Home

Port Group Management

image

Contents

1. b Bind the Gateway IP and MAC address for each PC This prevents the ARP from cheating IP and its MAC address First find out the gateway IP and MAC address on the device end LAN Setting 30 47e 195 so J94 be _ Default 30 7e 95 99 94 be aalma 4 Si 255 255 255 On every PC start or operate cmd to enter the dos operation Enter arp s 192 168 1 1 0a 0f d4 9e fb 0b so as to finish the binding of pc01 as illustrated mi 28525 Microsoft Windows hiv 6 1 7681 Copyright c gt 24089 Microsoft Corporation All rights reserved KC Users Tina Jhen gt arp s 192 168 1 1 00 17 16 81 35 cf For other host devices within the network follow the same way to enter the IP and MAC address of the corresponding device to complete the binding work However if this act restarts the computer the setting will be cancelled Therefore this command can be regarded as a batch of processing documents placed in the activation of the operation system The batch processing documents can be put in this way echo off 74 N your future life arp d arp s Router LAN IP Router LAN MAC For those internal network attacked by Arp the source must be identified Method If the PC fails to go online or there is packet loss of ping in the DOS screen input arp a command to check if the MAC address of the gateway is the same with the device MAC address If not the PC correspondin
2. U U Z CN System Tool XII System Tool V Device Spec Verification Status Display and Login Password and Time Setting 5 2 Change and Set Login Password and Time Password 5 2 Change and Set Login Password and Time Diagnostic 12 1 Diagnostic Firmware Upgrade 12 2 Firmware Upgrade 12 3 Setting Backup 12 4 SNMP Setting Backup SNMP Time 65 N your future life Teen Recover 125 Sytem Retar ooo o oi nen enone II iene Key 107 conse Kee URNI CES Tate rasi System Log 13 1 System Log ra Fist as 192 System ae II rate ts 109 Taf tte O D T omean senso 194 Comecton Setio O CT A O Tome Tese JU 66 D GINO your future life Appendix Il Troubleshooting 1 Shock Wave and Worm Virus Prevention Since many users have been attacked by Shock Wave and Worm viruses recently the internet transmission speed was brought down and the Session bulky increase result in the massive processing load of the device The following guides users to block this virus corresponding port for prevention a Add this TCP135 139 UDP135 139 and TCP445 Port Service Name Protocol Port Range tol HTTPS TCP 443 443 HTTPS Secondary TCP 8443 8443 TFTP UDP 69 69 IMAP TCP 143 143 NNTP TCP 119 119 POP3 TCP 110 110 SNMP UDP 161 161 SMTP TCP 25 25 TELNET TCP 23 23 TELNET Secondary TCP 8023 8023 TELNETSSL TCP 992 992 DHCP UDP 67 67 L2TP UDP 1701 1701 PPT
3. Public IP Range Begin Input the Public IP address for the Internet One to One NAT function Range Length The numbers of final IP addresses of actual Internet IP addresses Please do not include IP addresses in use by WANs Add to List Add this configuration to the One to One NAT list Delete Selected Item Remove a selected One to One NAT list Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes N your future life Attention One to One NAT mode will change the firewall working mode If this function has been set up the Internet IP server or PC which is mapped with a LAN port will be exposed on the Internet To prevent Internet users from actively connecting with the One on One NAT server or PC please set up a proper denial rule for access as described Firewall Multiple to One NAT Enable Multiple to One NAT Multiple to One NAT Private IP Range IU to Representative Public IP r i I Interface WAN 1 Add to list Delete selected rungs Spy Enable Multiple to One NAT Click to enable multiple to one NAT function Private IP Range Input intranet IPs for NAT mapping Respective Public IP Input the respective public IP addresses This should go along with the following interface selection If the IP address is not within the interface ranges the setting will not work Interface Select the mapping interfa
4. column at default if the functions have trial versions Users can try the functions for certain period of time by pressing the button After entering and registering License Key successfully Official Version column will be checked The feature will be in official version and not be limited by trial expiration date 42 N your future life Registration Time Status Information Refresh Display successfully inputted and registered time Indicate remaining trial date or supported amount of QnoSoftkey VPN Tunnels Refresh current system status and time 43 N ONO your future life XII Log From the log management and look up we can see the relevant operation status which is convenient for us to facilitate the setup and operation 12 1 System Log Its system log offers three options system log E mail alert and log setting Syslog Server Enabled E mail Alert Enabled O Log Setting L Syn Flooding LIP Spoofing LJ Win Nuke Ping Of Death Unauthorized Login Attempt System Error Messages C Deny Policies Allow Policies Configuration Changes Authorized Login View System Log Outgoing Packet Log Incoming Packet Log Clear Log Now System Log Syslog Server Enabled N your future life Enabled Host Name E mail Alert Future Feature E mail Alert Enabled Enabled Mail Server E mail Log Queue Length If this option is se
5. 192 166 1 100 WANI 74 120 121 3 80 8 32 192 166 1 100 TCP 2940 WANI 192 168 5 126 1144 11 20 192 168 1 100 TCP 3036 WANI 192 168 5 27 445 1 1 192 168 1 100 TCP 2958 WANI 65 54 189 156 1863 0 0 192 168 1 100 TCP 2942 WANI 192 168 5 121 49156 0 0 192 168 1 100 TGP 3128 WANI 118 160 195 248 1894 0 0 192 165 1 100 TCP 2947 WANI 192 168 5 120 49157 0 0 Raresh Specific Port Status Enter the service port number in the field and IP that are currently used by this port will be displayed 56 N ONO your future life IP Port Statistic Enabled IP Port Statistic Port 192 168 1 100 192 168 1 100 57 N your future life 12 6 QRTG Qno Router Traffic Grapher QRTG utilizes dynamic GUI and simple statistic to display system status of Qno Firewall Router presently including CPU Utilization Memory Utilization Session and WAN Traffic Enable QRTG The funcation is disabled by default When you are going to enable the QRTG function system will pop up a warning massage to remind you this function will be enabled which may influence router efficiency You can use drop down menu to select current status that including statistic and graphics of the following items when this function is enabled System will refresh the statistic and graphics to latest data timing when you click Refresh button I CPU Usage As in the the following figure 1 CPU Hours Usage Rate graphic average maximum 2 CPU Days
6. Close some unnecessary services and some unnecessary sharing if the condition is applicable which includes such management sharing as C and D Single device user can directly close Server service 7 Do not open QQ or the link messages sent by MSN online chatting tools in a causal manner Do not open or execute any strange Suspicious documents and procedures such as the unknown attachment enclosed in E mail and plug in 4 Summary ARP attack prevention is a serious and long term undertaking The above methods can basically resolve the network problems caused by ARP virus attack Moreover clients who adopted similar methods witness good results However it is important that network administrators pay special attention to this problem rather than overlooking the issue It is suggested that the above measures can be adopted to prevent ARP attack reduce the damage enhance the work efficiency and minimize economic loss 79 N your future life Appendix Ill Ono Technical Support Information For more information about the Qno s product and technology please log onto the Qno s bandwidth forum refer to the examples of the FTP server or contact the technical department of Qno s dealers as well as the Qno s Mainland technical center Qno Official Website http www Qno com tw Dealer Contact Users may log on to the service webpage to check the contacts of dealers http www gno com tw web where buy asp Taiwan Support
7. NS Record is the record of DNS server to assign which DNS server translates the domain name DNS Server Settings NS Record testcom test com testcom test com DNS Server Input registered NS Record ex ns1 ns2 WAN 11921684 164 WAN 2 0000 C WAN 3 0000 WAN 4 0000 WAN 1 192 168 4 164 C WAN 2 0000 WAN 3 0000 E WAN 4 0000 WAN 1 192 1684 164 WAN 2 0000 C WAN 3 0000 3 WAN 4 00 00 WAN 1 192 168 4 164 C WAN 2 0000 WAN 3 0000 C WAN 4 0000 24 N your future life Interface Assign WAN IP address as corresponding IP of NS Record The system will show all acquired enabled WAN IP addresses automatically so that users can check directly But users have to check if the IP addresses are the same as the corresponding settings on TWNIC DNS service provider Ex ns1 abc com tw WAN1 210 10 1 1 ns2 abc com tw WAN2 200 1 1 1 7 Host Record Add or modify host record A Record O Host Record A Record M wan 1192168 4 154 testcom WAN 20008 WAN 3 00 00 M WAN 40000 1 wan 1192168 4 154 testcom WAN 20000 M WAN 20000 WAN 4 00 00 M wan 1192168 4 154 test com WAN 20000 WAN 3 00 00 M WAN 40000 1 wan 1195168 4 164 test com I WAN 2 0008 M WAN 3 00 00 WAN 4 0000 Host Input the host name which provides services E g mail server or FTP Name WAN IP Check corresponding A Record IP WAN Port IP If more
