Home

User Manual

image

Contents

1. Choose DNS mode and then fill in the Host name and corresponding IP address of WAN1 and WAN2 Press Finish button the setting will be effective in 24 hours Attention Please follow your ISP to modify Host IP assignment if your upper level isn t TWNIC If your DNS agent is other ISP please refer to the Web configuration provided by your ISP 5 Configure Firewall Router Domain Name 217 CIPI CT sia p LASE your future life SSL IPSec VPN Firewall Enabled Inbound Load Balance Domain Name Input the Domain Name which is applied before The domain name will be shown in following configuration automatically without entering again Time To Live Time To Live the abbreviation is TTL is time interval of DNS inquiring second 0 65535 Too long interval will affect refresh time Shorter time will increase system s loading but the effect of Inbound Load Balance will be more correct You can adjust according your reality application Administrator Enter administrator s E mail address e g test abc com tw 6 DNS Server Settings Add or Modify NS Record NS Record NS Record is the record of DNS server to assign which DNS server translates the domain name DNS Server Settings NS Record C WAN 1192 1684 1164 EEE C WAN 2 0000 test com LARTA TAA EY C WAN 3 0000 C WAN 4 0000 C WAN 1 192 168 4 J64 C WAN 2 0000 testcom perrera C WAN 3 0000 C WAN 4 0000 WAN 1 192 1
2. 164 acilicet 165 11 3 Group Management ssssssssssssssssesseeee nennen nennen ann nnn nena n ines nnn annis nain nnns nenas 166 11 4 Domain MaNAGe em 185 your future life SSL IPSec VPN Firewall 11 5 User AAG SCN MD T m 186 11 6 Service Resource Management ccccccccccseseseeeeeaeeeeeeeecaeeeeeeeesaaeeeeeesseaaseeeesseaeseeeeesaaeees 189 BE oM Mor UMEN 190 IL 1 6 2 Resource C OB D UETD Of uui ihis atas PiEa ep Sous Can RSS THEE IP AU atis ab asma MIRI E PD EPURSE dIN aan C A IROCNU SUEDE MAUS 190 nur GNK lO ue TR 192 11 8 Advanced Settings ueooetexixieriibo derunt tenientntuE unite t anima teniasituMb umet dunt QA UI exa xni Es 193 INE ICI CSI 194 11 8 2 Advanced Confi9guratiOlis ooo apio toe esi Stet rV PPS E oobesedacanbepndbahaudeeteaoined sabedaveterbeandserncannsonsecadoeheus 196 TiS SSL Uperade Serial INBHBBDE iov si otv ovas ido Sra Sl E E aiaa 199 PA ipid M oaa 200 12 DMZ Forwarding contin RIGE IUS GoURTNRA E ENS dud GU E AUR ONU QUS XOU GUT ORSUT 200 eS EN SEALED INTO Em 200 T212 Port Ranse TOR yy Ai ON TR m 201 Tee UPRP tastes cena at eect 204 123 ROUINO X RES 205 12
3. 3 Microsoft XP 2000 VPN Client If users select XP 2000 VPN Client end status users don t need to do extra settings If there is any encryption mechanism the encryption mechanism of these two VPN channel settings must be identical in order to establish connection And the transmission data must be encrypted with IPSec key which is also known as the encryption key The device provides the following two types of encryption management modes Manual and IKE automatic encryption mode IKE with Preshared Key automatic If the Group VPN is selected or the dynamic IP address of the Remote Security Gateway Type is applied Aggressive Mode will be enabled automatically without the option of Manual mode 146 T i j D 3 l5 your future life SSL IPSec VPN Firewall Encryption Management Protocol IPSec Setup cree WE vi Peste rset re Gun v O Pesdtnpiea DES ov O Hase aienators W08 v 0 PselsALfeTme D socana C A Advanced Perfect Forward Secrecy When users check the PFS option make sure to activate the PFS feature of the VPN device and that VPN Client as well e Phase 1 Phase 2 DH Group This option allows users to select Diffie Hellman groups Group 1 Group 2 Group 5 Phase1 Phase2 Encryption This option allows users to set this VPN channel to use any encryption mode Note that this parameter must be identical to that of the remote encryption parameter DES 64 bit encryption mode
4. 203 your future life SSL IPSec VPN Firewall Exit Quit this configuration window 12 2 UPnP UPnP Universal Plug and Play is a protocol set by Microsoft If the virtual host supports UPnP system such as Windows XP users could also activate the PC UPnP function to work with the device UPnP Mapping Service Port DNS Service Port Management Enabled Add to list Delete selected item Ehan Tabla Aaah Cancel Service Port select the UPnP service number default list here for example WWW is 80 80 FIP is 21 21 Please refer to the default service number list Host Name or IP Address Input the Intranet virtual IP address or name that maps with UPnP such as 192 168 1 100 Enabled Activate this function Service Port Management Add or remove service ports from the management list Add to List Add to active service content Delete Selected Item Remove selected services Show Table This is a list which displays the current active UPnP functions Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any change 204 ONO your future life SSL IPSec VPN Firewall 12 3 Routing In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing Information Protocol Dynamic Routing 9 Gateway Router QEnabled Disabled Static Routing DetiP jf Subnet Mask LIE d db
5. in GING your future life 4WAN 4LAN SSL IPSec VPN Firewall Load Balance Bandwidth Management and Network Security English User s Manual your future life SSL IPSec VPN Firewall Content l MAU OCCU 1o HIE NIME 7 II Multi WAN Router Installation os osa osos ta eo sa poss eo eo sad eee aka Peu ee NY E Has accused coscsasscessmssacossdassteseaseescesacs 10 2 1 Systematic Setting Process ssssssssssssssssssssse esee n nnn nsns nnn nnn nn 10 PUE neBgdeme n 10 HI Hardware Installation cis E TT IT 13 ST OUTER LED SION s diciitrscitsisdetuk E ten didt cma NIC CUR IRAE ROT E 13 3 2 Router Network Connection ssessssssssssssssseeseeeeeenee nennen nennen nnn nnns nnne nnn nnns 15 Iy NEU BI M 16 V Device Spec Verification Status Display and Login Password and Time Setting 18 SM alert din ie TEE 18 SNB I CUI RETENTO m T UU TM m 18 S L 2 Physical PORE SEA US e ates esr eee e ineo ios utes sU stein DM EEEE 19 221 3 5 5 SEC arma O e auaecht edis astra ete eset EE E acu sucsa pu E E EE E aUe cp iE end 2 SMP RE o E i NOR 22 SN PEN Log Seting SIIS RR ieii aonne Ear r i orn iie 22 5 2 Change and Set Login Password and Time cccccccccccssseeeeeeeaeeeeeeeeeeaeeeeeesaaeeeeeeesaaeeeeeeeas 24 ec RS et
6. test com C WAN 11921584164 C wAN 2 0000 C WAN 3 0000 C WAN 4 0000 test com test com C WAN 1192 1684 64 C WAN 2 0000 C WAN 3 0000 C WAN40000 WAN 1 192 168 4 164 C WAN 2 0000 C WAN 3 0000 C WAN 4 0000 Host Record A Record test com test com WAN 1 192 168 4 164 T WAN 2 0000 T WAN 3 0000 T wan 4 00 00 7 wan 1192 168464 l WAN 2 0000 l WAN 3 0000 test com wan 4 0000 7 wan 11921684164 T wan 2 0000 T wan 3 0000 7 WAN 4 0000 test com WAN 1 192 168 4 164 M WAN 2 0000 wan 3 0000 WAN 4 0000 Alias Record CName Record test com test com test com test com testcom test com test com test com 216 your future life SSL IPSec VPN Firewall 4 Configure Domain Name and Host IP Assign DNS service provider and Host IP address Take the setting on TWNIC as an example the network structure and IP are as following WAN1 ADSL ISP A 210 10 1 1 WAN ADSL ISP B 200 1 1 1 Domain Name abc com tw Name Server NS nsi abc com tw ns2 abc com tw Go to website of your DNS service provider to modify your own DNS Host IP as the following figure DNS REME AMOR EH EIRE IBSDNSEOGE DNSBBISERDI DNS TUECGEBSuISZ S DII DNSEMKENM IP Address z xi si IRE So itanit ie ME tase fO RBI
7. Only when a device assignment is collocated with Protocol Binding can the balancing function be brought into full play For example an assignment requiring all Intranet IP addresses to go through WAN 1 when connecting with service port 80 or go through WAN 1 when connecting with IP 211 1 1 1 must be set up in the Protocol Binding Configuration Attention When assigning mode is selected as in the above example the IP s or service provider s configured in the connection rule will follow the rule for external connections but those which are not configured in the rule will still follow the device Load Balance system to go through 47 your future life SSL IPSec VPN Firewall other WAN ports to connect with the Internet Please refer to the explanations in 6 2 3 Configuring Protocol Binding for setting up Protocol Binding and for examples of collocating router mode with Protocol Binding Strategy Routing Mode If strategy Routing is selected the device will automatically allocate external connections based on routing policy Division of traffic between Telecom and Netcom is to be used in China embedded in the device All you have to do is to select the WAN or WAN group which is connected with Netcom the device will then automatically dispatch the traffic for Netcom through that WAN to connect with the Internet and dispatch traffic for Telecom to go through the WAN connected with Telecom to the Internet accordingly In this
8. is selected the rule will be executed according to the configured time range For example if the time control is from Monday to Friday 8 00am to 6 00pm users can refer to the following figure to set up the rule Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change Exempted Service Port or IP Address Some IP addresses or specified services should be free in a environment for example SMTP service you can use this function to avoid the session control Q Exempted Service Port or IP Address Service Enabled Add to list Delete selected item Saal Cemcell Service Choose the service port IP Address Input the IP address range or IP group 96 your future life SSL IPSec VPN Firewall Enabled Activate the rule Add to list Add this rule to the list Delete selected Remove the rules selected from the Service List item Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change 97 your future life SSL IPSec VPN Firewall 8 3 Hardware Optimization Future Feature This VPN router not only provides high processing performance but also launches hardware optimization function for bandwidth control and traffic prioritization The main purpose is to process the bandwidth functions through hardware design which can accelerate and prioritize the traffic distribution and usage without wasti
9. Previous Page Next Page Jumpto __ Page Entries Per Page Tunnel No Status Account ID Add New Tunnel Click Previous page or Next page to view the desired VPN tunnel page Or users can select the page number directly to view all VPN tunnel statuses such as 3 5 10 20 or All To set the embedded VPN feature please select the tunnel number It supports up to 300 IPSec VPN tunnel Setting gateway to gateway as well as client to gateway Successful connection is indicated as Connected Failing hostname resolution is indicated as Hostname Resolution Failed Resolving hostname is indicated as Resolving Hostname Waiting to be connected is indicated as Waiting for Connection If users select Manual setting for IPSec setup the status message will display as Manual and there is no Tunnel test function available for this manual setting Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid 119 your future life SSL IPSec VPN Firewall confusion should users have more than one tunnel settings Note If this tunnel is to be connected to other VPN device not this device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can thus be successfully enabled Phase2 Displays settings such as encryption DES 3DES authentication Encrypt Auth Group
10. Self Defined IP To build a self defined IP users can use a text based editor such as Notepad which is included with Windows system Follow the text format in the figure below to key in the destination IPs users want to assign For example if the destination IP address range users want to designate is 140 115 1 1 140 115 1 255 key in 140 115 1 1 140 115 1 255 in Notepad 66 your future life SSL IPSec VPN Firewall The next destination IP address range should be keyed in the next line Attention Even if only one destination IP address is to be assigned it should follow the same format For example if the destination IP address is 210 66 161 54 it should be keyed in as 210 66 161 54 210 66 161 54 After the document has been saved the extension file name is txt users can import the IP range of self defined strategy D SelfiP txt Notepad File Edit Format View Help 1458 115 1 1 7158 115 1 255 216 66 161 54 216 66 161 54 Self Defined Port To build a self defined Port users can use a text based editor such as Notepad which is included with Windows system For example if the destination port users want to designate is TCP 3724 3724 key in TCP 3724 3724 in Notepad The next destination port should be keyed in the next line After the document has been saved the extension file name is txt users can import the port of self defined strategy D SelfPort txt Notepad Selle File Edit Format Vi
11. into the IP boxes select the WAN for which users want to set up the binding rule To activate the rule To add this rule to the list To remove the rules selected from the Service List The priority for rule execution depends on the rule order in the list A rule located at the top will be executed prior to those located below it Users can arrange the order according to their priorities The rules configured in Protocol Binding will be executed by the device according to their priorities too The higher up on the list the higher the priority of execution Show Priority Click the Show Priority button A dialogue box as shown in the following figure will be displayed Users can choose to sort the list by priority or by interface Click Refresh and the page will be refreshed click Close and the dialogue box will be closed 59 GINO your future life SSL IPSec VPN Firewall Su mmary a Priority i Interface Refresh Add or Remove Service Port If the Service Port users want to activate is not in the list users can add or remove service ports from Service Management to arrange the list as described in the following Service Name All Traffic TCP amp UDPH 65535 I DNS UDP 53 53 FTP TCP 21 21 HTTP TCP 30 80 HTTP Secondary TCP 8080 8080 HTTPS TCP 443 443 HTTPS Secondary TCP 8443 8443 ar TFTP UDP 69 69 aoe IMAP TCP 143 143 Jol NNTP
12. 13 6 High Availability High Availability is adopted in the network that requires fault tolerance and backup mechanism Two similar devices are used to be the backup for each other One of these devices is employed for major network transmitting and the other redundant device will take over when the master device fails to assure that network transmitting and services never break down Therefore administrators will have more opportunity and time to deal with the master device problems Besides general HA Qno also provides advanced HA function that enables two devices to operate simultaneously It brings full cost efficiency without making another device idle It does not have to be the same model All of Qno devices which support HA can achieve the function High Availability High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously Operation e Master Mode C Backup Mode Master Slave Mode setting Of two devices must be different Status Normal Status of the backup device Normal High Availability Enable Activate HA function Disable Disable HA function Mode 1 Hardware Backup Mode It is the general backup mode The master device takes responsibility of network transmitting and the other one is set as idle When the master device fails transmitting it will send out the message to the idle device for taking over network transmitting immediately 229 N
13. 264 your future life SSL IPSec VPN Firewall network session about What is the MAC address of 192 168 1 1 Other host devices do not respond to the ARP inquiry except host device B which responds to host device A when receiving this frame The MAC address of 192 168 1 1 is 00 aa 00 62 c6 09 So Host A knows the MAC address of Host B and it can send data to Host B Meanwhile it will update its ARP cache Moreover ARP virus attack can be briefly described as an internal attack to the PC which causes trouble to the ARP table of the PC In LAN IP address was transferred into the second physical address MAC address through ARP protocol ARP protocol is critical to network security ARP cheating is caused by fake IP addresses and MAC addresses and the massive ARP communications traffic will block the network The MAC address from the fake source sends ARP response attacking the high speed cache mechanism of ARP This usually happens to the cyber cafe users Some or all devices in the shop experience temporal disconnection or failure of going online It can be resolved by restarting the device however the problem repeats shortly after Cafe Administrators can use arp a command to check the ARP table If the device IP and MAC are changed it is the typical symptom of ARP virus attack Such virus program as PWSteal lemir or its transformation is worm virus of the Trojan programs affecting Windows 95 98 Me NT 2000 XP 200
14. 3DES 128 bit encryption mode AES the standard of using security code to encrypt information It supports 128 bit 192 bit and 256 bit encryption keys Phase 1 Phase 2 Authentication This authentication option allows users to set this VPN tunnel to use any authentication mode Note that this parameter must be identical to that of the remote authentication mode MD5 or SHA1 e Phase SA Life Time The life time for this exchange code is 28800 seconds or 8 hours by default This allows the automatic generation of other exchange passwords within the valid time of the VPN connection so as to guarantee security e X Phase2 SA Life Time The life time for this exchange code is 3600 seconds or 1 hour by 147 your future life SSL IPSec VPN Firewall default This allows the automatic generation of other exchange passwords within the valid time of the VPN connection so as to guarantee security Preshared Key For the Auto IKE option enter a password of any digit or character in the text of Pre shared Key the example here is set as test and the system will automatically translate what users entered as exchange password and authentication mechanism during the VPN tunnel connection This exchange password can be made up of up to 30 characters Advanced Setting for IKE Preshared Key Only The advanced settings include Main Mode and Aggressive mode In Main mode the default setting is Q Advanced A
15. Source IP ide 166 1 _ 150 ty 200 i Group Destination IP 0 0 0 0 mp Interface AN2 Enable C HTTP TCP 80 80 21827 188 1 1507200 0 0 0 00 0 0 DOWANE Delete selected application Add Hew Back Aay C Camel Example 3 How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going through WAN when the destination port is Port 80 and keep all other services from going through WANT As in the figure below there are two rules to be configured The first rule select HTTP TCP 80 80 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 to 0 which means to include all Intranet IP addresses Retain the original numbers 0 0 0 0 in the boxes of Destination IP Which means to include all Internet IP addresses Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode The device will transmit packets to Port 80 through WAN2 However with only the above rule packets that do not go to Port 80 may be transmitted through WAN therefore a second rule is necessary The second rule Select All Ports TCP amp UDP 1 65535 from the pull down option list Service and then input 192 168 1 2 254 in the boxes of Source IP Retain the original numbers 0 0 0 0 in the boxes of Destination IP which means to include all Internet IP addresses Select WAN1
16. sssoossssocssseossssocssseososeoossseossseososseososeosssseosossososseesossocssseossssosssseosos 117 1O T YPN eect PE 117 10 1 1 Display All VPN Summary assente coaceesnevnssseodindegsatonceslsecesddscwavsstesinndienctise Cox eei natu P apu ae bre rae ine tke ies pura dads 117 IT Adda New MVPINCDUBIE sidpai DRIN EUSISI DII IUMODUIENIS ISIN DIN REI MODUM SIDE DEIN REI MODE 121 IO T3 PP TE SCS aa r N ud EdDN petita eg DUI demi NUMEN UE IDE 149 LOST OW PINIJPOSS DEBEO Do udeecatuteen None aso cesar RS MUnDuHR edidi addat estes epe EUER RO nM Uu IE E PDA RO ET E 152 piso 1 00 m eeee eee 153 10 21 Qnokey SIAR Yn 50555 deanascnssasunsetoaenbniesansnondeatcinancannenndoibore ny sdannendaatancien oosanend aaiae i aeieeiaii saii 153 OOS ae OUI SCU RTT 154 DE Onoke Peor LIST MT RR 157 10 3 QVM VPN Mts lead eg poi 10 o BeNneemen er een tne sree eer pn ety Wee ert N eee rere ta ease 159 IOS hL OV IVE Server SCOT Soo aerate ons nneta sect op absouaaaaeeanduacnbsaqonaesccGsa onecedasapadieauacminceodsooait eset oa eE 159 IDs OVNE M 161 10 3 QVM Client Set ngs Future Feature t1scicsscanercnasine sunceasdet God ap azur etg o e E edusee accetta cot an dv cUoEU ias 162 54 NU PR ui c M 164 Le E
17. 1 The tunnel number conversion ratio among IPSec VPN QVM and Qnokey is 1 1 1 2 The conversion ratio between PPTP and IPSec VPN OVM Ginokey is 1 10 Namely one PPTP tunnel is equal to tenfold IPSec VPN QVM Gnokey tunnel 3 The maximum weighting of total tunnels is equal to the specification limitation of PPTP tunnel number x PPTP weighting 10 4 Total tunnel weighting is equal to PPTP total tunnel number x PPTP weighting 10 IPSec VPN QVM OnokKey total tunnel number x IPSec weighting 1 5 The conversion principle can t overrule the specification limitation of each type tunnel Total tunnel weighting 1400 Max 1500 PPTP Total Tunnel Number Tunnels Used IPSec Setup z QVM Total Tunnel Number Tunnel s Used QnoKey Total Tunnel Number D Tunnel s Used IPSec VPN Total Tunnel Number D Tunnels Used Detail Push this button to display the following information with regard to all current VPN configurations to facilitate VPN connection management 118 CINCO your future life Detil Windows Intermet Explorer SSL IPSec VPN Firewall e http 192 168 1 1 Vpnsettig htm WANT IP 0 0 0 0 WAN2 IP 0 0 0 0 WAN3 IP 192 168 4776 WAN4 IP 0 0 0 0 Mon Aug 11 15 29 37 2008 VPN Tunnel Status The following describes VPN Tunnel Status the current status of VPN tunnel in detail VPN Tunnel Status n Tunnelfs Enabled n Tunnel s Defined Jump 1 ti Edi 1Page is RH entries per page
18. 4 Provide system administrators with a sophisticated and strong password for different accounts It would be best if the password consists of a combination of more than 12 letters digits and symbols Forbid 271 your future life SSL IPSec VPN Firewall and delete some redundant accounts 5 Frequently update anti virus software virus data base and set the daily upgrade that allows regular and automatic update Install and use the network firewall software Network firewall is important for the process of anti virus It can effectively avert the attack from the network and invasion of the virus Some users of the pirate version of Windows cannot install patches successfully Users are advised to use network firewall and other measures for protection 6 Close some unnecessary services and some unnecessary sharing if the condition is applicable which includes such management sharing as C and D Single device user can directly close Server service 7 Do not open QQ or the link messages sent by MSN online chatting tools in a causal manner Do not open or execute any strange suspicious documents and procedures such as the unknown attachment enclosed in E mail and plug in 4 Summary ARP attack prevention is a serious and long term undertaking The above methods can basically resolve the network problems caused by ARP virus attack Moreover clients who adopted similar methods witness good results However it is importa
19. ISP If you have multiple IP ranges you need setup group1 and group 2 You can also setup the default gateway and IP range in the group 2 The WAN disconnection schedule will be activated by checking this option In some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Input the time rule for disconnection of this WAN service Input how long the WAN service may be disconnected before the newly added connections should go through another WAN to connect with the Internet Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP 41 your future life SSL IPSec VPN Firewall Click Apply to save the configuration or click Cancel to leave without making any changes DMZ Setting For some network environments an independent DMZ port may be required to set
20. MD5 SHA1 and Group 1 2 5 If users select Manual setting for IPSec Phase 2 DH group will not display Local Group Displays the setting for VPN connection secure group of the local end Remote Group Displays the setting for remote VPN connection secure group Remote Gateway Set the IP address to connect the remote VPN device Please set the VPN device with a valid IP address or domain name Control Click Connect to verify the tunnel status The test result will be updated To disconnect click Disconnect to stop the VPN connection Config Setting items include Edit and Delete icon U Click on Edit to enter the setting items and users may change the settings Click on the trash bin icon and all the tunnel settings will be deleted Tunnel s Enabled This displays how many tunnels are enabled and how many tunnels m are set Tunnel s Defined VPN Group Tunnel Status If there is no setting for Group VPN there will be no display of VPN Group status Q VPN Group Tunnel Status Group Name Displays the tunnel name of the Group VPN that is connected 120 your future life SSL IPSec VPN Firewall Connected Tunnels Displays the VPN Groups tunnel numbers Phase2 Displays settings such as encryption DES 3DES authentication MD5 SHA1 and Group 1 2 5 Encrypt Auth DH If users select Manual setting for IPSec Phase 2 DH group will not be displayed Local Group Displays the VPN connection secure
21. NE auum Ed a we J p f E A it U EE E ti um your future life SSL IPSec VPN Firewall Cancel Click Cancel to clear any recent changes to the settings 6 NT Domain 2 hitp 192 168 1_1fedit_sslvpn_domain_ him Windows Internet Ex E mta E http192 106 1 Ledit_slypn_domean hin Authentication Type Domain Name NT Server Address NT Domain Name Al JL Authentication Type Select the authentication server type from the drop down menu Domain Names Name the selected authentication server NT Server Address Enter the NT Domain authentication server address NT Domain Name Enter NT Domain authentication domain name For example qno com Submit Click on the Submit tab to save changes Cancel Click Cancel to clear any recent changes to the settings T Active Directory http 192 168 1 1 edit_sslvpn_domain him Windows Internet Ex e 0 X http 192 168 1 1 edit sslvpn domain htm Authentication Type Domain Name Server Address Active Directory Domain Submit Authentication Type Select the authentication server type from the drop down menu 174 your future life SSL IPSec VPN Firewall Domain Name Name the selected authentication server Server Address Enter Active Directory authentication server address Active Directory Enter Active Directory authentication servers domain name For Domain example qno com Submit Click on the S
22. source IP addresses destination IP addresses and service ports It is illustrated as below Incoming Log Table IN ppp4 OUT eth0 SRC 121 6 29 221 DST 192 188 1 211 LEN 48 OS 0x00 PREC 0x00 TTL 107 ID 9178 DF PROTO TCP SPT 1288 DPT 5110 WINDOW 65535 RES 0x00 SYN URGP 0 IN ppp4 OUT eth0 SRC 121 6 29 221 DST 192 168 1 211 LEN 48 TOS 0x00 PREC 0x00 TTL 107 ID 9231 DF PROTO TCP SPT 1268 DPT 5110 WINDOW 65535 RES 0x00 SYN URGP 0 Apr 20 17 05 25 2008 Apr 20 17 05 27 2008 Connection Accepted IN ppp4 OUT ethO SRC 114 138 154 217 DST 192 168 1 211 LEN 52 TOS 0x00 PREC 0x00 TTL 42 ID 58763 DF PROTO TCP SPT 4832 DPT 23488 WINDOW 59136 RES 0x00 SYN URGP 0 Apr 20 17 05 30 2009 Connection Accepted Clear Log Now This feature clears all the current information on the log 14 2 System Statistic The Router has the real time surveillance management feature that provides system current operation information such as port location device name current WAN link status IP address MAC address subnet mask default gateway DNS number of received sent total packets number of received sent total Bytes Received and Sent Bytes Sec total number of error packets received total number of the packets dropped number of session number of the new Session Sec and upstream as well as downstream broadband usage 96 240 ONO your future life SSL IPSec VPN Firewall System Statistic eth eth3 eth Enabled En
23. you do not have email setting and it can not send out syslog emails 2 If you have the email address set in system log but the log does not meet the sending log conditions it will show E mail settings have been configured represents that you already have the email setting but the log does not meet the sending log conditions yet 3 If you have the email address set in system log and log is sent out it will show E mail settings have been configured and sent out normally represents that you already have the email setting and the log is set out to the email address 4 If you have the email address set in the system log but the log can not be sent out correctly it will show E mail cannot be sent out probably use incorrect settings represents that there is email address setting but the log can not be sent out which might be due to the incorrect setting 23 1 your future life SSL IPSec VPN Firewall 5 2 Change and Set Login Password and Time 5 2 1 Password Setting When you login Router setting window every time you must enter the password The default value for Router username and password are both admin For security reasons we strongly recommend that you must change your password after first login Please keep the password safe or you might not login to Router You can press Reset button for more than 10 sec Router will return back to default Q Password Setup UserN
24. 1 Make sure Default Gateway is also the default IP address of Router Te WIN cochant Im Ey oe i m SP REP gz EI eo Microsoft Windows XP Chika 5 1 2600 c ARAVPT 1985 2081 Microsoft Corp C Documents and Settings dk gt ipconf ig Mindows IP Configuration Ethernet adapter AS TE Fe Connection specific DHS Suffix FUR9 4i6 IF Address C 192 168 1 100 Subnet Mask s s sn na ime ET Default Gateway a a tvm Ethernet adapter 13189E284 2E3C 4H9F 8BCH 38E5975 76 B9 F4 Media State REEL Media disconnected Attention When not getting IP address and default gateway by using ipconfig or the received IP address is 0 0 0 0 and 169 X X X we recommend that users should check if there is any problem with the circuits or the computer network card is connected nicely 16 N CINCO your future life SSL IPSec VPN Firewall Then open webpage browser IE for example and key in 192 168 1 1 in the website column The login window will appear as below APND your future life Router default username and password are both admin Users can change the login password in the setting later Attention For security we strongly suggest that users must change password after login Please keep the password safe or you can not login to Router Press Reset button for more than 10 sec all the setting will return to default After login R
25. 1 WAN2 DNS12138 175 55 244 WAN DNS2 139 175 252 16 mtu 1492 Jan 4 02 00 17 2000 Syatem Log apis MT S hi 59 105 115 195 255 255 255 755 qw Jan 1 08 00 18 2000 System Log dhepConfig open write close No such file or directory Jan 1 08 00 18 2000 System Log dhcpConfig fopen No such file or directory Apr 20 16 57 38 2009 System Log apad ru 58 105 115 248 255 255 255 255 gw Apr 20 16 57 46 2009 System Log e is up 182 168 4 141 255 255 254 0 gw 192 168 4 1 Outgoing Packet Log 239 your future life SSL IPSec VPN Firewall View system packet log which is sent out from the internal PC to the Internet This log includes LAN IP destination IP and service port that is applied It is illustrated as below Outgoing Log Table IN eth OUT ppp4 SRC 182 188 1 211 DST 121 6 29 221 LEN 40 OS 0 00 PREC 0x00 TTL 63 ID 50341 DF PROTO TCP SPT 5110 DPT 1266 WINDOW 0 RES 0200 ACK RST URGP 0 INzeth OUT ppp4 SRC 1927 168 1211 DST2121 6 29 221 LEN 40 O3 0 00 PREC 0x00 TTL 63 ID 50343 DF PROTO TCP SPT 5110 DPT 1266 WINDOW 0 RES 0x00 ACK RST URGP 0 IN ethO OUT ppp4 SRC 192 168 1 211 D3T2114 138 154 217 LEN 40 Apr 20 17 05 30 2008 Connection Accepted O5 0x00 PREC 0x00 TTL 63 ID 50344 DF PROTO TCP SPT 23469 DPT24832 WINDOW 0 RES 0200 ACK RST URGP 0 Apr 20 17 05 25 2009 Apr 20 17 05 27 2009 Incoming Packet Log View system packet log of those entering the firewall The log includes information about the external
26. 10Base T 100Base TX gt iniferface WAN1 4 LAN1 4 DMZ link status Up Down physical port status Port Enabled Port Disabled gt priority high or normal speed status 10Mbps 100Mbps gt duplex status Half Full gt auto negotiation Enabled or Disabled The tabble also shows statistics of Receive Transmit Packets Receive Transmit Packets Byte Count as well as Error Packets Count 20 lt i your future life SSL IPSec VPN Firewall 5 1 3 System Information System Information 192 158 1 1 255 255 255 0 Qnoz 4L 1000123754 Gateway Firmware Version v1 2 01 13 Nov 26 2009 0 Days 0 Hours 12 Minutes 6 B 10 11 58 Seconds Wed Dec 2 2009 20 11 11 NWA MA MA Device IP Address Identifies the current device IP address The default is 192 168 1 1 Working Mode Indicates the current working mode Can be NAT Gateway or Router mode The default is NAT Gateway mode System active time Indicates how long the Router has been running Serial Number This number is the Router serial number Firmware Version Information about the Router present software version Current Time Indicates the device present time Please note To have the correct time users must synchronize the device with the remote NTP server first CPU Usage Indicates the current router CPU usage percentage Memory Usage Indicates the current router memory usage percentage Total Session Indicates the current router session
27. All Users All Wsers oupervisor Mobile User Branch Staff Q Group Name Add Hew Group Group Enable Group Name Display all group names in the drop down list Add New Group Click it to create a new group Add New Group http 192 168 1 1 edit group name him Wi C O K E httpir192 1568 1 1 edit group name him Sroupname O ARAR Group Name Import a group name Submit Click Submit tab to save recent changed settings new group names will appear in the drop down menu Cancel Click Cancel to clear any recent changes to the settings Each group must follow below steps Domain Management User management and Service resource management to complete group settings Step One Domain Management 168 your future life SSL IPSec VPN Firewall Domain Management is used to determine which authentication server will be used to authenticate users at login The default authentication server type is local database SSL VPN supports external authentication services and can be combined with an enterprise s current authentication server for a simplified deployment If no suitable authentication servers can be chosen from the list click Add New Domain to create a new one Domain Management e Default Local DataBase U taba Qno Active Directory 192 168 1101 Apply User Database i Customize User Database Add New Domain Assign All authentication servers with defi
28. Bandwidth Usage Indicates the current upstream bandwidth usage for each WAN DDNS Indicates if Dynamic Domain Name is activated The default configuration is Off Quality of Service Indicates how many QoS rules are set Manual Connect When Obtain an IP automatically is selected two buttons Release and Renew will appear If a WAN connection such as PPPoE or PPTP is selected Disconnect and Connect will appear DMZ IP Address WAN4 DMZ Indicates the current DMZ IP address 5 1 2 Physical Port Status Physical Port Status 1 2 3 4 Enabled Enabled Connect Enabled Internet Internet Internet Internet WAN WAN WANS WANA Enabled Connect Enabled Enabled The status of all system ports including each connected and enabled port will be shown on this Home page see above table Click the respective status button and a separate window will appeare to show detailed data including setting status summary and statisitcs of the selected port 19 ONO your future life SSL IPSec VPN Firewall Port Information Type 10Base T 100Base TX Interface LAN Link Status Up Physical Port Status Port Enabled o Pony Speed Status 100Mbps Duplex Status Ful AuoNeg Enabled 7 Statistics E Transmit Packets Count res Transmit Packets Byte Count Ses or Packets Count The current port setting status information will be shown in the Port Information Table Examples type
29. DefautGateway Hop Count Add to list 205 your future life SSL IPSec VPN Firewall 12 3 1 Dynamic Routing The abbreviation of Routing Information Protocol is RIP There are two kinds of RIP in the IP environment RIP and RIP Il Since there is usually only one router in a network ordinarily just Static Routing will be used RIP is used when there is more than one router in a network and if an administrator doesn t want to assign a path list one by one to all of the routers RIP can help refresh the paths RIP is a very simple routing protocol in which Distance Vector is used Distance Vector determines transmission distance in accordance with the number of routers rather than based on actual session speed Therefore sometimes it will select a path through the least number of routers rather than through the fastest routers Dynamic Routing 9 Gateway Router Q Enabled 9 Disabled Working Mode Select the working mode of the device NAT mode or router mode RIP Click Enabled to open the RIP function Receive RIP versions Use Up Down button to select one of None RIPv1 RIPv2 Both RIPv1 and v2 as the TX function for transmitting dynamic RIP Transmit RIP versions Use Up Down button to select one of None RIPv1 RIPv2 Broadcast RIPv2 Multicast as the RX function for receiving dynamic RIP 12 3 2 Static Routing When there are more than one router and IP subnets the
