Vigor2900 Series Security Router User's Guide: More User Manuals On
Vigor2900 Series Security Router User's Guide: More User Manuals On
Security Router
Users Guide
Version: 2.0
Date: 2006/1/16
ii
Table of Contents
Preface ...............................................................................................................1
1.1 LED Indicators and Connectors .............................................................................................. 1
1.1.1 Front and Rear View for Vigor2900 .................................................................................. 2
1.1.2 Front and Rear View for Vigor2900G ............................................................................... 3
1.1.3 Front and Rear View for Vigor2900Gi .............................................................................. 4
1.1.4 Front and Rear View for Vigor2900i ................................................................................. 5
1.1.5 Front and Rear View for Vigor2900V................................................................................ 6
1.1.6 Front and Rear View for Vigor2900VG............................................................................. 7
1.1.7 Front and Rear View for Vigor2900VGi ............................................................................ 8
1.1.8 Front and Rear View for Vigor2900Vi............................................................................... 9
1.2 Hardware Installation ............................................................................................................ 10
iii
iv
Preface
Targeting requirement for residential, SOHO (Small Office and Home Office) and business
users, the Vigor2900 series provides exceptional bandwidth for Internet access.
To secure your network, the Vigor2900 series provides an advanced firewall with advanced
features, such as NAT with multi VPN pass-through, Stateful Packet Inspection (SPI) to offer
network reliability by detecting and prohibiting malicious penetrating packets,
user-configurable web filtering for parental control against network abuse etc.
Vigor2900 series is embedded with an 802.11g compliant wireless module which provides
wireless LAN access with data rate as much as (up to 54Mbps for Vigor2900G/VG/VGi only).
As for data privacy of wireless network, the Vigor2900 series can encode all transmissions
data with standard WEP and industrial strength WPA2 (IEEE 802.11i) encryption. Additional
features include Wireless Client List and MAC Address Control for maintaining control over
users authorization in your network, and Hidden SSID for being invisible to outside intruders
scanning.
LAN
ACT
DMZ
LED
ACT (Activity)
DMZ
QoS
Attack
P1
Status
Blinking
On
On
On
Blinking
On
On
Orange
Green
Blinking
Orange
VPN
Printer
WAN
LAN (1, 2, 3, 4)
Blinking
Interface
Printer
PWR
0/1
P1 P4
WAN
Factory Reset
PWR
P3
P4
Explanation
The router is powered on and running properly.
DMZ Host is specified in certain site.
The QoS function is active.
DoS Defense function is active.
An attack is detected.
The VPN tunnel is launched.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
Green
Printer
P2
P4
P3
P2
P1
WAN
Factory
Reset
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter for local networked devices.
Connecter for remote networked devices.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LAN
ACT
LED
ACT (Activity)
QoS
WLAN
Status
Blinking
On
On
Blinking
On
Blinking
On
On
Orange
Green
Blinking
Orange
Attack
VPN
Printer
WAN
LAN (1, 2, 3, 4)
Green
Blinking
Printer
Interface
Printer
PWR
0/1
P1 P4
WAN
Factory Reset
PWR
P1
P2
P3
P4
Explanation
The router is powered on and running properly.
The QoS function is active.
The wireless LAN function is enabled.
Ethernet packets are transmitting over wireless LAN.
DoS Defense function is active.
An attack is detected.
The VPN tunnel is launched.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
P4
P3
P2
P1
WAN
Factory
Reset
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter for local networked devices.
Connecter for remote networked devices.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LAN
ACT
LED
ACT (Activity)
ISDN
Status
Blinking
On
Blinking
WLAN
On
Blinking
On
Blinking
On
On
Orange
Green
Blinking
Orange
Attack
VPN
Printer
WAN
LAN (1, 2, 3, 4)
Green
Blinking
PWR
Printer
Interface
Printer
PWR
0/1
P1 P4
WAN
ISDN
Factory Reset
P1
P2
P3
P4
Explanation
The router is powered on and running properly.
The ISDN network is correctly setup.
A successful remote connection on the ISDN BRI
B1/B2 channel.
The wireless LAN function is enabled.
Ethernet packets are transmitting over wireless LAN.
DoS Defense function is active.
An attack is detected.
The VPN tunnel is launched.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
P4
P3
P2
P1
WAN
ISDN
Factory
Reset
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter for local networked devices.
Connecter for remote networked devices.
