Copyright (C) 2020 PLANET Technology Corp. All rights reserved.
The products and programs described in this User’s Manual are licensed products of PLANET
Technology, This User’s Manual contains proprietary information protected by copyright, and this
User’s Manual and all accompanying hardware, software, and documentation are copyrighted.
No part of this User’s Manual may be copied, photocopied, reproduced, translated, or reduced to any
electronic medium or machine-readable form by any means, electronic or mechanical including
photocopying, recording, or information storage and retrieval systems, for any purpose other than the
purchaser's personal use, and without the prior express written permission of PLANET Technology.
Disclaimer
PLANET Technology does not warrant that the hardware will work properly in all environments and
applications, and makes no warranty and representation, either implied or expressed, with respect to
the quality, performance, merchantability, or fitness for a particular purpose.
PLANET has made every effort to ensure that this User’s Manual is accurate; PLANET disclaims
liability for any inaccuracies or omissions that may have occurred. Information in this User’s Manual is
subject to change without notice and does not represent a commitment on the part of PLANET.
PLANET assumes no responsibility for any inaccuracies that may be contained in this User’s Manual.
PLANET makes no commitment to update or keep current the information in this User’s Manual, and
reserves the right to make improvements and/or changes to this User’s Manual at any time without
notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate
your comments and suggestions.
FCC Compliance Statement
This Equipment has been tested and found to comply with the limits for a Class A digital device,
pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference in a residential installation. This equipment can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful
interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception, which can be determined
by turning the equipment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
– Reorient or relocate the receiving antenna.
– Increase the separation between the equipment and receiver.
– Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
– Consult the dealer or an experienced radio/TV technician for help.
CE mark Warning
The is a class A device, In a domestic environment, this product may cause radio
interference, in which case the user may be required to take adequate measures.
WEEE
To avoid the potential effects on the environment and human health as a result of the
presence of hazardous substances in electrical and electronic equipment, end users of
electrical and electronic equipment should understand the meaning of the crossed-out
wheeled bin symbol. Do not dispose of WEEE as unsorted municipal waste and have to collect such
WEEE separately.
Trademarks
The PLANET logo is a trademark of PLANET Technology. This documentation may refer to numerous
hardware and software products by their trade names. In most, if not all cases, these designations are
claimed as trademarks or registered trademarks by their respective companies.
Revision
User’s Manual of PLANET Industrial 5-Port 10/100/1000T VPN Security Gateway
Model: IVR-100
Rev.: 1.0 (December, 2020)
Part No. EM-IVR-100_v1.0
VPN Gateway x 1
Quick Installation Guide x 1
Wall-mount Kit x 1
Dust Cap x 5
If any of the above items are missing, please contact your dealer immediately.
IVR-100
1.2 Overview
Powerful Industrial VPN Security Solution
The innovation of the Internet has created tremendous worldwide opportunities for e-business and
information sharing. It has become essential for businesses to focus more on network security issues.
The demand for information security has become the primary concern for the enterprises. To fulfill this
demand, PLANET has launched the IVR-100 Industrial VPN Security Gateway, an all-in-one appliance
that carries several main categories across your industrial network security deployments: Cyber
security, SPI firewall security protection, policy auditing (Content Filtering, VPN Tunnel an d V LA N ) , and
easy management (Setup Wizard, QoS and Dashboard). Furthermore, its Dual-WAN Failover and
Outbound Load Balancing features can improve the network efficiency while the web-based interface
provides friendly and consistent user experience. For the harsh environment, the IVR-100 can not onl y
operate stably under temperature range from -40 to 75 degrees C, but also is equipped with a compact
IP30 metal case that allows either DIN-rail or wall mounting for efficient use of cabinet space.
The IVR-100 built-in SPI (stateful packet inspection) firewall and anti DoS/DDoS attack functions
provide high efficiency and extensive protection for your network. Virtual server and DMZ functions can
let you set up servers in the Intranet and still provide services to the Internet users.
Ideal VPN Security Gateway Solution for SMBs
The IVR-100 provides complete data security and privacy for accessing and exchanging most sensitive
data, built-in IPSec VPN function with DES/3DES/AES encryption and
MD5/SHA-1/SHA-256/SHA-384/SHA-512 authentication, and GRE, SSL, PPTP and L2TP server
mechanism. The full VPN capability in the IVR-100 makes the connection solidly secure, more flexible,
and more capable.
The IVR-100 supports many popular security features including Content Filtering to block specific URL,
MAC/IP filtering, outbound load balancing and more. Furthermore, it provides higher performance with
all Gigabit Ethernet interfaces which offer faster speeds for your network applications. The Gigabit
user-defined interfaces flexibly fulfill the network requirements, and the dual-WAN interfaces enable the
IVR-100 to support outbound load balancing and WAN fail-over features.
Cybersecurity Network Solution to Minimize Security Risks
The cybersecurity feature included to protect the switch management in a mission-critical network
virtually needs no effort and cost to install. For efficient management, the IVR-100 is equipped with
HTTPS web and SNMP management interfaces. With the built-i n web-based management interface,
the IVR-100 offers an easy-to-use, platform independent management and configuration facility. As the
IVR-100 supports SNMP, it can be managed via any management software based on the standard
SNMP protocol.
