Rate
(VBR). You can configure these classes of service on a per VC basis. The default ATM class of service
is UBR.
Quality of Service (QoS) settings
Note: QoS settings are not available on Ethernet-to-Ethernet WAN models.
•Select the QoS (Quality of Service) setting from the pop-up menu: UBR. CBR, or VBR.
UBR: No configuration is needed for UBR VCs. Leave the default value 0 (maximum line rate).
CBR: One parameter is required for CBR VCs. Enter the Peak Cell Rate that applies to the VC. This
value should be between 1 and the line rate. You set this value according to specifications defined by
your service provider.
WAN and System Configuration 2-7
Add Circuit
Circuit Name: Circuit 2
Circuit Enabled: Yes
Circuit VPI (0-255): 0
Circuit VCI (32-65535): 32
QoS... VBR
Peak Cell Rate (0 = line rate): 0
Sustained Cell Rate: 0
Maximum Burst Size: 0
Use Connection Profile... Default Profile
Use Default Profile for Circuit
ADD Circuit NOW CANCEL
Return accepts * ESC cancels * Left/Right moves insertion point * Del deletes.
VBR: This class is characterized by:
• a Peak Cell Rate (PCR), which is a temporary burst, not a sustained rate, and
• a Sustained Cell Rate (SCR),
• a Burst Tolerance (BT), specified in terms of Maximum Burst Size (MBS). The MBS is the maximum
number of cells that can be transmitted at the peak cell rate and should be less than, or equal to the
Peak Cell Rate, which should be less than, or equal to the line rate.
VBR has two sub-classes:
a. VBR non-real-time (VBR-nrt): Typical applications are non-real-time traffic, such as IP data traffic.
This class yields a fair amount of Cell Delay Variation (CDV).
b. VBR real time (VBR-rt): Typical applications are real-time traffic, such as compressed voice over IP
and video conferencing. This class transmits cells with a more tightly bounded Cell Delay Variation.
The applications follow CBR.
•Then, select a Connection Profile for the Circuit. To use the Default Profile, select Use Default Profile
for Circuit and press Return. For other options, select a profile from the Use Connection Profile
pop-up menu.
2-8 Firmware User Guide
Note: With multiple VCs you must explicitly statically bind the second (and all subsequent) VCs to a profile.
The first VC will automatically statically bind according to pre-defined dynamic binding rules when you add the
second VC. It will revert back to dynamic binding if the number of VCs is reduced to one; for example, by
deleting previously defined VCs.
When the link comes up the router binds the VC dynamically to the first suitable Connection Profile or to the
Default Profile if there is no Connection Profile configured.
• If you factory default the router, the VC binds to the Default Profile.
• If you delete a Connection Profile that is statically bound to a VC, the VC binding is set back to the Default
Profile. If there is only one VC defined, the VC dynamically binds to the first suitable profile or to the Default
Profile. If there are multiple VCs defined, it binds to the Default Profile.
• If you add a second VC, it is initialized to the Default Profile, and the menu screens display the VC
Connection Profile-related items, allowing you to bind to a specific Connection Profile instead of the Default
Profile. In addition, the router statically binds the first VC according to the rules used to select a profile for
dynamic binding. At this point, each profile uses static binding when the link is brought up.
• If there are no VCs when you add a VC -- for example, if you deleted all your previous VCs and star ted adding
them again -- dynamic binding will occur when the link comes up. If you delete a VC, leaving only one VC, that VC
resumes dynamically binding again.
•Select ADD Circuit NOW and press Return.
8.To display or change a circuit, select Display/Change Circuit, select a circuit from the pop-up menu, and
press Return. The fields are the same as those in the Add Circuit screen.
9.To delete a circuit, select Delete Circuit, select a circuit from the pop-up menu, and press Return. In the
confirmation window, select CONTINUE and press Return.
10. Press Escape to return to the WAN Setup menu.
WAN and System Configuration 2-9
Creating a New Connection Profile
Connection profiles are useful for configuring the connection and authentication settings for negotiating a PPP
connection. If you are using the PPP data link encapsulation method, you can store your authentication
information in the connection profile so that your user name and password (or host name and secret) are
transmitted when you attempt to connect.
Connection profiles define the networking protocols necessar y for the Router to make a remote connection. A
connection profile is like an address book entr y describing how the Router is to get to a remote site, or how to
recognize and authenticate a connection. To create a new connection profile, you navigate to the WAN
Configuration screen from the Main Menu, and select Add Connection Profile.
Main
Menu
The Add Connection Profile screen appears.
Add Connection Profile
Profile Name: Profile 1
Profile Enabled: Yes
Encapsulation Type... RFC1483
RFC1483 Mode... Bridged 1483
IP Profile Parameters...
COMMIT CANCEL
Return accepts * ESC cancels * Left/Right moves insertion point * Del deletes.
Configure a new Conn. Profile. Finished? COMMIT or CANCEL to exit.
WAN
Configuration
Add Connection
Profile
On a Netopia Router you can add up to 15 more connection profiles, for a total of 16, but you can only use one
at a time, unless you are using VPNs.
1.Select Profile Name and enter a name for this connection profile. It can be any name you wish. For
example: the name of your ISP.
2.Toggle Profile Enabled to Ye s or No. The default is Yes. You can toggle it to No, if you want to disable it
later.
3.Select Encapsulation Type and press Return. The pop-up menu offers the possible data link encapsulation
methods for connection profiles used for a variety of purposes: PPP, RFC1483, ATMP, PPTP, IPsec, or L2TP.
2-10 Firmware User Guide
Multiple Data Link Encapsulation Settings
4.Select Encapsulation Options and press Return.
•If you selected ATMP, PPTP, L2TP, or IPSec, see Chapter 4, “
Virtual Private Networks (VPNs).”
•If you selected PPP or RFC1483, the screen offers different options:
Configure a new Conn. Profile. Finished? COMMIT or CANCEL to exit.
•If you selected PPP, the screen allows you to
choose PPPoE or None as the Underlying Encapsulation.
•If you choose None, the PPP Mode offers the
choice of VC Multiplexed or LLC SNAP.
If you are using PPP, when you select Encapsulation Options, the Datalink (PPP/MP) Options screen
appears. (RFC1483 does not require these options and does not offer the menu selection.)
WAN and System Configuration 2-11
Datalink (PPP/MP) Options
Data Compression... Standard LZS
Send Authentication... PAP
Send User Name:
Send Password:
Receive User Name:
Receive Password:
•Data Compression defaults to Standard LZS. You
can select Ascend LZS, if you are connecting to
compatible equipment, or None from the
pull-down menu.
•The Send Authentication pull-down menu lets
you select PAP, CHAP, or None.
•Selecting PAP or CHAP allows you to enter your
authentication credentials for both sending and
receiving connections.
PAP requires a User Name and Password;
CHAP requires a Host Name and Secret.
The screen changes to accommodate your
selection.
Datalink (PPP/MP) Options
Data Compression... Standard LZS
Send Authentication... PAP
Send User Name:
Send Password:
Receive User Name:
Receive Password:
Dial on Demand: Yes
•If you are creating a Backup profile (suppor ted
models only), and have selected Backup as the
Interface Group in the previous screen, you can
toggle Dial on Demand to Yes (the default) or No.
See “Line Backup” on page 7-1 for more
information.
Return to the Add Connection Profile screen by pressing Escape.
5.Select IP Profile Parameters and press Return. The IP Profile Parameters screen appears.
2-12 Firmware User Guide
IP Profile Parameters
Address Translation Enabled: Yes
IP Addressing... Numbered
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
NAT Options...
Stateful Inspection Enabled: No
Local WAN IP Address: 0.0.0.0
Local WAN IP Mask: 0.0.0.0
Filter Set...
Remove Filter Set
RIP Profile Options...
Return/Enter to select <among/between> ...
Configure IP requirements for a remote network connection here.
RIP Profile Parameters
+-----------------------+
+-----------------------+
Receive RIP: | Off |
| v1 |
| v2 |
| Both v1 and v2 |
| v2 MD5 Authentication |
+-----------------------+
WAN and System Configuration 2-13
•The Receive RIP pop-up menu controls the reception and transmission of Routing Information Protocol
(RIP) packets on the WAN port. The default is Both v1 and v2.
A Transmit RIP pop-up menu is hidden if NAT is enabled.
Routing Information Protocol (RIP) is needed if there are IP routers on other segments of your Ethernet
network that the Netopia Router needs to recognize. Set to “Both” (the default) Netopia Firmware Version
8.4 will accept information from either RIP v1 or v2 routers. Alternatively, select Receive RIP and select v1, v2, or v2 MD5 Authentication from the popup menu. With Receive RIP set to “v1,” the Netopia Router’s
Ethernet port will accept routing information provided by RIP packets from other routers that use the same
subnet mask. Set to “v2,” the Netopia Firmware Version 8.4 will accept routing information provided by RIP
packets from other routers that use different subnet masks.
For more information on v2 MD5 Authentication, see “
RIP-2 MD5 Authentication” on page 6-10.
7.Return to the Add Connection Profile screen by pressing Escape.
8.Select COMMIT and press Return. Your new Connection Profile will be added.
If you want to view the Connection Profiles in your device, return to the WAN Configuration screen, and
select Display/Change Connection Profile. The list of Connection Profiles is displayed in a scrolling pop-up
screen.
You can also delete Connection Profiles by selecting them in the same manner using the Delete Connection
Profile option in the WAN Configuration screen.
2-14 Firmware User Guide
Advanced Connection Options
Configuration Changes Reset WAN Connection
The menu supports delaying some configuration changes until after the Netopia Router is restarted.
If your Netopia Router is preconfigured by your ser vice provider, or if you are not remotely configuring the router,
you can leave this setting unchanged.
The purpose of this feature is to defer configuration changes only when remotely configuring or reconfiguring the
Netopia Router to prevent premature Telnet disconnection. When this feature is enabled, no changes to the
WAN setup, datalink encapsulation, Connection Profiles, or Default Gateway will take effect until after the
Netopia Router is restarted. Until the Netopia Router is restarted the WAN link and the routing table remain
unaffected.
A single setting in the Advanced Connection Options screen controls this feature, as shown below.
Advanced Connection Options
Configuration Changes Reset WAN Connection: Yes
Scheduled Connections...
Backup Configuration...
Prioritize Delay-Sensitive Data: No
Return/Enter to configure SA Backup Parameters.
WAN and System Configuration 2-15
When you toggle Configuration Changes Reset WAN Connection either to Yes or No using the Tab key and
press Return, a pop-up window asks you to confirm your choice.
Advanced Connection Options
+----------------------------------------------------+ No
+----------------------------------------------------+
| The Router will now be restarted to allow this |
| feature to function properly. |
| Are you sure you want to do this? |
| |
| CANCEL CONTINUE |
| |
+----------------------------------------------------+
Toggling from Ye s to No makes the router ready to be configured. If you toggle from No to Yes after any
configuration changes have been entered (and confirm the reboot), your changes are committed and the router
comes up using the newly created configuration.
Scheduled Connections
Scheduled connections are useful for PPPoE, PPTP, and ATMP connection profiles.
To go to the Scheduled Connections screen, from the WAN Configuration screen select Advanced Connection Options and then select Scheduled Connections.
Main
Menu
WAN
Configuration
Advanced
Connection Options
Scheduled
Connections
2-16 Firmware User Guide
Scheduled Connections
Display/Change Scheduled Connection...
Add Scheduled Connection...
Delete Scheduled Connection...
Navigate from here to add/modify/change/delete Scheduled Connections.
Viewing scheduled connections
To display a table of scheduled connections, select Display/Change Scheduled Connection in the Scheduled
Connections screen. Each scheduled connection occupies one row of the table.
The first column in the table shows a one-letter representation of the Days of the week, from Monday (M or m)
to Sunday (S or s). If a letter representing a day is capitalized, the connection will be activated on that day; a
lower-case letter means that the connection will not be activated on that day. If the scheduled connection is
configured for a once-only connection, the word “once” will appear instead of the days of the week.
The other columns show:
WAN and System Configuration 2-17
•The time of day that the connection will Begin At
•The duration of the connection (HH:MM)
•Whether it’s a recurring Weekly connection or used Once Only
•Which connection profile (Conn. Prof.) is used to connect
•Whether the scheduled connection is currently Enabled
The Router checks the date and time set in scheduled connections against the system date and time.
Adding a scheduled connection
To add a new scheduled connection, select Add Scheduled Connection in the Scheduled Connections screen
and press Return. The Add Scheduled Connection screen appears.
