Ovislink AirLive RS-1000 User Manual

Security bandwidth management
Hide thumbs Also See for AirLive RS-1000:

Advertisement

Quick Links

AirLive RS-1000
Security Bandwidth Management
User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for Ovislink AirLive RS-1000

  • Page 1 AirLive RS-1000 Security Bandwidth Management User’s Manual...
  • Page 2: Table Of Contents

    Contents System Admin Setting Date/Time Language Permitted IP Multiple NAT Hack Alert Route Table DHCP Host Table Dynamic DNS Logout...
  • Page 3 Software Update Interface Address LAN Group WAN Group Service Pre-defined Custom Group Schedule Authentication Policy...
  • Page 4 Outgoing Incoming Content Filtering URL Blocking General Blocking Virtual Server Mapped IP Virtual Server Traffic Log Event Log Connection Log Log Backup Alarm Traffic Alarm...
  • Page 5 Event Alarm Accounting Report Outbound Inbound Statistics WAN Statistics Policy Statistics Status Interface Status ARP Table DHCP Clients Setup Examples...
  • Page 6: System

    System The Security Bandwidth Manager Administration and monitoring control is set by the System Administrator. The System Administrator can add or modify System settings and monitoring mode. The sub Administrators can only read System settings but not modify them. In System, the System Administrator can: 1.
  • Page 7 Multiple NAT Multiple NAT allows local port to set multiple subnet works and connect with the Internet through different WAN IP Addresses. Address:Enables the Administrator to authorize specific internal/external IP address(s for Manager. Hack Alert When abnormal conditions occur, the Security Bandwidth Manager will send an e-mail alert to notify the Administrator, and also display warning messages in the Event window of Alarm.
  • Page 8: Admin

    Admin On the left hand menu, click on Setup, and then select Admin below it. The current list of Administrator(s) shows up. Figure1-1 Settings of the Administration table Administrator Name: The username of Administrators for the Security Bandwidth Manager. The user admin cannot be removed. Privilege: The privileges of Administrators (Admin or Sub Admin) The username of the main Administrator is Administrator with read / write privilege.
  • Page 9 Changing the Main/Sub-Administrator’s Password Step 1. The Modify Administrator Password window will appear. Enter in the required information: " Password: enter original password. " New Password: enter new password " Confirm Password: enter the new password again. Step 2. Click OK to confirm password change or click Cancel to cancel it. Figure1-2 4...
  • Page 10 Adding a new Sub Administrator Step 1. In the Add New Sub Administrator window: " Sub Admin Name: enter the username of new Sub Admin. " Password: enter a password for the new Sub Admin. " Confirm Password: enter the password again. Step 2.
  • Page 11 Removing a Sub Administrator Step 1. In the Administration table, locate the Administrator name you want to edit, and click on the Remove option in the Configure field. Step 2. The Remove confirmation pop-up box will appear. Click OK to remove that Sub Admin or click Cancel to cancel.
  • Page 12: Setting

    Settings The Administrator may use this function to backup Security Bandwidth Manager configurations and export (save) them to an “Administrator” computer or anywhere on the network; or restore a configuration file to the device; or restore the Security Bandwidth Manager back to default factory settings. Entering the Settings window Click Setting in the System menu to enter the Settings window.
  • Page 13 Exporting Security Bandwidth Manager settings Step 1. Under Bandwidth Manager Configuration, click on the Download button next to Export System Settings to Client. Step 2. When the File Download pop-up window appears, choose the destination place to save the exported file. The Administrator may choose to rename the file if preferred.
  • Page 14 Importing Security Bandwidth Manager settings Under Bandwidth Manager Configuration, click on the Browse button next to Import System Settings. When the Choose File pop-up window appears, select the file which contains the saved Security Bandwidth Manager Settings, then click OK. Click OK to import the file into the Security Bandwidth Manager or click Cancel to cancel importing.
  • Page 15: Restoring Factory Default Settings

    Restoring Factory Default Settings Step 1. Select Reset Factory Settings under Bandwidth Manager Configuration. Click OK at the bottom-right of the screen to restore the factory settings. Figure1-8 Select Reset Factory Settings 10...
  • Page 16 Enabling E-mail Alert Notification Step 1. Select Enable E-mail Alert Notification under E-Mail Settings. This function will enable the Security Bandwidth Manager to send e-mail alerts to the System Administrator when the network is being attacked by hackers or when emergency conditions occur.
  • Page 17 Web Manager (WAN Interface) (Remote UI Manager) The administrator can change the port number used by HTTP port anytime. (Remote UI Manager) Step 1. Set Web Manager (WAN Interface). The administrator can change the port number used by HTTP port anytime. Figure1-10 Web Manager 12...
  • Page 18 MTU (set networking packet length) The administrator can modify the networking packet length. Step 1. MTU Setting. Modify the networking packet length. Figure1-11 MTU 13...
  • Page 19 To-Bandwidth Manager Packets Log Once this function is enabled, every packet passing through the Firewall will be recorded for the administrator to trace. Step 1. Select this option to the device’s To-Bandwidth Manager Packets Log. Once this function is enabled, every packet to this appliance will be recorded for system manager to trace.
  • Page 20 Security Bandwidth Manager Reboot Once this function is enabled, the Security Bandwidth Manager will be rebooted. Reboot Security Bandwidth Manager: Click Reboot. A confirmation pop-up box will appear. Follow the confirmation pop-up box, click OK to restart Security Bandwidth Manager or click Cancel to discard changes Figure1-13 Reboot Security Bandwidth Manager 15...
  • Page 21: Date/Time

    Date/Time Synchronizing the Bandwidth Manager with the System Clock Admins can configure the Security Bandwidth Manager.s date and time by either syncing to an Internet Network Time Server (NTP) or by syncing to your computer.s clock. Follow these steps to sync to an Internet Time Server Enable synchronization by checking the box.
  • Page 22: Language

    Language Admins can configure the Security Bandwidth Manager Select the Language version Step 1. Select the Language version (English Version/Traditional Chinese Version or Simplified Chinese Version). Step 2. Click 【OK】to set the Language version or click Cancel to discard changes. Figure1-15 Language Setting 17...
  • Page 23: Permitted Ip

