Billion BiPAC 6404VGP R3 User Manual

Voip/802.11g broadband firewall router
Hide thumbs Also See for BiPAC 6404VGP R3:

Advertisement

Quick Links

N
BiPAC 6404VGP R3
VoIP/802.11g Broadband
Firewall Router

User Manual

6.24b.dm2
Version release:
Last Revised: July 04, 2012

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BiPAC 6404VGP R3 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Billion BiPAC 6404VGP R3

  • Page 1: User Manual

    BiPAC 6404VGP R3 VoIP/802.11g Broadband Firewall Router User Manual 6.24b.dm2 Version release: Last Revised: July 04, 2012...
  • Page 2: Table Of Contents

    Table of Contents Chapter 1: Introduction........................1 Introduction to your Router ......................1 Features ..........................1 Chapter 2: Installing the Router ..................... 4 Important note for using this router....................4 Package Contents ........................4 Device Description........................5 Cabling ............................7 Chapter 3: Basic Installation ......................
  • Page 3: Chapter 1: Introduction

    Chapter 1: Introduction Introduction to your Router Welcome to the VoIP/802.11g Broadband Firewall Router. The router is an “all-in-one” VoIP Broadband router, combining a Broadband router, Ethernet network switch and 2 ports for Voice over IP functionalities, providing everything you need to get the machines on your network connected to the Internet over your DSL/Cable broadband connection.
  • Page 4 Network Address Translation (NAT) Allows multi-users to access outside resources such as the Internet simultaneously with one IP address/one Internet access account. Many application layer gateway (ALG) are supported such as web browser, ICQ, FTP, Telnet, E-mail, News, Net2phone, Ping, NetMeeting, IP phone and others.
  • Page 5 Web based GUI It supports web based GUI for configuration and management. It is user-friendly and comes with on-line help. It also supports remote management capability for remote users to configure and manage this product. Firmware Upgradeable Device can be upgraded to the latest firmware through the WEB based GUI. Rich Management Interfaces It supports flexible management interfaces with local console port, LAN port, and WAN port.
  • Page 6: Chapter 2: Installing The Router

    Chapter 2: Installing the Router Important note for using this router Package Contents VoIP/802.11g Broadband Firewall Router CD-ROM containing the online manual Ethernet (CAT-5) Cable RJ-45 to RS-232 Console kit Power adapter A detachable antenna Quick Start Guide...
  • Page 7: Device Description

    Device Description The Front LEDs Meaning Both red and green LEDs lit together when power is ON. Lit red means system failure. Power Restart the device or contact support. Lit green when the device is ready. Lit when one of LAN ports is connected to an Ethernet device. Lit green when the speed of transmission hits 100Mbps;...
  • Page 8 The Rear Ports Port Meaning Antenna Connect the detachable antenna to this port. Line Connect this port to the telephone jack on the wall with RJ-11cable. Phone 1X-2X Connect this port to an analog phone set with RJ-11 cable. WAN 10/100M Ethernet port (with auto crossover support); connect xDSL / Cable modem here.
  • Page 9: Cabling

    Cabling The most common problem associated with Ethernet is bad cabling. Make sure that all connected devices are turned on. On the top of the product is a bank of LEDs, as a first check, verifies that the relevant LAN Link and WAN Link LEDs are lit. If they are not, verify that you are using the proper cables.
  • Page 10: Chapter 3: Basic Installation

    Chapter 3: Basic Installation The router can be configured through your web browser. A web browser is included as a standard application in the following operating systems: Linux, Mac OS, Windows 7/98/NT/2000/XP/Me/Vista, etc. The product provides an easy and user-friendly interface for configuration. Please check your PC network components.
  • Page 11: Connecting Your Router

    Connecting Your Router 1. (a) ATA Mode: Connect the ATA to a WAN (Connect to modem/router). (b) Broadband Router Mode: Connect the Router to a LAN (Local Area Network) and WAN (Connect to Cable or modem). 2. Power on the device. 3.
  • Page 12: Network Configuration

    Network Configuration Configuring PC in Windows 7 1. Go to Start. Click on Control Panel. 2. Then click on Network and Internet. 3. When the Network and Sharing Center window pops up, select and click on Change adapter settings on the left window panel.
  • Page 13 5. Select Internet Protocol Version 4 (TCP/IPv4) then click Properties. 6. In the TCP/IPv4 properties window, select the Obtain an IP address automatically and Obtain DNS Server address automatically radio buttons. Then click OK to exit the setting. 7. Click OK again in the Local Area Connection Properties window to apply the new configuration.
  • Page 14: Configuring Pc In Windows Vista

