1g Wireless Security Router User Guide 8/05/2003
11g Wireless Security Router User Guide FCC Interference Statement This device complies with Part 15 of FCC rule. Operation is subject to the following two conditions: 9 This device may not cause harmful interference. 9 This device must accept any interference received, including interference that may cause undesired operation. This 11g Wireless Security Router has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
11g Wireless Security Router User Guide Manufacturer’s Disclaimer State The information in this document is subject to change without notice and does not represent a commitment on the part of vendor. No warranty or representation, either expressed or implied, is made with respect to the quality, accuracy or fitness for any particular prupose of this document.
11g Wireless Security Router User Guide Table of Contents INTRODUCTION................................................................................................................................................. 1 About this Guide ............................................................................................................................................ 1 Chapter 1: Get to know your 11g Wireless Security Router ..........................................................................
11g Wireless Security Router User Guide 4-9 DMZ HOST ................................................................................................................................................. 40 4-10 DYNAMIC ROUTING .................................................................................................................................. 42 4-11 STATIC ROUTING ......................................................................................................................................
11g Wireless Security Router User Guide C-2.2 Build 2 Filter Lists: “WinXPÆBroadband VPN Router” and “Broadband VPN RouterÆWinXP”. 68 C-2.3 Configure Individual Rule of 2 Tunnels ............................................................................................. 71 C-2.4 Assign New IPsec Policy ................................................................................................................... 80 APPENDIX D: GLOSSARY .................................................................
11g Wireless Security Router User Guide Introduction Congratulations on your purchase of this 11g Wireless Security Router . This router is the perfect design product combining wireless and Ethernet network technology together. Fully compatible with IEEE 802.11g wireless standard, this device not only allows you to take advantage of mobility, but also to have fast Ethernet connection with built-in four 10/100 auto-sensing switch Ethernet ports.
11g Wireless Security Router User Guide Chapter 3: Internet Access This chapter describes the steps for the basic configuration and start up of the 11g Wireless Security Router . Chapter 4: Advanced Applications This chapter describes how to configure advanced functions in order to get the most from your 11g Wireless Security Router .
11g Wireless Security Router User Guide Chapter 1: Getting to know your 11g Wireless Security Router This chapter describes the package contents and provides a list of features and application illustrations of the 11g Wireless Security Router. 1-1 About The 11g Wireless Security Router The 11g Wireless Security Router is a hybrid design product which combines Ethernet technology and wireless access into a single stand-alone unit. The device allows you take advantages of both mobility and fast connection.
11g Wireless Security Router User Guide network send data to that dedicated access point. 11g Wireless Security Router uses “Infrastructure” network as Wireless LANs. Each wireless LAN PC within the range of the access point can communicate with other wireless LAN PCs within the range. 1-2 Contents of the 11g Wireless Security Router Package After carefully unpacking the shipping carton, check the contents listed below. 1. 11g Wireless Security Router. 2. Power Adapter. 3. User’s Manual 4.
g Wireless Security Router User Guide 9 9 9 9 9 9 9 9 9 Internet Explorer 5.0 or later. Built-in firewall to protect your PCs from outside intruders (NAT). Supports DHCP client to receive both a dynamic IP Address and a fixed IP Address from ISP. Built-in DHCP server to automatically assign and manage LAN IP addresses. Allow administrators to block specific internal users from accessing specified applications or services.
11g Wireless Security Router User Guide Chapter 2: Hardware Installation & Setup This chapter provides information about your 11g Wireless Security Router ’s physical features and gives step-by-step installation instructions. 2-1 Rear Panel & Connections The following figure shows the rear view of the 11g Wireless Security Router and illustrates how the cables connect to the interfaces on the rear panel. 1. 2. 3. 4.
11g Wireless Security Router User Guide Power: Green Diag Red For WLAN Enable /Activity: Green The Power LED illuminates when the Wireless 11g Router is powered on. The Diag LED illuminates when Router goes through its self-diagnosis mode during boot-up. It will turn off upon successful completion of the diagnostic. The Links LED illuminates when the wireless option is enabled. When the wireless option is disabled (through the web-based utility), the LED is off.
