Billion 7202 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Billion 7202 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Billion 7202, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Billion 7202 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Billion 7202. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Billion 7202 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Billion 7202
- Den Namen des Produzenten und das Produktionsjahr des Geräts Billion 7202
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Billion 7202
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Billion 7202 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Billion 7202 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Billion finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Billion 7202 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Billion 7202, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Billion 7202 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    myGuard 7202 / 7202G (Wireless-G) Security ADSL2+ Router User ’ s Manual[...]

  • Seite 2

    Chapter 1 ................................................................................................. 1 1.1 Introducing the myGuard 7202(G) ....................................................... 1 1.2 Features ................................................................................................. 3 1.3 Applications of the myGuard 7[...]

  • Seite 3

    Chapter 1 Introduction 1.1 Introducing the myGuard 7202(G) Thank you for purchasing the myG uard 7202(G) ADSL Router by Bi llion. Y our new router is an all-in-one unit that combines an ADSL m odem, ADSL router and Et hernet network switch to provide everything you need to get the machines on your network connected to the Internet over an ADSL broa[...]

  • Seite 4

    addresses making them invisible to outside users on the Internet, so it is much more dif ficult for a hacker to target a machine on your network . Second, it can block and redirect cert ain ports to limit the services that out side users can access. T o ensure that games and other Internet applications run properly , you can open specific ports for[...]

  • Seite 5

    1.2 Features Express Internet Access – ADSL2/2+ cap able The myGuard 7202(G) complies with ADSL worldwide standards. Supporting downstream rates of 8Mbps with ADSL, the myGuard rout er is capable of up to 12/24 Mbps with ADSL2/2+, and upstream rates of up to 1 Mb ps. Users enjoy not only high-speed ADSL services but also broadband multimedia appl[...]

  • Seite 6

    and PCs from many different vendors, and it makes setting up a network simple and affordable. UPnP architecture leverages TCP/IP and the Web to enable proximity networking in addition to control and data transfer among networked devices. With this feature enabled, you can seamlessly connec t to Net Meeting or MSN Messenger. Network Address T ransla[...]

  • Seite 7

    V irtual Server: You can specify which services are visible to outside users. The myGuar d router detects an incoming service request and forwards it to t he specific local computer for handling. For example, you can assign a PC in a LAN to ac t as a Web server inside and expose it to the outside network. Outside users can browse insi de the web se[...]

  • Seite 8

    1.3 Applications of the myGuard 7202(G) 6[...]

  • Seite 9

    Chapter 2 Product Overview 2.1 Import ant Notes War n in g  Do not open or repair the case yourself. If the myGuard 7202(G) is too hot, turn off the power immediately and have it repaired at a qualified service center .  Avoid using this product and all accessories out doors.  Do not use the myGuard 7202(G) in high humidity or high tempera[...]

  • Seite 10

    2.3 The Front LEDs myGuard 7202 myGuard 7202G LED Description 1 PPP : Steady glow when there is a PPPoA / PPPoE connection. 2 ADSL: Lights when successfully connected to an ADSL DSLAM (linesync). 3 LAN Port 1-4: Steady glow when connected to an Ethernet device. Glows green for 100Mbps; Orange for 10Mbps. Blinking light when data is Transmitted / Re[...]

  • Seite 11

    2.4The Rear Port s myGuard 7202 3 4 1 2 myGuard 7202G 4 3 5 1 2 Port Description 1 PWR Connect the supplied power adapter to this jack. 2 RESET After the myGuard router is powered on, press this recessed button using the end of paper clip or other small pointed object to reset the router or to restore it to factory default settings. 1. Recovery pro[...]

  • Seite 12

    password will be reset to admin , and the modem will be accessible via its default IP address at http://192.168.1.254/ 3 LAN Connect a UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an of fice/home network of 10Mbps or 100Mbp s. 4 ADSL Connect the supplied RJ-1 1 (tele phone) cable to this port when con[...]

  • Seite 13

    2.5 Cabling One of the most common causes of problems is bad cabling or ADSL line(s). Make sure that all connected devices are turned on. On the front of the product is a bank of LEDs. V erify that the LAN Link and ADSL line LEDs are lit. If they are not, verify th at you are using the proper cables. Ensure that all other devices connected to the s[...]