    Configuring PC in Windows Vista Go to Start. Click on Network. Then click on Network and Sharing Center at the top bar. When the Network and Sharing Center window pops up, select and click Manage network connections on the left window column.
  • Page 15 5. Select Internet Protocol Version4 (TCP/IPv4) then click Properties. 6. In the TCP/IPv4 properties window, select the Obtain an IP address automatically and Obtain DNS Server address automatically radio buttons. Then click OK to exit the setting. 7. Click OK again in the Local Area Connection Properties window to apply the new configuration.
  • Page 16: Configuring Pc In Windows Xp

    Configuring PC in Windows XP Go to Start > Control Panel (in Classic View). In the Control Panel, double-click on Network Connections Double-click Local Area Connection. 3. In the Local Area Connection Status window, click Properties. Select Internet Protocol (TCP/IP) and click Properties.
  • Page 17: Configuring Pc In Windows 2000

    Configuring PC in Windows 2000 1. Go to Start > Settings > Control Panel. In the Control Panel, double-click on Network and Dial-up Connections. 2. Double-click Local Area Connection. 3. In the Local Area Connection Status window click Properties. Select Internet Protocol (TCP/IP) and click Properties.
  • Page 18: Configuring Pc In Windows 95/98/Me

    Configuring PC in Windows 95/98/Me 1. Go to Start > Settings > Control Panel. In the Control Panel, double-click on Network and choose the Configuration tab. 2. Select TCP/IP > NE2000 Compatible, or the name of your Network Interface Card (NIC) in your PC. 3.
  • Page 19 Configuring PC in Windows NT4.0 Go to Start > Settings > Control Panel. In the Control Panel, double-click on Network and choose the Protocols tab. 2. Select TCP/IP Protocol and click Properties. 3. Select the Obtain an IP address from a DHCP server radio button and click...
  • Page 20: Factory Default Settings

    Factory Default Settings Before configuring your router, you need to know the following default settings. Web Interface (Username and Password) Username: admin Password: admin The default username and password are “admin” and “admin” respectively. Device LAN IP settings IP Address: 192.168.1.254 Subnet Mask: 255.255.255.0 ISP setting in WAN site PPPoE...
  • Page 21: Information From Your Isp

    Information from your ISP Before configuring this device, you have to check with your ISP (Internet Service Provider) to find out what kind of service is provided such as DHCP (Obtain an IP Address Automatically, Static IP (Fixed IP Address) or PPPoE. Gather the information as illustrated in the following table and keep it for reference.
  • Page 22: Configuring With Your Web Browser

    Configuring with your Web Browser Open your web browser, enter the IP address of your router, which by default is 192.168.1.254, and click “Go”, a user name and password window prompt will appear. The default username and password are “admin” and “admin” respectively. (See Figure 3.14) Figure 3.14: User name &...
  • Page 23: Chapter 4: Configuration

    Chapter 4: Configuration At the configuration homepage, the left navigation column provides you the link to each configuration page. The category of each configuration page is listed as below. Status EWAN Status ARP Table DHCP Table Routing Table NAT Sessions UPnP Portmap VoIP Status VoIP Call Log...
  • Page 24: Status

    Status EWAN Status The router offers a WAN port to be used to connect to Cable Modems and fiber optic lines. This alternative, yet faster method to connect to the internet will provide users more flexibility to get online. Total TX Bytes / Packets: The statistics of total data transmission in bytes / packets since system ready.
  • Page 25: Arp Table

    ARP Table This section displays the router ARP (Address Resolution Protocol) Table which shows the mapping of Internet (IP) addresses to Ethernet (MAC) addresses. This is a quick way of determining the MAC address of the network interface of your PCs that use the Firewall – MAC Address Filter function. See the Firewall section of this manual for more information on this feature.
  • Page 26: Dhcp Table

    DHCP Table Leased: Shows the information of the DHCP assigned IP addresses. Expired: Shows the information of all expired IP addresses. Permanent: Shows the fixed host mapping information. Leased Table IP Address: Shows the IP address that is assigned to each client. MAC Address: Shows the MAC address of each client.
  • Page 27: Routing Table

    Routing Table Routing Table Valid: A check mark indicates a successful routing status. Destination: Shows the IP address of the destination network. Netmask: Shows the destination Netmask address. Gateway/Interface: Shows the IP address of the gateway or the existing interface that this route will use.
  • Page 28: Nat Sessions

