Billion Electric Company 7404V(G)PX manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Billion Electric Company 7404V(G)PX, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Billion Electric Company 7404V(G)PX one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Billion Electric Company 7404V(G)PX. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Billion Electric Company 7404V(G)PX should contain:
- informations concerning technical data of Billion Electric Company 7404V(G)PX
- name of the manufacturer and a year of construction of the Billion Electric Company 7404V(G)PX item
- rules of operation, control and maintenance of the Billion Electric Company 7404V(G)PX item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Billion Electric Company 7404V(G)PX alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Billion Electric Company 7404V(G)PX, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Billion Electric Company service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Billion Electric Company 7404V(G)PX.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Billion Electric Company 7404V(G)PX item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    BiP AC 7404V(G)OX BiP AC 7404V(G)PX 3G/V oIP/(802.1 1g) ADSL2+ (VPN) Firewall Router User Manual Last Revised Date 23-10-2008 V ersion release 5.53.s5.rc3[...]

  • Page 2

    T able of Contents Chapter 1: Introduction ..................................................................... 1 Introduction to your Router .................................................................. 1 Features ............................................................................................ 1 Chapter 2: Installing the Router .[...]

  • Page 3

    Error Log ........................................................................................... 30 Diagnostic ......................................................................................... 30 Quick Start ............................................................................................ 31 Conguration ..................[...]

  • Page 4

    Firewall Log ..................................................................................... 85 VPN - V irtual Private Networks (Only available for BiP AC 7404V(G)OX) 86 PPTP (Point-to-Point T unneling Protocol) .............................................. 86 IPSec (IP Security Protocol) .....................................................[...]

  • Page 5

    Appendix: Product Support & Contact ........................................ 16 2[...]

  • Page 6

    Chapter 1: Introduction Introduction to your Router Welcome to the 3G/V oIP/ (802.1 1g) ADSL2+(VPN) Firewall Router . The router is an “all-in-one” ADSL router , combining an ADSL modem, ADSL router and Ethernet network switch functionalities, providing everything you need to get the machines on your network connected to the Internet over your [...]

  • Page 7

    Multi-Protocol to Establish a Connection It s upports PPPoA (RFC 2364 - PPP over A TM Adaptation Layer 5), RFC 1483 encapsulatio n overA TM (bridged or routed), PPP over Ethernet (RFC 2516), and IPoA (RFC1577) to establish a connection with the ISP . The product also supports VC-based and LLC-based multiplexing. Quick Installation Wizard It s uppor[...]

  • Page 8

    Quality of Service (QoS) QoS gives you full control over which types of outgoing data trafc should be given priority by the router , ensuring important data like gaming packets, customer information, or management information move through the router ay lightning speed, even under heavy load. The QoS features are congurable by source IP addres[...]

  • Page 9

    Firmware Upgradeable Device can be upgraded to the latest rmware through the WEB based GUI. Rich Management Interfaces It s upports exible management interfaces with local console port, LAN port, and W AN port. Users can use terminal applications through the console port to congure and manage the device, or T elnet, WEB GUI, and SNMP throu[...]

  • Page 10

    Chapter 2: Installing the Router Important note for using this router Package Contents 3G/VoIP/(802.11g) ADSL2+ (VPN) Firewall Router CD-ROM containing the online manual RJ-11 ADSL/telephone Cable Ethernet (CAT-5) Cable Console kit Power adapter A detachable antenna Quick Start Guide 5[...]

  • Page 11

    The Front LEDs. LED Meaning 1 Power Lit when power is ON. Lit red means system failure. Restart the device or contact Billion for support. 2 Ethernet Port 1X — 4X (RJ-45 connector) Lit when one of LAN ports is connected to an Ethernet device. Lit green when the speed of transmission hits 100Mbps; Lit orange when the speed of transmission hits 10M[...]

  • Page 12

    The Rear Ports Port Meaning 1 Antenna (Wireless Router only) Connect the detachable antenna to this port. 2 DSL Connect this port to the ADSL/telephone network with the RJ- 1 1 cable (telephone) provided. 3 Line (Router with LINE port only) Connect this port to the telephone jack on the wall with RJ-1 1 cable. 4 Phone 1X-2X (RJ-1 1 connector) Conne[...]

  • Page 13

    Cabling One of the most common causes of problem is bad cabling or ADSL line(s) . Make sure that all connected devices are turned on. On the front panel of your router is a bank of LEDs. V erify that the LAN Link and ADSL line LEDs are lit. If they are not, verify if you are using the proper cables. Make sure that all devices (e.g. telephones, fax [...]

  • Page 14

    Chapter 3: Basic Installation The router can be congured through your w eb browser . A web browser is included as a standard application in the following operating systems: Linux, Mac OS, Windows 98/NT/2000/XP/Me/Vista, etc. The product provides an easy and user-friendly interface for conguration. P lease check your PC network components. The[...]

  • Page 15

    Connecting Y our Router Connect this router to a 1. LAN (Local Area Network) and the ADSL/telephone ( ADSL ) net work. Power on the device. 2. Make sure the 3. Power LED lit steadily and that the LAN LED is lit. Connect your router to the telephone jack on the wall with RJ-1 1 cable. 4. Connect the USB 2.0 cable. 5. 10[...]

  • Page 16

    Network Conguration Conguring PC in Windows V ista Go to Start. Click on Network. 1. Then click on Network and Sharing 2. Center at the top bar . When the Network and Sharing 3. Center window pops up, select and click on Manage network connec - tions on the left window column. Select the Local Area Connection, 4. and right click the icon to s[...]

  • Page 17

    Select Internet Protocol V ersion 4 5. (TCP/IPv4) then click Properties. In the TCP/IPv4 properties window , 6. select the Obtain an IP address au- tomatically and Obtain DNS Server address automatically radio but- tons. Then click OK to exit the set - ting. Click OK again in the Local Area 7. Connection Properties window to apply the new congur[...]

  • Page 18

    Conguring PC in Windows XP Go to Start > Control Panel (in Classic 1. View). In the Control Panel, double-click on Network Connections Double-click Local Area Connection. 2. In the Local Area Connection Status 3. window , click Properties. Select Internet Protocol (TCP/IP) and 4. click Properties. Select the Obtain an IP address auto- 5. mati[...]

  • Page 19

    Conguring PC in Windows 2000 Go to Start > Settings > Control Panel. 1. In the Control Panel, double-click on Network and Dial-up Connections. Double-click Local Area Connection. 2. In the Local Area Connection Status 3. window click Properties. Select Internet Protocol (TCP/IP) and 4. click Properties. Select the Obtain an IP address auto[...]