Connecter for NT1 (or NT1+) box provided by ISDN service provider.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LAN
ACT
ISDN
LED
ACT (Activity)
ISDN
Status
Blinking
On
Blinking
QoS
Attack
On
On
Blinking
On
On
Orange
Green
Blinking
Orange
VPN
Printer
WAN
LAN (1, 2, 3, 4)
Green
Blinking
PWR
Printer
Interface
Printer
PWR
0/1
P1 P4
WAN
ISDN
Factory Reset
P1
P2
P3
P4
Explanation
The router is powered on and running properly.
The ISDN network is correctly setup.
A successful remote connection on the ISDN BRI
B1/B2 channel.
The QoS function is active.
DoS Defense function is active.
An attack is detected.
The VPN tunnel is launched.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
P4
P3
P2
P1
WAN
ISDN
Factory
Reset
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter for local networked devices.
Connecter for remote networked devices.
Connect for NT1 (or NT1+) box provided by ISDN service provider.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LED
ACT (Activity)
QoS
Phone
(FXS1, FXS2)
VPN
Printer
WAN
LAN (1, 2, 3, 4)
Status
Blinking
On
On
Blinking
On
On
Orange
Green
Blinking
Orange
Green
Blinking
Interface
Printer
PWR
0/1
FXS 2 - 1
P1 P4
WAN
Factory Reset
Explanation
The router is powered on and running properly.
The QoS function is active.
The phone is off hook (the handset of phone is
hanging).
A phone call is incoming.
The VPN tunnel is launched.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter of analog phone for VoIP communication.
Connecter for local networked devices.
Connecter for remote networked devices.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LED
ACT (Activity)
QoS
Phone
(FXS1, FXS2)
WLAN
Printer
WAN
LAN (1, 2, 3, 4)
Status
Blinking
On
On
Blinking
On
Blinking
On
Orange
Green
Blinking
Orange
Green
Blinking
Interface
Printer
PWR
0/1
FXS 2 - 1
P1 P4
WAN
Factory Reset
Explanation
The router is powered on and running properly.
The QoS function is active.
The phone is off hook (the handset of phone is
hanging).
A phone call is incoming.
The wireless LAN function is enabled.
Ethernet packets are transmitting over wireless LAN.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter of analog phone for VoIP communication.
Connecter for local networked devices.
Connecter for remote networked devices.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LED
ACT (Activity)
ISDN
Status
Blinking
On
Blinking
On
Phone
(FXS1, FXS2)
WLAN
Printer
WAN
LAN (1, 2, 3, 4)
Blinking
On
Blinking
On
Orange
Green
Blinking
Orange
Green
Blinking
Interface
Printer
PWR
0/1
FXS 2 - 1
P1 P4
WAN
Factory Reset
Explanation
The router is powered on and running properly.
The ISDN network is correctly setup.
A successful remote connection on the ISDN BRI
B1/B2 channel.
The phone is off hook (the handset of phone is
hanging).
A phone call is incoming.
The wireless LAN function is enabled.
Ethernet packets are transmitting over wireless LAN.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter of analog phone for VoIP communication.
Connecter for local networked devices.
Connecter for remote networked devices.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
LED
ACT (Activity)
ISDN
Status
Blinking
On
Blinking
On
Phone
(FXS1, FXS2)
VPN
Printer
WAN
LAN (1, 2, 3, 4)
Blinking
On
On
Orange
Green
Blinking
Orange
Green
Blinking
Interface
Printer
PWR
0/1
FXS 2 - 1
P1 P4
WAN
Factory Reset
Explanation
The router is powered on and running properly.
The ISDN network is correctly setup.
A successful remote connection on the ISDN BRI
B1/B2 channel.
The phone is off hook (the handset of phone is
hanging).
A phone call is incoming.
The VPN tunnel is launched.
The USB interface printer is ready.
A normal 10Mbps WAN link is ready.
A normal 100Mbps WAN link is ready.
Ethernet packets are transmitting.
A normal 10Mbps connection is through its
corresponding port.
A normal 100Mbps connection is through its
corresponding port.
Ethernet packets are transmitting.
Description
Connecter for a USB printer.
Connecter for a power adapter.
Power Switch.
Connecter of analog phone for VoIP communication.
Connecter for local networked devices.
Connecter for remote networked devices.
Restore the default settings.
Usage: Turn on the router (ACT LED is blinking). Press the hole and
keep for more than 5 seconds. When you see the ACT LED begins to
blink rapidly than usual, release the button. Then the router will restart
with the factory default configuration.