Add Scheduled Connection
Scheduled Connection Enable: On
How Often... Weekly
Schedule Type... Forced
Set Weekly Schedule...
Use Connection Profile...
ADD SCHEDULED CONNECTION CANCEL
Scheduled Connections dial remote Networks on a Weekly or Once-Only basis.
Follow these steps to configure the new scheduled connection:
•To activate the connection, select Scheduled Connection Enable and toggle it to On. You can make the
scheduled connection inactive by toggling Scheduled Connection Enable to Off.
•Decide how often the connection should take place by selecting How Often and choosing Weekly or Once
Only from the pop-up menu.
•The Schedule Type allows you to set the exact weekly schedule or once-only schedule.
Options are:
•Forced Up, meaning that this connection will be maintained whether or not there is a demand call on
the line.
•Forced Down, meaning that this connection will be torn down or blocked whether or not there is a
demand call on the line.
•Demand-Allowed, meaning that this schedule will permit a demand call on the line.
2-18 Firmware User Guide
•Demand-Blocked, meaning that this schedule will prevent a demand call on the line.
•Periodic, meaning that the connection is retried several times during the scheduled time.
•Random Retry, which operates as follows:
First, it will wait 0 to 60 seconds before starting, then it will try three times to bring the connection up as
quickly as possible;
Second, on each successive retry after these first three attempts it will wait a random number of seconds
between zero and a user-specified maximum.
Should the connection come up, and subsequently go down, the Scheduled Connection will start over with
three retries. Switched connections have a variable redial back-off time depending on the inter face type.
Consequently, the first three attempts for such connections will be slower. Once the connection is up it will
be forced to remain up.
•If How Often is set to Weekly, the item directly below How Often reads Set Weekly Schedule. If How Often
is set to Once Only, the item directly below How Often reads Set Once-Only Schedule.
Set Weekly Schedule
If you set How Often to Weekly, select Set Weekly Schedule and go to the Set Weekly Schedule screen.
•Select the days for the scheduled connection to occur and toggle them to Yes.
Set Weekly Schedule
Monday: No
Tuesday: No
Wednesday: No
Thursday: No
Friday: No
Saturday: No
Sunday: No
Scheduled Window Start Time: 04:29
AM or PM: AM
Scheduled Window Duration Per Day: 00:00
Retry interval (minutes): 5
Return/Enter accepts * Tab toggles * ESC cancels.
•Select Scheduled Window Start Time and enter the time to initiate the scheduled connection.
•You must enter the time in the format H:M, where H is a one- or two-digit number representing the hour and
M is a one- or two-digit number representing the minutes. The colon is mandator y. For example, the entry
1:3 (or 1:03) would be accepted as 3 minutes after one o’clock. The entry 7:0 (or 7:00) would be accepted
as seven o’clock, exactly. The entries 44, :5, and 2: would be rejected.
•Select AM or PM and choose AM or PM from the pop-up menu.
WAN and System Configuration 2-19
•Select Scheduled Window Duration Per Day and enter the maximum duration allowed for this scheduled
connection, per call.
•Retry interval (minutes) becomes visible if you have selected Random Retr y. This option allows you to set
the upper limit for the number of minutes to use for the retry time (the attempts after the first three
attempts). It accepts values of 1 – 255 minutes; the default setting is 5 minutes. With a setting of 5
minutes it will try every 0 – 300 seconds after the first three retries to bring up the connection.
You are finished configuring the weekly options. Return to the Add Scheduled Connection screen to
continue.
Set Once-Only Schedule
If you set How Often to Once Only, select Set Once-Only Schedule and go to the Set Once-Only Schedule
screen.
Set Once-Only Schedule
Place Call on (MM/DD/YY): 05/07/1998
Scheduled Window Start Time: 11:50
AM or PM: AM
Scheduled Window Duration: 00:00
•Select Place Call On (Date) and enter a date in the format MM/DD/YY or MM/DD/YYYY (month, day,
year).
Note: You must enter the date in the format specified. The slashes are mandator y. For example, the entry
5/7/98 would be accepted as May 7, 1998. The entry 5/7 would be rejected.
•Select Scheduled Window Start Time and enter the time to initiate the scheduled connection.
Note: You must enter the time in the format H:M, where H is a one- or two-digit number representing the
hour and M is a one- or two-digit number representing the minutes. The colon is mandator y. For example,
the entry 1:3 (or 1:03) would be accepted as 3 minutes after one o’clock. The entry 7:0 (or 7:00) would be
accepted as seven o’clock, exactly. The entries 44, :5, and 2: would be rejected.
•Select AM or PM and choose AM or PM.
•Select Scheduled Window Duration and enter the maximum duration allowed for this scheduled
connection. Use the same format restrictions noted above.
2-20 Firmware User Guide
You are finished configuring the once-only options. Return to the Add Scheduled Connection screen to continue.
•In the Add Scheduled Connection screen, select Use Connection Profile and choose from the list of
connection profiles you have already created. A scheduled connection must be associated with a
connection profile to be useful. The connection profile becomes active during the times specified in the
associated scheduled connection, if any exists.
•Select ADD SCHEDULED CONNECTION to save the current scheduled connection. Select CANCEL to exit
the Add Scheduled Connection screen without saving the new scheduled connection.
Modifying a scheduled connection
To modify a scheduled connection, select Display/Change Scheduled Connection in the Scheduled
Connections screen to display a table of scheduled connections.
Select a scheduled connection from the table and press Return. The Change Scheduled Connection screen
appears. The parameters in this screen are the same as the ones in the Add Scheduled Connection screen
(except that ADD SCHEDULED CONNECTION and CANCEL do not appear). To find out how to set them, see
“Adding a scheduled connection” on page 2-17.
Deleting a scheduled connection
To delete a scheduled connection, select DeleteScheduled Connection in the Scheduled Connections screen
to display a table of scheduled connections.
Select a scheduled connection from the table and press the Return key to delete it. To exit the table without
deleting the selected scheduled connection, press the Escape key.
Backup Configuration
See “Line Backup” on page 7-1.
Priority Queuing (TOS bit)
Netopia Firmware Version 8.4 offers the ability to prioritize delay-sensitive data over the WAN link.
Certain types of IP packets, such as voice or multimedia packets, are sensitive to latency introduced by the
network. This means that if such packets are not received rapidly, the quality of service degrades. If you expect
to route significant amounts of such traffic you can configure your router to prioritize this type of traffic using the
priority queuing feature.
To configure your router to prioritize delay-sensitive data, navigate to the Advanced Connection Options screen
in the console menu.
Main
Menu
The Advanced Connection Options screen appears.
WAN
Configuration
Advanced Connection
Options
WAN and System Configuration 2-21
Advanced Connection Options
Scheduled Connections...
Backup Configuration...
Prioritize Delay-Sensitive Data: No
Return/Enter to configure SA Backup Parameters.
The Router will recognize a delay-sensitive packet as having the low-latency bit set in the TOS field of the IP
header.
If you toggle Prioritize Delay-Sensitive Data to Yes the router will place these packets at the front of the
transmission queue to the WAN link, overtaking non-delay-sensitive traf fic. Accepting the default No will allow
the normal sequential queue of data packets.
2-22 Firmware User Guide
System Configuration Screens
System configuration features
The Netopia Router’s default settings may be all you need to configure. Some users, however, require advanced
settings or prefer manual control over the default selections. For these users, the Netopia Firmware Version 8.4
provides system configuration options.
“IP Setup” on page 2-23“SNMP (Simple Network Management Protocol)” on
page 2-36
“Filter Sets” on page 2-23“Security” on page 2-36
“Network Address Translation (NAT)” on page 2-23“Upgrade Feature Set” on page 2-36
“Stateful Inspection” on page 2-23“Change Device to a Bridge” on page 2-37
“Date and time” on page 2-29“Logging” on page 2-38
“Wireless configuration” on page 2-30
To access the system configuration screens, select System Configuration in the Main Menu, then press
Return.
The System Configuration menu screen appears:
System Configuration
IP Setup...
Filter Sets...
IP Address Serving...
Network Address Translation (NAT)...
Stateful Inspection...
Date and Time...
Wireless Configuration...
Console Configuration
SNMP (Simple Network Management Protocol)...
Security...
Upgrade Feature Set...
Change Device to a Bridge...
Logging...
Use this screen if you want options beyond Easy Setup.
WAN and System Configuration 2-23
IP Setup
These screens allow you to configure your network’s use of the IP networking protocol.
•Details are given in “
IP Setup” on page 6-2.
Filter Sets
These screens allow you to configure security on your network by means of filter sets and a basic firewall.
•Details are given in “
Security” on page 9-1.
IP Address Serving
These screens allow you to configure IP address ser ving on your network by means of DHCP, WANIP, and BootP.
•Details are given in “IP Address Serving” on page 6-17.
Network Address Translation (NAT)
These screens allow you to configure the Multiple Network Address Translation (MultiNAT) features.
•Details are given in “Multiple Network Address Translation” on page 3-1.
Stateful Inspection
Stateful inspection is a security feature that prevents unsolicited inbound access when NAT is disabled. You
can configure UDP and TCP “no-activity” periods that will also apply to NAT time-outs if stateful inspection is
enabled on the interface. Stateful Inspection parameters are active on a WAN interface only if enabled on your
Gateway. Stateful inspection can be enabled on a profile whether NAT is enabled or not.
Stateful Inspection
UDP no-activity timeout (sec): 180
TCP no-activity timeout (sec): 14400
Add Exposed Address List...
Exposed Address Associations...
Return/Enter goes to new screen.
Return/Enter to configure Xposed IP addresses.
2-24 Firmware User Guide
•UDP no-activity time-out: The time in seconds after which a UDP session will be terminated, if there is no
traffic on the session.
•TCP no-activity time-out: The time in seconds after which an TCP session will be terminated, if there is no
traffic on the session.
•Exposed Addresses: The hosts specified in Exposed addresses will be allowed to receive inbound traffic
even if there is no corresponding outbound traf fic. This is active only if NAT is disabled on an WAN
interface.
Stateful Inspection Options
Enable and configure stateful inspection on a WAN interface.
IP Profile Parameters
Address Translation Enabled: Yes
IP Addressing... Numbered
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
NAT Options...
Stateful Inspection Enabled: No
Local WAN IP Address: 0.0.0.0
Local WAN IP Mask: 0.0.0.0
Filter Set...
Remove Filter Set
RIP Profile Options...
Return/Enter to select <among/between> ...
Configure IP requirements for a remote network connection here.
When you create or modify a Connection Profile, the IP Profile Parameters screen allows you to enable Stateful
Inspection on that profile by toggling Stateful Inspection Enabled to Yes . By default, this is turned of f (No). If
you enable Stateful Inspection, the Stateful Inspection Options field appears.
WAN and System Configuration 2-25
IP Profile Parameters
Address Translation Enabled: No
IP Addressing... Numbered
Stateful Inspection Enabled: Yes
Stateful Inspection Options...
Local WAN IP Address: 0.0.0.0
Local WAN IP Mask: 0.0.0.0
Filter Set...
Remove Filter Set
RIP Profile Options...
Configure IP requirements for a remote network connection here.
Select Stateful Inspection Options and press Return. The Stateful Inspection Parameters screen appears.
Stateful Inspection Parameters
Max. TCP Sequence Number Difference: 0
Enable default mapping to router: No
Deny Fragmented Packets: No
Exposed Address List...
Enter max. allowed TCP sequence number difference (1 - 65535), 0 to disable.
•Max. TCP Sequence Number Difference: Enter a value in this field. This value represents the maximum
sequence number difference allowed between subsequent TCP packets. If this number is exceeded, the
packet is dropped. The acceptable range is 0 – 65535. A value of 0 (zero) disables this check.
•Enable default mapping to router: This is disabled by default. Toggling this option to Yes will allow the
router to respond to traffic received on this inter face, for example, ICMP Echo requests.
2-26 Firmware User Guide
Note: If Stateful Inspection is enabled on a base connection profile (for example, for PPP, RFC1483
bridged/routed, or PPPoE), Enable default mapping to router must be yes to allow inbound VPN terminations.
(for example. for PPTP/ATMP client access to the router)
•Deny Fragmented Packets: Toggling this option to Yes causes the router to discard fragmented packets on
this interface.
•You can apply these parameters to your Exposed Address lists by selecting your Exposed Address List
from the pop-up menu,
Up/Down Arrows to select, then Return/Enter; ESC to cancel.
