Sign In
Upload
Manuals
Brands
Nortel Manuals
Network Router
BSR252
Nortel BSR252 Manuals
Manuals and User Guides for Nortel BSR252. We have
3
Nortel BSR252 manuals available for free PDF download: Configuration - Basics, Fundamentals, Quick Install Manual
Nortel BSR252 Configuration - Basics (460 pages)
Business Secure Router
Brand:
Nortel
| Category:
Network Router
| Size: 15.84 MB
Table of Contents
Table of Contents
3
Tables
27
Before You Begin
29
Preface
29
Text Conventions
29
Hard Copy Technical Manuals
30
Related Publications
30
How to Get Help
31
Getting Help from the Nortel Web Site
31
Getting Help over the Phone from a Nortel Solutions Center
31
Getting Help from a Specialist by Using an Express Routing Code
32
Getting Help through a Nortel Distributor or Reseller
32
Chapter 1 Getting to Know Your Business Secure Router
33
Introducing the Business Secure Router
33
Features
34
Physical Features
34
High-Speed Internet Access
34
ADSL Standards
34
Table 1 Feature Specifications
34
Networking Compatibility
35
Multiplexing
35
Encapsulation
35
Four-Port Switch
35
Autonegotiating 10/100 Mb/S Ethernet LAN
36
Autosensing 10/100 Mb/S Ethernet LAN
36
Auxiliary Port
36
Time and Date
36
Reset Button
36
Nonphysical Features
36
Ipsec VPN Capability
36
Nortel Contivity Client Termination
37
Certificates
37
Ssh
37
Https
37
IEEE 802.1X for Network Security
37
Firewall
37
Brute Force Password Guessing Protection
38
Content Filtering
38
Packet Filtering
38
Universal Plug and Play (Upnp)
38
Call Scheduling
38
Pppoe
38
Dynamic DNS Support
39
IP Multicast
39
IP Alias
39
Central Network Management
39
Snmp
39
Network Address Translation (NAT)
40
Traffic Redirect
40
Port Forwarding
40
DHCP (Dynamic Host Configuration Protocol)
40
Full Network Management
40
Logging and Tracing
41
Upgrade Business Secure Router Firmware
41
Embedded FTP and TFTP Servers
41
Applications for the Business Secure Router
41
Secure Broadband Internet Access and VPN
41
Hardware Setup
42
Figure 1 Secure Internet Access and VPN Application
42
Chapter 2 Introducing the Webgui
45
Webgui Overview
45
Accessing the Business Secure Router Webgui
45
Figure 2 Login Screen
46
Figure 3 Change Password Screen
47
Figure 4 Replace Certificate Screen
47
Restoring the Factory-Default Configuration Settings
48
Procedure to Use the Reset Button
48
Uploading a Configuration File through Console Port
48
Navigating the Business Secure Router Webgui
49
Figure 5 Example Xmodem Upload
49
Figure 6 MAIN MENU Screen
50
Figure 7 Contact Support
51
Chapter 3 Wizard Setup
53
Wizard Overview
53
Encapsulation
53
Enet Encap
53
PPP over Ethernet
54
Pppoa
54
Rfc 1483
54
Multiplexing
54
VC-Based Multiplexing
55
LLC-Based Multiplexing
55
VPI and VCI
55
Wizard Setup Configuration: First Screen
55
Figure 8 Wizard Screen 1
56
Table 2 Wizard Screen 1
56
IP Address and Subnet Mask
57
IP Address Assignment
57
IP Assignment with Pppoa or Pppoe Encapsulation
58
IP Assignment with RFC 1483 Encapsulation
58
IP Assignment with ENET ENCAP Encapsulation
58
Private IP Addresses
58
Nailed-Up Connection (Only with PPP)
59
Nat
59
Wizard Setup Configuration: Second Screen
59
Figure 9 Internet Connection with Pppoa
60
Table 3 Internet Connection with Pppoa
60
Figure 10 Internet Connection with RFC 1483
61
Table 4 Internet Connection with RFC 1483
61
Figure 11 Internet Connection with ENET ENCAP
