Planex BRC-14VG User Manual

4-port vpn (virtual private network) broadband router
Table of Contents

Advertisement

Quick Links

4-Port VPN (Virtual Private Network)
Broadband Router
BRC-14VG

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BRC-14VG and is the answer not in the manual?

Questions and answers

Summary of Contents for Planex BRC-14VG

  • Page 1 4-Port VPN (Virtual Private Network) Broadband Router BRC-14VG...
  • Page 2 Please Read Before Using the Product Objective Thank you for your purchase of PLANEX product. This document shows you how to use the product properly. Please keep it in a safe place so that you can view it whenever necessary.
  • Page 3 Important Safety Instructions Before using the product, be sure to read and adhere to the following safety guidelines. Hazardous conditions including electric shock, fire or product failure may result if these guidelines are not followed. Such hazardous conditions may cause death or serious injury to the user. Should the product ignite, emit smoke or melt, please stop using the product immediately and contact our technical support.
  • Page 4 About Product Handling - Avoid direct contact with the product. During its operation, the temperature of product surface may become quite high. Direct contact with the product surface may result in a burn. - Do not store the product in humid or dusty locations. Storing the product in such places may result in electric shock, fire, product malfunctioning or failure.
  • Page 5: Table Of Contents

    Table of Contents Chapter 1 Introduction..................... 9 1.1 Overview ........................9 1.2 Key Features......................10 1.3 Package Contents ..................... 13 1.4 Parts Terminology...................... 14 1.5 System Requirements ....................16 1.6 Initializing Configuration .................... 17 Chapter 2 Hardware Installation..................18 Chapter 3 Connecting to the Internet ................20 3.1 Connecting to the management console ..............
  • Page 6 4.7 UPnP Configuration....................67 4.7.1 Verifying the UPnP configuration of your computer ........67 4.7.2 Disabling UPnP....................73 Chapter 5 Security configuration.................. 76 5.1 Security ........................76 5.2 Defining Security Level....................77 5.3 Packet Filtering Configuration ................... 79 5.3.1 Configuring Packet Filter ................. 79 5.3.2 Creating a new service..................
  • Page 7 7.2.2 Deleting a PPTP Client................... 172 7.2.3 Configuring the Advanced Options of PPTP Server ........174 7.2.4 Advanced Configuration of IPSec ..............177 7.2.5 Manually Configuring Key Exchange Method..........181 7.2.6 Connecting and Disconnecting a VPN Connection........182 7.2.7 Recreating Key ....................183 7.2.8 IPSec Log Configuration .................
  • Page 8 Chapter 11 Configuring File Server ................245 11.1 Using a USB Storage Device to Set Up a File Server..........245 11.1.1 Using a USB Storage Device................. 245 11.1.2 Attaching a USB storage device to the product ........... 245 11.1.3 Creating and formatting a partition............. 247 11.1.4 Creating a Partition ..................
  • Page 9: Chapter 1 Introduction

    USB camera. ADSL Modem CATV Cable Modem Caution: Either the use of a VPN router like the BRC-14VG or access from multiple PC's may be restricted by some ISP's. Please be sure to carefully review your ISP's term of use.
  • Page 10: Key Features

    The product supports multiple global IP address service offered by your ISP and let i)global IP address host and ii)private address host coexist on the LAN side of the router. Furthermore, the BRC-14VG allows private address host to communicate with global address host without using any special settings/configuration.
  • Page 11 DHCP Server The router uses this function to dynamically assign an IP address to a PC on the LAN side or network device. The time and range of IP addresses being assigned can be freely adjusted and scheduled, and you can even configure the product so that only a certain device is always assigned the same IP address Simple DNS Server This function manages the host name and IP address information of the PC's and...
  • Page 12 required when you are using the product's option feature(s). URL Filter Web sites registered via this function cannot be accessed from users of PC's on the LAN side. Security Log The router is capable of saving LAN-to-Internet as well as Internet-LAN access log of the configuration screen for each permitted and denied connection.
  • Page 13: Package Contents

    1.3 Package Contents Please verify that the product package contains all of the following parts. . BRC-14VG Quick Installation Guide CD-ROM (User’s Manual) AC Adapter UTP Straight-through LAN Cable (1m) Warranty Card Please contact our technical support if any of the above components is missing.
  • Page 14: Parts Terminology

    1.4 Parts Terminology Front View [LED Status] Status LED Yellow Flashing Booting the product Green The boot process was successful Power LED Green The power is on The power is off LAN 100 LED Green There is a 100M link on LAN port There is a 10M link on LAN port Link/Act LED Green...
  • Page 15 Rear View USB Port WAN Port LAN Port Reset Switch Power ON/OFF DC Power Jack Back View WAN: WAN side MAC address LAN: LAN side MAC address...
  • Page 16: System Requirements

    1.5 System Requirements Supported Platforms 1) Windows 98/98SE/Me/2000/XP PC equipped with an Ethernet (RJ-45) port 2) MacOS 8.x/9.x/X computer equipped with an Ethernet (RJ-45) port Required Networking Equipment A twisted-pair cable x n (n= the number of computers attached to the product) About Web Configuration Screen The system configuration of the product is adjusted via a Web browser.
  • Page 17: Initializing Configuration

    1.6 Initializing Configuration In case you forget the IP address and password of the product OR configure incorrect values and the configuration screen is not accessible, you can initialize the system configuration to restore the factory-default settings of the router. Caution: Please note that all the parameters configured prior to initialization will be deleted.
  • Page 18: Chapter 2 Hardware Installation

    DSL/Cable modem are powered OFF. (3) Connect LAN Cables Use standard LAN cable to connect PCs to the switching hub ports on the BRC-14VG. Both 10BaseT and 100BaseT connections can be used simultaneously. If required, connect any port to a normal port on another hub, using a standard LAN cable.
  • Page 19 (4) Connect WAN Cable Connect the DSL or Cable modem to the WAN port on the BRC-14VG. Use the cable supplied with your DSL/Cable modem. If no cable was supplied, use a standard cable. (5) Power Up • Power on the Cable or DSL modem.
  • Page 20: Chapter 3 Connecting To The Internet

    Chapter 3 Connecting to the Internet 3.1 Connecting to the management console Using a computer that is already attached to the BRC-14VG, start a Web browser and enter http://192.168.1.1/ in the address field. Enter “http://192.168.1.1/” The first time [Login Setup] screen will be displayed. Specify the login user name and login password to access the management console.
  • Page 21 (2) New Password Enter a new password (1 to 64 alphanumeric characters). The characters entered in this field will be displayed as "*". (3) Retype new password Enter the same password for verification. Click [OK]. Click The management console will be displayed.
  • Page 22 Click on [Connection Wizard] icon on the left side of the screen. Click After steps of configure depends on your ISP.
  • Page 23: For Cable Modem

    3.2 For Cable Modem 1. Select [Internet Connection] and click [Next]. Select Click 2. Select [Ethernet Connection] and click [Next]. Select Click...
  • Page 24 3. Select [Dynamic Negotiation (DHCP)] and click [Next]. Select Click 4. [Connection Summary] screen will be displayed. Verify the new settings, and click [Finish]. The product will now automatically obtain an IP address from your ISP. Click...
  • Page 25: For Adsl (Static Ip)

    3.3 For ADSL (Static IP) 1. Select [Internet Connection] and click [Next]. Select Click 2. Select [Ethernet Connection] and click [Next]. Select Click...
  • Page 26 3. Select [Manual IP Address Configuration] and click [Next]. Select Click 4. [Manual IP Address configuration] page will be displayed. Refer to the information provided by your ISP, and enter [IP Address], [Subnet Mask], [Default Gateway], [Primary DNS Server] and [Secondary DNS Server] addresses. Click [Next]. Enter data Click...
  • Page 27 5. [Connection Summary] screen will be displayed. Verify the information displayed and click [Finish]. Click...
  • Page 28: For Pppoe

    3.4 For PPPoE 1. Select [Internet Connection] and click [Next]. Select Click 2. Select [External DSL Modem] and click [Next]. Select Click...
  • Page 29 3. [External DSL Modem] screen will be displayed. Refer to the information provided by your ISP, and enter the [Login User Name] and [Login Password] of the ISP. Click [Next]. Enter data Click 4. [Connection Summary] screen will be displayed. Verify the information displayed, and Click [Finish].
  • Page 30: Chapter 4 Lan Side Configuration

    Chapter 4 LAN Side Configuration This chapter describes how to configure the LAN-side parameters of the product. 4.1 IP Address Configuration This section describes how to verify and modify IP address of LAN port(s) on the product. Caution: Please be sure to assign a valid IP address to the product. Assigning an incorrect or invalid address to it may result in failure to connect to the Internet.
  • Page 31 [Network Connections] page Click on the button 3. Click [Settings]. [LAN Ethernet Properties] page Click 4. The LAN port IP address of the product is shown in the [IP Address] field. To change IP address, modify the displayed values as needed.
  • Page 32 [Configure LAN Ethernet] page Enter new values as needed 5. Click on the [OK] button at the bottom of the page. [LAN Ethernet Properties] page will be displayed again. *If [Attention] page is displayed after clicking on the OK button, verify the information displayed and click [OK].
  • Page 33: Napt (Ip Masquerading)

    4.2 NAPT (IP Masquerading) The router supports NAPT as its routing mode. NAPT (also known as IP masquerading) converts multiple private IP addresses to one global IP address. This function is used when i)there are multiple PC’s on the LAN side with private IP address and ii) all the PC’s need to connect to the Internet via a single global IP address.
  • Page 34: Dhcp Server Configuration