Improving Network Efficiency
The IVR-100 has link redundancy, content filtering and many more functions to make the entire network
system perform better. It is applicable to the small-scale sector (from 10 to 50 people), using a compact
industrial design, with five Gigabit ports (WAN/LAN). The IVR-100’s economical price with complete
cable management features make it an inevitable choice for the next-generation office network load
balancer.
The IVR-100’s built-in content filtering feature can automatically resolve the IP address corresponding
to all. Users’ network can be easily managed by just typing the URL of the websites like Facebook,
YouTube and Yahoo.
The IVR-100 can connect dual WANs with up to two different ISPs. It creates a stable and qualified
VPN connection for many important applications such as VoIP, video conferencing and data
transmission.
To facilitate transportation and industrial-level applications, the IVR-100 provides an integrated power
solution with a wide range of voltages (9~48V DC) for worldwide operability. It also provides
dual-redundant, reversible polarity 9~48V DC power supply inputs for high availability applications.
Stable Operating Performance under Difficult Environments
Today, the VPN demand expands from commercial applications to many critical networks in the harsh
environment. The IVR-100 will be one of the ideal solutions that provide a high level of immunity
against electromagnetic interference and heavy electrical surges typical of environments found on plant
floors or in curb-side traffic control cabinets. The IVR-100 can operate stably under temperature range
from -40 to 75 degrees C which enables the users to conveniently apply the device in almost any
location of the network. The IVR-100 is also equ ip ped with a compact IP30 standard metal case that
allows either DIN-rail or wall mounting for efficient use of cabinet space.
PLANET IVR-100 can work as a VPN security gateway in an industria l application f or a company that
has a factory and many different divisions. With IPSec/GRE/PPTP/L2TP/SSL VPN solutions, the
IVR-100 provides secured data communication for branches, vendors, and mobile workers with a
flexible way to connect back to the headquarters.
The IVR-100 connects dual WANs with up to two different ISPs. It creates a stable and qualified VPN
connection for many important applications such as VoIP, video conferencing and data transmission.
5 10/100/1000BASE-T RJ45 ports
1 undefined Ethernet port (LAN/WAN)
Dual-WAN function
1 USB 3.0 port for system configuration backup and firmware upgrade
Reset button
Industrial Case and Installation
IP30 metal case
Solid DIN-rail, wal l-mount or side wall-mount design
Supports 6KV DC Ethern et ESD protec t io n
IVR-100
Fault alarm for power input failure
DC redundant power with reverse polarity protection
-40 to 75 degrees C operating temperature
Static IP/DHCP client for WAN
Protocols: TCP/IP, UDP, ARP, IPv4, IPv6
Port forwarding
QoS
DMZ
VLAN
IGMP Proxy
SNMP(v1/v2C/v3)
DHCP server/NTP client
MAC address clone
DDNS: PLANET DDNS, PLANET Easy DDNS, DynDNS and No-IP
Cybersecurity
Others
IVR-100
Setup wizard
Dashboard for real-time system overview
Supported access by HTTP or HTTPS
Auto reboot
Configuration backup and restoration via remote/USB port
Firmware upgrade via remote/USB port
Event message logging to remote syslog server
PLANET Smart Discovery utility/UNI-NMS supported
USB 3.0 port for system configuration backup
and restoration.
Lights up when the power is on.
has failed.
“Steady on” to indicate the port is
connected to other network device
successfully.
the port.
“Steady on” to indicate that the
port is successfully connecting to
the network at 1000Mbps.
“Off” to indicate that the port is
successfully connecting to the
network at 10Mbps or 100Mbps.
Power on the device and press the reset
Reset Button
Gigabit Port 1-3 It is a LAN port for connecting to a switch.
Gigabit Port 4
Gigabit Port 5
- 17 -
button for less than 5 seconds to reboot it or
over 5 seconds to restore it to factory default
settings.
Default is LAN port. It can be defined as LAN
port or WAN port.
It is a WAN port for connecting to a perimeter
gateway.
The upper panel of the Industrial Gateway consists of one terminal block connector within two DC
power inputs.
2.1.3 Wiring the Power Inputs
The 6-contact terminal block connector on the top panel of Industrial Gateway is used for two DC
redundant power inputs . Pl ease follow the steps below to insert the power wire.
1. Insert positive and negative DC power wires into contacts 1 and 2 for POWER 1, or 5 and 6 for
To avoid damage, please use the Industrial Gateway under its
specification.
2. Tighten the wire-clamp screws for preventing the wires from loosening.
1 2 3 4 5 6
Power 1 Fault Power 2
IVR-100
+ - + -
The wire gauge for the terminal block should be in the range from 12 to 24 AWG.
2.1.4 Wiring the Fault Alarm Contact
The fault alarm contacts are in the middle of the terminal block connector as the picture shows below.
Inserting the wires, the Industrial Gateway will detect the fault status of the power failure and then forms
an open circuit. The following illustration shows an application example for wiring the fault alarm
contacts.
This section describes how to install the Industrial Gateway. There are three methods to install the
Industrial Gateway -- DIN-rail mounting, wall mounting and side wall mounting. Basic knowledge of
networking is assumed.
Please read the following sections and perform the procedures in the order being presented.
(The device shown on this chapter is just a representation of the said device.)
2.2.1 DIN-rail Mounting
Step 1: Lightly slide the DIN-rail into the track.