62
Table 5 Internet Connection with ENET ENCAP
62
Figure 12 Internet Connection with Pppoe
63
Table 6 Internet Connection with Pppoe
64
DHCP Setup
65
IP Pool Setup
65
Wizard Setup Configuration: Third Screen
65
Figure 13 Wizard Screen 3
66
Figure 14 Wizard: LAN Configuration
67
Table 7 Wizard: LAN Configuration
67
Wizard Setup Configuration: Connection Tests
69
Test Your Internet Connection
69
Figure 15 Wizard Screen 4
69
Chapter 4 User Notes
71
General Notes
71
General
71
Firewall
72
Nat
72
VPN Client Termination
73
Security
74
Routing
74
Advanced Router Configuration
75
Setting up the Router When the System Has a Server
75
Connecting Two Sites to Establish a Virtual Private Network
75
Adding IP Telephony to a Multi-Site Network
76
Configuring the Router to Act as a Nortel VPN Server (Client Termination)
77
Configuring the Router to Connect to a Nortel VPN Server (Client Emulation)
77
Allowing Remote Management of a LAN-Connected BCM50
77
Setting up the Router for Guest Access
78
Preventing Heavy Data Traffic from Impacting Telephone Calls
79
Setting up a Remote Office with a Unistim IP Telephone
79
Inter-Operability with Third-Party Routers
80
VPN Connections with Cisco Routers
80
Chapter 5 System Screens
81
System Overview
81
DNS Overview
81
Private DNS Server
81
Configuring General Setup
82
Figure 16 Private DNS Server Example
82
Figure 17 System General Setup
83
Table 8 System General Setup
83
Dynamic DNS
85
DYNDNS Wildcard
85
Configuring Dynamic DNS
85
Figure 18 DDNS
86
Table 9 DDNS
86
Configuring Password
87
Figure 19 Password
88
Table 10 Password
88
Predefined NTP Time Server List
89
Configuring Time and Date
90
Table 11 Default Time Servers
90
Figure 20 Time and Date
91
Table 12 Time and Date
92
Alg
94
Configuring ALG
94
Figure 21 ALG
94
Table 13 ALG
95
Chapter 6 LAN Screens
97
LAN Overview
97
DHCP Setup
97
IP Pool Setup
97
DNS Servers
98
Lan Tcp/Ip
98
Factory LAN Defaults
98
RIP Setup
98
Multicast
99
Configuring IP
100
Figure 22 LAN IP
100
Table 14 LAN IP
101
Configuring Static DHCP
103
Figure 23 Static DHCP
104
Table 15 Static DHCP
104
Configuring IP Alias
105
Figure 24 IP Alias
105
Table 16 IP Alias
106
Chapter 7 WAN Screens
107
WAN Overview
107
TCP/IP Priority (Metric)
107
Configuring Route
108
Figure 25 WAN: Route
108
Pppoe Encapsulation
109
Table 17 WAN: Route
109
Configuring WAN ISP
110
Figure 26 WAN: WAN ISP
111
Table 18 WAN: WAN ISP
112
Configuring WAN IP
113
Figure 27 WAN: IP
114
Table 19 WAN: IP
115
Chapter 21
116
Traffic Redirect
117
Figure 28 Traffic Redirect WAN Setup
117
Configuring Traffic Redirect
118
Figure 29 Traffic Redirect LAN Setup
118
Configuring Dial Backup
119
Figure 30 Traffic Redirect
119
Table 20 Traffic Redirect
119
Figure 31 Dial Backup Setup
120
Table 21 Dial Backup Setup
121
Advanced Modem Setup
124
AT Command Strings
124
DTR Signal
124
Response Strings
124
Configuring Advanced Modem Setup
125
Figure 32 Advanced Setup
125
Table 22 Advanced Setup
126
Chapter 8 Network Address Translation (NAT) Screens
129
NAT Overview
129
NAT Definitions
129
What NAT Does
130
Table 23 NAT Definitions
130
How NAT Works
131
Port Restricted Cone NAT
131
Figure 33 How NAT Works
131
NAT Application
132
Figure 34 Port Restricted Cone NAT
132
NAT Mapping Types
133
Figure 35 NAT Application with IP Alias
133
Using NAT
134
SUA (Single User Account) Versus NAT