    NAT Sessions This section lists all the current NAT sessions between external (WAN) and internal (LAN) interface. UPnP Portmap This section lists all the established port-mapping using UPnP (Universal Plug and Play). See the Advanced section of this manual for more details on UPnP and the router UPnP configuration options.
  • Page 29: Voip Status

    VoIP Status This table shows the status of the phone ports when VoIP feature has been activated. It displays information such as domain name, display name & phone number of the VoIP device. VoIP Call Log The call log records the data from your VoIP devices such as the date / time of dial out calls, the duration of the calls, information about the missed calls and also incoming calls.
  • Page 30: Event Log

    Event Log This page displays all the event Log entries of the router such as when gets disconnected and during Firewall triggered events like Intrusion or Blocking Logging. Please see the Firewall section of this manual for more details on how to enable Firewall logging. Click Refresh button to get the latest event log information.
  • Page 31: Error Log

    Error Log Any errors encountered by the router (e.g. invalid names given to entries) are logged to this window. IDS Log Any records about hacker attacks and intrusion attempts from the Internet are logged to this window. Diagnostic It tests the connection to computer(s) which is connected to the LAN ports and also the WAN Internet connection.
  • Page 32: Quick Start

    Quick Start 1. Click Quick Start. Select the connect mode you want. There is only one option: EWAN . Obtain an IP Address Automatically When connecting to the ISP, the router also functions as a DHCP client. This router can automatically obtain an IP address, subnet mask, gateway address, and DNS server addresses if the ISP assigns this information via DHCP.
  • Page 33 IP Address: Your WAN IP address. Leave this at 0.0.0.0 to automatically obtain an IP address from your ISP. Subnet Netmask: The default is 0.0.0.0. User can change it to other such as 255.255.255.0.Type the subnet mask assigned to you by your ISP (if given). Gateway: You must specify a gateway IP address (supplied by your ISP).
  • Page 34 2. Configure the Wireless LAN setting. WLAN Service: Default setting is set to Enable. If you want to use wireless, both 802.11g and 802.11b device in your network, you can select Enable. ESSID: The ESSID is the unique name of a wireless access point (AP) to be distinguished from another.
  • Page 35 3. Set up VoIP. SIP: To use VoIP SIP as VoIP call signaling protocol. Default is set to Disable. Region: This selection is a drop-down box, which allows user to select the country for which the VoIP device must work. When a country is selected, the country parameters are automatically loaded. SIP Service Provider: This section allows you to select the service provider.
  • Page 36: Configuration

    Configuration When you click this item, the column will expand to display the sub-items that will allow you to further configure your router. LAN, WAN, System, Firewall, VoIP, Virtual Server, Wake on LAN, Time Schedule and Advanced The function of each configuration sub-item is described in the following sections.
  • Page 37: Lan - Local Area Network

    LAN - Local Area Network Here are the items within the LAN section: Ethernet, IP Alias, IPv6 Autoconfig, Ethernet Client Filter, Wireless, Wireless Security, Wireless Client Filter, WPS DHCP Server. Ethernet The router supports more than one Ethernet IP addresses in the LAN that supports multiple internet access at the same time.
  • Page 38 IP Alias This function enables the creation of multiple virtual IP interfaces for this router. It helps to connect two or more local networks to the ISP or remote node. In this case, an internal router is not required. IP Address: Specify an IP address for this virtual interface. Netmask: Specify a subnet mask for this virtual interface Security Interface: Specify the firewall setting for this virtual interface.
  • Page 39: Ipv6 Autoconfig

    The IPv6 address composes of two parts, thus, the prefix and the interface ID. BiPAC 6404VGP R3 dynamically configure IPv6 address on host with Stateless auto-configuration mode. Stateless auto-configuration requires no manual configuration of hosts, minimal (if any) configuration of routers, and no additional servers.
  • Page 40: Ethernet Client Filter

    Ethernet Client Filter The Ethernet Client Filter can support up to 16 Ethernet network computers. It enables you to accept traffic from specific authorized computers or can restrict unwanted computer(s) to access your LAN. There are no pre-defined Ethernet MAC address filter rules, you can add the filter rules to meet your requirements.
  • Page 41 Wireless Parameters WLAN Service: Choose Disabled/Enable/TimeSlot from the drop-down list. Mode: The default setting is 802.11b+g (Mixed mode). If you do not know or do not have both 11g and 11b devices on your network, then keep the setting in mixed mode. From the drop-down menu, you can select 802.11g if you have only 11g card.
  • Page 42 Disable: When disabled, you do not broadcast your ESSID. Therefore, no one will be able to locate the Access Point (AP) of your router. Regulation Domain: There are seven Regulation Domains for you to choose from, including North America (N.America), Europe, France, etc. The Channel ID will be different based on this setting. Channel ID: Select the wireless connection ID channel that you would like to use.
  • Page 43: Wireless Security