WAN and System Configuration 2-27
Exposed Addresses
You can specify the IP addresses you want to expose by selecting Add Exposed Address List and pressing
Return. The Add Exposed Address List screen appears.
Add Exposed Address List
Exposed Address List Name: my_xposed_addr_list
Return accepts * ESC cancels * Left/Right moves insertion point * Del deletes.
Add, Edit, or delete exposed addresses options are active only if NAT is disabled on an WAN interface. The
hosts specified in exposed addresses will be allowed to receive inbound traffic even if there is no
corresponding outbound traf fic.
Change Exposed Address Range ("my_xposed_list")
First Exposed Address: 192.168.1.10
Last Exposed Address: +-------------+
+-------------+
Protocol... | TCP and UDP |
| TCP |
Port Start: | UDP |
| ANY |
Port End: +-------------+
CHANGE EXPOSED ADDRESS RANGE CANCEL
•Start Address: Start IP Address of the exposed host range.
•End Address: End IP Address of the exposed host range
2-28 Firmware User Guide
•Protocol: Select the Protocol of the traffic to be allowed to the host range from the pull-down menu.
Options are Any, TCP, UDP, or TCP/UDP.
•Start Por t: Start port of the range to be allowed to the host range. The acceptable range is from 1 - 65535
•End Port: Protocol of the traffic to be allowed to the host range. The acceptable range is from 1 - 65535
You can edit or delete exposed address lists by selecting Show/Change Exposed Address List or Delete
Exposed Address List. A list of previously configured exposed addresses appears.
Up/Down Arrow Keys to select, ESC to dismiss, Return/Enter to Edit.
This allows you to select an exposed address list for editing or deletion.
WAN and System Configuration 2-29
Date and time
You can set the system’s date and time parameters in the Set Date and Time screen.
Select Date and Time in the System Configuration screen and press Return. The Set Date and Time screen
appears.
Set Date and Time
NTP (Network Time Prot.) Enabled: On
Time Server Host Name/IP Address 204.152.184.72
Time Zone... GMT -8:00 Pacific Standard Time
NTP Update Interval (HHHH:MM) 0:00
System Date Format: MM/DD/YY
System Time Format: AM/PM
Follow these steps to set the system’s date and time:
1.Toggle NTP (Network Time Prot.) Enabled to On to synchronize the Router’s time and date with a network
server. Toggle this field to Off to manually set the time and date; the options in this screen will change to
allow you to manually enter the time and date parameters.
Note: If time and date are manually set, that information will be lost upon reboot or loss of power.
2.Enter the IP address of the time server in the field Time Server Host Name/IP Address.
3.Select the Router’s time zone from the Time Zone pop-up menu and press Return.
4.In the NTP Update Interval field, enter how often to synchronize with the time ser ver, using the format
HHHH:MM where H is hours and M is minutes.
5.Select a System Date Format; the options are MM/DD/YY, DD/MM/YY, and YY/MM/DD, where M is
month, D is day, and Y is year.
6.Select a System Time Format, either AM/PM or 24hrs.
7.Press Escape to return to the System Configuration menu.
Note: NTP can be blocked by some firewall configurations. To ensure that this feature works, create a filterset
rule to allow UDP por t 123 to be open.
2-30 Firmware User Guide
Wireless configuration
If your Router is a wireless model (such as a 3347W) you can enable or disable the wireless LAN by selecting
Wireless Configuration. The Wireless Configuration screen appears.
Wireless LAN Configuration
Enable Wireless: Yes
Enable Segmentation: No
SSID: 5247 3521
Channel... 6
Closed System... Open
Enable Privacy... Off
Wireless MAC Authentication...
Return/Enter accepts * Tab toggles * ESC cancels.
Enable Wireless is set to Ye s by default. When Enable Wireless is disabled (No), the Gateway will not provide or
broadcast any wireless LAN ser vices. If you toggle Enable Wireless to No or Ye s, you must restar t the Gateway
for the change to take effect. See “Restarting the System” on page 10-8.
Segmentation
•Enable Segmentation: This feature isolates the hosts on the wireless LAN from the hosts on the wired
Ethernet LAN. It also prevents the hosts on the wireless LAN from entering or enabling any VPN terminated
on the Netopia Gateway.
If on is specified, the wireless LAN will be isolated from the wired LAN; if off is specified, the wireless LAN
will be joined with the wired LAN.
You must reboot the unit for this setting to take effect.
•SSID (Wireless ID): The SSID is preset to a number that is unique to your unit. You can either leave it as is,
or change it by entering a freeform name of up to 32 characters, for example “Ed’s Wireless LAN”. On
client PCs’ software, this might also be called the Network Name. The SSID is used to identify this
particular wireless LAN. Depending on their operating system or client wireless card, users must either:
•select from a list of available wireless LANs that appear in a scanned list on their client
•or, if you are in Closed System Mode (see “Closed System” on page 2-31), enter this name on their cli-
ents in order to join this wireless LAN.
You can then configure:
•Channel: (1 through 11) on which the network will broadcast. This is a frequency range within the 2.4Ghz
band. Channel selection depends on government regulated radio frequencies that var y from region to
WAN and System Configuration 2-31
region. The widest range available is from 1 to 14. However, in North America only 1 to 11 may be
selected. Europe, France, Spain and Japan will differ. Channel selection can have a significant impact on
performance, depending on other wireless activity close to this Gateway. Channel selection is not
necessary at the client computers; the clients will scan the available channels seeking access points using
the same ESSID as the client.
•Closed System: If you toggle Closed System to Closed, the wireless network is hidden from the scanning
features of wireless client computers. Unless both the wireless clients and the Router share the same
SSID in Closed System mode, the Router’s wireless LAN will not appear as an available network when
scanned for by wireless-enabled computers. Members of the Closed System WLAN must log onto the
Router’s wireless network with the identical SSID as that configured in the router.
Closed System mode is an ideal way to increase wireless security and to prevent casual detection by
unwanted neighbors, office users, or malicious users such as hackers.
If you toggle it to Open, it is more convenient, but potentially less secure, for clients to access your WLAN
by scanning available access points. You must decide based on your own network requirements.
Note: Enabling Closed System Mode on your wireless Gateway provides another level of security, since your
wireless LAN will no longer appear as an available access point to client PCs that are casually scanning for one.
Your own wireless network clients, however, must log into the wireless LAN by using the exact SSID of the
Netopia Gateway.
In addition, if you have enabled WEP encryption on the Netopia Gateway, your network clients must also have
WEP encryption enabled, and must have the same WEP encryption key as the Netopia Gateway.
Once the Netopia Gateway is located by a client computer, by setting the client to a matching SSID, the client
can connect immediately if WEP is not enabled. If WEP is enabled then the client must also have WEP enabled
and a matching WEP key.
Wireless client cards from dif ferent manufacturers and dif ferent operating systems accomplish connecting to a
wireless LAN and enabling WEP in a variety of ways. Consult the documentation for your particular wireless card
and/or operating system.
Enable Privacy
By default, Enable Privacy is set to Off. IT IS STRONGLY RECOMMENDED THAT YOU ENABLE PRIVACY.
•WPA-PSK: (Wi-Fi Protected Access) The easiest way to enable Privacy on your Wireless network is by
selecting WPA-PSK - (Pre-Shared Key) from the pop-up menu.
The Pre Shared Key field becomes visible to allow you to enter a Pre Shared Key. The key can be between
8 and 63 characters, but for best security it should be at least 20 characters. Clients wishing to connect
must also be configured to use WPA with this same key.
Select an 8 to 63 character passphrase. At least 20 is ideal for best security.
•WEP: Alternatively, you can provide a level of data security by enabling WEP (Wired Equivalent Privacy) for
encryption of network data. You can enable 40-, 128-, or 256-bit WEP Encryption (depending on the
capability of your client wireless card) for IP traffic on your LAN.
WAN and System Configuration 2-33
Wireless LAN Configuration
Enable Wireless: Yes
SSID: 4405 2605
Channel... 6
Closed System... Open
Enable WEP... On - Automatic
Default Key... 1
Passphrase: Well I stand up next to a mountain,
Enter a phrase and hit Enter to generate your encryption keys.
You select a single key for encryption of outbound traffic. The WEP-enabled client must have an identical
key of the same length, in the identical slot (1 – 4) as the Gateway, in order to successfully receive and
decrypt the traffic. Similarly, the client also has a ‘default’ key that it uses to encrypt its transmissions. In
order for the Gateway to receive the client’s data, it must likewise have the identical key of the same
length, in the same slot. For simplicity, a Gateway and its clients need only enter, share, and use the first
key.
The pull-down menu for enabling WEP offers these settings: On - Automatic or On - Manual.
•On - Automatic uses a passphrase to generate encryption keys for you. You enter a passphrase that
you choose in the Passphrase field. The passphrase can be any string of words or numbers.
Note: While clients may also have a passphrase feature, these are vendor-specific and may not necessarily
create the same keys. You can passphrase generate a set of keys on one, and manually enter them on the
other to get around this.
Select the Default Key (#1 – #4). The longer the key, the stronger the encryption and the more difficult it is
to break the encryption.
•On - Manual allows you to enter your own encryption keys manually. This is a difficult process, but only
2-34 Firmware User Guide
needs to be done once. Avoid the temptation to enter all the same characters.
Wireless LAN Configuration
Enable Wireless: Yes
SSID: 4405 2605
Channel... 6
Closed System... Open
Enable WEP... On - Manual
Default Key (#1 – #4): Specifies which key the Router will use to encrypt transmitted traffic. The default is
key #1.
Key (#1 – #4): The encryption keys. You enter keys using hexadecimal digits. For 40/64bit encryption, you
need ten digits; 26 digits for 128bit, and 58 digits for 256bit WEP. Hexadecimal characters are 0 – 9, and
a – f. The longer the key, the stronger the encryption and the more dif ficult it is to break the encr yption.
Wireless MAC Authentication allows you to specify which client PCs are allowed to join the wireless LAN by
specific hardware address. Once it is enabled, only entered MAC addresses that have been set to Allow will be
accepted onto the wireless LAN. All unlisted addresses will be blocked, in addition to the listed addresses with
Allow disabled.
To enable Wireless MAC Authentication, select Wireless MAC Authentication, and press Return.
WAN and System Configuration 2-35
The Wireless MAC Authorization screen appears.
Authorized Wireless MAC Addresses
Enable MAC Authentication: Yes
Display/Change MAC Addresses...
Add MAC Address...
Delete MAC Address...
To enable Wireless Mac Authorization, toggle Enable MAC Authentication to Yes . You can toggle it to No to
disable it at any time.
Select Add MAC Address and press Return. The Add Wireless MAC Address screen appears.
Add Wireless MAC Address
Wireless MAC Allowed: Yes
Wireless MAC Address: 00-0a-27-ae-71-a4
ADD WIRELESS MAC NOW CANCEL
Return/Enter accepts * Tab toggles * ESC cancels.
Configure a new Wireless MAC in this Screen.
Enter the MAC (hardware) address of the client PC you want to authorize for access to your wireless LAN.
Wireless MAC Allowed is set to Ye s (enabled) by default. Toggling this to No (disabled) specifically denies
access from this MAC address.
Select ADD WIRELESS MAC NOW, and press Return.
2-36 Firmware User Guide
Your entry will be added to a list of up to 32 authorized addresses. To display the list of authorized MAC
addresses, select Display/Change MAC Addresses from the Authorized Wireless MAC Addresses menu.
You can continue to Add, Change, or Delete addresses to the list by selecting the respective menu options.
SNMP (Simple Network Management Protocol)
These screens allow you to monitor and configure your network by means of a standard Simple Network
Management Protocol (SNMP) agent.
•Details are given in “Simple Network Management Protocol (SNMP)” on page 8-10.
Security
These screens allow you to add users and define passwords on your network.
•Details are given in “Security” on page 9-1.
Upgrade Feature Set
You can upgrade your Netopia Router by adding new feature sets through the Upgrade Feature Set utility.
See the release notes that came with your Router or feature set upgrade, or visit the Netopia Web site at
www.netopia.com for information on new feature sets, how to obtain them, and how to install them on your
Router.
WAN and System Configuration 2-37
Change Device to a Bridge
For Netopia DSL Routers, this feature allows you to turn off the routing features and use your device as a
bridge. It is not an option for Ethernet WAN models. If you select this option, the device will restart itself, and
reset all the settings to factory defaults. Any configurations you have made will be erased. Use this feature with
caution. If you decide to reinstate the routing capabilities, you must reconfigure the device from scratch.
