The following typographical conventions are used in this book
Content Style
Menu >Submenu > Right Side Banner Selections
e.g.Configuration >Administrator > System Setup
Constant width bold
Indicates chapter and section
"Italic"
"Indicates user input examples."
This icon indicates a tip, or suggestion. I would like to tell users a special point on the
Internet.
This icon indicates a limited or caution. Pay attention to these to avoid running into system.
This icon indicates an example. Give users examples and to show how to use.
5
Chapter 0:Description
Chapter 0:Description
In this chapter, it will not only tell you how to install and connect your network system but also
configure and monitor it. Many explanations in detail functions are shown as well as the examples
of the operation for interface. In the description chapter you can enable the following lists:
․ 0-1 Hardware Overview
․ 0-2 Front Panel
․ 0-3 Rear Panel
․ 0-4 System Setting
․ 0-5Setting internal and external network
․ 0-6 Homepage Information
6
Chapter 0:Description
SG-100N
Dimensions(wide*long*high) :232*152*44mm
Custom Port (Fixed LAN & WAN1), 2G memory
320G HDD
SG-100N with WiFi
Dimensions(wide*long*high) : 232*152*44mm
Custom Port (Fixed LAN & WAN1), 2G memory,
320G HDD
2dBi, 3T3R, 802.11b/g/n
0-1 Hardware Overview
Integration between firewall and NAS
Unlike the traditional way building a gateway firewall and then installing shared storage space via
NAS or Network Neighborhood, ShareTech SG-100N is a gateway device integrated NAS into
firewall, protecting user’s network against threats from web activities with URL filtering. Users
can define search by keywords and sort options. Filtering conditions can be applied by time to
control over network access and usage to avoid threats from external networks. SG-100N
simplifies SMB network environments and provides IT staff a cloud-managed networking
solution.
7
Chapter 0:Description
LED
State
Description
POWER
Blinking
ShareTech appliance is activity
Green
ShareTech appliance in ON
Off
Take off adapter power(+12V DC)
HDD
Flashing Amber
Activity going on
Off
No activity
Ethernet Ports
Flashing Green(Right)
The port is linking and active in data
transmission.
Green(Left)
Correct cable is used and power is on port
Off
Power is not on port.
0-2 Front Panel
Figure 0-2. 1 Front Panel
Model Name:please see the Figure 0-2.1(Figure 0-2.1)
Appliance LED Behavior
8
Chapter 0:Description
0-3 Rear Panel
Figure 0-3. 1 Rear Panel
Power supply: +12 DC in
Console Port: By using RJ-45 to DB-9 Female cable, you can connect to a computer terminal for
Use the following configuration settings for terminal-emulation programs: (Figure 0-3.4)
Figure 0-3. 4 PuTTY Configuration
11
Chapter 0:Description
Please check your COM and LPT(Figure 0-3.5)
Figure 0-3. 5 USB-SERIAL
Enter Information: (Figure 0-3.6)
Choose "serial"
Serial line: COM(?), please refer to Figure 0-3.5, and enter your COM number.
Speed : 115200
Choose "Open"
Figure 0-3. 6 Serial line
12
Chapter 0:Description
Console Screen: (Figure 0-3.)
MY LAN IP IS 192.168.1.1: it shows current LAN IP
admin_pw_def: reset your login User Name and Password to be default(admin/admin)
admin_ip_def: reset your IP to be 192.168.1.1
Apache_port: shows http and https port
Restart: reboot SG-100N and every setting still exist on equipment.
Poweroff: shutdown SG-100N.
Figure 0-3. 7 Console Screen
13
Chapter 0:Description
0-4 System Setting
Deployment
Your PC connect the device’s LAN port directly or, with the same hub / switch, and launch a web
browser (ex. Internet Explorer, Mozilla Firefox, or Chrome) to access the management interface
address which is set to http://192.168.1.1 by default. Therefore, the IP addresses of LAN PCs must
be configured within the range between 192.168.1.2 and 192.168.1.254 inclusively, and assigned
the subnet mask of 255.255.255.0.(Figure 0-4.1)
Figure 0-4. 1 Deployment
Start Browser and Enter Login User Name / Password
Open the IE browser; enter 192.168.1.1 in the address bar. (Figure 0-4.2)
Browser will pop up for authentication, please enter admin (username) / admin (password) to login.
Figure 0-4. 2 Start Browser and Enter Login User Name / Password
14
Chapter 0:Description
Login completed (Figure 0-4.3)
Change Language
Default management interface language is English. Select Configuration >Language > Language.
Then, there are three languages, English, Traditional Chinese, and Simplified Chinese. Select one
language which belongs to you. Click on. (Figure 0-4.4)
Figure 0-4. 3 Login completed
Figure 0-4. 4 Change Language
15
Chapter 0:Description
0-5 Setting internal and external network
In this section, follow two parts below, LAN setup and WAN setup, and to start machine up.
When configure a new LAN interface address accordingly. If the company’s LAN IP address is
not belong to subnet of 192.168.1.0/24 (default), and then the Administrator must
add/change PC IP address to be within the same range of the LAN subnet. (Figure 0-5.1)
For example, to add multiple IP address (192.168.1.2) in “LAN connection”you’re your
computer.