    Permitted IPs Only the authorized IP address is permitted to manage the Security Bandwidth Manager. Figure1-16 Permitted IP Address 18...
  • Page 24 Add Permitted IP Address Step 1. Click New Entry button. Step 2. In IP Address field, enter the LAN IP address or WAN IP address. IP address:Enter the LAN IP address or WAN IP address. " " Netmask:Enter the netmask of LAN/WAN. "...
  • Page 25 Modify Permitted IP Address Step 1. In the table of Permitted IPs, highlight the IP you want to modify, and then click Modify. Step 2. In Modify Permitted IP, enter new IP address. Step 3. Click OK to modify or click Cancel to discard changes. Figure1-18 Modify Permitted IPs 20...
  • Page 26 Remove Permitted IP addresses Step 1. In the table of Permitted IPs, highlight the IP you want to remove, and then click Remove. Step 2. In Remove Permitted IP, enter new IP address. Step 3. In the confirm window, click OK to remove or click Cancel to discard changes. Figure1-19 Remove Permitted IPs 21...
  • Page 27: Multiple Nat

    Multiple NAT Multiple NAT allows local port to set multiple subnetworks and connect with the Internet through different WAN IP Addresses. For instance:The lease line of a company applies several real IP Addresses 168.85.88.0/24,and the company is divided into R&D department, service, sales department, procurement department, accounting department, the company can distinguish each department by different subnetworks for the purpose of convenient Manager.
  • Page 28: Multiple Nat

    Multiple NAT settings Step 1. Click Multiple NAT in the System menu to enter Multiple NAT window. Figure1-20 Multiple NAT Global port interface IP Address:Global port IP Address. Local port interface IP Address:Local port IP Address and subnet Mask. Modify: Modify the settings of Multiple NAT. Click Modify to modify the parameters of Multiple NAT or click Delete to delete settings.
  • Page 29 Add Multiple NAT Step 1. Click the Add button below to add Multiple NAT. Step 2. Enter the IP Address in the website name column of the new window. Global port interface IP Address: Select Global port IP Address. " "...
  • Page 30 Modify Multiple NAT Step 1. Find the IP Address you want to modify and click Modify Step 2. Enter the new IP Address in Modify Multiple NAT window. Step 3. Click the OK button below to change the setting or click Cancel to discard changes.
  • Page 31 Delete Multiple NAT Step 1. Find the IP Address you want to delete and click Delete. Step 2. A confirmation pop-up box will appear, click OK to delete the setting or click Cancel to discard changes. Figure1-23 Remove Multiple NAT 26...
  • Page 32 Hacker Alarm The Administrator can enable the device’s auto detect functions in this section. When abnormal conditions occur, the Security Bandwidth Manager will send an e-mail alert to notify the Administrator, and also display warning messages in the Event window of Alarm. Figure1-24 Hacker Alert Auto Detect functions "...
  • Page 33: Hack Alert

    " Detect ICMP Flood: Select this option to detect ICMP flood attacks. When hackers continuously send PING packets to all the machines of the LAN networks or to the Security Bandwidth Manager, your network is experiencing an ICMP flood attack. This can cause traffic congestion on the network and slows the network down.
  • Page 34 " Filter IP Source Route Option: Each IP packet can carry an optional field that specifies the replying address that can be different from the source address specified in packet’s header. Hackers can use this address field on disguised packets to invade LAN networks and send LAN networks’ data back to them.
  • Page 35: Route Table

    Route Table In this section, the Administrator can add static routes for the networks. Entering the Route Table screen Step 1. Click System on the left side menu bar, then click Route Table below it. The Route Table window appears, in which current route settings are shown. Figure1-25 Route Table Route Table functions "...
  • Page 36: Route Table

    Adding a new Static Route Step 1. In the Route Table window, click the New Entry button. Step 2. In the Add New Static Route window, enter new static route information. Step 3. In the Interface field’s pull-down menu, choose the network to connect (LAN, WAN).
  • Page 37 Modifying a Static Route: Step 1. In the Route Table menu, find the route to edit and click the corresponding Modify option in the Configure field. Step 2. In the Modify Static Route window, modify the necessary routing addresses. Step 3. Click OK to apply changes or click Cancel to cancel it.
  • Page 38 Removing a Static Route Step 1. In the Route Table window, find the route to remove and click the corresponding Remove option in the Configure field. Step 2. In the Remove confirmation pop-up box, click OK to confirm removing or click Cancel to cancel it.
  • Page 39: Dhcp

    DHCP In the section, the Administrator can configure DHCP (Dynamic Host Configuration Protocol) settings for the LAN (LAN) network. Entering the DHCP window Click System on the left hand side menu bar, then click DHCP below it. The DHCP window appears in which current DHCP settings are shown on the screen.
  • Page 40 Enabling DHCP Support Step 1. In the Dynamic IP Address window, click Enable DHCP Support. Domain Name: The Administrator may enter the name of the LAN network domain if preferred. DNS Server 1 : Enter the distributed IP address of DNS Server1. DNS Server 2 : Enter the distributed IP address of DNS Server2.
  • Page 41: Host Table

    Adding a new Host Table STEP 1﹒ Select Host Table in Settings function and enter the following setting: " Click on New Entry " Host Name: The domain name of the server Virtual IP Address: The virtual IP address that Host Table mapped to "...
  • Page 42: Dynamic Dns

    Dynamic DNS The Dynamic DNS (require Dynamic DNS Service) allows you to alias a dynamic IP address to a static hostname, allowing your device to be more easily accessed by specific name. When this function is enabled, the IP address in Dynamic DNS Server will be automatically updated with the new IP address provided by ISP.
  • Page 43 How to register:Firstly, Click Dynamic DNS in the System menu to enter Dynamic DNS window, then click Add button,on the right side of the service providers, click Register, the service providers’ website will appear, please refer to the website for the way of registration. Click to link to the website selected on the left.
  • Page 44 Add Dynamic DNS settings Step 1. Click Add button. Step 2. Click the information in the column of the new window. Service providers:Select service providers. Register:to the service providers’ website. WAN IP Address:IP Address of the WAN port. % automatically fill in the WAN IP:Check to automatically fill in the WAN IP.。 User Name:Enter the registered user name.
  • Page 45 Modify dynamic DNS Step 1. Find the item you want to change and click Modify. Step 2. Enter the new information in the Modify Dynamic DNS window. Click OK to change the settings or click Cancel to discard changes.。 Figure1-34 Modify Dynamic DNS 40...
  • Page 46 Delete Dynamic DNS Step 1. Find the item you want to change and click Delete. Step 2. A confirmation pop-up box will appear, click OK to delete the settings or click Cancel to discard changes. Figure1-35 Remove Dynamic DNS 41...
  • Page 47: Logout

    Logout Step 1. Select this option to the device’s Logout the Security Bandwidth Manager. This function protects your system while you are away. Step 2. Click Logout the Bandwidth Manager. Step 3. Click OK to logout or click Cancel to discard the change. Figure1-36 Logout 42...
  • Page 48: Software Update