2.
Connect one port of 4-port switch to your computer with a RJ-45 cable. This device
allows you to connect 4 PCs directly.
3.
Connect one end of the power cord to the power port of this device. Connect the other
end to the wall outlet of electricity.
4.
5.
6.
Check the ACT and WAN, LAN LEDs to assure network connections.
(For the detailed information of LED status, please refer to section 1.1.)
4
Internet
6
Cable/DSL
modem
1
WAN IP
3
5
2
Power plug
USB Port
PC
N
LA
n
so
USB Printer
10
Notice: You may either simply set up your computer to get IP dynamically
from the router or set up the IP address of the computer to be the same
subnet as the default IP address of Vigor router 192.168.1.1. For the
detailed information, please refer to the later section - Trouble Shooting of
this guide.
2.
Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password. Please type default values (both username and
password are Null) on the window for the first time accessing and click OK for next
screen.
3.
11
Notice: Some of the settings might not appear as above, because the home
page will change slightly according to the features that your router has.
4.
5.
Enter the login password (the default is blank) on the field of Old Password. Type a new
one in the field of New Password and retype it on the field of Retype New Password.
Then click OK to continue.
6.
Now, the password has been changed. Next time, use the new password to access the
Web Configurator for this router.
12
After typing the password, please click Next. The following screen will appear.
13
Please select the appropriate time zone for the router. Then, click Next.
2.2.2 PPPoE
PPPoE stands for Point-to-Point Protocol over Ethernet. It relies on two widely accepted
standards: PPP and Ethernet. It connects users through an Ethernet to the Internet with a
common broadband medium, such as a single DSL line, wireless device or cable modem. All
the users over the Ethernet can share a common connection. And the PPPoA stands for
Point-to-Point Protocol over ATM. PPPoA uses the PPP dial-up protocol with ATM as the
transport.
14
PPPoE is used for most of DSL modem users. All local users can share one PPPoE connection
for accessing the Internet. Your service provider will provide you information about user name,
password, and authentication mode.
If your ISP provides you the PPPoE connection, please select PPPoE for this router. The
following page will be shown:
User Name
Password
Retype Password
Always On
Idle Timeout
15
2.2.3 PPTP
For PPTP connection, please click PPTP as the protocol.
User Name
Password
Retype Password
Obtain an IP address
automatically
Specify an IP address
IP Address
Subnet Mask
16
PPTP Server IP
After finishing the settings in this page, click Next to see the following page.
17
2.2.4 L2TP
Note: This setting is available only for Vigor 2900, Vigor 2900G, Vigor
2900Gi and Vigor 2900i.
Click L2TP as the protocol.
User Name
Password
Retype Password
Obtain an IP address
automatically
Specify an IP address
IP Address
18
Subnet Mask
PPTP Server IP
After finishing the settings in this page, click Next to see the following page.
2.2.5 Static IP
Click Static IP as the protocol.
19
WAN IP
Subnet Mask
Gateway
Primary DNS
Second DNS
After finishing the settings in the above page, click Next to see the following page.
20
2.2.6 DHCP
Click DHCP as the protocol.
Host Name
MAC
Type in all the information that your ISP provides for this protocol. After finishing the settings
in this page, click Next to see the following page.
21
In some special case, you may have a public IP subnet from your ISP such as
220.135.240.0/24. This means that you can set up a public subnet or call second subnet that
each host is equipped with a public IP address. As a part of the public subnet, the Vigor router
22
will serve for IP routing to help hosts in the public subnet to communicate with other public
hosts or servers outside. Therefore, the router should be set as the gateway for public hosts.
23
1st IP Address
2nd IP Address
24
You can configure the router to serve as a DHCP server for the 2nd
subnet.
Start IP Address: Enter a value of the IP address pool for the DHCP
server to start with when issuing IP addresses. If the 2nd IP address
of your router is 220.135.240.1, the starting IP address must be
220.135.240.2 or greater, but smaller than 220.135.240.254.
IP Pool Counts: Enter the number of IP addresses in the pool. The
maximum is 10. For example, if you type 3 and the 2nd IP address of
your router is 220.135.240.1, the range of IP address by the DHCP
server will be from 220.135.240.2 to 220.135.240.4.
MAC Address: Enter the MAC Address of the host one by one and
click Add to create a list of hosts to be assigned, deleted or edited IP
address from above pool. Set a list of MAC Address for 2nd DHCP
server will help router to assign the correct IP address of the correct
subnet to the correct host. So those hosts in 2nd subnet wont get an
IP address belonging to 1st subnet.
