VigorPro 5300 Unified Security Firewall User’s Guide Version: 2.0 Date: 2008/05/29 Copyright 2008 All rights reserved. This publication contains information that is protected by copyright. No part may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without written permission from the copyright holders. The scope of delivery and other details are subject to change without prior notice. Microsoft is a registered trademark of Microsoft Corp.
Safety Instructions and Approval Safety Instructions Warranty z z Read the installation guide thoroughly before you set up the router. The router is a complicated electronic unit that may be repaired only be authorized and qualified personnel. Do not try to open or repair the router yourself. z Do not place the router in a damp or humid place, e.g. a bathroom. z The router should be used in a sheltered area, within a temperature range of +5 to +40 Celsius.
European Community Declarations Manufacturer: Address: Product: DrayTek Corp. No. 26, Fu Shing Road, HuKou County, HsinChu Industrial Park, Hsin-Chu, Taiwan 303 VigorPro 5300 Series DrayTek Corp. declares that VigorPro 5300 Series is in compliance with the following essential requirements and other relevant provisions of R&TTE Directive 1999/5/EEC.
Table of Contents 1 Preface ...............................................................................................................1 1.1 Web Configuration Buttons Explanation ................................................................................. 1 1.2 LED Indicators and Connectors .............................................................................................. 2 1.1.1 For VigorPro5300 .........................................................................................
3.4.1 IP Object ......................................................................................................................... 56 3.4.2 IP Group ......................................................................................................................... 58 3.4.3 Service Type Object ....................................................................................................... 59 3.4.4 Service Type Group..........................................................................
3.12.3 Phone Settings ........................................................................................................... 163 3.12.4 Status.......................................................................................................................... 178 3.13 ISDN.................................................................................................................................. 179 3.13.1 Basic Concept..........................................................................
4.6 Backup and Upgrade Signature for Anti-Intrusion/Anti-Virus .................................................. 256 4.7 Switching between DT-DT and DT-KL ................................................................................ 257 4.8 Enabling Anti-Virus/Anti-Intrusion/Anti-Spam...................................................................... 259 5 Application and Examples ............................................................................261 5.
1 Preface VigorPro 5300 is a broadband router with dual-WAN interface. It provides policy-based load-balance, fail-over and BOD (Bandwidth on Demand), also it integrates IP layer QoS, NAT session/bandwidth management to help users control works well with large bandwidth.
1.2 LED Indicators and Connectors 1.1.1 For VigorPro5300 LED Status Explanation ACT (Activity) Blinking Off On (Yellow) On (Yellow) On The router is powered on and running normally. The router is powered off. The anti-intrusion function is enabled. IDP (Intrusion Detection and Prevention) Virus CSM WAN1/2 MGMT VPN QoS The anti-virus function is enabled.
Interface Description Factory Reset Restore the default settings. Usage: Turn on the router (ACT LED is blinking). Press the hole and keep for more than 5 seconds. When you see the ACT LED begins to blink rapidly than usual, release the button. Then the router will restart with the factory default configuration. Restart the router forcefully. Connecters for remote networked devices. Connecters for local networked devices. Connecter for a power adapter. Power Switch.
1.1.2 For VigorPro5300n LED Status Explanation ACT (Activity) Blinking Off On (Yellow) On (Yellow) On Blinking The router is powered on and running normally. The router is powered off. The anti-intrusion function is enabled. IDP (Intrusion Detection and Prevention) Virus WLAN WAN1/2 MGMT VPN QoS The anti-virus function is enabled. On Blinking On Blinking On On Wireless access point is ready. It will blink slowly while wireless traffic goes through.
Interface Description Wireless LAN ON/OFF/WPS Factory Reset Press "Wireless LAN ON/OFF/WPS" button for 2 seconds to wait for client device making network connection through WPS. Press "Wireless LAN ON/OFF/WPS" button once to enable (WLAN LED on) or disable (WLAN LED off) wireless connection. Restore the default settings. Usage: Turn on the router (ACT LED is blinking). Press the hole and keep for more than 5 seconds. When you see the ACT LED begins to blink rapidly than usual, release the button.
1.1.3 For VigorPro5300Vn LED Status Explanation ACT (Activity) Blinking Off On (Yellow) On (Yellow) On Blinking The router is powered on and running normally. The router is powered off. The anti-intrusion function is enabled. IDP (Intrusion Detection and Prevention) Virus WLAN WAN1/2 MGMT Phone 1/2 The anti-virus function is enabled. On Blinking On Blinking On Off Blinking Wireless access point is ready. It will blink slowly while wireless traffic goes through.
Interface Description Wireless LAN ON/OFF/WPS Factory Reset Press "Wireless LAN ON/OFF/WPS" button for 2 seconds to wait for client device making network connection through WPS. Press "Wireless LAN ON/OFF/WPS" button once to enable (WLAN LED on) or disable (WLAN LED off) wireless connection. Restore the default settings. Usage: Turn on the router (ACT LED is blinking). Press the hole and keep for more than 5 seconds. When you see the ACT LED begins to blink rapidly than usual, release the button.
1.1.4 For VigorPro5300VS LED Status Explanation ACT (Activity) Blinking Off On (Yellow) On (Yellow) On The router is powered on and running normally. The router is powered off. The anti-intrusion function is enabled. IDP (Intrusion Detection and Prevention) Virus CSM WAN1/2 On Blinking On Blinking On Off Blinking MGMT Phone 1/2 The anti-virus function is enabled.
Right LED (Green) LAN 1/2/3/4 Left LED (Green) Right LED (Green) On Off On Off Blinking On Off The port is connected with 100Mbps. The port is connected with 10Mbps. The port is connected. The port is disconnected. The data is transmitting. The port is connected with 100Mbps. The port is connected with 10Mbps. Interface Description Factory Reset Restore the default settings. Usage: Turn on the router (ACT LED is blinking). Press the hole and keep for more than 5 seconds.
1.1.5 For VigorPro5300VSn LED Status Explanation ACT (Activity) Blinking Off On (Yellow) On (Yellow) On Blinking The router is powered on and running normally. The router is powered off. The anti-intrusion function is enabled. IDP (Intrusion Detection and Prevention) Virus WLAN WAN1/2 On Blinking On Blinking On Off Blinking MGMT Phone 1/2 The anti-virus function is enabled. Wireless access point is ready. It will blink slowly while wireless traffic goes through.
LAN 1/2/3/4 Right LED (Green) Left LED (Green) Right LED (Green) Blinking On Off On Off Blinking On Off The data is transmitting. The port is connected with 100Mbps. The port is connected with 10Mbps. The port is connected. The port is disconnected. The data is transmitting. The port is connected with 100Mbps. The port is connected with 10Mbps.
1.3 Hardware Installation Before starting to configure the router, you have to connect your devices correctly. 1. Connect a cable Modem/DSL Modem/Media Converter (depends on your requirement) to any WAN port of router with Ethernet cable (RJ-45). The WAN1/WAN2 LED (Right) will light up according to the network speed (100 or 10) of the device that it connected. 2.
NT mode in VoIP>> Phone Settings, the orange LED will light on to indicate ISDN2-S0 is selected. And by using ISDN phone adapters (coming from the router package), the user can connect several phones to Vigor5300VS for communication. Refer to the following figure for reference. Yet, if the user configures ISDN S0 2 as TE Mode in VoIP>> Phone Settings, the green LED will light on to indicate ISDN2-TE is selected. Then, the port is specified for ISDN line only. Refer to the following figure for reference.
14 VigorPro5300 Series User’s Guide
2 Configuring Basic Settings For use the router properly, it is necessary for you to change the password of web configuration for security and adjust primary basic settings. This chapter explains how to setup a password for an administrator and how to adjust basic settings for accessing Internet successfully. Be aware that only the administrator can change the router configuration. 2.
3. Now, the Main Screen will pop up. Note: The home page will change slightly in accordance with the router you have. 16 4. Go to System Maintenance page and choose Administrator Password. 5. Enter the login password (the default is blank) on the field of Old Password. Type a new one in the field of New Password and retype it on the field of Retype New Password. Then click OK to continue. 6. Now, the password has been changed.
2.2 Quick Start Wizard If your router can be under an environment with high speed NAT, the configuration provide here can help you to deploy and use the router quickly. The first screen of Quick Start Wizard is entering login password. After typing the password, please click Next. On the next page as shown below, please select the WAN interface that you use. Choose Auto negotiation as the physical type for your router. Then click Next for next step.
On the next page as shown below, please select the appropriate Internet access type according to the information from your ISP. For example, you should select PPPoE mode if the ISP provides you PPPoE interface. Then click Next for next step. In the Quick Start Wizard, you can configure the router to access the Internet with different protocol/modes such as PPPoE, PPTP, Static IP or DHCP. The router supports the DSL WAN interface for Internet access. 2.2.
If your ISP provides you the PPPoE connection, please select PPPoE for this router. The following page will be shown. User Name Assign a specific valid user name provided by the ISP. Password Assign a valid password provided by the ISP. Confirm Password Retype the password for confirmation. Click Next for viewing summary of such connection. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system status of this protocol will be shown.
2.2.2 PPTP Click PPTP as the protocol. Type in all the information that your ISP provides for this protocol. Click Next for viewing summary of such connection. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system status of this protocol will be shown.
2.2.3 Static IP Click Static IP as the protocol. Type in all the information that your ISP provides for this protocol. After finishing the settings in this page, click Next to see the following page. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system status of this protocol will be shown.
2.2.4 DHCP Click DHCP as the protocol. Type in all the information that your ISP provides for this protocol. After finishing the settings in this page, click Next to see the following page. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system status of this protocol will be shown.
2.3 Online Status The online status shows the system status, WAN status, ADSL Information and other status related to this router within one page. If you select PPPoE/PPTP as the protocol, you will find out a link of Dial PPPoE/PPPoA or Drop PPPoE/PPPoA in the Online Status web page.
Online status for DHCP Detailed explanation is shown below: Primary DNS Displays the IP address of the primary DNS. Secondary DNS Displays the IP address of the secondary DNS. LAN Status IP Address Displays the IP address of the LAN interface. TX Packets Displays the total transmitted packets at the LAN interface. RX Packets Displays the total number of received packets at the LAN interface. WAN1/2 Status Line Displays the physical connection (Ethernet) of this interface.
2.4 Saving Configuration Each time you click OK on the web page for saving the configuration, you can find messages showing the system interaction with you. Ready indicates the system is ready for you to input settings. Settings Saved means your settings are saved once you click Finish or OK button.
This page is left blank.
3 Advanced Web Configuration After finished basic configuration of the router, you can access Internet with ease. For the people who want to adjust more setting for suiting his/her request, please refer to this chapter for getting detailed information about the advanced configuration of this router. As for other examples of application, please refer to chapter 4. 3.1 WAN Quick Start Wizard offers user an easy method to quick setup the connection mode for the router.
Below shows the menu items for WAN. 3.1.2 General Setup This section will introduce some general settings of Internet and explain the connection modes for WAN1 and WAN2 in details. This router supports dual WAN function. It allows users to access Internet and combine the bandwidth of the dual WAN to speed up the transmission through the network. Each WAN port can connect to different ISPs, Even if the ISPs use different technology to provide telecommunication service (such as DSL, Cable modem, etc.).
Physical Type You can change the physical type for WAN2 or choose Auto negotiation for determined by the system. Load Balance Mode If you know the practical bandwidth for your WAN interface, please choose the setting of According to Line Speed. Otherwise, please choose Auto Weigh to let the router reach the best load balance. Line Speed If your choose According to Line Speed as the Load Balance Mode, please type the line speed for downloading and uploading through WAN1/WAN2. The unit is kbps.
3.1.3 Internet Access For the router supports dual WAN function, the users can set different WAN settings (for WAN1/WAN2) for Internet Access. Due to different physical mode for WAN1 and WAN2, the Access Mode for these two connections also varies slightly. Index It shows the WAN modes that this router supports. WAN1 is the default WAN interface for accessing into the Internet. WAN2 is the optional WAN interface for accessing into the Internet when WAN 1 is inactive for some reason.
Details Page for PPPoE To use PPPoE as the accessing protocol of the internet, please choose Internet Access from WAN menu. Then, select PPPoE mode for WAN2. The following web page will be shown. PPPoE Client Mode Click Enable for activating this function. If you click Disable, this function will be closed and all the settings that you adjusted in this page will be invalid.
Ping IP – If you choose Ping Detect as detection mode, you have to type IP address in this field for pinging. TTL (Time to Live) – Displays value for your reference. TTL value is set by telnet command. PPP/MP Setup PPP Authentication – Select PAP only or PAP or CHAP for PPP. Idle Timeout – Set the timeout for breaking down the Internet after passing through the time without any action. This setting is active only when the Active on demand option for Active Mode is selected in WAN>> General Setup page.
