QNO QVF7411 User Manual

English User’s Manual
SSL / IPSec VPN QoS Router
2x100Mbps WAN + 4x100Mbps Switch LAN
(WAN2/DMZ)
Fully Integrated SMB SSL & IPSec VPN Solution
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
I
Product Manual Using Permit Agreement
[Product Manual (hereafter the "Manual") Using Permit Agreement] hereafter the "Agreement" is the using permit of the Manual, and the relevant rights and obligations between the users and Qno Technology Inc (hereafter "Qno"), and is the exclusion to remit or limit the liability of Qno. The users who obtain the file of this manual directly or indirectly, and users who use the relevant services, must obey this Agreement.
Important Notice: Qno would like to remind the users to read the clauses of the "Agreement" before downloading and reading this Manual. Unless you accept the clauses of this "Agreement", please return this Manual and relevant services. The downloading or reading of this Manual is regarded as accepting this "Agreement" and the restriction of clauses in this "Agreement".
1Statement of Intellectual Property
Any text and corresponding combination, diagram, interface design, printing materials or electronic file are protected by copyright of our country, clauses of international copyright and other regulations of intellectual property. When the user copies the "Manual", this statement of intellectual property must also be copied and indicated. Otherwise, Qno regards it as tort and relevant duty will be prosecuted as well.
2Scope of Authority of "Manual"
The user may install, use, display and read this "Manual on the complete set of computer.
3User Notice If users obey the law and this Agreement, they may use this "Manual" in accordance with "Agreement". The "hardcopy or softcopy" of this Manual is restricted using for information, non-commercial and personal purpose. Besides, it is not allowed to copy or announce on any network computer. Furthermore, it is not allowed to disseminate on any media. It is not allowed to modify any part of the "file". Using for other purposes is prohibited by law and it may cause serious civil and criminal punishment. The transgressor will receive the accusation possibly.
4Legal Liability and Exclusion 4-1Qno will check the mistake of the texts and diagrams with all strength. However, Qno, distributors, and
resellers do not bear any liability for direct or indirect economic loss, data loss or other corresponding commercial loss to the user or relevant personnel due to the possible omission.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
II
4-2In order to protect the autonomy of the business development and adjustment of Qno, Qno reserves the right to adjust or terminate the software / Manual any time without informing the users. There will be no further notice regarding the product upgrade or change of technical specification. If it is necessary, the change or termination will be announced in the relevant block of the Qno website.
4-3All the set parameters are examples and they are for reference only. You may also purpose your opinion or suggestion. We will take it as reference and they may be amended in the next version.
4-4This Manual explains the configuration of all functions for the products of the same series. The actual functions of the product may vary with the model. Therefore, some functions may not be found on the product you purchased.
4-5Qno reserves the right to change the file content of this Manual and the Manual content may not be updated instantly. To know more about the updated information of the product, please visit Qno official website.
4-6Qno (and / or) distributors hereby declares that no liability will be born for any guarantee and condition of the corresponding information. The guarantee and condition include tacit guarantee and condition about marketability, suitability for special purposes, ownership, and non-infringement. The name of the companies and products mentioned may be the trademark of the owners. Qno (and/or) the distributors do not provide the product or software of any third party company. Under any circumstance, Qno and / or distributors bear no liability for special, indirect, derivative loss or any type of loss in the lawsuit caused by usage or information on the file, no matter the lawsuit is related to agreement, omission, or other tort.
5Other Clauses 5-1The potency of this Agreement is over any other verbal or written record. The invalidation of part or
whole of any clause does not affect the potency of other clauses. 5-2The power of interpretation, potency and dispute are applicable for the law of Taiwan. If there is any
dissension or dispute between the users and Qno, it should be attempted to solve by consultation first. If it is not solved by consultation, user agrees that the dissension or dispute is brought to trial in the jurisdiction of the court in the location of Qno. In Mainland China, the "China International Economic and Trade Arbitration Commission" is the arbitration organization.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
III
Content
I.
Introduction ................................................................................................................... 1
II.
Multi- WAN VPN Router Installation ............................................................................. 3
2.1 Systematic Setting Process .............................................................................................................. 3
2.2 Setting Flow Chart ............................................................................................................................ 3
III.
Hardware Installation .................................................................................................... 6
3.1 LED Signal ........................................................................................................................................ 6
3.2 VPN Router Network Connection ..................................................................................................... 9
IV.
