QNO VPN QoS User Manual

1x100mbps wan + 4x100mbps switch lan + 2xusb family &small business ipsec vpn solution
Table of Contents

Advertisement

Quick Links

VPN QoS Wireless Router
1x100Mbps WAN + 4x100Mbps Switch LAN + 2xUSB
Family &Small Business IPSec VPN Solution
English User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for QNO VPN QoS

  • Page 1 VPN QoS Wireless Router 1x100Mbps WAN + 4x100Mbps Switch LAN + 2xUSB Family &Small Business IPSec VPN Solution English User’s Manual...
  • Page 2 Manual, and the relevant rights and obligations between the users and Qno Technology Inc (hereafter "Qno"), and is the exclusion to remit or limit the liability of Qno. The users who obtain the file of this manual directly or indirectly, and users who use the relevant services, must obey this Agreement.
  • Page 3 【5-2】The power of interpretation, potency and dispute are applicable for the law of Taiwan. If there is any dissension or dispute between the users and Qno, it should be attempted to solve by consultation first. If it is not solved by consultation, user agrees that the dissension or dispute is brought to trial in the jurisdiction of the court in the location of Qno.
  • Page 4: Table Of Contents

    Content Introduction ....................... 6 Multi- WAN VPN Router Installation ................8 Systematic Setting Process ....................8 Setting Flow Chart ......................8 III. Hardware Installation ....................11 LED Signal ........................11 VPN Router Network Connection ..................12 Login ........................13 V. Device Spec Verification, Status Display and Login Password and Time Setting ..15 Home Page........................
  • Page 5 IP & MAC Binding ......................70 VIII. Wireless Network ...................... 74 8.1 Basic Configuration ......................75 8.2 Security Setting ........................77 8.3 Station List ........................... 85 8.4 Statistic ..........................85 QoS (Quality of Service) .................... 86 Bandwidth Management ....................87 9.1.1 The Maximum Bandwidth provided by ISP ...............
  • Page 6 Log out ........................195 Appendix I:Troubleshooting ....................196 (1) Block BT Download......................196 (2)Shock Wave and Worm Virus Prevention ..............197 (3)Block QQLive Video Broadcast Setting ................199 (4)ARP Virus Attack Prevention ..................201 Appendix II:Qno Technical Support Information ..............209...
  • Page 7: Introduction

    Introduction IPSec VPN QoS Router (referred as VPN Router hereby) is a business level security router that efficiently integrates new generation multiple WAN-port devices. It meets the needs of medium enterprises, internet cafés, campus, dorm and communities, etc. VPN Router has 2 10/100 Base-T/TX Ethernets (RJ45) WAN ports. These WAN ports can support auto load balance mode, exclusive mode (remaining WAN balance), and stategy routing mode for high-efficiency network.
  • Page 8 websites according to their needs. By the filter setting and complete OS management, school and business internet management will be clearly improved. VPN Router offers various on-line SysLog records. It supports on-line management setup tools; it makes setting up networks easy to understand. It also reinforces the management of network access rules, VPN, and all other network services.
  • Page 9: Multi- Wan Vpn Router Installation

    Multi- WAN VPN Router Installation In this chapter we are going to introduce hardware installation. Through the understanding of multi-WAN setting process, users can easily setup and manage the network,making VPN Router functioning and having best performance. 2.1 Systematic Setting Process Users can set up and enable the network by utilizing bandwidth efficiently.
  • Page 10 Configure the Install the device hardware based on user Hardware installation network to meet physical requirements. user’s demand. Login Login the device with Login the device web- based UI. Web Browser. Verify device Verify Firmware Verify the device specification, Firmware specification version and working version and working status.
  • Page 11 Monitor VPN Router Administrators can look up system log and Management and working status and monitor system status and inbound/outbound maintenance settings: configuration backup. flow in real time. Syslog, SNMP, and configuration backup Configure VPN Configure different types of VPN to meet VPN Virtual Private tunnels different application environment.
  • Page 12: Hardware Installation

    III. Hardware Installation In this chapter we are going to introduce hardware interface as well as physical installation. 3.1 LED Signal LED Signal Description Color Description Power Green Green LED on: Power ON DIAG Amber Amber LED on: System self-test is running. Amber LED blinking: System not ready Amber LED off: System self-test is completed successfully.
  • Page 13: Vpn Router Network Connection

    3.2 VPN Router Network Connection WAN connection:A WAN port can be connected with xDSL Modem, Fiber Modem, Switching Hub, or through an external router to connect to the Internet. LAN Connection: The LAN port can be connected to a Switching Hub or directly to a PC. Users can use servers for monitoring or filtering through the port after “Physical Port Mangement”...
  • Page 14: Login

    IV. Login This chapter is mainly introducing Web- based UI after conneting the device. First, check up the device’s IP address by connecting to DOS through the LAN PC under the device. Go to Start → Run, enter cmd to commend DOS, and enter ipconfig for getting Default Gateway address, as the graphic below, 192.168.1.1.
  • Page 15 Then, open webpage browser, IE for example, and key in 192.168.1.1 in the website column. The login window will appear as below: The device’s default username and password are both “admin”. Users can change the login password in the setting later. Attention! For security, we strongly suggest that users must change password after login.
  • Page 16: Device Spec Verification, Status Display And Login Password And Time Setting

    V. Device Spec Verification, Status Display and Login Password and Time Setting This chapter introduces the device specification and status after login as well as change password and system time settings for security. 5.1 Home Page In the Home page, all the device’s parameters and status are listed for users’ reference. 5.1.1 WAN Status IP Address:...
  • Page 17: Physical Port Status

    Usage(%): DDNS: Indicates if Dynamic Domain Name is activated. The default configuration is “Off”. Quality of Service: Indicates how many QoS rules are set. Manual Connect: When “Obtain an IP automatically” is selected, two buttons (Release and Renew) will appear. If a WAN connection, such as PPPoE or PPTP, is selected, “Disconnect”...
  • Page 18 The current port setting status information will be shown in the Port Information Table. Examples: type (10Base-T/100Base-TX), iniferface (WAN/ LAN/ DMZ), link status (Up/ Down), physical port status (Port Enabled/ Port Disabled), priority (high or normal), speed status (10Mbps or 100Mbps), duplex status (Half/ Full), auto negotiation (Enabled or Disabled).
  • Page 19: System Information

    5.1.3 System Information LAN IP/Subnet Mask: Identifies the current device IP address. The default is 192.168.1.1. Working Mode: Indicates the current working mode. Can be NAT Gateway or Router mode. The default is “NAT Gateway” mode. System Active Time:Indicates how long the Router has been running. Serial Number:This number is the Router serial number.
  • Page 20: Firewall Status

    5.1.4 Firewall Status SPI (Stateful Packet Inspection): Indicates whether SPI (Stateful Packet Inspection) is on or off. The default configuration is “On”. DoS (Denial of Service):Indicates if DoS attack prevention is activated. The default configuration is “On”. Block WAN Request:Indicates that denying the connection from Internet is activated. The default configuration is “On”.
  • Page 21: Change And Set Login Password And Time

    The default is “admin”. User Name: Input the original password.(The default is “admin”.) Old Password: New User Name: Input the new user name. i.e.Qno New Password: Input the new password. Confirm New Input the new password again for verification. Password:...
  • Page 22: Time