For static IP mode, you usually receive a fixed public IP address or a public subnet, namely multiple public IP addresses from your DSL or Cable ISP service providers. In most cases, a Cable service provider will offer a fixed public IP, while a DSL service provider will offer a public subnet. If you have a public subnet, you could assign an IP address or many IP address to the WAN interface. To use Static or Dynamic IP as the accessing protocol of the internet, please choose Internet Access from WAN menu.
PING Interval - Enter the interval for the system to execute the PING operation. WAN Connection Detection Such function allows you to verify whether network connection is alive or not through ARP Detect or Ping Detect. Mode – Choose ARP Detect or Ping Detect for the system to execute for WAN detection. Ping IP – If you choose Ping Detect as detection mode, you have to type IP address in this field for pinging. TTL (Time to Live) – Displays value for your reference. TTL value is set by telnet command.
Specify a MAC Address: Some Cable service providers specify a specific MAC address for access authentication. In such cases you need to click the Specify a MAC Address and enter the MAC address in the MAC Address field. DNS Server IP Address Type in the primary IP address for the router if you want to use Static IP mode. If necessary, type in secondary IP address for necessity in the future.
PPP Setup PPP Authentication - Select PAP only or PAP or CHAP for PPP. Idle Timeout - Set the timeout for breaking down the Internet after passing through the time without any action. This setting is active only when the Active on demand option for Active Mode is selected in WAN>> General Setup page. IP Address Assignment Method(IPCP) Fixed IP - Usually ISP dynamically assigns IP address to you each time you connect to it and request.
3.1.4 Load-Balance Policy This router supports the function of load balancing. It can assign traffic with protocol type, IP address for specific host, a subnet of hosts, and port range to be allocated in WAN1 or WAN2 interface. The user can assign traffic category and force it to go to dedicate network interface based on the following web page setup. Twenty policies of load-balance are supported by this router. Note: Load-Balance Policy is running only when both WAN1 and WAN2 are activated.
Dest Port Start Displays the IP address for the start of the destination port. Dest Port End Displays the IP address for the end of the destination port. Click Index 1 to access into the following page for configuring load-balance policy. 38 Enable Check this box to enable this policy. Protocol Use the drop-down menu to choose a proper protocol for the WAN interface. Binding WAN interface Choose the WAN interface (WAN1 or WAN2) for binding.
3.2 LAN Local Area Network (LAN) is a group of subnets regulated and ruled by router. The design of network structure is related to what type of public IP addresses coming from your ISP. 3.2.1 Basics of LAN The most generic function of Vigor router is NAT. It creates a private subnet of your own. As mentioned previously, the router will talk to other public hosts on the Internet by using public IP address and talking to local hosts by using its private IP address.
What is Routing Information Protocol (RIP) Vigor router will exchange routing information with neighboring routers using the RIP to accomplish IP routing. This allows users to change the information of the router such as IP address and the routers will automatically inform for each other. What is Static Route When you have several subnets in your LAN, sometimes a more effective and quicker way for connection is the Static routes function rather than other method.
3.2.2 General Setup This page provides you the general settings for LAN. Click LAN to open the LAN settings page and choose General Setup. 1st IP Address Type in private IP address for connecting to a local private network (Default: 192.168.1.1). 1st Subnet Mask Type in an address code that determines the size of the network. (Default: 255.255.255.0/ 24) For IP Routing Usage Click Enable to invoke this function. The default setting is Disable.
Start IP Address: Enter a value of the IP address pool for the DHCP server to start with when issuing IP addresses. If the 2nd IP address of your router is 220.135.240.1, the starting IP address must be 220.135.240.2 or greater, but smaller than 220.135.240.254. IP Pool Counts: Enter the number of IP addresses in the pool. The maximum is 10. For example, if you type 3 and the 2nd IP address of your router is 220.135.240.1, the range of IP address by the DHCP server will be from 220.135.240.2 to 220.135.240.
DHCP Server IP Address for Relay Agent - Set the IP address of the DHCP server you are going to use so the Relay Agent can help to forward the DHCP request to the DHCP server. DNS Server Configuration DNS stands for Domain Name System. Every Internet host must have a unique IP address, also they may have a human-friendly, easy to remember name such as www.yahoo.com. The DNS server converts the user-friendly name into its equivalent IP address.
Destination Address Displays the destination address of the static route. Status Displays the status of the static route. Viewing Routing Table Displays the routing table for your reference. Add Static Routes to Private and Public Networks Here is an example of setting Static Route in Main Router so that user A and B locating in different subnet can talk to each other via the router.
Note: There are two reasons that we have to apply RIP Protocol Control on 1st Subnet. The first is that the LAN interface can exchange RIP packets with the neighboring routers via the 1st subnet (192.168.1.0/24). The second is that those hosts on the internal private subnets (ex. 192.168.10.0/24) can access the Internet via the router, and continuously exchange of IP routing information with different subnets. 1. Click the LAN - Static Route and click on the Index Number 1. Check the Enable box.
3.2.4 VLAN Virtual LAN function provides you a very convenient way to manage hosts by grouping them based on the physical port. You can also manage the in/out rate of each port. Go to LAN page and select VLAN. The following page will appear. Click Enable to invoke VLAN function. To add or remove a VLAN, please refer to the following example. 1. 46 If, VLAN 0 is consisted of hosts linked to P1 and P2 and VLAN 1 is consisted of hosts linked to P3 and P4.
2. After checking the box to enable VLAN function, you will check the table according to the needs as shown below. To remove VLAN, uncheck the needed box and click OK to save the results. 3.2.5 Bind IP to MAC This function is used to bind the IP and MAC address in LAN to have a strengthen control in network. When this function is enabled, all the assigned IP and MAC address binding together cannot be changed. If you modified the binding IP or MAC address, it might cause you not access into the Internet.
and MAC address listed in ARP table can be selected and added to IP Bind List by clicking Add below. Add and Edit IP Address – Type the IP address that will be used for the specified MAC address. Mac Address – Type the MAC address that is used to bind with the assigned IP address. Refresh It is used to refresh the ARP table. When there is one new PC added to the LAN, you can click this link to obtain the newly ARP table information. IP Bind List It displays a list for the IP bind to MAC information.
3.3.1 Port Redirection Port Redirection is usually set up for server related service inside the local network (LAN), such as web servers, FTP servers, E-mail servers etc. Most of the case, you need a public IP address for each server and this public IP address/domain name are recognized by all users.
Press any number under Index to access into next page for configuring port redirection. 50 Enable Check this box to enable such port redirection setting. Mode Two options (Single and Range) are provided here for you to choose. To set a range for the specific service, select Range. In Range mode, if the public port (start port and end port) and the starting IP of private IP had been entered, the system will calculate and display the ending IP of private IP automatically.
box (as the starting point). The second one is assigned automatically after you type the private port number below. Private Port Specify the private port number of the service offered by the internal host. After you enter the proper number in this box, the second box of Private IP address will be assigned accordingly. Active Check this box to activate the port-mapping entry you have defined. Note that the router has its own built-in services (servers) such as Telnet, HTTP and FTP etc.
3.3.2 DMZ Host As mentioned above, Port Redirection can redirect incoming TCP/UDP or other traffic on particular ports to the specific private IP address/port of host in the LAN. However, other IP protocols, for example Protocols 50 (ESP) and 51 (AH), do not travel on a fixed port. Vigor router provides a facility DMZ Host that maps ALL unsolicited data on any protocol to a single host in the LAN.
True…. MAC address of the one you want. If you previously have set up WAN Alias in Internet Access>>PPPoE, you will find them in Aux. WAN IP list for your selection. Enable Check to enable the DMZ Host function. Private IP Enter the private IP address of the DMZ host, or click Choose PC to select one. Choose PC Click this button and then a window will automatically pop up, as depicted below. The window consists of a list of private IP addresses of all hosts in your LAN network.
3.3.3 Open Ports Open Ports allows you to open a range of ports for the traffic of special applications. Common application of Open Ports includes P2P application (e.g., BT, KaZaA, Gnutella, WinMX, eMule and others), Internet Camera etc. Ensure that you keep the application involved up-to-date to avoid falling victim to any security exploits. Click Open Ports to open the following page: Index Indicate the relative number for the particular entry that you want to offer service in a local host.
Enable Open Ports Check to enable this entry. Comment Make a name for the defined network application/service. WAN Interface Specify the WAN interface that will be used for this entry. Local Computer Enter the private IP address of the local host or click Choose PC to select one. Choose PC Click this button and, subsequently, a window having a list of private IP addresses of local hosts will automatically pop up. Select the appropriate IP address of the local host in the list.
3.4 Objects Settings For IPs in a range, service ports in a limited range and keywords usually will be applied for configuring router’s settings, we can define them with objects and bind them with groups for using conveniently. Later, we can select that object/service/keyword for applying. For example, all the IPs in the same department can be defined with an IP object (a range of IP address). 3.4.1 IP Object You can set up to 192 sets of IP Objects with different conditions.
Name Type a name for this profile. Maximum 15 characters are allowed. Interface Choose a proper interface (WAN, LAN or Any). For example, the Direction setting in Edit Filter Rule will ask you specify IP or IP range for WAN or LAN or any IP address. If you choose LAN as the Interface here, and choose LAN as the direction setting in Edit Filter Rule, then all the IP addresses specified with LAN interface will be opened for you to choose in Edit Filter Rule page.
3.4.2 IP Group This page allows you to bind several IP objects into one IP group. Set to Factory Default Clear all profiles. Click the number under Index column for settings in detail. 58 Name Type a name for this profile. Maximum 15 characters are allowed. Interface Choose WAN, LAN or Any to display all the available IP objects with the specified interface.
3.4.3 Service Type Object You can set up to 96 sets of Service Type Objects with different conditions. Set to Factory Default Clear all profiles. Click the number under Index column for settings in detail. Name Type a name for this profile. Protocol Specify the protocol(s) which this profile will apply to. Source/Destination Port Source Port and the Destination Port column are available for TCP/UDP protocol. It can be ignored for other protocols. The filter rule will filter out any port number.
(!=) – when the first and last value are the same, it indicates all the ports except the port defined here; when the first and last values are different, it indicates that all the ports except the range defined here are available for this service type. (>) – the port number greater than this value is available. (<) – the port number less than this value is available for this profile. Below is an example of service type objects settings. 3.4.
Name Type a name for this profile. Available Service Type Objects You can add IP objects from IP Object page. All the available IP objects will be shown in this box. Selected Service Type Objects Click box. button to add the selected IP objects in this 3.4.5 Keyword Object You can set 100 keyword object profiles for choosing as black /white list in Anti-Spam >>Profile Setting. Set to Factory Default Clear all profiles. Click the number under Index column for setting in detail.
Name Type a name for this profile, e.g., game. Contents Type the content for such profile. For example, type gambling as Contents. When you browse the webpage, the page with gambling information will be watched out and be passed/blocked based on the configuration on Firewall settings. 3.4.6 Keyword Group This page allows you to bind several keyword objects into one group. The keyword groups set here will be chosen as black /white list in Anti-Spam >>Profile Setting.
Available Keyword Objects Selected Keyword Objects You can gather keyword objects from Keyword Object page within one keyword group. All the available Keyword objects that you have created will be shown in this box. Click this box. button to add the selected Keyword objects in 3.4.7 File Extension Object This page allows you to set eight profiles which will be applied in CSM>>URL Content Filter and Defense Configuration>>Anti-Virus.
Profile Name Type a name for this profile. Type a name for such profile and check all the items of file extension that will be processed in the router. Finally, click OK to save this profile.
3.4.8 IM Object This page allows you to set 32 profiles for Instant Messenger. These profiles will be applied in Firewall>>IM/P2P Filter Profile for filtering. Set to Factory Default Clear all profiles. Click the number under Profile column for configuration in details. There are several types of Instant Messenger (IM) provided here for you to choose to disallow people using. Simple check the box (es) and then click OK.
Profile Name Type a name for this profile. Type a name for such profile and check all the items that not allowed to be used in the host. Finally, click OK to save this profile.
3.4.9 P2P Object This page allows you to set 32 profiles for peer-to-peer application. These profiles will be applied in Firewall>>IM/P2P Filter Profile for filtering. Set to Factory Default Clear all profiles. Click the number under Profile column for configuration in details. There are several items for P2P protocols provided here for you to choose to disallow people using. Simple check the box (es) and then click OK.
Profile Name Type a name for this profile. Type a name for such profile and check all the protocols that not allowed to be used in the host. Finally, click OK to save this profile.