    Software Update Under Software Update, the admin may update the device’s software with a newer software. You may acquire the current version number of software in Version Number. Administrators may visit distributor’s web site to download the latest version and save it in server’s hard disc. Step 1.
  • Page 49: Interface

    Interface In this section, the Administrator can set up the IP addresses for the office network. The Administrator may configure the IP addresses of the Internal (LAN) network, and the External (WAN) network. The netmask and gateway IP addresses are also configured in this section. In Interface section, the administrator can configure IP address, Netmask, and Gateway of the LAN network/ WAN network inside the office network, depending on the ISP selected.
  • Page 50 Entering the Interface menu: Step 1. Click on Configuration in the left menu bar. Step 2. Then click on Interface below it. The current settings of the interface addresses will appear on the screen. Internal Interface Using the Internal Interface, the Administrator sets up the Internal (LAN) network. The Internal network will use a private IP scheme.
  • Page 51 46...
  • Page 52 ADSL user Interface setting PPPoE(External Interface) Step 1. Select Interface function in the menu bar. Step 2. Check the item PPPoE (ADSL User) below WAN Interface. Step 3. Enter each parameter of WAN Interface. Figure2-2 PPPoE ADSL User Interface For PPPoE (ADSL User): This option is for PPPoE users who are required to enter a username and password in order to connect, such as ADSL users.
  • Page 53 Fixed: Select this if you were given a static IP address. Enter the IP address that is given to you by your ISP. Upload/Download Bandwidth:The bandwidth your ISP provided. (Maximum bandwidth for Upload/Download Bandwidth is 10Mbps) Service-On-Demand: Auto Disconnect: The PPPoE connection will automatically disconnect after a length of idle time (no activities).
  • Page 54 For Dynamic IP Address (Cable Modem User): This option is for users who are automatically assigned an IP address by their ISP, such as cable modem users. The following fields apply: IP Address: The dynamic IP address obtained by the Firewall from the ISP will be displayed here.
  • Page 55 After setting all of the parameters, click OK button. Figure2-3 Dynamic IP Address (Cable Modem User) 50...
  • Page 56 For Static IP Address: This option is for users who are assigned a static IP Address from their ISP. Your ISP will provide all the information needed for this section such as IP Address, Netmask, Gateway, and DNS. Use this option if you have more than one public IP Address assigned to you.
  • Page 57 If you want to set up DNS Server, you have to go to Virtual Server function to map the real IP address from DNS server to the corresponding private IP address of internal DNS server. Enter the mapped IP address of internal server in DNS server address field. 52...
  • Page 58 For PPTP (European User Only): This option is for PPTP users who are required to enter a username and password in order to connect, especially for European Users. Current Status: Displays the current line status of the PPTP connection. IP Address: Displays the IP Address of the PPTP connection Username: Enter the PPTP username provided by the ISP.
  • Page 59: Address

    Address allows the Administrator to set Interface addresses of the Security Bandwidth Manager LAN network, LAN network group, WAN network, WAN group. What is the Address Table? An IP address in the Address Table can be an address of a computer or a sub network. The Administrator can assign an easily recognized name to an IP address.
  • Page 60: Lan

    Entering the LAN window Step 1. Click LAN under the Address menu to enter the LAN window. The current setting information such as the name of the LAN network, IP and Netmask addresses will show on the screen. Figure3-1 LAN Definition Name: Name of LAN network address.
  • Page 61 Adding a new LAN Address Step 1. In the LAN window, click the New Entry button. Step 2. In the Add New Address window, enter the settings of a new LAN network address. Step 3. Click OK to add the specified LAN network or click Cancel to cancel the changes. Figure3-2 Add New IP Address in LAN If you want to enable Add in Static DHCP function, enter the MAC Address then check the Add in Static DHCP.
  • Page 62 Modifying an LAN Address Step 1. In the LAN window, locate the name of the network to be modified. Click the Modify option in its corresponding Configure field. The Modify Address window appears on the screen immediately. Step 2. In the Modify Address window, fill in the new addresses. Step 3.
  • Page 63 Removing a LAN Address Step 1. In the LAN window, locate the name of the network to be removed. Click the Remove option in its corresponding Configure field. Step 2. In the Remove confirmation pop-up box, click OK to remove the address or click Cancel to discard changes.
  • Page 64: Lan Group

    LAN Group Entering the LAN Group window The LAN Addresses may be combined together to become a group. Step 1. Click LAN Group under the Address menu to enter the LAN Group window. The current setting information for the LAN network group appears on the screen. Figure3-5 LAN Group Definitions (LAN group): Name: Name of the LAN group.
  • Page 65 Adding a LAN Group Step 1. In the LAN Group window, click the New Entry button to enter the Add New Address Group window. Step 2. In the Add New Address Group window: " Available Address: list the names of all the members of the LAN network. "...
  • Page 66 Modifying a LAN Group Step 1. In the LAN Group window, locate the network group desired to be modified and click its corresponding Modify option in the Configure field. Step 2. A window displaying the information of the selected group appears: "...
  • Page 67 Removing a LAN Group Step 1. In the LAN Group window, locate the group to be removed and click its corresponding Remove option in the Configure field. Step 2. In the Remove confirmation pop-up box, click OK to remove the group or click Cancel to discard changes.
  • Page 68: Wan

    Entering the WAN window Step 1. Click WAN under the Address menu to enter the WAN window. The current setting information, such as the name of the WAN network, IP and Netmask addresses will show on the screen. Figure3-9 WAN Definitions Name: Name of WAN network address.
  • Page 69 Adding a new WAN Address Step 1. In the WAN window, click the New Entry button. Step 2. In the Add New Address window, enter the settings for a new WAN network address. Step 3. Click OK to add the specified WAN network or click Cancel to discard changes. Figure3-10 Add WAN IP Address 64...
  • Page 70 Modifying an WAN Address Step 1. In the WAN table, locate the name of the network to be modified and click the Modify option in its corresponding Configure field. Step 2. The Modify Address window will appear on the screen immediately. In the Modify Address window, fill in new addresses.
  • Page 71 Removing an WAN Address Step 1. In the WAN table, locate the name of the network to be removed and click the Remove option in its corresponding Configure field. Step 2. In the Remove confirmation pop-up box, click OK to remove the address or click Cancel to discard changes.
  • Page 72: Wan Group