RIP Protocol Control
1st Subnet - Select the router to change the RIP information of the
1st subnet with neighboring routers.
2nd Subnet - Select the router to change the RIP information of the
2nd subnet with neighboring routers.
DHCP Server
Configuration
25
DNS stands for Domain Name System. Every Internet host must
have a unique IP address, also they may have a human-friendly,
easy to remember name such as www.yahoo.com. The DNS server
converts the user-friendly name into its equivalent IP address.
Primary IP Address -You must specify a DNS server IP address
here because your ISP should provide you with usually more than
one DNS Server. If your ISP does not provide it, the router will
automatically apply default DNS Server IP address: 194.109.6.66 to
this field.
Secondary IP Address - You can specify secondary DNS server IP
address here because your ISP often provides you more than one
DNS Server. If your ISP does not provide it, the router will
automatically apply default secondary DNS Server IP address:
194.98.0.1 to this field.
The default DNS Server IP address can be found via Online Status:
If both the Primary IP and Secondary IP Address fields are left empty,
the router will assign its own IP address to local users as a DNS
proxy server and maintain a DNS cache.
If the IP address of a domain name is already in the DNS cache, the
router will resolve the domain name immediately. Otherwise, the
router forwards the DNS query packet to the external DNS server by
establishing a WAN (e.g. DSL/Cable) connection.
There are two common scenarios of LAN settings that stated in Chapter 4. For the
configuration examples, please refer to that chapter to get more information for your necessity.
26
ISDN Port
Country Code
Own Number
Blocked MSN Numbers for the Enter the specified MSN number into the fields to
prevent the router from dialing the specific MSN
router
number.
For example, DrayTek provides the Remote Activation (refer to section 3.2) feature for the
teleworkers who wish to dial in the head office over the ISDN. With this feature, teleworkers
can make a phone call to the router at the head office and ask the router to dial up the ISP. As
a result, the teleworkers can be authorized with their office accounts to utilize ISDN dial-up
services and both sides can thus engage in secure communication over the LAN-to-LAN
ISDN.
The ISDN interface of Vigor2900VGi and Vigor2900Vi routers supports the VTA (Virtual
Terminal Adapter, please refer to section 2.8) feature. VTA is actually a CAPI software,
Vigor2900 Series Users Guide
27
which can simulate a real ISDN terminal adapter installed on your computer. You can install
the CAPI-compliant software for dial-up networking, fax or voice applications depending on
the functionality of the CAPI software you installed. To employ the VTA feature, please
download the VTA drivers (available only to Windows 98SE/2000/XP) from
http://www.draytek.com/english/support/download.php.
Note: * The actual data throughput will vary according to the network conditions
and environmental factors, including volume of network traffic, network overhead
and building materials.
In an Infrastructure Mode of wireless network, Vigor wireless router plays a role as an Access
Point (AP) connecting to lots of wireless clients or Stations (STA). All the STAs will share the
same Internet connection via Vigor wireless router. The General Settings will set up the
information of this wireless network, including its SSID as identification, located channel etc.
28
Security Overview
Real-time Hardware Encryption: Vigor Router is equipped with a hardware AES encryption
engine so it can apply the highest protection to your data without influencing user experience.
Complete Security Standard Selection: To ensure the security and privacy of your wireless
communication, we provide several prevailing standards on market.
WEP (Wired Equivalent Privacy) is a legacy method to encrypt each frame transmitted via
radio using either a 64-bit or128-bit key. Usually access point will preset a set of four keys and
it will communicate with each station using only one out of the four keys.
WPA(Wi-Fi Protected Access), the most dominating security mechanism in industry, is
separated into two categories: WPA-personal or called WPA Pre-Share Key (WPA/PSK), and
WPA-Enterprise or called WPA/802.1x.
In WPA-Personal, a pre-defined key is used for encryption during data transmission. WPA
applies Temporal Key Integrity Protocol (TKIP) for data encryption while WPA2 applies AES.
The WPA-Enterprise combines not only encryption but also authentication.
Since WEP has been proved vulnerable, you may consider using WPA for the most secure
connection. You should select the appropriate security mechanism according to your needs.
No matter which security suite you select, they all will enhance the over-the-air data
protection and /or privacy on your wireless network. The Vigor wireless router is very flexible
and can support multiple secure connections with both WEP and WPA at the same time.
