SMC Networks BR14VPN Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung SMC Networks BR14VPN an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von SMC Networks BR14VPN, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung SMC Networks BR14VPN die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung SMC Networks BR14VPN. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung SMC Networks BR14VPN sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts SMC Networks BR14VPN
- Den Namen des Produzenten und das Produktionsjahr des Geräts SMC Networks BR14VPN
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts SMC Networks BR14VPN
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von SMC Networks BR14VPN zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von SMC Networks BR14VPN und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service SMC Networks finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von SMC Networks BR14VPN zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts SMC Networks BR14VPN, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von SMC Networks BR14VPN widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    i[...]

  • Seite 2

    Copyright Information furnished by SMC Networks, Inc. (S MC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which ma y result from its use. No license is granted by implication or otherwise under any patent or patent rights of S[...]

  • Seite 3

    Compliances FCC - Class B This equipment has been tested and found to co mply with the l imits for a Class B digital device, pursuant to Part 15 of the FCC Ru les. Thes e limits are designed to provide reasonable protection against harmfu l interfer ence in a residential installation. This equipment generates, uses and can radiate radi o frequenc y[...]

  • Seite 4

    EC Conformance Declaration – Class B SMC contact for these products in Europe is: SMC Networks Europe, Edificio Conata II Calle Fructuos Gelabert 6-8, 2o, 4a 08970 – Sant Joan D espi Barcelona, Spain This equipment complies with the requirements relating to electromagn etic compatibility, EN 55022/A1 Class B, and EN 50082-1. This meets the ess [...]

  • Seite 5

    1 | SYSTEM REQUIREMENTS 1 2 | EQUIPMENT CHECKLIST 1 3 | FUNCTIONS AND FEATURES 2 4 | PANEL LAYOUT 3 5 | HARDWARE INSTALLATION 4 6 | NETWORK SETTINGS AND SOFTWARE INSTALLATION 4 6.1 | Instal ling TCP/IP 5 6.2 | Setting u p TCP/IP 5 6.3 | Obtainin g an IP Address 6 6.4 | Config uring a Macintosh Computer 7 6.5 | Verifying Your TCP/IP Co nnection 7 7 [...]

  • Seite 6

    7.9 | Advanced S etup - VPN 33 7.9.1 | IPSec Tunnel 33 7.9.2 | IKE Proposal 35 7.9.3 | IPSec Proposal 36 7.9.4 | Dynamic VPN 38 7.9.5 | PPTP/L2TP Server 39 7.10 | Advanced Setu p - SNMP 40 7.11 | Advanced Setup - ROUTING 41 7.12 | Advanced Setup - MISCELLANEOUS 42 7.13 | Advanced Setup – DISPLAY STATUS 43 7.14 | DDNS (Dynami c DNS) 43 7.15 | UPnP[...]

  • Seite 7

    1 | System Requirements • Internet access from your local telephone compan y or Internet Service Provider (ISP) using a DSL modem, cable mode m, Dial-Up modem, or ISDN modem • A PC using a fixed IP address or dynamic IP address assigned via DHCP, as well as a Gateway server address a nd DNS server address from your servi ce pro vider • A comp[...]

  • Seite 8

    3 | Functions and Features Broadband Modem and NAT Router Connects multiple computers to a broadband (cable or DSL) modem, and/or Ethernet router to access the Internet. 10/100 Mbps Ethernet Interface Provides a 10/100 Base-TX in terface to connect to a DSL or cable modem for broadband Internet access. Auto-sensing Ethernet Switch Equipped with a 4[...]

  • Seite 9

    4 | Panel Layout The following figure shows the front panel layout, which is followed by a table describin g in detail the status and function of each LED. SMCBR14VPN Front Panel SMCBR18VPN Front Panel LED Function Color Status Descripti on Power Power indicator Green Steady Power is being applied to this device M1 System status indicator Orange Bl[...]

