CNET CWR-854 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of CNET CWR-854, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of CNET CWR-854 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of CNET CWR-854. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of CNET CWR-854 should contain:
- informations concerning technical data of CNET CWR-854
- name of the manufacturer and a year of construction of the CNET CWR-854 item
- rules of operation, control and maintenance of the CNET CWR-854 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of CNET CWR-854 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of CNET CWR-854, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the CNET service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of CNET CWR-854.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the CNET CWR-854 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    www.cnetusa.com 1 VPN Setup for CNet’ s CWR-854 802.1 1g Wireless Router The instructions below are for getting an IPSec client to connect CNet’s wireless broadband router CWR-854(F) with VPN capab ility. The VPN feature can be used for secure remote access to a home or work network from anywhere on the Internet. VPN Client Software used for th[...]

  • Page 2

    www.cnetusa.com 2 Connect securely to home/work computers over the Internet. You could be at work, at a friend’s house or on the road. Equipment Needed: 1- A solid broadband connection to the Intern et at home or work where CWR-854 is used. CWR-854 needs to be configured for IPSec VPN capability 2- A client system with a VPN client soft ware. W e[...]

  • Page 3

    www.cnetusa.com 3 Router’s VPN Configuration: Please use the routers’s default IP ad dress 192.168.1.254 to access its con figuration.[...]

  • Page 4

    www.cnetusa.com 4 As shown above, CWR-854 can store 10 different VPN profiles. We need to enable IPSec VPN and then click on edit to configure the first profile. - Use any name for the connection. - Authentication will be through the Pre-Shared Key (PSK). Basically anyone who wants to have VPN connectivity to the route r needs to have this key. We [...]

  • Page 5

    www.cnetusa.com 5 The last step to finalize VP N configuration is to enter the PSK (Pre-Shared Key) and save settings. The router is now ready to accep t incoming VPN connections.[...]

  • Page 6

    www.cnetusa.com 6[...]

  • Page 7

    www.cnetusa.com 7 Second Scenario: In this scenario the remote system is behind a NAT router for example another CWR- 854. The connection is from VPN clie nt >> NAT router>> Cable/DSL modem >> Internet >>Cable/DSL modem >>VPN router. The only difference in the configuration with scenario one is to configure the VPN rou[...]

  • Page 8

    www.cnetusa.com 8 VPN Client Configuration The client software used for this test is SSH-Sentinel v1.4. The SSH Sentinel software is configured in two steps. The fi rst one involves the creation of a key management and the second one is the actual VPN security policy. After the software is installed, righ t c lic k on the Sentinel icon in the task [...]

  • Page 9

    www.cnetusa.com 9 From the “New Authentication Key” window , select the “create a pre-shared key” radio button and click next.[...]

  • Page 10

    www.cnetusa.com 10 In the next window, type a name and the same exact key you have entered in the router’s VPN configuration and click “Finish”.[...]

  • Page 11

    www.cnetusa.com 11 Configuring SSH Sentinel Security Policy From the Security Policy window, click on the “Security Policy” tab, select VPN connections and click on “Add” button. In the “Add VPN Connection” window, ente r an IP address or a Domain Name associated with the WAN IP of the CNet router. For remo te network, click the “…?[...]

  • Page 12

    www.cnetusa.com 12 Click OK to save the changes and retu rn to the “Rule Properties” window.[...]

  • Page 13

    www.cnetusa.com 13 Click on the IPSec/IKE proposal settings bu tton to view proposal parameters.[...]

  • Page 14

    www.cnetusa.com 14 Click OK to go back to “Rule Properties” window. Click on the Advanced tab to view Security association lifetimes as well as Audit and som e other advanced settings. If the VPN client system is sitting behi nd a NAT device, you’ll need to check the box next to “Pass NAT device” using NAT-T.[...]

  • Page 15

    www.cnetusa.com 15 At this stage we’ve completed SSH Sentin el configuration and we are ready to perform a diagnostic test. Click OK to go back to the SSH Sentinel Policy Editor window and click “Apply” to update s ecurity policy changes we’ve made. Now click on “Diagnostics” to start probing th e connection to the VPN server. If Diagno[...]

  • Page 16

    www.cnetusa.com 16 We can now use the SSH Sentinel icon in th e task bar, select the VPN server and establish the VPN tunnel.[...]

  • Page 17

    www.cnetusa.com 17 Testing VPN Connection To test the VPN connection, bring up a DOS window and try a ping to the IP address of one of the computers at home. If pi ng is successful then the connection is established and you should be able to see and map network drives to systems behind the VPN router.[...]