Figure 0-5. 1 Advanced TCP/IP settings
For your reference, you may configure your management address based on the available
subnet ranges below: 10.0.0.0 ~ 10.255.255.255,
172.16.0.0 ~ 172.31.255.255,
192.168.0.0 ~ 192.168.255.255
16
Chapter 0:Description
Setting Internal Network
Select Network >Interface > Port 1, and Interface Type is LAN. (Figure 0-5.2)
Administrator clicks on Network >Interface > Port 1 (LAN) to enter internal network information. At
last, click on “save” to complete the setup.
Figure 0-5. 2 LAN Interface
Note: If the management interface is assigned with a different IP address, the management
interface will only become accessible from a web browser using the new IP address.
Setting External Network
Select Network >Interface > Port 2, and Interface Type is WAN1. (Figure 0-5.3)
Administrator clicks on Network > Interface > Port 2 (WAN) to enter external network information.
Step 2: Port 2 (WAN) Alive Detection(Figure 0-5.6)
Figure 0-5. 6 WAN1 Alive Detection
18
Chapter 0:Description
Step 3: General Setting on Port 2 (WAN) (Figure 0-5.7)
Figure 0-5. 7 General Setting on Port 2
Step 4: After finish configuring LAN and WAN, SG-100N setup is successful.
19
Chapter 0:Description
0-6 Homepage Information
Menu Bar
From top of the screen, menu bar, you can know different models depend on the different colors.
SG series is Blue color. (Figure 0-6.1)
Figure 0-6. 1 Menu Bar
MENU
On the other hand, from the left side of the screen, MENU, it shows difference depend on the
different models.
Figure 0-6. 2 Menu
System Time and System Resource
It shows Server 1-1 Date & Time and 11-1 Performance. In addition, it displays the CPU, Memory,
Flash, and HDD simultaneously. (Figure 0-6.3)
Figure 0-6. 3 System Time and System Resource
20
Chapter 0:Description
System Information and Server Service
The Server Model and Server Version of the machine (Figure 0-6.4)
: Service works.
: Service does not work.
Figure 0-6. 4 System Information and Server Service
Interface
Equipment Interface details: (Figure 0-6.5)
Name: The system catches network contact surface name.
Connect Status: Whether the network is unimpeded
1. : Connect up.
2. : It does not connect the Internet.
Line Status: Whether the judgment network does connect
1. : Connect up.
2. : It does not connect the Internet.
IP Address: System binding IP address
Total Packets: Each network interface transmission, receive wrapped packets quantity. (Bytes)
Total Flow: Each network interface transmission, receive current capacity. (Bytes)
Figure 0-6. 5 Interface
21
Chapter 0:Description
Click (Figure 0-6.6)
Figure 0-6. 6 Interface more detailed
22
Chapter 1:Configuration
Chapter 1:Configuration
In this chapter, you will know how to configure your machine of Date, Time, Administrator, Backup,
Notification, and Language. In the Description chapter you can enable the following lists:
․ 1-1 Data & Time
․ 1-2Administration
․ 1-3System
․ 1-4 Package
․ 1-5 Language
․ 1-6Notification
․ 1-7Backup & Mount
․ 1-8Signature Update
․ 1-9 CMS
․ 1-10 Ap Management
․ 1-11 SSL Proof
․ 1-12 MyCloud Setting
23
Chapter 1:Configuration
1
1-1 Date & Time
Your current time zone setting can also be changed in this section. The first form in this section gives
you the possibility to manually change the system time. Second, the system time synchronized to
time server hosts on the internet by using the network time protocol (NTP1). A number of time
server hosts on the internet are preconfigured and used by the system. This makes sense if the
system clock is way off and you would like to speed up synchronization. Finally, this might be
necessary if you are running a setup that does not allow ShareTech to reach the internet. You can
add a host on User Defined Time Server field. In the Date & Time section you can enable the
following lists: (Figure 1-1.1)
Figure 1-1. 1 Date & Time
SelectConfiguration >Date & Time > Setting. There are three methods you are able to set up,
Timezone and time and Network Time Retrieval.
Method 1: Synchronize to the local computer.
Time Zone: Select your country time zone.
Time: Select the local time.
Date: Select the local date.
Click on.
Method 2: The date and time settings can be configured by either synchronizing to an Internet
Network Time Server.
Select Enabled in Network Time Retrieval.
Selected Time Server: Select your country time server.
Network Time Protocol
24
Chapter 1:Configuration
Click. Click on to check time log information, and it keeps within three days log
information.
Click on.
Method 3: This might be necessary if you are running a setup that does not allow ShareTech to
reach the internet.
Select Enabled in Network Time Retrieval.
User Defined Time Server: Enter a time server you know.
Click on. Click on to check time log information, and it keeps within three days
log information.
Click on.
25
Chapter 1:Configuration
1-2 Administration
This section mainly explains the authorization settings for accessing. It covers the subjects of
Administrator Setup, System Setup, Manage IP Address, Clear Data, and SMTP Server Setting. In this
The default account and password are both "admin." IT administrator can create several
sub-administrators with different permission and menu customization. In addition, default "admin"
is permitted using all privileges and all menus, such as the privileges of packets that pass through
the equipment and monitoring controls. "Admin"(system manager) can manage monitor and
configure setting of functions. For some sub-administrations (account) are set "Read," it is
"read-only" for that account that is not able to change any setting of the machine. (Figure 1-2.1)
Account: Enter account name.
Password: The password for authentication.
