Billion BiGuard 30 User Manual

Billion BiGuard 30 User Manual

Billion ibusiness security gateway smb user's manual
Hide thumbs Also See for BiGuard 30:
Table of Contents

Advertisement

Quick Links

BiGuard 30
iBusiness Security Gateway SMB
User's Manual
Version Release 7.01 (FW:1.06p)

Advertisement

Table of Contents
loading

Summary of Contents for Billion BiGuard 30

  • Page 1 BiGuard 30 iBusiness Security Gateway SMB User’s Manual Version Release 7.01 (FW:1.06p)
  • Page 2: Copyright Information

    BiGuard 30 User’s Manual (Updated March 28, 2007) Copyright Information © 2007 Billion Electric Corporation, Ltd. The contents of this publication may not be reproduced in whole or in part, transcribed, stored, translated, or transmitted in any form or any means, without the prior written consent of Billion Electric Corporation.
  • Page 3: Safety Warnings

    • DO NOT use your BiGuard 30 and any accessories outdoors. • If you wall mount your BiGuard 30, make sure that no electrical, water or gas pipes will be damaged during installation. • DO NOT install or use your BiGuard 30 during a thunderstorm.
  • Page 4: Table Of Contents

    Table of Contents Chapter 1: Introduction 1.1 Overview 1.2 Product Highlights 1.2.1 Increased Bandwidth, Scalability and Resilience 1.2.2 Virtual Private Network Support 1.2.3 Advanced Firewall Security 1.2.4 Intelligent Bandwidth Management 1.3 Package Contents 1.3.1 Front Panel 1.3.2 Rear Panel 1.3.3 Rack Mounting 1.3.4 Cabling Chapter 2: Router Applications 2.1 Overview...
  • Page 5 2.6.1 General VPN Setup 2.6.2 VPN Planning - Fail Over 2.6.3 Concentrator Chapter 3: Getting Started 3.1 Overview 3.2 Before You Begin 3.3 Connecting Your Router 3.4 Configuring PCs for TCP/IP Networking 3.4.1 Overview 3.4.2 Windows XP 3.4.2.1 Configuring 3.4.2.2 Verifying Settings 3.4.3 Windows 2000 3.4.3.1...
  • Page 6 4.2.5 IPSec Status 4.2.6 PPTP Status 4.2.7 Traffic Statistics 4.2.8 System Log 4.2.9 IPSec Log 4.3 Quick Start 4.3.1 DHCP 4.3.2 Static IP 4.3.3 PPPoE 4.3.4 PPTP 4.3.5 Big Pond 4.4 Configuration 4.4.1 LAN 4.4.1.1 Ethernet 4.4.1.2 DHCP Server 4.4.1.3 LAN Address Mapping 4.4.2 WAN 4.4.2.1 ISP Settings 4.4.2.1.1 DHCP...
  • Page 7 4.4.4.8 Email Alert 4.4.5 Firewall 4.4.5.1 Packet Filter 4.4.5.2 URL Filter 4.4.5.3 LAN MAC Filter 4.4.5.4 Block WAN Request 4.4.5.5 Intrusion Detection 4.4.6 VPN 4.4.6.1 IPSec 4.4.6.1.1 IPSec Wizard 4.4.6.1.2 IPSec Policy 4.4.6.2 PPTP 4.4.7 QoS 4.4.8 Virtual Server 4.4.8.1 DMZ 4.4.8.2 Port Forwarding Table 4.4.9 Advanced 4.4.9.1 Static Route...
  • Page 8 5.2.3.3 Java Permissions 5.3 WAN Interface 5.3.1 Can’t Get WAN IP Address from the ISP 5.4 ISP Connection 5.5 Problems with Date and Time 5.6 Restoring Factory Defaults Appendix A: Product Specifications Appendix B: Customer Support Appendix C: FCC Interference Statement Appendix D: Network, Routing, and Firewall Basics D.1 Network Basics D.1.1 IP Addresses...
  • Page 9 E.2 What is IPSec? E.2.1 IPSec Security Components E.2.1.1 Authentication Header (AH) E.2.1.2 Encapsulating Security Payload (ESP) E.2.1.3 Security Associations (SA) E.2.2 IPSec Modes...
  • Page 10 E.2.3 Tunnel Mode AH E.2.4 Tunnel Mode ESP E.2.5 Internet Key Exchange (IKE) Appendix F: IPSec Logs and Events F.1 IPSec Log Event Categories F.2 IPSec Log Event Table Appendix G: Bandwidth Management with QoS G.1 Overview G.2 What is Quality of Service? G.3 How Does QoS Work? G.4 Who Needs QoS? G.4.1 Home Users...
  • Page 11: Product Highlights

    IPSec VPN is up to 30 simultaneous IPSec VPN connections are possible on BiGuard 30, with performance of up to 30Mbps. PPTP VPN is up to 4 simultaneous PPTP VPN...
  • Page 12: Advanced Firewall Security

    1.2.4 Intelligent Bandwidth Management BiGuard 30 utilizes Quality of Service (QoS) to give you full control over the priority of both incoming and outgoing data, ensuring that critical data such as customer information moves through your network, even while under a heavy load.
  • Page 13: Rear Panel

    Power A solid light indicates a steady connection to a power source. Status A blinking light indicates the device is writing to flash memory. Lit when connected to an Ethernet device. 1 – 8 10/100M : Lit green when connected at 100Mbps. Not lit when connected at 10Mbps.
  • Page 14: Rack Mounting

    DC12V Connect DC Power Adapter here. (12VDC) 1.3.3 Rack Mounting To rack mount BiGuard 30, carefully secure the device to your rack on both sides using the included brackets and screws. See the diagram below for a more detailed explanation.
  • Page 15: Cabling

    One of the most common causes of networking problems is bad cabling. Make sure that all connected devices are turned on. On the front panel of BiGuard 30, verify that the LAN link and WAN line LEDs are lit. If they are not, check to see that you are...
  • Page 16: Chapter 2: Router Applications

    Chapter 2: Router Applications 2.1 Overview Your BiGuard 30 router is a versatile device that can be configured to not only protect your network from malicious attackers, but also ensure optimal usage of available bandwidth with Quality of Service (QoS) and both Inbound and Outbound Load Balancing.
  • Page 17: Qos Policies For Different Applications

    2.2.2 QoS Policies for Different Applications By setting different QoS policies according to the applications you are running, you can use BiGuard 30 to optimize the bandwidth that is being used on your network. VoIP Normal PCs Restricted PC As illustrated in the diagram above, applications such as Voiceover IP (VoIP) require...
  • Page 18: Guaranteed / Maximum Bandwidth

    2.2.3 Guaranteed / Maximum Bandwidth Setting a Guaranteed Bandwidth ensures that a particular service receives a minimum percentage of bandwidth. For example, you can configure BiGuard 30 to reserve 10% of the available bandwidth for a particular computer on the network to transfer files.
  • Page 19: Priority Bandwidth Utilization

    2.2.5 Priority Bandwidth Utilization Assigning priority to a certain service allows BiGuard 30 to give either a higher or lower priority to traffic from this particular service. Assigning a higher priority to an application ensures that it is processed ahead of applications with a lower priority...
  • Page 20: Management By Ip Or Mac Address

    2.2.6 Management by IP or MAC address BiGuard 30 can also be configured to apply traffic policies based on a particular IP or MAC address. This allows you to quickly assign different traffic policies to a specific computer on the network.
  • Page 21: Dscp (Matching)