Step 2: Check whether the DIN-rail is tightly on the track.
A. Connect one end of a standard network cable to the LAN port (port 1) of the device.
B. Connect the other end of the cable to the hub / switch.
The UTP Category 5, 5e or 6 network cabling with RJ45 tips is recommended.
Step 4: Connect your device to internet.
A. Connect one end of a standard network cable to the WAN port (port 5) of the device.
B. Connect the other end of the cable to the LAN port of ISP network device (such as a modem).
If there is only one line connected to the outer network in your network environment, it is
suggested that you use WAN port (port 5).
Step 5: Power on the device. When the device receives power, the Power LED should remain solid
Green.
2.2.2 Wall Mount Plate Mounting
To install the Industrial Gateway on the wall, please follow the instructions below.
Step 1: Remove the DIN-rail from the Industrial Gateway. Use the screwdriver to loosen the screws to
remove the DIN-rail.
Step 2: Place the wall-mount plate on the rear panel and use the screwdriver to screw the wall mount
Step 3: Use the hook holes at the corners of the wall mount plate to hang the Industrial Gateway on the
wall.
Step 4: To remove the wall mount plate, reverse the steps above.
Step 5: Proceed with Steps 3, 4 and 5 in Secti on 2.2.1 DIN-rail Mounting to connect the network
To install the Industrial Gateway on the wall, please follow the instructions below.
Step 1: Remove the DIN-rail from the Industrial Gateway. Use the screwdriver to loosen the screws to
remove the DIN-rail.
Step 2: Place the wall-mount plate on the side panel and use the screwdriver to screw the wall mount
plate tightly on the Industrial Gateway.
Step 3: Use the hook holes at the corners of the wall mount plate to hang the Industrial Gateway on the
wall.
Step 4: To remove the wall mount plate, reverse the steps above.
Step 5: Proceed with Steps 3, 4 and 5 in Section 2.2.1 DIN-rail Mounting to connect the network
Before getting into the device’s web UI, user has to check the network setting and configure PC’s IP
address.
3.1 Requirements
User is able to confirm the following items before configuration:
1. Please confirm the network is working properly; it is strongly suggested to test your network
connection by connecting your computer directly to ISP.
2. Suggested operating systems: Windows 7 / 8 / 10.
3. Recommended web browsers: IE / Firefox / Chrome.
3.2 Setting TCP/IP on your PC
The default IP address of the VPN Gateway is 192.168.1.1, and the DHCP Server is on. Please set the
IP address of the connected PC as DHCP client, and the PC will get IP address automatically from the
VPN Gateway.
Please refer to the following to set the IP address of the conn ect ed PC.
3.2.1 Wind ows 7/8
If you are using Windows 7/8, please refer to the following:
1. Click on the network icon from the right side of the taskbar and th en click on “Open Net work and
For easily listing the Gateway in your Ethernet environment, the search tool -- Planet Smart Discovery
Utility -- is an ideal solution.
The following installation instructions are to guide you to running the Planet Smart Discovery Utility.
1. Download the Planet Smart Discovery Utility in administrator PC.
2. Run this utility as the following screen appears.
1. This utility shows all necessary information from the devices, such as MAC address, device name,
firmware version, and device IP subnet address. It can also assign new password, IP subnet
address and description to the devices.
2. After setup is completed, press the “Update Device”, “Update Multi” or “Update A ll” button to take
effect. The functions of the 3 buttons above are shown below:
Update Device: use current setting on one single device.
Update Multi: use current setting on choose multi-devices.
Update All: use current setting on whole devices in the list.
The same functions mentioned above also can be found in “Option” tools bar.
3. To click the “Control Packet Force Broadcast” function, it allows you to assign a new setting
value to the device under a different IP subnet address.
4. Press the “Connect to Device” button and the Web login screen appears.
Press the “Exit” button to shut down the Planet Smart Discovery Utility.
This chapter provides setup details of the device’s Web-based Interface.
4.1 Introduction
The device can be configured with your Web browser. Before configuring, please make sure your PC is
under the same IP segment with the device.
4.2 Logging in to the VPN Gateway
Refer to the steps below to configure the VPN Gateway:
Step 1. Connect the IT administrat or ’s PC and VPN Gateway’s LAN por t (port 1) to the s ame hub /
switch, and then launc h a b r owser t o link the managem ent inter f ac e a ddres s whi c h is s et to
http://192.168.1.1 by default.
The DHCP server of the VPN Gateway is enabled. Therefore, the LAN PC
will get IP from the VPN Gateway. If user needs to set IP address of LAN
PC manually, please set the IP address within the range between
192.168.1.2 and 192.168.1.254 inclusively, and assigned the subnet mask
of 255.255.255.0.
Step 2. The browser prompts you for the login credentials. (Both are “admin” by default.)
Default IP address: 192.168.1.1
Default user name: admin
Default password: admin
Administrators are strongly suggested to change the default admin and
password to ensure system security.
After a successful login, the main web page appears. The web main page displays the web panel, main
menu, function menu, and the main information in the center.
Figure 4-1: Main Web Page
■ Web Panel
The web panel displays an image of the device’s ports as shown in Figure 4-2.
The main menu displays the product name, function menu, and main information in the center. Via the
Web management, the administrator can set up the device by selecting the functions those listed in the
function menu and button as shown in Figures 4-3 and 4-4.