    WAN Group Entering the WAN Group window Step 1. Click the WAN Group under the Address menu bar to enter the WAN window. The current settings for the WAN network group(s) will appear on the screen. Figure3-13 WAN Group Definitions: Name: Name of the WAN group.
  • Page 73 Adding an WAN Group Step 1. In the WAN Group window, click the New Entry button and the Add New Address Group window will appear. Step 2. In the Add New Address Group window the following fields will appear: " Name: enter the name of the new group.
  • Page 74 Modifying a WAN Group Step 1. In the WAN Group window, locate the network group to be modified and click its corresponding Modify button in the Configure field. Step 2. A window displaying the information of the selected group appears: "...
  • Page 75 Removing a WAN Group Step 1. In the WAN Group window, locate the group to be removed and click its corresponding Modify option in the Configure field. Step 2. In the Remove confirmation pop-up box, click OK to remove the group or click Cancel to discard changes.
  • Page 76: Service

    Service In this section, network services are defined and new network services can be added. There are three sub menus under Service which are: Pre-defined, Custom, and Group. The Administrator can simply follow the instructions below to define the protocols and port numbers for network communication applications.
  • Page 77: Pre-Defined

    Pre-defined Entering a Pre-defined window Step 1. Click Pre-defined under it. A window will appear with a list of services and their associated IP addresses. This list cannot be modified. Figure4-1 Pre-defined Service Icons and Descriptions Figu Description TCP services, i.g. FTP、FINGER、HTTP、 、HTTPS 、IMAP、SMTP、 POP3、ANY、AOL、BGP、GOPHER、InterLocator、IRC、L2TP、...
  • Page 78: Custom

    Custom Entering the Custom window Step 1. Click Custom under it. A window will appear with a table showing all services currently defined by the Administrator. Figure4-2 Custom Service Definitions: Service name: The defined service name. Protocol: Network protocol used in the basic setting. Such as TCP、UDP or others. Client port: The range of Client port in defined service.
  • Page 79 Use” message will appear in the Configure column. In this case you are not allowed to modify or remove the settings. Go to the Policy or Group window to delete the setting, and then you can configure the settings. 74...
  • Page 80 Adding a new Service In the Custom window, click the New Entry button and a new service table appears. In the new service table: " New Service Name: This will be the name referencing the new service. " Protocol: Enter the network protocol type to be used, such as TCP, UDP, or Other (please enter the number for the protocol type).
  • Page 81 Modifying Custom Services Step 1. A table showing the current settings of the selected service appears on the screen Step 2. Enter the new values. Step 3. Click OK to accept editing; or click Cancel. Figure4-4 Modify Custom Service 76...
  • Page 82 Removing Custom Services Step 1. Click its corresponding Remove option in the Configure field. Step 2. In the Remove confirmation pop-up box, click OK to remove the selected service or click Cancel to cancel action. Figure4-5 Remove Custom Service 77...
  • Page 83: Group

    Group Accessing the Group window Step 1. Click Group under it. A window will appear with a table displaying current service group settings set by the Administrator. Figure4-6 Service Group Definitions: Group name: The Group name of the defined Service. Service: The Service item of the Group.
  • Page 84 Adding Service Groups Step 1. In the Group window, click the New Entry button. Step 2. In the Add Service Group window, the following fields will appear: " Available Services: list all the available services. " Selected Services: list services to be assigned to the new group. Step 3.
  • Page 85 Modifying Service Groups Step 1. In the Mod (modify) group window the following fields are displayed: " Available Services: lists all the available services. Selected Services: list services that have been assigned to the selected " group. Step 2. Add new services: Select services in the Available Services list, and then click the Add>>...
  • Page 86 Removing Service Groups In the Remove confirmation pop-up box, click OK to remove the selected service group or click Cancel to cancel removing. Figure4-9 Remove Group 81...
  • Page 87: Schedule

    Schedule The Security Bandwidth Manager allows the Administrator to configure a schedule for policies to take affect. By creating a schedule, the Administrator is allowing the Security Bandwidth Manager policies to be used at those designated times only. Any activities outside of the scheduled time slot will not follow the Security Bandwidth Manager policies therefore will likely not be permitted to pass through the Security Bandwidth Manager.
  • Page 88 Accessing the Schedule window Step 1. Click on Schedule on the menu bar and the schedule window will appear displaying the active schedules. Figure5-1 Schedule The following items are displayed in this window: Name: the name assigned to the schedule Comment: a short comment describing the schedule Configure: modify or remove 83...
  • Page 89 Adding a new Schedule Step 1. Click on the New Entry button and the Add New Schedule window will appear. " Schedule Name: Fill in a name for the new schedule. " Period 1: Configure the start and stop time for the days of the week that the schedule will be active.
  • Page 90 Modifying a Schedule Step 1. In the Schedule window, find the policy to be modified and click the corresponding Modify option in the Configure field. Make needed changes. Step 2. Click OK to save changes. Figure5-3 Modify Schedule 85...
  • Page 91 Removing a Schedule Step 1. In the Schedule window, find the policy to be removed and click the corresponding Remove option in the Configure field. Step 2. A confirmation pop-up box will appear, click on OK to remove the schedule. Figure5-4 Remove Schedule 86...
  • Page 92: Qos

    By configuring the QoS, you can control the outbound Upstream/downstream Bandwidth. The administrator can configure the bandwidth according to the WAN bandwidth. Downstream Bandwidth: To configure the Guaranteed Bandwidth and Maximum Bandwidth. Upstream Bandwidth: To configure the Guaranteed Bandwidth and Maximum Bandwidth. QoS Priority:To configure the priority of distributing Upstream/Downstream and unused bandwidth.
  • Page 93 Configuration of QoS Click QoS in the menu bar on the left hand side. Definitions: Name:The name of the QoS you want to configure. Downstream Bandwidth:To configure the Guarateed Bandwidth and Maximum Bandwidth. Upstream Bandwidth:To configure the Guarateed Bandwidth and Maximum Bandwidth. QoS Priority:To configure the priority of distrubuting Upstream/Downstream and unused bandwidth.
  • Page 94 Add New QoS Step 1. Click QoS in the menu bar on the left hand side. Step 2. Click the New Entry button to add new QoS. Definition Name:The name of the QoS you want to configure. Downstream Bandwidth:To configure the Guarateed Bandwidth and Maximum Bandwidth.
  • Page 95 Modify QoS Step 1. Click QoS in the menu bar on the left hand side. Click the Modify button to modify QoS. Definition: Name:The name of the QoS you want to configure. Downstream Bandwidth:To configure the Guarateed Bandwidth and Maximum Bandwidth.
  • Page 96 Delete QoS Step 1. In the QoS window, find the QoS you want to change, and click Delete in the Configure column. Step 2. In the Delete QoS window, click OK to delete the QoS or click Cancel to discard the change.
  • Page 97: Authentication

    Authentication By configuring the Authentication, you can control the user’s (Internal user or remote user who connect by VPN and IPSec) connection authority. The user has to pass the authentication to access to Internet. 92...
  • Page 98: Add New User