Example 1
Example 2
29
Example 3
Separate the Wireless and the Wired LAN- WLAN Isolation enables you to isolate your
wireless LAN from wired LAN for either quarantine or limit access reasons. To isolate means
neither of the parties can access each other. To elaborate an example for business use, you
may set up a wireless LAN for visitors only so they can connect to Internet without hassle of
the confidential information leakage. For a more flexible deployment, you may add a filter of
MAC address to isolate single users access from wired LAN.
Manage Wireless Stations - Station List will display all the station in your wireless network
and the status of their connection.
Click Wireless LAN Setup from the Basic Setup group. You will see the following page.
30
Mode
Scheduler (1-15)
SSID
31
Hide SSID
Long Preamble
32
2.5.3 Security
By clicking the Security Settings, a new web page will appear so that you could configure the
settings of WEP and WPA.
Mode
33
WEP
34
Policy
35
Add
Remove
Edit
Cancel
Clear All
OK
Refresh
Add
36
37
If your router supports ISDN function, you will get the following page with ISDN dial-up
Internet Access.
2.6.2 PPPoE
As a CPE device, Vigor router encapsulates the PPP session based for transport across the
ADSL loop and your ISPs Digital Subscriber Line Access Multiplexer (DSLAM).
To choose PPPoE as the accessing protocol of the internet, please select PPPoE from the
Internet Access menu. The following web page will be shown.
38
PPPoE Link
Click Enable for activating this function. If you click Disable, this
function will be closed and all the settings that you adjusted in this
page will be invalid.
ISP Name
Username
Password
Index (1-15) in
Schedule Setup
You can type in four sets of time schedule for your request. All the
schedules can be set previously in Application Schedule web
page and you can use the number that you have set in that web
page.
Always On
Check this box if you want the router keeping connecting to Internet
forever.
Idle Timeout
Set the timeout for breaking down the Internet after passing through
the time without any action.
Fixed IP
Fixed IP Address
WAN IP Alias
39
By checking the checkbox Join NAT IP Pool, data from NAT hosts
will be round-robin forwarded on a session basis.
If you do not check Join NAT IP Pool, you can still use these public
40
Check and choose a proper type used for duplex between this device
and other router that you want to communicate. Both sides should
use the same physical type; otherwise, the connection might be
failed due to inconsistent type. It is recommended for you to set
Auto negotiation as the physical type.
After finishing all the settings here, please click OK to activate them.
41
Access Control
Click Enable for activating this function. If you click Disable, this
function will be closed and all the settings that you adjusted in this
page will be invalid.
42
PING Interval - Enter the interval for the system to execute the
PING operation.
WAN physical type
Check and choose a proper type used for duplex between this device
and other router that you want to communicate. Both sides should
use the same physical type; otherwise, the connection might be
failed due to inconsistent type. It is recommended for you to set
Auto negotiation as the physical type.
RIP Protocol
BPA Setup
43
Type in the primary IP address for the router if you want to use
Static IP mode. If necessary, type in secondary IP address for
necessity in the future.
After finishing all the settings here, please click OK to activate them.
2.6.4 PPTP
To choose PPTP as the accessing protocol of the internet, please select Internet Access
Setup on the Quick Setup page. Next, choose the PPTP link. The following web page will be
shown.
44
PPTP Setup
ISP Name - Type in the ISP Name provided by ISP in this field.
Username -Type in the username provided by ISP in this field.
Password -Type in the password provided by ISP in this field.
Index (1-15) in Schedule Setup - You can type in four sets of time
schedule for your request. All the schedules can be set previously in
Application Schedule web page and you can use the number that
you have set in that web page.
.
Due to the absence of the ISDN interface in some models (e.g.,
Vigor2900V and Vigor2900VG), the ISDN dial backup feature and
its associated setup options are not available to them. Please refer to
the previous part for further information.
None - Disable the backup function.
Packet Trigger -The backup line is not on until a packet from a
local host triggers the router to establish a connection.
Always On - If the broadband connection is no longer available, the
backup line will be activated automatically and always on until the
broadband connection is restored. We recommend you to enable this
feature if you host a web server for your customers access.
PPP Setup
Idle Timeout - Set the timeout for breaking down the Internet after
passing through the time without any action.
IP Address
Assignment
Method(IPCP)
LAN2/WAN IP
Network Settings
Check and choose a proper type used for duplex between this device
and other router that you want to communicate. Both sides should
use the same physical type; otherwise, the connection might be
failed due to inconsistent type. It is recommended for you to set
Auto negotiation as the physical type.