    IP header matches the criteria selected. These markings can be used to identify traffic within the network. 2.3 Outbound Traffic This section outlines some of the ways you can use BiGuard 30 to manage outbound traffic. 2.3.1 Outbound Fail Over Configuring BiGuard 30 for Outbound Fail Over allows you to ensure that outgoing traffic is uninterrupted by having BiGuard 30 default to WAN2 should WAN1 fail.
  • Page 22: Outbound Load Balancing

    In the above example, PC 1 (IP_192.168.2.2) and PC 2 (IP_192.168.2.3) are connected to the Internet via WAN1 (IP_230.100.100.1) on BiGuard 30. Should WAN1 fail, Outbound Fail Over tells BiGuard 30 to reroute outgoing traffic to WAN2 (IP_213.10.10.2). Configuring your BiGuard 30 for Outbound Fail Over provides a more reliable connection for your outgoing traffic.
  • Page 23: Inbound Traffic

    IP address of the client. By balancing the load between WAN1 and WAN2, your BiGuard 30 can ensure that outbound traffic is efficiently handled by making sure that both ports are equally sharing the load, preventing situations where one port is completely saturated by outbound traffic.
  • Page 24: Inbound Load Balancing

    In the above example, an FTP Server (IP_192.168.2.2) and an HTTP Server (IP_192.168.2.3) are connected to the Internet via WAN1 (ftp.billion.dyndns.org) on BiGuard 30. A remote computer is trying to access these servers via the Internet. Under normal circumstances, the remote computer will gain access to the network via WAN1.
  • Page 25: Dns Inbound

    For example, a sales force can be directed to www.billion2.dyndns.org, while the R&D group can access www.billion3.dyndns.org. By balancing the load between WAN1 and WAN2, your BiGuard 30 can ensure that inbound traffic is efficiently handled with both ports equally sharing the load, preventing situations where service is slow because one port is completely saturated by inbound traffic.
  • Page 26: Dns Inbound Fail Over

    DNS Inbound is a three step process. First, a DNS request is made to the router via a remote PC. BiGuard 30, based on settings specified by the user, will direct the requesting PC to the correct WAN port by replying the selected WAN IP address through the built-in DNS server.
  • Page 27: Dns Inbound Load Balancing

    In the above example, an FTP Server (IP_192.168.2.2) and an HTTP Server (IP_192.168.2.3) are connected to the Internet via WAN1 (IP_200.200.200.1) on BiGuard 30. A remote computer is trying to access these servers via the Internet, and makes a DNS request. The DNS request (www.mydomain.com) will be sent through WAN1 (200.200.200.1) to the built-in DNS server.
  • Page 28 If WAN2 is experiencing a heavy load, BiGuard 30 responds to incoming DNS requests with WAN1. By balancing the load between WAN1 and WAN2, your BiGuard 30 can ensure that inbound traffic is efficiently handled, making sure that both ports are equally sharing the load and preventing situations where service is slow because one port is completely saturated by inbound traffic.
  • Page 29: Virtual Private Networking

    WAN1 and WAN2 and decide which WAN IP to reply to the request (3). After the decision is made, BiGuard 30 will route the DNS reply to the user through WAN2 (4). The user will receive the DNS reply with the IP address of WAN1 (5). The browser will initiate an HTTP request to the WAN1 IP address (6).
  • Page 30: General Vpn Setup

    The following section discusses Virtual Private Networking with BiGuard 30. 2.6.1 General VPN Setup There are typically three different VPN scenarios. The first is a Gateway to Gateway setup, where two remote gateways communicate over the Internet via a secure tunnel.
  • Page 31: Vpn Planning - Fail Over

    The following sections demonstrate the various ways of using BiGuard 30 to setup your VPN. 2.6.2 VPN Planning - Fail Over Configuring your VPN with Fail Over allows BiGuard 30 to automatically default to WAN2 should WAN1 fail. biguard.billion.com 192.168.3.x...
  • Page 32: Concentrator

    VPN tunnel to headquarter with the exception of LAN-side traffic. This way, all branch offices can connect to each other through headquarter via the headquarter’s firewall management. You can also configure BiGuard 30 to function as a VPN Concentrator: Please refer to appendix H for example settings.
  • Page 33: Chapter 3: Getting Started

    Linux, Mac OS, and Windows 98/Me/NT/2000/XP operating systems. The following chapter takes you through the very first steps to configuring your network for BiGuard 30. Take a look and see how easy it is to get your network up and running. 3.2 Before You Begin BiGuard 30 is a flexible and powerful networking device.
  • Page 34: Connecting Your Router

    4. Prepare to physically connect BiGuard 30 to Cable or DSL modems and a computer. Be sure to also review the Safety Warnings located in the preface of this manual before working with your BiGuard 30.
  • Page 35: Configuring Pcs For Tcp/Ip Networking

    DHCP server. If using a fixed IP address, it is important to remember that it must be in the same subnet as the router. The default IP address of BiGuard 30 is 192.168.1.254 with a subnet mask of 255.255.255.0. Using the default configuration, networked PCs must reside in the same subnet, and have an IP address in the range of 192.168.1.1 to 192.168.1.253.
  • Page 36: Windows Xp

    If you are using Windows 3.1, you must purchase a third-party TCP/IP application package. Any TCP/IP capable workstation can be used to communicate with or through BiGuard 30. To configure other types of workstations, please consult the manufacturer’s documentation. 3.4.2 Windows XP 3.4.2.1...
  • Page 37 3. Select Internet Protocol (TCP/IP) and click Properties. 4a. To have your PC obtain an IP address automatically, select the Obtain an IP...
  • Page 38 address automatically and Obtain DNS server address automatically radio buttons. 4b. To manually assign your PC a fixed IP address, select the Use the following IP address radio button and enter your desired IP address, subnet mask, and default gateway in the blanks provided. Remember that your PC must reside in the same subnet mask as the router.
  • Page 39: Verifying Settings

    To verify your settings using a command prompt: 1. Click Start > Programs > Accessories > Command Prompt. 2. In the Command Prompt window, type ipconfig and then press ENTER. If you are using BiGuard 30’s default settings, your PC should have:...
  • Page 40 - An IP address between 192.168.1.1 and 192.168.1.253 - A subnet mask of 255.255.255.0 To verify your settings using the Windows XP GUI: 1. Click Start > Settings > Network Connections.
  • Page 41 2. Right click one of the network connections listed and select Status from the pop-up menu. 3. Click the Support tab.
  • Page 42: Windows 2000

    If you are using BiGuard 30’s default settings, your PC should: - Have an IP address between 192.168.1.1 and 192.168.1.253 - Have a subnet mask of 255.255.255.0 3.4.3 Windows 2000 3.4.3.1 Configuring 1. Select Start > Settings > Control Panel.
  • Page 43 2. In the Control Panel window, double-click Network and Dial-up Connections. 3. In Network and Dial-up Connections, double-click Local Area Connection.
  • Page 44 4. In the Local Area Connection window, click Properties. 5. Select Internet Protocol (TCP/IP) and click Properties.
  • Page 45 6a. To have your PC obtain an IP address automatically, select the Obtain an IP address automatically and Obtain DNS server address automatically radio buttons. 6b. To manually assign your PC a fixed IP address, select the Use the following IP address radio button and enter your desired IP address, subnet mask, and default gateway in the blanks provided.
  • Page 46: Verifying Settings

    7. Click OK to finish the configuration. 3.4.3.2 Verifying Settings 1. Click Start > Programs > Accessories > Command Prompt.
  • Page 47 2. In the Command Prompt window, type ipconfig and then press ENTER. If you are using BiGuard 30’s default settings, your PC should have: - An IP address between 192.168.1.1 and 192.168.1.253 - A subnet mask of 255.255.255.0...
  • Page 48: Windows 98 / Me