Figure 4-3: Function Menu
Object Description
System
Network
Security
VPN
Maintenance
Provides System information of the Gateway.
Provides WAN, LAN and network configuration of the Gateway.
Provides Firewall and security configuration of the Gateway.
Provides VPN configuration of the Gateway.
Provides firmware upgrade and setting file restore/backup
configuration of the Gateway.
Figure 4-4: Function Button
Object Description
Click the "Refresh button" to refresh the current web page.
Click the "Logout button" to log out the web UI of the Gateway.
Use the System menu items to display and configure basic administrative details of the Gateway. The
System menu shown in Figure 4-5 provides the following features to configure and monitor system.
Object Description
Wizard
Dashboard
Status
Statistics
Connection Status
SNMP
Figure 4-5: System Menu
The Wizard will guide the user to configuring the Gateway easily
and quickly.
The overview of system information includes connection, port,
and system status.
Display the status of the system, LAN and WAN.
Display statistics information of network traffic of LAN and WAN.
Display the DHCP client table and the ARP table.
Display SNMP system information.
The Wizard will guide the user to configuring the Gateway easily and quickly. There are different
procedures in different operation modes. According to the operation mode you switch to, please follow
the instructions below to configure the Gateway via Setup Wizard as shown in Figure 4-6.
Figure 4-6: Setup Wizard
Step 1: LAN Interface
Set up the IP Address and Subnet Mask for the LAN interface as shownin Figure 4-7.
Figure 4-7: Setup Wizard – LAN Configuration
Object Description
IP Address
Subnet Mask
DHCP Server
Enter the IP address of your Gateway. The default is 192.168.1.1.
An address code that determines the size of the network. Normally
use 255.255.255.0 as the subnet mask.
By default, the DHCP Server is enabled.
If user needs to disable the function, please uncheck the box.
By default, the start IP address is 192.168.1.100.
Please do not set it to the same IP address of the Gateway.
By default, the maximum DHCP users are 101, whi c h mean the
Maximum DHCP Users
Gateway will provide DHCP clie n t w ith IP address from 192.168.1.100
to 192.168.1.200 when the start IP address is 192.168.1.100.
Next
Press this button to the next step.
Press this button to undo any changes made locally and revert to
Cancel
previously saved values.
Step 2: WAN Interface
The Gateway supports two access modes on the WAN side shownin Figure 4-8
Select Static IP Address if all the Internet port’s IP information is provided to you by your ISP. You will
need to enter the IP Address, Netmask, Default Gateway and DNS Ser v er provided to you by your
ISP. Each IP address entered in the fields must be in the appropriate IP form, which are four octets
separated by a dot (x.x.x.x). The Gateway will not accept the IP address if it is not in this format. The
setup is shown in Figure 4-10.
Figure 4-10: WAN Interface Setup – Static IP Setup
Object Description
IP Address
Netmask
Default Gateway
DNS Server
Enter the IP address assigned by your ISP.
Enter the Netmask assigned by your ISP.
Enter the Gateway assigned by your ISP.
The DNS server information will be supplied by your ISP.
The SPI Firewall prevents attack and improper access to network
SPI Firewall
Block SYN Flood
Block ICMP Flood
Block WAN Ping
Remote Management
resources.
The default configuration is enabled.
SYN Flood is a popular attack way. DoS and DDoS are TCP
protocols. Hackers like using this method to make a fake connection
that involves the CPU, memory, and so on.
The default configuration is enabled.
ICMP is kind of a pack of TCP/IP; its important function is to transfer
simple signal on the Internet. There are two normal attack ways
which hackers like to use, Ping of Death and Smurf attack.
The default configuration is disabled.
Enable the function to allow the Ping access from the Internet
network.
The default configuration is disabled.
Enable the function to allow the web server access of the Gateway
from the Internet network.
The default configuration is disabled.
Next
Previous
Press this button for the next step.
Press this button for the previous step.
Press this button to undo any changes made locally and revert to
Cancel
previously saved values.
Step 4: Setup Completed
The page will show the summary of LAN, WAN and Security settings as shown in Figure 4-13.
This page is used to configure the parameters for Internet network which connects to the WAN port of
the Gateway as shown in Figure 4-20. Here you may select the access method by clicking the item
value of WAN access type.
WAN Acces s Ty p e
Figure 4-20: WAN
Please select the corresponding WAN Access Ty pe for the Internet,
and fill out the correct parameters from your local ISP in the fields
which appear below.
Select Static IP Address if all the Internet ports’ IP
information is provided to you by your ISP (Internet
Service Provider). You will need to enter the IP
address, Netmask, Gateway, and DNS Server provided
to you by your IS P.
Static
Each IP address entered in the fields must be in the
appropriate IP form, which are four octets separated by
a dot (x.x.x.x). The Gateway will not accept the IP
address if it is not in this format.
The DNS server information will be supplied by your
ISP.
DHCP
WAN IP, whether obtained automatically or specified manually, should NOT be on
the same IP net segment as the LAN IP; otherwise, the Gateway will not work
properly. In case of emergency, press the hardware-based "Reset" button.
Select DHCP Client to obtain IP Address information
automatically from your ISP.