From the Main Menu, select System Configuration.
System Configuration
IP Setup...
Filter Sets...
IP Address Serving...
Network Address Translation (NAT)...
Date and Time...
SNMP (Simple Network Management Protocol)...
Security...
Upgrade Feature Set...
Change Device to a Bridge...
Logging...
Use this screen if you want options beyond Easy Setup.
Select Change Device to a Bridge and press Return. You will be challenged to confirm this choice.
+----------------------------------------------------+
+----------------------------------------------------+
| This change requires a reboot and will result |
| in Factory Defaulting the device. |
| |
| CANCEL CONTINUE |
| |
+----------------------------------------------------+
If you chose CONTINUE, the device will reboot and restart in bridge mode. Routing features will be disabled and
the Telnet menus corresponding configuration items, such as Easy Setup, will be removed.
2-38 Firmware User Guide
Netopia Router
WAN Configuration...
System Configuration...
Utilities & Diagnostics...
Statistics & Logs...
Quick View...
You can reinstate Router mode by returning to the System Configuration menu.
System Configuration
Management IP Setup...
Filter Sets...
Date and Time...
SNMP (Simple Network Management Protocol)...
Security...
Upgrade Feature Set...
Change Device to a Router...
Logging...
Use this screen if you want options beyond Easy Setup.
Select Change Device to a Router.
Press Return, confirm your choice, and the device will restar t in router mode.
Logging
You can configure a UNIX-compatible syslog client to report a number of subsets of the events entered in the
Router’s WAN Event History. See “
The Syslog client (for the PC only) is available on the Netopia CD.
Select Logging from the System Configuration menu.
WAN Event History” on page 8-5.
WAN and System Configuration 2-39
The Logging Configuration screen appears.
Logging Configuration
WAN Event Log Options
Log Boot and Errors: Yes
Log Line Specific: Yes
Log Connections: Yes
Log PPP, DHCP, CNA: Yes
Log IP: Yes
Syslog Parameters
Syslog Enabled: No
Hostname or IP Address:
Facility... Local 0
By default, all events are logged in the event history.
•By toggling each event descriptor to either Yes or No, you can determine which ones are logged and which
are ignored.
•You can enable or disable the syslog client dynamically. When enabled, it will report any appropriate and
previously unreported events.
•You can specify the syslog server’s address either in dotted decimal format or as a DNS name up to 63
characters.
•You can specify the UNIX syslog Facility to use by selecting the Facility pop-up.
•Erase the log by selecting DUMP WAN LOG
2-40 Firmware User Guide
You will need to install a Syslog client daemon program on your PC and configure it to report the WAN events
you specified in the Logging Configuration screen.
The following screen shows a sample syslog dump of WAN events:
May 5 10:14:06 tsnext.netopia.com Link 1 down: PPP PAP failure
May 5 10:14:06 tsnext.netopia.com >>Issued Speech Setup Request from our DN: 5108645534
May 5 10:14:06 tsnext.netopia.com Requested Disc. from DN: 917143652500
May 5 10:14:06 tsnext.netopia.com Received Clear Confirm for our DN: 5108645534
May 5 10:14:06 tsnext.netopia.com Link 1 down: Manual disconnect
May 5 10:14:06 tsnext.netopia.com >>Issued Speech Setup Request from our DN: 5108645534
May 5 10:14:06 tsnext.netopia.com Requested Disc. from DN: 917143652500
May 5 10:14:06 tsnext.netopia.com Received Clear Confirm for our DN: 5108645534
May 5 10:14:06 tsnext.netopia.com Link 1 down: No answer
May 5 10:14:06 tsnext.netopia.com --Device restarted----------------------------------------May 5 10:14:06 tsnext.netopia.com >>Received Speech Setup Ind. from DN: (not supplied)
May 5 10:14:06 tsnext.netopia.com Requested Connect to our DN: 5108645534
May 5 10:14:06 tsnext.netopia.com ASYNC: Modem carrier detected (more) Modem
reports: 26400 V34
May 5 10:14:06 tsnext.netopia.com >>WAN: 56K Modem 1 activated at 115 Kbps
May 5 10:14:06 tsnext.netopia.com Connect Confirmed to our DN: 5108645534
May 5 10:14:06 tsnext.netopia.com PPP: Channel 1 up, Answer Profile name: Default Profile
May 5 10:14:06 tsnext.netopia.com PPP: NCP up, session 1, Channel 1 Final (fallback)
negotiated auth: Local PAP , Remote NONE
May 5 10:14:06 tsnext.netopia.com PPP: PAP we accepted remote, Channel 1 Remote name: guest
May 5 10:14:06 tsnext.netopia.com PPP: MP negotiated, session 1 Remote EDO: 06 03 0
000C5700624 0
May 5 10:14:06 tsnext.netopia.com PPP: CCP negotiated, session 1, type: Ascend
LZS Local mode: 1, Remote mode: 1
May 5 10:14:06 tsnext.netopia.com PPP: BACP negotiated, session 1 Local MN: FFFFFF
FF, Remote MN: 00000001
May 5 10:14:06 tsnext.netopia.com PPP: IPCP negotiated, session 1, rem:
192.168.10.100 local: 192.168.1.1
May 5 10:14:06 tsnext.netopia.com >>WAN: 56K Modem 1 deactivated
May 5 10:14:06 tsnext.netopia.com Received Clear Ind. from DN: 5108645534, Cause: 0
May 5 10:14:06 tsnext.netopia.com Issued Clear Response to DN: 5108645534
May 5 10:14:06 tsnext.netopia.com Link 1 down: Remote clearing
May 5 10:14:06 tsnext.netopia.com PPP: IPCP down, session 1
May 5 10:14:06 tsnext.netopia.com >>Received Speech Setup Ind. from DN: (not supplied)
You should read this chapter completely before attempting to configure any of the advanced NAT features.
This chapter covers the following topics:
•Over
•MultiNAT Configuration on page 3-6
•Easy Setup Profile configuration on page 3-6
•Server Lists and Dynamic NAT configuration on page 3-7
•Adding Server Lists on page 3-15
•Binding Map Lists and Server Lists on page 3-21
•NAT Associations on page 3-25
•IP Passthrough on page 3-27
•MultiNAT Configuration Example on page 3-31
view on page 3-1
33
nn
Overview
NAT (Network Address Translation) is a means of mapping one or more IP addresses and/or IP service ports
into different values. This mapping serves two functions:
•It allows the addresses of many computers on a LAN to be represented to the public Internet by only one or
a few addresses, saving you money.
•It can be used as a security feature by obscuring the true addresses of impor tant machines from potential
hackers on the Internet.
To help you understand some of the concepts discussed here, it may be helpful to introduce some NAT
terminology.
The term mapping refers to rules that associate one or more private addresses on the Netopia Router’s LAN to
one or more public addresses on the Netopia Router’s WAN interface (typically the Internet).
The terms private and internal refer to addresses on the Netopia Router’s LAN. These addresses are
considered private because they are protected or obscured by NAT and cannot be directly accessed from the
WAN (or Internet) side of the Netopia Router unless specifically configured otherwise.
The terms public and external refer to the WAN (or Internet) side of the Netopia Router.
3-2 Firmware User Guide
Features
MultiNAT features can be divided into several categories that can be used simultaneously in different
combinations on a per-Connection Profile basis.
The following is a general description of these features:
Port Address Translation
The simplest form of classic Network Address Translation is PAT (Port Address Translation). PAT allows a group
of computers on a LAN, such as might be found in a home or small office, to share a single Internet connection
using one IP address. The computers on the LAN can surf the Web, read e-mail, download files, etc., but their
individual IP addresses are never exposed to the public network. Instead, a single IP address acts as the
source IP address of traffic originating from the LAN. The Netopia Router allows you to define multiple PAT
mappings, which can be individually mapped to different public IP addresses. This offers more control over the
access permitted to users on the LAN.
A limitation of PAT is that communication must be initiated from the internal network. A user on the external
side cannot access a machine behind a PAT connection. A PAT enhancement is the ability to define multiple PAT
mappings. Each of these can optionally map to a section or range of IP addresses of the internal network. PAT
mapping allows only internal users to initiate traffic flow between the internal and external networks.
Server lists
Server lists, sometimes known as exported services, make it possible to provide access from the public
network to hosts on the LAN. Server lists allow you to define particular services, such as Web, ftp, or e-mail,
which are available via a public IP address. You define the type of service you would like to make available and
the internal IP address to which you would like to provide access. You may also define a specific public IP
address to use for this service if you want to use an IP other than the WAN IP address of the Netopia Router.
Static mapping
If you want to host your own Website or provide other Internet services to the public, you need more than
classic NAT. The reason is noted under Port Address Translation above – external users cannot initiate traffic to
computers on your LAN because external users can never see the real addresses of the computers on your
LAN. If you want users outside your LAN to have access, for example, to a Web or FTP server that you host, you
need to make a public representation of the real IP addresses of those ser vers.
Static mappings are a way to make one or more private IP addresses fully accessible from the public network
via corresponding public IP addresses. Some applications may negotiate multiple TCP connections in the
process of communication, which often does not work with traditional PAT. Static mapping offers the ability to
use these applications through NAT. Each private IP address is mapped, on a one-to-one basis, to a public IP
address that can be accessed from the Internet or public network. As with PAT mappings, you may have multiple
static mappings to map a range of private IP addresses to a range of public IP addresses if desired.
Multiple Network Address Translation 3-3
Dynamic mapping
Dynamic mapping, often referred to as many-to-few, offers an extension to the advantages provided by static
mapping. Instead of requiring a one-to-one association of public addresses and private addresses, as is
required in static mapping, dynamic mapping uses a group of public IP addresses to dynamically allocate static
mappings to private hosts that are communicating with the public network. If a host on the private network
initiates a connection to the Internet, for example, the Netopia Router automatically sets up a one-to-one
mapping of that host’s private IP address to one of the public IP addresses allocated to be used for Dynamic
NAT. As long as this host is communicating with the Internet, it will be able to use that address. When traffic
from that host ceases, and no traffic is passed from that host for five minutes, the public address is made
available again for other private hosts to use as necessary.
When addresses are returned to the group of available addresses, they are returned to the head of the group,
being the most recently used. If that same host requests a connection an hour later, and the same public
address is still available, then it will be mapped to the same private host. If a new host, which has not
previously requested a connection, initiates a connection it is allocated the last, or oldest, public address
available.
Dynamic NAT is a way of sharing a range of public, or exterior, NAT addresses among one or more groups of
private, or interior, hosts. This is intended to provide superior support for applications that traditionally have
difficulty communicating through NAT. Dynamic NAT is intended to provide functionality beyond many-to-one and
one-to-one translation. Netopia’s NAT implementation makes it possible to have a static mapping of one public
address to one private address, thus allowing applications such as NetMeeting to work by assuring that any
traffic sent back to the source IP address is forwarded through to the internal machine.
Static one-to-one mapping works well if you have enough IP addresses for all the workstations on your LAN. If
you do not, Dynamic NAT allows machines to make full use of the publicly routable IP addresses provided by the
ISP as necessary, on demand. When these public IP addresses are no longer being used by a particular
workstation, they are returned to a pool of available addresses for other workstations to use.
A common example is a DSL customer’s application. Most DSL ISPs only provide customers with a few IP
addresses for use on their network. For networks with more than four or five machines it is usually mandator y to
use NAT. A customer may have 15 workstations on the LAN, all of which need Internet access. The customer is
only provided five IP addresses by their ISP. The customer has eight hosts, which only need to use email and
have Web access, but another seven hosts, which use NetMeeting to communicate with clients once or twice a
day. NetMeeting will not work unless a static one-to-one mapping exists for the machine running NetMeeting to
use for communication. The customer does not have enough IP addresses to create a one-to-one mapping for
each of the seven users. This is where dynamic NAT applies.
The customer can configure four of these addresses to be used for Dynamic NAT. The fifth address is then used
for the eight other machines that do not need one-to-one mappings. As each machine configured to use
addresses from the dynamic pool tries to connect to the Internet it is allocated a public IP address to use
temporarily. Once the communication has been terminated, that IP address is freed for one of the other six
hosts to use.