  • Seite 10

    SMCBR18VPN Front Panel: 8 LAN, 1 WAN, and 1 COM port Port Type Description 5 VDC Receptor for power adapter: 5 VDC, 2 A (minimum) WAN This is the connection for the Ethernet cable to the Ethernet port on the cable or D SL modem Port 1–4/8 These are the connections for Ethernet cables to your Ethernet enabled computers COM Serial port (connection [...]

  • Seite 11

    You must first verify that the TCP/IP communi cation protocol is properly in stalled and the computer is configured to get its IP address via the DHCP Server that is built-into this router. If you have not previous ly installed TCP/IP protocols on your client PCs, refer to the following section. 6.1 | Instal ling TCP/IP Windows 95/98/Me 1. Click St[...]

  • Seite 12

    into your CDROM drive and check the correct file location, e.g ., D:win98, D:win9x. (if D is the letter of your CD-ROM drive). 9. Windows may prompt you to restart the PC. If so, click the Yes button. If Windows does not prompt you to restart your com puter, do so to insure your setting s. Windows NT 1. From the Windows desktop click Start/Settin[...]

  • Seite 13

    6.4 | Config uring a Macintosh Computer You may find that the instructions here do not exactly match your screen. This is because these steps and screen shots were creat ed usi ng Mac OS 10.2. Mac OS 7.x and above are all very similar, but may not be identical to Mac OS 10.2. 1. Pull down the Apple Menu. Click System P references and sel ect Networ[...]

  • Seite 14

    7 | Configuring Your Broadband VPN Router Before you attempt to log into the web-based Admi nistration, please verify the following. 1. Your browser is configured properly (s ee below). 2. Disable any firewall or security software that may be running. 3. Confirm that you have a good link LED wh ere your computer is pl ugged into the Router. If you [...]

  • Seite 15

    Note that there are two different Web user in terfaces, one for general users and one for the system administrator. To log on as an admini strator, enter the system password (default password is smcadmin ) and click the LOGIN button. If you typed the password correctly, the left panel of the Web user interface changes to the administrator configura[...]

  • Seite 16

    Cable Modem The cable modem option allows you to confi gure a host name and MAC Address. The Host Name is optional, but may be required by some ISP s. The default MAC address is set to the WAN’s physical interface on the Router. Use this ad dress when registering for Internet service, and do not change it unl ess required by your ISP. If your ISP[...]

  • Seite 17

    Fixed-IP xD SL Some xDSL Internet Service Providers may assi gn a fixed (static) IP address. If you have been provided with this information, choose this option and enter th e assigned IP address, gateway IP address, DNS IP addresses, and subnet mask. PPPoE xDSL Enter the PPPoE User N ame and Password assi gned by your Service Provid er. The Servic[...]

  • Seite 18

    PPTP Point-to-Point Tunneling Protocol is a common connection method used for xDSL connections in Europe. It can be used to join different physical networks usi ng the Internet as an intermediary. If you have been provid ed with the informati on as s hown on the screen, enter the assigned IP address, subnet mask, default gateway IP address, user ID[...]

  • Seite 19

    BigPond If you use the BigPond Intern et Service which is available in Australia, enter your username and password and apply the changes. L2TP Layer 2 Tunneling Protocol is a common connection method u sed for xDSL connections in Europe. It can be used to join different physical networks using the Internet as an intermediary. If you have been provi[...]

  • Seite 20

    will be dropped and will automatically re-estab lish the connecti on as soon as you attempt to access the Internet again. Dial-Up Most Dial-up users will select this option to connect to their ISP through an analog dial-up modem. This feature can be used as a back-up when your broad band connectivity is unavailable. Enter the ph one number, account[...]

  • Seite 21

    15[...]

  • Seite 22

    7.4 | Advanced S etup – S YSTEM Time Zone Use the section below to configure the Barricad e 's system time. Select your timezone and configure the daylight savings option based on your location. This information is used for the time/date parental rules you can configure wi th the Barricade's Advanc ed Firewall. This information is also [...]

  • Seite 23

    Password Setti ngs Use this section to configure the 2 password accou nts and idle time-out setting for your Barricade Router. Ther e are 2 levels of admin access for this VPN Router: The Administrator account has Read/ Write perm ission to view and change any settings. The default password for this account is "smcadmin". The User account[...]