3.4.10 Misc Object This page allows you to set 32 profiles for miscellaneous applications. These profiles will be applied in Firewall>>IM/P2P Filter Profile for filtering. Set to Factory Default Clear all profiles. Click the number under Profile column for configuration in details. Applications for tunneling and streaming are listed in the page for you to choose to disallow people using. Simple check the box (es) and then click OK.
Type a name for such profile and check all the protocols that not allowed to be used in the host. Finally, click OK to save this profile. 3.5 CSM Profile Content Security Management (CSM) CSM is an abbreviation of Content Security Management which is used to control IM/P2P usage, filter the web content and URL content to reach a goal of security management. IM/P2P Filter As the popularity of all kinds of instant messenger application arises, communication cannot become much easier.
Web surfing because each of multiple load balanced database servers can handle millions of requests for categorization. Note: The priority of URL Content Filter is higher than Web Content Filter. 3.5.1 IM/P2P Filter Profile You can define policy profiles for different policy of IM (Instant Messenger)/P2P (Peer to Peer) application. CSM profile can be used in Filter Setup page. Set to Factory Default Clear all profiles. Click the number under Index column for settings in detail.
3.5.2 URL Content Filter Profile Based on the list of user defined keywords, the URL Content Filter facility in Vigor router inspects the URL string in every outgoing HTTP request. No matter the URL string is found full or partial matched with a keyword, the Vigor router will block the associated HTTP connection. For example, if you add key words such as “sex”, Vigor router will limit web access to web sites or web pages such as “www.sex.com”, ”www.backdoor.net/images/sex/p_386.html”.
Priority It determines the action that this router will apply. Both: Pass – The router will let all the packages that match with the conditions specified in URL Access Control and Web Feature below passing through. When you choose this setting, both configuration set in this page for URL Access Control and Web Feature will be inactive. Both:Block –The router will block all the packages that match with the conditions specified in URL Access Control and Web Feature below.
Block - Restrict accessing into the corresponding webpage with the keywords listed on the box below. If the web pages do not match with the keyword set here, it will be processed with reverse action. Group/Object Selections – The Vigor router provides several frames for users to define keywords and each frame supports multiple keywords. The keyword could be a noun, a partial noun, or a complete URL string. Multiple keywords within a frame are separated by space, comma, or semicolon.
inside to outside world to protect the local user's privacy. Proxy - Check the box to reject any proxy transmission. To control efficiently the limited-bandwidth usage, it will be of great value to provide the blocking mechanism that filters out the multimedia files downloading from web pages. File Extension Profile – Choose one of the profiles that you configured in Object Setting>> File Extension Objects previously for passing or blocking the file downloading. 3.5.
Action Pass - allow accessing into the corresponding webpage with the categories listed on the box below. Block - restrict accessing into the corresponding webpage with the categories listed on the box below. If the web pages do not match with the specified feature set here, it will be processed with reverse action. Log None – There is no log file will be recorded for this profile. Pass – Only the log about Pass will be recorded in Syslog. Block – Only the log about Block will be recorded in Syslog.
restricts users in the local network from accessing the Internet. Furthermore, it can filter out specific packets that trigger the router to build an unwanted outgoing connection. The most basic security concept is to set user name and password while you install your router. The administrator login will prevent unauthorized access to the router configuration from your router. If you did not set password during installation; you can go to System Maintenance to set up your password.
z Call Filter - When there is no existing Internet connection, Call Filter is applied to all traffic, all of which should be outgoing. It will check packets according to the filter rules. If legal, the packet will pass. Then the router shall “initiate a call” to build the Internet connection and send the packet to Internet. z Data Filter - When there is an existing Internet connection, Data Filter is applied to incoming and outgoing traffic. It will check packets according to the filter rules.
vulnerability attacks will try to paralyze the system by offending the vulnerabilities of the protocol or operation system. The DoS Defense function enables the Vigor router to inspect every incoming packet based on the attack signature database. Any malicious packet that might duplicate itself to paralyze the host in the secure LAN will be strictly blocked and a Syslog message will be sent as warning, if you set up Syslog server. Also the Vigor router monitors the traffic.
80 Call Filter Check Enable to activate the Call Filter function. Assign a start filter set for the Call Filter. Data Filter Check Enable to activate the Data Filter function. Assign a start filter set for the Data Filter. Filter Select Pass or Block for the packets that do not match with the filter rules. IM/P2P Filter Select a CSM profile for global IM/P2P application blocking. All the hosts in LAN must follow the standard configured in the CSM profile selected here.
Web Content Filter Select one of the Web Content Filter profile settings (created in CSM>> Web Content Filter) for applying with this router. Please set at least one profile for anti-virus in CSM>> Web Content Filter web page first. For troubleshooting needs, you can specify to record information for Web Content Filter by checking the Log box. It will be sent to Syslog server. Please refer to section 3.14.4 Syslog/Mail Alert for more detailed information.
PCs with subnet “172.16.x.x” connected under VigorPro 5300 will be protected by security settings enabled and configured on the web pages of Vigor router. When the transparent mode has been checked, hackers from Internet do not sense the existence of vigor router, therefore they cannot attack the router. Advance Setting Click Edit to open the following window. However, it is strongly recommended to use the default settings here.
Window size – It determines the size of TCP protocol (0~65535). The more the value is, the better the performance will be. However, if the network is not stable, small value will be proper. Session timeout /Queue timeout–Setting timeout for sessions can make the best utilization of network resources. However, Queue timeout is configured for TCP protocol only; session timeout is configured for the data flow which matched with the firewall rule. Max.
3.6.3 Filter Setup Click Firewall and click Filter Setup to open the setup page. To edit or add a filter, click on the set number to edit the individual set. The following page will be shown. Each filter set contains up to 7 rules. Click on the rule number button to edit each rule. Check Active to enable the rule. Filter Rule Click a button numbered (1 ~ 7) to edit the filter rule. Click the button will open Edit Filter Rule web page. For the detailed information, refer to the following page.
Check to enable the Filter Rule Check this box to enable the filter rule. Comments Enter filter set comments/description. Maximum length is 14character long. Index (1-15) Set PCs on LAN to work at certain time interval only. You may choose up to 4 schedules out of the 15 schedules pre-defined in Applications >> Schedule setup. The default setting of this filed is blank and the function will always work. Direction Set the direction of packet flow (LAN->WAN/WAN->LAN). It is for Data Filter only.
To set the IP address manually, please choose Any Address/Single Address/Range Address/Subnet Address as the Address Type and type them in this dialog. In addition, if you want to use the IP range from defined groups or objects, please choose Group and Objects as the Address Type. From the IP Group drop down list, choose the one that you want to apply. Or use the IP Object drop down list to choose the object that you want.
choose Group and Objects as the Service Type. Protocol - Specify the protocol(s) which this filter rule will apply to. Source/Destination Port (=) – when the first and last value are the same, it indicates one port; when the first and last values are different, it indicates a range for the port and available for this service type.
checking the Log box. It will be sent to Syslog server. Please refer to section 3.14.4 Syslog/Mail Alert for more detailed information. Web Content Filter Select one of the Web Content Filter profile settings (created in CSM>> Web Content Filter Profile) for applying with this router. Please set at least one profile for anti-virus in CSM>> Web Content Filter Profile web page first. For troubleshooting needs, you can specify to record information for Web Content Filter by checking the Log box.
codepage, no decoding job of URL will be processed. Please use the drop-down list to choose a codepage. If you do not have any idea of choosing suitable codepage, please open Syslog. From Codepage Information of Setup dialog, you will see the recommended codepage listed on the dialog box. Window size – It determines the size of TCP protocol (0~65535). The more the value is, the better the performance will be. However, if the network is not stable, small value will be proper.
90 VigorPro5300 Series User’s Guide
3.6.4 DoS Defense As a sub-functionality of IP Filter/Firewall, there are 15 types of detect/defense function in the DoS Defense setup. The DoS Defense functionality is disabled for default. Click Firewall and click DoS Defense to open the setup page. Enable Dos Defense Check the box to activate the DoS Defense Functionality. Enable SYN flood defense Check the box to activate the SYN flood defense function.
packets per second. Block IP options Check the box to activate the Block IP options function. The Vigor router will ignore any IP packets with IP option field in the datagram header. The reason for limitation is IP option appears to be a vulnerability of the security for the LAN because it will carry significant information, such as security, TCC (closed user group) parameters, a series of Internet addresses, routing messages...etc. An eavesdropper outside might learn the details of your private networks.
reject this kind of packets. Warning Messages We provide Syslog function for user to retrieve message from Vigor router. The user, as a Syslog Server, shall receive the report sending from Vigor router which is a Syslog Client. All the warning messages related to DoS defense will be sent to user and user can review it through Syslog daemon. Look for the keyword DoS in the message, followed by a name to indicate what kind of attacks is detected.
3.7 Defense Configuration This menu allows you to set profiles for, activate, and upgrade the service of Anti-Intrusion/Anti-Virus/Anti-Spam in your system. 3.7.1 Anti-Intrusion Anti-Intrusion allows you to prevent the intrusion from hackers while accessing into Internet. It can detect the intrusion and execute basic defense. There are more than 200 basic rules for anti-intrusion and anti-virus for this router.
Anti-Intrusion Control Setup This field will display the signature version of this router. The default signature version is “basic”. In this version, you can modify the settings for Anti-Intrusion rules in Defense Configuration>>Anti-Intrusion >>Advanced Setup page. However, if you restart/reset the router, all the modified configurations for the rules will not be available and return to the default settings.
Enable Reset procession Click this radio button to break down the communication between your computer and specific link which might have intrusion actions. 3.7.1.2 Advanced Setup This page lists all the available types and allows you to adjust the rule setting for each type. The rules will be applied by the options chosen in the page of Defense Configuration>>Anti-Intrusion>>Basic Setup for Anti-Intrusion.
Enable Check to enable this rule. If you uncheck this box, the corresponding settings for the rule will not be executed. SID The number for each anti-intrusion rule is displayed in this field. Name A brief description name for the anti-intrusion rule is shown in this field. Click the name link to access into VigorPro website for checking the detailed information for the specified antiintrusion.
click Go to the specified page. Or you can click ⏐>, >>, << or >⏐ button on the right side of the Go button to access to the home/previous/next/end page. 3.7.2 Anti-Virus Vigor router can offer basic virus scanning, destroying and cut off the connection between questionable link and your computer for the files transmitted through specified protocol. In addition, several types of compressed file formats such as .zip, .gzip, .bzip2 are supported and can be scanned with this router.
Profile Name Type a name for the profile. Protocol Currently, only the files transmitted through the protocols listed in this page including SMTP, POP3, IMAP, HTTP and FTP will be scanned by this router. Action Choose the action that you want to apply to the protocols of each operation. Pass - Detect if there is any virus for your reference. The system will not do any advanced action for such condition. Destroy- Destroy the infected file found by the router system.
Detect Macro Attachment The file with macro attachment will be passed/destroyed/reset under different protocols. The system will detect it automatically if you set corresponding configuration here. Detect Encrypted Zipped Files The file zipped with encryption will be detected and then be passed/destroyed/reset according to the configuration set here.
SID/NAME To find the specific type of anti-virus, you can type its SID number or name in this field if you know, and then click Search. The system will locate that rule for you. Search Click this button to find out all the virus rules related to the SID/NAME that you entered. The page of the searching result will be shown as the following picture. Click each name link to check the detailed information of the anti-virus rule.
3.7.2.3 File Filter Profile To avoid confidential file being leaked out by someone else through network and cause severe consequence, you can specify the file name in this page and determine to destroy or scan or pass it while the file passes through the router. Before activating the File Filter Profile, you have to set one Anti-Virus profile on Defense Configuration>>Anti-Virus>>Profile Setting.
Default Action Choose one of the actions (Scan, Non-Scan, Destroy) as the default action if the file does not meet the conditions configured below. Keyword You can set three sets of keywords for this profile. Action Choose the action that you want to apply to the selected keyword. Destroy- Destroy the file with name specified here which is found by the router system. Non-Scan –The file will not be scanned and will not be processed by using general rules set in Anti-Virus profile.
To activate function of Anti-Spam, you have to configure profile(s) for your computer first. Please open Defense Configuration>>Anti- Spam menu to access into the following page. There are sixteen profiles provided by this system for you to define. Profile (1 ~16) There are sixteen profiles provided for you to define. Simply click the number link under Profile, the setting page for that number will be open for you to configure. Name List the name for the profile setting. 3.7.3.
Profile Name Type a name for such profile setting. Choose Protocol to Scan Spam Spam files usually come with protocol of SMTP or POP3. Please check the box that you want to avoid. It would be better to check both protocols. In addition, you can check Log All Mail Events to send record of all mail events to syslog. Select an Action for Each Category Mails would be judged and categorized into Spam, Bulk or normal mails.
following dialog. The keyword/group that you have set on Object Settings>>Keyword Object/ Object Settings>>Keyword Group will be displayed here for you to choose. Choose Action for System Timeout or Network Problem When the system fails due to system timeout or network problem, you can specify specific action (Pass or Tag) for the system to execute immediately. Pass – Choose this action to make all mails passing through.