30. Group 10 2 2 Qnokey Group Setup SSL IPSec VPN Firewall The upper limited number of QnoKey users The number of QnoKey in use Displays the number of connected devices that are using QnoKey Displays the list of all QnoKey users Deletes one user name group setting rule Goes to the page where summarized information is needed Each summary page displays several group messages Add new group settings Delete all the group settings Press Add New Qnokey Group to enter Group Setup page as illustrated below Q Group Account Setup DIwan 1 IP Address Domain Name IP Address Domain Mame Ds P Address Domain Name a P Address Domain Name Memme Forever O Do Account Number Limitation Max 100 Beck my Cemes This page is designed for QnoKey group setup Group parameters for QnoKey include WAN ports valid 154 your future life SSL IPSec VPN Firewall time and number of users and protection actions for potential QnoKey losses These setting options facilitate classified management for QnoKey users and enhance security Enable this rule Group Account ID Interface Life Time select this option to activate this setting rule Enter the QnoKey group name that users would like to set up Select WAN port and enter the correct IP address which corresponds to WAN port or the domain name analyzed by DDNS If WAN ports are empty IP entry is not necessary so that VPN
31. IP address will be displayed under the remote gateway of Summary IP by DNS Resolved TUE Or users can choose IP by Multiple DNS Resolved and IP address can be translated through DNS When users finish the setting the corresponding IP address will be displayed under the remote gateway of Summary IP only vi t 2 2403 4 2 IP Domain Name FQDN Authentication If users select IP domain name please enter IP address and the domain name to be verified FQDN refers to the combination of host name and domain name Users may enter any name that corresponds to the domain name of FQDN This IP address and domain name must be identical to those of the remote VPN security gateway setting type to establish successful connection IP Domain Name FQDN Authentication E IP Address EE b If the remote IP address is unknown choose IP by DNS Resolved allowing DNS to translate the IP address This domain name must be available on the Internet When users finish the setting the 127 CINCO your future life SSL IPSec VPN Firewall corresponding IP address will be displayed under the remote gateway of Summary IP Domain Name FQDN Authentication v IPbyDNSResoed Or users can choose IP by Multiple DNS Resolved and IP address can be translated through DNS When users finish the setting the corresponding IP address will be displayed
32. IP addresses This should go along with the following interface selection If the IP address is not within the interface ranges the setting will not work Select the mapping interface If the WAN IP above is not within the interface range the setting will not work Add this configuration to the One to One NAT list Hemove a selected One to One NAT list Click Apply to save the network configuration modification Click Cancel to leave without making any changes 211 your future life SSL IPSec VPN Firewall 12 5 DDNS Dynamic Domain Name Service DDNS supports the dynamic web address transfer for QnoDDNS org cn 3322 0rg DynDNS org and DtDNS com This is for VPN connections to a website that is built with dynamic IP addresses and for dynamic IP remote control For example the actual IP address of an ADSL PPPoE time based system or the actual IP of a cable modem will be changed from time to time To overcome this problem for users who want to build services such as a website it offers the function of dynamic web address transfer This service can be applied from www qno cn ddns www 3322 0rg www dyndns org or www dtdns com and these are free Also in order to solve the issue that DDNS server is not stable the device can update the dynamic IP address with different services at the same time DDNS Setup Dyndns Disabled Dydns WAN 1 3322 Disabled 3322 Edit Qnoddns Disabled Gna Dyndns Disable
33. Inc hereafter Qno and is the exclusion to remit or limit the liability of Qno The users who obtain the file of this manual directly or indirectly and users who use the relevant services must obey this Agreement Important Notice Qno would like to remind the users to read the clauses of the Agreement before downloading and reading this Manual Unless you accept the clauses of this Agreement please return this Manual and relevant services The downloading or reading of this Manual is regarded as accepting this Agreement and the restriction of clauses in this Agreement 1 Statement of Intellectual Property Any text and corresponding combination diagram interface design printing materials or electronic file are protected by copyright of our country clauses of international copyright and other regulations of intellectual property When the user copies the Manual this statement of intellectual property must also be copied and indicated Otherwise Qno regards it as tort and relevant duty will be prosecuted as well 2 Scope of Authority of Manual The user may install use display and read this Manual on the complete set of computer 3 User Notice If users obey the law and this Agreement they may use this Manual in accordance with Agreement The hardcopy or softcopy of this Manual is restricted using for information non commercial and personal purpose Besides it is not allowed to copy or announce on any n
34. Interface and User Manual Chapter Cross Reference This appendix is to show the corresponding index for each chapter and user interface how to setup quickly and understand the VPN Router capability at the same time Router overall index is as below NetWork USB Setting Qo IP DHCP E Bulletin amp ARP Binding Group Management gt Firewall Adva nced Function System Tool Port Management VPN Virtual Passage SSL Full Set SSL nokey QVM Server Log Category Home WAN Status WAN 1 122 117 1825 168 95 98 254 158 95 192 1 168 985 1 1 633 11 35 Dyndns Disabled 3322 Disabled Dtdns Disabled Qnoddns Disabled 2 rules set Sub category WAN 2 122 117 188 183 168 95 98 254 168 95 192 1 168 95 1 1 450 25 43 Dyndns Disabled 3322 Disabled Dtdns Disabled Qnoddns Disabled 2 rules set Chapter WAM 3 122 117 189 6 168 95 98 254 158 95 192 1 168 85 1 1 107 17 60 Dyndns Disabled 3322 Disabled Dtdns Disabled Qnoddns Disabled 2 rules set Users can find English WAN 4 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Dyndns Disabled 3322 Disabled Dtdns Disabled Qnoddns Disabled D rules set V Device Spec Verification Status Display and Login Password and Time Setting 5 1 Home Basic Setting Vl Network Network Connection 6 1 Network Connection Traffic Management 6 2 Multi WAN Setting 4 your future life SSL IPSec VPN Fire
35. It should be different from Salve device s LAN MAC Status Normal indicates both devices work normally Status Backup indicates the Backup device is enabled for backing up Master device to take over WAN connection and DHCP issuing function 233 your future life SSL IPSec VPN Firewall 11 7 License Key Users have to purchase License Key to enable some functions in Qno Firwalls Routers series or upgrade to Official Version not trial version such as QnoSniff or Inbound Load Balance etc License Key Current Time 2009 12 09 NTP Server License Key Number i i Submit Trial version Official Version Registration time Status And Information Current Time Before inputing License Key the device will check whether current time is correct and whether License Key is still in valid period In order to prevent from dysfuction problems we strongly recommend you to check and update the time correctly before attempting a feature and entering License Key License Key Input License Key you purchase Generally the key is composed Number by several alphanumeric characters Enter the key and click Submit and the system will check whether the License Key is valid If the key is valid users will be allowed to use the feature The Official Version column of that feature will be checked Feature Name List value added features If there is no Trial Version button in the
36. QoS Quality OE Service 5 ooeece sevo eu ae ES NEE NAE PEEL sec vecescerceesicucsivesavaceusiscsvedeedeaccesseusesueseisunssidesveverteaccustens 85 8 1 Bandwidth Management QOS saiisiiivscsicsincassascensensennvencexdeasanananetavsnievnesseunenniosievnecantautaneensennaneieends 85 8 1 1 Bandwidth Management sueco ius con ERU PRU Eo REUL SU SRA PITE NE AA PILIS e Ebbb RE ORI SI I OPE T RUNDE PU SEU RUP rS QA IR NE NUIGON EU DDRES 87 VENE 87 IS eS Fere id Be ETT mem 9 8 1 4 Bandwidth Management Scheduling ssssssseeesssseseeeeeeeeeeee eene nnn hn nennen nene sss nennen 02 5 15 Exception IP address Gonsuiitossariu cessi deaheptuu bep slbi tuo Red niiae anian i aoai od Rs URS SAe os ES REN URY COGN R sabinas 93 oes 1 8 ge 2 1112 Pee ee ee ee ere er 94 8 3 Hardware Optimization Future Feature ccccccccccccccssseceeeeceeeeeeeeeeeeeeeeesseeeseeeeeseaeeeeeeeas 98 WX MERC WA T 100 REC OhICBuddlg M 100 92 ACCESS lI J 107 Boo CTA qecess R NS iiec Isa E uc T UM MM NNNM EU MUN TIU onteareeacteavecs 107 92 2 Add NEWACCESS RULE coc dene cance oa E a iu eut qa d oa ERU a dU x Ene uS 109 5 CONSIGN 111 X VPN Virtual Private Network
37. Set installation path this of application server Set application working directory Set server address Select the server icon In addition to built in icons there are also commonly used icons Check to activate this service If user management settings have the user type set to Administrator the user will login on the router management UI For login to the web portal click Link to Portal 192 Y CINCO your future life SSL IPSec VPN Firewall Services ll Service Intranet Service A A Terminal Application E E Web Secure Web Telnet SSH FTP My Desktop L Bookmarks My Network Place Services Description Name IP Address Virtual Passage ms Add Bookmark 11 8 Advanced Settings Advanced Settings can modify SSL connection ports amp add SSL upgrades Virtual Passage Client Address Range Begin 182 168 1 200 Client Address Range End 192 168 1 205 Unified IP Management Advanced Settings Change SSLVPN Clients Service Port 193 rn Fi KT joey I WT LASS lbs your future life SSL IPSec VPN Firewall 11 8 1 Virtual Passage A virtual passage is a type of point to point SSL client connection When remote users use a secure tunnel to connect SSL VPN will establish a virtual web interface For this reason you will need to set SSL VPN s secure tunnel client address range so it does not conflict with your company s Internet DHCP IP Default for 5 SSL
38. This function detects LAN users automatically fewer LAN users can use higher bandwidth and too many LAN users can use user lower bandwidth so that all LAN users can use bandwidth at average This function is flexible and simplifies the management effort Each IP s upstream bandwidth threshold Kbitisec Each IP s downstream bandwidth threshold Kbit sec Each IF s Maximum bandwith Upstream WAN 1 Kbitsec WAN 2 Kbitsec WAN 3 Kbit sec WAN 4 Kbitisec Downstream WAN1 Kbitisec WAN 2 Kbitisec WAN 3 Kbit sec WAN 4 Kbitisec Penalty mechanism Enable Smart QoS When the utility of any WAN s bandwidth is over Enable Smart QoS 0 Always Enabled Each IP s upstream bandwidth threshold Each IP s downstream bandwidth threshold Each IP s maximum bandwidth Show Panelty IP Click Enable Intelligent QoS When the bandwidth usage is over the condition the dynamic intelligent QoS will auto start The default condition is 60 Setup the Upstream bandwidth threshold Setup the Downstream bandwidth threshold When an IP address usage over above upstream or downstream thresholds the penalty is triggered Please setup penalty upstream downstream bandwidth 9 778 I 47 your future life SSL IPSec VPN Firewall Penalty mechanism Select the second penalty if one user triggered the internal condition this user will has a second penalty Show Penalty IP Display penalty IP addresses u
39. be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for disconnection of this WAN service Line Dropped Scheduling Input how long the WAN service may be disconnected before the newly added connections should go through another WAN to connect with the Internet Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP After the changes are completed click Apply to save the configuration or click Cancel to leave 39 your future life SSL IPSec VPN Firewall without making any changes Router Plus NAT Mode When you apply a public IP address as your default gateway you can setup this public IP address into a LAN PC and this PC can use this public IP address to reach the Internet Others PCs can use NAT mode to reach the Internet If this WAN network is enabled the Router plus NAT mode you can still use
40. between the two ends of the VPN tunnel If one end is disconnected the device will disconnect the tunnel automatically and then create new connection Users can define the transmission time for each DPD message packet and the default value is 10 seconds 10 1 3 PPTP Setting It supports the PPTP of Window XP 2000 to create point to point tunnel protocol for single device users to create VPN connection Summary Gateway to Gateway Client to Gateway PPTP Status VPN Pass Through 149 your future life PPTP Client IP Range Remote Client Setup Enabled PPTP Server PPTP Client IP Range Username Password Confirm Password SSL IPSec VPN Firewall Enabled PPTP Server Range Start 192 168 1150 Range End 192 168 199 User Name Password Confirm Password Delst selected iter When this option is selected the point to point tunnel protocol PPTP server can be enabled Please enter PPTP IP address range so as to provide the remote users with an entrance IP into the local network Enter Range Start Enter the value into the last field Enter Range End Enter the value into the last field Please enter the name of the remote user Enter the password and confirm again by entering the new password 150 N gn te E gg prea F IP i 8 bow LA your future life SSL IPSec VPN Firewall Add to list Add a new account and password Delete selected item Delete Selec
41. connection IPSec Setup If there is any encryption mechanism the encryption mechanism of these two VPN tunnels must be identical in order to create connection And the transmission data must be encrypted with IPSec key which is known as the encryption key The device provides the following two encrypted Key Managements They are 130 N ONO your future life SSL IPSec VPN Firewall Manual and IKE automatic encryption mode IKE with Preshared Key automatic By using the drop down menu select the desired encryption mode as illustrated below IPSec Setup Encryption Management Protocol When users set this VPN tunnel to use any encryption and authentication mode users must set the parameter of this exchange password with that of the remote Setting methods include Auto IKE or Manual To do the settings select any one from the two options IPSec Setup IKE with Preshared Key v Group 1v m DES v MD5 800 A Seconds v Group 1 v DES MDS wv 3600 Seconds Advances 131 your future life SSL IPSec VPN Firewall Use IKE Protocol Click the shared key generated by IKE to encrypt and authenticate the remote user If PFS Perfect Forward Secrecy is enabled the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentica
42. device and ATU R need only one actual IP if ISP issued more than one actual IP such as eight ADSL static IP addresses or more users can map the remaining real IP addresses to the intranet PC virtual IP addresses These PCs use private IP addresses in the Intranet but after having One to One NAT mapping these PCs will have their own public IP addresses For example if there are more than 2 web servers requiring public IP addresses administrators can map several public IP addresses directly to internal private IP addresses Example Users have five available IP addresses 210 11 1 1 5 one of which 210 11 1 1 has been configured as a real IP for WAN and is used in NAT Users can respectively configure the other four real IP addresses for Multi DMZ as follows 210 11 1 2 gt 192 168 1 3 210 11 1 3 192 168 1 4 210 11 1 4 192 168 1 5 210 11 1 5 192 168 1 6 Note The device WAN IP address can not be contained in the One to One NAT IP configuration 208 Y your future life SSL IPSec VPN Firewall One to One NAT Enable One to One NAT One to One NAT Add Range Private Range Begin hse he U Fublic Range Begin I HH I Range Length Add to list Delate selected ringa Enable Multiple to One NAT C1 Apay o Censal Enable One to One NAT To activate or close the One to One NAT function Check to activate the function Private IP Range Begin Input the Private IP address for th
43. devices Tunnel No Set the embedded VPN feature please select the Tunnel number Tunnel Name Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid confusion Note If this tunnel is to be connected to the other VPN device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can thus be successfully enabled Interface From the pull down menu users can select the Interface for this VPN tunnel Enabled Click to activate the VPN tunnel This option is set to activate by default Afterwards users may select to activate this tunnel feature Local Group Setup Local Group Setup Local Security 6 y Type iP Only v Sume v 192 168 ji jo a Eo Boss Roos d This Local Security Gateway Type must be identical with that of the remote type Remote Security Gateway Type Local Security Gateway This local gateway authentication type comes with five operation modes which are Type IP only IP Domain Name FQDN Authentication IP E mail Addr USER FQDN Authentication 123 your future life SSL IPSec VPN Firewall Dynamic IP Domain Name FQDN Authentication Dynamic IP E mail Addr USER FQDN Authentication Dynamic IP address Email address name 1 IP only If users decide to use IP only entering the IP address is the onl
44. domain name must be identical to those of the VPN secure gateway setting type to establish successful connection Local Security Gateway Type IP Domain Name FQDN Authentication v Lem mm 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail enter the IP address and E mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space Users don t need to do further settings 136 your future life Local Security Group Type SSL IPSec VPN Firewall IP E mail User FQDN Authentication J ie p fe fm le 4 Dynamic IP Domain Name FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to link to VPN If the remote VPN gateway requires connection to the device for VPN connection this device will start authentication and respond to this VPN tunnel connection if users select this option to link to VPN please enter the domain name Dymamci IP Domain Name FQDN Authentication v 5 Dynamic IP E mail Addr USER FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to connect to VPN without entering IP address When VPN Gateway requires for VPN connection the device will start authentication and respond to VPN tunnel connection if users select this option to link to VPN enter E Mai
45. function to make sure that users can not add extra PCs for Internet access or change private IP addresses 76 Y CINCO your future life SSL IPSec VPN Firewall Q IP amp MAC binding Show new IP user Static IP p MAC Address Z _ z aM _ Mame Enabled Add to list ter tern Block MAC address on the list with wrong IP address Block MAC address not on the list There are two methods for setting up this function TI GINO your future life SSL IPSec VPN Firewall Provide services to allowed MAC addresses IP amp MAC binding Show new IP user IP amp MAC binding Static IP Address MAC Address z E 3 Name Enable Add to list 192 158 1 110 gt O0 1f c6h Th Ga bd gt Enabled Block MAC address on the list with wrong IP address Block MAC address not on the list Spay o l Gemecl There are two ways to input static IP 1 If users want to set up a MAC address to acquire IP from DHCP but the IP need not be a specific assigned IP input 0 0 0 0 in the boxes The boxes cannot be left empty 2 If users want DHCP to assign a static IP for a PC every single time users should input the IP address users want to assign to this computer in the boxes The server or PC which is to be bound will then acquire a static virtual IP 78 your future life SSL IPSec VPN Firewall whenever it r
46. information manage and allocate the bandwidth further to achieve best efficiency Administrators can block BT to avoid bandwidth occupation and enable access rules to restrict employee accessing internet improperly or using MSN QQ and Skype during working time They can also protect network from Worm or ARP attacking 11 Q your future life SSL IPSec VPN Firewall Advanced Settings DMZ Forwarding DMZ Forwarding UPnP Routing Mode DMZ Forwarding UPnP Routing Mode multiple WAN IP DDNS and MAC Clone UPnP DDNS MAC multiple WAN IP DDNS and MAC Clone Monitor working Administrators can look up system log and Management and l l status and monitor system status and inbound outbound maintenance settings l l configuration backup flow in real time Syslog SNMP and configuration backup 10 Configure VPN Configure different types of VPN to meet VPN Virtual Private tunnels e g PPTP different application environment Network QnoKey QnoKey QVM and QVM VPN function SSL VPN setting 11 Logout Close configuration Web based Ul logout window We will follow the process flow to complete the network setting in the following chapters 12 your future life SSL IPSec VPN Firewall Ill Hardware Installation In this chapter we are going to introduce hardware interface as well as physical installation 3 1 Router LED Signal LED Signal Description LED Color Description Power Green Green LED on Power O
47. is minute Range End This is an initial IP automatically leased by DHCP It means DHCP will start the lease from this IP The default initial IP is 192 168 1 100 DNS Domain Name Service This is for checking the DNS from which an IP address has been leased to a PC port Input the IP address of this server directly DNS Server Required 1 Input the IP address of the DNS server DNS Server Required 2 Input the IP address of the DNS server WINS If there is a WIN server in the network users can input the IP address of that server directly WINS Server Input the IP address of WINS Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes Show Table This is for the status of showing whole MAC IP binding list that has configured and you can chose Edit to modify it IP amp MAC binding List Select All Refresh Clo E E D a en ae 192 166 1 110 00 1f c6 7b 8a bd 72 your future life SSL IPSec VPN Firewall 7 4 DHCP Status This is an indication list of the current status and setup record of the DHCP server The indications are for the administrator s reference when a network modification is needed DHCP Dynamic IP Client Lease Time Minutes Subnet1 Subnet Subnet3 Subnet4 Enabled Disabled Disabled Disabled 192 168 1 100 192 168 2 100 192 168 3 100 192 168 4 100 192 168 1 149 182 168 2 148 192 168 3 149 192 168
48. life SSL IPSec VPN Firewall IP amp MAC Binding Static IP 1 MAC Address Name PCOO1 Enabled 192 168 1 101 gt 00 1e 8c c5 b9 69 PC001 Enabled Block MAC address on the list with wrong IP address Block MAC address not on the list Snow Taila Caneel After an item is added to the list the corresponding message will be displayed in the white block on the bottom However such method is not recommended because the inquiry of IP MAC addresses of all hosts creates heavy workload Another method to bind IP and MAC is more recommended because of easy operation reducing workload and time efficiency It is described in the following Enter Setup under the DHCP page and look for IP and MAC binding On the right there is an option of Show new IP user and click to enter 269 CINCO your future life SSL IPSec VPN Firewall IP amp MAC Binding sce H j maCAddress Enabled Block MAC address on the list with wrong IP address C Block MAC address not on the list Show Tells gy Caneel Click to display IP and MAC binding list dialog box In this box the unbinding IP and MAC address corresponding to the PC are displayed Enter the Name of the computer and click on Enabled with the display of the V icon and push the option on the top right corner of the screen to confirm a M 192 158 1 101
49. of an ADSL router will be input automatically by the device Therefore users just need to check the option if this function is needed Attention Some gateways of an ADSL network will not affect packet detection If users have an optical fiber box or the IP issued by ISP is a public IP and the gateway is located at the port of the net caf rather than at the IP provider s port do not activate this option ISP Host This is the detected location for the ISP port such as the DNS IP address of ISP When configuring an IP address for this function make sure this IP is capable of receiving feedback stably and speedily Please input the DNS IP of the ISP port Remote Host This is the detected location for the remote Network Segment This Hemote Host IP should better be capable of receiving feedback stably 55 your future life DNS Lookup Host Note SSL IPSec VPN Firewall and speedily Please input the DNS IP of the ISP port This is the detect location for DNS Only a web address such as www hinet net is acceptable here Do not input an IP address In addition do not input the same web address in this box for two different WANs In the load balance mode for Assigned Routing the first WAN port WAN1 will be saved for the traffic of the IP addresses or the application service ports that are not assigned to other WANs WAN2 WAN3 and WANA Therefore in this mode we recommend assigning one of the connections to
50. of the game s communication protocol Through the spread of this virus the detailed information of the game players within the local network can be obtained Their account and information are stolen The following describes how to prevent such virus attack First let us get down to the definition of ARP Address Resolution Protocol In LAN what is actually transmitted is frame in which there is MAC address of the destination host device So called Address Analysis refers to the transferring process of the target IP address into the target MAC address before the host sends out the frame The basic function of ARP protocol aims to inquire the MAC address of the target equipment via the IP address of the target equipment so as to facilitate the communications The Working Principle of ARP Protocol Computers with TCP IP protocol have an ARP cache in which the IP address corresponds to the MAC address as illustrated IP MAC 192 168 1 1 00 0f 3d 83 74 28 192 168 1 2 00 aa 00 62 c5 03 192 168 1 3 03 aa 01 75 c3 06 For example host A 192 168 1 5 transmits data to Host B 192 168 1 1 Transmitting data Host A searches for the destination IP address from the ARP Cache If it is located MAC address is known Simply fill in the MAC address for transmission If no corresponding IP address is found in ARP cache Host A will send a broadcast The MAC address is FF FF FF FF FF FF which is to inquire all the host devices in the same
51. paths server addresses and application program image editing SSL VPN supports built in application program paths c program files Microsoft office office windword exe If you have installed Microsoft terminal services that have a different server path modification will be required Microsoft terminal service is Disabled by default Once Microsoft terminal service server is set up and configured activate it to avoid limited services for group users If there is no need to support terminal services click on the delete icon to delete the resource Displays server resource status as Enabled or Disabled Add New Terminal Server If an enterprise has multiple internal terminal servers click on the Add New Terminal Service tab to add a new terminal service Web Hanagement Windows Internet Explorer htp7192 158 1 1 sslvpn resowrce add Termunalhtm sppstetus Application Description Application and Path Working Directory C Program Files Microsoft Office O0fficeApp Hame C Program Files HostAddress Optional fe O Cancel Application Icon Enable submit 191 your future life SSL IPSec VPN Firewall Application Description Application and Path Working Directory Host Address Application Icon Enable 11 7 Link to Portal SSL VPN Status Group Summary Group Management Domain Management User Management Link to portal Advanced Setting Import an application name
52. problem arising from failed ISP connection with remote ends or the branches 10 3 1 QVM Server Settings Select QVM Feature as Server mode QVM VPN Status Q Setup Mode QVM Server 159 your future life SSL IPSec VPN Firewall QVM Server Setup QVM Tunnel Number Tunnal s Used 300 Tunnel s Available Advanced Account ID Password Confirm Password ll IP Address M I Subnet Mask 255 255 255 OB VPN HUB Function Enabled Add to list Delete selected item Account ID Must be identical to that of the remote client end Please enter the remote client user name in either English or Chinese Password Must be identical to that of the remote client end Confirm Password Please enter the password and confirm again IP Address Refers to the specific network IP address and subnet mask which has to Subnet Mask build connection with the remote client end VPN Hub Function After branch and headquarter are connected branches can access each other easily without having other tunnels Enabled Enable this account Add to list Add a new account and password Delete selected item Delete the selected user 160 your future life SSL IPSec VPN Firewall After modification push Apply button to save the network setting or push Cancel to keep the settings unchanged 10 3 2 QVM Status QVM VPN Setup QVM Client Table No Acco
53. routing dynamic routing NAT one to one NAT PAT MAC Clone as well as DDNS As for LAN ports including one DMZ they support 10 100 Base T TX Ethernet RJ45 and provide the features of Microsoft UPnP VLAN Multi Subnet and transparent bridge mode Internet IP addresses can also be used in intranet Individual QoS bandwidth management with powerful and easy to setup functions allows manager to arrange the limited network resource rational and efficiently It is not needed to extend the bandwidth to unlimited settings which would increase spending cost it can also avoid the complaint of few people to force whole bandwidth Simple user configuration can be the best efficiency application it allows the optimization of bandwidth utilization based on the whole utility rate without setting rules step by step and only to limit the users who occupy the bandwidth for resource savings Moreover intelligence bandwidth management is provided through the simple deployment to complete LAN side bandwidth management for efficiency utility rate simple management and improvement performance SSL IPSec VPN Router exclusively provides hardware optimization which can run broadbandwidth management traffic priorities and distributions directly through hardware Not only can it ensure intranet important services won t have disconnection but also decrease the depletion of CPU and the whole system resources Thus SSL IPSec VPN Router can endure enormous sessions
54. routing mode for the device should be configured as static routing Static routing enables different network nodes to seek necessary paths automatically It also enables different network nodes to access each other Click the button Show Routing Table as in the figure to display the current routing list 206 your future life SSL IPSec VPN Firewall Static Routing Destination IP subnet Mask Default Gateway AOL AOL LIL LIL Lh L Hop Count Metric max is 15 interface Add to list Nelets selected Ir Show Teile ems Ceres Dest IP Input the remote network IP locations and subnet that is to be routed For example the IP subnet is 192 168 2 0 255 255 255 0 Subnet Mask Default Gateway The default gateway location of the network node which is to be routed Hop Count This is the router layer count for the IP If there are two routers under the device users should input 2 for the router layer the default is 1 Max is 15 Interface This is to select WAN port or LAN port for network connection location Add to List Add the routing rule into the list Delete Selected Item Remove the selected routing rule from the list Show Table Show current routing table Apply Click Apply to save the network configuration modification 207 your future life SSL IPSec VPN Firewall Cancel Click Cancel to leave without making any changes 12 4 One to One NAT As both the
55. the SSL Upgrade Serial Number blank and the tunnel quantity in SSL Upgrade Tunnel Number After that click Apply and you can successfully upgrade the SSL tunnels You can go to Status to view Tunnel s Used and Tunnel s Available to confirm whether your upgrade is successful or not 199 your future life SSL IPSec VPN Firewall XII Advanced Function This chapter will introduce to you the advance router settings In the advance settings you can 1 Setup DMZ servers forwarding to WAN for example the Web or FTP servers 2 Setup static routing entries or dynamic routing protocol 3 Setup one to one NAT function to mapping public IP address and private IP address 4 Setup dynamic DNS service 5 Setup MAC address in interfaces 12 1 DMZ Forwarding DMZ Host DMZ Private IP Address 192 168 o Port Range Forwarding Service IP Address Interface Enabled All Traffic TCP amp UDP 1 65535 HH yy O Add ta li zt service Management Deleite selected applicution 12 1 1 DMZ Configuration When the NAT mode is activated sometimes users may need to use applications that do not support 200 your future life SSL IPSec VPN Firewall virtual IP addresses such as network games We recommend that users map the device actual WAN IP addresses directly to the Intranet virtual IP addresses as follows If the DMZ Host function is selected to cancel this function users mus
56. the VPN connection so as to guarantee security e Preshared Key For the Auto IKE option enter a password of any digit or characters in the text of Pre shared Key the example here is set as test and the system will automatically translate what users entered as exchange password and authentication mechanism during the VPN tunnel connection This exchange password can be made up of up to 30 characters 132 GNO your future life SSL IPSec VPN Firewall Manual Mode Future Feature IPSec Setup If the Manual mode is selected users need to set encryption key manually without negotiation e Itis divided into two types Encryption KEY and Authentication KEY Users may enter an exchange password made up of either digits or characters The systems will automatically translate what users entered into the exchange password and authentication mechanism during the VPN tunnel connection This exchange password can be made up of digits and characters up to 23 e Moreover the exchange strings for Incoming SPI and Outgoing SPI must be identical to those of the connected VPN device For the Incoming SPI parameters users must set it the same with the Outgoing SPI string of the remote VPN device And the Outgoing SPI string must be the same with the incoming SPI string of the remote VPN device 133 your future life SSL IPSec VPN Firewall Advanced Setting for IKE Protocol Only The advanced
57. this option is selected the System Log feature will be enabled Host Name The device provides external system log servers with log collection feature System log is an industrial standard communications protocol lt is designed to dynamically capture related system message from the network The system log provides the source and the destination IP addresses during the connection service number and type To apply this feature enter the system log server name or the IP address into the empty system log server field 236 2s your future life E mail Alert Future Feature E mail Alert Enabled SSL IPSec VPN Firewall MalSeweri 80 00 name iP Adtress LogQueue Leng entries toa Time Threshold minutes Enabled Mail Server E mail Log Queue Length Log Time Threshold Send Log to E mail Send Log to E mail If this option is selected E mail Warning will be enabled If users wish to send out all the logs please enter the E mail server name or the IP address for instance mail abc com This is set as system log recipient email address such as abc mail abc com Set the number of Log entries and the default entry number is 50 When this defined number is reached it will automatically send out the log mail Set the interval of sending the log and the default is set to 10 minutes Reaching this defined number it will automatically send out the Mail log The device will detect whic
58. to Enable to activate the VPN tunnel This option is set to Enable by default After users set up users may select to activate this tunnel feature Local Group Setup This local gateway authentication type Local Security Gateway Type must be identical with that of the remote type Remote Security Gateway Type Local Security Gateway This local gateway authentication type comes with five operation modes which are 135 your future life Type SSL IPSec VPN Firewall IP only Authentication by the use of IP only IP Domain Name FQDN Authentication IP Domain name IP E mail Addr USER FQDN Authentication IP Email address Dynamic IP Domain Name FQDN Authentication Dynamic IP address Domain name Dynamic IP E mail Addr USER FQDN Authentication Dynamic IP address Email address name 1 IP only If users decide to use IP only entering the IP address is the only way to gain access to this tunnel The WAN IP address will be automatically filled into this space Users don t need to do further settings rA dui 2 IP Domain Name FQDN Authentication If users select IP domain name type please enter the domain name and IP address The WAN IP address will be automatically filled into this space Users don t need to do further settings FQDN refers to the combination of host name and domain name and can be retrieved from the Internet i e vpn server com This IP address and