    4.3 DHCP Server Configuration The built-in DHCP server function automatically assigns a unique IP address to every PC or networking device in the network as it is connected to the LAN. Ex) LAN port IP address of the product is 192.168.1.1 while the first IP address to be assigned 192.168.1.11...
  • Page 35 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [IP Address Distribution] icon. [Advanced] window Click 3. The subnet and dynamic IP range of DHCP server will be displayed. To modify any of the values, click on the button.
  • Page 36 [IP Address Distribution] window Click on the button 4. [DHCP Settings for LAN Ethernet] window will be displayed. Enter the range IP addresses to be assigned, subnet mask and least time. Click [OK]. [DHCP Settings for LAN Ethernet] window Input values Click [DHCP Server] Enables DHCP server function...
  • Page 37: Assigning A Static Ip Address Via Dhcp Server

    4.3.2 Assigning a static IP address via DHCP server This section provides the procedure to configure the DHCP server function to always assign a static IP address to a specific PC or network device. 1. Click on the [Advanced] icon on the side bar. Click 2.
  • Page 38 3. Click on the [Connection List] button. [IP Address Distribution] window Click 4. Click on the button in the [New Static Connection] field. [DHCP Connections] window Click 5. Enter the host name, IP address and MAC address of the PC or network device to add, then click [OK].
  • Page 39: Changing Ip Address

    6. Verify that the host you added is now listed in the [DHCP Connections] window. Verify 7. The DHCP function setup is now complete. 4.3.3 Changing IP Address This section describes the procedure to change the configuration of PC or network device to which IP address is automatically assigned via DHCP server.
  • Page 40 [Advanced] window Click 3. Click on the [Connection List] button. [IP Address Distribution] window Click 4. Click on the button for the host entry for which you wish to change configuration. [DHCP Connections] window Click on the button 5. Select [Static Lease Type] and click on [OK].
  • Page 41: Deleting Ip Address

    Select Click 6. Verify that lease type is [Static], then click the button for the host. Verify Click on the button 7. In this manner, you can assign a static IP or modify host name and MAC address settings. 8. Click on the OK button. [DHCP Connections] window will be displayed again. 9.
  • Page 42 address. 1. Click on [Advanced] on the side bar. Click 2. Click on [IP Address Distribution]. [Advanced] window Click 3. Click on the [Connection List] button.
  • Page 43: Enabling And Disabling Dhcp Server

    [IP Address Distribution] window Click 4. Click on the button for the host you wish to delete. [DHCP Connections] window Click on the button 5. Click on the [Close] button. [IP Address Distribution] window will be displayed again. 6. The IP deletion is now complete. 4.3.5 Enabling and disabling DHCP server The section below describes how to enable or disable the built-in DHCP server function.
  • Page 44 Click 2. Click on [IP Address Distribution]. [Advanced] window Click 3. The current DHCP server subnet and the range of IP addresses being assigned will be displayed. Click on the button to modify the DHCP server settings.
  • Page 45 [IP Address Distribution] window Click on the button 4. Select [DHCP Server] in the [IP Address Distribution] field to enable the function, or select [Disabled] to disable it. [DHCP Settings for LAN Ethernet] window Select Caution: - If you have disabled DHCP server, be sure to manually assign an IP address to each PC or network device attached to the LAN side of the product.
  • Page 46: Dns Server Configuration

    4.4 DNS Server Configuration The built-in DNS server of the product manages the IP-to host (PC or network device in LAN) association data. DNS server refers to the same association table used by DHCP server. Once a host name is registered during DHCP server configuration, the host name and its associated IP address will be automatically managed by DNS server.
  • Page 47 Click 2. Click [IP Address Distribution]. [Advanced] window Click 3. Click on the [Connection List] button.
  • Page 48 [IP Address Distribution] window Click 4. The built-in DHCP server will display the host names and IP addresses already registered. [DHCP Connections] window Host name and IP address will be displayed 5. Click on the [Close] button to return to the [IP Address Distribution] window. 6.
  • Page 49: Manual Registration Of Host Name And Ip Address

    [Advanced] window Click 8. The host names and IP addresses already registered to the built-in DNS server will be displayed. [DNS Server] window Host name and IP address will be displayed 9. The verification of IP and host name is now complete. 4.4.2 Manual registration of host name and IP address When DHCP server function is not in use, host name and IP address need to be registered manually.
  • Page 50 Click 2. Click on the [DNS Server] icon. [Advanced] window Click 3. Click on the button in the [New DNS Entry] field.
  • Page 51: Modifying Host Name And Ip Address

    [DNS Server] window Click on the button 4. Enter the host name and IP address you wish to register to DNS server, then click [OK]. [DNS Entry] window Enter data Click 5. The manual addition of host name and IP address is now complete. 4.4.3 Modifying host name and IP address After changing host name or IP address, the information previously registered to DNS server needs to be manually modified as well.
  • Page 52 Click 2. Click on the [DNS Server] icon. [Advanced] window Click 3. Click on the button for the host name you wish to modify.
  • Page 53: Deleting Host Name And Ip Address

    [DNS Server] window Click on the button 4. Modify host name and IP address as necessary and click [OK]. [DNS Entry] window Make change Click *As for hosts whose IP addresses are automatically assigned by DHCP server, only their host name may be changed.> 5.
  • Page 54 Click 2. Click on the [DNS Server] icon. [Advanced] window Click 3. Click on the button for the host name you wish to delete, then click [OK].
  • Page 55 [DNS Server] window Click on the button Click 4. The deletion of host name or IP address is now complete.
  • Page 56: Proxy Dns

    4.5 Proxy DNS The product is equipped with a proxy DNS function. When each PC on the LAN side attempts to make a connection to a specific domain name on the Internet (DNS inquiry), proxy DNS forwards the inquiry to a DNS server on the Internet and returns the corresponding IP address to the PC.
  • Page 57: Routing Configuration

    4.6 Routing Configuration The product supports RIP, RIP Version 2 as dynamic routing protocols. It supports static routing as well. 4.6.1 Configuring dynamic routing This section describes how to configure dynamic routing and dynamically register routing information. Specify an interface on which dynamic routing is enabled, then enable dynamic routing on the product.
  • Page 58 4. [LAN Ethernet Properties] window will be displayed. Click on the [Settings] button. [LAN Ethernet Properties] page Click 5. Select [Routing Information Protocol (RIP)] in the [Device Metric] section. Click 6. Now configure RIP receive/transmit settings. Select the type of RIP the product receives in the [Listen to RIP Messages] field.
  • Page 59 None Disables the RIP function RIPv1 Sends routing information via RIPv1 RIPv2, broadcast Sends routing information via RIPv2 RIPv2, multicast Sends routing information via RIPv2 7. Click [OK]. If a warning window appears, verify the displayed information and click on the [OK] button.
  • Page 60: Adding Static Routing Information

    [Advanced] window Click 11. Verify that [Routing Information Protocol- RIP] has been selected in the [Routing Protocols] section. [Routing] window Make change 12. Click on the [OK] button. 13. The dynamic routing configuration is now complete. 4.6.2 Adding static routing information This section describes how to manually add routing information.
  • Page 61 Click 2. Click on the [Routing] icon. [Advanced] window Click 3. Click on the button in the [New Route] field.
  • Page 62 [Routing] window Click on the button 4. Select the device for which you wish to add routing information, and enter the new routing information. [Route Settings] window Select [Name] Select the interface for which static routing is configured (Select from [LAN Ethernet], [WAN Ethernet], [WAN PPPoE], etc.
  • Page 63: Modifying Static Routing Information

    Verify Click 6. The addition of stating routing information is now complete. 4.6.3 Modifying static routing information This section describes how to modify previously configured static routing information. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Routing] icon.
  • Page 64 [Advanced] window Click 3. Click on the button for the routing information you wish to modify. [Routing] window Click on the button 4. Modify the routing information selected, and click on the [OK] button.
  • Page 65: Deleting Static Routing Information

    [Routing Settings] window Modify Click 5. The modification to the existing routing information is now complete. 4.6.4 Deleting static routing information This section describes how to delete previously configured static routing information. 1. Click on the [Advanced] icon on the side bar. Click 2.
  • Page 66 [Advanced] window Click 3. Click on the button for the routing information you wish to delete. [Routing] window Click on the button 4. Click on the [OK] button. 5. The deletion of routing information is now complete.
  • Page 67: Upnp Configuration

    4.7 UPnP Configuration Universal Plug and Play (UPnP) is a standard that easily enables intercommunication between devices on a network. UPnP compliant devices can communicate between each other as they are connected to an existing network. The product supports UPnP and provides the following features.
  • Page 68 Click 2. Click on the [Add or Remove Programs] button, then click on [Add/Remove Windows Components] button on the left. Click 3. Select [Networking Services] in the [Components] list, and click on the [Details] button.
  • Page 69 Select Click 4. The Networking Services window will be displayed. Verify the status of [Universal Plug and Play]. Verify If the [Universal Plug and Play] has been already checked, UPnP has already been enabled on your PC. Close the dialog box. If the item is not checked, UPnP is disabled at the moment.
  • Page 70 ■ Windows® Me 1. Click on the [Start] button, then click [Settings] -> [Control Panel]. 2. Click on the [Add/Remove Programs] button. When the [Add/Remove Programs] window is displayed, click on the [Windows Setup] tab.
  • Page 71 Click 3. Select [Communications] in the [Components] list, and click on the [Details] button.
  • Page 72 Select Click 4. The details of communication status will be displayed. Verify the status of [Universal Plug and Play].
  • Page 73: Disabling Upnp

    Verify 5. If [Universal Plug and Play] has been already checked, the UPnP function has been already enabled on your PC. Close the dialog box. If the item is not checked, UPnP is currently disabled. Check (select) the item and click [OK]. Follow the displayed instructions to continue the installation process.
  • Page 74 Click 2. Click on the [Universal Plug and Play] icon. [Advanced] window Click 3. To disable UPnP, uncheck the check mark in the [Allow other network..] box.
  • Page 75 [Universal Plug and Play] window Uncheck 4. Click on the [OK] button. 5. UPnP has been disabled on the product.
  • Page 76: Chapter 5 Security Configuration