8. a DI GING your future life Port Group Management N your future life Port Group Management Service ports can be grouping as IP grouping It is convenient to set QoS firewall access rules and other functions user edit port Port GroupSet Port List GroupName La name protocol port delete name protocol port delete All Traffic BOTH 1 55535 DNS UDP 53 53 FIP TCP 21 21 HTTP TCP 80 80 1 SISI TCP 8080 8080 Secondary HTTPS TCP 443 443 PERI error ei TCP 3443 8443 secondary TFTP UDF 69 69 IMAP TCP 143 143 NNTP TCP 119 119 POP3 TCP 110 110 SNMP UDP 161 161 SMTP TCP 25 25 m User edit port Name Protocol Port Range Add to Port List Group Name Delete Group gt gt gt gt button Delete 3 Apply Cancel Input the name protocol and port range for the specific service port Name the Port in order to identify its property For example Virus 135 Choose the port protocol form the pull down list like TCP UDP or TCP and UDP Input the port range For example 135 to 135 After setting name protocol and port range push this button to add the information into the Port list below This port can be from some port groups When you add new groups please note if the group name is in the column For example Virus Choose the group that you would like to delete from the pull down list and push the Delete Group button System will ask you again if you would like to delete the gro
9. the routing mode for the device should be configured as static routing Static routing enables different network nodes to seek necessary paths automatically It also enables different network nodes to access each other Click the button Show Routing Table as in the figure to display the current routing list 10 N your future life O Static Routing Dest IP Subnet Mask Gateway Hop Count Interface Add to List Delete Selected Item Show Table Apply Cancel Dest IP IU I subnet Mask JUL I Default Gateway Yr I Hop Count Interface Add to list Halata galactad item Show Tabla Apay Cenedl Input the remote network IP locations and subnet that is to be routed For example the IP subnet is 192 168 2 0 255 255 255 0 The default gateway location of the network node which is to be routed This is the router layer count for the IP If there are two routers under the device users should input 2 for the router layer the default is 1 Max is 15 This is to select WAN port or LAN port for network connection location Add the routing rule into the list Remove the selected routing rule from the list Show current routing table Click Apply to save the network configuration modification Click Cancel to leave without making any changes Q ONO your future life N your future life 10 4 One to One NAT As both the
10. 80 32 56 TCP 1144 17 30 TCP 1863 3 6 UDP 137 2 4 TCP netbios 139 1 2 Raresh By Outbound Port The figure displays the network protocol type destination IP address bytes per second and percentage Traffic Statistic Enabled Traffic Statistic O Proto est Port bytesisee AA AA TCP af 65 1863 TCP 1144 11 20 TCP http 80 8 14 Rleiingeli By Inbound Port The figure displays the network protocol type destination IP address bytes per second and percentage 52 N DONO your future life O Traffic Statistic Enabled Traffic Statistic 192 168 1 100 TGP 2940 192 166 5 126 1144 100 Rais By Outbound Session The figure displays the source IP address network protocol type source port destination IP address destination port bytes per second and percentage Traffic Statistic Enabled Traffic Statistic Inbound Session 192 166 1 100 TCP 2940 192 168 5 126 1144 Rees By Inbound Session The figure displays the source IP address network protocol type source port destination IP address destination port bytes per second and percentage 53 D your future life 12 4 Connection Statistic Future Feature Connection Statistic function is used to record the numbers of network connections including outbound sessions and intranet users PC It also displays the user connection sessions Connection Statistic V Enabled LAN PC Data Ordering By
11. Disabled Qnoa Dyndns Disabled Dydns WAN 4 3322 Disabled dale Edit Qnoddns Disabled ina Dyndns Disabled Dydns USB 3322 Disabled Jil Edit Qnoddns Disabled Qno Select the WAN port to which the configuration is to be edited for example WAN 1 Click the hyperlink to enter and edit the settings 17 N DONO your future life DynDNS org Interface DDNS Username Password Host Name Internet IP Address Status Apply Interface NAH 1 e Lo o V U 0 0 0 0 Not Updated LOU _ 0 0 0 0 Not Updated J gnoddns org cn 0 0 0 0 Not Updated opij Cameal This is an indication of the WAN port the user has selected Check either of the boxes before DynDNS org 3322 org DiDNS com and QnoDDNS org cn to select one of the four DDNS website address transfer functions The name which is set up for DDNS Input a complete website address such as abc qnoddns org cn as a user name for QnoDDNS The password which is set up for DDNS Input the website address which has been applied from DDNS Examples are abc dyndns org or xyz 3322 org Input the actual dynamic IP address issued by the ISP An indication of the status of the current IP function refreshed by DDNS After the changes are completed click Apply to save the network 18 N your future life configuration modification Cancel Click Cancel to leave without making any changes 19 your Future
12. Enter Setup under the DHCP page and look for IP and MAC binding On the right there is an option of Show new IP user and click to enter 76 N ONO your future life IP amp MAC Binding swe maCAddress Name Enabled _ Block MAC address on the list with wrong IP address Block MAC address not on the list Show Tekla Apply Caneel Click to display IP and MAC binding list dialog box In this box the unbinding IP and MAC address corresponding to the PC are displayed Enter the Name of the computer and click on Enabled with the display of the V icon and push the option on the top right corner of the screen to confirm 00 1 e 8c c5 b9 59 Hi 00 20 e0 44 cb 9d a 1921631101 1921681 100 Now the bound options will display on the IP and MAC binding list as illustrated in Figure 5 and click Apply to finish binding TI D your future life IP a MAC Binding Static IP 192 168 1 100 MAC Address 00 20 ed far _ eb _ 9a Name PCOOZ Enabled 192 168 1 100 gt 00 20 ed 41 cb 9d PC002 gt Enabled 492 168 1 101 gt 00 1e 8c c5 b9 69 gt PC001 gt Enabled Delete selected iten Add Block MAC address on the list with wrong IP address Block MAC address not on the list Shaw Tabla Avaralhy Caneel Though these basic operations can help solve the problem bu
13. MAC address before the host sends out the frame The basic function of ARP protocol aims to inquire the MAC address of the target equipment via the IP address of the target equipment so as to facilitate the communications The Working Principle of ARP Protocol Computers with TCP IP protocol have an ARP cache in which the IP address corresponds to the MAC address as illustrated IP MAC 192 168 1 1 00 0f 3d 83 74 28 192 168 1 2 00 aa 00 62 c5 03 192 168 1 3 03 aa 01 75 c3 06 For example host A 192 168 1 5 transmits data to Host B 192 168 1 1 Transmitting data Host A searches for the destination IP address from the ARP Cache If it is located MAC address is known Simply fill in the MAC address for transmission If no corresponding IP address is found in ARP cache Host A will send a broadcast The MAC address is FF FF FF FF FF FF which is to inquire all the host devices in the same network session about What is the MAC address of 192 168 1 1 Other host devices do not respond to the ARP inquiry except host device B which responds to host device A when receiving this frame The MAC address of 192 168 1 1 is 00 aa 00 62 c6 09 So Host A knows the MAC address of Host B and it can send 71 N your future life data to Host B Meanwhile it will update its ARP cache Moreover ARP virus attack can be briefly described as an internal attack to the PC which causes trouble to the ARP table of the PC In LAN
14. This feature allows users to integrate all backup content of parameter settings into the device Before upgrade confirm all information about the software version Select and browse the backup parameter file config exp Select the file and click Import to import the file Export Configuration File This feature allows users to backup all parameter settings Click Export and select the location to save the config exp file 32 N Qe ee i wae PRA il F g th your future life 11 4 SNMP Simple Network Management Protocol SNMP refers to network management communications protocol and it is also an important network management item Through this SNMP communications protocol programs with network management i e SNMP Tools HP Open View can help communications of real time management The device supports standard SNMP vi v2c and is consistent with SNMP network management software so as to get hold on to the operation of the online devices and the real time network Information SNMP Setup SNMP Setup Enabled Enabled System Name System Contact System Location Get Community Name Set Community Name Trap Community Name Send SNMP Trap to Activate SNMP feature The default is activated Set the name of the device such as Qno Set the name of the person who manages the device i e John Define the location of the device i e Taipei Set the name of the group or communi