    3.4.4 Windows 98 / Me 3.4.4.1 Installing Components To prepare Windows 98/Me PCs for TCP/IP networking, you may need to manually install TCP/IP on each PC. To do this, follow the steps below. Be sure to have your Windows CD handy, as you may need to insert it during the installation process. 1.
  • Page 49 You must have the following installed:...
  • Page 50 - An Ethernet adapter - TCP/IP protocol - Client for Microsoft Networks If you need to install a new Ethernet adapter, follow these steps: a. Click Add. b. Select Adapter, then Add. c. Select the manufacturer and model of your Ethernet adapter, then click OK.
  • Page 51 If you need TCP/IP: a. Click Add. b. Select Protocol, then click Add.
  • Page 52 c. Select Microsoft. TCP/IP, then OK. If you need Client for Microsoft Networks: a. Click Add.
  • Page 53: Configuring

    b. Select Client, then click Add. c. Select Microsoft. Client for Microsoft Networks, and then click OK. 3. Restart your PC to apply your changes. 3.4.4.2 Configuring 1. Select Start > Settings > Control Panel.
  • Page 54 2. In the Control Panel, double-click Network and choose the Configuration tab.
  • Page 55 3. Select TCP / IP > ASUSTek or the name of any Network Interface Card (NIC) in your PC and click Properties. 4. Select the IP Address tab and click the Obtain an IP address automatically radio button.
  • Page 56 5. Select the DNS Configuration tab and select the Disable DNS radio button. 6. Click OK to apply the configuration.
  • Page 57: Verifying Settings

    3.4.4.3 Verifying Settings To check the TCP/IP configuration, use the winipcfg.exe utility: 1. Select Start > Run. 2. Type winipcfg, and then click OK. 3. From the drop-down box, select your Ethernet adapter.
  • Page 58: Factory Default Settings

    The window is updated to show your settings. Using the default BiGuard 30 settings, your PC should have: - An IP address between 192.168.1.1 and 192.168.1.253 - A subnet mask of 255.255.255.0 - A default gateway of 192.168.1.254 3.5 Factory Default Settings...
  • Page 59: Username And Password

    The Status LED will remain solid as the device boots. Once the boot sequence is complete, the LED will shut off, indicating that BiGuard 30 is ready. 3.5.2 LAN and WAN Port Addresses...
  • Page 60: Configuration Information

    If your account uses PPP over Ethernet (PPPoE), you will need to enter your login name and password when configuring your BiGuard 30. After the network and firewall are configured, BiGuard 30 will login automatically, and you will no longer need to run the login program from your PC.
  • Page 61 ISP, you need to copy the configuration information from your PC’s Network TCP/IP Properties window before reconfiguring your computer for use with BiGuard 30. The following sections describe how you can obtain this information. 3.6.2.1 Windows This section uses illustrations from Windows XP.
  • Page 62 3. In the Network Connections window, right-click Local Area Connection and select Properties. 4. Select Internet Protocol (TCP/IP) and click Properties.
  • Page 63 5. If an IP address, subnet mask and a Default gateway are shown, write down the information. If no address is present, your account’s IP address is dynamically assigned. Click the Obtain an IP address automatically radio button. 6. If any DNS server addresses are shown, write them down. Click the Obtain DNS...
  • Page 64 server address automatically radio button. 7. Click OK to save your changes.
  • Page 65: Web Configuration Interface

    (the default user name and password are "admin" and "admin") to access the Web Configuration Interface. If the Web Configuration Interface appears, congratulations! You are now ready to configure your BiGuard 30. If you are having trouble accessing the interface, please refer to Chapter 5: Troubleshooting for possible resolutions.
  • Page 66: Chapter 4: Router Configuration

    Chapter 4: Router Configuration 4.1 Overview The Web Configuration Interface makes it easy for you to manage your network via any PC connected to it. On the Web Configuration homepage, you will see the navigation pane located on the left hand side. From it, you will be able to select various options used to configure your router.
  • Page 67: Status

    The following sections will show you how to configure your router using the Web Configuration Interface. 4.2 Status The Status menu displays the various options that have been selected and a number of statistics about your BiGuard 30. In this menu, you will find the following sections: - ARP Table - Routing Table...
  • Page 68: Routing Table

    No.: Number of the list. IP Address: A list of IP addresses of devices on your LAN. MAC Address: The Media Access Control (MAC) addresses for each device on your LAN. Interface: The interface name (on the router) that this IP address connects to. Static: Static status of the ARP table entry.
  • Page 69: Session Table

    4.2.3 Session Table The NAT Session Table displays a list of current sessions for both incoming and outgoing traffic with protocol type, source IP, source port, destination IP and destination port, each page shows 10 sessions. No.: Number of the list. Protocol: Protocol type of the Session.
  • Page 70: Ipsec Status

    4.2.5 IPSec Status The IPSec Status window displays the status of the IPSec Tunnels that are currently configured on your BiGuard 30. Name: The name you assigned to the particular IPSec entry. Enable: Whether the IPSec connection is currently Enable or Disable.
  • Page 71: Pptp Status

    4.2.6 PPTP Status The PPTP Status window displays the status of the PPTP Tunnels that are currently configured on your BiGuard 30. Name: The name you assigned to the particular PPTP entry. Enable: Whether the PPTP connection is currently Enable or Disable.
  • Page 72: System Log

    WAN2: Transmitted (Tx) and Received (Rx) bytes and packets for WAN2. Display: Allows you to change the units of measurement for the traffic graph. 4.2.8 System Log This window displays BiGuard 30’s System Log entries. Major events are logged on this window. Refresh: Refresh the System Log.
  • Page 73: Quick Start

    Refresh: Refresh the IPSec Log. Clear Log: Clear the IPSec Log. Send Log: Send IPSec Log to your email account. You can set the email address in Configuration > System > Email Alert. See the Email Alert section for more details.
  • Page 74: Static Ip

    4.3.2 Static IP IP assigned by your ISP: Enter the assigned IP address from your IP. IP Subnet Mask: Enter your IP subnet mask. ISP Gateway Address: Enter your ISP gateway address. Primary DNS: Enter your primary DNS. Secondary DNS: Enter your secondary DNS. Click Apply to save your changes.
  • Page 75: Pptp

    4.3.4 PPTP Username: Enter your user name. Password: Enter your password. Retype Password: Retype your password. PPTP Client IP: Enter the PPTP Client IP provided by your ISP. PPTP Client IP Netmask: Enter the PPTP Client IP Netmask provided by your ISP. PPTP Client IP Gateway: Enter the PPTP Client IP Gateway provided by your ISP.
  • Page 76: Configuration

    For detailed instructions on configuring WAN settings, please refer to the WAN section of this chapter. 4.4 Configuration The Configuration menu allows you to set many of the operating parameters of BiGuard 30. In this menu, you will find the following sections: - LAN - WAN - Dual WAN...
  • Page 77: Lan

    There are three items within this section: Ethernet, DHCP Server and LAN Address Mapping. 4.4.1.1 Ethernet IP Address: Enter the internal LAN IP address for BiGuard 30 (192.168.1.254 by default). Subnet Mask: Enter the subnet mask (255.255.255.0 by default). RIP: RIP v2 Broadcast and RIP v2 Multicast. Check to enable RIP.
  • Page 78: Dhcp Server

    In this menu, you can disable or enable the Dynamic Host Configuration Protocol (DHCP) server. The DHCP protocol allows your BiGuard 30 to dynamically assign IP addresses to PCs on your network if they are configured to automatically obtain IP addresses.
  • Page 79: Lan Address Mapping

    Name: Enter the name you want to give for the IP+Mac Address Fixed Host account. Active: Select whether you want to Enable or Disable this particular Fixed Host account. IP Address: Enter the IP address that you want to reserve for the above MAC address.
  • Page 80: Wan