59. up externally connected servers such as WEB and Mail servers Therefore the device supports a set of independent DMZ ports for users to set up connections for servers with real IP addresses The DMZ ports act as bridges between the Internet and LANs For some Qno models the WAN4 and DMZ port can be configurable each other You can depend on the real environment to choose which the port is WAN4 or DMZ enable DMZ DMZ Setting DMZ 0 0 0 0 Edit IP address Indicates the current default static IP address Config Indicates an advanced configuration modification Click Edit to enter the advanced configuration page The DMZ configuration can be classified by Subnet Range and DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode Subnet The DMZ and WAN located in different Subnets For example If the ISP issued 16 real IP addresses 220 243 230 1 16 with Mask 255 255 255 240 users have to separate the 16 IP addresses into two groups 220 243 230 1 8 with Mask 255 255 255 248 and 220 243 230 9 16 with Mask 255 255 255 248 and then set the device and the gateway in the same group with the other group in the DMZ 42 your future life SSL IPSec VPN Firewall Interface DMZ DMZ IP ranges are the same with WAN IP 9 Subnet O Range DMZ amp WAN within same subnet ranges in Router Plus NAT mode Specify DMZ IP Address o o o Subnet Mask 255 255 zss n Specify DMZ IP Address Enter t
60. way the traffic for Netcom and Telecom can be divided Set WAN Grouping If more than one WAN is connected with Netcom to apply a similar division of traffic policy to these WANs a combination for the WANs must be made Click Set WAN Grouping an interactive window as shown in the figure below will be displayed Interface C WAN C1 wAN2 wAN3 wANA Add to list Deletes selected Name To define a name for the WAN grouping in the box such as Education etc The name is for recognizing different WAN groups 48 your future life SSL IPSec VPN Firewall Interface Check the boxes for the WANs to be added into this combination Add To List To add a WAN group to the grouping list Delete selected To remove selected WANs from the WAN grouping Apply Click Apply to save the modification Cancel Click Cancel to cancel the modification This only works before Apply is clicked After the configuration is completed in the China Netcom Policy window users can select WANs in combination to connect with Netcom Import Strategy A division of traffic policy can be defined by users too In the Import IP Range window select the WAN or WAN group ex WAN 1 to be assigned and click the Import IP Range button the dialogue box for document importation will be displayed accordingly A policy document is an editable text document It may contain a destination IP users
61. well as to ensure stable and reliable network transmission To maximize the bandwidth efficiency network administrators should take account of the practical requirements of a company a community a building or a caf etc and modify bandwidth management according to the network environment application processes or services 8 1 Bandwidth Management QoS 85 Y CINCO your future life SSL IPSec VPN Firewall Q The Maximum Bandwidth provided by ISP TI wanz 10000 waa TT NN Q Quality of Service Interface waN1 L wana O wana CO WAN 4 Service All Traffic TCP amp UDP A 65535 v Service Management Mini Rate Kbitsec Max Rate Kbitsec Bandwidth sharing Share total bandwidth with all IP addresses 9 Assign bandwidth for each IP address Enabled 86 your future life SSL IPSec VPN Firewall 8 1 1 Bandwidth Management The Maximum Bandwidth provided by ISP 10000 WAN WAN 2 LO000 10000 WAN 3 LOO00 10000 WAN 4 IRL 10000 In the boxes for WAN1 and WAN2 bandwidth input the upstream and downstream bandwidth which users applied for from bandwidth supplier The bandwidth QoS will make calculations according to the data users input In other words it will guarantee a minimum rate of upstream and downstream for each IP and Service Port based on the total actual bandwidth of WAN1 and WAN2 For example if the upstream bandwidths of both WAN1 and WAN2 ar
62. without domain name of mail host Indicate the order of several mail hosts the smaller has more priority Mail Input the server name which is saved in A Record or external mail server Server Click Apply button to save the configuration Besides users have to configure DNS service port as following description 10 Enable DNS Query DNS service port in Access Rule of Firewall setting Add a new access rule in Firewall setting to enable DNS service port of the WAN on which Inbound Load Balance need to be enabled Action Check Allow 00 From the drop down menu select DNS UDP 53 53 Check Enable if DNS Query data should be recorded Select WAN port and input correspondingly IP of the domain name Take the previous example input 210 10 1 1 Scheduling Select Always 11 Enable internal IP and service port corresponding to A Record in Port Range Forwarding of Advanced Function 22 your future life SSL IPSec VPN Firewall Port Range Forwarding Service Port All Traffic TCP amp UDPN 655 Service Port Management Internal IP Address Interface ANY Enabled Add to list Delete selecta item Service Port Activate the service port of A Record server e g SMTP TCP 25 25 for Mail Input the internal IP of A Record e g 192 168 8 100 of Mail server Interface Select the WAN port of A Record and corresponding IP
63. 00 1 e 8c c b9 59 Fi 192 1583 100 00 70 e0 41 cb Sd a Now the bound options will display on the IP and MAC binding list as illustrated in Figure 5 and click Apply to finish binding 270 your future life SSL IPSec VPN Firewall IP amp MAC Binding Static IP 192 168 1 100 MAC Address 00 20 ea _ 41 cb 84 Name PC002 Enabled Update this Entry 492 168 1 100 gt 00 20 ed 41 cb 9d PC002 gt Enabled 192 168 1 101 gt 00 1e 8c c5 b9 69 gt PC001 gt Enabled Delete selected iten Add Block MAC address on the list with wrong IP address Block MAC address not on the list Show Velale Avaralhy Caneel Though these basic operations can help solve the problem but Qno s technical engineers suggest that further measures should be taken to prevent the ARP attack 1 Deal with virus source as well as the source device affected by virus through virus killing and the system re installation This operation is more important because it solves the source PC which is attacked by ARP This can better shelter the network from being attacked 2 Cyber caf administrators should check the LAN virus install anti virus software Ginshan Virus Reixin must update the virus codes and conduct virus scanning for the device 3 Install the patch program for the system Through Windows Update the system patch program critical update security update and Service Pack
64. 1893 192 168 8 100 TCP 51897 192 168 8 100 TCP 51399 Host Name Session Refresh WAN1 65544979 1863 65 8 WAN1 114 47 207 109 1257 0 0 WAN1 192 168 3 10 1025 22 22 WAN1 192 168 3 10 1318 44 44 WAN1 192 1683 10 1318 0 0 Retreat Display PC names that having outbound traffic It will show blank when the system cannot analyze Display PC connection sessions that having outbound traffic Click the Refresh button that the latest data and list will be updated 246 GNO your future life SSL IPSec VPN Firewall 14 5 IP Port Statistic The Router allows administrators to inquire a specific IP or from a specific port about the addresses that this IP had visited or the users source IP who used this service port This facilitates the identification of websites that needs authentication but allows a single WAN port rather than Multi WANs Administrators may find out the destination IP for protocol binding to solve this login problem For example when certain port software is denied inquiring about the IP address of this specific software server port may apply this feature Moreover to find out BT or P2P software users may select this feature to inquire users from the port IP Port Statistic C Enabled IP Port Statistic IP PortStatistic IP Address v IPAddress o o o Specific IP Status Enter the IP address that users want to inquire and then the entire destination I
65. 3 There are two attack methods affecting the network connection speed cheat on the ARP table in the device or LAN PC The former intercepts the gateway data and send ceaselessly a series of wrong MAC messages to the device which sends out wrong MAC address The PC thus cannot receive the messages The later is ARP attack by fake gateways A fake gateway is established The PC which is cheated sends data to this gateway and doesn t go online through the normal device From the PC end the situation is disconnection For these two situations the device and client setup must be done to prevent ARP virus attack which is to guarantee the complete resolution of the issue The device selection is advised to take into consideration the one with anti ARP virus attack Qno products come squarely with such a feature which is very user friendly compared to other products 2 ARP Diagnostic If one or more computers are affected by the ARP virus we must learn how to diagnose and take appropriate measures The following is experience shared by Qno technical engineers with regard to the ARP prevention Through the ARP working principle it is known that if the ARP cache is changed and the device is constantly notified with the series of error IP or if there is cheat by fake gateway then the issue of disconnection will affect a great number of devices This is the typical ARP attack It is very easy to judge if there is ARP attack Once users find th
66. 3 1 Dynamic TNOUUH ccccccscccasargesnccantsanteabnacessaninenieaeaaamedanobnnssabhsruatsonsasaaaeposnesannsond aroi ioes UU CPU Gd COR dEE 206 12 3 2 Stabe NS OUTING a2 2q5usse escgusked OP dum Ed IP E rM ese ase DON A SU UI MD 206 12 4 One to One NAT cette etes eee 208 12 5 DDNS Dynamic Domain Name Service esssessssssssseeseeenenennen nnne nnns 212 12 6 MAC Clone 214 12 7 Inbound Load Balance cccccccccceccccecceeeeeeeeeeaeeeeeeeesaeeeceeeeseeeseeeesseaeseeeesseaaeeeeessaeeeeeeessaeees 215 PAUUO c 223 pP reor 223 13 2 Firmware Upgrade as vcasciiesiiccicdendenstitewsanaadonsieadsitennacasbendanddtewheststontenssteceardabendensiiunsactatanieeddtesiecesadeesens 224 13 3 Configuration Backup cccccccccsssseceeccsesseeeeceeesseeecceeuuseeeccsaaaseeeesseaaeeeeesseaeeeeessaageeeeessaages 225 per NMP eec 226 pO SES SEC FROCOM ON ger 227 13 6 High Availability sssssss nnns 229 UNA LICENSE KE anes 234 PARUEPEO M 236 ES Sem ET m S 236 io secscl ubuclri 240 gp Ceo 0 i ee ere re es eee ane ere 241 14 4 Connection Stat
67. 4 149 Fool Table Fool Table Fool Table Fool Table Unified IF Management DHCP Server This is the current DHCP IP Dynamic IP Used The amount of dynamic IP leased by DHCP Static IP Used The amount of static IP assigned by DHCP IP Available The amount of IP still available in the DHCP server Total IP The total IP which the DHCP server is configured to lease Host Name The name of the current computer IP Address The IP address acquired by the current computer MAC Address The actual MAC network location of the current computer Client Lease Time The lease time of the IP released by DHCP Delete Remove a record of an IP lease 73 your future life SSL IPSec VPN Firewall DNS Local Database Future Normally DNS sever will be directed to ISP DNS server or internal self defined DNS server Qno router also provides easy self defined DNS services called DNS Local Database which can map website host domain names and the corresponding IP addresses DNS Local Database Host Domain Name Po Ex www google com IPAddess Add to list Halata selected itam Spay Censal Host Domain Name Enter the website host domain name i e www google com IP Address Enter the corresponding IP address of the host domain above Add to Llist Add the items into the list below Delete selected item Delete the items chosen X Note 1 Users MUST enable DCHP server service to enable DNS local dat
68. 68 4 J64 C WAN 2 0000 testcom ANDA C WAN 3 0000 C WAN 4 0000 C WAN 1 192 168 4 164 C WAN 2 0000 testcom MC WAN 3 0000 C WAN 4 0000 218 your future life SSL IPSec VPN Firewall FE Input registered NS Record ex ns1 ns2 Assign WAN IP address as corresponding IP of NS Record The system will show all acquired enabled WAN IP addresses automatically so that users can check directly But users have to check if the IP addresses are the same as the corresponding settings on TWNIC DNS service provider Ex nsi1 abc com tw WAN1 210 10 1 1 ns2 abc com tw WAN2 200 1 1 1 7 Host Record Add or modify host record A Record Host Record A Record WAN 1192 168464 testcom WAN 2 00 80 WAN 3 000 M WAN 4 000 WAN 11921634 164 testcom WAN 20000 WAN 3 00 00 M WAN 40000 WAN 11921684164 testcom WAN 20000 M WAN 3 00 00 M WAN 4 00 00 M WAN 1 182 168 4 154 testcom WAN 20000 M WAN 3 00 00 M WAN 4000D Input the host name which provides services E g mail server or FTP Check corresponding A Record IP WAN Port IP If more than one IPs is checked Inbound traffic will be distributed on this WANs 8 Alias Record Add or modify alias record CNAME Record This kind of record allows you to assign several names to one computer host which may provide several services on it 219 your future life SSL IPSec VPN Firewall For instance there is a co
69. All Traffic from the pull down option list Service and then in the boxes of Source IP input the source IP address 192 168 1 100 to 100 Retain the original numbers 0 0 0 0 in the boxes of Destination IP which means to include all Internet IP addresses Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode 61 your future life SSL IPSec VPN Firewall Show Priority SMTP TCP 25 25 Service Service Management Source IF ld 166 1 U to 0 Group Destination IP 0 to Interface WAN Enable E All Traffic TCP amp UDP 1 65535 192 165 1 100 100 0 0 0 0 0 0 0 0 AHL Delate selected sonication Example 2 How do I set up Auto Load Balance Mode to keep Intranet IP 192 168 1 150 200 from going through WAN2 when the destination port is Port 80 As in the figure below select HTTP TCP 80 80 from the pull down option list Service and then in the boxes for Source IP input 192 168 1 150 to 200 Retain the original numbers 0 0 0 0 in the boxes of Destination IP which means to include all Internet IP addresses Select WAN 2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode 62 your future life SSL IPSec VPN Firewall Show Priority HITP TCP 80 80 Service
70. Enable Activate the configuration Add to List Add to the active service content 222 your future life SSL IPSec VPN Firewall XIII System Tool This chapter introduces the management tool for controlling the device and testing network connection For security consideration we strongly suggest to change the password Password and Time setting is in Chapter 5 2 13 1 Diagnostic router provides a simple online network diagnostic tool to help users troubleshoot network related problems This tool includes DNS Name Lookup Domain Name Inquiry Test and Ping Packet Delivery Reception Test 9DNSNameLookup Ping Lookup thename DNS Name lookup On this test screen please enter the host name of the network users want to test For example users may enter www abc com and press Go to start the test The result will be displayed on this page DNS Name Lookup Ping Look up the name www google com Name www google com Address 66 249 89 104 223 your future life SSL IPSec VPN Firewall Ping DNS Name Lookup 9 Ping Ping host or IP address 168 95 1 1 Status Test Succeeded Packets 4 4 transmitted 4 4 received 0 loss Minimun 18 ms Round Trip Time Maximun 99 ms Average 48 ms This item informs users of the status quo of the outbound session and allows the user to know the existence of computers online On this test screen please enter the host IP that users want to te
71. Group END e le lele B e f le le Sion Eleze Saa Cancel Advanced Function packet Type This device provides three types of data packet transmission TCP SYN Flood UDP Flood and ICMP Flood WAN Threshold When all packet values from external attack or from single external IP attack reach the maximum amount the default is 15000 packets Sec and 2000 packets Sec respectively if these conditions above occurs the IP will be blocked for 5 minutes the default is 5 minutes OBJ 176 Users can adjust the threshold value and the blocking duration to effectively deal with external attack The threshold value should be adjusted from high to low LAN Threshold When all packet values from internal attack or from single internal IP attack reach the maximum amount the default is 15000 packets Sec and 2000 packets Sec respectively if these conditions above 102 your future life Exception Source IP Exception Dest IP Apply Cancel Restrict Application SSL IPSec VPN Firewall occurs the IP will be blocked for 5 minutes the default is 5 minutes Users can adjust the threshold value and the blocking duration to effectively deal with external attack The threshold value should be adjusted from high to low Input the exempted source IP Input the exempted Destination IP addresses Click Apply to save the configuration Click Cancel to leave without making any change MSN Caa Exception QQ Numb
72. IP is assigned by both China Netcom strategy and self defined strategy China Netcom strategy will take priority In other words traffic to that destination IP will be transmitted through the WAN or WAN group under China Netcom strategy Session Balance Advanced Function In general session balance is to equally and randomly distribute the session connections of each intranet IP For some special connections for example web banking encrypted connection Https or TCP443 is required to connect from the same WAN IP If one intranet IP visits web banking website and the connection is distributed into different WAN IP addresses there will be disconnection or failure oession balance advanced function targets at solving this issue oession balance advanced function can set the same intranet IP keeps having sessions from the same WAN IP for some specific service protocols Other service protocols can still adopt the original balance mechanism to distribute the sessions equally and randomly With the original session balance efficiency advanced function can ensure the connection running without error for some special service protocols 50 D GINO your future life SSL IPSec VPN Firewall Mode Auto Load Balance Mode Mode ian ced Function Unbinding WAN Balance ion ced Function strategy Routing Mode ion ced Function Selr defined Strategy2 Disabled Click Advanced Function to enter the setting wind
73. Input the time rule for disconnection of this WAN service 31 your future life SSL IPSec VPN Firewall Line Dropped Scheduling Input how long the WAN service may be disconnected before the newly added connections should go through another WAN to connect with the Internet Backup Interface Select another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes Static IP If an ISP issues a static IP such as one IP or eight IP addresses etc please select this connection mode and follow the steps below to input the IP numbers issued by an ISP into the relevant boxes Interface YAN 1 WAN Connection Type Static IF WAN IP Address 0 Jo Subnet Mask 255 255 255 Default Gateway 0 0 DNSServer Required 0 o e ji DNSServer Optional 0 EnabledLine Dropped Scheduling Line Dropped Period from o o to o 24 Hour Format ing minutes ahead line dropped to start new session transferring Line Dropped Sch disable Backup Interface WAN IP address Input the available static IP address issued by ISP Subnet Mask Input the subnet mask of the static IP address issued by ISP such as 32 your future life Default Gateway DNS Server Enable Line Dropped S
74. L IPSec VPN Firewall High Availability 9 Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously E Master Mode 9 Slave Mode DHCP Enable DHCP Disable Master Slave Mode setting Of two devices must be different WAN Backup LAN Gateway Backup Llwan 1 L waN 2 Wan 3 v WAN 4 The checked WAN are not working in this device MAC Address ofthe backupdevice 0 o Ho jo o lo Status Normal This Ul might vary from model to model depending on different product lines Operation Slave Mode WAN Backup The Checked WANs are not working in this device LAN Gateway Backup MAC Address of the backup device Status Although working with master device Backup device s DHCP server is disabled LAN users need to transmit traffic through the WAN on Slave device You should add LAN IP of Slave device into Master device DHCP server default gateway which is DHCP server IP address For example if the DHCP server s IP of Master device is 192 168 1 1 and the subnet mask is 255 255 255 0 Salve device should be in the same subnet ex 192 168 1 2 The checked WANs will works in another device For an example if WAN1 and WAN2 work in this device and WANS and WAN4 work in another WAN3 and WANA should be checked Input the LAN IP of Master device It should be different from Slave device s IP Must be in the same subnet Input the LAN MAC of Master device
75. L VPN will assign a LAN IP address for the client You can adjust Range Start and Range End by purchasing SSL tunnel quantity In this way you can provide sufficient LAN IPs for SSL tunnel users Please Note IP ranges for virtual passage cannot have conflict with those in DHCP and PPTP tunnels 11 8 2 Advanced Configurations The SSL default port is 443 If port 443 is being used by another internal application you can use the SSL VPN s service port drop down menu to select a different one 10443 20443 Remind If you change a port other than the default 443 when a client connects to the SSL VPN the port number will have to be entered after the address Q Advanced Settings Change SSLVPM Clients Service Port 443 10443 0443 196 your future life SSL IPSec VPN Firewall Password Protection For enhance the robust security connection of SSL you can avoid illegal users or brute force attack by selecting below options Password Protection Enable restrict crack calculator Enable graphics verification 1 Enable restrict crack calculator When a single account continuous input an incorrect password 3 times the system will black this account minutes administrators can set the number of error times for the single account login when this account login times are over the number administrators set system will block this account for a period of time To enter Apply it will tak
76. N DIAG Amber Amber LED on System self test is running Amber LED off System self test is completed successfully Link Act Green Green LED on Ethernet connection is fine l Green LED blinking Packets are transmitting through Ethernet Green light at the right of port the port 100M Speed Amber Amber LED on Ethernet is running at 100Mbps Amber LED off Ethernet is running at 10Mbps Amber light at th left of the port Connect Green Green LED on WAN is connected and gets the IP address Reset Action Description Press Reset Button For 5 Secs Warm Start DIAG indicator Amber LED flashing slowly Press Reset Button Over 10 Secs Factory Default DIAG indicator Amber LED flashing quickly System Built in Battery A system timing battery is built into Router The lifespan of the battery is about 1 2 years If the battery life is over or it can not be charged Router will not be able to record time correctly nor synchronize with internet NTP time server Please contact your system supplier for information on how to replace the battery Attention Do not replace the battery yourself otherwise irreparable damage to the product may be caused your future life SSL IPSec VPN Firewall Installing Router on a Standard 19 Rack We suggest to either place Router on a desk or install it in a rack with attached brackets Do not place other heavy objects together with Router on a rack Overloading may cause the rack to fail t
77. OUR m 24 SRM O 23 VL on sius eer a E E a 27 6 1 Network Connection sss eene nennen nnne nnn nnn nnn nnns nnn n nnn nnne nnns 27 OLI Host Name and DG mig itt NOI senec e ok REESE WERTE oie EUASAS RSS EDER NEUE IEN EUR SUAR I RIUSUKS ENTER ONRT HO RIEN S SER MESI SUUS 28 QU BEA PENIS SUID PER MENERCTH 28 6 1 3 SEE BAS AST Rl REO 20 6 2 Multi WAN Setting esssssssssssssssseeeenneennen nnne n nnne nnn nnn rsen nnns inire nnns 45 e 2 Load Balance VIOGS sue cest tbi mn ERSTES HO Im In ee eee MEI ID IN ON URN MM EUM 46 0 2 2 Network Detection Sel VICES norsu arriti saina suns a ad Inataltusxcasiitutupuma ns uno uio inae uo vod AA 53 02 Protocol Bindin Decrecer Rm 56 VIT Intranet COMM G WPAN oisciccdisccccssseccssscevseeseissdcesetasecacocssscecsveudesseissicese test vecsens etesvevdeeseiaviesseleseeocesssecesess 68 FENSTER m tm 68 FU dori HQ 69 re OHOP M 71 rus Cii 73 7 5 IP amp MAC Binding cccccsscsseseeeeeeeeeeeeeceeeecaeauassseeseseeeeeeeeeceeeeeeasaaaaassseeeeeeeeeeeeeseeeeseaaagssssseeees 76 reo uecuetdiim u mc M 80 your future life SSL IPSec VPN Firewall 7 7 Port Group Management MR m UU 82 VIII
78. P connected to remote devices as well as the number of ports will be displayed IP Port Statistic Enable IP Part statistic Specific IP Part status far IP address jise 188 182 188 4 141 WANT 182 158 4 155 3664 182 188 4 141 TCP a0 WANT 182 1868 4 156 3665 54 42 192 168 4 141 TCP 80 WANT 182 1868 4 156 3670 182 168 4 141 TCP a0 WAN 192 168 4 166 3552 182 1868 4 141 TCP 80 WANT 192 168 4 166 3661 116 2216 182 1868 4 141 TCP 80 WAN 192 168 4 166 3668 0 0 182 1868 4 141 TCP 80 WAN 192 168 4 166 3669 0 0 192 168 4 141 TCP 80 WANT 192 168 4 166 3571 0 0 Ratesh 247 N ONO your future life SSL IPSec VPN Firewall Specific Port Status Enter the service port number in the field and IP that are currently used by this port will be displayed P Port Statistic Enabled Search Type Service Port Service Port 492 168 1100 TCP 1290 WAN2 2074611114 192 168 1 100 TCP 1944 WAN2 203 69 138 19 80 0 o siete s t 248 your future life SSL IPSec VPN Firewall 14 6 QRTG Qno Router Traffic Graphic QRTG utilizes dynamic GUI and simple statistic to display system status of Qno Firewall Router presently including CPU Utilization Memory Utilization Session and WAN Traffic Enable QRTG The function is disabled by default When you are going to enable the QRTG function system will pop up a warning massage to remind you this function will be enabled which may infl
79. TCPH19 119 POP3 TCP 110 110 SNMP UDPA61 161 SMTP TCP 25 25 TELNET TCP 23 23 TELNET Secondary TCP 8023 8023 Add to list Deletes selerted Services Service Name In this box input the name of the Service Port which users want to activate such as BT etc Protocol This option list is for selecting a packet format such as TCP or UDP for the Service Ports users want to activate Port range In the boxes input the range of Service Ports users want to add Add To List Click the button to add the configuration into the Services List Users can add up to 100 services into the list 60 your future life SSL IPSec VPN Firewall Delete selected Service To remove the selected activated Services Apply Click the Apply button to save the modification Cancel Click the Cancel button to cancel the modification This only works before Apply is clicked Exit To quit this configuration window Auto Load Balancing mode when enabled The collocation of the Auto Load Balance Mode and the Auto Load Mode will enable more flexible use of bandwidth Users can assign specific Intranet IP addresses to specific destination application service ports or assign specific destination IP addresses to a WAN user choose for external connections Example 1 How do I set up Auto Load Balance Mode to assign the Intranet IP 192 168 1 100 to WAN2 for the Internet As in the figure below select
80. Trial Version column it means the feature has no trail version or it just supports the amount of VPN tunnels such as QnoSoftKey Trial Version Display Trial button in the Trial Version column at default if Official Version the functions have trial versions Users can try the functions for certain period of time by pressing the button After entering and registering License Key successfully Official Version column will be checked The feature will be in official 234 your future life SSL IPSec VPN Firewall DERI version and not be limited by trial expiration date Registration Time Display successfully inputted and registered time Status Information Indicate remaining trial date or supported amount of QnoSoftkey VPN Tunnels Refresh Refresh current system status and time 2255 your future life SSL IPSec VPN Firewall XIV Log From the log management and look up we can see the relevant operation status which is convenient for us to facilitate the setup and operation 14 1 System Log Its system log offers three options system log E mail alert and log setting Syslog Enable Syslog syslog Server Po Name or IF Address Syn Flooding IP Spoofing _ Win Nuke Fi Ping Qf Death Unauthorized Login Attempt Deny Policies L Allow Policies Authorized Login Clear Log How View System Log Outgoing Log Table Incoming Log Table System Log Enabled If
81. WAN Setting WAM 1 Obtain an IP automatically Edit WAN 2 Obtain an IP automatically Edit WAN 3 Obtain an IP automatically Edit WAN 4 Obtain an IP automatically Edit enable DMZ Appi o l Cenes 27 4 your future life SSL IPSec VPN Firewall 6 1 1 Host Name and Domain Name Device name and domain name can be input in the two boxes Though this configuration is not necessary in most environments some ISPs in some countries may require it 6 1 2 LAN Setting This is configuration information for the Router current LAN IP address The default configuration is 192 168 1 1 and the default Subnet Mask is 255 255 255 0 It can be changed according to the actual network structure LAN Setting m Device IP Address 182 168 1 1 subnet Mask 255 255 255 0 Multiple Subnet Setting Disabled Multiple Subnet Setting Click Unified IP Management to enter the configuration page as shown in the following figure Input the respective IP addresses and subnet masks 28 CINCO your future life SSL IPSec VPN Firewall Q LAN Setting Device IP Address192 168 SubnetMask255 55 255 C Multiple Subnet LANIPAdaress Add to list Dynamic IP EnableDHCP Server Subnet Subnet Subnet3 Subnet4 Enable Enable C Enable Enable 192188 100 192188 100 100 19 166 4 100 Agi Ceneel This function enables users to input IP segments that differ from t
82. WAN Traffic Statistic hourly graphic and average up down stream As in the following figures 250 ONO your future life SSL IPSec VPN Firewall Iv Enabled QRTG WAN Traffic Statistics Hour WAN Downstream M wan1 wan2 M wan3 M wan4 M wans I wans M wan l wang Unit 5000 2500 nee 0 TE ANa X ed rd AE JAI 0 10 05 10 10 10 15 10 20 10 25 10 30 10 35 10 40 10 45 10 50 WAN Upstream M want M wan2 M wan3 wan4 M wans wans M wan7 wang Unit Kbps 10 05 10 10 10 15 10 20 10 25 10 30 10 35 10 40 10 45 10 50 The UI might vary from model to model depending on different product lines iv 10 55 10 55 11 00 Average 1328 E 1338 E 1690 i 1487 BO E 1041 Kbps Kbps Kbps Kbps Kbps Kbps UnitMinutes Average B 411 i 388 B 431 Bi 516 E o B 434 Kbps Kbps Kbps Kbps Kbps Kbps UnitMinutes Ill WAN Traffic Statistic Day graphic and average up down stream As in the following figures 251 ONO your future life SSL IPSec VPN Firewall Iv Enabled QRTG WAN Traffic Statistics Day WAN Downstream M wan1 M wan2 M wan3 M wan4 M wans l wans wan7 l wang Unit e900 Kbps 4000 2000 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 WAN Upstream Iv want M wan2 M wan3 wan4 M wans C wans M wan wang Unit Kbps 1000 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 The UI might vary from model to model depend
83. abase 2 Users must set DHCP server DNS IP address as the router LAN IP For example LAN is 10 10 10 1 as shown in the following figure 74 your future life SSL IPSec VPN Firewall LAN Setting MAC Address Default 1e 06 61 95 de 9a Device IP Address ho fio fio ft Subnet Mask ms Lem Lem Therefore DCHP DNS IP address must be 10 10 10 1 to make DNS local database in effect DNS DNS Server Optional 2 e Je Je Je 3 After enabling DNS local database if there is no host domain names in the list the router will still use ISP DNS server or internal DNS server for lookup Test if DNS local database is effective Assumed tw yahoo com IP address is 10 10 10 199 as the following figure DNS Local Database Host Domain Name IPAddress D 1 0 jio 199 Update this Entry www jay com gt 111 122 43 25 Anny gt 139 145 3328 tw yahoo com gt 10 10 10 199 Delete selected item 1 System Tool gt Diagnostic gt DNS Name Lookup 75 your future life SSL IPSec VPN Firewall OQ DNS Name Lookup Ping Ping host or IP address Po 2 Enter tw yahoo com for lookup DNS Name Lookup 9 Ping 3 The IP is 10 10 10 199 confirming the corresponding IP in DNS local database DNS Name Lookup Ping Ping host or IP address wrecm Status 10 10 10 199 7 5 IP amp MAC Binding Administrators can apply IP amp MAC Binding
84. abled Enabled Enabled 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00 78 78 78 11 CE 00 78 78 78 11 DO 00 78 78 78 11 D1 0 0 0 0 0 0 0 0 0 0 0 0 Test Failed Test Failed Test Failed Test Failed ee 0 9 b amp j 2 ce ce 14 3 Traffic Statistic Six messages will be displayed on the Traffic Statistic page to provide better traffic management and control 24 CINCO your future life SSL IPSec VPN Firewall Q Traffic Statistic inbound IP Address inbound IF Address Enabled Traffic Statistic ance UU Inbound Service Outbound Service Inbaund Session Outbound Session ee Til By Inbound IP Address The figure displays the source IP address bytes per second and percentage Traffic Statistic Enable Traffic Statistic 59 105 115 196 235 58 182 1868 4 141 155 41 Rairesn By outbound IP Address The figure displays the source IP address bytes per second and percentage 242 ONO your future life SSL IPSec VPN Firewall Traffic Statistic Outbound IF Source Address Enable Traffic Statistic 58 105 115 1865 8 100 By Inbound Port The figure displays the network protocol type destination IP address bytes per second and percentage Traffic Statistic v Enable Traffic Statistic TCP ssh 22 248 og UDP dns 53 28 10 x etinselm By Outbound Port The figure displays the network protocol type destinatio
85. ain name Dynamic Domain Name Status Displays QVN connection status Keep Alive Redial Period This function is to set re connect duration if QVM contention 162 your future life E Mins QVM Backup Tunnel Advanced Function Change QVM Client s Service Port SSL IPSec VPN Firewall drops The range is 1 60 mins You can input at most 3 backup IP addresses or domain names for backup Once the connection is dropped the function will be automatically enabled to backup the VPN connection and ensure data transition security In some environment port 443 has been used for example E Mail Forwarding To avoid the conflict with QVM QVM port can be changed to other encryption ports such as 10443 After modification press Apply to save the network setting or press Cancel to keep the settings unchanged 163 your future life SSL IPSec VPN Firewall XI SSL VPN The router provides two different SSL VPNs virtual passage SSL and full set SSL The functions might vary but the settings in GUI are similar This chapter will introduce SSL VPN settings based on full set SSL SSL Secure Sockets Layer is a protocol that ensures secure data transmission over the Internet via HTTPS encryption including server authentication user authentication and SSL data link integrity and security SSL VPN is an LAN application service that remote users are provided with web page security through a SSL VPN gateway Becau
86. ain name etc www google com Add to list Add the rule to list Delete selected item Users can select one or more rules and click to delete Apply Click Apply to save the modified parameters Cancel Click Cancel to cancel all the changes made to the parameters Exception IP address You can exempted some IP addresses or IP group from the Allow Domain 115 your future life SSL IPSec VPN Firewall Exception Exception redes viso e Jp e lop Add to list Delate selected range Exception IP Enter the exempted IP addresses or IP group address Group Add to list Click this button to add exempted IP addresses or IP group Delete selected range Click this button to delete selected exempted IP address or IP group Content Filter Scheduling Select Always to apply the rule on a round the clock basis Select from and the operation will run according to the defined time For example if the control time runs from 8 a m to 6 p m Monday to Friday users may control the operation according to the following illustrated example Scheduling oo Ayee o o t p o Qo4 HourFormat Everyday Sun on Tue Wed Thu ri Sat Always Select Always to apply the rule on a round the clock basis Select from and the operation will run according to the defined time tO Select Always to apply the rule on a round the clock basis If From is selected the activation time is introduced as b
