Comet Labs WRB54+ User Manual

Wireless internet broadband router

Advertisement

Quick Links

User's Manual
Wireless Internet Broadband Router
(Model-Nr. WRB54+)
English version
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WRB54+ and is the answer not in the manual?

Questions and answers

Summary of Contents for Comet Labs WRB54+

  • Page 1 User’s Manual Wireless Internet Broadband Router (Model-Nr. WRB54+) English version...
  • Page 2: Fcc Interference Statement

    Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system, translated into any language, or transmitted in any form or by any means, mechanical, magnetic, electronic, optical, photocopying, manual, or otherwise, without the prior written permission.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1 Introduction......................4 Functions and Features .................4 Packing List ..................7 Chapter 2 Hardware Installation................... 8 2.1 Panel Layout ...................8 2.2 Procedure for Hardware Installation..........10 Chapter 3 Network Settings and Software Installation............. 11 3.1 Make Correct Network Settings of Your Computer .....11 Chapter 3 Configuring Wireless Broadband Router ............
  • Page 4: Chapter 1 Introduction

    Congratulations on your purchase of this outstanding Wireless Broadband Router. This product is specifically designed for Small Office and Home Office needs. It provides a complete SOHO solution for Internet surfing, and is easy to configure and operate even for non-technical users. Instructions for installing and configuring this product can be found in this manual.
  • Page 5 Wireless functions l High speed for wireless LAN connection Up to 54Mbps data rate by incorporating Orthogonal Frequency Division Multiplexing (OFDM).Texas Instrument 4X (Four times) mode supported – IEEE802.11g++ l Roaming Provides seamless roaming within the IEEE 802.11b(11M) and IEEE 802.11g(54M) WLAN infrastructure.
  • Page 6 Advanced functions l System time Supported Allow you to synchronize system time with network time server. l E-mail Alert Supported The router can send its info by mail. l Dynamic dns Supported At present,the router has 3 ddns.dyndns,TZO.com and dhs.org. l SNMP Supported Because SNMP this function has many versions, anyway, the router supports V1 and V2c.
  • Page 7: Packing List

    Packing List Wireless broadband router unit Installation CD-ROM Power adapter CAT-5 UTP Fast Ethernet cable...
  • Page 8: Chapter 2 Hardware Installation

    2.1 Panel Layout 2.1.1. Front Panel Figure 2-1 Front Panel LED: Function Color Status Description Power POWER Green Power is being applied to this product. indication System Green Blinking This product is functioning properly. status 1 The WAN port is linked. WAN port Green The WAN port is sending or receiving...
  • Page 9 2.1.2. Rear Panel Figure 2-2 Rear Panel Ports: Port Description 5VDC Power inlet: DC 5V, 1.5A (minimum) the port where you will connect your cable (or DSL) modem or Ethernet router. Port 1-4 the ports where you will connect networked computers and other devices.
  • Page 10: Procedure For Hardware Installation

    2.2 Procedure for Hardware Installation 1. Decide where to place your Wireless Broadband Router You can place your Wireless Broadband Router on a desk or other flat surface, or you can mount it on a wall. For optimal performance, place your Wireless Broadband Router in the center of your office (or your home) in a location that is away from any potential source of interference, such as a metal wall or microwave oven.
  • Page 11: Chapter 3 Network Settings And Software Installation

    To use this product correctly, you have to properly configure the network settings of your computers and install the attached setup program into your MS Windows platform ( Windows 95/98/NT/2000). 3.1 Make Correct Network Settings of Your Computer The default IP address of this product is 192.168.0.1 , and the default subnet mask is 255.255.255.0. These addresses can be changed on your need, but the default values are used in this manual.
  • Page 12: Chapter 3 Configuring Wireless Broadband Router

    This product provides Web based configuration scheme, that is, configuring by your Web browser, such as Netscape Communicator or Internet Explorer. This approach can be adopted in any MS Windows, Macintosh or UNIX based platforms.
  • Page 13: Start-Up And Log In

    3.1 Start-up and Log in Activate your browser, and disable the proxy or add the IP address of this product into the exceptions. Then, type this product’s IP address in the Location (for Netscape) or Address (for IE) field and press ENTER. For example: http://192.168.0.1. After the connection is established, you will see the web user interface of this product.
  • Page 14: Status