Password Strength:
Confirm Password: The confirmation of password
Notes: Easy to know who is it.
Privilege: Sub-administrators can be granted with Read, Write, or All Privileges to determine the
right of system. Besides, sub-administrators can be created, edited or deleted.
User Defined Menu: IT administrator could customize MENU by selecting.(Figure 1-2.1)
26
Chapter 1:Configuration
Figure 1-2. 1 User Defined Menu
Select Configuration >Administration > System. This function shows view of the screen and system
default setting.
General Setting: (Figure 1-2.2)
Login Message: Enter a name, and then click on. The name you enter will be showed when
you login. (Figure 1-2.3)
Homepage Message: Enter a name, and then click on. The name you enter will be showed
next to the logo picture. (Figure 1-2.4)
Browser Message: Enter a name, and then click on. The name you enter will be showed on
the top of browser.(Figure 1-2.5)
Upload Logo: Click on to upload resolution of 150x90 gif figure file, and then click
on. The image will automatically appear in the upper left corner of the screen.(Figure 1-2.6)
Memory Release: How often check memory when memory usage up to what you set %. System
will release memory if it has high memory. (Please see memory status in Homepage
Information.)
Pass-Through Protocol: System supports H-323 and SIP.
Session timeout of established:
WatchDog timer: When the system is crashed, watchdog will immediately restart the system.
27
Chapter 1:Configuration
Figure 1-2. 2 System Setup
Figure 1-2. 3 Login Message
Figure 1-2. 4 Homepage Message
28
Chapter 1:Configuration
Figure 1-2. 5 Browser Message
Figure 1-2. 6 Upload Logo
29
Chapter 1:Configuration
Login Failure Block Settings: (Figure 1-2.7)
Temporarily block when login failed more than:
IP blocking period:
Unblocked IP: (Figure 1-2.9)
Figure 1-2. 7 Login failure block Settings
Here is an example: enter wrong username and password more than five times, and browser
shows the following figure. (Figure 1-2.8) (Figure 1-2.9) (Figure 1-2.10)
Figure 1-2. 8 someone login fail more than 5 times
Figure 1-2. 9 IP blocking list
Figure 1-2. 10 IP blocking list and unblock it
30
Chapter 1:Configuration
Reset/Reboot Setting:
Reset to Default Setting: If you need keep LAN, WAN and DMZ IP setting or you need to format
hard disk, please select what you need. If you do not select, it means that you just want to reset
to default setting.
Reset to MyCloud Default Setting: Delete all settings and logs to be default setting.
Reboot System: Click on for reboot system.
Figure 1-2. 11 Reset/Reboot Setting
Select Configuration >Administration > Fsck Hard Disk. (Figure 1-2.12)
As implied by its name, fsck is used to check and optionally repair one or more Linux file systems.
This tool is important for maintaining data integrity, especially after an unforeseen reboot (crash,
power-outage). At some point your system unusualcrash, improperly shut-down, or be struck by
lightning, we advise you must using fsck
in order to repair of your file system. Normally,
the fsck program will try to handle file systems on different physical disk drives in parallel to reduce
the total amount of time needed to check all of the file systems.
Scheduling conditions are match, the system will reboot!
Figure 1-2. 12 Fsck Hard Disk
31
Chapter 1:Configuration
If don’t set up any IP address here (Figure 1-2.13), system would follow Network >Network > IP
Address > Ports what you set up. (Figure 1-2.14) (Figure 1-2.15)
Figure 1-2. 13 Administrator Management
Figure 1-2. 14 Port 1 Administrator Management
32
Chapter 1:Configuration
Figure 1-2. 15 Port 2 Administrator
Here is an example:
Please note Action should ne “Allow all of the Following.”
Click on to create a new IP and Netmask for Interface management. (Figure 1-2.17)
Figure 1-2. 16 IP Address
Then, others which are not among the IP range don’t have permission to access the server even
if server works fine. (Figure 1-2.18)
Figure 1-2. 17 You don’t have permission to access this server
Customize: Default is Admin if you don’t enable it.
Sender Name: Enter email address
Mail Server IP Address: Enter SMTP server address or domain
Account: Enter account
Password: Enter right password of account.
Authentication: Please select if your SMTP server of mail server has been enabled it.
34
Chapter 1:Configuration
TLS: The TLS protocol allows client-server applications to communicate across a network in a way
designed to prevent eavesDropping and tampering.
Delivery Domain Name: If Delivery Domain Name is the same with the domain of receiver, the
email will be sent from this SMTP setting; if not, the email will be sent from the first SMTP
setting.
Figure 1-2. 20 Add SMTP Server
Figure 1-2. 21 SMTP Server List
Figure 1-2. 22 SMTP Test Mail
35
Chapter 1:Configuration
If users got email as blow, your setting is correct, or else, user has to check users’ SMTP server
setting again.(Figure 1-2.24)
Figure 1-2. 23 Got SMTP TEST Email
36
Chapter 1:Configuration
1-3 System
In the System section you can enable the following lists:
Select Configuration >System > System Backup, you will see two parts, System Backup and System
Recovery. (Figure 1-3.1)
Clear Data: System Backup: Click on, and then please wait a minute. You will see another
window. Click on, and do not forget where you save file.
System Recovery: If you feel system is stranger than last week, you are able to download backup
file on Configuration >System > Schedule Backup, and click on, and then select the file.