    Add New User STEP 1﹒Setting the user’s Address in LAN of Address function. 93...
  • Page 99 STEP 2﹒Enter the following setting in Authentication function: " Click New User " Auth-User Name: Enter guest " Password: Enter 1234 " Confirm Password: Enter 1234 Click OK " " Complete Authentication Setting " 94...
  • Page 100 STEP 3﹒Add a policy in Outgoing Policy and input the Address and Authentication of STEP1, 2 95...
  • Page 101 STEP 4﹒When user_1 is going to access to Internet through browser, the authentication UI will appear in Browser. After entering the correct user name and password, click OK to access to Internet. STEP 5﹒If the user does not need to access to Internet anymore and is going to logout, he/she can click LOGOUT Auth-User to logout the system.
  • Page 102: Policy

    Policy This section provides the Administrator with facilities to sent control policies for packets with different source IP addresses, source ports, destination IP addresses, and destination ports. Control policies decide whether packets from different network objects, network services, and applications are able to pass through the Security Bandwidth Manager. What is Policy? The device uses policies to filter packets.
  • Page 103: Outgoing

    Outgoing This section describes steps to create policies for packets and services from the LAN network to the WAN network. Entering the Outgoing window Step 1. Click Policy on the left hand side menu bar, Step 2. Click Outgoing under it. A window will appear with a table displaying currently defined Outgoing policies.
  • Page 104 Descriptions for Policy figures: Figure Name Description Permit the specified packets from LAN network to Permit WAN network. Block the specified packets from LAN network to Block WAN network. Traffic and event log function is enabled. Statistics Flow statistics function is enabled. The automatic execution function in Schedule table Schedule has been enabled.
  • Page 105 Adding a new Outgoing Policy Click on the New Entry button and the Add New Policy window will appear. Figure7-2 Add a new Outgoing Policy Source Address: Select the name of the LAN network from the drop down list. The drop down list contains the names of all LAN networks defined in the LAN section of the Address menu.
  • Page 106 Alarm Threshold: set a maximum flow rate (in Kbytes/Sec). An alarm will be sent if flow rates are higher than the specified value. QoS: To determine if the QoS function can work in this Policy function. Click OK to add a new outgoing policy; or click Cancel to cancel adding a new outgoing policy.
  • Page 107 Modifying an Outgoing policy Step 1. In the Modify Policy window, fill in new settings. Note: To change or add selections in the drop-down list for source or destination address, go to the section where the selections are setup. (Source Address→LAN of Address menu; Destination Address →...
  • Page 108 Schedule: Select the item listed in the schedule to enable the policy to automatically execute the function in a certain time and range. Alarm Threshold: To set the maximum value of transmitting and receiving packet, enter the number based on the unit(KBytes/Sec) QoS: To determine if the QoS function can work in this Policy function.
  • Page 109 Removing the Outgoing Policy Step 1. In the Remove confirmation dialogue box, click OK to remove the policy or click Cancel to cancel removing. Figure7-4 Remove a Outgoing Policy 104...
  • Page 110: Incoming

    Incoming This chapter describes steps to create policies for packets and services from the WAN network to the LAN network including Mapped IP and Virtual Server. Enter Incoming window Step 1. Click Incoming under the Policy menu to enter the Incoming window. The Incoming table will display current defined policies from the WAN network to assigned Mapped IP or Virtual Server.
  • Page 111 fourth column is the Alarm Threshold function. The fifth column is the QoS function. If the figures appear in the column, it means that the function is enabled. On the other hand, if there is no figures appeared in the column, it means that the function is not enabled. The fields of the Incoming window are "...
  • Page 112 Remarks: To view the traffic and event log of the system, click Log function in the menu bar on the left hand side. To view the alarm records of the system, click Alarm function in the menu bar on the left hand side. of the system, click Statistics function in the menu bar on To view the statistics the left hand side.
  • Page 113 Adding an Incoming Policy Under Incoming of the Policy menu, click the New Entry button. Figure7-6 Add a Incoming Policy Source Address:Select the name of WAN from the pull-down menu. The names of WAN listed in this pull-down menu are:the Source Addresses that are already set.
  • Page 114 the function in a certain time and range. Alarm Threshold:To set the maximum value of transmitting and receiving packet, enter the number based on the unit(KBytes/Sec) QoS:To determine if the QoS function can work in this Policy function. Click OK to execute the new setting or click Cancel to discard changes. To change the Policy order of Incoming, select the number from the pull-down menu on the right hand side Move column 109...
  • Page 115 Modifying Incoming Policy Step 1. In the Modify Policy window, fill in new settings. Step 2. Click OK to save modifications or click Cancel to cancel modifications. Figure7-7 Modify an Incoming Policy Source Address:Select the name of WAN from the pull-down menu. The names of WAN listed in this pull-down menu are:the Source Addresses that are already set.
  • Page 116 QoS:To determine if the QoS function can work in this Policy function. Click OK to execute the new setting or click Cancel to discard changes. if you want to change or add new items into the pull-down menu, go to the original configuration unit.
  • Page 117 Removing an Incoming Policy Step 1. In the Remove confirmation window, click Ok to remove the policy or click Cancel to cancel removing. Figure7-8 Remove an Incoming Policy 112...
  • Page 118: Content Filtering

    Content filtering Content Filtering includes “URL Blocking” and “General Blocking” URL Blocking:The administrator can use a complete domain name, key word, “~” or “*” to make rules for specific websites. General Blocking:To let Popup、ActiveX、Java、Cookie in or keep them out. Apply Policy Administrator can use a complete domain name, key word, wild card(...
  • Page 119: Url Blocking

    URL Blocking The Administrator may setup URL Blocking to prevent LAN network users from accessing a specific website on the Internet. Any web request coming from an LAN network computer to a blocked website will receive a blocked message instead of the website. Entering the URL blocking window Step 1.
  • Page 120 How to use URL Blocking: Description of signs: 〝~〞means to permit to enter; 〝*〞means wild card。 To block certain websites : Enter the complete domain name or key words of the website you want to block in the Block String column. For example, www.yahoo.com or yahoo。...
  • Page 121 Adding a URL Blocking policy Step 1. After clicking New Entry, the Add New Block String window will appear. Step 2. Enter the URL of the website to be blocked. Step 3. Click OK to add the policy. Click Cancel to discard changes. Figure8-2 Add a New URL Blocking 116...
  • Page 122 Modifying a URL Blocking Policy Step 1. In the URL Blocking window, find the policy to be modified and click the corresponding Modify option in the Configure field. Step 2. Make the necessary changes needed. Step 3. Click on OK to save changes or click on Cancel to discard changes. Figure8-3 Modify the URL Blocking 117...
  • Page 123 Removing a URL Blocking policy Step 1. In the URL Blocking window, find the policy to be removed and click the corresponding Remove option in the Configure field. Step 2. A confirmation pop-up box will appear, click on OK to remove the policy or click on Cancel to discard changes.
  • Page 124: General Blocking