    Click “Cancel" to leave without making any change. This action will be Cancel: effective before ”Apply” to save the configuration. 5.2.2 Time The device can adjust time setting. Users can know the exact time of event occurrences that are recorded in the System Log, and the time of closing or opening access for Internet resources. You can either select the embedded NTP Server synchronization function or set up a time reference.
  • Page 23 Daylight Saving: If there is Daylight Saving Time in your area, input the date range. The device will adjust the time for the Daylight Saving period automatically. NTP Server: If you have your own preferred time server, input the server IP address. After the changes are completed, click “Apply”...
  • Page 24: Network

    VI. Network This Network page contains the basic settings. For most users, completing this general setting is enough for connecting with the Internet. However, some users need advanced information from their ISP. Please refer to the following descriptions for specific configurations. 6.1 Network Connection 6.1.1 Host Name and Domain Name Device name and domain name can be input in the two boxes.
  • Page 25 network structure. Multiple-Subnet Setting: Click “Unified IP Management” to enter the configuration page, as shown in the following figure. Input the respective IP addresses and subnet masks. This function enables users to input IP segments that differ from the router network segment to the multi-net segment configuration;...
  • Page 26: Wan Settings

    6.1.3 WAN Settings WAN Setting: Interface: An indication of which port is connected. Connection Type: Obtain an IP automatically, Static IP connection, PPPoE (Point-to-Point Protocol over Ethernet), PPTP (Point-to-Point Tunneling Protocol) or Transparent Bridge. Config.: A modification in an advanced configuration: Click Edit to enter the advanced configuration page. Obtain an Automatic IP automatically: This mode is often used in the connection mode to obtain an automatic DHCP IP.
  • Page 27 DNS Server: Input the DNS IP address set by ISP. At least one IP group should be input. The maximum acceptable groups is two IP groups. Enable Line-Dropped The WAN disconnection schedule will be activated by checking this Scheduling: option. In some areas, there is a time limitation for WAN connection service.
  • Page 28 WAN IP address Input the available static IP address issued by ISP. Input the subnet mask of the static IP address issued by ISP, such as: Subnet Mask Issued eight static IP addresses: 255.255.255.248 Issued 16 static IP addresses: 255.255.255.240 Input the default gateway issued by ISP.
  • Page 29 Enable The WAN disconnection schedule will be activated by checking this option. In Line-Dropped some areas, there is a time limitation for WAN connection service. For example: Scheduling the optical fiber service will be disconnected from 0:00 am to 6:00 am. Although there is a standby system in the device, at the moment of WAN disconnection, all the external connections that go through this WAN will be disconnected too.
  • Page 30 User Name Input the user name issued by ISP. Input the password issued by ISP. Password This function enables the auto-dialing function to be used in a PPPoE dial Connect on Demand connection. When the client port attempts to connect with the Internet, the device will automatically make a dial connection.
  • Page 31 Enable The WAN disconnection schedule will be activated by checking this option. Line-Dropped In some areas, there is a time limitation for WAN connection service. For Scheduling example: the optical fiber service will be disconnected from 0:00 am to 6:00 am. Although there is a standby system in the device, at the moment of WAN disconnection, all the external connections that go through this WAN will be disconnected too.
  • Page 32 This option is to configure a static IP address. The IP address to be WAN IP Address configured could be one issued by ISP. (The IP address is usually provided by the ISP when the PC is installed. Contact ISP for relevant information).
  • Page 33 This function enables the auto-dialing function to be used for a PPTP dial Connect on Demand connection. When the client port attempts to connect with the Internet, the device will automatically connect with the default ISP auto dial connection; when the network has been idle for a period of time, the system will break the connection automatically.
  • Page 34 the WAN connection mode. In this way, users will be able to connect normally with the Internet while keeping the original Internet IP addresses in Intranet IP configuration. If there are two WANs configured, users still can select Transparent Bridge mode for WAN connection mode, and load balancing will be achieved as usual.
  • Page 35 Input the available IP range issued by ISP. If ISP issued two Internal LAN IP discontinuous IP address ranges, users can input them into Internal Range LAN IP Range 1 and Internal LAN IP Range 2 respectively. Enable The WAN disconnection schedule will be activated by checking this option.
  • Page 36 PIN CODE: If your SIM card is protected by PIN code, then you will need to fill out the columns. If your PIN Code is not correct, the system will not enable 3G feature. ※Note: ※ISP sometimes protects the SIM card by having limited PIN code trial errors. If you enter wrong PIN code too many times, the SIM card will be locked by ISP, and the setting UI will show [PUK] PIN Unlocked Key.
  • Page 37 Status 2:3G modem is connected, but there is no SIM card available. Please insert the SIM card for 3G service. Status 3:3G modem is connected, but it requires the PIN code to enable the 3G service. Status 4:3G modem is connected, but the SIM card is locked. Please enter the PUK code to unlock Status 5:3G modem is connected and works normally.
  • Page 38: Multi- Wan Setting

    6.2 Multi- WAN Setting When you have multiple WAN gateways, you can use Traffic Management and Protocol Binding function to fulfill WAN road balancing, so that we can have highest network bandwidth efficiency.
  • Page 39: Load Balance Mode

    6.2.1 Load Balance Mode Auto Load Balance Mode When Auto Load Balance mode is selected, the device will use sessions or IP and the WAN bandwidth automatically allocate connections to achieve load balancing for external connections. The network bandwidth is set by what users input for it. For example, if the upload bandwidth of both WANs is 512Kbit/sec, the automatic load ratio will be 1:1;...
  • Page 40 addresses or servers that are configured in the connection rule will follow the rule for external connections; those which are not configured in the rule will still follow the device Auto Load Balance system. Please refer to the explanations in 6.2.3 Configuring Protocol Binding for setting up Protocol Binding and for examples of collocating router modes with Protocol Binding.
  • Page 41 All you have to do is to select the WAN (or WAN group) which is connected with Netcom; the device will then automatically dispatch the traffic for Netcom through that WAN to connect with the Internet and dispatch traffic for Telecom to go through the WAN connected with Telecom to the Internet accordingly. In this way, the traffic for Netcom and Telecom can be divided.
  • Page 42 After the configuration is completed, in the China Netcom Policy window users can select WANs in combination to connect with Netcom. Import Strategy: A division of traffic policy can be defined by users too. In the “Import Strategy” window, select the WAN or WAN group (ex.
  • Page 43: Network Service Detection

    Note! China Netcom strategy and self-defined strategy can coexist. However, if a destination IP is assigned by both China Netcom strategy and self-defined strategy, China Netcom strategy will take priority. In other words, traffic to that destination IP will be transmitted through the WAN (or WAN group) under China Netcom strategy.
  • Page 44 Interface: Select the WAN Port that enables Network Service Detection. This selects the retry times for network service detection. The default is Retry: five times. If there is no feedback from the Internet in the configured “Retry Times", it will be judged as “External Connection Disconnected”. Retry Timeout: Delay time for external connection detection latency.
  • Page 45 connection failure is detected, no error message will be recorded in the System Log. The packet transmitted through this WAN will be shifted to the other WAN automatically, and be shifted back again when the connection for the original WAN is repaired and reconnected.
  • Page 46: Protocol Binding

