Planet Technology VRT-401 User Manual

n
Networking & Communicatio
Broadband VPN Router
VRT-401
Copyright
Copyright (C) 2002 PLANET Technology Corp. All rights reserved. The products and programs described in this User’s Manual are licensed products of PLANET
Technology, This User’s Manual contains proprietary information protected by copyright, and this User’s Manual and all accompanying hardware, software, and documentation are copy­righted.
No part of this User’s Manual may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form by any means by electronic or mechanical. Including photocopying, recording, or information storage and retrieval systems, for any pur­pose other than the purchaser's personal use, and without the prior express written permission of PLANET Technology.
Disclaimer
PLANET Technology does not warrant that the hardware will work properly in all environments and applications, and makes no warranty and representation, either implied or expressed, with respect to the quality, performance, merchantability, or fitness for a particular purpose.
PLANET has made every effort to ensure that this User’s Manual is accurate; PLANET dis­claims liability for any inaccuracies or omissions that may have occurred.
Information in this User’s Manual is subject to change without notice and does not represent a commitment on the part of PLANET. PLANET assumes no responsibility for any inaccuracies that may be contained in this User’s Manual. PLANET makes no commitment to update or keep current the information in this User’s Manual, and reserves the right to make improvements to this User’s Manual and/or to the products described in this User’s Manual, at any time without notice.
If you find information in this manual that is incorrect, misleading, or incomplete, we would appreciate your comments and suggestions.
CE mark Warning
The is a class B device, In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.
Trademarks
The PLANET logo is a trademark of PLANET Technology. This documentation may refer to numerous hardware and software products by their trade names. In most, if not all cases, these designations are claimed as trademarks or registered trademarks by their respective compa­nies.
Revision
User’s Manual for PLANET Broadband VPN Router: Model: VRT-401 Rev: 1.0 (Oct. 2002) Part No. EM-VRT4V1
ii
Table of Contents
CHAPTER 1 INTRODUCTION......................................................................................1
VRT-401 Features..................................................................................................1
Package Contents.................................................................................................3
Physical Details.....................................................................................................4
CHAPTER 2 INSTALLATION........................................................................................6
Requirements........................................................................................................6
Procedure...............................................................................................................6
CHAPTER 3 SETUP......................................................................................................8
Overview................................................................................................................8
Configuration Program.........................................................................................9
Config Wizard......................................................................................................11
LAN Screen..........................................................................................................14
CHAPTER 4 PC CONFIGURATION............................................................................16
Overview..............................................................................................................16
Windows Clients.................................................................................................16
Macintosh Clients...............................................................................................28
Linux Clients........................................................................................................28
Other Unix Systems............................................................................................28
CHAPTER 5 OPERATION AND STATUS...................................................................29
Operation.............................................................................................................29
Status Screen......................................................................................................29
Connection Status - PPPoE...............................................................................31
Connection Status - PPTP..................................................................................34
Connection Status - Telstra Big Pond...............................................................35
Connection Details - SingTel RAS.....................................................................36
Connection Details - Fixed/Dynamic IP Address.............................................38
CHAPTER 6 INTERNET FEATURES..........................................................................40
Overview..............................................................................................................40
Advanced Internet Screen..................................................................................40
Dynamic DNS (Domain Name Server)...............................................................45
Virtual Servers.....................................................................................................47
Options.................................................................................................................49
CHAPTER 7 SECURITY CONFIGURATION..............................................................51
Overview..............................................................................................................51
Admin Login........................................................................................................51
Access Control....................................................................................................53
Firewall Rules......................................................................................................58
Logs......................................................................................................................62
Security Options..................................................................................................65
Scheduling...........................................................................................................67
Services................................................................................................................68
CHAPTER 8 VPN.........................................................................................................70
Overview..............................................................................................................70
Common VPN Situations....................................................................................72
VPN Configuration..............................................................................................74
i
Examples..............................................................................................................83
Using Certificates..............................................................................................101
CHAPTER 9 OTHER FEATURES AND SETTINGS.................................................106
Overview............................................................................................................106
PC Database......................................................................................................107
Remote Administration.....................................................................................111
Routing...............................................................................................................112
Firmware Upgrade.............................................................................................116
UPNP..................................................................................................................117
APPENDIX A TROUBLESHOOTING........................................................................118
Overview............................................................................................................118
General Problems..............................................................................................118
Internet Access..................................................................................................118
APPENDIX B SPECIFICATIONS...............................................................................120
VRT-401..............................................................................................................120
FCC Statement...................................................................................................120
CE Marking Warning.........................................................................................121
ii
1
Chapter 1
Introduction
This Chapter provides an overview of VRT-401's features and capabili­ties.
Congratulations on the purchase of your new VRT-401. VRT-401 is a multi-function device providing the following services:
Shared Broadband Internet Access for all LAN users.
4-Port Switching Hub for 10BaseT or 100BaseT connections.
Figure 1: VRT-401

VRT-401 Features

VRT-401 incorporates many advanced features, carefully designed to provide sophisti­cated functions while being easy to use.

Internet Access Features

Shared Internet Access. All users on LAN side can access the Internet
through VRT-401, using only a single external IP Address. The local (invalid) IP Addresses are hidden from external sources. This process is called NAT (Network Address Translation).
DSL & Cable Modem Support. VRT-401 has a 10/100BaseT Ethernet port
for connecting a DSL or Cable Modem. All popular DSL and Cable Modems are supported. Furthermore, SingTel RAS and Big Pond (Australia) login are sup­ported as well.
PPPoE, PPTP, SingTel RAS and Telstra Big Pond Support. The Internet
(WAN port) connection supports PPPoE (PPP over Ethernet), PPTP (Peer-to-Peer Tunneling Protocol), SingTel RAS and Telstra Big Pond (Australia), as well as "Di­rect Connection" type services.
Fixed or Dynamic IP Address. On the Internet (WAN port) connection, VRT-
401 supports both Dynamic IP Address (IP Address is allocated on connection) and Fixed IP Address.
1
VRT-401 User Manual

Advanced Internet Functions

Communication Applications. Support for Internet communication applica-
tions, such as interactive Games, Telephony, and Conferencing applications, which are often difficult to use when behind a Firewall, is included.
Special Internet Applications. Applications which use non-standard connec-
tions or port numbers are normally blocked by the Firewall. The ability to define and allow such applications is provided, to enable such applications to be used normally.
Virtual Servers. This feature allows Internet users to access Internet servers on
your LAN. The required setup is quick and easy.
DMZ. One (1) PC on your local LAN can be configured to allow unrestricted 2-
way communication with Servers or individual users on the Internet. This provides the ability to run programs which are incompatible with Firewalls.
URL Filter. Use the URL Filter to block access to undesirable Web sites by LAN
users.
Internet Access Log. See which Internet connections have been made.
VPN Pass through Support. PCs with VPN (Virtual Private Networking)
software using PPTP, L2TP and IPSec are transparently supported - no configura­tion is required.

LAN Features

4-Port Switching Hub. VRT-401 incorporates a 4-port 10/100BaseT switch,
making it easy to create or extend your LAN.
DHCP Server Support. Dynamic Host Configuration Protocol provides a
dynamic IP address to PCs and other devices upon request. VRT-401 can act as a DHCP Server for devices on your local LAN and WLAN.
Multi Segment LAN Support. LANs containing one or more segments are
supported, via VRT-401’s RIP (Routing Information Protocol) support and built-in static routing table.
DMZ Port. Used when allowing Servers on your LAN to be accessed from the
Internet, the DMZ port provides additional protection for both your Servers and your LAN.

Configuration & Management

Easy Setup. Use your WEB browser from anywhere on the LAN or WLAN for
configuration.
Remote Management. VRT-401 can be managed from any PC on your LAN.
And, if the Internet connection exists, it can also (optionally) be configured via the Internet.
UPnP Support. UPnP (Universal Plug and Play) allows automatic discovery and
configuration of VRT-401. UPnP is by supported by Windows ME, XP, or later.

Security Features

Password - protected Configuration. Optional password protection is
provided to prevent unauthorized users from modifying the configuration data and settings.
NAT Protection. An intrinsic side effect of NAT (Network Address Translation)
technology is that by allowing all LAN users to share a single IP address, the loca-
2
Introduction
tion and even the existence of each PC is hidden. From the external viewpoint, there is no network, only a single device - VRT-401.
Stateful Inspection Firewall. All incoming data packets are monitored and all
incoming server requests are filtered, thus protecting your network from malicious attacks from external sources.
Protection against DoS attacks. DoS (Denial of Service) attacks can flood
your Internet connection with invalid packets and connection requests, using so much bandwidth and so many resources that Internet access becomes unavailable. VRT-401 incorporates protection against DoS attacks to secure your network.
Rule-based Policy Firewall. To provide additional protection against mali-
cious packets, you can define your own firewall rules. This can also be used to control the Internet services available to LAN users.

VPN Features

IPSec.. Support for IPSec standards, including IKE and certificates.
100 Tunnels. Up to 100 VPN tunnels can be created.
High performance. High performance encryption engine maintains high
throughput even when using 3DES.

Package Contents

The following items should be included:
VRT-401 Unit
Power Adapter
Quick Installation Guide
CD-ROM containing the on-line manual.
If any of the above items are damaged or missing, please contact our local dealer immediately.
3
VRT-401 User Manual

Physical Details

Front-mounted LEDs

Figure 2: Front Panel
Power On - Power on.
Off - No power.
Status (Red) On - Error condition.
Off - Normal operation. Blinking - This LED blinks during start up.
LAN
WAN On - Connection to the modem attached to the WAN (Internet) port
For each port, there are 2 LEDs
LNK/ACT
On - Corresponding LAN port is active.
Off - No active connection on the corresponding LAN port.
Flashing - Data is being transmitted or received via the cor-
responding LAN port.
100
On - Corresponding LAN port is using 100BaseT.
Off - Corresponding LAN port connection is using 10BaseT,
or no active connection.
is established.
Flashing - Data is being transmitted or received via the WAN port.
PPPoE On - PPPoE connection established.
Off - No PPPoE connection.
DMZ
LNK/ACT
Blinking – receiving/ transmitting data
100
On - Link at 100Mbps
Off - Link at 10Mbps
4

Rear Panel

Introduction
Figure 3: Rear Panel
DMZ
Reset Button
WAN port (10/100BaseT)
10/100BaseT LAN connec­tions
Use a standard LAN cable to connect a normal port on the other hub.
This button has two (2) functions:
Reboot. When pressed and released, VRT-401 will reboot (restart).
Clear All Data. This button can also be used to clear ALL data and restore ALL settings to the factory default values.
To Clear All Data and restore the factory default values:
1. Power Off.
2. Hold the Reset Button down while you Power On.
3. Keep holding the Reset Button for a few seconds, until the RED LED has flashed TWICE.
4. Release the Reset Button. VRT-401 is now using the factory default values.
Connect the DSL or Cable Modem here. If your modem came with a cable, use the supplied cable. Otherwise, use a standard LAN cable.
Use standard LAN cables (RJ45 connectors) to connect your PCs to these ports.
Note:
Any LAN port on VRT-401 will automatically function as an "Uplink" port when required. Just connect any port to a normal port on the other hub, using a standard LAN cable.
Power port
Connect the supplied power adapter here.
5
Chapter 2
Installation
This Chapter covers the physical installation of VRT-401.