    Please click Create to create a LAN Address Mapping rule. Name: Please input the name of the rule. IP Address: Please input the LAN Gateway IP Address you would like to use. Netmask: Please input the Netmask you would like to use. WAN IP Address: Please click Candidates to select the WAN IP address you would like to use from WAN Alias list.
  • Page 81: Isp Settings

    The WAN menu contains two items: ISP Settings, Bandwidth Settings and WAN IP Alias. 4.4.2.1 ISP Settings This WAN Service Table displays the different WAN connections that are configured on BiGuard 30. To edit any of these connections, click Edit. You will be taken to the following menu.
  • Page 82: Dhcp

    Connection Method: Select how your router will connect to the Internet. Selections include Obtain an IP Address Automatically, Static IP Settings, PPPoE Settings, PPTP Settings, and Big Pond Settings. For each WAN port, the factory default is DHCP. If your ISP does not use DHCP, select the correct connection method and configure the connection accordingly.
  • Page 83: Static Ip

    and enter your primary and secondary DNS. RIP: To activate RIP, select Send, Receive, or Both from the drop down menu. To disable RIP, select Disable from the drop down menu. MTU: Enter the Maximum Transmission Unit (MTU) for your network. Network Address Translation: Enables or Disables the NAT function.
  • Page 84: Pppoe

    would like to use router mode, you have to input the packet filter rules you would like to forward in Configuration -> Firewall -> Packet filter Click Apply to save your changes. To reset to defaults, click Reset. 4.4.2.1.3 PPPoE Username: Enter your user name.
  • Page 85 MAC Address: If your ISP requires you to input a WAN Ethernet MAC, check the checkbox and enter your MAC address in the blanks below. Candidates: You can also select the MAC address from the list in the Candidates. DNS: If your ISP requires you to manually setup DNS settings, check the checkbox and enter your primary and secondary DNS.
  • Page 86: Big Pond

    PPTP Client IP Gateway: Enter the PPTP Client IP Gateway provided by your ISP. PPTP Server IP: Enter the PPTP Server IP provided by your ISP. Connection: Select whether the connection should Always Connect or Trigger on Demand. If you want the router to establish a PPTP session when starting up and to automatically re-establish the PPTP session when disconnected by the ISP, select Always Connect.
  • Page 87: Bandwidth Settings

    Username: Enter your user name. Password: Enter your password. Retype Password: Retype your password. Login Server: Enter the IP of the Login server provided by your ISP. MAC Address: If your ISP requires you to input a WAN Ethernet MAC, check the checkbox and enter your MAC address in the blanks below.
  • Page 88: Wan Ip Alias

    bandwidth for each WAN port. WAN1: Enter your ISP inbound and outbound bandwidth for WAN1. WAN2: Enter your ISP inbound and outbound bandwidth for WAN2. NOTE: These values entered here are referenced by both QoS and Load Balancing functions. 4.4.2.3 WAN IP Alias WAN IP Alias allows you to input additional WAN IP addresses.
  • Page 89: Dual Wan

    Name: Please input the name of the rule. IP Address: Please input the additional WAN IP address you would like to use. Interface: Please select the WAN Interface that you would like to add the additional WAN IP to. Click the Apply button to add the configuration into the WAN IP Alias. 4.4.3 Dual WAN In this section, you can setup the fail over or load balance function, outbound load balance or inbound load balance function, or setup specific protocol to bind with...
  • Page 90: Outbound Load Balance

    Mode: You can select Load Balance or Fail Over. Service Detection: Enables or disables the service detection feature. For fail over, the service detection function is enabled. For load balance, user is able to enable or disable it. Connectivity Decision: Establishes the number of times probing the connection has to fail before the connection is judged as failed.
  • Page 91 Outbound Load Balancing on BiGuard 30 can be based on one of two methods: 1. By session mechanism 2. By IP address hash mechanism Choose one by clicking the corresponding radio button. Based on Session Mechanism: The source IP address and destination IP address might go through WAN1 or WAN2 according to policy settings in this mechanism.
  • Page 92: Inbound Load Balance

    authenticate the source IP address. Balance by weight of link capacity: Uses an IP hash to balance traffic based on weight of link bandwidth capacity. Balance by weight: Uses an IP hash to balance traffic based on a ratio. Enter the desired ratio into the blanks provided.
  • Page 93 SOA: Domain Name: The domain name of DNS Server 1. It is the name that you register on DNS organization. You have to fill-out the Fully Qualified Domain Name (FQDN) with an ending character (a dot) for this text field.(ex:abc.com.).When you enter the following domain name, you can only input different chars without an ending dot, its name is then added with domain name, and it becomes FQDN.
  • Page 94 To edit the Host Mapping URL list, click Edit. This will open the Host Mapping URL table, which lists the current Host Mapping URLs. To add a host mapping URL to the list, click Create. Domain Name: The domain name of the local host. Host URL: The URL to be mapped.
  • Page 95: Protocol Binding

    Port Range: The port range of all incoming packets are accepted and processed by a local host with the specified private IP address. Candidates: You can also select the Candidates which are referred from the ARP table for automatic input. Name1: The Alias Host URL Name2: The Alias Host URL Click Apply to save your changes.
  • Page 96 Interface: Choose which WAN port to use: WAN1, WAN2 Packet Type: The particular protocol of Internet traffic for the specified policy. Choose from TCP, UDP, or Any. Source IP Range: All Source IP: Click it to specify all source IPs. Specified Source IP: Click to specify a specific source IP address and source IP netmask.
  • Page 97: System

    Simply choose your local time zone, enter NTP Server IP Address, and click Apply. After connecting to the Internet, BiGuard 30 will retrieve the correct local time from the NTP server you have specified. Your ISP may provide an NTP server for you to...
  • Page 98: Remote Access

    Click Apply to apply the rule, Click Cancel to discard the changes. 4.4.4.2 Remote Access To allow remote users to configure and manage BiGuard 30 through the Internet, select the Enable radio button. To deactivate remote access, select the Disable radio button.
  • Page 99: Firmware Upgrade

    Only the PC: Please specify the IP Address that is allowed to access. PC from the subnet: Please specify the subnet that is allowed to access. 4.4.4.3 Firmware Upgrade Upgrading your BiGuard 30’s firmware is a quick and easy way to enjoy increased...
  • Page 100: Backup / Restore

    To upgrade your firmware, simply visit Billion’s website (http://www.billion.com) and download the latest firmware image file for BiGuard 30. Next, click Browse and select the newly downloaded firmware file. Click Upgrade to complete the update.
  • Page 101: Restart

    4.4.4.5 Restart The Restart feature allows you to easily restart BiGuard 30. To restart with your last saved configuration, select the Current Settings radio button and click Restart. If you wish to restart the router using the factory default settings, select Factory Default Settings and click Restart to reboot BiGuard 30 with factory default settings.
  • Page 102: System Log Server

    Click Apply to save your changes. Click Reset to reset to the default administration password (admin). 4.4.4.7 System Log Server This function allows BiGuard 30 to send system logs to an external Syslog Server. Syslog is an industry-standard protocol used to capture information about network...
  • Page 103: Email Alert

    activity. To enable this function, select the Enable radio button and enter your Syslog server IP address in the Log Server IP Address field. Click Apply to save your changes. To disable this feature, simply select the Disable radio button and click Apply. 4.4.4.8 E-mail Alert The Email Alert function allows a log of security-related events (such as System Log and IPSec Log) to be sent to a specified email address.
  • Page 104: Firewall