    WANs (WAN2) are broken and connection error remove (Remove the Connection) has been selected for the connection detection system, traffic will be shifted to the first WAN (WAN1). In addition, if the first WAN (WAN1) is broken, the traffic will be shifted to other WANs in turn. For example, the traffic will be shifted to WAN2.
  • Page 47 WAN for external connections. For any other unassigned IP addresses and services, WAN load balancing will still be carried out. Note! In the load balance mode of Assigned Routing, the first WAN (WAN1) cannot be assigned. It is to be saved for the IP addresses and the application Service Ports that are not assigned to other WANs (WAN2) for external connections.
  • Page 48 selected from the pull-down option list. The default Service is All 0~65535. Option List for Service Management: Click the button to enter the Service Port configuration page to add or remove default Service Ports on the option list. Source IP: Users can assign packets of specific Intranet virtual IP to go through a specific WAN port for external connection.
  • Page 49 Show Priority: Click the “Show Table” button. A dialogue box as shown in the following figure will be displayed. Users can choose to sort the list by priorities or by interface. Click “Refresh” and the page will be refreshed; click “Close”...
  • Page 50 Users can add up to 100 services into the list. To remove the selected activated Services. Delete selected service: Click the “Apply” button to save the modification. Apply: Click the “Cancel” button to cancel the modification. This only Cancel: works before “Apply” is clicked. Exit: To quit this configuration window.
  • Page 51 As in the figure below, select “All Traffic” from the pull-down option list “Service”, and then in the boxes of “Source IP” input the source IP address “192.168.1.100” to “100”. Retain the original numbers “0.0.0.0” in the boxes of “Destination IP” (which means to include all Internet IP addresses). Select WAN2 from the pull-down option list “Interface”, and then click “Enable”.
  • Page 52 Example 3:How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going through WAN2 when the destination port is Port 80 and keep all other services from going through WAN1? As in the figure below, there are two rules to be configured. The first rule: select “HTTP [TCP/80~80]”...
  • Page 54 Configuring “Assigned Routing Mode” for load Balance: IP Group: This function allows users to assign packets from specific Intranet IP addresses or to specific destination Service Ports and to specific destination IP addresses through an assigned WAN to the Internet. After being assigned, the specific WAN will only support those assigned Intranet IP addresses, destination Service Ports, or destination IP addresses.
  • Page 55 Example 2:How do I configure Protocol Binding to keep traffic from all Intranet IP addresses from going through WAN2 when the destinations are IP 211.1.1.1 ~ 211.254.254.254 as well as the whole Class A group of 60.1.1.1 ~ 60.254.254.254, while traffic to other destinations goes through WAN1? As in the following figure, there are two rules to be configured.
  • Page 56: Advanced Features Of 3G/3.5G Usb Modems

    6.3 Advanced features of 3G/3.5G USB Modems Qno provides Intelligent USB Power Saving feature to be power efficient and extend 3G/3.5G USB dongle lifetime. Based on bandwidth usage rate, time, and behaviors, there are 4 modes: 1. Peformance Mode 2. Backup Mode 3.
  • Page 58 We also need to be familiar with other UI setting before using “Intelligent Power Saving”. Choose theUSB port USB port Auto Self Test feature. No matter what sate the system is on, USB port will automatically dial the 3G/3.5G connection to get IP address at Auto Self Test time.
  • Page 59: Performance Mode (Always Connected)

    6.3.1 Performance Mode (Always Connected) This mode allows 3G/3.5G USB dongle to keep at the connected status. The power consumption is huge under this mode. System will keep detecting if 3G/3.5G USB dongle is connected; In this mode, the trigger condition is disable. 6.3.2 Backup Mode 3G/3.5G USB dongles wil be in power saving state, which the system will provide low power for USB interface.
  • Page 60: Smart Mode

    6.3.3 Smart Mode The system will keep detecting the wired network bandwidth usage. When the wired network is disconnected, or the bandwith usage is over the pre-defined threshold, the system will wake 3G/3.5G USB dongles up for backuping wired network or sharing traffic. When clicking Smart Mode, you can see there is an Idle time setting.
  • Page 61 1_All the chosen wired connections are detected failed Sams as back up mode, you have to choose at least one WAN port. If there are are multiple WAN ports chosen, the system will transfer traffic to 3G/3.5G USB dongles when all the chosen wired connections are detected failed.
  • Page 62 During 3G/3.5G load balance, the system will keep detecting the WAN port status. If the badwidth is _% of the threshold to start load balance, 3G/3.5 USB dongle could return to power saving state. For example, if we enter 10% on the following figure, when WAN 1 bandwidth is less than 9000Kbit (10000Kbits X 10%), 3G/3.5G will return to power saving state.
  • Page 63: Scheduling Mode

    6.3.4 Scheduling Mode Scheduling mode is a helpful tool to plan the bandwidth usage. For example, private enterprise could use 3G/3.5G to expand bandwidth and balance the traffic along with XDSL wired network. After clicking Scheduling Mode, you can see the Show Table button. You can schedule the USB port usage time on the time table, which is shown in hour.
  • Page 64: Intranet Configuration

    VII. Intranet Configuration This chapter introduces how to configure ports and understand how to configure intranet IP addresses. 7.1 Port Management Summary: There are Network Connection Type, Interface, Link Status (Up/Down), Port Activity (Port Enabled), Priority Setting (High or Normal), Speed Status (10Mbps or 100Mbps), Duplex Status (half duplex or full duplex), Auto Neg.
  • Page 65: Ip/ Dhcp

    7.2 IP/ DHCP With an embedded DHCP server, it supports automatic IP assignation for LAN computers. (This function is similar to the DHCP service in NT servers.) It benefits users by freeing them from the inconvenience of recording and configuring IP addresses for each PC respectively. When a computer is turned on, it will acquire an IP address from the device automatically.
  • Page 66 Dynamic IP: Client lease Time: Check the option to activate the DHCP server automatic IP lease function. If the function is activated, all PCs will be able to acquire IP automatically. Otherwise, users should configure static virtual IP for each PC individually.
  • Page 67: Dhcp Status

    7.3 DHCP Status This is an indication list of the current status and setup record of the DHCP server. The indications are for the administrator’s reference when a network modification is needed. DHCP Server: This is the current DHCP IP. Dynamic IP Used:...
  • Page 68 Remove a record of an IP lease. DNS Local Database Normally, DNS sever will be directed to ISP DNS server or internal self- defined DNS server. Qno router also provides “easy” self- defined DNS services, called “DNS Local Database”, which can map website host domain names and the corresponding IP addresses.
  • Page 69 ※ Note! (1) Users MUST enable DCHP server service to enable DNS local database. (2) Users must set DHCP server DNS IP address as the router LAN IP. For example, LAN is 10.10.10.1, as shown in the following figure. Therefore, DCHP DNS IP address must be 10.10.10.1 to make DNS local database in effect. (3) After enabling DNS local database, if there is no host domain names in the list, the router will still use ISP DNS server or internal DNS server for lookup.
  • Page 70 (2) Enter tw.yahoo.com for lookup. (3) The IP is 10.10.10.199, confirming the corresponding IP in DNS local database.
  • Page 71: Ip & Mac Binding