11g Wireless Security Router User Guide Select the “Configuration” tab. Note: For Windows 2000 & Windows XP Setting Click the “Local Area Connection” icon on the lower right hand side of your desktop screen. In the “Local Area Connection Status” window, click the “Properties” button then your Network window will appear.
11g Wireless Security Router User Guide There is only one tab, “General”, in the Network window. 2. Check whether the TCP/IP Protocol has already been installed onto your computer’s Ethernet card. Note that TCP/IP Protocol can be installed for a computer’s Dial-Up Adapter as well as for the Ethernet card. - If yes, go to step 7. - If no, click the “Add” button. 3. Double-click “Protocol” in the Select Network Component Type or highlight “Protocol” then click “Add”.
11g Wireless Security Router User Guide 4. Highlight “Microsoft” under the list of manufacturers. Double-click “TCP/IP” from the list on the right or highlight “TCP/IP” then click “OK” to install TCP/IP. 5. After a few seconds, you will be returned to the Network window. The TCP/IP Protocol should now be on the list of installed network components (see 2 above). 6. Click the “Properties” button. The TCP/IP Properties window consists of several tabs. Choose the “IP Address” tab. 7.
11g Wireless Security Router User Guide Fixed IP Addresses Configuration Fixed IP addresses may be assigned to network devices for many reasons, such as the server PCs or printers which are consistently accessed by multiple users. To set up computers with fixed IP Addresses, go to the “IP Address” tab of the “TCP/IP Properties” window as shown above. Select “Specify an IP address” and enter “192.168.1.
11g Wireless Security Router User Guide Click on the “DNS Configuration” tab and select “Enable DNS”. Enter the “DNS IP Address” obtained from your ISP in the “Server Search Order” location. Then click the “Add” button. Click on the “Gateway” tab and enter the 11g Wireless Security Router ’s default gateway value 192.168.1.1 in the “New gateway” field, then click “Add” Botton. Click “OK”. Restart your PC to complete the TCP/IP installation.
11g Wireless Security Router User Guide Chapter 3: Internet Access This chapter describes the procedures necessary to configure the basic functions and begin using your 11g Wireless Security Router . If you follow these procedures correctly, there should be no problem in accessing the Internet via your 11g Wireless Security Router .
11g Wireless Security Router User Guide 3-3 Initial Configuration – Setup The “OnePage Setup” screen is the first screen you will see when you access the Utility. If the router has already been successfully installed and set up, this screen’s values will already be properly configured. Host Name: This entry is required by certain ISPs. Domain Name: This entry is required by certain ISPs. Time Zone: Select the time zone of your location from the drop down list.
11g Wireless Security Router User Guide Private IP Address: Wireless: The “Device IP Address” and “Subnet Mask” of the router are used for the internal LAN. The default values are 192.168.1.1 for the IP Address and 255.255.255.0 for the Subnet Mask. Check “Enable” or “Disable” to make the wireless LAN function active or inactive. SSID: As the acronym for Service Set Identifier, SSID is the unique name shared among all clients and Wireless Security Router in a same wireless network.
11g Wireless Security Router User Guide Default TX Key: Select one of the four keys to be the encryption key you are going to use in the wireless network. To be sure that all the points in a same wireless network have to have the same encryption key. Click “Apply” after making any changes. WAN Connection Type: There are four options for WAN connection types, Obtain IP automatically, Static IP, PPPoE, and PPTP. The connection type you need to choose is dependent upon the settings assigned by your ISP.
11g Wireless Security Router User Guide Specify WAN IP Address: Enter the IP address provided by your ISP. Subnet Mask: Enter the subnet mask values provided by your ISP. Default Gateway IP Address: Your ISP will provide you with the Default Gateway IP Address. Domain Name Server (DNS): Your ISP will provide you with at least one DNS IP Address. Multiple DNS IP settings are common. The first available DNS entry is used in most cases. PPPoE PPPoE is a dial-up connection type provided by some ISPs.