Requirements

Network cables. Use standard 10/100BaseT network (UTP) cables with RJ45 connectors.
TCP/IP protocol must be installed on all PCs.
For Internet Access, an Internet Access account with an ISP, and either of a DSL
or Cable modem (for WAN port usage)

Procedure

Figure 4: Installation Diagram
1. Choose an Installation Site
Select a suitable place on the network to install VRT-401. Ensure VRT-401 and the DSL/Cable modem are powered OFF.
2. Connect LAN Cables
Use standard LAN cables to connect PCs to the Switching Hub ports on VRT-401. Both 10BaseT and 100BaseT connections can be used simultaneously.
If required, you can connect any LAN port to another Hub. Any LAN port on VRT­401 will automatically function as an "Uplink" port when required. Just connect any LAN port to a normal port on the other hub, using a standard LAN cable.
6
Installation
If desired, connect the DMZ port to a standard port on a Hub. PCs connected to this hub will also gain Internet access, but will NOT be able to access the rest of the LAN.
3. Connect WAN Cable
Connect the DSL or Cable modem to the WAN port on VRT-401. Use the cable supplied with your DSL/Cable modem. If no cable was supplied, use a standard cable.
4. Power Up
Power on the Cable or DSL modem.
Connect the supplied power adapter to VRT-401 and power up.
Use only the power adapter provided. Using a different one may cause hardware damage
5. Check the LEDs
The Power LED should be ON.
The Status LED should flash, then turn Off. If it stays on, there is a hardware error.
For each LAN (PC) connection, the LAN Link/Act LED should be ON (provided the
PC is also ON.)
The WAN LED should be ON.
For more information, refer to Front-mounted LEDs in Chapter 1.

Using the DMZ Port

Please note the following points regarding the DMZ port.
The DMZ port is a normal port, not an "uplink" port.
PCs connected to the DMZ port are on the same LAN segment as PCs connected
to the Hub ports. They must use the same IP address range.
PCs connected to the DMZ port are NOT visible to PCs on the hub (LAN) ports. So you cannot use Microsoft networking or other networking protocols to connect to PCs on the DMZ.
PCs connected to the DMZ port still share the WAN port IP address for Internet access.
Advantages of the DMZ Port
If running any Servers on your LAN, you should connect them to the DMZ port, for the following reasons:
Traffic passing between the DMZ and LAN passes through the firewall. The fire­wall will protect your LAN if your Server is compromised and used to launch an attack on your LAN.
When using the Virtual Servers feature, (see Virtual Servers in Chapter 6) a fire- wall rule to allow incoming traffic from the Internet (WAN) to the DMZ is automatically created. If the Server is connected to the LAN (hub) ports, you must add the firewall rule manually.
7
3
Chapter 3
Setup
This Chapter provides Setup details of VRT-401.

Overview

This chapter describes the setup procedure for:
Internet Access
LAN configuration
PCs on your local LAN may also require configuration. For details, see Chapter 4 - PC Configuration.
Other configuration may also be required, depending on which features and functions of VRT-401 you wish to use. Use the table below to locate detailed instructions for the required functions.
To Do this: Refer to:
Configure PCs on your LAN. Chapter 4:
PC Configuration
Check VRT-401 operation and Status. Chapter 5:
Operation and Status
Use any of the following Internet features:
Advanced Setup (Applications, DMZ)
Dynamic DNS
Virtual Servers
MAC Address
Options (Backup DNS, MTU)
Change any of the following Security-related settings:
Admin Login
Access Control
Firewall Rules
Logs
Security Options (TFTP, Firewall)
Scheduling (used by Access Control)
Services
Describe the VPN capabilities and configuration required for common situations.
Chapter 6: Internet Features
Chapter 7: Security Configuration
Chapter 8: VPN
8
Setup
Configure or use any of the following:
PC Database
Remote Admin
Routing (RIP and static Routing)
Upgrade firmware
Enable/Disable UPnP Support
Where use of a certain feature requires that PCs or other LAN devices be configured, this is also explained in the relevant chapter.
Chapter 9: Other Features and Set­tings

Configuration Program

VRT-401 contains an HTTP server. This enables you to connect to it, and configure it, using your Web Browser. Your Browser must support JavaScript. The configuration program has been tested on the following browsers:
Netscape V4.08 or later
Internet Explorer V4 or later

Preparation

Before attempting to configure VRT-401, please ensure that:
Your PC can establish a physical connection to VRT-401. The PC and VRT-401 must be directly connected (using the switch ports on VRT-401) or on the same LAN segment.
VRT-401 must be installed and powered ON.
If VRT-401’s default IP Address (192.168.0.1) is already used by another device,
the other device must be turned OFF until VRT-401 is allocated a new IP Address during configuration.
Using UPnP
If your Windows system supports UPnP, an icon for VRT-401 will appear in the system tray, notifying you that a new network device has been found, and offering to create a new desktop shortcut to the newly-discovered device.
Unless you intend to change the IP Address of VRT-401, you can accept the desktop shortcut.
Whether you accept the desktop shortcut or not, you can always find UPnP de­vices in My Network Places (previously called Network Neighborhood).
Double - click the icon for VRT-401 (either on the Desktop, or in My Network Places) to start the configuration. Refer to the following section Config Wizard for
details of the initial configuration process.
Using your Web Browser
To establish a connection from your PC to VRT-401:
1. After installing VRT-401 in your LAN, start your PC. If your PC is already running, restart it.
9
VRT-401 User Manual
2. Start your WEB browser.
3. In the Address box, enter "HTTP://" and the IP Address of VRT-401, as in this example, which uses VRT-401’s default IP Address:
HTTP://192.168.0.1
If you can't connect
If VRT-401 does not respond, check the following:
VRT-401 is properly installed, LAN connection is OK, and it is powered ON. You can test the connection by using the "Ping" command:
Open the MS-DOS window or command prompt window.
Enter the command:
ping 192.168.0.1 If no response is received, either the connection is not working, or your PC's IP address is not compatible with VRT-401’s IP Address. (See next item.)
If your PC is using a fixed IP Address, its IP Address must be within the range 192.168.0.2 to 192.168.0.254 to be compatible with VRT-401's default IP Address of 192.168.0.1. Also, the Network Mask must be set to 255.255.255.0. See Chapter 4 - PC Configuration for details on checking your PC's TCP/IP settings.
Ensure that your PC and VRT-401 are on the same network segment. (If you don't have a router, this must be the case.)
4. You will be prompted for a username and password, as shown below.
Figure 5: Password Dialog
Enter admin for the User Name, and leave the Password blank.
Both the name and password can (and should) be changed, using the Admin
Login screen.
10
Setup

Config Wizard

The first time you connect to VRT-401, the Config Wizard will run automatically. (The Setup Wizard will also run if VRT-401’s default settings are restored.)
1. Step through the Wizard until finished.
You need to know the type of Internet connection service used by your ISP. Check the data supplied by your ISP.
The common connection types are explained in the tables below.
2. On the final screen of the Wizard, run the test and check that an Internet connec­tion can be established.
3. If the connection test fails:
Check your data, the Cable/DSL modem, and all connections.
Check that you have entered all data correctly.
If using a Cable modem, your ISP may have recorded the MAC (physical) ad-
dress of your PC. Run the Wizard, and on the Cable Modem screen, use the "Clone MAC address" button to copy the MAC address from your PC to VRT-
401.

Common Connection Types

Cable Modems
Type Details ISP Data required
Dynamic IP Address
Static (Fixed) IP Address
DSL Modems
Type Details ISP Data required
Dynamic IP Address
Your IP Address is allo­cated automatically, when you connect to you ISP.
Your ISP allocates a per­manent IP Address to you.
Your IP Address is allo­cated automatically, when you connect to you ISP.
Usually, none. However, some ISP's may
require you to use a particu­lar Hostname, Domain name, or MAC (physical) address.
IP Address allocated to you, mask and gateway (if pro­vided), and DNS address.
Some ISP's may also require you to use a particular Host­name, Domain name, or MAC (physical) address.
None.
Static (Fixed) IP Address
PPPoE You connect to the ISP only
Your ISP allocates a per­manent IP Address to you.
when required. The IP address is usually allocated automatically.
IP Address allocated to you, mask and gateway (if pro­vided), and DNS address.
User name and password.
11
VRT-401 User Manual
PPTP Mainly used in Europe.
You connect to the ISP only when required. The IP address is usually allocated automatically, but may be Static (Fixed).
PPTP Server IP Address.
User name and pass-
IP Address allocated to
Other Modems (e.g. Broadband Wireless)
Type Details ISP Data required
Dynamic IP Address
Static (Fixed) IP Address
Your IP Address is allo­cated automatically, when you connect to you ISP.
Your ISP allocates a per­manent IP Address to you.
Usually, none. However, some ISP's may
require you to use a particu­lar Hostname, Domain name, or MAC (physical) address.
IP Address allocated to you, mask and gateway (if pro­vided), and DNS address.
Big Pond Cable (Australia)
For this connection method, the following data is required:
User Name
Password
Big Pond Server IP address
word.
you, if Static (Fixed).
SingTel RAS
For this connection method, the following data is required:
User Name
Password
RAS Plan
12
Setup

Home Screen

After finishing or exiting the Setup Wizard, you will see the Home screen. When you connect in future, you will see this screen when you connect. An example screen is shown below.
Figure 6: Home Screen
Navigation & Data Input
Use the menu bar on the top of the screen, and the "Back" button on your Browser, for navigation.
Changing to another screen without clicking "Save" does NOT save any changes you may have made. You must "Save" before changing screens or your data will be ignored.
On each screen, clicking the "Help" button will display help for that screen.
From any help screen, you can access the list of all help files (help index).
13
VRT-401 User Manual

LAN Screen

Use the LAN link on the main menu to reach the LAN screen An example screen is shown below.
Figure 7: LAN Screen
Data - LAN Screen
TCP/IP IP Address
Subnet Mask
DHCP Server
Buttons Save
IP address for VRT-401, as seen from the local LAN. Use the default value unless the address is already in use or your LAN is using a different IP address range. In the latter case, enter an unused IP Address from within the range used by your LAN.
The default value 255.255.255.0 is standard for small (class "C") networks. For other networks, use the Subnet Mask for the LAN segment to which VRT-401 is attached (the same value as the PCs on that LAN segment).
If Enabled, VRT-401 will allocate IP Addresses to PCs (DHCP clients) on your LAN when they start up. The default (and recommended) value is Enabled.
If you are already using a DHCP Server, this setting must be Disabled, and the existing DHCP server must be re­configured to treat VRT-401 as the default Gateway. See the following section for further details.
The Start IP Address and Finish IP Address fields set the values used by the DHCP server when allocating IP Ad­dresses to DHCP clients. This range also determines the number of DHCP clients supported.
See the following section for further details on using DHCP.
Save the data on screen.
Cancel
The "Cancel" button will discard any data you have entered and reload the file from VRT-401.
14
Setup

DHCP

What DHCP Does
A DHCP (Dynamic Host Configuration Protocol) Server allocates a valid IP address to a DHCP Client (PC or device) upon request.
The client request is made when the client device starts up (boots).
The DHCP Server provides the Gateway and DNS addresses to the client, as well
as allocating an IP Address.
VRT-401 can act as a DHCP server.
Windows 95/98/ME and other non-Server versions of Windows will act as a DHCP
client. This is the default Windows setting for the TCP/IP network protocol. How­ever, Windows uses the term Obtain an IP Address automatically instead of "DHCP Client".
You must NOT have two (2) or more DHCP Servers on the same LAN segment. (If your LAN does not have other Routers, this means there must only be one (1) DHCP Server on your LAN.)
Using VRT-401’s DHCP Server
This is the default setting. The DHCP Server settings are on the LAN screen. On this screen, you can:
Enable or Disable VRT-401’s DHCP Server function.
Set the range of IP Addresses allocated to PCs by the DHCP Server function.
You can assign Fixed IP Addresses to some devices while using DHCP, provided that the Fixed IP Addresses are NOT within the range used by the DHCP Server.
Using another DHCP Server
You can only use one (1) DHCP Server per LAN segment. If you wish to use another DHCP Server, rather than VRT-401’s, the following procedure is required.
1. Disable the DHCP Server feature in VRT-401. This setting is on the LAN screen.
2. Configure the DHCP Server to provide VRT-401’s IP Address as the Default Gateway.
To Configure your PCs to use DHCP
This is the default setting for TCP/IP under Windows 95/98/ME. See Chapter 4 - Client Configuration for the procedure to check these settings.
15
4
Chapter 4
PC Configuration
This Chapter details the PC Configuration required on the local ("Inter­nal") LAN.