15. Usage Rate graphic average maximum 3 CPU Week Usage Rate graphic average maximum M Enabled QRTG CPU Usage ind o CPU Hours Usage Rate Total Session 4942 Memory Usage 22 Unit 100 Session Avg 5257 Session 100 50 Max 10416 Session 0 10 05 10 10 10 15 10 20 10 25 10 30 10 35 10 40 10 45 10 50 10 55 11 00 Unit Minutes Unit 100 Avg 17 50 Max 36 D 10 05 10 10 10 15 10 20 10 25 10 30 10 35 10 40 10 45 10 50 10 55 11 00 Unit Minutes 58 N ONO your future life o CPU Days Usage Rate Unit Session iso Avg 10771 Session 100 Max 17143 Session 190 50 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 6 00 8 00 10 00 UnitHours Unit 100 Avg 31 50 Max 48 0 12 00 14 00 18 00 18 00 20 00 22 00 0 00 2 00 4 00 6 00 8 00 10 00 UnitHours CPU Week Usage Rate Unit Session 290 Avg 10138 Session 10 em 150 Max 22088 Session 100 50 0 Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 26 Nov 27 UnitWeek Unit 100 Avg 32 50 Max 51 0 Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 28 Nov 27 Unit Week 59 N ONO your future life ll WAN Traffic Statistic hourly graphic and average up down stream As in the following figures F Enabled ORTG WAN Traffic Statistics Hour Refresh WAN Downstream M wan1 M wan2 M wan3 M wan4 M wans IM wang M wan7 IM wang Average Unit MA want Kbps 7500 BM wan2 MW 1323 Kbps MM wan3 M1338 Kbps 5000 MM wand W 1690 Kbps MM wand M1487 Kbps Mi w
16. address 192 168 1 1 status Test Succeeded Packets 4 4 transmitted 4 4 received 0 loss Minimun 0 9 ms Round Trip Time Maximun 1 1 ms Average 0 9 ms This item informs users of the status quo of the outbound session and allows the user to know the existence of computers online On this test screen please enter the host IP that users want to test such as 192 168 5 20 Press Go to start the test The result will be displayed on this screen 30 N your future life 11 2 Firmware Upgrade Users may directly upgrade the device firmware on the Firmware Upgrade page Please confirm all information about the software version in advance Select and browse the software file click Firmware Upgrade Right Now to complete the upgrade of the designated file Note Please read the warning before firmware upgrade Users must not exit this screen during upgrade Otherwise the upgrade may fail O Firmware Upgrade Browse Firmware Upgrade Right Now Warning 1 When choosing previous firmware versions all settings will restore back to default value 2 Upgrading firmware may take a few minutes please dont turn off the power or press the Reset button 3 Please don t close the window or disconnect the link during the upgrade process 31 D your future life 11 3 Setting Backup Import Configuration File Browse import Export Configuration File Import Configuration File
17. device and ATU R need only one actual IP if ISP issued more than one actual IP such as eight ADSL static IP addresses or more users can map the remaining real IP addresses to the intranet PC virtual IP addresses These PCs use private IP addresses in the Intranet but after having One to One NAT mapping these PCs will have their own public IP addresses For example if there are more than 2 web servers requiring public IP addresses administrators can map several public IP addresses directly to internal private IP addresses Example Users have five available IP addresses 210 11 1 1 5 one of which 210 11 1 1 has been configured as a real IP for WAN and is used in NAT Users can respectively configure the other four real IP addresses for Multi DMZ as follows 210 11 1 2 gt 192 168 1 3 210 11 1 3 gt 192 168 1 4 210 11 1 4 gt 192 168 1 5 210 11 1 5 gt 192 168 1 6 Attention The device WAN IP address can not be contained in the One to One NAT IP configuration 13 D your future life Enable One to One NAT One to One NAT Add Range Private Range Begi njise 168 Public Range Begin KU Range Length Add to list Deletes selected ranges Enable Multiple to One NAT L Gal D Cened Enabled One to One NAT To activate or close the One to One NAT function Check to activate the function Private IP Range Begin Input the Private P address for the Intranet One to One NAT function
18. of received sent total Bytes Received and Sent Bytes Sec total number of error packets received total number of the packets dropped number of session number of the new Session Sec and upstream as well as downstream broadband usage O System Status Down Connected Down Down 0 0 0 0 192 165 4 138 0 0 0 0 0 0 0 0 00 0c 41 00 00 02 00 0c 41 00 00 03 00 00 41 00 00 04 00 0c 41 00 00 05 0 0 0 0 255 255 254 0 0 0 0 0 i 0 0 0 0 0 0 0 0 192 168 4 1 0 0 0 0 0 0 0 0 0 0 0 0 192 168 5 21 0 0 0 0 0 0 0 0 Test Failed Test Succeeded Test Failed Test Failed 0 0 0 0 0 0 0 0 0 0 0 0 0 93053577 0 0 0 25338543 0 o 0 118392120 0 0 0 640 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 g 0 0 0 0 o 0 0 0 0 0 0 0 0 0 Reresh 50 ONO your future life 12 3 Traffic Statistic Six messages will be displayed on the Traffic Statistic page to provide better traffic management and control Traffic Statistic Enabled Traffic Statistic 192 166 1 100 294 100 Ratesh By Inbound IP Address The figure displays the source IP address bytes per second and percentage Traffic Statistic Trae Type Outbound IP Address V Enabled Traffic Statistic 192 168 1 100 31 100 Rees By outbound IP Address The figure displays the source IP address bytes per second and percentage SI N ONO your future life Traffic Statistic Tate Type outbound Senice Enabled Traffic Statistic TCP htip
19. out the message to the idle device for taking over network transmitting immediately 37 N your future life 2 Two devices are operating simultaneously Two devices operate outbound linking simultaneously but they are still separated as Master device and Backup device In normal situation Master device is major DHCP IP issuer and Backup device will disable DHCP issuing automatically When Master device fails transmitting the Backup device will take over all outbound links and enable DHCP server to provide IP addresses Following is the description of the two different modes Hardware Backup gita ja x High Availability Enable t Disable Mode Hardware Backup Mode Two devices are operating simultaneously Operation 1 Master Mode Backup Mode Master Slave Mode setting Of two devices must be different Status Normal Status of the backup device Normal Indicates the master device will operate for all outbound links When Operation Master Mode IH the master device fails transmitting the backup device will take over Status Status Normal indicates the device operates well Status of the backup device Indicates status of backup device If the status is normal administrators can login the device remotely to manage Remote Management should be enabled Status Abnormal indicates the backup device can not be detected or does exist and need to inspect the backup device actual statu
20. possible that the system is attacked by ARP To verify the situation we may judge by checking ARP table Enter the ARP a command as illustrated below Interface 192 168 1 72 Bx2 Internet Address Physical Address Type 192 168 1 1 HA BF 3d 83 74 268 dynamic 192 168 1 43 G4 13 d43 ef b2 Ac dynamic 192 168 1 252 Bi bf 1d B1 74 28 dynamic Le WINDOWS S ystemi arp a It is found that the IP of 192 168 1 1 and 192 168 252 points to the same MAC address as 00 0f 3d 83 74 28 Evidently this is a cheat by ARP 3 ARP Solution Now we understand ARP ARP cheat and attack as well as how to identify this type of attack What comes next is to find out effective prevention measures to stop the network from being attacked The general solution provided by Qno can be divided into the following three options a Enable Prevent ARP Virus Attack 39 Enter the device IP address to log in the management webpage of the device Enter Firewall gt General and find the option Prevent ARP Virus Attack to the right of the page Click on the option to activate it and click Apply at the bottom of the page see illustrated 73 LE Gay iy CJ 5 5 a hi your future life Enabled O Disabled Enabled Disabled Enabled Disabled Advanced Enabled Disabled O Enabled Disabled Port O Enabled Disabled Enabled O Disabled Router sends ARP 20 times per second
21. setup must be done to prevent ARP virus attack which is to guarantee the complete resolution of the issue The device selection is advised to take into consideration the one with anti ARP virus attack Qno products come squarely with such a feature which is very user friendly compared to other products 2 ARP Diagnostic If one or more computers are affected by the ARP virus we must learn how to diagnose and take appropriate measures The following is experience shared by Qno technical engineers with regard to the ARP prevention Through the ARP working principle it is known that if the ARP cache is changed and the device is constantly notified with the series of error IP or if there is cheat by fake gateway then the issue of disconnection will affect a great number of devices This is the typical ARP attack It is very easy to judge if there is ARP attack Once users find the PC point where there is problem users may enter the DOS system to conduct operation pining the LAN IP to see the packet loss Enter the ping 192 168 1 1 Gateway IP address as Illustrated 72 N your future life eply from 172 168 1 1 bytes 32 time lt ims eply from 172 168 1 1 hbytes 32 time lt lms equest timed out equest timed out equest timed out equest timed out eply from 172 168 1 1 bytes 32 time lt lms eply from 192 168 1 1 bytes 32 timetims If there are cases of packet loss of the ping LAN IP and If later there is connection it is
22. time limit If the function can match your network demand you can apply for the official version License Key in Qno Official Website www gno com tw After applying auditing paying and inputting License Key successfully users can use the official version without time limit 1 System Tool gt License Key gt Try to enable Inbound Load Balance License Key Current Time 2010 07 16 NTP Server License Key Number RO O n FeatureName Trial version Official Version Registration time status And Information nos Rakesh After enabling Trial version Status and Information column will display the remaining trial time If trial expires the function can not work out at all unless users enter an official License Key 2 Go to Inbound Load Balance in Advanced Function and click Edit to configure 3 Enable Inbound Load Balance 21 N ONO your future life Inbound Load Balance F Enabled Inbound Load Balance ftestcom fr200 test test com DNS Server Settings NS Record WAN 1192168 4 154 WAN 2 0000 test com r WAN 3 0000 WAN 4 0000 WAN 1182 684 64 WAN 2 0000 test com RER WAN 3 0000 WAN 4 0000 WAN 192 684 64 WAN 2 0000 testcom See WAN 3 0000 WAN 4 0000 WAN 1 192 584 54 WAN 2 0000 test com PEETRE WAN 3 0000 WAN 4 0000 ARAAAAARARARARARARARARARARARARARARARABAR
23. 168 8 100 TOP 51899 WANI 192 168 3 10 1318 0 0 Reiresh Host Name Display PC names that having outbound traffic It will show blank when the system cannot analyze Session Display PC connection sessions that having outbound traffic Refresh Click the Refresh button that the latest data and list will be updated IN k f i S sti your future life 12 5 IP Port Statistic The device allows administrators to inguire a specific IP or from a specific port about the addresses that this IP had visited or the users source IP who used this service port This facilitates the identification of websites that needs authentication but allows a single WAN port rather than Multi WANs Administrators may find out the destination IP for protocol binding to solve this login problem For example when certain port software is denied inquiring about the IP address of this specific software server port may apply this feature Moreover to find out BT or P2P software users may select this feature to inquire users from the port IP Port Statistic 2 Enabled IP Port Statistic IP Address M IP Address 192 166 1 t00 Search Specific IP Status Enter the IP address that users want to inquire and then the entire destination IP connected to remote devices as well as the number of ports will be displayed IP Port Statistic M Enabled IP Port Statistic IP Address v Address w IP Address 192 168 i 100
24. 218 17 209 17 After repeated addition users may see the links to the QQLive Server blocked Click Apply to block QQLive video broadcast 70 N your future life 3 ARP Virus Attack Prevention 1 ARP Issue and Information Recently many cyber cafes in China experienced disconnection partially or totally for a short period of time but connection is resumed quickly This is caused by the clash with MAC address When virus contained MAC mirrors to such NAT equipments as host devices there is complete disconnection within the network If it mirrors to other devices of the network only devices of this affected network have problems This happens mostly to legendary games especially those with private servers Evidently the network is attacked by ARP which aims to crack the encryption method By doing so they hackers may intercept the packet data and user information through the analysis of the game s communication protocol Through the spread of this virus the detailed information of the game players within the local network can be obtained Their account and information are stolen The following describes how to prevent such virus attack First let us get down to the definition of ARP Address Resolution Protocol In LAN what is actually transmitted is frame in which there is MAC address of the destination host device So called Address Analysis refers to the transferring process of the target IP address into the target
25. ADSL ISP A 210 10 1 1 WAN2 ADSL ISP B 200 1 1 1 Domain Name abc com tw Name Server NS ns1 abc com tw ns2 abc com tw Go to website of your DNS service provider to modify your own DNS Host IP as the following figure DNS R EMME Sit SARS DNS RE DNS gt DNS AEGEA SIRIA iP Address O JE z na RETRO th ise J ERER Choose DNS mode and then fill in the Host name and corresponding IP address of WANI and WAN2 Press Finish button the setting will be effective in 24 hours Attention Please follow your ISP to modify Host IP assignment if your upper level isn t TWNIC If your DNS agent is other ISP please refer to the Web configuration provided by your ISP 5 Configure Firewall Router Domain Name 23 N IN k f i S sti your future life Enabled Inbound Load Balance F200 Domain Name Input the Domain Name which is applied before The domain name will be shown in following configuration automatically without entering again Time To Live Time To Live the abbreviation is TTL is time interval of DNS inquiring second 0 65535 Too long interval will affect refresh time Shorter time will increase system s loading but the effect of Inbound Load Balance will be more correct You can adjust according your reality application Administrator Enter administrator s E mail address e g test abc com tw 6 DNS Server Settings Add or Modify NS Record NS Record
26. ARAAAMAAAMAAAMARARARARARAMARAMAMAMA MAMA AARAAAMARARARAMARARARARARARARARAAARAAAMARABARAMARARARARARARARARARAMAMAMARAMARAMAARMARARAAAMARARARARAAAAMAAMALAMAMARAARAANAMAAARARARARAMARAMARARAMARARARAAAMARAMARARARARARARARARARAMAMARARAMARARARARARARARAMARARARARARARAAAMAAAMAAAMAAAMARARARAMARAMARARARARARARAAAMAMARI Host Record A Record 1 wan 1 192 168 4 164 Tr Teca WAN 2 0000 wan 3 0000 WAN 4 0000 WAN 1 192 168 4 164 OT testcom 1 wan 2 0000 WAN 3 0000 wan 4 0000 WAN 1 192 1684 164 test com WAN 2 0000 17 WAN 3 0000 FT wan 4 0000 WAN 1 192 168 4 164 test com WAN 2 0000 l WAN 3 0000 T WAN 4 00 00 ARMAREAAARAAARARARARARARAAARAAMALAAAAAAAAAARARAARARARARARARARAARARARARARARAAABMAABAAABARARARARARARARARARARAMARA A ABARARAARARARARARARRARARARARARARARARAMAAAMARAMAARAMARARARARARAAARARARAMA RARA RARA ABAARABARARARAAARARARARARAARAA MALA ARMA RARA RARAAARARARARARARARAARAMAAAMAAAIALARAAARAARAMARARARARARAARARA MARA ALBA AARAAAAARARARARARARARA MARA MA dd ddr dd O Alias Record CName Record Pt _ test com p test com fo testcom testcom I RI test com testcom lei test com po o test com test com test com 22 N your future life 4 Configure Domain Name and Host IP Assign DNS service provider and Host IP address Take the setting on TWNIC as an example the network structure and IP are as following WAN1
27. Center E mail QnoFAE qno com tw 80
28. IP Address up to down Jump to 1 1 Page 10 v entries per page 192 168 8 100 QnoPM01 24 Enable When enabling Connection Statistic function parts of system efficiency will be influenced Therefore the system will remind you the influence when you enable this function PC there are currently traffic Display current PC amounts having outbound connections If the PC does not boot up or is not connected to internet it will not be counted in the Statistic LAN PC Data Ordering By Select this function to sort the data by IP Address up to down IP Address down to up Session down to up and Session up to down Jump to__ Page Select this function to display the data by how many Entries per page___ entries of data per page will be displayed Also you can select the page you would like to see from the drop down menu Data List field IP Address Display PC s IP address which has outbound traffic Also you can click the IP hyperlink to display the current N ONO your future life connection statistic and details As the following graph O IP Port Statistic M Enabled Search Type IP Address IP Address tez fies E ico Search 192 168 8 100 TCP 50143 WANI 65 544979 1863 65 8 _192168 8 100 TCP 51877 WANT 11447207 109 1257 0 0 192 168 8 100 TCP 51893 WANI 192 168 3 10 1025 22 22 _192 168 8 100 TOP 51897 WANT 192168310 1318 44 44 192
29. IP address was transferred into the second physical address MAC address through ARP protocol ARP protocol is critical to network security ARP cheating is caused by fake IP addresses and MAC addresses and the massive ARP communications traffic will block the network The MAC address from the fake source sends ARP response attacking the high speed cache mechanism of ARP This usually happens to the cyber cafe users Some or all devices in the shop experience temporal disconnection or failure of going online lt can be resolved by restarting the device however the problem repeats shortly after Cafe Administrators can use arp a command to check the ARP table If the device IP and MAC are changed it is the typical symptom of ARP virus attack Such virus program as PWSteal lemir or its transformation is worm virus of the Trojan programs affecting Windows 95 98 Me NT 2000 XP 2003 There are two attack methods affecting the network connection speed cheat on the ARP table in the device or LAN PC The former intercepts the gateway data and send ceaselessly a series of wrong MAC messages to the device which sends out wrong MAC address The PC thus cannot receive the messages The later is ARP attack by fake gateways A fake gateway is established The PC which is cheated sends data to this gateway and doesn t go online through the normal device From the PC end the situation is disconnection For these two situations the device and client