    3.2 Status This option provides the function for observing this product’s working status: A. WAN Port Status. If the WAN port is assigned a dynamic IP, there may appear a “Renew” or “Release” button on the Sidenote column. You can click this button to renew or release IP manually. B.
  • Page 15: Wizard

    3.3 Wizard Setup Wizard will guide you through a basic configuration procedure step by step.Press ”Next >”...
  • Page 16: Basic Setting

    Setup Wizard - Select WAN Type: For detail settings, please refer to 3.4.1 primary setup. 3.4 Basic Setting...
  • Page 17 3.4.1 Primary Setup – WAN Type, Virtual Computers Press “Change”...
  • Page 18 This option is primary to enable this product to work properly. The setting items and the web appearance depend on the WAN type. Choose correct WAN type before you start. 1. LAN IP Address: the local IP address of this device. The computers on your network must use the LAN IP address of your product as their Default Gateway.
  • Page 19 3.4.1.3 Dynamic IP Address with Road Runner Session Management.(e.g. Telstra BigPond) LAN IP Address is the IP address of this product. It must be the default gateway of your computers. WAN Type is Dynamic IP Address. If the WAN type is not correct, change it! Host Name: optional.
  • Page 20 3.4.1.6 Virtual Computers Virtual Computer enables you to use the original NAT feature, and allows you to setup the one -to-one mapping of multiple global IP address and local IP address. Global IP: Enter the global IP address assigned by your ISP. Local IP: Enter the local IP address of your LAN PC corresponding to the global IP address.
  • Page 21 3.4.2 DHCP Server Press “More>>” The settings of a TCP/IP environment include host IP, Subnet Mask, Gateway, and DNS configurations. It is not easy to manually configure all the computers and devices in your network. Fortunately, DHCP Server provides a rather simple approach to handle all these settings. This product supports the function of DHCP server.
  • Page 22 3.4.3 Wireless Setting, and 802.1X setting Wireless settings allow you to set the wireless configuration items. 1. Network ID(SSID): Network ID is used for identifying the Wireless LAN (WLAN). Client stations can roam freely over this product and other Access Points that have the same Network ID. (The factory setting is “default”) 2.
  • Page 23 6. 802.1X Setting 802.1X Check Box was used to switch the function of the 802.1X. When the 802.1X function is enable, the Wireless user must authenticate to this router first to use the Network service. RADIUS Server IP address or the 802.1X server’s domain-name. RADIUS Shared Key Key value shared by the RADIUS server and this router.
  • Page 24 3.4.4 Change Password You can change Password here. We strongly recommend you to change the system password for security reason.
  • Page 25: Forwarding Rules

    3.5 Forwarding Rules 4.5.1 Virtual Server...
  • Page 26 This product’s NAT firewall filters out unrecognized packets to protect your Intranet, so all hosts behind this product are invisible to the outside world. If you wish, you can make some of them accessible by enabling the Virtual Server Mapping. A virtual server is defined as a Service Port, and all requests to this port will be redirected to the computer specified by the Server IP.
  • Page 27 3.5.2 Special AP Some applications require multiple connections, like Internet games, Video conferencing, Internet telephony, etc. Because of the firewall function, these applications cannot work with a pure NAT router. The Special Applications feature allows some of these applications to work with this product. If the mechanism of Special Applications fails to make an application work, try setting your computer as the DMZ host instead.
  • Page 28: Miscellaneous Items

    3.5.3 Miscellaneous Items IP Address of DMZ Host DMZ (DeMilitarized Zone) Host is a host without the protection of firewall. It allows a computer to be exposed to unrestricted 2-way communication for Internet games, Video conferencing, Internet telephony and other special applications. NOTE: This feature should be used only when needed.
  • Page 29: Security Settings