  • Seite 14

    Chapter 3 Installation Y ou can configure the myGuar d 7202(G) router through the convenient and user-friendly interface of a web browser . Most popular operating systems such as Linux and Windows 98/NT/2000/XP/Me include a web brow ser as a standard application. 3.1 Before Configuration PCs must have a properly install ed Ethernet interface and co[...]

  • Seite 15

    Configuring a PC in Windows XP 1. Go to Start / Control Panel (in Classic View) . In the Control Panel, double-click on Network Connections 2. Double-click Local Area Connection . 3. In the Local Area Connection Status window, click Properties . 4. Select Internet Protocol (TCP/IP) and click Properties . 5. Select the Obtain an IP address automatic[...]

  • Seite 16

    Configuring a PC in Windows 2000 1. Go to Start / Settings / Control Panel . In the Control Panel, double-click on Network and Dial-up Connections . 2. Double-click Local Area Connection . 3. In the Local Area Connection Status window click Properties . 4. Select Internet Protocol (TCP/IP) and click Properties . 5. Select the Obtain an IP address a[...]

  • Seite 17

    Configuring PC in Windows 98/Me 1. Go to Start / Settings / Control Panel . In the Control Panel, double-click on Network and choose the Configuration tab. 2. Select TCP/IP ->NE2000 Compatible , or the name of your Network Interface Card (NIC) in your PC. 3. Select the Obtain an IP address automatically radio button. 4. Then select the DNS Confi[...]

  • Seite 18

    Configuring PC in Windows NT4.0 1. Go to Start / Settings / Control Panel . In the Control Panel, double-click on Network and choose the Protocols tab. 2. Select TCP/IP Protocol and click Properties . 3. Select the Obtain an IP address from a DHCP server radio button and click OK . 16[...]

  • Seite 19

    3.2 Activating T rend Micro Security Services Activate T rend Micro Security Services and receive enhanced protection for your PCs. A vailable Services Before Activation Af ter Activation  Security Scan  V ulnerability reports 60-day evaluation version Unlimited use.  V irus Scan  Personal Firewall  S pyware Protection  Parent al [...]

  • Seite 20

    3.3 Factory Default Settings Before configuring the myGuard 7202(G) rout er , you need to know the following default settings. Web Interface: Username: admin Password: admin LAN Device IP Settings: IP Address: 192.168.1.254 Subnet Mask: 255.255.255.0 ISP setting in W AN site: PPPoE DHCP Server: DHCP server is enabled. S tart IP Address: 192.168.1.1[...]

  • Seite 21

    3.4 LAN and W AN Port Addresses The parameters of LAN and W AN ports are preset at the factory . The default values are shown below . LAN Port W AN Port IP address 192.168.1.254 Subnet Mask 255.255.255.0 DHCP server function Enabled IP addresses for distribution to PCs 100 IP addresses continuing from 192.168.1.100 through 192.168.1.199 The PPPoE f[...]

  • Seite 22

    Chapter 4 Configuration Once you have logged on to yo ur myGuard 7202(G) ADSL Rout er via your web browser , you can begin to set it up according to your requirements. On the c onfiguration homepage, the left navigation p ane links you directly to the setup pages, which include: S t a t u s (ARP T able, Wireless A ssociation, Routing T able, DHCP T[...]

  • Seite 23

    4.1 S tatus 21[...]

  • Seite 24

    Device Information Host Name: Provide a name for the router for i dentification purposes. Host Name lets you change the router name. System Up-T ime: Records system up-time. Current time: Set the current time. See the T ime Zone section for more information. 22[...]

  • Seite 25

    Hardware V ersion: Chipset version Sof tware V ersion: Firmware version LAN MAC Address: The LAN MAC address W AN MAC Address: The W AN MAC address Home URL: Connects to the Home W ebsite. LAN IP Address: LAN port IP address. Sub Net Mask: LAN port IP subnet mask. DHCP Server: LAN port DHCP role - Server , Relay or None. W AN IP W AN: Name of the W[...]

  • Seite 26

    4.1.1 ARP T able The router ’s ARP (Address Resolution Protocol ) T able shows the mappi ng of Internet (IP) addresses to Ethernet (MAC) addr esses. This is a quick way to determine the MAC address of the network interface of your PCs to use with the router ’s Firewall – MAC Address Filter function. See the Firewall section of this manual for[...]

  • Seite 27

    4.1.2 Wireless Association IP Address: It is IP Address of wireless client that join this network. MAC: The MAC address of wireless client. 25[...]