2.6.5 L2TP
To choose L2TP as the accessing protocol of the internet, please select Internet Access Setup
on the Quick Setup page. Next, choose the L2TP link. The following web page will be
shown.
46
L2TP Setup
ISP Name - Type in the ISP Name provided by ISP in this field.
Username -Type in the username provided by ISP in this field.
Password -Type in the password provided by ISP in this field.
Index (1-15) in Schedule Setup - You can type in four sets of time
schedule for your request. All the schedules can be set previously in
Application Schedule web page and you can use the number that
you have set in that web page.
PPP Setup
IP Address
Assignment
Method(IPCP)
LAN2/WAN IP
Network Settings
Check and choose a proper type used for duplex between this device
and other router that you want to communicate. Both sides should
47
ISP Name
Dial Number
Username
Password
Require ISP Callback If your ISP supports the callback function, check this box to
activate the Callback Control Protocol during the PPP negotiation.
(CBCP)
Scheduler (1-15)
Link Type
There are four link types: Link Disable, Dialup 64 Kbps, Dialup 128
Kbps, and Dialup BOD.
Link Disable - Disable the ISDN dial-out function.
Dialup 64Kbps - Use one ISDN B channel for Internet access.
Dialup 128Kbps - Use both ISDN B channels for Internet access.
Dialup BOD - BOD stands for bandwidth-on-demand. The router
will use only one B channel in low traffic situations. Once the single
B channel bandwidth is fully used, the other B channel will be
activated automatically through the dialup. For more detailed BOD
parameter settings, please refer to the Advanced Setup field > Call
Control and PPP/MP Setup.
PPP Authentication
PAP Only - Configure the PPP session to use the PAP protocol to
negotiate the username and password with the ISP.
PAP or CHAP - Configure the PPP session to use the PAP or
CHAP protocols to negotiate the username and password with the
ISP.
48
Idle Timeout
Idle timeout means the router will be disconnect after being idle for
a preset amount of time. The default is 180 seconds. If you set the
time to 0, the ISDN connection to the ISP will always remain on.
Fixed IP
Fixed IP Address
Most configuration parameters are the same as those of the previous part. This screen provides
a checkbox to enable the Dual ISPs function and adds the secondary ISP Setup section field.
Check the corresponding box and enter the second ISP information. About the details please
refer to the descriptions of the previous part.
49
The Virtual TA client only supports the CAPI 2.0 protocol and has no built-in FAX
engine.
One ISDN BRI interface has two B channels. The maximum number of active clients is
also two.
Before you configure the Virtual TA, you must set the correct country code.
As depicted in the above application scenario, the Virtual TA client can make an outgoing call
or accept an incoming call to/from a peer FAX machine or ISDN TA, etc.
Before you configure the Virtual TA (Remote CAPI) Setup, please install the virtual TA client
first. Simply insert the CD bundled with your Vigor router, or directly double-click one of the
installer files. In which Vsetup95.exe is for Windows 95 OSR2.1 or higher; Vsetup98.exe is
for Windows 98, 98SE and Me; and Vsetup2k.exe is for Windows 2000. Follow the on-screen
instructions of the installer. The last step will ask you to restart your computer. Click OK to
restart your computer.
After the computer restarts, you will see a VT icon in the taskbar (usually in the bottom-right
of the screen, near the clock) as shown below.
When the icon text is GREEN, the Virtual TA client is connected to the Virtual TA server and
you can launch your CAPI-based software to use the client to access the router. Please read
your software user guide for detailed configuration. If the icon text is RED, it means the client
has lost the connection to the server. In such condition, please check the physical Ethernet
connection.
Next, click the Virtual TA (Remote CAPI) Setup link in the Quick Setup group to configure
the Virtual TA features.
Since the Virtual TA application is a client/server network model, you must configure it on
both ends to run properly your Virtual TA application.
By default, the Virtual TA server is enabled and the Username/Password fields are left blank.
Any Virtual TA client may login to the server. Once a single Username/Password field has
been filled in, the Virtual TA server will only allow clients with a valid Username/Password to
login. The screen of Virtual TA configuration is presented below.
50
Virtual TA Server
Username
Password
MSN1/ MSN2/MSN3
Active
User Profile
Note that creating a single user access account will limit the access to the Virtual TA server to
only the specified account holders.
Assume you did not acquire any MSN service from your ISDN network provider.