4.5.2 WAN A dvan ced
This page is used to configure the advanced parameters for Internet area network which connects to
the WAN port of your Gateway as shown in Figure 4-21. Here you may change the setting for Load
Balance Weight, Detect Interval, Detect Link Up Threshold, etc...
Detect Link Up
Threshold
Detect Link Down
Threshold
Custom Detect Host
4.5.3 LAN Setup
Load Balance Weight allows you to set a relative weight (from 1 - 10)
for each WAN port.
Enable to detect the status of WAN connection.
Set the detect interval as you need.
The recommended value is 5 (default).
Set the times for detecting link up.
The recommended value is 8 (default).
Set the times for detecting link down.
The recommended value is 3 (default).
The host is used to check whether the internet connection is alive or
not.
This page is used to configure the parameters for local area network which connects to the LAN port of
your Gateway as shown i n Figure 4-22. Here you may change the settings for IP address, subnet mask,
DHCP, etc.
Figure 4-22: LAN Setup
Object Description
IP Address The LAN IP address of the Gateway and default is 192.168.1.1.
Net Mask Default is 255.255.255.0.
Please refer to the following sections for the details as shown in Figures 4-23 and 24.
Figure 4-23: Routing table
IVR-100
Figure 4-24: Routing setup
Routing tables contain a list of IP addresses. Each IP address identifies a remote router (or other
network gateway) that the local router is configured to recognize. For each IP address, the routing table
additionally stores a network mask and other data that specifies the destination IP address ranges that
remote device will accept.
Type
Destination
Net Mask
There are two types: Host and Net.
When the Net type is selected, user does not need to input the
Gateway.
The network or host IP address desired to access.
The subnet mask of destination IP.
The gateway is the router or host’s IP address to which packet was
Gateway
Interface
Comment
sent. It must be the same network segment with the WAN or LAN
port.
Select the interface that the IP packet must use to transmit out of the
router when this route is used.
Enter any words for recognition.
4.5.5 WAN IPv6 Setting
This page is used to configure parameter for IPv6 internet network which connects to WAN port of the
Gateway as shown in Figure 4-25. It allows you to enable IPv6 function and set up the parameters of
the Gateway’s WAN. In this setting you may change WAN connection type and other settings.
Connection Type
IPv6 Address
Subnet Prefix Length
Default Gateway
Figure 4-25: IPv6 WAN setup
Select IPv6 WAN type either by using DHCP or Static.
Enter the WAN IPv6 address.
Enter the subnet prefix length.
Enter the default gateway of the WAN port.
The DHCP service allows you to control the IP address configuration of all your network devices. When
a client (host or other device such as networked printer, etc.) joins your network it will automatically get
a valid IP address from a range of addresses and other settings from the DHCP service. The client
must be configured to use DHCP; this is something called "automatic network configuration" and is
often the default setting. The setup is shown in Figure 4-26.
DHCP Service
Start IP Address
Maximum DHCP Users
Set DNS
Figure 4-26: DHCP
By default, the DHCP Server is enabled, meaning the Gateway will
assign IP addresses to the DHCP clients automatically.
If user needs to disable the function, please set it as disable.
By default, the start IP address is 192.168.1.100.
Please do not set it to the same IP address of the Gateway.
By default, the maximum DHCP users are 101, meaning the
Gateway will provide DHCP client with IP address from
192.168.1.100 to 192.168.1.200 when the start IP address is
192.168.1.100.
By default, it is set as Automatically, and the DNS server is the
Gateway’s LAN IP address.
If user needs to use specific DNS server, please set it as Manually,
The Gateway offers the DDNS (Dynamic Domain Name System) feature, which allows the hosting of a
website, FTP server, or e-mail server with a fixed domain name (named by yourself) and a dynamic IP
address, and then your friends can connect to your server by entering your domain name no matter
what your IP address is. Before using this feature, you need to sign up for DDNS service providers such
as PLANET DDNS (http://www.planetddns.com
PLANET DDNS website provides a free DDNS (Dynamic Domain Name Server) service for PLANET
devices. Whether the IP address used on your PLANET device supporting DDNS service is fixed or
dynamic, you can easily connect the devices anywhere on the Internet with a meaningful or
easy-to-remember name you gave. PLANET DDNS provides two types of DDNS services. One is
PLANET DDNS and the other is PLANET Easy DDNS as shown in Figure 4-27.
PLANET DDNS
For example, you've just installed a PLANET IP camera with dynamic IP like 210.66.155.93 in the
network. You can name this device as “Mycam1” and register a domain as Mycam1.planetddns.com at
PLANET DDNS (http://www.planetddns.com
but just the URL link: Mycam1.planetddns.com.
PLANET Easy DDNS
PLANET Easy DDNS is an easy way to help user to get your Domain Name with just one click. Y ou can
just log in to the Web Management Interface of your devices, say, your Gateway, and check the DDNS
) and set up the domain name of your choice.
). Thus, you don't need to memorize the exact IP address
menu and just enable it. You don’t need to go to http://www.planetddns.com
Once you enabled the Easy DDNS, your PLANET Network Device will use the format PLxxxxxx where
xxxxxx is the last 6 characters of your MAC address that can be found on the Web page or bottom label
of the device. (For example, if the Gateway’s MAC address is A8-F7-E0-81-96-C9, it will be converted
into pt8196c9.planetddns.com)
When this function is enabled, DDNS hostname will appear
IVR-100
DDNS Service
Interface
DDNS Type
Easy DDNS
User Name
By default, the DDNS service is disabled.