    Chapter 5 Security configuration 5.1 Security When connected to the Internet, computers in a LAN face the risk of being attacked or accessed by unauthorized users on the Internet. Implementing adequate and effective security measures to protect LAN is thus vital to ensure safe and comfortable networking. The product is equipped with the following security functions for always-on connection to the Internet.
  • Page 77: Defining Security Level

    5.2 Defining Security Level This section provides the procedure to configure basic security level of the product. When implementing security measures, it is necessary to define rules for “LAN-to-Internet communication” and “Internet-to-LAN communication” that are appropriate for the actual data transactions that take place in a network. Generally, LAN-to-Internet access is permitted while Internet-to-LAN access is denied.
  • Page 78 access LAN. Only PC’s in LAN (ex. Web service, services configured [Local e-mail) are permitted. (*) Server] [Remote Access] windows are permitted. Typical Denied No restriction Users on the Internet cannot All Internet services are available access LAN. Only to PC’s in LAN. services configured [Local...
  • Page 79: Packet Filtering Configuration

    5.3 Packet Filtering Configuration The built-in packet filter of the product applies pre-configured filter rules to packets received as well as packets transmitted by the product. Filter rules include [LAN Ethernet rule], [WAN Ethernet rule] and [WAN PPPoE rule]. Rule Application Order LAN Ethernet Rule WAN Ethernet Rule WAN PPPoE Rule...
  • Page 80 Click 2. Click on the [Advanced Filtering] tab. [Security] window Click 3. The following tables will be displayed.
  • Page 81 4. In the [Input Rule Sets] or [Output Rule Sets] section, click on the interface for which you wish to create rule. *[WAN PPPoE Rule] is selected as an example. If you have selected another interface, configure it in the similar manner. [WAN …...
  • Page 82 5. [Configure WAN Ethernet Rules] window will be displayed. Click on the button in the [New Entry] field. [Configure WAN Ethernet Rules] window Click on the button 6. [Add Advanced Filter] window will be displayed. [Add Advanced Filter] window 7. Enter the Source and Destination IP addresses in the [Matching] field. When [Any] is selected, the rule is applied to all IP addresses.
  • Page 83 When [Range] is selected, the rule is applied to the range of IP addresses specified. Enter address 8. Select filter operation in the [Operation] section. Select [Drop] Packets are dropped. [Reject] Drop packets, and send TCP Reset or ICMP Host Unreachable packets to sender. [Accept] Accept all packets related to this session.
  • Page 84 Select 10. Click on the [OK] button. Click * The [OK] button is shown at the bottom of the window. Scroll down as necessary. 11. Repeat Steps 3 to 10 for any additional filter rule you wish to create. 12. Filter rule setup is now complete. ■...
  • Page 85 Click 2. Click on the [Advanced Filtering] tab. [Security] window Click 3. Click on the button of the interface you wish to configure.
  • Page 86 [WAN … ] selected as an example 4. [Configure WAN Ethernet Rules] window will be displayed. Click on the button in the Action field. [Configure WAN Ethernet Rules] window Click on the button 5. [Edit Advanced Filter] window will be displayed. Make changes as necessary, and click on the [OK] button.
  • Page 87 6. The rule you have selected has been modified. ■ Deleting Packet Filter 1. Click on the [Security] icon on the side bar. Click 2. Click on the [Advanced Filtering] tab.
  • Page 88 [Security] window Click 3. Click on the interface for which you wish to delete a rule. [WAN … ] selected as an example 4. [Configure WAN Ethernet Rules] window will be displayed. Click on the button in the [Action] field.
  • Page 89: Creating A New Service

    [Configure WAN Ethernet Rules] window Click on the button 5. The deletion of packet filter is now complete. 5.3.2 Creating a new service This section describes how to configure a service that has not been registered to the product. 1. In the [Add Advanced Filter] window, click on the [User Defined Services] link. [Add Advanced Filter] window Click 2.
  • Page 90 [User Defined Services] window Click on the button 3. [Edit Service] window will be displayed. Click on the button in the [New Entry] field. [Edit Service] window Click on the button 4. Select the protocol used by the new service. Select [Protocol] Select a protocol from among TCP, UDP, ICMP, GRE, ESP, AH and Other...
  • Page 91 Click on the button 7. When you have configured the parameters, enter the desired name in the [Service Name] field and click [OK]. 8. The [User Defined Serviced] window will be displayed again. Verify that the service you have configured is listed in the [Service Name] section. Click on the [Close] button. Verify Click 9.
  • Page 92: Filter Rule Example

    10. The addition of new service is now complete. 5.3.3 Filter Rule Example As an example of packet filter, this section provides the procedure to block communication between WAN and ports 137 to 139 of LAN (used in NetBIOS, etc). NetBIOS packets used in Windows®...
  • Page 93 [Security] window Click 3. In this example, a rule for blocking LAN-to-WAN NetBIOS packets is created. In the [Input Rule Sets] field, click on the button for [LAN Ethernet Rules] . Click on the button 4. Click on the button in the [New Entry] field.
  • Page 94 [Configure LAN Ethernet Rules] window Click on the button 5. Select [ANY] for both [Source IP Address] and [Destination IP Address]. [Add Advanced Filter] window Select 6. Select [Drop] in the [Operation] field. Select 7. Click on [User Defined Services].
  • Page 95 [Add Advanced Filter] window Click 8. The [User Defined Services] window will be displayed. Click on the button in the [New Entry] field. [User Defined Services] window Click on the button 9. [Edit Service] window will be displayed. Click on the button in the [New Entry] field.
  • Page 96 Configure parameters 11. Click on the [OK] button. 12. Click on the button to block UDP ports similarly. Click on the button 13. Select [UDP] as protocol. Next, select [Any] as [Source Ports] and select [Range] as [Destination Ports]. Enter 137 and 139 as range. Configure parameters 14.
  • Page 97 Enter service name Click 16. The [User Defined Services] window will be displayed again. Verify that the service you have created is listed under [Service Name]. Click on the [Close] button. Click 17. The new service is listed under [User Defined Services]. Select (check) the service and click on the [OK] button.
  • Page 98 * The [OK] button is displayed at the bottom of the window. Scroll down as necessary. 18. Click on the [OK] button to return to [Advanced Filtering] window. [Configure LAN Ethernet Rules] window Click 19. Click on the [OK] button. 20.
  • Page 99 [Add Advanced Filter] window Select 23. Select [Drop] in the [Operation] section. Select 22. The new service will be displayed in the [User Defined Rules] section. Select this entry and click on the [OK] button.
  • Page 100 Select * The [OK] button is displayed at the bottom of the window. Scroll down as necessary. 23. Click on the [OK] button to return to the [Advanced Filtering] window. [Configure WAN Ethernet Rules] window Click 24. The configuration of sample rule is now complete.
  • Page 101: Remote Access Configuration

    5.4 Remote Access Configuration The remote access function of the product allows you to access the product via the Internet and modify its system configuration. This function is disabled by default to protect LAN. Caution: To prevent unauthorized access and modification of the system by third parties, it is recommended to disable remote access for normal use.
  • Page 102 [Security] window Click 3. Configure WAN-to-LAN access settings. Select as necessary Click Allow Incoming Access to Using the Well-Known HTTP Select if you wish to make the Web Management Port 80 the HTTP port of the product publicly accessible. Using Secondary HTTP Port Select to make the product’s...
  • Page 103 (8080) HTTP port publicly accessible via TCP 8080 port. Allow Incoming Access to Select to make the web the Web Management management console publicly accessible. Diagnostic Tool Allow Incoming ICMP Echo Select to let the product Requests (e.g. pings and respond ping ICMP traceroute queries)
  • Page 104: Url Filter Configuration

    5.5 URL Filter Configuration URL filter forbids LAN-side PC’s to access a specific Web site. For instance, Web sites that may offend public order and morals may be configured on the product to prevent LAN side PC’s to view such sites. 5.5.1 Configuring URL Filter ■...
  • Page 105 [Security] window Click 3. Click on the button in the [New Entry] field. Click on the button 4. Enter the URL or IP address of the Web site you wish to block access to, and click on [OK]. Click...
  • Page 106 [Restricted Web Site Address] window Enter address 5. The address will be added to the [IP Address or Hostname] list. Verify 6. When a URL is added, the product will automatically check whether the URL exists on the Internet. During the process, the [Status] is displayed as [Resolving]. Click on the [Refresh] button to verify that the URL entered is valid.
  • Page 107 Notes: If [Status] remains [Error], start a Web browser and enter the URL to see whether the Web site is displayed. If the site is accessible, there is a chance that the URL entered on the product was inaccurate. ■ Enabling/ Disabling URL Filter 1.
  • Page 108 [Security] window Click 3. Uncheck (deselect) the Web site in the [IP Address or Hostname] field for which you wish to disable URL filter, then click [OK]. Uncheck Click 4. The screen will get back to the homepage. Please get back to [IP/Hostname Filtering] tab and confirm again.
  • Page 109 Verify 6. The URL filter has been disabled (enabled). ■ Modifying a URL filter 1. Click on the [Security] icon on the side bar. Click 2. Click on the [IP/Hostname Filtering] tab.
  • Page 110 [Security] window Click 3. Click on the button of the Web site entry you wish to configure. Click on the button 4. When the [Restricted Web Site Address] is displayed, enter a new URL or IP address and click [OK].
  • Page 111 [Restricted IP Address or Hostname] window Click 5. The new Web site is added to the [Web Site Address] list. Verify 6. The URL filter has been modified. ■ Deleting a URL filter 1. Click on the [Security] icon on the side bar.
  • Page 112 Click 2. Click on the [IP/Hostname Filtering] tab. [Security] window Click 3. Click on the button of the Web site entry for which you wish to remove access restrictions:...
  • Page 113 Click on the button 4. Click on the [OK] button. 5, The deletion of URL filter is now complete.
  • Page 114: Log Management