  • Seite 28

    4.1.3 Routing T able Routing T able: #: Item number Destination: IP address of the destination network. Netmask: The destination netmask address. Gateway/Interface: IP address of the gateway or existi ng interface that this route uses. Cost: The cost of transmission for routing pur poses. The number need not be precise, but it must be between 0 and[...]

  • Seite 29

    4.1.4 DHCP T able Leased: DHCP assigned IP addresses information. IP Address: IP addresses of devices on your LAN (Local Area Network). MAC Address: The MAC Address that you want to assign the fixed IP address Client Host Name: Expired IP addresses information Register Time: Register time information 27[...]

  • Seite 30

    4.1.5 System Log Display system logs accumulated up to the pres ent time. Y ou can trace historical information with this function. 28[...]

  • Seite 31

    4.1.6 Security Log This screen displays security log information. If a hacker attacks your server , he is isolated by the firewall function and the router record s related information. This help s you know where the hacker comes from. 29[...]

  • Seite 32

    4.2 Quick S tart For detailed instructions on configuring W AN settings, see the WA N section of this manual. The information you need for the Quick S tart wizard to get you online are your login (often in the form of username@ispname ), your p assword, and the encapsulation type. Y our ISP can supply all the det ails you need. Alte rnatively , if [...]

  • Seite 33

    Connection Encap sulation: Select the encapsulation type your ISP uses or choose “Auto Scan”. Click Star t to begin scanning for encapsulation types offered by your ISP . If the scan is successful, you are presented wit h a list of supported options. VCI: Enter the VCI assigned to you. This field may already be configured. VPI : Enter the VPI a[...]

  • Seite 34

    Optional Setting IP Address: Type your ISP assigned IP address in the IP Address text box. Subnet Mask: Enter a subnet mask in dotted decimal notation. Default Gateway: You must specify a gateway IP address (supplied by your ISP) DNS Obt ain DNS automatically: Select this check box to use DNS. Primary DNS: Enter the IP addresses of the DNS se rvers[...]

  • Seite 35

    4.3 Configuration Click this item to access the following sub- items that configur e the ADSL router: LAN, W AN, System, Firewall, QoS, V irtual Server and Advanced. These functions are described in the following sections. 33[...]

  • Seite 36

    4.3.1 LAN (Local Area Network) 4.3.1 LAN (Local Area Network) A Local Area Network (LAN) is a shared comm unication system to which many computers are attached and is limited to t he immediate area, usually the same building or floor of a building. A Local Area Network (LAN) is a shared comm unication system to which many computers are attached and[...]

  • Seite 37

    4.3.1.2 Wireless Parameters Mode: 802.1 1b + g (Mixed mode), 802.1 1b and 802.1 1g. The factory default is 802.1 1b + g. ESSID: Enter the unique ID given to the Access Poin t (AP), which is already built-in to the router ’s wireless interface. T o connect to this device, your wireless clients must have the same ESSID as the device. Regulation Dom[...]

  • Seite 38

    WDS Service: The default setting is Disable. Check Enable radio button to activate this function. Peer WDS MAC Address: It is the associated AP’s MAC Address. It is important that your peer ’s AP must include your MAC address in order to acknowledge and communicate with each other . ( Note : For MAC Address, Semicolon ( : ) must be included) 4.[...]

  • Seite 39

    WEP WEP Encryption: T o prevent unauthorized wireless stations from accessing data transmitted over the network, the router offers highly secure data encryption, known as WEP . If you require high security for transmissions, t here are two alternativ es to select from: WEP 64 and WEP 128 . WEP 128 will offer increased security over WEP 64. Passphra[...]

  • Seite 40

    T o disable the router ’s DHCP Server , check Disabled and click Next then click Apply . When the DHCP Server is disabled you need to manually assign a fixed IP address to each PC on your network, and set the default gateway fo r each PC to the IP address of the router (the default is 192.168.1.254). T o configure the router ’s DHCP Server , ch[...]

  • Seite 41

    If you check DHCP Relay Agent and click Next then you must enter the IP address of the DHCP server which assigns an IP address back to the DHCP client in the LAN. Use this function only if advised to do so by your network administr ator or ISP . Click Appl y to enable this function. 39[...]

  • Seite 42

    4.3.2 W AN (Wide Area Network) A W AN (Wide Area Network) is an outside connec tion to another network or the Internet. There are three items within the W AN section: ISP , DNS and ADSL. 4.3.2.1 ISP The factory default is PPPoE. If your IS P uses this access protocol, click Edit to input other parameters as below . If your ISP does not use PPPoE, y[...]