  • Page 20

    Conguring PC in Windows 95/98/Me Go to Start > Settings > Control Panel. 1. In the Control Panel, double-click on Network and choose the Conguration tab. Select TCP/IP > NE2000 Compatible, 2. or the name of your Network Interface Card (NIC) in your PC. Select the Obtain an IP address auto- 3. matically radio button. Then select the D[...]

  • Page 21

    Conguring PC in Windows NT4.0 Go to Start > Settings > Control Panel. 1. In the Control Panel, double-click on Network and choose the Protocols tab. Select TCP/IP Protocol and click Prop - 2. erties. Select the Obtain an IP address from 3. a DHCP server radio button and click OK. 16[...]

  • Page 22

    Factory Default Settings Before conguring your router , you need to know the following default settings. Web Interface (Username and Password) Username: admin Password: admin The default username and password are “ admin ” and “ admin ” respectively . Device LAN IP settings IP Address: 192.168.1.254 Subnet Mask: 255.255.255.0 ISP setting[...]

  • Page 23

    Information from your ISP Before conguring this device, you have to check with your ISP (Internet Service Provider) to nd out what kind of service is provided such as DHCP (Obtain an IP Address Automatically , Static IP (Fixed IP Address) or PPPoE. Gather the information as illustrated in the following table and keep it for reference. PPPoE(R[...]

  • Page 24

    Conguring with your W eb Browser Open your web browser , enter the IP address of your router , which by default is 192.168.1.254, and click “Go”, a user name and password window prompt will appear . The default username and password are “admin” and “admin” respectively . (See Figure 3.14) Figure 3.14: User name & Password Prompt [...]

  • Page 25

    Chapter 4: Conguration At the conguration homepage, the left navigation column provides you the link to each conguration page. The category of each conguration page is listed as below . Status ADSL T able 3G Status ARP T able DHCP T able Routing T able NA T Sessions UpnP Portmap PPTP Status IPSec Status L2TP Status Email Status V oIP St[...]

  • Page 26

    Status ADSL Status This section displays the ADSL overall status, which shows a number of helpful information such as DSP rmware version. 3G Status This section displays the 3G Card’s overall status, which shows you a number of helpful information such as the current signal strength and statistics on current and total bytes transferred and rec[...]

  • Page 27

    Card Name: The name of the 3G card. Card Firmware: The current rmware for the 3G card. Current TX Bytes / Packets: The statistics of transmission, count for this call. Current RX Bytes / Packets: The statistics of receive, count for this call. T otal TX Bytes / Packets: The statistics of transmission, count from system ready T otal RX Bytes / Pa[...]

  • Page 28

    Leased T able IP Address: The IP address that assigned to client. MAC Address: The MAC address of client. Client Host Name: The Host Name (Computer Name) of client. Expiry: The current lease time of client. 23[...]

  • Page 29

    Routing T able Routing T able V alid: It indicates a successful routing status. Destination: The IP address of the destination network. Netmask: The destination Netmask address. Gateway/Interface: The IP address of the gateway or existing interface that this route will use. Cost: The number of hops counted as the cost of the route. RIP Routing T ab[...]

  • Page 30

    NA T Sessions This section lists all current NA T sessions between interface of types external (W AN) and internal (LAN). UPnP Portmap The section lists all port-mapping established using UPnP (Universal Plug and Play . See Advanced section of this manual for more details on UPnP and the router’s UPnP conguration options. 25[...]

  • Page 31

    PPTP Status This shows details of your congured PPTP VPN Connections. Name: The name you assigned to the particular PPTP connection in your VPN conguration. T ype: The type of connection (dial- in/dial -out). Enable: Whether th e connection is currently enabled. Active: Whether the connection is currently active. T unnel Connected: Whether th[...]

  • Page 32

    IPSec Status This shows details of your congured IPSec VPN Connections. Name: The name you assigned to the particular VPN entry . Active: Whether the VPN Connection is currently Active. Connection State: Whether the VPN is Connected or Disconnected. Statistics: Statistics for this VPN Connection. Local Subnet: The local IP Address or Subnet used[...]

  • Page 33

    Email Status Details and status for the Email Account you have congured the router to check. Please see the Advanced section of this manual for details on this function. V oIP Status V oIP Call Log 28[...]

  • Page 34

    Event Log This page displays the router ’s Event Log entries. Major events are logged to this window , such as when the router ’s ADSL connection is disconnected, as well as Firewall events when you have enabled Intrusion or Blocking Logging in the Conguration – Firewall section of the interface. Please see the Firewall section of this man[...]

  • Page 35

    Error Log Any errors encountered by the router (e.g. invalid names given to entries) are logged to this window . Diagnostic It tests the connection to computer(s) which is connected to the LAN ports and also the W AN Internet connection. If PING www .google.com is shown F AIL and the rest is P ASS, you ought to check your PC’s DNS setting is corr[...]

  • Page 36

    Quick Start Click Quick Start. Select the connect mode you want. There are 2 options to choose from: ADSL 1. or 3G. Select ADSL mode from the drop down menu and click Continue. If your ADSL line is not ready , you need to check your ADSL line has been set or not. 2. If your ADSL line is ready , the screen appears ADSL Line is Ready . Choose Auto ra[...]

  • Page 37

    Please enter “Username” and “Password” as supplied by your ISP(Internet Service Provider) 5. and click Apply to continue. Pro le Port: Select the connection mode. There is ADSL . Protocol : Select the protocol mode. The default mode is PPPoE. VPI/VCI : Enter the VPI and VCI information provided by your ISP . Username : Enter the username[...]

  • Page 38

    Congure the Wireless LAN setting. 6. WLAN Service: Default setting is set to Enable. If you want to use wireless, both 802.1 1g and 802.1 1b device in your network, you can select Enable. ESSID: The ESSID is the unique name of a wireless access point (AP) to be distinguished from another . For security propose, change to a unique ID name to the [...]

  • Page 39

    SIP: T o use V oIP SIP as V oIP call signaling protocol. Default is set to Disable. Region: This selection is a drop-down box, which allows user to select the country for which the V oIP device must work. When a country is selected, the country parameters are automatically loaded. SIP Service Provider: This section allows you to select the service [...]

  • Page 40

    Conguration When you click this item, the column will expand to display the sub-items that will allow you to further congure your ADSL router . LAN, W AN, System, Firewall, V oIP , QoS, V irtual Server , Time Schedule and Advanced The function of each conguration sub-item is described in the following sections. 35[...]