  • Seite 24

    Syslog Server The Syslog Server tool will automatically dow nload the Barricad e log to the server IP address specified by the u ser. Enter the Serv er LAN IP Address and select the Enable radio button to enable this function. The broadband rout er is also able to send th e log files to a specific email address. Simply ent er the IP addres s of you[...]

  • Seite 25

    7.5 | Advanced S etup - WAN Dynamic IP The cable modem option allows you to confi gure a host name and MAC Address. The Host Name is optional, but may be required by some ISP s. The default MAC address is set to the WAN’s physical interface on the Router. Use this ad dress when registering for Internet service, and do not change it unl ess requir[...]

  • Seite 26

    PPPoE Enter the PPPoE User N ame and Password assi gned by your Service Provid er. The Service Name is normally optional, but may be requi red by some s ervice providers. Leave the Maximum Transmission Unit (MTU) at the defaul t value unless you have a particular reason to change it. Enter a Maximum Idle Ti me (in mi nutes) to define a maximu m per[...]

  • Seite 27

    PPTP Point-to-Point Tunneling Protocol is a common connection method used for xDSL connections in Europe. It can be used to join different physical networks usi ng the Internet as an intermediary. If you have been provid ed with the informati on as s hown on the screen, enter the assigned IP address, subnet mask, default gateway IP address, user ID[...]

  • Seite 28

    BigPond If you use the BigPond Intern et Service which is available in Australia, enter your username and password and apply the changes. L2TP Layer 2 Tunneling Protocol is a common connection method u sed for xDSL connections in Europe. It can be used to join different physical networks using the Internet as an intermediary. If you have been provi[...]

  • Seite 29

    Dial Up Most Dial-up users will select this option to connect to their ISP through an analog dial-up modem. This feature can be used as a back-up when your broad band connectivity is unavailable. Enter the ph one number, account na me and password assigned to you by yo ur ISP. The baud rate is the communicati on ra te between the broadband router a[...]

  • Seite 30

    7.6 | Advanced S etup - L AN This is the local IP address of the router. All networked comput ers must use the LAN IP address of the router as their d efault Gateway. However, if necessary, it can be changed. Here you can configure the LAN IP address fo r the router and enable/disable the DHCP server for dynamic client addre ss allocation. You can [...]

  • Seite 31

    You also have the option to configure more ad vanc ed settings by clicking the “More” button. You can configure the router’s DHCP server to give out specific Primary and Second ary DNS, Primary and Secondary W INS, and an alternate Gat eway (in the event that the rout er is not the Internet gateway). Clicking on the “Client List” link bri[...]

  • Seite 32

    7.7 | Advanced Setup - NAT 7.7.1 | Virtu al Server The firewall of the router filters out unrecogni zed packets to protect your intranet. This means that all network hosts are invisible to th e outside world. However, some of the hosts can be made accessible by enabling th e Virtual Se rver mapping. A virtual server is defined as a Service Port. Al[...]

  • Seite 33

    For example, if you have an FTP server (port 21 ) at 192.168.123.1, a We b server (port 80) at 192.168.123.2, and a VPN server at 192.168.123.6, you need to specify the f ollowing virtual server mapping as shown in the table below: Service Port Server IP Enable 21 192.168.123.1 X 80 192.168.123.2 X 1723 192.168.123.6 X The “IP Address” section [...]

  • Seite 34

    For a full list of ports and the services that run on them, see http://www.iana.org/assignments/port-numbers 7.7.3 | Virtu al Computer Use the “Virtual Computer” option to maintain th e privacy and security of the local net work. Virtual Computer enables you to use th e origin al NAT feature, and allows you to setup the one-to-one mapping of mu[...]

  • Seite 35

    You can select one of the two filtering policies: • Allow all to pass except those that match the specified rules • Deny all to pass except those that match the specif ied rules You can apply up to 8 rules for each direction, inbound or outbound. For each rule you c an define the following: • Source IP address • Source port address • Dest[...]