87. al as the service name Name or IP address Enter the service name or IP address 182 your future life SSL IPSec VPN Firewall Service Select a service from the drop down menu below for example Telnet SSH FTP Add to List After completing the previous steps click on the Add to List tab to add the bookmark setting into the list Save Setting After settings are complete click on the Save Setting tab to save Cancel Click on the Cancel tab to cancel all unsaved settings Exit Click on the Exit tab to close the window Bookmark configured for this group Remote desktop service http 192 168 1 1 edit conbookmarkl htm owner AII Users amp z O E http192 168 1 1 edit conbookmarkl htm owner A 20 I TsersSbookmarktrpe grow Bookmark Name Name or IP Address PY Screen Size Add to list ILI Save Setting k Bookmark Name Enter the service resource name this name will appear on the user s web portal as the service name Name or IP address Enter the service name or IP address Service Select remote desktop service RDP5 VNC from the drop down menu 183 X CINCO your future life SSL IPSec VPN Firewall Screen Size Configure user remote desktop screen display dimensions 680x480 800x600 1027x768 or full screen Add to List After completing the previous steps click on the Add to List tab to add the bookmark setting into the list Save Setting After complet
88. ame admin User Name The default is admin Old Password Input the original password The default is admin New User Name Input the new user name i e Qno New User Password Input the new password Confirm New Password Input the new password again for verification Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change This action will be effective before Apply to save the configuration 24 your future life 5 2 2 Time SSL IPSec VPN Firewall GIGAGIT Router can adjust time setting Users can know the exact time of event occurrences that are recorded in the Syslog and the time of turning on or off access for Internet resources You can either select the embedded NTP Server synchronization function or set up a time reference Synchronize with external NTP server Router has embedded NTP server which will update the time spontaneously Network Time Time Zone Daylight Saving Time Zone Daylight Saving NTP Server Apply Cancel Set the local time using Network Time Protocol NTP automatically Set the local time Manu ally Beijing GMT 08 00 Enabled fro moe Mo nth 25 D ayto Month D ay NTP Server Ag Caneel oelect your location from the pull down time zone list to show correct local time If there is Daylight Saving Time in your area input the date range The device will adjust the time for the Daylight Sav
89. an use Traffic Management and Protocol Binding function to fulfill WAN road balancing so that we can have highest network bandwidth efficiency Mode Auto Load Balance Mode Advanced Function Unbinding WAN Balance Un binding WAN Balance Mode Advanced Function Strategy Routing Advanced Function Set WAH Grouping China Netcom Disabled v Import IF Range Selt defined Strategy 1 Disabled v Saelf defined Strateqy2 Disabled v Network Service Detection E mM on Remove the Connection 45 your future life SSL IPSec VPN Firewall 6 2 1 Load Balance Mode Q Mode Auto Load Balance Mode Mode O By Session Advanced Function By IP Unbinding WAN Balance Un binding WAN Balance Mode By Session BER CIEL ET BEA By IP Strategy Routing Mode Q By Session Advanced Function e By IP Set WAN Grouping China Netcom Disabled Import IP Range Self defined Strategy 1 Disabled Self defined Strategye Disabled Auto Load Balance Mode When Auto Load Balance mode is selected the device will use sessions or IP and the WAN bandwidth automatically allocate connections to achieve load balancing for external connections The network bandwidth is set by what users input for it For example if the upload bandwidth of both WANs is 512Kbit sec the automatic load ratio will be 1 1 if one of the upload bandwidths is 1024Kbit sec while the other is 512Kbit sec the automatic load ratio will be 2 1 T
90. and PCs and provide stable network environment Load balancing function supports Auto Load Balance mode Specify WAN Binding mode and Strategy your future life SSL IPSec VPN Firewall Routing mode to allow deployment of flexible network connection required to control traffic flow to guarantee that whole connections are unobstructed Strategy Routing mode is simply to configure the network without the input of IP address It can automatically detect outbound packets and filter telecom connection to ensure quick response and packet pass through without obstruction and it can aggregate the same ISP bandwidth for load balancing control and increase flexibility of network resource Built in Firewall system can fulfill market requirement in defense of internet attacks for most enterprise Initiative packet inspection via the network layer dynamic detection denies or blocks non standard protocol connections It can easily employ complete protection functions to ensure network security as required for any kind of hack attacks worm amp Virus and ARP attacks by one way control Firewall system has not only NAT function but also DoS attack Complete Functions of Access Rules can allow managers to select the network service levels to deny or allow accesses and it can also limit or deny LAN users to use the network and to avoid the network resource being occupied or threatened due to improper uses NAT function can provide the translation betwee
91. ary table displays group setting information Group settings can be modified here and new users can also be added Group Summary Detail All Users Default Detail Enable supervisar Default Detail Detail i Disable Mobile User Default Detail Detail Disable Branch Staff Default Detail Detail Disable Add Hew Group Group Domain User Display the group s name SSL VPN has 4 built in groups by default All Users Supervisor Mobile User amp Branch Staff If one group needs to be edited click on its name to access the group management page Display the authentication server name used corresponding to certain group which is served as Local Database by default Click Detail to view a specific group s user names and types E Summary Microsoft Internet Explorer E m EJ Group Mame All Users 165 your future life Resource Delete Status Add New Group SSL IPSec VPN Firewall Click Detail to view a specific group s available service resources The 4 default group s authentication service resources are all listed in the following service resource configuration explanation Clo S Summary Microsoft Internet Explorer Group Mame All Users I Telnet SSH FTP Word Excel PowerPoint ACCESS Outlook Internet Explorer FrontPage ERP Terminal Service RDPS Actives Vi
92. assword Expiration Date yyyy mm dd User Type Displays the authentication server name Enter authentication server s user names For Local Database enter user passwords Passwords do not need to be entered if Local Database is not used Enter users permitted time limit For example if the expiration date is set to November 1 2007 then the user will be denied beginning on November 2 2007 at 12 00 AM If set to Administrator the user will login on the router management UI If set to User the user will login on the web portal Please note Only Local Database users can be set as Administrator external authentication server users can only be User and cannot login on the router management UI 188 your future life Inactive timeout Add to List Confirm Cancel Exit SSL IPSec VPN Firewall Even though a user has logged in via the web portal he she will be forced to logout timeout due to inactivity after 10 minutes If a user logs into the web portal to access enterprise resources using a SSL in an unsafe environment a shorter timeout time is recommended to mitigate risk if the user is logged in but inactive After completing the above settings click on Add to List to add newly created user settings to the corresponding list After settings are complete click on the Confirm tab to save Click on the Cancel tab to cancel all unsaved settings Click on the Exit tab to close the
93. ave the network setting or push Cancel to keep the settings unchanged 152 your future life SSL IPSec VPN Firewall 10 2 QnoKey Introduces how Qno VPN devices conducts preliminary configuration of the data from the user end and how to set the QnoKey user to successfully create QnoKey by using QnoKey management software 10 2 1 QnoKey Summary Login to the web based UI and click on the QnoKey menu to display the page that summarizes the current status information of QnoKey as illustrated below QnoKey QnoKey Tunnel Number o Tunnel s Used 100 Tunnel s Available Q QnokKey Client Table Jumpto 1 dw 1Page 5 w 5 w entries per page Add New QnoKey Group Displays how many tunnels are applied and the total tunnel number of QnoKey tunnel Through advanced setting users can set the tunnel number of IPSec and QnoKey QnoKey Tunnel Number Enabled Displays whether QnoKey username is enabled Account ID Displays the user name group of QnoKey Local IP Address Server IP address or the applied domain name Domain Name The present valid time of QnoKey permanent use is displayed as Forever If the number of days of using QnoKey is set the remaining time is displayed here Life Time Available Time 153 GNO your future life Account Number Limitation Used Number Online Number Show Table Delete Go to page Entries per page Add Qnokey Group Delete All
94. c VPN Firewall Q Block File Type Exception ip address Special service Exceptian IP E i OY HE dp od Add to list Special service Choose the blocked service application Exception IP Add the IPs which are not required for blocking 106 your future life SSL IPSec VPN Firewall Add to list Add this rule to the list Delete selected item Remove the rules selected from the Service List 9 2 Access Rule Users may turn on off the setting to permit or forbid any packet to access internet Users may select to set different network access rules from internal to external or from external to internal Users may set different packets for IP address and communication port numbers to filter Internet access rules Network access rule follows IP address destination IP address and IP communications protocol status to manage the network packet traffic and make sure whether their access is allowed by the firewall 9 2 1 Default Access Rule The device has a user friendly network access regulatory tool Users may define network access rules They can select to enable disable the network so as to protect all internet access The following describes the internet access rules e All traffic from the LAN to the WAN is allowed by default e All traffic from the WAN to the LAN is denied by default e All traffic from the LAN to the DMZ is allowed by default e All traffic from the DMZ to the LAN is denied by defaul
95. cess to this tunnel and the WAN IP address will be automatically filled into this space Users don t need to do further settings P EmallUserFODN Amenicaton fie2 fies 123 le 4 Dynamic IP Domain Name FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to link to VPN If the remote VPN gateway requires connection to the device for VPN connection this device will start 139 CINCO your future life SSL IPSec VPN Firewall authentication and respond to this VPN tunnel connection if users select this option to link to VPN please enter the domain name zm n Dynamei IP Domain Name FQDN Authentication v 5 Dynamic IP E mail Addr USER FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to connect to VPN without entering IP address When VPN Gateway requires for VPN connection the device will start authentication and respond to VPN tunnel connection if users select this option to link to VPN enter E Mail address to the empty field for E Mail authentication Dynamic IP E mail User FQDN Authentication v IPSec Setup IPSec Setup If there is any encryption mechanism the encryption mechanism of these two VPN tunnels must be identical in order to create connection And the transmission data must be encrypted w
96. cheduling Line Dropped Period Line Dropped Scheduling Backup Interface SSL IPSec VPN Firewall Issued eight static IP addresses 255 255 255 248 Issued 16 static IP addresses 255 255 255 240 Input the default gateway issued by ISP For ADSL users it is usually an ATU R IP address As for optical fiber users please input the optical fiber switching IP Input the DNS IP address issued by ISP At least one IP group should be input The maximum acceptable is two IP groups The WAN disconnection schedule will be activated by checking this option In some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Input the time rule for disconnection of this WAN service Input how long the WAN service may be disconnected before the newly added connections should go through another WAN to connect with the Internet Select another WAN p
97. ck Show List to show the Account List page applying this rule Q Group Account list Group Account ID test test w Beek Apy Cancel Group Account ID Displays the group ID to which the user belongs to Enabled Click this option to activate QnoKey user QnoKey SN Displays the QnoKey serial number User Name Displays the QnoKey user name Displays the QnoKey connection status Connect means the user is connected and online Disconnect means no connection and offline Status 157 your future life Stolen Key Login Action Bind MAC MAC Address Delete SSL IPSec VPN Firewall Select this option to create settings if the QnoKey is lost If there is hardware binding QnoKey can only execute on the bound PC If hardware binding function is enabled it will show the MAC address which Qnokey is bound with not the PC MAC address Delete the user Qnokey connection information 158 your future life SSL IPSec VPN Firewall 10 3 QVM VPN Function Setup The QVM series device provides three major convenient functions 1 Smart Link IPSec VPN Easy VPN setup replaces the conventional complicated VPN setup process by entering Server IP User Name and Password 2 Central Control Feature Displays a clear VPN connection status of all remote ends and branches Its central control screen allows setup from remote into external client ends 3 VPN Disconnection Backup Solves data transmission
98. connection quantity 21 GINO your future life SSL IPSec VPN Firewall 5 1 4 Firewall Status Security Status status On On Off On Off 0 rules set SPI Stateful Packet Inspection Indicates whether SPI Stateful Packet Inspection is on or off The default configuration is On DoS Denial of Service Indicates if DoS attack prevention is activated The default configuration is On Block WAN Request Indicates that denying the connection from Internet is activated The default configuration is On Prevent ARP Virus Attack Indicates that preventing Arp virus attack is acitvated The default configuration is Off Remote Management Indicates if remote management is activated on or off Click the hyperlink to enter and manage the configuration The default configuration is Off Access Rule Indicates the number of access rule applied 5 1 5 Log Setting Status Q Log Setting Status Disabled Disabled 22 your future life SSL IPSec VPN Firewall External Syslog Indicates the sever setting to receive the syslog Server Send Log by E mail future feature Indicates the E mail setting Syslog will be sent to the specific E mail E Mail link will be connected to syslog setting page 1 If you do not have the email address set in system log it will show E mail cannot be sent because you have not specified an outbound SMTP server address represents that
99. connection will not fail This option allows users to select which WAN port to make connection facilitating management If WAN1 is selected QnoKey group users can connect through only WAN1 If both WAN 1and WAN 2 are selected QnoKey group users are allowed to make connection via WAN 1or WAN 2 When WANT is disconnected WAN2 will be automatically connected to back up VPN connection Note B f WAN port is selected and the network connection type is set as static IP the system will automatically display this WAN IP Administrator does not need to enter it manually B f WAN port is selected and the network connection is set to other types such as DHCP PPPoE administrator needs to enter the IP address or domain name through DDNS analysis oet the valid time for QnoKey group If the QnoKey is for normal and frequent use the option Forever may be selected so the user end valid time is infinite If the user is more complicated or if itis meant for mobile users who travel on business the VPN security can be guaranteed by setting the valid time of QnoKey as 1 99 days according to the 155 your future life SSL IPSec VPN Firewall desired number of days to be set Account Number Limitation Set the maximum number of QnoKey users from 1 100 allowed by the group setting rules Stolen Key Login Action In the drop down list select operation options for the missing QnoKey In the event of losing Qn
100. ct Diffie Hellman groups Group 1 Group 2 Group 5 e Phase 1 Phase 2 Encryption This option allows users to set this VPN tunnel to use any encryption mode Note that this parameter must be identical to that of the remote encryption 141 your future life SSL IPSec VPN Firewall parameter DES 64 bit encryption mode 3DES 128 bit encryption mode AES the standard of using security code to encrypt information It supports 128 bit 192 bit and 256 bit encryption keys Phase 1 Phase 2 Authentication This authentication option allows users to set this VPN tunnel to use any authentication mode Note that this parameter must be identical to that of the remote authentication mode MD5 or SHA1 e Phase 1 SA Life Time The life time for this exchange code is set to 28800 seconds or 8hours by default This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security e Phase2 SA Life Time The life time for this exchange code is set to 3600 seconds or 1hours by default This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security e Preshared Key For the Auto IKE option enter a password of any digit or characters in the text of Pre shared Key the example here is set as test and the system will automatically translate what users entered as exchange passwo
101. cted to the entire network to facilitate network management Mirror Port Users can configure LAN 1 as mirror port by choosing Enable Port 1 as Mirror Port All the traffic from LAN to WAN will be copied to mirror port Administrator can control or filter the traffic through mirror port Once this function is enabled LAN 1 will be shown as Mirror Port in Physical Port Status Home page Physical Port Status 7 2 Port Status 1 2 3 4 Mirrar Part LAN Enabled Connect Enabled Enabled Internet Internet Internet Internet WAN 1 WAN WANS WAN Enabled Enabled Enabled Enabled 69 4 ONEJ your future life SSL IPSec VPN Firewall This function allows network managers to review the detail information of each port introduces how to configure ports and understand how to configure intranet IP addresses PotiD LAN 1 v Q Summary 10Base T 100Base TX z Down Fort Enabled Normal 10 Mbps Half Enabled VLAN Statistics oO o o a ac Raiesh Summary There are Network Connection Type Interface LAN WAN 1 4 DMZ Link Status Up Down Port Activity Port Enabled Priority Setting High or Normal Speed Status 10Mbps or 100Mbps Duplex Status half duplex or full duplex Auto Neg Enabled Disabled and VLAN VLAN 1 4 VLAN All Statistics The packet data of this specific port will be displayed Data include receive transmit packet count receive trans
102. d Dydns WAN 2 3322 Disabled 3322 Edit Qnoddns Disabled Gna Dyndns Disabled Dydns WAN 3 3322 Disabled 3322 Edit Qnoddns Disabled Qna Dyndns Disabled Dydns WAN 4 3322 Disabled 3322 Edit Qnoddns Disabled Gna Dyndns Disabled Dydns WAN 5 3322 Disabled 3322 Edit Qnoddns Disabled Qna Select the WAN port to which the configuration is to be edited for example WAN 1 Click the hyperlink to enter and edit the settings 212 NS ONO your future life SSL IPSec VPN Firewall Interface WAN DynDNS org 0 0 0 0 DDNS function is disabled or Mo Internet connection E 3322 0rg 0 0 0 0 DOWNS function is disabled or No Internet connection QnoDDNS org cn la noddns org cn 0 0 0 0 DONS function is disabled or No Internet connection gpl Camel Interface This is an indication of the WAN port the user has selected DDNS Check either of the boxes before DynDNS org 3322 org DEDNS com and QnoDDNS org cn to select one of the four DDNS website address transfer functions Username The name which is set up for DDNS Input a complete website address such as abc qnoddns org cn as a user name for QnoDDNS Password The password which is set up for DDNS Host Name Input the website address which has been applied from DDNS 213 S x E a GIN LJ your future life SSL IPSec VPN Firewall Examples are abc dyndns org or xyz 3322 org In
103. d Load Balance Balance System Tool XIII System Tool V Device Spec Verification Status Display and Login Password and Time Setting Password 5 2 Change and Set Login Password and Time Diagnostic 13 1 Diagnostic Firmware Upgrade 13 2 Firmware Upgrade Setting Backup 13 3 Setting Backup Time 5 2 Change and Set Login Password and Time System Recover 13 4 System Recover 251 your future life SSL IPSec VPN Firewall Ftc key TE Lense Key 0 Se ee sms a9 Connection Statistic 14 4 Connection Statistic IP Port statistic 14 5 IP Port statistic QRTG 14 6 QRTG TrafficStatistic 14 3 Traffic Statistic 258 Y your future life SSL IPSec VPN Firewall Appendix II Troubleshooting 1 Block BT Download To block BT and prevent downloading by users go to the Firewall gt Content Filter and select Enable Website Block by Keywords followed by the input of torrent This will prevent the users from downloading Accept Allowed Domains 9 Block Forbidden Domains Forbidden Domains Enabled Website Blocking by Keywords Enabled Forbidden all IP address v fo Lp wj ts Nate rms 259 CINCO your future life SSL IPSec VPN Firewall 2 Shock Wave and Worm Virus Prevention Since many users have been attacked by Shock Wave and Worm viruses recently the internet transmission speed was brought down and the Session bulky increase result in the ma
104. d authentication server Enter authentication server address Enter the password for RADIUS Click on the Submit tab to save changes Click Cancel to clear any recent changes to the settings 172 m i a E JJ ee your future life http 7197 168 1 17edit sslvpn domaim htm Windows Internet Ex Si Ea i http 182 168 1 1 edit ssbepn domam hin v Authentication Type Domain Name Radius Server Secret Password ERE Authentication Type Domain Names RADIUS Server Secret Password Submit Cancel 5 Radius MSCHAPV2 http 192 168 1 1 edit sslvpn domain htm Windows Internet Ex ERSTES SSL IPSec VPN Firewall Radi us MSCHAP al Select the authentication server type from the drop down menu Name the selected authentication server Enter authentication server address Enter the password for RADIUS Click on the Submit tab to save changes Click Cancel to clear any recent changes to the settings http r192 168 1 1 edit sslepn domam htm Authentication Type Domain Name Radius Server Secret Password Submit SER Authentication Type Domain Names RADIUS Server Secret Password Submit Radius MSCHAPVZ Cancel O ARE 100 Select the authentication server type from the drop down menu Name the selected authentication server Enter authentication server address Enter the password for RADIUS Click on the Submit tab to save changes 173 E
105. defined Rule settings 108 778 I 47 your future life SSL IPSec VPN Firewall 9 2 2 Add New Access Rule Service Service Management Scheduling Apply this rule Always Aways w to 24 Hour Format Everyday sun Mon Tue Wed Thu Fri Sat Beck Apy Genea Action Allow Permits the pass of packets compliant with this control rule Deny Prevents the pass of packets not compliant with this control rule Service From the drop down menu select the service that users grant or do not give permission Service If the service that users wish to manage does not exist in the drop down Management menu press Service Management to add the new service From the pop up window enter a service name and communications protocol and port and then click the Add to list button to add the new service Log No Log There will be no log record Create Log when matched Event will be recorded in the log Source Interface Select the source port whether users are permitted or not for example 109 your future life Source IP Dest IP Scheduling Apply this rule to Day Control Apply Cancel SSL IPSec VPN Firewall LAN WAN1 WAN or Any Select from the drop down menu Select the source IP range for example Any Single Range or preset IP group name If Single or Range is selected please enter a single IP address or an IP address within a session Select
106. designated After the path for document importation has been selected click Import and then at the bottom of the configuration window click Apply The device will then dispatch the traffic to the assigned destination IP through the WAN ex WAN 1 or WAN grouping users designated to the Internet 9 China Netcom Self defined Strategy 1 J Self defined Strategy 2 p To build a policy document users can use a text based editor such as Notepad which is included with 49 your future life SSL IPSec VPN Firewall Windows system Follow the text format in the figure below to key in the destination IP addresses users want to assign For example if the destination IP address range users want to designate is 140 115 1 1 140 115 1 255 key in 140 115 1 1 140 115 1 255 in Notepad The next destination IP address range should be keyed in the next line Attention Even if only one destination IP address is to be assigned it should follow the same format For example if the destination IP address is 210 66 161 54 it should be keyed in as 210 66 161 54 210 66 161 54 After the document has been saved the extension file name is txt users can import the IP range of self defined strategy Oconee th PAE bt zou Sele HRE HRPE d c eG ERBHOD 158 115 1 17158 115 1 255 158 116 11 17158 116 11 31 218 66 161 557218 66 161 5 Note China Netcom strategy and self defined strategy can coexist However if a destination
107. e SSL IPSec VPN Firewall High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously o Master Mode C slave Mode Operation OHGP Enable DHCP Disable Master Slave Mode setting Of two devices must be different WAN Backup LAN Gateway Backup wAN1 wane F wAN3 M WAN 4 The checked WAN are not working in this device MAC Address of the backup device D 0 p b 0 p Status Normal This Ul might vary from model to model depending on different product lines Operation Master Mode WAN Backup The Checked WANSs are not working in this device LAN Gateway Backup MAC Address of the backup device Status Besides operating network with another device Master device is also the DHCP server to issue LAN IP addresses Although Slave device also supports outbound linking its DHCP server is disabled The checked WANs will works in the other device For an example if WAN1 and WAN2 work in this device and WAN3 and WAN4 work in the other device WAN3 and WAN4 should be checked Input LAN IP of Slave device The IP should be different from LAN IP of Master device Input LAN MAC of Slave device It should be different from LAN MAC of Master device Status Normal means both two devices operate normally Status Backup indicates Slave mode has problems and the device enables backup to take over WAN 232 your future life SS
108. e SSL IPSec VPN Firewall Interface Wami WAN Connection Type Use the Following DNS Server Addresses DNSServer Required DNSServer Optional o EnabledLine Dropp d Scheduling ed Period from 0 0 to lo 24 Hour Format j 3 inutes a Ba lin FEY IBI Bi ji XE tna cncc Line Dropped Scheduling ue utes ahead line dropped to start new session transferring Line Dropp Use the following DNS Server Select a user defined DNS server IP address Addresses DNS Server Input the DNS IP address set by ISP At least one IP group should be input The maximum acceptable groups is two IP groups Enable Line Dropped The WAN disconnection schedule will be activated by checking this Scheduling option In some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period
109. e Mode Hardware Backup Mode Two devices are operating simultaneously Operation Master Mode Backup Mode Master Slave Mode setting Of two devices must be different LAN IP of the backup device 12 168 f 5 MAC Address of the backup device T E E h p p E Status Normal Operation Backup Mode Indicates the backup device will take over when the master fails transmitting WAN and LAN IP setting in backup device should be the same as those of master device The backup device should not be in charge of network transmitting and DHCP server xX If the original LAN IP addresses are issued by Master device DHCP server setting of Backup device should be the same as Master device The Backup device can keep DHCP functioning and there will be no LAN disconnection LAN IP of the backup device Input LAN IP of Master mode which is backed up MAC Address of the backup device Input Master device MAC address which is backed up Status Status Normal indicates the status is idle Master device operates normally Status Backup indicates the device takes over all the network transmitting The status will return to Normal when Master device boots normally and send a message to the backup device Then the status will return to Normal which the backup device remains idle Two devices are operating simultaneously 231 your future lif
110. e 512Kbit Sec the total upstream bandwidth will be WAN1 WAN2 1024Kbit Sec Therefore if there are 50 IP addresses in the Intranet the minimum guaranteed upstream bandwidth for each IP would be 1024Kbit 50 20Kbit Sec Thus 20Kbit Sec can be input for Mini Rate Downstream bandwidth can be calculated in the same way Note The unit of calculation in this example is Kbit Some software indicates the downstream upstream speed with the unit KB 1KB 8Kbit 8 1 2 QoS To satisfy the bandwidth requirements of certain users the device enables users to set up QoS Rate Control and Priority Control Users can select only one of the above QoS choices Rate Control The network administrator can set up bandwidth or usage limitations for each IP or IP range according to the actual bandwidth The network administrator can also set bandwidth control for certain Service Ports A guarantee bandwidth control for external connections can also be configured if there is an internal server 87 your future life Quality of Service Interface Service IP Address Bandwidth sharing SSL IPSec VPN Firewall Interface WAN1 L WAN L wana COI wAN 4 Service All Traffic TCP amp UDPH 55535 Service Management IP Address NI MI MI o to o Direction Upstream yr Mini Rate Kbit sec Max Rate Kbit sec Share total bandwidth with all IP addresses l Assign bandwidth fo
111. e Auto Load Balance system Please refer to the explanations in 6 2 3 Configuring Protocol Binding for setting up Protocol Binding and for examples of collocating router modes with Protocol Binding Un binding WAN Balance Mode This mode enables users to assign specific intranet IP addresses destination application service ports or destination IP addresses to go through an assigned WAN for external connection After being assigned the specific WAN will only support those assigned Intranet IP addresses specific destination application service ports or specific destination IP addresses Intranet IP specific destination application service ports and specific destination IP that is not configured under the rules will go through other WANs for external connection For unassigned WANs users can select Load Balance mode and select session or IP for load balancing If you don t specified IP address gt TCP UDP port or destination IP addresses in WAN ports you can still use Session Balance and IP Balance mechanisms to fulfill load balancing Detail of these two mechanisms are as following Session Balance If By Session is selected the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance IP Balance If By IP is selected the WAN bandwidth will automatically allocate connections based on the number of IP addresses to achieve network load balance Note
112. e Intranet One to One NAT function Public IP Range Begin Input the Public IP address for the Internet One to One NAT function 209 your future life Range Length Add to List Delete Selected range Apply Cancel Note SSL IPSec VPN Firewall The numbers of final IP addresses of actual Internet IP addresses Please do not include IP addresses in use by WANs Add this configuration to the One to One NAT list Remove a selected One to One NAT list Click Apply to save the network configuration modification Click Cancel to leave without making any changes One to One NAT mode will change the firewall working mode If this function has been set up the Internet IP server or PC which is mapped with a LAN port will be exposed on the Internet To prevent Internet users from actively connecting with the One on One NAT server or PC please set up a proper denial rule for access as described Firewall Multiple to One NAT 210 your future life Multiple to One NAT Enable Multiple to One NAT Private IP Range Respective Public IP Interface Add to List Delete selected range Apply Cancel SSL IPSec VPN Firewall Enable Multiple to One NAT Private IP Range Yr dE db to Respective Public IP i db Interface Add to list Delate selected rans phy Caneel Click to enable multiple to one NAT function Input intranet IPs for NAT mapping Input the respective public
113. e PC point where there is problem users may enter the DOS system to 265 your future life SSL IPSec VPN Firewall conduct operation pining the LAN IP to see the packet loss Enter the ping 192 168 1 1 Gateway IP address as illustrated eply from 172 168 1 1 bytes 32 timetims TTL 64 eply from 172 168 1 1 bytes 32 timetims TTL 64 equest timed out equest timed out equest timed out equest timed out eply from 172 168 1 1 bytes 32 timetims TTL 64 eply from 192 168 1 1 hytes 32 timetims TTL 64 If there are cases of packet loss of the ping LAN IP and If later there is connection it is possible that the system is attacked by ARP To verify the situation we may judge by checking ARP table Enter the ARP a command as illustrated below Interface 192 168 1 72 x2 Internet Address Physical Address Type 192 168 1 1 HB BHf 3d4 83 74 28 dynamic 192 168 1 43 080 13 d3 ef b2 Wc dynamic 192 168 1 257 HH HBf 34 83 74 28 dynamic Ge WINDOWS Systemsz2 arp a It is found that the IP of 192 168 1 1 and 192 168 252 points to the same MAC address as 00 0f 3d 83 74 28 Evidently this is a cheat by ARP 3 ARP Solution Now we understand ARP ARP cheat and attack as well as how to identify this type of attack What comes next is to find out effective prevention measures to stop the network from being attacked The general solution provided by Qno can be divided into the following three options a Enab
114. e QQLive Login Time can be set If necessary specific time setting may be undertaken Click Apply to move to the next step 262 your future life c Input the following IP address in Dest IP repeatedly cache tv qq com logingglivedx qq com 58 60 11 145 219 133 49 159 58 60 11 146 logingglivewt qq com 58 60 11 147 58 251 63 13 59 36 97 5 logingglivexy qq com 59 36 97 7 202 205 3 218 59 36 97 37 219 133 63 48 SSL IPSec VPN Firewall aglive qq com 219 133 62 70 tv1 3t qq com 221 236 11 40 tv2 qq com 218 17 209 17 After repeated addition users may see the links to the QQLive Server blocked Click Apply to block QQLive video broadcast 263 your future life SSL IPSec VPN Firewall 4 ARP Virus Attack Prevention 1 ARP Issue and Information Recently many cyber cafes in China experienced disconnection partially or totally for a short period of time but connection is resumed quickly This is caused by the clash with MAC address When virus contained MAC mirrors to such NAT equipments as host devices there is complete disconnection within the network If it mirrors to other devices of the network only devices of this affected network have problems This happens mostly to legendary games especially those with private servers Evidently the network is attacked by ARP which aims to crack the encryption method By doing so they hackers may intercept the packet data and user information through the analysis
115. e User Database Select the Customize User Database the administrator must add a new user to the group See step two User management If users have not been set by the administrator users of the authentication server can still pass the authentication but they will not be able to access the web portal to use internal enterprise resources Click on the Edit tab to make changes to the server addresses and authentication domain names Authentication server type and authentication service name cannot be altered If you want to change the authentication server type and authentication service name delete them and then set up a new authentication server http 61 222 81 69 edit_sslvpn _domain htm Windows Internet Explorer je http 61 222 81 69 edit sslvpn d omain htm Authentication Type Active Directory Domain Name Cmo Server Address 192 168 1 100 Active Directory Domain qno corm tw ZERE SRST Be Click on the recycle bin icon to delete authentication server settings Adding New Authentication Service SSL VPN in addition to Local Database supports another 7 kinds of authentication server types 170 QE te EB ass CINIC J AES Ho S unn your future life SSL IPSec VPN Firewall Radius PAP CHAP MSCHAP MSCHSPV2 NT Domain Active Directory and LDAP 1 Local Database http 71972 168 1 1 7edit sslpn domaim htm Windows Internet Ex m ma E http 192 1568 1 1 ed t sslvpn domai
