LevelOne WBR-3402TX User Manual
LevelOne WBR-3402TX User Manual

LevelOne WBR-3402TX User Manual

1w,4l 11g wireless adsl router w/vpn/printer server(usb)

Advertisement

Quick Links

LevelOne
WBR-3402TX
1W,4L 11g Wireless ADSL Router
w/VPN/Printer Server(USB)
User`s Manual
1

Advertisement

Table of Contents
loading

Summary of Contents for LevelOne WBR-3402TX

  • Page 1 LevelOne WBR-3402TX 1W,4L 11g Wireless ADSL Router w/VPN/Printer Server(USB) User`s Manual...
  • Page 2: Table Of Contents

    Chapter 1 Introduction ... 4 Functions and Features ... 4 Packing List ... 6 Chapter 2 Hardware Installation... 7 2.1 Panel Layout ... 7 2.2 Procedure for Hardware Installation... 8 Chapter 3 Network Settings and Software Installation ... 10 3.1 Make Correct Network Settings of Your Computer... 10 3.2 Install the Software into Your Computers...
  • Page 3 4.8.6 Miscellaneous Items ... 75 Chapter 5 Print Server ... 76 5.1 Configuring on Windows 95/98 Platforms ... 76 5.2 Configuring on Windows NT Platforms ... 79 5.3 Configuring on Windows 2000 and XP Platforms... 80 5.4 Configuring on Unix-like based Platforms ... 85 5.5 Configuring on Apple PC ...
  • Page 4: Chapter 1 Introduction

    Congratulations on your purchase of LevelOne WBR-3402 ADSL Wireless Broadband Router. This product is specifically designed for Small Office and Home Office needs. It provides a complete SOHO solution for Internet surfing, and is easy to configure and operate even for non-technical users.
  • Page 5 correctly. Statistics of WAN Supported Enables you to monitor inbound and outbound packets Wireless functions High speed for wireless LAN connection Up to 54Mbps data rate by incorporating Orthogonal Frequency Division Multiplexing (OFDM). Roaming Provides seamless roaming within the IEEE 802.11b(11M) and IEEE 802.11g(54M) WLAN infrastructure.
  • Page 6: Packing List

    When SPI Mode is enabled, the router will check every incoming packet to detect if this packet is valid. DoS Attack Detection Supported When this feature is enabled, the router will detect and log the DoS attack comes from the Internet.
  • Page 7: Chapter 2 Hardware Installation

    2.1 Panel Layout 2.1.1. Front Panel LED: Function Color POWER Power indication Green STATUS System status Green Show-tme ADSL status1 Green ADSL-Act ADSL status2 Green WLAN Wireless activity Green L1~L4 Link status Green Figure 2-1 Front Panel Status Description Power is being applied to this product.
  • Page 8: Procedure For Hardware Installation

    2.1.2. Rear Panel Ports: Port Description 5VDC Power inlet: DC 5V, 2A ADSL the port where you will connect your phone jack.. Port 1-4 the ports where you will connect networked computers and other devices. USB Ports for USB printer. 2.2 Procedure for Hardware Installation 1.
  • Page 9 Figure 2-3 Setup of LAN and WAN connections for this product. 3. Setup ADSL connection Prepare a telephone cable for connecting this product to your ISP. Figure 2-3 illustrates the ADSL connection. 4. Connecting this product with your printer Use the printer cable to connect your printer to the USB printer port of this product. 5.
  • Page 10: Chapter 3 Network Settings And Software Installation

    To use WBR-3402 correctly, you have to properly configure the network settings of your computers and install the attached setup program into your MS Windows platform (Windows 95/98/NT/2000). 3.1 Make Correct Network Settings of Your Computer The default IP address of this product is 192.168.123.254, and the default subnet mask is 255.255.255.0.
  • Page 11: Install The Software Into Your Computers