After you select the file, please click on.
Figure 1-3. 1 System Backup
Select Configuration >System > Schedule Backup. There are two methods. (Figure 1-3.2)
Method 1:
Starting: Select Starting to turn machine on.
When to Backup: Set information to When to Backup
Backup Reserved Quantities: Fill out number in the Field. The number should be a positive
number in Backup Reserved Quantities field.
Click on.
Method 2:
Backup Right Now: Click on, the data will show below of the screen.
37
Chapter 1:Configuration
Figure 1-3. 2 Auto Backup
Figure 1-3. 3 Backup Logs
38
Chapter 1:Configuration
Figure 1-3. 4 Backup Download
Figure 1-3. 5 Firmware Message
Select Configuration >System > Firmware Upgrade, you will see two parts, Software Upgrade and
Upgrade Record. (Figure 1-3.6)
Firmware Upgrade: You could know information about server model and current Firmware
Version. Besides, ShareTech offer Software Upgrade file constantly on the ShareTech website.
Therefore, you could follow the link below to download the most new one on the Internet.
http://www.sharetech.com.tw/web_eng/contact-download.htm. After download it, click on
to find out the file where you have just download. Then, remember to click on.
Upgrade Log: It shows all of upgrade information you had even done before.
Date: Set date and time.
Event: Set information what you want to search.
Recipient: The mail receiver
Record / Page: Select how many data would be shown on the screen.
After you click on, you will see the result below of the screen.
Click on to see logs. (Figure 1-6.5)
Figure 1-6. 4 Notification Log
Figure 1-6. 5 content of Notification Log
44
Chapter 1:Configuration
1-7 Backup & Mount
Some of IT administrators are afraid of the hard disk which is belonging to SG-100N broken; even
through IT administrators do backup system usually or users forget where those files location are.
Otherwise, users are also afraid of the device doesn’t have enough free space to store those files.
Therefore, users would like this function because system has schedule to do data backup
automatically.
Select Configuration >Backup & Mount > Data Backup
Backup Destination
Backup Method: Samba only
IP address: Enter an IP address.
Folder Name: Enter a Folder Name you like.
Please create this Folder Name in C: and share it before you set up this
Username: Enter user’s computer name.
Password: The password for user own computer authentication.
Confirm Password: The confirmation of password.
Click on in order to check whether settings are right or not. (Figure 1-7.1)
Figure 1-7. 1 Backup & Mount
45
Chapter 1:Configuration
Backup Setting
Scheduled Backup: Select when does the system backup data?
Send Backup Result Notification: User has to go to Configuration >Notification > Notification to
set your information first. Then, you will get mail after system backup successfully. (Figure 1-7.3)
Figure 1-7. 2 Send Backup Result Notification
Click on you will see the information as below. (Figure 1-7.4) (Figure 1-7.\53)
Figure 1-7. 3 Backup Now
Figure 1-7. 4 backup completed
Backup Item: Flow Analysis (Figure 1-7.6)
Figure 1-7. 5 Backup Item
46
Chapter 1:Configuration
If you want to see previous contents, but you have ever reset machine to default setting or have
ever Clear Data, for these reasons, there are no data contents in this machine hardisk. Fortunately,
you have ever use Backup & Mount application to backup contents to another server or computer.
Then, you can mount these contents to search Content Record items.
First please click on, you will see data items that you have ever backup.
(Figure 1-7.7)
Figure 1-7. 6 Data Mount
Click on(Figure 1-7.8)
User is able to click on
(Figure 1-7.9)
Figure 1-7. 8 Unmount Remote Data
Figure 1-7. 7 Mount Remote Data
if user does not these contents for searching in needed.
Http Port Setting: allow Http when you enabled it
Https Port Setting: allow Https when you enabled it
Restart MyCloud service
Restart MyCloud service:
Reset MyCloud admin password
Reset MyCloud admin password: enter a password for admin
Default password is "admin"
Figure 1-12. 2 MyCloud Setting
You are able to login MyCloud as the following steps:
1. Administrator can click on to login MyCloud system. (Figure 1-12.3)
Figure 1-12. 3 Menu Bar
60
Chapter 1:Configuration
2. Or open the browser; enter Port 1, or Port 2 IP in the address bar. (Figure 1-12.4)
Default username / Password: admin/ admin
Figure 1-12. 4 enter IP to login My cloud
Login completed (Figure 1-12.5)
Figure 1-12. 5 MyCloud Homepage Information
61
Chapter 1:Configuration
Personal
Password: set up Adminisrtator’s password (Figure 1-12.6)
Full Name: set up Adminisrtator’s username (Figure 1-12.6)
Language: Choose your native language (Figure 1-12.6)
Figure 1-12. 6 Password, Full Name, and Language
62
Chapter 1:Configuration
Users
Shows every group and its members
Members who are in Group (admin) have high permission to manage settings.(Figure 1-12.7)
Figure 1-12. 7 High Permission to manage settings.
63
Chapter 1:Configuration
Add a New Group(Figure 1-12.8)
Figure 1-12. 8 Add a new GroupAdd a new member into the group. (Figure 1-12.8)
Add a New member into a group (Figure 1-12.9)
Figure 1-12. 9 Add a new member
64
Chapter 1:Configuration
Set up users’ Quota (Figure 1-12.10)
Default Quota: unlimited
Figure 1-12. 10 Set Up user’s Quota
A member is able to be with more than a group (Figure 1-12.11)
Figure 1-12. 11 a member within two groups
65
Chapter 1:Configuration
Group Admin: group leader (Figure 1-12.11) Others are its’ members.