Login ............................................................................................................................ 10
V.
V. Device Spec Verification, Status Display and Login Password and Time Setting12
5.1 Home Page ..................................................................................................................................... 12
5.1.1 WAN Status ........................................................................................................................... 12
5.1.2 Physical Port Status .............................................................................................................. 13
5.1.3 System Information ............................................................................................................... 15
5.1.4 Firewall Status ...................................................................................................................... 16
5.1.5 Log Setting Status ................................................................................................................. 16
5.2 Change and Set Login Password and Time ................................................................................... 17
5.2.1 Password Setting .................................................................................................................. 17
5.2.2 Time ...................................................................................................................................... 18
VI.
Network ........................................................................................................................ 20
6.1 Network Connection ....................................................................................................................... 20
6.1.1 Host Name and Domain Name ............................................................................................. 20
6.1.2 LAN Setting ........................................................................................................................... 21
6.1.3 WAN & DMZ Settings ............................................................................................................ 22
6.2 Multi- WAN Setting ......................................................................................................................... 36
6.2.1 Load Balance Mode .............................................................................................................. 37
6.2.2 Network Service Detection .................................................................................................... 41
6.2.3 Protocol Binding .................................................................................................................... 44
VII.
Intranet Configuration ................................................................................................. 54
7.1 Port Management ........................................................................................................................... 54
7.2 Port Status ...................................................................................................................................... 57
7.3 IP/ DHCP ........................................................................................................................................ 59
7.4 DHCP Status .................................................................................................................................. 62
7.5 IP & MAC Binding ........................................................................................................................... 66
7.6 IP Group Management ................................................................................................................... 70
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
IV
7.7 Port Group Management ................................................................................................................ 73
VIII.
QoS (Quality of Service) .............................................................................................. 75
8.1 Bandwidth Management ................................................................................................................. 76
8.1.1 The Maximum Bandwidth provided by ISP ........................................................................... 77
8.1.2 QoS ....................................................................................................................................... 78
8.2 Session control ............................................................................................................................... 82
8.3 Hardware Optimization(Future) ...................................................................................................... 85
8.4 Smart QoS ...................................................................................................................................... 87
IX.
Firewall ......................................................................................................................... 89
9.1 General Policy ................................................................................................................................ 89
Restrict Application ............................................................................................................................... 92
9.2 Access Rule .................................................................................................................................... 95
9.2.1 Add New Access Rule ........................................................................................................... 97
9.3 Content Filter .................................................................................................................................. 99
X.
VPN (Virtual Private Network) ................................................................................... 104
10.1. VPN .............................................................................................................................................. 104
10.1.1. Display All VPN Summary ................................................................................................... 104
10.1.2. Add a New VPN Tunnel ....................................................................................................... 108
10.1.3. PPTP Server ....................................................................................................................... 134
10.1.4. VPN Pass Through ............................................................................................................. 136
10.2. QnoKey ......................................................................................................................................... 137
10.2.1. QnoKey Summary ............................................................................................................... 137
10.2.2 Qnokey Group Setup ........................................................................................................... 138
10.2.3 Qnokey Account List ............................................................................................................ 141
10.3. QVM VPN Function Setup ............................................................................................................ 143
10.3.1. QVM Server Settings .......................................................................................................... 143
10.3.2. QVM Status ......................................................................................................................... 145
10.3.3. QVM Client Settings(Future Feature) ................................................................................. 146
XI.
Virtue Route ............................................................................................................... 148
11.1 Virtual Route Server (PPTP Server) .............................................................................................. 150
11.2 Virtue Route Client (Future Feature) ............................................................................................. 151
XII.
SSL VPN ..................................................................................................................... 154
12.1 Status ............................................................................................................................................ 155
12.2 Group Summary ............................................................................................................................ 155
12.3 Group Management ...................................................................................................................... 156
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
V
12.4 Domain Management .................................................................................................................... 172
12.5 User Management ......................................................................................................................... 173
12.6 Service Resource Management .................................................................................................... 175
12.7 Link to Portal.................................................................................................................................. 176
12.8 Advanced Settings ......................................................................................................................... 176
12.8.1 Virtual Passage .................................................................................................................... 177
12.8.2 Advanced Configurations ..................................................................................................... 179
12.8.3 Password Protection ............................................................................................................ 180
12.8.4 SSL Upgrade Serial Number ................................................................................................ 181
XIII.