On the server - Click Virtual TA (Remote CAPI) Setup link, and fill in the Username and
Password fields. Check the Active box to enable the account.
51
On the client - Right-click the mouse on the VT icon. The following pop-up menu will be
shown.
Enter the Username/Password and then click OK. After a short time, the VT icon text will turn
green.
MSN Configuration
If you have applied to an MSN number service, the Virtual TA server can assign which client
has the specified MSN number. When an incoming call arrives, the server will inform the
appropriate client. Now we set an example to describe the configuration of the MSN number.
Suppose that you could assign the MSN number 123 to the client alan.
Type the specified MSN number in the CAPI-based software. When the Virtual TA server
sends an alert signal to the specified Virtual TA client, the CAPI-based software will also
receive the action, the software will not accept the incoming call.
52
Assume you have a registered domain name from the DDNS provider (e.g.,
hostname.dyndns.org), and an account with username: test and password: test.
2.
Select Dynamic DNS Setup from the Advanced Setup group. The following page will
appear.
Enable Dynamic DNS Setup Check this box to enable DDNS function.
Index
Domain Name
Display the domain name that you set on the setting page
of DDNS setup.
53
3.
4.
Active
View Log
Force Update
Select Index number 1 to add an account for the router. Check Enable Dynamic DNS
Account, and choose correct Service Provider: dyndns.org, type the registered hostname:
hostname and domain name suffix: dyndns.org in the Domain Name block. The
following two blocks should be typed your account Login Name: test and Password: test.
Enable Dynamic
DNS Account
Check this box to enable the current account. If you did check
the box, you will see a check mark appeared on the Active
column of the previous web page in step 2).
Service Provider
Service Type
Domain Name
Login Name
Type in the login name that you set for applying domain.
Password
Mail Extender
Click OK button to activate the settings. You will see your setting has been saved.
The Wildcard and Backup MX features are not supported for all Dynamic DNS providers.
You could get more detailed information from their websites.
Disable the Function and Clear all Dynamic DNS Accounts
Uncheck Enable Dynamic DNS Setup, and press Clear All button to disable the function and
clear all accounts from the router.
Delete a Dynamic DNS Account
On the Dynamic DNS Setup page, click the Index number you want to delete and then press
Clear All button to delete the account.
54
Note: Call Control and PPP/MP are only available for the models of Vigor2900VGi
and Vigor2900Vi equipped with the ISDN interface.
Click Call Control and PPP/MP Setup from Advanced Setup group.
Note: Please set Dialing to a Single ISP first before configuring this web page.
Dial Retry
Remote Activation
Link Type
55
PPP Authentication
Idle Timeout
Low Water Mark and Low These parameters specify the situation in which the second
channel will be dropped. In terms of the two B channels, if
Water Time
their utilization is under the Low Water Mark and these two
channels are being used over the High Water Time, the
additional channel will be dropped. As a result, the total link
speed will be 64kbps (one B channel).
Note: If you are not sure whether your ISP can support BOD and/or ML-PPPs
features, please seek assistance from your ISP, local dealers or our website:
support@draytek.com.
56
Index
Click the number below Index to access into the setting page of
schedule.
Status
You can set up to 15 schedules. Then you can apply them to your Internet Access or VPN
and Remote Access >> LAN-to-LAN settings.
To add a schedule, please click any index, say Index No. 1. The detailed settings of the call
schedule with index 1 are shown below.
Action
57
How often
Example
Suppose you want to control the PPPoE Internet access connection to be always on (Force On)
from 9:00 to 18:00 for whole week. Other time the Internet access connection should be
disconnected (Force Down).
Office
Hour:
(Force On)
Mon - Sun
9:00 am
to
6:00 pm
1.
Make sure the PPPoE connection and Call Schedule Setup is working properly.
2.
Configure the PPPoE always on from 9:00 to 18:00 for whole week.
3.
Configure the Force Down from 18:00 to next day 9:00 for whole week.
Assign these two profiles to the PPPoE Internet access profile. Now, the PPPoE Internet
connection will follow the schedule order to perform Force On or Force Down action
according to the time plan that has been pre-defined in the schedule profiles.
Save cost on applying public IP address and apply efficient usage of IP address.
NAT allows the internal IP addresses of local hosts to be translated into one public IP
address, thus you can have only one IP address on behalf of the entire internal hosts.
Enhance security of the internal network by obscuring the IP address. There are
many attacks aiming victims based on the IP address. Since the attacker cannot be aware
of any private IP addresses, the NAT function can protect the internal network.
