Home

Billion BiPAC 8520

image

Contents

1. Transport Type id Start Port ol ala PEE a Input HTTP port number End Part Inbound Allow cc BEE lt H m Select Allow Outbound Allow v w Return 58 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router 6 The new port filter rule for HTTP is shown below UDF 123 123 Block Allow Edit Mee as EE a ee EE ey Ehi Kea die 50 50 Allow Allow Edit HTTP inbound amp outbound application Delete 2 eo oosoooosososoAAT 7 Configure your Virtual Server port forwarding settings so that incoming HTTP requests on port 80 will be forwarded to the PC running your web server Virtual Server Port Forwarding Port Mapping Table Enable Application Protocol External Port Redirect Port E FF TCP 21 lo O Telnet TCP 23 oo O SMTP EN ER EE o ee e m T Sa epee EE ee ne P Address 142 1EB 1 O 182181 142 168 1 192 1681 To enable the HTTP service in Virtual Server settings input the web server PC s IP address Tip If you wish to setup permanent remote management of your router you may enter the router s IP instead Chapter 4 Configuration 59 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Intrusion Detection Intrusion Detection Parameters Intrusion Detection CO Enable Disable ictim Protection Black Duration scan Attack Block Duration DOS Attack Block Duration Max
2. LINE1 amp 2 Lit when successfully connected to SHDSL line and it is synchronized LAN Port Lit when connected to an Ethernet device 1X 4X Green for 100Mbps Orange for 10Mbps RJ 45 connector Blinking when data is Transmitted Received Lit when the system is ready Lit when power is ON Chapter 2 Installing the Router Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router The Rear Ports A SOTE X Only the BIPAC 8520 has two Line jack ports BIPAC 8500 has one 1 Power Switch Power ON OFF switch 2 PWR Connect the supplied power adapter to this jack After the device is powered on press it to reset the device or restore to factory default settings 0 3 seconds reset the device 6 seconds above restore to factory default settings this is used when you can not login to the router e g forgot the password LAN Connect a UTP Ethernet cable Cat 5 or Cat 5e to one of the 1X 4X four LAN ports when connecting to a PC or an office home RJ 45 connector network of 10Mbps or 100Mbps Connect a PS2 RS 232 cable to this port when connecting to a CONSOLE PC s RS 232 port 9 pin serial port LINE Connect the supplied RJ 11 telephone cable to this port when 1X 2X connecting to the A SHDSL line RJ 11 connector Chapter 2 Installing the Route
3. Intrusion Detection URL filter Blacklisting Firewall amp Filter Firewall Prevents access from outside your network The router provides three levels of security support NAT natural firewall This masks LAN users IP addresses which are invisible to outside users on the Internet making it much more difficult for a hacker to target a machine on your network This natural firewall is on when NAT function is enabled MV OTE When using Virtual Servers your PCs will be exposed to the degree specified in your Virtual Server settings provided the ports specified are A opened in your firewall packet filter settings Firewall Security and Policy General Settings Inbound direction of Packet Filter rules to prevent unauthorized computers or applications accessing your local network from the Internet Intrusion Detection Enable Intrusion Detection to detect prevent and log malicious attacks Access Control Prevents access from PCs on your local network Firewall Security and Policy General Settings Outbound direction of Packet Filter rules to prevent unauthorized computers or applications accessing the Internet MAC Filter rules To prevent unauthorized computers accessing the Internet 51 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router URL Filter To block PCs on your local network from unwanted websites You can find six items under the Firewall section General S
4. 41 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router IPoA Routed Connections WAN Connection IPoA Routed Description ATM Class JBF v NAT Enable Disable Obtain an IP address automatically via DHCP client O Use the following IP address IP Assignment IP Address N RIP LJ RIP wt O RIP v2 L RIP v2 Multicast Description User definable name for the connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing a single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled DHCP client Enable or disable the DHCP client specifying if the router can obtain an IP address from the Internet Service Provider ISP automatically or not Please click Obtain an IP address automatically via DHCP client to enable the DHCP client function or click Specify an IP address to disable the DHCP client function and specify the IP address manually The setting of this item is specified by your ISP RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface ee 7 Chapter 4 Co
5. Type o M Ola 9 9 2 oe 5 2 5 T Auth Type ChapfAuta 5 Idle Timeout O mintes Co PSone SEE Ee MDS Encryption DES So Perfect Forward Secrecy a F rO Ca ak a K Dialin f Check Dial in 2 Private IP Address Assigned 192 168 1 200 IP address assigned to branch office network to Dialing User J a EeerNeworki 1 08 0 0 _ Branch otce ewok Netmask 2552552850 a esemame username _ Input username amp password to authenticate branch office aes 5 AuthType Chap Auto _ Keep as default value in most ofthe cases The connection will be disconnected when there Is no Idle Timeout traffic in a predefined period of time Idle time 0 means the connection is always on IPSec Enable for enhancing your L2TP VPN security Authentication Encryption 3DES Perfect Forward None Both sites should use the same value None Secrecy Pre shared Key 12345678 96 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring L2TP VPN in the Branch Office The IP address 69 1 121 30 is the Public IP address of the router located in head office If you registered the DDNS please refer to the DDNS section of this manual you can also use the domain name instead of the IP address to reach the router L2TP LAN to LAN Connection Name BranchOfice Dial out o IP Address or Hostname 69 1211 33 2 Type EE In Pr
6. 4Wired Connection Otrue false Fort Fort 1 Port 2 Bit Rate Mode Fixed Bit Rate Activate Line DSP Firmwareversion R23 1 2 3 1 Connected false false state Handshake Handshake Bit Hate 0 DO Mode The default is CPE Customer Premises Equipment mode If you want to do back to back connection with another BIPAC 8500 you must set to CO Central Office mode on another unit Annex Type SHDSL standard The default is Annex A and both sites should use the same type Bit Rate Mode Adaptive mode depends on your line quality to get a best connection rate Fixed mode will fix the rate between CO and CPE and if the line quality is not good enough that connection will be fail Fixed Bit Rate You can choose which Bit Rate you want to use with Fixed Bit Rate mode Activate Line Aborting false your SHDSL line and making it active true again for taking effect with settings of SHDSL DSP Firmware Version Current SHDSL line code firmware version Connected Display current SHDSL line sync status State Display current SHDSL line status of physical layer Bit Rate Display current sync rate of your SHDSL line when physical layer has connected APOTE BIPAC 8500 only supports 2 Wire mode and one SHDSL port can be configured 44 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router System There are six items within the System section Time Zone Remote Access Firmware Upgrade Backup R
7. Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring your firewall to allow for a publicly accessible web server on your LAN The pre defined port filter rule for HTTP TCP port 80 is the same no matter whether the firewall is set to a high medium or low security level To setup a web server located on the local network when the firewall is enabled you have to configure the Port Filters setting for HTTP As you can see from the diagram below when the firewall is enabled with one of the three presets Low Medium High inbound HTTP access is not allowed Port Filters Filtering Rules Ada TCP UDP Filter 2 Filtering Table Type TCP UDP ICP TEE TEE TEE TEE TCF UDF ICMP ILE TEF TEE UDE MEE Configuring Packet Filter start Port ou 53 5a 21 23 2n 110 114 r r HA 1 20 1503 Ze 123 445 End Part al 53 53 21 23 25 110 114 OO MAA 1720 1503 Ze 123 445 Add Raw IP Filter Inbound Block Block Block Block Block Block Block Block Allow Block Block Block Block Block Block Outbound Allow Allow Allow Allow Allow Allow Allow Allow Allow Allow Allow Allow Allow Allow Allow 1 Click Packet Filter you will get the following page Click Port Filters Packet Filte Firewall Securit Type external T internal Con Chapter 4 Configuration ration Port Filters Address Filters 2 Mote Edit Edit Edit
8. Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Give DNSto Relay Controls whether the PPP Internet Protocol Control Protocol IPCP can request the DNS server IP address for a remote PPP peer Once IPCP has discovered the DNS server IP address it automatically gives the address to the local DNS relay so that a connection can be established Give DNSto Client Controls whether the PPP Internet Protocol Control Protocol IPCP can request a DNS server IP address for a remote PPP peer Once IPCP has discovered the DNS server IP address it automatically gives the address to the local DNS client so that a connection can be established Give DNSto DHCP Server Similar to the above but gives the DNS server address to the DHCP server Discover Primary NBNS Discover Secondary NBNS This setting enables disables whether the primary secondary NBNS server address is requested from a remote PPP peer using IPCP The default setting for this command is disabled Discover Subnet Mask Specifies if the subnet mask given by IPCP negotiation process is to be used Give Subnet Mask To DHCP Server Enable to change your DHCP Server settings by using the given information in IPCP negotiation process 37 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router RFC 1483 Bridged Connections WAN Connection RFC 1483 Bridged Description RFC 1403 bridged mode ve ATM Class Encapsulation Method Ether F
9. Blocked please be sure your PC s MAC address is not listed MAC Address There are 10 entries to enter the MAC addresses you want manage Chapter 4 Configuration 62 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E URL Filter URL Uniform Resource Locator e g an address in the form of http www billion com or http www example com filter rules allow you to prevent users on your network from accessing particular websites by their URL There are no pre defined URL filter rules you can add filter rules to meet your requirements URL Filter Configuration URL Filtering O Enable Disable Always Black Block Mode Aina OB v o0 vlis 18 vioo sv JCR TOM ar Monday to Friday Keywords Filtering L Enable Details 2 L Enable Details Domains Filtering Disable all WEB traffic except for Trusted Domains Block Java Applet Block surfing by IP address Restrict URL Features Enable Disable To enable or disable URL Filter feature Always Block Select to always check the URL filter rules i e at all hours of the day Block from Specify the time period to check the URL filter rules e g during work hours Keywords Filtering Allows blocking by specific keywords within a particular URL rather than having to specify a complete URL e g to block any image called advertisement gif When enabled your specified keywords list will be checked to see if an
10. Edit Edit Edit Edit Edit Edit Edit Edit Edit Edit Edit Edit Return Delete 2 Delete 3 Delete 2 Delete 3 Delete 2 Delete 3 Delete 2 Delete 3 Delete 2 Delete 2 Delete 2 Delete 2 Delete 2 Delete 2 Delete 2 1 By default all protocol types and TCP UDP ports are blocked 2 Only the listed IP addresses are blocked 57 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router 2 Click Port Filters You will then be presented with the pre defined port filter rules screen in this case for the low security level shown below Port Filters Filtering Rules Add TCRYUDP Filter Add Raw IF Filter 3 Return Filtering Table Type Start Port End Part Inbound Outbound TCR 50 50 Block Allow Edit Delete 3 d Click Delete LIDP Sa 53 Block Allow Edit Delete TOE 53 53 Block Allow Edit Delete ICP 2 2 Block Allow Edit Delete ICE 23 23 Block Allow Edit Delete TCP 25 25 Block Allow Edit Delete ICE 110 110 Block Allow Edit Delete TEE 114 114 Block Allow Edit Delete UDF rozo rozo Allow Allow Edit Delete 3 Click Delete to delete the existing HTTP rule 4 Click Add TCP Filter Click Add TCP Filter Port Filters Filtering Rules Add TCP UDP Filter Add Raw IF Filter Return amp 5 Input the port number 80 and set both Inbound amp Outbound to Allow Port Filters Add TCP UDP Filter
11. ME ee EE N 105 MH Check Email ee ee ee ee Gee 106 M Device Management ee ee ee ee ee ee ee 107 SAVE CONFIGURATION TO FLASH ses uses ekne eens eedee se se ev oe ea ev eek ee eo we vie bee we 111 LOG OW aa AE EE 112 CHAPTER 5 TROUBLESHOOTING 113 PROBLEMS STARTING UP THE ROUTER essens ene ne nee kk eek Ke Ek KR EE ER KR KEER KR KEER AR KEER ARK ERK KEER kk REEN 113 PROBLEMS WITH THE WAN INTERFACE eeuse sense ne n eek n eek ke kk KEER KA KEER RR REEN RR KEER ARK GR RR EE EER KERE 113 PROBLEMS WITH THE LAN INTERFACE eeuse sense ene n eek ke eek ke kk EER KR KEER KR KEER AR RE ER ARK E RR KEER kk REEN 114 APPENDIX A PRODUCT SUPPORT AND CONTACT INFORMATION esse esse sesse esse ee 115 Table of Contents iii Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Chapter 1 Introduction Introduction to your BIPAC 8500 8520 Router Welcome to the Billion BIPAC 8500 8520 Router Your Billion router is an all in one unit combining an SHDSL modem SHDSL router and Ethernet network switch providing everything you need to get the machines on your network connected to the Internet over your SHDSL broadband connection With features such as an SHDSL Quick Start wizard and DHCP Server you can be online in no time at all and with a minimum of fuss and configuration catering for first time users to the guru requiring advanced features and control over their Internet connection and network Features SHDSL Multi Mode S
12. With this feature enabled users can now connect to Net meeting or MSN Messenger seamlessly Chapter 1 Introduction Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Network Address Translation NAT Allows multi users to access outside resources such as the Internet simultaneously with one IP address one Internet access account Many application layer gateway ALG are Supported such as web browser ICQ FIP Telnet E mail News Net2phone Ping NetMeeting IP phone and others Firewall Supports SOHO firewall with NAT technology automatically detects and blocks Denial of service DoS attacks URL blocking packet filtering and SPI Stateful Packet Inspection are also supported The hacker s attack will be recorded associated with timestamp in the security logging area More firewall functions will always be implemented through updated firmware releases Domain Name System DNS relay Provides an easy way to map the domain name a friendly name for users such as www yahoo com and IP address When a local machine sets its DNS server with this router s IP address every DNS conversion request packet from the PC to this router will be forwarded to the real DNS in the outside network Dynamic Domain Name System DDNS The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname This dynamic IP address is the WAN IP address For example to use the service you must first apply for an account from
13. 255 0 port configuration from the ISP DHCP server function Enabled but you have to set the username and password first IP addresses for 100 IP addresses continuing from distribution to PCs 192 168 1 100 through 192 168 1 199 Chapter 3 Basic Installation 15 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Information from your ISP Before configuring this device you have to check with your ISP Internet Service Provider what kind of service is provided such as PPPoE PPPoA RFC1483 or IPOA Gather the information as illustrated in the following table and keep it for reference RFC1483 Bridged RFC1483 Routed VPI VCI VC based LLC based multiplexing Username Password Service Name and Domain Name System DNS IP address it can be automatically assigned by your ISP when you connect or be set manually VPI VCI VC based LLC based multiplexing Username Password and Domain Name System DNS IP address it can be automatically assigned by your ISP when you connect or be set manually VPI VCI VC based LLC based multiplexing to use Bridged Mode VPI VCI VC based LLC based multiplexing IP address Subnet mask Gateway address and Domain Name System DNS IP address it is fixed IP address VPI VCI VC based LLC based multiplexing IP address Subnet mask Gateway address and Domain Name System DNS IP address it is fixed IP address 16 Chapter 3 Basic Installation Billion BIPA