  • Seite 43

    NA T: The NA T (Network Address T ranslation) feat ure allows multiple users to access t he Internet through a single IP account, sharing the single IP address. If users on your LAN have public IP addresses and can access the Inte rnet directly , the NA T function can be disabled. Encap sulation method: Select the encapsulation format, the default [...]

  • Seite 44

    NA T: The NA T (Network Address T ranslation) feat ure allows multiple users to access t he Internet through a single IP account, sharing a single IP address. If users on your LAN have public IP addresses and can access the Internet directly , the NA T function can be disabled. Username: Enter the username provided by your ISP . Y ou can input up t[...]

  • Seite 45

    Description: A user-definable name for this connection. VPI/VCI: Enter the information provided by your ISP . NA T: The NA T (Network Address T ranslation) feat ure allows multiple users to access t he Internet through a single ISP account, shari ng a single IP address. If users on your LAN have public IP addresses and can access the Inte rnet dire[...]

  • Seite 46

    and to automatically re-establish the PPPo E session when disconnected by the ISP .  Connect to Demand: If you want to establish a PPPoE session only when there is a packet requesting access to the Internet (i.e. when a program on your computer attempts to access the Internet). Idle Timeout: Auto-disconnect the broadband firewall gat eway when t[...]

  • Seite 47

    4.3.2.2 DNS A Domain Name System (DNS) contains a mapping table for domain name and IP addresses. On the Internet, every host has a unique and user-friendl y name (domain name) such as www .billion.com and an IP address. An IP address is a 32-bit number in the form of xxx.xxx.xxx.xxx , for example 192.168.1.254. Y ou can thin k of an IP address as [...]

  • Seite 48

    4.3.2.3 ADSL ADSL Mode: There are four modes “Open Annex T y pe and Follow DSLAM’s Setting”, ”Annex A Only”, ”Annex L Only” and ”Annex M Only” that user can select for this connection. Modulator: There are four modes “ AUTO ”,” ADSL multimode ”,” ADSL2 ”and” ADSL2+ ” that user can select for this connection. DSP Fi[...]

  • Seite 49

    4.3.3 System There are six items within the System section: Time Zone, Remote Access, Firmw are Upgrade, Backup/Restore, Rest art and User Management. 4.3.3.1 Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network T ime Protocol (SNTP) to get the current time from an SNTP server outside your network. Choo[...]

  • Seite 50

    4.3.3.2 Remote Access T o temporarily permit remote administration of th e router (i.e. from outs ide your LAN), select a time period the router permits remote access for and click Enable. Y ou may change other configuration options for the w eb administration interface using Device Management options in the Advanced section of the GUI. 4.3.3.3 Fir[...]

  • Seite 51

    4.3.3.4 Backup / Restore These functions allow you to save and backup your router ’ s current settings to a file on your PC, or to restore a previously saved backup. This is useful if you wish to experiment with different settings, knowing that you have a backup handy in the case of any mist akes. It is advisable to backup your router ’s settin[...]

  • Seite 52

    If you wish to restart the rout er using the factory default se ttings (for example, af ter a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default settings. Y ou may also reset your router to factory se ttings by pressing in the small Reset pinhole button on the back of your [...]

  • Seite 53

    Y ou can change the user ’s p assword , whether their account is active and Va l i d , as well as add a comment to each user account. These opt ions are the same when creating a user account, with the exception that once creat ed you cannot change the username. Y ou cannot delete the default admin account; however y ou can delete any other create[...]

  • Seite 54

    4.3.4 Firewall 4.3.4 Firewall Firewall and Access Control Firewall and Access Control Y our router includes a full SPI (S tateful Packet Inspection) firewall for controlling Internet access from your LAN, as well as helping to pr event attacks fro m hackers. In addition to this, when using NA T (Network Address T ranslation) t he router acts as a ?[...]

  • Seite 55

    prevent unauthorized computers or applications accessing your local network from the Internet. Intrusion Detection : Enable Intrusion Detection to detect, prevent, and log malicious attacks. MAC Filter rules : Prevents unauthorized computers accessing the Internet. URL Filter : Blocks PCs on your local network from unwanted websites. A detailed exp[...]