Advanced Function ................................................................................................... 187
13.1 DMZ Host/ Port Range Forwarding ............................................................................................... 187
13.1.1 DMZ Host ............................................................................................................................. 187
13.1.2 Port Range Forwarding ........................................................................................................ 187
13.2 UPnP ............................................................................................................................................. 191
13.3 Routing .......................................................................................................................................... 192
13.3.1 Dynamic Routing .................................................................................................................. 192
13.3.2 Static Routing ....................................................................................................................... 193
13.4 One to One NAT ............................................................................................................................ 195
13.5 DDNS- Dynamic Domain Name Service ....................................................................................... 197
13.6 MAC Clone .................................................................................................................................... 200
13.7 Inbound Load Balance .................................................................................................................. 201
XIV.
System Tool ............................................................................................................... 209
14.1 Diagnostic ...................................................................................................................................... 209
14.2 Firmware Upgrade ......................................................................................................................... 211
14.3 Configration Backup ...................................................................................................................... 212
14.4 SNMP ............................................................................................................................................ 213
14.5 System Recover ............................................................................................................................ 215
14.6 High Availability ............................................................................................................................. 217
14.7 License Key ................................................................................................................................... 222
XV.
Log ................................................................................................................................. 1
15.1 System Log ........................................................................................................................................ 1
15.2 System Statistic ................................................................................................................................. 7
15.3 Traffic Statistic ................................................................................................................................... 9
15.4 IP/ Port Statistic ............................................................................................................................... 11
15.5 Connection Statistic (Future Feature) ............................................................................................. 13
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
VI
15.6 QRTG (Qno Router Traffic Grapher) ............................................................................................... 15
XVI.
Log out ......................................................................................................................... 20
Appendix I: User Interface and User Manual Chapter Cross Reference ................................ 21
Appendix II::Troubleshooting .................................................................................................. 24
(1) Block BT Download ............................................................................................................................ 24
2Shock Wave and Worm Virus Prevention ...................................................................................... 25
3Block QQLive Video Broadcast Setting.......................................................................................... 27
4ARP Virus Attack Prevention .......................................................................................................... 29
Appendix III::Qno Technical Support Information ................................................................ 38
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
1
I. Introduction
SSL / IPSec VPN QoS Router (referred as VPN Router hereby) is a business level security router that efficiently integrates new generation multiple WAN-port devices. It meets the needs of medium enterprises, internet cafés, campus, dorm and communities, etc. Apart from its internet connectivity that suits the broadband market, VPN Router has a built-in QoS and VLAN switching board which enables it to fulfill most enterprise and internet cafe firewall needs.
VPN Router has 2 10/100 Base-T/TX Ethernets (RJ45) WAN ports. These WAN ports can support auto load balance mode, exclusive mode (remaining WAN balance), and stategy routing mode for high-efficiency network. They offer super flexibility for network set-up. Moreover, these WAN ports also support DHCP, fixed IP, PPPoE, transparent bridge, VPN connection, port binding, static routing, dynamic routing, NAT, one to one NAT, PAT, MAC Clone, as well as DDNS. As for LAN ports including one DMZ, they support 4 10/100 Base-T/TX Ethernet (RJ45) ports and provide the features of virtual route, Microsoft UPnP, VLAN, Multi Subnet, and transparent bridge mode. Internet IP addresses can also be used in intranet.
To fulfill the requirement for a highly secure and integrated firewall, VPN Router has a
64-bit
hardware acceleration,
high-speed, high-efficiency processor embedded. With high processing speed, plusing high standard SDRAM and Flash, VPN Router brings users super networking efficiency. Its processing speed and capacity are almost equal to those of expensive enterprise-level VPN Routers. This is why the device is so popular with modern enterprises.
In addition to internet connectability, for the broadband market, VPN Router has the function of VPN virtual network connection. It is equipped with a virtual private network hardware acceleration mode which is widely used in modern enterprises, and offers full VPN functionality.
Qno is a supporter of the IPSec and SSL Protocol. IPSec/SSL VPN provides DES, 3DES, AES-128 encryption, MD5, SH1 certification, IKE Pre-Share Key, or manual password interchange. VPN Router also supports aggressive mode. When a connection is lost, VPN Router will automatically re-connect. In addition, the device features NetBIOS transparency, and supports IP grouping for connections between clients and host in the virtual private network.