14. Description _ __ _ HeadOffice Given a name of PPTP connection Dial in Check Dial in 2 Private IP Address Assigned 192 168 1 200 IP address assigned to branch office network to Dialing User Netmask 2552852660 Input username amp password to authenticate branch ems Mel Keep as default value in most of the cases PPTP server amp client will determine the value automatically j Key Length Auto Refer to manual for details if you want to change the Mode stateful setting The connection will be disconnected when there Is no Idle Time traffic in a predefined period of time Idle time 0 means the connection is always on 85 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring PPTP VPN in the Branch Office The IP address 69 1 121 30 is the Public IP address of the router located in head office If you registered the DDNS please refer to the DDNS section of this manual you can also use the domain name instead of the IP address to reach the router PPTP LAN to LAN Connection Mame BranchOfice T Dial out server P Address for Hostname 69 121 1 33 gt Pe Dial in Private IP Address Assigned to Dialin User fF O Peer Network IP 192 168 1 0 Netmask 255 255 255 0 E gt sername username Password an O Auth Type haplAutol Data Encryption key Length Mode Cs Idle Timeout 0 minutes Co Apply Item Function Descripti
15. Forwarding Port Mapping Table Enable Application Protocol External Port Redirect Port IP Address E Fe TCP 2 0 19214681 Telnet TCP 23 o 1921681 O SMTP TCP 25 o 921681 O HTTP TCP an 0 1921681 O E POP3 TCP 110 o 1921681 O NNTE TCP 119 0 1921681 NTP JDP 123 o 921681 E HTIPS TCR 443 o 192168 1 O KE UDP 500 0 192 1681 E x TCP 1503 o 1921681 E ie TCP 1720 oo 1921681 O PPTP TCP 1723 0o 1921684 E oer TCP UDP 5060 0 1921681 O CUSeeMe TCP 7649 0 1921681 a EE o mo o Ho tte a EEN o Ho dB Ho toate O tcp o Ho Me tte O DEL ee o Ho JE ee Because NAT can act as a natural Internet firewall your router protects your network from being accessed by outside users when using NAT as all incoming connection attempts will point to your router unless you specifically create Virtual Server entries to forward those ports to a PC on your network When your router needs to allow outside users to access internal servers e g a web server FTP server Email server or game server the router can act as a virtual server You can set up a local server with a specific port number for the service to use e g web HTTP port 80 FTP port 21 Telnet port 23 SMTP port 25 or POP3 port 110 When an incoming access request to the router for a specified port is received it will be forwarded to the corresponding internal server O 2 Chapter 4 Configuratio
16. Header Selects encapsulation mode true for using LLC or false for using VC Mux Create Route This setting specifies whether a route is added to the system after IPCP Internet Protocol Control Protocol negotiation is completed If set to enabled a route will be created which directs packets to the remote end of the PPP link Specific Route Specifies whether the route created when a PPP link comes up is a specific or default route If set to enabled the route created will only apply to packets for the subnet at the remote end of the PPP link The address of this subnet is obtained during IPCP negotiation Subnet Mask sets the subnet mask used for the local IP interface connected to the PPP transport If the value 0 0 0 0 is supplied the netmask will be calculated from the class of the IP address obtained during IPCP negotiation Route Mask Sets the subnet mask used by the route that is created when a PPP link comes up If it is set to 0 0 0 0 the subnet mask is determined by the IP address of the remote end of the link The class of the IP address is obtained during IPCP Internet Protocol Control Protocol negotiation MRU Maximum Receive Unit This is negotiated during the LCP protocol stage Discover Primary Secondary DNS This setting enables disables whether the primary secondary DNS server address is requested from a remote PPP peer using IPCP The default setting for this command is enabled 36 Chapter 4 Configuration
17. PAP the password is sent unencrypted whilst CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder Idle Time Auto disconnect the VPN connection when there is no activity on the connection for a predetermined period of time 0 means this connection is always on Click Apply after changing settings 76 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router IPSec Enable for enhancing your LT2P VPN security Authentication Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit There are three options Message Digest 5 MD5 Secure Hash Algorithm SHA 1 or NONE SHA 1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that produces a 128 bit hash SHA 1 A one way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are four options DES 3DES AES and NONE NONE means it is a tunnel only with no encryption 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 56 3 bits as an encryption method AES Stands for Advanced Encryption Standards it uses 128 bits as an enc
18. Provider ISP or network administrator will be able to supply you with this Interval Enter the value in minutes between periodic mail checks Automatically dial out for checking emails When the function is enabled your SHDSL router will connect to your ISP automatically to check emails if your Internet connection dropped Please be careful when using this feature if your SHDSL service is charged by time online 06 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Device Management The Device Management advanced configuration settings allow you to control your router s security options and device monitoring features Device Management Device Host Name Host Mame Embedded Web Server home gateway HTTP Port BO 80 is default HTTP port Management IF Address DOOD U 0 0 0 means Any Expire to auto logout 16 seconds Universal Plug and Play UPnP UPnP Enable Disable SNMP Access Control SNMP V1 and Y2 Read Community IP Address Write Community IP Address Trap Community f E IP Address SNMP V3 Username N Password Access Right Read ReadVYVrite P Address t ThS setting wil become effective after you save to Pash and restart the router Embedded Web Server HTTP Port This is the port number the router s embedded web server for web based configuration will use The default value is the standard HTTP port 80 Users may specify an altern
19. RFC 1473 PPP IP MIB T PPP IP Group gt From RFC 1474 PPP Bridge MIB v PPP Bridge Group gt From RFC1573 IfMIB T fMIBObjects Group gt From RFC1695 atmMIB v atmMIBObjects gt From RFC 1907 SNMPv2 M only snmpSetSerialNo OID 10 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Save Configuration to Flash After changing the routers configuration settings you must save all of the configuration parameters to FLASH to avoid them being lost after turning off or resetting your router Click Save to write your new configuration to FLASH save Config to FLASH Please confirm that you wish to save the configuration There wil be a delay While saving as configuration information is written to FLASH CMDS Apply 11 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Logout To exit the router s web interface choose Logout Please ensure that you have saved the configuration settings before you logout Be aware that the router is restricted to only one PC accessing the configuration web pages at a time Once a PC has logged into the web interface other PCs cannot get access until the current PC has logged out of the web interface If the previous PC forgets to logout the second PC can access the page after a user defined period by default 3 minutes You can modify this value using the Advanced Device Management section of the web
20. a DDNS service like http www dyndns org More than 5 DDNS servers are supported Virtual Private Network VPN Allows user to make a tunnel with a remote site directly to secure the data transmission among the connection User can use embedded PPTP and L2TP client server IKE and IPSec which are supported by this router to make a VPN connection or users can run the PPTP client in PC and the router already provides IPSec and PPTP pass through function to establish a VPN connection if the user likes to run the PP TP client in his local computer Virtual Server port forwarding Users can specify some services to be visible from outside users The router can detect incoming service requests and forward either a single port or a range of ports to the specific local computer to handle it For example a user can assign a PC in the LAN acting as a WEB server inside and expose it to the outside network Outside users can browse inside web servers directly while it is protected by NAT A DMZ host setting is also provided to a local computer exposed to the outside network Internet Rich Packet Filtering Not only filters the packet based on IP address but also based on Port numbers It will filter packets from and to the Internet and also provides a higher level of security control Dynamic Host Configuration Protocol DHCP client and server In the WAN site the DHCP client can get an IP address from the Internet Service Provider ISP autom
21. bo oe ee 33 H SP ee ee ee ee ee ee ee ee ee PE E 33 RE EE EE EO ER Ee 43 E SHDSL ee ee ee ee ee ee ee ee ee ee ee ee 44 VS IW cares OR ER EE OO ET 45 MVS ZO AO N N OE E re 45 ME Remote Access ee ee ee ee ee 46 E Firmware Upgrade ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee 47 E Backup Restore see ee ee ee ee ee ee ee 48 E Restart Router ee ee ee ee ee ee ee ee 49 M User Management ee ee ee ee ee ee ee ee ee ee ee 50 Firewall and Access CONTON seke EE EE EG Ea aa GAST aE ee ee Re 51 E General Settings ee ee ee ee ee ee ee ee ee 53 E Packet Filter ee ee ee ee ee ee 54 E intrusion Detection o cccccccceccececccceceeeeceeeeceneeeeeececeeseeeeetenteeeeeeeeeeeeeeeens 60 E MAC Address Filter ee ee ee ee ee ee ee ee ee ee 62 E URL Filter ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee 63 N Firewall LOG o oo ee ee ee ee ee ee ee ee ee ee ee ee ee ee 65 VPN Virtual de ASe SE RE N EE NE OE Nr 66 ET HR EE N OE OR OR OE N 66 ME EE Oe N 71 E Advanced Option ee ee ee ee ee ee ee ee ee ee ee 74 ME MA EE N EE 75 Oo ONE Ol CINICO masr ER EE RE ER ED Re ee ok GR Ee ee te 98 E Prioritization ie ee ee ee ee ee ee ee ee ee ee ee ee ee 99 Table of Contents ME ei ME RE RR E EEE RR EE 100 Virtual Server Port Forwarding ane N EE N ER GE ee 101 Tok eo N 104 E StaticRoutiNg ee ee ee ee ee ee ee ee ee ee ee 104
22. configured PPTP VPN Connections PPTP Status YVPH PPITP for Remote Access Application Tunnel all Name Type Enable Active EE Feed Encryption YPH PPTP for LAN to L4N Application l Tunnel al Mame Type Enable Active E E Eed Encryption Name The name you assigned to the particular PPTP connection in your VPN configuration Type The type of connection dial in dial out Enable Whether the connection is currently enabled Active Whether the connection is currently active Tunnel Connected Whether the VPN Tunnel is currently connected Call Connected If the Call for this VPN entry is currently connected Encryption The encryption type used for this VPN connection Chapter 4 Configuration 22 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router IPSec Status This shows details of your configured IPSec VPN Connections IPSec Status YPN Tunnels Mame Actve Connection state Statistics Local subnet Remote Subnet Remote Gateway SA Name The name you assigned to the particular VPN entry Active Whether the VPN Connection is currently Active Connection State Whether the VPN is Connected or Disconnected Statistics Statistics for this VPN Connection Local Subnet The local IP Address or Subnet used Remote Subnet The Subnet of the remote site Remote Gateway The Remote Gateway IP address SA The Security Association for this VPN entry 23 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL
23. detailed instructions on configuring your WAN settings please see the WAN section of this manual Usually the only details you will need for the Quick Start wizard to get you online are your login often in the form of username ispname your password and the encapsulation type Your ISP will be able to supply all the details you need alternatively if you have deleted the current WAN Connection in the WAN ISP section of the interface you can use the routers PVC Scan feature to attempt to determine the Encapsulation types offered by your ISP Auto Scan Before you scan the P Cs please DELETE all the WAN interfaces IP Address if provided by ISP Gateway if provided by ISP Click Start to begin scanning for encapsulation types offered by your ISP If the scan is successful you will then be presented with a list of supported options 2 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router 1 found PPPoE PL on Oaa Quick Start Configuration save Config to FLASH Lanquage Auto Scan D Cancel Select the desired option from the list and click Apply to return to the Quick Start interface to continue configuring your ISP connection Please note that the contents of this list will vary depending on what is supported by your ISP 28 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuration When you click this item you get following sub
24. items to configure the SHDSL router LAN WAN System Firewall VPN QoS Virtual Server and Advanced These functions are described below in the following sections LAN Local Area Network There are four items within the LAN section Ethernet Port Setting and DHCP Server E Ethernet Ethernet Primary IP Address IP Address 192 168 SubNetmask 265 T2sE ic RIP LI RIPyvi J RIP L RIP v Multicast Secondary IP Address The Secondary IF Address should be on the same subnet as the Primary IF Address and uses the same subnet Mask P Address ojo jo jo Apply The router supports two Ethernet IP addresses in the LAN and two different LAN subnets through which you can access the Internet at the same time Users usually only have one subnet in their LAN so there is no need to configure a Secondary IP address The default IP address for the router is 192 168 1 254 RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function WOTE i The Subnet mask of Secondary IP Address depends on the setting ol Primary IP Address 29 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Port Setting This section allows you to configure the settings for the router s Ethernet ports to solve some of the compatibility problems that may be encountered while connecting to the Internet as well allowing users to tweak the performance of their network Port Setting Parameters P
25. of the destination network Netmask The destination netmask address Gateway The IP address of the gateway that this route will use Cost The number of hops counted as the cost of the route 20 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router DHCP Table DHCP Table Type Leased Expired 2 Permanent Leased The DHCP assigned IP addresses information IP Address A list of IP addresses of devices on your LAN Local Area Network Expired The expired IP addresses information Permanent The fixed host mapping information E Leased Table Leased Table IP Address MAC Address Client Host Mame Expiry IP Address The IP address that assigned to client Client UID hw addr The MAC address of client Client Host Name The Host Name Computer Name of client Expiry The current lease time of client Expired Table Expired Table IP Address MAC Address Client Host Mame Expiry Please refer the Leased Table E Permanent Table Permanent Table Name IP Address MAC Address Maximum Lease Time Name The name you assigned to the Permanent configuration IP Address The fixed IP address for the specify client MAC Address The MAC Address that you want to assign the fixed IP address Maximum Lease Time The maximum lease time interval you allow to clients 21 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router PPTP Status This shows details of your