134
Table 24 NAT Mapping Type
134
SUA Server
135
Default Server IP Address
135
Port Forwarding: Services and Port Numbers
136
Configuring Servers Behind SUA (Example)
136
Table 25 Services and Port Numbers
136
Configuring SUA Server
137
Figure 36 Multiple Servers Behind NAT Example
137
Figure 37 SUA/NAT Setup
138
Table 26 SUA/NAT Setup
138
Configuring Address Mapping
139
Figure 38 Address Mapping
140
Table 27 Address Mapping
140
Figure 39 Address Mapping Edit
142
Table 28 Address Mapping Edit
142
Trigger Port Forwarding
143
Trigger Port Forwarding Example
143
Two Points to Remember about Trigger Ports
144
Figure 40 Trigger Port Forwarding Process: Example
144
Configuring Trigger Port Forwarding
145
Figure 41 Trigger Port
145
Table 29 Trigger Port
146
Chapter 9 Static Route Screens
147
Static Route Overview
147
Configuring IP Static Route
148
Figure 42 Example of Static Routing Topology
148
Figure 43 Static Route Screen
149
Table 30 IP Static Route Summary
149
Configuring Route Entry
150
Figure 44 Edit IP Static Route
150
Table 31 Edit IP Static Route
150
Chapter 10 Firewalls
153
Firewall Overview
153
Types of Firewalls
153
Packet Filtering Firewalls
154
Application Level Firewalls
154
Stateful Inspection Firewalls
154
Introduction to the Business Secure Router Firewall
155
Denial of Service
156
Basics
156
Figure 45 Business Secure Router Firewall Application
156
Types of Dos Attacks
157
Table 32 Common IP Ports
157
Figure 46 Three-Way Handshake
158
Figure 47 SYN Flood
159
Figure 48 Smurf Attack
160
Table 33 ICMP Commands that Trigger Alerts
160
Table 34 Legal Netbios Commands
160
Stateful Inspection
161
Table 35 Legal SMTP Commands
161
Figure 49 Stateful Inspection
162
Stateful Inspection Process
162
Stateful Inspection and the Business Secure Router
163
TCP Security
164
UDP/ICMP Security
165
Upper Layer Protocols
165
Guidelines for Enhancing Security with Your Firewall
166
Packet Filtering Vs. Firewall
166
Packet Filtering
166
When to Use Filtering
167
Firewall
167
When to Use the Firewall
167
Chapter 11 Firewall Screens
169
Access Methods
169
Firewall Policies Overview
169
Rule Logic Overview
171
Rule Checklist
171
Security Ramifications
171
Key Fields for Configuring Rules
172
Action
172
Service
172
Source Address
172
Destination Address
172
Connection Direction Examples
172
LAN to WAN Rules
173
WAN to LAN Rules
173
Figure 50 LAN to WAN Traffic
173
Configuring Firewall
174
Figure 51 WAN to LAN Traffic
174
Figure 52 Enabling the Firewall
176
Table 36 Firewall Rules Summary: First Screen
176
Configuring Firewall Rules
178
Figure 53 Creating and Editing a Firewall Rule
179
Table 37 Creating and Editing a Firewall Rule
179
Configuring Source and Destination Addresses
181
Figure 54 Adding or Editing Source and Destination Addresses
181
Table 38 Adding or Editing Source and Destination Addresses
181
Configuring Custom Ports
182
Figure 55 Creating or Editing a Custom Port
182
Table 39 Creating/Editing a Custom Port
182
Example Firewall Rule
183
Figure 56 Firewall Edit Rule Screen Example
183
Figure 57 Firewall Rule Edit IP Example
184
Figure 58 Edit Custom Port Example
184
Figure 59 Myservice Rule Configuration Example
185
Predefined Services
186
Figure 60 My Service Example Rule Summary
186
Table 40 Predefined Services
187
Alerts
189
Configuring Attack Alert
190
Threshold Values
190