    Wireless Security You can disable or enable the wireless security function using WPA or WEP for wireless network protection. The default mode of wireless security is set to disabled. WPA-PSK / WPA2-PSK Security Mode: You can disable or enable with WPA or WEP for protecting wireless network. The default mode of wireless security is Disable.
  • Page 44 WEP Authentication: To prevent unauthorized wireless stations from accessing data transmitted over the network, the router offers secure data encryption, known as WEP. If you require high security for transmissions, there are two options to select from: Open System, Share key. WEP Encryption: To prevent unauthorized wireless stations from accessing data transmitted over the network, the router offers highly secure data encryption, known as WEP.
  • Page 45 Wireless Client / MAC Address Filter The MAC Address supports up to 16 wireless network PCs and helps you manage your network control to accept traffic from specific authorized PCs or to restrict unwanted PC(s) to access your LAN. There are no pre-defined MAC Address filter rules; you can add the filter rules to meet your requirements.
  • Page 46 WPS (WiFi Protected Setup) feature is a standard protocol created by Wi-Fi Alliance. This protocol is used to build a Wi-Fi network within a home / small office environment in an easy and secured manner. This feature thus provides a much simplified method to configure Wi-Fi Protected Access to those who know very little about wireless security.
  • Page 47 Step 3: Enter AP’s PIN into the utility and click on the “next” button. Step 4: These are two ways to trigger AP as Enrolee role, you can choose one to do it.  Push AP’s WPS button 1 second and release it. ...
  • Page 48 Step 5: Jumpstart WPS utility search WPS AP. Step 6: SSID and security will be generated automatically (You can change it) and apply “next” button.
  • Page 49 Step 7: WPS set up complete. And you have set up security-enabled Wi-Fi networks.
  • Page 50 Set up of security-enabled Wi-Fi network using WCN in Vista Step 1: Note down the AP’s PIN from Web (Ex: 78749887). Step 2: In Vista’s Control Panel, select Network and Internet and choose View network computers and devices. Double click the “Firewall Router” icon and enter the AP’s PIN code then click “Next”.
  • Page 51 Step 3: Enter the AP SSID and apply “Next” button. Step 4: Enter the Passphrase and apply “Next” button.
  • Page 52 Step 5: WCN set up complete. And you have set up security-enabled Wi-Fi networks.
  • Page 53 Adding a new WPS device (wireless client) to a network - Use PBC Method Step 1: Push AP’s WPS button more than one second and you will see AP’s WLAN led will flashing per second. Step 2: Open wireless client’s WPS utility, select “Join a wireless network” and apply “next” button.
  • Page 54 Step 4: New WPS device have join into the wireless network.
  • Page 55 Adding a new WPS device (wireless client) to a network - Use PIN Method Step 1: Open wireless client’s WPS utility, select “Join a wireless network” and apply “next” button. Step 2: Note down the wireless client’s PIN (Ex: 41538142) and apply “Start” button for active wireless client WPS PIN method.
  • Page 56 Step 3: Enter wireless client’s PIN into “Enrollee’s PIN” of Web and apply “Start” button. Step 4: New WPS device have join into the wireless network.
  • Page 57: Dhcp Server

    DHCP Server You can disable or enable the DHCP (Dynamic Host Configuration Protocol) server or enable the router’s DHCP relay functions. The DHCP protocol allows your router to dynamically assign IP addresses to the PCs on your network if they are configured to obtain IP addresses automatically. To disable the router DHCP Server, check Disabled and click Next, then click Apply.
  • Page 58: Wan - Wide Area Network

    WAN - Wide Area Network WAN refers to your Wide Area Network connection, i.e. your router’s connection to your ISP and the Internet. Here is the item within the WAN section: WAN Profile. WAN Profile Obtain an IP Address Automatically (EWAN) When connecting to the ISP, This router also functions as a DHCP client.
  • Page 59 Fixed IP Address (EWAN) Select this option to set static IP information. You will need to enter in the Connection type, IP address, netmask, and gateway address, provided to you by your ISP. Each IP address entered in the fields must be in the appropriate IP form, which is four IP octets separated by a dot (x.x.x.x). The Router will not accept the IP address if it is not in this format.
  • Page 60 PPPoE (EWAN) PPPoE (PPP over Ethernet) provides access control in a manner similar to dial-up services using PPP. Profile Port: Select the profile port as EWAN. Username: Enter the username provided by your ISP. You can input up to 128 alphanumeric characters (case sensitive).
  • Page 61 MAC Spoofing: Select Enable and enter a MAC address that will temporarily change your router’s MAC address to the one you have specified in this field. Leave it as Disabled if you do not wish to change the MAC address of your router. Obtain DNS: Select Automatic to use DNS.
  • Page 62: System