    General Blocking To let Popups, ActiveX, Java, or Cookies in or keep them out. Step 1: Click Content Filtering in the menu. Step 2: General Blocking detective functions. Popup filtering: Prevent pop-up boxes from appearing. ActiveX filtering: Prevent ActiveX packets. Java filtering: Prevent Java packets.
  • Page 125: Virtual Server

    Virtual Server The Security Bandwidth Manager separates an enterprise’s Intranet and Internet into LAN networks and WAN networks respectively. Generally speaking, in order to allocate enough IP addresses for all computers, an enterprise assigns each computer a private IP address, and converts it into a real IP address through Security Bandwidth Manager’s NAT (Network Address Translation) function.
  • Page 126 " Virtual Server can map one real IP to several LAN physical servers while Mapped IP can only map one real IP to one LAN physical server (1-to-1 Mapping). The Virtual Servers’ load balance feature can map a specific service request to different physical servers running the same services. "...
  • Page 127: Mapped Ip

    Mapped IP Internal private IP addresses are translated through NAT (Network Address Translation). If a server is located in the LAN network, it has a private IP address, and outside users cannot connect directly to LAN servers’ private IP address. To connect to a LAN network server, outside users have to first connect to a real IP address of the WAN network, and the real IP is translated to a private IP of the LAN network.
  • Page 128 Adding a new IP Mapping Step 1. In the Mapped IP window, click the New Entry button. The Add New Mapped IP window will appear. " WAN IP: select the WAN public IP address to be mapped. " Internal IP: enter the LAN private IP address will be mapped 1-to-1 to the WAN IP address.
  • Page 129 Modifying a Mapped IP Step 1. In the Mapped IP table, locate the Mapped IP you want it to be modified and click its corresponding Modify option in the Configure field. Step 2. Enter settings in the Modify Mapped IP window. Step 3.
  • Page 130 Removing a Mapped IP Step 1. In the Mapped IP table, locate the Mapped IP desired to be removed and click its corresponding Remove option in the Configure field. Step 2. In the Remove confirmation pop-up window, click OK to remove the Mapped IP or click Cancel to cancel.
  • Page 131: Virtual Server

    Virtual Server Virtual server is a one-to-many mapping technique, which maps a real IP address from the WAN interface to private IP addresses of the LAN network. This function provides services or applications defined in the Service menu to enter into the LAN network. Unlike a mapped IP which binds an WANIP to an LAN IP, virtual server binds WAN IP ports to LAN IP ports.
  • Page 132 Adding a Virtual Server Step 1. Click an available virtual server from Virtual Server in the Virtual Server menu bar to enter the virtual server configuration window. In the following, Virtual Server is assumed to be the chosen option: Step 2. Click the click here to configure button and the Add new Virtual Server IP window appears and asks for an IP address from the WAN network.
  • Page 133 Modifying a Virtual Server IP Address Step 1. Click the virtual server to be modified Virtual Server under the Virtual Server menu bar. A new window appears displaying the IP address and service of the specified virtual server. Step 2. Click on the Virtual Server’s IP Address button at the top of the screen.
  • Page 134 Removing a Virtual Server Step 1. Click the virtual server to be removed in the corresponding Virtual Server option under the Virtual Server menu bar. A new window displaying the virtual server’s IP address and service appears on the screen. Step 2.
  • Page 135 Setting the Virtual Server’s services Step 1. For the Virtual Server which has already been set up with an IP address, click the New Service button in the table. Step 2. In the Virtual Server Configurations window: " Server Virtual IP: displays the WAN IP address assigned to the Virtual Server "...
  • Page 136 Adding New Virtual Server Service Configuration Step 1. Select Virtual Server in the menu bar on the left hand side, and then select Virtual Server 1/2/3/4 sub-selections. Step 2. In Virtual Server 1/2/3/4 Window, click “Click here to configure” button. Step 3.
  • Page 137 Modifying the Virtual Server configurations Step 1. In the Virtual Server window’s service table, locate the name of the service desired to be modified and click its corresponding Modify option in the Configure field. Step 2. In the Virtual Server Configuration window, enter the new settings. Step 3.
  • Page 138 Removing the Virtual Server service Step 1. In the Virtual Server window’s service table, locate the name of the service desired to be removed and click its corresponding Remove option in the Configure field. Step 2. In the Remove confirmation pop-up box, click OK to remove the service or click Cancel to cancel removing.
  • Page 139: Log

    The Security Bandwidth Manager supports traffic logging and event logging to monitor and record services, connection times, and the source and destination network address. The Administrator may also download the log files for backup purposes. The Administrator mainly uses the Log menu to monitor the traffic passing through the Security Bandwidth Manager. What is Log? Log records all connections that pass through the Security Bandwidth Manager’s control policies.
  • Page 140: Traffic Log

    Traffic Log The Administrator queries the Security Bandwidth Manager for information, such as source address, destination address, start time, and Protocol port, of all connections. Entering the Traffic Log window Step 1. Click the Traffic Log option under Log menu to enter the Traffic Log window. Figure10-1 Traffic Log Traffic Log Table The table in the Traffic Log window displays current System statuses:...
  • Page 141 Downloading the Traffic Logs The Administrator can backup the traffic logs regularly by downloading it to the computer. Step 1. In the Traffic Log window, click the Download Logs button at the bottom of the screen. Step 2. Follow the File Download pop-up window to save the traffic logs into a specified directory on the hard drive.
  • Page 142 Clearing the Traffic Logs The Administrator may clear on-line logs to keep just the most updated logs on the screen. Step 1. In the Traffic Log window, click the Clear Logs button at the bottom of the screen. Step 2. In the Clear Logs pop-up box, click Ok to clear the logs or click Cancel to cancel Figure10-3 Clear Traffic Logs 137...
  • Page 143: Event Log

    Event Log When the Security Bandwidth Manager WAN detects events, the Administrator can get the details, such as time and description of the events from the Event Logs. Entering the Event Log window Step 1. Click the Event Log option under the Log menu and the Event Log window will appear.
  • Page 144 Downloading the Event Logs Step 1. In the Event Log window, click the Download Logs button at the bottom of the screen. Step 2. Follow the File Download pop-up window to save the event logs into a specific directory on the hard drive. Figure10-5 Download the Event Logs 139...
  • Page 145 Clearing the Event Logs The Administrator may clear on-line event logs to keep just the most updated logs on the screen. Step 1. In the Event Log window, click the Clear Logs button at the bottom of the screen. Step 2. In the Clear Logs pop-up box, click OK to clear the logs or click Cancel to cancel Figure10-6 Clear the Event Logs 140...
  • Page 146: Connection Log