    3.2 Install the Software into Your Computers Skip this section if you do not want to use the print server function of this product. Notice: If you are using Windows 2000/XP, please refer to Chapter 5 Printer - 5.3 Configuring on Windows 2000 and XP Platforms.
  • Page 12 Step 3: Select the destination folder and click on the Next button. Then, the setup program will begin to install the programs into the destination folder .Step 4: When the following window is displayed, click on the Finish button. Select the item to restart the computer and then click the OK button to reboot your computer. Step 4: After rebooting your computer, the software installation procedure is finished.
  • Page 13: Chapter 4 Configuring Adsl Wireless Broadband Router

    This product provides Web based configuration scheme, that is, configuring by your Web browser, such as Netscape Communicator or Internet Explorer. This approach can be adopted in any MS Windows, Macintosh or UNIX based platforms.
  • Page 14: Start-Up And Log In

    4.1 Start-up and Log in Activate your browser, and disable the proxy or add the IP address of this product into the exceptions. Then, type this product’s IP address in the Location (for Netscape) or Address (for IE) field and press ENTER. For example: http://192.168.123.254. After the connection is established, you will see the web user interface of this product.
  • Page 15: Status

    4.2 Status This option provides the function for observing this product’s working status: A. WAN Port Status. If the WAN port is assigned a dynamic IP, there may appear a “Renew” or “Release” button on the Sidenote column. You can click this button to renew or release IP manually. B.
  • Page 16: Wizard

    4.3 Wizard Setup Wizard will guide you through a basic configuration procedure step by step. Press ”Next >”...
  • Page 17: Basic Setting

    Setup Wizard - Select WAN Type: For detail settings, please refer to 4.4.1 primary setup. 4.4 Basic Setting...
  • Page 18 4.4.1 Primary Setup – WAN Type Press “Change”...
  • Page 19 This page is primary to enable this product to work properly. The setting items and the web appearance depend on the WAN type. Choose correct WAN type before you start. 1. LAN IP Address: the local IP address of this device. The computers on your network must use the LAN IP address of your product as their Default Gateway.
  • Page 20 4.4.1.1 Ethernet Over ATM (RFC 1483 Bridged) without NAT This WAN type disable the NAT, this device becomes a pure bridge between your LAN and WAN, all the clients in your LAN must have legal IPs. If you enable the NAT feature, you have to set the following WAN IP settings.
  • Page 21 4.4.1.2 Ethernet Over ATM (RFC 1483 Bridged) with NAT Dynamic IP Address: Obtain an IP address from ISP automatically. Host Name: optional. Required by some ISPs, for example, @Home. Renew IP Forever: this feature enables this product to renew your IP address automatically when the lease time is expiring-- even when the system is idle.
  • Page 23 4.4.1.3 IP over ATM (RFC 1483 Routed) In the Router Mode, NAT is always enabled. You have to set the following WAN IP settings: WAN IP Mode: This product supports two WAN IP modes: static and dynamic. If you select dynamic mode, it will try to get a legal IP and WAN settings from ISP’s DHCP server.
  • Page 24 4.4.1.4 Classical IP over ATM (RFC 1577) In the Classical IP over ATM Mode, NAT is always enabled. You have to set the following WAN IP settings: WAN IP Mode: This product supports two WAN IP modes: static and dynamic. If you select dynamic mode, it will try to get a legal IP and WAN settings from ISP’s DHCP server.
  • Page 25 button to save the configuration into Flash memory, and the reboot this device. 4.4.1.5 PPP over ATM (RFC 2364) Press “More >>”...
  • Page 26 PPPoA Account/Password: The account ID & password provided by your ISP. Maximum Idle Time: The time of no activity disconnect to your PPPoA session. You can also set it to zero or enable Auto-reconnect to disable this feature. If Auto-reconnect is enabled, this product will automatically connect to ISP after system is restarted or connection is dropped.
  • Page 27 "Save" button to save the configuration into Flash memory, and the reboot this device. 4.4.1.6 PPP over Ethernet (RFC 2516) PPPoE Account/Password: The account ID & password provided by your ISP. Maximum Idle Time: The time of no activity disconnect to your PPPoE session. You can also set it to zero or enable Auto-reconnect to disable this feature.
  • Page 28 PPPoE Service Name: Optional. Input the service name if your ISP requires it. Assigned IP Address: Optional. Required by some ISPs. Once you finished the required configuration, you must click on the "Save" button to save the configuration into Flash memory, and the reboot this device. 4.4.2 OAM Server In this page, you can set the OAM feature for virtual channel.
  • Page 29 4.4.3 DHCP Server Press “More” The settings of a TCP/IP environment include host IP, Subnet Mask, Gateway, and DNS configurations.
  • Page 30 It is not easy to manually configure all the computers and devices in your network. Fortunately, DHCP Server provides a rather simple approach to handle all these settings. This product supports the function of DHCP server. If you enable this product’s DHCP server and configure your computers as “automatic IP allocation”...
  • Page 31 Wireless settings allow you to set the wireless configuration items. 1. Network ID(SSID): Network ID is used for identifying the Wireless LAN (WLAN). Client stations can roam freely over this product and other Access Points that have the same Network ID. (The factory setting is “default”) 2.
  • Page 32 4.4.5 Change Password You can change Password here. We strongly recommend you to change the system password for security reason.
  • Page 33: Forwarding Rules