11g Wireless Security Router User Guide disconnection occurs in the “Max Idle Time” location. Keep Alive: This function keeps your PPPoE connection enable even if it remains idle. However, in some situation, PPPoE session cannot be established immediately after disconnection. This is because the system on the ISP’s site may need a little time to restore itself. You may need to check with your ISP to obtain detail of how long you need to wait before re-establish the PPPoE session.
11g Wireless Security Router User Guide PPTP PPTP is the acronym of Point to Point Tunneling Protocol. Usually, it is used to encapsulate other protocols’ packets for transmission over IP network. Some ISPs use this protocol as way to establish the initial connection between the CPE (end-user side) and DSLAM (ISP side). If your ISP uses PPTP to establish the connection, you should select this item and follow the steps below. Specify WAN IP Address: Enter the IP address provided by your ISP.
11g Wireless Security Router User Guide information in the “Redial Period” field. HBS If your ISP uses HBS to establish the connection, you should select this item and follow the steps below. User Name: Enter the user name provided by your ISP. Password: Enter the password provided by your ISP. Heart Beat Server: Enter the IP address provided by your ISP. This setting is available only for some areas. Check your ISP for more detailed information.
11g Wireless Security Router User Guide Chapter 4: Advanced Applications This chapter provides information on how to set up and use the advanced functions of your 11g Wireless Security Router . 4-1 Firewall The settings page allows you to configure advanced Firewall functions, providing superior security for your network environment. Firewall Option: Enabling this function will prevent DoS (Denial of Service) attacks and activates the SPI (Stateful Packet Inspection).
11g Wireless Security Router User Guide viruses are also written in these languages. If you deny access to either of these, you may run the risk of not having access to certain web pages. A cookie is a small piece of data (usually in the form of a text file), which is stored on your PC when you visit certain web sites. This allows the server to identify your machine at a future date. The cookie normally contains an ID number but can also contain other information.
11g Wireless Security Router User Guide from any others you have created. Note: The tunnel name set here does not always have to match the name used at the other end of the tunnel. However, certain VPN applications require a tunnel to have the same name at both ends of the tunnel. If the other end point with which you want to establish the tunnel dose not use this Wireless Security Router, it is important that you give the other side precise set up instructions and ensure that these are followed.
11g Wireless Security Router User Guide remain in the IP and Mask fields. (2) IP Address Selecting this item allows only the specific PC with the IP address you enter in the IP field to the tunnel. Only the PC with IP Address 192.168.2.51 can access the tunnel from the other end. (3) IP Range Selecting this item allows a specific group of PCs access to the tunnel. PCs with IP Address between 192.168.2.2 and 192.168.2.100 can access the tunnel from the other end.
11g Wireless Security Router User Guide (3) Any Accept remote requests from any IP address. Note that the router cannot initial VPN connection when “Any” is selected. Encryption: This item helps give your VPN connection added security. There are two different type of encryption: “DES” or “3DES”. DES uses 64-bit encryption key, and 3DES uses 128-bit encryption key. You may choose either of them, but be aware that both end of a VPN tunnel should use the same encryption type.
11g Wireless Security Router User Guide Manual keying allows you to manually enter the keys to be used for encryption and authentication. Enter the Keys (code) you wish to use for encryption and authentication separately in the “Encryption KEY” and “Authentication KEY” fields. Up to 23 alphanumeric characters are allowed in each field. Be aware that both ends of the VPN tunnel should use the same key management method in addition to same encryption and authentication keys.
11g Wireless Security Router User Guide Operation mode: There two options in this mode: Main and Aggressive. Main mode is the default and is more secure method. Aggressive mode is used when the devices at the remote end of the VPN tunnel use Aggressive mode. Mostly, it is used with dynamic IP addresses. Whenever the Main or Aggressive modes are selected, the router will accept both modes initialed by the remote VPN devices. Encryption: Select either DES or 3DES from the drop down list.