Activate The Activate link brings you accessing into www.vigorpro.com to finish the activation of the account and the router. Authentication Message As for authentication information of Anti-Intrusion/Anti-Virus/Anti-Spam, the process of authenticating will be displayed on this field for your reference. 3.7.5 Signature Upgrade You can get the most updated signature from DrayTek’s server if the license key of anti-virus/anti-intrusion for the VigorPro5300 is not expired.
Signature Upgrade Setting It displays the signature version for your reference. There are three levels for the signature: basic – If you did not register and activate your account, you can just own the default 200 (or more) anti-intrusion and anti-virus rules for your router. DT-DT/DT-KL_XXXXXX – If you have registered and activated your AI/AV account, and downloaded the newest rules from www.vigorpro.com, you can see DT-DT/DT-KL in this field that means you have obtained the latest signature information.
After downloading is finished, the signature version will be upgraded and displayed on the web page. Upgrade Automatically Specify certain time for executing the upgrade automatically. Remember to check the Schedule Update box to activate the time settings. Every – It means the downloading procedure will be executed automatically whenever passing through the time (hours and minutes) that you set here.
3.8 Bandwidth Management Below shows the menu items for Bandwidth Management. 3.8.1 Sessions Limit A PC with private IP address can access to the Internet via NAT router. The router will generate the records of NAT sessions for such connection. The P2P (Peer to Peer) applications (e.g., BitTorrent) always need many sessions for procession and also they will occupy over resources which might result in important accesses impacted.
To activate the function of limit session, simply click Enable and set the default session limit. Enable Click this button to activate the function of limit session. Disable Click this button to close the function of limit session. Default session limit Defines the default session number used for each computer in LAN. Limitation List Displays a list of specific limitations that you set on this web page. Start IP Defines the start IP address for limit session.
In the Bandwidth Management menu, click Bandwidth Limit to open the web page. To activate the function of limit bandwidth, simply click Enable and set the default upstream and downstream limit. 112 Enable Click this button to activate the function of limit bandwidth. Disable Click this button to close the function of limit bandwidth. Default TX limit Define the default speed of the upstream for each computer in LAN.
have set in that web page. 3.8.3 Quality of Service Deploying QoS (Quality of Service) management to guarantee that all applications receive the service levels required and sufficient bandwidth to meet performance expectations is indeed one important aspect of modern enterprise network. One reason for QoS is that numerous TCP-based applications tend to continually increase their transmission rate and consume all available bandwidth, which is called TCP slow start.
However, each node may take different attitude toward packets with high priority marking since it may bind with the business deal of SLA among different DS domain owners. It’s not easy to achieve deterministic and consistent high-priority QoS traffic throughout the whole network with merely Vigor router’s effort. In the Bandwidth Management menu, click Quality of Service to open the web page. This page displays the QoS settings result of the WAN interface.
Enable the QoS Control The factory default for this setting is checked. Please also define which traffic the QoS Control settings will apply to. IN- apply to incoming traffic only. OUT-apply to outgoing traffic only. BOTH- apply to both incoming and outgoing traffic. Check this box and click OK, then click Setup link again. You will see the Online Statistics link appearing on this page. WAN Inbound Bandwidth It allows you to set the connecting rate of data input for WAN.
(for WAN1/WAN2) on the Bandwith Management>>Quality of Service. Edit the Class Rule for QoS The first three (Class 1 to Class 3) class rules can be adjusted for your necessity. To add, edit or delete the class rule, please click the Edit link of that one. After you click the Edit link, you will see the following page. Now you can define the name for that Class. In this case, “Test” is used as the name of Class Index #1.
For adding a new rule, click Add to open the following page. ACT Check this box to invoke these settings. Local Address Click the Edit button to set the local IP address (on LAN) for the rule. Remote Address Click the Edit button to set the remote IP address (on Lan/WAN) for the rule. Edit It allows you to edit source address information. Address Type – Determine the address type for the source address. For Single Address, you have to fill in Start IP address.
Edit the Service Type for Class Rule To add a new service type, edit or delete an existed service type, please click the Edit link under Service Type field. After you click the Edit link, you will see the following page. For adding a new service type, click Add to open the following page.
Service Name Type in a new service for your request. Service Type Choose the type (TCP, UDP or TCP/UDP) for the new service. Port Configuration Click Single or Range. If you select Range, you have to type in the starting port number and the end porting number on the boxes below. Port Number – Type in the starting port number and the end porting number here if you choose Range as the type. By the way, you can set up to 40 service types.
3.9 Applications Below shows the menu items for Applications. 3.9.1 Dynamic DNS The ISP often provides you with a dynamic IP address when you connect to the Internet via your ISP. It means that the public IP address assigned to your router changes each time you access the Internet. The Dynamic DNS feature lets you assign a domain name to a dynamic WAN IP address. It allows the router to update its online WAN IP address mappings on the specified Dynamic DNS server.
3. WAN Interface Display current WAN interface used for accessing Internet. Domain Name Display the domain name that you set on the setting page of DDNS setup. Active Display if this account is active or inactive. View Log Display DDNS log status. Force Update Force the router updates its information to DDNS server. Select Index number 1 to add an account for the router. Check Enable Dynamic DNS Account, and choose correct Service Provider: dyndns.
delivery will be attempted to your host first, and then to the host you specify here if that fails. 4. Click OK button to activate the settings. You will see your setting has been saved. The Wildcard and Backup MX features are not supported for all Dynamic DNS providers. You could get more detailed information from their websites.
Enable Schedule Setup Check to enable the schedule. Start Date (yyyy-mm-dd) Specify the starting date of the schedule. Start Time (hh:mm) Specify the starting time of the schedule. Duration Time (hh:mm) Specify the duration (or period) for the schedule. Action Specify which action Call Schedule should apply during the period of the schedule. Force On -Force the connection to be always on. Force Down -Force the connection to be always down.
3. Configure the Force Down from 18:00 to next day 9:00 for whole week. 4. Assign these two profiles to the PPPoE Internet access profile. Now, the PPPoE Internet connection will follow the schedule order to perform Force On or Force Down action according to the time plan that has been pre-defined in the schedule profiles. 3.9.
3.9.4 UPnP The UPnP (Universal Plug and Play) protocol is supported to bring to network connected devices the ease of installation and configuration which is already available for directly connected PC peripherals with the existing Windows 'Plug and Play' system. For NAT routers, the major feature of UPnP on the router is “NAT Traversal”. This enables applications inside the firewall to automatically open the ports that they need to pass through a router.
The reminder as regards concern about Firewall and UPnP Can't work with Firewall Software Enabling firewall applications on your PC may cause the UPnP function not working properly. This is because these applications will block the accessing ability of some network ports. Security Considerations Activating the UPnP function on your network may incur some security threats. You should consider carefully these risks before activating the UPnP function.
3.9.5 IGMP IGMP is the abbreviation of Internet Group Management Protocol. It is a communication protocol which is mainly used for managing the membership of Internet Protocol multicast groups. For invoking IGMP Snooping function, you have to check the Enable IGMP Proxy box first for activating the IGMP proxy function. Enable IGMP Proxy Check this box to enable this function. The application of multicast will be executed through WAN port. Enable IGMP Snooping Check this box to enable this function.
128 Wake by Two types provide for you to wake up the binded IP. If you choose Wake by MAC Address, you have to type the correct MAC address of the host in MAC Address boxes. If you choose Wake by IP Address, you have to choose the correct IP address. IP Address The IP addresses that have been configured in LAN>>Bind IP to MAC will be shown in this drop down list. Choose the IP address from the drop down list that you want to wake up. MAC Address Type any one of the MAC address of the binded PCs.
3.10 VPN and Remote Access A Virtual Private Network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. In short, by VPN technology, you can send data between two computers across a shared or public network in a manner that emulates the properties of a point-to-point private link. Below shows the menu items for VPN and Remote Access. 3.10.1 Remote Access Control Enable the necessary VPN service as you need.
3.10.2 PPP General Setup This submenu only applies to PPP-related VPN connections, such as PPTP, L2TP, L2TP over IPSec. Select this option to force the router to authenticate dial-in Dial-In PPP Authentication PAP Only users with the PAP protocol. PAP or CHAP Selecting this option means the router will attempt to authenticate dial-in users with the CHAP protocol first. If the dial-in user does not support this protocol, it will fall back to use the PAP protocol for authentication.
For example, if the local private network is 192.168.1.0/255.255.255.0, you could choose 192.168.1.200 as the Start IP Address. But, you have to notice that the first two IP addresses of 192.168.1.200 and 192.168.1.201 are reserved for ISDN remote dial-in user. 3.10.3 IPSec General Setup In IPSec General Setup, there are two major parts of configuration. There are two phases of IPSec.
Pre-Shared Key- Specify a key for IKE authentication Confirm Pre-Shared Key-Confirm the pre-shared key. IPSec Security Method Medium - Authentication Header (AH) means data will be authenticated, but not be encrypted. By default, this option is active. High - Encapsulating Security Payload (ESP) means payload (data) will be encrypted and authenticated. You may select encryption algorithm from Data Encryption Standard (DES), Triple DES (3DES), and AES. 3.10.
Profile Name Type in a name in this file. Accept Any Peer ID Click to accept any peer regardless of its identity. Accept Subject Alternative Click to check one specific field of digital signature to accept the peer with matching value. The field can be IP Address, Name Domain, or E-mail address. The box under the Type will appear according to the type you select and ask you to fill in corresponding setting.
3.10.5 Remote Dial-in User You can manage remote access by maintaining a table of remote user profile, so that users can be authenticated to dial-in via ISDN or build the VPN connection. You may set parameters including specified connection peer ID, connection type (VPN connection including PPTP, IPSec Tunnel, and L2TP by itself or over IPSec) and corresponding security methods, etc. The router provides 100 access accounts for dial-in users.
Enable this account Check the box to enable this function. Idle Timeout- If the dial-in user is idle over the limitation of the timer, the router will drop this connection. By default, the Idle Timeout is set to 300 seconds. ISDN Allow the remote ISDN dial-in connection. You can further set up Callback function below. You should set the User Name and Password of remote dial-in user below. This feature is for i model only.
SSL Tunnel It allows the remote dial-in user to make an SSL VPN Tunnel connection through Internet, suitable for the application through network accessing (e.g., PPTP/L2TP/IPSec) If you check this box, the function of SSL Tunnel for this account will be activated immediately. To check if SSL Tunnel is activated or not, please open Draytek SSL VPN portal interface. From the web page, you will see the message to indicate the SSL Tunnel is activated.
To check if SSL Web Proxy is activated or not, please open Draytek SSL VPN portal interface. From the web page, you will see the message to indicate that you have the privilege for the SSL Web Proxy. Set SSL Web Proxy – If you haven’t set any SSL VPN web proxy profiles, you will a link here. Click this link to access into the configuration page of SSL VPN. User Name Password Note: SSL VPN can be applied in browser (e.g., IE) which supports ActivateX only.
Medium -Authentication Header (AH) means data will be authenticated, but not be encrypted. By default, this option is invoked. You can uncheck it to disable it. High-Encapsulating Security Payload (ESP) means payload (data) will be encrypted and authenticated. You may select encryption algorithm from Data Encryption Standard (DES), Triple DES (3DES), and AES. Local ID - Specify a local ID to be used for Dial-in setting in the LAN-to-LAN Profile setup.
Set to Factory Default Click to clear all indexes. Name Indicate the name of the LAN-to-LAN profile. The symbol ??? represents that the profile is empty. Status Indicate the status of individual profiles. The symbol V and X represent the profile to be active and inactive, respectively. Click each index to edit each profile and you will get the following page. Each LAN-to-LAN profile includes 4 subgroups. If the fields gray out, it means you may leave it untouched.
WAN1 Only - While connecting, the router will use WAN1 as the only channel for VPN connection. WAN2 First - While connecting, the router will use WAN2 as the first channel for VPN connection. If WAN2 fails, the router will use another WAN interface instead. WAN2 Only - While connecting, the router will use WAN2 as the only channel for VPN connection. Netbios Naming Packet Pass – click it to have an inquiry for data transmission between the hosts located on both sides of VPN Tunnel while connecting.
PPTP Build a PPTP VPN connection to the server through the Internet. You should set the identity like User Name and Password below for the authentication of remote server. IPSec Tunnel Build an IPSec VPN connection to the server through Internet. L2TP with … Build a L2TP VPN connection through the Internet. You can select to use L2TP alone or with IPSec. Select from below: None: Do not apply the IPSec policy.