    System Here are the items within the System section: Time Zone, Remote Access, Firmware Upgrade, Backup/Restore, Restart User Management. Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network Time Protocol (SNTP) to get the current time from an SNTP server outside your network. Choose your local time zone, click Enable and click the Apply button.
  • Page 63: Remote Access

    Remote Access This feature enables system administrator to set the time interval where the router can be accessed for administration purpose from a remote site (i.e. from outside your LAN). If you wish to permanently enable remote access, set the time period to 0 minute. Firmware Upgrade Your router firmware is the software that enables it to operate and provides all its functionality.
  • Page 64 Backup / Restore This function allows you to save a backup of the current configuration of your router to a file on your PC, or to restore a previously saved configuration. This is very useful if you wish to customize the setting of the router, knowing in advance that you can always restore the setting if any mistakes do occur.
  • Page 65: Restart Router

    Restart Router Click Restart with option Current Settings to reboot your router (and restore your last saved configuration). If you wish to restart the router using the factory default settings (for example, after a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default settings.
  • Page 66: User Management

    User Management In order to prevent unauthorized access to your router’s configuration interface, it requires that all users are to login the GUI with a password. You can set up multiple user accounts, each with their own password. You can Edit any existing user accounts and Add new user account to grant access to the device configuration interface.
  • Page 67 To Add an Account 1. Check the Valid checkbox, fill in all the information: User name, Comment (optional), Password, Confirm Password. 2. When it is done, click the Add button. To delete a user account Click on the Delete radio button of the account you want to delete. Then click the Edit/Delete to confirm the deletion.
  • Page 68: Firewall And Access Control

    Firewall and Access Control Your router includes a full SPI (Stateful Packet Inspection) firewall for Internet access controlling from your LAN. This feature also protects your system from being attacked by hackers. When using NAT, the router acts as a “natural” Internet firewall, as all PCs on your LAN will have their own private IP addresses which are not directly accessible from the Internet.
  • Page 69: General Settings

    General Settings You can choose to disable Firewall and still be able to access the URL Filter, Intrusion Detection and IM/P2P Blocking or enable the Firewall using the preset filter rules and modify the port filter rules as required. The Packet Filter is used to filter packets based on Applications (Port) or IP addresses.
  • Page 70: Packet Filter

    Packet Filter This function is only available when Firewall is enabled with one of the four security levels selected (All blocked, High, Medium and Low). The preset port filter rules in the Packet Filter must be modified accordingly to the level of security selected. See Table1: Predefined Port Filter for more detail information.
  • Page 71 Example: Predefined Port Filters Rules The predefined port filter rules for High, Medium and Low security levels are listed. See Table 1. Note: Firewall – All Blocked/User-defined, you must define and create the port filter rules yourself. No predefined rule is being preconfigured. Table 1: Predefined Port Filter Firewall - Firewall -...
  • Page 72 Packet Filter – Add TCP/UDP Filter Rule Name Helper: User defined description for entry identification. You may also choose from the Select drop-down menu for an existing predefined rule. The maximum name length is 32 characters. Time Schedule: A self defined time period. You may specify a time schedule for your prioritization policy.
  • Page 73 Packet Filter – Add Raw IP Filter Go to “Type” drop-down menu, select “Use Protocol Number”. Rule Name Helper: User defined description for entry identification. You may also choose from the Select drop-down menu for an existing predefined rule. Time Schedule: A self defined time period. You may specify a time schedule for your prioritization policy.
  • Page 74 Example: Configuring your firewall to allow a publicly accessible web server on your LAN The predefined port filter rule for HTTP (TCP port 80) is the same whether the firewall is set to a high, medium or low security level. To setup a web server located on the local network when the firewall is enabled, you have to configure the Port Filters setting for HTTP.
  • Page 75 Configuring Packet Filter: 1. Click Packet Filters. You will then be presented with the predefined port filter rules screen (in this case for the low security level), shown below: Note: You may click Edit the predefined rule instead of Delete it. This is an example to show to how you add a filter on your own.
  • Page 76: Intrusion Detection