26. own password PPP Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using PAP the password is sent unencrypted whilst CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder Data Encryption Data sent over the VPN connection can be encrypted by an MPPE algorithm Default is Auto so that this setting is negotiated when establishing a connection or else you can manually Enable or Disable encryption Key Length The data can be encrypted by MPPE algorithm with 40 bits or 128 bits Default is Auto it is negotiated when establishing a connection 128 bit keys provide stronger encryption than 40 bit keys 67 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Mode You may select Stateful or Stateless mode The key will be changed every 256 packets when you select Stateful mode If you select Stateless mode the key will be changed in each packet Idle Time Auto disconnect the VPN connection when there is no activity on the connection for a predetermined period o
27. section of this manual for more details on how to enable Firewall logging Event Log system log buffer head system log buffer tail Error Logging Any errors encountered by the router e g invalid names given to entries are logged to this window Error Log Error Log mes are in seconds since last reboot When Process Error Log 25 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router NAT Sessions This section lists all current NAT sessions between interface of types external WAN and internal LAN NAT Sessions WAT sessions between interface of types external and internal Local IF Port local public Remote IP Fort Idle fer 61 231 104 61 216 40 661 216 2008 30 0 254 6l 59 Ya 218 166 103 61 230 221 210 17 220 0 94 0 254 0 94 Se55long SBES lons sess loans sess long UPnP Portmap The section lists all port mapping established using UPnP Universal Plug and Play Please see the Advanced section of this manual for more details on UPnP and the routers UPnP configuration options 26 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Quick Start Quick Start Connection Encapsulation PI HAT Enable Disable Optional Settings IP Address SubMetrask Default Gateway f O DNS Primary ONS Po secondary DNS f PPP For
28. this IP address will be sent SNMP Traps SNMP V3 Specify a name and password for authentication And define the access right from identified IP address Once the authentication has succeeded users from this IP address will be able to view and modify the data 08 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router SNMP Version SNMPv2c and SNMPv3 SNMPv2c is the combination of the enhanced protocol features of SNMPv2 without the SNMPv2 security The c comes from the fact that SNMPv2c uses the SNMPvi community string paradigm for security but is widely accepted as the SNMPv2 standard SNMPv3 is a strong authentication mechanism authorization with fine granularity for remote monitoring Traps supported Cold Start Authentication Failure The following MIBs are supported gt From RFC 1213 MIB II System group Interfaces group Address Translation group IP group ICMP group TCP group N NAN N N N K UDP group x EGP not applicable M Transmission M SNMP group gt From RFC1650 EtherLike MIB M dot3Stats gt From RFC 1493 Bridge MIB v dot1dBase group T dot1dTp group M dot1dStp group if configured as spanning tree gt From RFC 1471 PPP LCP MIB 09 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router T pppLink group PppLar group gt From RFC 1472 PPP Security MIB Mv PPP Security Group gt From
29. vs so ves ves ves I AE SEN WE AE Telnet 23 Ce EIN SENSE e ae es ele es De Teer RealAudio UDP 17 7070 H 323 1720 TCP 6 1720 1720 YES YES YES T 120 1503 1503 1503 YES YES YES YES reer fom ma ems HTTPS ei 443 EIE ICQ 5190 5190 Inbound Internet to LAN Outbound LAN to Internet 55 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Address Filters Address Filters are used to block traffic to from particular IP addresses They can be used to block IP addresses either on the Internet or on your local network There are no pre defined address filter rules you can add the filter rules to meet your requirements There are two kinds of address filters one is inbound and the other is outbound The rules can be set to prevent unauthorized users hosts or network to access the Internet from LAN outbound and or access LAN from the Internet inbound Host IP Address This is the IP address you wish to block access to or from Host Subnet Mask This is the subnet mask for the IP address range you wish to block Direction Whether you want to block access to the Internet outbound from the Internet inbound or both to and from the Internet both Tip To block access to from a single IP address enter that IP address as the Host IP Address and use a Host Subnet Mask of 255 255 255 255 ma 5G Chapter 4 Configuration
30. your own password PPP Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using PAP the password is sent unencrypted whilst CHAP encrypts the password before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder Data Encryption Data sent over the VPN connection can be encrypted by an MPPE algorithm Default is Auto so that this setting is negotiated when establishing a connection or else you can manually Enable or Disable encryption 69 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Key Length The data can be encrypted by MPPE algorithm with 40 bits or 128 bits Default is Auto it is negotiated when establishing a connection 128 bit keys provide stronger encryption than 40 bit keys Mode You may select Stateful or Stateless mode The key will be changed every 256 packets when you select Stateful mode If you select Stateless mode the key will be changed in each packet Idle Time Auto disconnect the VPN connection when there is no activity on the connection for a predetermined per
31. 000 Windows Me and Windows XP are registered Trademarks of Microsoft Corporation 15 Appendix A Product Support and Contact Information
32. 1 RIP v2 and RIP v2 Multicast Check to enable RIP function MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface Advanced Options PPPoA LLC Header Selects encapsulation mode true for using LLC or false for using VC Mux Create Route This setting specifies whether a route is added to the system after IPCP Internet Protocol Control Protocol negotiation is completed If set to enabled a route will be created which directs packets to the remote end of the PPP link Specific Route Specifies whether the route created when a PPP link comes up is a specific or default route If set to enabled the route created will only apply to packets for the subnet at the remote end of the PPP link The address of this subnet is obtained during IPCP negotiation Subnet Mask sets the subnet mask used for the local IP interface connected to the PPP transport If the value 0 0 0 0 is supplied the netmask will be calculated from the class of the IP address obtained during IPCP negotiation Route Mask Sets the subnet mask used by the route that is created when a PPP link comes up If it is set to 0 0 0 0 the subnet mask is determined by the IP address of the remote end of the link The class of the IP address is obtained during IPCP Internet Protocol Control Protocol negotiation MRU Maximum Receive Unit This is negotiated during the LCP protocol sta
33. 71 254 Internet Router Server Encryption Data LTF Server L TP Client VPN Connection Dial out ee 192 168 1 0 24 L2TP VPN Remote Access Dial out 92 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring the L2TP VPN in the Office L2TP Remote Access Connection Connection Name venet 4 Type Dial out Server IP Address or Hostname O Dial in Private IP Address Assigned to Dialin User Po Username Password Auth Type Idle Timeout IPSec Enable ees Authentication ee Encryption SIDES v Cs Perfect Forward Secrecy s Function Description _ __ 1 Connection Name VPN_L2TP Given name of L2TP connection 2 Sener or Check Dial out Server IP Address s9 4944 33 An Dialed server IP or Hostname Username username 3 A given username amp password Password 123456 4 Auth Type Chap Auto Keep as default value in most of the cases The connection will be disconnected when 5 Idle Timeout 0 there Is no traffic in a predefined period of time Idle time 0 means the connection is always on IPSec ie Enable for enhancing your L2TP VPN security Authentication Encryption 3DES Perfect Forward Non Both sites should use the same value None Secrecy Pre shared Key 12345678 93 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring your Router to
34. AN to LAN Application Enable Disable Mame Type status Create 3 Apply There are two types of PPTP VPN supported Remote Access and LAN to LAN please refer below for more information Click Create to configure a new VPN connection 66 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Remote Access PPTP Connection PPTP Remote Access Connection Dial out Server IP Address ar Hostname fF OE ype Dial in Private IF Address Assigned to Dialin User oo O Username Connection Mame l Password Auth Type ChaplAuto Data Encryption Key Length Mode ldle Timeout O minutes Apply Connection Name This allows you to identify this particular connection e g Connection to office Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server When configuring your router as a Client enter the remote Server IP Address or Hostname you wish to connection to When configuring your router as a server enter the Private IP Address Assigned to Dial in User address Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user Server enter your own username Password If you are a Dial Out user client enter the password provided by your Host If you are a Dial In user server enter your
35. BILLION BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router User s Manual Version Release 1 54c Table of Contents CHAPTER 1 INTRODUCTION ees esse sesse ee l INTRODUCTION TO YOUR BIPAC 8500 8520 ROUTER essens se ne se nn een Kak KERK KEER KERKE GR KERK EK EE 1 BEAR EE EE EE RE ER EE 1 BIPAC 8500 8520 SHDSL ROUTER APPLICATION ouens sen ne ne se nn een n eek KA Ee K KEER KERKE GR Ke KERR EE 4 CHAPTER 2 INSTALLING THE ROUTER 5 IMPORTANT NOTE FOR USING THE BIPAC 8500 8520 SHDSL ROUTER een sn en en n en een 5 PACKAGE CONTENTS oes ee nee Ee ee ede oe ie ee ee NE ORR Oe ee ee Gee Ne eke ei 5 THE FRONT LEDs of BIPAC 8500 sies es eer ek eke EN eN eN ERGE ke dee Re eN Ne ee dee ke ide 6 THE FRONT LEDS OF DIP AC BO sees vee es NSR Go KA inn 7 HE REAR PORTS ieke eke ede N EG N ee Re NR ee ed ee ee ee ee eN ee ee ee eN Ee 8 sd T eN 9 CHAPTER 3 BASIC INSTALLATION 10 CONNECTING YOUR ROUTER OE SR es Ee Ee Ee NN NEE ee NG OER ER GEREG GR RE ee ee ee ONE 10 CONFIGURING PCS IN WINDOWS eeuse an nan n ek RAK EK KAK KA REK KEER KEER KEER RR EE RR KERKE GR KERKE EER KEER KEER K ESE KEE 11 FORN IMONGA P o N E ON EE A A 11 FOF WINONG ZOOO EE E 12 For Windows 98 ME ee RE ee eo er gianna aan EEEE ee ea ete 13 For Windows ES EE EE EN 14 FACTORY DEFAULT SE TINGS ar oes SE ees ke ORR RENE EE Ge GENE NG ENE ONS ER Ee bee eN ea ee 15 Username and Password AO OE N OE EE AE ER EO N OE EE N 15 LAN and WAN Port AddreSSeS e
36. C 8500 8520 SHDSL VPN Firewall Bridge Router Configuring with your Web Browser Open your web browser enter the IP address of your router which by default is 192 168 1 254 and click Go a user name and password window prompt will appear The default username and password are admin and admin See Figure 3 14 Connect to 197 168 1 254 User name f admin ww Remember my password Figure 3 14 User namd amp Password Prompt Widonw Congratulation You are now successfully logon to the BIPAC 8500 8520 SHDSL Router 17 Chapter 3 Basic Installation Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Chapter 4 Configuration At the configuration homepage the left navigation pane where bookmarks are provided links you directly to the desired setup page including Status ARP Table Routing Table DHCP Table PPTP Status IPSec Status L2TP Status Email Status Event Log Error Log NAT Sessions and UPnP Portmap Quick Start Configuration LAN WAN System Firewall VPN QoS Virtual Server and Advanced Save Config to FLASH Language provides user interface in English and German languages Please see the relevant sections of this manual for detailed instructions on how to configure your Billion router 18 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Status ARP Table This section displays the router s ARP Address Resolution Protoco
37. Cs Please see the WAN configuration section of this manual for more information on NAT The Internet Assigned Numbers Authority IANA is the central coordinator for the assignment of unique parameter values for Internet protocols Port numbers range from 0 to 65535 but only ports numbers O to 1023 are reserved for privileged services and are designated as well known ports The registered ports are numbered from 1024 through 49151 The remaining ports referred to as dynamic ports or private ports are numbered from 49152 through 65535 Examples of well known and registered port numbers are shown in Table 4 for further information please see IANA s website at http www iana org assignments port numbers For help on determining which private port numbers are used by common applications on this list please see the FAQs Frequently Asked Questions at http www billion com Table 4 Well know and registered Ports FTP Data FTP Control 3 kos amp UDP SSH Remote Login Protocol SMTP Simple Mail Transfer Protocol 53 TCP amp UDP DNS Domain Name Server 69 UDP TFTP Trivial File Transfer Protocol 01 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router 80 TCP World Wide Web HTTP 110 TCP POP3 Post Office Protocol Version 3 NEWS Network News Transfer Protocol NTP Network Time Protocol 443 TCP amp UDP HTTPS 1503 TCP T 120 4000 TCP ICQ Virtual Server Port
38. D is lit 10 Chapter 3 Basic Installation Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring PCs in Windows amp Control Panel F Wi d XP File Edit View Favorites Tools Help hd 0 r i n OWS C X S A Search Key Folders Ei Address e Control Panel o o Mpo a on s o s s i i Vg Control Panel B gt Phone and Power Options Modem 1 Go to Start Control Panel in Classic View In the B sec r 7 Control Panel double click Network Connections EL Ss 8 3 Printers and Regional and Scanners and Windows Update Faxes Cameras Language 4 Help and Support TA A Scheduled Sounds and Speech Audio Devices 2 Double click Local Area Connection See Figure 3 1 Figure 3 1 LAN Area Connection Local Area Connection Status 3 In the LAN Area Connection Status window click emt Suan Properties See Figure 3 2 Ede ek Status Connected Duration 00 05 34 Speed 100 0 Mbps 4 Select Internet Protocol TCP IP and click Properties See Figure 3 3 m og Received Bytes 1 749 5 Select the Obtain an IP address automatically and Ce Jy Bene jo Obtain DNS server address automatically radio buttons See Figure 3 4 Figure 3 2 LAN Connection Status Local Area Connection Properties 6 Click OK to finish the configuration Connect using BS 4SUSTekK Broadcom 440x 10 100 Integrated Controller This connection u
39. DSL VPN Firewall Bridge Router Configuring IPSec VPN in the Head Office IPSec Edit Connection Name IP sec HeadDffice ie Local O Single Address IF Address fF O Net vork Subnet IF Address 192 165 1 0 Netmask 255 255 255 0 OIP Range IP Address EndIP Remote secure Gateway Address or Hostname amia 8 2 Single Address IPF Address fF OE NetWork Subnet IP Address Netmask 255 255 2550 4 OIF Range IP Address f OE End IP EEN NE ES ES Authentication MDS We 7 Encryption O OAH Authentication Perfect Forward Secrecy a E shared Key 12345678 Apply Advanced Options _Item_ Function Description ___ 1 Connection Name IPSec HeadOffice Given a name of IPSec connection Check Subnet radio button IP Address 192 168 1 0 PERE OER Netmask 255 255 255 0 Secure Gateway Address 69 121130 IP address of the head office router in or Hostname ai WAN side Check Subnet radio button 4 IP Address 192 168 0 0 Netmask 255 255 255 0 ESP Check ESP radio button MD5 3DES None Pre shared Key 12345678 Security plan Encryption Prefer Forward Security Pre shared Key Branch office network 88 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring IPSec VPN in the Branch Office IF Address 192 168 0 0 IPSec Edit Connection Name IPSec Brenchofice W Local O Single Address Hetvy ork Subnet OIF Range Remote secure Gateway Addre