  • Page 41

    LAN - Local Area Network Here are the items within the LAN section: Bridge Interface, Ethernet, IP Alias, Ethernet Client Filter , Wireless, Wireless Security , Wireless Client Filter , WPS, Port Setting and DHCP Server . Bridge Interface Y ou can setup member ports for each VLAN group under Bridge Interface section. From the example, two VLAN grou[...]

  • Page 42

    Ethernet Primary IP Address IP Address: The default IP on this router . Subnet Mask: The default subnet mask on this router . RIP: RIP v1, RIP v2, and RIP v2 Multicast. Check to enable RIP function. IP Alias This function creates multiple virtual IP interfaces on this router . It helps to connect two or more local networks to the ISP or remote n od[...]

  • Page 43

    Ethernet Client Filter The Ethernet Client Filter supports up to 16 Ethernet network machines that helps you to manage your network control to accept trafc from specic authorized machines or can restrict unwanted machine(s) to access your LAN. There are no pre-dene Ethernet MAC address lter rules; you can add the lter rules to meet y[...]

  • Page 44

    MAC Address which connecting to the router . Y ou can easily by checking the box next to the IP address to be blocked or allowed. Then, Add to insert to the Ethernet Client Filter table. The maximum Ethernet client is 16. 39[...]

  • Page 45

    Wireless Parameters WLAN Service: Default setting is set to Enable. If you do not have any wireless, both 802.1 1g and 802.1 1b, device in your network, select Disable. Mode: The default setting is 802.1 1b+g (Mixed mode). If you do not know or have both 1 1g and 1 1b devices in your network, then keep the default in mixed mode. From the drop-down [...]

  • Page 46

    Note: Wireless performance may degrade if select ID channel is already being occupied by other AP(s). TX PowerLevel: It is a function that enhances the wireless transmitting signal strength. User may adjust this power level from minimum 1 up to maximum 127. Note: The Power Level maybe different in each access network user premises environment and c[...]

  • Page 47

    Wireless Security Y ou can disable or enable with WP A or WEP for protecting wireless network. The default mode of wireless security is disabled. 42[...]

  • Page 48

    WP A-PSK / WP A2-PSK Security Mode: Y ou can disable or enable with WP A or WEP for protecting wireless network. The default mode of wireless security is Disable . WP A Algorithms: There are two types of the WP A-PSK, WP A-PSK and WP A2-PSK. The WP A- PSK adapts the TKIP (T emporal Key Integrity Protocol) encrypted algorithms, which incorporates Me[...]

  • Page 49

    Passphrase: This is used to generate WEP keys automatically based upon the input string and a pre-dened algorithm in WEP64 or WEP128. Default Used WEP Key: Select the encryption key ID; please refer to Key (1~4) below . Key (1-4): Enter the key to encrypt wireless data. T o allow encrypted data transmission, the WEP Encryption Key values on all [...]

  • Page 50

    Wireless Client / MAC Address Filter The MAC Address supports up to 16 wireless network machines and helps you manage your network control to accept trafc from specic authorized machines or to restrict unwanted machine(s) to access your LAN. There are no pre-dene MAC Address lter rules; you can add the lter rules to meet your require[...]

  • Page 51

    connects to the router . Y ou can easily by checking the box next to the MAC address to be blocked or allowed. Then, Add to insert to the Wireless Client (MAC Address) Filter table. The maximum Wireless client is 16. WPS WPS feature is follow Wi-Fi Alliance WPS standard and it easily set up security-enabled Wi- Fi networks in the home and small of?[...]

  • Page 52

    Port Setting This section allows you to congure the settings for the router ’s Ethernet ports to solve some of the compatibility problems that may be encountered while connecting to the Internet, as well allowing users to tweak the performance of their network. Port # Connection T ype: There are Six options to choose from: A uto, disable, 10M [...]

  • Page 53

    DHCP Server Y ou can disable or enable the DHCP (Dynamic Host Conguration Protocol) server or enable the router ’s DHCP relay functions. The DHCP protocol allows your router to dynamically assign IP addresses to PCs on your network if they are congured to obtain IP addresses automatically . T o disable the router ’s DHCP Server , check Di[...]

  • Page 54

    W AN - Wide Area Network W AN refers to your Wide Area Network connection, i.e. your router ’s connection to your ISP and the Internet. Here are the items within the W AN section: W AN Interface, W AN Prole and ADSL Mode. W AN Interface W AN Connection-ADSL Mode The default setting for Connection Mode is ADSL and for Protocol is PPPoE. Main Po[...]

  • Page 55

    Rule 1. ADSL Down Rule 2. Ping Fail No Ping: It will not send any ping packet to determine the connection. It means to disable the ping fail detection. Ping Gateway: It will send ping packet to gateway and wait response from gateway in every “Probe Cycle”. Ping Host: It will send ping packet to specic host and wait response in every “Probe[...]

  • Page 56

    W AN Prole PPPoE Connection PPPoE (PPP over Ethernet) provides access control in a manner which is similar to dial-up services using PPP . Prole Port: Select the prole port as ADSL. Protocol: The A TM protocol will be used in the device. Description: A given name for the connection. VPI/VCI: Enter the information provided by your ISP . A T[...]

  • Page 57

    Auth. Protocol: Default is Auto. Y our ISP should advise you on whether to use Chap or Pap. Connection: Always on: If you want the router to establish a PPPoA session when starting up and to au- tomatically re-establish the PPPoA session when disconnected by the ISP. Connect on Demand: If you want to establish a PPPoA session only when there is a p[...]

  • Page 58

    PPPoA Connection Prole Port: Select the prole port as ADSL. Protocol: The A TM protocol will be used in the device.. Description: A given name for the connection. VPI/VCI: Enter the information provided by your ISP . A TM Class: The Quality of Service for A TM layer . Username: Enter the username provided by your ISP . Y ou can input up to 12[...]

  • Page 59

    Detail: You can dene the destination port and packet type (TCP/UDP) without checking by timer. It allows you to set which outgoing trafc will not trigger and reset the idle timer. MTU: Maximum T ransmission Unit. The size of the largest datagram (excluding media-specic headers) that IP will attempt to send through the interface. RIP: RIP v[...]

  • Page 60

    MPoA Connection Prole Port: Select the prole port as ADSL. Protocol: The A TM protocol will be used in the device. Description: A given name for the connection. VPI/VCI: Enter the information provided by your ISP . A TM Class: The Quality of Service for A TM layer . NA T : The NA T (Network Address T ranslation) feature allows multiple users [...]