    5.6 Log Management This section describes how to configure access log of LAN (PC)-to-Internet, Internet-to-LAN and management console connections. 5.6.1 Verifying Security Log ■ Viewing Log 1. Click on the [Security] icon on the side bar. Click 2. Click on the [Security Log] tab.
  • Page 115 [Security] window Click 3. The [Security Log] window will be displayed. You can view the log related to the currently active security settings. Log information...
  • Page 116 ■ Information Contained in Log (Example) Event Type Description Inbound/Outbound Connection accepted Connection request conforms Traffic firewall security policy Accepted-Host probed Although there was a TCP connection request that conforms to firewall security policy, it is uncertain whether the host on the Internet is reliable.
  • Page 117 ■ Clearing Log 1. Click on the [Security] icon on the side bar. Click 2. Click on the [Security Log] tab. [Security] window Click...
  • Page 118 3. Click on the [Clear Log] button to clear the log currently shown on screen. Click 4. Click on the [Close] button. 5. The system log has been cleared. ■ Detailed Configuration of Log This section describes how to modify the configuration for saving log. 1.
  • Page 119 2. Click on the [Security Log] tab. [Security] window Click 3. Click on the [Settings] button. Click...
  • Page 120 4. In the [Log Events] section, select the log you wish to save. [Security Log Settings] window Select [Connections Attempts Accepted] LAN-to-Internet and Internet-to-LAN connections that have been permitted by firewall are saved as log. [Connection Attempts Blocked] LAN-to-Internet and Internet-to-LAN connections that have been denied by firewall are saved as log.
  • Page 121: E-Mail Notification

    5.7 E-mail Notification The product can be configured notify its administrator of system/line/firewall error via e-mail. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Users] icon.
  • Page 122 [Advanced] window Click 3. Click on the button for the user to whom e-mail notification is sent. [Users] window Click on the button 4. Enter the destination mail address in the [Address] field (see below).
  • Page 123 [User Settings] window Enter address 5. Select [Security Notify Level]. System notification sends out messages related to system information.
  • Page 124 Select [Error] A message is sent when a fatal error (ex. the product is not operating properly) is detected. [Warning] A message is sent when an error requiring warning has occurred. When this option is selected, [Error] level message is sent as well. [Information] The message displayed when the user uses the product is sent.
  • Page 125 Select [Error] A message is sent when a fatal error (ex. the product is not operating properly) is detected. [Warning] A message is sent when an error requiring warning has occurred. When this option is selected, [Error] level message is sent as well. [Information] The message displayed when the user uses the product is sent.
  • Page 126 Enter address 9. Click on the [OK] button to return to the [User Settings] window. 10 Click on the [OK] button. 11. The e-mail notification setup is now complete.
  • Page 127: Syslog Configuration

    5.8 Syslog Configuration The product can be configured to send log to Syslog server when an error occurs to the system, line or firewall. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [System Settings] icon.
  • Page 128 [Advanced] window Click 3. Locate the [System Remote Logging] section. Select the information to be notified via the [System Notify Level] menu, and enter the address of Syslog server in the [System Log Host IP] field. Enter address [Error] A message is sent when a fatal error (ex. the product is not operating properly) is detected.
  • Page 129 Enter address [Error] A message is sent when a fatal error (ex. the product is not operating properly) is detected. [Warning] A message is sent when an error requiring warning has occurred. When this option is selected, [Error] level message is sent as well. [Information] The message displayed when the user uses the product is sent.
  • Page 130: Chapter 6 Making Lan-Side Pc's Publicly Accessible

    Chapter 6 Making LAN-side PC's publicly accessible This chapter provides information on the configuration settings required to make a PC on your LAN publicly accessible. 6.1 Local Server Configuration Local Server configuration is used to i) make a sever on LAN publicly accessible via the Internet and ii) access applications including online games and chat programs.
  • Page 131 Click 2. Click on the [Local Servers] tab. [Security] window Click 3. Click on the button in the [New Entry] field.
  • Page 132 Click on the button 4. The [Add Local Server] window will be displayed. In the [Local Host] field, enter the IP address of the PC that serves as local server [Add Local Server] window Enter address 5. Services and applications that have been already registered to the product will be listed in the [Basic Web Utilities] list.
  • Page 133: Configuring A Local Server Using A New Service

    Click *The [OK] button is displayed at the bottom of window. Scroll down as necessary. 7. The local server configuration is complete. 6.1.2 Configuring a Local Server Using a New Service ■ Creating a New User-Defined Service Follow the steps below to create a new service and use local server via the service. 1.
  • Page 134 2. Click on the [Local Servers] tab. [Security] window Click 3. Click on the button in the [New Entry] field. Click on the button 4. Register a new service. Click on the [User Defined Services] link. Click...
  • Page 135 5. The [User-Defined Services] window will be displayed. Click on the button in the [New Entry] field. [User-Defined Services] window Click on the button 6. The [Edit Service] window will be displayed. Click on the button in the [New Entry] field.
  • Page 136 [Edit Service Triggering Ports] window Click 8. Click on the button to specify multiple ports. [Edit Service] window Click on the button 9. When the configuration is complete, enter the desired name for service in the [Service Name] field and click [OK]. 10.
  • Page 137 [Add Local Server] window Select 12. In the following steps, PC using the Local Server function is configured. Enter the IP address of the PC in the [Local Host] field. Enter address 13. Click on the [OK] button. Click * The [OK] button is located at the bottom of window. Scroll down as necessary. 14.
  • Page 138 Service and IP address are shown 15. Click on the [OK] button. 16. A new user-defined service has been created. ■ Modifying a User-Defined Service This section describes how to modify a previously configured user-defined service. 1. Click on the [Security] icon on the side bar. Click 2.
  • Page 139 [Security] window Click 3. Click on the button for the PC for which you wish to change configuration. Click on the button 4. The [Edit Local Server] window will be displayed. Click on the [User-Defined Services] link. [Edit Local Server] window Click...
  • Page 140 5. The [User-Defined Services] window will be displayed. Click on the button of the service you wish to configure. [User-Defined Services] window Click on the button 6. The [Edit Service] window will be displayed. Click on the button of the protocol you wish to configure.
  • Page 141 [Edit Service] window Click 9. The [User-Defined Service] window will be displayed again. Click on the [Close] button. [User-Defined Services] window Click 10. The user-defined service has been modified. ■ Deleting a User-Defined Service 1. Click on the [Security] icon on the side bar. Click...
  • Page 142 2. Click on the [Local Servers] tab. [Security] window Click 3. Click on the button in the [New Entry] field. Click on the button 4. Click on the [User-Defined Services] link.
  • Page 143: Modifying Local Server Configuration

    [Add Local Server] window Click 5. The [User Defined Services] window will be displayed. Click on the button of the service you with to delete. [User-Defined Services] window Click on the Button 6. Click on the [Close] button. 7. The deletion of unwanted service is now complete. 6.1.3 Modifying Local Server Configuration 1.
  • Page 144 2. Click on the [Local Servers] tab. [Security] window Click 3. Click on the button of the PC whose Local Server settings you wish to change. Click on the button 4. The [Edit Local Server] window will be displayed. Modify the IP address of PC or service as needed.
  • Page 145: Enabling/ Disabling Local Server

    [Edit Local Server] window Modify 5. Click on the [OK] button. 6. The local server setting has been modified. 6.1.4 Enabling/ Disabling Local Server 1. Click on the [Security] icon on the side bar. Click 2. Click on the [Local Servers] tab.
  • Page 146 [Security] window Click 3. In the [Local Host] list, uncheck the IP address entry of the service for which you wish to disable Local Server. Uncheck 4. Click on the [OK] button. 5. The Local Server setting of the service has been disabled.
  • Page 147: Deleting Local Server

    6.1.5 Deleting Local Server 1. Click on the [Security] icon on the side bar. Click 2. Click on the [Local Servers] tab. [Security] window Click...
  • Page 148 3. Click on the button of the service whose configuration you wish to delete. Click on the button 4. Click on the [OK] button. 5. The Local Server setting of the selected service has been deleted.
  • Page 149: Dmz Configuration

    6.2 DMZ Configuration You can use the virtual computer function of the product to make one PC in LAN publicly accessible on the Internet. Virtual Computer can be used when: - Using online games or TV conference applications that are not on the [Local Server] service/function list and it is not known which port is used for the applications - Making one PC publicly accessible on the Internet and letting it provide all the available services with no security restriction settings...
  • Page 150: Configuring A Lan Side Pc As Virtual Computer

    All Internet-to-LAN access requests (except the requests with destinations registered with the [Local Server] function) will be forwarded to Virtual Computer. 6.2.1 Configuring a LAN Side PC as Virtual Computer This section describes how to configure a LAN-side PC as Virtual Computer that is publicly accessible on the Internet.
  • Page 151 2. Click on the [DMZ Host] tab. [Security] window Click 3. Check the [DMZ Host IP Address] option and enter the IP address of the PC that serves as Virtual Computer (DMZ host). Enter address Check 4. Click on the [OK] button. 5.
  • Page 152 ■ Enabling and Disabling Virtual Computer 1. Click on the [Security] icon on the side bar. Click 2. Click on the [DMZ Host] tab. [Security] window Click...
  • Page 153 3. Uncheck the [DMZ Host IP Address] option. Uncheck 4. Click on the [OK] button. 5. The Virtual Computer configuration is now complete.
  • Page 154: Dynamic Dns Configuration