  • Seite 56

    4.3.4.1 Packet Filter Packet filtering enables you to configure your router to block specified internal/external users ( IP a ddress ) from Internet access, or you can disable specific service requests ( Po rt number ) to /from Internet. This conf iguration program allows you to set up to 6 dif ferent filter rules for different users based on their[...]

  • Seite 57

    Application: User can choose that they want.  Outgoing  Incoming: Determine whether the rule is for outgoing p ackets or for incoming packet s. Active: Choose “Y es” to enable the rule, or choose “No” to disable the rule. Packet T ype: S pecify the packet type (TCP , UDP , ICMP or any) that the rule applies to. Select TCP if you wish [...]

  • Seite 58

    Schedule time: User can setup the time to use the packet filter. A ttention If the DHCP server option is enabled, y ou must be very careful in assigning IP addresses of a filtered private IP range to avoid conflicts because you do not know which PC in the LAN is a ssigned which IP address. The easiest and safest way is that t he filtered IP address[...]

  • Seite 59

    Active: Select Yes from the drop down list box to enable MAC address filtering. Action When Matched: Select “Drop” or “Forward”. Log: Choose “Y es” if you wish to generate logs when the filer rule is applied to a pa cket. MAC Address: Enter the MAC addresses you wish to manage. Candidates: 57[...]

  • Seite 60

    4.3.4.3 Intrusion Detection Check “Enable” if you wish to detect intruders accessing your computer without permission. The myGuard router autom atically detects and blocks a DoS (D enial of Service) attack if a user enables this function. This kind of atta ck is not to access confidential data on the network; instead, it aims to disrupt specifi[...]

  • Seite 61

    Alert Mail Time: Set the time for receiving Alert mail. Your E-Mail: Set your email address. Recipient’s E-mail: Set the Recipient’s email address to which the E-<mail notification is sent. SMTP server: Set the SMTP (mail) server address. 4.3.4.4 Block WAN Request Check “Enable” if you wish to exclude outside PING requests from reaching [...]

  • Seite 62

    Active: Select Yes from the drop down list box to enable or disable the URL Filter feature. Always Block: Select to always check URL filter rules (i.e. at all hours of the day). Block from: S pecify the time period to check URL filter rules (e.g. during work hours). Keywords Filtering: Allows blocking by specific keywor ds within a particular URL r[...]

  • Seite 63

    (Forbidden). The checking procedure is: 1. Check the domain in the URL to determine if it is in the tr usted list. If yes, the connection attempt is sent to the remote web server . 2. If not, it is checked with the forbidden list. If present, the connection attempt is dropped. 3. If the packet matches neither of the above, it is sent to the remote [...]

  • Seite 64

    4.3.5 QoS (Quality of Service) Quality of Service Introduction If you’ve ever found your ‘net’ speed has slowed to a crawl because another famil y member is using a P2P file sharing prog ram, you’ll underst and why the Quality of Service features in Billion’ s routers is such a breakthrough for home users and office users . QOS: Keeping Y[...]

  • Seite 65

    Application : A name that identifies an existing policy . Time Schedule : Scheduling your QOS policy to be applied. Direction : The traffic flow direction to be controlled by the QOS policy . There are two settings to be provided in the Router:  LAN to W AN: Y ou want to control the traffic flow from the local network to the outside world. E.g.,[...]

  • Seite 66

    configuration. If you want to make the change persistent in flash, choose in the left windows to save it into flash. When you press or buttons described above, the following page will show up in your browser . Y ou can use it to define a QOS policy . Controlled T raffic Flow: S pecify the traffic flow you want to control. For GRE protocol, there is[...]

  • Seite 67

     GRE: For PPTP VPN Connections. Assigned Dat a rate: Assign the data ratio for this policy to be controlled. For examples, we want to only allow 20% of t he total data transfer rate for t he LAN-to-W AN direction to be used for FTP server . Then we can specify here wit h dat a ratio = 20. If you have ADSL LINE with 256K/bps.rate, the estimated d[...]

  • Seite 68

    Best Effort Best Effort (000000) Premium Express Forwarding (101 1 10) Gold service (L) Class 1, Gold (001010) Gold service (M) Class 1, Silver (001 100) Gold service (H) Class 1, Bronze (001 1 10) Silver service (L) Class 2, Gold (010010) Silver service (M) Class 2, Silver (010100) Silver service (H) Class 2, Bronze (0101 10) Bronze service (L) Cl[...]