If user needs to enable the function, please set it as enable.
User is able to select the interface for DDNS service.
By default, the interface is WAN 1.
There are three options:
1. PLANET DDNS: Activate PLANET DDNS service.
2. DynDNS: Activate DynDNS service.
3. NOIP: Activate NOIP service.
Note that please first register w ith the DDNS service and set up the
domain name of your choice to begin using it.
When the PLANET DDNS service is activated, user is able to s elect
to enable or disable Easy DDNS.
automatically. User doesn’t go to http://www.planetddns.com to
apply for a new account.
The user name is used to log into DDNS service.
Password
Host Name
Interval
Update Status
The password is used to log into DDNS service.
The host name as registered with your DDNS provider.
Set the update interval of the DDNS function.
Show the connection status of the DDNS function.
The Security menu provides Firewall, Access Filtering and other functions as shown in Figure 4-29.
Please refer to the following sections for the details.
Figure 4-29: Security menu
Firewall
MAC Filtering
IP Filtering
Web Filtering
Port Range
Forwarding
DMZ
Allows setting DoS (Denial of Service) protection as enable.
Allows setting MAC Filtering.
Allows setting IP Filtering.
Allows setting Web Filtering.
A "Denial-of-Service" (DoS) attack is characterized by an explicit attempt by hackers to prevent
legitimate users of a service from using that service. The Gateway can prevent specific DoS attacks as
shown in Figure 4-30.
SPI Firewall
Block SYN Flood
Block FIN Flood
Figure 4-30: Firewall
The SPI Firewall prevents attack and improper access to network
resources.
The default configuration is enabled.
SYN Flood is a popular attack way. DoS and DDoS are TCP
protocols. Hackers like using this method to make a fake connection
that involves the CPU, memory, and so on.
The default configuration is enabled.
If the function is enabled, when the number of the current FIN
packets is beyond the set value, the Gateway will start the blocking
function immediately.
The default configuration is disabled.
If the function is enabled, when the number of the current
Block UDP Flood
Block ICMP Flood
IP TearDrop
Ping Of Death
Block WAN Ping
UPD-FLOOD packets is beyond the set value, the Gateway will start
the blocking function immediately.
The default configuration is disabled.
ICMP is kind of a pack of TCP/IP; its important function is to transfer
simple signal on the Internet. There are two normal attack ways
which hackers like to use, Ping of Death and Smurf attack.
The default configuration is disabled.
If the function is enabled, the Gateway will block Teardrop attack that
is targeting on TCP/IP fragmentation reassembly codes.
If the function is enabled, the Gateway will block Ping of Death
attack that aims to disrupt a targeted machine by sending a packet
larger than the maximum allowable size causing the target machine
to freeze or crash.
Enable the function to allow the Ping access from the Internet
network.
The default configuration is disabled.
Remote Management
Enable the function to allow the web server access of the Gateway
from the Internet network.
The default configuration is disabled.
Entries in this table are used to restrict certain types of data packets from your local network or Internet
through the Gateway. Use of such filters can be helpful in securing or restricting your local network as
shown in Figure 4-31.
Enable MAC Filtering
Interface
MAC Address
Add
Remove
Remove All
Figure 4-31: MAC Filtering
Set the function as enable or disable.
When the function is enabled, the Gateway will block traffic of the
MAC address on the list.
Select the function works on LAN, WAN or both. If you want to block
a LAN device’s MAC address, please select LAN, vice versa.
Input a MAC address you want to contro l , such as
A8:F7:E0:00:06:62.
When you input a MAC address, please click the “Add” button to add
it into the list.
If you want to remove a MAC address from the list, please click on
the MAC address, and then click the “Remove” button to remove it.
If you want to remove all MAC addresses from the list, please click
the “Remove All” button to remove all.
Check the box if you want to control all web sites, meaning the LAN
user can’t visit any web site.
Input the port of destination IP Address which you want to block.
Leave it as blank if you want to block all ports of the web site.
Select the protocol type (TCP, UDP or all).
If you are unsure, please leave it to the default all protocol.
4.6.4 Web Filtering
Web filtering is used to deny LAN users from accessing the internet as shown in Figure 4-34. Block
those URLs which contain keywords listed below.
Web Filtering
Add Web Filtering Rule
Object Description
Figure 4-34: Web Filtering
Set the function as enable or disable.
Go to the Add Web Filtering Rule page to add a new rule.
Figure 4-35: Web Filtering Rule Setting
Status
Filter Keyword
Set the rule as enable or disable.
Input the URL address that you want to filter, such as
Entries in this table allow you to automatically redirect common network services to a specific machine
behind the NAT firewall as shown in Figure 4-36.These setti ngs are on l y necessa ry if you wish to host
some sort of server like a web server or mail server on the private local network behind your Gateway's
NAT firewall.
Figure 4-36: Port Forwarding
Port Forwarding
Add Port Forwarding Rule
Rule Name
Set the function as enable or disable.
Go to the Add Port Forwarding Rule page to add a new rule.
Figure 4-37: Port Forwarding Rule Setting
Enter any words for recognition.
Protocol
External Service Port
Select the protocol type (TCP, UDP or both). If you are unsure,
please leave it to the default both protocols.
