Billion BiPAC 8500 User Manual

Shdsl vpn firewall bridge/ router, shdsl.bis (vpn) firewall bridge/router
Hide thumbs Also See for BiPAC 8500:

Advertisement

Quick Links

BiPAC 8500/8520
SHDSL VPN Firewall Bridge/ Router
BiPAC 8501/8501 R2/8521
SHDSL.bis (VPN) Firewall Bridge/Router
User Manual
Firmware Version 5.75
Last Revised on September 2010

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BiPAC 8500 and is the answer not in the manual?

Questions and answers

Summary of Contents for Billion BiPAC 8500

  • Page 1 BiPAC 8500/8520 SHDSL VPN Firewall Bridge/ Router BiPAC 8501/8501 R2/8521 SHDSL.bis (VPN) Firewall Bridge/Router User Manual Firmware Version 5.75 Last Revised on September 2010...
  • Page 2: Table Of Contents

    Chapter 1: Product ....................1 Introduction to your Router ................1 Features ....................1 Chapter 2: Installing the Router ................4 Package Contents..................4 Device Description ..................5 BiPAC 8500 ..................5 Front Panel LED ................5 Rear Ports ..................6 BiPAC 8520 ..................7 Front Panel LED ................7 Rear Ports ..................8 BiPAC 8501 ..................9...
  • Page 3 LAN - Local Area Network .............50 WAN - Wide Area Network ............57 System ..................83 Firewall ..................90 VPN (Virtual Private Networks) (BiPAC 8500/ 8501/ 8520 Only) 106 QoS - Quality of Service .............136 Virtual Server (Port Forwarding) ..........143 Time Schedule ................149 Advanced ..................151...
  • Page 4 Chapter 5: Troubleshooting ................172 Appendix: Product Support & Contact .............173...
  • Page 5: Chapter 1: Product

    Chapter 1: Product Introduction to your Router Thank you for purchasing Billion BiPAC 8500/ 8520/ 8501/ 8501 R2/ 8521 SHDSL (bis) Router. Your SHDSL (bis) router is an “all-in-one” unit, combining an SHDSL (bis) modem, SHDSL (bis) router and Ethernet network switch, providing everything you need to get the machines on your network connected to the Internet over your SHDSL (bis) broadband connection.
  • Page 6 Virtual Private Network (VPN) (BiPAC 8500 /8520 /8501 Only) It allows user to establish a virtual network with a remote computer. In this way data can be transmitted securedly through the virtual tunnel formed within the network.
  • Page 7 Static and RIP1/2 Routing It has routing capability and supports easy static routing table or RIP1/2 routing protocol. Simple Network Management Protocol (SNMP) It is an easy way to remotely manage the router via SNMP. Web based GUI It supports web based GUI for configuration and management. It is user-friendly and comes with on- line help.
  • Page 8: Chapter 2: Installing The Router

    • SHDSL Firewall Bridge/Router (BiPAC 8500/8520) or SHDSL.bis Firewall Bridge/Router (BiPAC 8501/ 8501 R2/ 8521) • CD-ROM containing the online manual • RJ-11 SHDSL/telephone Cable (One Cable for BiPAC 8500/ 8501/ 8501 R2) (Two Cables for BiPAC 8520/8521) • Ethernet (CAT-5 LAN) Cable •...
  • Page 9: Device Description

    Device Description BiPAC 8500 Front Panel LED Meaning Lit when the device is successfully connected to SHDSL line and LINE synchronized. Lit green when one of the LAN ports is connected to an Ethernet LAN Port device of 100Mbps. Blinking when data is transmitted/ received.
  • Page 10: Rear Ports

    Rear Ports Port Meaning LINE Connect the supplied RJ-11 (“telephone”) cable to this port when connecting to the SHDSL line. (RJ-11 connector) Connect a PS2/RS-232 cable to this port when connecting to CONSOLE a PC’s RS-232 port (9-pin serial port). Connect an UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an office/ 1X - 4X...
  • Page 11: Bipac 8520

    BiPAC 8520 Front Panel LED Meaning Lit when the device is successfully connected to SHDSL line and LINE 1 & 2 synchronized. Lit green when one of the LAN ports is connected to an Ethernet LAN Port device of 100Mbps. Blinking when data is transmitted/ received. 1X —...
  • Page 12: Rear Ports

    Rear Ports Port Meaning LINE Connect the supplied RJ-11 (“telephone”) cable to this port 1X - 2X when connecting to the SHDSL line. (RJ-11 connector) Connect a PS2/RS-232 cable to this port when connecting to CONSOLE a PC’s RS-232 port (9-pin serial port). Connect an UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an office/ 1X - 4X...
  • Page 13: Bipac 8501

    BiPAC 8501 Front Panel LED Meaning Lit when the device is successfully connected to SHDSL line and LINE synchronized. Lit green when one of the LAN ports is connected to an Ethernet LAN Port device of 100Mbps. Blinking when data is transmitted/ received. 1X —...
  • Page 14: Rear Ports

    Rear Ports Port Meaning LINE Connect the supplied RJ-11 (“telephone”) cable to this port 1X - 2X when connecting to the SHDSL line. (RJ-11 connector) Connect a PS2/RS-232 cable to this port when connecting to CONSOLE a PC’s RS-232 port (9-pin serial port). Connect an UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an office/ 1X - 4X...
  • Page 15: Bipac 8501 R2

    BiPAC 8501 R2 Front Panel LED Meaning Lit when the device is successfully connected to SHDSL line and LINE synchronized. Lit green when one of the LAN ports is connected to an Ethernet LAN Port device of 100Mbps. Blinking when data is transmitted/ received. 1X —...
  • Page 16: Rear Ports

    Rear Ports Port Meaning LINE Connect the supplied RJ-11 (“telephone”) cable to this port 1X - 2X when connecting to the SHDSL line. (RJ-11 connector) Connect a PS2/RS-232 cable to this port when connecting to CONSOLE a PC’s RS-232 port (9-pin serial port). Connect an UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an office/ 1X - 4X...
  • Page 17: Bipac 8521

    BiPAC 8521 Front Panel LED Meaning Lit when the device is successfully connected to SHDSL line and LINE synchronized. Lit green when one of the LAN ports is connected to an Ethernet LAN Port device of 100Mbps. Blinking when data is transmitted/ received. 1X —...
  • Page 18: Rear Ports