Half-Open Sessions
190
TCP Maximum Incomplete and Blocking Period
191
Figure 61 Attack Alert
192
Table 41 Attack Alert
192
Chapter 12 Content Filtering
195
Introduction to Content Filtering
195
Restrict Web Features
195
Days and Times
195
Configure Content Filtering
196
Figure 62 Content Filter
196
Table 42 Content Filter
197
Chapter 13 VPN
199
Ipsec
199
Business Secure Router VPN Functions
199
VPN Screens Overview
200
Table 43 VPN Screens Overview
200
Other Terminology
201
Encryption
201
Figure 63 Encryption and Decryption
201
Data Confidentiality
202
Data Integrity
202
Data Origin Authentication
202
VPN Applications
202
Ipsec Architecture
202
Ipsec Algorithms
203
Figure 64 Ipsec Architecture
203
AH (Authentication Header) Protocol
204
ESP (Encapsulating Security Payload) Protocol
204
Key Management
205
Table 45 AH and ESP
205
Encapsulation
206
Transport Mode
206
Figure 65 Transport and Tunnel Mode Ipsec Encapsulation
206
Tunnel Mode
207
Ipsec and NAT
207
Secure Gateway Address
208
Table 46 VPN and NAT
208
Dynamic Secure Gateway Address
209
Summary Screen
209
Figure 66 Ipsec Summary Fields
209
Figure 67 Summary
210
Table 47 Summary
211
Keep Alive
212
Nailed up
212
NAT Traversal
213
Figure 68 NAT Router between Ipsec Routers
213
NAT Traversal Configuration
214
Preshared Key
214
Configuring Contivity Client VPN Rule Setup
214
Figure 69 VPN Contivity Client Rule Setup
215
Table 48 VPN Contivity Client Rule Setup
215
Configuring Advanced Setup
216
Figure 70 VPN Contivity Client Advanced Rule Setup
217
Table 49 VPN Contivity Client Advanced Rule Setup
217
ID Type and Content
218
ID Type and Content Examples
219
Table 50 Local ID Type and Content Fields
219
Table 51 Peer ID Type and Content Fields
219
My IP Address
220
Table 52 Matching ID Type and Content Configuration Example
220
Table 53 Mismatching ID Type and Content Configuration Example
220
Configuring Branch Office VPN Rule Setup
221
Figure 71 VPN Branch Office Rule Setup
222
Table 54 VPN Branch Office Rule Setup
223
Configuring an IP Policy
230
Figure 72 VPN Branch Office - IP Policy
231
Table 55 VPN Branch Office - IP Policy
232
Port Forwarding Server
236
Configuring a Port Forwarding Server
236
Figure 73 VPN Branch Office - IP Policy - Port Forwarding Server
237
Table 56 VPN Branch Office - IP Policy - Port Forwarding Server
237
IKE Phases
238
Figure 74 Two Phases to Set up the Ipsec SA
239
Negotiation Mode
240
Preshared Key
240
Diffie-Hellman (DH) Key Groups
241
Perfect Forward Secrecy (PFS)
241
Configuring Advanced Branch Office Setup
241
Figure 75 VPN Branch Office Advanced Rule Setup
242
Table 57 VPN Branch Office Advanced Rule Setup
242
SA Monitor
245
Figure 76 VPN SA Monitor
246
Table 58 VPN SA Monitor
246
Global Settings
247
Figure 77 VPN Global Setting
247
Table 59 VPN Global Setting
247
VPN Client Termination
248
Figure 78 VPN Client Termination
249
Table 60 VPN Client Termination
250
VPN Client Termination IP Pool Summary
252
Figure 79 VPN Client Termination IP Pool Summary
253
Table 61 VPN Client Termination IP Pool Summary
253
VPN Client Termination IP Pool Edit
254
Figure 80 VPN Client Termination IP Pool Edit
254
Table 62 VPN Client Termination IP Pool Edit
254
VPN Client Termination Advanced
255
Figure 81 VPN Client Termination Advanced
256
Table 63 VPN Client Termination Advanced
257
Chapter 14 Certificates
261