VPN Router offers the function of a standard PPTP server, which is equipped with connection setting status. Each WAN port can be set up with multiple DDNS at the same time. It is also capable of establishing VPN connections with dynamic IP addresses.
VPN Router also has unique QVM VPN- SmartLink IPSec VPN. Just input VPN server IP, user name, and password, and IPSec VPN will be automatically set up. Through VPN Router exclusive QVM function, users can set up QVM to work as a server, and have it accept other QVM series products from client ports. QVM offers easy VPN allocation for users; users can do it even without a network administrator. VPN Router enables enterprises to benefit from VPN without being troubled with technical and network management problems. The central control function enables the host to log in remote client computers at any time. Security and secrecy are guaranteed to meet the IPSec standard, so as to ensure the continuity of VPN service.
The advanced built-in firewall function enables VPN Router to resist most attacks from the Internet. It utilizes active detection technology SPI (Stateful Packet Inspection). The SPI firewall functions mainly within the network by dynamically inspecting each link. The SPI firewall also has a warning function for
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
2
the application process; therefore, it can refuse links to non-standard communication protocols. VPN Router supports network address translation (NAT) function and routing modes. It makes the network environment more flexible and easier to manage.
Through web- based UI, VPN Router enables enterprises to have their own network access rules . To control web access, users can build and edit filter lists. It also enables users to ban or monitor websites according to their needs. By the filter setting and complete OS management, school and business internet management will be clearly improved. VPN Router offers various on-line SysLog records. It supports on-line management setup tools; it makes setting up networks easy to understand. It also reinforces the management of network access rules, VPN, and all other network services.
VPN Router fully protects the safety of communication between all offices and branches of an organization. It helps to free enterprises from increasing hacker intrusion. With an exclusive independent operation platform, users are able to set up and use a firewall without professional network knowledge. VPN Router setting up and management can be carried out through web browsers, such as IE, Netscape, etc.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
3
II. Multi- WAN VPN Router Installation
In this chapter we are going to introduce hardware installation. Through the understanding of multi-WAN setting process, users can easily setup and manage the network,making VPN Router functioning and having best performance.
2.1 Systematic Setting Process
Users can set up and enable the network by utilizing bandwidth efficiently. The network can achieve the ideal efficientness,block attacks, and prevent security risks at the same time. Through the process settings, users can install and operate VPN Router easily. This simplifies the management and maintenance, making the user network settings be done at one time. The main process is as below:
1. Hardware installation
2. Login
3. Verify device specification and set up password and time
4. Set WAN connection
5. Set LAN connection: physical port and IP address settings
6. Set QoS bandwidth management: avoid bandwidth occupation
7. Set Firewall: prevent attack and improper access to network resources
8. Other settings: UPnP, DDNS, MAC Clone
9. Management and maintenance settings: Syslog, SNMP, and configuration backup
10. VPN (Virtual Private Network), QnoKey, QVM VPN function setting
11. Logout
2.2 Setting Flow Chart Below is the description for each setting process, and the crospondent contents and purposes. For detailed functions, please refer to Appendix I: Setting Inferface and Chapter Index.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
4
# Setting Content Purpose
1
Hardware installation
Configure the network to meet user’s demand.
Install the device hardware based on user physical requirements.
2 Login Login the device with
Web Browser.
Login the device web- based UI.
3 Verify device
specification
Verify Firmware version and working status.
Verify the device specification, Firmware version and working status.
Set password and time Set time and re- new
password.
Modify the login password considering safe issue. Synchronize time with WAN.
4
Set WAN connection
Verify WAN connection setting, bandwidth allocation, and protocol binding.
Connect to WAN. Configure bandwidth to optimize data transmission.
5
Set LAN connection: physical port and IP address settings
Set mirror port and VLAN. Allocate and manage LAN IP.
Provide mirror port, port management and VLAN setting functions. Support Static/DHCP IP allocation to meet different needs. IP group will simplize the management work.
6
Set QoS bandwidth management: avoid bandwidth occupation
Restrict bandwidth and session of WAN ports, LAN IP and application.
To assure transmission of important information, manage and allocate the bandwidth further to achieve best efficiency.
7
Set Firewall: prevent attack and improper access to network resources
Block attack, Set Access rule and restrict Web access.