    7.4 IP & MAC Binding Administrators can apply IP & MAC Binding function to make sure that users can not add extra PCs for Internet access or change private IP addresses.
  • Page 72 There are two methods for setting up this function: (1)、Block MAC address not on the list This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet access. When this method is applied, please fill out Static IP with 0.0.0.0, as the figure below:...
  • Page 73 (2)、IP & MAC Binding Static IP: There are two ways to input static IP: If users want to set up a MAC address to acquire IP from DHCP, but the IP need not be a specific assigned IP, input 0.0.0.0 in the boxes. The boxes cannot be left empty.
  • Page 74 Name: For distinguishing clients, input the name or address of the client that is to be bound. The maximum acceptable characters are 12. Enabled: Activate this configuration. Add to list: Add the configuration or modification to the list. Delete selected item: Remove the selected binding from the list.
  • Page 75: Wireless Network

    VIII. Wireless Network Wireless function is enabled by default. The WLAN LED will be on after system booting. Client device can find SSID as QNO_AP_1. Please refer to following illustrations to change configuration.
  • Page 76: Basic Configuration

    8.1 Basic Configuration Enable Wireless Netwrk Check the box to enable wireless function. The default value is “11bgn Mixed Mode”. “11bgn Mixed Mode”, “11b Network Mode Only”, “11g only” and “11n Only” also can be chosen. The default value is recommended.
  • Page 77 WMM Capable APSD (automatic power-save delivery) APSD is an enhancement over the power-save mechanisms supported by Wi-Fi networks. It allows devices to take more time in sleeping state and consume less power to improve the performance by minimizing transmission latency. Direct Link Setup(DLS) This function will greatly improve the data transfer rate between WMM-enabled wireless devices.
  • Page 78: Security Setting

    8.2 Security Setting...
  • Page 79 Enable to feature to make clients connect to this device can not communicate to each other. Guess Access Enable to feature so that clients user can only reach internet instead of wired LAN. 8.2.2 Security Mode Qno provides several security modes. Uses need correct key to access wireless network. 1. WEP mode  Open WEP...
  • Page 80  Shared WEP  WEP Auto If “Open WEP” or “Shared WEP” is checked, client users need to select the same mode to connect to AP. If “WEP auto” is checked, client users can choose any security mode. Default Key Select one of following 4 sets to be security key.
  • Page 81 Algorithms Attention! Only AES can achieve 802.11n rate. ReKey Interval WPA/WPA2-PSK will rekey in a fixed interval. The interval can be configured. 3. Enterprise Mode RADIUS server is necessary to use WPA/WPA2 enterprise mode.  WPA Enterprise  WPA2 Enterprise ...
  • Page 82 4. 802.1x Mode RADIUS server is needed while 802.1x mode is enabled. IP Address Input RADIUS server IP. RADIUS Port Input RADIUS service port. Shared Secret Input initial shared key. Session Timeout Input a maximum idle time. If the link idles over time, the connection will be terminated. 8.2.3 WPS Config Users can enable WPS function when using WPA Personal, WPA2 Personal and WPA/WPA2 Personal Mixed Mode.
  • Page 83 8.2.4 WDS Config WDS is the abbreviation of Wireless Distribution System. The system will transmit packets to other WDS devices in the wireless network to extand covering range.. Two devices should be set in the same subnet as figure above. Configurations of two devices should be the same.
  • Page 84 ※ If WEP mode is enabled, system will arrange 4 sets of key for those MACs. Make sure the order is correct. (2) Or check “Scanning”to select existing AP and then click “Submit”.
  • Page 85 8.2.5 Access Filter For additional security of wireless access, the Access Control facility allows you to restrict the network access right by controlling the wireless LAN MAC address of client. Only the valid MAC address that has been configured can access the wireless LAN interface.
  • Page 86: Station List

    8.3 Station List Station List provides the knowledge of connecting wireless clients MAC Address The MAC address of client device. DHCP IP The IP address allocated from system. Host Name The host name of client device. SSID SSID of client device. Rate The quality of Wifi signal (%).
  • Page 87: Qos (Quality Of Service)

    IX. QoS (Quality of Service) QoS is an abbreviation for Quality of Service. The main function is to restrict bandwidth usage for some services and IP addresses to save bandwidth or provide priority to specific applications or services, and also to enable other users to share bandwidth, as well as to ensure stable and reliable network transmission.
  • Page 88: Bandwidth Management

    9.1 Bandwidth Management...
  • Page 89: The Maximum Bandwidth Provided By Isp

    9.1.1 The Maximum Bandwidth provided by ISP In the boxes for WAN1 and WAN2 bandwidth, input the upstream and downstream bandwidth which users applied for from bandwidth supplier. The bandwidth QoS will make calculations according to the data users input. In other words, it will guarantee a minimum rate of upstream and downstream for each IP and Service Port based on the total actual bandwidth of WAN1 and WAN2.
  • Page 90: Qos

    Attention! The unit of calculation in this example is Kbit. Some software indicates the downstream/upstream speed with the unit KB. 1KB = 8Kbit. 9.1.2 QoS To satisfy the bandwidth requirements of certain users, the device enables users to set up QoS: Rate Control and Priority Control.
  • Page 91 Interface: Select on which WAN the QoS rule should be executed. It can be a single selection or multiple selections. Service Port: Select what bandwidth control is to be configured in the QoS rule. If the bandwidth for all services of each IP is to be controlled, select “All (TCP&UDP) 1~65535”.
  • Page 92 IP Address: This is to select which user is to be controlled. If only a single IP is to be restricted, input this IP address, such as “192.168.1.100 to 100”. The rule will control only the IP 192.168.1.100. If an IP range is to be controlled, input the range, such as “192.168.1.100 ~ 149”.
  • Page 93 : Sharing total bandwidth with all IP addresses: If this option is selected, all IP Bandwidth sharing addresses or Service Ports will share the bandwidth range (from minimum to maximum bandwidth). Assign bandwidth for each IP address: If this option is selected, every IP or Service Port in this range can have this bandwidth (minimum to maximum).
  • Page 94 Example 1. How to set up the maximum download speed to 50 Kbit for the FTP protocol on all WAN interfaces ? Please refer to the following as a setup example. Click before both WAN1 and WAN2; then choose "FTP [TCP/21~21]"...
  • Page 95 Example 2. How to set up the maximum download speed of each WAN to 512Kbit/Sec for each LAN user? One by one IP to set up? No need to set up one by one. Below is the example. Click both WAN1 and WAN2; then choose “No Check Port[TCP&UDP /0~0”...
  • Page 96: Session Control

    9.2 Session control Session management controls the acceptable maximum simultaneous sessions of Intranet PCs. This function is very useful for managing connection quantity when P2P software such as BT, Thunder, or emule is used in the Intranet causing large numbers of sessions. Setting up proper limitations on sessions can effectively control the sessions created by P2P software.
  • Page 97 When single IP exceed __: If this function is selected, when the user’s port session reach the limit, this user will not be able to make a new session for five minutes. Even if the previous session has been closed, new sessions cannot be made until the setting time ends.
  • Page 98 Exempted Service Port or IP Address Service Port: Choose the service port. Source IP: Input the IP address range or IP group. Enabled: Activate the rule. Add to list: Add this rule to the list. Delete seleted item: Remove the rules selected from the Service List. Click “Apply”...
  • Page 99: Smart Qos