    4.5 Forwarding Rules 4.5.1 Virtual Server...
  • Page 34 This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisible to the outside world. If you wish, you can make some of them accessible by enabling the Virtual Server Mapping. A virtual server is defined as a Service Port, and all requests to this port will be redirected to the computer specified by the Server IP.
  • Page 35 4.5.2 Special AP Some applications require multiple connections, like Internet games, Video conferencing, Internet telephony, etc. Because of the firewall function, these applications cannot work with a pure NAT router. The Special Applications feature allows some of these applications to work with this product. If the mechanism of Special Applications fails to make an application work, try setting your computer as the DMZ host instead.
  • Page 36: Miscellaneous Items

    4.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet telephony and other special applications. NOTE: This feature should be used only when needed.
  • Page 37: Security Settings

    4.6 Security Settings...
  • Page 38: Packet Filter

    4.6.1 Packet Filter Packet Filter enables you to control what packets are allowed to pass the router. Outbound filter applies on all outbound packets. However, Inbound filter applies on packets that destined to Virtual Servers or DMZ host only. You can select one of the two filtering policies: 1.
  • Page 39: Inbound Filter

    For source or destination IP address, you can define a single IP address (4.3.2.1) or a range of IP addresses (4.3.2.1-4.3.2.254). An empty implies all IP addresses. For source or destination port, you can define a single port (80) or a range of ports (1000-1999). Add prefix "T"...
  • Page 40: Outbound Filter

    Example 2: (192.168.123.100-192.168.123.119) They can do everything except read net news (port 119) and transfer files via FTP (port 21) Others are all allowed. After Inbound Packet Filter setting is configured, click the save button. Outbound Filter: To enable Outbound Packet Filter click the check box next to Enable in the Outbound Packet Filter field. Example 1:...
  • Page 41 (192.168.123.100-192.168.123.149) They are allowed to send mail (port 25), receive mail (port 110), and browse Internet (port 80); port 53 (DNS) is necessary to resolve the domain name. (192.168.123.10-192.168.123.20) They can do everything (block nothing) Others are all blocked. Example 2: (192.168.123.100-192.168.123.119) They can do everything except read net news (port 119) and transfer files via FTP (port 21) Others are allowed...
  • Page 42: Domain Filter

    4.6.2 Domain Filter Domain Filter let you prevent users under this device from accessing specific URLs. Domain Filter Enable Check if you want to enable Domain Filter. Log DNS Query Check if you want to log the action when someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these hosts to access network without restriction.
  • Page 43 Example: In this example: 1. URL include “www.msn.com” will be blocked, and the action will be record in log-file. 2. URL include “www.sina.com” will not be blocked, but the action will be record in log-file. 3. URL include “www.google.com” will be blocked, but the action will not be record in log-file. IP address X.X.X.1~ X.X.X.20 can access network without restriction.
  • Page 44: Url Blocking