    3.6 Security Settings...
  • Page 30: Packet Filter

    3.6.1 Packet Filter Packet Filter enables you to control what packets are allowed to pass the router. Outbound filter applies on all outbound packets. However, Inbound filter applies on packets that destined to Virtual Servers or DMZ host only. You can select one of the two filtering policies: 1.
  • Page 31 For source or destination port, you can define a single port (80) or a range of ports (1000-1999). Add prefix "T" or "U" to specify TCP or UDP protocol. For example, T80, U53, U2000-2999. No prefix indicates both TCP and UDP are defined. An empty implies all port addresses. Packet Filter can work with Scheduling Rules, and give user more flexibility on Access control.
  • Page 32 Example 2: (1.2.3.100-1.2.3.119) They can do everything except read net news (port 119) and transfer files via FTP (port 21) Others are all allowed. After Inbound Packet Filter setting is configured, click the save button. Outbound Filter: To enable Outbound Packet Filter click the check box next to Enable in the Outbound Packet Filter field.
  • Page 33 Example 1: First filter : All the nodes can connect to the internet except 192.168.0.123 which is very limited to special functions. It is not allowed to send mail (port 25), receive mail (port 110), and browse Internet (port 80); port 53 (DNS) is necessary to resolve the domain name. Second filter (192.168.0.20-) has no access to the internet (everything is blocked)
  • Page 34 Example 2: First filter : 192.168.0.200 is not allowed to transfer files via FTP (port 21) Second filter : 192.168.0.219 can do everything except read net news (port 119) Others are allowed After Outbound Packet Filter setting is configured, click the save button.
  • Page 35: Domain Filter

    3.6.2 Domain Filter Domain Filter let you prevent users under this device from accessing specific URLs. Domain Filter Enable Check if you want to enable Domain Filter. Log DNS Query Check if you want to log the action when someone accesses the specific URLs. Privilege IP Addresses Range Setting a group of hosts and privilege these hosts to access network without restriction.
  • Page 36 Example: In this example: 1. URL include “www.msn.com” will be blocked, and the action will be record in log-file. 2. URL include “www.sina.com” will not be blocked, but the action will be record in log-file. 3. URL include “www.google.com” will be blocked, but the action will not be record in log-file. IP address X.X.X.1~ X.X.X.20 can access network without restriction.
  • Page 37: Url Blocking

    3.6.3 URL Blocking URL Blocking will block LAN computers to connect to pre-defined Websites. The major difference between “Domain filter” and “URL Blocking” is Domain filter require user to input suffix (like .com or .org, etc), while URL Blocking require user to input a keyword only. In other words, Domain filter can block specific website, while URL Blocking can block hundreds of websites by simply a keyword.
  • Page 38 In this example: 1.URL include “msn” will be blocked, and the action will be record in log-file. 2.URL include “sina” will be blocked, but the action will be record in log-file 3.URL include “cnnsi” will not be blocked, but the action will be record in log-file. 4.
  • Page 39: Mac Address Control

    3.6.4 MAC Address Control MAC Address Control allows you to assign different access right for different users and to assign a specific IP address to a certain MAC address. MAC Address Control Check “Enable” to enable the “MAC Address Control”. All of the settings in this page wi ll take effect only when “Enable”...
  • Page 40 Control table "Control table" is the table at the bottom of the "MAC Address Control" page. Each row of this table indicates the MAC address and the expected IP address mapping of a client. There are four columns in this table: MAC Address MAC address indicates a specific client.
  • Page 41: Vpn Setting