11g Wireless Security Router User Guide NetBIOS Broadcast: Check the box to allow NetBIOS traffic pass through the VPN tunnel. Anti-replay: Check the box to enable this function. This item will keep track of sequence numbers as data packets arrive and ensure security at the IP packet level. Keep-Alive: Check the box to re-establish the VPN tunnel connection whenever it is dropped. After the tunnel has been created, this function will keep the connection alive for a period of time.
11g Wireless Security Router User Guide ¾ Creating a tunnel between VPN router and VPN client with dynamic IP Address Once you are satisfied that your settings are correct, click the “Apply” button. Click the “Cancel” button to exit the screen without saving any changes.
11g Wireless Security Router User Guide 4-3 DHCP Configuration A DHCP (Dynamic Host Configuration Protocol) Server can automatically assign IP Addresses to each computer in your network. Unless you already have one in you LAN, it is highly recommended that you set your router to act as a DHCP server. Dynamic IP Address: Select “Enable” to use the DHCP server option of the router. If you already have a DHCP server in your network, set the router's DHCP option to “Disable”.
11g Wireless Security Router User Guide if the network transport is TCP/IP. For example, through WINS the two PCs that belong to different subnet can locate each other by name. Enter the IP address of WINS server and it will be assigned to DHCP clients. DHCP Clients Table Click the DHCP Clients Table button to show current DHCP client information. Apply Click this button after making any changes for activating the settings.
11g Wireless Security Router User Guide specific website listed on the location only. In contrast, to restrict users on the network to access the website listed on the location, check “Block” in this item. Web site or Key Words: Enter either a complete URL (Internet address) or keywords included in the URL. Exception IP Address: Enter the IP Address of LAN PC that will not be restricted by this rule. Apply Click this button after making any changes for activating the settings.
11g Wireless Security Router User Guide 4-6 Access Control The Access Control feature allows administrators to set up to 20 access policies to block or allow certain users from accessing the Internet or specific applications. Before using this function, the network PCs which you want to control the access limitation should be assigned fixed IP Addresses. Packet Filter: Select the number of policy rules you want to configure. There are up to 20 rules you can set. Note that these rules are sequencied.
11g Wireless Security Router User Guide external connections from Internet to your LAN. MAC: This item allows network administrators to use the MAC addresses of PCs to restrict users/computers from accessing the specific application you set in this rule. A MAC address is short for Media Access Control Address and is a hardware address that uniquely identifies each node on network. Enter the MAC addresses of the computers you wish to allow/block in each field.
11g Wireless Security Router User Guide 4-7 Virtual Server Settings The Virtual Server Settings application allows you to set up a maximum of ten public services that can be accessed by external users of the Internet, such as a Web Address, Email, FTP etc.. Each service is provided by a dedicated network computer (server) configured with a fixed IP Address.
11g Wireless Security Router User Guide to be used, select “Specify an IP address” and enter the IP Address and other necessary information provided by your ISP. Ports: Enter the desired service port numbers in the “Ports” fields. You can specify the protocol type as “TCP” or “UDP” from the drop-down list. If you are not sure which one to select, choose “Both”. A selection of well-known service port numbers is provided on this screen.
11g Wireless Security Router User Guide PC Anywhere host Quake 2 Quake III TCP UDP UDP UDP 5631 5632 27910 27660 (first player) "C:\Program Files\Quake III Arena\quake3.exe" +set net_port 27660 Telnet Server Web Server 27661 (second player) 23 80 TCP TCP UPnP Forwarding UPnP (Universal Plug and Play) is a standard introduced from Microsoft and UPnP Forum for interoperability.
11g Wireless Security Router User Guide UPnP Function: Check “Enable” will allow LAN side PCs that support UPnP to set virtual server. Before you enable the UPnP Forwarding, you have to set up individual network computers to act as servers and configure each with a fixed IP Address. In the “One Page Setup” screen, ensure the “Private IP Address” is set to the Router’s default setting of 192.168.1.1.
11g Wireless Security Router User Guide 4-8 Special Applications Some applications use multiple TCP/UDP ports to transmit data. Due to the NAT, these applications cannot work with the Wireless Security Router. Port Triggering allows some of these applications to work properly. Note that only one PC can use each Port Triggering setting at any time. Application name: Enter the name of application you wish to configure in the Name column to identify this setting.