30. Log system Log Authentication Success system Log system Log Authentication Success Feb 2 02 02 04 2006 system Log Feb 2 02 02 42 2006 system Log Feb 2 02 02 42 2006 system Log Feb z 02 06 50 2006 system Log Outgoing Packet Log System is up Firmware v2 1 0 07 Qna Username admin System is up Firmware v2 1 0 07 Qna Username admin System is up Firmware v2 1 0 07 Qno Username admin Restart Router System is up Firmware v2 1 0 07 Qno Return to Factory Default Settings and Reboot View system packet log which is sent out from the internal PC to the Internet This log includes LAN IP destination IP and service port that is applied It is illustrated as below Ontzoimg Packet Log Windows Internet Explorer E http 192 165 1 Loutgome log htm LE x 4 ETS c Feb 6 02 46 02 2006 Connection Refused Policy violation Feb 6 024606 2006 a Rensed Policy violation TIA On st one ie violation Feb don jena zona Onneckon Rene Folla violation Connection Refused Policy Feb608 19 53 2006 i violation Incoming Packet Log UDP 192166 1 100 746477239233 6420301 on ixp2 UDP 192 168 1 100 7464 gt 84 10 118 17 10682 on ixp TGP 192 168 1 1 50 gt 192 1683 1 100 1224 on ixp0 TCP 192 168 1 101 18195 gt 163 253 104 140 1234 on ixp1 TCP 192 168 1 101 516 1 gt 3 139 58 12 1234 on ixp1 View system packet log of those entering the firewall The log inclu
31. Log Setting _ Syn Flooding CIP Spoofing CI Win Nuke Ping Of Death Unauthorized Login Attempt System Error Messages Deny Policies Allow Policies Configuration Changes Authorized Login View System Log Outgoing Packet Log Incoming Packet Log Clear Log Now Alert Log The device provides the following warning message Click to activate these features Syn Flooding IP Spoofing Win Nuke Ping of Death Unauthorized Login Attempt Syn Flooding Bulky syn packet transmission in a short time causes the overload of the system storage of record in connection information IP Spoofing Through the packet sniffing hackers intercept data transmitted on the network After they access the information the IP address from the sender is changed so that they can access the resource in the source system Win Nuke Servers are attacked or trapped by the Trojan program Ping of Death The system fails because the sent data exceeds the maximum packet that can be handled by the IP protocol 46 N your future life Unauthorized If intruders into the device are identified the message will be sent to the Login system log General Log The device provides the following warning message Click to activate the feature System error message blocked regulations regulation of passage permission system configuration change and registration verification System Error Provides the system log with all kinds of error messages For exa
32. P TCP 1723 1723 IPSec UDP 500 500 TCP TCP 135 139 UDP UDP 135 139 TCP TCP 445 445 gt ili KA ffajata selected iter b Use the Access Rule in the firewall and set to block these three ports 67 N ONO your future life CO appirnisnue Amays l liol I eetourroman ini Sun Mon Tue Wed Thu Fri Sat e ne E gt Use the same method to add UDP UDP135 139 and TCP 445 445 Ports c Enhance the priority level of these three to the highest 5 mi entries per page Next Page gt gt Jump to 12 Page Tre a mev revmi my A Aas He MO zm ew vesa gt ay m awe GTO 0 ba owe icona me MI INO Mow amamen vw sw sw wes MERCI IR SE a aes 68 N gm i g Aian a Bed J NI St your future life 2 Block QQLive Video Broadcast Setting QQLive Video broadcast software is a stream media broadcast software Many clients are bothered by the same problem When several users apply QQLive Video broadcast software a greater share of the bandwidth is occupied thus overloading the device Therefore the device responds more slowly or is paralyzed If the login onto the QQLive Server is blocked the issue can be resolved The following relates to Qno products and provides users with solutions by introducing users how to set up the device a Log into the device web based UI and enter Firewall gt Access Rule Access Rul
33. Quit this configuration window N your future life 10 2 UPnP UPnP Universal Plug and Play is a protocol set by Microsoft If the virtual host supports UPnP system such as Windows XP users could also activate the PC UPnP function to work with the device UPnP Mapping Service Port Service Port Host Name or IP Address Enabled Service Port Management Add to List Delete Selected Item Show Table Apply Cancel Service Port Management HostName or IP Address Po Enabled Add to list Delete salcia item Show Tabla spe O Cemesl Select the UPnP service number default list here for example WWW is 80 80 FTP is 21 21 Please refer to the default service number list Input the Intranet virtual IP address or name that maps with UPnP such as 192 168 1 100 Activate this function Add or remove service ports from the management list Add to active service content Remove selected services This is a list which displays the current active UPnP functions Click Apply to save the network configuration modification Click Cancel to leave without making any change N ONO your future life 10 3 Routing In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing Information Protocol Dynamic Routing Gateway Router O Enabled Disabled Static Routing Dest P SubnetMask Def
34. an7 2500 mo Kbps JT W 1041 Kbps v porn A ne ai 10 05 10 10 10 15 10 20 10 25 10 20 10 35 10 40 10 45 10 50 10 55 11 00 UnitMinutes WAN Upstream M wani wan2 M wan3 M wan4 M wan5 D wans M wan7 wang Average Unit a 750 wani Kbps 411 Kbps 500 M388 Kbps E 431 Kbps M516 Kbps 250 mo Kbps M 434 Kbps 0 10 05 10 10 10 15 10 20 10 25 10 30 10 35 10 40 10 45 10 50 10 55 11 00 Unit Minutes The Ul might vary from model to model depending on different product lines 60 N ONO your future life lll WAN Traffic Statistic Day graphic and average up down stream As in the following figures M Enabled QRTG WAN Traffic Statistics Day x WAN Downstream M wani M wan2 M wan3 M wan4 M wans IM wans M wan7 IM wang Unit s000 Kbps 4000 2000 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 WAN Upstream M want M wan2 M wan3 M wan4 M wans C wan M wan7 I wang Unit Kbps 1000 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 The UI might vary from model to model depending on different product lines 61 8 00 10 00 Average IN 2342 M 2568 E 2050 E 2179 mo MN 2619 Unit Hours Average M698 E 673 E 607 E 603 mo B 669 Unit Hours Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps N ONO your future life IV WAN Traffic Statistic Week graphic and average up down stream As in the following figures M Enabled ORTG WAN Traff
35. ault Gateway I I Hop Count Interface LAN Add to list N your future life 10 3 1 Dynamic Routing The abbreviation of Routing Information Protocol is RIP There are two kinds of RIP in the IP environment RIP and RIP II Since there is usually only one router in a network ordinarily just Static Routing will be used RIP is used when there is more than one router in a network and if an administrator doesn t want to assign a path list one by one to all of the routers RIP can help refresh the paths RIP is a very simple routing protocol in which Distance Vector is used Distance Vector determines transmission distance in accordance with the number of routers rather than based on actual session speed Therefore sometimes it will select a path through the least number of routers rather than through the fastest routers O Dynamic Routing Gateway Router O Enabled Disabled Working Mode Select the working mode of the device NAT mode or Router mode RIP Click Enabled to open the RIP function Receive RIP versions Use Up Down button to select one of None RIPv1 RIPv2 Both RIPv1 and v2 as the TX function for transmitting dynamic RIP Transmit RIP versions Use Up Down button to select one of None RIPv1 RIPv2 Broadcast RIPv2 Multicast as the RX function for receiving dynamic RIP 10 3 2 Static Routing When there are more than one router and IP subnets
36. ce If the WAN IP above is not within the interface range the setting will not work 15 N your future life Add to List Add this configuration to the One to One NAT list Delete selected range Remove a selected One to One NAT list Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes 16 N your future life 10 5 DDNS Dynamic Domain Name Service DDNS supports the dynamic web address transfer for QnoDDNS org cn 3322 0rg DynDNS org and DtDNS com This is for VPN connections to a website that is built with dynamic IP addresses and for dynamic IP remote control For example the actual IP address of an ADSL PPPoE time based system or the actual IP of a cable modem will be changed from time to time To overcome this problem for users who want to build services such as a website it offers the function of dynamic web address transfer This service can be applied from www gno cn ddns www 3322 org www dyndns org or www dtdns com and these are free Also in order to solve the issue that DDNS server is not stable the device can update the dynamic IP address with different services at the same time DDNS Setup Dyndns Disabled Dydns WAN 1 3322 Disabled dale Edit Qnoddns Disabled ina Dyndns Disabled Dydns WAN 2 3322 Disabled Jes Edit Qnoddns Disabled Qno Dyndns Disabled Dydns WAN 3 3322 Disabled dadi Edit Qnoddns