  • Seite 36

    7.8.3 | MAC Filter MAC Address Filtering allows you assign differe nt access rights to various users and you can also assign a specific IP address to a certain MAC address. Select the Enable radio button to enable the MA C Address Cont rol. All of the settings on this screen take effect when Enable is ch ecked. • MAC Address: This is the unique a[...]

  • Seite 37

    7.8.4 | Schedul e Rule Set scheduled times to be used to control what time of day a service or set of services is enabled. Use this section to configure up to 10 Schedule Rules to lim it network access based on time and day. To create a schedule rule click the [Add Schedule Rule ...] link below. Enter a rule name into the text field next to “Name[...]

  • Seite 38

    The Schedule Rule screen appears. It now shows your setting for Rule 1. If you need to make changes to your setting, click the Edit button. If you want to delete Rule 1, click the Delet e button. 7.8.5 | Advance d In this section you can enable/disable Stateful Packet Inspectio n (SPI), Discard Ping from WAN, and PPTP and IPSec VPN Passthrough type[...]

  • Seite 39

    7.8.6 | DMZ If you have a local client PC that cannot run an Internet application properly from behind the NAT firewall, then you can open the client up to unrestricted two-way Internet access by defining a Virtual DMZ Host. 7.9 | Advanced S etup - VPN 7.9.1 | IPSe c Tunnel VPN settings are used to create virtual privat e tunnels to remote VPN gate[...]

  • Seite 40

    • VPN: VPN protects network information from intruders. However, it greatly decreases network throughput. Enable it onl y when a security tu nnel is absolutely necessary. This feature is disabled by default. • Max. Number of Tunnels: Set the number of tunnel s that are allowed to be in operation simultaneously. • Tunnel name: Lists the monito[...]

  • Seite 41

    Options • Select IKE proposal: Click this button to se tup a set of frequently used IKE p roposals for the dedicated tunnel. • Select IPSec proposal: Click this button to setup a set of frequently used IPSec proposals for the dedicated tunnel. The tunnel name is equal to the name you c onfigured on the p revious page of VPN settings. The IKE pr[...]

  • Seite 42

    o MD5 • Life Time: The unit of Life time is based on the value of the life time unit, which can be seconds or KB. If the value of the unit is seconds, the value of life time repres ents the life time of the dedicated VPN tunnel bet ween both end gateways. Its value can range from 300 to 172,800 seconds. If the value of the unit is KB, the value o[...]

  • Seite 43

    • Proposal Name: The proposal name indicates which IPSec proposal will be monitored. The first character of the name with the value of 0x00 stands for the IPSec proposal that is not available. • DH Group - Three groups can be selected: o Group 1 (MODP768) o Group 2 (MODP1024) o Group 5 (MODP1536) However, you can also select None. • Encapsula[...]

  • Seite 44

    7.9.4 | Dyna mic VPN When using the VPN Dynamic IP Setting, the r outer functions as a Dynamic VPN server. The Dynamic VPN server does not check the VPN client IP information - this means that you can build a VPN tunnel with a VPN gateway from any remote host, regardless of the IP information. 38[...]

  • Seite 45

    7.9.5 | PPTP/L2TP Server Point-to-Point and Layer 2 Tunneling Protocol s (PPTP / L2TP) allows the secure remote access over the Internet by simply dialing in a local point provid ed by an ISP. The following screen displays the management interface where you enter username and passwords for authorized remote users, the authentication pr otocol, and [...]

  • Seite 46

    7.10 | Advanced Setu p - SNMP The Simple Network Management Protocol (S NMP) lets you manage a compu ter network remotely by polling and setting terminal values and monitoring network events. • Enable SNMP: You can check Local, Remote, or both options to enable the SNMP function. o If Local is checked, the router responds only to req uests from t[...]

  • Seite 47

    7.11 | Advanced Setup - ROUTING The Routing Table lets you determine which phy sical interface address to use for outgoing IP data grams. If you have more than one router and subnet, you will have to enable the rout ing table to allow packets to find the routing path. This allows different subnets to communi cate with each other. The settings in th[...]