Certificates Overview
261
Advantages of Certificates
262
Self-Signed Certificates
262
Configuration Summary
263
My Certificates
263
Figure 82 Certificate Configuration Overview
263
Figure 83 My Certificates
264
Table 64 My Certificates
265
Certificate File Formats
266
Importing a Certificate
267
Figure 84 My Certificate Import
268
Table 65 My Certificate Import
268
Creating a Certificate
269
Figure 85 My Certificate Create
270
Table 66 My Certificate Create
271
My Certificate Details
273
Figure 86 My Certificate Details
274
Table 67 My Certificate Details
275
Trusted Cas
277
Figure 87 Trusted Cas
278
Table 68 Trusted Cas
278
Importing a Trusted CA Certificate
280
Figure 88 Trusted CA Import
280
Table 69 Trusted CA Import
280
Trusted CA Certificate Details
281
Figure 89 Trusted CA Details
282
Table 70 Trusted CA Details
283
Trusted Remote Hosts
285
Figure 90 Trusted Remote Hosts
286
Table 71 Trusted Remote Hosts
286
Verifying a Certificate of a Trusted Remote Host
287
Trusted Remote Host Certificate Fingerprints
287
Figure 91 Remote Host Certificates
288
Figure 92 Certificate Details
288
Importing a Certificate of a Trusted Remote Host
289
Figure 93 Trusted Remote Host Import
289
Trusted Remote Host Certificate Details
290
Table 72 Trusted Remote Host Import
290
Figure 94 Trusted Remote Host Details
291
Table 73 Trusted Remote Host Details
292
Directory Servers
294
Figure 95 Directory Servers
294
Add or Edit a Directory Server
295
Table 74 Directory Servers
295
Figure 96 Directory Server Add
296
Table 75 Directory Server Add
296
Chapter 15 Bandwidth Management
299
Bandwidth Management Overview
299
Bandwidth Classes and Filters
300
Proportional Bandwidth Allocation
300
Application Based Bandwidth Management
300
Subnet Based Bandwidth Management
300
Application and Subnet Based Bandwidth Management
301
Reserving Bandwidth for Nonbandwidth Class Traffic
301
Figure 97 Subnet Based Bandwidth Management Example
301
Table 76 Application and Subnet Based Bandwidth Management Example
301
Configuring Summary
302
Figure 98 Bandwidth Manager: Summary
302
Table 77 Bandwidth Manager: Summary
302
Configuring Class Setup
303
Figure 99 Bandwidth Manager: Class Setup
304
Table 78 Bandwidth Manager: Class Setup
304
Bandwidth Manager Class Configuration
305
Figure 100 Bandwidth Manager: Edit Class
306
Table 79 Bandwidth Manager: Edit Class
306
Bandwidth Management Statistics
308
Table 80 Services and Port Numbers
308
Figure 101 Bandwidth Management Statistics
309
Table 81 Bandwidth Management Statistics
309
Monitor
310
Figure 102 Bandwidth Manager Monitor
310
Table 82 Bandwidth Manager Monitor
310
Chapter 16 IEEE 802.1X
311
IEEE 802.1X Overview
311
Radius
311
Types of RADIUS Messages
311
EAP Authentication Overview
312
Configuring 802.1X
313
Figure 103 EAP Authentication
313
Figure 104 802.1X
314
Table 83 802.1X
314
Chapter 17 Authentication Server
317
Introduction to Local User Database
317
Local User Database
317
Figure 105 Local User Database
318
Table 84 Local User Database
318
Edit Local User Database
319
Figure 106 Local User Database Edit
320
Table 85 Local User Database Edit
321
Current Split Networks
322
Figure 107 Current Split Networks
322
Current Split Networks Edit
323
Table 86 Current Split Networks
323
Figure 108 Current Split Networks Edit
324
Table 87 Current Split Networks Edit
324
Configuring RADIUS