116. e effect when users login next time If user login with a error password continuously a warning message will pop up as below figure i The Username or Password is not correct When entry error is up ta 3 times system will deny the access of this account for 5 minutes z When the error times over the threshold system will block this account automatically for few minutes along with pop up a warning message to remind the users as below figure 197 N CINCO your future life SSL IPSec VPN Firewall amp Entry error is up to 3 times the access of this account is denied now 2 Enable graphics verification Enable graphics verification When select Enable graphics verification and enter Apply the login web page will display graphics verification as below figure when users login next time Users not only key in the user name password but also need to key in the correct graphics verification to login SSL connecting successful hl MERE 198 your future life SSL IPSec VPN Firewall 11 8 3 SSL Upgrade Serial Number SSL Upgrade Serial Number SSL Upgrade Serial Number SSL Upgrade Tunnel umber Appi Caneel In addition to SSL VPN default SSL tunnel if you want to upgrade for additional tunnels please contact your Qno distribution representatives to order the upgraded edition After purchasing an SSL upgrade serial number will be provided Enter the serial number in
117. e settings click on the Save Setting tab to save Cancel Click on the Cancel tab to cancel all unsaved settings Exit Click on the Exit tab to close the window Permit Customized Bookmarks If an administrator activates Permit Customized Bookmarks then users should click Add Bookmark to configure a service name or IP address to use that resource Q Resource Management E Secure Web Configure Bookmark for T SE Permit Customized Bookmark 184 CINCO your future life SSL IPSec VPN Firewall Add Bookmark Windows Internet Explorer E hitp 1892 1568 1 1 add bookmark htar title title Add BookMarkdsereice sere 4 Services 11 4 Domain Management In addition to selecting 12 3 Group Management SSL VPN can also provide authentication to display Domain Management All authentication services will be shown in the Domain Management list Groups using authentication services will be displayed according to the authentication server name All User Group Supervisor Mobile User Branch Staff Group Group Group Step One Domain Management Step 2 User Management Step 3 Service Resource Management Domain Management 9m bo All Users o Default Local DataBase msn Branch Staff u Gino Active Directory 1932 168 1 101 I Add Hew Domain 185 your future life SSL IPSec VPN Firewall Do
118. e some of the users on this line will not have normal connections This option is suitable under the condition that one of the WAN connections has failed the traffic going through this WAN to the 54 your future life SSL IPSec VPN Firewall destination IP cannot shift to another WAN to reach the destination For example if users want the traffic to 10 0 0 1 10 254 254 254 to go only through WAN1 while WAN 2 is not to support these destinations users should select this option When the WAN1 connection is disconnected packets for 10 0 0 1 10 254 254 254 cannot be transmitted through WAN 2 and there is no need to remove the connection when WAN 1 is disconnected 2 Keep System Log and Remove the Connection If an ISP connection failure is detected no error message will be recorded in the System Log The packet transmitted through this WAN will be shifted to the other WAN automatically and be shifted back again when the connection for the original WAN is repaired and reconnected This option is suitable when one of the WAN connections fails and the traffic going through this WAN to the destination IP should go through the other WAN to reach the destination In this way when any of the WAN connections is broken other WANs can serve as a backup traffic can be shifted to a WAN that is still connected Detecting Feedback Servers Default Gateway The local default communication gateway location such as the IP address
119. efer to Appendix Setting Inferface and Chapter Index 10 your future life Hardware installation Configure the network to meet user s demand SSL IPSec VPN Firewall Setting Content Purpose Install VPN Router hardware based on user physical requirements Login Login the device with Login VPN Router web based UI Web Browser Verify device specification Set password and time Set WAN connection Set LAN connection physical port and IP address settings Set QoS bandwidth management avoid bandwidth occupation oet Firewall prevent attack and improper access to network resources Verify Firmware version and working status oet time and re new password Verify WAN connection setting bandwidth allocation and protocol binding Set mirror port and VLAN Allocate and manage LAN IP Hestrict bandwidth and session of WAN ports LAN IP and application Block attack Set Access rule and restrict Web access Verify VPN Router specification Firmware version and working status Modify the login password considering safe issue oynchronize VPN Router time with WAN Connect to WAN Configure bandwidth to optimize data transmission Provide mirror port port management and VLAN setting functions Support Static DHCP IP allocation to meet different needs IP group will simplify the management work To assure transmission of important
120. eive the device SNMP data The default setting is Private Trap Community Name Set user parameters password required by the Trap receiving host computer to receive Trap message Send SNMP Trap to Set one IP address or Domain Name for the Trap receiving host computer Apply Press Apply to save the settings Cancel Press Cancel to keep the settings unchanged 13 5 System Recover Users can restart the VPN Router with System Recover button System Recover RKeztart Router Q Factory Default Return to Factory Default Setting Restart As the figure below if clicking Restart Router button the dialog block will pop out confirming if users would like to restart the device 224 your future life SSL IPSec VPN Firewall Q System Recover Kestart Ronter Q Factory Default 9 tV Ave you eure you want to restart router Return to Factory Default Setting If clicking Return to Factory Default Setting the dialog block will pop out if the device will return to factory default Q Factory Default Return to Factory Default Setting We suggest you backup your router configuration before upgrade firmware after upgraded firmware you can reset router configuration to default for check the router stability and then restore original router configuration About backup and restore router configuration you can refer to Chapter 12 3 228 your future life SSL IPSec VPN Firewall
121. elow Day Control This control rule has time limitation The setting method Is in 24 hour format such as 08 00 18 00 8 a m to 6 p m 116 CINCO your future life SSL IPSec VPN Firewall X VPN Virtual Private Network 10 1 VPN Gateway to Gateway Client to Gateway PPTP Setup PPTP Status VPN Pass Through PPTP Tunnel Number o Tunnel s Used 30 Tunnel s Available IPSec QnoKey Tunnel Number Tunnel s Used 00 Tunnel s Available IPSec VPN Tunnel Number Tunnel s Used 150 Tunnel s Available EE VPN Tunnel Status 0 Tunnel s Enabled D Tunnels Defined Jump t1 v 1Page entries per page VPN Group Tunnel Status 10 1 1 Display All VPN Summary This VPN Summary displays the real time data with regard to VPN status These data include all tunnel numbers PPTP IPSec QnoKey and IPSec VPN setting parameters and Group VPN and so forth 117 your future life SSL IPSec VPN Firewall Advanced Setting Through Advanced setting users may adjust the tunnel number of IPSec and Qnokey PPTP Tunnel Number lo Tunnel s Used 30 Tunnel s Available IPSec QnoKey Tunnel Number lo Tunnel s Used 200 Tunnel s Available Advanced IPSec VPN Tunnel Number lo Tunnel s Used 150 Tunnel s Available Detai This shows how many VPN tunnels are in use or available 2 PPIP IPSec Tunnel Number Setting Windows Internet Explorer IE m E http19z 158 1 15psec tunnel hin ke
122. er Yahoo Messager PPSTREAM PPLIVE Exception ip address Skype Exception IP Group QQ Exception QQ Number Blocking Skype might affect some website visits or logins When blocking Skype application it is recommended to add the websites which are frequently visited or necessary into the exception list to avoid from visiting or login to the websites You can add the user QQ accounts which are not required to block to the exception QQ number list as the following chart 103 CINCO your future life SSL IPSec VPN Firewall ExemptedQQ Number Windows Internet Explorer i httpr192 1568 1 1 exception qq htm Add to list Exception IP address You can add user IP or IP ranges in to the exception IP list These intranet users won t have the application block above 104 ONO your future life SSL IPSec VPN Firewall Exception ip address Exception ip address Special service MSN Ww Exception IP LH HD HD ow Add to list Delate selected itap Special service Choose the blocked service application Exception IP Add the IPs which are not required for blocking Add to list Add this rule to the list Delete selected item Remove the rules selected from the Service List Block Filter Type Some data format transmits might occupy huge network resources for example exe and zip files You can choose to block these format transmits 105 Y CINCO your future life SSL IPSe
123. erver Required D Jo e jp o DNSServer Optional 0 Intemal LAN IP Range 1 0 jo o jide Internal LAN IP Range z o o j jib Internal LAN IP Range 3 0 o des oho p Internal LAN IP Range 4 0 EnabledLine Dropped Scheduling Line Dropped Period from 0 to 0 24 Hour Format Line Dropped Scheduling 5 I ahead line dropped to start new session transferring Backup Interface WAN IP Address Input one of the static IP addresses issued by ISP 38 your future life SSL IPSec VPN Firewall Subnet Mask Input the subnet mask of the static IP address issued by ISP such as Issued eight static IP addresses 255 255 255 248 Issued 16 static IP addresses 255 255 255 240 Default Gateway Address Input the default gateway of the static IP address issued by ISP For ADSL users it is usually an ATU R IP address DNS Server Input the DNS IP address set by ISP At least one IP group should be input The maximum acceptable is two IP groups Internal LAN IP Range Input the available IP range issued by ISP If ISP issued two discontinuous IP address ranges users can input them into Internal LAN IP Range 1 and Internal LAN IP Range 2 respectively Enable Line Dropped The WAN disconnection schedule will be activated by checking this Scheduling option In some areas there is a time limitation for WAN connection service For example the optical fiber service will
124. ess User Name Input the user name issued by ISP 36 your future life SSL IPSec VPN Firewall Password Input the password issued by ISP Connect on Demand This function enables the auto dialing function to be used for a PPTP dial connection When the client port attempts to connect with the Internet the device will automatically connect with the default ISP auto dial connection when the network has been idle for a period of time the system will break the connection automatically The default time for automatic break off when no packets have been transmitted is five minutes Keep Alive This function enables the PPTP dial connection to redial automatically when the connection has been disconnected Users can set up the redialing time The default is 30 seconds Enable The WAN disconnection schedule will be activated by checking this option Line Dropped In some areas there is a time limitation for WAN connection service For Scheduling example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through ano
125. estarts MAC Address Input the static real MAC the address on the network card for the server or PC which is to be bound Name For distinguishing clients input the name or address of the client that is to be bound The maximum acceptable characters are 12 Enable Activate this configuration Add to list Add the configuration or modification to the list Delete selected Entry Remove the selected binding from the list Add to list Add new binding Block MAC address on the list with wrong IP address This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet access Block MAC address not on the list When this option is activated MAC addresses which are not included in the list will not be able to connect with the Internet Show New IP user This function can reduce administrator s effort on checking MAC addresses one by one for the binding Furthermore it is easy to make mistakes to fill out MAC addresses on the list manually By checking this list administrator can see all MAC addresses which have traffic and are not bound yet Also if administrators find that one specific bound MAC address is shown on the list it means that the user changes the private IP address IP amp MAC binding List 192 168 1 110 Name Enabled Apply 00 1f c6 7b 8a bd Input the name or address of the client that is to be bound The maximum acceptable characters are 12 Choose the i
126. etwork computer Furthermore it is not allowed to disseminate on any media It is not allowed to modify any part of the file Using for other purposes is prohibited by law and it may cause serious civil and criminal punishment The transgressor will receive the accusation possibly 4 Legal Liability and Exclusion 4 1 Qno will check the mistake of the texts and diagrams with all strength However Qno distributors and resellers do not bear any liability for direct or indirect economic loss data loss or other corresponding commercial loss to the user or relevant personnel due to the possible omission 4 2 In order to protect the autonomy of the business development and adjustment of Qno Qno reserves your future life SSL IPSec VPN Firewall the right to adjust or terminate the software Manual any time without informing the users There will be no further notice regarding the product upgrade or change of technical specification If it is necessary the change or termination will be announced in the relevant block of the Qno website 4 3 All the set parameters are examples and they are for reference only You may also purpose your opinion or suggestion We will take it as reference and they may be amended in the next version 4 4 This Manual explains the configuration of all functions for the products of the same series The actual functions of the product may vary with the model Therefore some functions may not be found on t
127. ew Help TOP 3724 3724 TOP 1234 1234 TCP 6666 8 060 67 your future life SSL IPSec VPN Firewall VII Intranet Configuration This chapter introduces how to configure ports and understand how to configure intranet IP addresses 7 1 Port Management Through the Router users can easily manage the setup for WAN ports LAN ports and the DMZ port by choosing the number of ports speed priority duplex and enable disable the auto negotiation feature for connection setting of each port Port Setup _ Enable Port 1 as Mirror Port PortiD Interface Disabled Priority Speed Status Duplex Status AutoNeg VLAN 1 LAN 2 LAN 3 LAN 4 LAN 5 WAN 1 6 WAN 2 T WAN 3 8 WAN 4 Disabled Priority Speed Duplex Status O 10M 100M Half Full V Enabled VLAN1 w O 10M 100M Half Full Enabled VLAN1 v Normal w 10M 100M Half Full v Enabled VLAN1 w O 10M 100M Half Full JEnabled VLAN1 10M 100M Half Full Enabled L 10M 100M Half Full Enabled 10M 100M Half Full Enabled O Normal 10M 100M Half Full v Enabled Apuli Caneel This feature allows users turn on off the Ethernet port If selected the Ethernet port will be shut down immediately and no connection can be made The default value is on This feature allows users to set the high low priority of the packet delivery for the Ethernet port If it is set as High the port has the first prio
128. feature System error message blocked regulations regulation of passage permission system configuration change and registration verification Deny Policies Allow Policies Authorized Login If remote users fail to enter the system because of the access rules for instance message will be recorded in the system log If remote users enter the system because of compliance with access rules for instance message will be recorded in the system log Successful entry into the system includes login from the remote end or from the LAN into this device These messages will be recorded in the system log The following is the description of the four buttons allowing online inquiry into the log View System Log This option allows users to view system log The message content can be read online via the device They include All Log System Log Firewall Log and VPN log which is illustrated as below System Log Current Time Mon Apr 20 16 59 02 2009 Jan 1 08 00 07 2000 System Log SMB System is up WAN4 59 105 115 196 WANT MASK 255 255 255 255 Jan 1 08 00 17 2000 System Log WAN4 GATEWAY 59 105 115 1 WAN4_DN51 139 175 55 244 WAN4 DNS2 139 175 252 16 mtu 1492 WAN2 59 105 115 2468 WANT _MASK 255 255 255 255 Jan 1 08 00 17 2000 System Log WAN2 GATEWAY 59 105 115
129. from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode The device will transmit packets that are not going to Port 80 to the Internet through WAN1 63 NS your future life SSL IPSec VPN Firewall Show Priority HITE TCP 80 80 Service Source IP ow 192 168 1 150 tg 00 Group Destination IP 0 0 0 0 ty Interface ANZ Enable Up date this Appli cation HITE TCE s0 80 2192 168 1 150200 0 0 0 070 0 0 DOWAN All Traffic TCPAUDP 1 65535 7192 168 1 2 254 0 0 0 00 0 0 07 sH1 Delete selected application Add Hew Es Appi s Cem Configure Assigned Routing Mode for Load Balance IP Group This function allows users to assign packets from specific Intranet IP addresses or to specific destination Service Ports and to specific destination IP addresses through an assigned WAN to the Internet After being assigned the specific WAN will only support those assigned Intranet IP addresses destination Service Ports or destination IP addresses Those which are not configured will go through other WANs for external connection Only when this mode is collocated with Assigned Routing can it bring the function into full play Example 1 How do set up the Assigned Routing Mode to keep all Intranet IP addresses from going through WAN2 when the destination is Port 80 and keep all other services from going throug
130. ggressive Mode Compress Support IP Payload Compression Protocol IPComp Keep Alive AH Hash Algorithm Allow MetBIOS Broadcast Pass Through NAT Traversal Dead Peer Detection DPD Interval seconds Allow specific broadcast packet Pass through Service Port Management L1 iL ET EJ E31 L1 E VPN operation mode The connection is the same as most of the VPN device Aggressive Mode This mode is mostly adopted by remote devices The IP connection is designed to enhance the security control if dynamic IP is used for connection Use IP Header Compression Protocol If this option is selected in the connected VPN tunnel the device supports IP Payload compression Protocol Keep Alive If this option is selected VPN channel will keep this VPN connection This is mostly used to connect the remote node of the branch office and headquarter or used for the remote dynamic IP address AH Hash Calculation For AH Authentication Header users may select MD5 DSHA 1 NetBIOS Broadcast If this option is selected the connected VPN tunnel allows the passage of NetBIOS broadcast packet This facilitates the easy connection with other Microsoft Network Neighborhoods however the traffic using this VPN tunnel will increase Dead Peer Detection DPD If this option is selected the connected VPN tunnel will regularly 148 your future life SSL IPSec VPN Firewall transmit HELLO ACK message packet to detect whether there is connection
131. ght to trial in the jurisdiction of the court in the location of Qno In Mainland China the China International Economic and Trade Arbitration Commission is the arbitration organization your future life SSL IPSec VPN Firewall I Introduction New generation SSL IPSec VPN Firewall is a high efficiency router owing to the market requirement It is designed as economical high efficiency with all functions integrated for network VPN Router that fulfills the requirement of enterprise branches vendors and SOHO for VPN application increase and bandwidth management New generation SSL IPSec VPN Router focuses on multiple ISP environment and user bandwidth management requirement to integrate the backbone networking it can support hardware port mirror smart QoS Multi WAN load balance gateway redundancy and Intelligent Firewall SSL IPSec VPN Router uses a 64 bit high level processor and maximum 200 Mbps two way forwarding rate that can support several hundred thousand session connections built in high capacity RAM allows the stability and reliability for long time operation It has 4 10 100 Base T TX Ethernets RJ45 WAN ports These WAN ports can support auto load balance mode exclusive mode remaining WAN balance and stategy routing mode for high efficiency network They offer super flexibility for network set up Moreover these WAN ports also support DHCP fixed IP PPPoE transparent bridge VPN connection port binding static
132. h WAN1 As in the figure below select HTTP TCP 80 80 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses Retain the original numbers 0 0 0 0 in the boxes of Destination IP Which means to include all Internet IP addresses Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode After the rule is set up only packets that go to Port 80 will be transmitted through WANe while other traffics will be transmitted through WAN1 64 your future life SSL IPSec VPN Firewall Show Priority HTTP TCP 80 80 Service service Management Source IF T Group Destination IP 0 0 0 to T 0 D Interface WAHE Enable Update this Application HTTP TCP S80 80 2192 166 1 0 000 0 0 070 0 0 oo WAN Delete selected application Add Hew eck Apply 9 Cenedl Example 2 How do I confiqure Protocol Binding to keep traffic from all Intranet IP addresses from going through WAN2 when the destinations are IP 211 1 1 1 211 254 254 254 as well as the whole Class A group of 60 1 1 1 60 254 254 254 while traffic to other destinations goes through WAN1 As in the following figure there are two rules to be configured The first rule Select All Port TCP amp UDP 1 65535 from the pull down option list Service and
133. h parameter either entries or intervals reaches the threshold first and send the log message of that parameter to the user Users may send out the log right away by pressing this button 237 your future life SSL IPSec VPN Firewall Log Setting Alert Log L Syn Flooding IP Spoofing win Nuke Ping Of Death Unauthorized Login Attempt L Deny Policies Allow Policies Authorized Login Outgoing Log Table Incoming Log Table Clear Loz How The Router provides the following warning message Click to activate these features Syn Flooding IP Spoofing Win Nuke Ping of Death Unauthorized Login Attempt Syn Flooding Bulky syn packet transmission in a short time causes the overload of the system storage of record in connection information IP Spoofing Through the packet sniffing hackers intercept data transmitted on the network After they access the information the IP address from the sender is changed so that they can access the resource in the source system Win Nuke Servers are attacked or trapped by the Trojan program Ping of Death The system fails because the sent data exceeds the maximum packet that can be handled by the IP protocol Unauthorized If intruders into the device are identified the message will be sent to the Login system log 238 your future life General Log SSL IPSec VPN Firewall The VPN Router provides the following warning message Click to activate the
134. he DMZ Port IP Address Subnet Mask Enter the DMZ Port Subnet Mask Range DMZ and WAN are within same Subnet Interface DMZ DMZ IP ranges are the same with WAN IP Subnet 9 Range DMZ amp WAN within same subnet i ranges in Router Plus NAT mode Interface IP Range for DMZ poto o p o jo Interface Select a WAN Port witch is the same subnet with DMZ IP Range for DMZ port Input the IP range located at the DMZ port DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode 43 your future life SSL IPSec VPN Firewall Interface DMZ DMZ IP ranges are the same with WAN IP Subnet Range DMZ amp WAN within same subnet Fm ranges in Router Plus NAT mode Interface LAN Public P Range o o e be LAN Default Gateway2 0 o o o LAN Public P Range o o e be LAN Default Gateway3 0 o o o LAN Public IP Range o o o o LAN Default Gateway Enter the LAN Default Gateway that you configured at Router Plus NAT Mode LAN IP Range Enter the usable static IP range that provide by ISP into the DMZ service IP range If you have other IP range you can setup the default gateway and IP range into group 2 After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes 44 N CINCO your future life SSL IPSec VPN Firewall 6 2 Multi WAN Setting When you have multiple WAN gateways you c
135. he first time learning User Define Dis Or Port Auto Indicates that the intranet IP will connect through the same WAN IP Binding when the service ports are self defined You can self define the service ports and destination IP If the destination IP is set as 0 0 0 0 to O this represents that the destination is to any IP range Note You can only choose either Destination Auto Binding or User Define Dis Or Port Auto Binding Take default rules for example 52 D your future life SSL IPSec VPN Firewall Destination Auto Binding O User Define Dis or Port Auto Binding Service All Traffic TCP amp UDPH 65535 service Management Enable Add to list HTTPS TCPF 443 443 0 0 0 0 0 0 0 0 Deletes selected Eniey When any intranet IP connects with TCP443 port or any destination 0 0 0 0 to O represents any destination it will go through the same WAN IP As for which WAN will be selected this follows the first chosen WAN IP distributed by the original session balance mechanism For example there are two intranet IP 192 168 100 1 and 192 168 100 2 When these intranet IPs first connects with TCP443 port 192 168 100 1 will go through WAN 1 and 192 168 100 2 will go through WAN2 Afterwards 192 168 100 1 will go through WAN1 when there are TCP443 port connections 192 168 100 2 will go through WAN2 when there are TCP443 port connections This rule is by default You can delete or add r
136. he product you purchased 4 5 Qno reserves the right to change the file content of this Manual and the Manual content may not be updated instantly To know more about the updated information of the product please visit Qno official website 4 6 Qno and or distributors hereby declares that no liability will be born for any guarantee and condition of the corresponding information The guarantee and condition include tacit guarantee and condition about marketability suitability for special purposes ownership and non infringement The name of the companies and products mentioned may be the trademark of the owners Qno and or the distributors do not provide the product or software of any third party company Under any circumstance Qno and or distributors bear no liability for special indirect derivative loss or any type of loss in the lawsuit caused by usage or information on the file no matter the lawsuit is related to agreement omission or other tort 5 Other Clauses 5 1 The potency of this Agreement is over any other verbal or written record The invalidation of part or whole of any clause does not affect the potency of other clauses 5 2 The power of interpretation potency and dispute are applicable for the law of Taiwan If there is any dissension or dispute between the users and Qno it should be attempted to solve by consultation first If it is not solved by consultation user agrees that the dissension or dispute is brou
137. he router network segment to the multi net segment configuration the Internet will then be directly accessible In other words if there are already different IP segment groups in the Intranet the Internet is still accessible without making any changes to internal PCs Users can make changes according to their actual network structure 6 1 3 WAN amp DMZ Settings WAN Setting 29 your future life SSL IPSec VPN Firewall WAN Setting WAN 1 Obtain an IP automatically Edit WAN 2 Obtain an IP automatically Edit WAN 3 Obtain an IP automatically Edit WAN 4 Obtain an IP automatically Edit Interface An indication of which port is connected Connection Type Obtain an IP automatically Static IP connection PPPoE Point to Point Protocol over Ethernet PP TP Point to Point Tunneling Protocol or Transparent Bridge Config A modification in an advanced configuration Click Edit to enter the advanced configuration page Obtain an Automatic IP automatically This mode is often used in the connection mode to obtain an automatic DHCP IP This is the device system default connection mode It is a connection mode in which DHCP clients obtain an IP address automatically If having a different connection mode please refer to the following introduction for selection of appropriate configurations Users can also set up their own DNS IP address Check the options and input the user defined DNS IP addresses 30 your future lif
138. herefore to ensure that the device can balance the actual network load please input real upload and download bandwidths Session Balance If By Session is selected the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance IP Session Balance If By IP is selected the WAN bandwidth will automatically allocate connections based on IP amount to achieve network load balance Note For either session balancing or IP connection balancing collocation with Protocol Binding will provide a more flexible application for bandwidth Users can assign a specific Intranet IP to go through a specific service provider for connection or assign an IP for a specific destination to go through the WAN users assign to connect with the Internet For example if users want to assign IP 192 168 1 100 to go through WAN 1 when connecting with the Internet or assign all Intranet IP to go through WAN 2 when connecting with servers with port 80 or assign all Intranet IP to go through WAN 1 when connecting with IP 211 1 1 1 users 46 your future life SSL IPSec VPN Firewall can do that by configuring Protocol Binding Attention When the Auto Load Balance mode is collocated with Protocol Binding only IP addresses or servers that are configured in the connection rule will follow the rule for external connections those which are not configured in the rule will still follow the devic
139. hus causing damage or danger Each Router comes with a set of rack installation accessories including 2 L shaped brackets and 8 screws Users can rack mount the device onto the chassis Please refer to the figure below for the installation onto a 19 rack Attention In order for the device to run smoothly wherever users install it be sure not to obstruct the vent on each side of the device Keep at least 10cm space in front of both the vents for air convection 14 your future life SSL IPSec VPN Firewall 3 2 Router Network Connection XDSI able Modem Hub Switch WAN connection AWAN port can be connected with xDSL Modem Fiber Modem Switching Hub or through an external router to connect to the Internet LAN Connection The LAN port can be connected to a Switching Hub or directly to a PC Users can use servers for monitoring or filtering through the port after Physical Port Mangement configuration is done DMZ The DMZ port can be connected to servers that have legal IP addresses such as Web servers mail servers etc 15 N your future life SSL IPSec VPN Firewall IV Login Router This chapter is mainly introducing Web based UI after connecting Router First check up Router IP address by connecting to DOS through the LAN PC under Router Go to Start Run enter cmd to commend DOS and enter ipconfig for getting Default Gateway address as the graphic below 192 168 1
140. ife User Edit IP Name IP Address Add to IP List Local Group Set IP Group Group Name Delete Group gt gt gt button Delete 1 Apply Cancel SSL IPSec VPN Firewall The IP list will show the list which learns the IP addresses automatically on the left under side You can also modify IP addresses manually Input the name of IP address or range showed below Input IP address or range For example 192 168 1 200 250 After setting name and IP address push this button to add the information into the IP list below If this IP or range is already in the list you can not add it again You can choose from the IP list on the left side to set up a local IP group Choose IP Group that you would like to modify If you would like to add new groups please push Add new group button When you add new groups please note if the group name is in the column Choose the group that you would like to delete from the pull down list and push the Delete Group button System will ask you again if you would like to delete the group After pushing the confirmation button the group will be deleted You can choose several IPs from IP list on the left side and push this button to have them added into the group the right side Delete self defined IP or IP range Click Apply to save the network configuration modification Click Cancel to leave without making any changes Remote IP Group Managemen
141. ing on different product lines 6 00 8 00 10 00 Average i 2342 i 2568 E 2050 i 2179 NO E 2619 UnitHours Average i 698 E 673 i 607 i 603 Bo E 669 UnitHours IV WAN Traffic Statistic Week graphic and average up down stream As in the following figures 2532 Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps N ONO your future life SSL IPSec VPN Firewall Iv Enabled ORTG WAN Traffic Statistics Week WAN Downstream M wan1 wan2 M wan3 M wan4 M wans l wan M wan l wane Unit 6000 Kbps 4000 PAN Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 28 WAN Upstream Iv wan1 wan2 wan3 M wan4 M wans wans M wan7 I wans Unit 1500 Kbps 1000 500 Il Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 28 The Ul might vary from model to model depending on different product lines 253 Nov 27 Nov 27 Average M2174 i 2229 E 2238 i 2225 Bo E 2188 UnitDay Average in 676 E 696 ll 636 i 616 E o 621 UnitDay Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps Kbps your future life SSL IPSec VPN Firewall XV Log out On the top right corner of the web based UI there is a Logout button Click on it to log out of the web based UI To enter next time open the Web browser and enter the IP address user name and password to log in 254 your future life SSL IPSec VPN Firewall Appendix I User
142. ing period automatically If you have your own preferred time server input the server IP address After the changes are completed click Apply to save the configuration Click Cancel to leave without making any change This action will be effective before Apply to save the configuration 25 your future life SSL IPSec VPN Firewall Select the Local Time Manually Input the correct time date and year in the boxes Network Time Set the local time using Network Time Protocol NTP automatically Set the local time Manually Hours Minutes Seconds Month Day Year Alt Cenes After the changes are completed click Apply to save the configuration Click Cancel to leave without making any change This action will be effective before Apply to save the configuration 26 T i j D 3 l5 your future life SSL IPSec VPN Firewall VI Network Configuration This Network page contains the basic settings For most users completing this general setting is enough for connecting with the Internet However some users need advanced information from their ISP Please refer to the following descriptions for specific configurations 6 1 Network Connection o HostName 586 Required by some ISPs DomanWame hc Required by some ISPs LAN Setting oo or iis Tn flee piss Device IP Address 182 168 1 1 Subnet Mask 255 255 255 0 Multiple Subnet Setting Disabled Unified IP Management Q
143. ion automatically The default time for automatic break off resulting from no packet transmissions is five minutes Keep Alive This function enables the PPPoE dial connection to keep connected and to automatically redial if the line is disconnected It also enables a user to 34 your future life SSL IPSec VPN Firewall set up a time for redialing The default is 30 seconds Enable Line Dropped The WAN disconnection schedule will be activated by checking this Scheduling option In some areas there is a time limitation for WAN connection service For example the optical fiber service will be disconnected from 0 00 am to 6 00 am Although there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby system to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly Scheduling added connections should go through another WAN to connect with the Internet Backup Interface Select another WAN port as link backu
144. ironment User may need to take feasible measures in this condition your future life SSL IPSec VPN Firewall Il Multi WAN Router Installation In this chapter we are going to introduce hardware installation Through the understanding of multi WAN setting process users can easily setup and manage the network making Router functioning and having best performance 2 1 Systematic Setting Process Users can set up and enable the network by utilizing bandwidth efficiently The network can achieve the ideal efficientness block attacks and prevent security risks at the same time Through the process settings users can install and operate Router easily This simplifies the management and maintenance making the user network settings be done at one time The main process is as below 1 Hardware installation 2 Login 3 Verify device specification and set up password and time 4 SetWAN connection 5 Set LAN connection physical port and IP address settings 6 Set QoS bandwidth management avoid bandwidth occupation 7 Set Firewall prevent attack and improper access to network resources 8 Other settings UPnP DDNS MAC Clone 9 Management and maintenance settings Syslog SNMP and configuration backup 10 VPN Virtual Private Network QnoKey QVM SSL VPN function setting 11 Logout 2 2 Setting Flow Chart Below is the description for each setting process and the crospondent contents and purposes For detailed functions please r