    Intrusion Detection The router Intrusion Detection System (IDS) is used to detect hacker’s attack and intrusion attempts from the Internet. If the IDS function of the firewall is enabled, inbound packets are filtered and blocked depending on whether they are detected as possible hacker attacks, intrusion attempts or other connections that the router determines to be suspicious.
  • Page 77 For SYN Flood, ICMP Echo Storm and ICMP flood, IDS will just warn the user in the Event Log. It cannot protect against such attacks. Table 2: Hacker attack types recognized by the IDS Type of Block Intrusion Name Detect Parameter Blacklist Drop Packet Show Log Duration Ascend Kill data...
  • Page 78: Url Filter

    URL Filter URL (Uniform Resource Locator) (e.g. an address in the form of http://www.abcde.com or http:// www.example.com) filter rule allows you to prevent users on your network from accessing specific websites defined by their URL. There are no predefined URL filter rules, therefore you can add filter rules to meet your requirements.
  • Page 79 For example, if the URL is http://www.abc.com/abcde.html, the connection will be dropped if the keyword “abcde” occurs in the URL. Domains Filtering: This function checks the whole URL address but not the IP address against your list of domains to block or allow. If it is matched, the URL request will either be sent (Trusted) or dropped (Forbidden).
  • Page 80 Example: Andy wishes to disable all WEB traffic except for the ones listed in the trusted domain, which would prevent Bobby from accessing other websites. Andy selects both conditions in the Domain Filtering thinking that this will stop Bobby. But Bobby knows this function, Domain Filtering, ONLY disables all WEB traffic except for Trusted Domain, BUT not its IP address.
  • Page 81 Both Instant Message and Peer-to-peer applications make communication faster and easier but your network can become increasingly insecure at the same time. Billion’s IM and P2P blocking helps users to restrict LAN PCs to access the commonly used IM, Yahoo and MSN, and P2P, BitTorrent and eDonkey, applications over the Internet.
  • Page 82: Firewall Log

    Firewall Log Firewall Log displays a log that contains information of any unexpected actions that occur to your firewall settings. Check the Enable checkbox to activate event logging. Log information can be seen in the Status – Event Log after the feature is enabled.
  • Page 83: Voip - Voice Over Internet Protocol

    VoIP - Voice over Internet Protocol VoIP enables telephone calls through existing Internet connection instead of going through the PSTN (Public Switched Telephone Network). It is not only cost-effective, especially for a long distance telephone charges, but also toll-quality voice calls over the Internet. Here are the items within the VoIP section: SIP Device Parameters, SIP Accounts, Phone Port, PSTN Dial Plan, VoIP Dial Plan, Call Features, Speed Dial...
  • Page 84: Sip Device Parameters

    SIP Device Parameters This section provides easy setup for your VoIP service. Phone port 1 and 2 can be registered to different SIP Service Provider. SIP Device Parameters SIP: To use VoIP SIP as VoIP call signaling protocol. Default is set to Disable. Silence Suppression (VAD): Voice Activation Detection (VAD) prevents transmitting the nature silence to consume the bandwidth.
  • Page 85 Voice QoS, DSCP Marking: Differentiated Services Code Point (DSCP), it is the first 6 bits in the ToS byte. DSCP Marking allows users to assign specific application traffic to be executed in priority by the next Router based on the DSCP value. See Table 4. The DSCP Mapping Table: Note: To be sure the router(s) in the backbones network have the capability in executing and checking the DSCP through-out the QoS network.
  • Page 86 Advanced – PSTN Environment Adjustment PSTN Environment Adjustment options will help you to adjust the onhook and offhook voltage detection values for your environment. You should use these if the default values are incorrect and result in PSTN calls not being detected properly, e.g. calls being terminated within 5 seconds of being answered.
  • Page 87: Sip Accounts

    SIP Accounts This section reflects and contains the basic settings of the VoIP module from the selected provider in the Wizard section. Fail to provide the correct information will stop making calls out to the Internet. Profile Name: Assign a name for profile identification. Registrar Address (or Hostname): Indicate the VoIP SIP registrar IP address.
  • Page 88: Phone Port