Administrators can block BT to avoid bandwidth occupation, and enable access rules to restrict employee accessing internet improperly or using MSN, QQ and Skype during working time. They can also protect network from Worm or ARP attacking.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
5
8
Advanced Settings DMZ/Forwarding, UPnP, DDNS, MAC Clone
DMZ/Forwarding, UpnP, Routing Mode, multiple WAN IP, DDNS and MAC Clone
DMZ/Forwarding, UPnP, Routing Mode, multiple WAN IP, DDNS and MAC Clone
9
Management and maintenance settings: Syslog, SNMP, and configuration backup
Monitor VPN Router working status and configuration backup.
Administrators can look up system log and monitor system status and inbound/outbound flow in real time.
10
VPN Virtual Private Network, QnoKey, QVM VPN function setting
Configure VPN tunnels, e.g. PPTP, QnoKey, and QVM VPN.
Configure different types of VPN to meet different application environment.
11 Logout Close configuration
window.
Logout VPN Router web- based UI.
We will follow the process flow to complete the network setting in the following chapters.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
6
III. Hardware Installation
In this chapter we are going to introduce hardware interface as well as physical installation.
3.1 LED Signal
LED Signal Description
LED Color Description
Power Green Green LED on: Power ON DIAG Amber Amber LED on: System self-test is running.
Amber LED blinking: System not ready Amber LED off: System self-test is completed successfully.
Link/Act Green Green LED on: Port has been connected & Get IP.
Green LED blinking: Packets are transmitting through Ethernet port.
100M- Speed Amber Amber LED on: Ethernet is running at 100Mbps.
Amber LED off: Ethernet is running at 10Mbps. Connect Green Green LED on: WAN is connected and gets the IP address. WAN1 Green
Green LED onWAN1 is connected and IP address has been
obtained WAN2 Green
Green LED onWAN2 is connected and IP address has been
obtained
Reset
Action Description
Press Reset Button For 5 Secs
Warm Start DIAG indicator: Amber LED flashing slowly.
Press Reset Button Over 10 Secs
Factory Default DIAG indicator: Amber LED flashing quickly.
System Built-in Battery
A system timing battery is built into the device. The lifespan of the battery is about 1~2 years. If the battery life is over or it can not be charged, the device will not be able to record time correctly, nor synchronize with internet NTP time server. Please contact your system supplier for information on how to replace the battery.
Attention!
Do not replace the battery yourself; otherwise irreparable damage to the product may be caused.
Installing the device
on a Standard 19 Rack
We suggest to either place
t
place other heavy objects together with
thus causing damage or danger.
Each device
comes with a set of rack installation accessories, including 2 L
screws. Users can rack-
mount the device onto the chassis. Please r
installation onto a 19” rack:
Attention!
In order for the device to run smoothly, wherever users install it, be sure not to obstruct the vent on
each side of the device. Keep at least 10cm
SSSSLL // I
I
P
P
7
he device on a des
k or install it in a rack with attached brackets. Do not
the device on a rack. Ov
erloading may cause the rack to fail,
-
efer to the figure below for the
space in front of both the vents for air convection.
SSeecc VVPPNN QQooSS RRoouutteer
r
shaped brackets and 8
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
8
Installing Router on a Wall
The Router has two wall-mount slots on its bottom panel. When mounting the device on a wall, please ensure that the heat dissipation holes are facing sideways as shown in the following picture for safety reasons. Qno is not responsible for damages incurred by insecure wall-mounting hardware.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
9
3.2 VPN Router Network Connection
WAN connection:A WAN port can be connected with xDSL Modem, Fiber Modem, Switching Hub, or through an external router to connect to the Internet.
LAN Connection: The LAN port can be connected to a Switching Hub or directly to a PC. Users can use servers for monitoring or filtering through the port after “Physical Port Mangement” configuration is done.
DMZ : The DMZ port can be connected to servers that have legal IP addresses, such as Web servers, mail servers, etc.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
10
IV. Login
This chapter is mainly introducing Web- based UI after conneting the device.
First, check up the device’s IP address by connecting to DOS through the LAN PC under the device. Go to Start Run, enter cmd to commend DOS, and enter ipconfig for getting Default Gateway address, as the graphic below, 192.168.1.1. Make sure Default Gateway is also the default IP address of the router.
Attention!