145. istic Future Feature cc cccccccsseceeceeeeeeeeeeeeeeseeeeeeseeeeeesseeeeeeseaeeeeees 245 MHOIR PO USUE o ee ee E ee eee ere 247 your future life SSL IPSec VPN Firewall 14 6 QRTG Qno Router Traffic Graphic cece cccccceeeecceeesaeeeceeeeeeeeceeeeeeaeeeeeesseaeceeeesanees 249 ANV Pun m 254 Appendix I User Interface and User Manual Chapter Cross Reference 255 P yu siDi sibMEvIbt inm 259 1 Block BT Download essssseeennmm HI Inm nmm rm mnm mnn hnnemrerne reri rre rrre treni trennen 259 2 Shock Wave and Worm Virus Prevention essesseeseeenm m meme rr nennen 260 3 Block QQLive Video Broadcast Setting cccccccssssscccccececesssseeceeeeeeeesesseceeeeeeseaeeeseceeeeseeseaansses 262 45 ARP Virus Attack PrevenllOHunsscceise eni ezvbaaesdvt ia Civ Deraa ixi na baie alive Redi bd td avi ea tai 264 Appendix III Qno Technical Support Information cce ee ecce eee eee eee eee e eee ee eee eee eese ee eee 273 your future life SSL IPSec VPN Firewall Product Manual Using Permit Agreement Product Manual hereafter the Manual Using Permit Agreement hereafter the Agreement is the using permit of the Manual and the relevant rights and obligations between the users and Qno Technology
146. ith IPSec key which is known as the encryption key The device provides the following two encrypted Key Managements They are Manual and IKE automatic encryption mode IKE with Preshared Key automatic By using the drop down menu select the desired encryption mode as illustrated below 140 GNO your future life SSL IPSec VPN Firewall Encryption Management Protocol When users set this VPN tunnel to use any encryption and authentication mode users must set the parameter of this exchange password with that of the remote Setting methods include Auto IKE or Manual To do the settings select any one from the two options IPSec Setup IKE with Preshared Key v Group 1 DES v 28800 Seconds Group 1 v DES w MD5 3600 Seconds IKE Protocol Click the shared key generated by IKE to encrypt and authenticate the remote user If PFS Perfect Forward Secrecy is enabled the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication When PFS is enabled hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time Perfect Forward Secrecy When users check the PFS option don t forget to activate the PFS function of the VPN device and the VPN Client as well X Phase 1 Phase 2 DH Group This option allows users to sele
147. k function after you have added new authentication servers complete the setup by assigning the All Users group authentication server to the newly created authentication server Note All of the users in this authentication server can link to the web portal and access all of the enterprise resources pre determined by administrators Administrators do not need to define settings for step 2 User management and step 3 Service resources management Group Name Add Hew Group Group Enable Host Check C Enable Host Check Domain Management priis victi nomin er ee ipn tm Default Local DataBase O Qno Active Directory 192 168 1101 Apply User Database 1 9 Customize User Database Step 2 User Management User Management determines who belong to this group and have the right to use the resources Newly added users will appear on the user list click on Assign to this Group column to designate a user to this group If Domain Management is set to Customize User Database and when the user list does not have a suitable user click Add New User to create a new one 176 your future life SSL IPSec VPN Firewall User Management d Sales Add New User Assign to this Group Select a user from the user list to assign to this group One user can be assigned to one group only User Name Display customized user name Please note The built in users of the authentication server database i
148. kmark the limits of users access to resources For example if a company has multiple FTP servers internally and when FTP service is activated then a group s users can connect through the web portal and enter the FTP servers if they want to access If an administrator has not activated FTP service but has only bookmarked one FTP then the group s users can only access the bookmarked FTP Server wy Service Terminal Application E A si My Desktop e My Network Place 3 Virtual Passage Services Intranet Service Web Secure Web Bookmarks 179 Description Name IP Address G FTP Services Add Bookmark X CINCO your future life SSL IPSec VPN Firewall Resource Management Web Secure Web Telnet Configure Bookmark for this Group Permit Customized Bookmark Configure Bookmark for this Group Permit Customized Bookmark mae Besse 0 My Network Place w Virtual Passage Allow the SSL users to access the same subnet but not to transfer the traffic to the router completely users can choose g O The SSL chi transferring the traffic to the router completely O Force the trafic of SSL users to transfer to the router Default values for each built in user groups are shown in the following table Resource name Group All Users Supervisor Mobile User Branch Staff name Internet Services Telnet v SSH v FTP y Y Y v Microsoft Terminal 180 your futu
149. l address to the empty field for E Mail authentication Dynamic IP E mail User FQDN Authentication D le This option allows users to set the local VPN connection access type The following offers a few items for local settings Please select and set appropriate parameters 4 IP address This option allows the only IP address which is entered to build the VPN tunnel IP Address v 192 ee to Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 can establish connection 137 T i j D 3 l5 your future life Remote Group Setup Remote Group Setup SSL IPSec VPN Firewall 5 Subnet This option allows local computers in this subnet to be connected to the VPN tunnel Subnet w nee ee t o less less less o Reference When this VPN tunnel is connected only computers with the session of 192 168 1 0 and with subnet mask as 255 255 255 0 can connect with remote VPN 6 IP Range This option allows connection only when IP address range which is entered after the VPN tunnel is connected Rae i92 168 t o g 294 Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 254 can establish connection IPOny Ww Des IE 1L 0L 1L subnet i TEE i M 255 less 255 uaa This remote gateway authentication ty
150. l connection if users select this option to link to VPN please enter the domain name 5 Dynamic IP E mail Addr USER FQDN Authentication If users use dynamic IP address to connect to the device users may select this option to connect to VPN without entering IP address When VPN Gateway requires for VPN connection the device will start authentication and respond to VPN tunnel connection If users select this option to link to VPN enter E Mail address to the empty field for E Mail authentication Dynamic IP E mail UserFODN Authentication v IL This option allows users to set the local VPN connection access type The following offers a few items for local settings Please select and set appropriate parameters 1 IP address This option allows the only IP address which is entered to build the VPN tunnel IP Address l Ilo ase ise ft o Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 can establish connection 2 Subnet This option allows local computers in this subnet can be connected to the VPN tunnel Subnet v ee tee t Jo less less 25s fo 125 N S x E lt a 8 FE UA M MI mj AM m your future li Remote Group Setup Remote Group Setup IP Address JJ fe SSL IPSec VPN Firewall Reference When this VPN tunnel is connected only computers with the sessio
151. l only be effective to guarantee the traffic in high priorities when the traffic rules match destination IP addresses 3 None The traffic rules neither match traffic rules nor check MAC addresses Choose service port protocols for games videos or other network applications required to be prioritized You can choose TCP UDP or any other protocols listed Input service ports for games videos or other network applications required to be prioritized Range is 1 65535 Activate the rule Add this rule to the list Remove the rules selected from the Service List 99 GINO your future life SSL IPSec VPN Firewall IX Firewall This chapter introduces firewall general policy access rule and content filter settings to ensure network security 9 1 General Policy The firewall is enabled by default If the firewall is set as disabled features such as SPI DoS and outbound packet responses will be turned off automatically Meanwhile the remote management feature will be activated The network access rules and content filter will be turned off General Policy Enabled Disabled Enabled Disabled SEnabled ODisabled Advanced Function Enabled 9 Disabled OEnabled Disabled Por QEnabled Disabled Enabled Disabled Router sends ARF 5 fimes per second Agli Cemeel Firewall This feature allows users to turn on off the firewall SPI Stateful Packet This enables the packet a
152. le Prevent ARP Virus Attack Enter the device IP address to log in the management webpage of the device Enter Firewall gt General and find the option Prevent ARP Virus Attack to the right of the page Click on the option to activate it and click Apply at the bottom of the page see illustrated 266 NS 778 I 477 your future life SSL IPSec VPN Firewall Enabled Disabled 9 Enabled Disabled Enabled Disabled BETIS 9 Enabled Disabled O Enabled 9 Disabled Port Enabled Disabled 9 Enabled Disabled Router sends ARP 20 times per second b Bind the Gateway IP and MAC address for each PC This prevents the ARP from cheating IP and its MAC address First find out the gateway IP and MAC address on the device end LAN Setting 30 Jre Jos Jos foe Default 30 7e 95 99 94 be F fies t 1 m oO 255 j255 255 _ On every PC start or operate cmd to enter the dos operation Enter arp s 192 168 1 1 Oa Of d4 9e fb Ob so as to finish the binding of pcO1 as illustrated Microsoft Windows LER 6 1 7601 Copyright tc 2609 Microsoft Corporation All rights reserved 3 Cowsers Tina Jhen tarp s 192 168 1 1 86 17 16 61 35 cf For other host devices within the network follow the same way to enter the IP and MAC address of the corresponding device to complete the binding work Howe
153. lhy Caneel The advanced settings include Main Mode and Aggressive mode For the Main mode the default setting is set to VPN operation mode The connection is the same to most of the VPN devices Aggressive Mode This mode is mostly adopted by remote devices The IP connection is designed to enhance the security control if dynamic IP is used for connection Use IP Header Compression Protocol If this option is selected in the connected VPN tunnel the device supports IP Payload Compression Protocol Keep Alive If this option is selected VPN tunnel will keep this VPN connection This is mostly used to connect the remote node of the branch office and headquarter or used for the remote dynamic IP address e AHhash calculation For AH Authentication Header users may select MD5 DSHA 1 e NetBIOS Broadcast If this option is selected the connected VPN tunnel allows the passage of NetBIOS broadcast packet This facilitates the easy connection with other Microsoft network however the traffic using this VPN tunnel will increase 143 your future life SSL IPSec VPN Firewall e X Dead Peer Detection DPD If this option is selected the connected VPN tunnel will regularly transmit HELLO ACK message packet to detect whether there is connection between the two ends of the VPN tunnel If one end is disconnected the device will disconnect the tunnel automatically and then create new connection Users can define the tran
154. lick Cancel to leave without making any change 113 your future life SSL IPSec VPN Firewall Website Blocking by Keywords EP Website Blocking by Keywords Enable Website Blocking by Keywords Add Exception IP address iT t a0 10 _ oO to U Rs Add to list Delate selected keywords Enable Website Click to activate this feature The default setting is disabled For example If Blocking by users enter the string sex any websites containing sex will be blocked Keywords Add Enter keywords Only for English keyword Exception IP Input the IP or IP ranges not to be controlled address Add to List Add this new service item content to the list Delete selected item Delete the service item content from the list Apply Click Apply to save the modified parameters Cancel Click Cancel to cancel all the changes made to the parameters Accept Allowed Domains In some companies or schools employees and students are only allowed to access some specific 114 your future life SSL IPSec VPN Firewall websites This is the purpose of the function select Accept Allowed Domains check box you will see below setup windows Block Forbidden Domains Accept Allowed Domains EP Allowed Domains Allowed Domains Enabled Add Add ta list Halata zalactad domain Allowed Domains Enabled Activate the function The default setting is Disabled Add Input the allowed dom
155. lly distribution and congested Users can use only one device to satisfy the demand of Inbound Outbound Load Balance simultaneously Following introduces how to enable and setup Inbound Load Balance step by step Attention In For some models of Qno routers user can try the function for a period but with time limit If the function can match your network demand you can apply for the official version License Key in Qno Official Website www qno com tw After applying auditing paying and inputting License Key successfully users can use the official version without time limit 1 System Tool gt License Key gt Try to enable Inbound Load Balance License Key Current Time 2009 12 09 NTP Server License Key Number S 5 Submit Official Version Registration time Status And Information After enabling Trial version Status and Information column will display the remaining trial time If trial expires the function can not work out at all unless users enter an official License Key 2 Go to Inbound Load Balance in Advanced Function and click Edit to configure 3 Enable Inbound Load Balance 215 N ONO your future life Inbound Load Balance i Enabled Inbound Load Balance ftest com r200 fest itest com SSL IPSec VPN Firewall DNS Server Settings NS Record test com C WAN 1192 68 4 164 C WAN 2 0000 C WAN 3 0000 E WAN 4 0000
156. load balancing function in this WAN network Interface WAM o o WAN Connection Type WAN IP Address Subnet Mask Default Gateway I eo DNSServer Required DNS Server Optional LAN Default Gat y 1 LAN Public IP Range 1 LAN Public IP Range 2 Ihr c LAN Default Gat LAN Public IP Range 1 LAN Public IP Range 2 LAN Default Gatew LAN Public IP Range 1 LAN Public IP Range 2 B p b p p p p p o1 o1 sn AIA CASAL 3D ud Bj pj eJ oj an zo e oj 0 o o e e e to T EnabledLine Dropped Scheduling Line Dropped Period om 0 0 to 24 Hour Format minutes ahead line dropped to start new session transferring Line Dropped Scheduling Backup Interface 40 your future life WAN IP address Subnet mask WAN Default Gateway DNS Servers LAN Default Gateway LAN IP Addresses Range Enable Line Dropped Scheduling Line Dropped Period Line Dropped Scheduling Backup Interface SSL IPSec VPN Firewall Enter the public IP address Enter the public IP address subnet mask Enter the WAN default gateway which provided by your ISP Enter the DNS server IP address you must have to enter a DNS server IP address maximum two DNS servers IP addresses available Enter one of IP addresses that provide by the ISP as your default gateway Enter your IP addresses range which IP addresses are provided by
157. lock this IP s new sessions for minutes block this IP s all sessions for minutes Scheduling n co i I k Apply this rule o0 24 Hour Format Everyday Sun Mon Tue Wed Thu Fri Sat Disabled Disable Session Control function Single IP cannot This option enables the restriction of maximum external sessions to each exceed session Intranet PC When the number of external sessions reaches the limit to allow new sessions to be built some of the existing sessions must be closed For example when BT or P2P is being used to download information and the sessions exceed the limit the user will be unable to connect with other services until either BT or P2P is closed i on block this IP to add new session for NN Minutes If this function is selected when the user s port session reach the limit this user will not be able to make a new session for five minutes Even if the previous session has been closed new sessions cannot be made until the setting time ends Q block this IP s all connection for Is Minutes If this function is selected when the user s port connections reach the limit all the lines that this user is connected with will be removed and the user will not be able to connect with the Internet for five minutes New connections cannot be made until the delay time ends 95 your future life SSL IPSec VPN Firewall Scheduling If Always is selected the rule will be executed around the clock If From
158. m htm Authentication Type Submit Cancel SERA O ES 1004 Authentication Type Select the authentication server type from the drop down menu Domain Names Name the selected authentication server Submit Click on the Submit tab to save changes Cancel Click Cancel to clear any recent changes to the settings 2 Radius PAP gt hitp 192 168 1 17edit sslypn domain htm Windows Internet Ex E O X E http 182 188 1 1 edzt ssbepn domam htm Authentication Type Domain Name Td Radius Server id Secret Password TS Cancel SER O FEAR 100 Authentication Type Select the authentication server type from the drop down menu Domain Names Name the selected authentication server 171 your future life RADIUS Server Secret Password Submit Cancel 3 Radius CHAP SSL IPSec VPN Firewall Enter authentication server address Enter the password for RADIUS Click on the Submit tab to save changes Click Cancel to clear any recent changes to the settings hitp 192 168 1 L edit_sslvpn_domain him Windows Internet Ex a O X E httpl92 1060 1 Ledit_slypn_domem hin Authentication Type Domain Name Radius Server Secret Password submit SERA Authentication Type Domain Names RADIUS Server Secret Password Submit Cancel 4 Radius MSCHAP Radiuz CHAP d Cancel O aas 100 Select the authentication server type from the drop down menu Name the selecte
159. main Name All newly added authentication services will be displayed on the Domain Management list Authentication Type Authentication service types are displayed by authentication server name including Local Database Radius PAP CHAP MSCHAP MSCHAPV2 NT Domain Active Directory and LDAP Authentication Display configured external authentication server IP addresses Server IP Group Display authentication server group names Edit Click on the Edit tab to select an authentication server IP address and edit authentication domain names Delete Click on the clear tab to clear the selected authentication server Add New Domain See 12 3 Group Management 11 5 User Management In addition to selecting 12 3 Group Management to configure group settings SSL VPN can also provide inter group user management On the user management list each authentication server will display all self defined users that can be appointed to groups All User Group Supervisor Mobile User Branch Staff Group Group Group otep One Domain Management Step 2 User Management Step 3 Service Hesource Management 186 your future life SSL IPSec VPN Firewall SSL VPN Status Group Summary Group Management Domain Management Resource Management Link ta partal Advanced Setting User Management es 9 unassigned All Users Supervisor i Local DataBase Mobile User Branch Staff admin Add New User Do
160. main Name Select an authentication server to perform user management on from the drop down menu Authentication Type Displays the name of the authentication server type and also shows default is Local Database User Name Displays authentication server s self defined user names Group Displays which group the user belongs to from here you can modify user groups Edit User passwords if Local Database expiration dates user classifications and inactive timeouts can be edited or modified but user authentication servers and user names cannot If you want to modify a user name first delete it and then add a new user name You can also select an authentication server to edit IP address and domain name Delete Click on the Delete tab to delete selected users Add New User Click on Add New User and then the window below will pop up 187 your future life SSL IPSec VPN Firewall Please note In addition to the local database user names and passwords must correspond to the selected authentication server s user names hitp 192 168 1 1 edit sslvpn user htm Windows Internet E fa X E httpir192 1568 1 1 edit sslepn user htm Domain Name uer tame Expiration Date Gyyy Emm i dd User Type CO Administrator User nativity Timeout m Add to list Iefault 5alesz 22010 D8 08 2230 27 UJzer Iefault admin 2 28 0 Administrator Save Setting Domain Name User Name P
161. mit packet Byte count and error packet count Users may press the refresh button to update all real time messages 70 X CINCO your future life SSL IPSec VPN Firewall 7 3 IP DHCP With an embedded DHCP server it supports automatic IP assignation for LAN computers This function is similar to the DHCP service in NT servers It benefits users by freeing them from the inconvenience of recording and configuring IP addresses for each PC respectively When a computer is turned on it will acquire an IP address from the device automatically This function is to make management easier Enabled DHCP Server DHCP Dynamic IP Client Lease Time Minutes Subnett Subnet Subnet3 Subnet Enabled Disabled Disabled Disabled 192 168 1 100 192 158 2 100 182 158 3 100 192 168 4 100 192 166 1 149 192 168 2 149 192 166 3 149 192 168 4149 Fool Table Pool Table Fool Table Fool Table Unified IP Management 71 your future life SSL IPSec VPN Firewall Dynamic IP Client lease Time This is to set up a lease time for the IP address which is acquired by a PC The default is 1440 minutes a day Client PC will acquire again after the lease time is expiration Users can change it according to their needs The time unit is minute Range Start This is to set up a lease time for the IP address which is acquired by a PC The default is 1440 minutes a day Users can change it according to their needs The time unit
162. mputer whose name is host mydomain com A record It provides WWW and Mail services concurrently Administrator can configure as two CNAME WWW and Mail They are www mydomain com and mail mydomain com They are both orientated to host mydomain com You can also assign several domain names to the same IP address One of the domains will be A record corresponding server IP and the others will be alias of A record domain If you change your server IP you don t have to modify every domain one by one Just changing A record domain and the other domains will be assigned to new IP address automatically Alias Record CName Record ns tare 0000 PO testcom pO testcom test com test com testcom testcom testcom testcom Alias Input Alias Record corresponding to A Record Input the existed A Record domain name 9 Mail Server Add or modify mail server record MX Record is directed to a mail server It orientates to a mail server according to the domain name of an E mail address For example someone on internet sends a mail to user myhomain com The mail server will search MX Record of mydomain com through DNS If the MX Record exists sender PC will send mails to the mail server assigned by MX Record 220 your future life SSL IPSec VPN Firewall Mail Server MX Record MetName Weight Malt Server o PO m test com PO mm testcom Poll Display the host name
163. n Domain Management will not display on the user list Edit User passwords if Local Database expiration dates user classifications and inactive timeouts can be edited or modified but user authentication servers and user names cannot If you want to modify a user name first delete it and then add a new modified user name Delete Delete this user Add New User Click on Add new user and the window below will pop up Please note In addition to Local Database user names and passwords must correspond to the selected authentication server s user names 177 your future life http 7 192 168 1 edit sslvpn user htm Windows Internet E 0 E httpir192 1568 1 1 edit sslvpn user htn SSL IPSec VPN Firewall Domain Name User Name Password Expiration Date User Type Inactivity Timeout SS Administrator User B mn Add to list Iefault 5alesz 22010 8 082230 22Uzer Iefault admin 2 280 Administrataor Domain Name User Name Password Expiration Date yyyy mm dd User Type Display the authentication server name used by this group Enter authentication server s user name For Local Database enter user passwords Passwords do not need to be entered if Local Database is not used Enter users permitted time limit For example if the expiration date is set to November 1 2007 then the user will be denied beginning on November 2 2007 at 12 00 AM If
164. n IP address bytes per second and percentage 243 ONO your future life SSL IPSec VPN Firewall Traffic Statistic Outbound IF Service Ww Enable Traffic Statistic TCR ssh 22 423 03 TCP http 80 22 4 UDP dns 53 g E Reine By Inbound Session The figure displays the source IP address network protocol type source port destination IP address destination port bytes per second and percentage Traffic Statistic LE EE Enable Traffic Statistic 59 105 115 196 TCP 80 422 116 174 226 1924 53 182 168 1211 TCP 22 58 215 87 207 358600 z 20 192 168 1 211 TCP 22 58 215 87 207 33049 86 13 192 168 1 211 TCP 22 58 215 87 207 37342 4 7 192 168 1 211 UDP 32789 192 168 5 21 53 28 4 Retesh By Outbound Session The figure displays the source IP address network protocol type source port destination IP address destination port bytes per second and percentage 244 GNO your future life SSL IPSec VPN Firewall Traffic Statistic Outbound IF Session Enable Traffic Statistic 192 168 1 211 TCP 22 58 215 87 207 50521 121 58 59 105 115 196 TGP a0 122 116 174 226 1824 41 20 192 168 1211 TCP 22 58 215 87 207 52821 of 13 192 166 1211 UDP 32789 1982 158 5 21 53 18 f Ratesh 14 4 Connection Statistic Future Feature Connection Statistic function is used to record the numbers of network connections including outbound sessions and intranet users PC It als
165. n of 192 168 1 0 and with subnet mask as 255 255 255 0 can connect with remote VPN 3 IP Range This option allows connection only when IP address range which is entered after the VPN tunnel is connected iG Range v 192 168 0 tg 254 Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 254 can establish connection fh 255 255 J o This remote gateway authentication type Remote Security Gateway Type must be identical to the remotely connected local security gateway authentication type Local Security Gateway Type Remote Security Gateway his remote gateway authentication type comes with five operation Type modes which are IP only Authentication by use of IP only IP Domain Name FQDN Authentication IP Domain name IP E mail Addr USER FQDN Authentication IP Email address Dynamic IP Domain Name FQDN Authentication Dynamic IP address Domain name Dynamic IP E mail Addr USER FQDN Authentication Dynamic IP address Email address name 1 IP only 126 your future life SSL IPSec VPN Firewall If users select the IP Only type entering this IP allows users to gain access to this tunnel P Only _ A IP Address me If the IP address of the remote client is unknown choose IP by DNS Resolved allowing DNS to translate IP address When users finish the setting the corresponding
166. n private IP and public IP which can allow multi user to connect the internet with one public IP at the same time LAN IP supports four Class C connections and DHCP server is also supported as well as an easy configuration of IP MAC binding function allowing network structure to be flexible and easy to deployed and managed In addition SSL IPSec VPN Router also supports virtual routing function One WAN branch can be upgraded to dual WAN transmit ion easily Enterprise with one WAN can connect to dual WAN center by easy configuration and traffic will pass through other WAN lines from the center network This can also accelerate the connections among different areas to solve the connection bottleneck problem For SSL VPN client only need a web browser to access to Central servers Passing the ID and you get the portal to the company s internal resources such as Internet services Microsoft terminal services remote desktop services online neighborhood networks and secure tunnel functions Meanwhile different users or groups can access to different interfaces according to the web administrator s configurations which satisfies external and mobile users security requirements Qno is a supporter of the IPSec Protocol IPSec VPN provides DES 3DES AES 128 encryption MD5 SH1 certification IKE Pre Share Key or manual password interchange SSL IPSec VPN Router also supports aggressive mode When a connection is lost SSL IPSec VPN Rou
167. na O wana L wan4 9 Do not control u pstream bandwidth Q Do not control downstream bandwidth Do not control bi direction bandwidth Enabled Add to list Halata selected itam 93 your future life SSL IPSec VPN Firewall WAN Select WAN ports Source IP Enter the exempted IP range or select the exempted IP group Do not control Select do not control upload download or both of them Direction Enabled Enable this policy Add to List Add this policy into the exempted list Delete Selected Delete selected list item Apply Click Apply button to saving configuration Cancel Click Cancel button to reject modification 8 2 Session control oession management controls the acceptable maximum simultaneous sessions of Intranet PCs This function is very useful for managing connection quantity when P2P software such as BT Thunder or emule is used in the Intranet causing large numbers of sessions Setting up proper limitations on sessions can effectively control the sessions created by P2P software It will also have a limiting effect on bandwidth usage In addition if any Intranet PC is attacked by a virus like Worm Blaster and sends a huge number of session requests session control will restrict that as well Session Control and Scheduling 94 your future life SSL IPSec VPN Firewall Session Control 9 Disabled Single IP cannot exceed session When single IP exceed Session b
168. ned settings will be displayed on Domain Management list You are required to choose one authentication server to be assigned to this group Each group can only be assigned to one type of authentication server Default is Local Database If there are changes to the domain servers designated by All Users other groups that have yet to enable will also be modified accordingly Domain Names Display all authentication server names Authentication Type Display authentication server type Authentication server IP Display external authentication server IP addresses If the Authentication Type is Local Database the authentication server IP address will not be displayed 169 your future life User Database Edit Delete SSL IPSec VPN Firewall For external authentication servers the user database will be Apply User Database and Customize User Database Click Apply User database then there is no need to establish additional user data and the system will directly apply the external authentication server s internal user database settings As long as the users belong to this authentication server group they can use the group s resources Note If multiple groups designate the same authentication server for users only one group will be able to use the built in user database at one time For this reason it is recommended that the largest group be designated to use the built in user database and other smaller groups use the Customiz
169. nel will regularly transmit HELLO ACK message packet to detect whether there is connection between the two ends of the VPN tunnel If one end is disconnected the device will disconnect the tunnel automatically and then create new connection Users can define the transmission time for each DPD message packet and the default value is 10 seconds 134 your future life SSL IPSec VPN Firewall 10 1 2 2 Client to Gateway Setting The following describes how an administrator builds a VPN tunnel between devices Users can set this VPN tunnel to be used by one client or by a group of clients Group VPN at the client end If it is used by a group of clients the individual setting for remote clients can be reduced Only one tunnel will be set and used by a group of clients which allows easy setting Situation in Tunnel 9 Tunnel VPN Group WAN 1 v Tunnel No Set the embedded VPN feature please select the Tunnel number Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid confusion Tunnel Name Note If this tunnel is to be connected to the other VPN device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can thus be successfully enabled Interface Users may select which port to be the node for this VPN channel They can be applied for VPN connections Enabled Click
170. ng CPU and system resources Hardware optimization will soeed up the router processing carry huge connection sessions and PCs and provide stable and excellent network environment Service Optimization Service ports that online games and video softwares will be the highest priority Router can process these games or videos traffic in first priority In this way users can play games or watch videos fluently without disconnection even when the traffic is full IPv4 NonJP MAC Address IP Address IP Protocol Action Rate Control V Enable Add to list Deletes selected Entey MAC address Pull down menus includes 98 your future life IP address IP Protocol Action Enable Add to list Delete selected entry SSL IPSec VPN Firewall 1 Source MAC address Hardware optimization will only be effective to guarantee the traffic in high priorities when the traffic rules match source MAC addresses 2 Destination MAC address Hardware optimization will only be effective to guarantee the traffic in high priorities when the traffic rules match destination MAC addresses 3 None The traffic rules neither match traffic rules nor check MAC addresses Pull down menus includes 1 Source IP address Hardware optimization will only be effective to guarantee the traffic in high priorities when the traffic rules match source IP addresses 2 Destination IP address Hardware optimization wil
171. nt that network administrators pay special attention to this problem rather than overlooking the issue It is suggested that the above measures can be adopted to prevent ARP attack reduce the damage enhance the work efficiency and minimize economic loss 212 your future life SSL IPSec VPN Firewall Appendix Ill Qno Technical Support Information For more information about the Qno s product and technology please log onto the Qno s bandwidth forum refer to the examples of the FTP server or contact the technical department of Qno s dealers as well as the Qno s Mainland technical center Qno Official Website http www Qno com tw Dealer Contact Users may log on to the service webpage to check the contacts of dealers http www qno com tw web where_buy asp Taiwan Support Center E mail QnoFAE qno com tw 273
172. ny clients are bothered by the same problem When several users apply QQLive Video broadcast software a greater share of the bandwidth is occupied thus overloading the device Therefore the device responds more slowly or is paralyzed If the login onto the QQLive Server is blocked the issue can be resolved The following relates to Qno products and provides users with solutions by introducing users how to set up the device a Log into the device web based UI and enter Firewall gt Access Rule Q Access Rule Deny v All Traffic TCP amp UDP 65535 Single v zt 1a ms us Q Scheduling Apply this rule Always v kl to E kl 24 Hour Format Everyday Sun Mon Tue Wed Thu Fri Sat Beck C Apy Cancel b Click Add New Rule under Access Rule page Select Deny in Action under the Service rule setting followed by the selection of All Traffic TCP amp UDP 1 65535 from the service and select Any for Interface Any for source IP address users with relevant needs may select either Single or Range to block any QQLive login by using one single IP or IP range followed by the selection of Single of the Dest IP and enter the IP address as 121 14 75 155 for the QQLive Server note that there are more than one IP address for QQLive server Repeated addition may be needed Lastly select Always under the Scheduling setting so that th