    Connection Log Click Log in the menu bar on the left hand side, and then select the sub-selection Connection Log. Figure10-7 Connection Log Definition: Time:The start and end time of connection. Connection Log:Event description during connection. 141...
  • Page 147 Download Logs Step 1. Click Log in the menu bar on the left hand side and then select the sub-selection Connection Log. Step 2. In Connection Log window, click the Download Logs button. Step 3. In the Download Logs window, save the logs to the specified location. Figure10-8 Connection Log 142...
  • Page 148 Clear Logs Step 1. Click Log in the menu bar on the left hand side, and then select the sub-selection Connection Logs. Step 2. In Connection Log window, click the Clear Logs button. Step 3. In Clear Logs window, click OK to clear the logs or click Cancel to discard changes.
  • Page 149: Log Backup

    Log Backup Step 1. Click Log $Log Backup. Figure10-10 Log Backup Log Mail Configuration:When the Log Mail files accumulated up to 300Kbytes, router will notify administrator by email with the traffic log and event log.。 Note: Before enabling this function, you have to enable E-mail Alarm in Administrator. Syslog Settings:If you enable this function, system will transmit the Traffic Log and the Event Log simultaneously to the server which supports Syslog function.
  • Page 150 Enable Log Mail Support & Syslog Message Log Mail Configuration /Enable Log Mail Support Step 1. Firstly, go to Admin –Select Enable E-mail Alert Notification under E-Mail Settings. Enter the e-mail address to receive the alarm notification. Click OK. Step 2. Go to LOG $Log Backup.
  • Page 151 Disable Log Mail Support & Syslog Message Step 1. Go to LOG $Log Backup. Uncheck to disable Log Mail Support. Click OK. Step 2. Go to LOG $Log Backup. Uncheck to disable Settings Message. Click OK. Figure10-12 Disable Log Backup 146...
  • Page 152: Alarm

    Alarm In this chapter, the Administrator can view traffic alarms and event alarms that occur and the Security Bandwidth Manager has logged. Security Bandwidth Manager has two alarms: Traffic Alarm and Event Alarm. Traffic alarm: In control policies, the Administrator set the threshold value for traffic alarm. The System regularly checks whether the traffic for a policy exceeds its threshold value and adds a record to the traffic alarm file if it does.
  • Page 153: Traffic Alarm

    Traffic Alarm In control policies, the Administrator set the threshold value for traffic alarm. The System regularly checks whether the traffic for a policy exceeds its threshold value and adds a record to the traffic alarm file if it does. Entering the Traffic Alarm window Step 1.
  • Page 154 Downloading the Traffic Alarm Logs The Administrator can back up traffic alarm logs regularly and download it to a file on the computer. Step 1. In the Traffic Alarm window, click the Download Logs button on the bottom of the screen.
  • Page 155 Clearing the Traffic Alarm Logs Step 1. In the Traffic Alarm window, click the Clear Logs button at the bottom of the screen. Step 2. In the Clear Logs pop-up box, click Ok to clear the logs or click Cancel to cancel. Figure11-3 Clear Traffic Alarm 150...
  • Page 156: Event Alarm

    Event Alarm When Security Bandwidth Manager detects attacks from hackers, it writes attacking data in the event alarm file and sends an e-mail alert to the Administrator to take emergency steps. Entering the Event Alarm window Step 1. Click the Event Alarm option below the Alarm menu to enter the Event Alarm window.
  • Page 157 Downloading the Event Alarm Logs The Administrator can back up event alarm logs regularly by downloading it to a file on the computer. Step 1. In the Event Alarm window, click the Download Logs button at the bottom of the screen.
  • Page 158 Clearing Event Alarm Logs The Administrator may clear on-line logs to keep the most updated logs on the screen. Step 1. In the Event Alarm window, click the Clear Logs button at the bottom of the screen. Step 2. In the Clear Logs pop-up box, click OK. Figure11-6 Clear the Event Alarm 153...
  • Page 159: Accounting Report

    Accounting Report Accounting Report can be divided into two parts, one is Outbound Accounting Report, and the other is Inbound Accounting Report. Outbound Accounting Report It is the statistics of the downstream and upstream of the LAN, WAN and all kinds of communication services.
  • Page 160 Inbound Accounting Report It is the statistics of downstream/upstream for all kinds of communication services; the Inbound Accounting report will be shown when WAN user uses Security Bandwidth Manager to connect to LAN Service Server. Source IP:the IP address used by WAN users who use Security Bandwidth Manager Destination IP:the IP address used by LAN service server who use Security Bandwidth Manager Service:The communication service which listed in the pull-down menu when WAN...
  • Page 161: Outbound

    Outbound Accounting Report Step 1. Click the Accounting Report function, and then select Outbound. 156...
  • Page 162 Outbound source IP Accounting Report Source IP:When LAN users use Security Bandwidth Manager to connect to WAN service server, all of the Downstream/Upstream/First Packet/Last Packet/Duration log of the source IP will be recorded. Definitions: TOP:Select the data you want to view, it presents 10 results in one page. Pull-down menu selection Source IP:The IP address used by LAN users who use Security Bandwidth Manager to connect to WAN service server.
  • Page 163 Outbound Destination IP Accounting Report Destination IP:When WAN service server uses Security Bandwidth Manager to connect to LAN user, all of the Downstream/Upstream/First Packet/Last Packet/Duration log of the Destination IP will be recorded. Definition: TOP:Select the data you want to view, it presents 10 results in one page. Pull-down menu selection Destination IP:The IP address used by WAN service server which uses Security Bandwidth Manager.
  • Page 164 159...
  • Page 165 Outbound Service Accounting Report Service: When LAN users use Security Bandwidth Manager to connect to WAN Service Server, all of the Downstream/Upstream/First Packet/Last Packet/Duration log of the Communication Service will be recorded. Definitions: TOP:Select the data you want to view. It presents 10 results in one page. :According to the downstream/upstream report of the selected TOP numbering to draw the Protocol Distribution chart.
  • Page 166 Press to return to Accounting Report window. 161...
  • Page 167: Inbound