    When log is full: The router will send an alert only when the log is full. 4.4.5 Firewall BiGuard 30 includes a full Stateful Packet Inspection (SPI) firewall for controlling Internet access from your LAN, and preventing attacks from hackers. Your router also acts as a "natural"...
  • Page 105 The Packet Filter function is used to limit user access to certain sites on the Internet or LAN. The Filter Table displays all current filter rules. If there is an entry in the Filter Table, you can click Edit to modify the setting of this entry, click Delete to remove this entry, or click Move to change this entry’s priority.
  • Page 106: Url Filter

    applications accessing your local network from the Internet. Outgoing Packet Filter rules prevent unauthorized computers or applications accessing the Internet. Select if the new filter rule is incoming or outgoing. Source IP: Select Any, Subnet, IP Range or Single Address. Starting IP Address: Enter the source IP or starting source IP address this filter rule is to be applied.
  • Page 107 The URL Filter is a powerful tool that can be used to limit access to certain URLs on the Internet. You can block web sites based on keywords or even block out an entire domain. Certain web features can also be blocked to grant added security to your network.
  • Page 108 Domains Filtering: Click the top checkbox to enable this feature. You can also choose to disable all web traffic except for trusted sites by clicking the bottom checkbox. To edit the list of filtered domains, click Details. Enter a domain and select whether this domain is trusted or forbidden with the pull-down menu.
  • Page 109: Lan Mac Filter

    Enter a name for the IP Address and then enter the IP address itself. Click Apply to save your changes. The IP address will be entered into the Exception List, and excluded from the URL filtering rules in effect. 4.4.5.3 LAN MAC Filter LAN Mac Filter can decide that BiGuard will serve those devices at LAN side or not by MAC Address.
  • Page 110: Block Wan Request

    Create: You can also input a specified MAC Address to be dropped or Forward without depending on the default rule. Rule: Enable or disable this entry. Action When Matched: Select to Drop or Forward the packet specified in this filter entry.
  • Page 111: Intrusion Detection

    Blocking WAN requests is one way to prevent DDOS attacks by preventing ping requests from the Internet. Use this menu to enable or disable function. 4.4.5.5 Intrusion Detection Intrusion Detection can prevent most common DoS attacks from the Internet or from LAN users.
  • Page 112: Vpn

    Limit Maximum sessions per IP to (with reject and drop options): Just like the previous option, this option expands on what to do with additional sessions above the maximum limit. You can either reject the additional sessions for a period of time or just drop all packets from those sessions for a period of time.
  • Page 113 Connection Name: A user-defined name for the connection. Interface: Select the interface the IPSec tunnel will apply to. WAN1: Select interface WAN1 WAN2: Select interface WAN2 Auto: The device will automatically apply the tunnel to WAN1 or WAN2 depending on which WAN interface is active when the IPSec tunnel is being established.
  • Page 114 Secure Gateway Address (or Domain Name): The IP address or hostname of the remote VPN gateway. Remote Network: The subnet of the remote network. Allows you to enter an IP address and netmask. Back: Back to the Previous page. Next: Go to the next page. (2)LAN to Mobile LAN: BiGuard would like to establish an IPSec VPN tunnel with remote router using Dynamic Internet IP by using aggressive mode.
  • Page 115 Remote Identifier: The Identifier of the remote gateway. According to the input value, the ID type will be auto-defined as IP Address, FQDN(DNS) or FQUN(E-mail). Remote Network: The subnet of the remote network. Allows you to enter an IP address and netmask. Back: Back to the Previous page.
  • Page 116 remote VPN device that is connected and establishes a VPN tunnel. Back: Back to the Previous page. Next: Go to the next page. (4)LAN to Mobile Host: BiGuard would like to establish an IPSec VPN tunnel with remote client software using Dynamic Internet IP by using aggressive mode. Remote Identifier: The Identifier of the remote gateway.
  • Page 117 VPN Client IP Address: The VPN Client Address for BiGuard VPN Client, this value will be applied on both remote ID and Remote Network as single address. Back: Back to the Previous page. Next: Go to the next page. After your configuration is done, you will see a Configuration Summary. Back: Back to the Previous page.
  • Page 118: Ipsec Policy

    4.4.6.1.2 IPSec Policy Click Create to create a new IPSec VPN connection account. Configuring a New VPN Connection...
  • Page 119 Connection Name: A user-defined name for the connection. Tunnel: Select Enable to activate this tunnel. Select Disable to deactivate this tunnel. Interface: Select the interface the IPSec tunnel will apply to. WAN1: Select interface WAN1 WAN2: Select interface WAN2 Auto: The device will automatically apply the tunnel to WAN1 or WAN2 depending on which WAN interface is active when the IPSec tunnel is being established.
  • Page 120 interface if Auto is selected. Local: This section configures the local host. ID: This is the identity type of the local router or host. Choose from the following four options: WAN IP Address: Automatically use the current WAN Address as ID. IP Address: Use an IP address format.
  • Page 121 Any Local Address: Will enable any local address on the network. Subnet: The subnet of the remote network. Selecting this option allows you to enter an IP address and netmask. IP Range: The IP Range of the remote network. Single Address: The IP address of the remote host. Gateway Address: The gateway address of the remote host.
  • Page 122 negotiation time. Diffie-Hellman is a public-key cryptography protocol that allows two parties to establish a shared secret over the Internet. Pre-shared Key: This is for the Internet Key Exchange (IKE) protocol. IKE is used to establish a shared security policy and authenticated keys for services (such as IPSec) that require a key.
  • Page 123: Pptp

    IP Addresses Assigned to Peer Start from: 192.168.1.x: please input the IP assigned range from 1 ~ 254 (except BiGuard 30’s LAN IP address with 192.168.1.254 as BiGuard 30’s default LAN IP address and IP pool range of DHCP server settings with 100~199 as BiGuard 30’s default DHCP IP pool range.) Idle Timeout “...
  • Page 124: Qos

    PPTP Tunnel, please select Enable or Disable. 4.4.7 QoS BiGuard 30 can optimize your bandwidth by assigning priority to both inbound and outbound data with QoS. This menu allows you to configure QoS for both inbound and outbound traffic.
  • Page 125 The first menu screen gives you an overview of which WAN ports currently have QoS active, and the bandwidth settings for each. WAN1 Outbound: QoS Function: QoS status for WAN1 outbound. Select Enable to activate QoS for WAN1’s outgoing traffic. Select Disable to deactivate. Max ISP Bandwidth: The maximum bandwidth afforded by the ISP for WAN1’s outbound traffic.
  • Page 126 Creating a New QoS Rule To get started using QoS, you will need to establish QoS rules. These rules tell BiGuard 30 how to handle both incoming and outgoing traffic. The following example shows you how to configure WAN1 Outbound QoS. Configuring the other traffic types follows the same process.
  • Page 127 Interface: The current traffic type. This can be WAN1 (outbound, inbound) and WAN2 (outbound, inbound). Application: User defined application name for the current rule. Packet Type: The type of packet this rule applies to. Choose from Any, TCP, UDP, or ICMP. Guaranteed: The guaranteed amount of bandwidth for this rule as a percentage.
  • Page 128: Virtual Server

    Helper: You could also select the application type you would like to apply for automatic input. Click Apply to save your changes. For MAC Address: Source MAC Address: The source MAC Address of the device this rule applies to. Candidates: You can also select the Candidates which are referred from the ARP table for automatic input.
  • Page 129: Dmz