    9.3 Smart QoS The smart QoS function enables the administrators to constrain the bandwidth occupied automatically without any configuring. Enabled QoS: Choose to apply QoS function. When the usage of any WAN’s bandwidth is Input the required rate value into the column. The over than___%, Enable Smart QoS default is 60%.
  • Page 100 If “Always” is selected, the rule will be executed around Scheduling: the clock. If “From…” is selected, the rule will be executed according to the configured time range. For example, if the time control is from Monday to Friday, 8:00am to 6:00pm, users can refer to the following figure to set up the rule.
  • Page 101: Firewall

    Firewall This chapter introduces firewall general policy, access rule, and content filter settings to ensure network security. 10.1 General Policy The firewall is enabled by default. If the firewall is set as disabled, features such as SPI, DoS, and outbound packet responses will be turned off automatically. Meanwhile, the remote management feature will be activated.
  • Page 102 DoS (Denial of Service): This averts DoS attacks such as SYN Flooding, Smurf, LAND, Ping of Death, IP Spoofing and so on. Block WAN request: If set as Enabled, then it will shut down outbound ICMP and abnormal packet responses in connection. If users try to ping the WAN IP from the external, this will not work because the default value is set as activated in order to decline the outbound responses.
  • Page 103 Advanced Setting Packet Type: This device provides three types of data packet transmission: TCP-SYN-Flood, UDP-Flood and ICMP-Flood. WAN Threshold: When all packet values from external attack or from single external IP attack reach the maximum amount (the default is 15000 packets/Sec and 2000 packets/Sec respectively), if these conditions above occurs, the IP will be blocked for 5 minutes ( the default is 5 minutes OBJ 176 ).
  • Page 104 Show Blocked IP: Show the blocked IP list and the remained blocked time. Restricted WEB It supports the block that is connected through: Java, Cookies, Active X, Features: and HTTP Proxy access. Click “Apply” to save the configuration. Apply: Click “Cancel" to leave without making any change. Cancel:...
  • Page 105: Access Rule

    10.2 Access Rule Users may turn on/off the setting to permit or forbid any packet to access internet. Users may select to set different network access rules: from internal to external or from external to internal. Users may set different packets for IP address and communication port numbers to filter Internet access rules. Network access rule follows IP address, destination IP address, and IP communications protocol status to manage the network packet traffic and make sure whether their access is allowed by the firewall.
  • Page 106: Add New Access Rule

    Edit: Define the network access rule item Delete: Remove the item. Add New Rule: Create a new network access rule Restore to Default Restore all settings to the default values and delete all the self-defined Rule: settings. 10.2.1 Add New Access Rule Action:...
  • Page 107 Create Log when matched: Event will be recorded in the log. Source Interface: Select the source port whether users are permitted or not (for example: LAN, WAN1, WAN2 or Any). Select from the drop-down menu. Source IP: Select the source IP range (for example: Any, Single, Range, or preset IP group name).
  • Page 108 Example 2.:How to forbid intranet IP range from 192.168.1.200 to 230 to access service port 80? Action:Forbid Service Port:TCP 80 Source Interface:LAN (Meaning to service port 80 which blocks the traffic from intranet to internet.) Source IP:192.168.1.200~192.168.1.230 Dest. IP:ANY (Meaning to any service port 80 which blocks the traffic from intranet to internet among 192.168.1.200~230.)
  • Page 109: Content Filter

    10.3 Content Filter The device supports two webpage restriction modes: one is to block certain forbidden domains, and the other is to give access to certain web pages. Only one of these two modes can be selected. Block Forbidden Domain Fill in the complete website such as www.sex.com to have it blocked.
  • Page 110 Add: Enter the websites to be controlled such as www.playboy.com Click ”Add to list” to create a new website to be controlled. Add to list: Delete selected item: Click to select one or more controlled websites and click this option to delete.
  • Page 111 Website Blocking by Keywords: Enabled: Click to activate this feature. The default setting is disabled. For example: If users enter the string ”sex”, any websites containing ”sex” will be blocked. Enter keywords. Keywords(Only for English keyword) : Add this new service item content to the list. Add to List:...
  • Page 112 Activate the function. The default setting is “Disabled.” Enabled: Input the allowed domain name, etc. www.google.com Add: Add the rule to list. Add to list: Users can select one or more rules and click to delete. Delete selected item: Exception IP Here IP/IP ranges are exempted from “Accept Allowed Domain”...
  • Page 113 Exception IP address Input unrestricted IP/IP Range Click this button to add new unrestricted IPs Add to list: Delete selected item: Select out one/more unrestricted IPs, click this button to delete them Content Filter Scheduling Select “Always” to apply the rule on a round-the-clock basis. Select “from”, and the operation will run according to the defined time.
  • Page 114: L7 Management

    XI. L7 Management 11.1 L7 Filter (1) Rule list:...
  • Page 115 (2) Add new rule: click...
  • Page 116 Below are the steps for rule setting with an exmple in the enterprise: Step 1: Name the rule The name of the rule will be shown on the list, so administrator could name the rule by users or usages. Step 2: Choose the application ※Figures are used for reference.
  • Page 117 Step 4: Set exceptaional users (IP or QQ number)  Administrator can set IP address or QQ numbers (if QQ is blocked) in the exceptional user setting.  Please note that the exceptional user setting will be applied to all the rules in the application. For example, if there is a Google Talk rule with no exceptional IP, when adding a new Google Talk rule with the exceptional IP 192.168.1.100, 192.168.1.100 could use Google Talk anyway no matter applied to the original rule or the new rule.
  • Page 118: L7 Vip Priority Channel

    11.2 L7 VIP Priority Channel (1) Rule List: (2) Add New Rule: Click...
  • Page 119 Step1: Basic Setting The name of the rule will be shown on the list, so administrator could name the rule by users or usages. Select one WAN as VIP. For example, only the traffic of president room on WAN1 and WAN2 is VIP, traffic on other WAN ports is not VIP.
  • Page 120 Step2: Set Application or IP as VIP  Set application as VIP. For instance, [Webpage] is selected. When the system recognizes the IP is using webpage service, the system will give VIP priority.  Set source IP/Group as VIP. For instance, if [General Manager Room] IP group is chosen, they will have VIP priority no matter what application is used.
  • Page 121 Take a community for an example: The community will ensure VIP authority when internal users browse webpage, the administrator should check [VIP Application] and [webpage] at Item column. ※Figures are used for reference. Please visit the official website for the actual application support list. After choosing [Category], the [Item] column will show the crosponding list.
  • Page 122 Step 4: Click to save the rules.
  • Page 123: L7 Qos

    11.3 L7 QoS (1) Rule List:...
  • Page 124 The Maximum Bandwidth provided by ISP: This table is relative to general QoS function. Filling WAN Upstream/Downstream bandwidth with realistic broadband network bandwidth which user applying by ISP, QoS Bandwidth control is according to the bandwidth number that user filling to calculate. Click to save the set-up.
  • Page 125 (2) Add New Rule:Click...
  • Page 126 Step 1: Name the rule The name of the rule will be shown on the list, so administrator could name the rule by users or usages. Step 2: Choose the application ※Figures are used for reference. Please visit the official website for the actual application support list. After choosing [Category], the [Item] column will show the crosponding list.
  • Page 127 Step 3: QoS Configuration Interface Select on which WAN the QoS rule should be executed. It can be a single selection or multiple selections. Source IP/Group This is to select which user is to be controlled. If only a single IP is to be restricted, input this IP address, such as “192.168.1.100 to 100”.
  • Page 128 Step 4: Make sure the time setting is correct to make the rule in effective only during the set time. All time is set as the default. The time frame could be modified in the following settings. Step 5: Click to save the rule setting.
  • Page 129: Application Define