11g Wireless Security Router User Guide Cancel Click this button if you are not satisfied with the settings in this page before clicking Apply. The following is a list of port numbers used on some popular applications: Application Battle.
11g Wireless Security Router User Guide Before setting up a LAN PC to act as a DMZ Host, you should configure it using a fixed IP Address. Note: In the “One Page Setup” screen, ensure the Private IP Address is set to the Wireless Security Router’s default setting of 192.168.1.1. In the Public IP Address area, select “Specify an IP Address”, and then enter the IP Address and other necessary information provided by your ISP.
11g Wireless Security Router User Guide 4-10 Dynamic Routing The Dynamic Routing feature allows your Wireless Security Router to exchange routing information with other routers in the network. Enabling this feature is likely to enhance performance of your Wireless Security Router. TX: From the drop-down list, select one of the routing information types, “RIP-1”, “RIP-1 Compatible”, or “RIP-2”, to enable the “TX” (transmit) function. “RIP-1” is the protocol used by older routers.
11g Wireless Security Router User Guide 4-11 Static Routing The Static Routing feature allows PCs that are connected to the Wireless Security Router, either directly or through a hub/switch (in the immediate LAN), to communicate with other PCs in the respective LAN segment which are connected to the Wireless Security Router through another router (destination LAN). Up to 20 route entries may be input into the Wireless Security Router.
11g Wireless Security Router User Guide Delete this entry Delete the selected route entry information. Destination LAN IP and Enter the IP Address and Subnet Mask of the destination LAN that the immediate LAN is to communicate with. Taking the Subnet Mask: above diagram as an example, enter 192.168.2.0 in the “Destination LAN IP” field and 255.255.255.0 in the “Subnet Mask” field. Default Gateway: Enter the IP Address of the router that forwards data packets to the destination LAN.
11g Wireless Security Router User Guide Wireless Station Status: The “Active MAC Table” shows the MAC addresses of wireless clients, which have the same ESSID and WEP key with Wireless Security Router. When the “MAC Filter” function is disabled, the background color is gray. Click the “Active MAC Table” button will display all MAC addresses of wireless nodes on your WLAN.
11g Wireless Security Router User Guide Beacon Interval: RTS Threshold: Fragmentation Threshold: Wireless MAC Entry There are 32 sets divided into four groups in this function. You can choose each group by selecting from the pop-down list. Enter the MAC addresses of the computers you wish to block in the columns and click the Filter field beside the MAC address, and then that user will be blocked to link to WLAN and Internet. If the “Filter” field isn’t checked, that MAC address won’t be blocked.
11g Wireless Security Router User Guide Authentication Type: Select either Open System or Share Key as authentication type. If you are not sure, select both. Apply Click this button after making any changes for activating the settings. Cancel Click this button if you are not satisfied with the settings in this page before clicking Apply. 4-13 DDNS “DDNS” is an acronym for Dynamic Domain Name Service.
11g Wireless Security Router User Guide DDNS Service: Check the “Enable” option if you wish to activate this function. Username: After you have applied for the DDNS service from DynDNS.org, you will be issued with a Username. Enter this username in the “Username” field. Password: DynDNS.org, will also issue you with a password. Enter the detail in the “Password” field. Host Name: DynDNS.org, will provide you with a Host Name. Enter this name in the “Host Name” field.
11g Wireless Security Router User Guide Chapter 5: Management This chapter provides information on using Macintosh computers in your network. The instructions given here are for system software version 8.0 or above, which comes with the TCP/IP Protocol preloaded and supports DHCP Addressing. 5-1 Device Administration Settings This feature allows the administrator to manage the Wireless Security Router by setting certain parameters.
11g Wireless Security Router User Guide Administrator Password: Enter the password you want to use into the “Password Change” field and re-enter it into the “Password Confirm” field for confirmation. Be sure that the password is less than 64 characters long and without any special characters or spaces.. SNMP Function: As with the Password, SNMP community allows authorized persons to access this router through the SNMP Management tool.