    6.3 Dynamic DNS Configuration To make a WEB server publicly accessible on the Internet, a static global IP address needs to be assigned to the product. Even when there is an always-on connection, however, disconnection does occur and the IP address may dynamically change after reconnection. When Dynamic DNS is enabled, the IP address of the product is reported to a Dynamic DNS server at regular intervals so that it can use the same static host name even after IP has changed.
  • Page 155 2. Click on the [Dynamic DNS] icon. [Advanced] window Click 3. The [Dynamic DNS] window will be displayed. Select [Connection to Update] option and fill out each field using the same information that has been registered to the Dynamic DNS service. [Dynamic DNS] window Select Enter values...
  • Page 156 [Connection to Update] Select the connection to which you would like to couple the DDNS service. [Offline] Disable the Dyndns feature by selecting this check box. This feature is available only to users who have purchased some type of upgrade credit from Dyndns.org. Please note that changing the redirection URL can only be perfomed via the Dyndns web site.
  • Page 157: Chapter 7 Vpn Configuration

    Chapter 7 VPN Configuration The VPN (Virtual Private Network) technology utilizes security schemes such as data capsulation and encoding to allow its user to use the Internet as if it is a WAN directly connected via a leased line. Protocols including PPTP (Point to Point Tunneling Protocol) and IPSec (IP Security) are used to construct a VPN.
  • Page 158: Configuration Via The Connection Wizard

    7.1 Configuration via the Connection Wizard This section describes how to establish a VPN using the built-in Connection Wizard. The product supports PPTP server, PPTP client and IPSec. Configure the product so that it best matches your networking environment. 7.1.1 PPTP Client Configuration This section describes how to configure the product as a PPTP client.
  • Page 159 Click 2. Select [Connect to a Virtual Private Network over the Internet] and click [Next]. [Connection Wizard] window Select Click 3. Select [Point-to-Point Tunneling Protocol (PPTP)] and click [Next].
  • Page 160 [Connect to a Virtual Private Network over the Internet] window Select Click 4. Configure the PPTP connection using the configuration data of the server to which you wish to access remotely. Enter the IP address of the PPTP server in the [Host Name or IP Address Of Destination:] field.
  • Page 161: Pptp Server Configuration

    [Connection Summary] window Verify Click 7.1.2 PPTP Server Configuration This section describes how to configure the product as a PPTP server. Internet PPTP client Encryption PPTP server The PC obtains an IP address in the LAN side network to become a member of the LAN 1.
  • Page 162 Click 2. Select [Connect to a Virtual Private Network over the Internet] and click [Next]. [Connection Wizard] window Select Click 3. Select [Point-to-Point Tunneling Protocol Server (PPTP Server)] and click [Next].
  • Page 163 [Connect to a Virtual Private Network over the Internet] window Select Click 4. Enter the data of user(s) to whom the PPTP server grants access. [Users] window Click on the button 5. Enter user information in the [Full Name], [User Name], [New Password] and [Retype New Password] fields of the [General] section.
  • Page 164 [User Settings] window Enter user data Select Click 6. When the addition, modification or deletion of user entry is complete, the [Users] window will be displayed again. Click on the [Next] button. [Users] window Click 7. Enter the range of IP addresses that are assigned to users who will access the PPTP server remotely.
  • Page 165 [Point-to-Point Tunneling Protocol Server (PPTP Server)] window Enter address Click 8. The [Connection Summary] window will be displayed. Click on the [Finish] button. [Connection Summary] window Click If the product is connected to the Internet, the PPTP client will automatically connect to the PPTP server as soon as the client configuration is complete.
  • Page 166: Ipsec Configuration

    7.1.3 IPSec Configuration This section describes how to establish an IPSec-based VPN connection using the product. Internet Encryption IPSec client IPSec client 1. Click on the [Connection Wizard] icon on the side bar. Click 2. Select [Connect to a Virtual Private Network over the Internet] and click [Next].
  • Page 167 [Connection Wizard] window Select Click 3. Select [Internet Protocol Security (IPSec)] and click [Next]. [Connect to a Virtual Private Network over the Internet] window Select Click 4. Enter the information of IPSec connection and click on the [Next] button.
  • Page 168 [Internet Protocol Security (IPSec)] window Enter data Click [Remote Tunnel Endpoint Address] Enter the IP address of the host (target) to which IPSec connection is established. [Remote Subnet IP Address] Enter the network address of the host to which IPSec connection is established. [Remote Subnet Mask] Enter the subnet mask of the host to which IPSec connection is established.
  • Page 169: Configuration Via [Network Connections]

    7.2 Configuration via [Network Connections] This section describes how to configure advanced settings of PPTP client/server and IPSec connection. To modify these parameters, you must first complete configuration via the [Connection Wizard]. 7.2.1 Advanced Configuration of PPTP Client 1. Click on the [Network Connections] icon on the side bar. Click 2.
  • Page 170 [VPN PPTP Properties] window Verify Click 4. The [Configure VPN PPTP] window will be displayed. Verify the information provided by your PPTP server administrator, and configure the parameters in the [General], [PPP], [PPP Authentication], [PPP Encryption] and [Internet Protocol] sections. ■...
  • Page 171 ■ PPP Encryption, Internet Protocol There parameters are used to configure packet encryption. [PPP Encryption] - Require Encryption Select this option to make request for encrypted communication. PPTP connection is not established if server declines. - Support Encryption MPPE (Microsoft Point-to-Point Encryption) is used for encryption. Choose the MPPE-40 option if you wish to use 40bit encryption key, or MPPE-128 to use 128bit key.
  • Page 172: Deleting A Pptp Client

    5. Click on the [OK] button to enable the new configuration. The [VPN PPTP Properties] window will be displayed again. 7.2.2 Deleting a PPTP Client This section describes how to delete an existing PPTP client connection. 1. Click on the [Network Connections] icon on the side bar. Click 2.
  • Page 173 [VPN PPTP Properties] window Click Click 4. Click on the button of the VPN PPTP connection you wish to delete. [Network Connections] window Click on the button 5. Click on the [Close] button. 6. The deletion of the connection is now complete.
  • Page 174: Configuring The Advanced Options Of Pptp Server

    7.2.3 Configuring the Advanced Options of PPTP Server 1. Click on the [Network Connections] icon on the side bar. Click 2. The [Network Connections] window will be displayed. Click on the button of the VPN PPTP Server connection you wish to configure. [Network Connections] window Click on the button...
  • Page 175 3. The [Point-to-Point Tunneling Protocol Server (PPTP Server)] window will be displayed. Click on the [Advanced] button. Note that you can also edit user and PPTP client configuration settings in this window. [Point-to-Point Tunneling Protocol Server (PPTP Server)] window Server configuration Click 4.
  • Page 176 [Status] The current connection status of PPTP server is displayed. [Enabled] Select this option to enable PPTP server. If unchecked, the product will no longer serve as PPTP server. Its connection status will no longer displayed, and its entry will be removed from the advanced configuration window.
  • Page 177: Advanced Configuration Of Ipsec

    7.2.4 Advanced Configuration of IPSec 1. Click on the [Network Connections] icon on the side bar. Click 2. The [Network Connections] window will be displayed. Click on the button of the VPN IPSec connection you wish to configure. [Network Connections] window Click on the button 3.
  • Page 178 [VPN IPSec Properties] window Click 4. The [Configure VPN IPSec] window will be displayed. [Configure VPN IPSec] window Configure the following options: [Host Name or IP Address of Remote Tunnel Endpoint] The endpoint information that you have configured via the Connection Wizard is shown.
  • Page 179 - Manual Select this option if you wish to configure SA agreement manually in advance. The manual configuration window will be displayed. Caution: If you are using the manual mode, be sure to select [Tunneling] as [Transport Type]. 5. Select [Automatic] in the [Key Exchange Method] menu and configure the following two phases.
  • Page 180 [Encryption Algorithm] Select the encryption algorithm you wish to use. [Hash Algorithm] Select the hash algorithm you wish to use. [Group Description Attribute] Select the group(s) as necessary. 6. Configure the [IPSec Automatic, Phase 2] section. Configure as necessary IPSec Automatic, Phase 2 [Life Time in Seconds] Specify the expiration period of key in seconds.
  • Page 181: Manually Configuring Key Exchange Method

    button to enable the new configuration. 8. To establish a VPN using IPSec, IP fragment packets need to be permitted. In the Security configuration window, uncheck the [Block IP Fragments] option. [Security] window Uncheck 7.2.5 Manually Configuring Key Exchange Method When configuring key exchange method manually, Encryption Algorithm and Encryption Algorithm need to be configured to match the configuration of the destination/target device.
  • Page 182: Connecting And Disconnecting A Vpn Connection

    Enter algorithm data Use hexadecimal numbers as encryption and authentication algorithms (key). Enter eight digits in each space provided. 7.2.6 Connecting and Disconnecting a VPN Connection A LAN-to-LAN connection is automatically established as soon as the server or client connects to the Internet. 1.
  • Page 183: Recreating Key

    [VPN IPSec Properties] window Click In addition, the following IPSec connection parameters are configurable. 7.2.7 Recreating Key 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [IPSec] icon.
  • Page 184 [Advanced] window Click 3. The [Internet Protocol Security (IPSec)] window will be displayed. Click on the [Settings] button. [Internet Protocol Security (IPSec)] window Click 4. The [Internet Protocol Security (IPSec) Settings] window will be displayed. Click on the [Recreate Key] button.
  • Page 185: Ipsec Log Configuration