Overview

For each PC, the following may need to be configured:
TCP/IP network settings
Internet Access configuration

Windows Clients

This section describes how to configure Windows clients for Internet access via VRT-
401.
The first step is to check the PC's TCP/IP settings. VRT-401 uses the TCP/IP network protocol for all functions, so it is essential that the
TCP/IP protocol be installed and configured on each PC.

TCP/IP Settings - Overview

If using default VRT-401 settings, and the default Windows TCP/IP set­tings, no changes need to be made.
By default, VRT-401 will act as a DHCP Server, automatically providing a suitable IP Address (and related information) to each PC when the PC boots.
For all non-Server versions of Windows, the default TCP/IP setting is to act as a DHCP client.
If using a Fixed (specified) IP address, the following changes are re­quired:
The Gateway must be set to the IP address of VRT-401
The DNS should be set to the address provided by your ISP.
If your LAN has a Router, the LAN Administrator must re­configure the Router itself. Refer to Chapter 8 - Other Features and Operations for details.
16
PC Configuration

Checking TCP/IP Settings - Windows 9x/ME:

1. Select Control Panel - Network. You should see a screen like the following:
Figure 8: Network Configuration
2. Select the TCP/IP protocol for your network card.
3. Click on the Properties button. You should then see a screen like the following.
Figure 9: IP Address (Win 95)
Ensure your TCP/IP settings are correct, as follows:
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, VRT-401 will act as a DHCP Server.
Restart your PC to ensure it obtains an IP Address from VRT-401.
Using "Specify an IP Address"
If your PC is already configured, check with your network administrator before making the following changes:
17
VRT-401 User Manual
On the Gateway tab, enter VRT-401’s IP address in the New Gateway field and click Add, as shown below. Your LAN administrator can advise you of the IP Ad­dress they assigned to VRT-401.
Figure 10: Gateway Tab (Win 95/98)
On the DNS Configuration tab, ensure Enable DNS is selected. If the DNS Server Search Order list is empty, enter the DNS address provided by your ISP in the fields beside the Add button, then click Add.
Figure 11: DNS Tab (Win 95/98)
18
PC Configuration

Checking TCP/IP Settings - Windows NT4.0

1. Select Control Panel - Network, and, on the Protocols tab, select the TCP/IP protocol, as shown below.
Figure 12: Windows NT4.0 - TCP/IP
2. Click the Properties button to see a screen like the one below.
19
VRT-401 User Manual
Figure 13: Windows NT4.0 - IP Address
3. Select the network card for your LAN.
4. Select the appropriate radio button - Obtain an IP address from a DHCP Server or Specify an IP Address, as explained below.
Obtain an IP address from a DHCP Server
This is the default Windows setting. Using this is recommended. By default, VRT­401 will act as a DHCP Server.
Restart your PC to ensure it obtains an IP Address from VRT-401.
Specify an IP Address
If your PC is already configured, check with your network administrator before making the following changes.
1. The Default Gateway must be set to the IP address of VRT-401. To set this:
Click the Advanced button on the screen above.
On the following screen, click the Add button in the Gateways panel, and enter
VRT-401’s IP address, as shown in Figure 14 below.
If necessary, use the Up button to make VRT-401 the first entry in the Gate-
ways list.
20
PC Configuration
Figure 14 - Windows NT4.0 - Add Gateway
2. The DNS should be set to the address provided by your ISP, as follows:
Click the DNS tab.
On the DNS screen, shown below, click the Add button (under DNS Service
Search Order), and enter the DNS provided by your ISP.
21
VRT-401 User Manual
Figure 15: Windows NT4.0 - DNS
22
PC Configuration

Checking TCP/IP Settings - Windows 2000:

1. Select Control Panel - Network and Dial-up Connection.
2. Right - click the Local Area Connection icon and select Properties. You should see a screen like the following:
Figure 16: Network Configuration (Win 2000)
3. Select the TCP/IP protocol for your network card.
4. Click on the Properties button. You should then see a screen like the following.
23
VRT-401 User Manual
Figure 17: TCP/IP Properties (Win 2000)
5. Ensure your TCP/IP settings are correct, as described below.
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, VRT-401 will act as a DHCP Server.
Restart your PC to ensure it obtains an IP Address from VRT-401.
Using a fixed IP Address ("Use the following IP Address")
If your PC is already configured, check with your network administrator before making the following changes.
Enter VRT-401’s IP address in the Default gateway field and click OK. (Your LAN administrator can advise you of the IP Address they assigned to VRT-401.)
If the DNS Server fields are empty, select Use the following DNS server addresses, and enter the DNS address or addresses provided by your ISP, then click OK.
24
PC Configuration

Checking TCP/IP Settings - Windows XP

1. Select Control Panel - Network Connection.
2. Right click the Local Area Connection and choose Properties. You should see a screen like the following:
Figure 18: Network Configuration (Windows XP)
3. Select the TCP/IP protocol for your network card.
4. Click on the Properties button. You should then see a screen like the following.
25
VRT-401 User Manual
Figure 19: TCP/IP Properties (Windows XP)
5. Ensure your TCP/IP settings are correct.
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, VRT-401 will act as a DHCP Server.
Restart your PC to ensure it obtains an IP Address from VRT-401.
Using a fixed IP Address ("Use the following IP Address")
If your PC is already configured, check with your network administrator before making the following changes.
In the Default gateway field, enter VRT-401’s IP address and click OK. Your LAN administrator can advise you of the IP Address they assigned to VRT-401.
If the DNS Server fields are empty, select Use the following DNS server addresses, and enter the DNS address or addresses provided by your ISP, then click OK.
26
PC Configuration

Internet Access

To configure your PCs to use VRT-401 for Internet access:
Ensure that the DSL modem, Cable modem, or other permanent connection is functional.
Use the following procedure to configure your Browser to access the Internet via the LAN, rather than by a Dial-up connection.
For Windows 9x/ME/2000
1. Select Start Menu - Settings - Control Panel - Internet Options.
2. Select the Connection tab, and click the Setup button.
3. Select "I want to set up my Internet connection manually, or I want to connect through a local area network (LAN)" and click Next.
4. Select "I connect through a local area network (LAN)" and click Next.
5. Ensure all of the boxes on the following Local area network Internet Configuration screen are unchecked.
6. Check the "No" option when prompted "Do you want to set up an Internet mail account now?"
7. Click Finish to close the Internet Connection Wizard. Setup is now completed.
For Windows XP
1. Select Start Menu - Control Panel - Network and Internet Connections.
2. Select Set up or change your Internet Connection.
3. Select the Connection tab, and click the Setup button.
4. Cancel the pop-up "Location Information" screen.
5. Click Next on the "New Connection Wizard" screen.
6. Select "Connect to the Internet" and click Next.
7. Select "Set up my connection manually" and click Next.
8. Check "Connect using a broadband connection that is always on" and click Next.
9. Click Finish to close the New Connection Wizard. Setup is now completed.
Accessing AOL
To access AOL (America On Line) through VRT-401, the AOL for Windows software must be configured to use TCP/IP network access, rather than a dial-up connection. The configuration process is as follows:
Start the AOL for Windows communication software. Ensure that it is Version 2.5,
3.0 or later. This procedure will not work with earlier versions.
Click the Setup button.
Select Create Location, and change the location name from "New Locality" to
"VRT-401 ".
Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number blank.)
Click Save, then OK. Configuration is now complete.
Before clicking "Sign On", always ensure that you are using the "VRT-401 " loca­tion.
27
VRT-401 User Manual

Macintosh Clients

From your Macintosh, you can access the Internet via VRT-401. The procedure is as follows.
1. Open the TCP/IP Control Panel.
2. Select Ethernet from the Connect via pop-up menu.
3. Select Using DHCP Server from the Configure pop-up menu. The DHCP Client ID field can be left blank.
4. Close the TCP/IP panel, saving your settings.
Note:
If using manually assigned IP addresses instead of DHCP, the required changes are:
Set the Router Address field to VRT-401’s IP Address.
Ensure your DNS settings are correct.

Linux Clients

To access the Internet via VRT-401, it is only necessary to set VRT-401 as the "Gate­way".
Ensure you are logged in as "root" before attempting any changes.
Fixed IP Address
By default, most Unix installations use a fixed IP Address. If you wish to continue using a fixed IP Address, make the following changes to your configuration.
Set your "Default Gateway" to the IP Address of VRT-401.
Ensure your DNS (Name server) settings are correct.
To act as a DHCP Client (recommended)
The procedure below may vary according to your version of Linux and X -windows shell.
1. Start your X Windows client.
2. Select Control Panel - Network
3. Select the "Interface" entry for your Network card. Normally, this will be called "eth0".
4. Click the Edit button, set the "protocol" to "DHCP", and save this data.
5. To apply your changes
Use the "Deactivate" and "Activate" buttons, if available.
OR, restart your system.

Other Unix Systems

To access the Internet via VRT-401:
Ensure the "Gateway" field for your network card is set to the IP Address of VRT-
401.
Ensure your DNS (Name Server) settings are correct.
28
5
Chapter 5
Operation and Status
This Chapter details the operation of VRT-401 and the status screens.

Operation

Once both VRT-401 and the PCs are configured, operation is automatic.
However, there are some situations where additional Internet configuration may be required:
If using Internet-based Communication Applications, it may be necessary to specify which PC receives an incoming connection. Refer to Chapter 6 - Internet Features for further details.
Applications that use non-standard connections or port numbers may be blocked by VRT-401’s built-in firewall. You can define such applications as Special Appli- cations to allow them to function normally. Refer to Chapter 6 - Internet Features for further details.
Some non-standard applications may require use of the DMZ feature. Refer to Chapter 6 - Internet Features for further details.