Figure 1-12. 12 Group admin
Admin
HDD usage: it shows total HDD usage (Figure 1-12.13)
Depend on your HDD usage. Default is 320G
Figure 1-12. 13 HDD usage
File handling (Figure 1-12.14)
maximum Upload possible: 2 GB
Figure 1-12. 14 File handling
66
Chapter 1:Configuration
Remote Shares
Allow other instances to mount public links shared from this server
Allow users to mount public link shares
Upload Logo
Login Logo (Figure 1-12.15)
Logined Logo(Figure 1-12.16)
Figure 1-12. 15 Login Logo
Figure 1-12. 16 Logined Logo
67
Chapter 1:Configuration
Share Link Logo(Figure 1-12.17)
When you copy your file link and share it with your friends, your friends will
Figure 1-12. 17 Copy Link
Your friends will open the browser; enter share link in the address bar, (Figure 1-12.18) will see this
logo which you uploaded
Figure 1-12. 18 Share Link Logo
68
Chapter 1:Configuration
Page icon (Figure 1-12.19)
Figure 1-12. 19 Page icon
Page icon(iPad, iPhone)
Background Color (Figure 1-12.20)
Figure 1-12. 20 Background Color
Login BackGround: Default is #5ED8EE and #17A4BE
Example: #E9EE5E #BE1717(Figure 1-12.21)
Figure 1-12. 21 Login BackGround
69
Chapter 1:Configuration
Logined Logo BackGround: default #31B5CD
Example: #4B31CD(Figure 1-12.22)
Figure 1-12. 22 Logined logo BackGround
Upload User Manual
Upload User Manual: upload a file which guide user how to use their cloud files. (Figure 1-12.24)
File extension: pdf, and only one file existed (Figure 1-12.23)
Figure 1-12. 23 Uploaded User Manual
Figure 1-12. 24 I User Manual
70
Chapter 1:Configuration
User List (Figure 1-12.25)
Enable User List: every users has permission to see each other
Members who are in Admin Group have high to manage settings. Default: disable
Sharing
Allow apps to use the Share API
Allow users to share via link
In the Interface section you can enable the following lists:
Select Network >Interface> Port 1.
LAN Interface Setting: (Figure 2-1.1)
Name: Enter any words for recognition.
Interface Name: eth0
IP Address: Enter an IP address.
Up Speed: Define a suitable Max. Upstream bandwidth for each for them in order that the device
may use it as a basis for operating
MAC Address: Enter a MAC Address.
Speed and Duplex Mode: Usually, it sets on Auto. You also can select another setting.
Interface Type: LAN
Enable: NAT mode only because it without bypass
Netmask: Enter a Netmask.
Down Speed: Define a suitable Max. Downstream bandwidth for each for them in order that the
device may use it as a basis for operating.
MTU: Nearly all IP over Ethernet implementations use the Ethernet V2 frame format.
Click on.
Figure 2-1. 1 Port1 (LAN) Setting
Table of MTUs of common media
Note: the MTUs in this section are given as the maximum size of IP packet that can be
transmitted without fragmentation - including IP headers but excluding headers from lower
levels in the protocol stack. The MTU must not be confused with the minimumdatagramsize
81
Chapter 2:Network
Media
Maximum Transmission Unit
(Bytes)
Notes
Internet IPv4 Path MTU
At Least 68
Practical path MTUs are generally higher.
IPv4 links must be able to forward packets
of size up to 68 bytes. Systems may
use Path MTU Discovery to find the actual
path MTU. This should not be mistaken
with the packet size every host must be
able to handle, which is 576.
Internet IPv6 Path MTU
At least 1280
Practical path MTUs are generally higher.
Systems must use Path MTU Discovery to
find the actual path MTU.
Ethernet v2
1500
Nearly all IP over Ethernet implementations
use the Ethernet V2 frame format.
Ethernet with LLC and
SNAP, PPPoE
1492
Ethernet Jumbo Frames
1500-9000
The limit varies by vendor. For correct
interoperation, the whole Ethernet network
must have the same MTU. Jumbo frames
are usually only seen in special purpose
networks.
WLAN (802.11)
7981
Token Ring (802.5)
4464
FDDI
4352
that all hosts must be prepared to accept, which has a value of 576 for IPv4and of 1280 for
IPv6.
82
Chapter 2:Network
2
2
ARP Spoofing Prevention: (Figure 2-1.1)
Figure 2-1. 2 ARP Spoofing Prevention
What Is ARP Spoofing
?
ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address
Resolution Protocol) messages over a local area network. This results in the linking of an
attacker’s MAC address with the IP address of a legitimate computer or server on the
network. Once the attacker’s MAC address is connected to an authentic IP address, the
attacker will begin receiving any data that is intended for that IP address. ARP spoofing can
enable malicious parties to intercept, modify or even stop data in-transit. ARP spoofing
attacks can only occur on local area networks that utilize the Address Resolution Protocol.
Administrator Management
There are three multiple-choice modes, ping, HTTP, and HTTPS.
Ping: The network can be detected by Ping commands when ticked.