    Phone Port This section displays the status and allows for further editing on the account information of the Phones. Click Edit to update your phone information. Port: It allows you to change the phone port setting for specific FXS port. *69 (Return Call): Dial *69 to return the last missed call.
  • Page 89 Codec Preference Codec is known as Coder-Decoder, it is used for data signal conversion. Set the priority of voice compression with Priority 1 represents the top priority. G.729: It is used to encode and decode voice information into a single packet to reduce bandwidth consumption.
  • Page 90 PSTN Dial Plan (Router with LINE port only) This section enables you to configure the “VoIP with PSTN switching” on your system. You can define a range of dial plans that will make regular call to switch from VoIP to PSTN line. Prefix number is an essential key to make a difference between VoIP and Regular phone call.
  • Page 91 Note: The length of the number of digit dialed must not exceed the number of digit defined otherwise dialing will be invalid. PSTN Dial Plan Examples: Dial with Prefix If you dial 01223 707070, the number 01223707070 will be dialed out via FXO for making a regular phone call.
  • Page 92 If you dial 9102, only 102 will be dialed out via FXO port for making a regular phone call. Dial at Timeout If you only dial 01223 7070, the number 012237070 will be dialed to make a regular call via FXO port after a defined timeout interval even though the number of digit entered does not match the number of digit defined.
  • Page 93: Voip Dial Plan

    VoIP Dial Plan This feature makes dialing phone number a lot more convenient and easy. Instead of having to memorize long digits of every single contact, VoIP Dial Plan provides you the ease to create dial plans that will enable you to make your phone calls without the need to memorize the phone number.
  • Page 94 Service Provider for information. If Prefix is xxx, delete it: Prefix xxx is removed from the dialing numbers before making a call. If Prefix is xxx, replace with: Prefix xxx is replaced when making a call. No prefix: No prefix is appended to the front of the numbers dialed. This is the default setting for Prefix Processing section.
  • Page 95 Special Dial Plan Examples: Description Starting with ‘* sign’ + any two digit numbers + any number *xx*x. (0-9) in variable length. Maximum length is 16. Starting with ‘* sign’ + any 2 digit numbers between 0 and 9. Total length including the * is 3. Note: No period is needed (.) Starting with ‘** sign’...
  • Page 96: Call Feature

    Call Feature VoIP has all the basic features of a traditional phone. Besides the provided basic features, VoIP also comes with several enhanced features that allows you to further customize their settings to suit your personal needs such as call forwarding setting, call waiting time length, conference call feature, anonymous call feature and incoming no answer timer.
  • Page 97 Ring & Tone This section allows advanced user to change the existing or newly defined parameters for various ring tones (dial tone, busy tone, answer tone and etc.)
  • Page 98 Country Specific Ring & Tone Region: Select a country ring tone from the drop-down list that pertains to your residence. This VoIP router will display the default parameters of each ring tone according to the country selected. If your country is not found in the list, you may manually enter the parameters of the ring tone that pertains to the country.
  • Page 99: Virtual Server (Known As Port Forwarding)

    Virtual Server (known as Port Forwarding) In TCP/IP and UDP networks, a port is a 16-bit number used to identify which application program (usually a server) incoming connections should be delivered to. Some ports have numbers that are pre-assigned to them by the IANA (the Internet Assigned Numbers Authority), and these are referred to as “well-known ports”.
  • Page 100: Add Virtual Server

    Add Virtual Server Because NAT can act as a “natural” Internet firewall, your router protects your network from being accessed by outside users when using NAT, as all incoming connection attempts will point to your router unless you specifically create Virtual Server entries to forward those ports to a PC on your network.
  • Page 101 Example: If you like to remotely access your Router through the Web/HTTP all the time, you will need to enable port number 80 (Web/HTTP) and map to the Router’s IP Address. Then all incoming HTTP requests from you (Remote side) will be forwarded to the Router with an IP address of 192.168.1.254.
  • Page 102: Edit Dmz Host

    Edit DMZ Host DMZ Host is a local computer that is exposed to the Internet. When setting a particular internal IP address as the DMZ Host, all incoming packets especially those that do not use the port number that is being used by any other Virtual Server entries will be checked by the Firewall and NAT algorithms before being passed to the DMZ host.
  • Page 103 Edit One-to-One NAT (Network Address Translation) One-to-One NAT maps a specific private / local IP address to a global / public IP address. If you have multiple public / WAN IP addresses from your ISP, you are eligible to use these IP addresses in One-to-One NAT Go to Configuration >...
  • Page 104 : 20 predefined rules are available. Application, Protocol and External/Redirect Ports will be filled after the selection. Protocol: It is the supported protocol for the virtual server. In addition to specifying the port number to be used, you will also need to specify the protocol used. The protocol used is determined by the particular application.
  • Page 105 For further information, please see IANA’s website at http://www.iana.org/assignments/port- numbers For help on determining which private port numbers are used by common applications on this list, please see the FAQs (Frequently Asked Questions) at http://www.billion.com Table 5: Well-known and registered Ports Port Number Protocol Description...
  • Page 106: Wake On Lan