    3.6.5 VPN setting VPN Settings are settings that are used to create virtual private tunnels to remote VPN gateways. The tunnel technology supports data confidentiality, data origin authentication and data integrity of network information by utilizing encapsulation protocols, encryption algorithms, and hashing algorithms. VPN enable item VPN protects network information from ill network inspectors.
  • Page 42 IPSec VPN supports two kinds of key-obtained methods: manual key and automatic key exchange. Manual key approach indicates that two end VPN gateways setup authenticator and encryption key by system managers manually. However, IKE approach will perform automatic Internet key exchange. System managers of both end gateways only need set the same pre-shared key.
  • Page 43 Local netmask Local netmask combined with local subnet to form a subnet domain. Remote subnet The subnet of LAN site of remote VPN gateway, it can be a host, a partial subnet, and the whole subnet of LAN site of remote gateway. Remote netmask Remote netmask combined with remote subnet to form a subnet domain of remote end.
  • Page 44 IKE Proposal index A list of selected proposal indexes from the IKE proposal pool listed below. The selecting activity is performed by selecting a proposal ID and clicking "add to" button in the bottom of the page. There are only four indexes can be chosen from the proposal pool for the dedicated tunnel. Remove button beside the index list can remove selected proposal index before.
  • Page 45 VPN Settings -Set IPSec Proposal IPSec Proposal index A list of selected proposal indexes from the IPSec proposal pool listed below. The selecting activity is performed by selecting a proposal ID and clicking "add to" button in the bottom of the page. There are only four indexes can be chosen for the dedicated tunnel.
  • Page 46 Life time The unit of life time is based on the value of Life Time Unit. If the value of unit is second, the value of life time represents the life time of dedicated VPN tunnel between both end gateways. Its value ranges from 300 seconds to 172,800 seconds.
  • Page 47 3.6.5.2 VPN Settings - Dynamic VPN Tunnel When using VPN Dynamic IP Setting, this router is working as a Dynamic VPN server. Dynamic VPN Server will not check VPN client IP information, so user can build VPN tunnel with VPN gateway from any remote host regardless of its IP information.
  • Page 48 3.6.5.3 VPN Settings – L2TP Server L2TP (Layer2 Tunneling protocol) combine features of both Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Forwarding (L2F) technology. L2TP provides security for a virtual private network (VPN) connection from the remote user to the corporate LAN. User can build up to five L2TP tunnels for L2TP clients.
  • Page 49 3.6.5.4 VPN Settings – PPTP Server PPTP (Point-to-Point Tunneling Protocol) is a tunneling protocol for connecting clients and servers. PPTP can be used to create a Virtual Private Network (VPN) between the remote user and the corporate LAN. User can build up to five PPTP tunnels for PPTP clients. Each tunnel can accept more than one client. User is required to configure Virtual IP of PPTP Server, Authentication Protocol, PPTP Tunnel Name and User Account, Password.
  • Page 50 3.6.6 Miscellaneous Items Remote Administrator Host/Port In general, only Intranet user can browse the built-in web pages to perform administration task. This feature enables you to perform administration task from remote host. If this feature is enabled, only the specified IP address can perform remote administration. If the specified IP address is 0.0.0.0, any host can connect to this product to perform administration task.
  • Page 51 DoS Attack Detection When this feature is enabled, the router will detect and log the DoS attack comes from the Internet. Currently, the router can detect the following DoS attack: SYN Attack, WinNuke, Port Scan, Ping of Death, Land Attack etc. VPN PPTP/IPSec Pass-Through Please enable this feature, if you need to establish a PPTP or IPSEC connection that will pass through this device.
  • Page 52: Advanced Settings

    3.7 Advanced Settings...
  • Page 53 3.7.1 System Time Get Date and Time by NTP Protocol Selected if you want to Get Date and Time by NTP Protocol. Time Server Select a NTP time server to consult UTC time Time Zone Select a time zone where this device locates. Set Date and Time manually Selected if you want to Set Date and Time manually.
  • Page 54: System Log

    3.7.2 System Log This page support two methods to export system logs to specific destination by means of syslog(UDP) and SMTP(TCP). The items you have to setup including: IP Address for Syslog Host IP of destination where syslogs will be sent to. Check Enable to enable this function.
  • Page 55 Send E-mail alert to The recipients who will receive these logs. You can assign more than 1 recipient, using ';' or ',' to separate these email addresses. E-mail Subject The subject of email alert. This setting is optional. Username and Password To fill some SMTP server's authentication requirement, you may need to input Username and Password that offered by your ISP.
  • Page 56: Dynamic Dns

    3.7.3 Dynamic DNS To host your server on a changing IP address, you have to use dynamic domain name service (DDNS). So that anyone wishing to reach your host only needs to know the name of it. Dynamic DNS will map the name of your host to your current IP address, which changes each time you connect your Internet service provider.
  • Page 57 Example: After Dynamic DNS setting is configured, click the save button.
  • Page 58: Snmp Setting

    3.7.4 SNMP Setting In brief, SNMP, the Simple Network Management Protocol, is a protocol designed to give a user the capability to remotely manage a computer network by polling and setting terminal values and monitoring network events. Enable SNMP You must check either Local or Remote or both to enable SNMP function. If Local is checked, this device will response request from LAN.
  • Page 59 Example: 1. This device will response to SNMP client which’s get community is set as “public” 2. This device will response to SNMP client which’s set community is set as “private” 3. This device will response request from both LAN and WAN 4.
  • Page 60: Routing Table