    11.4 Application Define When you set up the L7 Management rules, not only you can select the application that is defined by Qno, but also you can add your own L7 applications by the URL, destination IP address or the port number.
  • Page 130 Application Define-Add New Rule Step 1:Name the Application Step 2:Define the application by the URL, destination or the port number. The definable parameter as below: Dest. IP If only a single IP is to be restricted, input this IP address, such as “100.100.100.105”.
  • Page 131: Applicatios Status

    11.5 Applicatios Status The Administrator can check the whole applied applications from the Application Status function, including the ID of the policies. ※Figures are used for reference. Please visit the official website for the actual application support list. Sorting and ordering Sorting the applications or ordering the applications by the name.
  • Page 132: Database Update

    11.6 Database Update Database Update function provides administrator to know the server side informations on this web page whether the newest version to update, moreover to set-up the update time of database and version check frequency.
  • Page 133 Version Check: Version status check When your router connected with database server and the availible new version has field been checked to download, the prompt of version status, newest version number and file size will be displayed on this filed. Download Now Download this version immediately after click this button.
  • Page 134 Automatic Version Check: Enable Automatic Version Adjust the frequency of server version check time. Check Every__Hours Disable System will not update the database automatically, administrator can still use to comfirm if the server has the newest version or to adjust the check frequency manually.
  • Page 135: Vpn (Virtual Private Network)

    XII. VPN (Virtual Private Network) 10.1. VPN...
  • Page 136: Add A New Vpn Tunnel

    10.1.1. Add a New VPN Tunnel The device supports Gateway to Gateway tunnel or Client to Gateway tunnel. The VPN tunnel connections are done by 2 VPN devices via the Internet. When a new tunnel is added, the setting page for Gateway to Gateway or Client to Gateway will be displayed. Gateway to Gateway:...
  • Page 137 10.1.1.1. Gateway to Gateway Setting The following instructions will guide users to set a VPN tunnel between two devices. Tunnel No.: Set the embedded VPN feature, please select the Tunnel number. Displays the current VPN tunnel connection name, such as XXX Office. Users Tunnel Name:...
  • Page 138 This local gateway authentication type comes with five operation Local Security modes, which are: GatewayType: IP only IP + Domain Name (FQDN) Authentication IP + E-mail Addr. (USER FQDN) Authentication Dynamic IP + Domain Name (FQDN) Authentication Dynamic IP + E-mail Addr. (USER FQDN) Authentication. Dynamic IP address + Email address name (1) IP only: If users decide to use IP only, entering the IP address is the only way...
  • Page 139 (4) Dynamic IP + Domain Name(FQDN) Authentication: If users use dynamic IP address to connect to the device, users may select this option to link to VPN. If the remote VPN gateway requires connection to the device for VPN connection, this device will start authentication and respond to this VPN tunnel connection;...
  • Page 140 IP address of 192.168.1.0 can establish connection. 2. Subnet This option allows local computers in this subnet can be connected to the VPN tunnel. Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.
  • Page 141 If users select the IP Only type, entering this IP allows users to gain access to this tunnel. If the IP address of the remote client is unknown, choose IP by DNS Resolved, allowing DNS to translate IP address. When users finish the setting, the corresponding IP address will be displayed under the remote gateway of Summary.
  • Page 142 If the remote IP address is unknown, choose IP by DNS Resolved, allowing DNS to translated the IP address. This domain name must be available on the Internet. When users finish the setting, the corresponding IP address will be displayed under the remote gateway of Summary.
  • Page 143 This option allows users to set the remote VPN connection access Remote Security Group type. The following offers a few items for remote settings. Please Type: select and set appropriate parameters: (1) IP address This option allows the only IP address which is entered to build the VPN tunnel.
  • Page 144 IPSec Setup If there is any encryption mechanism, the encryption mechanism of these two VPN tunnels must be identical in order to create connection. And the transmission data must be encrypted with IPSec key, which is known as the encryption "key". The device provides the IKE automatic encryption mode- IKE with Preshared Key (automatic).
  • Page 145  Perfect Forward Secrecy: When users check the PFS option, don't forget to activate the PFS function of the VPN device and the VPN Client as well.  Phase 1/ Phase 2 DH Group: This option allows users to select Diffie-Hellman groups: Group 1/ Group 2/ Group 5.
  • Page 146 Advanced Setting- for IKE Protocol Only The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is set to VPN operation mode. The connection is the same to most of the VPN devices. Aggressive Mode: This mode is mostly adopted by remote devices. The IP connection is ●...
  • Page 147 Heart Beat:VPN Tunnel Heart Beat Detection function。 ● If this option is selected, the system will sent ICMP ACK packet to the remote host with VPN tunnel regularly; the remote host will also send an ICMP ACK reply packet toward the originator. If there is still no received ICMP ACK reply after exceeding the setting retry, the Heart Beat originator will terminate this VPN tunnel.
  • Page 148 10.1.1.2. Client to Gateway Setting The following describes how an administrator builds a VPN tunnel between devices. Users can set this VPN tunnel to be used by one client at the client end. If it is used by a group of clients, the individual setting for remote clients can be reduced.
  • Page 149 Local Group Setup This local gateway authentication type (Local Security Gateway Type) must be identical with that of the remote type (Remote Security Gateway Type). This local gateway authentication type comes with five operation Local Security Gateway modes, which are: Type:...
  • Page 150 If users select IP address and E-mail, enter the IP address and E-mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space. Users don't need to do further settings. (4) Dynamic IP + Domain Name(FQDN) Authentication: If users use dynamic IP address to connect to the device, users may select this option to link to VPN.
  • Page 151 Reference: When this VPN tunnel is connected, computers with the IP address of 192.168.1.0 can establish connection. 2. Subnet This option allows local computers in this subnet to be connected to the VPN tunnel. Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.
  • Page 152 Remote Group Setup: This remote gateway authentication type (Remote Security Gateway Type) must be identical to the remotely-connected local security gateway authentication type (Local Security Gateway Type). This local gateway authentication type comes with five operation Remote Security Gateway modes, which are: Type:...
  • Page 153 gateway setting type to establish successful connection. (3) IP + E-mail Addr. (USER FQDN) Authentication. If users select IP address and E-mail, enter the IP address and E-mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space. Users don't need to do further settings.
  • Page 154 IPSec Setup If there is any encryption mechanism, the encryption mechanism of these two VPN tunnels must be identical in order to create connection. And the transmission data must be encrypted with IPSec key, which is known as the encryption "key". The device provides the IKE automatic encryption mode- IKE with Preshared Key (automatic).
  • Page 155  Perfect Forward Secrecy: When users check the PFS option, don't forget to activate the PFS function of the VPN device and the VPN Client as well.  Phase 1/ Phase 2 DH Group: This option allows users to select Diffie-Hellman groups: Group 1/ Group 2/ Group 5.
  • Page 156 Advanced Setting- for IKE Protocol Only The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is set to VPN operation mode. The connection is the same to most of the VPN devices. Aggressive Mode: This mode is mostly adopted by remote devices. The IP connection is ●...
  • Page 157: Pptp Server