AES with Authentication-Use AES encryption algorithm and apply MD5 or SHA-1 authentication algorithm. Advanced Specify mode, proposal and key life of each IKE phase, Gateway etc. The window of advance setup is shown as below: IKE phase 1 mode -Select from Main mode and Aggressive mode. The ultimate outcome is to exchange security proposals to create a protected secure channel. Main mode is more secure than Aggressive mode since more exchanges are done in a secure channel to set up the IPSec session.
remote peer requires the Vigor router to callback, the local ISDN number will be provided to the remote peer. Check here to allow the Vigor router to send the ISDN number to the remote router. This feature is useful for i model only. Allowed Dial-In Type Determine the dial-in connection with different types. ISDN Allow the remote ISDN LAN-to-LAN connection. You should set the User Name and Password of remote dial-in user below. This feature is useful for i model only.
None- Do not apply the IPSec policy. Accordingly, the VPN connection employed the L2TP without IPSec policy can be viewed as one pure L2TP connection. Nice to Have- Apply the IPSec policy first, if it is applicable during negotiation. Otherwise, the dial-in VPN connection becomes one pure L2TP connection. Must- Specify the IPSec policy to be definitely applied on the L2TP connection.
Callback number-The option is for extra security. Once enabled, the router will ONLY call back to the specified Callback Number. Callback budget- By default, the callback function has limitation of callback period. Once the callback budget is exhausted, the function will be disabled automatically. Callback Budget (Unit: minutes)- Specify the time budget for the dial-in user. The budget will be decreased automatically per callback connection. The default value 0 means no limitation of callback period.
have to do IP, please choose NAT, otherwise choose Route. Check this box to change the default route with this VPN Change default route to tunnel. Be aware that this setting is available only for one this VPN tunnel (Only single WAN supports this ) WAN interface is enabled. It is not available when both WAN interfaces are enabled. 3.10.7 Connection Management You can find the summary table of all VPN connections. You may disconnect any VPN connection by clicking Drop button.
3.11 Certificate Management A digital certificate works as an electronic ID, which is issued by a certification authority (CA). It contains information such as your name, a serial number, expiration dates etc., and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. Here Vigor router support digital certificates conforming to standard X.509.
Type in all the information that the window request. Then click Generate again. Import Click this button to import a saved file as the certification information. Refresh Click this button to refresh the information listed below. View Click this button to view the detailed settings for certificate request.
3.11.2 Trusted CA Certificate Trusted CA certificate lists three sets of trusted CA certificate. To import a pre-saved trusted CA certificate, please click IMPORT to open the following window. Use Browse… to find out the saved text file. Then click Import. The one you imported will be listed on the Trusted CA Certificate window. Then click Import to use the pre-saved file. For viewing each trusted CA certificate, click View to open the certificate detail information window.
3.11.3 Certificate Backup Local certificate and Trusted CA certificate for this router can be saved within one file. Please click Backup on the following screen to save them. If you want to set encryption password for these certificates, please type characters in both fields of Encrypt password and Retype password. Also, you can use Restore to retrieve these two settings to the router whenever you want. 3.
registration messages to validate. Then, both parties’ SIP proxies will forward the sequence of messages to caller to establish the session. If you both register to the same SIP Registrar, then it will be illustrated as below: The major benefit of this mode is that you don’t have to memorize your friend’s IP address, which might change very frequently if it’s dynamic. Instead of that, you will only have to using dial plan or directly dial your friend’s account name if you are with the same SIP Registrar.
Phone Book In this section, you can set your VoIP contacts in the “phonebook”. It can help you to make calls quickly and easily by using “speed-dial” Phone Number. There are total 60 index entries in the phonebook for you to store all your friends and family members’ SIP addresses. Loop through and Backup Phone Number will be displayed if you are using VigorPro5300 VS for setting the phone book. Click any index number to display the dial plan setup page.
Enable Click this to enable this entry. Phone Number The speed-dial number of this index. This can be any number you choose, using digits 0-9 and * . Display Name The Caller-ID that you want to be displayed on your friend’s screen. This let your friend can easily know who’s calling without memorizing lots of SIP URL Address. SIP URL Enter your friend’s SIP Address This page will differ for different models. Below is a sample page obtained from VigorPro5300 VSn.
replace the VoIP phone number. At this time, the phone call will be changed from VoIP phone into PSTN call according to the loop through direction chosen. Note that, during the phone switch, the blare of phone will appear for a short time. And when the VoIP phone is switched into the PSTN phone, the telecom co. might charge you for the connection fee. Please type in backup phone number (PSTN number) for this VoIP phone setting.
Strip - When you choose this mode, the OP number will be deleted by the prefix number for calling out through the specific VoIP interface. Take the above picture (Prefix Table Setup web page) as an example, the OP number of 886 will be deleted completely for the prefix number is set with 886. Replace - When you choose this mode, the OP number will be replaced by the prefix number for calling out through the specific VoIP interface.
Click any index number to display the dial plan setup page. Enable Click this to enable this entry. Call Direction Determine the direction for the phone call, IN – incoming call, OUT-outgoing call, IN & OUT – both incoming and outgoing calls. Barring Type Determine the type of the VoIP phone call, URI/URL or number. Specific URI/URL or Specific Number - This field will be changed based on the type you selected for barring Type.
Interface “All” means all the phone calls (including ISDN & PSTN) will be blocked with such mechanism. ”ISDN” means only ISDN phone call will be blocked with such mechanism. Index (1-15) in Schedule Enter the index of schedule profiles to control the call barring according to the preconfigured schedules. Refer to section 3.9.2 Schedule for detailed configuration. Additionally, you can set advanced settings for call barring such as Block Anonymous, Block Unknown Domain or Block IP Address.
Regional This page allows you to process incoming or outgoing phone calls by regional. Default values (common used in most areas) will be shown on this web page. You can change the number based on the region that the router is placed. 158 Last Call Return [Miss] Sometimes, people might miss some phone calls. Please dial number typed in this field to know where the last phone call comes from and call back to that one.
Call Forward [Busy][Act] Dial the number typed in this field to forward all the incoming calls to the specified place while the phone is busy. Call Forward [No Ans][Act] Dial the number typed in this field to forward all the incoming calls to the specified place while there is no answer of the connected phone. Do Not Disturb [Act] Dial the number typed in this field to invoke the function of DND. Do Not Distrub [Deact] Dial the number typed in this field to release the DND function.
160 Index Click this link to access into next page for setting SIP account. Profile Display the profile name of the account.
Domain/Realm Display the domain name or IP address of the SIP registrar server. Proxy Display the domain name or IP address of the SIP proxy server. Account Name Display the account name of SIP address before @. Ring Port Specify which port will ring when receiving a phone call. Set Phone1, Phone2, ISDN1-S0 or ISDN-TE as the default ring port for the SIP account. If you choose Phone1, Phone2 or ISDN1-S0, the ISDN2-TE selection will be dimmed, vice versa.
The system will select a proper way for your VoIP call. SIP Port Set the port number for sending/receiving SIP message for building a session. The default value is 5060. Your peer must set the same value in his/her Registrar. Domain/Realm Set the domain name or IP address of the SIP Registrar server. Proxy Set domain name or IP address of SIP proxy server. By the time you can type:port number after the domain name to specify that port as the destination of data transmission (e.g., nat.draytel.
Any as ring port for specified SIP account. By the way, ISDN-S0 can be used by mapping with MSN numbers. Ring Pattern Choose a ring tone type for the VoIP phone call. 3.12.3 Phone Settings This page allows user to set phone settings for Phone1, Phone2, ISDN1-S0 and ISDN2-TE/S0 respectively. Phone List VigorPro5300 Series User’s Guide Port – There are four phone ports provided here for you to configure. Three (Index 1 to 3) are fixed and one (Index 4) is configurable.
Tone - Display the tone settings that configured in the advanced settings page of Phone Index. Gain - Display the volume gain settings for Mic/Speaker that configured in the advanced settings page of Phone Index. Default SIP Account – “draytel_1” is the default SIP account. You can click the number below the Index field to change SIP account for each phone port. DTMF Relay – Display DTMF mode that configured in the advanced settings page of Phone Index.
Hotline Check the box to enable it. Type in the SIP URL in the field for dialing automatically when you pick up the phone set. Session Timer Check the box to enable the function. In the limited time that you set in this field, if there is no response, the connecting call will be closed automatically. Call Forwarding There are four options for you to choose. Disable is to close call forwarding function. Always means all the incoming calls will be forwarded into SIP URL without any reason.
detailed configuration. Index (1-60) in Phone Book - Enter the index of phone book profiles. Refer to section 3.11.1 DialPlan – Phone Book for detailed configuration. CLIR (hide caller ID) Check this box to hide the caller ID on the display panel of the phone set. Call Waiting Check this box to invoke this function. A notice sound will appear to tell the user new phone call is waiting for your response. Click hook flash to pick up the waiting phone call.
Play dial tone only when account registered - Check this box to invoke the function. Default Call Route It determines the default direction for the call route of the router. To ISDN (for VoIP) - The router is set by using ISDN call. To change ISDN call into VoIP call, please dial the character in this field for transferring. The character that you can type can be *, #, and 0~9. To VoIP (for ISDN) - The router is set by using VoIP call.
Also, you can specify each field for your necessity. It is recommended for you to use the default settings for VoIP communication. Volume Gain Mic Gain (1-10)/Speaker Gain (1-10) - Adjust the volume of microphone and speaker by entering number from 1- 10. The larger of the number, the louder the volume is. MISC Dial Tone Power Level - This setting is used to adjust the loudness of the dial tone. The smaller the number is, the louder the dial tone is. It is recommended for you to use the default setting.
Detailed Settings for ISDN1-S0 Port Click the number link of Index 3 (ISDN1-S0), you can access into the following page for configuring Phone settings. Hotline Check the box to enable it. Type in the SIP URL in the field for dialing automatically when you pick up the phone set. Session Timer Check the box to enable the function. In the limited time that you set in this field, if there is no response, the connecting call will be closed automatically.
SIP URL – Type in the SIP URL (e.g., aaa@draytel.org or abc@iptel.org) as the site for call forwarded. Time Out – Set the time out for the call forwarding. The default setting is 30 sec. DND (Do Not Disturb) mode Set a period of peace time without disturbing by VoIP phone call. During the period, the one who dial in will listen busy tone, yet the local user will not listen any ring tone.
something to save the bandwidth for other using. Click On to invoke this function; click off to close the function. Default SIP Account You can set SIP accounts (up to six groups) on SIP Account page. Use the drop down list to choose one of the profile names for the accounts as the default one for this phone setting. ISDN-S0 port can pick up multiple incoming calls simultaneously. Therefore different phone sets (MSN30 to MSN39) can use different SIP accounts to call out through this port.
Region Select the proper region which you are located. The common settings of Caller ID Type, Dial tone, Ringing tone, Busy tone and Congestion tone will be shown automatically on the page. If you cannot find out a suitable one, please choose User Defined and fill out the corresponding values for dial tone, ringing tone, busy tone, congestion tone by yourself for VoIP phone. Also, you can specify each field for your necessity. It is recommended for you to use the default settings for VoIP communication.
default setting. Ring Frequency - This setting is used to drive the frequency of the ring tone. It is recommended for you to use the default setting. DTMF DTMF Mode – There are four DTMF modes for you to choose.
Hotline Check the box to enable it. Type in the SIP URL in the field for dialing automatically when you pick up the phone set. Session Timer Check the box to enable the function. In the limited time that you set in this field, if there is no response, the connecting call will be closed automatically. Call Forwarding There are four options for you to choose. Disable is to close call forwarding function. Always means all the incoming calls will be forwarded into SIP URL without any reason.
profiles. Refer to section 3.10.1 DialPlan – Phone Book for detailed configuration. CLIR (hide caller ID) Check this box to hide the caller ID on the display panel of the phone set. Prefer Codec Select one of five codecs as the default for your VoIP calls. The codec used for each call will be negotiated with the peer party before each session, and so may not be your default choice. The default codec is G.729A/B; it occupies little bandwidth while maintaining good voice quality.
configured. In addition, you can specify which port (both phone 1 and phone 2, phone 1 only or phone 2 only) will ring. Loop Through to ISDN1-S0 Port – Choose this radio button to make all the calls controlled by ISDN line. In addition, you can press the Advanced button to configure tone settings, volume gain, MISC and DTMF mode. Advanced setting is provided for fitting the telecommunication custom for the local area of the router installed. Wrong tone settings might cause inconvenience for users.