  • Seite 48

    7.12 | Advanced Setup - MISCELLANEOUS If you experience difficulties accessing an FTP server that is running on a port other than 21, you can enter that port in the “Non-standard FTP port” and apply the changes. Wake-on-LAN is a technology that lets you power up a netwo rked router remotely. To use this feature, the target network adapter mu st[...]

  • Seite 49

    7.13 | Advanced Setup – DISPLAY STATUS Enable the Display Status option to view the W AN connectivity settings on the login page. When this is enabled, the login page appears as follows: 7.14 | DDNS (Dynami c DNS) Dynamic DNS provides users on the Internet a method to tie their domain name(s) to computers or servers. DDNS allows your domain name [...]

  • Seite 50

    7.15 | UPnP (Universal Plug-and-Pla y) The Universal Plug and Play architecture offers p ervasive pe er-to-peer network connecti vity of PCs of all form factors, intelligent app liances, and wireless devices. UPnP enables seamless proximity networking in addition to control and data transfer among network ed devices in the home, office and everywhe[...]

  • Seite 51

    7.17 | Status You can use the Status screen to see the connection status for Barricade's WAN/LAN interfaces, firmware and hard ware version numbers, any illega l attempts to access your network, as well as information on all DHCP clie nt PCs currently connected to your network. 45[...]

  • Seite 52

    46[...]

  • Seite 53

    8 | IPSec Settings Guide (For Reference/Example Only) 8.1 | Tunnel betwee n two SMCBR 14VPN The easiest way to construct a VPN tunnel bet w een two sites is to use two SMCBR14VPNs, which are connected to the intern et. The steps to follow to create an IP tunnel bet ween are the following: • Step 1: Go to the VPN section and select the enabl e che[...]

  • Seite 54

    Set the VPN settings as follows: VPN: Enable Max. number of tunnels: 2 ID: 1 Tunnel Name: 1 Method: IKE When finished, click “More”. VPN Settings – Tunnel 1 – IKE 48[...]

  • Seite 55

    Set the Tunnel 1 IKE settings as follows: Tunnel 1: 1 Local Subnet: 192.168.1.0 Local Netmask: 255.255.255.0 Remote Subnet: 192.168.1.0 Remote Netmask: 255.255.255.0 Remote Gateway: ip2.smc.com Preshare Key: mypresharedkey When finished, save your settings. 8.1.2 | Settings f or router 2 VPN Router 2 WAN IP Address: ip2.smc.com LAN IP Address: 192.[...]

  • Seite 56

    Set the VPN settings as follows: VPN: Enable Max. number of tunnels: 2 ID: 1 Tunnel Name: 1 Method: IKE When finished, click “More”. VPN Settings – Tunnel 1 – IKE 50[...]

  • Seite 57

    Set the Tunnel 1 IKE settings as follows: Tunnel 1: 1 Local Subnet: 192.168.2.0 Local Netmask: 255.255.255.0 Remote Subnet: 192.168.1.0 Remote Netmask: 255.255.255.0 Remote Gateway: ip1.smc.com Preshare Key: mypresharedkey When finished, save your settings. 51[...]

  • Seite 58

    8.1 3 | Common Sett ngs for both rout ers . i VPN Settings – Tunnel 1 – Set IKE Proposal Set the Tunnel 1 IKE Prop osal settings as follows: ID: 1 Proposal Name: 1 DH Group: Group2 Encypt. algorithm: 3DES Auth. algorithm: SHA1 Life Time: 10000 Life Time Unit: Sec. When finished, save the settings. 52[...]

  • Seite 59

    VPN Settings – Tunnel 1 – Set IPSec Proposal Set the Tunnel 1 IPSec Proposal settings as follows: ID: 1 Proposal Name: 1 DH Group: Group2 Encap. protocol: ESP Encrypt. algorithm: DES Auth. Algorithm: MD5 Life Time: 10000 Life Time Unit: Sec. When finished, save the settings. Now to view the VPN connection proc ess, go to the STATUS page and vie[...]

  • Seite 60

    8.3 | PPTP/ L2TP configuratio n example Pease note that the virtual address of th e L2TP and PPTP server have to be different. PPTP • Step 1: Go to the PPTP Server s ecti on and select the Enable radi o button • Step 2: Change the virtual IP value if ne cessary (thi s is the IP network that your PPTP clients will automatically be connected to) [...]