    PCs. Please see the WAN Configuration section of this manual for more information on NAT. BiGuard 30 can also be configured as a virtual server so that remote users accessing services such as Web or FTP services via the public (WAN) IP address can be automatically redirected to local servers in the LAN network.
  • Page 130: Port Forwarding Table

    table for automatic input. Select the Apply button to apply your changes. 4.4.8.2 Port Forwarding Table Because NAT can act as a "natural" Internet firewall, your router protects your network from being accessed by outside users, as all incoming connection attempts will point to your router unless you specifically create Virtual Server entries to forward those ports to a PC on your network.
  • Page 131: Advanced

    Application: User defined application name for the current rule. Helper: You could also select the application type you would like to apply for automatic input. Protocol type: please select protocol type External Port: Enter the port number of the service that will be sent to the Internal IP address.
  • Page 132: Static Route

    BiGuard 30. Users who do not understand the features should not attempt to reconfigure their router, unless advised to do so by support staff. There are five items within the Advanced section: Static Route, Dynamic DNS, Device Management, IGMP and VLAN Bridge.
  • Page 133: Dynamic Dns

    Rule: Select Enable to activate this rule, Disable to deactivate this rule. Destination: This is the destination subnet IP address. Netmask: This is the subnet mask of the destination IP addresses based on above destination subnet IP. Gateway: This is the gateway IP address to which packets are to be forwarded. Interface: Select the interface through which packets are to be forwarded.
  • Page 134 You will first need to register and establish an account with the Dynamic DNS provider using their website, Example: DYNDNS http://www.dyndns.org/ (BiGuard 30 supports several Dynamic DNS providers , such as www.orgdns.org , www.dhs.org, www.dyns.cx, www.3domain.hk, www.dyndns.org , www.3322.org ) Dynamic DNS: Disable: Check to disable the Dynamic DNS function.
  • Page 135: Device Management

    4.4.9.3 Device Management The Device Management Advanced Configuration settings allow you to control your router’s security options and device monitoring features. Device Name Name: Enter a name for this device. Web Server Settings HTTP Port: This is the port number the router’s embedded web server (for web-based configuration) will use.
  • Page 136: Igmp

    SNMP Function: Select Enable to activate this function, Disable to deactivate this function. SNMP V1 and V2 Read Community: Input the string for Read community to match your SNMP software. Write Community: Input the string for Write community to match your SNMP software.
  • Page 137: Vlan Bridge

    Click Apply to apply this function, and please note that the setting will become effective after you save to flash and restart the router. 4.4.9.5 VLAN Bridge This section allows you to create VLAN group and specify the member. VLAN Mode: Select Disable to disable VLAN mode, select Bridge Mode to use VLAN Bridge function and select Tagging Mode to use the VLAN Tagging mode option.
  • Page 138: Save Configuration To Flash

    Tagged Member port(s): Please check the interface that you would like to use in this VLAN ID group. Untagged Member port(s): Please check the interface that you would like to use in this VLAN ID group. Click Apply to add this rule. 4.5 Save Configuration To Flash After changing the router’s configuration settings, you must save all of the configuration parameters to flash memory to avoid them being lost after turning off...
  • Page 139: Chapter 5: Troubleshooting

    5.1.2 LEDs Never Turn Off When your BiGuard 30 is turned on, the LEDs turn on for about 10 seconds and then turn off. If all the LEDs stay on, there may be a hardware problem. If all LEDs are still on one minute after powering up: - Cycle the power to see if the router recovers.
  • Page 140: Forgot My Password

    Please note that both the User Name and Password are case-sensitive. If this fails, you can restore your BiGuard 30 to its factory default settings by holding the Reset button on the back of your router until the Status LED begins to blink.
  • Page 141: Can't Access Web Configuration Interface

    - Check the 10/100 LAN LEDs on BiGuard 30’s front panel. One of these LEDs should be on. If they are both off, check the cables between BiGuard 30 and the hub or PC. - Check the corresponding LAN LEDs on your PC’s Ethernet device are on.
  • Page 142 3. Make sure that the Delete All Offline Content checkbox is checked, and click 4. Click OK under Internet Options to close the dialogue. - In Windows, type arp –d at the command prompt to clear you computer’s ARP table.
  • Page 143: Pop-Up Windows

    To use the Web Configuration Interface, you need to disable pop-up blocking. You can either disable pop-up blocking, which is enabled by default in Windows XP Service Pack 2, or create an exception for your BiGuard 30’s IP address. Disabling All Pop-ups In Internet Explorer, select Tools >...
  • Page 144: Java Permissions

    3. Under Scripting, check to see if Active scripting is set to Enable. 4. Ensure that Scripting of Java applets is set to Enabled. 5. Click OK to close the dialogue. 5.2.3.3 Java Permissions The following Java Permissions should also be given for the Web Configuration Interface to display properly: 1.
  • Page 145: Wan Interface

    BiGuard 30’s system name. 5.4 ISP Connection Unless you have been assigned a static IP address by your ISP, your BiGuard 30 will need to request an IP address from the ISP in order to access the Internet. If your BiGuard 30 is unable to access the Internet, first determine if your router is able to obtain a WAN IP address from the ISP.
  • Page 146 If an IP address cannot be obtained: 1. Turn off the power to your cable or DSL modem. 2. Turn off the power to your BiGuard 30. 3. Wait five minutes and power on your cable or DSL modem. 4. When the modem has finished synchronizing with the ISP (generally shown by LEDs on the modem), turn on the power to your router.
  • Page 147: Problems With Date And Time

    Configuration > System > Time Zone. 5.6 Restoring Factory Defaults You can restore your BiGuard 30 to its factory settings by holding the Reset button on the back of your router until the Status LED begins to blink. This will reset your...
  • Page 148: Appendix A: Product Specifications

    Appendix A: Product Specifications Availability and Resilience - Dual-WAN ports - Load balancing for increased bandwidth of inbound and outbound traffic - Automatic failover to redirect the packet when one broadband connection is broken. It will keep your Internet connection always online whenever one connection should fail.
  • Page 149: Content Filtering

    Firewall - Stateful Packet Inspection (SPI) and Denial of Service (DoS) prevention - Packet filter un-permitted inbound (WAN)/Inbound (LAN) Internet access by IP address, port number and packet type - Email alert and logs of attack - MAC Address Filtering - Intrusion detection Content Filtering - URL Filter settings prevent user access to certain sites on the Internet...
  • Page 150: Physical Interface

    Physical Interface Ethernet WAN 2 ports (10/100 Base-T), support Auto- Crossover (MDI/MDIX) Ethernet LAN 8 ports (10/100 Base-T) switch support Auto- Crossover (MDI/MDIX) Physical Specifications Dimensions: 18.98" x 6.54" x 1.77" (482mm x 166 mm x 45mm, with Bracket) 9.84" x 6.54" x 1.38" (250mm x 166 mm x 35mm, non Bracket) Power Requirement Input: 12VDC, 1A Operating Environment...
  • Page 151: Appendix B: Customer Support

    Appendix B: Customer Support Most problems can be solved by referring to the Troubleshooting section in the User’s Manual. If you cannot resolve the problem with the Troubleshooting chapter, please contact the dealer where you purchased this product. Contact Billion Worldwide http://www.billion.com/...
  • Page 152: Appendix C: Fcc Interference Statement

    Appendix C: FCC Interference Statement This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: - This device may not cause harmful interference. - This device must accept any interference received, including interference that may cause undesired operations.
  • Page 153: Appendix D: Network, Routing, And Firewall Basics

    Appendix D: Network, Routing, and Firewall Basics D.1 Network Basics D.1.1 IP Addresses With the number of TCP/IP networks interconnected across the globe, ensuring that transmitted data reaches the correct destination requires each computer on the Internet has a unique identifier. This identifier is known as the IP address. The Internet Protocol (IP) uses a 32-bit address structure, and the address is usually written in dot notation.
  • Page 154: Subnet Addressing

    back slash (/). For example, a typical Class C address could be written as 192.168.234.245/24, which means that the net mask is 24 ones followed by 8 zeros. (11111111 11111111 11111111 00000000). D.1.1.2 Subnet Addressing Subnet addressing enables the split of one IP network address into multiple physical networks.
  • Page 155: Network Address Translation (Nat)