Also, you can specify each field for your necessity. It is recommended for you to use the default settings for VoIP communication. Volume Gain Mic Gain (1-10)/Speaker Gain (1-10) - Adjust the volume of microphone and speaker by entering number from 1- 10. The larger of the number, the louder the volume is. MISC Dial Tone Power Level - This setting is used to adjust the loudness of the dial tone. The smaller the number is, the louder the dial tone is. It is recommended for you to use the default setting.
the default value was 101. This setting is available for the OutBand (RFC2833) mode. 3.12.4 Status From this page, you can find codec, connection and other important call status for each port. 178 Refresh Seconds Specify the interval of refresh time to obtain the latest VoIP calling information. The information will update immediately when the Refresh button is clicked. Port It shows current connection status for the port of Phone1, Phone2, ISDN1 and ISDN2.
ALERTING - Indicates that a call is coming. ACTIVE-Indicates that the VoIP connection is launched. Codec Indicates the voice codec employed by present channel. PeerID The present in-call or out-call peer ID (the format may be IP or Domain). Elapse The format is represented as hours:minutes:seconds. Tx Pkts Total number of transmitted voice packets during this connection session. Rx Pkts Total number of received voice packets during this connection session.
3.13.2 General Settings This web page allows you to enable ISDN function. ISDN Port Click Enable to open the ISDN port and Disable to close it. Country Code For proper operation on your local ISDN network, you should choose the correct country code. D-Channel Mode It allows you to configure ISDN layer2 protocol as: Point-to-Point - Configure ISDN port to use static TEI (Terminal Endpoint Identifier). Point-to-Multipoint - Configure ISDN port to use Dynamic TEI.
MSN Numbers for the Router MSN Numbers mean that the router is able to accept only number-matched incoming calls. In addition, local ISDN network provider should support MSN services. The router provides three fields for MSN numbers. Note that MSN services must be acquired from your local telecom operators. By default, MSN function is disabled. If you leave the fields blank, all incoming calls will be accepted without number matching. 1-10 fields – Fill in the portion that is different with the own number.
the external MSN numbers that you setup will be displayed to remote side. Application Example You got ISDN numbers with 5972720~5972729 from your ISP, and you try to connect ISDN-TE port to ISDN network. Please refer to the following configuration. Open ISDN>> General Setup and set as the following: When remote user calls you by dialing 5972727, the router will make Phone1 port ringing.
3.13.3 Dial to a Single ISP/Dial to Dual ISPs Select Dialing to a Single ISP if you access the Internet via a single ISP. ISP Access Setup ISP Name - Enter your ISP name such as Seednet, Hinet and so on. Dial Number -Enter the ISDN access number provided by your ISP. Username - Enter the username provided by your ISP. Password - Enter the password provided by your ISP.
IP Address Assignment Method (IPCP) In most environments, you should not change these settings as most ISPs provide a dynamic IP address for the router when it connects to the ISP. If your ISP provides a fixed IP address, check Yes and enter the IP address in the field of Fixed IP Address. Select Dialing to Dual ISPs if you have more than one ISP. You will be able to dial to both ISPs at the same time. This is mainly for those ISPs that do not support Multiple-Link PPP (ML-PPP).
default is 180 seconds. If you set the time to 0, the ISDN connection to the ISP will always remain on. Primary ISP Setup ISP Name - Enter your ISP name. Dial Number -Enter the ISDN access number provided by your ISP. Username - Enter the username provided by your ISP. Password - Enter the password provided by your ISP.
3.13.4 Call Control Some applications require that the router (only for the ISDN models) be remotely activated, or be able to dial up to the ISP via the ISDN interface. Vigor routers provide this feature by allowing user to make a phone call to the router and then ask it to dial up to the ISP. Accordingly, a teleworker can access the remote network to retrieve resources.
access the server which is off the Internet in the head office. To remotely make the server to be available on the Internet, i.e. make the router in the head office activating its Internet access either by dialing-up or starting broadband connection, users can make a regular phone call (the number is set in the Remote Activation field) to the router as signaling it for activation. The phone call will be soon disconnected once the router is on line.
3.14 Wireless LAN This function is used for G models only. 3.14.1 Basic Concepts Over recent years, the market for wireless communications has enjoyed tremendous growth. Wireless technology now reaches or is capable of reaching virtually every location on the surface of the earth. Hundreds of millions of people exchange information every day via wireless communication products. The Vigor G model, a.k.a. Vigor wireless router, is designed for maximum flexibility and efficiency of a small office/home.
WEP (Wired Equivalent Privacy) is a legacy method to encrypt each frame transmitted via radio using either a 64-bit or 128-bit key. Usually access point will preset a set of four keys and it will communicate with each station using only one out of the four keys. WPA(Wi-Fi Protected Access), the most dominating security mechanism in industry, is separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK), and WPA-Enterprise or called WPA/802.1x.
Separate the Wireless and the Wired LAN- WLAN Isolation enables you to isolate your wireless LAN from wired LAN for either quarantine or limit access reasons. To isolate means neither of the parties can access each other. To elaborate an example for business use, you may set up a wireless LAN for visitors only so they can connect to Internet without hassle of the confidential information leakage. For a more flexible deployment, you may add filters of MAC addresses to isolate users’ access from wired LAN.
Enable Wireless LAN Check the box to enable wireless function. Mode At present, the router can connect to Mixed (11b+11g), 11g Only, 11b Only, Mixed (11g+11n), 11n Only and Mixed (11b+11g+11n) stations simultaneously. Simply choose Mix (11b+11g+11n) mode. Index(1-15) Set the wireless LAN to work at certain time interval only. You may choose up to 4 schedules out of the 15 schedules pre-defined in Applications >> Schedule setup.
Long Preamble This option is to define the length of the sync field in an 802.11 packet. Most modern wireless network uses short preamble with 56 bit sync filed instead of long preamble with 128 bit sync field. However, some original 11b wireless network devices only support long preamble. Check it to use Long Preamble if needed to communicate with this kind of devices. Packet-OVERDRIVE This feature can enhance the performance in data transmission about 40%* more (by checking Tx Burst).
Mode There are several modes provided for you to choose. Disable - Turn off the encryption mechanism. WEP - Accept WEP client and the encryption key should be entered in WEP filed below. WPA/PSK - Accepts WPA clients and the encryption key should be entered in PSK. WPA2/PSK-Accepts only WPA2 clients and the encryption key should be entered in PSK. Mixed (WPA+WPA2)/PSK - Accepts WPA and WPA2 clients simultaneously and the encryption key should be entered in PSK.
128-Bit - For 128 bits WEP key, either 13 ASCII characters, such as ABCDEFGHIJKLM (or 26 hexadecimal digits leading by 0x, such as 0x4142434445464748494A4B4C4D). All wireless devices must support the same WEP encryption bit size and have the same key. Four keys can be entered here, but only one key can be selected at a time. The keys can be entered in ASCII or Hexadecimal. Check the key you wish to use. 3.14.
with MAC address not listed above are allowed to access AP. Enable Mac Access Filter Select to enable the MAC Address filter for wireless LAN identified with SSID 1 to 4 respectively. All the clients (expressed by MAC addresses) listed in the box can be grouped under different wireless LAN. For example, they can be grouped under SSID 1 and SSID 2 at the same time if you check SSID 1 and SSID 2. MAC Address Filter Display all MAC addresses that are edited before.
z On the side of Vigor 2930 series which served as an AP, press Factory Reset button once on the front panel of the router or click Start PBC on web configuration interface. On the side of a station with network card installed, press Start PBC button of network card. z If you want to use PIN code, you have to know the PIN code specified in wireless client. Then provide the PIN code of the wireless client you wish to connect to the vigor router.
Enable WPS Check this box to enable WPS setting. WPS Status Display related system information for WPS. If the wireless security (encryption) function of the router is properly configured, you can see ‘Configured’ message here. SSID Display the SSID1 of the router. WPS is supported by SSID1 only. Authentication Mode Display current authentication mode of the router. Only WPA2/PSK and WPA/PSK support WPS. Configure via Push Button Click Start PBC to invoke Push-Button style WPS setup procedure.
The application for the WDS-Repeater mode is depicted as below: The major difference between these two modes is that: while in Repeater mode, the packets received from one peer AP can be repeated to another peer AP through WDS links. Yet in Bridge mode, packets received from a WDS link will only be forwarded to local wired or wireless hosts. In other words, only Repeater mode can do WDS-to-WDS packet forwarding.
Click WDS from Wireless LAN menu. The following page will be shown. Mode VigorPro5300 Series User’s Guide Choose the mode for WDS setting. Disable mode will not invoke any WDS setting. Bridge mode is designed to fulfill the first type of application.
one. Security There are three types for security, Disable, WEP and Pre-shared key. The setting you choose here will make the following WEP or Pre-shared key field valid or not. Choose one of the types for the router. WEP Use the same key set in Security Settings page. Pre-shared Key Type 8 ~ 63 ASCII characters or 64 hexadecimal digits leading by “0x”. Bridge If you choose Bridge as the connecting mode, please type in the peer MAC address in these fields.
If you want the found AP applying the WDS settings, please type in the AP’s MAC address on the bottom of the page and click Bridge or Repeater. Next, click Add to. Later, the MAC address of the AP will be added to Bridge or Repeater field of WDS settings page. 3.14.7 Station List Station List provides the knowledge of connecting wireless clients now along with its status code. There is a code summary below for explanation.
Refresh Click this button to refresh the status of station list. Add Click this button to add current selected MAC address into Access Control. 3.14.8 Rate Control This page allows you to control the upload and download rate of each wireless client (station) and SSID1-4. Please check the box of Enable to invoke this setting. The range for the rate is between 100 ~ 100,000 kbps.
SSID rate control controls the data transmission rate through wireless connection. Enable Check Enable for typing upload and download rate. Upload Type the transmitting rate for data upload. Default value is 30,000 kbps. Download Type the transmitting rate for data download. Default value is 30,000 kbps. 3.15 SSL VPN An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser.
Name Display the name of the profile that you create. URL Display the URL. Active Display current status (active or inactive) of such profile. Click number link under Index filed to set detailed configuration. 204 Name Type name of the profile. URL Type the address (function variation or IP address) or path of the proxy server. Host IP Address If you type function variation as URL, you have to type corresponding IP address in this filed. Such field must match with URL setting.
WAN to LAN access, the web server must be configured behind vigor router; 2) web server gateway must be indicated to vigor router. In addition, users must execute “Connect” manually in SSL Client Portal page. SSL – if you choose such selection, web proxy over SSL will be applied for VPN. 3.15.2 User Account For SSL VPN, identity authentication and power management are implemented through deploying user accounts. Therefore, the user account for SSL VPN must be set together with remote dial-in user web page.
The SSL Web Proxy profile names will be displayed (together with check box) as shown below. 3.15.3 Online User Status If you have finished the configuration of SSL Web Proxy (server), users can find out corresponding settings when they access into Draytek SSL VPN portal interface. Next, users can open SSL VPN>> Online Status to view logging status of SSL VPN.
Active User Display current user who visit SSL VPN server. Host IP Displays the IP address for the host. Time out Display the time remaining for logging out. Action You can click Drop to drop certain login user from the router's SSL Portal UI.
3.16 System Maintenance For the system setup, there are several items that you have to know the way of configuration: Status, Administrator Password, Configuration Backup, Syslog, Time setup, Reboot System, Firmware Upgrade. Below shows the menu items for System Maintenance. 3.16.1 System Status The System Status provides basic network settings of Vigor router. It includes LAN and WAN interface information.
1st IP Address st Display the IP address of the LAN interface. 1 Subnet Mask Display the subnet mask address of the LAN interface. DHCP Server Display the current status of DHCP server of the LAN interface. DNS Display the assigned IP address of the primary DNS. Link Status Display the connection status of WAN interface. MAC Address Display the MAC address of the WAN Interface. Connection Display the chosen WAN mode. IP Address Display the IP address of the WAN interface.
2. Click Backup button to get into the following dialog. Click Save button to open another dialog for saving configuration as a file. 3. In Save As dialog, the default filename is config.cfg. You could give it another name by yourself. 4. Click Save button, the configuration will download automatically to your computer as a file named config.cfg. The above example is using Windows platform for demonstrating examples.
Restore Configuration 1. Go to System Maintenance >> Configuration Backup. The following windows will be popped-up, as shown below. 2. Click Browse button to choose the correct configuration file for uploading to the router. 3. Click Restore button and wait for few seconds, the following picture will tell you that the restoration procedure is successful. 3.16.4 Syslog/Mail Alert SysLog function is provided for users to monitor router.
Send a test e-mail Make a simple test for the e-mail address specified in this page. Please assign the mail address first and click this button to execute a test for verify the mail address is available or not. SMTP Server The IP address of the SMTP server. Mail To Assign a mail address for sending mails out. Return-Path Assign a path for receiving the mail from outside. Authentication Check this box to activate this function while using e-mail application.