When not getting IP address and default gateway by using “ipconfig”, or the received IP address is
0.0.0.0 and 169.X.X.X, we recommend that users should check if there is any problem with the circuits or the computer network card is connected nicely.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
11
Then, open webpage browser, IE for example, and key in 192.168.1.1 in the website column. The login window will appear as below:
The device’s default username and password are both “admin”. Users can change the login password in the setting later.
Attention!
For security, we strongly suggest that users must change password after login. Please keep the password safe, or you can not login to the device. Press Reset button for more than 10 sec, all the setting will return to default.
After login, the device’s web- based UI will be shown. Select the language on the upper right corner of the
webpage. The language chosen will be in blue. Please select “English’ as below.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
12
V. V. Device Spec Verification, Status Display and Login Password and Time Setting
This chapter introduces the device specification and status after login as well as change password and
system time settings for security.
5.1 Home Page
In the Home page, all the device’s parameters and status are listed for users’ reference.
5.1.1 WAN Status
IP Address
Indicates the current IP configuration for WAN port.
Default Gateway
Indicates current WAN gateway IP address from ISP.
DNS Server
Indicates the current DNS IP configuration.
Session
Indicates the current session number for each WAN in the device.
Downstream Bandwidth Usage(%)
Indicates the current downstream bandwidth usage(%) for each WAN.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
13
Upstream Bandwidth Usage(%)
Indicates the current upstream bandwidth usage(%) for each WAN.
DDNS
Indicates if Dynamic Domain Name is activated. The default configuration is “Off”.
Quality of Service
Indicates how many QoS rules are set.
Manual Connect
When “Obtain an IP automatically” is selected, two buttons (Release and Renew) will appear. If a WAN connection, such as PPPoE or PPTP, is selected, “Disconnect” and “Connect” will appear.
DMZ IP Address
Indicates the current DMZ IP address.
5.1.2 Physical Port Status
The status of all system ports, including each connected and enabled port, will be shown on this Home page (see above table). Click the respective status button and a separate window will appeare to show detailed data (including setting status summary and statisitcs) of the selected port.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
14
The current port setting status information will be shown in the Port Information Table. Examples: type (10Base-T/100Base-TX), iniferface (WAN/ LAN/ DMZ), link status (Up/ Down), physical port status (Port Enabled/ Port Disabled), priority (high or normal), speed status (10Mbps or 100Mbps), duplex status (Half/ Full), auto negotiation (Enabled or Disabled). The tabble also shows statistics of Receive/ Transmit Packets, Receive/Transmit Packets Byte Count as well as Error Packets Count.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
15
5.1.3 System Information
LAN IP/Subnet Mask::: Identifies the current device IP address. The default is 192.168.1.1.
Working Mode::: Indicates the current working mode. Can be NAT Gateway or Router mode. The default
is “NAT Gateway” mode.
System Active Time:::Indicates how long the Router has been running.
Serial Number:::This number is the Router serial number.
Firmware Version::: Information about the Router present software version.
Current Time:::Indicates the device present time
. Please note:
To have the correct time, users must
synchronize the device with the remote NTP server first.
CPU Usage:::Indicates the current router CPU usage percentage.
Memory UsageIndicates the current router memory usage percentage.
Total Session:::Indicates the current router session connection quantity.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
16
5.1.4 Firewall Status
SPI (Stateful Packet Inspection): Indicates whether SPI (Stateful Packet Inspection) is on or off. The
default configuration is “On”.
DoS (Denial of Service):Indicates if DoS attack prevention is activated. The default configuration is
“On”.
Block WAN Request:Indicates that denying the connection from Internet is activated. The default
configuration is “On”.
Prevent ARP Virus Attack: Indicates that preventing Arp virus attack is acitvated. The default
configuration is “Off”.
Remote Management: Indicates if remote management is activated (on or off). Click the hyperlink to
enter and manage the configuration. The default configuration is “Off”.
Access Rule:Indicates the number of access rule applied in the device.
5.1.5 Log Setting Status
External SyslogServer:::
Indicates the sever setting to receive the syslog.
Send Log by E-mail :::
(future feature)
Indicates the E-mail setting. Syslog will be sent to the specific E-mail.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
17
5.2 Change and Set Login Password and Time
5.2.1 Password Setting When you login the device setting window every time, you must enter the password. The default value for
the device username and password are both “admin”. For security reasons, we strongly recommend that you must change your password after first login. Please keep the password safe, or you might not login to the device. You can press Reset button for more than 10 sec, the device will return back to default.