HTTP: The management interface is available for access via HTTP protocol when ticked.
HTTPS: The management interface is available for access via HTTPS protocol when ticked.
Administrator is able to login via Port 1’s HTTPS and ping Port 1’s IP. (Figure 2-1.3)
Figure 2-1. 3 Administrator Management
Multiple Subnet: (Figure 2-1.4)
Name: Enter any word for recognition.
IP Address: The multiple Subnet range of IP addresses.
Interface: LAN only because it without bypass
Bind: it depends on your network condition.
Netmask: Enter Netmask
WAN Interface IP Address / Operation Mode Setting: The WAN IP addresses that the subnet
corresponds to WAN.
Forwarding Mode:Allows the internal network to accommodate multiple subnets and enables
Internet access through various external IP addresses. It displays using modes of WAN interface
Network segment is the same as LAN IP range, so please disable "Bind."
Figure 2-1. 4 set up Engineering Department multiple subnet
Network segment is not within LAN IP range, so please enable "Bind."
Figure 2-1. 5 set up Marketing Department multiple subnet
84
Chapter 2:Network
Completed
Figure 2-1. 6 Multiple Subnet
The IT administrator must renew his / her own PC’s IP address upon using a DHCP server. It is
to assure the access validity of the management interface after the change of LAN interface IP
address. To renew the IP address distributed by a DHCP server, you may simply follow two
steps:
Step 1. Reboot computer.
Step 2. Enter "cmd" in the Run window, and enter "ipconfig /release," and then enter
"ipconfig /renew," the IP address is successfully retrieved.
There is another example to show whether should be bind or not. (Figure 2-1.7)
Figure 2-1. 7 Bind selection
85
Chapter 2:Network
Select Network >Interface> Port 2. (Figure 2-1.8)
Interface Name: Enter any word for recognition.
Interface Name: eth1
IP Address: Depend on the Connection Method. DHCP and PPPoE mode do not need to set IP
address. Only Static mode needs to setup IP address.
Default Gateway: Depend on the Connection Method. DHCP and PPPoE mode do not need to set
Default Gateway. Only Static mode needs to setup Default Gateway.
Up Speed (Max. 1000Mbps): The IT administrator must define a proper bandwidth for each of
them in order that the device may use it as a basis for operating. The Kbps is a unit of Speed. You
can click on Custom Define link to set your speed according to ISP’s WAN Speed.
Speed and Duplex Mode: Usually, it sets on Auto. You also can select another setting.
Load Balancing: It offers four methods.
1. Auto: Distributes the outward sessions by the usage status of each WAN port.
2. By Source IP: For services that require using the same IP address throughout the process,
such as online game and banking, ShareTech UR helps user retain the same WAN port (i.e.
IP address) over which the session was created to avoid disconnection caused by the
variation of the user’s IP address.
3. Manual: According administrator demand to share loading on the WAN.
4. By Destination IP: Once a session is created between the ShareTech SG-100N and a specific
host, then the following sessions linking to that host will be automatically distributed to the
same WAN port.
Interface Type: WAN
Connection Method:There are three Connection methods.
1. Static: Static IP address
2. DHCP: Using DHCP to get IP address from ISP
3. PPPoE: PPPoE
Netmask: Enter a Netmask. Default setting is 255.255.255.0
MAC address: Enter a MAC Address.
Down Speed: The IT administrator must define a proper bandwidth for each of them in order
that the device may use it as a basis for operating. The Kbps is a unit of Speed. You can click on
Custom Define link to set your speed according to ISP’s WAN Speed.
MTU: Nearly all IP over Ethernet implementations use the Ethernet V2 frame format.
Click on.
86
Chapter 2:Network
Figure 2-1. 8 WAN 1 Setting
WAN Alive Detection (Figure 2-1.9)
Detection Method: Using DNS, ICMP or NONE to check WAN is on or off. Both DNS and ICMP
need to setup IP address for test. In addition, you can click on to see more detail Logs.
1. DNS: Tests the validity of Internet connection by requesting the domain name.
2. ICMP: Uses ping command to test the validity of Internet connection.
3. NONE: Line is not detected; the connection status is always on line.
Administrator Management: There are three multiple-choice modes, ping, HTTP, and HTTPS.
1. Ping: The network can be detected by Ping commands when ticked.
2. HTTP: The management interface is available for access via HTTP protocol when ticked.
3. HTTPS: The management interface is available for access via HTTPS protocol when ticked.
Firewall Protect Items: There are four multiple-choice, SYN, ICMP, UDP, and Port Scan. It offers
currently available protection. In addition, you can click on to see more detail Logs.
Figure 2-1. 10 Port 2 Firewall Protection
87
Chapter 2:Network
You are able to see attack logs which through Port2 of SG-100N machine on Objects >Firewall
Protection > Attack Log. (Figure 2-1.11)
Figure 2-1. 11 Firewall Protection Port Scan
General Setting (Figure 2-1.12)
DNS Server 1: The IP address of the DNS server used for the bulk of DNS lookups.
For example: Google DNS are 8.8.8.8 and 8.8.4.4
HTTP Port: HTTP port number for manage.
Default: 80
WAN Alive Detection Period: System administrators can enter the system every interval of
time to do much testing, unit calculated in seconds.
Default: 5 second
DNS Server 2: The IP address of the backup DNS server, used when the Primary DNS Server is
unreachable.