Status Screen

Use the Status link on the main menu to view this screen.
Figure 20: Status Screen
29
VRT-401 User Manual
Data - Status Screen
Internet Connection Method
Broadband Modem Internet Connection
Internet IP Address
"Connection De­tails" Button
LAN IP Address Network Mask
This indicates the current connection method, as set in the Setup Wizard.
This shows the connection status of the modem. Current connection status:
Active
Idle
Unknown
Failed
If there is an error, you can click the "Connection Details" button to find out more information.
This IP Address is allocated by the ISP (Internet Service Provider).
Click this button to open a sub-window and view a detailed description of the current connection. Depending on the type of connection, a "log" may also be available.
The IP Address of VRT-401. The Network Mask (Subnet Mask) for the IP Address
above.
DHCP Server
System Device Name Firmware Version "System Data"
Button Buttons Connection Details
System Data Restart Router
Refresh Screen
This shows the status of the DHCP Server function - either "Enabled" or "Disabled".
For additional information about the PCs on your LAN, and the IP addresses allocated to them, use the PC Database option on the Advanced menu.
This displays the current name of VRT-401. The current version of the firmware installed in VRT-401. Clicking this button will open a Window which lists all sys-
tem details and settings.
View the details of the current Internet connection. The sub­screen displayed will depend on the connection method used. See the following sections for details of each sub­screen.
Display all system information in a sub-window. Restart (reboot) the Router. You will have to wait for the
restart to be completed before continuing. Update the data displayed on screen.
30
Operation and Status

Connection Status - PPPoE

If using PPPoE (PPP over Ethernet), a screen like the following example will be dis­played when the "Connection Details" button is clicked.
Data - PPPoE Screen
Connection Physical Address
IP Address
Network Mask PPPoE Link Status
Figure 21: PPPoE Status Screen
The hardware address of this device, as seen by remote devices on the Internet. (This is different to the hardware address seen by devices on the local LAN.)
The IP Address of this device, as seen by Internet users. This address is allocated by your ISP (Internet Service Provider).
The Network Mask associated with the IP Address above. This indicates whether or not the connection is currently
established.
If the connection does not exist, the "Connect" button can be used to establish a connection.
If the connection currently exists, the "Disconnect" button can be used to break the connection.
31
VRT-401 User Manual
Connection Log Connection Log
Buttons
The Connection Log shows status messages relating to the existing connection.
The most common messages are listed in the table below.
The "Clear Log" button will restart the Log, while the Refresh button will update the messages shown on screen.
Connect Disconnect Clear Log
If not connected, establish a connection to your ISP. If connected to your ISP, hang up the connection. Delete all data currently in the Log. This will make it easier
to read new messages.
Refresh
Update the data on screen.
Connection Log Messages
Message Description
Connect on Demand Connection attempt has been triggered by the "Connect
automatically, as required" setting. Manual connection Connection attempt started by the "Connect" button. Reset physical connec-
tion Connecting to remote
server Remote Server located ISP's Server has responded to connection attempt. Start PPP Attempting to login to ISP's Server and establish a PPP
Preparing line for connection attempt.
Attempting to connect to the ISP's server.
connection. PPP up successfully Able to login to ISP's Server and establish a PPP con-
nection. Idle time-out reached The connection has been idle for the time period speci-
fied in the "Idle Time-out" field. The connection will now
be terminated. Disconnecting The current connection is being terminated, due to either
the "Idle Time-out" above, or "Disconnect" button being
clicked. Error: Remote Server
not found Error: PPP Connection
failed
ISP's Server did not respond. This could be a Server
problem, or a problem with the link to the Server.
Unable to establish a PPP connection with the ISP's
Server. This could be a login problem (name or pass-
word) or a Server problem. Error: Connection to
Server lost
The existing connection has been lost. This could be
caused by a power failure, a link failure, or Server failure.
32
Operation and Status
Error: Invalid or un­known packet type
The data received from the ISP's Server could not be
processed. This could be caused by data corruption
(from a bad link), or the Server using a protocol which is
not supported by this device.
33
VRT-401 User Manual

Connection Status - PPTP

If using PPTP (Peer-to-Peer Tunneling Protocol), a screen like the following example will be displayed when the "Connection Details" button is clicked.
Data - PPTP Screen
Connection Physical Ad-
dress
IP Address
PPTP Status
Connection Log Connection Log
Figure 22: PPTP Status Screen
The hardware address of this device, as seen by remote de­vices on the Internet. (This is different to the hardware address seen by devices on the local LAN.)
The IP Address of this device, as seen by Internet users. This address is allocated by your ISP (Internet Service Provider).
This indicates whether or not the connection is currently estab­lished.
If the connection does not exist, the "Connect" button can be used to establish a connection.
If the connection currently exists, the "Disconnect" button can be used to break the connection.
The Connection Log shows status messages relating to the existing connection.
The "Clear Log" button will restart the Log, while the Re­fresh button will update the messages shown on screen.
34
Buttons
Operation and Status
Connect Disconnect Clear Log
Refresh
If not connected, establish a connection to your ISP. If connected to your ISP, hang up the connection. Delete all data currently in the Log. This will make it easier to
read new messages. Update the data on screen.

Connection Status - Telstra Big Pond

An example screen is shown below.
Figure 23: Telstra Big Pond Status Screen
Data - Telstra Big Pond Screen
Connection Physical Address
IP Address
The hardware address of this device, as seen by remote devices. (This is different to the hardware address seen by devices on the local LAN.)
The IP Address of this device, as seen by Internet users. This address is allocated by your ISP (Internet Service Provider).
35
VRT-401 User Manual
Connection Status
Connection Log Connection Log
Buttons Connect Disconnect Clear Log
Refresh
This indicates whether or not the connection is currently established.
If the connection does not exist, the "Connect" button can be used to establish a connection.
If the connection currently exists, the "Disconnect" button can be used to break the connection.
Normally, it is not necessary to use the Connect and Disconnect buttons unless the setting "Connect automati­cally, as required" is disabled.
The Connection Log shows status messages relating to the existing connection.
The Clear Log button will restart the Log, while the Re­fresh button will update the messages shown on screen.
If not connected, establish a connection to Telstra Big Pond. If connected to Telstra Big Pond, terminate the connection. Delete all data currently in the Log. This will make it easier to
read new messages. Update the data on screen.

Connection Details - SingTel RAS

If using the SingTel RAS access method, a screen like the following example will be displayed when the "Connection Details" button is clicked.
Figure 24: Connection Details - SingTel RAS
36
Data - SingTel RAS Screen
Internet
Operation and Status
RAS Plan Physical Ad-
dress
IP Address
Network Mask Default Gateway
DNS IP Address
DHCP Client
Buttons Release/Renew Button will
display EITHER "Release" OR "Renew"
The RAS Plan which is currently used. The hardware address of this device, as seen by remote de-
vices on the Internet. (This is different to the hardware address seen by devices on the local LAN.)
The IP Address of this device, as seen by Internet users. This address is allocated by your ISP (Internet Service Provider).
The Network Mask associated with the IP Address above. The IP Address of the remote Gateway or Router associated
with the IP Address above. The IP Address of the Domain Name Server which is currently
used. This will show "Enabled" or "Disabled", depending on whether
or not this device is functioning as a DHCP client. If "Enabled" the "Remaining lease time" field indicates when
the IP Address allocated by the DHCP Server will expire. The lease is automatically renewed on expiry; use the "Renew" button if you wish to manually renew the lease immediately.
This button is only useful if the IP address shown above is allocated automatically on connection. (Dynamic IP address). If you have a Fixed (Static) IP address, this button has no effect.
If the ISP's DHCP Server has NOT allocated an IP Address for VRT-401, this button will say "Renew". Clicking the "Renew" button will attempt to re-establish the connection and obtain an IP Address from the ISP's DHCP Server.
If an IP Address has been allocated to VRT-401 (by the ISP's DHCP Server), this button will say "Release". Clicking the "Release" button will break the connection and release the IP Address.
Refresh
Update the data shown on screen.
37
VRT-401 User Manual

Connection Details - Fixed/Dynamic IP Address

If your access method is "Direct" (no login), a screen like the following example will be displayed when the "Connection Details" button is clicked.
Figure 25: Connection Details - Fixed/Dynamic IP Address
Data - Fixed/Dynamic IP address Screen
Internet Physical Ad-
dress
IP Address
Network Mask Default Gateway
DNS IP Address
DHCP Client
The hardware address of this device, as seen by remote de­vices on the Internet. (This is different to the hardware address seen by devices on the local LAN.)
The IP Address of this device, as seen by Internet users. This address is allocated by your ISP (Internet Service Provider).
The Network Mask associated with the IP Address above. The IP Address of the remote Gateway or Router associated
with the IP Address above. The IP Address of the Domain Name Server which is currently
used. This will show "Enabled" or "Disabled", depending on whether
or not this device is functioning as a DHCP client. If "Enabled" the "Remaining lease time" field indicates when
the IP Address allocated by the DHCP Server will expire. The lease is automatically renewed on expiry; use the "Renew" button if you wish to manually renew the lease immediately.
38
Buttons
Operation and Status
Release/Renew Button will
display EITHER "Release" OR "Renew"
Refresh
This button is only useful if the IP address shown above is allocated automatically on connection. (Dynamic IP address). If you have a Fixed (Static) IP address, this button has no effect.
If the ISP's DHCP Server has NOT allocated an IP Address for VRT-401, this button will say "Renew". Clicking the "Renew" button will attempt to re-establish the connection and obtain an IP Address from the ISP's DHCP Server.
If an IP Address has been allocated to VRT-401 (by the ISP's DHCP Server), this button will say "Release". Clicking the "Release" button will break the connection and release the IP Address.
Update the data shown on screen.
39
6
Chapter 6
Internet Features
This Chapter explains when and how to use VRT-401’s "Internet" Fea­tures.

Overview

The following advanced features are provided.
Advanced Internet
Communication Applications
Special Applications
DMZ
URL filter
Dynamic DNS
Virtual Servers
Options

Advanced Internet Screen

Figure 26: Internet Screen
This screen allows configuration of all advanced features relating to Internet access.
Communication Applications
Special Applications
DMZ
URL filter
40
Internet Features

Communication Applications

Most applications are supported transparently by VRT-401. But sometimes it is not clear which PC should receive an incoming connection. This problem could arise with the Communication Applications listed on this screen.
If this problem arises, you can use this screen to set which PC should receive an incoming connection, as described below.
Communication Applications Select an Applica-
tion
Send incoming calls to
This lists applications which may generate incoming con­nections, where the destination PC (on your local LAN) is unknown.
This lists the PCs on your LAN.
If necessary, you can add PCs manually, using the "PC Database" option on the advanced menu.
For each application listed above, you can choose a destination PC.
There is no need to "Save" after each change; you can set the destination PC for each application, then click "Save".

Special Applications

If you use Internet applications which use non-standard connections or port numbers, you may find that they do not function correctly because they are blocked by VRT­401’s firewall. In this case, you can define the application as a "Special Application".
Special Applications Screen
This screen can be reached by clicking the Special Applications button on the Ad­vanced Internet screen.
You can then define your Special Applications. You will need detailed information about the application; this is normally available from the supplier of the application.
Also, note that the terms "Incoming" and "Outgoing" on this screen refer to traffic from the client (PC) viewpoint
41
VRT-401 User Manual
Figure 27: Special Applications Screen
Data - Special Applications Screen
Checkbox Name Incoming
Ports
Outgoing Ports
Use this to Enable or Disable this Special Application as required. Enter a descriptive name to identify this Special Application.
Type - Select the protocol (TCP or UDP) used when you receive data from the special application or service. (Note: Some applica­tions use different protocols for outgoing and incoming data).
Start - Enter the beginning of the range of port numbers used by the application server, for data you receive. If the application uses a single port number, enter it in both the "Start" and "Finish" fields.
Finish - Enter the end of the range of port numbers used by the application server, for data you receive.
Type - Select the protocol (TCP or UDP) used when you send data to the remote system or service.
Start - Enter the beginning of the range of port numbers used by the application server, for data you send to it. If the application uses a single port number, enter it in both the "Start" and "Finish" fields.
Finish - Enter the end of the range of port numbers used by the application server, for data you send to it. If the application uses a single port number, enter it in both the "Start" and "Finish" fields.
Using a Special Application
Configure the Special Applications screen as required.
On your PC, use the application normally. Remember that only one (1) PC can use
each Special application at any time. Also, when 1 PC is finished using a particular Special Application, there may need to be a "Time-out" before another PC can use the same Special Application. The "Time-out" period may be up to 3 minutes.
42
Internet Features
If an application still cannot function correctly, try using the "DMZ" feature.
DMZ
This feature, if enabled, allows one (1) computer on your LAN to be exposed to all users on the Internet, allowing unrestricted 2-way communication between the "DMZ PC" and other Internet users or Servers.
This allows almost any application to be used on the "DMZ PC".
The "DMZ PC" will receive all "Unknown" connections and data.
If the DMZ feature is enabled, you must select the PC to be used as the "DMZ PC".
The DMZ feature can be Enabled and Disabled on the Advanced Internet screen.
The "DMZ PC" is effectively outside the Firewall, mak­ing it more vulnerable to attacks. For this reason, you should only enable the DMZ feature when required.