User Name
The default is “admin”. Old Password Input the original password.The default is “admin”. New User Name
Input the new user name. i.e.Qno New Password
Input the new password.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
18
Confirm New Password
Input the new password again for verification.
Apply
Click “Apply” to save the configuration. Cancel
Click “Cancel" to leave without making any change. This action will be
effective before ”Apply” to save the configuration.
5.2.2 Time The device can adjust time setting. Users can know the exact time of event occurrences that are
recorded in the System Log, and the time of closing or opening access for Internet resources. You can either select the embedded NTP Server synchronization function or set up a time reference.
Synchronize with external NTP serverThe device has embedded NTP server, which will update the time
spontaneously.
Time Zone
Select your location from the pull-down time zone list to show correct local time.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
19
Daylight Saving
If there is Daylight Saving Time in your area, input the date range. The device will adjust the time for the Daylight Saving period automatically.
NTP Server
If you have your own preferred time server, input the server IP address.
Apply
After the changes are completed, click “Apply” to save the configuration.
Cancel
Click “Cancel" to leave without making any change. This action will be effective before ”Apply” to save the configuration.
Select the Local Time Manually: Input the correct time, date, and year in the boxes.
After the changes are completed, click “Apply” to save the configuration. Click “Cancel" to leave
without making any change. This action will be effective before ”Apply” to save the configuration.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
20
VI. Network
This Network page contains the basic settings. For most users, completing this general setting is enough
for connecting with the Internet. However, some users need advanced information from their ISP. Please refer to the following descriptions for specific configurations.
6.1 Network Connection
6.1.1 Host Name and Domain Name
Device name and domain name can be input in the two boxes. Though this configuration is not
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
21
necessary in most environments, some ISPs in some countries may require it.
6.1.2 LAN Setting
This is configuration information for the device current LAN IP address. The default configuration is
192.168.1.1 and the default Subnet Mask is 255.255.255.0. It can be changed according to the actual network structure.
Multiple-Subnet Setting
Click “Unified IP Management” to enter the configuration page, as shown in the following figure. Input
the respective IP addresses and subnet masks.
This function enables users to input IP segments that differ from the router network segment to the multi-net segment configuration; the Internet will then be directly accessible. In other words, if there are already different IP segment groups in the Intranet, the Internet is still accessible without making any
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
22
changes to internal PCs. Users can make changes according to their actual network structure.
6.1.3 WAN & DMZ Settings WAN Setting
Interface: An indication of which port is connected.
Connection Type: Obtain an IP automatically, Static IP connection, PPPoE (Point-to-Point Protocol over Ethernet), PPTP (Point-to-Point Tunneling Protocol) or Transparent Bridge.
Config.: A modification in an advanced configuration: Click Edit to enter the advanced configuration page.
Obtain an Automatic IP automatically:
This mode is often used in the connection mode to obtain an automatic DHCP IP. This is the device
system default connection mode. It is a connection mode in which DHCP clients obtain an IP address automatically. If having a different connection mode, please refer to the following introduction for selection of appropriate configurations. Users can also set up their own DNS IP address. Check the options and input the user-defined DNS IP addresses.
SSSSLL // IIPPSSeecc VVPPNN QQooSS RRoouutteer
r
23
Use the following DNS Server Addresses:::
Select a user-defined DNS server IP address.
DNS Server:::
Input the DNS IP address set by ISP. At least one IP group should be input. The maximum acceptable groups is two IP groups.
Enable Line-Dropped Scheduling:::
The WAN disconnection schedule will be activated by checking this option. In some areas, there is a time limitation for WAN connection service. For example: the optical fiber service will be disconnected from
0:00 am to 6:00 am. Although there is a standby system in the device, at
the moment of WAN disconnection, all the external connections that go through this WAN will be disconnected too. Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet. Therefore, to avoid a huge number of disconnection, users can activate this function to arrange new connections to be made through another WAN to the Internet. In this way, the effect of any disconnection can be minimized.
Line-Dropped Period:::
Input the time rule for disconnection of this WAN service.
Line-Dropped Scheduling:::
Input how long the WAN service may be disconnected before the newly added connections should go through another WAN to connect with the Internet.
Loading...
+ 238 hidden pages