    In addition, other information such as gateway and DNS address can also be assigned with a DHCP server. When connecting to the ISP, BiGuard 30 also functions as a DHCP client. BiGuard 30 can automatically obtain an IP address, subnet mask, gateway address, and DNS server addresses if the ISP assigns this information via DHCP.
  • Page 156: Router Basics

    Routers can vary in performance and scale, the types of physical WAN connection they support, and the number of routing protocols supported. BiGuard 30 offers a convenient and powerful way for small-to-medium businesses to connect their networks.
  • Page 157: Firewall Basics

    D.3.1.1 Stateful Packet Inspection BiGuard 30 uses Stateful Packet Inspection (SPI) to protect your network from intrusions and attacks. Unlike less sophisticated Internet sharing routers, SPI ensures secure firewall filtering by intercepting incoming packets at the network layer, and analyzing them for state-related information that is associated with all network connections.
  • Page 158: Why Use A Firewall

    Internet. Still, there are ways for more dedicated hackers to either obtain information about your network or disrupt your network’s Internet access. Your BiGuard 30 provides an extra level of protection from such attacks with its built-in firewall.
  • Page 159: Appendix E: Virtual Private Networking

    Appendix E: Virtual Private Networking E.1 What is a VPN? A Virtual Private Network (VPN) is a shared network where private data is segmented from other traffic so that only the intended recipient has access. It allows organizations to securely transmit data over a public medium like the Internet.
  • Page 160 data authentication, integrity, and confidentiality as data is transferred across IP networks. IPSec provides data security at the IP packet level, and protects against possible security risks by protecting data. IPSec is widely used to establish VPNs. There are three major functions of IPSec: - Confidentiality: Conceals data through encryption.
  • Page 161 Next Payload Reserved Header Length Sequence Number Authentication Data E.2.1.2 Encapsulating Security Payload (ESP) Encapsulating Security Payload (ESP) provides privacy for data through encryption. An encryption algorithm combines the data with a key to encrypt it. It then repackages the data using a special format, and transmits it to the destination. The receiver then decrypts the data using the same algorithm.
  • Page 162 Sequence Number Data Next Authentication Data E.2.1.3 Security Associations (SA) Security Associations are a one-way relationships between sender and receiver that specify IPSec-related parameters. They provide data protection by using the defined IPSec protocols, and allow organizations to control according to the security policy in effect, which resources may communicate securely.
  • Page 163 AH/E Transport Mode - This mode is used to provide data security between two networks. It provides protection for the entire IP packet and is sent by adding an outer IP header corresponding to the two tunnel end-points. Since tunnel mode hides the original IP header, it provides security of the networks with private IP address space.
  • Page 164 E.2.4 Tunnel Mode ESP Here is an example of a packet with ESP applied: Original Packet Data IP Header Packet with IPSec Encapsulation Security Payload New IP Header ESP Header Org IP Header Data ESP Trailer Authentication encrypted Authenticated E.2.5 Internet Key Exchange (IKE) Before either AH or ESP can be used, it is necessary for the two communication devices to exchange a secret key that the security protocols themselves will use.
  • Page 165 encryption, and is more vulnerable to Denial of Service attacks. Phase II, known as Quick Mode, establishes symmetrical IPSec Security Associations for both AH and ESP. It does this by negotiating IPSec parameters, exchange nonces to derive session keys from the IKE shared secret, exchange DH values to generate a new key, and identify which traffic this SA bundle will protect using selectors (IDi and IDr payloads).
  • Page 166 Appendix F: IPSec Logs and Events F.1 IPSec Log Event Categories There are three major categories of IPSec Log Events for your BiGuard 30. These include: 1. IKE Negotiate Packet Messages 2. Rejected IKE Messages 3. IKE Negotiated Status Messages The table in the following section lists the different events of each category, and provides a detailed explanation of each.
  • Page 167 Send Main mode second response Sending the main mode second response message. Done to exchange key message of ISAKMP values. Received Main mode second Received the main mode second response message. Done to exchange response message of ISAKMP key values. Send Main mode third message of Sending the third message of main mode.
  • Page 168 Received Quick mode first Received the first response message of quick mode (Phase II). Done to response message exchange proposal and key values (IPSec). Send Quick mode second message Sending the second message of quick mode (Phase II). Received Quick mode second Received the second message of quick mode (Phase II).
  • Page 169 Received Delete SA payload: Deleting ISAKMP State (integer) (Main/Aggressive) mode peer ID is (identifier string) ISAKMP SA Established IPsec SA Established...
  • Page 170 Internet. When too many are accessing the Internet at the same time, service can slow to a crawl, causing service interruptions and general frustration. Quality of Service (QoS) is one of the ways BiGuard 30 can optimize the use of bandwidth, ensuring a smooth and responsive Internet connection for all users.
  • Page 171 -Prioritization: Assigns different priority levels for different applications, prioritizing traffic. High, Normal and Low priority settings. -Outbound and Inbound IP Throttling: Controls network traffic and allows you to limit the speed of each application. -DiffServ Technology: Manages priority queues and DSCP tagging through the Internet backbone.
  • Page 172 Application Data Ratio (%) On-line games Skype Email Other G.4.2 Office Users QoS is also ideal for small businesses using an office server as a web server. With QoS control, web pages served to your customers can be given top priority and delivered first so that it will not be impeded by email and office web browsing.
  • Page 173 Appendix H: Router Setup Examples H.1 Outbound Fail Over Step 1: Go to Configuration > WAN > ISP Settings. Select WAN1 and WAN2 and click Edit. Step 2: Configure WAN1 and WAN2 according to the information given by your ISP.
  • Page 174 Step 3: Go to Configuration > Dual WAN > General Settings. Select the Fail Over radio button. Under Connectivity Decision, input the number of times BiGuard 30 should probe the WAN before deciding that the ISP is in service or not (3 by default).
  • Page 175 Please ensure the WAN ports are functioning by performing a ping operation on each before proceeding. Finally, choose whether or not BiGuard 30 should fail back to WAN1. Step 4: Click Save Config to save all changes to flash memory.
  • Page 176 Step 2: Configure your WAN2 ISP settings and click Apply. Step 3: Go to Configuration > Dual WAN > General Settings. Select the Load Balance radio button.
  • Page 177 Step 4: Go to Configuration > Dual WAN > Outbound Load Balance. Choose the Load Balance mechanism you want and click Apply. Step 5: Complete. To check traffic statistics, go to Status > Traffic Statistics. Step 6: Click Save Config to save all changes to flash memory.