URL Filter

The URL Filter allows you to block access to undesirable Web site
To use this feature, you must define "filter strings". If the "filter string" appears in a requested URL, the request is blocked.
Enabling the URL Filter also affects the Internet Access Log. If Enabled, the "Des- tination" field in the log will display the URL. Otherwise, it will display the IP Address.
The URL Filter can be Enabled or Disabled on the Advanced Internet screen.
43
VRT-401 User Manual

URL Filter Screen

Click the "Configure URL Filter" button on the Advanced Internet screen to access the URL Filter screen. An example screen is shown below.
Data - URL Filter Screen
Filter Strings Current Entries
Add Filter String
Buttons Delete/Delete
All
Add
This lists any existing entries. If you have not entered any values, this list will be empty.
To add an entry to the list, enter it here, and click the "Add" button. An entry may be a Domain name (e.g. www.trash.com) or simply a string. (e.g. ads/ ) Any URL which contains ANY entry ANYWHERE in the URL will be blocked.
Use these buttons to delete the selected entry or all entries, as required. Multiple entries can be selected by holding down the CTRL key while selecting.(On the Macintosh, hold the SHIFT key while selecting.)
Use this to add the current Filter String to the site list.
Figure 28: URL Filter Screen
44
Internet Features

Dynamic DNS (Domain Name Server)

This free service is very useful when combined with the Virtual Server feature. It allows Internet users to connect to your Virtual Servers using a URL, rather than an IP Ad­dress.
This also solves the problem of having a dynamic IP address. With a dynamic IP address, your IP address may change whenever you connect, which makes it difficult to connect to you.
The Service works as follows:
1. You must register for the service at http://www.dyndns.org (Registration is free). Your password will be E-mailed to you.
2. After registration, use the "Create New Host" option (at www.dyndns.org) to re­quest your desired Domain name.
3. Enter your data from www.dyndns.org in VRT-401’s DDNS screen.
4. VRT-401 will then automatically ensure that your current IP Address is recorded at http://www.dyndns.org
5. From the Internet, users will be able to connect to your Virtual Servers (or DMZ PC) using your Domain name, as shown on this screen.

Dynamic DNS Screen

Select Internet on the main menu, then Dynamic DNS, to see a screen like the follow­ing:
Figure 29: DDNS Screen
45
VRT-401 User Manual
Data - Dynamic DNS Screen
DDNS Service DDNS Service
DDNS Data User Name
Password Domain Name
DDNS Status
You must sign up first to create a new account before using the service. The service is free.
Click this link to connect to the www.dyndns.org Web site.
Your initial password will be E-mailed to you; you can
change this later if you wish.
After registration, use the "Create New Host" link (on the www.dyndns.org Web site) to request a domain name.
Enter the "User name" specified at the www.dyndns.org Web site when you registered.
Enter your current password for www.dyndns.org
Enter your domain name, as allocated at www.dyndns.org.
The name should consist only of letters and the hyphen
(dash). Using any other characters may cause problems..
This message is returned by the DDNS Server at www.dyndns.org
Normally, this message should be "Update successful" (current IP address was updated on the www.dyndns.org server).
If the message is "No host", this indicates the host name entered was not allocated to you. You need to connect to www.dyndns.org and correct this problem.
46
Internet Features

Virtual Servers

This feature allows you to make Servers on your LAN accessible to Internet users. Normally, Internet users would not be able to access a server on your LAN because:
Your Server does not have a valid external IP Address.
Attempts to connect to devices on your LAN are blocked by the firewall in this
device.
The "Virtual Server" feature solves these problems and allows Internet users to con­nect to your servers, as illustrated below.
Figure 30: Virtual Servers

IP Address seen by Internet Users

Note that, in this illustration, both Internet users are connecting to the same IP Address, but using different protocols.
To Internet users, all virtual Servers on your LAN have the same IP Address. This IP Address is allocated by your ISP.
This address should be static, rather than dynamic, to make it easier for Internet users to connect to your Servers.
However, you can use the DDNS (Dynamic DNS) feature to allow users to connect to your Virtual Servers using a URL, instead of an IP Address.
47
VRT-401 User Manual

Using the DMZ port for Virtual Servers

You should connect your Virtual Servers to the DMZ port, for the following reasons:
Traffic passing between the DMZ and LAN passes through the firewall. The fire­wall will protect your LAN if your Server is compromised and used to launch an attack on your LAN.
For each enabled Virtual Server, a firewall rule to allow incoming traffic from the Internet (WAN) to the DMZ is automatically created. If the Server is connected to the LAN (hub) ports, you must add the firewall rule manually.
Note that the DMZ port is a normal port, not an "uplink" port. If connecting to a hub, connect to the "uplink" port on the hub.

Virtual Servers Screen

The Virtual Servers screen is reached by the Virtual Servers link on the Internet menu. An example screen is shown below.
Figure 31: Virtual Servers Screen
This screen lists a number of pre-defined Servers,. providing a quick and convenient method to set up the common server types.
Data - Virtual Servers Screen
Servers Servers
Properties Enable
PC (Server)
This lists a number of pre-defined Servers, plus any Servers you have defined. Details of the selected Server are shown in the "Properties" area.
Use this to Enable or Disable support for this Server, as required.
If Enabled, any incoming connections will be forwarded to the selected PC.
If Disabled, any incoming connection attempts will be blocked.
Select the PC for this Server. The PC must be running the appropriate Server software.
48
Internet Features

Defining your own Virtual Servers

If the type of Server you wish to use is not listed on the Virtual Servers screen, you can use the Firewall Rules to allow particular incoming traffic and forward it to a specified PC (Server).

Connecting to the Virtual Servers

Once configured, anyone on the Internet can connect to your Virtual Servers. They must use the Internet IP Address (the IP Address allocated to you by your ISP). e.g.
http://203.70.212.52 ftp://203.70.212.52
It is more convenient if you are using a Fixed IP Address from your ISP, rather than Dynamic. However, you can use the Dynamic DNS feature, described in the following section, to allow users to connect to your Virtual Servers using a URL, rather than an IP Address.

Options

This screen allows advanced users to enter or change a number of settings. For normal operation, there is no need to use this screen or change any settings.
Figure 32: Options Screen
Data - Options Screen
Backup DNS IP Address
Enter the IP Address of the DNS (Domain Name Servers) here. These DNS will be used only if the primary DNS is unavailable.
49
VRT-401 User Manual
MTU MTU size
MTU (Maximum Transmission Unit) value should only be changed if advised to do so by Technical Support.
Enter a value between 1 and 1500.
This device will still auto-negotiate with the remote server, to
set the MTU size. The smaller of the 2 values (auto­negotiated, or entered here) will be used.
For direct connections (not PPPoE or PPTP), the MTU used is always 1500.
50
7
Chapter 7
Security Configuration
This Chapter explains the settings available via the security configura­tion section of the "Security" menu.

Overview

The following advanced configurations are provided.
Admin Login
Access Control
Firewall Rules
Logs
Security Options
Scheduling
Services

Admin Login

The Admin Login screen allows you to assign a user name and password to VRT-401.
Figure 33: Admin Login Screen
1. The default login name is "admin". Change this to the desired value.
2. The default password is blank (no password). Enter the desired password in the New Password and Verify Password fields.
3. Save your changes.
You will see a login prompt when you connect to VRT-401, as shown below.
51
VRT-401 User Manual
Figure 34: Password Dialog
Enter the "User Name" and "Password" you set on the Admin Login screen above.
52
Security Configuration

Access Control

This feature is accessed by the Access Control link on the Security menu. The Access Control feature allows administrators to restrict the level of Internet Ac-
cess available to PCs on your LAN. With the default settings, everyone has unrestricted Internet access.
To use this feature:
1. Set the desired restrictions on the "Default" group. All PCs are in the "Default" group unless explicitly moved to another group.
2. Set the desired restrictions on the other groups ("Group 1", "Group 2", "Group 3" and "Group 4") as needed.
3. Assign PC to the groups as required.
Restrictions are imposed by blocking "Services", or types of connections. All common Services are pre-defined. If required, you can also define your own Services.

Access Control Screen

To view this screen, select the Access Control link on the Security menu.
Figure 35: Access Control Screen
53
VRT-401 User Manual
Data - Access Control Screen
Group Group
"Members" Button
Internet Access Restrictions
Select the desired Group. The screen will update to display the settings for the selected Group. Groups are named "De­fault", "Group 1", "Group 2", "Group 3" and "Group 4", and cannot be re-named.
Click this button to add or remove members from the current Group.
If the current group is "Default", then members can not be added or deleted. This group contains PCs not allocated to any other group.
To remove PCs from the Default Group, assign them to another Group.
To assign PCs to the Default Group, delete them from the Group they are currently in.
See the following section for details of the Group Members screen.
Select the desired options for the current group:
None - Nothing is blocked. Use this to create the least restrictive group.
Block all Internet access - All traffic via the WAN port is blocked. Use this to create the most restrictive group.
Block selected Services - You can select which Services are to block. Use this to gain fine control over the Internet access for a group.
Block by Schedule
Services
Buttons Members
Save Cancel
If Internet access is being blocked, you can choose to apply the blocking only during scheduled times. (If access is not blocked, no Scheduling is possible, and this setting has no effect.)
This lists all defined Services. Select the Services you wish to block. To select multiple services, hold the CTRL key while selecting. (On the Macintosh, hold the SHIFT key rather than CTRL.)
Click this button to add or remove members from the current Group.
If the current group is "Default", then members can not be added or deleted. This group contains PCs not allocated to any other group.
See the following section for details of the Group Members screen.
Save the data on screen. Reverse any changes made since the last "Save".
54
Security Configuration
View Log
Clear Log
Click this to open a sub-window where you can view the "Access Control" log. This log shows attempted Internet accesses which have been blocked by the Access Control feature.
Click this to clear and restart the "Access Control" log, mak­ing new entries easier to read.
55
VRT-401 User Manual

Group Members Screen

This screen is displayed when the Members button on the Access Control screen is clicked.
Figure 36: Group Members
Use this screen to add or remove members (PCs) from the current group.
The "Del >>" button will remove the selected PC (in the Members list) from the current group.
The "<< Add" button will add the selected PC (in the Other PCs list) to the current group.
PCs not assigned to any group will be in the "Default" group. PCs deleted from any other Group will be added to the "Default" group.