325
Figure 109 RADIUS
326
Table 88 RADIUS
326
Chapter 18 Remote Management Screens
329
Remote Management Overview
329
Remote Management Limitations
329
Remote Management and NAT
330
System Timeout
330
Introduction to HTTPS
331
Configuring WWW
332
Figure 110 HTTPS Implementation
332
Figure 111 WWW
333
Table 89 WWW
333
HTTPS Example
334
Internet Explorer Warning Messages
335
Netscape Navigator Warning Messages
335
Figure 112 Security Alert Dialog Box (Internet Explorer)
335
Figure 113 Figure 18-4 Security Certificate 1 (Netscape)
336
Avoiding the Browser Warning Messages
337
Figure 114 Security Certificate 2 (Netscape)
337
Logon Screen
338
Figure 115 Logon Screen (Internet Explorer)
339
Figure 116 Login Screen (Netscape)
340
Figure 117 Replace Certificate
341
Figure 118 Device-Specific Certificate
342
SSH Overview
343
Figure 119 Common Business Secure Router Certificate
343
How SSH Works
344
Figure 120 SSH Communication Example
344
Figure 121 How SSH Works
344
SSH Implementation on the Business Secure Router
345
Requirements for Using SSH
345
Configuring SSH
345
Figure 122 SSH
346
Table 90 SSH
346
Secure Telnet Using SSH Examples
347
Example 1: Microsoft Windows
347
Figure 123 SSH Example 1: Store Host Key
347
Example 2: Linux
348
Figure 124 SSH Example 2: Test
348
Secure FTP Using SSH Example
349
Figure 125 SSH Example 2: Log on
349
Telnet
350
Figure 126 Secure FTP: Firmware Upload Example
350
Figure 127 Telnet Configuration on a TCP/IP Network
350
Configuring TELNET
351
Figure 128 Telnet
351
Table 91 Telnet
351
Configuring FTP
352
Figure 129 FTP
352
Table 92 FTP
352
Configuring SNMP
353
Figure 130 SNMP Management Model
354
SNMP Traps
355
Supported Mibs
355
Table 93 SNMP Traps
355
Figure 131 SNMP
356
Remote Management: Snmp
356
Table 94 SNMP
356
Configuring DNS
357
Configuring Security
358
Figure 132 DNS
358
Table 95 DNS
358
Figure 133 Security
359
Table 96 Security
359
Chapter 19 Upnp
361
Universal Plug and Play Overview
361
How Do I Know if I am Using Upnp
361
NAT Traversal
361
Cautions with Upnp
362
Upnp Implementation
362
Configuring Upnp
362
Figure 134 Configuring Upnp
363
Table 97 Configuring Upnp
363
Displaying Upnp Port Mapping
364
Figure 135 Upnp Ports
364
Table 98 Upnp Ports
364
Installing Upnp in Windows Example
365
Installing Upnp in Windows Me
365
Installing Upnp in Windows XP
366
Figure 136 Add/Remove Programs: Windows Setup
366
Figure 137 Communications
366
Figure 138 Network Connections
367
Figure 139 Windows Optional Networking Components Wizard
367
Using Upnp in Windows XP Example
368
Autodiscover Your Upnp-Enabled Network Device
368
Figure 140 Windows XP Networking Services
368
Figure 141 Internet Gateway Icon
369
Figure 142 Internet Connection Properties
369
Figure 143 Internet Connection Properties Advanced Setup
370
Figure 144 Service Settings
370
Webgui Easy Access
371
Figure 145 Internet Connection Icon
371
Figure 146 Internet Connection Status
371
Figure 147 Network Connections
372
Figure 148 My Network Places: Local Network
372
Chapter 20 Logs Screens
373
Configuring View Log
373
Figure 149 View Log
374
Table 99 View Log
374
Configuring Log Settings
375
Figure 150 Log Settings
376
Table 100 Log Settings
377
Configuring Reports
378
Figure 151 Reports
379
Table 101 Reports
380
Viewing Web Site Hits
380
Figure 152 Web Site Hits Report Example
381