  • Page 178 H.3 Inbound Fail Over Configuring your BiGuard 30 for Inbound Fail Over is a great way to ensure a more reliable connection for incoming requests. To do so, follow these steps: NOTE: Before you begin, ensure that both WAN1 and WAN2 have been properly configured.
  • Page 179 Step 2: Configure Fail Over options if necessary. Step 3: Go to Configuration > Advanced > Dynamic DNS. Set the WAN1 DDNS settings.
  • Page 180 Step 4: From the same menu, set the WAN2 DDNS settings. Step 5: Click Save Config to save all changes to flash memory.
  • Page 181 H.4 DNS Inbound Fail Over Authoritative Domain Name Server 192.168.2.2 1st connection Built-in DNS 192.168.2.3 HTTP Before Fail Over 192.168.2.2 Built-in DNS 192.168.2.3 HTTP After Fail Over NOTE: Before proceeding, please ensure that both WAN1 and WAN2 are properly configured according to the settings provided by your ISP. If not, please refer to Chapter 4.2.2.1 ISP Settings for details on how to configure your WAN ports.
  • Page 182 Enable radio button and configure DNS Server 1 by clicking Edit. Step 3: Input DNS Server 1 settings and click Apply. Step 4: Configure your Host URL Mapping for DNS Server 1 by clicking Edit to enter the Host URL Mappings List. Click Create and input the settings for Host URL Mappings and click New.
  • Page 183 Step 5: Click Save Config to save all changes to flash memory. H.5 DNS Inbound Load Balancing Authoritative Domain Name Server 192.168.2.2 WAN 1 WAN 2 192.168.2.3 Built-in DNS Heavy load on WAN 2 HTTP 192.168.2.2 WAN 1 WAN 2 192.168.2.3 Built-in DNS HTTP...
  • Page 184 Balance radio button. Step 2: Go to Configuration > Dual WAN > Inbound Load Balance > Server Settings and configure DNS Server 1. Step 3: Go to Configuration > Dual WAN > Inbound Load Balance > Host URL...
  • Page 185 Mapping and configure your FTP mapping. Step 4: Next configure your HTTP mapping. Step 5: Click Save Config to save all changes to flash memory.
  • Page 186 H.6 Dynamic DNS Inbound Load Balancing 192.168.2.2 www.billion3.dyndns.org www.billion2.dyndns.org 192.168.2.3 www.billion3.dyndns.org HTTP www.billion2.dyndns.org Remote Access from Internet Step 1: Go to Configuration > WAN > Bandwidth Settings. Configure your WAN inbound and outbound bandwidth.
  • Page 187 Step 2: Go to Configuration > Dual WAN > General Settings and enable Load Balance mode. You may then decide whether to enable Service Detection or not. Step 3: Go to Configuration > Dual WAN > Outbound Load Balance. Choose your load balance policy and click Apply to apply your changes.
  • Page 188 Step 4: Go to Configuration > Advanced > Dynamic DNS and input the dynamic DNS settings for WAN1 and WAN2. WAN1:...
  • Page 189 WAN 2: Step 5: Go to Configuration > Virtual Server and set up a virtual server for both FTP and HTTP.
  • Page 190 Step 6: Click Save Config to save all changes to flash memory. H.7 VPN Configuration This section outlines some concrete examples on how you can configure BiGuard 30 for your VPN. H.7.1 LAN to LAN...
  • Page 191 IP Address Data 69.121.1.30 Network Any Local Address IP Address 192.168.0.0 Netmask 255.255.255.0 Secure Gateway Address(or 69.121.1.3 Hostname) IP Address Data 69.121.1.3 Network Subnet IP Address 192.168.1.0 Netmask 255.255.255.0 IKE Pre-shared Key 12345678 Security Algorithm Main Mode; ESP: 3DES Branch Office Head Office Local IP Address...
  • Page 192 H.7.2 Host to LAN Single client IP Address Data 69.121.1.30 Network Any Local Address IP Address 0.0.0.0 Netmask 0.0.0.0 Secure Gateway Address(or 69.121.1.3 Hostname) IP Address Data 69.121.1.3 Head Office Local IP Address 69.121.1.3 Any Local Address 192.168.1.0 255.255.255.0 Remote 69.121.1.30 IP Address 69.121.1.30...
  • Page 193 Network Subnet IP Address 192.168.1.0 Netmask 255.255.255.0 IKE Pre-shared Key 12345678 Security Algorithm Main Mode; ESP: 3DES H.8 IP Sec Fail Over (Gateway to Gateway) biguard.billion.com 192.168.2.x BiGuard3 Before Fail Over 192.168.2.x biguard.billion.com BiGuard3 Single Address 69.121.1.30 255.255.255.255 Proposal 12345678 Main 3DES 200.200.200.1...
  • Page 194 Step 1: Go to Configuration > Dual WAN > General Settings. Enable Fail Over by selecting the Fail Over radio button. Then, configure your Fail Over policy. Step 2: Go to Configuration > Advanced > Dynamic DNS and configure your dynamic DNS settings (Both WAN1 and WAN2).
  • Page 195 Step 3: Go to Configuration > VPN > IPSec > IPSec Policy. Click Create to configure VPN settings. Step 4: Click Save Config to save all changes to flash memory. To configure BiGuard 10 gateway, refer to the screenshot below.
  • Page 196 Remote subnet: 192.168.4.0 Remote mask: 255.255.255.0 Step 1: Go to Configuration > VPN > IPSec > IPSec Policy and configure the link from BiGuard 30 to BiGuard 10 Branch A. Local ID Type: Subnet Local subnet: 192.168.3.0 Local mask: 255.255.255.0 Remote ID Type: Subnet Remote subnet: 0.0.0.0...
  • Page 197 Step 2: Go to Configuration > VPN > IPSec > IPSec Policy and configure the link from BiGuard 30 to BiGuard 10 Branch B. Step 3: Go to Configuration > VPN > IPSec > IPSec Policy and configure the connection from BiGuard 10 Branch A to BiGuard 30.
  • Page 198 Step 4: Go to Configuration > VPN > IPSec > IPSec Policy and configure the connection from BiGuard 10 Branch B to BiGuard 30. Step 5: Click Save Config to save all changes to flash memory. H.10 Protocol Binding Step 1: Go to Configuration > Dual WAN > General Settings. Select the Load...
  • Page 199 Step 2: Go to Configuration > Dual WAN > Protocol Binding and configure settings for WAN1. Step 3: Go to Configuration > Dual WAN > Protocol Binding and configure settings for WAN2. Step 4: Click Save Config to save all changes to flash memory.
  • Page 200 H.11 Intrusion Detection BiGuard Safe!! Server Safe!! Intrusion Detection on Detected! Step 1: Go to Configuration > Firewall > Intrusion Detection and Enable the settings. Step 2: Click Apply and then Save Config to save all changes to flash memory. H.12 PPTP Remote Access by Windows XP Internet Internet...
  • Page 201 Step1: Go to Configuration > VPN > PPTP and Enable the PPTP function, Click Apply. Step2: Click Create to create a PPTP Account. Step3: Click Apply, you can see the account is successfully created.
  • Page 202 Step4: Click Save Config to save all changes to flash memory. Step5: In Windows XP, go Start > Settings > Network Connections.
  • Page 203 Step6: In Network Tasks, Click Create a new connection, and press Next. Step7: Select Connect to the network at my workplace and press Next.
  • Page 204 Step8: Select Virtual Private Network connection and press Next. Step9: Input the user-defined name for this connection and press Next.
  • Page 205 Step10: Input PPTP Server Address and press Next. Step11: Please press Finish.
  • Page 206 Step12: Double click the connection, and input Username and Password that defined in BiGuard PPTP Account Settings. PS. You can also refer the Properties > Security page as below, by default.
  • Page 207 H.13 PPTP Remote Access by BiGuard Internet Internet Headquarter 100.100.100.1 BiGuard &PPTP Server Local subnet: 192.168.30.0 Local mask: 255.255.255.0 Step1: Go to Configuration > VPN > PPTP and Enable the PPTP function, Disable the Encryption, then Click Apply. Branch Office 200.200.200.1 Internet Internet...
  • Page 208 Step2: Click Create to create a PPTP Account. Step3: Click Apply, you can see the account is successfully created. Step4: Click Save Config to save all changes to flash memory.
  • Page 209 Step5: In another BiGuard as Client, Go to Configuration > WAN > ISP Settings. Step6: Click Apply, and Save CONFIG.

Table of Contents