VigorPro5300 Series User’s Guide 213
3.16.5 Time and Date It allows you to specify where the time of the router should be inquired from. Current System Time Click Inquire Time to get the current time. Use Browser Time Select this option to use the browser time from the remote administrator PC host as router’s system time. Use Internet Time Select to inquire time information from Time Server on the Internet using assigned protocol. Time Protocol Select a time protocol. Server IP Address Type the IP address of the time server.
3.16.6 Management This page allows you to manage the settings for access control, access list, port setup, and SNMP setup. For example, as to management access control, the port number is used to send/receive SIP message for building a session. The default value is 5060 and this must match with the peer Registrar when making VoIP calls. Allow management from the Internet Enable the checkbox to allow system administrators to login from the Internet.
Set Community Set community by typing a proper name. The default setting is private. Manager Host IP Set one host as the manager to execute SNMP function. Please type in IP address to specify certain host. Trap Community Set trap community by typing a proper name. The default setting is public. Notification Host IP Set the IP address of the host that will receive the trap community. Trap Timeout The default setting is 10 seconds. 3.16.
3.16.8 Firmware Upgrade Before upgrading your router firmware, you need to install the Router Tools. The Firmware Upgrade Utility is included in the tools. The following web page will guide you to upgrade firmware by using an example. Note that this example is running over Windows OS (Operating System). Download the newest firmware from DrayTek's web site or FTP site. The DrayTek web site is www.draytek.com (or local DrayTek's web site) and FTP site is ftp.draytek.com.
3.17 Diagnostics Diagnostic Tools provide a useful way to view or diagnose the status of your Vigor router. Below shows the menu items for Diagnostics. 3.17.1 Dial-out Trigger Click Diagnostics and click Dial-out Trigger to open the web page. The internet connection (e.g., ISDN, PPPoE, PPPoA, etc) is triggered by a package sending from the source IP address. 218 Decoded Format It shows the source IP address (local), destination IP (remote) address, the protocol and length of the package.
3.17.2 Routing Table Click Diagnostics and click Routing Table to open the web page. Refresh Click it to reload the page. 3.17.3 ARP Cache Table Click Diagnostics and click ARP Cache Table to view the content of the ARP (Address Resolution Protocol) cache held in the router. The table shows a mapping between an Ethernet hardware address (MAC Address) and an IP address. Refresh Click it to reload the page. Clear Click it to clear the whole table.
3.17.4 DHCP Table The facility provides information on IP address assignments. This information is helpful in diagnosing network problems, such as IP address conflicts, etc. Click Diagnostics and click DHCP Table to open the web page. Index It displays the connection item number. IP Address It displays the IP address assigned by this router for specified PC. MAC Address It displays the MAC address for the specified PC that DHCP assigned IP address for it.
Interface It indicates the interface of the WAN connection. Refresh Click it to reload the page. 3.17.6 Data Flow Monitor This page displays the running procedure for the IP address monitored and refreshes the data in an interval of several seconds. The IP address listed here is configured in Bandwidth Management. You have to enable IP bandwidth limit and IP session limit before invoke Data Flow Monitor. If not, a notification dialog box will appear to remind you enabling it.
Index Display the number of the data flow. IP Address Display the IP address of the monitored device. TX rate (kbps) Display the transmission speed of the monitored device. RX rate (kbps) Display the receiving speed of the monitored device. Sessions Display the session number that you specified in Limit Session web page. Action Block - can prevent specified PC accessing into Internet within 5 minutes. Unblock – the device with the IP address will be blocked in five minutes.
The horizontal axis represents time. Yet the vertical axis has different meanings. For WAN1/WAN2 Bandwidth chart, the numbers displayed on vertical axis represent the numbers of the transmitted and received packets in the past. For Sessions chart, the numbers displayed on vertical axis represent the numbers of the NAT sessions during the past. 3.17.8 Ping Diagnosis Click Diagnostics and click Ping Diagnosis to pen the web page.
3.17.9 Trace Route Click Diagnostics and click Trace Route to open the web page. This page allows you to trace the routes from router to the host. Simply type the IP address of the host in the box and click Run. The result of route trace will be shown on the screen. Trace through Use the drop down list to choose the WAN interface that you want to ping through or choose Unspecified to be determined by the router automatically. Protocol Use the drop down list to choose suitable protocol.
4 Registration for the Router To use the anti-intrusion, anti-virus and anti-spam features of VigorPro series router, you have to create a new account, finish the registration for that account by using the router and complete the registration for the Vigor router. After finishing the registration of the router, you can download the newly update types and rules of anti-intrusion and anti-virus during the valid time of the license key you purchased. There are two ways to create and activate new account.
226 2. Check to confirm that you accept the Agreement and click Accept. 3. Type your personal information in this page and then click Continue.
4. Choose proper selection for your computer and click Continue. 5. Now you have created an account successfully. 6. Check to see the confirmation email with the title of New Account Confirmation Letter from www.vigorpro.com.
228 7. Click the Activate my Account link to enable the account that you created. The following screen will be shown to verify the register process is finished. Please click Login. 8. When you see the following page, please type in the account and password (that you just created) in the fields of UserName and Password. Then type the code in the box of AuthCode according to the value displayed on the right side of it. 9. Now, click Login. Your account has been activated.
4.2 Creating and Activating an Account from Router Web Configurator You, also can created and register a new account from the web configurator of the VigorPro router. 1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will open to ask for username and password. Do not type any word on the window and click OK. 2. From the router’s web page, please open Defense Configuration >>Activation. You will see the following web page. 3.
230 4. A Re-login page will be shown on the screen. 5. Locate and click Create an account now link on the bottom of this page. You will access into the following page. Check the box below to confirm that you accept the Agreement and click Accept.
6. Type your personal information in this page and then click Continue. 7. Choose proper selection for your computer and click Continue.
8. Now you have created an account successfully. 9. Check to see the confirmation email with the title of New Account Confirmation Letter from www.vigorpro.com. 10. Click the Activate my Account link to enable the account that you created. The following screen will be shown to verify the register process is finished. Please click Login.
11. When you see the following page, please type in the account and password (that you just created) in the fields of UserName and Password. Then type the code in the box of AuthCode according to the value displayed on the right side of it. 12. Now, click Login. Your account has been activated. And the following page will be shown automatically. VigorPro5300 Series User’s Guide DrayTek will maintain a database of MAC address/serial number of shipped goods.
4.3 Registering Your Vigor Router You have activated the new account for the router. Now, it is the time for you to register your vigor router. Open Defense Configuration >>Activation; the other is to register by using Anti-Spam>>Profile Setting. Registering Vigor router should be done just for once. If the router has been registered previously, the system will not allow you to register the router again.
4. A Re-login page will be shown on the screen. Please type the account and password that you created previously. And click Login. 5. The following page will be displayed after you logging in VigorPro server. From this page, please click Add.
236 6. When the following page appears, please type in Nick Name (for the router) and choose the right purchase date from the popup calendar (it appears when you click on the box of Purchase Date). 7. After adding the basic information for the router, please click Submit. 8. Now, your router information has been added to the database. Click OK to leave this web page and return to My Product web page.
4.4 Activating Anti-Virus/Anti-Intrusion/Anti-Spam Service After registering your vigor router, you have to follow the steps listed below to activate anti-virus/anti-intrusion/anti-spam service to obtain full security for your computer. 4.4.1 For Anti-Virus and Anti-Intrusion Service 1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will open to ask for username and password. 2. From the router’s web page, please open Defense Configuration >>Activate.
238 4. A Re-login page will be shown on the screen. Please type the account and password that you created previously. And click Login. 5. On the web page of My Product, you can find a list of the devices that you add with the above steps. Currently, you just have added VigorPro 5300. Please click the serial number link.
6. From the Device’s Service section, click the Activate button for AI-AV (Anti-Intrusion & Anti-Virus) service. Rename It allows you to change the account name. Delete It allows you to delete account name used currently. Transfer It allows you to transfer the VigorPro device together with applied license to someone who has already registered another account in www.vigorpro.com. Be sure to press this button to transfer the product to whom you want to give.
7. In the following page, check the box of “I have read and accept the above Agreement”. The system will find out the date for you to activate this version of service. Then, click Next. Note: DT-DT means you can acquire the anti-intrusion and anti-virus services from DrayTek Corporation. 8. When this page appears, click Register. 9. Next, the DrayTek Service Activation screen will be shown as the following: (Above figure supposes you have not activated Anti-Spam yet.
10. Click Close. 11. Open Defense Configuration>>Status page of the router’s web configurator. The start date and expire date for the license are shown in this page. 12. Click Activate to access into VigorPro website again. Open the following page. You will see the AI-AV (with provider DT-DT) has been activated and in use. Now, you have finished all the procedure for registering your router.
4.4.2 For Anti-Spam Service Please follow the steps below to activate Anti-Spam Service for your system. Getting 30 Days of Free Charge 242 1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will open to ask for username and password. 2. From the router’s web page, please open Defense Configuration >>Activate. You will see the following web page. 3. Click the Activate link from Anti-Spam License to activate Anti-Spam service.
4. A Re-login page will be shown on the screen. Please type the account and password that you created previously. And click Login. 5. On the web page of My Product, you can find a list of the devices that you add with the above steps. Currently, you just have added VigorPro 5300. Please click the serial number link.
6. From the Device’s Service section, click the Trial button for AS (Anti-Spam) service. 7. In this page, check the box of “I have read and accept the above Agreement”. The system will find out the date for you to activate this version of service. Then, click Next. Note: CTCH means you can acquire anti-spam service from Commtouch. 8. 244 When this page appears, click Register.
9. Next, the DrayTek Service Activation screen will be shown as the following. 10. Click Close. Now, you have finished all the procedure for activating Anti-Spam service for your router. Note: You are allowed to use this version (with anti-spam feature) for 30 days after registration for your router. In addition, you will be informed with an e-mail before expire date of this version.
246 3. Click the Activate link from Anti-Spam License to activate Anti-Spam service. 4. A Re-login page will be shown on the screen. Please type the account and password that you created previously. And click Login.
5. On the web page of My Product, you can find a list of the devices that you add with the above steps. Currently, you just have added VigorPro 5300. Please click the serial number link. 6. From the Device’s Service section, click the Upgrade buttons for AS (Anti-Spam) service.
248 7. In this page, type the License Number stated on the Anti-Spam license card in the field of License Number. Then, click Add License. 8. Now, the license number will be displayed on the page immediately. Click Next.
9. 10. In this page, check the box of “I have read and accept the above Agreement”. The system will find out the date for you to activate this version of service. Then, click Next. When this page appears, click Apply. (Above figure supposes you have not activated Anti-Virus yet.) 11. Confirm Message window will appear for you to make a confirmation. Click Confirm. 12. Next, the DrayTek Service Activation screen will be shown as the following.
13. Click Close to exit.
4.5 Applying a New License for Anti-Intrusion/Anti-Virus When days for free of charge expires, you can apply for a new license by following the steps below: 1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will open to ask for username and password. Do not type any word on the window and click OK. 2. From the router’s web page, please open Defense Configuration >>Activation. You will see the following web page 3.
252 4. A Re-login page will be shown on the screen. Please type the account and password that you created previously. And click Login. 5. On the web page of My Product, you can find a list of the devices that you add with the above steps. Currently, you just have added VigorPro 5300. Please click the serial number link.
6. From the Device’s Service section, click the Renew button for AI-AV (Anti-Intrusion & Anti-Virus) service (service provider is DT-DT). 7. In the following page, please type in license number shown on the License Key card. Enter the number and click Add License. Note: DT-KL allows you to acquire the anti-intrusion service from DrayTek and anti-virus service from Kaspersky. DT-DT allows you to acquire the anti-intrusion and anti-virus services from DrayTek Corporation. 8.
9. Check the box of “I have read and accept the above Agreement” and click Next. 10. When this page appears, click Apply.
11. Confirm Message window will appear for you to make a confirmation. Click Confirm. 12. The Service Activation screen will be shown as the following. 13. Click Close. Return to Defense Configuration>>Status page of the router’s web configurator. The start date and expire date for the license will be shown in this page.
4.6 Backup and Upgrade Signature for Anti-Intrusion/Anti-Virus You can get the most updated signature from DrayTek’s server if the license key of anti-virus/anti-intrusion for the VigorPro 5300 is not expired. Before you upgrade the signature, please check the validation information either from WEB user interface of VigorPro 5300 or account information from www.vigorpro.com. 1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will open to ask for username and password.
Time for Download After changing other license, it is suggested for you to download newly update signature for your router. To download newly update anti-intrusion and anti-virus from VigorPro website, please click Download Now!!!. Time for Import Backup files can be imported whenever you want. To use a saved signature information, please click Import. In addition, users can specify certain time for executing the upgrade automatically by the router.