    3.7.5 Routing Table Routing Tables allow you to determine which physical interface address to use for outgoing IP data grams. If you have more than one routers and subnets, you will need to enable routing table to allow packets to find proper routing path and allow different subnets to communicate with each other. Routing Table settings are settings used to setup the functions of static and dynamic routing.
  • Page 61 Example: Configuration on NAT Router Destination Subnet Mask Gateway Enabled 192.168.1.0 255.255.255.0 192.168.0.216 192.168.10.0 255.255.255.0 192.168.0.103 So if, for example, the client3 wanted to send an IP data gram to 192.168.10.2, it would use the above table to determine that it had to go via 192.168.0.103 (a gateway), And if it sends Packets to 192.168.1.11 wi ll go via 192.168.0.216 Each rule can be enabled or disabled individually.
  • Page 62 3.7.6 Schedule Rule You can set the schedule time to decide which service will be turned on or off. Select the “enable” item. Press “Add New Rule”...
  • Page 63 You can write a rule name and set which day and what time to schedule from “Start Time” to “End Time”. The following example configure “ftp time” as everyday 14:10 to 16:20...
  • Page 64 After configure Rule 1à Schedule Enable Selected if you want to Enable the Scheduler. Edit To edit the schedule rule. Delete To delete the schedule rule, and the rule# of the rules behind the deleted one will decrease one automatically. Schedule Rule can be apply to Virtual server and Packet Filter, for example:...
  • Page 65 Exanple1: Virtual Server – Apply Rule#1 (ftp time: everyday 14:10 to 16:20) Exanple2: Packet Filter – Apply Rule#1 (ftp time: everyday 14:10 to 16:20).
  • Page 66: Toolbox

    3.8 Toolbox...
  • Page 67 3.8.1 System Log You can View system log by clicking the View Log button...
  • Page 68 3.8.2 Firmware Upgrade You can upgrade firmware by clicking Firmware Upgrade button.
  • Page 69 3.8.3 Backup Setting You can backup your settings by clicking the Backup Setting button and save it as a bin file. Once you want to restore these settings, please click Firmware Upgrade button and use the bin file you saved. 3.8.4 Reset to default You can also reset this product to factory default by clicking the Reset to default button.
  • Page 70 3.8.6 Miscellaneous Items MAC Address for Wake-on-LAN Wake-on-LAN is a technology that enables you to power up a networked device remotely. In order to enjoy this feature, the target device must be Wake-on-LAN enabled and you have to know the MAC address of this device, say 00-11-22-33-44-55.
  • Page 71: Appendix A Tcp/Ip Configuration For Windows 95/98

    This section introduces you how to install TCP/IP protocol into your personal computer. And suppose you have been successfully installed one network card on your personal computer. If not, please refer to your network card manual. Moreover, the Section B.2 tells you how to set TCP/IP values for working with this NAT Router correctly.
  • Page 72 6. The TCP/IP protocol shall be listed in the Network window. Click OK to complete the install procedure and restart your PC to enable the TCP/IP protocol. A.2 Set TCP/IP Protocol for Working with NAT Router 1. Click Start button and choose Settings, then click Control Panel . 2.
  • Page 73 b. Don’t input any value in the Gateway tab.
  • Page 74 c. Choose Disable DNS in the DNS Configuration tab. B. Configure IP manually Select Specify an IP address in the IP Address tab. The default IP address of this product is 192.168.0.1. So please use 192.168.0.xxx (xxx is between 1 and 253) for IP Address field and 255.255.255.0 for Subnet Mask field.
  • Page 75 b. In the Gateway tab, add the IP address of this product (default IP is 192.168.0.1 ) in the New gateway field and click Add button.
  • Page 76 c. In the DNS Configuration tab, add the DNS values which are provided by the ISP into DNS Server Search Order field and click Add button.
  • Page 77: Appendix B Win 2000/Xp Ipsec Setting Guide