40. Dial in to the Server Currently Microsoft Windows operation system does not support L2TP incoming service Additional software may be required to set up your L2TP incoming service 94 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring LAN to LAN L2TP VPN Connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet The routers are installed in the head office and branch office accordingly Branch Office Head Office Public IP j 192 168 0 254 69 121 1 33 192 168 1 254 Router Router Encryption Data LTF Client LTF Server VPN Connection 192 168 0 024 192 168 1 0 24 L2TP VPN LAN to LAN Both office LAN networks MUST in different subnet with LAN to LAN application Functions of Pre shared Key VPN Connection Type and Security Algorithm MUST BE identically set up on both sides Attention 95 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring L2TP VPN in the Head Office The IP address 192 168 1 200 will be assigned to the router located in the branch office Please make sure this IP is not used in the head office LAN L2TP LAN to LAN Connection Mame server IF Address or Hostname EEN Private IP Address Assigned to Dialin User 192 168 1 200 2 Peer Network IP 92 168 0 0 Netmask Username usemame Password esses N
41. IP address or IP range of packets to be monitored 99 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router IP Throttling IP Throttling allows you to limit the speed of IP traffic The value entered will limit the speed of the application that you set to the specified value s multiple of 32kbps The trigger of check can base on IP protocol port number and address as well IP Throttling Configuration from LAN to WAN packet source IP Address Range U 0 0 0 means Any Destination IP Address Range U 0 0 0 means Any 0 w ee hl 2 m N IN o m IN N IN Source Port Enable Application Protocol Upstream Rate Limit Destination Port EE EE D 12 kbps D H W Ro 2 w IN N iN EE o2 m IN N IN 2 m IN N IN m EE m EE mu al LY pak pak mu al m1 Er Er Er lt ka kas kas jl Enable Select it to activate the function Application A name that identifies an existing rule Protocol The name of supported protocol Source Port The source port of packets to be monitored Destination Port The destination port of packets to be monitored Source IP Address Range The source IP address or IP range of packets to be monitored Destination IP address Range The destination IP address or IP range of packets to be monitored Upstream Rate Limit This function allows you to limit the speed of IP traffic from LAN to WAN The value entere
42. Is no traffic in a predefined period of time Idle Time Idle time 0 means the connection is always on 83 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring a LAN to LAN PPTP VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet The routers are installed in the head office and branch office accordingly Branch Office Head Office Public IP 192 168 0 254 69 121 1 33 192 168 1 254 m Internet oo Router Router Encryption Data PPTP Client PPIP Server VPN Connection 192 168 0 0 24 192 168 1 0 24 PPTP VPN LAN to LAN Both office LAN networks MUST in different subnet with LAN to LAN application Attention 84 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring PPTP VPN in the Head Office The IP address 192 168 1 201 will be assigned to the router located in the branch office Please make sure this IP is not used in the head office LAN PPTP LAN to LAN Connection Name HeadOtice Dial out Server IP Address or Hostname Type Dial in Private IP Address Assigned to Dialin User 1921681200 2 Peer Network IP 132 166 0 0 Metmask 255 255 255 0 ey sername Username Password eesese Auth Type ChaplAutol Data Encryption Key Length Mode 5 Idle Timeout 0 minutes Co Function
43. N Connection RFC 1483 Routed Description PI ATM Class UBR M HAT Enable Disable Encapsulation Method Obtain an IF address automatically via DHCP client O Use the following IP address IP Assignment IP Address Po ll RIP C RF yt L Blew L RIP v2 Multicast MTU 1500 Description Your description of this connection VPI and VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing the single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled Encapsulation method Select the encapsulation format the default is LlcBridged Select the one provided by your ISP DHCP client Enable or disable the DHCP client specify if the Router can get an IP address from the Internet Service Provider ISP automatically or not Please click Obtain an IP address automatically via DHCP client to enable the DHCP client function or click Specify an IP address to disable the DHCP client function and specify the IP address manually The setting of this item is specified by your ISP RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the in
44. P address 192 168 1 200 will be assigned to the remote worker Please make sure this IP is not used in the Office LAN L2TP Remote Access Connection Connection Mame T Z ko T Dial out Server P Address or Hostname Type Doo Dial in Private IP Address Assigned to Dialin User 192 168 1 200 2 Password Auth Type ChaplAuto v amp Idle Timeout D minutes Cs eal Enable ee z Authentication En Encryption Item Function 1 Connection Name VPN L2TP Given a name of L2TP connection Check Dial in 2 Private IP Address Assigned 192 168 1 200 An assigned IP address for the remote worker to Dialing User Password 123456 remote worker 4 Auth Type Chap Auto Keep as default value in most of the cases ps iomon The connection will be disconnected when there Idle Timeout 0 Is no traffic in a predefined period of time Idle time 0 means the connection is always on Authentication MD5 Encryption 3DES Perfect Forward Both sites should use the same value None Secrecy Pre shared Key 12345678 91 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring a Remote Access L2TP VPN Dial out Connection A company s office establishes a L2TP VPN connection with a file server located at a separate location The router is installed in the office connected to a couple of PCs and Servers Office LAN Public IP 69 1271 1 33 197 168 1
45. PAC 8500 8520 SHDSL VPN Firewall Bridge Router E Remote Access Remote Access You may temporarily permit remote administration of this network device Allow Access for 30s minutes To temporarily permit remote administration of the router i e from outside your LAN select a time period the router will permit remote access for and click Enable You may change other configuration options for the web administration interface using Device Management options in the Advanced section of the GUI If you wish to permanently enable remote access choose a time period of 0 minutes 46 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Firmware Upgrade Firmware Upgrade You may upgrade the system software on your network device Your routers firmware is the software that allows it to operate and provides all its functionality Think of your router as a dedicated computer and the firmware as the software it runs Over time this software may be improved and modified and your Billion router allows you to upgrade the software it runs to take advantage of these changes Clicking on Browse will allow you to select the new firmware image file you have downloaded to your PC Once the correct file is selected click Upgrade to update the firmware in your router vy DO NOT power down the router or interrupt the firmware upgrading while it is still in process Improper operation could damage the route
46. PIP Server VPN Connection Dial in 192 168 1 0 24 PPTP VPN Remote Access Dial in Configuring PPTP VPN in the Office The input IP address 192 168 1 200 will be assigned to the remote worker Please make sure this IP is not used in the Office LAN PPTP Remote Access Connection Connection Mame VPM PPIF ED Dial out Server IP Address or Hostname N Type Dial in Private IP Address Assigned to Dialin User 192 166 1200 gt Username Password ae Auth Type Data Encryption Key Length Mode Ca Idle Timeout O minutes s Item Function 1 Connection Name VPN PPTP Given a name of PPTP connection 2 Dial in Check Dial in 80 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Private IP Address Assigned 192 168 1 200 An assigned IP address for the remote worker to Dialing User username Input username amp password to authenticate Password 123456 remote worker Chap Auto Data Encryption Auto Keep as default value in most of the cases Key Length Auto PPTP server amp client will determine the value automatically Refer to manual for details if you Mode stateful want to change the setting Idle Time 0 The connection will be disconnected when there is no traffic in a predefined period of time Idle time 0 means the connection is always on 81 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Con
47. PN tunnel Network Set the IP address subnet or address range of the remote network Proposal Proposal Select the IPSec security method There are two methods of checking the authentication information AH authentication header and ESP Encapsulating Security Payload Use ESP for greater security so that data will be encrypted and authenticated Using AH data will be authenticated but not encrypted 12 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Authentication Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit There are three options Message Digest 5 MD5 Secure Hash Algorithm SHA 1 or NONE SHA 1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that produces a 128 bit hash SHA 1 A one way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are four options DES 3DES AES and NONE NONE means it is a tunnel only with no encryption 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 56 3 bits as an encryption method AES Stands for Advanced Encryption Standards it uses 128 bits as an encryption method Perfect Forward Secrecy Choose w
48. VPN Firewall Bridge Router L2TP Status This shows details of your configured L2TP VPN Connections L2TP Status VPN LZIP for Remote Access Application Tunnel Call Name Type Enable Active Ee er enn Encryption VPN LZTP for LAN to L4N Application Tunnel al Name Type Enable Active pee ae EE EE Encryption Name The name you assigned to the particular L2TP connection in your VPN configuration Type The type of connection dial in dial out Enable Whether the connection is currently enabled Active Whether the connection is currently active Tunnel Connected Whether the VPN Tunnel is currently connected Call Connected If the Call for this VPN entry is currently connected Encryption The encryption type used for this VPN connection Email Status Details and status for the Email Account you have configured the router to check Please see the Advanced section of this manual for details on this function Email Status Email Account Account Mame Username POPS Mail Server pops mall com Email Status Mo mall 24 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Event Log This page displays the router s Event Log entries Major events are logged to this window such as when the router s SHDSL connection is disconnected as well as Firewall events when you have enabled Intrusion or Blocking Logging in the Configuration Firewall section of the interface Please see the Firewall
49. You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically O Use the following DNS server addresses c Preferred DNS server Alternate DNS server Advanced mo F igure 3 8 IP Address amp DNS Configuration 12 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router For Windows 98 ME Go to Start Settings Control Panel In the Control Panel double click Network and choose the Configuration tab select TCP IP gt NE2000 Compatible or the name of any Network Interface Card NIC in your PC See Figure 3 9 Click Properties Select the IP Address tab In this page click the Obtain an IP address automatically radio button See Figure 3 10 Then select the DNS Configuration tab See Figure 3 11 Select the Disable DNS radio button and click OK to finish the configuration Chapter 3 Basic Installation Network 2 x Configuration Identification Access Control The following network components are installed m Microsoft Family Logon 28 ASUSTeK Broadcom 440x 10 100 Integrated Controller 2 Dial Up Adapter Y TCP IP gt ASUSTeK Broadcom 440x 10 100 Integrated be a gt TCP IP gt Dial Up Ada
50. atically In the LAN site the DHCP server can allocate a range of client IP addresses and distribute them including IP address subnet mask as well as DNS IP address to local computers It provides an easy way to manage the local IP network Static and RIP1 2 Routing Supports an easy static routing table or RIP1 2 routing protocol to support routing capability 2 Chapter 1 Introduction Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Simple Network Management Protocol SNMP It is an easy way to remotely manage the router via SNMP Web based GUI Supports web based GUI for configuration and management It is user friendly and comes with on line help It also Supports remote management capability for remote users to configure and manage this product Firmware Upgradeable Device can be upgraded to the latest firmware through the WEB based GUI Rich management interfaces Supports flexible management interfaces with local console port LAN port and WAN port Users can use terminal applications through the console port to configure and manage the device or Telnet WEB GUI and SNMP through LAN or WAN ports to configure and manage the device Chapter 1 Introduction Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router BIPAC 8500 8520 SHDSL Router Application 8500 8520 QoS Prioritization IP Throttling Firewall SPI DoS URL Blocking PPTP IPSec L2TP Figure 1 1 Appl
51. ative if for example they are running a web server on a PC within their LAN Management IP Address You may specify an IP address allowed to logon and access the routers web server Setting the IP address to 0 0 0 0 will disable IP address restrictions allowing users to login from any IP address Expire to auto logout Specify a time frame for the system to auto logout the users configuration session For Example User A changes HTTP port number to 100 specifies their own IP address of 192 168 1 55 and sets the logout time to be 100 seconds The router will only allow User A access from the IP address 192 168 1 55 to logon to the Web GUI by typing 07 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router http 192 168 1 254 100 in their web browser After 100 seconds the device will automatically logout User A Universal Plug and Play UPnP UPnP offers peer to peer network connectivity for PCs and other network devices along with control and data transfer between devices UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings removing the need for the user to control advanced configuration of their device Both the users Operating System and the relevant application must support UPnP in addition to the router Windows XP and Windows Me n
52. atively support UPnP when the component is installed and Windows 98 users may install the Internet Connection Sharing client from Windows XP in order to support UPnP Windows 2000 does not support UPnP Disable Check to disable the router s UPnP functionality Enable Check to enable the router s UPnP functionality UPnP Port Its default setting is 2800 It is highly recommended for users to use this port value If this value conflicts with other ports already being used you may wish to change the port SNMP Access Control Software on a PC within the LAN is required in order to utilize this function Simple Network Management Protocol SNMP V1 and V2 Read Community Specify a name to be identified as the Read Community and an IP address This community string will be checked against the string entered in the configuration file Once the string name is matched user obtains this IP address will be able to view the data Write Community Specify a name to be identified as the Write Community and an IP address This community string will be checked against the string entered in the configuration file Once the string name is matched users from this IP address will be able to view and modify the data Trap Community Specify a name to be identified as the Trap Community and an IP address This community string will be checked against the string entered in the configuration file Once the string name is matched users from
53. be disabled Username Enter the username provided by your ISP You can input up to 128 alphanumeric characters case sensitive This will usually be in the format of username ispname instead of simply username Password Enter the password provided by your ISP You can input up to 128 alphanumeric characters case sensitive IP Address Specify an IP address allowed to logon and access the router s web server Note IP 0 0 0 0 indicates all users who are connected to this router are allowed to logon the device and modify data Authentication Protocol Type Default is Chap Auto Your ISP will advise you whether to use Chap or Pap 39 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Connection Always on If you want the router to establish a PPPoA session when starting up and to automatically re establish the PPPoA session when disconnected by the ISP Connect to Demand If you want to establish a PPPoA session only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet Idle Timeout Auto disconnect the broadband firewall gateway when there is no activity on the line for a predetermined period of time Detail You can define the destination port and packet type TCP UDP without checking by timer It allows you to set which outgoing traffic will not trigger and reset the idle timer RIP RIP v