    4.6.3 URL Blocking URL Blocking will block LAN computers to connect to pre-defined Websites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suffix (like .com or .org, etc), while URL Blocking require user to input a keyword only. In other words, Domain filter can block specific website, while URL Blocking can block hundreds of websites by simply a keyword.
  • Page 45 In this example: 1.URL include “sex” will be blocked, and the action will be record in log-file. 2.URL include “erotica” will be blocked, but the action will be record in log-file 3.URL include “girl” will not be blocked, but the action will be record in log-file. 4.
  • Page 46: Mac Address Control

    4.6.4 MAC Address Control MAC Address Control allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address. MAC Address Control Check “Enable” to enable the “MAC Address Control”. All of the settings in this page will take effect only when “Enable”...
  • Page 47 Control table "Control table" is the table at the bottom of the "MAC Address Control" page. Each row of this table indicates the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address IP Address In this page, we provide the following Combobox and button to help you to input the MAC address.
  • Page 48: Vpn Setting

    4.6.5 VPN setting VPN Settings are settings that are used to create virtual private tunnels to remote VPN gateways. The tunnel technology supports data confidentiality, data origin authentication and data integrity of network information by utilizing encapsulation protocols, encryption algorithms, and hashing algorithms. •...
  • Page 49 System managers of both end gateways only need set the same pre-shared key. Function of Buttons More: To setup detailer configuration for manual key or IKE approaches by clicking the "More" button. • VPN Settings - IKE There are three parts that are necessary to setup the configuration of IKE for the dedicated tunnel: basic setup, IKE proposal setup, and IPSec proposal setup.
  • Page 50   Local netmask Local netmask combined with local subnet to form a subnet domain.   Remote subnet The subnet of LAN site of remote VPN gateway, it can be a host, a partial subnet, and the whole subnet of LAN site of remote gateway.  ...
  • Page 51: Encryption Algorithm

    •VPN Settings - Set IKE Proposal   IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below. The selecting activity is performed by selecting a proposal ID and clicking "add to" button in the bottom of the page. There are only four indexes can be chosen from the proposal pool for the dedicated tunnel.
  • Page 52 • VPN Settings -Set IPSec Proposal   IPSec Proposal index A list of selected proposal indexes from the IPSec proposal pool listed below. The selecting activity is performed by selecting a proposal ID and clicking "add to" button in the bottom of the page. There are only four indexes can be chosen for the dedicated tunnel.
  • Page 53 IPSec proposal.   Life time The unit of life time is based on the value of Life Time Unit. If the value of unit is second, the value of life time represents the life time of dedicated VPN tunnel between both end gateways. Its value ranges from 300 seconds to 172,800 seconds.
  • Page 54: Miscellaneous Items

    4.6.6 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform administration task. This feature enables you to perform administration task from remote host. If this feature is enabled, only the specified IP address can perform remote administration. If the specified IP address is 0.0.0.0, any host can connect to this product to perform administration task.
  • Page 55: Advanced Setting

    4.7 Advanced Setting...
  • Page 56: Adsl Modem Performance Setting

    4.7.1 ADSL Modem Performance Setting Tx Gain Offset This parameter allows the user to add an offset on the Tx gain of the CPE Modem. The offset range is limited between -10 dB and +3 dB with a granularity of 0.5 dB. The default value is set to 0 dB, no offset.
  • Page 57 offset. Tx Output Power Offset This parameter allows user to reduce the Tx output power (in the upstream direction). The value should be ranged between 0 and 10 dBm. Rx Output Power Offset This parameter allows user to reduce the Rx output power. The value should be ranged between 0 and 10 dBm.
  • Page 58: System Time

    4.7.2 System Time Get Date and Time by NTP Protocol Selected if you want to Get Date and Time by NTP Protocol. Time Server Select a NTP time server to consult UTC time Time Zone Select a time zone where this device locates. Set Date and Time manually Selected if you want to Set Date and Time manually.
  • Page 59: System Log

    4.7.3 System Log This page support two methods to export system logs to specific destination by means of syslog(UDP) and SMTP(TCP). The items you have to setup including: IP Address for Syslog Host IP of destination where syslogs will be sent to. Check Enable to enable this function.
  • Page 60 E-mail Subject The subject of email alert. This setting is optional.
  • Page 61: Dynamic Dns