3-4 Firmware User Guide
Available for Dynamic NATUsed for Normal NAT
172.16.1.25
172.16.1.26
172.16.1.27
172.16.1.28
172.16.1.29
WAN Network
Network Address Translation
LAN Network
192.168.1.16
192.168.1.15
192.168.1.14
192.168.1.13
192.168.1.12
192.168.1.11
192.168.1.10
192.168.1.9
192.168.1.8
192.168.1.7
192.168.1.6
192.168.1.5
192.168.1.4
192.168.1.3
192.168.1.2
Exterior addresses are allocated to internal hosts on a demand, or as-needed, basis and then made available
when traffic from that host ceases. Once an internal host has been allocated an address, it will use that
address for all traffic. Five minutes after all traffic ceases – no pings, all TCP connections closed, no DNS
requests, etc. – the address is put at the head of an available list. If an interior host needs an exterior address
an hour later, and the previously used address is still available, it will acquire the same address. If an interior
host that has not previously been allocated an exterior address needs one, it will be allocated the last, hence
the oldest, exterior address on the available list.
All NAT configurations are rule-based. This means that traffic passed through NAT from either the public or the
private network is compared to the rules and mappings configured in the Netopia Router in a par ticular order.
The first rule that applies to the traffic being initiated is used.
For example, if a connection is initiated from the public network and is destined for a public IP address
configured on the Netopia Router, the following comparisons are made in this order.
1.The Netopia Router first checks its internal NAT cache to see if the data is part of a previously initiated
connection, if not…
2.The Netopia Router checks the configured server lists to see if this traffic is intended to be forwarded to an
internal host based on the type of service.
3.The Netopia Router then checks to see if there is a static, dynamic, or PAT mapping for the public IP
address that the connection is being initiated to.
4.The Netopia Router answers the request itself if the data is destined for the Netopia’s WAN interface IP
address. Otherwise the data is discarded.
Multiple Network Address Translation 3-5
Complex maps
Map lists and server lists are completely independent of each other. A Connection Profile can use one or the
other or both.
MultiNAT allows complex mapping and requires more complex configuration than in earlier firmware versions.
Multiple mapped interior subnets are supported, and the rules for mapping each of the subnets may be
different. The figure below illustrates a possible multiNAT configuration.
Private AddressesIP HostPublic AddressesNAT Type
206.1.1.1
206.1.1.2
206.1.1.3
206.1.1.4
206.1.1.5
206.1.1.6
}
192.168.1.1
192.168.1.253
192.168.1.254
192.168.1.1 – 252
192.168.1.1 – 252
Web/FTP Server
E-mail Server
LAN Users
LAN Users
1:1 Static
1:1 Static
1:1 Dynamic
1:Many PAT
206.1.2.1 – 6
(possible later)
In order to support this type of mapping, you define two address ranges. First, you define a public range which
contains the first and last public address to be used and the way in which these addresses should be used
(PAT, static, or dynamic). You then configure an address map which defines the private IP address or addresses
to be used and which public range they should be mapped to. You add the address map to the list of address
maps which are configured, creating a map list. The mappings in the map list are order-dependent and are
compared in order from the top of the list to the bottom. If a par ticular resource is not available, subordinate
mappings can be defined that will redirect traffic.
192.168.1.1 – 252
LAN Users
1:1 Dynamic
Supported traffic
MultiNat supports the following IP protocols:
•PAT: TCP/UDP traffic which does not carry source or destination IP addresses or por ts in the data stream
(i.e., HTTP, Telnet, ‘r’ commands, tftp, NFS, NTP, SMTP, NNTP, etc.).
•Static NAT: All IP protocol traffic which does not carry or other wise rely on the source or destination IP
addresses in the data stream.
•Dynamic NAT: All IP protocol traffic which does not carry or other wise rely on the source or destination IP
addresses in the data stream.
Support for AOL Instant Messenger (AIM) File Transfer
Netopia Firmware Version 8.4 provides Application Level Gateway (ALG) support for AOL Instant Messenger
(AIM) file transfer. This allows AIM users to exchange files, even when both users are behind NAT. Previously,
the file transfer function would work only if one or neither of the two users were behind NAT.
Currently there is a restriction that the remote user must be routed to via the WAN interface, otherwise the
connections will fail. There is no restriction as to the number of connections.
There is no user configuration required for this feature.
3-6 Firmware User Guide
Support for Yahoo Messenger
Netopia Firmware Version 8.4 provides Application Level Gateway (ALG) support for Yahoo Messenger. This
allows Yahoo Messenger users to exchange files, even when both users are behind NAT. Previously, the file
transfer function would work only if one or neither of the two users were behind NAT.
Currently there is a restriction that the remote user must be routed to via the WAN interface, otherwise the
connections will fail. There is no restriction as to the number of connections.
There is no user configuration required for this feature.
MultiNAT Configuration
You configure the MultiNAT features through the Telnet menu:
•For a simple 1-to-many NAT configuration (classic NAT or PAT), use the Easy Setup Profile configuration,
described below.
•For the more advanced features, such as ser ver lists and dynamic NAT, follow the instructions in:
•IP setup, described on page 3-7
•IP profile parameters, described on page 3-21
Easy Setup Profile configuration
The screen below is an example. Depending on the type of Router you are using, fields displayed in this screen
may vary.
Connection Profile 1: Easy Setup Profile
Connection Profile Name: Easy Setup Profile
Address Translation Enabled: Yes
IP Addressing... Numbered
Local WAN IP Address: 0.0.0.0
Local WAN IP Mask: 255.255.255.0
Remote IP Address: 127.0.0.2
Remote IP Mask: 255.255.255.255
PPP Authentication... PAP
Send User Name: tonyf
Send Password: ********************
PREVIOUS SCREEN NEXT SCREEN
Return/Enter brings you to next screen.
The Local WAN IP Address is used to configure a NAT public address range consisting of the Local WAN IP
Address and all its ports. The public address map list is named Easy-PAT List and the port map list is named Easy-Servers.
Multiple Network Address Translation 3-7
The two map lists, Easy-PAT List and Easy-Servers, are created by default and NAT configuration becomes
effective.This will map all your private addresses (0.0.0.0 through 255.255.255.255) to your public address.
These map lists are bound to the Easy Setup Profile. See Binding Map Lists and Server Lists on page 3-21.
This is all you need to do if you want to continue to use a single PAT, or 1-to-many, NAT configuration.
Server Lists and Dynamic NAT configuration
You use the advanced NAT feature sets by first defining a series of mapping rules and then grouping them into
a list. There are two kinds of lists -- map lists, made up of dynamic, PAT and static mapping rules, and server lists, a list of internal services to be presented to the external world. Creating these lists is a four-step process:
1.Define the public range of addresses that external computers should use to get to the NAT internal
machines. These are the addresses that someone on the Internet would see.
2.Create a List name that will act as a rule or ser ver holder.
3.Create a map or rule that specifies the internal range of NATed addresses and the external range they are
to be associated with.
4.Associate the Map or Server List to your WAN interface via a Connection Profile or the Default Profile.
The three NAT features all operate completely independently of each other, although they can be used
simultaneously on the same Connection Profile.
You can configure a simple 1-to-many PAT (often referred to simply as NAT) mapping using Easy Setup. More
complex setups require configuration using the Network Address Translation item on the IP Setup screen.
An example MultiNAT configuration at the end of this chapter describes some applications for these features.
See the MultiNA
In order to configure the Router to make ser vers on your LAN visible to the Internet, you use advanced features
in the System Configuration screens, described in IP setup.
T Configuration Example on page 3-31.
IP setup
To access the NAT configuration screens, from the Main Menu navigate to IP Setup:
Add Server List...
Show/Change Server List...
Delete Server List...
NAT Associations...
Return/Enter to configure IP Address redirection.
Public Range defines an external address range and indicates what type of mapping to apply when using this
range. The types of mapping available are dynamic, static and pat.
Map Lists define collections of mapping rules. A rule maps interior range addresses to exterior range
addresses by the mapping techniques defined in the map list.
Server Lists bind internal IP addresses and ports to external IP addresses and ports so that connections
initiated from the outside can access an interior server.
Multiple Network Address Translation 3-9
NAT rules
The following rules apply to assigning NAT ranges and server lists:
•Static public address ranges must not overlap other static, PAT, public addresses, or the public address
assigned to the Router’s WAN interface.
•A PAT public address must not overlap any static address ranges. It may be the same as another PAT
address or server list address, but the por t range must not overlap.
You configure the ranges of exterior addresses by first adding public ranges.
Select Add Public Range and press Return.
The Add NAT Public Range screen appears.
Add NAT Public Range
Range Name: my_first_range
Type... pat
Public Address: 206.1.1.6
First Public Port: 49152
Last Public Port: 65535
ADD NAT PUBLIC RANGE CANCEL
•Select Range Name and give a descriptive name to this range.
•Select Type and from the pop-up menu, assign its type. Options are static, dynamic, or pat (the default).
•If you choose pat as the range type, select Public Address and enter the exterior IP address in the
range you want to assign. Select First and Last Public Port and enter the first and last exterior por ts
in the range. These are the ports that will be used for traffic initiated from the private LAN to the outside world.
Note: For PAT map lists and server lists, if you use the Public Address 0.0.0.0, the list will acquire its public IP
address from the WAN IP address specified by your WAN IP configuration in the Connection Profile. If that is a
static IP address, then the PAT map list and server lists will acquire that address. If it is a negotiated IP
address, such as may be assigned via DHCP or PPP, the PAT map list and server lists will acquire that address
each time it is negotiated.
•If you choose dynamic as the range type, a new menu item, First Public Address, becomes visible.
Select First Public Address and enter the first exterior IP address in the range you want to assign.
Select Last Public Address and enter an IP address at the end of the range.
•If you choose static as the range type, a new menu item, First Public Address, becomes visible.
3-10 Firmware User Guide
Select First Public Address and enter the first exterior IP address in the range you want to assign.
Select Last Public Address and enter an IP address at the end of the range.
•Select ADD NAT PUBLIC RANGE and press Return. The range will be added to your list and you will be
returned to the Network Address Translation screen.
Once the public ranges have been assigned, the next step is to bind interior addresses to them. Because these
bindings occur in ordered lists, called map lists, you must first define the list, then add mappings to it.
From the Network Address Translation screen select Add Map List and press Return.
The Add NAT Map List screen appears.
Add NAT Map List
Map List Name: my_map
Add Map...
•Select Map List Name and enter a descriptive name for this map list. A new menu item, Add Map,
appears.
•Select Add Map and press Return. The Add NAT Map screen appears.
Multiple Network Address Translation 3-11
Add NAT Map ("my_map")
First Private Address: 192.168.1.1
Last Private Address: 192.168.1.254
Use NAT Public Range...
ADD NAT MAP CANCEL
•Select First and Last Private Address and enter the first and last interior IP addresses you want to assign
to this mapping.
•Select Use NAT Public Range and press Return. A screen appears displaying the public ranges you have
defined.
Up/Down Arrow Keys to select, ESC to cancel, Return/Enter to Delete.
Select
•From the list of public ranges you defined, select the one that you want to map to the interior range for this
mapping and press Return.
If none of your preconfigured ranges are suitable for this mapping, you can select <<NEW RANGE>> and
create a new range. If you choose <<NEW RANGE>>, the Add NAT Public Range screen displays and you
can create a new public range to be used by this map. See Add NAT Public Range on page 3-9.
3-12 Firmware User Guide
•The Add NAT Map screen now displays the range you have assigned.
Add NAT Map ("my_map")
First Private Address: 192.168.1.1
Last Private Address: 192.168.1.254
Use NAT Public Range... my_first_range
Public Range Type is: pat
Public Range Start Address is: 206.1.1.6
ADD NAT MAP CANCEL
•Select ADD NAT MAP and press Return. Your mapping is added to your map list.
Modifying map lists
You can make changes to an existing map list after you have created it. Since there may be more than one map
list you must select which one you are modifying.
From the Network Address Translation screen select Show/Change Map List and press Return.
•Select the map list you want to modify from the pop-up menu.
Scroll to the map you want to modify using the arrow keys and press Return.
3-14 Firmware User Guide
The Change NAT Map screen appears.
Change NAT Map ("my_map")
First Private Address: 192.168.1.253
Last Private Address: 192.168.1.254
Use NAT Public Range... my_second_range
Public Range Type is: static
Public Range Start Address is: 206.1.1.1
Public Range End Address is: 206.1.1.2
CHANGE NAT MAP CANCEL
Make any modifications you need and then select CHANGE NAT MAP and press Return. Your changes will
become effective and you will be returned to the Show/Change NAT Map List screen.
Multiple Network Address Translation 3-15
Adding Server Lists
Server lists, also known as Exports, are handled similarly to map lists. If you want to make a particular server’s
port accessible (and it isn’t accessible through other means, such as a static mapping), you must create a
server list.