54. bnet IP Gateway This is the gateway IP address to which packets are to be forwarded Interface Select the interface through which packets are to be forwarded Cost This is the same meaning as Hop This should usually be left at 1 04 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Dynamic DNS Dynamic DNS Parameters Dynamic DNS Enable Disable Dynamic ONS Server Period Lavis W The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname allowing users whose ISP does not assign them a static IP address to use a domain name This is especially useful for hosting servers via your SHDSL connection so that anyone wishing to connect to you may use your domain name rather than having to use your dynamic IP address which changes from time to time This dynamic IP address is the WAN IP address of the router which is assigned to you by your ISP You will first need to register and establish an account with the Dynamic DNS provider using their website for example http www dyndns org There are more than 5 DDNS services supported Disable Check to disable the Dynamic DNS function Enable Check to enable the Dynamic DNS function The following fields will be activated and required Dynamic DNS Server Select the DDNS service you have established an account with Domain Name Username and Password Enter your registered domain name and your userna
55. ces connected to the same telephone line as your SHDSL linesync Billion router e g telephones fax machines analogue modems have a disconnections line filter connected between them and the wall socket unless you are using a Central Splitter or Central Filter installed by a qualified and licensed electrician and ensure that all line filters are correctly installed and the right way around Missing line filters or line filters installed the wrong way around can cause problems with your SHDSL connection including causing frequent disconnections Problems with the LAN Interface Corrective Action Can t ping any PCs on Check the Ethernet LEDs on the front panel The LED should be on for a the LAN port that has a PC connected If it is off check the cables between your router and the PC Make sure you have uninstalled any software firewall for troubleshooting Verify that the IP address and the subnet mask are consistent between the router and the workstations a FE Chapter 5 Troubleshooting APPENDIX A Product Support and Contact Information Most problems can be solved by referring to the Troubleshooting section in the Users Manual If you cannot resolve the problem with the Troubleshooting chapter please contact the dealer where you purchased this product Contact Billion WORLDWIDE http www billion com Mac OS is a registered Trademark of Apple Computer Inc Windows 98 Windows NT Windows 2
56. d will limit the speed of the application that you identified The speed can be specified in multiple of 32kbps 00 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Virtual Server Port Forwarding In TCP IP and UDP networks a port is a 16 bit number used to identify which application program usually a server incoming connections should be delivered to Some ports have numbers that are pre assigned to them by the IANA the Internet Assigned Numbers Authority and these are referred to as well known ports Servers follow the well known port assignments so clients can locate them If you wish to run a server on your network that can be accessed from the WAN i e from other machines on the Internet that are outside your local network or any application that can accept incoming connections e g Peer to peer P2P software such as instant messaging applications and P2P file sharing applications and are using NAT Network Address Translation then you will usually need to configure your router to forward these incoming connection attempts using specific ports to the PC on your network running the application You will also need to use port forwarding if you want to host an online game server The reason for this is that when using NAT your publicly accessible IP address will be used by and point to your router which then needs to deliver all traffic to the private IP addresses used by your P
57. e ee ee Re ee Re ee ee ee ee Re ee ee ee ee ee ee ee Re ee ee ee 15 INFORMATION FROM YOUR SP eeuse seven eisers ke Need e dek Ke RR Ke Ne GN ee ede ev e GR eN eek EE ENE Fe N GE 16 CONFIGURING WITH YOUR WEB BROWSER vise n n sen n eee n ese n kak Kak Ke RR EER KEER KEER K RS EK KEER KEGR KEER KERSE KS 17 CHAPTER 4 CONFIGURATION 18 SATUS ER OE EE EE EE EO 19 NE EO EE EE EE EE 19 ROUINO Table s o iss N ee ee n Re ee ee Ee De Se ee 20 DIEP ODE ae ee GEE ee Ge ee ee Ge ee 21 E Leased Table ee ee ee ee ee ee ee ee ee ee 21 E Expired Table ee ee ee ee ee ee ee ee ee 21 Table of Contents i E Permanent Table ESE SEE EE ESE GEE EE GE nanana 21 YES RE N N EE EE EE 22 P CE o ul OE EE EE E 25 BE Sc EE EE EE EE ON N 24 Bio Ge OS RE EE EE N 24 ai E o AR EE EE ET Te 25 Eie a Ee lelie N EE N 25 ME oi OR N 26 OU IN den et etuanratan tpt Dirty Atos A E ahd annsteatoinnAneaouRineanis 20 8e Ad EE EE 27 CONFIGURATION seciueimectursusvnscaauewonsttadvvzcevarsaeuscvavansuvsvantvtetunimansareitarantaiiuevatuisiistaumneavannieanies 29 LAN Local Area IS AV Assets aseewin oe ee Ge oe ED EG Ee 29 E Ethernet ccccccccccccccccccccccccccceceeeceeeeceeeecceccenncececceeceececeeeeeeeeeeeeeeeteteeeetees 29 E Port Setting cece ee ee ee ee ee ee ee ee ee ee ee 29 E Port Setting ooo ie ee ee ee ee ee ee ee ee ee ee ee ee ee 30 E DHCP Server ie ee ee ee ee ee ee ee ee ee ee ee ee ee 31 WAN Wide Area Meek onse ee oe ee RA eo ee
58. enable PFS using Diffie Hellman public key cryptography to change encryption keys during the second phase of VPN negotiation This function will provide better security but extends the VPN negotiation time Diffie Hellman is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups Pre shared Key This is for the Internet Key Exchange IKE protocol a string from 4 to 128 characters Both sides should use the same key IKE is used to establish a shared security policy and authenticated keys for services such as IPSec that require a key Before any IPSec traffic can be passed each router must be able to verify the identity of its peer This can be done by manually entering the pre shared key into both sides router or hosts 19 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring a Remote Access PPTP VPN Dial in Connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft s VPN Adapter included with Windows 2000 ME etc The router is installed in the head office connected to a couple of PCs and Servers Office LAN Public IP 61 56 158 112 192 168 1 254 Remote Worker Router Encryption Data PPTP Client a Eee P
59. ers DHCP relay functions The DHCP protocol allows your router to dynamically assign IP addresses to PCs on your network if they are configured to obtain IP addresses automatically DHCP Server Configuration Disable DHCP Server Mode DHCP Server O DHEP Relay Agent DHCP Server Status Allow Bootp true Allow Unknown Clrents true Enable true Subnet Definitions subnet Value 192 168 1 0 Subhetmask 255 Aas Aa 0 Maximum Lease Time ob400 seconds Default Lease Time 432400 seconds Use local host address as DNS server true Use local host address as default gateway true Get subnet trom IF interface Iplan IF Range 792 766 7 700 14 1665 1 169 Option domain name servers 0 0 0 0 To disable the router s DHCP Server check Disabled and click Next then click Apply When the DHCP Server is disabled you will need to manually assign a fixed IP address to each PCs on your network and set the default gateway for each PCs to the IP address of the router by default this is 192 168 1 254 To configure the router s DHCP Server check DHCP Server and click Next You can then configure parameters of the DHCP Server including the IP pool starting IP address and ending IP address to be allocated to PCs on your network lease time for each assigned IP address the period of time the IP address assigned will be valid DNS IP address and the gateway IP address These details are sent to the DHCP client i e your PC when it requests an IP addres
60. estore Restart and User Management E Time Zone Time Zone Parameters Time Fone Enable Disable Time Zone List By City By Time Difference Local Time Zone GMT Time GMT Greenwich Mean Time v carl css gov time nist gov india colorado edu time b nist gov Daylight Saving v Automatic Resyne Period 1440 minutes SMTP Server P Address Y The router does not have a real time clock on board instead it uses the Simple Network Time Protocol SNTP to get the current time from an SNTP server outside your network Choose your local time zone click Enable and click the Apply button After a successful connection to the Internet the router will retrieve the correct local time from the SNTP server you have specified If you prefer to specify an SNTP server other than those in the drop down list simply enter its IP address as shown above Your ISP may provide an SNTP server for you to use Resync Poll Interval in minutes is the periodic interval the router will wait before it re synchronizes the router s time with that of the specified SNTP server In order to avoid unnecessarily increasing the load on your specified SNTP server you should keep the poll interval as high as possible at the absolute minimum every few hours or even days 45 Chapter 4 Configuration Billion BI
61. ettings Packet Filter Intrusion Detection MAC Address Filter URL Filter and Firewall Log 52 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E General Settings You can choose not to enable Firewall to add all filter rules by yourself or enable the Firewall using preset filter rules and modify the port filter rules as required The Packet Filter is divided into two sections Port Filters and Address Filters used to filter packets based on Applications Port or IP addresses There are four options when you enable the Firewall they are AI blocked User defined no pre defined port or address filter rules by default meaning that all inbound Internet to LAN and outbound LAN to Internet packets will be blocked Users have to add their own filter rules for further access to the Internet High Medium Low security level the pre defined port filter rules for High Medium and Low security are displayed in Port Filters of Packet Filter Select either High Medium or Low security level to enable the Firewall The only difference between these three security levels is the preset port filter rules in the Packet Filter Firewall functionality is the same for all levels it is only the list of preset port filters that changes between each setting lf you choose of the preset security levels and then add custom filters you may temporarily disable the firewall and recover your custom filter setting
62. f attacks Default value is 600 seconds Victim Protection If enabled IDS will block Smurf attack attempts Default is false Max TCP Open Handshaking Count This is a threshold value to decide whether a SYN Flood attempt is occurring or not Default value is 100 TCP SYN per seconds 60 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Max PING Count This is a threshold value to decide whether an ICMP Echo Storm is occurring or not Default value is 15 ICMP Echo Requests PING per second Max ICMP Count This is a threshold to decide whether an CMP flood is occurring or not Default value is 100 ICMP packets per seconds except ICMP Echo Requests PING For SYN Flood ICMP Echo Storm and ICMP flood IDS will just warn the user in the Event Log It cannot protect against such attacks Table 2 Hacker attack types recognized by the IDS Type of Intrusion Name _ Detect Parameter Blacklist Block Duration Ascend kill Ascend Kill data Src IP DoS Yes Yes TCP WinNuke Port 135 137 139 DoS Yes Yes Flag URG ICMP type 8 Victim Des IP is broadcast Protection Land attack SrclIP DstIP UDP Echo Port and Echo CharGen Scan CharGen Port UDP Dst Port Echo 7 UDP Dst Port CharGen Scan CharGen 19 TCP Flag Xmas IMAP TCP Flag SYN FIN SYN FIN Scan DstPort IMAP 143 SrcPort 0 or 65535 TCP SYN FIN RST ACK No Existing session And Scan Hosts more than five TCP No Exist
63. f time 0 means this connection is always on Click Apply after changing settings 68 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router LAN to LAN PPTP Connection PPTP LAN to LAN Connection Mame Dial out Server IP Address or Hostname fF OE YPE Dial in Private IF Address Assigned to Dialin User fF OE Peer Network IF Netmask Po Username ll Password Auth Type ChaplAuto Data Encryption Key Length Mode Idle Timeout DO minutes Apply Connection Name A user define description of the connection Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server When configuring your router establish the connection to a remote LAN enter the remote Server IP Address or Hostname you wish to connection to When configuring your router as a server to accept incoming connections enter the Private IP Address Assigned to Dial in User address Peer Network IP Enter Peer network IP address Netmask Enter the subnet mask of peer network based on the Peer Network IP setting Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user server enter your own username Password If you are a Dial Out user client enter the password provided by the your Host If you are a Dial In user server enter
64. figuring a Remote Access PPTP VPN Dial out Connection A company s office establishes a PPTP VPN connection with a file server located at a separate location The router is installed in the office connected to a couple of PCs and Servers Offic e LAN Public IF 69 121 1 33 192 168 1 254 Gener Router Encryption Data PPIP server I Iii PPIP Client VPN Connection 192 168 1 0 24 PPTP VPN Remote Access Dial out Configuring the PPTP VPN in the Office You can either input the IP address 69 1 121 33 in this case or hostname to reach the server PPTP Remote Access Connection Connection Mame YPR_PPTP Dial out Server IP Address for Hostname 69 121 1 33 es be Dial in Private IF Address Assigned to Dialin User EK Username Password an e Auth Type ChapiAutoj Data Encryption key Length Mode 4 Idle Timeout O minutee Function Description VPN_PPTP Given name of PPTP connection Dialout Check Dial out 2 Server IP Address or Hostname Username username A given username amp password 123456 Chapter 4 Configuration 69 121 1 33 An Dialed server IP 82 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Auth Type Chap Auto Keep as default value in most of the cases PPTP server amp client will determine the value automatically Refer to manual for details if you Mode want to change the setting The connection will be disconnected when there
65. ge Discover Primary Secondary DNS This setting enables disables whether the primary secondary DNS server address is requested from a remote PPP peer using IPCP The default setting for this command is enabled Give DNSto Relay Controls whether the PPP Internet Protocol Control Protocol IPCP can request the DNS server IP address for a remote PPP peer Once IPCP has discovered the DNS server IP address it automatically gives the address to the local DNS relay so that a connection can be established 40 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Give DNSto Client Controls whether the PPP Internet Protocol Control Protocol IPCP can request a DNS server IP address for a remote PPP peer Once IPCP has discovered the DNS server IP address it automatically gives the address to the local DNS client so that a connection can be established Give DNSto DHCP Server Similar to the above but gives the DNS server address to the DHCP server Discover Primary NBNS Discover Secondary NBNS This setting enables disables whether the primary secondary NBNS server address is requested from a remote PPP peer using IPCP The default setting for this command is disabled Discover Subnet Mask Specifies if the subnet mask given by IPCP negotiation process is to be used Give Subnet Mask To DHCP Server Enable to change your DHCP Server settings by using the given information in IPCP negotiation process