    4.7.4 Dynamic DNS To host your server on a changing IP address, you have to use dynamic domain name service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the name of your host to your current IP address, which changes each time you connect your Internet service provider.
  • Page 62 Username/E-mail Password/Key You will get this information when you register an account on a Dynamic DNS server. Example: After Dynamic DNS setting is configured, click the save button.
  • Page 63: Snmp Setting

    4.7.5 SNMP Setting In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. Enable SNMP You must check either Local or Remote or both to enable SNMP function. If Local is checked, this is checked, this device will response request from LAN.
  • Page 64 1. This device will response to SNMP client which’s get community is set as “public” 2. This device will response to SNMP client which’s set community is set as “private” 3. This device will response request from both LAN and WAN...
  • Page 65: Routing Table

    4.7.6 Routing Table Routing Tables allow you to determine which physical interface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other. Routing Table settings are settings used to setup the functions of static and dynamic routing.
  • Page 66 Example: So if, for example, the host wanted to send an IP data gram to 192.168.3.88, it would use the above table to determine that it had to go via 192.168.1.33 (a gateway), And if it sends Packets to 192.168.5.77 will go via 192.168.1.55 Each rule can be enabled or disabled individually.
  • Page 67: Schedule Rule

    4.7.7 Schedule Rule You can set the schedule time to decide which service at what time will be turned on or off. Select the “enable” item. Press “Add New Rule” You can write a rule name and set which day and what time to schedule from “Start Time” to “End Time”.
  • Page 69 Schedule Enable Selected if you want to Enable the Scheduler. Edit To edit the schedule rule. Delete To delete the schedule rule, and the rule# of the rules behind the deleted one will decrease one automatically. Schedule Rule can be apply to Virtual server and Packet Filter, for example: Exanple1: Virtual Server –...
  • Page 70 Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 14:10 to 16:20).
  • Page 71: Toolbox

    4.8 Toolbox...
  • Page 72: View Log

    4.8.1 View Log You can View system log by clicking the View Log button...
  • Page 73: Firmware Upgrade

    4.8.2 Firmware Upgrade You can upgrade firmware by clicking Firmware Upgrade button.
  • Page 74: Backup Setting

    4.8.3 Backup Setting You can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmware Upgrade button and use the bin file you saved. 4.8.4 Reset to default You can also reset this product to factory default by clicking the Reset to default button.
  • Page 75: Miscellaneous Items

    4.8.6 Miscellaneous Items MAC Address for Wake-on-LAN Wake-on-LAN is a technology that enables you to power up a networked device remotely. In order to enjoy this feature, the target device must be Wake-on-LAN enabled and you have to know the MAC address of this device, say 00-11-22-33-44-55.
  • Page 76: Chapter 5 Print Server

    WBR-3402 provides the function of network print server for MS Windows 95/98/NT/2000 and Unix based platforms. (If the product you purchased doesn’t have printer port, please skip this chapter.) 5.1 Configuring on Windows 95/98 Platforms After you finished the software installation procedure described in Chapter 3, your computer has possessed the network printing facility provided by this product.
  • Page 77 Find out the corresponding icon of your server printer, for example, the HP LaserJet 6L. Click the mouse’s right button on that icon, and then select the Properties item:...
  • Page 78 2. Click the Details item: 3. Choose the “PRTmate: (All-in-1)” from the list attached at the Print To item. Be sure that the Printer Driver item is configured to the correct driver of your server printer. 4. Click on the button of Port Settings: Type in the IP address of this product and then click the OK button.
  • Page 79: Configuring On Windows Nt Platforms

    5.2 Configuring on Windows NT Platforms The configuration procedure for a Windows NT platform is similar to that of Windows 95/98 except the screen of printer Properties: Compared to the procedure in last section, the selection of Details is equivalent to the selection of Ports, and Port Settings is equivalent to Configure Port.
  • Page 80: Configuring On Windows 2000 And Xp Platforms