    [Internet Protocol Security (IPSec) Settings] window Click 5. Click on the [Refresh] button to view the recreated key. Click on the [Close] button to return to the [IPSec] window. 7.2.8 IPSec Log Configuration Follow the steps below to IPSec communication log parameters. 1.
  • Page 186 [IPSec Log Settings] window Select 3. Click on the [OK] button to enable the new configuration. The [IPSec] window will be displayed again.
  • Page 187: Deleting Ipsec A Connection

    7.3 Deleting IPSec a Connection This section describes how to delete an existing IPSec configuration. 1. Click on the [Network Connections] icon on the side bar. Click 2. Click on the button of the VPN IPSec connection you wish to delete. [Network Connections] window Click on the button...
  • Page 188 [VPN IPSec Properties] window Click Click 4. Click on the button of the VPN IPSec connection you wish to delete. [Network Connections] window Click on the button 5. Click on the [Close] button. 6. The deletion of the IPSec connection is now complete.
  • Page 189: Chapter 8 Advanced Configuration

    [For example] Set both routers into virtual IP Addresses, backup router will only become active if master router link fails. Master Router Backup Router BRC-14VG(1) BRC-14VG(2) IP ADDRESS 192.168.50.250 192.168.50.250 VRRP ID Priority...
  • Page 190 2. Click on the [Advanced] icon on the side bar. Click 3. [Advanced] screen will appear and then click [VRRP]. [Advanced] window Click 4. Click on the button in the [Add New Virtual Router] field.
  • Page 191 [VRRP] window Click on the button 5. [VRRP] setting screen will appear. (1) Key 192.168.50.250 into [IP address] (2) Key 1 at [VRRP ID(1-255)] (3) Key 250 at [Priority(1-255)] (4) Select enable at [Enable Preemption Mode] (5) Select which interface to monitor at [Monitoring Interface] (6) Click [Enable] button Configure parameters Click...
  • Page 192 Configure parameters Click 7. Finish setting. Caution: [BRC-14VG side] Recommend disable DHCP Server. [Clients side] 1. Set IP address and gateway(must match to IP of router), according to example the IP address is 192.168.50.250 2. Set DNS server IP which refer to ISP supply.
  • Page 193: Ipv6 Bridge

    8.2 IPv6 Bridge This product supports function of IPv6 Bridge, which can connect between LAN and WAN in Data. In using this function, you can connect to computers in your network thru PPPoE connection. *IPv6 setting of clients, please refer to OS manual. 1.
  • Page 194 [Advanced] window Click 3. Make a check mark in front of [Enable IPv6 bridge]. [IPv6 Bridge] window Select 4. Click [OK] button.
  • Page 195: Pppoe Bridge

    8.3 PPPoE Bridge This product supports function of PPPoE bridge, clients can directly use PPPoE dialing thru this router to connect to Internet. *About PPPoE dialing connection, please refer to your setup manual from your current ISP. 1. Click on the [Advanced] icon on the side bar. Click 2.
  • Page 196 [Advanced] window Click 3. Make a check mark in front of [Enable PPPoE Bridge]. [IPv6 Bridge] window Select 4. Click [OK] button.
  • Page 197: Chapter 9 Option Configuration

    Chapter 9 Option configuration This chapter describes how to use the product to configure its option functions. 9.1 Configuring a USB Camera You can take still image shots or capture video clips via a USB camera attached to the USB interface of the product.
  • Page 198 Click 2. The [Option Settings] window will be displayed. Click on the [USB Camera] icon. [Option Settings] window Click 3. The [USB Camera] window will be displayed. Physically attach the USB camera to the product, and click on the [On] option. Select Caution: - The default selection of the [USB Camera] window is [Off].
  • Page 199: Viewing The Captured Images Via The Internet

    4. Select either [High(512Kbps)] or [Low(128Kbps)] as [Bit rate]. 5. Click on the [OK] button. The USB camera starts capturing images, while the product sends out the streaming data. 9.1.2 Viewing the Captured Images via the Internet 1. Click on the [Security] icon on the side bar. Click 2.
  • Page 200 [Security] window Click 3. Verify which port (TCP Port 80 or TCP 8080) is not in use, and select that port ([Using the Well-Known HTTP Port (80)] or [Using Secondary HTTP Port (8080)] ). Next, click on the [Allow Incoming Access to USB Camera(8090)] option at the bottom of the window. Select 4.
  • Page 201: Viewing Captured Images From A Pc Or Cellular Phone

    5. The USB camera configuration is now complete. 9.1.3 Viewing captured images from a PC or cellular phone ■ System requirements to view the captured images The following applications and conditions are required to use PC’s or cellular phones to view images captured via the camera Still Image Video...
  • Page 202 2. The following authentication window will be displayed when the product is accessed remotely. Enter the preconfigured user name and password. The USB camera authentication window will be displayed Enter user data * Note that this authentication function does not completely guarantee that the captured images and video clips are disclosed only to a specified user/target.
  • Page 203 The still image window Click 5. When [Video] is selected, the video clip window will be displayed. The video clip window...
  • Page 204 Caution: - When sending the video data, it may take some time before the image is displayed due to network conditions and Windows ® Media Player buffering process, etc. - The brightness and contrast of picture or video cannot be adjusted.
  • Page 205: Chapter 10 Maintenance And Administration

    Chapter 10 Maintenance and administration This chapter describes how to i)verify network connection status and ii)modify administrator login name or password. 10.1 Verifying Device Status 10.1.1 Verifying Connection Status Follow the steps below to verify the connection status and address information of each port. 1.
  • Page 206: Verifying System Up Time

    10.1.2 Verifying System Up Time Follow the steps below to verify how long the product has been operating. 1. Click on the [System Monitoring] icon on the side bar. Click 2. Click on the [System] tab. Click ■ How to disable the automatic refresh function...
  • Page 207 Select [Advanced] – [System Settings] and check whether the [Automatic Refresh of System Monitoring Web Pages] option has been if selected. If it is, the [System Monitoring] window will be updated automatically at a regular interval. To disable this function, click on the [Automatic Refresh Off] button at the bottom of the [System Monitoring] window.
  • Page 208: Configuring Login User Name And Password

    10.2 Configuring Login User Name and Password Follow the sections below to add, modify or delete login user name and password. 10.2.1 Configuring Login User Name and Login Password ■ Creating a User Account 1. Click on the [Advanced] icon on the side bar. Click 2.
  • Page 209 [Advanced] window Click on the [Users] icon 3. Click on the button in the [New User] field. [Users] window Click on the button 4. The [User Settings] window will be displayed. Enter [Full Name], [User Name] and [New Password].
  • Page 210 [User Settings] window Enter data [Full Name] Enter the full name of the user to add. You may use up to 128 alphanumeric characters. [User Name] Enter the login name of the new user. You may use up to 64 alphanumeric characters.
  • Page 211 Configure as necessary * See the [E-mail Notification] section above for more details on this function. 7. Click on the [OK] button. Click 8. The creation of new user account is now complete. ■ Modifying User Settings 1. Click on the [Advanced] icon on the side bar. Click 2.
  • Page 212 [Advanced] window Click on the [Users] icon 3. Click on the button of the user entry you wish to configure. [Users] window Click on the button 4. The [User Settings] window will be displayed. Modify the data as needed and click on the [OK] button.
  • Page 213: Deleting A User Entry

    [User Settings] window Click 5. The modification of user entry is now complete. 10.2.2 Deleting a User Entry 1. Click on the [Advanced] icon on the side bar. Click...
  • Page 214 2. Click on the [Users] icon. [Advanced] window Click on the [Users] icon 3. Click on the button of the user entry you wish to delete. [Users] window Click on the button Caution: The default administrator entry cannot be deleted. 4.
  • Page 215: System Configuration

    10.3 System Configuration Follow the steps below to configure the host name and LAN side domain name of the product. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [System Settings] icon. [Advanced] window Click [System Settings] icon...
  • Page 216 3. Enter the host name and domain name of the product in the [System] section. [System Settings] window Enter the host name and domain name of the product [Hostname] Enter the host name of the product. [Local Domain] Enter the domain name you wish to use within the LAN. 4.
  • Page 217 6. Configure the [System Remote Logging] and [Security Remote Logging] options as necessary. Configure as necessary *Refer to the [Syslog Configuration] section above to learn how to configure the Syslog settings. 7. If you have selected to use E-mail notification in the user configuration step, enter the mail server address in the [Outgoing Mail Server] field.
  • Page 218: Configuring Date And Time

    10.4 Configuring Date and Time Follow the steps below to modify the current date and time settings. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Date and Time] icon. [Advanced] window Click on the [Date and Time] icon...
  • Page 219 3. To manually configure date and time, enter the values in the provided fields. [Date and Time] window Configure as necessary 4. To enable daylight saving time configuration, click on the [Enabled] option in the [Daylight Saving Time] section. Select 5.
  • Page 220 7. Specify how often to perform the update in the [Update Every] field. 8. You can define time server addresses by pressing the link on the bottom of the [Automatic Time Update] section. 9. Click on the [OK] button. 10. The Date and Time configuration is now complete.
  • Page 221: Upgrading Firmware

    10.5 Upgrading Firmware Follow the steps below to first download the latest firmware from our web site and then update the firmware of the product. Caution: - Prior to firmware upgrade, be sure to disconnect from the Internet. All the PC’s on the LAN but the one used to upgrade firmware of the product need to be turned off.
  • Page 222 [Advanced] window Click on the [Firmware Upgrade] icon 4. The [Upgrade from a Computer in the Network] window will be displayed. Click on the [Browse…] button to specify the path for the firmware file you have downloaded. Click 5. Click on the [Open] button.
  • Page 223 * Windows ® XP dialog box is used as an example. Its appearance may vary depending on the OS of your computer. Click 6. Click on the [OK] button to initiate the firmware update preparation phase. Caution: During firmware update preparation phase, do not turn off the power of the product or remove the LAN cable from it.
  • Page 224: Diagnostic Tool