    Wake on LAN This feature provides greater flexibility for users to turn on / boot the computer of the network from a remotely site. MAC Address: Enter the MAC address of the target computer or you can select the MAC address directly from the Select drop down menu on the right.
  • Page 107: Time Schedule

    Time Schedule The Time Schedule supports up to 16 time slots which helps you to manage your Internet connection. In each time profile, you may schedule specific day(s) i.e. Monday through Sunday to restrict or allow the use of the Internet by users or applications. Time Schedule correlates closely with router time.
  • Page 108: Configuration Of Time Schedule

    Configuration of Time Schedule Edit a Time Slot Choose any Time Slot (ID 1 to ID 16) to edit, click Edit radio button. Note: Watch it carefully, the days you have selected will present in capital letter. Lower case letter shows the day(s) is not selected, and no rule will apply on this day(s). A detailed setting of this Time Slot will be shown.
  • Page 109 Delete a Time Slot Click on the Delete radio button of the Time Slot you wish to delete under the Time Slot section, and then click the Edit/Delete button to confirm the deletion of the selected Time profile, i.e. erase the Day and back to default setting of Start Time / End Time.
  • Page 110: Advanced

    Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router. Users who do not understand the features should not attempt to reconfigure their router, unless advised to do so by support staff. These are the items within the Advanced section: Static Route, Static ARP, Dynamic DNS, Device Management and IGMP.
  • Page 111: Dynamic Dns

    Dynamic DNS The Dynamic DNS function allows you to alias a dynamic IP address to a static hostname, allowing users whose ISP does not assign them a static IP address to use a domain name. This is especially useful for hosting servers via your connection, so that anyone wishing to connect to you may use your domain name, rather than having to use your dynamic IP address, which changes from time to time.
  • Page 112: Device Management

    Device Management The Device Management advanced configuration setting allows you to control your router security option and device monitoring features. Device Host Name Host Name: Assign it a name. Note: The Host Name must have more than a word. These two words should be connected with a ‘.’...
  • Page 113 Embedded Web Server ( 2 Management IP Accounts) HTTP Port: This is the port number that the router embedded web server (for web-based configuration) will use. The default value is the standard HTTP port 80. Users may specify an alternative if, for example, they are running a web server on a PC within their LAN. Management IP Address: You may specify an IP address for logon and access the router web server.
  • Page 114 Specify a name and password for authentication and define the access right from an identified IP address. Once the authentication has succeeded, users with this IP address will be able to view and modify the data. SNMP Version: SNMPv2c and SNMPv3 SNMPv2c is the combination of the enhanced protocol features of SNMPv2 without the SNMPv2 security.
  • Page 115 IGMP IGMP, known as Internet Group Management Protocol, is used to manage hosts from multicast group. IGMP Proxy: Enables or disables the router’s IGMP Proxy. Upstream Interface: When IGMP Proxy enabled, sets one of the router’s existing IP interfaces as the upstream interface;...
  • Page 116 upstream interface; all other router interfaces are designated downstream interfaces. MLD Forward All: select enable to forward the multicast packets to all ports. If select disable, the multicast packets will be forwarded to ports set according to the MLD Snooping below. MLD Snooping: similar to IGMP snooping, listens in on the MLD conversation between hosts and routers by processing MLD packets sent in a multicast network, and it analyzes all MLD packets between hosts and the connected multicast routers in the network.
  • Page 117: Logout

    Logout To exit the router web interface, choose Logout. Please save your configuration setting before logging out of the system. Be aware that the router configuration interface can only be accessed by one PC at a time. Therefore when a PC has logged into the system interface, the other users cannot access the system interface until the current user has logged out of the system.
  • Page 118: Chapter 5: Troubleshooting

    If your router is not functioning properly, please refer to the suggested solutions provided in this chapter. If your problems persist or the suggested solutions do not meet your needs, please kindly contact your service provider or Billion for support. Problems with the router...
  • Page 119: Appendix: Product Support & Contact

    However if your problems persist or you come across other technical issues that are not listed in the Troubleshooting section, please contact the dealer from where you purchased your product. Contact Billion Worldwide: http://www.billion.com MAC OS is a registered Trademark of Apple Computer, Inc.

Table of Contents