66. he Internet Server Provider ISP automatically or not Please click Obtain an IP address automatically via DHCP client to enable the DHCP client function or click Specify an IP address to disable the 35 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router DHCP client function and specify the IP address manually The setting of this item is specified by your ISP Authentication Protocol Default is Chap Auto Your ISP will advise you whether to use Chap or Pap Connection Always on If you want the router to establish a PPPoE session when starting up and to automatically re establish the PPPoE session when disconnected by the ISP Connect to Demand If you want to establish a PPPoE session only when there is a packet requesting access to the Internet i e when a program on your computer attempts to access the Internet Idle Timeout Auto disconnect the broadband firewall gateway when there is no activity on the line for a predetermined period of time Detail You can define the destination port and packet type TCP UDP without checking by timer It allows you to set which outgoing traffic will not trigger and reset the idle timer RIP RIP v1 RIP v2 and RIP v2 Multicast Check to enable RIP function MTU Maximum Transmission Unit The size of the largest datagram excluding media specific headers that IP will attempt to send through the interface Advanced Options PPPoE LLC
67. hether to enable PFS using Diffie Hellman public key cryptography to change encryption keys during the second phase of VPN negotiation This function will provide better security but extends the VPN negotiation time Diffie Hellman is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups Pre shared Key This is for the Internet Key Exchange IKE protocol a string from 4 to 128 characters Both sides should use the same key IKE is used to establish a shared security policy and authenticated keys for services such as IPSec that require a key Before any IPSec traffic can be passed each router must be able to verify the identity of its peer This can be done by manually entering the pre shared key into both sides router or hosts Select the Save button to save the setting 73 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Advanced Option Click Advanced Option to change the following settings IPSec IPSec Configuration Local ID Type Remote ID Type Identifier N DA Lifetime Phase 1 IKE 240 Phase 2 P Sec IKE Mode Select IKE mode to Main mode or Aggressive mode Local ID Type Specify local ID type Content Input ID s information like domain name ww
68. ication Diagram of 8500 8520 Thank you for your purchase and welcome to the world of broadband Internet Chapter 1 Introduction Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Chapter 2 Installing the Router Important note for using the BIPAC 8500 8520 SHDSL Router DO NOT use the BIPAC 8500 8520 in high humidity or high temperatures DO NOT use the same power source for the BIPAC 8500 8520 as other equipment Warning DO NOT open or repair the case yourself If the BIPAC 8500 8520 is too hot turn off the power immediately and have it repaired at a qualified service center Place the BIPAC 8500 8520 on a stable surface Only use the power adapter that comes with the package Using a different voltage rating power adaptor may damage the router Attention Package Contents BIPAC 8500 8520 SHDSL Router CD ROM containing the online manual RJ 11 SHDSL telephone Cable Console PS2 RS232 Cable oO Ethernet CAT 5 LAN Cable G AC DC power adapter 12V DC 1A Q Quick Start Guide Chapter 2 Installing the Router Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router The Front LEDs of BIPAC 8500 Lit when the system is ready Chapter 2 Installing the Router Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router The Front LEDs of BIPAC 8520
69. ilter Type Al w spanning Bridge Interface Enable Disable VPI and VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer Encapsulation method Select the encapsulation format this is provided by your ISP Ether Filter Type Specify the type of ethernet filtering performed by the named bridge interface All Allows all types of ethernet packets through the port ip Allows only IP ARP types of ethernet packets through the port Allows only PPPoE types of ethernet packets through the port Spanning Bridge Interface Enable Disable spanning tree function of modem 38 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router PPPoA Routed Connections WAN Connection PPPoA Routed Description vc ATM Class LIBR w MAT Enable Disable BE ETE means Obtain an IF address automatically Authentication Protocol ChapiAuto Connection Idle Timeout 0 minutes Details RIP LJ RIP yt L RIP L RIP v2 Multicast Apply Advanced Options O Description User definable name for the connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single IP account sharing a single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can
70. imum TOP Open Handshakmg Count 100 per second Maximum Ping Count 15 per second Maximum ICMP Count 100 per second Apply Clear Blacklist The routers Intrusion Detection System IDS is used to detect hacker attacks and intrusion attempts from the Internet If the IDS function of the firewall is enabled inbound packets are filtered and blocked depending on whether they are detected as possible hacker attacks intrusion attempts or other connections that the router determines to be SUSPICIOUS Blacklist If the router detects a possible attack the source IP or destination IP address will be added to the Blacklist Any further attempts using this IP address will be blocked for the time period specified as the Block Duration The default setting for this function is false disabled Some attack types are denied immediately without using the Blacklist function such as Land attack and Echo CharGen scan Block Duration DoS Attack Block Duration This is the duration for blocking hosts that attempt a possible Denial of Service DoS attack Possible DoS attacks this attempts to block include Ascend Kill and WinNuke Default value is 1800 seconds Scan Attack Block Duration This is the duration for blocking hosts that attempt a possible Scan attack Scan attack types include X mas scan IMAP SYWN FIN scan and similar attempts Default value is 86400 seconds Victim Protection Block Duration This is the duration for blocking Smur
71. ing session DstPort Net Bus 12345 12346 3456 i UDP DstPort Back Orifice Scan Orifice Port 31337 Max TCP Open SYN Flood Handshaking Count Default 100 c sec Max ICMP Count ICMP Flood Default 100 c sec Max PING Count Drop Packet Show Log Net Bus Scan da Default 15 c sec Src IP Source IP Src Port Source Port Dst Port Destination Port Dst IP Destination IP 61 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E MAC Address Filter A MAC Media Access Control address is the unique network hardware identifier for each PC on your networks interface i e its Network Interface Card or Ethernet card Using your router s MAC Address Filter function you can configure the switch to only accept traffic from specified machines or else to block specific machines from accessing your LAN There are no pre defined MAC address filter rules you can add the filter rules to meet your requirements MAC Address Filter Filtering Rules MAC Address Filter For LAN ethernet frames only the following Source MAC Address es are MAC Address Enable Disable O Allowed Blocked 00 00 00 00 00 00 N Enable Disable To enable or disable the MAC Address Filter function Allowed Blocked To allow or block the following MAC addresses to surf outside network only If you check Allowed please be sure your PC s MAC address is listed If you check
72. interface Please see the Advanced section of this manual for more information 12 Chapter 4 Configuration Chapter 5 Troubleshooting If the router is not functioning properly first check this chapter for simple troubleshooting before contacting your service provider or Billion support Problems starting up the router None of the LEDs are Check the connection between the adapter and the router If the error on when you turn on persists you may have a hardware problem In this case you should the router contact technical support You have forgotten Try the default login and password please refers to Chapter 3 If this fails your router login you can restore your router to its factory settings by holding the Reset and or password button on the back of your router for 6 seconds above Problems with the WAN Interface Initialization of the Ensure that the telephone cable is connected properly from the SHDSL port to the wall jack The SHDSL LED on the front panel of the router PVC connection linesync failed should be on Check that your VPI VCI encapsulation type and type of multiplexing settings are the same as those provided by your ISP Reboot the router GE If you still have problems you may need to verify these settings with your ISP ING Chapter 5 Troubleshooting Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Frequent loss of Ensure that all other devi
73. iod of time 0 means this connection is always on Click Apply after changing settings 70 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router IPSec Click Create to configure a new IPSec VPN connection Chapter 4 Configuration 71 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configure a new VPN Connection IPSec Create Local Single Address IP Address 0000 Netvvork O Subnet IP Address fs Netmask fs OIP Range IP Address Cn IP Remote secure Gateway Addressinr Hostname PY Single Address IP Address 0000 Netvvork O Subnet IP Address Ps Netmask Po OIP Range IPAddess si End PO Proposal Authentication ees Encryption OAH Authentication Perfect Forward Secrecy Pre shared Key Po Connection Name A user defined name for the connection e g connection to office Local Local Network Set the IP address subnet or address range of the local network Single Address The IP address of the local host Subnet The subnet of the local network For example IP 192 168 1 0 with netmask 255 255 255 0 specifies one class C subnet starting from 192 168 1 1 i e 192 168 1 1 through to 192 168 1 254 IP Range The IP address range of the local network For example IP 192 168 1 1 end IP 192 168 1 10 Remote Secure Gateway Address or hostname The IP address or hostname of the remote VPN device that is connected and establishes a V
74. ivate IP Address Assigned to Dialin User 00000 Connection Mame Username Po Password Po Auth Type haplAuto ldle Timeout O mintes IPSec Enable Authentication Mone Encryption NULL w Perfect Forward Secrecy Mone l Pre shared Key Connection Name This allows you to identify this particular connection e g Connection to office Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server When configuring your router as a Client enter the remote Server IP Address or Hostname you wish to connection to When configuring your router as a server enter the Private IP Address Assigned to Dial in User address Username If you are a Dial Out user client enter the username provided by your Host If you are a Dial In user server enter your own username Password If you are a Dial Out user client enter the password provided by your Host lf you are a Dial In user Server enter your own password PPP Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using
75. ivate IP Address Assigned to Dialin User fs Peer Network IF 18216810 16a 1 0 Hetmask Jsername Username Password Auth Type amp Idle Timeout O minutes O Pger ee PERSIE z A EE MD5 MEEN EE 2 Encryption 3DES w OD Perfect Forward Secrecy None Pre shared Key 12345678 nauk Item Function Description 1 Connection Name BranchOffice Given a name of L2TP connection Dial out Check Dial out server IP Address 9 121 1 33 IP address of the head office router in WAN side or Hostname Peer Network IP 192 168 1 0 Head office network 255 255 255 0 Input username amp password to authenticate branch office 123456 sees O Auth Type Chap Auto Keep as default value in most of the cases The connection will be disconnected when there Is no emo Timeout traffic in a predefined period of time Idle time 0 means the connection is always on cine Enable for enhancing your L2TP VPN security ak Encryption 3DES Perfect Forward Both sites should use the same value Secrecy pone Pre shared Key 12345678 97 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router QoS Quality of Service QoS function helps you to control your network traffic for each application from LAN Ethernet and or Wireless to WAN Internet It facilitates you to control the different quality and speed of through put for each application when the system is running with full loading of ups
76. l Table which shows the mapping of Internet IP addresses to Ethernet MAC addresses This is useful as a quick way of determining the MAC address of the network interface of your PCs to use with the router s Firewall MAC Address Filter function See the Firewall section of this manual for more information on this feature ARP Table IP lt gt MAC List IP Address MAC Address Interface static 142 150 1 167 OU Oc be bd 11 ba plan na IP Address A list of IP addresses of devices on your LAN Local Area Network MAC Address The MAC Media Access Control addresses for each device on your LAN Interface The interface name on the router that this IP Address connects to Static Static status of the ARP table entry no for dynamically generated ARP table entries yes for static ARP table entries added by the user 19 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Routing Table Routing Table Routing Table Valid Destination Netmask sateway Interace Cost RIP Routing Table Destination Netmask Gateway Cost Routing Table Valid It indicates a successful routing status Destination The IP address of the destination network Netmask The destination netmask address Gateway lnterface The IP address of the gateway or existing interface that this route will use Cost The number of hops counted as the cost of the route RIP Routing Table Destination The IP address
77. me and password for this service Period Set the time period between updates for the Router to exchange information with the DDNS server In addition to updating periodically as per your settings the router will perform an update when your dynamic IP address changes 05 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Check Emails Check Email Parameters Check Email Enable Disable Account Mame Po POP3 Mail Server N Period minutes Dial out for Checking Emails Automatic This function allows you to have the router check your POP3 mailbox for new Email messages The Mail LED on your router will light when it detects new messages waiting for download You may also view the status of this function using the Status Email Checking section of the web interface which also provides details on the number of new messages waiting See the Status section of this manual for more information Disable Check to disable the router s Email checking function Enable Check to enable the routers Emailing checking function The following fields will be activated and required Account Name Enter the name login of the POP3 account you wish to check Normally it is the text in your email address before the symbol If you have trouble with it please contact your ISP Password Enter the accounts password POP3 Mail Server Enter your POP mail server name You Internet Service
78. n Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router For example if you set the port number 80 Web HTTP to be mapped to the IP Address 192 168 1 2 then all incoming HTTP requests from outside users will be forwarded to the local server PC with the IP address of 192 168 1 2 If the port is not listed as a predefined application you need to add it manually In addition to specifying the port number to be used you will also need to specify the protocol used The protocol used is determined by the particular application Most applications will use TCP or UDP however you can specify other protocols using the drop down Protocol menu Setting the protocol to all will cause all incoming connection attempts using all protocols on all port numbers to be forwarded to the specified IP address DMZ The DMZ Host is a local computer exposed to the Internet When setting a particular internal IP address as the DMZ Host all incoming packets will be checked by the Firewall and NAT algorithms then passed to the DMZ host when a packet received does not use a port number used by any other Virtual Server entries Using port forwarding does have security implications as outside users will be able to connect to PCs on your network For this reason you are advised to use specific Virtual Server entries just for the ports your application requires instead of simply using DMZ or create a Virtual Server entry for All protocols as doing so