HTTPS Port: HTTPS port number for manage.
Default: 443
Idle Timeout: The device may be configured to automatically disconnect when idle for a period
of time upon using PPPoE connection.
Default: 60 minutes
Figure 2-1. 12 Port 2 General Setting
Please note that Interface Type depend on what you set up on Network >Interface > Interface
Config (Figure 2-1.13) (Figure 2-1.14)
88
Chapter 2:Network
Figure 2-1. 13 Interface Config
Figure 2-1. 14 Port 3 setting
Please note that Interface Type depend on what you set up on Network >Interface > Interface
Config
For example: Configure the IP address and subnet mask of your demilitarized zone (DMZ) here.
Select Network >Interface > Port4.(Figure 2-1.15)
Name: Enter any word for recognition.
Interface Name: eth3
IP Address: Enter an IP address.
Up Speed: The IT administrator must define a proper bandwidth for each of them in order that
the device may use it as a basis for operating. The Kbps is a unit of Speed.
MAC Address: Enter a MAC address.
Speed and Duplex Mode: Usually, it sets on Auto. You also can select another setting.
Interface Type: DMZ
Enable: It offers three modes.
1. NAT: In this mode, the DMZ acts an independent subnet from the LAN, from which the IT
administrator may configure.
2. OFF: It means Disable.
89
Chapter 2:Network
3. Transparent Bridging: A mode that allows a SG-100N (firewall, router, switch) to be
inserted into an existing network without the need for IP reconfiguration similar with the
Transparent Mode but providing more transparency(the firewall acts as a Layer 2 bridge)
and versatile functionality. An optional mode of L2 Bridge which prevents traffic that has
entered an L2 bridge from being forwarded to a non-Bridge-Pair interface, ensuring that
traffic which enters an L2 Bridge exits the L2 Bridge rather than taking its most logically
optimal path.
4. Transparent Routing: A mode that allows a SG-100N (firewall, router, switch) to be
inserted into an existing network without the need for IP reconfiguration by spanning a
single IP subnet across two or more interfaces.
Netmask: Enter a Netmask.
Down Speed: The IT administrator must define a proper bandwidth for each of them in order
that the device may use it as a basis for operating. The Kbps is a unit of Speed.
MTU: Nearly all IP over Ethernet implementations use the Ethernet V2 frame format.
Click on after you finish setting.
Figure 2-1. 15 Port 3 Setting
What’s the difference between DMZ (Transparent Routing) and DMZ (Transparent Bridge)?
In the past, most of SG-100N supports NAT and Transparent mode usually in order to satisfy
customers with different network framework requirement. DMZ is an independent virtual
(internal) network within NAT mode. If some enterprise doesn’t have enough public IP, they
would like to use Port Mapping or IP Mapping, and make DMZ Internal IP to be a WAN public
IP in order to make Internet service work fine. On the other hand, transparent mode means
routing mode, so that DMZ should be Public (real) IP.
90
Chapter 2:Network
Fortunately, ShareTech research and development team creates and improves multi-features
constantly. After the firmware 7.1.3, ShareTech DMZ port supports three flexible modes: NAT,
Transparent Routing, and Transparent Bridge. We better know what the difference between
NAT and Transparent mode from the first paragraph is. Therefore, that’s go onto see what’s
the difference between Transparent Routing and Transparent Bridge
1. Transparent Routing: (Figure 2-1.16)
When DMZ packets pass through ShareTech SG-100N, system follows routing table rule and
then deliver packets to their destination.
Network Environment: When enterprise has more than two WANs, and must do load
balance necessarily. System follows the WAN load balance rule and divide packets which
from DMZ among each WAN Port.
Figure 2-1. 16 Transparent Routing
91
Chapter 2:Network
2. Transparent Bridge: (Figure 2-1.17)
System doesn’t follow routing table rule to deliver packets to their destination, and
delivery destination based on MAC. Therefore, the operation is similar to Switch.
Network Environment: When enterprise only has one WAN or only allow DMZ packets
must go pass static WAN.
Even though Transparent Bridge cannot support load balance, however, sometimes it’s
very practical method and conscientious. Please see the following figure, if we put
gateway in front of SG-100N, and then gateway bind DMZ’s IP and MAC. So, as we know
the packets is allowed pass out if having the same IP and MAC. On the other hand, the
packets will be block if it’s with Transparent Routing mode, because gateway just analyze
DMZ IP but bind WAN port MAC. (Figure 2-1.17) (Figure 2-1.18)
Figure 2-1. 17 Transparent Bridge
92
Chapter 2:Network
Compare Transparent Routing with Transparent Bridge
Figure 2-1. 19 Compare Transparent Routing with Transparent Bridge
93
Chapter 2:Network
It’s an optional item. If you never purchase WiFi on Configuration >Package, you will not see
this (Figure 2-1.20) Please enable one of SSID.
Figure 2-1. 20 WiFi
Custom Port (Fixed LAN & WAN1) (Figure 2-1.21)
Please note systme will reboot after modify
Figure 2-1. 21 Custom Port
94
Chapter 2:Network
2-2 Interface (IPv6)
IPv4 is not enough anymore until 2021, and previously technical administrators are used to rely on
IPv4 with NAT mode. As for now, IPv6 which offer more flexible for distributing IP address and
routing table turn up. Compared to IPv4, the most obvious advantage of IPv6 is its larger address
space. IPv4 addresses are 32 bits long and number about 4.3 × 10 9 (4.3 billion ). IPv6 addresses are
128 bits long and number about 3.4 × 10 38 (340 Undecillion).