173. o displays the user connection sessions Connection Statistic Iv Enabled 1 24 LAN PC Data Ordering By IP Address up to down Jump to 1 1Page 10 entries per page 192 168 8 100 QnoPM01 24 Retresh Enable When enabling Connection Statistic function parts of system efficiency will be influenced Therefore the system will remind you the influence when you enable this function PC there are currently Display current PC amounts having outbound traffic connections If the PC does not boot up or is not connected to internet it will not be counted in the 245 your future life LAN PC Data Ordering By Jump to Page Entries per page SSL IPSec VPN Firewall statistic Select this function to sort the data by IP Address up to down IP Address down to up Session down to up and Session up to down Select this function to display the data by how many entries of data per page will be displayed Also you can select the page you would like to see from the drop down menu Data List field IP Address IP Port Statistic lv Enabled Display PC s IP address which has outbound traffic Also you can click the IP hyperlink to display the current connection statistic and details As the following graph Search Type IP Address IP Address i92 figs fe foo Search 192 168 8 100 TCP 50143 192 168 8 100 TCP 51877 192 168 8 100 TCP 5
174. o import the file Export Configuration File This feature allows users to backup all parameter settings Click Export and select the location to save the config exp file Export Configuration File This feature allows users to backup IP amp MAC binding QoS and Protocol Binding setting rules You can separately export the rules or import these rules from Import Configuration File above 13 4 SNMP Simple Network Management Protocol SNMP refers to network management communications protocol and it is also an important network management item Through this SNMP communications protocol programs with network management i e SNMP Tools HP Open View can help communications of real time management The device supports standard SNMP v1 v2c and is consistent with SNMP network management software so as to get hold on to the operation of the online devices and the real time network information Q SNMP Setup SNMP Setup Enabled 226 your future life SSL IPSec VPN Firewall evened Activate SNMP feature The default is activated System Name Set the name of the device such as Qno System Contact Set the name of the person who manages the device i e John System Location Define the location of the device i e Taipei Get Community Name Set the name of the group or community that can view the device SNMP data The default setting is Public Set Community Name Set the name of the group or community that can rec
175. oKey there are three options for selection Do Nothing Clear Key and Lock Key Setting this feature on QnoKey can enhance VPN security Select Do Nothing to do no change after the Key is lost Select Clear Key to clean up the QnoKey settings when the VPN connection is established again after the QnoKey is lost Select Block Key to block the VPN connection after the QnoKey is lost Press Apply to confirm the group settings and press Cancel to cancel the setting Press Back to return the previous page Pressing Apply to display a dialog box in which it will ask if users want to continue to add new setting group Click Ok to add another group setting or Cancel to return to the QnoKey Summary page It is illustrated as below Windows Internet Explorer 2 settings are successful Press Ok to add another SB Eey Group or press Cancel to retur to the page of USB Eey 5 Status ALA On the QnoKey Summary page the defined group will be displayed which is illustrated as below 156 ONO your future life SSL IPSec VPN Firewall QnokKey Client Table Jumpto 1 4 1 1Page 5 vw entries per page senes When a new rule is created Show List and Edit button will be displayed behind the rule Click on Show List to show the list of users applying this group rule Click Edit to change settings Click the trash canicon ll to delete this setting 10 2 3 Qnokey Account List Cli
176. option is to control the upload bandwidth for the connections from outside to this Server For example game servers have been built in many Internet caf s This rule can be used to control the bandwidth for connections from outside to the game server of a caf to update data In this way game players inside the caf will not be affected Min amp Max Rate The minimum bandwidth The rule is to guarantee minimum available Kbit Sec bandwidth The maximum bandwidth This rule is to restrict maximum available bandwidth The maximum bandwidth will not exceed the limit set up under this rule Attention The unit of calculation used in this rule is Kbit Some software indicates download upload speed by the unit KB 1KB 8Kbit Bandwidth Sharing total bandwidth with all IP addresses If this option is selected all Sharing IP addresses or Service Ports will share the bandwidth range from minimum to maximum bandwidth Assign bandwidth for each IP address If this option is selected every IP or Service Port in this range can have this bandwidth minimum to maximum For example If the rule is set for the IP of each PC the IP of each PC will have the same bandwidth Note If Share Bandwidth is selected be aware of the actual usage conditions and 89 gt your future life SSL IPSec VPN Firewall avoid an improper configuration that might cause a malfunction of the network when the bandwidth is too small For exam
177. ort as link backup when port binding is configured Users should select the port that employs the same ISP After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes PPPoE This option is for an ADSL virtual dial up connection suitable for ADSL PPPoE Input the user 33 your future life SSL IPSec VPN Firewall connection name and password issued by ISP Then use the PPP Over Ethernet software built into the device to connect with the Internet If the PC has been installed with the PPPoE dialing software provided by ISP remove it This software will no longer be used for network connection Interface WAND O WAN Connection Type UserName fo Password fs Connect on Demand Max Idle Time Min Keep Alive Redial Period Sec EnabledLine Dropped Scheduling Line Dropped Period from o o to p o 24 Hour Format Line Dropped Scheduling minutes ahead line dropped to start new session ne Dropped Schi transferring Backup Interface User Name Input the user name issued by ISP Password Input the password issued by ISP Connect on Demand This function enables the auto dialing function to be used in a PPPoE dial connection When the client port attempts to connect with the Internet the device will automatically make a dial connection If the line has been idle for a period of time the system will break the connect
178. ost that users want to activate such as All TCP amp UDP 0 65535 80 80 80 for WWW and 21 21 for FTP Please refer to the list of default service ports IP Address Input the virtual host IP address Enable Activate this function Service Port Add or remove service ports from the list of service ports Management Add to list Add to the active service content Service Port Management The services in the list mentioned above are frequently used services If the service users want to activate is not in the list we recommend that users use Service Port Management to add or remove ports as follows 202 N your future life SSL IPSec VPN Firewall Service Name Protocol TOP w Port Range POPS TCP 110 110 SNMP UDP 161 161 SMTP TCP 25 25 X P z25 2 TELNET TCP 23 TELNET Secondary Add to list Service Name Input the name of the service port users want to activate on the list such as E donkey etc Protocol To select whether a service port is TCP or UDP Port Range To activate this function input the range of the service port locations users want to activate such as 500 500 or 2300 2310 etc Add to list Add the service to the service list Delete selected item To remove the selected services Apply Click the Apply button to save the modification Cancel Click the Cancel button to cancel the modification This only works before Apply is clicked
179. outer web based UI will be shown Select the language on the upper right corner of the webpage The language chosen will be in blue Please select English as below English 3 17 your future life SSL IPSec VPN Firewall V Device Spec Verification Status Display and Login Password and Time Setting This chapter introduces the device specification and status after login as well as change password and system time settings for security 5 1 Home Page In the Home page all 5 1 1 WAN Status Q WAN Status IP Address Default Gateway DNS Server Session Downstream Bandwidth Router parameters and status are listed for users reference Me un TT IP Address 0 0 0 0 192 168 4154 0 0 0 0 0 00 0 Default Gateway 0 0 0 0 182 168 4 1 0 0 0 0 0 0 0 0 DNS 0 0 0 0 182 168 5 120 0 0 0 0 0 0 0 0 Dyndns Disabled Dyndns Disabled Dyndns Disabled Dyndns Disabled 3322 Disabled 3322 Disabled 3322 Disabled 3322 Disabled Qnoddns Disabled Qnoddns Disabled Qnoddns Disabled Qnoddns Disabled BE D rules set rules set rules set D rules set elses uices puces Reis Indicates the current IP configuration for WAN port Indicates current WAN gateway IP address from ISP Indicates the current DNS IP configuration Indicates the current session number for each WAN in Router Indicates the current downstream bandwidth usage for each 18 your future life SSL IPSec VPN Firewall Usage WAN Upstream
180. ow 9 Destination Auto Binding User Define Dis or Port Auto Binding Port Add to list Destination Auto Binding Indicates that the session will be connected with the same WAN IP when the destination IP is in the same Class B range For example there are WAN1 1 200 10 10 1 and WAN2 200 10 10 2 and two intranet IP addresses When 192 168 1 100 visits Internet 61 222 81 100 for the first time the connection is through WAN1 200 10 10 1 If the next destination is to 61 222 81 101 in the same Class B range the connection will also be through WAN 1 200 10 10 1 If the destination is to other IP not in the same Class B range as 61 222 81 100 the session will be distributed in the original session balance mechanism 51 your future life SSL IPSec VPN Firewall When the other intranet IP 192 168 1 101 visits 61 222 81 101 for the first time the connection is through WAN2 200 10 10 2 If the next destination is to 61 222 81 100 in the same Class B range the connection will also be through WAN2 200 10 10 2 If the destination is to other IP not in the same Class B range as 61 222 81 100 the session will be distributed in the original session balance mechanism Note Not all intranet IP will visit the same Class B range with the same WAN IP It depends on which WAN the first connection goes to If the destination IP is in the same Class B range the connection will go through with the same WAN IP based on t
181. p when port binding is configured Users should select the port that employs the same ISP After the changes are completed click Apply to save the configuration or click Cancel to leave without making any change PPTP This option is for the PPTP time counting system Input the user s connection name and password issued by ISP and use the built in PPTP software to connect with the Internet 35 your future life SSL IPSec VPN Firewall Interface WAND o WAN Connection Type WAN IP Address Subnet Mask Default Gateway KUWE AEC HUE E UserName Password Connect on Demand Max Idle Time Min Keep Alive Redial Period Sec EnabledLine Dropped Scheduling Line Dropped Period from 0 0 to 1 0 24 HourFormat Line Dropped Scheduling minutes ahead line dropped to start new session ae transferring Backup Interface disab WAN IP Address This option is to configure a static IP address The IP address to be configured could be one issued by ISP The IP address is usually provided by the ISP when the PC is installed Contact ISP for relevant information Subnet Mask Input the subnet mask of the static IP address issued by ISP such as Issued eight static IP addresses 255 255 255 248 Issued 16 static IP addresses 255 255 255 240 Default Gateway Input the default gateway of the static IP address issued by ISP For ADSL Address users it is usually an ATU R IP addr
182. pe Remote Security Gateway Type must be identical to the remotely connected local security gateway authentication type Local Security Gateway Type Remote Security Gateway his local gateway authentication type comes with five operation Type modes which are IP only IP Domain Name FQDN Authentication IP E mail Addr USER FQDN Authentication Dynamic IP Domain Name FQDN Authentication Dynamic IP E mail Addr USER FQDN Authentication 138 your future life SSL IPSec VPN Firewall 1 IP only If users decide to use IP only entering the IP address is the only way to gain access to this tunnel The WAN IP address will be automatically filled into this space Users don t need to do further settings P Only 2 IP Domain Name FQDN Authentication If users select IP domain name type please enter the domain name and IP address The WAN IP address will be automatically filled into this space Users don t need to do further settings FQDN refers to the combination of host name and domain name and can be retrieved from the Internet i e vpn server com This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection IP Domain Name FQDN Authentication i Ree R m 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail enter the IP address and E mail address to gain ac
183. ple if users do not want an FTP to occupy too much bandwidth users can select the Share Bandwidth Mode so that no matter how much users use FTPs to download information the total occupied bandwidth is fixed Enabled Activate the rule Add to list Add this rule to the list Move up amp down QoS rules will be executed from the bottom of the list to the top of the list In other words the lower down the list the higher the priority of execution Users can arrange the sequence according to their priorities Usually the service ports which need to be restricted such as BT e mule etc will be moved to the bottom of the list The rules for certain IP addresses would then be moved upward Delete selected Remove the rules selected from the Service List items Show Table Display all the Rate Control Rules users made for the bandwidth Click Edit to modify Apply Click Apply to save the configuration Cancel Click Cancel to leave without making any change Show Table Click Show Table button you can get a window as below You can select Rule to display rules or select Interface to display rules Click update can re flash window Click Close can close this window You can also click Edit to modify parameters Rue O Interface 90 your future life 8 1 3 Smart QoS SSL IPSec VPN Firewall With Smart QoS you can reach the traffic management without setup IP addresses in the traffic management rule
184. pstream limit downstream limit and second penalty information 8 1 4 Bandwidth Management Scheduling You can use Time Schemer function to deploy difference traffic management scripts in difference time so that we can use maximum bandwidth efficiency F Enable Bandwidth Management Scheduling Schedule Military Time Scale Beside Schedule 2 0 Enabie trom 00 foo heo o Disable w Bandwidth Management isabls 2 Enabe from o o oo oo Disable v Bandwidth Management Disable Enable Bandwidth Management Enable Bandwidth Management Scheduling Scheduling Date From Sunday to Saturday Schedule We have three time ranges can setup in one day and the clock formula is 24H If you select All day in the first time range then others time range will blank and unable to setup The time ranges can t overlap We have shutdown QoS and Smart QoS methods can be used 92 your future life SSL IPSec VPN Firewall Beside schedule Other unspecified time we still can deploy shutdown QoS or Smart QoS methods for traffic management Apply Click Apply button to saving configuration Cancel Click Cancel button to reject modification Close Click Close button to leaving this configuration page without saving 8 1 5 Exception IP address If some users are allowed to avoid traffic management control you can use this function to fulfill the requirement Q Exception IP address C wand O wa
185. puters in this subnet can be connected to the VPN tunnel Suns Bi nez hee RH o 255 pss ese o Reference When this VPN tunnel is connected only computers with the session of 192 168 1 0 and with subnet mask as 255 255 255 0 can connect with remote VPN 9 IP Range This option allows connection only when IP address range which is entered after the VPN tunnel is connected IP Range 1 v me tee i 0 o 254 Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 254 can establish connection Remote Group Setup Remote Group Setup Remote Security Client Type Domain Name FQDN v Remote Security client his setting offers three operation modes which are Type Domain Name FQDN E mail Address USER FQDN 145 your future life IPSec Setup SSL IPSec VPN Firewall Microsoft XP 2000 VPN Client 1 Domain Name FQDN If users select Domain Name type please enter the domain name to be authenticated FQDN refers to the combination of host name and domain name that are available on the Internet i e vpn Server com The domain name must be identical to the status setting of the client end to establish successful connection 2 E mail Addr USER FQDN If users select this option only filling in the E mail address allows access to this tunnel Remote Security Client Type E mal USER FQDN 00 o Emk le
186. r USER FQDN Authentication If users use dynamic IP address to connect with the device users may select this type to link to VPN When the remote VPN gateway requires connection to facilitate VPN connection the device will start authentication and respond to the VPN tunnel connection Please enter the E Mail to the empty space Oran smi KD utet w 129 your future life SSL IPSec VPN Firewall Remote Security Group This option allows users to set the remote VPN connection access type The following offers a few items for remote settings Please Type select and set appropriate parameters 1 IP address This option allows the only IP address which is entered to build the VPN tunnel P Address v Reference When this VPN tunnel is connected computers with the IP address of 192 168 2 1 can establish connection 2 Subnet This option allows local computers in this subnet can be connected to the VPN tunnel Reference When this VPN tunnel is connected only computers with the session of 192 168 2 0 and with subnet mask as 255 255 255 0 can connect with remote VPN 3 IP Address Range This option allows connection only when IP address range which is entered after the VPN tunnel is connected IP Range v 192 168 P lt tg 25 Reference When this VPN channel is connected computers with the IP address range between 192 168 2 1 and 192 168 1 254 can establish
187. r each IP address Enabled Delete selected item Select on which WAN the QoS rule should be executed It can be a single selection or multiple selections Select what bandwidth control is to be configured in the QoS rule If the bandwidth for all services of each IP is to be controlled select All TCP amp UDP 1765535 If only FTP uploads or downloads need to be controlled select FTP Port 21 21 Refer to the Default Service Port Number List This is to select which user is to be controlled If only a single IP is to be restricted input this IP address such as 192 168 1 100 to 100 The rule will control only the IP 192 168 1 100 If an IP range is to be controlled input the range such as 192 168 1 100 150 The rule will control IP addresses from 192 168 1 100 to 150 If all Intranet users that connect with the device are to 88 your future life SSL IPSec VPN Firewall be controlled input 0 in the boxes of IP address This means all Intranet IP addresses will be restricted QoS can also control the range of Class B Direction Upstream Means the upload bandwidth for Intranet IP Downstream Means the download bandwidth for Intranet IP server in LAN Upstream If a Server for external connection has been built in the device this option is to control the bandwidth for the traffic coming from outside to this Server server in LAN Downstream If there are web sites built in the Intranet this
188. rd and authentication mechanism during the VPN tunnel connection This exchange password can be made up of up to 30 characters Manual Mode Future Feature IPSec Setup Manual v If the Manual mode is selected users need to set encryption key manually without negotiation e It is divided into two types Encryption KEY and Authentication KEY Users may enter an exchange password made up of either digits or characters The systems will automatically translate what users entered into the exchange password and authentication mechanism during the VPN tunnel connection This exchange password can be made up of digits and characters 142 your future life SSL IPSec VPN Firewall up to 23 e Moreover the exchange strings for Incoming SPI and Outgoing SPI must be identical to those of the connected VPN device For the Incoming SPI parameters users must set it the same with the Outgoing SPI string of the remote VPN device And the Outgoing SPI string must be the same with the incoming SPI string of the remote VPN device Advanced Setting for IKE Preshareed Key Only Q Advanced ges LL Aggressive Mode Compress Support IP Payload Compression Protocol IP Comp Keep Alive AH Hash Algorithm MDS Allow NetBIOS Broadcast Pass Through NAT Traversal Dead Peer Detection DPD Interval 1 seconds Ew Be DP aaa Allow specific boardcast packet Pass throuah Service Port Management Avara
189. re life SSL IPSec VPN Firewall Services Word v v v Excel v v v Power Point v v v Access v v v Outlook v v v IE v FrontPage v ERP v v v v Remote Desktop RDP5 v v VNC v My Network Place v d v v Virtual Passage Configure Bookmark for this Group Services Telnet SSH FTP and remote desktop services RDP5 VNC can use group established bookmarks Users are not required to remember or set a server name or IP address Q Resource Management Web Secure Web v Telnet SSH FTP Configure Bookmark for this Group Permit Customized Bookmark RDP5 VNC Administrators can see all configured bookmarks here which will display on a user web portal Users are not required to remember or set a server name or IP address they can click to use the administrator pre configured resources 181 N CINCO your future life SSL IPSec VPN Firewall Services Intranet Service Terminal Application Secure Web Telnet FTP 2n My Desktop Bookmarks e My Network Place Description Name IP Address Services FTP 192 168 5 163 HTTP Edit ffi Add Bookmark Virtual Passage Bookmark configured for this group http 192 168 1 1Jedit conbookmark htm 0wner AIl Users amp E E http 192 158 1 1 edit conbookmark htm ownerzAT S201 se rs amp bookmarktrpe group j Add to list Bookmark Name Enter the service resource name this name will appear on the user s web port
190. rity to deliver the packet The default value is Normal This feature allows users to select the network hardware connection speed for the Ethernet port The options are 10Mbps and 100Mbps This feature allows users to select the network hardware connection speed 68 your future life Auto Neg VLAN VLAN All SSL IPSec VPN Firewall working mode for the Ethernet The options are full duplex and half duplex The Auto Negotiation mode can enable each port to automatically adjust and gather the connection speed and duplex mode Therefore if Enabled Auto Neg selected the ports setup will be done without any manual setting by administrators This feature allows administrators to set the LAN port to be one or more disconnected network sessions All of them will be able to log on to the Internet through the device Members in the same network session within the same VLAN can see and communicate with each other Members in different VLAN will not know the existence of other members Set VLAN All port to be the public area of VLAN so that it can be connected to other VLAN networks A server should be constructed for the intranet so that all VLAN group can visit this server Set one of the network ports as VLAN All Connect the server to VLAN All so that computers of different VLAN groups can be connected to this server Moreover the port where the administrator locates must be set as VLAN All so that it can be conne
191. rtual Metweork Computing My Network Place Virtual Passage Click the recycle bin icon to delete a group Display whether the group configuration is Enabled or Disabled Defaults for the All Users group are Enabled and for others are Disabled Click the Add New Group tab entering the group admin section to add a new group 11 3 Group Management Group Management helps the web administrator organize users access to internal service resources in groups It can be configured by following 3 steps Domain Management User management and Service Resource management In addition SSL VPN s unique One Click makes your basic configurations fast 166 ONO your future life SSL IPSec VPN Firewall Group Name All Users na Add Hew Group Group Enable Host Check C Enable Host Check Domain Management Add New Domain User Management Add Hew User Resource Management Configure Bookmark for this Group Permit Customized Bookmark Configure Bookmark for this Group Permit Customized Bookmark Virtual Passage Allow the SSL users to access the same subnet but nat to transfer the traffic to the router completely m The SSL users can choose transferring the traffic to the router completely Q Force the traffic of SSL users to transfer to the router completely your future life SSL IPSec VPN Firewall Group Name Group Name
192. se SSL VPN uses a standard built in web browser SSL HTTPS secure transmission mechanism there are no required installations or settings for clients Clients can access remote data via a web browser such as IE or Netscape This simple setup requires no client software costs less and is highly adaptable with other networks Administrators can also use the same ID for user ID authentication mechanism network access and classification management This prevents enterprise information s complete transparency and provides an increasing level of security safeguards SSL VPN Group Summary Group Management Domain Management User Management Resource Management Link to portal Advanced Setting 11 1 Status Block Status shows current SSL VPN users online status Status Tunnel 5 Used t l Tunnel s Available admin 192 168 1 100 Sat Jan 1 08 00 46 2000 Administrator 164 your future life SSL IPSec VPN Firewall Tunnel s Used Tunnel s Available User Group IP Login Time User Type Logout 11 2 Group Summary Display the amount of previously set tunnels Display the amount of unused tunnels Display the current SSL tunnel user name Display the name of current SSL tunnel using Group Display current users SSL tunnel remote IP addresses Display current SSL tunnel users login time Display whether the user is an administrator or a staff Logout when clicking on the icon Group Summ
193. set to Administrator the user will login on the router management Ul If set to U user the user will login on the web portal Please note Only Local Database users can be set as Administrator external authentication server users can only be Users and cannot login on the router management UI 178 your future life Inactive timeout Add to List Save Setting Cancel Exit SSL IPSec VPN Firewall Even though a user has logged in via the web portal he she will be forced to logout timeout due to inactivity after 10 minutes If a user logs into the web portal to access enterprise resources using a SSL in an unsafe environment a shorter timeout time is recommended to mitigate risk if the user is logged in but inactive After completing the above settings click on add to list to add newly created user settings to the corresponding list After complete settings click on the Save Setting tab to save Click on the Cancel tab to cancel all unsaved settings Click on the Exit tab to close the add new user window Step 3 Service Resource Management Service resource management settings determine which enterprise resources a group s users can use The checked resources will be the icons which are available to the users after they have logged on to the web portal If users are not allowed to enter resource addresses or names administrators can opt to not activate that resource and boo
194. setting for the local group Remote Client Displays the name of this group for remote VPN Connection secure group setting Remote Client Status Click on Detail List and more information such as Group Name IP address and the connection time will be displayed Control Click Connect to verify the status of the tunnel The test result will be updated in this status Config As illustrated below configurations include Edit and Delete icon Click on Edit to enter the setting items to be changed Click on the trash bin icon i and all the tunnel settings will be deleted 10 1 2 Add a New VPN Tunnel The device supports Gateway to Gateway tunnel or Client to Gateway tunnel The VPN tunnel connections are done by 2 VPN devices via the Internet When a new tunnel is added the setting page for Gateway to Gateway or Client to Gateway will be displayed Gateway to Gateway Click Add to enter the setting page of Gateway to Gateway Gateway to Gateway REMOTE VPN Device Gateway to Gateway VPN Device 121 Y CINCO your future life SSL IPSec VPN Firewall Client to Gateway Click Add to enter the setting page of Client to Gateway Client to Gateway CLIENT Mobile Users E t LOCAL Client to Gateway VPN Device 122 GINO your future life SSL IPSec VPN Firewall 10 1 2 1 Gateway to Gateway Setting The following instructions will guide users to set a VPN tunnel between two
195. settings include Main Mode and Aggressive mode For the Main mode the default setting Advanced FII LL Aggressive Mode Compress Support IP Payload Compression Protocol IP Comp Keep Alive AH Hash Algorithm MDS w Allow NetBIOS Broadcast Pass Through NAT Traversal Dead Peer Detection DPD Interval 9 seconds EN B P 98 P8 85 08 Allow specific boardcast packet Pass through Service Port Management Aaa Cencel is set to VPN operation mode The connection is the same to most of the VPN devices Aggressive Mode This mode is mostly adopted by remote devices The IP connection is designed to enhance the security control if dynamic IP is used for connection Use IP Header Compression Protocol If this option is selected in the connected VPN tunnel the device supports IP Payload Compression Protocol Keep Alive If this option is selected VPN tunnel will keep this VPN connection This is mostly used to connect the remote node of the branch office and headquarter or used for the remote dynamic IP address AH hash calculation For AH Authentication Header users may select MD5 DSHA 1 NetBIOS Broadcast If this option is selected the connected VPN tunnel allows the passage of NetBIOS broadcast packet This facilitates the easy connection with other Microsoft network however the traffic using this VPN tunnel will increase Dead Peer Detection DPD If this option is selected the connected VPN tun
196. smission time for each DPD message packet and the default value is 10 seconds Situation in Group VPN Future Feature Tunnel VPN Group rou to FF OoOO Gmpvme interface WANT v Enabled Group No Group Name Interface Enabled Local Group Setup Local Security Group Type Two Group VPN settings at most Displays the current VPN tunnel connection name such as XXX Office Users are well advised to give them different names to avoid confusion Note If this tunnel is to be connected to other VPN device some device requires that the tunnel name is identical to the name of the host end to facilitate verification This tunnel can thus be successfully enabled From the pull down list users can select the Interface for this VPN tunnel Click to Enabled the VPN tunnel This option is set to Enabled by default After the set up users may select to activate this tunnel feature This option allows users to set the local VPN connection access type The following offers a few items for local settings Please select and set appropriate parameters 144 778 I 47 your future life SSL IPSec VPN Firewall 7 IP address This option allows the only IP address which is entered to build the VPN tunnel JP Address v mower p Reference When this VPN tunnel is connected computers with the IP address of 192 168 1 0 can establish connection 8 Subnet This option allows local com
197. ssive processing load of the device The following guides users to block this virus corresponding port for prevention a Add this TCP135 139 UDP135 139 and TCP445 Port Service Name EE Protocol TCP v Port Range to HTTPS TCP 443 443 HTTPS Secondary TCP 8443 8443 TFTP UDP 69 69 IMAP TCP 143 143 NNTP TCP 119 1189 POP3 TCP 110 110 SNMP UDP 161 161 SMTP TCP 25 25 TELNET TCP 23 23 TELNET Secondary TCP 8023 8023 TELNETSSL TCP 992 992 DHCP UDP 57 67 L2TP UDP 1701 1701 PPTP TCP 1723 1723 IPSec UDP 500 500 TCP TCP 135 1389 UDPI UDP 135 139 TCP TCP 445 445 E ill Ka siete selected iter e b Use the Access Rule in the firewall and set to block these three ports 260 ONO your future life SSL IPSec VPN Firewall LEE Jo L I eour oman t Everyday Sun Mon Tue Wed Thu Fri Sat Use the same method to add UDP UDP135 139 and TCP 445 445 Ports c Enhance the priority level of these three to the highest Jump to 2Page s ix entries per page Next Page gt gt rw tow cius Aw Aw Aves 8 zv E Dew vons aw ay aws ER OU e ua Bd LE 9 C OU Aw Altra UN he Die ewe 1 L5 Dess T 1 261 EN ie NE UN BI 3 E SS Ee your future life SSL IPSec VPN Firewall 3 Block QQLive Video Broadcast Setting QQLive Video broadcast software is a stream media broadcast software Ma
198. st such as 192 168 5 20 Press Go to start the test The result will be displayed on this screen 13 2 Firmware Upgrade Users may directly upgrade the VPN Router firmware on the Firmware Upgrade page Please confirm all information about the software version in advance Select and browse the software file click Firmware Upgrade Right Now to complete the upgrade of the designated file Note Please read the warning before firmware upgrade Users must not exit this screen during upgrade Otherwise the upgrade may fail 224 your future life SSL IPSec VPN Firewall Firmware Upgrade Firerare Upgrade Eight Hor Warning 1 When choosing previous firmware versions all settings will restore back to default value 2 Upgrading firmware may take a few minutes please don t turn off the power or press the reset button 3 Please don t close the window or disconnect the link during the upgrade process 13 3 Configuration Backup Q Import Configuration File Q Export Configuration File Q Export Configuration File CIP amp MAC Binding laos Protocol Binding Import Configuration File This feature allows users to integrate all backup content of parameter settings into the Router Before upgrade confirm all information about the software version Select and browse the backup parameter file 225 GINO your future life SSL IPSec VPN Firewall config exp Select the file and click Import t
199. t Basically Remote IP Group setups are exactly the same as Local IP Group setups However remote IP group does not have automatically learning functions Instead you need to define addresses ranges and groups manually For example 220 130 188 1 to 200 range 81 your future life SSL IPSec VPN Firewall User Edit IP RemoteGroup Set E IPGrup l A d d Gr nup PER LE EL W oh Delete Group Add to IP list IP List GroupName name IP delete name IP delete It is the same setting methods You should set the IP address or the range of remote IP from the left side first and choose to add IP address information from the left side into the remote group 7 7 Port Group Management Service ports can be grouping as IP grouping It is convenient to set QoS firewall access rules and other functions 82 your future life user edit port Protocol SSL IPSec VPN Firewall Port Group Set Group Add Group PotRane lo EEZDLZIT Delete Group Port List GroupName name protocol port delete name protocol port delete All Traffic BOTH 1 865535 DNS UDP 53 53 FIP TCP 21 21 HITP TCP 80 80 1 du TCP 8080 8080 HTTPS TCP 443 443 Secondary Lid a J TFIP UDP 59 659 IMAP TCP 143 143 NNTP TCP 119 119 POP3 TCP 110 110 SNMP UDP 161 161 SMTP TCP 25 25 User edit port Name Protocol Port Range Add to Port List Group Name Delete Group gt gt gt gt button Delete Inpu
200. t e All traffic from the WAN to the DMZ is allowed by default e All traffic from the DMZ to the WAN is allowed by default Users may define access rules and do more than the default rules However the following four extra service items are always on and are not affected by other user defined settings HTTP Service from LAN to Device is on by default for management DHCP Service from LAN to Device is set to on by default for the automatic IP retrieval DNS Service from LAN to Device is on by default for DNS service analysis Ping Service from LAN to Device is on by default for connection and test 107 your future life SSL IPSec VPN Firewall Access Rule Jumpto page entries per page All Traffic 220 130 188 45 y Edit t MD Allow ia 220 130 188 45 yo Amr is i Allow l LAN Any Any Always Deny Al Trafic wana Any Any Always 1 Add Hew Rule Restore to Default Rules In addition to the default rules all the network access rules will be displayed as illustrated above Users may follow or self define the priority of each network access rule The device will follow the rule priorities one by one so please make sure the priority for all the rules can suit the setting rules Edit Define the network access rule item Delete Remove the item Add New Rule Create a new network access rule Return to Default Restore all settings to the default values and delete all the self