    5.3 Configuring on Windows 2000 and XP Platforms Windows 2000 and XP have built-in LPR client, users could utilize this feature to Print. You have to install your Printer Driver on LPT1 or other ports before you preceed the following sequence.
  • Page 81 2.Select “Ports” page, Click “Add Port…” 3. Select “Standard TCP/IP Port”, and then click “New Port…”...
  • Page 82 4.Click Next and then provide the following information: Type address of server providing LPD that is our NAT device:192.168.123.254 4. Select Custom, then click “Settings…”...
  • Page 83 6.Select “LPR”, type ” lp“ lowercase letter in “Queue Name:” And enable “LPR Byte Counting Enabled”.
  • Page 84 7.Apply your settings...
  • Page 85: Configuring On Unix-Like Based Platforms

    5.4 Configuring on Unix-like based Platforms Please follow the traditional configuration procedure on Unix platforms to setup the print server of this product. The printer name is “lp.” In X-Windows, for example, In Redhat Platforms, Please follow the below steps to configure your printer on Red Hat 9.0. 1.
  • Page 86 2. Click Add---> Forward. 3. Enter the Pinter Name, Comments then forward.
  • Page 87 4. Select LPD protocol and then forward. 5. Enter the router LAN IP Address and the queue name "lp". Then forward.
  • Page 88 6. Select the Printer Brand and Model Name. Then Forward. 7. Click Apply to finish setup.
  • Page 89 8. At last you must click Apply on the toolbox to make the change take effective. In Command Mode: Linux has built-in LPR client ,You can utilize it for printing. You can manual set it or via the tool "printtool" in X-windows. PS: The spool name is "lp"------all lowercase letter.
  • Page 90: Configuring On Apple Pc

    5.5 Configuring on Apple PC 1.First, go to Printer center (Printer list) and add printer 2.Choose IP print and setup printer ip address (router Lan ip address). 3.Disable “Default Queue of Server.” And fill in ‘ lp ‘ in Queue name item. 4.Printer type: Choose “General”.
  • Page 91: Appendix A Tcp/Ip Configuration For Windows 95/98

    This section introduces you how to install TCP/IP protocol into your personal computer. And suppose you have been successfully installed one network card on your personal computer. If not, please refer to your network card manual. Moreover, the Section B.2 tells you how to set TCP/IP values for working with this NAT Router correctly.
  • Page 92 5. Select Microsoft item in the manufactures list. And choose TCP/IP in the Network Protocols. Click OK button to return to Network window. 6. The TCP/IP protocol shall be listed in the Network window. Click OK to complete the install procedure and restart your PC to enable the TCP/IP protocol.
  • Page 93 A.2 Set TCP/IP Protocol for Working with NAT Router 1. Click Start button and choose Settings, then click Control Panel. 2. Double click Network icon. Select the TCP/IP line that has been associated to your network card in the Configuration tab of the Network window. 3.
  • Page 94 Select Obtain an IP address automatically in the IP Address tab. b. Don’t input any value in the Gateway tab.
  • Page 95 Choose Disable DNS in the DNS Configuration tab. B. Configure IP manually Select Specify an IP address in the IP Address tab. The default IP address of this product is 192.168.123.254. So please use 192.168.123.xxx (xxx is between 1 and 253) for IP Address field and 255.255.255.0 for Subnet Mask field.
  • Page 96 b. In the Gateway tab, add the IP address of this product (default IP is 192.168.123.254) in the New gateway field and click Add button. In the DNS Configuration tab, add the DNS values which are provided by the ISP into DNS Server Search Order field and click Add button.
  • Page 97: Appendix B Win 2000/Xp Ipsec Setting Guide