    Heart Beat:VPN Tunnel Heart Beat Detection function。 ● If this option is selected, the system will sent ICMP ACK packet to the remote host with VPN tunnel regularly; the remote host will also send an ICMP ACK reply packet toward the originator. If there is still no received ICMP ACK reply after exceeding the setting retry, the Heart Beat originator will terminate this VPN tunnel.
  • Page 158 Enabled PPTP Server: When this option is selected, the point-to-point tunnel protocol PPTP server can be enabled. PPTP IP Address Range: Please enter PPTP IP address range so as to provide the remote...
  • Page 159: Vpn Pass Through

    users with an entrance IP into the local network. Enter Range Start: Enter the value into the last field. Enter Range End: Enter the value into the last field. Please enter the name of the remote user. User name: Enter the password and confirm again by entering the new password. Password:...
  • Page 160: Qvm Vpn Function Setup

    10.2. QVM VPN Function Setup The QVM-series device provides three major convenient functions: 1. Smart Link IPSec VPN: Easy VPN setup replaces the conventional complicated VPN setup process by entering Server IP, User Name, and Password. 2. Central Control Feature: Displays a clear VPN connection status of all remote ends and branches.
  • Page 161 Password: Must be identical to that of the server password. Confirm Password: Please enter the password and confirm again. QVM VPN ( IP Address or Input QVM VPN Server IP address or domain name. Dynamic Domain Name) : Status: Displays QVN connection status. Keep Alive: Redial Period This function is to set re- connect duration if QVM contention drops.
  • Page 162: Advanced Function

    XIII. Advanced Function 11.1 DMZ Host/ Port Range Forwarding 11.1.1 DMZ Host When the NAT mode is activated, sometimes users may need to use applications that do not support virtual IP addresses such as network games. We recommend that users map the device actual WAN IP addresses directly to the Intranet virtual IP addresses, as follows: If the “DMZ Host”...
  • Page 163 (the Internet IP addresses) with Port 80 (the service port of WWW is Port 80) to access the internal server directly. In the configuration page, if a web server address such as 192.168.1.50 and the Port 80 has been set up in the configuration, this web page will be accessible from the Internet by keying in the device actual IP address such as, http://211.243.220.43.
  • Page 164 activate is not in the list, we recommend that users use “Service Port Management” to add or remove ports, as follows: Service Name: Input the name of the service port users want to activate on the list, such as E-donkey, etc. Protocol:...
  • Page 165: Upnp

    11.2 UPnP UPnP (Universal Plug and Play) is a protocol set by Microsoft. If the virtual host supports UPnP system (such as Windows XP), users could also activate the PC UPnP function to work with the device. Service Port: Select the UPnP service number default list here; for example, WWW is 80~80, FTP is 21~21.
  • Page 166: Routing

    11.3 Routing In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing Information Protocol. When there are more than one router and IP subnets, the routing mode for the device should be configured as static routing. Static routing enables different network nodes to seek necessary paths automatically.
  • Page 167 Dest. IP: Input the remote network IP locations and subnet that is to be Subnet Mask: routed. For example, the IP/subnet is 192.168.2.0/255.255.255.0. Gateway: The default gateway location of the network node which is to be routed. Hop Count: This is the router layer count for the IP. If there are two routers under the device, users should input “2”...
  • Page 168: One To One Nat

    11.4 One to One NAT As both the device and ATU-R need only one actual IP, if ISP issued more than one actual IP (such as eight ADSL static IP addresses or more), users can map the remaining real IP addresses to the intranet PC virtual IP addresses.
  • Page 169 Enabled One to One NAT: To activate or close the One-to-One NAT function. (Check to activate the function). Private IP Range Begin: Input the Private IP address for the Intranet One-to-One NAT function. Public IP Range Begin: Input the Public IP address for the Internet One-to-One NAT function. Range Length:...
  • Page 170: Ddns- Dynamic Domain Name Service

    IP of a cable modem will be changed from time to time. To overcome this problem for users who want to build services such as a website, it offers the function of dynamic web address transfer. This service can be applied from http://www.qno.cn/en/ddns, www.3322.org, www.dyndns.org, or www.dtdns.com, and these are free.
  • Page 171 * The UI might vary from model to model, depending on different product lines. Interface This is an indication of the WAN port the user has selected. DDNS Check either of the boxes before DynDNS.org, 3322.org, DtDNS.com and QnoDDNS.org.cn to select one of the four DDNS website address transfer functions.
  • Page 172 After the changes are completed, click “Apply” to save the network Apply configuration modification. Click “Cancel" to leave without making any changes. Cancel Register for Qno DDNS 1. Please go to Qno website and register the product at http://www.qno.cn/en/register...
  • Page 173 2. Input the e-mail address which users used to register this product and the serial number of the product to log in to the QnoDDNS Service System. Be sure to input an available e-mail address so that the password sent from the system to activate QnoDDNS service can be received after the domain name registration.
  • Page 174 3. Rules for Applying a Domain Name: ●The Domain should have at least 4 letters and no more than 63 letters. ●The Domain name should only consist of a-z (lowercase letter) and 0-9 (numerals) and the first character should be an English letter.
  • Page 176: Mac Clone

    11.6 MAC Clone Some ISP will request for a fixed MAC address (network card physical address) for distributing IP address, which is mostly suitable for cable mode users. Users can input the network card physical address (MAC address: 00-xx-xx-xx-xx-xx) here. The device will adopt this MAC address when requesting IP address from ISP.
  • Page 177: System Tool

    XIV. System Tool This chapter introduces the management tool for controlling the device and testing network connection. For security consideration, we strongly suggest to change the password. Password and Time setting is in Chapter 5.2. 12.1 Diagnostic The device provides a simple online network diagnostic tool to help users troubleshoot network-related problems.
  • Page 178 Ping This item informs users of the status quo of the outbound session and allows the user to know the existence of computers online. On this test screen, please enter the host IP that users want to test such as 192.168.5.20. Press "Go"...
  • Page 179: Firmware Upgrade

    12.2 Firmware Upgrade Users may directly upgrade the device firmware on the Firmware Upgrade page. Please confirm all information about the software version in advance. Select and browse the software file, click "Firmware Upgrade Right Now" to complete the upgrade of the designated file. Note!...
  • Page 180: Configuration Backup

    12.3 Configuration Backup Import Configuration File: This feature allows users to integrate all backup content of parameter settings into the device. Before upgrade, confirm all information about the software version. Select and browse the backup parameter file: "config.exp." Select the file and click "Import" to import the file. Export Configuration File:...
  • Page 181: Snmp

    12.4 SNMP Simple Network Management Protocol (SNMP) refers to network management communications protocol and it is also an important network management item. Through this SNMP communications protocol, programs with network management (i.e. SNMP Tools-HP Open View) can help communications of real-time management. The device supports standard SNMP v1/v2c and is consistent with SNMP network management software so as to get hold on to the operation of the online devices and the real-time network information.
  • Page 182 Enabled: Activate SNMP feature. The default is activated. Set the name of the device such as Qno. System Name: Set the name of the person who manages the device (i.e. John). System Contact: Define the location of the device (i.e. Taipei).
  • Page 183: System Recover