37. ch MX Record of mydomain com through DNS If the MX Record exists sender PC will send mails to the mail server assigned by MX Record Mail Server MX Record Most Name MalSewer OO i ti Yt PO testcom NA tz NA testcom Host Display the host name without domain name of mail host Name Weight Indicate the order of several mail hosts the smaller has more priority 26 N your future life Mail Input the server name which is saved in A Record or external mail server Server Click Apply button to save the configuration Besides users have to configure DNS service port as following description 10 Enable DNS Query DNS service port in Access Rule of Firewall setting Add a new access rule in Firewall setting to enable DNS service port of the WAN on which Inbound Load Balance need to be enabled Action Check Allow Service Port From the drop down menu select DNS UDP 53 53 Log Check Enable if DNS Query data should be recorded Interface Check the WAN port on which Inbound Load Balance is enabled Source IP Select Any Dest IP Select WAN port and input correspondingly IP of the domain name Take the previous example input 210 10 1 1 Scheduling Select Always 11 Enable internal IP and service port corresponding to A Record in Port Range Forwarding of Advanced Function 21 ONO your future life Port Range Forwarding Service Por
38. des information about the external source IP addresses destination IP addresses and service ports It is illustrated as below 48 N DONO your future life gt Incoming Packet Log Windows Internet Explorer JE http192 168 1 l ncomimns log htm Connection Refused Policy Feb 6 02 34 31 2006 violation UDP 192 168 2 1 6 gt 255 255 255 255 68 on ixp2 Feb 6 02 57 54 2006 eee Refused Policy UDP 192 168 1 100 127 gt 192 168 1 255 127 on ixp0 g Connection Refused Policy Feb 6 03 06 39 2006 violation UDP 192 168 2 1 567 gt 192 168 2 102 68 on ixp2 Feb 603 15 31 2006 e Refused Policy i UDP 192 168 2 1 657 gt 192 168 2 100 68 on ixp4 violation Feb 6 03 45 58 2006 Connection Refused Policy ai UDP 192 168 1 100 7464 gt 75 128 47 253 27220 on ixp0 violation Connection Refused Policy Feb6 03 46 00 2006 violation UDP 192 168 1 100 7464 gt 91 153 161 189 27310 on ixp0 Feb 6 03 46 02 2006 Benza AA MLE UDP 192 168 1 100 7464 gt 24 160 250 156 19343 on ixp0 Clear Log Now This feature clears all the current information on the log 49 N DONO your future life 12 2 System Statistic The device has the real time surveillance management feature that provides system current operation information such as port location device name current WAN link status IP address MAC address subnet mask default gateway DNS number of received sent total packets number
39. e Deny v All Traffic TOPRUDP 1 65535 No log vj 121 14 Lis us single v Scheduling lin Apply this rule Always D to Et 24 Hour Format Everyday Sun Mon Tue Wed Thu Fri Sat rara Cencal b Click Add New Rule under Access Rule page Select Deny in Action under the Service rule setting followed by the selection of All Traffic TCP amp UDP 1 65535 from the service and select Any for Interface Any for source IP address users with relevant needs may select either Single or Range to block any QQLive login by using one single IP or IP range followed by the selection of Single of the Dest IP and enter the IP address as 121 14 75 155 for the QQLive Server note that there are more than one IP address for QQLive server Repeated addition may be needed Lastly select Always under the Scheduling setting so that the QQLive Login Time can be set If necessary specific time setting may be undertaken Click Apply to move to the next step c Input the following IP address in Dest IP repeatedly 69 N your future life cache tv qq com logingglivedx gg com 58 60 11 145 219 133 49 159 58 60 11 146 logingglivewt gg com 58 60 11 147 58 251 63 13 59 36 97 5 logingglivexy gg com 59 36 97 7 202 205 3 218 59 36 97 37 219 133 63 48 gglive gg com 219 133 62 70 tv1 3t gg com 221 236 11 40 tv2 qq com
40. g to the MAC address is the source of attack Solutions for other device users are to make a two way binding of the IP address and MAC address from both of the PC and device ends in order to carry out the prevention work However this is more complicated because the search for the IP and address and MAC increases the workload Moreover there is greater possibility of making errors during the operation c Bind the IP MAC Address from Device End Enter Setup under DHCP page On the down right corner of the screen there is IP and MAC Binding where users may create IP and MAC binding On Enabled click on V and select Add to List Repeat these steps to add other IP addresses and MAC binding followed by clicking Apply at the bottom of the page 75 ONO your future life O IP amp MAC Binding Static IP MAC Address Name Enabled 192 168 1 101 00 1e 8c c5 b9 69 gt PC001 gt Enabled Block MAC address on the list with wrong IP address Block MAC address not on the list Show Tele Cancel After an item is added to the list the corresponding message will be displayed in the white block on the bottom However such method is not recommended because the inquiry of IP MAC addresses of all hosts creates heavy workload Another method to bind IP and MAC is more recommended because of easy operation reducing workload and time efficiency It is described in the following
41. ic Statistics Week WAN Downstream wani M wan2 M wan3 M wan4 M wans IM wans M wan7 IM wang Unit 000 Kbps JE Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 28 WAN Upstream M wani M wan2 M wan3 M wan4 M wans wan wan7 I wang Unit 1500 Kbps 1000 Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 26 The Ul might vary from model to model depending on different product lines 62 Average Unit Day Average E 676 E 696 E 636 M616 mo 621 Unit Day Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps N your future life XIII Log out On the top right corner of the web based UI there is a Logout button Click on it to log out of the web based UI To enter next time open the Web browser and enter the IP address user name and password to log in English a 63 N your future life Appendix User Interface and User Manual Chapter Cross Reference This appendix is to show the corresponding index for each chapter and user interface Users can find how to setup quickly and understand the Router capability at the same time Router overall interface is as below English Mia O WAN Status WANI WAN2 WAN3 WAN4 USB Home 192 168 4 101 0 0 0 0 0 0 0 0 0 0 0 0 NetWork 192 168 4 1 0 0 0 0 0 0 0 0 0 0 0 0 192 168 5 121 0 0 0 0 0 0 0 0 0 0 0 0 USB Setting 7 0 0 0 QoS IPIDHCP i i s x Di Group Management 0 0 0 0 Firewal
42. ich means the server for an N your future life external service such as WWW FTP Mail etc is contained in the network we recommend that users use the firewall function to set up the host as a virtual host and then convert the actual IP addresses the Internet IP addresses with Port 80 the service port of WWW is Port 80 to access the internal server directly In the configuration page if a web server address such as 192 168 1 50 and the Port 80 has been set up in the configuration this web page will be accessible from the Internet by keying in the device actual IP address such as http 211 243 220 43 At this moment the device actual IP will be converted into 192 168 1 50 by Port 80 to access the web page In the same way to set up other services please input the server TCP or UDP port number and the virtual host IP addresses O PortRange Forwarding Service IP Address Interface Enabled All Traffic TCP amp UDP 1 65535 IU UU any DD Service Management Delate pelected anplication Show Tabla Aggy O 0 Cenesl Service To select from this option the default list of service ports of the virtual host that users want to activate Such as All TCP amp UDP 0 65535 80 80 80 for WWW and 21 21 for FTP Please refer to the list of default service ports Internal IP Address Input the virtual host IP address Interface Select the WAN port Enabled Activate this function N you
43. l Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled 3322 Disabled 3322 Disabled 3322 Disabled 3322 Disabled 3322 Disabled Qnoddns Disabled Qnoddns Disabled Qnoddns Disabled Qnoddns Disabled Qnoddns Disabled Advanced Function System Tool 0 rules set 0 rules set 0 rules set 0 rules set Port Management Log RENE Re nen RENIN Category Sub category Chapter Home V Device Spec Verification Status Display and Login Password and Time Setting 5 1 Home USB Setting Please download user manual on Qno official webpage http www gno com tw Bandwidth 8 1 QoS Smart QoS Management your future life Session Control 8 2 Session Limit Hardware 8 3 Hardware Optimization Optimization IP DHCP VII Port Management 7 3 DHCP IP 7 4 DHCP Status 7 5 IP amp MAC Binding Setup Status IP 8 MAC Binding Group Management VII Port Management 7 6 IP Grouping 7 6 IP Grouping Local IP Group Remote IP Group Port Group 7 7 Port Group Management Firewall IX Firewall General Policy 9 1 General Policy 9 2 Access Rule 9 3 Content Filter XI Advanced Setting 11 1 DMZ Host Port Range Forwarding 11 2 UPnP Universal Plug and Play 11 3 Routing 11 4 One to One NAT 11 5 DDNS 11 6 MAC Clone 11 7 Inbound Load Balance Access Rule Content Filter Advanced Function DMZ Forwarding UPnP Routing One to One NAT MAC Clone Inbound Load Balance