Table 102 Web Site Hits Report
381
Figure 153 Protocol/Port Report Example
382
Viewing Protocol/Port
382
Table 103 Protocol/ Port Report
383
Viewing LAN IP Address
383
Figure 154 LAN IP Address Report Example
384
Table 104 LAN IP Address Report
384
Reports Specifications
385
Table 105 Report Specifications
385
Call Scheduling Screens
387
Call Scheduling Introduction
387
Call Schedule Summary
387
Figure 155 Call Schedule Summary
388
Table 106 Call Schedule Summary
388
Call Scheduling Edit
389
Figure 156 Call Schedule Edit
389
Table 107 Call Schedule Edit
390
Applying Schedule Sets to a Remote Node
391
Figure 157 Applying Schedule Sets to a Remote Node
392
Chapter 22 Maintenance
395
Maintenance Overview
395
Status Screen
395
Figure 158 System Status
396
Table 108 System Status
396
System Statistics
397
Figure 159 System Status: Show Statistics
398
Table 109 System Status: Show Statistics
398
DHCP Table Screen
399
Diagnostic Screen
400
Figure 160 DHCP Table
400
Table 110 DHCP Table
400
Figure 161 Diagnostic
401
Table 111 Diagnostic
401
F/W Upload Screen
402
Figure 162 Firmware Upload
403
Table 112 Firmware Upload
403
Figure 163 Firmware Upload in Process
404
Figure 164 Network Temporarily Disconnected
404
Figure 165 Firmware Upload Error
404
Configuration Screen
405
Back to Factory Defaults
405
Figure 166 Configuration
405
Backup Configuration
406
Figure 167 Reset Warning Message
406
Restore Configuration
407
Figure 168 Configuration Upload Successful
407
Table 113 Restore Configuration
407
Restart Screen
408
Figure 169 Network Temporarily Disconnected
408
Figure 170 Restart Screen
409
Appendix A Troubleshooting
411
Problems Starting up the Business Secure Router
411
Table 114 Troubleshooting the Start-Up of Your Business Secure Router
411
Problems with the LAN LED
412
Problems with the LAN Interface
412
Table 115 Troubleshooting the LAN LED
412
Table 116 Troubleshooting the LAN Interface
412
Problems with the WAN Interface
413
Problems with Internet Access
413
Table 117 Troubleshooting the WAN Interface
413
Table 118 Troubleshooting Internet Access
413
Problems Accessing an Internet Web Site
414
Problems with the Password
414
Table 119 Troubleshooting Web Site Internet Access
414
Table 120 Troubleshooting the Password
414
Problems with the Webgui
415
Problems with Remote Management
415
Table 121 Troubleshooting the Webgui
415
Table 122 Troubleshooting Remote Management
415
Allowing Pop-Up Windows, Javascript and Java Permissions
416
Internet Explorer Pop-Up Blockers
416
Allowing Pop-Ups
416
Figure 171 Pop-Up Blocker
416
Enabling Pop-Up Blockers with Exceptions
417
Figure 172 Internet Options
417
Figure 173 Internet Options
418
Internet Explorer Javascript
419
Figure 174 Pop-Up Blocker Settings
419
Figure 175 Internet Options
420
Internet Explorer Java Permissions
421
Figure 176 Security Settings - Java Scripting
421
Figure 177 Security Settings - Java
422
JAVA (Sun)
422
Netscape Pop-Up Blockers
423
Figure 178 Java (Sun)
423
Allowing Pop-Ups
424
Figure 179 Allow Popups from this Site
424
Figure 180 Netscape Search Toolbar
424
Enable Pop-Up Blockers with Exceptions
425
Figure 181 Popup Windows
425
Figure 182 Popup Windows
426
Netscape Java Permissions and Javascript
427
Figure 183 Allowed Sites
427
Figure 184 Advanced
428
Figure 185 Scripts & Plug-Ins
429
Appendix B Log Descriptions
431