Select Add Server List from the Network Address Translation screen.
The Add NAT Server List screen appears.
Add NAT Server List
Server List Name: my_servers
Add Server...
•Select Server List Name and type in a descriptive name. A new menu item, Add Server, appears.
•Select Add Server and press Return. The Add NAT Server screen appears.
3-16 Firmware User Guide
Add NAT Server ("my_servers")
Service...
Server Private IP Address: 192.168.1.45
Public IP Address: 206.1.1.1
ADD NAT SERVER CANCEL
•Select Service and press Return. A pop-up menu appears listing a selection of commonly exported
services.
•Choose the service you want to export and press Return.
You can choose a preconfigured service from the list, or define your own by selecting Other. If you select
Other, a screen is displayed that allows you to enter the port number range for your customized ser vice.
Multiple Network Address Translation 3-17
Other Exported Port
First Port Number (1..65535): 31337
Last Port Number (1..65535): 31337
OK CANCEL
•Enter the First and Last Port Number between por ts 1 and 65535. Select OK and press Return. You
will be returned to the Add NAT Server screen.
•Enter the Server Private IP Address of the ser ver whose ser vice you are expor ting.
Since MultiNAT permits the mapping of multiple private IP addresses to multiple public IP addresses, your
ISP or corporate site’s Router must be configured such that it knows that your multiple public addresses
are accessible via your Router.
If you want to use static mappings to map internal servers to public addresses, your ISP or corporate site's
Router must also be configured for static routes to these public addresses on the Netopia Router.
•Enter the Public IP Address to which you are exporting the ser vice.
Note: For PAT map lists and server lists, if you use the Public Address 0.0.0.0, the list will acquire its public IP
address from the WAN IP address specified by your WAN IP configuration in the Connection Profile. If that is a
static IP address, then the PAT map list and server lists will acquire that address. If it is a negotiated IP
address, such as may be assigned via DHCP or PPP, the PAT map list and server lists will acquire that address
each time it is negotiated.
•Select ADD NAT SERVER and press Return. The server will be added to your ser ver list and you will be
returned to the Add NAT Server List screen.
Note: In order to use CUSeeMe through the Netopia Router, you must export the ports 7648 and 7649. In
MultiNat, you may use a port range export. Without the export, CUSeeMe will fail to work. This is true unless a
static mapping is in place for the host using CUSeeMe. In that case no server list entry is necessary.
Modifying server lists
Once a server list exists, you can select it for modification or deletion.
•Select Show/Change Server List from the Network Address Translation screen.
3-18 Firmware User Guide
•Select the Server List Name you want to modify from the pop-up menu and press Return.
Up/Down Arrow Keys to select, ESC to dismiss, Return/Enter to Edit.
Select any server from the list and press Return. The Change NAT Server screen appears.
Change NAT Server ("My Exports")
Service... smtp
Server Private IP Address: 192.168.1.254
Public IP Address: 206.1.1.1
CHANGE NAT SERVER CANCEL
You can make changes to the server’s service and port or internal or external address.
Select CHANGE NAT SERVER and press Return. Your changes take effect and you are returned to the
Show/Change NAT Server List screen.
Deleting a server
To delete a server from the list, select Delete Server from the Show/Change NAT Server List menu and press
Return.
3-20 Firmware User Guide
A pop-up menu lists your configured servers. Select the one you want to delete and press Return. A dialog box
asks you to confirm your choice.
Show/Change NAT Server List
+-Internal Address-External Address--Port------------+
+----------------------------------------------------+
Se| 192.168.1.254 206.1.1.6 smtp |
| 19+----------------------------------------------+ |
| 19+----------------------------------------------+ |
Ad| | Are you sure you want to delete this Server? | |
| | | |
Sh| | CANCEL CONTINUE | |
| | | |
De| | | |
| +----------------------------------------------+ |
| |
| |
| |
| |
| |
| |
| |
+----------------------------------------------------+
Choose CONTINUE and press Return. The ser ver is deleted from the list.
Multiple Network Address Translation 3-21
Binding Map Lists and Server Lists
Once you have created your map lists and server lists, for most Netopia Router models you must bind them to
a profile, either a Connection Profile or the Default Profile. You do this in one of the following screens:
•the IP profile parameters screen (see below) of the Connection Profile configuration menu
•the IP Parameters (WAN Default Profile) screen (see page 3-23) of the Default Profile configuration menu
•the Binding Map Lists and Ser
ver Lists screen (see page 3-21)
IP profile parameters
To bind a map list to a Connection Profile, from the Main Menu go to the WAN Configuration screen then the
Display/Change Connection Profile screen. From the pop-up menu list of your Connection Profiles, choose the
one you want to bind your map list to. Select IP Profile Parameters and press Return.
Main
Menu
The IP Profile Parameters screen appears.
IP Profile Parameters
Address Translation Enabled: Yes
IP Addressing... Unnumbered
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
Local WAN IP Address: 206.1.1.6
Local WAN IP Mask: 0.0.0.0
Remote IP Address: 127.0.0.2
Remote IP Mask: 255.255.255.255
Filter Set... Basic Firewall
Remove Filter Set
WAN
Configuration
Display/Change
Connection Profile
IP Profile
Parameters
RIP Profile Options...
Configure IP requirements for a remote network connection here.
•Select NAT Map List and press Return. A pop-up menu displays a list of your defined map lists.
3-22 Firmware User Guide
IP Profile Parameters
+--NAT Map List Name---+
+----------------------+
Address Trans| Easy-PAT |s
IP Addressing| my_map |mbered
| <<None>> |
NAT Map List.| |sy PAT
NAT Server Li| |
| |
Local WAN IP | |
| |
Remote IP Add| |7.0.0.2
Remote IP Mas| |5.255.255.255
| |
Filter Set...| |tBIOS Filter
Remove Filter| |
| |
Receive RIP: | |th
| |
+----------------------+
Up/Down Arrow Keys to select, ESC to dismiss, Return/Enter to Edit.
•Select the map list you want to bind to this Connection Profile and press Return. The map list you selected
will now be bound to this Connection Profile.
•Select NAT Server List and press Return. A pop-up menu displays a list of your defined ser ver lists.
IP Profile Parameters
+-NAT Server List Name-+
+----------------------+
Address Trans| Easy-Servers |s
IP Addressing| my_servers |mbered
| <<None>> |
NAT Map List.| |sy PAT
NAT Server Li| |
| |
Local WAN IP | |0.0.0
Local WAN IP | |0.0.0
Remote IP Add| |7.0.0.2
Remote IP Mas| |5.255.255.255
| |
Filter Set...| |tBIOS Filter
Remove Filter| |
| |
Receive RIP: | |th
| |
+----------------------+
Up/Down Arrow Keys to select, ESC to dismiss, Return/Enter to Edit.
•Select the server list you want to bind to this Connection Profile and press Return. The ser ver list you
selected will now be bound to this Connection Profile.
Note: There is no interdependency between NAT and IP Addressing. Also, the Local WAN IP Address and Mask
fields’ visibility are dependent only on the IP Addressing type.
Multiple Network Address Translation 3-23
IP Parameters (WAN Default Profile)
The Netopia Firmware Version 8.4 using RFC 1483 supports a WAN default profile that permits several
parameters to be configured without an explicitly configured Connection Profile.
The procedure is similar to the procedure to bind map lists and ser ver lists to a Connection Profile.
From the Main Menu go to the WAN Configuration screen, then the Default Profile screen. Select IP Parameters
and press Return.
Main
Menu
WAN
Configuration
The IP Parameters (Default Profile) screen appears.
IP Parameters (Default Profile)
Address Translation Enabled: Yes
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
Filter Set (Firewall)...
Remove Filter Set
Receive RIP: Both
Return/Enter to select <among/between> ...
WAN Default
Profile
IP Parameters
•Toggle Address Translation Enabled to Yes.
•Select NAT Map List and press Return. A pop-up menu displays a list of your defined map lists.
Up/Down Arrow Keys to select, ESC to dismiss, Return/Enter to Edit.
•Select the server list you want to bind to the default profile and press Return. The ser ver list you selected
will now be bound to the default profile.
Note: There is no interdependency between NAT and IP Addressing. Also, the Local WAN IP Address and Mask
fields’ visibility are dependent only on the IP Addressing type.
Multiple Network Address Translation 3-25
NAT Associations
Configuration of map and server lists alone is not sufficient to enable NAT for a WAN connection because map
and server lists must be linked to a profile that controls the WAN interface. This can be a Connection Profile, a
WAN Ethernet interface, a default profile, or a default answer profile. Once you have configured your map and
server lists, you may want to reassign them to different interface-controlling profiles, for example, Connection
Profiles. To permit easy access to this IP Setup functionality, you can use the NAT Associations screen.
You access the NAT Associations screen from the Network Address Translation screen.
Main
Menu
System
Configuration
IP
Setup
Network Address
Select NAT Associations and press Return. The NAT Associations screen appears.
NAT Associations
Profile/Interface Name-------------Nat?-Map List Name-----Server List Name
Default Answer Profile On my_first_map my_servers
Easy Setup Profile On Easy-PAT my_servers
Profile 01 On my_second_map my_servers
Profile 02 On my_first_map my_server_list
Profile 03 On <<None>> <<None>>
Translation
•You can toggle NAT? On or Off for each Profile/Interface name. You do this by navigating to the NAT? field
associated with each profile using the arrow keys. Toggle NAT on or off by using the Tab key.
•You can reassign any of your map lists or server lists to any of the Profile/Interfaces. You do this by
navigating to the Map List Name or Server List Name field associated with each profile using the arrow
keys. Select the item by pressing Return to display a pop-up menu of all of your configured lists.
3-26 Firmware User Guide
NAT Associations
+NAT Map List Name-+
Profile/Interface Name-------------Nat+------------------+Server List Name
Easy Setup Profile On | Easy-PAT List |my_servers
Profile 01 On | my_first_map |my_servers
Profile 02 On | my_second_map |my_server_list
Profile 03 On | my_map |<<None>>
Profile 04 On | <<None>> |<<None>>
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
Default Answer Profile On +------------------+my_servers
Up/Down Arrow Keys to select, ESC to dismiss, Return/Enter to Edit.
•Select the list name you want to assign and press Return again. Your selection will then be associated with
the corresponding profile or inter face.
Multiple Network Address Translation 3-27
IP Passthrough
Netopia Firmware Version 8.4 offers an IP passthrough feature. The IP passthrough feature allows for a single
PC on the LAN to have the router’s public address assigned to it. It also provides PAT (NAPT) via the same
public IP address for all other hosts on the private LAN subnet. Using IP passthrough:
•The public WAN IP is used to provide IP address translation for private LAN computers.
•The public WAN IP is assigned and reused on a LAN computer.
•DHCP address serving can automatically serve the WAN IP address to a LAN computer.
When DHCP is used for addressing the designated passthrough PC, the acquired or configured WAN
address is passed to DHCP, which will dynamically configure a single-servable-address subnet, and reser ve
the address for the configured MAC address. This dynamic subnet configuration is based on the local and
remote WAN address and subnet mask. If the WAN interface does not have a suitable subnet mask that is
usable, for example when using PPP or PPPoE, the DHCP subnet configuration will default to a class C
subnet mask.
Globally, only one dynamically-configured DHCP subnet is available. If you configure multiple Connection
Profiles to use IP Passthrough's DHCP option, when any of these profiles is established, the dynamic DHCP
configuration will be overwritten.
In the case of an Ethernet WAN router the IP passthrough configuration is located in the WAN Ethernet
Configuration menu. For all other routers, it is located in the Connection Profiles' IP Profile Parameters.
The WAN Ethernet Configuration screen, found under the WAN Configuration menu, WAN Setup screen,
appears as shown.
WAN Ethernet Configuration
Address Translation Enabled: Yes
Local WAN IP Address: 0.0.0.0
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
NAT Options...
Stateful Inspection Enabled: No
Filter Set...
Remove Filter Set
Enable PPP over Ethernet: Off
WAN Ethernet Speed Setting... Auto-Negotiation
Wan Ethernet MAC Address: 00:fc:de:fa:dd:02
DHCP Client Mode: Standards-Based
RIP Options...
Set up the basic IP attributes of your Ethernet Module in this screen.
3-28 Firmware User Guide
The IP Profile Parameters screen, found under the WAN Configuration menu, Add/Change Connection Profile
screen, appears as shown.
IP Profile Parameters
Address Translation Enabled: Yes
IP Addressing... Numbered
NAT Map List... Easy-PAT List
NAT Server List... Easy-Servers
NAT Options...
Stateful Inspection Enabled: No
Local WAN IP Address: 0.0.0.0
Local WAN IP Mask: 0.0.0.0
Filter Set...
Remove Filter Set
RIP Profile Options...
Toggle to Yes if this is a single IP address ISP account.
Configure IP requirements for a remote network connection here.
If you select NAT Options, in either case, the NAT Options screen appears.
NAT Options
IP Passthrough Enabled: No
Toggle ON to allow local WAN IP address to be used on LAN in addition to NAT.
If you toggle IP Passthrough Enabled to Ye s , additional field(s) appear.
Multiple Network Address Translation 3-29
NAT Options
IP Passthrough Enabled: Yes
IP Passthrough DHCP Enabled: Yes
IP Passthrough DHCP MAC address: 00-00-00-00-00-00
Enter MAC addr. of IP passthrough host, or zeroes for first come first serve.
Toggling IP Passthrough DHCP Enabled to Ye s displays the IP Passthrough DHCP MAC address field. This is
an editable field in which you can enter the MAC (hardware) address of the designated PC be used as the DHCP
Client Identifier for dynamic address reser vation. The MAC address must be six colon-delimited or
dash-delimited sets of hex digits ('0' – 'FF').
First Come First Serve Mode
Netopia Firmware Version 8.4 IP Passthrough allows a first come first serve mode.
NAT Options defaults to an all-zeroes MAC address.
If you leave the default all-zeroes MAC address, the Router will select the next DHCP client that initiates a DHCP
lease request or renewal to be the IP passthrough host. When the WAN comes up, or if it is already up, the
Router will serve this client the IP passthrough/WAN address. When this client's lease ends, the IP
passthrough address becomes available for the next client to initiate a DHCP transaction. The next client will
get the IP passthrough address. Note that there is no way to control which PC has the IP passthrough address
without releasing all other DHCP leases on the LAN.
Note: If you specify a non-zeroes MAC address, the DHCP Client Identifier must be in the format specified
above. Macintosh computers allow the DHCP Client Identifier to be entered as a name or text, however Netopia
routers accept only strict (binary/hex) MAC address format. Macintosh computers display their strict MAC
addresses in the TCP/IP Control Panel (Classic MacOS) or the Network Preference Pane of System Preferences
(Mac OS X).
Once configured, the passthrough host's DHCP leases will be shor tened to two minutes. This allows for timely
updates of the host's IP address, which will be a private IP address before the WAN connection is established.
After the WAN connection is established and has an address, the passthrough host can renew its DHCP
address binding to acquire the WAN IP address.
3-30 Firmware User Guide
A restriction
Since both the router and the passthrough host will use same IP address, new sessions that conflict with
existing sessions will be rejected by the router. For example, suppose you are a teleworker using an IPSec
tunnel from the router and from the passthrough host. Both tunnels go to the same remote endpoint, such as
the VPN access concentrator at your employer’s office. In this case, the first one to start the IPSec traffic will
be allowed; the second one – since, from the WAN it's indistinguishable – will fail.
Multiple Network Address Translation 3-31
MultiNAT Configuration Example
To help you understand a typical MultiNAT configuration, this section describes an example of the type of
configuration you may want to implement on your site. The values shown are for example purposes only. Make
your own appropriate substitutions.
A typical DSL service from an ISP might include five user addresses. Without PAT, you might be able to attach
only five IP hosts. Using simple 1-to-many PAT you can connect more than five devices, but use only one of your
addresses. Using multiNAT you can make full use of the address range. The example assumes the following
range of addresses offered by a typical ISP:
Local WAN IP address:206.1.1.6
Local WAN subnet mask:255.255.255.248
Remote IP address:206.1.1.254
Default gateway:206.1.1.254
Public IP addresses assigned by the ISP are 206.1.1.1 through 206.1.1.6 (255.255.255.248 subnet mask).
Your internal devices have IP addresses of 192.168.1.1 through 192.168.1.254 (255.255.255.0 subnet
mask).
Netopia Router's address is:192.168.1.1
Web server's address is:192.168.1.253
Mail server's address is:192.168.1.254
FTP server's address is:192.168.1.253
In this example you will statically map the first five public IP addresses (206.1.1.1 - 206.1.1.5) to the first five
corresponding private IP addresses (192.168.1.1 - 192.168.1.5). You will use these 1-to-1 mapped addresses
to give your servers “real” addresses. You will then map 206.1.1.6 to the remaining private IP addresses
(192.168.1.6 - 192.168.1.254) using PAT.
The configuration process is as follows:
From the Main Menu go to the Easy Setup and then the Connection Profile screen.
Main
Menu
Easy
Setup
Connection
Profile
3-32 Firmware User Guide
Enter your ISP-supplied values as shown below.
Connection Profile 1: Easy Setup Profile
Connection Profile Name: Easy Setup Profile
Address Translation Enabled: Yes
IP Addressing... Numbered
Local WAN IP Address: 206.1.1.6
Local WAN IP Mask: 255.255.255.248
PREVIOUS SCREEN NEXT SCREEN
Enter a subnet mask in decimal and dot form (xxx.xxx.xxx.xxx).
Enter basic information about your WAN connection with this screen.
Select NEXT SCREEN and press Return.
Your IP values are shown here.
IP Easy Setup
Ethernet IP Address: 192.168.1.1
Ethernet Subnet Mask: 255.255.255.0
Domain Name: ISP.net
Primary Domain Name Server: 173.166.101.1
Secondary Domain Name Server: 173.166.102.1
Default IP Gateway: 206.1.1.254
IP Address Serving: On
Number of Client IP Addresses: 20
1st Client Address: 192.168.1.2
PREVIOUS SCREEN NEXT SCREEN
Set up the basic IP & IPX attributes of your Netopia in this screen.
Then navigate to the Network Address Translation (NAT) screen.
Main
Menu
System
Configuration
Setup
IP
Network Address
Translation (NAT)
Multiple Network Address Translation 3-33
Select Show/Change Public Range, then Easy-PAT Range, and press Return. Enter the value your ISP assigned
for your public address (206.1.1.6, in this example). Toggle Type to pat. Your public address is then mapped to
the remaining private IP addresses using PAT. (If you were not using the Easy-PAT Range and Easy-PAT List that
are created by default by using Easy Setup, you would have to define a public range and map list. For the
purpose of this example you can just alter this range and list.)
Change NAT Public Range
Range Name: Easy-PAT Range
Type... pat
Public Address: 206.1.1.6
First Public Port: 49152
Last Public Port: 65535
CHANGE NAT PUBLIC RANGE CANCEL
Select CHANGE NAT PUBLIC RANGE and press Return. This returns you to the Network Address Translation
screen.
Select Add Public Range and press Return. Type a name for this static range, as shown below. Enter the first
and last public addresses your ISP assigned in their respective fields as shown. The first five public IP
addresses (206.1.1.1 - 206.1.1.5, in this example) are statically mapped to the first five corresponding private
IP addresses (192.168.1.1 - 192.168.1.5).
Add NAT Public Range
Range Name: Static Range
Type... static
First Public Address: 206.1.1.1
Last Public Address: 206.1.1.5
ADD NAT PUBLIC RANGE CANCEL
Return/Enter to commit changes.
3-34 Firmware User Guide
Select ADD NAT PUBLIC RANGE and press Return. You are returned to the Network Address Translation
screen.
Next, select Show/Change Map List and choose Easy-PAT List. Select Add Map. The Add NAT Map screen
appears. (Now the name Easy-PAT List is a misnomer since it has a static map included in its list.) Enter in
192.168.1.1 for the First Private Address and 192.168.1.5 for the Last Private Address.
Add NAT Map ("Easy-PAT List")
First Private Address: 192.168.1.1
Last Private Address: 192.168.1.5
Use NAT Public Range...
ADD NAT MAP CANCEL
Select Use NAT Public Range and from the pop-up menu choose Static Range. Select ADD NAT MAP and
press Return.
This will statically map the first five public IP addresses to the first five corresponding private IP addresses and
will map 206.1.1.6 to the remaining private IP addresses using PAT.
Notes on the example
The Easy-Map List and the Easy-PAT List are attached to any new Connection Profile by default. If you want to
use this NAT configuration on a previously defined Connection Profile then you need to bind the Map List to the
profile. You do this through either the NAT Associations screen or the profile’s configuration screens.
The PAT part of this example setup will allow any user on the Netopia Router's LAN with an IP address in the
range of 192.168.1.6 through 192.168.1.254 to initiate traffic flow to the outside world (for example, the
Internet). No one on the Internet would be able to initiate a conversation with them.
The Static mapping part of this example will allow any of the machines in the range of addresses from
192.168.1.1 through 192.168.1.5 to communicate with the outside world as if they were at the addresses
206.1.1.1 through 206.1.1.5, respectively. It also allows any machine on the Internet to access any service
(port) on any of these five machines.
You may decide this poses a security risk. You may decide that anyone can have complete access to your FTP
server, but not to your Router, and only limited access to the desired services (ports) on the Web and Mail
servers.
To make these changes, first limit the range of remapped addresses on the Static Map and then edit the
default server list called Easy-Servers.
Multiple Network Address Translation 3-35
•First, navigate to the Show/Change Map List screen, select Easy-PAT List and then Show/Change Maps.
Choose the Static Map you created and change the First Private Address from 192.168.1.1 to
192.168.1.4. Now the Router, Web, and Mail servers’ IP addresses are no longer included in the range of
static mappings and are therefore no longer accessible to the outside world. Users on the Internet will not
be able to Telnet, Web, SNMP, or ping to them. It is best also to navigate to the public range screen and
change the Static Range to go from 206.1.1.5.
•Next, navigate to Show/Change Server List and select Easy-Servers and then Add Server. You should
export both the Web (www-http) and Mail (smtp) ports to one of the now free public addresses. Select
Service... and from the resulting pop-up menu select www-http. In the resulting screen enter your Web
server's address, 192.168.1.2, and the public address, for example, 206.1.1.2, and then select ADD NAT SERVER. Now return to Add Server, choose the smtp port and enter 192.168.1.3, your Mail server's IP
address for the Server Private IP Address. You can decide if you want to present both your Web and Mail
services as being on the same public address, 206.1.1.2, or if you prefer to have your Mail ser ver appear
to be at a different IP address, 206.1.1.3. For the sake of this example, alias both services to 206.1.1.2.
Now, as before, the PAT configuration will allow any user on the Netopia Router's LAN with an IP address in the
range of 192.168.1.6 through 192.168.1.254 to initiate traffic flow to the Internet. Someone at the FTP server
can access the Internet and the Internet can access all ser vices of the FTP machine as if it were at 206.1.1.5.
The Router cannot directly communicate with the outside world. The only communication between the Web
server and the Internet is through por t 80, the Web port, as if the server were located on a machine at IP
address 206.1.1.2. Similarly, the only communication with the Mail server is through por t 25, the SMTP por t,
as if it were located at IP address 206.1.1.2
The Netopia Firmware Version 8.4 offers IPsec, PPTP, and ATMP tunneling support for Virtual Private Networks
(VPN).
The following topics are covered in this chapter:
Overview" on page 4-1
•"
•"About PPTP Tunnels" on page 4-4
•"About IPsec Tunnels" on page 4-7
•"About L2TP Tunnels" on page 4-8
•"About GRE Tunnels" on page 4-11
•"About ATMP Tunnels" on page 4-15
•"Encryption Support" on page 4-17
•"ATMP/PPTP Default Profile" on page 4-18
•"VPN QuickView" on page 4-20
•"Dial-Up Networking for VPN" on page 4-21
44
))
•"Allowing VPNs through a Firewall" on page 4-24
•"Windows Networking Broadcasts" on page 4-31
Overview
When you make a long distance telephone call from your home to a relative far away, you are creating a private
network. You can hold a conversation, and exchange information about the happenings on opposite sides of the
state, or the continent, that you are mutually interested in. When your next door neighbor picks up the phone to
call her daughter at college, at the same time you are talking to your relatives, your calls don't overlap, but each
is separate and private. Neither house has a direct wire to the places they call. Both share the same lines on
the telephone poles (or underground) on the street.
These calls are virtual private networks. Virtual, because they appear to be direct connections between the
calling and answering parties, even though they travel over the public wires and switches of the phone
company; private, because neither pair of calling and answering parties interacts with the other; and networks,
because they exchange information.