    Caution: Only firmware designed for the product may be used. Note that any forced attempt to upgrade the existing firmware using an incompatible version may result in product failure. 10.6 Diagnostic Tool Follow the steps below to use the ping command to a computer or another network device. 1.
  • Page 225 [Advanced] window Click 3. In the [Destination] field, enter the IP address or host name of the target device to which ping is used. [Diagnostics] window Enter destination address Click 4. Click on the [Go] button to execute the ping command to the destination.
  • Page 226 Destination and Status will be displayed 5. The ping test result will be displayed in the [Status] field. Click 6. Click on the [Close] button. 7. The ping test is now complete.
  • Page 227: Initializing The Product

    10.7 Initializing the Product Follow the steps below to erase the current configuration and restore its default settings. * You can also use the Reset switch to delete the current configuration. Caution: Please note that this function will erase all the configuration data including password to access the management console.
  • Page 228 [Advanced] window Click 3. Click on the [OK] button. [Restore Defaults] window Click on the [OK] button 4. The product configuration will be initialized. The system configuration will be deleted. This window will be displayed during the initialization process.
  • Page 229 5. When the deletion of system configuration is complete, the initial default window will be displayed. The initial login window will be displayed. Click on the [OK] button *If this window does not appear automatically, click on the [Login] button. 6.
  • Page 230 [User Name] Enter the user name to connect to the management console. [New Password] Enter password. [Retype New Password] Enter the same password. 7. Click on the [OK] button. The [Network Map] window will be displayed.
  • Page 231: Load Configuration

    10.8 Load Configuration 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Configuration File] icon in the [Advanced] window. [Advanced] window Click...
  • Page 232 3. Click on the [Load Configuration File] button. [Configuration File] window Click on the [Load Configuration File] button 4. The [Load Configuration File] window will be displayed. Click on the [Browse…] button and specify the configuration file. [Load Configuration File] window Click 5.
  • Page 233 correct, and click on the [OK] button. [Successful Configuration File Loading] window Click Caution: - The firmware version is displayed in the [Current Version] and [New Version] fields. - Note that the configuration update process may halt if invalid firmware version is used. 8.
  • Page 234: Save Configuration

    10.9 Save Configuration 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Configuration File] icon in the [Advanced] window. [Advanced] window Click...
  • Page 235 3. Click on the [Save Configuration File] button. [Configuration File] window Click on the [Save Configuration File] button 4. The File Download window will be displayed. Click on the [Save] button to save the configuration file to your PC. 5. The download process is now complete.
  • Page 236: Restarting System

    10.10Restarting System Follow the steps below to restart the product. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Restart] button. [Advanced] window Click...
  • Page 237 3. Click on the [OK] button. [Restart] window Click 4. When the system has restarted, the login window will be displayed.
  • Page 238: Snmp

    10.11 SNMP SNMP enables network management systems to remotely configure and monitor this product. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Simple Network Management Protocol] icon.
  • Page 239 [Advanced] window Click 3. To enable SNMP, check the check mark in the [Enable SNMP Agent] box. Select Read-Only Community Name SNMP community strings are passwords used in SNMP messages between the management system and product. A read-only community allows the manager to monitor product.
  • Page 240 5. SNMP has been enabled on the product.
  • Page 241: Mac Cloning

    10.12 MAC Cloning A MAC address is the numeric code that identifies a device on a network, such as your external cable/DSL modem or a PC network card. Your service provider may ask you to supply the MAC address of your PC, external modem, or both. 1.
  • Page 242 [Advanced] window Click 3. Modify MAC address as necessary and click [OK]. [MAC Cloning] window Make change 4. Click on the [OK] button.
  • Page 243: Firmware Information

    10.13 Firmware Information Follow the steps below to verify the firmware version of the product. 1. Click on the [Advanced] icon on the side bar. Click 2. Click on the [Technical Information] icon. [Advanced] window Click...
  • Page 244 3. The firmware version of the product will be displayed. [Technical Information] window...
  • Page 245: Chapter 11 Configuring File Server

    Chapter 11 Configuring File Server 11.1 Using a USB Storage Device to Set Up a File Server When a USB storage device is attached to the product, it can serve as a file server. The attached USB storage device can also be used as a publicly accessible HTTP server on the Internet.
  • Page 246 Turned off power 2. Use the USB cable supplied with the USB storage device and attach the device (HDD) to the USB port of the product. USB Cable USB Hard Disk 3. Turn on the power of the USB storage device. Caution: The product does not support bus-powered operation of the USB storage device.
  • Page 247: Creating And Formatting A Partition

    to attach the AC power adapter (supplied with the storage device) to the HDD. 4. Turn on the power of the product. The next section describes how to configure a partition in the USB storage device. 11.1.3 Creating and formatting a partition Once a USB storage device is attached to the product, its partition needs to be created and formatted.
  • Page 248 Click 2. The storage device attached to the product will be displayed in the [Network Map] window. Click on the storage device icon. Click 3. The [File Server Disk Information] window will be displayed. The partition information of the attached HDD is displayed in the [Partitions] section.
  • Page 249 Caution: The [Description] field will show the name of the hard disk you are using. The name shown in the image above may not match the name that is actually displayed. 4. The following information will be displayed in the [Partitions] section: [Share Name] This is the name of shared drive shown in your network.
  • Page 250 [Action] The icon is used to configure partition. Caution: If the displayed [Share Name] is [Unallocated Space], the hard disk space has no partition yet. 5. Click on the button in the [Unallocated Space] field. Click on the button 6. The [Partition Type] window will be displayed. Select the type of partition you wish to create, and click [Next].
  • Page 251 If you have selected [Primary Partition], see the [Creating Primary Partition] section below. If you have selected [Extended Partition], directly proceed to the [Creating an Extended Partition or Logical Partition] section. ■ Creating Primary Partition 1. In the [Partition Type] window, select [Primary Partition] and click on the [Next] button. Select Click 2.
  • Page 252 Caution: This product uses the 1GB = 1024MB ratio to calculate disk space. 3. The [Partition Format] window will be displayed. Select [Format Partition] and click on the [Next] button. Select Click 4. The [Partition File System] window will be displayed. Select the formatting file system you wish to use, and click on the [Next] button.
  • Page 253 Click 6. A new partition is created, and the [File Server Disk Information] window will be displayed again. If the [Status] is [Formatting], the partition is being formatted and thus the disk cannot be accessed yet. Please wait until the [Status] is [Ready]. Wait until the status is [Ready] Caution:...
  • Page 254 Select Click 2. The [Partition Size] window will be displayed. Enter the desired partition size in the [Partition Size] field and click on the [Next] button. Partition size can be any value between the minimum disk space size and maximum size. Enter partition size Click Caution:...
  • Page 255 Click 4. A new partition will be created, and the [File Server Disk Information] window will be displayed again. Click on the button of the [Unallocated Space] field. Click on the button 5. The [Partition Type] window will be displayed. Click on the [Next] button. Click 6.
  • Page 256 between the minimum disk space size and maximum size. Enter partition size Click Caution: This product uses the 1GB = 1024MB ratio to calculate disk space. 7. The [Partition Format] window will be displayed. Select [Format Partition] and click on the [Next] button.
  • Page 257 Select Click Caution: If you have selected EXT2 as format mode, make sure that the partition size does not exceed 137438MB (137GB). If you wish to use a partition that is greater than 137GB in size, select the FAT32 mode to format it. 9.
  • Page 258: Attaching A Formatted Usb Storage Device

    Wait until the status is [Ready] Caution: If the status does not change from [Format] for a long period of time, click on the [Refresh] button. 11. If there is any other [Unallocated Space], you can repeat the steps above to create additional partitions.
  • Page 259 Click 3. The USB storage device will be shown in the [Network Map] window. Click on the device icon. Click 4. The [File Server Disk Information] window will be displayed. The partition information of the storage device will be shown in the [Partitions] section. The [Share Name] of partitions formatted with the NTFS file system will be indicated as [Unsupported (or equivalent term)].
  • Page 260 [Unsupported] or equivalent term Caution: The [Description] field will show the name of the hard disk you are using. The name shown in the image above may not match the name that is actually displayed. 5. Click on the [Format Partition] icon in the [Action] field. Click 6.
  • Page 261 Select Click Caution: If you have selected EXT2 as format mode, make sure that the partition size does not exceed 137438MB (137GB). If you wish to use a partition that is greater than 137GB in size, select the FAT32 mode to format it. 7.
  • Page 262 Wait until the status is [Ready] Caution: If the status does not change from [Format] for a long period of time, click on the [Refresh] button. 9. The partition status changes to [Ready] when the formatting process is complete. The newly created partition can be used as a file server or Web server.
  • Page 263: Deleting An Existing Partition

    11.1.6 Deleting an Existing Partition This step shows how to delete a partition on the USB storage device. 1. Click on the [Home] icon on the side bar. Click 2. The storage device will be shown in the [Network Map] window. Click on the icon of the USB storage device.
  • Page 264 Click 3. The [File Server Disk Information] window will be displayed. Click on the icon of the partition you wish to delete. Click on the button Caution: The [Description] field will show the name of the hard disk you are using. The name shown in the image above may not match the name that is actually displayed.
  • Page 265 [Attention] window If the partition is being accessed by any user at this moment, the following message will be displayed. Wait until the access from the user is over and delete the partition. A warning message will be displayed 5. Click on the [OK] button to delete the partition. Caution: All data in the partition will be lost after the deletion process.
  • Page 266: Removing The Hard Disk