  • Seite 61

    55 55[...]

  • Seite 62

    9 | Troubleshooting A. Verifying your connection to the router If you are unable to access the Router’s we b-bas ed administration pages, then you may not be properly connected or configured. To determine your TCP/IP configuration status please follow the steps below: 1. Click Start then choose Run. 2. Type cmd or command to open a DOS prompt. 3.[...]

  • Seite 63

    F. I am having problem s establish ing a PPPoE xDSL WAN connecti on Some ISP’s require you to enter the domain name in addition to your username and password. For instance, for SBC Global, enter username@sbcglo bal.net. For Ameritech users, enter username@a meritech.net. BellSouth users may need to enter username@b ellsouth.net and Mindspring sub[...]

  • Seite 64

    J. I forgot my password and can no longer log into the ro uter. You should restore your router to factory defaults via its hard ware reset button. Locate the reset button (to the right of the power input). While the device is powered on, use a paper clip to depress this button for about 5-7 sec onds and then release. Now you have completed the rese[...]

  • Seite 65

    Microsoft uses an embedded L2TP/IPSEC VPN im plementation . In order to use the Microsoft standard VPN client, one has to disable the IP SEC on the PC. Please refer to Microsoft help to perform this operation. 9.1 | Questions and Awnsers What is the difference between SMCBR14VPN and SMCBR 18VPN? The SMCBR14VPN has 4 LAN ports and the SMCBR18VPN HAS[...]

  • Seite 66

    10 | Technical Specifications Standards: IEEE 802.3 10Base-T Eth ernet IEEE 802.3u 100Base-TX Fast Ethernet Hardware / Ports: LAN Port 4x RJ45, 10/100 Mbps with Auto-MDI/ MDIX (BR14VPN) 8x RJ45, 10/100 Mbps with Auto-MDI/ MDIX (BR18VPN) WAN Port 1x RJ45, 10/100 Mbps with Auto-MDI/ MDIX COM Port 1x DB9 (male), Up to 115200bps Input Power DC 5V2A LED[...]

  • Seite 67

    Dynamic IP L2TP PPTP BigPond Static IP Input Power: 5V 2A Operating Temperature: 0~40 o C Humidity: 10%~90% non-condensing Compliances: FCC CE VCCI UL 61[...]

  • Seite 68

    11 | Terminology 10BaseT - Physical Layer Specification for Twiste d- Pair Ethernet using Unshielded Twisted Pair wire at 10Mbps. This is the most popular ty pe of LAN cable used today because it is very cheap and easy to install. It uses RJ-45 conne ctors and has a cable length span of up to 100 meters. There ar e two versions , STP (Shielded Twis[...]

  • Seite 69

    DES - Data Encryption Standard. A cryptographic encryption al gorithm that is part of many standards. DHCP - Dynamic Host Configuration Protocol. This protocol automatically configures the TCP/IP settings of every computer on your home network. DMZ - Allows a networked computer to be fully ex posed to the Intern et. This function is used when the s[...]

  • Seite 70

    ISAKMP - Internet Securit y Association and Key Manangement Protocol. The basis for IKE. ISP - Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other busin esses or organizations. JPEG – Joint Photographic Exp erts Group. JPEG is a standard for compressing still images and it provides [...]

  • Seite 71

    NAT – (Network Address Translation) This process allows all of the computers on your ho me network to use one IP address. The N AT capabilit y of the Barricade, allows you to access the Internet from any comp uter on your home networ k without having to purchase more IP addresses from your ISP. Netw ork Address Translation can be used to give mul[...]

  • Seite 72

    TCP/IP - Transmission Control Protocol/Internet Protocol. This is the standard protocol for data transmission over the Intern et. TCP - Transmission Control Protocol - TCP and UDP (User Datagram Protocol) are th e two transport protocols in TCP/IP. TCP ensures that a message is sent accurately and in its entirety. However, for re al-time voice and [...]

  • Seite 73

    67[...]