    Example: Wi n XP/2000 àVPN Router (Configuration on WIN 2000 is similar to XP) 1. On Win 2000/XP, click [Start] button, select [Run], type secpol.msc in the field, then click [Run]à Goto **Local Security Policy Settings** page 2. Or in Win XP, Click [Control Pannel] Double-click [Performance and Maintenance]...
  • Page 78 Double-click [Administrative Tools]...
  • Page 79 Local Security Policy Settings Double-click [Local Security Policy]...
  • Page 80 Right-click [IP Security Policies on Local Computer], and click [Create IP Security Policy]. Click the [Next] button, enter your policy’s name (Here it is to_vpn_router). Then, click [Next]. Introduction Dis-select the [Activate the default response rule] check box, and click [Next] button.
  • Page 81 Build 2 Filter Lists: “xp->router” and “router->xp” Filter List 1: xp-> router In the “new policy’s properties” screen, select [Use Add Wizard] check box, and then click [Add] button to create a new rule.
  • Page 82 click [Add] button...
  • Page 83 Enter a name, for example: xp->router and dis-select [Use Add Wizard] check box. Click [Add] button.
  • Page 84 In the Source address field, select [A specific IP Address]. and fill in IP Address: 192.168.1.1 In the Destination address field, select [A specific IP Subnet], fill in IP Address: 192.168.0.0 and Subnet mask: 255.255.255.0 . If you want to select a protocol for your filter, click [Protocol] page.
  • Page 85 Click [OK] button. Then click [OK] button on the “IP Filter List” page.
  • Page 86 select [Filter Action], select [Require Security], then click [Edit] button.
  • Page 87 select [Negotiate security], Select [Session key Perfect Forward Secrecy (PFS)] click [Edit] button.
  • Page 88 select [Custom] button...
  • Page 89 Select [Data integrity and encryption (ESP)] Configure “Integrity algorithm”: [MD5] Configure “Encryption algorithm”: [DES] Configure “Generate a new key every [10000] seconds” Click [OK] button...
  • Page 90 select [Authentication Methods ] page, click [Add] button.
  • Page 91 select [Use this string to protect the key exchange (preshared key)], and enter your preshared key string, such as mypresharedkey. Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [Tunnel Setting]...
  • Page 92 configure [The tunnel endpoint is specified by this IP address]: 192.168.1.254 Select [Connection Type]...
  • Page 93 select [All network connections] Tunnel 2: router->xp In the “new policy’s properties” page, dis-select [Use Add Wizard] check box, and then click [Add] button to create a new rule.
  • Page 94 click [Add] button...
  • Page 95 Enter a name, such as router->xp and dis-select [Use Add Wizard] check box. Click [Add] button.
  • Page 96 In the Source address field, select [A specific IP Subnet]. fill in IP Address: 192.168.0.0 and Subnet mask: 255.255.255.0 . In the Destination address field, select [A specific IP Address], and fill in IP Address: 192.168.1.1 If you want to select a protocol for your filter, click [Protocol] page.
  • Page 97 Click [OK] button. Then click [OK] button on [IP Filter List] window.
  • Page 98 select [Filter Action tab], select [Require Security], then click [Edit] button.
  • Page 99 select [Negotiate security], Select [Session key Perfect Forward Secrecy (PFS)] click [Edit] button.
  • Page 100 select [Custom] button...
  • Page 101 Select [Data integrity and encryption (ESP)] Configure “Integrity algorithm”: [MD5] Configure “Encryption algorithm”: [DES] Configure “Generate a new key every [10000] seconds” Click [OK] button...
  • Page 102 select [Authentication Methods ] page, click [Add] button.
  • Page 103 select [Use this string to protect the key exchange (preshared key)], and enter the preshared key string, such as mypresharedkey. Click [OK] button. Click [OK] button on [Authentication Methods] page. Select [Tunnel Setting]...
  • Page 104 Configure [The tunnel endpoint is specified by this IP address]: 192.168.1.1 Select [Connection Type]...
  • Page 105 select [All network connections]...
  • Page 106 Configure IKE properties Select [General] Click [Advanced…]...
  • Page 107 enable “Master key perfect forward security (PFS)” configure “Authenticate and generate a new key after every [10000] seconds” click [Methods…] click [Add] button...
  • Page 108 Configure “Integrity algorithm”: [SHA1] Configure “Encryption algorithm”: [3DES] Configure “Diffie-Helman group”: [Medium (2)] Settings on VPN router VPN Router: Wan IP address:192.168.1.254 Lan IP address:192.168.0.1 192.168.0.223...
  • Page 109 VPN Settings: VPN: Enable Max. number of tunnels: 2 ID: 1 Tunnel Name: 1 Method: IKE Press “More”à...
  • Page 110 VPN Settings - Tunnel 1 – IKE Tunnel:1 Local Subnet:192.168.0.0 Local Netmask:255.255.255.0 Remote Subnet:192.168.1.1 Remote Netmask:255.255.255.255 Remote Gateway:192.168.1.1 Preshare Key: my-preshare-key...
  • Page 111 VPN Settings - Tunnel 1 - Set IKE Proposal ID: 1 Proposal Name: 1 DH Group: Group2 Encrypt. Algorithm: 3DES Auth. Algorithm: SHA1 Life Time: 10000 Life Time Unit: Sec.
  • Page 112 VPN Settings - Tunnel 1 - Set IPSec Proposal ID: 1 Proposal Name: proposal1 DH Group: Group2 Encap. Protocol: ESP Encrypt. Algorithm: DES Auth. Algorithm:MD5 Life Time: 10000 Life Time Unit: Sec.
  • Page 113 User can view VPN connection process in “System Log” page, and correct their settings. Phase1 is related to IKE settings, Phase2 is related to IPSEC settings.
  • Page 114: Appendix C Pptp And L2Tp Configurations