    Example: Win XP/2000 VPN Router (Configuration on WIN 2000 is similar to XP) 1. On Win 2000/XP, click [Start] button, select [Run], type secpol.msc in the field, then click [Run] Goto **Local Security Policy Settings** page 2. Or in Win XP, Click [Control Pannel] Double-click [Performance and Maintenance]...
  • Page 98 Double-click [Administrative Tools]...
  • Page 99 Local Security Policy Settings Double-click [Local Security Policy]...
  • Page 100 Right-click [IP Security Policies on Local Computer], and click [Create IP Security Policy]. Click the [Next] button, enter your policy’s name (Here it is to_vpn_router). Then, click [Next]. Introduction Dis-select the [Activate the default response rule] check box, and click [Next] button.
  • Page 101 Build 2 Filter Lists: “xp->router” and “router->xp” Filter List 1: xp-> router In the “new policy’s properties” screen, select [Use Add Wizard] check box, and then click [Add] button to create a new rule.
  • Page 102 click [Add] button...
  • Page 103 Enter a name, for example: xp->router and dis-select [Use Add Wizard] check box. Click [Add] button.
  • Page 104 In the Source address field, select [A specific IP Address]. and fill in IP Address: 192.168.1.1 In the Destination address field, select [A specific IP Subnet], fill in IP Address: 192.168.123.0 and Subnet mask: 255.255.255.0. If you want to select a protocol for your filter, click [Protocol] page.
  • Page 105 Click [OK] button. Then click [OK] button on the “IP Filter List” page.
  • Page 106 select [Filter Action], select [Require Security], then click [Edit] button.
  • Page 107 select [Negotiate security], Select [Session key Perfect Forward Secrecy (PFS)] click [Edit] button.
  • Page 108 select [Custom] button...
  • Page 109 Select [Data integrity and encryption (ESP)] Configure “Integrity algorithm”: [MD5] Configure “Encryption algorithm”: [DES] Configure “Generate a new key every [10000] seconds” Click [OK] button...
  • Page 110 select [Authentication Methods] page, click [Add] button.
  • Page 111 select [Use this string to protect the key exchange (preshared key)], and enter your preshared key string, such as mypresharedkey. Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [Tunnel Setting]...
  • Page 112 configure [The tunnel endpoint is specified by this IP address]: 192.168.1.254 Select [Connection Type]...
  • Page 113 select [All network connections] Tunnel 2: router->xp In the “new policy’s properties” page, dis-select [Use Add Wizard] check box, and then click [Add] button to create a new rule.
  • Page 114 click [Add] button...
  • Page 115 Enter a name, such as router->xp and dis-select [Use Add Wizard] check box. Click [Add] button.
  • Page 116 In the Source address field, select [A specific IP Subnet]. fill in IP Address: 192.168.123.0 and Subnet mask: 255.255.255.0. In the Destination address field, select [A specific IP Address], and fill in IP Address: 192.168.1.1 If you want to select a protocol for your filter, click [Protocol] page.
  • Page 117 Click [OK] button. Then click [OK] button on [IP Filter List] window.
  • Page 118 select [Filter Action tab], select [Require Security], then click [Edit] button.
  • Page 119 select [Negotiate security], Select [Session key Perfect Forward Secrecy (PFS)] click [Edit] button.
  • Page 120 select [Custom] button...
  • Page 121 Select [Data integrity and encryption (ESP)] Configure “Integrity algorithm”: [MD5] Configure “Encryption algorithm”: [DES] Configure “Generate a new key every [10000] seconds” Click [OK] button...
  • Page 122 select [Authentication Methods] page, click [Add] button.
  • Page 123 select [Use this string to protect the key exchange (preshared key)], and enter the preshared key string, such as mypresharedkey. Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [Tunnel Setting]...
  • Page 124 Configure [The tunnel endpoint is specified by this IP address]: 192.168.1.1 Select [Connection Type]...
  • Page 125 select [All network connections]...
  • Page 126 Configure IKE properties Select [General] Click [Advanced…]...
  • Page 127 enable “Master key perfect forward security (PFS)” configure “Authenticate and generate a new key after every [10000] seconds” click [Methods…] click [Add] button...
  • Page 128 Configure “Integrity algorithm”: [SHA1] Configure “Encryption algorithm”: [3DES] Configure “Diffie-Helman group”: [Medium (2)] Settings on VPN router VPN Router: Wan IP address:192.168.1.254 Lan IP address:192.168.123.254 192.168.123.123...
  • Page 129 VPN Settings: VPN: Enable Max. number of tunnels: 2 ID: 1 Tunnel Name: 1 Method: IKE Press “More”...
  • Page 130 VPN Settings - Tunnel 1 – IKE Tunnel:1 Local Subnet:192.168.123.0 Local Netmask:255.255.255.0 Remote Subnet:192.168.1.1 Remote Netmask:255.255.255.255 Remote Gateway:192.168.1.1 Preshare Key: my-preshare-key...
  • Page 131 VPN Settings - Tunnel 1 - Set IKE Proposal ID: 1 Proposal Name: 1 DH Group: Group2 Encrypt. Algorithm: 3DES Auth. Algorithm: SHA1 Life Time: 10000 Life Time Unit: Sec.
  • Page 132 VPN Settings - Tunnel 1 - Set IPSec Proposal ID: 1 Proposal Name: proposal1 DH Group: Group2 Encap. Protocol: ESP Encrypt. Algorithm: DES Auth. Algorithm:MD5 Life Time: 10000 Life Time Unit: Sec. User can view VPN connection process in “System Log” page, and correct their settings.
  • Page 133: Appendix C Pptp And L2Tp Configurations