    Verify that unallocated space has increased 11.1.7 Removing the Hard Disk This section describes how to remove the USB storage device from the product. The storage device must be unmounted before it is physically removed from the router. 1. Click on the [Home] icon on the side bar. Click 2.
  • Page 267 Click 3. The [File Server Disk Information] window will be displayed. Click on the [Unmount] button. Click Caution: The [Description] field will show the name of the hard disk you are using. The name shown in the image above may not match the name that is actually displayed. 4.
  • Page 268 the storage device is no longer being accessed by any user, there is a chance that the device still has an active session. Wait for approximately ten minutes and unmount the device again. (A session expires in about ten minutes.) 5.
  • Page 269: Access Configuration

    11.2 Access Configuration Although the product serves as a file serve when a USB storage device is attached to it, a workgroup and user account need to be configured to access the partitions created on the storage device. This section describes how to configure/create a workgroup and a user account. 11.2.1 Configuring a Workgroup Computers accessing the file server need to belong to the same workgroup as the product.
  • Page 270 [Advanced] window Click 3. In the [NetBIOS Workgroup] field under [File Server], enter the name of workgroup that has been already configured to your computer. Click on the [OK] button.
  • Page 271: Creating A User Account

    Enter workgroup name Caution: The workgroup of the computers accessing the file server must be the same. If a different workgroup is used, the file server icon will not be displayed in the My Network window of the computer. 4. The [Advanced] window will be displayed again. Proceed to the next section to create a user account.
  • Page 272 Click 2. The [Advanced] window will be displayed. Click on the [Users] icon. [Advanced] window Click 3. The [Users] window will be displayed. Click on the button of the [New User] field.
  • Page 273 Click on the button 4. The [User Settings] window will be displayed. Enter [Full Name], [User Name] and [New Password]. Caution: If the OS of the user is Windows ®, enter the same Windows ® login name and login password already used by the user. 5.
  • Page 274: Accessing The File Server

    ■ Read Files from File Server Users with this permission will be allowed to read data from the file server. ■ Write Files to File Server Users with this permission will be allowed to both i)write data to the file server and ii)delete data in the server.
  • Page 275 Click 2. The [System Properties] window will be displayed. Click on the [Computer Name] tab. Click 3. Click on the [Change] button.
  • Page 276 Click 4. The [Computer Name Changes] window will be displayed. In the [Member of] section, select [Workgroup]. In the [Workgroup] field, enter the same workgroup name as [NetBIOS Workgroup] of the product.
  • Page 277 Select Enter workgroup name 5. Click on the [OK] button. When the [Computer Name Changes] window is displayed, click on the [OK] button. Click 6. The [System Properties] will be displayed again. Click on the [OK] button. When the [Computer Name Changes] window is displayed again, click on the [OK] button to restart the computer.
  • Page 278 Right-click Click 2. The [System Properties] window will be displayed. Click on the [Network Identification] tab. Click 3. Click on the [Properties] button.
  • Page 279 Click 4. The [Identification Changes] window will be displayed. Select [Workgroup] in the [Member of] section. In the [Workgroup] field, enter the same workgroup name as the [NetBIOS Workgroup] name of the product.
  • Page 280 Select Enter workgroup name 5. Click on the [OK] button. When the [Network Identification] window is displayed, click on the [OK] button. Click 6. The [Network Identification] window will be displayed again. Click on the [OK] button. Click 7. The [System Properties] window will be displayed again. Click on the [OK] button. When another window pops up and prompts you to restart PC, click on the [OK] button to...
  • Page 281 restart the computer. Click Windows ® Me 1. Right-click on the [My Network Places] icon on the desktop, then click on [Properties]. Right-click Click 2. The [Network] window will be displayed. Click on the [Identification] tab.
  • Page 282 Click 3. In the [Workgroup] field, enter the same work group name as the [NetBIOS Work Group] of the product.
  • Page 283 Enter work group name 4. Click on the [OK] button. When prompted to restart the system, click on the [OK] button to restart your computer. Click Windows ® 98/98 Second Edition 1. Right-click on the [Network Neighborhood] icon on the desktop, then click on [Properties].
  • Page 284 Right-click Click 2. The [Network] window will be displayed. Click on the [Identification] tab. Click 3. In the [Workgroup] field, enter the same work group name as the [NetBIOS Work Group] of the product.
  • Page 285 Enter work group name 4. Click on the [OK] button. When prompted to restart the system, click on the [OK] button to restart your computer. Click ■ Accessing the File Server Windows ® XP 1. Open the [Start] menu, then double-click on the [My Computer] icon.
  • Page 286 Click 2. The [My Computer] window will be displayed. Click on the [My Network Places] icon on the left. Click 3. The [My Network Places] window will be displayed. Locate the icon of the partition of the file server you wish to access, and double-click the icon.
  • Page 287 Caution: If you are prompted for user name and password, user data has not been registered to the product yet. Enter the same user name and password already configured on Windows ® Register user data 4. If the partitions of the file server are not shown in the [My Network Places] window, click on [View workgroup computers] on the left.
  • Page 288 Click 5. Computers belonging to the same workgroup will be listed. The file server of the product is shown as [File Server]. Double-click this icon to view the icon of each partition of the file server. Double-click the icon of the partition you wish to access. Double-click Windows ®...
  • Page 289 Double-click 2. The [Computers Near Me] window will be displayed. In the list of computers, locate the icon whose name is the same as the host name of the product (this is the file server). Double-click the icon and locate the icon of the partition you wish to access. Double-click the partition icon.
  • Page 290 window will be displayed. Locate the partition icon of the file server you wish to access, and double-click the icon. Double-click Caution: If you are prompted for user name and password, user data has not been registered to the product yet. See the [Creating a User Account] section above and register the same user name and password (already configured on Windows ®...
  • Page 291 3. The [Entire Network] window will be displayed. Double-click the icon labeled with the name of the work group. Double-click 4. Computers belonging to the same workgroup group will be listed. The icon bearing the host name of the product is the file server of the product. Double-click this icon to view the icon of each partition of the file server.
  • Page 292 Windows ® 98/98 Second Edition 1. Double-click the [Network Neighborhood] icon on the desktop. Computers belonging to the same workgroup will be listed. Locate the icon bearing the host name of the product (this is the file server), and double-click it. Partition icons of the file server will be displayed.
  • Page 293: Configuring A Web Server

    11.3 Configuring a Web Server Each of the partitions created on the USB storage device can be also used as a Web server. Simply copy HTML files to each partition you wish to use as a Web server. The web (HTML) pages on the partition are publicly accessible on the Internet.
  • Page 294 Click 3. Select the [Using the Well-Known HTTP Port (80)] option and click on the [OK] button. Select Click...
  • Page 295 4. The Web server is publicly accessible on the Internet now. To access it via a Web browser, enter http://The-address-of-the-product/Drive-Letter(A-Z)/File-Name in the address field of the browser. Enter address Caution: Use the WAN side IP address of the product or an address registered to Dynamic DNS (when Dynamic DNS is in use) as [The-address-of-the-product] above.
  • Page 296: Chapter 12 Printer Server

    Chapter 12 Printer Server This print server of product only supports Windows ® OS. 12.1 Printer Server Setting 1. Open the browser 2. Web site enter http://192.168.1.1 http://brc14vg and then Enter. The Login pop-up screen will appear. 3. Type user name and password and then click [OK]. Once you have logged in the [Network Map] screen will appear.
  • Page 297 Click 5. The [Option Settings] window will be displayed. Click on the [Print Server] icon. [Option Settings] window Click 6. The [Print Server] window will be displayed. Input any name into [Printer Name] field and select [Enable Print server] check box, then click [OK]. Enter printer name Select Click...
  • Page 298: Printer Setting

    12.2 Printer Setting Windows ® XP/2000 (TCP/IP) 1. Windows XP: Click [Start] -> [Printers and Faxes]. Windows 2000: Click [Start] -> [Settings] -> [Printers]. Click Windows XP: Click Windows 2000: 2. Windows XP: Click [Add a printer]. Windows 2000: Double-click [Add Printer] icon.
  • Page 299 Click Windows XP: Double-click Windows 2000: 3. Click [Next] button. Click 4. Select [Local printer attached to this computer] and uncheck [Automatically detect and install my Plug and Play printer], then click [Next].
  • Page 300 Select Uncheck Click 5. Select [Standard TCP/IP Port] of [Create a new port], and then click [Next]. Select Select [Standard TCP/IP Port] Click 6. Click [Next] to continue.
  • Page 301 Click 7. [Add Port] screen will appear. Enter 192.168.1.1 at [Printer Name or IP Address], and then click [Next]. Enter IP address Click 8. [Additional Port Information Required] screen will appear. Select [Custom] and then click [Settings…].
  • Page 302 Select [Custom] and click [Settings…] button 9. [Configure Standard TCP/IP Port Monitor] screen will appear. Select [LPR] of [Protocol]. Enter lp at [Queue Name] of [LPR Settings]. Make a check at box of [LPR Byte Counting Enabled] then click [OK] to continue. Select Enter “lp”...
  • Page 303 Click 11. [Completing the Add Standard TCP/IP Printer Port Wizard] screen will appear. Click [Finish] button. Click 12. [Add Printer Wizard] screen will appear. Highlight the printer you using then click [Next].
  • Page 304 Select printer Click Notice: if you can not find your printer in the list that means have not installed your printer diver. Please refer to printer manual for installation of printer driver. 13. If the test page printed, click [OK]. Click Now you are ready to print.
  • Page 305: Chapter 13 Specifications

    Chapter 13 Specifications Items Description Product Name Multi-Use VPN Router Model Number BRC-14VG Network WAN Port 10/100BASE-TX Auto-Negotiation Port x 1 (RJ-45 Configuration Connector) Supports IEEE802.3, IEEE802.3u, AutoMDI/MDI-X LAN Ports 10/100BASE-TX Auto-Negotiation Port x 4 (RJ-45 Connector) Supports IEEE802.3, IEEE802.3u,...

Table of Contents