    Rear Ports Port Meaning LINE Connect the supplied RJ-11 (“telephone”) cable to this port 1X - 2X when connecting to the SHDSL line. (RJ-11 connector) Connect a PS2/RS-232 cable to this port when connecting to CONSOLE a PC’s RS-232 port (9-pin serial port). Connect a UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an office/home 1X - 4X...
  • Page 19: Chapter 3: Basic Network Installation

    Chapter 3: Basic Network Installation The router can be configured through your web browser. A web browser is included as a standard application in the following operating systems: Linux, Mac OS, Windows 98/NT/2000/XP/Me/Vista/7, etc. The product provides an easy and user-friendly interface for configuration. Please check your PC network components.
  • Page 20: Applications Of The Device

    Applications of the device 1. Connect the Router to a LAN (Local Area Network) and the SHDSL LINE. 2. Power on the device. 3. Make sure the PWR and SYS LEDs are lit steadily and that the relevant LAN LED are lit.
  • Page 21: Network Configuration

    Network Configuration Configuring PC in Windows 7 1. Go to Start. Click on Control Pan- 1. Then click on Network and Inter- net. 1. When the Network and Sharing Center window pops up, select and click on Change adapter settings on the left window panel.
  • Page 22 5. Select Internet Protocol Version 4 (TCP/IPv4) then click Proper- ties. 1. In the TCP/IPv4 properties window, select the Obtain an IP address au- tomatically and Obtain DNS Server address automatically radio but- tons. Then click OK to exit the set- ting.
  • Page 23: Configuring Pc In Windows Vista

    Configuring PC in Windows Vista 1. Go to Start. Click on Network. 1. Then click on Network and Sharing Center at the top bar. 1. When the Network and Sharing Center window pops up, select and click on Manage network connec- tions on the left window column.
  • Page 24 5. Select Internet Protocol Version 4 (TCP/IPv4) then click Proper- ties. 1. In the TCP/IPv4 properties window, select the Obtain an IP address au- tomatically and Obtain DNS Server address automatically radio but- tons. Then click OK to exit the set- ting.
  • Page 25: Configuring Pc In Windows Xp

    Configuring PC in Windows XP 1. Go to Start > Control Panel (in Classic View). In the Control Panel, double- click on Network Connections 1. Double-click Local Area Connection. 1. In the Local Area Connection Status win- dow, click Properties. 1.
  • Page 26: Configuring Pc In Windows 2000

    Configuring PC in Windows 2000 1. Go to Start > Settings > Control Panel. In the Control Panel, double-click on Net- work and Dial-up Connections. 1. Double-click Local Area Connection. 1. In the Local Area Connection Status win- dow click Properties. 1.
  • Page 27: Configuring Pc In Windows 95/98/Me

    Configuring PC in Windows 95/98/Me 1. Go to Start > Settings > Control Panel. In the Control Panel, double-click on Network and choose the Configuration tab. 1. Select TCP/IP > NE2000 Compatible, or the name of your Network Interface Card (NIC) in your PC. 1.
  • Page 28: Configuring Pc In Windows Nt4.0

    Configuring PC in Windows NT4.0 1. Go to Start > Settings > Control Panel. In the Control Panel, double-click on Net- work and choose the Protocols tab. 1. Select TCP/IP Protocol and click Proper- ties. 1. Select the Obtain an IP address from a DHCP server radio button and click...
  • Page 29: Factory Default Settings

    Factory Default Settings Before configuring your router, you need to know the following default settings. Web Interface (Username and Password) Username: admin Password: admin The default username and password are “admin” and “admin” respectively. Device LAN IP settings IP Address: 192.168.1.254 Subnet Mask: 255.255.255.0 ISP setting in WAN site PPPoE...
  • Page 30: Information From Your Isp

    Information from your ISP Before configuring this device, you have to check with your ISP (Internet Service Provider) to find out what kind of service is provided such as DHCP (Obtain an IP Address Automatically, Static IP (Fixed IP Address) or PPPoE. Gather the information as illustrated in the following table and keep it for reference.
  • Page 31: Easy Internet Access Configuration

    Easy Internet Access Configuration To easily configure this device for internet access, you must have IE 5.0 / Netscape 4.5 or above installed on your computer. There is basically one way to configure your router before you are able to connect to the internet: Interface.
  • Page 32: Chapter 4: Configuration

    On the configuration homepage, the left navigation pane provides the links to different setup pages. Status: ARP Table Routing Table DHCP Table PPTP Status (BiPAC 8500 /8520 Only) IPSec Status (BiPAC 8500 /8520 Only) L2TP Status (BiPAC 8500 /8520 Only) Email Status Event Log Error Log...
  • Page 33: Status

    Status 8500...
  • Page 34 8520...
  • Page 35 8501...
  • Page 36 8501 R2...
  • Page 37 8521...
  • Page 38 Device Information Model Name: Displays the model name. Host Name: Provide a name for the router for identification purposes. Host Name lets you change the router name. System Up-Time: Records system up-time enabling a user to determine how long has the system being online or the time that an unexpected restart or fault occured.The system up-time is restarted when there is a power failure or upon software or hardware reset.
  • Page 39: Arp Table

    ARP Table This section displays the router ARP (Address Resolution Protocol) Table which shows the mapping of Internet (IP) addresses to Ethernet (MAC) addresses. This is a quick way of determining the MAC address of the network interface of your PCs that use the Firewall – MAC Address Filter function. See the Firewall section of this manual for more information on this feature.
  • Page 40: Routing Table

    Routing Table The Routing Table provides administrators with a database in the router that contains current network topology such as current paths for transmitted packets. Routing Table Valid: Indicates a successful routing status. Destination: Displays the IP address of the destination network. Netmask: Displays the destination subnet mask address.
  • Page 41: Dhcp Table

    DHCP Table The DHCP Table lists the DHCP lease information for all IP addresses assigned by the DHCP server in the device. Leased: The DHCP assigned IP addresses information. Expired: The expired IP addresses information. Permanent: The fixed host mapping information. Leased Table IP Address: The current corresponding DHCP-assigned dynamic IP address of the device.
  • Page 42: Pptp Status (Bipac 8500/ 8501/ 8520 Only)

    PPTP Status (BiPAC 8500/ 8501/ 8520 Only) This screen shows details of your configured PPTP VPN Connections. Name: The name you assigned to the particular PPTP connection in your VPN configuration. Type: The type of connection (dial-in/dial-out). Enable: Whether the connection is currently enabled.
  • Page 43: Ipsec Status (Bipac 8500/ 8501/ 8520 Only)

    IPSec Status (BiPAC 8500/ 8501/ 8520 Only) This screen shows details of your configured IPSec VPN Connections. Name: The name you assigned to the particular VPN entry. Active: Whether the VPN Connection is currently Active. Connection State: Whether the VPN is Connected or Disconnected.
  • Page 44: L2Tp Status (Bipac 8500/ 8501/ 8520 Only)

    L2TP Status (BiPAC 8500/ 8501/ 8520 Only) This screen shows details of your configured L2TP VPN Connections. Name: The name you assigned to the particular L2TP connection in your VPN configuration. Type: The type of connection (dial-in/dial-out). Enable: Whether the connection is currently enabled.
  • Page 45: Email Status

    Email Status This screen shows the details and status for the Email Account you have configured. Please refer to the Advanced section of this manual for the detail information.
  • Page 46: Event Log

    Event Log Event Log displays the log information of any unexpected events that occurs to your setting. This page displays the router Event Log entries which have been recorded when you have enabled Intrusion Detection or Block WAN PING on the Firewall screen. Please see the Firewall section of this manual for more detail informtaion.
  • Page 47: Error Log

    Error Log Displays any error encountered by the router (e.g. invalid names given to entries) accumulated up to the present time. You can trace its historical information with this function.
  • Page 48: Nat Sessions

    NAT Sessions This section lists all current NAT sessions between interface of types external (WAN) and internal (LAN).
  • Page 49: Diagnostic

    Diagnostic It tests the connection of computer(s) which is connected to LAN ports and the WAN Internet connection as well. If PING www.google.com is shown FAIL and the rest is PASS, you ought to check if your PC’s DNS setting is correct.
  • Page 50: Upnp Portmap

    UPnP Portmap The section lists all established port-mapping using UPnP (Universal Plug and Play). Please see the Advanced section of this manual for more details on UPnP and the router’s UPnP configuration options. Name: The Host Name of the internal UPnP client. Protocol: The connection protocol of the UPnP client.
  • Page 51: Quick Start

    Quick Start Click Quick Start link to WAN Port setup pages. Please see the WAN section for detailed instructions on configuring your WAN settings. Usually, the information you will need for the Quick Start wizard to configure the connection is your login name (often in the form of username@ispname), password and the encapsulation type.
  • Page 52 Click Start to start scanning. If the scan is successful, you will be presented with a list of supported options: Select the desired option from the list and click Apply to return to the Quick Start screen to continue configuring your ISP connection. Please note that the contents of this list will vary depending on what is supported by your ISP.
  • Page 53: Configuration

    Configuration When you click this item, the column will expand to display the sub-items that will allow you to further configure your router. LAN, WAN, System, Firewall, QoS, Virtual Server, Time Schedule and Advanced. The function of each configuration sub-item is described in the following sections.
  • Page 54: Lan - Local Area Network

    LAN - Local Area Network A Local Area Network (LAN) is a shared communication system to which many computers are attached together and is limited to the immediate area, usually within the same building or storey of a building. Bridge Interface, Ethernet, Alias, Ethernet Client...
  • Page 55 Management Interface: To specify which VLAN group is responsible for device management, like doing web management. Note: NAT/NAPT can be applied to management interface only. Click Apply to confirm the settings. Ethernet The router supports more than one Ethernet IP addresses in the LAN that supports multiple internet access at the same time.
  • Page 56 IP Address: Specify an IP address for this virtual interface. SubNetmask: Specify a subnet mask for this virtual interface Security Interface: Specify the firewall setting for this virtual interface. • Internal: The network is behind NAT. All traffic will translate network address when being sent out to the Internet if NAT is enabled.
  • Page 57 Ethernet Client Filter: Default setting is Disable. • Allowed: check to authorize specific device accessing your LAN by inserting the MAC Ad- dress in the space provided or click Candidates. Make sure your PC’s MAC is listed. • Blocked: check to prevent unwanted device from accessing your LAN by inserting the MAC Address in the space provided or click Candidates.
  • Page 58 problems with legacy Ethernet devices, and you can configure different types to solve compatibility issues. Default setting is Auto, which users should keep it unless there is specific problem occured with PCs and you cannot access your LAN. IPv4 TOS priority Control (Advanced users): TOS, Type of Services, is the 2nd octet of an IP packet.
  • Page 59 DHCP Server Mode: • Disable: Choose Disable if IP addresses are assigned manually to stations on your network. • DHCP Server: Choose DHCP Server to have the BiPAC 85xx series devices assign IP ad- dresses automatically to stations on your network. •...
  • Page 60 outside network automatically and forward it back to the requesting PC in the LAN (your Local Area Network). Fixed Host: Click this link to add a specific fixed MAC Address Mapping to a fixed Address. Fill in the Host Name, MAC Address and IP Address fields. After clicking Apply, the new entry is listed.
  • Page 61: Wan - Wide Area Network

    WAN - Wide Area Network WAN refers to your Wide Area Network connection, i.e. your router’s connection to your ISP and the Internet. There are 2 items within the WAN section: and SHDSL. Default setting is PPPoE. If your ISP uses this access protocol, click Edit to input other parameters. (On the Edit screen, click Advanced Options to modify the associated parameters.) If your ISP does not use PPPoE, you can change the default WAN connection entry by clicking Change.
  • Page 62 RFC 1483 Routed Description: User-definable name for the connection. VPI / VCI: Enter the information provided by your ISP. ATM Class: Select thehe Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account by sharing the single IP address.
  • Page 63 MAC Address Spoofing: This option is required by Service Providers. You must fill in the MAC address that is specified by your Service Provider if this is required. Default is disabled. Click Apply to confirm the settings.
  • Page 64 RFC 1483 Bridged Description: User-definable name for the connection. VPI / VCI: Enter the information provided by your ISP. ATM Class: Select thehe Quality of Service for ATM layer. Encapsulation method: Select the encapsulation format, this is provided by your ISP. Acceptable Frame Type: Specify what kind of traffic can pass through this connection, all traffic or only VLAN tagged.
  • Page 65 PPPoA Routed Description: User-definable name for the connection. VPI / VCI: Enter the information provided by your ISP. ATM Class: Select thehe Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account, sharing a single IP address.
  • Page 66 Connection: • Always on: If you want the router to establish a PPPoA session when starting up and to au- tomatically re-establish the PPPoA session when disconnected by the ISP. • Connect to Demand: If you want to establish a PPPoA session only when there is a packet requesting to access the Internet (i.e.
  • Page 67 IPoA Routed Description: User-definable name for the connection. VPI / VCI: Enter the information provided by your ISP. ATM Class: Select thehe Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account, sharing a single IP address.
  • Page 68 PPPoE Routed Description: User-definable name for the connection. VPI / VCI: Enter the information provided by your ISP. ATM Class: Select the Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account, sharing a single IP address.
  • Page 69 Authentication Protocol: Default is Chap (Auto). Your ISP will advise you whether to use Chap or Pap. Connection: • Always on: If you want the router to establish a PPPoA session when starting up and to au- tomatically re-establish the PPPoA session when disconnected by the ISP. •...
  • Page 70 PPPoE Routed with Pass-through To access PPPoE with Pass-through Connection, press Change > PPPoE Routed with Pass- through. PPPoE with pass-through adapts the following method: PPPoE Routed mode + 1483 Bridge Mode. With pure PPPoE connection, the router can get one WAN address to the router. With the PPPoE and PPPoE pass-through, concurrently, it allows user to have a WAN address assigned to the router but also able to get another WAN IP from ISP using PPPoE dialer (e.g WinPoETor Windows XP PPPoE Dialer) at the same time.
  • Page 71 TCP MSS Clamp: This option helps to auto detect the optimal MTU size. Default is enabled. Click Apply to confirm the settings.
  • Page 72 Multiple Session with PPPoE Pass-through Connection To access Multiple Session with PPPoE Pass-through Connection, press Change > Multiple Session with PPPoE pass-through. TCP MSS Clamp: This option helps to auto detect the optimal MTU size. Default is enabled. Click Apply to confirm the settings.
  • Page 73 Annex Type: It is the DSL operating mode standard. Select Annex A or Annex B to support up to 2.3Mpbs SHDSL function. Note: Make sure that the Annex type is the same for the BiPAC 8500 and the remote router. Consult with your ISP to set the same annex for the other device.
  • Page 74 Line State: Displays current SHDSL line status. Bit Rate: Displays SHDSL line synch speed rate. SNR Margin: Displays Line Attenuation: Displays Click Apply to confirm the settings.
  • Page 75 BiPAC 8520 4-Wired Connection: BiPAC 8520 supports 4 types of SHDSL.bis connection: false, Enahnced, Standard & Sustain2W. Select the type of SHDSL.bis connection from the 4-wired connection drop-down menu, and then press Apply to activate the configuration page. Note: When select 2-wired mode, only Port 1 settings need to be configured and the SHDSL (RJ-11 cable) must be connected to LINE 1 on the back of the device.
  • Page 76 Note: Once Active Line is selected as false, you have to enable the Active Line to true again and click the Apply button to reactivate SHDSL connection. DSP Firmware Version: Displays the SHDSL line code firmware version. Connected: Displays current SHDSL line sync status. Line State: Displays current SHDSL line status.
  • Page 77 Enhanced 4-wired Connection Conexant enhanced 4-wired mode and compliant with Conexant Legacy codes. Standard 4-wired Connection The 4-wired handshaking procedure that is compliant with ITU-T standard.
  • Page 78 Sustain2W 4-wired Connection This mode is used to auto detect whether the device uses 2-wired connection or 4-wired connection.
  • Page 79 Mode: The SHDSL device can operate as a CPE (Customer Premises Equipment) or CO (Central Office). Select CPE mode when the BiPAC 8500 is connected to your ISP. Note: Back-to-back feature is a direct connection between two SHDSL devices that one is set to be CPE and the other CO by using a standard RJ-11 telephone cable.
  • Page 80 Bit Rate: Displays SHDSL line synch speed rate. SNR Margin: Displays SNR value when line is synchronized. It indicates the signal quality; the higher the ratio, the higher signal quality it has. Line Attenuation: Displays signal attenuation. The longer loop dostance, the larger line attenuation value is.
  • Page 81 Mode: The SHDSL device can operate as a CPE (Customer Premises Equipment) or CO (Central Office). Select CPE mode when the BiPAC 8500 is connected to your ISP. Note: Back-to-back feature is a direct connection between two SHDSL devices that one is set to be CPE and the other CO by using a standard RJ-11 telephone cable.
  • Page 82 higher the ratio, the higher signal quality it has. Line Attenuation: Displays signal attenuation. The longer loop dostance, the larger line attenuation value is. Click Apply to confirm the settings.
  • Page 83 Mode: The SHDSL device can operate as a CPE (Customer Premises Equipment) or CO (Central Office). Select CPE mode when the BiPAC 8500 is connected to your ISP. Note: Back-to-back feature is a direct connection between two SHDSL devices that one is set to be CPE and the other CO by using a standard RJ-11 telephone cable.
  • Page 84 DSP Firmware Version: Displays the SHDSL line code firmware version. Connected: Displays current SHDSL line sync status. Line State: Displays current SHDSL line status. Bit Rate: Displays SHDSL line synch speed rate. SNR Margin: Displays SNR value when line is synchronized. It indicates the signal quality; the higher the ratio, the higher signal quality it has.
  • Page 85 Enhanced 4-wired Connection Conexant enhanced 4-wired mode and compliant with Conexant Legacy codes. Standard 4-wired Connection The 4-wired handshaking procedure that is compliant with ITU-T standard.
  • Page 86 EFMBond 4-wired Connection...
  • Page 87: System

    System Time Zone, Remote Access, Firmware Upgrade, These are the items within the System section: Backup/Restore, Restart User Management. Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network Time Protocol (SNTP) to get the current time from an SNTP server outside your network. Choose your local time zone from the drop down menu.
  • Page 88 Remote Access To temporarily permit remote administration of the router (i.e. from outside your LAN), select a time period the router will permit remote access and click Enable. You may change other configuration options for the web administration interface using Device Management options in the Advanced section of the GUI.
  • Page 89 Firmware Upgrade Your router’s firmware is the software that enables it to operate and provides all its functionality. Think of your router as a dedicated computer, and the firmware as the software that runs in your router. Thus, by upgrading the newly improved version of the firmware allows you the advantage to use newly integrated features.
  • Page 90 Backup / Restore These functions allow you to save a backup of the current configuration of your router to a defined location on your PC, or to restore a previously saved configuration. This is useful if you wish to experiment with different settings, knowing that you have a backup in hand in case any mistakes occur.
  • Page 91 Restart There are two options for you to choose from before restarting the your 85xx devices. You can either choose to restart your device to restore it to the Factory Default Settings or to restart the device with your current settings applied. Restarting your device to Factory Default Setting will be useful especially after you have accidentally changed your settings that may result in undesirable outcome.
  • Page 92 User Management In order to prevent unauthorized access to your router configuration interface, it requires all users to login with a username and password. Therefore only system administrator can access the system. This feature allows you to set up multiple user accounts which contains a unique password of its own.
  • Page 93 Add an Account 1. In Screen 1, click Create, then the user creating page appears. In this page select true or false from the Valid drop-down menu, fill in all the information: User name, Comment (optional), Pass- word, Confirm Password. 2.
  • Page 94: Firewall

    Firewall Firewall and Access Control Your router includes a full SPI (Stateful Packet Inspection) firewall for controlling Internet access from your LAN, as well as helping to prevent attacks from hackers. In addition to this, when using NAT (Network Address Translation) the router acts as a “natural” Internet firewall, since all PCs on your LAN use private IP addresses that cannot be directly accessed from the Internet.
  • Page 95 General Settings You can choose enable or disable Firewall. If you disable this function, you will not able to add filter rules by yourself in the Packet Filter. If you enable this function using preset filter rules, you are allowed to modify the packet filter rules as required. The Packet Filter is used to filter packets based- on Applications (Port) or IP addresses.
  • Page 96 Packet Filter Packet filtering enables you to configure your router to block specific internal / external users (IP address) from Internet access, or disable specific service requests (Port number) to / from the Internet. This function is only available when Firewall is enabled and one of these four security levels is chosen (All blocked, High, Medium and Low).
  • Page 97 Example: Predefined Port Filters Rules Table: The predefined port filter rules for High, Medium and Low security levels are listed. See Predefined Port Filter as below. Note: Firewall – All Blocked/User-defined, you must define and create the port filter rules yourself.
  • Page 98 Add TCP/UDP Filter On the Packet Filter Rules screen, click Add TCP/UDP Filter link to add TCP/UDP filter rule. Rule Name: User-define description to identify this entry or click Helper link to select existing predefined rules. The maximum name length is 32 characters. Time Schedule: It is a self-defined time period.
  • Page 99 Add Raw IP Filter On the Packet Filter Rules screen, click Add Raw IP Filter link to add raw IP filter rule. Rule Name: A user-defined name for identifying the rule. Time Schedule: It is a self-defined time period. You may specify a time schedule for your prioritization policy.
  • Page 100 Example: Configuring your firewall to allow for a publicly accessible web server on your LAN The predefined port filter rule for HTTP (TCP port 80) is the same whether the firewall is set to a high, medium or low security level. To setup a web server located on the local network when the firewall is enabled, you have to configure the Port Filters setting for HTTP.
  • Page 101 Source / Destination IP Address(es): 0.0.0.0 (I do not wish to activate the address-filter, instead I use the port-filter.) Type: TCP (Please refer to Table: Predefined Port Filter.) Source Port: 0-65535 (I allow all ports to connect with the application.) Redirect Port: 80-80 (This is Port defined for HTTP.) Inbound / Outbound: Allow 5.
  • Page 102 Intrusion Detection The router Intrusion Detection System (IDS) is used to detect hacker’s attack and intrusion attempts from the Internet. If the IDS function of the firewall is enabled, inbound packets are filtered and blocked depending on whether they are detected as possible hacker attacks, intrusion attempts or other connections that the router determines to be suspicious.
  • Page 103 Table: Hacker attack types recognized by the IDS Type of Block Intrusion Name Detect Parameter Blacklist Drop Packet Show Log Duration Ascend Kill Ascend Kill data Src IP WinNuke Port 135, 137~139, Src IP Flag: URG ICMP type 8 Victim Smurf Dst IP Des IP is broadcast...
  • Page 104 Src IP: Source IP Src Port: Source Port Dst Port: Destination Port Dst IP: Destination IP...
  • Page 105 URL Filter URL (Uniform Resource Locator) (e.g. an address in the form of http://www.abcde.com or http:// www.example.com) filter rule allows you to prevent users on your network from accessing specific websites defined by their URL. There are no predefined URL filter rules, therefore you can add filter rules to meet your requirements.
  • Page 106 Domains Filtering: This function checks the whole URL not the IP address, in URLs accessed against your list of domains to block or allow. If it is matched, the URL request will be sent (Trusted) or dropped (Forbidden). For this function to be activated, both check-boxes must be checked. Here is the checking procedure: 1.
  • Page 107 Restrict URL Features: This function enhances the restriction to your URL rules. • Block Java Applet: Blocks Web content which includes the Java Applet to prevent someone who wants to damage your system via the standard HTTP protocol. • Block surfing by IP address: Preventing someone who uses the IP address as URL for skipping Domains Filtering function.
  • Page 108 Billion’s IM and P2P blocking helps to restrict LAN PCs from accessing the commonly used IM such as Yahoo and MSN, and P2P, BitTorrent and eDonkey applications over the Internet.
  • Page 109 Firewall Log Firewall Log displays log information of all unexpected action taken by your firewall settings. This feature is disabled by default. To activate the logs, check the Enable box then click the Apply button. Log information can be seen in the Status > Event Log after enabling.
  • Page 110: Vpn (Virtual Private Networks) (Bipac 8500/ 8501/ 8520 Only)

    VPN (Virtual Private Networks) (BiPAC 8500/ 8501/ 8520 Only) Virtual Private Networks is a way to establish a secured communication tunnel to an organization’s network via the Internet. Your router supports three main types of VPN (Virtual Private Network): PPTP, IPSec and L2TP.
  • Page 111 PPTP Connection - Remote Access Connection Name: A user-defined name for the connection (e.g. “connection to office”). Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In if you want the router to operate as a VPN server. When configuring your router as a Client, enter the remote Server IP Address (or Domain Name) you wish to connect to.
  • Page 112 Example: Configuring a Remote Access PPTP VPN Dial-out Connection An office of a company establishes a PPTP VPN connection with a file server located at a different location. The router is installed at the office, connecting to a couple of PCs and Servers.
  • Page 113 Configuring the PPTP VPN in the Office You can either input the IP address (69.1.121.33 in this case) or the hostname to reach the server. Connection Name: Specify a name for the PPTP connection (VPN_PPTP). Dial out: Check Dial out and enter a Dialed server IP (69.121.1.33) on the Server IP Address (or Hostname) field.
  • Page 114 PPTP Connection - LAN to LAN Connection Name: A user-defined name for the connection. Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In if you want it to operate as a VPN server. When configuring your router as a Client, enter the remote Server IP Address (or Hostname) you wish to connect to.
  • Page 115 Example: Configuring a PPTP LAN-to-LAN VPN Connection The branch office establishes a PPTP VPN tunnel with the head office to connect two private networks over the Internet. The routers are installed in the head office and the branch office respectively.
  • Page 116 Configuring PPTP VPN in the Head Office The IP address 192.168.1.201 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Connection Name: Specify a name for the PPTP connection (HeadOffice). Type: Check Dial in and enter an IP address assigned to branch office network (192.168.1.200).
  • Page 117 Configuring PPTP VPN in the Head Office The IP address 69.1.121.30 is the Public IP address of the router located in the head office. If you registered the DDNS (please refer to the DDNS section of this manual), you can also use the domain name instead of the IP address to reach the router.
  • Page 118 IPSec (IP Security Protocol) If you have created an IPSec connection, the account information will be shown. Enable / Disable: This function activates or inactivates the IPSec connection. To interrupt the tunnel, check the Disable radio button and click the Apply button to inactivate the connection. Name: This is the user-defined name of the connection.
  • Page 119 IPSec VPN Connection Connection Name: A user-defined name for the connection. Local Network: Set the IP address, subnet or address range of the local network. . • Single Address: The IP address of the local host. • Subnet: The subnet of the local network. For example, IP: 192.168.1.0 with netmask 255.255.255.0 specifies one class C subnet starting from 192.168.1.1 (i.e.
  • Page 120 • DES: Stand for Data Encryption Standard, it uses 56 bits as an encryption method. • 3DES: Stand for Triple Data Encryption Standard, it uses 168 (56*3) bits as an encryption method. • AES: Stand for Advanced Encryption Standards, you can use 128, 192 or 256 bits encryption method.
  • Page 121 Advanced Options On the IPSec Edit screen, click Advanced Options link to change the settings. IKE Mode: Set IKE (Internet key Exchange) mode to Main mode or Aggressive mode. This IKE provides secured key generation and key management. IKE Proposal Hash Function: It is a Message Digest algorithm which coverts any length of a message into a unique set of bits.
  • Page 122 • 3DES: Stands for Triple Data Encryption Standard, it uses 168 (56*3) bits encryption method. • AES: Stands for Advanced Encryption Standards, you can use 128, 192 or 256 bits encryp- tion method. Diffie-Hellman Group: It is a public-key cryptography protocol that allows two parties to establish a shared secret over an unsecured communication channel (i.e.
  • Page 123 minimum time interval for this function. Reconnection Time: It is the reconnecting time interval after NO TRAFFIC is initiated. Default setting is 15 minutes; 3 minutes is the minimum time interval for this function. Click the Apply button to update the settings. Example: Configuring an IPSec LAN-to-LAN VPN Connection The branch office establishes a PPTP VPN tunnel with the head office to connect two private networks over the Internet.
  • Page 124 Configuring IPSec VPN in the Head Office Connection Name: Specify a name for the PPTP connection (IPSec_HeadOffice). Local Network: Check the Subnet radio button and enter the IP address (192.168.1.0) and subnet mask (255.255.255.0) of head office network. Remote Secure Gateway Address (or Hostname): Enter the IP address (69.121.1.30) of the head office router (in WAN side).
  • Page 125 Configuring IPSec VPN in the Branch Office Connection Name: Specify a name for the PPTP connection (IPSec_BranchOffice). Local Network: Check the Subnet radio button and enter the IP address (192.168.0.0) and subnet mask (255.255.255.0) of branch office network. Remote Secure Gateway Address (or Hostname): Enter the IP address (69.121.1.3) of the head office router (in WAN side).
  • Page 126 Example: Configuring a IPSec Host-to-LAN VPN Connection...
  • Page 127 Configuring IPSec VPN in the Office Connection Name: Specify a name for the PPTP connection (IPSec). Local Network: Check the Subnet radio button and enter the IP address (192.168.1.0) and subnet mask (255.255.255.0) of head office network. Remote Secure Gateway Address (or Hostname): Enter the IP address (69.121.1.30) of the head office router (in WAN side).
  • Page 128 L2TP (Layer Two Tunneling Protocol) If you have created a L2TP connection, the account information will be displayed. Enable / Disable: This function activates or inactivates the L2TP connection. To interrupt the tunnel, check the Disable radio button and click the Apply button to inactivate the connection. Name: This is the user-defined name of the connection.
  • Page 129 L2TP Connection - Remote Access Connection Name: A user-defined name for the connection (e.g. “connection to office”). Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In if you want the router to operate as a VPN server. When configuring your router as a Client, enter the remote Server IP Address (or Hostname) you wish to connect to.
  • Page 130 Note: Authentication, Encryption, Perfect Forward Secrecy and Pre-shared Key will only be available for selection after IPSec is enabled. • Authentication: Authentication establishes the integrity of the datagram and ensures it is not tampered with during transmission. There are three options, Message Digest 5 (MD5), Secure Hash Algorithm (SHA1) or None.
  • Page 131 Example: Configuring a L2TP VPN - Remote Access Dial-in Connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft VPN Adapter (included with Windows XP/2000/ME, etc.). The router is installed in the head office, connecting to a couple of PCs and Servers.
  • Page 132 Configuring L2TP VPN in the Office-Dial In The input IP address 192.168.1.200 will be assigned to the remote worker. Please make sure this IP is not used by the Office LAN. Connection Name: Specify a name for the L2TP connection (VPN_L2TP). Type: Check Dial in and enter an assigned IP address (192.168.1.200) for the remote worker on the Private IP Address Assigned to Dialing User field.
  • Page 133 Example: Configuring a Remote Access L2TP VPN Dial-out Connection A company’s office establishes a L2TP VPN connection with a file server located at a different location. The router is installed in the office, connecting to a couple of PCs and Servers.
  • Page 134 Configuring L2TP VPN in the Office-Dial Out Connection Name: Specify a name for the L2TP connection (VPN_L2TP). Type: Check Dial out and enter a Dialed server IP (69.121.1.33) on the Server IP Address (or Hostname) field. Username / Password: Enter the username (username) & password (123456). Auth.Type: Keep as default value in most of the cases.
  • Page 135 L2TP Connection - LAN to LAN Connection Name: A user-defined name for the connection. Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In if you want it to operate as a VPN server. ...
  • Page 136 Note: Authentication, Encryption, Perfect Forward Secrecy and Pre-shared Key will only be available for selection after IPSec is enabled. • Authentication: Authentication establishes the integrity of the datagram and ensures it is not tampered with during transmission. There are three options, Message Digest 5 (MD5), Secure Hash Algorithm (SHA1) or None.
  • Page 137 Example: Configuring L2TP LAN-to-LAN VPN Connection The branch office establishes a L2TP VPN tunnel with the head office to connect two private networks over the Internet. The routers are installed in the head office and branch office respectively.
  • Page 138 Configuring L2TP VPN in the Head Office The IP address 192.168.1.200 will be assigned to the router located at the branch office. Please make sure that this IP is not used by the head office LAN. Connection Name: Specify a name for the L2TP connection (HeadOffice). Type: Check Dial in and enter the IP address (192.168.1.0) assigned to the branch office network on the Private IP Address Assigned to Dialing User field.
  • Page 139 Configuring L2TP VPN in the Branch Office The IP address 69.1.121.30 is the Public IP address of the router located at head office. If you registered the DDNS (please refer to the DDNS section of this manual), you can also use the domain name instead of the IP address to reach the router.
  • Page 140: Qos - Quality Of Service