Enter the external ports you want to control. For TCP and UDP
services, enter the beginning of the range of port numbers used by
the service. If the service uses a single port number, enter it in both
the start and finish fields.
Enter the local IP address.
Enter local ports you want to control. For TCP and UDP Services,
enter the beginning of the range of port numbers used by the
service. If the service uses a single port number, enter it in both the
start and finish fields.
4.6.6 DMZ
A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its
local private network as shown in Figure 4-38.Typically, the DMZ host contains devices accessible to
Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers.
DMZ
DMZ IP Address
Figure 4-38: DMZ
Object Description
Set the function as enable or disable. If the DMZ function is enabled,
it means that you set up DMZ at a particular computer to be exposed
to the Internet so that some applications/software, especially
Internet/online game can have two way connections.
Enter the IP address of a particular host in your LAN which will
receive all the packets originally going to the WAN port/Public IP
address above.
To obtain a private and secure network link, the Gateway is capable of establishing VPN connections.
When used in combination with remote client authentication, it links the business’ remote sites and
users, conveniently providing the enterprise with an encrypted network communication method. By
allowing the enterprise to utilize the Internet as a means of transferring data across the network, it
forms one of the most effective and secure options for enterprises to adopt in comparison to other
methods.
The Maintenance menu provides the following features for managing the system as Figure 4-39 is
shown below:
IPSec (IP Security) is a generic standardized VPN solution. IPSec must be implemented in the IP stack
which is part of the kernel. Since IPSec is a standardized protocol it is compatible to most vendors that
implement IPSec. It allows users to have an encrypted network session by standard IKE (Internet Key
Exchange). We strongly encourage you to use IPSec only if you need to because of interoperability
purposes. When IPSec lifetime is specified, the device can randomly refresh and identify forged IKE’s
during the IPSec lifetime.
This page will allow you to modify the user name and passwords as shown in Figure 4-40.
Add IPSec Tunnel
Figure 4-40: IPSec
Go to the Add IPSec Tunnel page to add a new tunnel.
Input the IP address of the remote host. For instance, "210.66.1.10”.
The remote subnet in CIDR notation. For instance, "210.66.1.0”.
The netmask of the remote host.
Set up the detection time of DPD (Dead Peer Detection).
By default, the DPD detection ’s gap is 30 seconds, o ver 150 seconds
to think that is the broken line.
When VPN detects opposit e party reaction time, the func tion will take
one of the actions: “Hold” stand for the system will retain IPSec SA,
"Clear" stand for the tunnel will clean away and waits for the new
sessions, "Restart" will delete the IPSec SA and reset VPN tunnel.
Enter a pass phrase to be used to authenticate the other side of the
tunnel. Should be the same as the remote host.
Select the IKE (Internet Key Exchange) vers i on.
Connection Type
ISAKMP
1. Main.
2. Aggressive.
It provides the wa y to create the SA between two PCs. T he SA can
access the encoding b etween two PCs, and the IT adm inistrator can
assign to which key size or Preshare Key and algorithm to use. The SA
comes in many connection ways.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block c ipher formed from the DES cipher
by using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen
5. M D5 Algorithm: MD5 processes a vari ably long m essage into a
fixed-length output of 128 bits.
6. DH Group: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
IKE SA Lifetime
ESP
You can specify how long IKE packets are valid.
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
1. AES: All using a 128-bit, 192-bit and 256-
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher
Use the IP address and the scope option needs to match the far end of the PPTP server; its goal is to
use the PPTP channel technology, and establish Site-to-Site VPN where the channel can have equally
good results from different methods with IPSec. The PPTP server is shown in Figure 4-44.
Object Description
PPTP Server
Broadcast
Force MPPE
Encryption
CHAP
MSCHAP
Figure 4-44: PPTP server
Set the function as enable or disable.
Enter any words for recognition.
Set the encryption as enable or disable.
Set the authentication as enable or disable.
Set the authentication as enable or disable.
Set the authentication as enable or disable.
When the PPTP client connects to the PPTP server, it will assign the
DNS server IP address to client.
When the PPTP client connects to the PPTP server, it will assign the
WINS server IP address to client.
Input the IP address of the PPTP Server. For instance, "192.168.10.1”.
When the VPN connection is established, the VPN client will get IP
address from the VPN Server. Please set the range of IP Address. For
instance, the start IP address is "192.168.10.10”, the end IP address is
"192.168.10.100”.
Create the username and password for the VPN client.
[Example] Establishing the PPTP VPN connection between two VPN Gateways.
Follow the steps below for setting up the PPTP VPN server:
This section assists you in setting the L2TP Server as shown in Figure4-45.
IVR-100
L2TP Server
Server IP Address
Clients IP Address
(Start/End)
With IPsec
Figure 4-45: L2TP Server
Set the function as enable or disable.
Input the IP address of the L2TP Server. For instance, "192.168.50.1”.
When the VPN connection is established, the VPN client will get IP
address from the VPN Server. Please set the range of IP Address. For
instance, the start IP address is "192.168.50.100”, the end IP address is
"192.168.50.200”.
Set the function as enable to make the L2TP work with IPsec encryption.
Enter a pass phrase.
Create the username and password for the VPN client.
1. Main.
2. Aggressive.
It provides the way to create the SA between two PCs. The SA can
access the encoding between two PCs, and the IT administrator can
assign to which ke y size or Preshare Key and algorith m to use. The SA
comes in many connection ways.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher by
using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen.