201. t input O in the following DMZ Private IP This function will then be closed After the changes are completed click Apply to save the network configuration modification or click Cancel to leave without making any changes 12 1 2 Port Range Forwarding oetting up a Port Forwarding Virtual Host If the server function which means the server for an external service such as WWW FTP Mail etc is contained in the network we recommend that users use the firewall function to set up the host as a virtual host and then convert the actual IP addresses the Internet IP addresses with Port 80 the service port of WWW is Port 80 to access the internal server directly In the configuration page if a web server address such as 192 168 1 50 and the Port 80 has been set up in the configuration this web page will be accessible from the Internet by keying in the device actual IP address such as http 211 243 220 43 At this moment the device actual IP will be converted into 192 168 1 50 by Port 80 to access the web page In the same way to set up other services please input the server TCP or UDP port number and the virtual host IP addresses 201 your future life SSL IPSec VPN Firewall Port Range Forwarding Service IP Address Interface Enable IL LLL d H Add to list Service Management Deletes selected application Service To select from this option the default list of service ports of the virtual h
202. t the name protocol and port range for the specific service port Name the Port in order to identify its property For example Virus 135 Choose the port protocol form the pull down list like TCP UDP or TCP and UDP Input the port range For example 135 to 135 After setting name protocol and port range push this button to add the information into the Port list below This port can be from some port groups When you add new groups please note if the group name is in the column For example Virus Choose the group that you would like to delete from the pull down list and push the Delete Group button System will ask you again if you would like to delete the group After pushing the confirmation button the group will be deleted You can choose several ports from Port list on the left side and push this button to have them added into the group the right side Delete self defined port or port range 83 your future life SSL IPSec VPN Firewall Apply Click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes 84 your future life SSL IPSec VPN Firewall VIII QoS Quality of Service QoS is an abbreviation for Quality of Service The main function is to restrict bandwidth usage for some services and IP addresses to save bandwidth or provide priority to specific applications or services and also to enable other users to share bandwidth as
203. ted ltem All PPTP Status Displays all successfully connected users including username remote IP address and PPTP address Gateway to Gateway Client to Gateway PPTP Setup VPN Pass Through PPTP Client Table ve tte t 151 2 your future life SSL IPSec VPN Firewall 10 1 4 VPN Pass Through Gateway to Gateway Client to Gateway PPTP Setup PPTP Status Enabled Disabled Fixed Source Port Change Source Port PPTPPassThrough Enabled O Disabled Enabled Disabled IPSec Pass Through If this option is enabled the PC is allowed to use VPN IPSec packet to pass in order to connect to external VPN device Fixed Source Port This option is only required when having VPN connection with Cisco VPN Server and Client Because VPN Server does not Future Feature accept two connections with the same IP and same source port Change Source Port the second connection needs to change source port from UDP Future Feature 500 to the other random port If choosing Fixed Source Port the second connection will still keep the connection with UDP 500 PPTP Pass Through If this option is enabled the PC is allowed to use VPN PPTP packet to pass in order to connect with external VPN device L2TP Pass Through If this option is enabled the PC end is allowed to use VPN L2TP packet to pass in order to connect with external VPN device After modification push Apply button to s
204. tem to be bound Activate the configuration 79 your future life SSL IPSec VPN Firewall Select All Choose all items on the list for binding Refresh Refresh the list Close Close the list 7 6 IP Group Management IP Group function can combine several IP addresses or IP address ranges into several groups When you manage user internet access privileges by IP address you can set up every management functions for users who have same internet access privileges in the same IP group in order to decrease the effort of setting rules for each IP address For example you can choose to set up QoS or Access Rule by IP grouping Thus you will simplify setting rules IP Grouping consists of Local IP Group and Remote IP Group Local IP Group refers to LAN IP groups and remote IP Group refers to WAN IP groups Local IP Group list will automatically learn IP addresses having packets that pass through firewall Moreover if user changes the IP address the IP in the list will change accordingly well For IP information which is in group list it won t update automatically along with IP list of the left side Administrators need to modify it manually User Edit IP Local GroupSet Add Group mares IL d hb Delete Group Add to IP list name IP delete name IP delete 192 168 239 1 101 192 168 1 101 101 li 2 192 168 1 2 2 i 100 192 168 1 100 100 ii 100 192 168 1 100 100 i 101 192 168 1 101 101 i gt gt gt 80 your future l
205. ter will automatically re connect In addition SSL IPSec VPN Router features NetBIOS transparency and supports IP grouping for connections between clients and host in the virtual private network SSL IPSec VPN Router offers the function of a standard PPTP server which is equipped with connection setting status Each WAN port can be set up with multiple DDNS at the same time It is also your future life SSL IPSec VPN Firewall capable of establishing VPN connections with dynamic IP addresses SSL IPSec VPN Router also has unique QVM VPN SmartLink IPSec VPN Just input VPN server IP user name and password and IPSec VPN will be automatically set up Through SSL IPSec VPN Router exclusive QVM function users can set up QVM to work as a Server and have it accept other QVM series products from client ports QVM offers easy VPN allocation for users users can do it even without a network administrator SSL IPSec VPN Router enables enterprises to benefit from VPN without being troubled with technical and network management problems The central control function enables the host to log in remote client computers at any time Security and secrecy are guaranteed to meet the IPSec standard so as to ensure the continuity of VPN service You can log on to our Web site www Qno com tw and find the latest Qno product information and technical support The device is an FCC Class A product it may cause radio interference in the living env
206. terface Range Source IP address range from 192 168 1 200 to 192 168 1 230 Destination address Any Services en rer 9 3 Content Filter The VPN Router supports two webpage restriction modes one is to block certain forbidden domains and the other is to give access to certain web pages Only one of these two modes can be selected 111 GNO your future life SSL IPSec VPN Firewall Block Forbidden Domains Accept Allowed Domains Forbidden Domains Enabled Enable Website Blocking by Keywords Scheduling HE mcs Apply this rule to o 24 Hour Format Everyday sun Mon Tue Wed Thu Fri Sat Ayaralhy Ganez Block Forbidden Domain Fill in the complete website such as www sex com to have it blocked 112 your future life SSL IPSec VPN Firewall Block Forbidden Dome ins 3 Accept Allowed Domains Forbidden Domains Exception IP address l to J Add to list Halata selected domain Forbidden Domains Click to enable the forbidden domains function Default is Disabled Enabled Add Input the website to be controlled For example www playboy com Exception IP Address Input the IP or IP ranges not to be controlled Add to list Click Add to list to create a new website to be controlled Delete selected domain Click to select one or more controlled websites and click this option to delete Apply Click Apply to save the configuration Cancel C
207. ternet IP Address Input the actual dynamic IP address issued by the ISP Status An indication of the status of the current IP function refreshed by DDNS Apply After the changes are completed click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes 12 6 MAC Clone Some ISP will request for a fixed MAC address network card physical address for distributing IP address which is mostly suitable for cable mode users Users can input the network card physical address MAC address 00 xx xx xx xx xx here The device will adopt this MAC address when requesting IP address from ISP MAC Clone WAN 1 00 17 16 11 33 56 Edit WAN 2 00 17 16 11 33 57 Edit WAN 3 00 17 18 11 33 58 Edit WAN 4 00 17 16 11 33 59 Edit Select the WAN port to which the configuration is to be edited click the hyperlink to enter and edit its configuration Users can input the MAC address manually Press Apply to save the setting and press Cancel to remove the setting Default MAC address is the WAN MAC address Interface ras il ENSE Default 00 06 a0 50 00 01 D0 1t c6 7b 8a bd 214 your future life SSL IPSec VPN Firewall 12 7 Inbound Load Balance Qno Firewall Router not only supports efficient Outbound Load Balance but Inbound Load Balance It distributes inbound traffic equally to every WAN port to make best use of bandwidth It also can prevent traffic from unequa
208. the first WAN When other WANs WAN2 WANS or WANA4 are broken and connection error remove Remove the Connection has been selected for the connection detection system traffic will be shifted to the first WAN WAN 1 In addition if the first WAN WANT1 is broken the traffic will be shifted to other WANs in turn For example the traffic will be shifted to WANe first if WAN2 is broken too the traffic will be shifted to WANS and so on 6 2 3 Protocol Binding Interface Configuration Router allows maximum four WAN interface the bandwidth and real connection of every WAN will impact the load balance mechanism therefore you need to set the Bandwidth and the Network service detection by each WAN Port correctly In Interface Configuration click Edit to enter the WAN port configuration Interface WAN 1 WAN 2 WAN 3 WAN 4 Bandwidth Configuration Auto Auto Auto Auto Edit When Auto Load Balance mode is selected the device will select sessions or IP and the WAN bandwidth 56 your future life SSL IPSec VPN Firewall will automatically allocate connections to achieve load balancing for external connections The network bandwidth is set by what users input for it For example if the upload bandwidth of both WANs is 512Kbit sec the automatic load ratio will be 1 1 if one of the upload bandwidths is 1024Kbit sec while the other is 512Kbit sec the automatic load ratio will be 2 1 Therefore to ens
209. the destination IP range such as Any Single Range or preset IP group name If Single or Range is selected please enter a single IP address or an IP address within a session select Always to apply the rule on a round the clock basis Select from and the operation will run according to the defined time Select Always to apply the rule on a round the clock basis If From is selected the activation time is introduced as below This control rule has time limitation The setting method is in 24 hour format such as 08 00 18 00 8 a m to 6 p m Everyday means this period of time will be under control everyday If users only certain days of a week should be under control users may select the desired days directly Click Apply to save the configuration Click Cancel to leave without making any change Example1 How to block TCP 135 139 ports First add a new TCP 135 139 service port object please refer the service port chapter and the finish below configurations Action Deny Service TCP135 139 Source Interface Any source IP address Any Destination IP address Any 110 GINO your future life SSL IPSec VPN Firewall Services Aton Dev v Sei Mr TF1 vl EEE SEE Oooo qogr ete 0000 Source Interface Av v Example2 How to block LAN IP addresses from 192 168 1 200 192 168 1 230 to access the TCP 80 port Action Deny Service TCP 80 Source In
210. then in the boxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses In the boxes for Destination IP input 211 1 1 1 211 254 254 254 Select WAN 2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode The second rule Select All Port TCP amp UDP 1 65535 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses In the boxes of Destination IP input 211 1 1 1 60 254 254 254 Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New and the rule will be added to the mode After the rule has been set up all traffic that is not going to the assigned destinations will only be transmitted through WAN1 65 your future life SSL IPSec VPN Firewall Show Priority SMTP TCP 25 25 hi Service service Management Source IP d Destination IP 0 0 4 0 to Interface WAHE Enable All Traffic TCP amp UDP 1 85535 192 188 1 0 0 211 1 1 1 P11 254 254 254 W AN All Traffic TCFAUDF 1 65535 gt 192 168 1 0 0 BD 1 1 150 254 254 254 WAHE Delate selected aplication When connection failed nput the retry period when connection failed The default value is 30 minutes Retry 30 every minutes m qw wc pem
211. ther WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for disconnection of this WAN service Line Dropped Input how long the WAN service may be disconnected before the newly Scheduling added connections should go through another WAN to connect with the Internet Backup Interface oelect another WAN port as link backup when port binding is configured Users should select the port that employs the same ISP After the changes are completed click Apply to save the configuration or click Cancel to leave without making any changes 37 your future life SSL IPSec VPN Firewall Transparent Bridge If all Intranet IP addresses are applied as Internet IP addresses and users don t want to substitute private network IP addresses for all Intranet IP addresses ex 192 168 1 X this function will enable users to integrate existing networks without changing the original structure Select the Transparent Bridge mode for the WAN connection mode In this way users will be able to connect normally with the Internet while keeping the original Internet IP addresses in Intranet IP configuration If there are two WANs configured users still can select Transparent Bridge mode for WAN connection mode and load balancing will be achieved as usual Interface HAND WAN Connection Type Transparent Bridge Default Gateway B7 ee DNSS
212. tion When PFS is enabled hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time Perfect Forward Secrecy When users check the PFS option don t forget to activate the PFS function of the VPN device and the VPN Client as well e Phase 1 Phase 2 DH Group This option allows users to select Diffie Hellman groups Group 1 Group 2 Group 5 e Phase 1 Phase 2 Encryption This option allows users to set this VPN tunnel to use any encryption mode Note that this parameter must be identical to that of the remote encryption parameter DES 64 bit encryption mode 3DES 128 bit encryption mode AES the standard of using security code to encrypt information It supports 128 bit 192 bit and 256 bit encryption keys Phase 1 Phase 2 Authentication This authentication option allows users to set this VPN tunnel to use any authentication mode Note that this parameter must be identical to that of the remote authentication mode MD5 or SHAT1 e Phase 1 SA Life Time The life time for this exchange code is set to 28800 seconds or 8hours by default This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security e Phase2 SA Life Time The life time for this exchange code is set to 3600 seconds or 1hours by default This allows the automatic generation of other exchange password within the valid time of
213. to select the Binding Service Port to be activated The default such as ALL TCP amp UDP 0 65535 WWW 80 80 FIP 21 to 21 etc can be selected from the pull down option list The default Service is All 0 65535 Option List for Service Management Click the button to enter the Service Port configuration page to add or remove default Service Ports on the option list Source IP Users can assign packets of specific Intranet virtual IP to go through a specific WAN port for external connection In the boxes here input the Intranet virtual IP address range for example if 192 168 1 100 150 is input the binding range will be 100 150 If only specific Service Ports need to be designated while specific IP designation is not necessary input O in 58 your future life Destination IP Interface Enable Add To List Delete selected item Moving Up amp Down Note SSL IPSec VPN Firewall the IP boxes In the boxes input an external static IP address For example if connections to destination IP address 210 11 1 1 are to be restricted to WAN1 the external static IP address 210 1 1 1 210 1 1 1 should be input If a range of destinations is to be assigned input the range such as 210 11 1 1 210 11 255 254 This means the Class B Network Segment of 210 11 x x will be restricted to a specific WAN If only specific Service Ports need to be designated while a specific IP destination assignment is not required input O
214. ubmit tab to save changes Cancel Click Cancel to clear any recent changes to the settings 8 LDAP hitp 192 168 1 L edit_sslvpn_domain him Windows Internet Ex c O E http 192 1568 1 1 edit sslvpn domam htm Domain Name Server Address LDAP BaseDN SERA Authentication Type Select the authentication service type you wish to use from the drop down menu Domain Names Name the selected authentication server Server Address Enter authentication server address LDAP BaseDN Enter LDAP authentication server s authentication domain name LDAP BaseDN Submit Click on the Submit tab to save changes Cancel Click Cancel to clear any recent changes to the settings One Click SSL VPN provides one click setting With fewest configurations all users can use SSL tunnels to access an open internal resource While in All Users group the authentication server settings support the current enterprise authentication server So all users after being identified via the authentication server will be directed to the portal and can use the full range of enterprise resources For Authentication server settings see step one below Domain Management 175 your future life SSL IPSec VPN Firewall If you don t want all users to access the full range of available resources go to All Users group settings to disable or modify settings in sequential order according to the following steps If you want to use the one clic
215. ubnet the PCs in these ranges don t need to make any modification and can go online This can be done with your actual internet architecture Dynamic IP SSL VPN firewall has 4 Class C DHCP servers and is enabled by default which can provide PCs in LAN to get IPs automatically like DHCP service in NT server So each PC isn t required to record or set other IP addresses After a computer starting SSL VPN firewall will automatically acquire an IP address Range Start The initial IP for the 4 ranges by default are 192 168 1 100 192 168 2 100 192 168 3 100 and 192 168 3 100 Changes can be made by actual requirements 195 your future life SSL IPSec VPN Firewall Range End The last IP for the 4 ranges by default are 192 168 1 149 192 168 2 149 192 168 3 149 192 168 4 149 Factory default allows to 50 IP addresses in each range A total of 200 computers can automatically acquire IP addresses Changes can be made by actual requirements Virtual Passage When the client uses SSL secure tunnel to connect to SSL VPN SSL VPN will assign a LAN IP address to the user You can use SSL VPN s supported SSL tunnels to adjust client start addresses and client end addresses to provide ample LAN IP the SSL secure tunnel clients Ensure that the secure tunnel IP range doesn t conflict with the DHCP IP range or the PPTP secure tunnel IP range PPTP IP Address Distribution Range When a client uses PP TP to dial into the SSL VPN SS
216. uence router efficiency You can use drop down menu to select current status that including statistic and graphics of the following items when this function is enabled System will refresh the statistic and graphics to latest data timing when you click Refresh button I CPU Usage As in the following figure 1 CPU Hours Usage Rate graphic average maximum 2 CPU Days Usage Rate graphic average maximum 3 CPU Week Usage Rate graphic average maximum V Enabled QRTG CPU Usage 7 o CPU Hours Usage Rate Total Session 4942 Memory Usage 22 Unit 100 Session _ Avg 5257 Session 100 s9 Max 10416 Session 0 10 05 10 10 10 15 10 20 10 25 10 30 10 35 10 40 10 45 10 50 10 55 11 00 UnitMinutes Unit 100 Ava 17 50 Max 36 05 10 05 10 10 10 15 10 20 10 25 10 20 10 35 10 40 10 45 10 50 10 55 11 00 UnitMinutes 240 NS ONO your future life SSL IPSec VPN Firewall Q CPU Days Usage Rate Unit Session 5n Avg 10771 Session 100 Max 17143 Session 100 50 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 6 00 8 00 10 00 UnitHours Unit 199 Avg 31 50 Max 48 0 12 00 14 00 16 00 18 00 20 00 22 00 0 00 2 00 4 00 6 00 8 00 10 00 UnitHours CPU Week Usage Rate Unit Session 700 Avg 10138 Session 100 Max 22088 Session 100 50 J Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 28 Nov 27 Unit Week Unit 100 Avg 32 59 Max 51 96 J Nov 21 Nov 22 Nov 23 Nov 24 Nov 25 Nov 28 Nov 27 Unit Week ll
217. ules to meet your connection requirement 6 2 2 Network Detection Service This is a detection system for network external services If this option is selected information such Retry 53 your future life SSL IPSec VPN Firewall or Retry Timeout will be displayed If two WANs are used for external connection be sure to activate the NSD system so as to avoid any unwanted break caused by the device misjudgment of the overload traffic for the WAN Network Service Detection Interface Retry count Retry Timeout When Fail LI IET ET ISI Interface Enable Retry count Retry timeout 30 Secon ds When Fail Remove the Connection When n OR lout bandwidth is over regarded as normal Default Gateway ISP Host tc tCd Remote Host tt Cd DNS Lookup Host Select the WAN Port that enables Network Service Detection This selects the retry times for network service detection The default is five times If there is no feedback from the Internet in the configured Retry Times it will be judged as External Connection Disconnected Delay time for external connection detection latency The default is 30 seconds After the retry timeout external service detection will restart 1 Generate the Error Condition in the System Log If an ISP connection failure is detected an error message will be recorded in the System Log This line will not be removed therefore th
218. under the remote gateway of Summary IP Domain Name FQDN Authentication v IP by Multiple DNS Resolved v HI s f 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail type entering the IP address and the E mail allows users to gain access to this tunnel IP E mail User FQDN Authentication v mem O ie If the remote IP address is unknown choose IP by DNS Resolved allowing DNS to translated the IP address This domain name must be available on the Internet When users finish the setting the corresponding IP address will be displayed under the remote gateway of Summary IP E mail User FQDN Authentication v IP by DNS Resolved 2 e 128 GINO your future life SSL IPSec VPN Firewall Or users can choose IP by Multiple DNS Resolved and IP address can be translated through DNS When users finish the setting the corresponding IP address will be displayed under the remote gateway of Summary IP Domain Name FQDN Authentication v IP by Multiple DNS Resolved ES m mo a a an 4 Dynamic IP Domain Name FQDN Authentication If users use dynamic IP address to connect with the device users may select the combination of the dynamic IP address host name and domain name aa ZUR H 5 Dynamic IP E mail Add
219. untiD Status interface StartTime EndTime Duration Contro Config 1 tst 8 E Edi Retesh Account Displays the remote client user Green means connection blue waiting for connection and red for QVM disconnection Status Displays the QVM VPN connection status Red means disconnection and green means connection Interface Shows which WAN port is applied to connect to this remote QVM Start Time Shows the starting time of QVM End Time Shows the ending time of QVM Duration Shows the total time used from the Start to the End of this QVM Control Shows the status of this QVM waiting for connection Waiting stop the connection Disconnect and Disable this feature Enable this QVM to enter the status of waiting for connection Config Click Edit to enter the setting items to be changed 161 your future life SSL IPSec VPN Firewall 10 3 3 QVM Client Settings Future Feature Select QVM feature as Client mode Setup Mode QVM Client Q QVM Client Setup IP Address or Dynamic Domain Name Status Keep Alive RedialPeriod Min QVM Backup Tunnel Advanced Function Change QVM Clients Service Port 10443 w Account ID Must be identical to that of the server account ID Password Must be identical to that of the server password Confirm Password Please enter the password and confirm again QVM VPN IP Address or Input QVM VPN Server IP address or dom
220. ure that the device can balance the actual network load please input real upload and download bandwidths The section refers to QoS configuration Therefore it should be set in QoS page Please refer to 8 1 QoS bandwidth configuration Interface The Maximum Bandwidth provided by ISP Upstream 10000 Kpit Sec Downstream 10000 Kbi Ger Protocol Binding Users can define specific IP addresses or specific application service ports to go through a user assigned WAN for external connections For any other unassigned IP addresses and services WAN load balancing will still be carried out Note In the load balance mode of Assigned Routing the first WAN WAN1 cannot be assigned It is to be saved for the IP addresses and the application Service Ports that are not assigned to other WANs WAN2 WANS and WANA for external connections In other words the first WAN WAN1 cannot be configured with the Protocol Binding rule This is to avoid a condition where all WANs are assigned to specific Intranet IP or Service Ports and destination IP no more WAN ports will be available for other IP addresses and Service Ports 57 a Pay E qu your future life SSL IPSec VPN Firewall Q Protocol Binding show Priority Service All Traffic TCP amp UDP 1 65535 Service Management Sower wipe l to es wj E Interface Enabled Dest sajagiar jam Shon Tela egy Genedl Service This is
221. users is 192 168 1 200 to 192 168 1 205 Virtual Passage Client Address Range Begin 192 168 1 200 Client Address Range End 192 168 1 205 Unified IP Management Unified IP Management The Unified IP Management configuration window can set LAN IP range DHCP IP range SSL virtual passage IP range and PPTP IP address range LAN Setting Device IP Address 192 168 1 Subnet Mask 255 255 255 je L Multiple Subnet LANIP Address Dynamic IP Enable DHCP Server Subnet 4 Enable Enable E Es ee 194 your future life SSL IPSec VPN Firewall Virtual Passage Client Address Range Begin 1 Client Address Range End 192 i88 io Q PPTP IP Address Range Range Start 192 68 i Range End 192 fies 1 199 LAN Settings The system default for LAN IP is 192 168 1 1 and subnet mask is 255 255 255 0 Changes can be made based on actual network architecture Multiple Subnet Settings Select Multiple Subnet and enter the subnet IP address subnet mask you want to add This function is to add the router s different LAN IPs in different ranges to the router identified LAN Therefore PCs in LAN already having configured IPs which are different from LAN IP range can still go online directly For example there are several IP ranges in LAN such as 192 168 3 0 192 168 20 0 192 168 150 0 etc When all of these ranges are added to a s
222. utomatic authentication detection technology The Inspection Firewall operates mainly at the network layer By executing the dynamic authentication for each connection it will also perform an alarming function for application procedure Meanwhile the packet authentication firewall may decline the connections which use non standard communication protocol DoS Denial of This averts DoS attacks such as SYN Flooding Smurf LAND Ping of Death Service IP Spoofing and so on 100 your future life Block WAN Request Remote Management Multicast Pass Through Prevent ARP Virus Attack SSL IPSec VPN Firewall If set as Enabled then it will shut down outbound ICMP and abnormal packet responses in connection If users try to ping the WAN IP from the external this will not work because the default value is set as activated in order to decline the outbound responses To enter the device web based UI by connecting to the remote Internet this feature must be activated In the field of remote browser IP a valid external IP address WAN IP for the device should be filled in and the modifiable default control port should be adjusted the default is set to 80 modifiable There are many audio and visual streaming media on the network Broadcasting may allow the client end to receive this type of packet message format This feature is off by default This feature is designed to prevent the intranet from being attacked b
223. ver if this act restarts the computer the setting will be cancelled Therefore this command can be regarded as a batch of processing documents placed in the activation of the operation system The batch processing documents can be put in this way 267 your future life SSL IPSec VPN Firewall echo off arp d arp s Router LAN IP Router LAN MAC For those internal network attacked by Arp the source must be identified Method If the PC fails to go online or there is packet loss of ping in the DOS screen input arp a command to check if the MAC address of the gateway is the same with the device MAC address If not the PC corresponding to the MAC address is the source of attack Solutions for other device users are to make a two way binding of the IP address and MAC address from both of the PC and device ends in order to carry out the prevention work However this is more complicated because the search for the IP and address and MAC increases the workload Moreover there is greater possibility of making errors during the operation c Bind the IP MAC Address from Device End Enter Setup under DHCP page On the down right corner of the screen there is IP and MAC Binding where users may create IP and MAC binding On Enabled click on V and select Add to List Repeat these steps to add other IP addresses and MAC binding followed by clicking Apply at the bottom of the page 268 GINO your future
224. wall Protocol Binding 6 2 Multi WAN Setting USB Please download the manual from Qno official Website http www Qno com tw VIII QoS Bandwidth QoS idi ll 8 3 Bandwidth dosis J session contot 2Sessontint OOOO ec sms ess eamm TSP amp MACHRE rong ereo OOOO oo ooi i neoe TrPmGmam OOOO O E Bulletin amp ARP Binding Future Feature General Policy 9 1 General Policy a recess ute e Access ue Oo jOmemBte fosco O 000 yi fom fosy OOO Gateway to 10 1 2 1 Gateway to Gateway Gateway ooo omo 105 22 Ghent Gateway Frere see onsets O O oo oo i ms onae ses OOO O Frew Pess Trouh 0A VEN PassTwoun 0 oeme 1021 1029 Grekey Group and Cien QVM Setup 10 3 1 QVM VPN Server Setting 10 3 3 QVM VPN Client Setting 256 your future life SSL IPSec VPN Firewall QVM Status 10 3 2 QVM Status XI SSL VPN 11 1 Status SSL VPN Status Group Summary 11 2 Group Summary 11 3 Group Management 11 4 Domain Management Management User Management 11 5 User Management Service Resource 11 6 Service Resource Management Management 11 7 Link to Portal 11 8 Advanced Settings XII Advanced Setting 12 1 DMZ Host Link to Portal w O o E Advanced Settings Advanced Function DMZ Host 12 2 UPnP Routing One to One NAT 12 3 Routing 12 4 One to One NAT C U 2 U Multiple to One 12 4 One to One NAT NAT DDNS MAC Clone Inbound Load 12 5 DDNS 12 6 MAC Clone 11 7 Inboun
225. window 11 6 Service Resource Management Banner Resource Name Bussiness Name Submit Q Resource Configuration Word in Excel PowerPoint Access Outlook Internet Explorer FrontPage ERP B e e Pv s K Edit i Disabled Edit Disabled Edit 1 Disabled Edit Disabled Edit Disabled Edit 1 Disabled Edit Disabled Edit 1 Disabled Add Hew Terminal Service 189 Y CINCO your future life SSL IPSec VPN Firewall 11 6 1 Banner Set the headings for users web portal including enterprise and resource names Banner Resource Name Q GJ n CJ O Soe Soleo Firmware Version SSL VPN Portal Page your future life 11 6 2 Resource Configuration SSL VPN supports common Microsoft terminal services including Word Excel PowerPoint Access Outlook IE FrontPage and ERP Administrators can also click on the Add New Terminal Service tab to add additional terminal services Resource Configuration eran ge Add Hew Terminal Service 190 your future life Resource Name Service Host Address Edit Delete Status SSL IPSec VPN Firewall Display resource name including SSL VPN supported terminal services like Word Excel PowerPoint Access Outlook IE FrontPage and ERP Display different service icons which will show on a user s web portal Display terminal server address Provides selected resource application program paths execution
226. y ARP spoofing causing the connection failure of the PC This ARP virus cheat mostly occurs in Internet cafes When attacked all the online computers disconnect immediately or some computers fail to go online Activating this feature may prevent the attack by this type of virus 101 CINCO your future life SSL IPSec VPN Firewall Advance DoS Settings WAN Threshold LAN Threshold Threshold counted by all packets Packets Sec Threshold counted by all packets Packets Sec Single Destination IP Threshold Packets Sec Threshald counted by single IP packet Packets Sec Single Source IP Threshold 397 Packets Sec Blockthis IP when reach threshold Minutes BlockthisIP when reach threshold 5 Minutes Threshald counted by all packets Packets Sec Threshold counted by all packets Packets Sec Single Destination IP Threshald Packets Sec Threshold counted by single IP packet Packets Sec Single Source IP Threshold Packets Sec Block this IP when reach threshold 5 Minutes Block this IP when reach threshold 5 Minutes Threshold counted by all packets Packets Sec Threshold counted by all packets Packets Sec Single Destination IP Threshald Packets Sec Threshold counted by single IP packet Packets Sec Single Source IP Threshold Packets Sec Block this IP when reach threshold 5 Minutes BlockthisIP when reach threshold 5 Minutes e le i j to erow uu 4 amp ENSE Pe Ie Ed PAddrw o je j e e tei
227. y way to gain access to this tunnel The WAN IP address will be automatically filled into this space Users don t need to do further settings IP ony B E 2 IP Domain Name FQDN Authentication If users select IP domain name type please enter the domain name and IP address The WAN IP address will be automatically filled into this space Users don t need to do further settings FQDN refers to the combination of host name and domain name and can be retrieved from the Internet i e von server com This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection IP Domain Name FQDN Authentication E ise fies fie 3 IP E mail Addr USER FQDN Authentication If users select IP address and E mail enter the IP address and E mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space Users don t need to do further settings IP E mail User FQDN Authentication vil rs fies 4 fiz e 4 Dynamic IP Domain Name FQDN Authentication 124 your future life Local Security Group Type SSL IPSec VPN Firewall If users use dynamic IP address to connect to the device users may select this option to link to VPN If the remote VPN gateway requires connection to the device for VPN connection this device will start authentication and respond to this VPN tunne
228. your future life SSL IPSec VPN Firewall 2 Two devices are operating simultaneously Two devices operate outbound linking simultaneously but they are still separated as Master device and Backup device In normal situation Master device is major DHCP IP issuer and Backup device will disable DHCP issuing automatically When Master device fails transmitting the Backup device will take over all outbound links and enable DHCP server to provide IP addresses Following is the description of the two different modes Hardware Backup High Availability Enable Disable Mode Hardware Backup Mode Two devices are operating simultaneously Operation Master Made Backup Mode Master Slave Mode setting Of two devices must be different Status Normal Status of the backup device Normal X Operation Master Mode Indicates the master device will operate for all outbound links When the master device fails transmitting the backup device will take over Status Status Normal indicates the device operates well Status of the backup device Indicates status of backup device If the status is normal administrators can login the device remotely to manage Remote Management should be enabled Status Abnormal indicates the backup device can not be detected or does exist and need to inspect the backup device actual status 230 your future life SSL IPSec VPN Firewall High Availability Enable Disabl

Download Pdf Manuals

image

Related Search

Related Contents

SMC SMCWBR14-N2 EU Barricade™ N Pro Wireless Broadband Router    iStarUSA WA-SF120-2FAN  LDOS LDOS LDOS LDOS LDOS LDOS LDOS LDOS - tim  FICHA TÉCNICA CHIPCO GREEN  MANUAL TECNICO  4-Kanal-Quadrocopter GH-4L, Drohne mit 360°-Flip-Funktion  SNAP: Programmer & PC Application  Cisco Nexus 7000 6.0kW AC Power Supply Module  Samsung SHC-735P User's Manual  

Copyright © All rights reserved.
Failed to retrieve file