  • Seite 69

    QOS example for your Network Connection Diagram V oIP HTTP web browsing users FTP Server ADSL Subscription Rate Upstream: 256 kbp s Downstream: 2048 Mbps Example QOS Plan :. Application IP or Ports Control Flow Data Rate T ime Schedule V oIP User 192.168.0.1 Outgoing Minimal 20% with high priority for non-used bandwidth with SDCP marking Class 1 Go[...]

  • Seite 70

    Example QOS Setup V oIP application V oice is latency-sensitive application. Most V o IP devices are use SIP protocol and the port number will be assigned by SIP module automatically . Better to use fixed IP address for catching V oIP p ackets as high priority . 68[...]

  • Seite 71

    Above settings will help to improve quality of your V oIP service when traf fic is full loading. 69[...]

  • Seite 72

    FTP Server Application Some of companies will setup FTP server for customer downloading or home user sharing their files by using FTP . LAN to W AN direction: 70[...]

  • Seite 73

    W AN to LAN direction: With above settings that help to limit utilization of upstream of FTP . T ime schedule also help you to only limit utilization at day time. 71[...]

  • Seite 74

    HTTP W eb Browsing Y ou can control the internet web browsing by specify the HTTP 80 (8080 for some proxy server). LAN to W AN direction: 72[...]

  • Seite 75

    W AN to LAN direction: 73[...]

  • Seite 76

    4.3.6 V irtual Server In TCP/IP and UDP networks a port is a 16-bi t number used to identify which applicatio n program (usually a server) incoming connecti ons should be delivered to. Some ports have numbers that are pre-assigned to them by the IANA (t he Internet Assigned Numbers Authority), and these are referre d to as “well-known ports”. S[...]

  • Seite 77

    Well-known and Registered Ports Port Number Protocol Description 20 TCP FTP Data 21 TCP FTP Control 22 TCP & UDP SSH Remote Login Protocol 23 TCP T elnet 25 TCP SMTP (Simple Mail T ransfer Protocol) 53 TCP & UDP DNS (Domain Name Server) 69 UDP TFTP (T rivial File T ransfer Protocol) 80 TCP World Wide W eb HTTP 1 10 TCP POP3 (Post Office Pro[...]

  • Seite 78

    Delete: Check the Rule No. you wish to delete, then click “Delete”. Item: Item number Service select: Select the service you wish to configure Protocol: Automatic when you choose Service select St art Port & End Port: Enter the public port number & range you wish to configure. IP Address: Enter the IP address of a specific inter nal ser[...]

  • Seite 79

    In addition to specifying the port number used, you also need to specify the protocol used. The protocol is determined by the particular app lication. Most applicat ions use TCP or UDP , however you can specify other protocols using the drop-down Protocol menu. Setting the protocol to “all” causes all incoming connection attempts using all prot[...]

  • Seite 80

    4.3.7 Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the myGuard router . Users who do not understand the features s hould not attempt to reconfigure t heir router , unless advised to do so by support staf f. There are five items within the Advanced section: St at[...]

  • Seite 81

    of the router , which is assigned to you by your ISP . Y ou first need to register and establish an a ccount with the Dynamic DNS provider using their website, for example http://www .dyndns.org/ There are more than 5 DDNS services supported. Disable: Check to disable the Dynamic DNS function. Enable: Check to enable the Dynamic DNS function. The f[...]

  • Seite 82

    4.3.7.4 Device Management The Device Management advanced configur ation setti ngs allow you to control your router ’s security options and device monitoring features. 80[...]

  • Seite 83

    T rend Micro All T rend Micro (TMSS) functions: Choose “Enable” or “Disabl e” TMSS functions that user want. Embedded Web Server: HTTP Port: The port number of the router ’ s embedded web se rver (for web-based configuration uses. The default value is t he standard HTTP port, 80. Y ou may specify an alternative if, for example, you are ru[...]

  • Seite 84

    the data. Write Co mmunity: S pecify a name to be identified as the Write Community , and an IP address. This community string is checked agains t the string entered in t he configuration file. Once a string name is matched, users from this IP address are able to view and modify dat a. T rap Community: S pecify a name and an IP address. Th is commu[...]

  • Seite 85

     From RFC1650 (EtherLike-MIB):  dot3S tats  From RFC 1493 (Bridge MIB):  dot1dBase group  dot1dTp group  dot1dS tp group (if configured as spanning tree)  From RFC 1471 (PPP/LCP MIB):  pppLink group  pppLqr group  From RFC 1472 (PPP/Security MIB):  PPP Security Group)  From RFC 1473 (PPP/IP MIB):  PPP IP Group[...]