  • Page 61

    MAC Spoong: Some service providers require the conguring of this option. Y ou must ll in the MAC address that specify by service provider when it is required. Default is disabled. Obtain DNS: A Domain Name System (DNS) contains a mapping table for domain name and IP addresses. DNS helps to nd the IP address for the specic domain name[...]

  • Page 62

    IPoA Routed Connection Prole Port : Select the prole port as ADSL. Protocol: The A TM protocol will be used in the device. Description: A given name for the connection. VPI/VCI: Enter the information provided by your ISP . A TM Class: The Quality of Service for A TM layer . NA T : The NA T (Network Address T ranslation) feature allows multipl[...]

  • Page 63

    Pure Bridge Prole Port: Select the prole port as ADSL. Protocol: The A TM protocol will be used in the device. Description: A given name for this connection. VPI/VCI: Enter the information provided by your ISP . A TM Class: The Quality of Service for A TM layer . Encap. mode: Choose whether you want the packets in W AN interface as bridged pa[...]

  • Page 64

    3G TEL No.: The dial string to make a GPRS / 3G user internetworking call. It may provide by your mobile service provider . APN: An APN is similar to a URL on the WWW , it is what the unit makes a GPRS / UMTS call. The service provider is able to attach anything to an APN to create a data connection, requirements for APN’s to be assigned varies b[...]

  • Page 65

    Connection: Always On: The router will make UMTS/GPRS call when starting up. Enabling Always On, will give you an option of Keep Alive. Keep Alive: Set Enable to allow the router automatically reconnects the connection when ISP disconnects it. Connect to Demand: If you want to make UMTS/GPRS call only when there is a packet re - questing access to [...]

  • Page 66

    ADSL Mode Connect Mode: This mode will automatically detect your ADSL line code, ADSL2+, ADSL2, AnnexM2 and AnnexM2+, ADSL, All. Please keep the factory setting unless ADSL is detected as the symptom of synchronization problem. Modulation: It will automatically detect capability of your ADSL line mode. Please keep the factory setting unless ADSL is[...]

  • Page 67

    System Here are the items within the System section: Time Zone, Remote Access, Firmware Upgrade, Backup/Restore, Restart and User Management. T ime Zone The router does not have a real time clock on board; instead, it uses the Simple Network T ime Protocol (SNTP) to get the current time from an SNTP server outside your network. Choose your local ti[...]

  • Page 68

    Remote Access T o temporarily permit remote administration of the router (i.e. from outside your LAN), select a time period the router will permit remote access for and click Enable. Y ou may change other conguration options for the web administration interface using Device Management options in the Advanced section of the GUI. If you wish to pe[...]

  • Page 69

    Backup / Restore These functions allow you to save and backup your router ’s current settings to a le on your PC, or to restore a previously saved backup. This is useful if you wish to experiment with different settings, knowing that you have a backup handy in the case of any mistakes. It is advisable to backup your router ’s settings before[...]

  • Page 70

    Restart Router Click Restart with option Current Settings to reboot your router (and restore your last saved conguration). If you wish to restart the router using the factory default settings (for example, after a rmware upgrade or if you have saved an incorrect conguration), select Factory Default Settings to reset to factory default sett[...]

  • Page 71

    User Management In order to prevent unauthorized access to your router ’s conguration interface, it requires all users to login with a password. Y ou can set up multiple user accounts, each with their own password. Y ou are able to Edit existing users and Add new users who are able to access the device’s conguration interface. Once you ha[...]

  • Page 72

    When you create a user account , check V alid box and ll in the respective information for User , Comment, Password and Conrm Password in the blanks provided. Then click the Add button to add your new user account. T o delete a user account, click on the Delete radio button on the right column of the account you wish to delete and then click [...]

  • Page 73

    Firewall and Access Control Y our router includes a full SPI (Stateful Packet Inspection) rewall for controlling Internet access from your LAN, as well as helping to prevent attacks from hackers. Besides, when using NA T , the router acts as a “natural” Internet rewall, as all PCs on your LAN will use private IP addresses that cannot be d[...]

  • Page 74

    Listed are the items under the Firewall section: General Settings, Packet Filter , Intrusion Detection, URL Filter , IM/P2P Blocking and Firewall Log. General Settings Y ou can choose not to enable Firewall and still able to access to URL Filter and IM/P2P Blocking or enable the Firewall using preset lter rules and modify the port lter rules [...]

  • Page 75

    disable. Mostly it is for preventing any scan tools from W AN site by hacker . Packet Filter This function is only available when the Firewall is enabled and one of these four security levels is chosen (All blocked, High, Medium and Low). The preset port lter rules in the Packet Filter must modify accordingly to the level of Firewall, which is s[...]

  • Page 76

    Example: Predened Port Filters Rules The predened port lter rules for High, Medium and Low security levels are listed. See T able 1. Note: Firewall – All Blocked/User-dened, you must dene and create the port lter rules yourself. No predened rule is being precongured. T able 1: Predened Port Filter Application Protocol P[...]

  • Page 77

    Inbound: Internet to LAN Outbound: LAN to Internet YES: Allowed NO: Blocked N/A: Not Applicable Packet Filter – Add TCP/UDP Filter Rule Name Helper: Users-dene description to identify this entry or click “ Select ” drop-down menu to select existing predened rules. The maximum name length is 32 characters. Time Schedule: It is self-de[...]

  • Page 78

    Packet Filter – Add Raw IP Filter Go to “ T ype ” drop-down menu, select “ Use Protocol Number ” . Rule Name Helper: Users-dene description to identify this entry or choosing “ Select ” drop-down menu to select existing predened rules. Time Schedule: It is self-dened time period. Y ou may specify a time schedule for your prio[...]

  • Page 79

    As you can see from the diagram below , when the rewall is enabled with one of the three presets (Low/Medium/High), inbound HTTP access is not allowed which means remote access through HTTP to your router is not allowed. Note: Inbound indicates accessing from Internet to LAN and Outbound is from LAN to the Internet. 74[...]

  • Page 80

    Conguring Packet Filter: Click Packet Filters. Y ou will then be presented with the predened port lter rules screen (in 1. this case for the low security level), shown below: Note: Y ou may click Edit the predened rule instead of Delete it. This is an example to show to how you add a lter on your own. Choose the radio button you want[...]

  • Page 81

    Example: Application: Cindy_HTTP T ime Schedule: Always On Source / Destination IP Address(es): 0.0.0.0 (I do not wish to active the address-lter , instead I use the port-lter) T ype: TCP (Please refer to T able1: Predened Port Filter) Source Port: 0-65535 (I allow all ports to connect with the application)) Redirect Port: 80-80 (This is P[...]

  • Page 82

    77[...]

  • Page 83

    Intrusion Detection The router ’s Intrusion Detection System (IDS) is used to detect hacker attacks and intrusion attempts from the Internet. If the IDS function of the rewall is enabled, inbound packets are ltered and blocked depending on whether they are detected as possible hacker attacks, intrusion attempts or other connections that the[...]

  • Page 84

    cannot protect against such attacks. T able 2: Hacker attack types recognized by the IDS Intrusion Name Detect Parameter Blacklist T ype of Block Duration Drop Packet Show Log Ascend Kill Ascend Kill data Src IP DoS Y es Y es WinNuke TCP Port 135, 137~139, Flag: URG Src IP DoS Y es Y es Smurf ICMP type 8 Des IP is broadcast Dst IP V ictim Protectio[...]

  • Page 85

    ICMP Flood Max ICMP Count (Default 100 c/ sec) Y es ICMP Echo Max PING Count (Default 15 c/sec) Y es Src IP : Source IP Src Port : Source Port Dst Port : Destination Port Dst IP : Destination IP 80[...]

  • Page 86

    URL Filter URL (Uniform Resource Locator – e.g. an address in the form of http://www .abcde.com or http:// www .example.com) lter rules allow you to prevent users on your network from accessing particular websites by their URL. There are no pre-dened URL lter rules; you can add lter rules to meet your requirements. Enable/Disable: T o[...]

  • Page 87

    Domains Filtering: This function checks the whole URL not the IP address, in URLs accessed against your list of domains to block or allow . If it is matched, the URL request will be sent (T rusted) or dropped (Forbidden). For this function to be activated, both check-boxes must be checked. Here is the checking procedure: Check the domain in the URL[...]

  • Page 88

    Example: Andy wishes to disable all WEB trafc except for ones listed in the trusted domain, which would prevent Bobby from accessing other web sites. Andy selects both functions in the Domain Filtering and thinks that it will stop Bobby . But Bobby knows this function, Domain Filtering, ONL Y disables all WEB trafc except for Trusted Domain, [...]

  • Page 89

    IM / P2P Blocking IM, short for Instant Message, is required to use client program software that allows users to communicate , in exchanging text message, with other IM users in real time over the Internet. A P2P application, known as Peer-to-peer , is group of computer users who share le to specic groups of people across the Internet. Both I[...]

  • Page 90

    Firewall Log Firewall Log display log information of any unexpected action with your rewall settings. Check the Enable box to activate the logs. Log information can be seen in the Status – Event Log after enabling. 85[...]

  • Page 91

    VPN - V irtual Private Networks (Only available for BiP AC 7404V(G)OX) Virtual Private Networks is ways to establish secured communication tunnels to an organization’ s network via the Internet. Y our router supports three main types of VPN (Virtual Private Network): PPTP , IPSec and L2TP . PPTP (Point-to-Point T unneling Protocol) There are two [...]

  • Page 92

    Username: If you are a Dial-Out user (client), enter the username provided by your Host. If you are a Dial-In user (server), enter your own username. Password: If you are a Dial-Out user (client), enter the password provided by your Host. If you are a Dial-In user (server), enter your own password. Authentication T ype: Default is Auto if you want [...]

  • Page 93

    Example: Conguring a Remote Access PPTP VPN Dial-out Connection A company’s ofce establishes a PPTP VPN connection with a le server located at a separate location. The router is installed in the ofce, connected to a couple of PCs and Servers. 88[...]

  • Page 94

    Conguring the PPTP VPN in the Ofce Click Conguration/VPN/PPTP . Choose Remote Access from Connect T ype drop-down menu. Y ou can either input the IP address (69.1.121.33 in this case) or hostname to reach the server . Function Description Name VPN_PPTP Given name of PPTP connection Connection T ype Remote Access Select Remote Access from t[...]

  • Page 95

    PPTP Connection - LAN to LAN Click Conguration/VPN/PPTP . Choose LAN to LAN from Connect T ype drop-down menu. Name: A given name for the connection (e.g. “connection to ofce”). Connection T ype: Remote Access or LAN to LAN. T ype: Check Dial Out if you want your router to operate as a client (connecting to a remote VPNserver , e.g. your [...]

  • Page 96

    than 40 bit keys. Mode: Y ou may select Stateful or Stateless mode. The key will be changed every 256 packets when you select Stateful mode. If you select Stateless mode, the key will be changed in each packet. Active as default route: Commonly used by the Dial-out connection which all packets will route through the VPN tunnel to the Internet; ther[...]

  • Page 97

    Example: Conguring a Remote Access PPTP VPN Dial-out Connection The branch ofce establishes a PPTP VPN tunnel with head ofce to connect two private networks over the Internet. The routers are installed in the head ofce and branch ofces accordingly . 92[...]

  • Page 98

    Conguring the PPTP VPN in the Head Ofce The IP address 192.168.1.201 will be assigned to the router located in the branch ofce. Please make sure this IP is not used in the head ofce LAN. Function Description Name HeadOfce Given name of PPTP connection Connection T ype LAN to LAN Select LAN to LAN from the Connection T ype drop-down m[...]

  • Page 99

    Conguring the PPTP VPN in the Head Ofce The IP address 69.1.121.30 is the Public IP address of the router located in head ofce. If you registered the DDNS (please refer to the DDNS section of this manual), you can also use the domain name instead of the IP address to reach the router . Function Description Name HeadOfce Given name of PP[...]

  • Page 100

    IPSec (IP Security Protocol) Active: This function activates or deactivates the IPSec connection. Check Active checkbox if you want the protocol of tunnel to be activated and vice versa. Note: When the Active checkbox is checked, the function of Edit and Delete will not be available. Name: This is a given name of the connection. Local Subnet: Displ[...]

  • Page 101

    IPSec VPN Connection Name: A given name for the connection (e.g. “connection to ofce”). Local Network: Set the IP address, subnet or address range of the local network. Single Address: The IP address of the local host. Subnet: The subnet of the local network. For example, IP: 192.168.1.0 with netmask 255.255.255.0 species one class C subn[...]

  • Page 102

    Remote ID: Identier: Input remote ID’s information, like domain name www.ipsectest.com Hash Function: It is a Message Digest algorithm which coverts any length of a message into a unique set of bits. It is widely used MD5 (Message Digest) and SHA-1 (Secure Hash Algorithm) algorithms. SHA1 is more resistant to brute-force attacks than MD5, howe[...]

  • Page 103

    unsecured communication channel (i.e. over the Internet). There are three modes, MODP 768-bit, MODP 1024-bit and MODP 1536-bit. MODP stands for Modular Exponentiation Groups. SA Lifetime: Specify the number of minutes that a Security Association (SA) will stay active before new encryption and authentication key will be exchanged. There are two kind[...]

  • Page 104

    Example: Conguring an IPSec LAN to LAN VPN Connection T able 3: Network Conguration and Security Plan Branch Ofce Head Ofce Local Network ID 192.168.0.0/24 192.168.1.0/24 Local Router IP 69.1.121.30 69.1.121.3 Remote Network ID 192.168.1.0/24 192.168.0.0/24 Remote Router IP 69.1.121.3 69.1.121.30 IKE Pre-shared Key 12345678 12345678 VPN[...]

  • Page 105

    Conguring IPSec VPN in the Head Ofce Function Description Name IPSec_HeadOfce Give a name of IPSec Connection Local Network Subnet Select Subnet from Local Network drop-down menu. IP Address 192.168.1.0 Head ofce network Netmask 255.255.255.0 Remote Secure Gateway IP (or Hostname) 69.121.1.30 IP address of the head ofce router (in W [...]

  • Page 106

    Conguring IPSec VPN in the Branch Ofce Function Description Name IPSec_BranchOfce Give a name of IPSec Connection Local Network Subnet Select Subnet from Local Network drop-down menu. IP Address 192.168.0.0 Branch ofce network Netmask 255.255.255.0 Remote Secure Gateway IP (or Hostname) 69.121.1.3 IP address of the head ofce router ([...]

  • Page 107

    Example: Conguring an IPSec Host to LAN VPN Connection 102[...]

  • Page 108

    Conguring IPSec VPN in the Ofce Function Description Name IPSec Give a name of IPSec Connection Local Network Subnet Select Subnet from Local Network drop-down menu. IP Address 192.168.1.0 Head ofce network Netmask 255.255.255.0 Remote Secure Gateway IP (or Hostname) 69.121.1.30 IP address of the head ofce router (in W AN side) Remote N[...]

  • Page 109

    L2TP (Layer T wo T unneling Protocol) T wo types of L2TP VPN are supported Remote Access and LAN-to-LAN (please refer below for more information.). Fill in the blank with information you need and click Add to create a new VPN connection account. Active: This function activates or deactivates the PPTP connection. Check Active checkbox if you want th[...]

  • Page 110

    Connection T ype: Remote Access or LAN to LAN Name: A given name for the connection (e.g. “connection to ofce”). Connection T ype: Remote Access or LAN to LAN. T ype: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server , e.g. your ofce server), check Dial In operates as a VPN server . When con?[...]

  • Page 111

    SHA1: A one-way hashing algorithm that produces a 160−bit hash. Encryption: Select the encryption method from the pull-down menu. There are four options, DES, 3DES, AES and NULL. NULL means it is a tunnel only with no encryption. 3DES and AES are more powerful but increase latency . DES: Stands for Data Encryption Standard, it uses 56 bits as an [...]

  • Page 112

    Example: Conguring a L2TP VPN - Remote Access Dial-in Connection A remote worker establishes a L2TP VPN connection with the head ofce using Microsoft's VPN Adapter (included with Windows XP/2000/ME, etc.). The router is installed in the head ofce, connected to a couple of PCs and Servers. 107[...]

  • Page 113

    Conguring L2TP VPN in the Ofce The input IP address 192.168.1.200 will be assigned to the remote worker . Please make sure this IP is not used in the Ofce LAN. Function Description Name VPN_L2TP Give a name of L2TP Connection Connection T ype Remote Access Select Remote Access from the Connection T ype drop-down menu T ype Dial in Select D[...]

  • Page 114

    Example: Conguring a Remote Access L2TP VPN Dial-out Connection A company’s ofce establishes a L2TP VPN connection with a le server located at a separate location. The router is installed in the ofce, connected to a couple of PCs and Servers. 109[...]

  • Page 115

    Conguring L2TP VPN in the Ofce The input IP address 192.168.1.200 will be assigned to the remote worker . Please make sure this IP is not used in the Ofce LAN. Function Description Name VPN_L2TP Give a name of L2TP Connection Connection T ype Remote Access Select Remote Access from the Connection T ype drop-down menu T ype Dial out Select [...]

  • Page 116

    L2TP Connection - LAN to LAN L2TP VPN Connection Name: A given name for the connection Connection T ype: Remote Access or LAN to LAN. T ype: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server , e.g. your ofce server), check Dial In to have it operate as a VPN server . When conguring your router to[...]

  • Page 117

    Active as default route: Commonly used by the Dial-out connection which all packets will route through the VPN tunnel to the Internet; therefore, active the function may degrade the Internet performance. Remote Host Name (Optional): Enter hostname of remote VPN device. It is a tunnel identier from the Remote VPN device matches with the Remote ho[...]

  • Page 118

    Example: Conguring L2TP LAN-to-LAN VPN Connection The branch ofce establishes a L2TP VPN tunnel with head ofce to connect two private networks over the Internet. The routers are installed in the head ofce and branch ofce accordingly . 1 13[...]

  • Page 119

    Conguring L2TP VPN in the Head Ofce The IP address 192.168.1.200 will be assigned to the router located in the branch ofce. Please make sure this IP is not used in the head ofce LAN. Function Description Name HeadOfce Give a name of L2TP Connection Connection T ype LAN to LAN Select LAN to LAN from the Connection T ype drop-down menu[...]

  • Page 120

    Conguring L2TP VPN in the Branch Ofce The IP address 69.1.121.30 is the Public IP address of the router located in head ofce. If you registered the DDNS (please refer to the DDNS section of this manual), you can also use the domain name instead of the IP address to reach the router . Function Description Name BranchOfce Give a name of L[...]

  • Page 121

    1 16 V oIP - V oice over Internet Protocol V oIP enables telephone calls through existing Internet connection instead of going through the PSTN (Public Switched T elephone Network). It is not only cost-ef fective, especially for a long distance telephone charges, but also toll-quality voice calls over the Internet. Here are the items within the V o[...]

  • Page 122

    1 17 SIP Device Parameters This section provides easy setup for your V oIP service. Phone port 1 and 2 can be registered to different SIP Service Provider . SIP Device Parameters SIP: T o use V oIP SIP as V oIP call signaling protocol. Default is set to Disable. Silence Suppression (V AD): V oice Activation Detection (V AD) prevents transmitting th[...]

  • Page 123

    1 18 Advanced – Parameters V oIP through IP Interface: IP Interface decides where to send/receive the voip trafc; it includes: ipwan and iplan. Easy way to select the interface is to check the location of the SIP server . If it locates some where in the Internet then select ipwan. If the V oIP SIP server is on the local Network then select ipl[...]

  • Page 124

    1 19 T o take your phone OFFHOOK, lift the receiver then press Hook/Flash until you hear your normal PSTN dialtone, not your V oIP dialtone. W ait several seconds and then press Check Level. Y ou should check the OFFHOOK value for each telephone you have connected to this device. Set the OFFHOOK voltage to the lowest setting registered for all your[...]

  • Page 125

    120 SIP Accounts This section reects and contains basic settings for the V oIP module from selected provider in the Wizard section. Fail to provide correct information will halt making calls out to the Internet. Prole Name: U ser-dened name is for identifying the Prole. Registrar Address (or Hostname): Indicate the V oIP SIP registrar I[...]

  • Page 126

    121 Phone Port This section displays status and allows you to edit the account information of your Phones. Click Edit to update your phone information. Port: It allows you to change the phone port setting for specify FXS port. *69 (Return Call): Dial *69 to return the last missed call. It is only available for V oIP call(s). *20 (Do not Disturb ON)[...]

  • Page 127

    122 without waiting. Note: Refer to Special Dial Code section in this Manual for more details. Codec Preference Codec is known as Coder-Decoder used for data signal conversion. Set the priority of voice compression; Priority 1 owns the top priority . G.729: It is used to encoder and decoder voice information into a single packet which reduces the b[...]

  • Page 128

    123 PSTN Dial Plan (Router with LINE port only) This section enables you to congure “V oIP with PSTN switching” on your system. Y ou can dene a range of dial plans to make regular call from V oIP switching to PSTN line. Prex numbers is essential key to make a distinguishing between V oIP and Regular phone call. If actual numbers dialed[...]

  • Page 129

    124[...]

  • Page 130

    125 PSTN Dial Plan Examples: Dial with Prex 1. If you dial 01223 707070, number 01223707070 will be dialed out via FXO to make a regular phone call. Dial without Prex 2. If you dial 9102, the number 102 will only be dialed out via FXO port to make a regular phone call. Dial at T imeout 3. If you only dial 01223 7070 and no more numbers, after[...]

  • Page 131

    126 Even though 7070 (only 4 digits) does not match with number of digits 6 dened in the led, 7070 is still a valid phone number since it has not exceeded 6 digits. Dial at T imeout no Prex 4. If you only dial 97070 and no more numbers, after the timeout activates, 7070 will be dialed without prex to make a regular call via FXO port. Ev[...]

  • Page 132

    127 V oIP Dial Plan This section helps you to make a telephony number dialed as making a regular call via V oIP . Y ou no longer need to memorize a long dial string of number for making a V oIP call. Go to Conguration > V oIP > V oIP Dial Plan. Dial Plan Rules Click the Add button to create and dene a V oIP dial-plan rule(s). Prex Pr[...]

  • Page 133

    128 Main Digit Sequence: The call(s) can be called out via SIP or PSTN or ENUM. x: Any numeric number between 0 and 9. . ( period ): Repeat numeric number(s) between 0 and 9. * (asterisk sign): It is normal character ‘* ’ on phone key pad. Please check if special service(s) is provided by your V oIP Service Provider or your Local T elephone Ser[...]

  • Page 134

    129 **xx*x. Starting with ‘** sign ’ + a ny two digit numbers between 0 + any number (0-9) in variable length. Maximum length is 16. #xx. Starting with ‘# sign ’ + a ny digit number (0-9) in variable length but no shorter than 1 digits . Maximum length is 16. ##xx*x. Starting with ‘## sign ’ + a ny two digit numbers + ‘* sign ’ + an[...]

  • Page 135

    130 Call Feature V oIP has all the basic features of a traditional phone. Besides the provided basic features, V oIP also comes with several enhanced features that allows you to further customize their settings to suit your personal needs such as call forwarding setting, call waiting time length, conference call feature, anonymous call feature and [...]

  • Page 136

    131 Ring & T one This section allows advanced user to change the existing or newly dened parameters for the various ring tones (dial tone, busy tone, answer tone and etc.) Country Specic Ring & T one Region: Select a country ring-tone, from the drop-down list, where you are located. This V oIP router provides default parameter of ring[...]

  • Page 137

    132 T one Parameters Y ou may need to check with your local telephone service provider for such information. Also, it is recommended that this option be congured by advance d user unless you are instructed to do so. Click Apply to apply the settings.[...]

  • Page 138

    133 QoS - Quality of Service QoS function helps you to control your network trafc for each application from LAN (Ethernet and/or Wireless) to W AN (Internet). It facilitates you to control the different quality and speed of through put for each application when the system is running with full loading of upstream. Here are the items within the Qo[...]

  • Page 139

    134 Destination IP address Range : The destination IP address or range of packets to be monitored. Destination Port : The destination port of packets to be monitored. DSCP Marking : Dif ferentiated Services Code Point (DSCP), it is the rst 6 bits in the T oS byte. DSCP Marking allows users to assign specic application trafc to be executed [...]

  • Page 140

    135 information. Protocol : The name of supported protocol. Rate Limit : T o limit the speed of outbound trafc Source IP Address Range : The source IP address or range of packets to be monitored. Source Port(s) : The source port of packets to be monitored. Destination IP Address Range : The destination IP address or range of packets to be monito[...]

  • Page 141

    136 Inbound IP Throttling (W AN to LAN) IP Throttling allows you to limit the speed of IP trafc. The value entered will limit the speed of the application that you set to the specied value’s multiple of 32kbps. Name : U ser-dene description to identify this new policy/application. Time Schedule : Scheduling your prioritization policy . R[...]

  • Page 142

    137 Example: QoS for your Network Connection Diagram R estri cted P C N o rm a l P C s V o I P[...]

  • Page 143

    138 Information and Settings Upstream: 928 kbps Downstream: 8 Mbps V oIP User : 192.168.1.1 Normal Users : 192.168.1.2~192.168.1.5 Restricted User: 192.168.1.100[...]

  • Page 144

    139 Mission-critical application Mostly the VPN connection is mission-critical application for doing data exchange between head and branch ofce. The mission-critical application must be sent out smoothly without any dropping. Set priority as high level for preventing any other applications to saturate the bandwidth. V oice application V oice is [...]

  • Page 145

    140 With above settings that help to limit utilization of upstream of FTP . T ime schedule also help you to only limit utilization at daytime. Advanced setting by using IP throttling With IP throttling you can specify more detail for allocating bandwidth; even the applications are located in the same level. Upstream: 928kbps (29*32kbps) Mission-cri[...]

  • Page 146

    141 Sometime your customers or friends may upload their les to your FTP server and that will saturate your downstream bandwidth. The settings below help you to limit bandwidth for the restricted application.[...]

  • Page 147

    142 V irtual Server (known as Port Forwarding) In TCP/IP and UDP networks a port is a 16-bit number used to identify which application program (usually a server) incoming connections should be delivered to. Some ports have numbers that are pre-assigned to them by the IANA (the Internet Assigned Numbers Authority), and these are referred to as “we[...]

  • Page 148

    143 Add V irtual Server Because NA T can act as a “natural” Internet rewall, your router protects your network from being accessed by outside users when using NA T , as all incoming connection attempts will point to your router unless you specically create Virtual Server entries to forward those ports to a PC on your network. When your ro[...]

  • Page 149

    144 enable port number 80 (Web/HTTP) and map to Router ’s IP Address. Then all incoming HTTP requests from you (Remote side) will be forwarded to the Router with IP address of 192.168.1.254. Since port number 80 has already been predened, next to the Application click Helper . A list of predened rules window will pop and select HTTP_Sever .[...]

  • Page 150

    145 Edit DMZ Host The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets will be checked by the Firewall and NA T algorithms then passed to the DMZ host, when a packet received does not use a port number used by any other Virtual Server entries. Cautious: This Lo[...]

  • Page 151

    146 Edit One-to-One NA T (Network Address T ranslation) One-to-One NA T maps a specic private/local IP address to a global/public IP address. If you have multiple public/W AN IP addresses from you ISP , you are eligible for One-to-One NA T to utilize these IP addresses. Go to Conguration > Virtual Server > Edit One-to-one NA T NA T T yp[...]

  • Page 152

    147 Application : Users-dened description to identify this entry or click drop-down menu to select existing predened rules. : 20 predened rules are available. Application, Protocol and External/Redirect Ports will be lled after the selection. Protocol : It is the supported protocol for the virtual server . In addition to specifying the [...]

  • Page 153

    148 Example: List of some well-known and registered port numbers. The Internet Assigned Numbers Authority (IANA) is the central coordinator for the assignment of unique parameter values for Internet protocols. Port numbers range from 0 to 65535, but only ports numbers 0 to 1023 are reserved for privileged services and are designated as “well-know[...]

  • Page 154

    149 T ime Schedule The T ime Schedule supports up to 16 time slots which helps you to manage your Internet connection. In each time prole, you may schedule specic day(s) i.e. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. This T ime Schedule correlates closely with router ’s time, since rou[...]

  • Page 155

    150 Conguration of T ime Schedule Edit a T ime Slot Choose any T ime Slot (ID 1 to ID 16) to edit, click Edit radio button. 1. Note: Watch it carefully , the days you have selected will present in capital letter . Lower case letter shows the day(s) is not selected, and no rule will apply on this day(s). A detailed setting of this T ime Slot will[...]

  • Page 156

    151 Delete a T ime Slot Select the Delete radio button of the selected T ime Slot under the Time Slot section, and click the Edit/ Delete button to conrm the deletion of the selected T ime prole, i.e. erase the Day and back to default setting of Start T ime / End T ime.[...]

  • Page 157

    152 Advanced Conguration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router . Users who do not understand the features should not attempt to recongure their router , unless advised to do so by support staff. Here are the items within the Advanced section: Static Route, Dyna[...]

  • Page 158

    153 Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname, allowing users whose ISP does not assign them a static IP address to use a domain name. This is especially useful for hosting servers via your ADSL connection, so that anyone wishing to connect to you may use your domain name, rather than having [...]

  • Page 159

    154 Check Email This function allows you to have the router check your POP3 mailbox for new Email messages. The Mail LED on your router will light when it detects new messages waiting for download. Y ou may also view the status of this function using the Status – Email Checking section of the web interface, which also provides details on the numb[...]

  • Page 160

    155 Device Management The Device Management advanced conguration settings allow you to control your router ’s security options and device monitoring features. Device Host Name Host Name: Assign it a name . (The Host Name cannot be used with one word only . There are two words should be connected with a ‘.’ at least. Example: Host Name: hom[...]

  • Page 161

    156 For Example: User A changes HTTP port number to 100 , species their own IP address of 192.168.1.55 , and sets the logout time to be 100 seconds. The router will only allow User A access from the IP address 192.168.1.55 to logon to the W eb GUI by typing: http://192.168.1.254:100 in their web browser . After 100 seconds, the device will autom[...]

  • Page 162

    157 for “security”, but is widely accepted as the SNMPv2 standard. SNMPv3 is a strong authentication mechanism, authorization with ne granularity for remote monitoring. T raps supported: Cold Start, Authentication Failure. The following MIBs are supported: From RFC 1213 (MIB-II) System group System group Interface group Address Translation g[...]

  • Page 163

    158 IGMP IGMP , known as Internet Group Management Protocol, is used to management hosts from multicast group. IGMP Forwarding: Accepting multicast packet. Default is set to Enable. IGMP Snooping: Allowing switched Ethernet to check and make correct forwarding decisions. Default is set to Disable. VLAN Bridge This section allows you to create VLAN [...]

  • Page 164

    159 Logout T o exit the router web interface, choose Logout. Please save your conguration setting before logging out of the system. Be aware that the router conguration interface can only be accessed by one PC at a time. Therefore when a PC has logged into the system interface, the other users cannot access the system interface until the curr[...]

  • Page 165

    160 Chapter 5: T roubleshooting If your router is not functioning properly , please refer to the suggested solutions provided in this chapter . If your problems persist or the suggested solutions do not meet your needs, please kindly contact your service provider or Billion for support. Problems with the router Problem Suggested Action None of the [...]

  • Page 166

    161 Problem with LAN interface Problem Suggested Action Cannot PING any PC on LAN Check the Ethernet LEDs on the front panel. The LED should be on for the port that has a PC connected. If it does not lit, check to see if the cable between your router and the PC is properly connected. Make sure you have rst unin - stalled your rewall program b[...]

  • Page 167

    162 Appendix: Product Support & Contact Following the suggestions listed in the T roubleshooting section of the user manual can help you solve most of your problems. However if your problems persist or you come across other technical issues that are not listed in the T roubleshooting section, please contact the dealer from where you purchased y[...]

  • Page 168

    163[...]