44. lected the System Log feature will be enabled The device provides external system log servers with log collection feature System log is an industrial standard communications protocol It is designed to dynamically capture related system message from the network The system log provides the source and the destination IP addresses during the connection service number and type To apply this feature enter the system log server name or the IP address into the empty system log server field Matt Server tame oriP Actress logTime Tnreshold 10 minute Send Log to E mail If this option is selected E mail Warning will be enabled If users wish to send out all the logs please enter the E mail server name or the IP address for instance mail abc com This is set as system log recipient email address such as abc mail abc com Set the number of Log entries and the default entry number is 50 When this defined number is reached it will automatically send out the log mail 45 N your future life Log Time Threshold Set the interval of sending the log and the default is set to 10 minutes Reaching this defined number it will automatically send out the Mail log The device will detect which parameter either entries or intervals reaches the threshold first and send the log message of that parameter to the user Send Log to E mail Users may send out the log right away by pressing this button Log Setting O
45. life 10 6 MAC Clone Some ISP will request for a fixed MAC address network card physical address for distributing IP address which is mosily suitable for cable mode users Users can input the network card physical address MAC address 00 xx xx xx xx xx here The device will adopt this MAC address when requesting IP address from ISP MAC Clone WANI 0 56 4D 32 30 31 Edit WAN 2 60 56 4D 32 30 32 Edit WAN 3 60 56 4D 32 30 33 Edit WAN 4 50 56 4D 32 30 34 Edit Select the WAN port to which the configuration is to be edited click the hyperlink to enter and edit its configuration Users can input the MAC address manually Press Apply to save the setting and press Cancel to remove the setting Default MAC address is the WAN MAC address Interface HAN 1 CREER Default 50 56 4D 32 30 31 tas O 00 14 02 70 43 cD Apai Cemesi 20 N your future life 10 7 Inbound Load Balance Qno Firewall Router not only supports efficient Outbound Load Balance but Inbound Load Balance It distributes inbound traffic equally to every WAN port to make best use of bandwidth It also can prevent traffic from unequally distribution and congested Users can use only one device to satisfy the demand of Inbound Outbound Load Balance simultaneously Following introduces how to enable and setup Inbound Load Balance step by step Attention In For some models of Qno routers user can try the function for a period but with
46. mple Message wrong settings occurrence of abnormal functions system reactivation disconnection of PPPoE and so on Deny Policies If remote users fail to enter the system because of the access rules for instance message will be recorded in the system log Allow Policies If remote users enter the system because of compliance with access rules for instance message will be recorded in the system log Configuration When the system settings are changed this message will be sent back Change to the system log Authorized Login Successful entry into the system includes login from the remote end or from the LAN into this device These messages will be recorded in the system log The following is the description of the four buttons allowing online inquiry into the log View System Log This option allows users to view system log The message content can be read online via the device They include All Log System Log Access Log Firewall Log and VPN log which is illustrated as below 47 na gt m i Ha PRE A 5 ine Ls ho be zim your future life Syslog Windows Internet Explorer JE http 192 169 1 1 sys log htm Current Time Wed Dec 17 18 55 19 2008 Oct 24 09 41 01 2008 Oct 24 09 41 01 2008 Oct 24 09 45 36 2008 Oct 24 09 47 57 2008 Oct 24 09 47 57 2008 Oct 24 09 48 24 2008 Oct 24 09 49 12 2008 Oct 24 09 49 12 2008 Oct 24 09 49 58 2008 system Log system Log Authentication Success system
47. nnection and DHCP issuing function 41 N your future life 11 7 License Key Users have to purchase License Key to enable some functions in Qno Firwalls Routers series or upgrade to Official Version not trial version such as QnoSniff or Inbound Load Balance etc O License Key Current Time License Key Number Current Time License Key Number Feature Name Trial Version Official Version 2010 07 16 NIP Server Trial version Official Version Registration time status And Information Trial Trial EI ES Rakesh Before inputing License Key the device will check whether current time is correct and whether License Key is still in valid period In order to prevent from dysfuction problems we strongly recommend you to check and update the time correctly before attempting a feature and entering License Key Input License Key you purchase Generally the key is composed by several alphanumeric characters Enter the key and click Submit and the system will check whether the License Key is valid If the key is valid users will be allowed to use the feature The Official Version column of that feature will be checked List value added features If there is no Trial Version button in the Trial Version column it means the feature has no trail version or it just supports the amount of VPN tunnels such as QnoSoftKey Display Trial button in the Trial Version
48. ory default to ensure system stable Please refer to 12 3 36 N your future life 11 6 High Availability High Availability is adopted in the network that requires fault tolerance and backup mechanism Two similar devices are used to be the backup for each other One of these devices is employed for major network transmitting and the other redundant device will take over when the master device fails to assure that network transmitting and services never break down Therefore administrators will have more opportunity and time to deal with the master device problems Besides general HA Qno also provides advanced HA function that enables two devices to operate simultaneously It brings full cost efficiency without making another device idle It does not have to be the same model All of Qno devices which support HA can achieve the function O High Availability High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously Operation a Master Mode C Backup Mode Master Slave Mode setting Of two devices must be different Status Normal Status of the backup device Normal aly Gemeel High Availability Enable Activate HA function Disable Disable HA function Mode 1 Hardware Backup Mode It is the general backup mode The master device takes responsibility of network transmitting and the other one is set as idle When the master device fails transmitting it will send
49. ously Operation Master Mode Slave Mode DHCP Enable DHCP Disable Master Slave Mode setting Of two devices must be different WAN Backup LAN Gateway Backup Clwan 1 Clwan 2 WAN 3 Mwan 4 The checked WAN are not working in this device MAC Address of the backup device o Ho Ho Ho Ho o Status Operation Slave Mode WAN Backup The Checked WANs are not working in this device LAN Gateway Backup MAC Address of the backup device Status Normal Although working with master device Backup device s DHCP server is disabled LAN users need to transmit traffic through the WAN on Slave device You should add LAN IP of Slave device into Master device DHCP server default gateway which is DHCP server IP address For example if the DHCP server s IP of Master device is 192 168 1 1 and the subnet mask is 255 255 255 0 Salve device should be in the same subnet ex 192 168 1 2 The checked WANs will works in another device For an example if WAN1 and WAN2 work in this device and WAN3 and WAN4 work in another WAN3 and WAN4 should be checked Input the LAN IP of Master device lt should be different from Slave device s IP Must be in the same subnet Input the LAN MAC of Master device It should be different from Salve device s LAN MAC Status Normal indicates both devices work normally Status Backup indicates the Backup device is enabled for backing up Master device to take over WAN co
50. r future life Service Port Add or remove service ports from the list of service ports Management Add to list Add to the active service content Service Port Management The services in the list mentioned above are frequently used services lf the service users want to activate is not in the list we recommend that users use Service Port Management to add or remove ports as follows service Name All Traffic TCP amp UDP 1 65535 RE DNS UDP 53 53 FTP TCPI21 21 HTTP TCP 80 80 Protocol HTTP Secondary TCP 8080 8080 HTTPS TCP 443 443 HTTPS Secondary TCP 8443 8443 Port Range TFTP UDP 69 69 IMAP TOP 143 143 to NNTP TCP 119 119 POPS TCP 110 110 SNMP UDP 161 161 SMTP TCPi25 25 TELNET TCP 23 23 TELNET Secondary TCP 8023 5023 i Add to list Nelets selected Service gt Service Name Input the name of the service port users want to activate on the list such as E donkey etc Protocol To select whether a service port is TCP or UDP Port Range To activate this function input the range of the service port locations users want to activate Add to list Add the service to the service list Delete selected item To remove the selected services N your future life Apply Cancel Close Click the Apply button to save the modification Click the Cancel button to cancel the modification This only works before Apply is clicked