  • Seite 86

    Universal Plug and Play (UPnP): UPnP of fers peer-to-peer network connectivity for PCs and other network devices, along with control and data transfer between devices. UPnP offers many advantages for users running NA T routers through UPnP NA T T rav ersal, and on supported systems makes tasks such as port forwarding much easier by letting the appl[...]

  • Seite 87

    Step 4: Click OK to go back to the Add/Remove Programs Properties window . Click Next. Step 5: Restart the computer when prompted. Follow the steps below to inst all the UPnP in Windows XP . Step 1: Click S tart and Control Panel. Step 2: Double-click Network Connections. Step 3: In the Network Connections window , click Advanced in the main menu a[...]

  • Seite 88

    Step 5: In the Networking Services window , select the Universal Plug and Play check box. Step 6: Click OK to go back to the Windows Op tional Networking Component Wizard window and click Next. Auto-discover Y our UPnP-enabled Netw ork Device Step 1: Click start and Control Panel. Double-cli ck Network Connections. An icon displays under Internet G[...]

  • Seite 89

    Step 3: In the Internet Connection Properties window , click Settings to see the port mappings that were automatically created. Step 4: You may edit or delete the port mappings or click Add to manually add port mappings. Step 5: Select Show icon in notification area w hen connected option and click OK. An icon displays in the system tray 87[...]

  • Seite 90

    Step 6: Double-click on the icon to display your current Internet connection status. Web Configurator Easy Access With UPnP , you can access web-based configur ation for the myGuard 7202(G) without first finding out the IP address of the router . This helps if you do not know the router ’s IP address. Follow the steps below to access web configur[...]

  • Seite 91

    4.3.7.5 IGMP IGMP , known as Internet Group Management Protocol , is used to management hosts from multicast group. IGMP Forw arding: Accepting multicast packet. Default is set to Enable. IGMP Snooping: Allowing switched Ethernet to check and make correct forwarding decisions. Default is set to Enable 89[...]

  • Seite 92

    4.4 T rend Micro There are two items in the T rend Micro section: Security Settings and Parental Controls. 90[...]

  • Seite 93

    4.4.1 Security Settings 4.4.1.1 Configuration The period value allows checking the latest Scan Engine and V irus Patte rns of PC-cillin. Y o u can customize the display interval value (1 day , 3 days, 1 week, 2 weeks, and 1 month) to invoke TMSS Security Services during Internet browsing. 4.4.1.2 Status The router checks the latest components avail[...]

  • Seite 94

    4.4.2 Parent al Controls 4.4.2.1 General Settings Parental Controls intercept request s to view Web sites from a user’s Internet browser and based on specified restricted categories, determines whether to allow or block the requested Web site content. Parental Controls are included when you install the evaluation version o f T rend Micro Internet[...]

  • Seite 95

    • Violence/Hate/Racism • Abortion • Illegal Drugs Exception List Select Enable to exclude IP addresses of any users on your LAN from Parental Controls. 93[...]

  • Seite 96

    Statistics In addition to blocking Web sites, Parent al Cont rols provides summary information that lets you know how many times users on your network accessed these website categories. 94[...]

  • Seite 97

    4.4.3 Getting S tarted with T rend Micro Security Services T o activate your T rend Micro Se curity Service, you must have Internet Explorer 5.5 or above installed. After finishing W AN connection settings, the following window appears when you open Internet Explorer to browse the Internet for the first time using the myGuard router . Click Continu[...]

  • Seite 98

    The service asks to download the T rend Micro Security Services ActiveX control. 96[...]

  • Seite 99

    Depending on security settings, you may be asked to accept this tool. Click Ye s to continue. By default, Internet Explorer permits downl oading the ActiveX control, however , if you experience issues downloading it modify your In ternet Explorer Security Settings to the following (refer to the Internet Expl orer online help for instructions): Sett[...]

  • Seite 100

    The T rend Micro Security Services dashboard appears as part of your 60-day evaluation of the security service. Click Scan Now! and activate the T rend Micro Security Services . By clicking Scan Now! Y our computer is automatically scanned for exposure to online threats. 98[...]

  • Seite 101

    Downloading… Scanning… 99[...]