11g Wireless Security Router User Guide read-only information about this router or have the authority to change the configuration. Also, the administrator can define any specific community and configure its limits as Read-Only or Read-Write from the right side drop-down box. WAN MAC Change: The WAN MAC address can be changed from the original values if necessary. Some ISPs require users to change the WAN MAC address to a registered one when users change their access equipment. External Admin.
11g Wireless Security Router User Guide 5-2 Status Monitor This screen shows the router’s current status. All of the information provided is read-only. Product Name: This field shows the name of this router. Firmware Version: This field shows the installed version of the firmware. Login: This column shows the login information of PPPoE or PPTP. You can manually initiate the connection or make a disconnection by clicking the appropriate buttons.
11g Wireless Security Router User Guide in “One Page Setup: Public IP Address”, the information will be the same as your input. DHCP Release: Click this button to eliminate the IP address obtained from DHCP server. DHCP Renew: Click this button to refresh the IP address from DHCP server. Note that the “DHCP Release” and “DHCP Renew” button only show up when you select “Get IP Address Automatically” in the OnePage Setup.
11g Wireless Security Router User Guide Send Log To: Enter the IP address of the PC that you wish to use to view the Log information. View Log: Click this button to view the log on-line. Send Log via E-mail: The Firewall log can be sent via e-mail. Denial of Service Thresholds: The threshold is used to determine the attempt of establishing connection is DoS attack or not. SMTP Mail Server: The domain name of IP Address of your ISP’s outgoing e-mail server.
11g Wireless Security Router User Guide Backup: Click “Backup” button save the current configuration as a backup file in your hard disk. Restore: Enter path of the configuration file you saved on the PC. You can click “Browse” to view the folders and select the file. Click “Restore” to retrieve it. 5-5 Upgrade Firmware This setting page allows you to upgrade the latest version firmware to keep your router up-to-date.
11g Wireless Security Router User Guide Note that don’t power off the router during the firmware upgrading, otherwise the incompletion of firmware upgrading will cause serious damage to the integrity of the router’s firmware that will lead to fail to boot the router again. 5-6 Diagnostic-Ping/Tracert This function allows you to test the connection between router and LAN or between router and Internet.
11g Wireless Security Router User Guide starting to ping the destination device. Start: Click this button to begin the ping test. Ping Result: The result will show the numbers of sending packet, numbers of packet receiving, and the average return time. Tracert Tracert Host: Enter the IP Address of destination device that you wish to trace the route between Router and that device. Trace Message: The result shows the routing information between Router and destination device.
11g Wireless Security Router User Guide Chapter 6: Macintosh Setup This chapter provides information on using Macintosh computers in your network. The instructions given here are for system software version 8.0 or above, which comes with the TCP/IP Protocol preloaded and supports DHCP Addressing. 6-1 Hardware Connections Connect your Macintosh computer to your 11g Wireless Security Router . If you have a newer computer, there will be a Ethernet port on the back.
11g Wireless Security Router User Guide - Select “Manually” in the “Configure” location from the drop-down list. - In the “IP Address” location, enter the IP Address that you want to assign to the computer. (see the notes on Fixed IP Addresses 2-4 above). - Enter “255.255.255.0” in the “Subnet Mask” location. Enter “192.168.1.1” (the 11g Wireless Security Router ’s default IP Address) in the “Router Address” location.
11g Wireless Security Router User Guide - has provided the information. Close the window. 5. Click “Confirm”. TCP/IP is now configured for manual IP Addressing. 6. Configure your 11g Wireless Security Router (see 5.3 above).
11g Wireless Security Router User Guide Chapter 7: Trouble Shooting This chapter provides solutions to problems you may encounter during installation and operation of your 11g Wireless Security Router . Hardware Q: The Power LED is off. Check that the power cable is properly connected to the 11g Wireless Security Router , the power adapter and the socket. Q: The LAN Link LED is off. Check that the computer, hub or switch is properly connected to the 11g Wireless Security Router .