Table 123 System Error Logs
431
Table 124 System Maintenance Logs
431
Table 125 Upnp Logs
432
Table 126 Content Filtering Logs
432
Table 127 Attack Logs
432
Table 128 Access Logs
434
Table 129 ACL Setting Notes
439
Table 130 ICMP Notes
439
Table 131 Sys Log
440
Vpn/Ipsec Logs
440
Figure 186 Example VPN Initiator Ipsec Log
441
VPN Responder Ipsec Log
441
Figure 187 Example VPN Responder Ipsec Log
442
Table 132 Sample IKE Key Exchange Logs
443
Table 133 Sample Ipsec Logs During Packet Transmission
445
Table 134 RFC 2408 ISAKMP Payload Types
446
Table 135 PKI Logs
446
Table 136 Certificate Path Verification Failure Reason Codes
448
Table 137 IEEE 802.1X Logs
449
Log Commands
450
Configuring What You Want the Business Secure Router to Log
450
Table 138 Log Categories and Available Settings
450
Displaying Logs
451
Log Command Example
452
Index
453
Advertisement
Nortel BSR252 Fundamentals (44 pages)
Business Secure Router
Brand:
Nortel
| Category:
Network Router
| Size: 1.17 MB
Table of Contents
Table of Contents
3
Acronyms
7
Before You Begin
7
Preface
7
Text Conventions
7
Hard-Copy Technical Manuals
8
Related Publications
8
How to Get Help
9
Chapter 1
11
Introducing the Business Secure Router
11
Chapter 2 Hardware Installation
13
Front Panel
14
Rear Panel
15
Chapter 3 Setting up Your Computer IP Address
17
Static or Dynamic Configuration (Windows 2000/NT/XP)
17
Checking Your Computer IP Address
19
Chapter 4 Configuring Your Business Secure Router
21
Accessing Your Business Secure Router Via the Webgui
21
Using the Wizard to Configure for Internet Access
24
Internet Connection with Pppoe
26
Internet Connection with RFC 1483
26
Internet Connection with ENET ENCAP
27
Internet Connection with Pppoa
28
Test Your Internet Connection
32
Chapter 5 User Notes
33
General Notes
33
General
33
Firewall
34
Nat
34
VPN Client Termination
34
Security
36
Routing
36
Advanced Router Configuration
37
Setting up the Router When the System Has a Server
37
Connecting Two Sites to Establish a Virtual Private Network
37
Adding IP Telephony to a Multi-Site Network
38
Configuring the Router to Act as a Nortel VPN Server (Client Termination)
39
Configuring the Router to Connect to a Nortel VPN Server (Client Emulation)
39
Allowing Remote Management of a LAN-Connected BCM50
39
Setting up the Router for Guest Access
40
Preventing Heavy Data Traffic from Impacting Telephone Calls
40
Setting up a Remote Office with a Unistim IP Telephone
41
Inter-Operability with Third-Party Routers
42
VPN Connections with Cisco Routers
42
Chapter 6 Troubleshooting
43
Problem: None of the Leds Turn on When You Turn on the Business Secure Router
43
Problem: You Cannot Access the Business Secure Router from the LAN
43
Problem: You Cannot Ping any Computer on the LAN
43
Problem: You Cannot Get a WAN IP Address from the ISP
44
Problem: You Cannot Access the Internet
44
Nortel BSR252 Quick Install Manual (1 page)
Nortel Networks Router User Manual
Brand:
Nortel
| Category:
Network Router
| Size: 3.73 MB
Advertisement
Advertisement
Related Products
Nortel BSR222
Nortel BSR222 1.0
Nortel BCM50a
Nortel BES50GE-12T PWR
Nortel BES50GE-24T PWR
Nortel BES50FE-24T PWR
Nortel BES50FE-12T PWR
Nortel BCM50e
Nortel BSG12aw 1.0
Nortel BSG12ew 1.0
Nortel Categories
IP Phone
Telephone
Switch
Software
Server
More Nortel Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL