BEC 7402 Series User Manual

Adsl2+ triple play modem/router
Table of Contents

Advertisement

Quick Links

7402 Series
ADSL2+ Triple Play Modem/Router
User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for BEC 7402 Series

  • Page 1 7402 Series ADSL2+ Triple Play Modem/Router User’s Manual...
  • Page 3: Table Of Contents

    CHAPTER 1: INTRODUCTION ......................1 7402 R .....................1 NTRODUCTION TO YOUR OUTER ..............................1 EATURES 7402 ADSL R ......................4 OUTER PPLICATION CHAPTER 2: INSTALLING THE ROUTER ..................5 7402 ADSL R ................5 MPORTANT NOTE FOR USING THE OUTER ..........................5 ACKAGE ONTENTS ............................6 RONT ............................7 ORTS ..............................8...
  • Page 4 System..............................54 Time Zone ............................54 Remote Access..........................55 Firmware Upgrade........................56 Backup / Restore..........................57 Restart Router ..........................58 User Management..........................59 Firewall and Access Control.......................60 General Settings..........................62 Packet Filter...........................63 Intrusion Detection........................70 URL Filtering..........................72 Firewall Log ...........................75 VPN (Virtual Private Networks)......................76 PPTP (Point-to-Point Tunneling Protocol) .................76 IPSec (IP Security Protocol)......................81 L2TP (Layer Two Tunneling Protocol)..................87 QoS (Quality of Service)........................112...
  • Page 5: Chapter 1: Introduction

    Chapter 1: Introduction Introduction to your 7402 Series Router Welcome to the BEC 7402 Series Router. The router is an “all-in-one” unit, combining an ADSL modem, IEEE 802.11g wireless access point (optional), ADSL router with four-port 10/100M auto-crossover Switch, and Firewall, enabling you to maximize the potential of your existing resources. The 7402 can provide everything you need to get the machines on your network connected to the Internet over your ADSL broadband connection.
  • Page 6 Universal Plug and Play (UPnP) and UPnP NAT Traversal This protocol is used to enable simple and robust connectivity among stand-alone devices PCs from many different vendors. It makes network simple and affordable for users. UPnP architecture leverages TCP/IP and the Web to enable seamless proximity networking in addition to control and data transfer among networked devices.
  • Page 7 Dynamic Host Configuration Protocol (DHCP) client and server In the WAN site, the DHCP client can get an IP address from the Internet Service Provider (ISP) automatically. In the LAN site, the DHCP server can allocate a range of client IP addresses and distribute them including IP address, subnet mask as well as DNS IP address to local computers.
  • Page 8: 7402 Adsl Router Application

    7402 ADSL Router Application Figure 1.1 Application Diagram of 7402 Thank you for your purchase, and welcome to the world of broadband Internet! Chapter 1: Introduction...
  • Page 9: Chapter 2: Installing The Router

    Only use the power adapter that comes with the package. Using a different voltage rating power adaptor may damage the router. Attention Package Contents ․ BEC 7402 ADSL2+ Triple Play Router ․ RJ-11 ADSL/telephone Cable ․ Ethernet (CAT-5 LAN) Cable ․ AC-DC power adapter (12V DC, 1A) ․...
  • Page 10: The Front Leds

    The Front LEDs WLAN PPP/MAIL ADSL Meaning Lit steady when there is a PPPoA / PPPoE connection. PPP / MAIL Lit and flashed periodically when there is email in the Inbox. When lit, it indicates that the ADSL (Line) port is connected to the ADSL DSLAM and working properly.
  • Page 11: The Rear Ports

    The Rear Ports Port Meaning Power Switch Power ON/OFF switch Connect the supplied power adapter to this jack. After the device is powered on, press it to reset the device or restore to factory default settings. 0-3 seconds: reset the device RESET 6 seconds above: restore to factory default settings (this is used when you cannot login to the router.
  • Page 12: Cabling

    ADSL line LEDs are lit. If they are not, verify that you are using the proper cables. Ensure that all other devices connected to the same telephone line as your BEC router (e.g. telephones, fax machines, analogue modems) have a line filter connected between them and the wall socket (unless you are using a Central Splitter or Central Filter installed by a qualified and licensed electrician), and ensure that all line filters are correctly installed and the right way around.
  • Page 13: Chapter 3: Basic Installation

    Chapter 3: Basic Installation 7402 can be configured with your web browser. The web browser is included as a standard application in the following operating systems: Linux, Mac OS, Windows 98/NT/2000/XP/Me, etc. The product provides a very easy and user-friendly interface for configuration. PCs must have an Ethernet interface installed properly and be connected to 7402 either directly or through an external repeater hub, and have TCP/IP installed and configured to obtain an IP address through a DHCP server or a fixed IP address that must be in the same subnet as 7402.
  • Page 14 Configuring PC in Windows XP 1. Go to Start / Control Panel (in Classic View). In the Control Panel, double-click on Network Connections. Double-click Local Area Connection. (See Figure 3.1) Figure 3.1: LAN Area Connection 3. In the Local Area Connection Status window, click Properties.
  • Page 15 4. Select Internet Protocol (TCP/IP) and click Properties. (See Figure 3.3) Figure 3.3: TCP / IP 5. Select the Obtain an IP address automatically and the Obtain DNS server address automatically radio buttons. (See Figure 3.4) Click OK to finish the configuration.
  • Page 16 Configuring PC in Windows 2000 Go to Start / Settings / Control Panel. In the Control Panel, double-click on Network and Dial-up Connections. Double-click Local Area Connection. (See Figure 3.5) Figure 3.5: LAN Area Connection In the Local Area Connection Status window, click Properties.
  • Page 17 Select Internet Protocol (TCP/IP) and click Properties. (See Figure 3.7) Figure 3.7: TCP / IP Select the Obtain an IP address automatically and the Obtain DNS server address automatically radio buttons. (See Figure 3.8) Click OK to finish the configuration. Figure 3.8: IP Address &...
  • Page 18 Configuring PC in Windows 95/98/ME Go to Start / Settings / Control Panel. In the Control Panel, double- click on Network and choose the Configuration tab. Select TCP / IP -> NE2000 Compatible, or the name of your Network Interface Card (NIC) in your (See Figure 3.9) Click Properties.
  • Page 19 Then select the DNS Configuration tab. (See Figure 3.11) Select the Disable DNS radio button and click OK to finish the configuration. Figure 3.11: DNS Configuration Chapter 3: Basic Installation...
  • Page 20 Configuring PC in Windows NT4.0 Go to Start / Settings / Control Panel. In the Control Panel, double- click on Network and choose the Protocols tab. Select TCP/IP Protocol and click (See Figure 3.12) Properties. Figure 3.12: TCP / IP Select the Obtain an IP address from a DHCP server radio button and click OK.
  • Page 21: Factory Default Settings

    Factory Default Settings Before configuring your, you need to know the following default settings. Web Interface (Username and Password) Username: admin Password: admin The default username and password are “admin” and “admin” respectively. If you ever forget the password to log in, you may press the RESET button up to 6 seconds to restore the factory default settings.
  • Page 22: Information From Your Isp

    Information from your ISP Before configuring this device, you have to check with your ISP (Internet Service Provider) what kind of service is provided such as PPPoE, PPPoA, RFC1483, or IPoA. Gather the information as illustrated in the following table and keep it for reference VPI/VCI, VC-based/LLC-based multiplexing, Username, Password, Service Name, and Domain Name System (DNS) IP address (it can be automatically PPPoE...
  • Page 23: Configuring With Your Web Browser

    Configuring with your Web Browser Open your web browser, enter the IP address of your router, which by default is 192.168.1.254, and click “Go”, a user name and password window prompt will appear. The default username and password are “admin” and “admin”. (See Figure 3.14) Figure 3.14: User name &...
  • Page 24: Chapter 4: Configuration

    Chapter 4: Configuration At the configuration homepage, the left navigation pane where bookmarks are provided links you directly to the desired setup page, including: Status (ARP Table, Wireless Association Table, Routing Table, DHCP Table, PPTP Status, IPSec Status, L2TP Status, Email Status, Event Log, Error Log, NAT Sessions and UPnP Portmap) Quick Start Configuration...
  • Page 25: Status

    Status ARP Table This section displays the router’s ARP (Address Resolution Protocol) Table, which shows the mapping of Internet (IP) addresses to Ethernet (MAC) addresses. This is useful as a quick way of determining the MAC address of the network interface of your PCs to use with the router’s Firewall – MAC Address Filter function.
  • Page 26: Wireless Association Table

    Wireless Association Table (Wireless Router Only) IP Address: It is IP address of wireless client that joins this network. MAC: The MAC address of wireless client Chapter 4: Configuration...
  • Page 27: Routing Table

    Routing Table Routing Table Valid: It indicates a successful routing status. Destination: The IP address of the destination network. Netmask: The destination netmask address. Gateway/Interface: The IP address of the gateway or existing interface that this route will use. Cost: The number of hops counted as the cost of the route. RIP Routing Table Destination: The IP address of the destination network.
  • Page 28: Dhcp Table

    DHCP Table Leased: The DHCP assigned IP addresses information. IP Address: A list of IP addresses of devices on your LAN (Local Area Network). Expired: The expired IP addresses information. Permanent: The fixed host mapping information Leased Table IP Address: The IP address that assigned to client. MAC Address: The MAC address of client.
  • Page 29: Pptp Status

    PPTP Status (VPN Router Only) This shows details of your configured PPTP VPN Connections. Name: The name you assigned to the particular PPTP connection in your VPN configuration. Type: The type of connection (dial-in/dial-out). Enable: Whether the connection is currently enabled. Active: Whether the connection is currently active.
  • Page 30: Ipsec Status

    IPSec Status (VPN Router Only) This shows details of your configured IPSec VPN Connections. Name: The name you assigned to the particular VPN entry. Active: Whether the VPN Connection is currently Active. Connection State: Whether the VPN is Connected or Disconnected. Statistics: Statistics for this VPN Connection.
  • Page 31: L2Tp Status

    L2TP Status (VPN Router Only) This shows details of your configured L2TP VPN Connections. Name: The name you assigned to the particular L2TP connection in your VPN configuration. Type: The type of connection (dial-in/dial-out). Enable: Whether the connection is currently enabled. Active: Whether the connection is currently active.
  • Page 32: Event Log

    Event Log This page displays the router’s Event Log entries. Major events are logged to this window, such as when the router’s ADSL connection is disconnected, as well as Firewall events when you have enabled Intrusion or Blocking Logging in the Configuration – Firewall section of the interface. Please see the Firewall section of this manual for more details on how to enable Firewall logging.
  • Page 33: Nat Sessions

    NAT Sessions This section lists all current NAT sessions between interface of types external (WAN) and internal (LAN). UPnP Portmap The section lists all port-mapping established using UPnP (Universal Plug and Play). Please see the Advanced section of this manual for more details on UPnP and the router’s UPnP configuration options. Chapter 4: Configuration...
  • Page 34: Quick Start

    Quick Start For detailed instructions on configuring your WAN settings, please see the WAN section of this manual. Usually, the only details you will need for the Quick Start wizard to get you online are your login (often in the form of username@ispname), your password and the encapsulation type. In additional, you have the option to provide specific DNS as your desire, or check the Enable box to get the DNS automatically from your ISP.
  • Page 35 Select the desired option from the list and click Apply to return to the Quick Start interface to continue configuring your ISP connection. Please note that the contents of this list will vary, depending on what is supported by your ISP. Chapter 4: Configuration...
  • Page 36: Configuration

    Configuration When you click this item, you get following sub-items to configure the ADSL router. LAN, WAN, System, Firewall, VPN, QoS, Virtual Server, Time Schedule and Advanced These functions are described below in the following sections. LAN (Local Area Network) There are seven items within the LAN section: Ethernet, Ethernet Client Filter, Wireless, Wireless Security, Wireless Client Filter, Port Setting...
  • Page 37: Ethernet Client Filter

    Ethernet Client Filter The Ethernet Client Filter supports up to 16 Ethernet network machines that helps you to manage your network control to accept traffic from specific authorized machines or can restrict unwanted machine(s) to access your LAN. There are no pre-define Ethernet MAC address filter rules; you can add the filter rules to meet your requirements.
  • Page 38 Active PC in LAN displays a list of individual Ethernet device’s IP Address & MAC Address which connecting to the router. You can easily by checking the box next to the IP address to be blocked or allowed. Then, Add to insert to the Ethernet Client Filter table.
  • Page 39: Wireless

    Wireless (Wireless Router Only) Parameters WLAN Service: Default setting is set to Enable. If you do not have any wireless, both 802.11g and 802.11b, device in your network, select Disable. Mode: The default setting is 802.11b+g (Mixed mode). If you do not know or have both 11g and 11b devices in your network, then keep the default in mixed mode.
  • Page 40 Wireless Distribution System (WDS) It is a wireless access point mode that enables wireless link and communication with other access point. It is easy to be installed simply define peer’s MAC address of the connected AP. WDS takes advantages of cost saving and flexibility which no extra wireless client device is required to bridge between two access points and extending an existing wired or wireless infrastructure network to create a larger network.
  • Page 41: Wireless Security

    Wireless Security (Wireless Router Only) You can disable or enable with WPA or WEP for protecting wireless network. The default mode of wireless security is disabled. WPA Pre-Shared Key WPA Algorithms: TKIP (Temporal Key Integrity Protocol) utilizes a stronger encryption method and incorporates Message Integrity Code (MIC) to provide protection against hackers.
  • Page 42 WEP Encryption: To prevent unauthorized wireless stations from accessing data transmitted over the network, the router offers highly secure data encryption, known as WEP. If you require high security for transmissions, there are two alternatives to select from: WEP 64 and WEP 128. WEP 128 will offer increased security over WEP 64.
  • Page 43: Wireless Client (Mac Address) Filter

    Wireless Client (MAC Address) Filter (Wireless Router Only) The MAC Address supports up to 16 wireless network machines and helps you to manage your network control to accept traffic from specific authorized machines or to restrict unwanted machine(s) to access your LAN. There are no pre-define MAC Address filter rules;...
  • Page 44 Associate Wireless Client displays a list of individual wireless device’s MAC Address that currently connects to the router. You can easily by checking the box next to the MAC address to be blocked or allowed. Then, Add to insert to the Wireless Client (MAC Address) Filter table. The maximum Ethernet client is 16. Chapter 4: Configuration...
  • Page 45: Dhcp Server

    DHCP Server You can disable or enable the DHCP (Dynamic Host Configuration Protocol) server or enable the router’s DHCP relay functions. The DHCP protocol allows your router to dynamically assign IP addresses to PCs on your network if they are configured to obtain IP addresses automatically. To disable the router’s DHCP Server, check Disabled and click Next, then click Apply.
  • Page 46: Wan (Wide Area Network)

    WAN (Wide Area Network) WAN refers to your Wide Area Network connection, i.e. your router’s connection to your ISP and the Internet. There are two items within the WAN section: ISP, DNS ADSL. The factory default is PPPoE. If your ISP uses this access protocol, click Edit to input other parameters as below.
  • Page 47 RFC 1483 Routed Connections Description: Your description of this connection. VPI and VCI: Enter the information provided by your ISP. ATM Class: The Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account, sharing the single IP address.
  • Page 48 RFC 1483 Bridged Connections VPI and VCI: Enter the information provided by your ISP. ATM Class: The Quality of Service for ATM layer. Encapsulation method: Select the encapsulation format, this is provided by your ISP. Ether Filter Type: Specify the type of ethernet filtering performed by the named bridge interface. Allows all types of ethernet packets through the port.
  • Page 49 PPPoA Routed Connections Description: User-definable name for the connection. VPI/VCI: Enter the information provided by your ISP. ATM Class: The Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account, sharing a single IP address.
  • Page 50 Connection: Always on: If you want the router to establish a PPPoA session when starting up and to automatically re-establish the PPPoA session when disconnected by the ISP. Connect to Demand: If you want to establish a PPPoA session only when there is a packet requesting access to the Internet (i.e.
  • Page 51 Discover Primary NBNS / Discover Secondary NBNS: This setting enables/disables whether the primary/secondary NBNS server address is requested from a remote PPP peer using IPCP. The default setting for this command is disabled. Discover Subnet Mask: Specifies if the subnet mask given by IPCP negotiation process is to be used.
  • Page 52 IPoA Routed Connections Description: User-definable name for the connection. VPI/VCI: Enter the information provided by your ISP. ATM Class: The Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single IP account, sharing a single IP address.
  • Page 53 PPPoE Connections Description: A user-definable name for this connection. VPI/VCI: Enter the information provided by your ISP. ATM Class: The Quality of Service for ATM layer. NAT: The NAT (Network Address Translation) feature allows multiple users to access the Internet through a single ISP account, sharing a single IP address.
  • Page 54 Connection: Always on: If you want the router to establish a PPPoE session when starting up and to automatically re-establish the PPPoE session when disconnected by the ISP. Connect to Demand: If you want to establish a PPPoE session only when there is a packet requesting access to the Internet (i.e.
  • Page 55 Discover Primary NBNS / Discover Secondary NBNS: This setting enables/disables whether the primary/secondary NBNS server address is requested from a remote PPP peer using IPCP. The default setting for this command is disabled. Discover Subnet Mask: Specifies if the subnet mask given by IPCP negotiation process is to be used.
  • Page 56: Dns

    A Domain Name System (DNS) contains a mapping table for domain name and IP addresses. On the Internet, every host has a unique and user-friendly name (domain name) such as www.helloworld.com and an IP address. An IP address is a 32-bit number in the form of xxx.xxx.xxx.xxx, for example 192.168.1.254.
  • Page 57: Adsl

    ADSL Connect Mode: The default setting is Multimode. This mode will automatically detect your ADSL line code, G.dmt, G.lite, and T1.413. But in some area, multimode cannot detect the ADSL line code well. If it is the case, please adjust the ADSL line code to G.dmt or T1.413 first. If it still fails, please try the other values such as ALCTL, ADI, etc.
  • Page 58: System

    System There are six items within the System section: Time Zone, Remote Access, Firmware Upgrade, Backup/Restore, Restart User Management. Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network Time Protocol (SNTP) to get the current time from an SNTP server outside your network. Choose your local time zone, click Enable and click the Apply button.
  • Page 59: Remote Access

    Remote Access To temporarily permit remote administration of the router (i.e. from outside your LAN), select a time period the router will permit remote access for and click Enable. You may change other configuration options for the web administration interface using Device Management options in the Advanced section of the GUI.
  • Page 60: Firmware Upgrade

    Firmware Upgrade Your router’s “firmware” is the software that allows it to operate and provides all its functionality. Think of your router as a dedicated computer, and the firmware as the software it runs. Over time this software may be improved and modified, and your router allows you to upgrade the software it runs to take advantage of these changes.
  • Page 61: Backup / Restore

    Backup / Restore These functions allow you to save and backup your router’s current settings to a file on your PC, or to restore a previously saved backup. This is useful if you wish to experiment with different settings, knowing that you have a backup handy in the case of any mistakes. It is advisable to backup your router’s settings before making any significant changes to your router’s configuration.
  • Page 62: Restart Router

    Restart Router Click Restart with option Current Settings to reboot your router (and restore your last saved configuration). If you wish to restart the router using the factory default settings (for example, after a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default settings.
  • Page 63: User Management

    User Management In order to prevent unauthorized access to your router’s configuration interface, it requires all users to login with a password. You can set up multiple user accounts, each with their own password. You are able to Edit existing users and Create new users who are able to access the device’s configuration interface.
  • Page 64: Firewall And Access Control

    Firewall and Access Control Your router includes a full SPI (Stateful Packet Inspection) firewall for controlling Internet access from your LAN, as well as helping to prevent attacks from hackers. In addition to this, when using NAT (Network Address Translation. Please see the WAN configuration section for more details on NAT) the router acts as a “natural”...
  • Page 65 You can find six items under the Firewall section: General Settings, Packet Filter, Intrusion Detection, URL Filter Firewall Log. Chapter 4: Configuration...
  • Page 66: General Settings

    General Settings You can choose not to enable Firewall, to add all filter rules by yourself, or enable the Firewall using preset filter rules and modify the port filter rules as required. The Packet Filter is used to filter packets based-on Applications (Port) or IP addresses. There are four options when you enable the Firewall, they are: All blocked/User-defined: no pre-defined port or address filter rules by default, meaning that all inbound (Internet to LAN) and outbound (LAN to Internet) packets will be blocked.
  • Page 67: Packet Filter

    Packet Filter This function is only available when the Firewall is enabled and one of these four security levels is chosen (All blocked, High, Medium and Low). The predefined port filter rules in the Packet Filter must modify accordingly to the level of Firewall, which is selected. See Table1: Predefined Port Filter for more detailed information.
  • Page 68 Example: Predefined Port Filters Rules The predefined port filter rules for High, Medium and Low security levels are listed. See Table 1. (Note: Firewall – All Blocked/User-defined, you must define and create the port filter rules yourself. No predefined rule is set) Table 1: Predefined Port Filter Port Number Firewall - High...
  • Page 69 Packet Filter – Add TCP/UDP Filter Rule Name: A user-defined name for identifying the application. Time Schedule: It is self-defined time period. You may specify a time schedule for your prioritization policy. For setup and detail, refer to Time Schedule section Source IP Address(es) / Destination IP Address(es): This is the Address-Filter used to allow or block traffic to/from particular IP address(es).
  • Page 70 Packet Filter – Add Raw IP Filter Rule Name: A user-defined name for identifying the rule. Time Schedule: It is self-defined time period. You may specify a time schedule for your prioritization policy. For setup and detail, refer to Time Schedule section Protocol Number: Insert the port number, i.e.
  • Page 71 Example: Configuring your firewall to allow for a publicly accessible web server on your LAN The predefined port filter rule for HTTP (TCP port 80) is the same no matter whether the firewall is set to a high, medium or low security level. To setup a web server located on the local network when the firewall is enabled, you have to configure the Port Filters setting for HTTP.
  • Page 72 Configuring Packet Filter: Click Port Filters. You will then be presented with the predefined port filter rules screen (in this case for the low security level), shown below: Note: You may click the predefined rule instead of it. This is an example to show to Edit Delete how you add a filter on your own.
  • Page 73 The new port filter rule for HTTP is shown below: 7. Configure your Virtual Server (“port forwarding”) settings so that incoming HTTP requests on port 80 will be forwarded to the PC running your web server: For how to configure the HTTP in Virtual Server, go to Add Virtual Server in Virtual Note: Server section for more details.
  • Page 74: Intrusion Detection

    Intrusion Detection The router’s Intrusion Detection System (IDS) is used to detect hacker attacks and intrusion attempts from the Internet. If the IDS function of the firewall is enabled, inbound packets are filtered and blocked depending on whether they are detected as possible hacker attacks, intrusion attempts or other connections that the router determines to be suspicious.
  • Page 75 Max ICMP Count: This is a threshold to decide whether an ICMP flood is occurring or not. Default value is 100 ICMP packets per seconds except ICMP Echo Requests (PING). For SYN Flood, ICMP Echo Storm and ICMP flood, IDS will just warn the user in the Event Log. It cannot protect against such attacks.
  • Page 76: Url Filtering

    URL Filtering URL (Uniform Resource Locator – e.g. an address in the form of http://www.abcde.com http://www.example.com) filter rules allow you to prevent users on your network from accessing particular websites by their URL. There are no pre-defined URL filter rules; you can add filter rules to meet your requirements.
  • Page 77 For example, if the URL is http://www.abc.com/abcde.html, it will be dropped as the keyword “abcde” occurs in the URL. Domains Filtering: This function checks the domain name only, not the IP address, in URLs accessed against your list of domains to block or allow. If it is matched, the URL request will be sent (Trusted) or dropped (Forbidden).
  • Page 78 Example: Andy wishes to disable all WEB traffic except for ones listed in the trusted domain, which would prevent Bobby from accessing other web sites. Andy selects both functions in the Domain Filtering and thinks that it will stop Bobby. But Bobby knows this function, Domain Filtering, ONLY disables all WEB traffic except for Trusted Domain, BUT not its IP address.
  • Page 79: Firewall Log

    Firewall Log Firewall Log display log information of any unexpected action with your firewall settings. Check the Enable box to activate the logs. Log information can be seen in the Status – Event Log after enabling. Chapter 4: Configuration...
  • Page 80: Vpn (Virtual Private Networks)

    VPN (Virtual Private Networks) (VPN Router Only) Virtual Private Networks is ways to establish secured communication tunnels to an organization’s network via the Internet. Your router supports three main types of VPN (Virtual Private Network), PPTP, IPSec L2TP. PPTP (Point-to-Point Tunneling Protocol) There are two types of PPTP VPN supported;...
  • Page 81 PPTP Connection - Remote Access Connection Name: A user-defined name for the connection (e.g. “connection to office”). Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In operates as a VPN server. When configuring your router as a Client, enter the remote Server IP Address (or Domain Name) you wish to connection to.
  • Page 82 Idle Time: Auto-disconnect the VPN connection when there is no activity on the connection for a predetermined period of time. 0 means this connection is always on. Active as default route: Enables the default route. Click Apply button to apply your changes. Chapter 4: Configuration...
  • Page 83 PPTP Connection - LAN to LAN Connection Name: A user-define description of the connection. Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In operates as a VPN server. When configuring your router as a Client, enter the remote Server IP Address (or Hostname) you wish to connection to.
  • Page 84 Mode: You may select Stateful or Stateless mode. The key will be changed every 256 packets when you select Stateful mode. If you select Stateless mode, the key will be changed in each packet. Idle Time: Auto-disconnect the VPN connection when there is no activity on the connection for a predetermined period of time.
  • Page 85: Ipsec (Ip Security Protocol)

    IPSec (IP Security Protocol) Click Create to create a new IPSec VPN connection account. After you have created the IPSec connection, account information will be displayed. (See example above). Enable / Disable: This function activates or deactivates the IPSec connection. To wish interrupting the tunnel, check Disable radio button and click Apply button to deactivate the connection.
  • Page 86 Configure a new VPN Connection Connection Name: A user-defined name for the connection (e.g. “connection to office”). Local: Network: Set the IP address, subnet or address range of the local network. Single Address: The IP address of the local host. Subnet: The subnet of the local network.
  • Page 87 SHA1: A one-way hashing algorithm that produces a 160−bit hash. Encryption: Select the encryption method from the pull-down menu. There are several options, DES, 3DES, AES (128, 192 and 256) and NULL. NULL means it is a tunnel only with no encryption.
  • Page 88 Advanced Option This function is only available after completed creating an IPSec account. Click Advanced Option to change the following settings: IKE (Internet key Exchange) Mode: Select IKE mode to Main mode or Aggressive mode. This IKE provides secured key generation and key management. IKE Proposal: Hash Function: It is a Message Digest algorithm which coverts any length of a message into a unique set of bits.
  • Page 89 DES: Stands for Data Encryption Standard, it uses 56 bits as an encryption method. 3DES: Stands for Triple Data Encryption Standard, it uses 168 (56*3) bits as an encryption method. AES: Stands for Advanced Encryption Standards, you can use 128, 192 or 256 bits as encryption method.
  • Page 90 Ping to the IP Action Ping to the IP Internal (sec) 0.0.0.0 0.0.0.0 2000 xxx.xxx.xxx.xxx (A valid IP Address) xxx.xxx.xxx.xxx(A valid IP Address) 2000 Yes, activate it in every 2000 second. Disconnection Time after no traffic: It is the NO Response time clock. When no traffic stage time is beyond the Disconnection time set, Router will automatically halt the tunnel connection and re-establish it base on the Reconnection Time set.
  • Page 91: L2Tp (Layer Two Tunneling Protocol)

    L2TP (Layer Two Tunneling Protocol) Two types of L2TP VPN are supported, Remote Access and LAN-to-LAN (please refer below for more information.). Click Create to create a new VPN connection account. After you have created L2TP connection, account status will be displayed. (See example above). Enable / Disable: This function activates or deactivates the L2TP connection.
  • Page 92 L2TP Connection - Remote Access Connection Name: This allows you to identify this particular connection, e.g. “Connection to office”. Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In operates as a VPN server. When configuring your router as a Client, enter the remote Server IP Address (or Hostname) you wish to connection to.
  • Page 93 Authentication: Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit. There are three options, Message Digest 5 (MD5), Secure Hash Algorithm (SHA1) or NONE. SHA1 is more resistant to brute-force attacks than MD5, however it is slower.
  • Page 94 L2TP Connection - LAN to LAN Connection Name: A user-define description of the connection. Type: Check Dial Out if you want your router to operate as a client (connecting to a remote VPN server, e.g. your office server), check Dial In operates as a VPN server. When configuring your router establish the connection to a remote LAN, enter the remote Server IP Address (or Hostname) you wish to connection to.
  • Page 95 Idle Time: Auto-disconnect the VPN connection when there is no activity on the connection for a predetermined period of time. 0 means this connection is always on. Click Apply after changing settings. IPSec: Enable for enhancing your LT2P VPN security. Authentication: Authentication establishes the integrity of the datagram and ensures it is not tampered with in transmit.
  • Page 96 Example: Configuring a Remote Access PPTP VPN Dial-in Connection A remote worker establishes a PPTP VPN connection with the head office using Microsoft's VPN Adapter (included with Windows 2000/ME, etc.). The router is installed in the head office, connected to a couple of PCs and Servers.
  • Page 97 Configuring PPTP VPN in the Office The input IP address 192.168.1.200 will be assigned to the remote worker. Please make sure this IP is not used in the Office LAN. Item Function Description Connection Name VPN_PPTP Given a name of PPTP connection Dial in Check Dial in Private IP Address...
  • Page 98 Example: Configuring a Remote Access PPTP VPN Dial-out Connection A company’s office establishes a PPTP VPN connection with a file server located at a separate location. The router is installed in the office, connected to a couple of PCs and Servers. Dial-out Chapter 4: Configuration...
  • Page 99 Configuring the PPTP VPN in the Office You can either input the IP address (69.1.121.33 in this case) or hostname to reach the server. Item Function Description Connection Name VPN_PPTP Given name of PPTP connection Dial out Check Dial out Server IP Address 69.121.1.33 An Dialed server IP...
  • Page 100 Example: Configuring a LAN-to-LAN PPTP VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet.. The routers are installed in the head office and branch office accordingly. Both office LAN networks MUST in different subnet with LAN to LAN application.
  • Page 101 Configuring PPTP VPN in the Head Office The IP address 192.168.1.201 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Item Function Description Connection Name HeadOffice Given a name of PPTP connection Dial in...
  • Page 102 Configuring PPTP VPN in the Branch Office The IP address 69.1.121.30 is the Public IP address of the router located in head office. If you registered the DDNS (please refer to the DDNS section of this manual), you can also use the domain name instead of the IP address to reach the router.
  • Page 103 Example: Configuring a IPSec LAN-to-LAN VPN Connection Table 3: Network Configuration and Security Plan Branch Office Head Office Local Network ID 192.168.0.0/24 192.168.1.0/24 Local Router IP 69.1.121.30 69.1.121.3 Remote Network ID 192.168.1.0/24 192.168.0.0/24 Remote Router IP 69.1.121.3 69.1.121.30 IKE Pre-shared Key 12345678 12345678 VPN Connection Type...
  • Page 104 Configuring IPSec VPN in the Head Office Item Function Description Connection Name IPSec_HeadOffice Given a name of IPSec connection Subnet Check Subnet radio button IP Address 192.168.1.0 Head office network Netmask 255.255.255.0 IP address of the head office router (in Secure Gateway Address 69.121.1.30 (or Hostname)
  • Page 105 Configuring IPSec VPN in the Branch Office Item Function Description IPSec_Branch Connection Name Given a name of IPSec connection Office Subnet Check Subnet radio button IP Address 192.168.0.0 Branch office network Netmask 255.255.255.0 IP address of the head office router (in Secure Gateway Address 69.121.1.3 (or Hostname)
  • Page 106 Example: Configuring a IPSec Host-to-LAN VPN Connection Chapter 4: Configuration...
  • Page 107 Configuring IPSec VPN in the Office Item Function Description Connection Name IPSec Given a name of IPSec connection Subnet Check Subnet radio button IP Address 192.168.1.0 Head office network Netmask 255.255.255.0 IP address of the head office router (in Secure Gateway Address 69.121.1.30 (or Hostname) WAN side)
  • Page 108 Example: Configuring a L2TP VPN - Remote Access Dial-in Connection A remote worker establishes a L2TP VPN connection with the head office using Microsoft's VPN Adapter (included with Windows XP/2000/ME, etc.). The router is installed in the head office, connected to a couple of PCs and Servers.
  • Page 109 Configuring L2TP VPN in the Office The input IP address 192.168.1.200 will be assigned to the remote worker. Please make sure this IP is not used in the Office LAN. Item Function Description Connection Name VPN_L2TP Given a name of L2TP connection Dial in Check Dial in Private IP Address...
  • Page 110 Example: Configuring a Remote Access L2TP VPN Dial-out Connection A company’s office establishes a L2TP VPN connection with a file server located at a separate location. The router is installed in the office, connected to a couple of PCs and Servers. Dial-out Chapter 4: Configuration...
  • Page 111 Configuring the L2TP VPN in the Office Item Function Description Connection Name VPN_L2TP Given name of L2TP connection Dial out Check Dial out Server IP Address (or 69.121.1.33 An Dialed server IP Hostname) Username username A given username & password Password 123456 Auth.Type...
  • Page 112 Example: Configuring your Router to Dial-in to the Server Currently, Microsoft Windows operation system does not support L2TP incoming service. Additional software may be required to set up your L2TP incoming service. Chapter 4: Configuration...
  • Page 113 Example: Configuring LAN-to-LAN L2TP VPN Connection The branch office establishes a L2TP VPN tunnel with head office to connect two private networks over the Internet. The routers are installed in the head office and branch office accordingly. Both office LAN networks MUST in different subnet with LAN to LAN application.
  • Page 114 Configuring L2TP VPN in the Head Office The IP address 192.168.1.200 will be assigned to the router located in the branch office. Please make sure this IP is not used in the head office LAN. Item Function Description Connection Name HeadOffice Given a name of L2TP connection Dial in...
  • Page 115 Configuring L2TP VPN in the Branch Office The IP address 69.1.121.30 is the Public IP address of the router located in head office. If you registered the DDNS (please refer to the DDNS section of this manual), you can also use the domain name instead of the IP address to reach the router.
  • Page 116: Qos (Quality Of Service)

    QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality and speed of through put for each application when the system is running with full loading of upstream. You can find three items under the QoS section: Prioritization Outbound / Inbound IP Throttling...
  • Page 117: Prioritization

    Prioritization There are three priority settings to be provided in the Router: High Normal (The default is normal priority for all of traffic without setting) And the balances of utilization for each priority are High (60%), Normal (30%) and Low (10%). Application: A user-define description to identify this new policy/application.
  • Page 118 Table 4: DSCP Mapping Table DSCP Mapping Table (Wireless) ADSL Router Standard DSCP Disabled None Best Effort Best Effort (000000) Premium Express Forwarding (101110) Gold service (L) Class 1, Gold (001010) Gold service (M) Class 1, Silver (001100) Gold service (H) Class 1, Bronze (001110) Silver service (L) Class 2, Gold (010010)
  • Page 119: Outbound Ip Throttling (Lan To Wan)

    Outbound IP Throttling (LAN to WAN) IP Throttling allows you to limit the speed of IP traffic. The value entered will limit the speed of the application that you set to the specified value’s multiple of 32kbps. Application: A user-define description to identify this new policy/application. Time Schedule: Scheduling your prioritization policy.
  • Page 120: Inbound Ip Throttling (Wan To Lan)

    Inbound IP Throttling (WAN to LAN) IP Throttling allows you to limit the speed of IP traffic. The value entered will limit the speed of the application that you set to the specified value’s multiple of 32kbps. Application: A user-define description to identify this new policy/application. Time Schedule: Scheduling your prioritization policy.
  • Page 121 Example: QoS for your Network Connection Diagram VoIP Normal PCs Restricted Information and Settings Upstream: 928 kbps Downstream: 8 Mbps VoIP User : 192.168.1.1 Normal Users : 192.168.1.2~192.168.1.5 Restricted User: 192.168.1.100 Throughput VoIP/VPN HIGH Others kbps NORMAL Restricted VoIP/VPN Others Restricted HIGH NORMAL...
  • Page 122 Mission-critical application Mostly the VPN connection is mission-critical application for doing data exchange between head and branch office. The mission-critical application must be sent out smoothly without any dropping. Set priority as high level for preventing any other applications to saturate the bandwidth. Voice application Voice is latency-sensitive application.
  • Page 123 Advanced setting by using IP throttling With IP throttling you can specify more detail for allocating bandwidth; even the applications are located in the same level. Upstream: 928kbps (29*32kbps) Mission-critical Application: 192kbps (6*32kbps) Voice Application: 128kbps (4*32kbps) Restricted Application: 160kbps (5*32kbps) Other Applications: 448kbps (14*32kbps) 6+4+14+5=29, 29*32kbps=928kbps Sometime your customers or friends may upload their files to your FTP server and that will saturate your...
  • Page 124: Virtual Server ("Port Forwarding")

    Virtual Server (“Port Forwarding”) In TCP/IP and UDP networks a port is a 16-bit number used to identify which application program (usually a server) incoming connections should be delivered to. Some ports have numbers that are pre- assigned to them by the IANA (the Internet Assigned Numbers Authority), and these are referred to as “well-known ports”.
  • Page 125: Add Virtual Server

    Add Virtual Server Because NAT can act as a “natural” Internet firewall, your router protects your network from being accessed by outside users when using NAT, as all incoming connection attempts will point to your router unless you specifically create Virtual Server entries to forward those ports to a PC on your network.
  • Page 126 Internal IP Address: The private IP in the LAN network, which will be providing the virtual server application. List all existing PCs connecting to the network. You may assign a PC with IP address and MAC from this list. Example: If you like to remote accessing your Router through the Web/HTTP at all time, you would need to enable port number 80 (Web/HTTP) and map to Router’s IP Address.
  • Page 127: Edit Dmz Host

    Edit DMZ Host The DMZ Host is a local computer exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets will be checked by the Firewall and NAT algorithms then passed to the DMZ host, when a packet received does not use a port number used by any other Virtual Server entries.
  • Page 128: Edit One-To-One Nat (Network Address Translation)

    Edit One-to-One NAT (Network Address Translation) One-to-One NAT maps a specific private/local IP address to a global/public IP address. If you have multiple public/WAN IP addresses from you ISP, you are eligible for One-to-One NAT to utilize these IP addresses. NAT Type: Select desired NAT type.
  • Page 129 Time Schedule: A self-defined time period to enable your virtual server. You may specify a time schedule or Always on for the usage of this Virtual Server Entry. For setup and detail, refer to Time Schedule section Application: Users-defined description to identify this entry or click to select existing predefined rules.
  • Page 130 For further information, please see IANA’s website at: http://www.iana.org/assignments/port-numbers For help on determining which private port numbers are used by common applications on this list, please see the FAQs (Frequently Asked Questions) at: http://www.BEC.com Table 5: Well-known and registered Ports Port Number Protocol...
  • Page 131: Time Schedule

    Time Schedule The Time Schedule supports up to 16 time slots which helps you to manage your Internet connection. In each time profile, you may schedule specific day(s) i.e. Monday through Sunday to restrict or allowing the usage of the Internet by users or applications. This Time Schedule correlates closely with router’s time, since router does not have a real time clock on board;...
  • Page 132: Configuration Of Time Schedule

    Configuration of Time Schedule Edit a Time Slot Choose any Time Slot (ID 1 to ID 16) to edit, click Edit. Click Edit A detailed setting of this Time Slot will be shown. ID: This is the index of the time slot. Name: A user-define description to identify this time portfolio.
  • Page 133 Example: I need to reserve a specific time period for allocating bandwidth for my VPN-PPTP connection during weekdays except on Wednesday from 8:30AM to 1:45 PM (13:45 in 24hour clock) for business purpose. But what should I do? 1. Choose a Time Slot to edit. 2.
  • Page 134: Advanced

    Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router. Users who do not understand the features should not attempt to reconfigure their router, unless advised to do so by support staff. There are four items within the Advanced section: Static Route, Dynamic DNS, Checking Email, Device Management...
  • Page 135: Dynamic Dns

    Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname, allowing users whose ISP does not assign them a static IP address to use a domain name. This is especially useful for hosting servers via your ADSL connection, so that anyone wishing to connect to you may use your domain name, rather than having to use your dynamic IP address, which changes from time to time.
  • Page 136: Check Emails

    Check Emails This function allows you to have the router check your POP3 mailbox for new Email messages. The Mail LED on your router will light when it detects new messages waiting for download. You may also view the status of this function using the Status – Email Checking section of the web interface, which also provides details on the number of new messages waiting.
  • Page 137: Device Management

    Device Management The Device Management advanced configuration settings allow you to control your router’s security options and device monitoring features. Embedded Web Server HTTP Port: This is the port number the router’s embedded web server (for web-based configuration) will use. The default value is the standard HTTP port, 80. Users may specify an alternative if, for example, they are running a web server on a PC within their LAN.
  • Page 138 Universal Plug and Play (UPnP) UPnP offers peer-to-peer network connectivity for PCs and other network devices, along with control and data transfer between devices. UPnP offers many advantages for users running NAT routers through UPnP NAT Traversal, and on supported systems makes tasks such as port forwarding much easier by letting the application control the required settings, removing the need for the user to control advanced configuration of their device.
  • Page 139 From RFC 1213 (MIB-II): System group Interfaces group Address Translation group IP group ICMP group TCP group UDP group EGP (not applicable) Transmission SNMP group From RFC1650 (EtherLike-MIB): dot3Stats From RFC 1493 (Bridge MIB): dot1dBase group dot1dTp group dot1dStp group (if configured as spanning tree) From RFC 1471 (PPP/LCP MIB): pppLink group pppLqr group...
  • Page 140 From RFC 1474 (PPP/Bridge MIB): PPP Bridge Group From RFC1573 (IfMIB): ifMIBObjects Group From RFC1695 (atmMIB): atmMIBObjects From RFC 1907 (SNMPv2): only snmpSetSerialNo OID Chapter 4: Configuration...
  • Page 141: Igmp

    IGMP IGMP, known as Internet Group Management Protocol, is used to management hosts from multicast group. IGMP Forwarding: Accepting multicast packet. Default is set to Enable. IGMP Snooping: Allowing switched Ethernet to check and make correct forwarding decisions. Default is set to Enable Chapter 4: Configuration...
  • Page 142: Save Configuration To Flash

    Save Configuration to Flash After changing the router’s configuration settings, you must save all of the configuration parameters to FLASH to avoid them being lost after turning off or resetting your router. Click Save to write your new configuration to FLASH. Chapter 4: Configuration...
  • Page 143: Logout

    Logout To exit the router’s web interface, choose Logout. Please ensure that you have saved the configuration settings before you logout. Be aware that the router is restricted to only one PC accessing the configuration web pages at a time. Once a PC has logged into the web interface, other PCs cannot get access until the current PC has logged out of the web interface.
  • Page 144: Chapter 5: Troubleshooting

    Chapter 5: Troubleshooting If the router is not functioning properly, first check this chapter for simple troubleshooting before contacting your service provider or BEC’s support. Problems starting up the router Problem Corrective Action Check the connection between the adapter and the router. If the error None of the LEDs are persists, you may have a hardware problem.
  • Page 145: Problems With The Lan Interface

    Problems with the LAN Interface Problem Corrective Action Check the Ethernet LEDs on the front panel. The LED should be on for a Can’t ping any PCs on port that has a PC connected. If it is off, check the cables between your the LAN.
  • Page 146: Appendix A: Product Support And Contact Information

    Contact BEC BEC Technologies Inc. http://www.bectechnologies.net/ ©2005 BEC Technologies Inc. All Rights Reserved. Mac OS is a registered Trademark of Apple Computer, Inc. Windows 98, Windows NT, Windows 2000, Windows Me and Windows XP are registered Trademarks of Microsoft Corporation.

Table of Contents