11g Wireless Security Router User Guide address automatically. Ensure that your PC is using an IP Address within the range 192.168.1.2 to 192.168.1.254 and thus compatible with the 11g Wireless Security Router default IP address of 192.168.1.1 Finally, use the Ping command in MS-DOS mode to verify the network connection: Ping 127.0.0.1 to check the TCP/IP stack of your computer Ping gateway IP (Default: 192.168.1.1) to check the internal link of network.
11g Wireless Security Router User Guide 9 Check that the values as stated above are the same in Status Monitor (4-7). Q: I get a time out error when I enter a URL or IP address. A: Check whether other computers work. If they do, ensure the computer’s IP settings are correct (IP Address, Subnet Mask, Gateway IP Address and DNS) (3-3). Then check whether the 11g Wireless Security Router ’s settings are correct (3-3).
11g Wireless Security Router User Guide Appendix A: Frequently Asked Questions Q: What is the maximum number of IP Addresses the 11g Wireless Security Router can support? The 11g Wireless Security Router can support up to 253 IP Addresses in the range of 192.168.1.2~192.168.1.254. Q: Where should the 11g Wireless Security Router be installed on the network? In a typical environment, the 11g Wireless Security Router should be installed between the ADSL/Cable modem and your LAN.
11g Wireless Security Router User Guide www.yahoo.com, is easier to use than an IP address, such as 204.71.177.70. Q: What operating systems does 11g Wireless Security Router series support? 11g Wireless Security Router uses standard TCP/IP protocol, it can be operated as long as you have the TCP/IP protocol installed in your operating system (For example: Windows 9x, Windows NT, Windows 2000, etc.) Q: Can I use multiple E-mail accounts if I use 11g Wireless Security Router ? Yes, you can.
11g Wireless Security Router User Guide Appendix B: Technical Specifications Standards Compliance IEEE 802.3 10BASE-T IEEE 802.3u 100BASE-TX IEEE 802.
11g Wireless Security Router User Guide Appendix C: Configuring IPSec between a Microsoft Windows 2000 or XP PC and Broadband VPN Router This document illustrates the steps of Microsoft Windows 2000 (or XP) PC establishing a secure IPsec tunnel with this Broadband VPN Router. You can find detailed information on configuring the Microsoft Windows 2000 server at the Microsoft website: Microsoft KB Q252735 - How to Configure IPSec Tunneling in Windows 2000 http://support.microsoft.
11g Wireless Security Router User Guide 4. Deselect the Activate the default response rule check box, and then click Next button. 5. Click the Finish button, making sure the Edit check box is checked. C-2.2 Build 2 Filter Lists: “WinXPÆBroadband VPN Router” and “Broadband VPN RouterÆWinXP”. [Filter List 1] WinXPÆ Broadband VPN Router 1. In the to_VPNRouter Properties, deselect the Use Add Wizard check box, and then click Add button to create a new rule.
11g Wireless Security Router User Guide 2. From the IP Filter List tab, click the Add button. 3. Type an appropriate name “XPÆBroadband VPN Router” for the filter list, deselect the Use Add Wizard check box, and then click Add button. 4. In the Source address area, click My IP Address. 5. In the Destination address field, select A specific IP Subnet, and fill in the IP Address “192.168.1.0” and Subnet mask “255.255.255.0”.
11g Wireless Security Router User Guide 6. If you want to type a description for your filter, click the Description tab. 7. Click OK button. Then click OK(for WinXP) or Close (for Win2000) button on the IP Filter List Window. [Filter List 2] Broadband VPN RouterÆWinXP 1. On the IP Filter List tab, click the Add button. 2. Type an appropriate name “Broadband VPN RouterÆXP” for the filter list, click to clear the Use Add Wizard check box, and then click Add. 3.
11g Wireless Security Router User Guide 4. Address “192.168.1.0” and Subnet mask “255.255.255.0”. In the Destination address area, click My IP Address. 5. 6. If you want to type a description for your filter, click the Description tab. Click OK, and then click OK. C-2.3 Configure Individual Rule of 2 Tunnels [Tunnel 1] WinXPÆBroadband VPN Router 1.