258 4. A Re-login page will be shown on the screen. Please type new account and password that you created previously. And click Login. 5. The following page will be shown automatically. You will find there are two devices service added to your router. If you activated only one service before, it must be only one service displayed here. In this case, DT-DT and DT-KL services are registered on the VirgorPro website. However, DT-DT service is installed into the router at present.
6. Click the On button on the line with DT-KL service to use that service. Then, the Status light for DT-DT service will be changed into red which means you can press on the On button for that one to use it for next time. 7. Now, you have successfully switched the service provider for your router. 4.
If you did not check the Anti-Intrusion box and choose a proper profile for Anti-Virus/Anti-Spam, you still cannot use the Anti-Intrusion/Anti-Virus/Anti-Spam function even if you finished all the relational profiles.
5 Application and Examples 5.1 Create a LAN-to-LAN Connection Between Remote Office and Headquarter The most common case is that you may want to connect to network securely, such as the remote branch office and headquarter. According to the network structure as shown in the below illustration, you may follow the steps to create a LAN-to-LAN profile. These two networks (LANs) should NOT have the same network address. Settings in Router A in headquarter: 1.
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to set general settings in IPSec General Setup, such as the pre-shared key that both parties have known. 262 3. Go to LAN-to-LAN. Click on one index number to edit a profile. 4. Set Common Settings as shown below. You should enable both of VPN connections because any one of the parties may start the VPN connection. 5.
If a PPP-based service is selected, you should further specify the remote peer IP Address, Username, Password, PPP Authentication and VJ Compression for this Dial-Out connection. 6. Set Dial-In settings to as shown below to allow Router B dial-in to build VPN connection. If an IPSec-based service is selected, you may further specify the remote peer IP Address, IKE Authentication Method and IPSec Security Method for this Dial-In connection.
If a PPP-based service is selected, you should further specify the remote peer IP Address, Username, Password, and VJ Compression for this Dial-In connection. 7. At last, set the remote network IP/subnet in TCP/IP Network Settings so that Router A can direct the packets destined to the remote network to Router B via the VPN connection. Settings in Router B in the remote office: 1. 264 Go to VPN and Remote Access and select Remote Access Control to enable the necessary VPN service and click OK.
2. Then, for using PPP based services, such as PPTP, L2TP, you have to set general settings in PPP General Setup. For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to set general settings in IPSec General Setup, such as the pre-shared key that both parties have known. 3. Go to LAN-to-LAN. Click on one index number to edit a profile. 4. Set Common Settings as shown below.
connection. If a PPP-based service is selected, you should further specify the remote peer IP Address, Username, Password, PPP Authentication and VJ Compression for this Dial-Out connection. 6. Set Dial-In settings to as shown below to allow Router A dial-in to build VPN connection. If an IPSec-based service is selected, you may further specify the remote peer IP Address, IKE Authentication Method and IPSec Security Method for this Dial-In connection.
If a PPP-based service is selected, you should further specify the remote peer IP Address, Username, Password, and VJ Compression for this Dial-In connection. 7. At last, set the remote network IP/subnet in TCP/IP Network Settings so that Router B can direct the packets destined to the remote network to Router A via the VPN connection.
5.2 Create a Remote Dial-in User Connection Between the Teleworker and Headquarter The other common case is that you, as a teleworker, may want to connect to the enterprise network securely. According to the network structure as shown in the below illustration, you may follow the steps to create a Remote User Profile and install Smart VPN Client on the remote host. Settings in VPN Router in the enterprise office: 1.
3. Go to Remote Dial-In Users. Click on one index number to edit a profile. 4. Set Dial-In settings to as shown below to allow the remote user dial-in to build VPN connection. If an IPSec service is selected, you may further specify the remote peer IP Address, IKE Authentication Method and IPSec Security Method for this Dial-In connection. Otherwise, it will apply the settings defined in IPSec General Setup above.
Settings in the remote host: 1. For Win98/ME, you may use "Dial-up Networking" to create the PPTP tunnel to Vigor router. For Win2000/XP, please use "Network and Dial-up connections" or “Smart VPN Client”, complimentary software to help you create PPTP, L2TP, and L2TP over IPSec tunnel. You can find it in CD-ROM in the package or go to www.draytek.com download center. Install as instructed. 2. After successful installation, for the first time user, you should click on the Step 0. Configure button.
You may further specify the method you use to get IP, the security method, and authentication method. If the Pre-Shared Key is selected, it should be consistent with the one set in VPN router. If a PPP-based service is selected, you should further specify the remote VPN server IP address, Username, Password, and encryption method. The User Name and Password should be consistent with the one set up in the VPN router.
4. Click Connect button to build connection. When the connection is successful, you will find a green light on the right down corner. 5.3 QoS Setting Example Assume a teleworker sometimes works at home and takes care of children. When working time, he would use Vigor router at home to connect to the server in the headquarter office downtown via either HTTPS or VPN to check email and access internal database. Meanwhile, children may chat on Skype in the restroom. 272 1.
Note: The rate of outbound/inbound must be smaller than the real bandwidth to ensure correct calculation of QoS. It is suggested to set the bandwidth value for inbound/outbound as 80% - 85% of physical network speed provided by ISP to maximize the QoS performance. 4. Return to previous page. Enter the Name of Index Class 1 by clicking Edit link. Type the name “E-mail” for Class 1. 5. For this index, the user will set reserved bandwidth (e.g., 25%) for Email using protocol POP3 and SMTP. 6.
274 7. Click Setup link for WAN1. 8. Check Enable UDP Bandwidth Control on the bottom to prevent enormous UDP traffic of VoIP influent other application, and click OK. 9. If the worker has connected to the headquarter using host to host VPN tunnel. (Please refer to Chapter 3 VPN for detail instruction), he may set up an index for it. Enter the Class Name of Index 3. In this index, he will set reserve bandwidth for 1 VPN tunnel.
10. Click edit to open a new window. 11. First, check the ACT box. Then click Edit of Local Address to set a worker’s subnet address. Click Edit of Remote Address to set headquarter’s subnet address. Leave other fields and click OK. 5.4 LAN – Created by Using NAT An example of default setting and the corresponding deployment are shown below. The default Vigor router private IP address/Subnet Mask is 192.168.1.1/255.255.255.0.
You can just set the settings wrapped inside the red rectangles to fit the request of NAT usage. To use another DHCP server in the network rather than the built-in one of Vigor Router, you have to change the settings as show below.
You can just set the settings wrapped inside the red rectangles to fit the request of NAT usage.
5.5 Calling Scenario for VoIP function 5.5.1 Calling via SIP Sever Example 1: Both John and David have SIP Addresses from different service providers. John’s SIP URL: 1234@draytel.org, David’s SIP URL: 4321@iptel.org Settings for John DialPlan index 1 Phone Number: 1111 Display Name: David SIP URL: 4321@iptel.org SIP Accounts Settings --Profile Name: draytel1 Register via: Auto SIP Port: 5060 (default) Domain/Realm: draytel.org Proxy: draytel.
Example 2: Both John and David have SIP Addresses from the same service provider. John’s SIP URL: 1234@draytel.org , David’s SIP URL: 4321@draytel.org Settings for John DialPlan index 1 Phone Number: 1111 Display Name: David SIP URL: 4321@draytel.org SIP Accounts Settings --Profile Name: draytel 1 Register via: Auto SIP Port: 5060 (default) Domain/Realm: draytel.org Proxy: draytel.
5.5.2 Peer-to-Peer Calling Example 3: Arnor and Paulin have Vigor routers respectively, they can call each other without SIP Registrar. First they must have each other’s IP address and assign an Account Name for the port used for calling. Arnor’s SIP URL: 1234@214.61.172.53 Paulin’s SIP URL: 4321@ 203.69.175.24 Settings for Arnor DialPlan index 1 Phone Number: 1111 Display Name: paulin SIP URL: 4321@ 203.69.175.
5.6 Upgrade Firmware for Your Router Before upgrading your router firmware, you need to install the Router Tools. The Firmware Upgrade Utility is included in the tools. 1. Insert CD of the router to your CD ROM. 2. From the webpage, please find out Utility menu and click it. 3. On the webpage of Utility, click Install Now! (under Syslog description) to install the corresponding program. 4. The file RTSxxx.exe will be asked to copy onto your computer. Remember the place of storing the execution file. 5.
9. Double click on the icon of router tool. The setup wizard will appear. 10. Follow the onscreen instructions to install the tool. Finally, click Finish to end the installation. 11. From the Start menu, open Programs and choose Router Tools XXX >> Firmware Upgrade Utility. 12. Type in your router IP, usually 192.168.1.1. 13. Click the button to the right side of Firmware file typing box. Locate the files that you download from the company web sites.
14. Click Send. 15. Now the firmware update is finished. 5.
284 1. Go to Certificate Management and choose Local Certificate. 2. You can click GENERATE button to start to edit a certificate request. Enter the information in the certificate request. 3. Copy and save the X509 Local Certificate Requet as a text file and save it for later use.
4. Connect to CA server via web browser. Follow the instruction to submit the request. Below we take a Windows 2000 CA server for example. Select Request a Certificate. Select Advanced request. Select Submit a certificate request a base64 encoded PKCS #10 file or a renewal request using a base64 encoded PKCS #7 file Import the X509 Local Certificate Requet text file. Select Router (Offline request) or IPSec (Offline request) below.
Then you have done the request and the server now issues you a certificate. Select Base 64 encoded certificate and Download CA certificate. Now you should get a certificate (.cer file) and save it. 286 5. Back to Vigor router, go to Local Certificate. Click IMPORT button and browse the file to import the certificate (.cer file) into Vigor router. When finished, click refresh and you will find the below window showing “------BEGINE CERTIFICATE------.....” 6.
5.8 Request a CA Certificate and Set as Trusted on Windows CA Server 1. Use web browser connecting to the CA server that you would like to retrieve its CA certificate. Click Retrive the CA certificate or certificate recoring list.
2. In Choose file to download, click CA Certificate Current and Base 64 encoded, and Download CA certificate to save the .cer. file. 3. Back to Vigor router, go to Trusted CA Certificate. Click IMPORT button and browse the file to import the certificate (.cer file) into Vigor router. When finished, click refresh and you will find the below illustration. 4. You may review the detail information of the certificate by clicking View button.
6 Trouble Shooting This section will guide you to solve abnormal situations if you cannot access into the Internet after installing the router and finishing the web configuration. Please follow sections below to check your basic installation status stage by stage. z Checking if the hardware status is OK or not. z Checking if the network connection settings on your computer are OK or not. z Pinging the router from your computer. z Checking if the ISP settings are OK or not.
For Windows 290 The example is based on Windows XP. As to the examples for other operation systems, please refer to the similar steps or find support notes in www.draytek.com. 1. Go to Control Panel and then double-click on Network Connections. 2. Right-click on Local Area Connection and click on Properties. 3. Select Internet Protocol (TCP/IP) and then click Properties.
4. Select Obtain an IP address automatically and Obtain DNS server address automatically. For MacOs 1. Double click on the current used MacOs on the desktop. 2. Open the Application folder and get into Network. 3. On the Network screen, select Using DHCP from the drop down list of Configure IPv4.
6.3 Pinging the Router from Your Computer The default gateway IP address of the router is 192.168.1.1. For some reason, you might need to use “ping” command to check the link status of the router. The most important thing is that the computer will receive a reply from 192.168.1.1. If not, please check the IP address of your computer. We suggest you setting the network connection as get IP automatically. (Please refer to the section 4.2) Please follow the steps below to ping the router correctly.
6.4 Checking If the ISP Settings are OK or Not Click WAN>> Internet Access and then check whether the ISP settings are set correctly. Click Details Page of WAN1/WAN2 to review the settings that you configured previously. For PPPoE Users 1. Check if the Enable option is selected. 2. Check if Username and Password are entered with correct values that you got from your ISP.
For Static/Dynamic IP Users 294 1. Check if the Enable option is selected. 2. Check if IP address, Subnet Mask and Gateway are entered with correct values that you got from your ISP.
For PPTP Users 1. Check if the Enable option for PPTP Link is selected. 2. Check if PPTP Server, Username, Password and WAN IP address are set correctly (must identify with the values from your ISP). 6.5 Backing to Factory Default Setting If Necessary Sometimes, a wrong connection can be improved by returning to the default settings. Try to reset the router by software or hardware. Warning: After pressing factory default setting, you will loose all settings you did before.
Hardware Reset While the router is running (ACT LED blinking), press the Factory Reset button and hold for more than 5 seconds. When you see the ACT LED blinks rapidly, please release the button. Then, the router will restart with the default configuration. After restore the factory default setting, you can configure the settings for the router again to fit your personal request. 6.