    1. First, please go to the Network connection 2. Connect to network at my workplace...
  • Page 115 3. Choose Virtual Private Network 4. Do not dial to initial connection...
  • Page 116 5. Input the router wan ip address 6. Then ok, please input username and password as you setup in the router.
  • Page 117 7. Select the type of VPN...
  • Page 118 However, you should add the Authentication Protocol in advanced(Custom setting) of Security option, like below t o support pap, chap, mschap. If successfully, we will see: This time, the client in the internet can ping any pcs in the lan(192.168.0.x) L2TP However, the router is the also vpn-l2tp server and supports three Authentication Protocols, PAP, CHAP and MSCPAP.
  • Page 119 Then the steps refer to pptp settings.
  • Page 120 Figure 1: Testing Environment (Use Windows 2000 Radius Server) 1 Equipment Details PC1: Microsoft Windows XP Professional without Service Pack 1. D-Link DWL-650+ wireless LAN adapter Driver version: 3.0.5.0 (Driver date: 03.05.2003) PC2: Microsoft Windows XP Professional with Service Pack 1a. Z-Com XI-725 wireless LAN USB adapter Driver version: 1.7.29.0 (Driver date: 10.20.2001) Authentication...
  • Page 121: Appendix D 802.1X Setting

    4.Set RADIUS server IP. 5.Set RADIUS server shared key. 6.Configure WEP key and 802.1X setting. The following test will use the inbuilt 802.1 X authentication method such as ,EAP_TLS, PEAP_CHAPv2(Windows XP with SP1 only), and PEAP_TLS(Windows XP with SP1 only) using the Smart Card or other Certificate of the Windows XP Professional.
  • Page 122 Figure 2: Enable IEEE 802.1X access control...
  • Page 123 Figure 3: Smart card or certificate properties 4.Windows 2000 RADIUS server Authentication testing: 4.1DUT authenticate PC1 using certificate. (PC2 follows the same test procedures.) 1. Download and install the certificate on PC1. (Fig 4) 2. PC1 choose the SSID of DUT as the Access Point. 3.
  • Page 124 Figure 4: Certificate information on PC1 Figure 5: Authenticating...
  • Page 125 Figure 6: Authentication success 4.2DUT authenticate PC2 using PEAP -TLS. 1. PC2 choose the SSID of DUT as the Access Point. 2. Set authentication type of wireless client and RADIUS server both to PEAP_TLS. 3. Disable the wireless connection and enable again. 4.The DUT will send the user's certificate to the RADIUS server, and then send the message of authentication result to PC2.
  • Page 126: Appendix E Faq And Troubleshooting

    Reset to factory Default There are 3 methods to reset to default. Restore with console mode null modem cable Please notice that this method requires a and terminal program (e.g. HyperTerminal for MS Windows). First, configure the setting of your terminal program as 19200 N-8-1. And then, power off and on the router.

Table of Contents