51. s 38 N your future life High Availability ce Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously Operation C Master Mode ts Backup Mode Master Slave Mode setting Of two devices must be different LAN IP of the backup device we s I K MAC Address of the backup device p b p DO Status Normal Operation Backup Mode Indicates the backup device will take over when the master fails transmitting WAN and LAN IP setting in backup device should be the same as those of master device The backup device should not be in charge of network transmitting and DHCP server ox If the original LAN IP addresses are issued by Master device DHCP server setting of Backup device should be the same as Master device The Backup device can keep DHCP functioning and there will be no LAN disconnection LAN IP of the backup device Input LAN IP of Master mode which is backed up MAC Address of the backup Input Master device MAC address which is backed up device Status Status Normal indicates the status is idle Master device operates normally Status Backup indicates the device takes over all the network transmitting The status will return to Normal when Master device boots normally and send a message to the backup device Then the status will return to Normal which the backup device remains idle Two devices are operating simultaneou
52. sly 39 N your future life High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously 43 Master Mode C Slave Mode Operation DH GP Enable DHGP Disable Master Slave Mode setting Cf two devices must be different WAN Backup WAN wana M WAN3 WAN 4 The checked WAN are not working in this device LAN Gateway Backup Bz fe IE MAC Address of the backup device 0 p p p p Status Normal Operation Master Mode Besides operating network with another device Master device is also the DHCP server to issue LAN IP addresses Although Slave device also supports outbound linking its DHCP server is disabled WAN Backup The checked WANs will works in the other device For an example if The Checked WANs are not WAN1 and WAN2 work in this device and WANS and WAN4 work in working in this device the other device WAN3 and WAN4 should be checked LAN Gateway Backup Input LAN IP of Slave device The IP should be different from LAN IP of Master device MAC Address of the backup device Input LAN MAC of Slave device It should be different from LAN MAC of Master device Status otatus Normal means both two devices operate normally Status Backup indicates Slave mode has problems and the device enables backup to take over WAN 40 N your future life High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultane
53. t Internal IP Interface Enable Add to List service Port All Traffic TCP amp UDP 1 65535 Service Port Management Internal IP Address E Interface Enabled Delete selected item Activate the service port of A Record server e g SMTP TCP 25 25 for Mail Input the internal IP of A Record e g 192 168 8 100 of Mail server Select the WAN port of A Record and corresponding IP Activate the configuration Add to the active service content 28 N your future life XI System Tool This chapter introduces the management tool for controlling the device and testing network connection For security consideration we strongly suggest to change the password Password and Time setting is in Chapter 5 2 11 1 Diagnostic The device provides a simple online network diagnostic tool to help users troubleshoot network related problems This tool includes DNS Name Lookup Domain Name Inquiry Test and Ping Packet Delivery Reception Test O DNS Name Lookup Ping Ping host or P address DNS Name lookup On this test screen please enter the host name of the network users want to test For example users may enter www abc com and press Go to start the test The result will be displayed on this page DNS Name Lookup Pina Look up the name Name WWW qno com tw Address 59 124 180 50 29 N your future life Ping DNS Name Lookup Ping Ping host or IP
54. t Qno s technical engineers suggest that further measures should be taken to prevent the ARP attack 1 Deal with virus source as well as the source device affected by virus through virus killing and the system re installation This operation is more important because it solves the source PC which is attacked by ARP This can better shelter the network from being attacked 2 Cyber caf administrators should check the LAN virus install anti virus software Ginshan Virus Reixin must update the virus codes and conduct virus scanning for the device 3 Install the patch program for the system Through Windows Update the system patch program critical update security update and Service Pack 4 Provide system administrators with a sophisticated and strong password for different accounts It would be best if the password consists of a combination of more than 12 letters digits and symbols Forbid 78 N your future life and delete some redundant accounts 5 Frequently update anti virus software virus data base and set the daily upgrade that allows regular and automatic update Install and use the network firewall software Network firewall is important for the process of anti virus It can effectively avert the attack from the network and invasion of the virus Some users of the pirate version of Windows cannot install patches successfully Users are advised to use network firewall and other measures for protection 6
55. than one IPs is checked Inbound traffic will be distributed on this WANs 8 Alias Record Add or modify alias record CNAME Record This kind of record allows you to assign several names to one computer host which may provide several services on it For instance there is a computer whose name is host mydomain com A record It provides WWW and Mail services concurrently Administrator can configure as two CNAME WWW and Mail They are 25 N ONO your future life www mydomain com and mail mydomain com They are both orientated to host mydomain com You can also assign several domain names to the same IP address One of the domains will be A record corresponding server IP and the others will be alias of A record domain If you change your server IP you don t have to modify every domain one by one Just changing A record domain and the other domains will be assigned to new IP address automatically O Alias Record CName Record ns e PO test com po testcom ES testcom pO test com PO test com pO testcom PO testcom pO testcom Alias Input Alias Record corresponding to A Record Target Input the existed A Record domain name 9 Mail Server Add or modify mail server record MX Record is directed to a mail server It orientates to a mail server according to the domain name of an E mail address For example someone on internet sends a mail to user myhomain com The mail server will sear
56. ty that can view the device SNMP data The default setting is Public Set the name of the group or community that can receive the device SNMP data The default setting is Private Set user parameters password required by the Trap receiving host computer to receive Trap message Set one IP address or Domain Name for the Trap receiving host computer 33 N your future life Apply Press Apply to save the settings Cancel l Press Cancel to keep the settings unchanged 34 ONO your future life 11 5 System Recover Users can restart the device with System Recover button Restart Restart Router Factory Default Return to Factory Default Setting Restart As the figure below if clicking Restart Router button the dialog block will pop out confirming if users would like to restart the device O Restart Restart Route Windows Internet Explorer O Factory Default 2 Ave you sure you want to restart router Return to Factory Default Setting If clicking Return to Factory Default Setting the dialog block will pop out if the device will return to factory default 35 ONO your future life Factory Default Windows Internet Explorer Z Are you sure you want to return to default setting f It s recommended to save the current configuration before upgrading firmware After firmware upgraded import the configuration file after returning to fact
57. up After pushing the confirmation button the group will be deleted You can choose several ports from Port list on the left side and push this button to have them added into the group the right side Delete self defined port or port range Click Apply to save the network configuration modification Click Cancel to leave without making any changes Q ONO your future life N your future life X Advanced Function 10 1 DMZ Host Port Range Forwarding O DMZ Host DMZ Private IP Address 192168 o Port Range Forwarding Service IP Address Interface Enabled All Traffic TCP amp UDP 1 65535 I yy any Of Service Management Nelets selected snpli emiti ar Show Tehle C App Cemesl 11 1 1 DMZ Host When the NAT mode is activated sometimes users may need to use applications that do not support virtual IP addresses such as network games We recommend that users map the device actual WAN IP addresses directly to the Intranet virtual IP addresses as follows If the DMZ Host function is selected to cancel this function users must input 0 in the following DMZ Private IP This function will then be closed After the changes are completed click Apply to save the network configuration modification or click Cancel to leave without making any changes 11 1 2 Port Range Forwarding Setting up a Port Forwarding Virtual Host If the server function wh

Download Pdf Manuals

image

Related Search

Related Contents

Getting Started with the WC02  PT-35 PT-35  Model 3164-07 Open-Boundary Quad  mets de noël, très bon de commande mets de noël, livraison ici et là  Ficha Técnica Hormiarte Mix  

Copyright © All rights reserved.
Failed to retrieve file