    QoS - Quality of Service QoS helps you to control the data upload traffic of each application from LAN (Ethernet and/ or Wireless) to WAN (Internet). It facilitates you the features to control the quality and speed of throughput for each application when the system is running with full upstream load. You can find three items under the QoS section: Prioritization Outbound / Inbound IP...
  • Page 141 Prioritization Application: Assign a name that identifies the new QoS application rule. Time Schedule: Scheduling your prioritization policy. Priority: The priority given to each policy/application. Its default setting is set to High; you may adjust this setting to fit your policy/application. Protocol: Select the supported protocol from the drop down list.
  • Page 142 applications. Both applications need minimal or higher bandwidth, besides the assigned one, if there is any available/non-used one available, you can specify which application can have higher priority by acquiring the non-used bandwidth. Average utilization of each priority type: High (60%), Normal (30%) and Low (10%).
  • Page 143 Outbound IP Throttling (LAN to WAN) IP Throttling allows you to limit the speed of IP traffic. The value entered will limit the speed of the application that you set to the specified value multiple of 32kbps. Application: Assign a name that identifies the new QoS application rule. Time Schedule: Scheduling your prioritization policy.
  • Page 144 Inbound IP Throttling (WAN to LAN) IP Throttling allows you to limit the speed of IP traffic. The value entered will limit the speed of the application that you set to the specified value multiple of 32kbps. Application: Assign a name that identifies the new QoS application rule. Time Schedule: Scheduling your prioritization policy.
  • Page 145 Example: QoS for your Network Connection Diagram VoIP Normal PCs Restricted PC Information and Settings Upstream: 928 kbps Downstream: 8 Mbps VoIP User : 192.168.1.1 Normal Users : 192.168.1.2~192.168.1.5 Restricted User: 192.168.1.100...
  • Page 146 Mission-critical application VPN connection is a mission-critical application used for data exchange between head office and branch office. This mission-critical application must be sent out smoothly without any dropping. Set this application as high priority to prevent other applications to saturate the bandwidth. Voice application Voice is latency-sensitive application.
  • Page 147: Virtual Server (Port Forwarding)

    Virtual Server (Port Forwarding) Virtual Server allows you to direct incoming traffic from WAN side (identified by Protocol and External port) to the Internal server with private IP address on the LAN side. The Internal port is required only if the external port needs to be converted to a different port number used by the server on the LAN side.
  • Page 148 Add Virtual Server Because NAT can act as a “natural” Internet firewall, your router protects your network from being accessed by outside users when using NAT, as all incoming connection attempts will point to your router unless you specifically create new Virtual Server entries to forward those ports to a PC on your network.
  • Page 149 IP Address: 192.168.1.254 Edit: Click to change virtual server application parameters. Delete: Click to remove virtual server application entry.
  • Page 150 Edit DMZ Host The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets that use the port number different from the one used by other Virtual Server entries will be checked by the Firewall and NAT algorithms before being passed to the DMZ host.
  • Page 151 Edit One-to-one NAT One-to-One NAT maps a specific private/local IP address to a global/public IP address. If you have multiple public/WAN IP addresses from you ISP, you are eligible for One-to-One NAT to utilize these IP addresses. NAT Type: Select the desired NAT type. As set in default setting, it disables the One-to-One NAT function.
  • Page 152 Examples of well-known and registered port numbers are shown below, for further information, please see IANA’s website at: http://www.iana.org/assignments/port-numbers. For help on determining which private port numbers are used by common applications on this list, please see the FAQs (Frequently Asked Questions) at http://www.billion.com. Table: Well-known and registered Ports Port Number Protocol...
  • Page 153: Time Schedule

    Time Schedule The Time Schedule supports up to 16 time slots which helps you to manage your Internet connection. In each time profile, you may schedule specific day(s) i.e. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. This Time Schedule correlates closely with router’s time, since router does not have a real time clock on board;...
  • Page 154 Configuration of Time Schedule Edit a Time Slot 1. To edit a time schedule, click on the Edit link of the schedule slot you want to edit. Note: The days you have selected will be shown with a capital letter. 2.
  • Page 155: Advanced

    Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router. Users who do not understand the features should not attempt to reconfigure their router, unless advised to do so by support staff. Here are the items within the Advanced section: Static Route,...
  • Page 156 Dynamic DNS The Dynamic DNS function lets you alias a dynamic IP address to a static hostname, so if your ISP does not assign you a static IP address you can still use a domain name. This is especially useful when hosting servers via your GPON connection, so that anyone wishing to connect to you may use your domain name, rather than the dynamic IP address which is assigned to you by ISP.
  • Page 157 Check Email This function allows you to have the router check your POP3 mailbox for new Email messages. The Mail LED on your router will light when it detects new messages waiting for download. You may also view the status of this function using the Status > Email Status section of the web interface, which also provides details on the number of new messages await for download.
  • Page 158 Device Management The Device Management advanced configuration settings allows you to control your router’s security options and device monitoring features. Device Host Name Host Name: Assign it a name. (The Host Name cannot be used with one word only. There are two words should be connected with a ‘.’...
  • Page 159 Embedded Web Server ( 2 Management IP Accounts) HTTP Port: This is the port number the router’s embedded web server (for web-based configuration) will use. The default value is the standard HTTP port, 80. Users may specify an alternative if, for example, they are running a web server on a PC within their LAN.
  • Page 160 SNMP V3 Specify a name and password for authentication. And define the access right from an identified IP address. Once the authentication has succeeded, user from this IP address will be able to view and modify the data. SNMP Version: SNMPv2c and SNMPv3 SNMPv2c is the combination of the enhanced protocol features of SNMPv2 without the SNMPv2 security.
  • Page 161 ifMIBObjects Group • From RFC1695 (atmMIB): atmMIBObjects • From RFC 1907 (SNMPv2): only snmpSetSerialNo OID...
  • Page 162 Installing UPnP in Windows Example Follow the steps below to install the UPnP in Windows Me. Step 1: Click Start and Control Panel. Double-click Add/Remove Programs. Step 2: Click on the Windows Setup tab and select Communication in the Components selection box.
  • Page 163 Step 4: Click OK to go back to the Add/Remove Programs Properties window. Click Next. Step 5: Restart the computer when prompted. Follow the steps below to install the UPnP in Windows XP. Step 1: Click Start and Control Panel. Step 2: Double-click Network Connections.
  • Page 164 Auto-discover Your UPnP-enabled Network Device Step 1: Click start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. Step 2: Right-click the icon and select Properties. Step 3: In the Internet Connection Properties window, click Settings to see the port mappings that were automatically created.
  • Page 165 Step 4: You may edit or delete the port mappings or click Add to manually add port mappings. Step 5: Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Step 6: Double-click on the icon to display your current Internet connection status.
  • Page 166 Step 6: Double-click on the icon to display your current Internet connection status. Web Configurator Easy Access With UPnP, you can access web-based configuration for the BiPAC 9300(V)NX without first finding out the IP address of the router. This helps if you do not know the router’s IP address. Follow the steps below to access web configuration.
  • Page 167 IGMP IGMP, known as Internet Group Management Protocol, is used to manage hosts from multicast group. IGMP Forwarding: Accept multicast packet. Default is Enable. IGMP Snooping: Allows a layer 2 switch to manage the transmission of any incoming IGMP multicast packet groups between the host and the router. Default is set to Disable. Click Apply to confirm the changes.
  • Page 168 VLAN Bridge This section allows you to create a VLAN group and specify the members of the VLAN group.. Edit: Edit your member ports in selected VLAN group. Create VLAN: Click to create another VLAN group.
  • Page 169 Advanced VLAN Setup Example (Triply Play) VLAN_data Ethernet Port 1, Wireless and Wireless WDS are reserved for Internet - On Ethernet port 1 I also need VC 0/40 bridged. VLAN_Vedio Ethernet ports: 2, 3 and 4: - 0/33 Bi-directional IP - 0/34 Video - 0/35 Video - 0/36 Video Subscriber Services (EPG, EAS, etc.)
  • Page 170 Bridge Interface VLAN Port (Always starts with) Ethernet P1 / P2 / P3 / P4 Ethernet1 P2 / P3 / P4 Ethernet2 P3 / P4 Ethernet3 Step 2: Create WAN Interface Go to Configuration > WAN > ISP. wanlink is the factory default WAN interface which provides service for data/internet access. If your ISP uses this access protocol, click Edit to input other parameters if needed.
  • Page 171 Click Create to setup up an additional WAN interface for video applications. A total of 8 VLAN is supported; therefore, only 8 WAN interfaces can be created in the table. From the example, PVC 0/33 to 0/39 is assigned to video using 1483 Bridged mode. Check RFC 1483 Bridged and click Next to continue the setup.
  • Page 172 Mapping the VLAN Bridge with Bridge Interface created in Step1, you will see the relationship in these two screenshots. Step 4: Enable IGMP Snooping Go to Configuration > Advanced > IGMP. IGMP Snooping must be enabled in order to allow video stream forwarding correctly.
  • Page 173: Save Configuration To Flash

    Save Configuration to Flash After changing the router’s configuration settings, you must save all of the configuration parameters to FLASH to avoid losing them after turning off or resetting your router. Click “Save Config“ and click “Apply” to write your new configuration to FLASH.
  • Page 174: Restart

    Restart Click “Restart” with option Current Settings to reboot your router (and restore your last saved configuration). If you wish to restart the router using the factory default settings (for example, after a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default settings...
  • Page 175: Logout

    Logout To exit the router web interface, click “Logout”. Please save your configuration setting before logging out of the system. A Warning screen will appear as below. Click OK and a message displays. Click Yes to close the window. Be aware that the router configuration interface can only be accessed by one PC at a time. Therefore when a PC has logged into the system interface, the other users cannot access the system interface until the current user has logged out of the system.
  • Page 176 If your router is not functioning properly, please refer to the suggested solutions provided in this chapter. If your problems persist or the suggested solutions do not meet your needs, please kindly contact your service provider or Billion for support. Problems with the router...
  • Page 177 However, if your problems persist or you come across other technical issues that are not listed in the Troubleshooting section, please contact the dealer from where you purchased your product. Contact Billion Worldwide: http://www.billion.com MAC OS is a registered Trademark of Apple Computer, Inc.

This manual is also suitable for:

Bipac 8520Bipac 8501 r2Bipac 8521Bipac 8501

Table of Contents