Computers can do the same thing; it's called Virtual Private Networks (VPNs). Equipped with a Netopia Router,
a single computer or private network (LAN) can establish a private connection with another computer or private
network over the public network (Internet).
4-2 Firmware User Guide
Netopia Firmware Version 8.4 can be used in VPNs either to initiate the connection or to answer it. When used
in this way, the Routers are said to be tunnelling through the public network (Internet). The advantages are that,
like your long distance phone call, you don't need a direct line between one computer or LAN and the other, but
use the local connections, making it much cheaper; and the information you exchange through your tunnel is
private and secure.
Tunneling is a process of creating a private path between a remote user or private network and another private
network over some intermediate network, such as the IP-based Internet. A VPN allows remote offices or
employees access to your internal business LAN through means of encr yption allowing the use of the public
Internet to look “virtually” like a private secure network. When two networks communicate with each other
through a network based on the Internet Protocol, they are said to be tunneling through the IP network.
Transit Internetwork
Virtual Private Network
Logical
Equivalent
Unlike the phone company, private and public computer networks can use more than one protocol to carry your
information over the wires. Several such protocols are in common use for tunnelling, Point-to-Point Tunnelling
Protocol (PPTP), IP Security (IPsec), Layer 2 Transport Protocol (L2TP), Generic Routing Encapsulation (GRE),
and Ascend Tunnel Management Protocol (ATMP). The Netopia Router can use any of these.
•Point-to-Point Tunneling Protocol (PPTP) is an extension of Point-to-Point Protocol (PPP) and uses a client
and server model. Netopia’s PPTP implementation is compatible with Microsoft’s and can function as
either the client (PAC) or the server (PNS). As a client, a Netopia Router can provide all users on a LAN with
secure access over the Internet to the resources of another LAN by setting up a tunnel with a Windows NT
server running Remote Access Ser vices (RAS) or with another Netopia Router. As a server, a Netopia
Netopia Router can provide remote users a secure connection to the resources of the LAN over a dial-up,
cable, DSL, or any other type of Internet access. Because PPTP can create a VPN tunnel using the Dial-Up
Networking (DUN) (see "
Dial-Up Networking for VPN" on page 4-21) utility built into Windows 95, 98, or NT,
no additional client software is required.
•IPsec stands for IP Security, a set of protocols that supports secure exchange of IP packets at the IP layer.
IPsec is deployed widely to implement Virtual Private Networks (VPNs). IPsec supports two encryption
modes: Transport and Tunnel. Transport mode encr ypts only the data por tion (payload) of each packet, but
Virtual Private Networks (VPNs) 4-3
leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On
the receiving side, an IPsec-compliant device decrypts each packet. The Netopia Firmware Version 8.4
supports the more secure Tunnel mode.
DES stands for Data Encryption Standard, a popular symmetric-key encryption method. DES uses a 56-bit
key. The Netopia Firmware Version 8.4 offers IPsec DES encr yption over the VPN tunnel.
•Ascend Tunnel Management Protocol (ATMP) is the protocol that is implemented in many Ascend gateways.
ATMP is a simple protocol for connecting nodes and/or networks together over the Internet via a tunnel.
ATMP encapsulates IP or other user data without PPP headers within General Routing Encapsulation (GRE)
protocol over IP. ATMP is more efficient than PPTP for network-to-network tunnels.
When used to initiate the tunnelled connection, the Router is called a PPTP Access Concentrator (PAC , in PPTP
language), or a foreign agent (in ATMP language). When used to answer the tunnelled connection, the Netopia
Router is called a PPTP Network Server (PNS, in PPTP language) or a home agent (in ATMP language).
In either case, the Netopia Router wraps, or encapsulates, information that one end of the tunnel exchanges
with the other, in a wrapper called General Routing Encapsulation (GRE), at one end of the tunnel, and unwraps,
or decapsulates, it at the other end.
Configuring the Netopia Router for use with the different protocols is done through the Telnet-based menu
screens. Each type is described in its own section:
•"About PPTP Tunnels" on page 4-4
•"About IPsec Tunnels" on page 4-7
•"About L2TP Tunnels" on page 4-8
•"About GRE Tunnels" on page 4-11
•"About ATMP Tunnels" on page 4-15
Your configuration depends on which protocol you (and the gateway at the other end of your tunnel) will use, and
whether or not you will be using VPN client software in a standalone remote connection.
Note: You must choose which protocol you will be using, since you cannot both export PPTP and use ATMP, or
vice versa, at the same time.
Having both an ATMP tunnel and a PPTP export is not possible because functions require GRE and the Router’s
PPTP export/server does not distinguish the GRE packets it forwards. Since it processes all of them, ATMP
tunneling is impaired. For example, you cannot run an ATMP tunnel between two gateways and also have PPTP
exported on one side.
Summary
A Virtual Private Network (VPN) connects the components of one network over another network. VPNs
accomplish this by allowing you to tunnel through the Internet or another public network in a manner that
provides the same security and features formerly available only in private networks.
VPNs allow networks to communicate across an IP network. Your local networks (connected to the Netopia
Router) can exchange data with remote networks that are also connected to a VPN-capable gateway.
This feature provides individuals at home, on the road, or in branch offices with a cost-effective and secure way
to access resources on remote LANs connected to the Internet with Netopia Routers.
4-4 Firmware User Guide
About PPTP Tunnels
To set up a PPTP tunnel, you create a Connection Profile including the IP address and other relevant information
for the remote PPTP partner. You use the same procedure to initiate a PPTP tunnel that terminates at a remote
PPTP server or to terminate a tunnel initiated by a remote PPTP client.
PPTP configuration
To set up the Router as a PPTP Network Server (PNS) capable of answering PPTP tunnel requests you must also
configure the VPN Default Answer Profile. See "ATMP/PPTP Default Profile" on page 4-18 for more information.
PPTP is a Datalink Encapsulation option in Connection Profiles. It is not an option in device or link configuration
screens, as PPTP is not a native encapsulation. Consequently, the Easy Setup Profile does not offer PPTP
datalink encapsulation. See the "Creating a New Connection Profile" on page 2-9 for information on creating
Connection Profiles.
Channel 4 (and higher) events, such as connections and disconnections, reported in the WAN Event Histories
are VPN tunnel events.
To define a PPTP tunnel, navigate to the Add Connection Profile menu from the Main Menu.
When you define a Connection Profile as using PPTP by selecting PPTP as the datalink encapsulation method,
and then select Data Link Options, the PPTP Tunnel Options screen appears.
PPTP Tunnel Options
PPTP Partner IP Address: 173.167.8.134
Tunnel Via Gateway: 0.0.0.0
•Enter the PPTP Partner IP Address. This specifies the address of the other end of the tunnel.
If you do not specify the PPTP Partner IP Address the Router cannot initiate tunnels, i.e., act as a PPTP
Access Concentrator (PAC) for this profile. It can only accept tunnel requests as a PPTP Network Ser ver
(PNS).
•If you specify the PPTP Partner IP Address, and the address is in the same subnet as the Remote IP
Address you specified in the IP Profile Parameters, the Tunnel Via Gateway option becomes visible. You
can enter the address by which the Router partner is reached.
If you do not specify the PPTP Partner IP Address, the Router will use the default gateway to reach the
partner and the Tunnel Via Gateway field is hidden. If the partner should be reached via an alternate port
(i.e. the LAN instead of the WAN), the Tunnel Via Gateway field allows this path to be resolved.
•From the pop-up menu select an Authentication protocol for the PPP connection. Options are PAP, CHAP, or
MS-CHAP. The default is PAP. The authentication protocol must be the same on both ends of the tunnel.
•You can specify a Data Compression algorithm, either None or Standard LZS, for the PPTP connection.
Note: When the Authentication protocol is MS-CHAP, compression is set to None, and the Data
Compression option is hidden.
•When the authentication protocol is MS-CHAP, you can specify a Data Encryption algorithm for the PPTP
connection. Available options are MPPE and None (the default). For other authentication protocols, this
option is hidden. When MPPE is negotiated, the WAN Event History reports that it is negotiated as a CCP
(compression) type. This is because the MPPE protocol uses a compression engine, even though it is not
itself a compression protocol.
4-6 Firmware User Guide
Note: Netopia Firmware Version 8.4 supports 128-bit (“strong”) encryption. Unlike MS-CHAP version 1, which
supports one-way authentication, MS-CHAP version 2 supports mutual authentication between connected
gateways and is incompatible with MS-CHAP version 1 (MS-CHAP-V1). When you choose MS-CHAP as the
authentication method for the PPTP tunnel, the Netopia Router will start negotiating MS-CHAP-V2. If the gateway
you are connecting to does not support MS-CHAP-V2, it will fall back to MS-CHAP-V1, or, if the gateway you are
connecting to does not support MPPE at all, the PPP session will be dropped.
•You can specify a Send Host Name which is used with Send Secret for authenticating with a remote PNS
when the profile is used for initiating a tunnel connection.
•You must specify a Send Password (the CHAP and MS-CHAP term for password), used for authenticating
the tunnel when initiating a tunnel connection.
•You can specify a Receive Host Name which is used with the Receive Secret for authenticating a remote
PPTP client.
•You must specify a Receive Password, used for authenticating the remote PPTP client.
•You can specify that this Router will Initiate Connections (acting as a PAC) or only answer them (acting as
a PNS).
•Tunnels are normally initiated On Demand; however, you can disable this feature. When disabled, the
tunnel must be manually established or may be scheduled using the scheduled connections feature. See
"Scheduled Connections" on page 2-15.
•Some networks that use Microsoft Windows NT PPTP Network Servers require additional authentication
information, called Windows NT Domain Name, when answering PPTP tunnel connection requests. Not all
Windows NT installations require this information, since not all such installations use this authentication
feature. The Windows NT Domain Name is not the same as the Internet domain name, but is the name of
a group of servers that share common security policy and user account databases. Your PPTP tunnel
partner’s administrator will supply this Windows NT Domain Name if it is required. If you configure your
Router to initiate PPTP tunnel connections by toggling Initiate Connections to Yes, the Optional Windows NT Domain Name field appears. Enter the domain name your network administrator has supplied.
•You can specify the Idle Timeout, an inactivity timer, whose expiration will terminate the tunnel. A value of
zero disables the timer. Because tunnels are subject to abrupt termination when the underlying datalink is
torn down, use of the Idle Timeout is strongly encouraged.
•Return to the Connection Profile screen by pressing Escape.
•Select IP Profile Parameters and press Return.
Virtual Private Networks (VPNs) 4-7
The IP Profile Parameters screen appears.
IP Profile Parameters
Address Translation Enabled: Yes
NAT Map List... Easy-PAT
NAT Server List... Easy-Servers
Local WAN IP Address: 0.0.0.0
Remote IP Address: 173.167.8.10
Remote IP Mask: 255.255.0.0
Filter Set...
Remove Filter Set
RIP Profile Options...
•Enter the Remote IP Address and Remote IP Mask for the host to which you want to tunnel.
About IPsec Tunnels
IPsec stands for IP Security, a set of protocols that supports secure exchange of IP packets at the IP layer.
IPsec is deployed widely to implement Virtual Private Networks (VPNs). See "Overview" on page 4-1 for more
information.
IPsec supports two encryption modes: Transport and Tunnel. Transport mode encr ypts only the data por tion
(payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the
header and the payload. On the receiving side, an IPsec-compliant device decrypts each packet. Netopia
Routers support the more secure Tunnel mode.
Netopia Firmware Version 8.4 offers IPsec 3DES encr yption over the VPN tunnel. DES stands for Data
Encryption Standard, a popular symmetric-key encryption method. DES uses a 56-bit key. Netopia Routers offer
IPsec 3DES (triple DES) encryption as a standard option. Some models support built-in hardware acceleration
of 3DES encryption at line speeds.
Internet Key Exchange (IKE) is an authentication and encryption key management protocol used in conjunction
with the IPsec standard. IPsec key management offers a wide variety of options which are explained in
L2TP stands for Layer 2 Tunnelling Protocol, an extension to the PPP protocol. L2TP combines features of two
other tunneling protocols: PPTP and L2F. Like PPTP, L2TP is a Datalink Encapsulation option in Connection
Profiles. It is not an option in device or link configuration screens, as L2TP is not a native encapsulation.
Consequently, the Easy Setup Profile does not offer L2TP datalink encapsulation. See the "Creating a New
Connection Profile" on page 2-9 for information on creating Connection Profiles.
L2TP configuration
To define an L2TP tunnel, navigate to the Add Connection Profile menu from the Main Menu.