  • Seite 102

    V ulnerability report for computer A detailed vulnerability repor t is generated. Please click Ste p 2 to see detailed information for the entire Network, as in the following figure. 100[...]

  • Seite 103

    V ulnerability report s for entire Network If you do not wish to perform a security scan now , the T rend Micro Security Services dashboard can be opened any time as follows. • Click the T r end Micro icon button on your In ternet Explorer W eb browser toolbar . • Click the Security Services link in your Windows S tart Menu. Click Activate My S[...]

  • Seite 104

    T o activate T rend Micro Security Services, perform the following: Step 1: Register your T rend Micro account Step 2: V alidate the Registration Email Step 3: Inst all T rend Micro Internet Security (named TIS 1 1.35 Package). *Import ant: you may download it through th e Internet or find it in the CD folder named T rend Micro Internet Security So[...]

  • Seite 105

    Step 1: Registering your Trend Micro account • In the appropriate fields on the Regist er Web p age, type your name and email address and other required information. Registration involves sending an email to the typed address to verify the email address is correct. • Returning users can use their existing Customer Care Center IDs and click Logi[...]

  • Seite 106

    T rend Micro sends a verification email to this address that you must reply to before your services are activated. Click << Back to make any modifications. Click Submit . A validation email is sent to the email address you entered. 104[...]

  • Seite 107

    Step 2: Validating the Registration Email After submitting your T rend Micro account registration information, T rend Micro sends a validation email to confirm that the email address is correct. T o validate your email address: 1. Open your email client (for example, Microsoft Outlook, Outlook Express) and click the validation link in the T rend Mi[...]

  • Seite 108

    Step 3: Installing Trend Micro Internet Security After validating the email to confirm your T r end Micro account, the final step involves downloading and installing T rend Micro Internet Security . T o dow nload and inst all T rend Micro Internet Security: 1. Click St art Dow nload . Another Web p age appears. 2. Click Inst all Now . 3. Click Next[...]

  • Seite 109

    Viewing Service Summary T o view Service Summary: 1. Open the T rend Micro Security Services dashboard. 2. On the dashboard main menu, click Service Summary . View Service Summary quickly displays the following: • T rend Micro Customer Account information • The number of days remaining for trial version software • Recent Vi rus Outbreaks In a[...]

  • Seite 110

    Using Parental Controls Parental Controls intercept request s to view Web sites from a user’s Internet browser and based on specified restricted categories, determi nes whether to allow or block the requested Web site content. Parental Controls are included when you inst all the evaluation version of T rend Micro Internet Security . This evaluati[...]

  • Seite 111

    Statistics of Parental Controls In addition to blocking Web sites, Parent al C ontrols provide summary information that lets you know how many times users on your network accessed filtered categories. T o view st atistics for Parent al Controls: 1. Open the myGuard 7202(G) Web GUI. 2. Open the T r end Micro Security Services dashboard, click Parent[...]

  • Seite 112

    11 0[...]

  • Seite 113

    4.5 Save Configuration to Flash After changing the router ’ s conf iguration settings, you must sa ve all of the configuration parameters to FLASH to avoid losing them after turning of f or resetting your router . Click Save to write your new configuration to FLASH. 111[...]

  • Seite 114

    4.6 Rest art Click Rest art with option Current Settings to reboot your router (and restore your last saved configuration). If you wish to restart the rout er using the factory default se ttings (for example, af ter a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default setti[...]

  • Seite 115

    Chapter 5 Troubleshooting If your ADSL Router is not functioning properly , y ou can refer first to this chapter for simple troubleshooting before contacting your service pr ovider or Billion support. This can save you time and effort but if symptoms persist, consult your service provider . If you are a registered TMSS user , please provide your T [...]

  • Seite 116

    Problems with the W AN Interface Problem Corrective Action Initialization of the PVC connection (“linesync”) failed. Ensure that the telephone cabl e is connected properly from the ADSL port to the wall jack. The ADSL LED on the front panel of the router should be on. Check that your VPI, VCI, encapsulation type and type of multiplexing setting[...]

  • Seite 117

    Appendix Support and Contact Information If you cannot resolve the problem after reading the T r oubleshooting chapter , please contact the dealer where you purchased this product. Contact Billion AUSTRALIA http://www .billion.com.au ©2005 Billion Electric Co., Ltd. PC Range P/L. All Rights Reserved. WORLDWIDE http://www .billion.com 11 5[...]