    12.5 System Recover Users can restart the device with System Recover button. System Recover As the figure below, if clicking “Restart Router” button, the dialog block will pop out, confirming if users would like to restart the device.
  • Page 184 Return to Factory Default Setting If clicking “Return to Factory Default Setting, the dialog block will pop out, if the device will return to factory default.
  • Page 185: Log

    XV. Log From the log management and look up, we can see the relevant operation status, which is convenient for us to facilitate the setup and operation. 13.1 System Log Its system log offers three options: system log, E-mail alert, and log setting. System Log Enable:...
  • Page 186 Syslog Server: The device provides external system log servers with log collection feature. System log is an industrial standard communications protocol. It is designed to dynamically capture related system message from the network. The system log provides the source and the destination IP addresses during the connection, service number, and type.
  • Page 187 General Log The device provides the following warning message. Click to activate the feature. System error message, blocked regulations, regulation of passage permission, system configuration change and registration verification. System Error Message : Provides the system log with all kinds of error messages. For example, wrong settings, occurrence of abnormal functions, system reactivation, disconnection of PPPoE and so on.
  • Page 188 Outgoing Packet Log: View system packet log which is sent out from the internal PC to the Internet. This log includes LAN IP, destination IP, and service port that is applied. It is illustrated as below.
  • Page 189 Incoming Packet Log: View system packet log of those entering the firewall. The log includes information about the external source IP addresses, destination IP addresses, and service ports. It is illustrated as below. Clear Log Now: This feature clears all the current information on the log.
  • Page 190: System Statistic

    13.2 System Statistic The device has the real-time surveillance management feature that provides system current operation information such as port location, device name, current WAN link status, IP address, MAC address, subnet mask, default gateway, DNS, number of received/ sent/ total packets , number of received/ sent/ total Bytes, Received and Sent Bytes/Sec., total number of error packets received, total number of the packets dropped, number of session, number of the new Session/Sec., and upstream as well as downstream broadband usage (%).
  • Page 191: Traffic Statistic

    13.3 Traffic Statistic Six messages will be displayed on the Traffic Statistic page to provide better traffic management and control. Inbound IP Source Address: The figure displays the source IP address, bytes per second, and percentage. Outbound IP Source Address: The figure displays the source IP address, bytes per second, and percentage.
  • Page 192 Inbound IP Service: The figure displays the network protocol type, destination IP address, bytes per second, and percentage. Outbound IP Service: The figure displays the network protocol type, destination IP address, bytes per second, and percentage.
  • Page 193: Ip/ Port Statistic

    Inbound IP Session: The figure displays the source IP address, network protocol type, source port, destination IP address, destination port, bytes per second and percentage. Outbound Session: The figure displays the source IP address, network protocol type, source port, destination IP address, destination port, bytes per second and percentage.
  • Page 194 Specific IP Status: Enter the IP address that users want to inquire, and then the entire destination IP connected to remote devices as well as the number of ports will be displayed. Specific Port Status: Enter the service port number in the field and IP that are currently used by this port will be displayed.
  • Page 196: Log Out

    XVI. Log out On the top right corner of the web- based UI, there is a Logout button. Click on it to log out of the web- based UI. To enter next time, open the Web browser and enter the IP address, user name and password to log in.
  • Page 197: Appendix I:troubleshooting

    Appendix I:Troubleshooting (1) Block BT Download To block BT and prevent downloading by users, go to the “Firewall -> Content Filter" and select "Enable Website Block by Keywords," followed by the input of "torrent." This will prevent the users from downloading.
  • Page 198: 2)Shock Wave And Worm Virus Prevention

    (2)Shock Wave and Worm Virus Prevention Since many users have been attacked by Shock Wave and Worm viruses recently, the internet transmission speed was brought down and the Session bulky increase result in the massive processing load of the device. The following guides users to block this virus' corresponding port for prevention. a.
  • Page 199 Use the same method to add UDP [UDP135~139] and TCP [445~445] Ports. c. Enhance the priority level of these three to the highest.
  • Page 200: 3)Block Qqlive Video Broadcast Setting

    If the login onto the QQLive Server is blocked, the issue can be resolved. The following relates to Qno products and provides users with solutions by introducing users how to set up the device. a). Log into the device web- based UI, and enter “Firewall -> Access Rule’.
  • Page 201 121.14.75.115 60.28.234.117 60.28.235.119 222.28.155.17 QQ LiveVersion:QQ Live 2008 (7.0.4017.0) Tested on: 2008-07-29 After repeated addition, users may see the links to the QQLive Server blocked. Click "Apply" to block QQLive video broadcast.
  • Page 202: 4)Arp Virus Attack Prevention

    (4)ARP Virus Attack Prevention ARP Issue and Information Recently, many cyber cafes in China experienced disconnection (partially or totally) for a short period of time, but connection is resumed quickly. This is caused by the clash with MAC address. When virus-contained MAC mirrors to such NAT equipments as host devices, there is complete disconnection within the network.
  • Page 203 For these two situations, the device and client setup must be done to prevent ARP virus attack, which is to guarantee the complete resolution of the issue. The device selection is advised to take into consideration the one with anti-ARP virus attack. Qno products come squarely with such a feature, which is very user-friendly compared to other products.
  • Page 204 Now we understand ARP, ARP cheat and attack, as well as how to identify this type of attack. What comes next is to find out effective prevention measures to stop the network from being attacked. The general solution provided by Qno can be divided into the following three options: a) Enable “Prevent ARP Virus Attack”: Enter the device IP address to log in the management webpage of the device.
  • Page 205 b) Bind the Gateway IP and MAC address for each PC This prevents the ARP from cheating IP and its MAC address. First, find out the gateway IP and MAC address on the device end. On every PC, start or operate cmd to enter the dos operation. Enter arp –s 192.168.1.1 0a-0f-d4-9e-fb-0b so as to finish the binding of pc01 as illustrated.
  • Page 206 address of the gateway is the same with the device MAC address. If not, the PC corresponding to the MAC address is the source of attack. Solutions for other device users are to make a two-way binding of the IP address and MAC address from both of the PC and device ends in order to carry out the prevention work.
  • Page 207 After an item is added to the list, the corresponding message will be displayed in the white block on the bottom. However, such method is not recommended because the inquiry of IP/MAC addresses of all hosts creates heavy workload. Another method to bind IP and MAC is more recommended because of easy operation, reducing workload and time efficiency.
  • Page 208 Now the bound options will display on the IP and MAC binding list (as illustrated in Figure 5) and click "Apply” to finish binding. Though these basic operations can help solve the problem but Qno's technical engineers suggest that further measures should be taken to prevent the ARP attack.
  • Page 209 2. Cyber café administrators should check the LAN virus, install anti-virus software (Ginshan Virus/Reixin must update the virus codes) and conduct virus scanning for the device. 3. Install the patch program for the system. Through Windows Update, the system patch program (critical update, security update and Service Pack) 4.
  • Page 210: Appendix Ii:qno Technical Support Information

    For more information about the Qno's product and technology, please log onto the Qno's bandwidth forum, refer to the examples of the FTP server, or contact the technical department of Qno's dealers as well as the Qno's Mainland technical center.

Table of Contents