IPv6 Auto Configuration is a new concept with IPv6. It gives an intermediate alternative
between a purely manual configuration and stateful auto configuration.
Select Network >Interface (IPv6) > Port 1(Figure 2-2.1)
IPV6 LAN (eth0) IP: Enter IPv6 address.
IPv6 Auto Configuration: It’s like IPv4 DHCP. It automatically distributes IPv6 address to among
LAN internal users.
The following is LAN IPv6 figure
Figure 2-2. 1 Port 1 IPv6
Select Network >Interface (IPv6) > Port 2
IPv6 model: you are able to choose static, Tunnel, or PPPoE IPv6 ways. (Figure 2-2.2)
The following is WAN1 IPv6 figure
Figure 2-2. 2 Port 2 IPv6
95
Chapter 2:Network
Select Network >Interface (IPv6) > Port 3. (Figure 2-2.3)
Please note that Interface Type depend on what you set up on Network >Interface > Interface
Config. (Figure 2-1.9)
The following is WAN2 IPv6 figure, so you are able to choose static, Tunnel, or PPPoE IPv6
ways.
Figure 2-2. 3 Port 3IPv6
Select Network >Interface (IPv6) > Port 4. (Figure 2-2.4)
Please note that Interface Type depend on what you set up on Network >Interface > Interface
Config. (Figure 2-1.9)
The following is DMZ IPv6 figure, so please enter DMZ’s IPv6 address.
Figure 2-2. 4 Port 4 IPv6
96
Chapter 2:Network
The current IETF recommendation is to use AAAA (Quad A) RR for forward mapping and PTR RRs for
reverse mapping when defining IPv6 networks. (Figure 2-2.5)
The Google Public DNS IPv6 addresses are as follows:
2001:4860:4860::8888
2001:4860:4860::8844
Figure 2-2. 5 DNS IPv6
97
Chapter 2:Network
2-3 Routing
Routing tables contain a list of IP addresses. Each IP address identifies a remote router (or other
network gateway) that the local router is configured to recognize. For each IP address, the routing
table additionally stores a network mask and other data that specifies the destination IP address
ranges that remote device will accept. In the Routing section you can enable the following lists:
Static routing is simply the process of manually entering routes into a device's routing table via a
configuration file that is loaded when the routing device starts up. As an alternative,
these routes can be entered by a network administrator who configures the routes manually. Since
these manually configured routes don't change after they are configured (unless a human changes
them) they are called 'static' routes.
Select Network >Routing > Routing Table. Click on to create a new routing table. (Figure 2-3.1)
Comment: Enter any words for recognition.
Destination IP: The IP address of the packet's final destination.
Netmask: Enter Netmask
Gateway: Enter Gateway
Interface: Select your internal interface.(The outgoing network interface the device should use
when forwarding the packet to the next hop or final destination)
Figure 2-3. 1 Routing Table
For exemple : A leased line connects Company A’s Router 1 (10.10.10.1) with Company B’s
Router 2 (10.10.10.2)
Company A : Connect WAN port 1 (61.11.11.11) to ATUR; Connect WAN port 2 (211.22.22.22)
to ATUR; LAN subnet ranges 192.168.1.1/24;The LAN subnet that Router 1 (10.10.10.1, RIPv2
supported) connected to ranges from 192.168.10.1/24.
Company B: The LAN subnet that Router 2 (10.10.10.2, RIPv2 supported) connected to ranges
from 192.168.20.1/24.
98
Chapter 2:Network
Setting Routing Table completed. The network subnets of 192.168.20.1/24 and 192.168.1.1/24
now not only communicate with each other, but as well use NAT mode to access the Internet. In
addition, select Mark tick box, and click on to create a new sub-content, to
modify contents, or to cancel list. (Figure 2-3.2)
Figure 2-3. 2 Routing Table List
Two hypothetical, partial routing table entries are shown below:
IP Address: 172.48.11.181 - Network Mask: 255.255.255.255
IP Address: 192.168.1.1 - Network Mask: 255.255.255.0
In this example, the first entry represents the route to the ISP's primary DNS server. Requests
made from the home network to any destination on the Internet will be sent to the IP address
172.48.11.181 for forwarding. The second entry represents the route between any computers
within the home network, where the home router has IP address 192.168.1.1.
A router using dynamic routing will 'learn' the routes to all networks that are directly connected to
the device. Next, the router will learn routes from other routers that run the same routing
protocol (RIP, RIP2, etc.). Each router will then sort through its list of routes and select one or more
'best' routes for each network destination the router knows or has learned.
Select Network >Routing > Dynamic routing. Select interface(s) and click on
Figure 2-3. 3 Dynamic routing Table
(Figure 2-3.3)
Viewing the Contents of Routing Tables, please select Tools >Connection Test > IP Route. (Figure
2-3.4)
Figure 2-3. 4 IP Route
99
Chapter 2:Network
On Windows and Unix/Linux computers, the netstat -r command also displays the contents of
the routing table configured on the local computer.
IPV6 Routing Table setting way is the same as Routing Table section. (Figure 2-3.5)
Figure 2-3. 5 IPV6 Routing Table
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.