Access Control Log

To check the operation of the Access Control feature, an Access Control Log is pro­vided. Click the View Log button on the Access Control screen to view this log.
This log shows attempted Internet accesses which have been blocked by the Access Control function.
Data shown in this log is as follows:
Date/Time Name
Source IP address
MAC address
Date and Time of the attempted access. If known, the name of the PC whose access was blocked.
This name is taken from the Network Clients database The IP Address of the PC or device whose access request
was blocked The hardware or physical address of the PC or device whose
access request was blocked
Destination
The destination URL or IP address
56
Security Configuration
57
VRT-401 User Manual

Firewall Rules

For normal operation and LAN protection, it is not necessary to use this screen. The Firewall will always block DoS (Denial of Service) attacks. A DoS attack does not
attempt to steal data or damage your PCs, but overloads your Internet connection so you can not use it - the service is unavailable.
As well, you can use this screen to create Firewall rules to block or allow specific traffic. But Incorrect configuration may cause serious problems.
This feature is for advanced administrators only!

Firewall Rules Screen

Click the Firewall Rules option on the Security menu to see a screen like the following example. This example contains two (2) rules for outgoing traffic.
Since the default rule for outgoing (LAN => WAN) traffic is "Allow", having an "Allow" rule for LAN => WAN only makes sense in combination with another rule.
For example, the screen below shows a rule blocking all traffic to a MSN Game Server, followed by another rule allowing access by a specific PC.
Figure 37: Firewall Rules Screen
58
Data - Firewall Rules Screen
Rule List
Security Configuration
View Rules for ..
Data
Add
Edit
Move
Select the desired option; the screen will update and list any current rules. If you have not defined any rules, the list will be empty.
For each rule, the following data is shown:
Name - The name you assigned to the rule.
Source - The traffic covered by this rule, defined by the
source IP address. If the IP address is followed by ... this in­dicates there is range of IP addresses, rather than a single address.
Destination - The traffic covered by this rule, defined by destination IP address. If the IP address is followed by ... this indicates there is range of IP addresses, rather than a single address.
Action - Action will be "Forward" or "Block"
To add a new rule, click the "Add" button, and complete the resulting screen. See the following section for more details.
To Edit or modify an existing rule, select it and click the "Edit" button.
There are 2 ways to change the order of rules
Use the up and down indicators on the right to move the selected rule. You must confirm your changes by clicking "OK". If you change your mind before clicking "OK", click "Cancel" to reverse your changes.
Click "Move" to directly specify a new location for the se­lected rule.
Delete View Log
System Rules
To delete an existing rule, select it and click the "Delete" button. Clicking the "View Log" button will open a new window and
display the Firewall log. Clicking the "System Rules" button will open a new window and
display the default firewall rules currently applied by the system. These rules cannot be edited, but any rules you create will take precedence over the default rules.
59
VRT-401 User Manual

Define Firewall Rule

Clicking the "Add" button in the Firewall Rules screen will display a screen like the example below.
Figure 38: Define Firewall Rule
Data - Define Firewall Rule Screen
Name Type
Source IP
Enter a suitable name for this rule. This determines the source and destination ports for traffic
covered by this rule. Select the desired option. These settings determine which traffic, based on their
source IP address, is covered by this rule. Select the desired option:
Any - All traffic from the source port is covered by this rule.
Single address - Enter the required IP address in the "Start IP address" field". You can ignore the "Subnet Mask" field.
Range address - If this option is selected, you must complete both the "Start IP address" and "Finish IP ad­dress" fields. You can ignore the "Subnet Mask" field.
Subnet address - If this option is selected, enter the required mask in the "Subnet Mask" field.
60
Security Configuration
Dest IP
Services
Action Log
These settings determine which traffic, based on their destination IP address, is covered by this rule.
Select the desired option:
Any - All traffic from the source port is covered by this rule.
Single address - Enter the required IP address in the "Start IP address" field". You can ignore the "Subnet Mask" field.
Range address - If this option is selected, you must complete both the "Start IP address" and "Finish IP ad­dress" fields. You can ignore the "Subnet Mask" field.
Subnet address - If this option is selected, enter the required mask in the "Subnet Mask" field.
Select the desired Service or Services. This determines which packets are covered by this rule, based on the proto­col (TPC or UDP) and port number. If necessary, you can define a new Service on the "Services" screen, by defining the protocols and port numbers used by the Service.
Select the desired action for packets covered by this rule: This determines whether packets covered by this rule are
logged. Select the desired option.
61
VRT-401 User Manual

Logs

The Logs record various types of activity on VRT-401. This data is useful for trouble­shooting, but enabling all logs will generate a large amount of data and adversely affect performance.
Since only a limited amount of log data can be stored in VRT-401, log data can also be E-mailed to your PC or sent to a Syslog Server.
Data - Logs Screen
Enable Logs DoS Attacks
Internet Connec­tions
Figure 39: Logs Screen
If enabled, this log will show details of DoS (Denial of Ser­vice) attacks which have been blocked by the built-in Firewall.
If selected, Outgoing Internet connections are logged. Normally, the (Internet) "Destination" will be shown as an IP address. But if the "URL Filter" is enabled, the "Destination" will be shown as a URL.
62
Security Configuration
Access Control
Firewall Rules
VPN
Timezone
E-Mail Logs Send E-mail alert
E-mail Logs
Send
If enabled, the log will include attempted outgoing connec­tions which have been blocked by the "Access Control" feature.
If enabled, the log will details of packets blocked by user­defined Firewall rules. Logging can be set for each rule individually. Only rules which have logging enabled will be included.
If enabled, the VPN log will record incoming and outgoing VPN connections.
Select the correct Timezone for your location. This is re­quired for the date/time shown on the logs to be correct.
If enabled, an E-mail will be sent immediately if a DoS (Denial of Service) attack is detected. If enabled, the E-mail address information must be provided.
You can choose to have the logs E-mailed to you, by ena­bling either or both checkboxes. If enabled, the Log will sent to the specified E-mail address. The interval between E­mails is determined by the "Send" setting.
Select the desired option for sending the log by E-mail.
When log is full - The time is not fixed. The log will be sent when the log is full, which will depend on the vol­ume of traffic.
Every day, Every Monday ... - The log is sent on the interval specified.
If "Every day" is selected, the log is sent at the time
specified.
If the day is specified, the log is sent once per
week, on the specified day.
Select the time of day you wish the E-mail to be
sent.
If the log is full before the time specified to send it, it
will be sent regardless of the day and time speci­fied.
E-mail Address
Subject
SMTP Server
Port No.
Syslog Server Enable Syslog Syslog Server
Enter the E-mail address the Log is to be sent to. The E­mail will also show this address as the Sender's address.
Enter the text string to be shown in the "Subject" field for the E-mail.
Enter the address or IP address of the SMTP (Simple Mail Transport Protocol) Server you use for outgoing E-mail.
Enter the port number used to connect to the SMTP Server. The default value is 25.
If enabled, log data will be sent to your Syslog Server. Enter the IP address of your Syslog Server.
63
VRT-401 User Manual
Include
Select the logs you wish to be included.
64
Security Configuration

Security Options

This screen allows you to set Firewall and other security-related options.
Figure 40: Security Options Screen
Data - Security Options Screen
SPI Firewall Enable DoS
Firewall
Threshold
If enabled, DoS (Denial of Service) attacks will be detected and blocked. The default is enabled. It is strongly recommended that this setting be left enabled.
Note:
A DoS attack does not attempt to steal data or damage your PCs, but overloads your Internet connection so you can not use it - the service is unavailable.
This device uses "Stateful Inspection" technology. This system can detect situations where individual TCP/IP pack­ets are valid, but collectively they become a DoS attack.
This setting affects the number of "half-open" connections al­lowed.
A "half-open" connection arises when a remote client con­tacts the Server with a connection request, but then does not reply to the Server's response.
While the optimum number of "half-open" connections allowed (the "Threshold") depends on many factors, the most important factor is the available bandwidth of your Internet connection.
Select the setting to match the bandwidth of your Internet connection.
65
VRT-401 User Manual
Options Respond to
ICMP
Allow IPsec
Allow PPTP
Allow L2TP
Allow TFTP firmware up­grade
The ICMP protocol is used by the "ping" and "trace route" pro­grams, and by network monitoring and diagnostic programs.
If checked, VRT-401 will respond to ICMP packets received from the Internet.
If not checked, ICMP packets from the Internet will be ig­nored. Disabling this option provides a slight increase in security.
The IPSec protocol is used to establish a secure connection, and is widely used by VPN (Virtual Private Networking) programs.
If checked, IPSec connections are allowed.
If not checked, IPSec connections are blocked.
PPTP (Point to Point Tunneling Protocol) is widely used by VPN (Virtual Private Networking) programs.
If checked, PPTP connections are allowed.
If not checked, PPTP connections are blocked.
L2TP is a protocol developed by Cisco for VPNs (Virtual Private Networks).
If checked, L2TP connections are allowed.
If not checked, L2TP connections are blocked.
If enabled, TFTP (Trivial FTP) connections can be made to this device.
TFTP can be used to upgrade the firmware. This is normally not required, and should not be enabled unless necessary.
You must obtain the firmware upgrade file first; instructions for using TFTP will be available with the upgrade.
66
Security Configuration

Scheduling

This schedule can be (optionally) applied to any Access Control Group.
Blocking will be performed during the scheduled time (between the "Start" and
"Finish" times.)
Two (2) separate sessions or periods can be defined.
Times must be entered using a 24 hr clock.
If the time for a particular day is blank, no action will be performed.

Define Schedule Screen

This screen is accessed by the Scheduling link on the Security menu.
Figure 41: Define Schedule Screen
Data - Define Schedule Screen
Day Session 1
Session 2 Start Time Finish Time
Each day of the week can scheduled independently. Two (2) separate sessions or periods can be defined. Session
2 can be left blank if not required. Enter the start using a 24 hr clock. Enter the finish time using a 24 hr clock.
67
VRT-401 User Manual

Services

Services are used in defining traffic to be blocked or allowed by the Access Control or Firewall Rules features. Many common Services are pre-defined, but you can also
define your own services if required. To view the Services screen, select the Services link on the Security menu.
Data - Services Screen
Available Services Available Ser-
vices "Delete" button
Add New Service Name Type
Start Port
Finish Port
ICMP Type
This lists all the available services.
Use this to delete any Service you have added. Pre-defined Services can not be deleted.
Enter a descriptive name to identify this service. Select the protocol (TCP, UDP, ICMP) used to the remote
system or service. For TCP and UDP Services, enter the beginning of the range of
port numbers used by the service. If the service uses a single port number, enter it in both the "Start" and "Finish" fields.
For TCP and UDP Services, enter the end of the range of port numbers used by the service. If the service uses a single port number, enter it in both the "Start" and "Finish" fields.
For ICMP Services, enter the type number of the required
Figure 42: Services Screen
68
Buttons
Security Configuration
service.
Delete Add
Cancel
Delete the selected service from the list. Add a new entry to the Service list, using the data shown in the
"Add New Service" area on screen. Clear the " Add New Service " area, ready for entering data for
a new Service.
69
8
Chapter 8
VPN
This Chapter describes the VPN capabilities and configuration required for common situations.

Overview

This section describes the VPN (Virtual Private Network) support provided by your VRT-401.
A VPN (Virtual Private Network) provides a secure connection between 2 points, over an insecure network - typically the Internet. This secure connection is called a VPN Tunnel.
There are many standards and protocols for VPNs. The standard implemented in VRT-401 is IPSec.