79. nd click OK See Figure 3 13 Figure 3 12 TCP IP Microcolt TCPAP Properties IPAddress DNS WINS Address Rowing An IF address can be automaticaly sgread bo thie network card by a DHICP sever If your network does not have a DHCP server ask pour mebaok admnitrator io an address and theri hoe It im the space below Obtan an IP address irom a DHCP server C Specily an IP adders IP Ede es i Sub MM pe Figure 3 13 IP Address n Chapter 3 Basic Installation Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Factory Default Settings Before configuring your you need to know the following default settings Web Interface Username admin xX Password admin LAN Device IP Settings x IP Address 192 168 1 254 X Subnet Mask 255 255 255 0 ISP setting in WAN site xX PPPoE DHCP server x DHCP server is enabled xX Start IP Address 192 168 1 100 x P pool counts 100 Username and Password The default username and password are admin and admin respectively D If you ever forget the password to log in you may press the RESET button up to 6 seconds to restore the factory default settings Attention LAN and WAN Port Addresses The parameters of LAN and WAN ports are pre set in the factory The default values are shown below Ee je EE IP address 192 168 1 254 The PPPoE function is enabled to automatically get the WAN Subnet Mask 239 295
80. nfiguration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E DNS DNS Parameters A Domain Name System DNS contains a mapping table for domain name and IP addresses On the Internet every host has a unique and user friendly name domain name such as www billion com and an IP address An IP address is a 32 bit number in the form of xxx xxx xxx xxx for example 192 168 1 254 You can think of an IP address as a telephone number for devices on the Internet and the DNS will allow you to find the telephone number for any particular domain name As an IP Address is hard to remember the DNS converts the friendly name into its equivalent IP Address You can obtain a Domain Name System DNS IP address automatically if your ISP has provided it when you logon Usually wnen you choose PPPoE or PPPoA as your WAN ISP protocol the ISP will provide the DNS IP address automatically You may leave the configuration field blank Alternatively your ISP may provide you with an IP address of their DNS If this is the case you must enter the DNS IP address If you choose one of the other three protocols RFC1483 Routed Bridged and IPoA check with your ISP it may provide you with an IP address for their DNS server You must enter the DNS IP address if you set the DNS of your PC to the LAN IP address of this router 43 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router SHDSL SHDSL Parameters
81. nt Fdit Username admin Password zesse Confirm zesce Walid true You can change the users password whether their account is active and Valid as well as add a comment to each user account These options are the same when creating a user account with the exception that once created you cannot change the username You cannot delete the default admin account however you can delete any other created accounts by clicking Delete when editing the user You are strongly advised to change the password on the default admin account when you receive your router and any time you reset your configuration to Factory Defaults 50 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Firewall and Access Control Your router includes a full SPI Stateful Packet Inspection firewall for controlling Internet access from your LAN as well as helping to prevent attacks from hackers In addition to this when using NAT Network Address Translation Please see the WAN configuration section for more details on NAT the router acts as a natural Internet firewall as all PCs on your LAN will use private IP addresses that cannot be directly accessed from the Internet Internet A F pa oi Router Access Control Firewall ie i Unauthorized users amp applications Unwanted website ACCESS Unauthorized users amp applications Malicious attacks MAT Packet filter
82. on _ ____ 1 Connection Name BranchOffice Given a name of PPTP connection 2 Sener OE Check Dial out ER IE oes 69 121 1 33 IP address of the head office router in WAN side or Hostname Peer Network IP 192 168 1 0 ER EE 255 255 255 0 Input username amp password to authenticate branch 123456 office network Auth Type Chap Auto Keep as default value in most of the cases PPTP Data Encryption server amp client will determine the value automatically Refer to manual for details if you want to change the stateful setting The connection will be disconnected when there Is no Idle Time traffic in a predefined period of time Idle time 0 means the connection is always on 86 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring a IPSec LAN to LAN VPN Connection Branch Office Head Office Public IP Public IP 192 168 0254 69 121 1 30 6G9 121 1 3 192 168 1254 SW Sng A Router Router Encryption Data IPSec bis IPSec VPN Connection 192 168 1 0 24 192 168 0 0124 IPSec VPN LAN to LAN Table 3 Network Configuration and Security Plan Banc fice feao Both office LAN networks MUST in different subnet with LAN to LAN application Functions of Pre shared Key VPN Connection Type and Security Algorithm MUST BE identically set up on both sides Attention 87 Chapter 4 Configuration Billion BIPAC 8500 8520 SH
83. ort1 Connection Type Port Connection Type Auto v Forts Connection Type Auto v Ford Connection Type Auto v Pd TOS Priority Control O Enable Disable Set High Priority TOS Ee HE EE HA KA HA HA p Port Connection Type Five options to choose from Auto 10M half duplex 10M full duplex 100M half duplex or 100M full duplex Sometimes there are Ethernet compatibility problems with legacy Ethernet devices and you can configure different types to solve compatibility issues The default is Auto which users should keep unless there are specific problems with PCs not being able to access your LAN IPv4 TOS priority Control Advanced users TOS Type of Services is the 2 octet of an IP packet Bits 6 7 of this octet are reserved and bit 0 2 are used to specify the priority precedence of the packet and bits 3 5 are specified the delay throughput and reliability This feature uses bits 0 2 to classify the packet s priority If the packet is high priority it will flow first Therefore when this feature is enabled the router s Ethernet switch will check the 2nd octet of each IP packet If the value in the Precedence of TOS field matches the checked values in the table 0 to 7 this packet will be treated as high priority 30 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E DHCP Server You can disable or enable the DHCP Dynamic Host Configuration Protocol server or enable the rout
84. pter Add Remove i Primary Network Logon Microsoft Family Logon 7 File and Print Sharing Description TEP4IP is the protocol you use to connect to the Internet and wide area networks OK Cancel Figure 3 9 TCP IP TCP IP Properties x Bindings Advanced NetBIOS DNS Configuration Gateway WINS Configuration P Address An IP address can be automatically assigned to this computer If your network does not automatically assign IP addresses ask your network administrator for an address and then type it in the space below Specify an IP address CY rr CY rr IP Address Subret tl ast Cancel Figure 3 10 IP Address TCP IP Properties 2 xi Bindings Advanced NetBIOS DNS Configuration Gateway WINS Configuration IP Address Cancel Figure 3 11 DNS Configuration 13 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router For Windows NT4 0 fae 2 Identiicaion Services Protocols Adapters Binding Network Protocols Y NetBEUI Protocol y NWLink IPX SPX Compatible Transport 1 Go to Start Settings Control Panel In the Control wenn Panel double click Network and choose the Protocols tab aa Description 2 Select TCP IP Protocol and click Properties See rea trok protocol that proves comunicaron aces Figure 3 12 3 Select the Obtain an IP address from a DHCP server radio button a
85. r Warning 47 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Backup Restore Backup Restore Allows you to backup the configuration settings to your computer or restore configuration from your computer Backup Configuration Backup configuration to your computer Restore Configuration Configuration File Browse Restore wi overnite the current configuration and restart the device If you want to keen the current conhiguvation Please use backun frst to save current configuration These functions allow you to save and backup your router s current settings to a file on your PC or to restore a previously saved backup This is useful if you wish to experiment with different settings Knowing that you have a backup handy in the case of any mistakes It is advisable to backup your router s settings before making any significant changes to your router s configuration Press Backup to select where on your local PC to save the settings file You may also change the name of the file when saving if you wish to keep multiple backups Press Browse to select a file from your PC to restore You should only restore settings files that have been generated by the Backup function and that were created when using the current version of the router s firmware Settings files saved to your PC should not be manually edited in any way After selecting the settings file you wish to use pressing Re
86. r Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Cabling One of the most common causes of problems is bad cabling or SHDSL line s Make sure that all connected devices are turned on On the front of the product is a bank of LEDs Verify that the LAN Link and SHDSL line LEDs are lit If they are not verify that you are using the proper cables Ensure that all other devices connected to the same telephone line as your Billion router e g telephones fax machines analogue modems have a line filter connected between them and the wall socket unless you are using a Central Splitter or Central Filter installed by a qualified and licensed electrician and ensure that all line filters are correctly installed and the right way around Missing line filters or line filters installed the wrong way around can cause problems with your SHDSL connection including causing frequent disconnections Chapter 2 Installing the Router Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Chapter 3 Basic Installation The router can be configured with your web browser A web browser is included as a standard application in the following operating systems Linux Mac OS Windows 98 NT 2000 XP Me etc The product provides a very easy and user friendly interface for configuration PCs must have an Ethernet interface installed properly and be connected to the router either directly or through an external repeater hub and have TCP IP ins
87. rward Secrecy Mone l Pre shared Key Connection Name A user define description of the connection Type Check Dial Out if you want your router to operate as a client connecting to a remote VPN server e g your office server check Dial In operates as a VPN server When configuring your router establish the connection to a remote LAN enter the remote Server IP Address or Hostname you wish to connection to When configuring your router as a server to accept incoming connections enter the Private IP Address Assigned to Dial in User address Peer Network IP Enter Peer network IP address Netmask Enter the subnet mask of peer network based on the Peer Network IP setting Username If you are a Dial Out user client enter the username provided by your Host lf you are a Dial In user Server enter your own username Password If you are a Dial Out user client enter the password provided by the your Host If you are a Dial In user server enter your own password PPP Authentication Type Default is Auto if you want the router to determine the authentication type to use or else manually specify CHAP Challenge Handshake Authentication Protocol or PAP Password Authentication Protocol if you know which type the server is using when acting as a client or else the authentication type you want clients connecting to you to use when acting as a server When using PAP the password is sent unencrypted whilst CHAP encrypt
88. ryption method Perfect Forward Secrecy Choose whether to enable PFS using Diffie Hellman public key cryptography to change encryption keys during the second phase of VPN negotiation This function will provide better security but extends the VPN negotiation time Diffie Hellman is a public key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel i e over the Internet There are three modes MODP 768 bit MODP 1024 bit and MODP 1536 bit MODP stands for Modular Exponentiation Groups Pre shared Key This is for the Internet Key Exchange IKE protocol a string from 4 to 128 characters Both sides should use the same key IKE is used to establish a shared security policy and authenticated keys for services such as IPSec that require a key Before any IPSec traffic can be passed each router must be able to verify the identity of its peer This can be done by manually entering the pre shared key into both sides router or hosts Uf Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router LAN to LAN L2TP Connection L2TP LAN to LAN Connection Mame Dial out Server IP Address or Hostname Po Hs O Dial in Private IP Address Assigned to Dialin User Po Peer Network IP PY Netmask Ps Username Po Password PF e Auth Type ChaplAuta v Idle Timeout D minutes IPSec Enable Authentication Mone Encryption MULL ha Perfect Fo
89. s by re selecting the same security level The Block WAN Request is a stand alone function and not relate to whether security enable or disable Mostly it is for preventing any scan tools from WAN site by hacker General Settings Firewall Security Security O Enable Disable All blocked Userdetined High security level Policy Medium security level Low security level Ns some apnicatians cannot work after enabling Firewall please check the Packet Fiter especially Port Fiter rules For example adding TCP 443 outbound alowed wil ist AIT PS data go Hough Firewall Block WAN Request O Enable Disable LAAN Enable for preventing any ning test from Internet such as hacker attack WOTE Any remote user who is attempting to perform this action may result in blocking all the accesses to configure and manage of the device from the Internet 53 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Packet Filter Port Filters 2 Chapter 4 Configuration 54 Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Port Filters The pre defined port filter rules for High Medium and Low security levels are listed See Table 1 Table 1 Pre defined Port Filter Port Number Firewall High Firewall Medium Firewall Low Application Protocol Start End Inbound Outbound Inbound JOutbound lInbound Outbound HT TP 80 TCP 6 80 80 NO YES NO YES NO YES sjaje
90. s from the DHCP server Click Apply to enable this function If you check Use Router as a DNS Server the SHDSL Router will perform the domain name lookup find the IP address from the outside network automatically and forward it back to the requesting PC in the LAN your Local Area Network 31 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router If you check DHCP Relay Agent and click Next then you will have to enter the IP address of the DHCP server which will assign an IP address back to the DHCP client in the LAN Use this function only if advised to do so by your network administrator or ISP Click Apply to enable this function 32 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router WAN Wide Area Network WAN refers to your Wide Area Network connection i e your router s connection to your ISP and the Internet There are two items within the WAN section ISP DNS and SHDSL E ISP WAN Connection WAN Services Table Mame Description Creator FI WE wanlink PPPoE WAN Link Factory Defaults 0 32 Edit Change The factory default is PPPoE If your ISP uses this access protocol click Edit to input other parameters as below If your ISP does not use PPPoE you can change the default WAN connection entry by clicking Change 33 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router RFC 1483 Routed Connections WA