11g Wireless Security Router User Guide Router”. 2. From the Filter Action tab, click the filter action “Require Security”, and click the Edit button. 3.
11g Wireless Security Router User Guide 4. unsecured communication, but always respond using IPsec check box. Select the Session key Perfect Forward Secrecy (PFS) and remember to check the PFS option on the Broadband VPN Router, and then click the OK button. 5. From the Authentication Methods tab, click the Edit button. 6. Change the authentication method to “Use this string (preshared key)”, enter the string “Test”, and then click the OK button.
11g Wireless Security Router User Guide This new Preshared key will be displayed in Authentication method preference order. Click the OK button to continue. 7. From the Tunnel Setting tab, click The tunnel endpoint is specified by this IP Address box, and then type the WAN IP Address “140.111.1.1”(Note: ISP provided IP Address; this is only an example.)of the Broadband VPN Router.
11g Wireless Security Router User Guide 8. From the Connection Type tab, select All network connections, and then click the OK or Close button to finish this rule.
11g Wireless Security Router User Guide [Tunnel 2] Broadband VPN RouterÆ WinXP 1. In the to_VPNRouter Properties, deselect the Use Add Wizard check box, and then click the Add button to create the second IP Filter. 2. On the IP Filter List tab, click the filter list “Broadband VPN RouterÆXP”.
11g Wireless Security Router User Guide 3. From the Filter Action tab, click the filter action “Require Security”. 4. From the Authentication Methods tab, click the Edit button. 5. Change the authentication method to “Use this string (preshared key)”, enter the string “Test”, and then click the OK button.
11g Wireless Security Router User Guide This new Preshared key will be displayed in Authentication method preference order. Click the OK button to continue. 6. From the Tunnel Setting tab, click The tunnel endpoint is specified by this IP Address box, and then type the Windows 2000/XP IP Address “140.111.1.2”.
11g Wireless Security Router User Guide 7. From the Connection Type tab, select All network connections, and then click the OK(for WinXP) or Close(for Win2000) button to finish.
11g Wireless Security Router User Guide 8. From the Rules tab, click the OK button to back to the secpol screen. C-2.4 Assign New IPsec Policy 1. In the IP Security Policies on Local Computer MMC snap-in, right-click policy named “to_VPNRouter”, and then click Assign. A green arrow appears in the folder icon.
11g Wireless Security Router User Guide Appendix D: Glossary 10Base-T / 100Base-T The adaptation of the Ethernet standard for Local Area Networks (LANs). 10Base-T uses a twisted pair cable with maximum lengths of 100 meters and transmits data at 10Mbps maximum. 100Base-T is similar, but uses two different twisted pair configurations and transmits at 100Mbps maximun.
11g Wireless Security Router User Guide Cookie A Cookie is a piece of data stored on your PC that a web server can retrieve later to identify your machine. It is normally a text with ID number, but can include other information. DHCP DHCP, short for Dynamic Host Configuration Protocol, is a protocol for assigning dynamic IP Addresses to devices on a network. Dynamic Addressing means that a device can have a different IP Address each time it connects to the network.
11g Wireless Security Router User Guide ESS ESS is an acronym for Extend Service Set that consists of several BSS’s. Firewall A security system used to enforce an access control policy between an organisation’s networks and the Internet. IEEE Short for Institute of Electrical and Electronics Engineers, an organization best known for developing standards for the computer and electronics industry. Internet A global network connecting millions of computers for the exchange of data, news and opinions.
11g Wireless Security Router User Guide Local Area Network (LAN) A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide area network (WAN) MAC Address Short for Media Access Control Address and in a hardware address that uniquely identifies each node of a network.
11g Wireless Security Router User Guide Protocol An agreed format for transmitting, sending and receiving data between two devices. Roaming The ability for a wireless device moving from one access point’s range to another without losing the connection. Router An Internet device that routes requests for information to other routers until the information’s location is found and the data can be transmitted back to the origin of the request. SPI SPI is an acronym for Stateful Packet Inspection.