IPSec

IPSec is a near-ubiquitous VPN security standard, designed for use with TCP/IP networks. It works at the packet level, and authenticates and encrypts all packets traveling over the VPN Tunnel. Thus, it does not matter what applications are used on your PC. Any application can use the VPN like any other network connection.
IPsec VPNs exchange information through logical connections called SAs (Security Associations). An SA is simply a definition of the protocols, algorithms and keys used between the two VPN devices (endpoints).
Each IPsec VPN has two SAs - one in each direction. If IKE (Internet Key Exchange) is used to generate and exchange keys, there are also SA's for the IKE connection as well as the IPsec connection.
There are two security modes possible with IPSec:
Transport Mode - the payload (data) part of the packet is encapsulated through encryption but the IP header remains in the clear (unchanged).
VRT-401 does NOT support Transport Mode.
Tunnel Mode - everything is encapsulated, including the original IP header, and a new IP header is generated. Only the new header in the clear (i.e. not protected) This system provides enhanced security.
VRT-401 always uses Tunnel Mode.
IKE
IKE (Internet Key Exchange) is an optional, but widely used, component of IPsec. IKE provides a method of negotiating and generating the keys and IDs required by IPSec. If using IKE, only a single key is required to be provided during configuration. Also, IKE supports using Certificates (provided by CAs - Certification Authorities) to authenti­cate the identify of the remote user or gateway.
If IKE is NOT used, then all keys and IDs (SPIs) must be entered manually, and Cer­tificates can NOT be used. This is called a "Manual Key Exchange".
When using IKE, there are 2 phases to establishing the VPN tunnel:
70
VPN
Phase I is the negotiation and establishment up of the IKE connection.
Phase II is the negotiation and establishment up of the IPsec connection.
Because the IKE and IPsec connections are separate, they have different SAs (secu­rity associations).

Policies

VPN configuration settings are stored in Policies. Each policy defines:
The address of the remote VPN endpoint
The traffic which is allowed to use the VPN connection.
The parameters (settings) for the IPsec SA (Security Association)
If IKE is used, the parameters (settings) for the IKE SA (Security Association)
Generally, you will need at least one (1) VPN Policy for each remote site for which you wish to establish VPN connections.
It is possible, and sometimes necessary, to have multiple Policies for the same remote site. In this case, the order (sequence) of the policies is important. The policies are examined in turn, and the first matching policy will be used.

VPN Configuration

The general rule is that each endpoint must have matching Policies, as follows:
Remote VPN ad­dress
Traffic Selector
IKE parameters
IPsec parameters
Each VPN endpoint must be configured to initiate or accept connections to the remote VPN client or Gateway.
Usually, this requires having a fixed Internet IP address. However, it is possible for a VPN Gateway to accept incom­ing connections from a remote client where the client's IP address is not known in advance.
This determines which outgoing traffic will cause a VPN connection to be established, and which incoming traffic will be accepted. Each endpoint must be configured to pass and accept the desired traffic from the remote endpoint.
If connecting 2 LANs, this requires that:
Each endpoint must be aware of the IP addresses used on the other endpoint.
The 2 LANs MUST use different IP address ranges.
If using IKE (recommended), the IKE parameters must match (except for the SA lifetime, which can be different).
The IPsec parameters at each endpoint must match.
71
VRT-401 User Manual

Common VPN Situations

VPN Pass-through

Figure 43: VPN Pass-through
Here, a PC on the LAN behind the Router/Gateway is using VPN software, but the Router/Gateway is NOT acting as a VPN endpoint. It is only allowing the VPN connec­tion.
The PC software can use any VPN protocol supported by the remote VPN.
The remote VPN Server must support client PCs which are behind a NAT router,
and so have an IP address which is not valid on the Internet.
The Router/Gateway requires no VPN configuration, since it is not acting as a VPN endpoint.

Client PC to VPN Gateway

Figure 44: Client PC to VPN Server
In this situation, the PC must run appropriate VPN client software in order to connect, via the Internet, to VRT-401. Once connected, the client PC has the same access to LAN resources as PCs on the local LAN (unless restricted by the network administra­tor).
IPsec is not the only protocol which can be used in this situation, but VRT-401 supports IPsec ONLY.
Windows 2000 and Windows XP include a suitable IPsec VPN client program. Configuration of this client program for use with VRT-401 is covered later in this document.
72
VPN

Connecting 2 LANs via VPN

Figure 45: Connecting 2 VPN Gateways
This allows two (2) LANs to be connected. PCs on each endpoint gain secure access to the remote LAN.
The 2 LANs MUST use different IP address ranges.
The VPN Policies at each end determine when a VPN tunnel will be established,
and what systems on the remote LAN can be accessed once the VPN connection is established.
It is possible to have simultaneous VPN connections to many remote sites.
73
VRT-401 User Manual

VPN Configuration

This section covers the configuration required on VRT-401 when using Manual Key Exchange (Manual Policies) or IKE (Automatic Policies).
Details of using Certificates are covered in a later section.

VPN Policies Screen

To view this screen, select VPN Policies from the VPN menu. This screen lists all existing VPN policies. If no policies exist, the list will be empty.
Figure 46: VPN Policies
Note that the order of policies is important if you have more than one policy for particu­lar traffic. In that case, the first matching policy (for the traffic under consideration) will be used.
Data - VPN Policies Screen
VPN List Policy Name
Enable
Remote VPN Endpoint
Key Type
The name of the policy. When creating a policy, you should select a suitable name.
This indicates whether or not the policy is currently enabled. Use the "Enable/Disable" button to toggle the state of the selected policy.
The IP address of the remote VPN endpoint (Gateway or client).
This will indicate "Manual" (manual key exchange) or "IKE" (Inter­net Key Exchange)
74
Operations
VPN
Add
Edit
Move
En­able/Disable
Copy
Delete View Log
To add a new policy, click the "Add" button. See the following section for details.
To Edit or modify an existing policy, select it and click the "Edit" button.
There are 2 ways to change the order of policies:
Use the up and down indicators on the right to move the selected row. You must confirm your changes by clicking "OK". If you change your mind before clicking "OK", click "Cancel" to reverse your changes.
Click "Move" to directly specify a new location for the selected policy.
Use this to toggle the On/Off state of the selected policy.
If you wish to create a policy which is similar to an existing policy, select the policy and click the "Copy" button.
Remember that the new policy must have a different name, and there can only be one active (enabled) policy for each remote VPN endpoint.
To delete an exiting policy, select it and click the "Delete" button. Clicking the "View Log" button will open a new window and display
the VPN log.

Adding a New Policy

1. To create a new VPN Policy, click the "Add" button on the VPN Policies screen. This will start the VPN Wizard, as shown below.
Figure 47: VPN Wizard - Start
If you prefer to use a single setup screen instead of a Wizard, click the Setup Screen button. This is recommended for experienced users only.
75
VRT-401 User Manual
Otherwise, click Next to continue. You will see a screen like the following.
Figure 48: VPN Wizard - General
General Settings Policy Name
Enter a suitable name. This name is not supplied to the remote VPN. It is used only to help you manage the policies.
Enable Policy
Remote VPN Endpoint
Enable or disable the policy as required. For each remote VPN, only 1 policy can be enabled at any time.
The Internet IP address of the remote VPN endpoint (Gateway or client).
Dynamic. Select this if the Internet IP address is unknown. In this case, only incoming connections are possible.
Fixed. Select this if the remote endpoint has a fixed Internet IP address.
Keys
Select Manually assigned or IKE (Internet Key Exchange) as required. If you are setting up both endpoints, using IKE is recommended.
2. Click Next to continue. You will see a screen like the following:
76
VPN
Figure 49: VPN Wizard - Traffic Selector
For outgoing VPN connections, these settings determine which traffic will cause a VPN tunnel to be created, and which traffic will be sent through the tunnel.
For incoming VPN connections, these settings determine which systems on your local LAN will be available to the remote endpoint.
The 2 VPN endpoints MUST use different address ranges. If the addresses were in the same range, traffic intended for the remote VPN would be considered local LAN traffic. So it would not be forwarded to the Gateway.
Local IP addresses Type
Any - no additional data is required. Any IP address is acceptable.
For outgoing connections, this allows any PC on the
LAN to use the VPN tunnel.
For incoming connections, this allows an PC using the
remote endpoint to access any PC on your LAN.
Single address - enter an IP address in the "Start IP address" field.
Range address - enter the starting IP address in the "Start IP address" field, and the finish IP address in the "Finish IP address" field.
Subnet address - enter the desired IP address in the "Start IP address" field, and the network mask in the "Sub­net Mask" field.
The remote VPN must have these IP addresses entered as it's "Remote" addresses.
77
VRT-401 User Manual
Remote IP addresses Type
Single address - enter an IP address in the "Start IP address" field.
Range address - enter the starting IP address in the "Start IP address" field, and the finish IP address in the "Finish IP address" field.
Subnet address - enter the desired IP address in the "Start IP address" field, and the network mask in the "Sub­net Mask" field.
The remote VPN should have these IP addresses entered as it's "Local" addresses.
3. Click Next to continue. The screen you will see depends on whether you previously selected "Manual Key Exchange" or "IKE".
Manual Key Exchange
Figure 50: VPN Wizard - Manual Key Exchange
78
These settings must match the remote VPN. Note that you cannot use both AH and ESP.
Manually assigned Keys
VPN
AH Authentication
ESP Encryption
AH (Authentication Header) specifies the authentication protocol for the VPN header, if used. (AH is often NOT used)
If AH is not enabled, the following settings can be ignored.
Keys
The "in" key here must match the "out" key on the remote VPN, and the "out" key here must match the "in" key on the remote VPN.
Keys can be in ASCII or Hex (0..9 A..F)
For MD5, the keys should be 32 hex/16 ASCII characters.
For SHA-1, the keys should be 40 hex/20 ASCII charac-
ters.
SPI
Each SPI (Security Parameter Index) must be unique.
The "in" SPI here must match the "out" SPI on the remote
VPN, and the "out" SPI here must match the "in" SPI on the remote VPN.
Each SPI should be at least 3 characters.
ESP (Encapsulating Security Payload) provides security for the payload (data) sent through the VPN tunnel. Generally, you will want to enable both Encryption and Authentication.
The "3DES" algorithm provides greater security than "DES", but is slower.
The "in" key here must match the "out" key on the remote VPN, and the "out" key here must match the "in" key on the remote VPN.
ESP Authentica­tion
Generally, you should enable ESP Authentication. There is little difference between the available algorithms. Just ensure each endpoint use the same setting.
The "in" key here must match the "out" key on the remote VPN, and the "out" key here must match the "in" key on the remote VPN.
Keys can be in ASCII or Hex (0..9 A..F)
For MD5, the keys should be 32 hex/16 ASCII characters.
For SHA-1, the keys should be 40 hex/20 ASCII charac-
ters.
ESP SPI This is required if either ESP Encryption or ESP Authen-
tication is enabled.
Each SPI (Security Parameter Index) must be unique.
The "in" SPI here must match the "out" SPI on the remote
VPN, and the "out" SPI here must match the "in" SPI on the remote VPN.
Each SPI should be at least 3 characters.
79
VRT-401 User Manual
For Manual Key Exchange, configuration is now complete.
Click "Next" to view the final screen.
On the final screen, click "Finish" to save your settings, then "Close" to exit the
Wizard.
IKE Phase 1
If you selected IKE, the following screen is displayed after the Traffic Selector screen.
IKE Phase 1 (IKE SA) Direction
Select the desired option:
Initiator - Only outgoing connections will be created.
Responder - Only incoming connections will be accepted.
Both Directions - Both incoming and outgoing connec-
Local Identity
This setting must match the "Remote Identity" on the remote VPN. IP address is the more common method.
Remote Identity
This setting must match the "Local Identity" on the remote VPN. IP address is the more common method.
Figure 51: VPN Wizard - IKE Phase 1
Incoming connection attempts will be rejected.
Outgoing traffic which would otherwise result in a connec­tion will be ignored.
tions are allowed.
80
VPN
Authentication
Encryption
IKE Exchange Mode
IKE SA Life Time
DH Group
IKE PFS
RSA Signature requires that both VPN endpoints have valid Certificates issued by a CA (Certification Authority).
For Pre-shared key, enter the same key value in both endpoints. The key should be at least 8 characters (maxi­mum is 128 characters). Note that this key is used for the IKE SA only. The keys used for the IPsec SA are automati­cally generated.
Select the desired method, and ensure the remote VPN end­point uses the same method. The "3DES" algorithm provides greater security than "DES", but is slower.
Select the desired option, and ensure the remote VPN endpoint uses the same mode. Main Mode provides identity protection for the hosts initiating the IPSec session, but takes slightly longer to complete. Aggressive Mode provides no identity protection, but is quicker.
This setting does not have to match the remote VPN endpoint; the shorter time will be used. Although measured in seconds, it is common to use time periods of several hours, such 28,800 seconds.
Select the desired method, and ensure the remote VPN end­point uses the same method. The smaller bit size is slightly faster.
If enabled, PFS (Perfect Forward Security) enhances security by changing the IPsec key at regular intervals, and ensuring that each key has no relationship to the previous key. Thus, breaking 1 key will not assist in breaking the next key.
This setting should match the remote endpoint.
Click Next to see the following IKE Phase 2 screen.
Figure 52: VPN Wizard - IKE Phase 2
81
VRT-401 User Manual
IKE Phase 2 (IPsec SA) IPsec SA Life
Time
IPSec PFS
AH Authentication
ESP Encryption
ESP Authentica­tion
This setting does not have to match the remote VPN end­point; the shorter time will be used. Although measured in seconds, it is common to use time periods of several hours, such 28,800 seconds.
If enabled, PFS (Perfect Forward Security) enhances security by changing the IPsec key at regular intervals, and ensuring that each key has no relationship to the previous key. Thus, breaking 1 key will not assist in breaking the next key.
AH (Authentication Header) specifies the authentication protocol for the VPN header, if used.
AH is often NOT used. If you do enable it, ensure the algo­rithm selected matches the other VPN endpoint.
ESP (Encapsulating Security Payload) provides security for the payload (data) sent through the VPN tunnel. Generally, you will want to enable both ESP Encryption and ESP Authen­tication.
Select the desired method, and ensure the remote VPN endpoint uses the same method. The "3DES" algorithm provides greater security than "DES", but is slower.
Generally, you should enable ESP Authentication. There is little difference between the available algorithms. Just ensure each endpoint use the same setting.
For IKE, configuration is now complete.
Click "Next" to view the final screen.
On the final screen, click "Finish" to save your settings, then "Close" to exit the
Wizard.
82
VPN