91. s the password before sending and also allows for challenges at different periods to ensure that the client has not been replaced by an intruder 78 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Idle Time Auto disconnect the VPN connection when there is no activity on the connection for a predetermined period of time 0 means this connection is always on Click Apply after changing settings IPSec Enable for enhancing your LT2P VPN security Authentication Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit There are three options Message Digest 5 MD5 Secure Hash Algorithm SHA 1 or NONE SHA 1 is more resistant to brute force attacks than MD5 however it is slower MD5 A one way hashing algorithm that produces a 128 bit hash SHA 1 A one way hashing algorithm that produces a 160 bit hash Encryption Select the encryption method from the pull down menu There are four options DES 3DES AES and NONE NONE means it is a tunnel only with no encryption 3DES and AES are more powerful but increase latency DES Stands for Data Encryption Standard it uses 56 bits as an encryption method 3DES Stands for Triple Data Encryption Standard it uses 168 5673 bits as an encryption method AES Stands for Advanced Encryption Standards it uses 128 bits as an encryption method Perfect Forward Secrecy Choose whether to
92. ses the following items v Client for Microsoft Networks w r File and Printer Sharing for Microsoft Networks QoS Packet Scheduler ad Internet Protocol TCP IP Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected Figure 3 3 TCP IP Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses Figure 3 4 IP Address amp DNS Configuration 11 Chapter 3 Basic Installation Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router For Windows 2000 Go to Start Settings Control Panel In the Control Panel double click Network and Dial up Connections Double click Local Area LAN Connection See Figure 3 5 In the LAN Area Connection Status window click Properties See Figure 3 6 Select Internet Protocol and click Properties See Figure 3 7 TCP IP Select the Obtain an IP address automatically and Obtain DNS ser
93. ssfor Hostname 2 Single Address F1 121 1 3 Netmask 255 255 255 0 2 Netmask 255 255 255 0 NetWork Subnet IP Address orau Pases OEP Proposal oe ES Ed Authentication gore si ESP 7 m Encryption 5 i OAH Authentication F Perfect Forward Secrecy ws N aa Advanced Options Description Connection Name o Given a name of IPSec connection 1 o pa ear Check Subnet radio button IP Address 192 168 0 0 Branch office network 255 255 255 0 IP address of the head office router in Secure Gateway Address Ea or Hostname di WAN side Subnet TT Check Subnet radio button resp fone ES Prado baton 5 Encryption 3DES Head office network Security plan 89 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Example Configuring a Remote Access L2TP VPN Dial in Connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft s VPN Adapter included with Windows XP 2000 ME etc The router is installed in the head office connected to a couple of PCs and Servers Office LAN Public IP 61 56 158 112 192 168 1 254 Remote Worker Router Encryption Data L2TP Client _ oe N ee P Server VPN Connection 1921681024 L2TP VPN Remote Access Dial in 90 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Configuring L2TP VPN in the Office The input I
94. store will load those settings into the router 48 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Restart Router Click Restart with option Current Settings to reboot your router and restore your last saved configuration Restart Router After restarting Please wait for several seconds to let the system Current Settings Restart Router with Factory Default Settings If you wish to restart the router using the factory default settings for example after a firmware upgrade or if you have saved an incorrect configuration select Factory Default Settings to reset to factory default settings You may also reset your router to factory settings by holding the small Reset pinhole button on the back of your router in for 10 12 seconds whilst the router is turned on 49 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E User Management User Management Current Defined Users Valid ser Comment true admin Default admin user Edit Create 2 In order to prevent unauthorized access to your router s configuration interface it requires all users to login with a password You can set up multiple user accounts each with their own password You are able to Edit existing users and Create new users who are able to access the device s configuration interface Once you have clicked on Edit you are shown the following options User Manageme
95. t for www sex or www sex com will be dropped because sex com is in the forbidden list Domains Filtering Domain Name Type Trusted Domain Name EE E E EE N eet whit abo com Delete ree Name N Ba N N air se ar Return 3 Restrict URL Features Block Java Applet This function can block Web content which including the Java Applet It is for preventing someone who wants to damage your system via standard HTTP protocol e Block surfing by IP address Preventing someone who uses the IP address as URL for skipping Domains Filtering function 64 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E Firewall Log Firewall Log Event will be shown in the Status Event Log Filtering Lag O Enable Disable Intrusion Log O Enable Disable URL Blocking Lag O Enable Disable Firewall Log display log information of any unexpected action with your firewall settings Check the Enable box to activate the logs Log information can be seen in the Status Event Log after enabling Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router VPN Virtual Private Networks Your router support three main types of VPN Virtual Private Network PPTP IPSec and L2TP and these are the two major section choices from the menu on the left PPTP PPTP VPN PPTP for Remote Access Application Enable Disable Name Type Status VPH PPITP for L
96. talled and configured to obtain an IP address through a DHCP server or a fixed IP address that must be in the same subnet as the router The default IP address of the router is 192 168 1 254 and the subnet mask is 255 255 255 0 i e any attached PC must be in the same subnet and have an IP address in the range of 192 168 1 1 to 192 168 1 253 The best and easiest way is to configure the PC to get an IP address automatically from the router using DHCP If you encounter any problems accessing the router s web interface it may also be advisable to uninstall any kind of software firewall on your PCs as they can cause problems accessing the 192 168 1 254 IP address of the router Users should make their own decisions on how to best protect their network Please follow the steps below for your PC s network environment installation First of all please check your PC s network components The TCP IP protocol stack and Ethernet network adapter must be installed If not please refer to your Windows related or other operating system manuals MV DT E Any TCP IP capable workstation can be used to communicate with or through the BIPAC 8500 8520 To configure other types of workstations please consult the manufacturer s documentation Connecting your router 1 Connect the Router to a LAN Local Area Network and the SHDSL telephone network 2 Power on the device 3 Make sure the PWR and SYS LEDs are lit steadily and that the relevant LAN LE
97. tandard Supports downstream and upstream transmission rates of up to 2 3Mbps It also supports rate management that allows SHDSL subscribers to select an Internet access speed suiting their needs and budgets It is ITU standard PAM16 Line Code complies with G 991 2 and G 994 1 standards Supports Annex A and B mode operation Fast Ethernet Switch A 4 port 10 100Mbps fast Ethernet switch is built in with automatic switching between MDI and MDI X for 10Base T and 100Base TX ports An Ethernet straight or cross over cable can be used directly for auto detection Multi Protocol to Establish A Connection Supports PPPoA RFC 2364 PPP over ATM Adaptation Layer 5 RFC 1483 encapsulation over ATM bridged or routed PPP over Ethernet RFC 2516 and IPoA RFC1577 to establish a connection with the ISP The product also supports VC based and LLC based multiplexing Quick Installation Wizard Supports a WEB GUI page to install this device quickly With this wizard end users can enter the information easily which they get from their ISP then surf the Internet immediately Universal Plug and Play UPnP and UPnP NAT Traversal This protocol is used to enable simple and robust connectivity among stand alone devices and PCs from many different vendors It makes network simple and affordable for users UPnP architecture leverages TCP IP and the Web to enable seamless proximity networking in addition to control and data transfer among networked devices
98. terface 34 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router PPPoE Connections WAN Connection PPPoE Routed Description ve ATM Class UBR ov MAT Enable O Disable Username Password Service Name dii U U U U means Obtain an IF address automatically Authentication Protocol GhapiAuta Connection Idle Timeout 0 O S minutes Details RIP LJ RIP vt L RIP v2 LJ RIP v2 Multicast Apply Advanced Options Description A user definable name for this connection VPI VCI Enter the information provided by your ISP ATM Class The Quality of Service for ATM layer NAT The NAT Network Address Translation feature allows multiple users to access the Internet through a single ISP account sharing a single IP address If users on your LAN have public IP addresses and can access the Internet directly the NAT function can be disabled Username Enter the username provided by your ISP You can input up to 128 alphanumeric characters case sensitive This will usually be in the format of username ispname instead of simply username Password Enter the password provided by your ISP You can input up to 128 alphanumeric characters case sensitive Service Name This item is for identification purposes If it is required your ISP will provide you the information Maximum input is 20 alphanumeric characters IP Address specify if the Router can get an IP address from t
99. tream You can find two items under the QoS section Prioritization and IP Throttling bandwidth management 98 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Prioritization There are three priority settings to be provided in the modem High Normal The default is normal priority for all of traffic without setting Low The trigger of check can base on IP protocol port number and address And the balance of utilization of each priorities are High 60 Normal 30 and Low 10 Prioritization Configuration from LAN to WAN packet source IP Address Range U 0 0 0 means Anyi Destination IP Address Range U 0 0 0 means Any C PPTP GRE ma an aei IN N source Fort Enable Application Priority Frotocal Destination Port ma ei ey aa P N N ma OE ad ul Po IN N Enable Select it to activate the function Application A name that identifies an existing rule Priority High or Low the priority for existing rule All of traffic will be set to normal priority until you change it The balance of utilizations for each priority is High 60 Normal 30 or Low 10 Protocol The name of supported protocol Source Port The source port of packets to be monitored Destination Port The destination port of packets to be monitored Source IP Address Range The source IP address or IP range of packets to be monitored Destination IP address Range The destination
100. ver address automatically radio buttons See Figure 3 8 Click OK to finish the configuration Chapter 3 Basic Installation EA Network and Dial up Connections File Edit wiew Favorites Tools Advanced Help Back Gsearch G Folders History WAS x ET Network and Dial up Connections Go a UL c Network and Dial up Connections 101 x Address pe Local Area Connection Type LAN Connection Status Fnahled zi Figure 3 5 LAN Area Connection Local Area Connection Status e General Connection Connected 06 16 26 100 0 Mbps Status Duration Speed Acctiviky Sent aB Recenved Packets 105 427 12215 Properties Disable Close Figure 3 6 LAN Connection Status General 71 x I Connect using BY ASUSTeK Broadcom 440 10 100 Integrated Controller Components checked are used by this connection ml Client for Microsoft Networks A File and Printer Sharing for Microsoft Networks lt I KI K Internet Protocol TCP IP Install Uninstall Properties Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks Show icon in taskbar when connected OK Cancel Figure 3 7 TCP IP Internet Protocol TCP IP Properties General 21x
101. w ipsectest com Remote ID Type Specify Remote ID type Identifier Input remote ID s information like domain name www ipsectest com SA Lifetime Specify the number of minutes that a Security Association SA will stay active before new encryption and authentication key will be exchanged There are two kinds of SAs IKE and IPSec IKE negotiates and establishes SA on behalf of IPSec an IKE SA is used by IKE Phase 1 IKE To issue an initial connection request for a new VPN tunnel The range can be from 5 to 15 000 minutes and the default is 240 minutes Phase 2 IPSec To negotiate and establish secure authentication The range can be from 5 to 15 000 minutes and the default is 60 minutes A short SA time increases security by forcing the two parties to update the keys However every time the VPN tunnel re negotiates access through the tunnel will be temporarily disconnected Select the Apply button to update the settings 14 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router E L2TP There are two types of L2TP VPN supported Remote Access and LAN to LAN please refer below for more information Click Create to configure a new VPN connection 75 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Remote Access L2TP Connection L2TP Remote Access Connection T Dial out server IP Address or Hostname Ps ype Dial in Pr
102. will result in all connection attempts to your public IP address will access the PC specified GOD If you have disabled the NAT option in the WAN ISP section the Virtual Server function will hence be invalid Attention lf the DHCP server option is enabled you have to be very careful in assigning the IP addresses of the virtual servers in order to avoid conflicts The easiest way of configuring Virtual Servers is to manually assign static IP address to each virtual server PC with an address that does not fall into the range of IP addresses that are to be issued by the DHCP server You Attention can configure the virtual server IP address manually but it must still be in the same subnet as the router 03 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router Users who do not understand the features should not attempt to reconfigure their router unless advised to do so by support staff There are four items within the Advanced section Static Route Dynamic DNS Checking Email and Device Management E Static Routing Click on Routing Table and then choose Create Route add a routing table Static Route Create Destination This is the destination subnet IP address Netmask Subnet mask of the destination IP addresses based on above destination su
103. y keywords are present in URLs accessed to determine if the connection attempt should be blocked Please note that the URL filter blocks web browser HTTP connection attempts using port 80 only For example if the URL is hittp AWwww abc com abcde html it will be dropped as the keyword abcde occurs in the URL Keywords Filtering Create Keyword Apply Block WEB URLs which contain these keywords Mame Keyword term abcde Delete 2 63 Chapter 4 Configuration Billion BIPAC 8500 8520 SHDSL VPN Firewall Bridge Router Domains Filtering This function checks the domain name in URLs accessed against your list of domains to block or allow If it is matched the URL request will be sent Trusted or dropped Forbidden The checking procedure is 1 Check the domain in the URL to determine if it is in the trusted list If yes the connection attempt is sent to the remote web server 2 If not check if it is listed in the forbidden list and if present then the connection attempt is dropped 3 If the packet does not match either of the above two items it is sent to the remote web server 4 Please be note that the domain only should be specified not the full URL For example to block traffic to www sex com enter sex or sex com instead of www sex com In the example below the URL request for www abc com will be sent to the remote web server because it is listed in the trusted list whilst the URL reques

Download Pdf Manuals

image

Related Search

Related Contents

TAGG PRODUCT WARRANTY  添付文書案 作成:2002年  51006-500 User Manual  Britannia Wyre 100cm twin  Ayuda  English - Magtrol  CLAPET DE SURPRESSION    

Copyright © All rights reserved.
Failed to retrieve file