IKE SA Lifetime
ESP
ESP Key life
5. MD5 Algorithm: MD5 processes a variably long message into a
fixed-length output of 128 bits.
6. DH Group: Either 1, 2, 5, 14, 15, 16, 17, or 18 can be chosen.
You can specify how long IKE packets are valid.
It offers AES, 3 DES, SHA 1, SHA2, and MD5.
1. AES: All using a 128-bit, 192-bit and 256-bit key. AES is a
commonly seen and adopted nowadays.
2. 3DES: Triple DES is a block cipher formed from the DES cipher by
using it three times. It can achieve an algorithm up to 168 bits.
3. SHA1: The SHA1 is a revision of SHA. It has improved the
shortcomings of SHA. By producing summary hash values, it can
achieve an algorithm up to 160 bits.
4. SHA2: Either 256, 384 or 512 can be chosen.
5. MD5 Algorithm: MD5 processes a variably long message into a
fixed-length output of 128 bits.
You can specify how long ESP packets are valid.
[Example] Establishing the L2TP VPN connection between the VPN Gateway and mobile phone.
Please refer the steps to configure the VPN settings of the VPN Gateway:
1. Connect the VPN Gateway to internet by the Wizard.
IVR-100
2. Go to the System -> Status page to check the WAN IP address. Make sure the VPN
Gateway gets public IP address successfully.
3. Go to the VPN -> L2TP page. Set the L2TP Server as enable, input the Server IP Address as
the VPN Gateway’ s public WAN IP address and other necessary information.
4. Please configure the VPN settings of your mobile phone.
Here we use iPhone as the example: please go to the Settings -> VPN page, click the “Add
VPN Configuration…”.
Note that the VPN settings might be different from each OS of mobile phone, if you do not
know how to configure it, please contact with the dealer of mobile phone.
The all information should be the same as VPN Gateway.
For example, the Type should be L2TP, the Server should be the WAN IP of VPN Gateway,
the account should be the L2TP User of VPN Gateway, the Password should be the L2TP
Password of VPN Gateway, and the Secret should be the L2TP Preshare Key of VPN
Gateway.
6. Slide the Status slider to “Connecting”, it will start to connect to the VPN server. When the
VPN connection is established, the Status will show “Connected”.
The Maintenance menu provides the following features for managing the system as Figure 4-48 is
shown below:
Administrator
Date & Time
Save/Restore
Configuration
Firmware Upgrade
Reboot / Reset
Auto Reboot
Diagnostics
Figure 4-48: Maintenance Menu
Allows changing the login username and password.
Allows setting Date & Time function.
Export the Gateway’s configuration to local or USB sticker.
Restore the Gateway’s configuration from local or USB sticker.
Upgrade the firmware from local or USB storage.
Reboot or reset the system.
Allows setting auto-reboot schedule.
Allows you to issue ICMP PING packets to troubleshoot IP.
4.8.1 Administrator
To ensure the Gateway's security is secure, you will be asked for your password when you access the
Gateway's Web-based utility. The default user name and password are "admin". This page will allow
you to modify the user name and passwords as shown in Figure 4-21.
This section assists you in setting the system time of the Gateway. You are able to either select to set
the time and date manually or automatically obtain the GMT time from Internet as shown in Figure 4-49.
Object Description
Current Time
Time Zone Select
Figure 4-49: Date and Time
Show the current time.
User is able to set time and date manually.
Select the time zone of the country you are currently in. The Gateway will
set its time based on your selection.
Once this function is enab led, Gateway will autom aticall y update c urrent
time from NTP server.
User may use the default NTP sever or input NTP server manually.
4.8.3 Saving/Restoring Configuration
This page shows the status of the configuration. You may save the setting file to either USB storage or
PC and load the setting file from USB storage or PC as Figure 4-50is shown below:
Figure 4-50: Save/Restore Configuration
■ Save Setting to PC
Configuration Export
Press the button to save setting file to PC.
Press the button to select the setting file, and then
Backup Settings to
USB Storage
Load Settings from
USB Storage
Unmount
Press the button to save setting file to USB storage.
Press the
Before removing the USB storage fr om the Gateway, please press the
button first.
button to upload setting file from USB storage.
4.8.4 Upgrading Firmware
This page provides the firmware upgrade of the Gateway as shown in Figure 4-51.
IVR-100
Figure 4-51: Firmware upgrade
Description
Choose File
Upgrade
Press the button to select the firmware.
Press the button to upgrade firmware to system.
4.8.5 Reboot / Reset
This page enables the device to be rebooted from a remote location. Once the Reboot button is
pressed, users have to re-log in the Web interface as Figure 4-52is shown below:
Press the button to r eb oot system.
Press the button to restore all settings to factory default
settings.
Check the box and then press the button
to keep the current network profiles and reset all other
configurations to factory defaults.
4.8.6 Diagnostics
The page allows you to issue ICMP PING packets to troubleshoot IP connectivity issues. After you have
pressed “Ping”, ICM P packets will be transmitted, and the sequence number and roundtrip time will be
displayed upon reception of a reply. The Page refreshes automatically until responses to all packets are
received, or until a timeout occurs. The ICMP Ping is shown in Figure 4-53.