Examples

This section describes some examples of using VRT-401 in common VPN situations.

Example 1: Connecting 2 VRT-401s

In this example, 2 LANs are connected via VPN.
Figure 53: Connecting 2 VRT-401s
Note
The LANs MUST use different IP address ranges.
Both endpoints have fixed WAN (Internet) IP addresses.
Configuration Settings
Setting LAN A Gateway LAN B Gateway Notes
Name Policy 1 Policy 1 Name does not affect
operation. Select a meaningful name.
Remote Endpoint 205.17.11.43 202.11.13.211 Other endpoint's WAN
(Internet) IP address.
Local IP addresses
Remote IP addresses
Key Exchange IKE IKE Must match
IKE SA Parameters
IKE Direction Both ways Both ways Does not have to match.
Local Identity IP address IP address IP address is the most
Any Any Use a more restrictive
definition if possible.
192.168.1.1 to
192.168.1.254
192.168.0.1 to
192.168.0.254
Address range on other endpoint. Use a more restrictive definition if possible.
Either endpoint can block 1 direction.
common ID method
Remote Identity IP address IP address IP address is the most
common ID method
IKE Authentica­tion method
Pre-shared Key Pre-shared Key Certificates are not
widely used.
83
VRT-401 User Manual
Pre-shared Key Xxxxxxxxxx Xxxxxxxxxx Must match IKE Authentica-
MD5 MD5 Must match
tion algorithm IKE Encryption DES DES Must match IKE Exchange
Main Mode Main Mode Must match
mode DH Group Group 1 (768
bit)
Group 1 (768 bit)
Must match
IKE SA Life time 28800 28800 Does not have to match.
Shorter period will be used.
IKE PFS Disable Disable Must match
IPSec SA Parameters
IPSec SA Life time
28800 28800 Does not have to match.
Shorter period will be
used. IPSec PFS Disabled Disabled Must match AH authentication Disabled Disabled AH is rarely used ESP authentica-
Enable/MD5 Enable/MD5 Must match
tion ESP encryption Enable/DES Enable/DES Must match
84
VPN

Example 2: Windows 2000/XP Client to LAN

In this example, a Windows 2000/XP client connects to VRT-401 and gains access to the local LAN.
Figure 54: Windows 2000/XP Client to VRT-401
To use 3DES encryption, you need Service Pack 3 or later installed on Windows 2000.
VRT-401 Configuration
Setting Value Notes
Name Win Client Name does not affect operation. Select a
meaningful name.
Remote Endpoint 172.16.9.10 Other endpoint's WAN (Internet) IP ad-
dress.
Local IP addresses
Remote IP addresses
Key Exchange IKE Must match
IKE SA Parameters
IKE Direction Responder Only want to accept client connections. Local Identity IP address Required. Remote Identity IP address Required IKE Authentica-
tion method Pre-shared Key Xxxxxxxxxx Must match client PC
Subnet address:
192.168.0.0
255.255.255.0
172.16.9.10 For a single client, this is the same as the
Pre-shared Key Certificates are not widely used.
Allows access to entire LAN. Use a more restrictive definition if possible.
Gateway.
IKE Authentica­tion algorithm
IKE Encryption 3DES Must match client PC IKE Exchange
SHA-1 Must match client PC
Main Mode Must match client PC
85
VRT-401 User Manual
mode DH Group Group 1 (768 bit) Must match client PC IKE SA Life time 28800 Does not have to match client PC. Shorter
period will be used.
IKE PFS Disable Must match client PC
IPSec SA Parameters
IPSec SA Life time
28800 Do not have to match. Shorter period will
be used. IPSec PFS Disable Must match client PC AH authentication Disabled AH is rarely used ESP authentica-
Enable/MD5 Must match client PC
tion ESP encryption Enable/DES Must match client PC
Windows Client Configuration
1. Select Start - Programs - Administrative Tools - Local Security Policy.
2. Right click IP Security Policy on Local Machine and select Create IP Security Policy
Figure 55: Windows 2000/XP - Local Security Settings
3. Click "Next", then enter a policy name, for example "DUT To Win2K", then click "Next".
4. Step through the Wizard:
Deselect Activate the default response rule. Click "Next",
Leave Edit Properties checked. Click "Finish".
5. The following "Properties - Rules" screen will be displayed.
86
Figure 56: Windows 2000/XP - Policy Properties
Note that no rules are in use. Two 2 rules are required - incoming and outgo-
ing.
The outgoing rule will be added first.
VPN
6. Deselect the "Use Add Wizard" checkbox, then click "Add" to view the screen below.
Figure 57: IP Filter List
7. Type "To DUT" for the name, then click "Add" to see a screen like the following.
Since this is the outing filter, the Source IP address is "My IP address" and the
Destination IP address is the address range used on the remote LAN.
Ensure the Mirrored option is checked.
87
VRT-401 User Manual
Figure 58: Filter Properties: Addressing
8. Enter the Source IP address and the Destination IP address.
Since this is the outing filter, the Source IP address is "My IP address" and the
Destination IP address is the address range used on the remote LAN.
Ensure the Mirrored option is checked.
9. Click "OK" to save your settings and close this dialog.
Figure 59: New Rule Properties: IP Filter List
10. On the resulting screen (above), ensure the "To DUT" filter is selected, then click the Filter Action tab to see a screen like the following
88
VPN
Figure 60: New Rule Properties: Filter Action
11. Select Require Security, then click the "Edit" button, to view the Require Security Properties screen.
Figure 61: Require Security Properties
12. Select Negotiate security (this selects IKE), then click "Add".
89
VRT-401 User Manual
Figure 62: Modify Security Method
13. On the resulting screen (above), select High [ESP] then click "OK" to save your changes and return to the Require Security Properties screen.
Figure 63: Require Security Properties
14. Ensure the following settings are correct, then click "OK" to return to the Filter Action tab of the Edit Rule Properties screen.
VPN Setting Windows Setting
IKE enabled Negotiate security AH disabled AH Integrity: <None> ESP encryption: Enable/DES ESP Confidentially: DES ESP authentication: Enable/MD5 ESP Integrity: MD5
90
VPN
15. Click the Tunnel Setting tab, then select The tunnel endpoint is specified by this IP address. Enter the WAN (Internet) IP address of VRT-401, as shown below.
Figure 64: Tunnel Setting
16. Click the Authentication Methods tab, then click the "Edit" to see the screen like the example below.
Figure 65: Authentication Method
17. Select Use this string to protect the key exchange (preshared key), then enter your preshared key in the field provided.
18. Click "OK" to save your changes and return to the Authentication Methods tab of the Edit Rule Properties screen.
91
VRT-401 User Manual
19. Click "Close" to return to the DUT to Win2K properties screen. The "To DUT" filter should now be listed, as shown below.
Figure 66: Windows 2000/XP Client to VRT-401
20. To add the second (outgoing) rule, click "Add". For the name, enter "To Win2K", then click "Add".
Figure 67: Windows 2000/XP Client to VRT-401
21. Enter the Source IP address and the Destination IP address as shown below.
Since this is the incoming filter, the Source IP address is the address range
used on the remote LAN and the Destination IP address is "My IP address".
Ensure the Mirrored option is checked.
92
Figure 68: Filter Properties: Addressing
22. Click "OK" to save your changes, then "Close".
VPN
Figure 69: Filter List
23. Ensure the "To Win2K" filter is selected, then click the Filter Action tab.
93
VRT-401 User Manual
Figure 70: Filter Action
24. Select Require Security, then click "Edit". On the Require Security Methods screen below, select Negotiate security.
Figure 71: Security Methods
25. Click the "Add" button. On the resulting Modify Security Method screen below, select High [ESP].
94
VPN
Figure 72: Modify Security Method
26. Click "OK" to save your changes, then click "OK" again to return to the Filter Action screen.
27. Select the Tunnel Setting tab, and enter the WAN (Internet) IP address of this PC (172.10..9.10 in this example).
Figure 73: Tunnel Setting
28. Select the Authentication Methods tab, and click the "Edit" button to see the screen below.
95
VRT-401 User Manual
Figure 74: Authentication Method
29. Select Use this string to protect the key exchange (preshared key), then enter your preshared key in the field provided.
30. Click "OK" to save your settings, then "Close" to return to the DUT to Win2K Prop- erties screen. There should now be 2 IP Filers listed, as shown below.
Figure 75: DUT to Win2K Properties
31. Select the General tab.
96
Loading...