    1. First, please go to the Network connection 2. Connect to network at my workplace...
  • Page 134 3. Choose Virtual Private Network 4. Do not dial to initial connection...
  • Page 135 5. Input the router wan ip address 6. Then ok, please input username and password as you setup in the router.
  • Page 136 7. Select the type of VPN...
  • Page 137 However, you should add the Authentication Protocol in advanced(Custom setting) of Security option, like below t o support pap, chap, mschap. If successfully, we will see: This time, the client in the internet can ping any pcs in the lan(192.168.123.x) L2TP However, the router is the also vpn-l2tp server and supports three Authentication Protocols, PAP, CHAP and MSCPAP.
  • Page 138 Then the steps refer to pptp settings.
  • Page 139 Figure 1: Testing Environment (Use Windows 2000 Radius Server) 1 Equipment Details PC1: Microsoft Windows XP Professional without Service Pack 1. D-Link DWL-650+ wireless LAN adapter Driver version: 3.0.5.0 (Driver date: 03.05.2003) PC2: Microsoft Windows XP Professional with Service Pack 1a. Z-Com XI-725 wireless LAN USB adapter Driver version: 1.7.29.0 (Driver date: 10.20.2001) Authentication...
  • Page 140: Appendix D 802.1X Setting

    3.LAN IP address: 192.168.123.254/24. 4.Set RADIUS server IP. 5.Set RADIUS server shared key. 6.Configure WEP key and 802.1X setting. The following test will use the inbuilt 802.1X authentication method such as ,EAP_TLS, PEAP_CHAPv2(Windows XP with SP1 only), and PEAP_TLS(Windows XP with SP1 only) using the Smart Card or other Certificate of the Windows XP Professional.
  • Page 141 Figure 2: Enable IEEE 802.1X access control...
  • Page 142 Figure 3: Smart card or certificate properties 4.Windows 2000 RADIUS server Authentication testing: 4.1DUT authenticate PC1 using certificate. (PC2 follows the same test procedures.) 1. Download and install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3.
  • Page 143 Figure 4: Certificate information on PC1 Figure 5: Authenticating...
  • Page 144 4.2DUT authenticate PC2 using PEAP-TLS. 1. PC2 choose the SSID of DUT as the Access Point. 2. Set authentication type of wireless client and RADIUS server both to PEAP_TLS. 3. Disable the wireless connection and enable again. 4.The DUT will send the user's certificate to the RADIUS server, and then send the message of authentication result to PC2.
  • Page 145: Appendix E Faq And Troubleshooting

    Reset to factory Default There are 2 methods to reset to default. Restore with RESET button First, turn off the router and press the RESET button in. And then, power on the router and hold the RESET button down until the Status LED start flashing, then move away the hand. If LED flashes about 8 times, the RESTORE process is completed.
  • Page 146 4.If you can find one device and unreachable. You must setup the same submask, For example configure the PC IP address to 192.168.12.xxx. 5. Click “Upgrade Button” and to upgrade the firmware smoothly. 6.If successfully, please use “Reset Button” reset to default the router. If failed, the program will ask to redo again from Step 2.

Table of Contents