    Inbound Step 1. Click Service in the menu bar on the left hand side of the window. Click Group under it. 162...
  • Page 168 Inbound Source IP Accounting Report Source IP:When WAN users use Security Bandwidth Manager to connect to LAN service server, all of the Downstream/Upstream/First Packet/Last Packet/Duration log of the source IP will be recorded. Definitions: TOP:Select the data you want to view. It presents 10 pages in one page. Select from the Pull-down menu Source IP:The IP address used by WAN users who use Security Bandwidth Manager.
  • Page 169 Inbound Destination IP Accounting Report Destination IP:When WAN users use Security Bandwidth Manager to connect to LAN service server, all of the Downstream/Upstream/First Packet/Last Packet/Duration log of the Destination IP will be recorded. Definitions: TOP:Select the data you want to view. It presents 10 pages in one page. Pull-down menu selection Destination IP:The IP address used by WAN users who uses Security Bandwidth Manager.
  • Page 170 165...
  • Page 171 Inbound Service Accounting Report Service: When WAN users use Security Bandwidth Manager to connect to LAN Service Server, Downstream/Upstream/First Packet/Last Packet/Duration log of the Communication Service will be recorded. Definitions: TOP:Select the data you want to view. It presents 10 results in one page. :According to the downstream/upstream report of the selected TOP numbering to draw the Protocol Distribution chart.
  • Page 172 Press and return to Accounting Report window. 167...
  • Page 173: Statistics

    Statistics In this chapter, the Administrator queries the Security Bandwidth Manager for statistics of packets and data which passes across the Security Bandwidth Manager. The statistics provides the Administrator with information about network traffics and network loads. What is Statistics Statistics are the statistics of packets that pass through the Security Bandwidth Manager by control policies setup by the Administrator.
  • Page 174 WAN Statistics Step 1. Click Statistics in the menu bar on the left hand side, and then select WAN Statistics. Step 2. The WAN Statistics will be displayed. Figure13-1 WAN Statistics Time:The statistics based on the units of minute, hour and day. WAN Downstream Figure WAN Upstream Figure WAN Downstream Packet Figure...
  • Page 175: Wan Statistics

    WAN Statistics Step 1. Click Statistics in the menu bar on the left hand side, and then select WAN Statistics. Step 2. In Statistics window, find the domain name you want to view. Step 3. In the Statistics window, find the network you want to view and click Minute on the right hand side, and then you will be able to view the Statistics figure every minute;...
  • Page 176: Policy Statistics

    Policy Statistics Entering the Statistics window Step 1. The Statistics window displays the statistics of current network connections. " Source: the name of source address. " Destination: the name of destination address. " Service: the service requested. " Action: permit or deny "...
  • Page 177 Entering the Policy Satistics Step 1. Click Statistics in the menu bar on the left hand side, and then select WAN Statistics. Step 2. In Statistics window, find the domain name you want to view Step 3. In the Statistics window, find the network you want to view and click Minute on the right hand side, and then you will be able to view the Statistics figure every minute;...
  • Page 178: Status

    Status In this section, the device displays the status information about the Security Bandwidth Manager. Status will display the network information from the Configuration menu. The Administrator may also use Status to check the DHCP lease time and MAC addresses for computers connected to the Security Bandwidth Manager.
  • Page 179: Interface Status

    Interface Status Entering the Interface Status window Figure14-1 Interface Status 174...
  • Page 180 Internal Interface In Internet Interface window: The interface IP will be displayed. System Uptime:The time of booting the Security Bandwidth Manager. Forwarding Mode:NAT mode or Transparent mode. MAC Address:The serial number of the network card. IP Address/Netmask: Internal IP Address/Internal Netmask Rx Pkts, Error Pkts:The received packets and the error received packets will be shown.
  • Page 181: Arp Table

    ARP Table Entering the ARP Table window Step 1. Click on Status in the menu bar, then click ARP Table below it. Step 2. A window will appear displaying a table with IP addresses and their corresponding MAC addresses. For each computer on the LAN, WAN network that replies to an ARP packet, the device will list them in this ARP table.
  • Page 182: Dhcp Clients

    DHCP Clients Entering the DHCP Clients window Step 1. Click on Status in the menu bar, then click on DHCP Clients below it. Step 2. A window will appear displaying the table of DHCP clients that are connected to the device. The table will list host computers on the LAN network that obtain its IP address from the Bandwidth Manager’s DHCP server function.
  • Page 183: Setup Examples

    Setup Examples Example 1: Allow the LAN network to be able to access the Internet Example 2: The LAN network can only access Yahoo.com website Example 3: Outside users can access the LAN FTP server through Virtual Servers Example 4: I Install a server inside the LAN network and have the Internet (WAN) users access the server through IP Mapping Example 5:...
  • Page 184 Example 2: The LAN network can only access Yahoo.com website. Step 1. Enter the WAN window under the Address menu. Step 2. Click the New Entry button. Step 3. In the Add New Address window, enter relating parameters. Step 4. Click OK to end the address table setup. Step 5.
  • Page 186 Example 3:Outside users can access the LAN FTP server through Virtual Servers Step 1. Enter Virtual Server under the Virtual Server menu. Step 2. Click the ‘click here to configure’ button. Step 3. Select an WANIP address, then click OK. Step 4.
  • Page 187 Step 8. Go to the Incoming window under the Policy menu, then click on the New Entry button. Step 9.In the Add New Policy window, set each parameter, then click OK. Step 10. An Incoming FTP policy should now be created.
  • Page 188 Example 4: Install a server inside the LAN network and have the Internet (WAN) users access the server through IP Mapping Step 1. Enter the Mapped IP window under the Virtual Server menu. Step 2. Click the New Entry button. Step 3.
  • Page 189 Step 6. In the Add New Policy window, set each parameter, then click OK. Step 7. Open all the services. (ANY) Step 8. The setup is completed.
  • Page 190 Example 5: Use QoS to setup LAN to WAN network to attain the maximum downstream/upstream bandwidth. The setup orders should be QoS and then Policy Step 1. Enter the QoS window in the menu bar on the left hand side of the window. Step 2.
  • Page 191 Step 7. Click the New Entry button. Step 8. In Add New Policy window, set each parameter, then click OK.
  • Page 192 Step 9. Open all the services (ANY). The setup is completed.
  • Page 193 Install a server inside the LAN network, open to all the IP addresses including LAN and WAN IPs to use QoS to attain the maximum downstream and upstream bandwidth. The setup orders should be QoS, Virtual Server and then Policy. Step 1.
  • Page 194 Step 8. In Virtual Server 1 window, enter the Virtual Server Real IP, and then click OK.
  • Page 195 Step 9. After adding new server IP, click the New Service button. Step 10. In the Virtual Server Configuration window, set each parameter, then click...
  • Page 196 Step 11. When the following screen appears, the virtual server setup is complete. Step 12. Enter the Incoming window under the Policy menu. Step 13. Click the New Entry button.
  • Page 197 Step 14. In the Add New Policy window, set each parameter, then click OK.

Table of Contents