58
On NAT page, you will see the private IP address defined in RFC-1918. Usually we
use the 192.168.1.0/24 subnet for the router. As stated before, the NAT facility can
map one or more IP addresses and/or service ports into different specified services.
In other words, the NAT function can be achieved by using port mapping methods.
Click NAT Setup on the Advanced Setup page. The setting items for NAT will be shown as
below.
59
Service Name
Protocol
Public Port
Private IP
Private Port
Specify the private port number of the service offered by the internal
host.
Active
Check this box to activate the port-mapping entry you have defined.
Note that the router has its own built-in services (servers) such as Telnet, HTTP and FTP etc.
Since the common port numbers of these services (servers) are all the same, you may need to
reset the router in order to avoid confliction.
For example, the built-in web configurator in the router is with default port 80, which may
conflict with the web server in the local network, http://192.168.1.13:80. Therefore, you need
to change the routers http port to any one other than the default port 80 to avoid conflict,
such as 8080. This can be set by the Management Setup in the System Management group.
You then will access the admin screen of by suffixing the IP address with 8080, e.g.,
http://192.168.1.1:8080 instead of port 80.
60
The inherent security properties of NAT are somewhat bypassed if you set up DMZ
host. We suggest you to add additional filter rules or a secondary firewall.
Click DMZ Host to open the following page:
If you previously have set up WAN Alias in Internet Access>>PPPoE, you will find them in
Aux. WAN IP list for your selection.
61
Enable
Private IP
Choose PC
Click this button and then a window will automatically pop up, as
depicted below. The window consists of a list of private IP addresses
of all hosts in your LAN network. Select one private IP address in
the list to be the DMZ host.
When you have selected one private IP from the above dialog, the IP
address will be shown on the following screen. Click OK to save the
setting.
62
Index
Indicate the relative number for the particular entry that you want to
offer service in a local host. You should click the appropriate index
number to edit or clear the corresponding entry.
Comment
Aux. WAN IP
Display the private IP address of the local host that you specify in
WAN Alias. If you did not specify any IP address in WAN Alias, this
item will not be shown.
Local IP Address
Display the private IP address of the local host offering the service.
Status
To add or edit port settings, click one index number on the page. The index entry setup page
will pop up. In each index entry, you can specify 10 port ranges for diverse services.
63
However, if you previously have set up WAN Alias in Internet Access>>PPPoE, you will
find that WAN IP appeared for your selection.
Enable Open Ports
Comment
Local Computer
Choose PC
Protocol
Specify the transport layer protocol. It could be TCP, UDP, or ----(none) for selection.
Start Port
Specify the starting port number of the service offered by the local
host.
End Port
Specify the ending port number of the service offered by the local
host.
Cancel
Clear All
OK
64
65
When you press the WAN IP Alias button, a window will show up for you to input other
public IP addresses. The Join NAT IP Pool check box indicates that the local users can use
this IP to connect to the Internet. If you do not chick this check box, this IP address will not be
available to the local users.
After you configure the WAN IP Alias feature, these addresses can be selected on DMZ
Hosts or Open Ports pages.
66
Enable
Server IP Address
Destination Port
The UDP port number that the RADIUS server is using. The
default value is 1812 , based on RFC 2138.
67
Shared Secret
Index
The number (1 to 10) under Index allows you to open next page to
setup static route.
Destination Address
Status
On the Basic Setup group, click LAN TCP/IP and DHCP Setup. Select 1st Subnet as
the RIP Protocol Control. Then click the OK button.
Note: There are two reasons that we have to apply RIP Protocol Control on
1st Subnet. The first is that the LAN interface can exchange RIP packets
with the neighboring routers via the 1st subnet (192.168.1.0/24). The second
68
is that those hosts on the internal private subnets (ex. 192.168.10.0/24) can
access the Internet via the router, and continuously exchange of IP routing
information with different subnets.
2.
Click Index Number 1 from the Static Route Configuration page. Please add a static
route as shown below, which regulates all packets destined to 192.168.10.0 will be
forwarded to 192.168.1.2. Click OK.
3.
Return to Static Route Setup page. Click on another Index Number to add another
static route as show below, which regulates all packets destined to 211.100.88.0 will be
forwarded to 192.168.1.2.
4.
Click Diagnostics Tools on the System Management group, then choose View Routing
Table to verify current routing table.
69
Click the Index Number that you want to delete from the Static Route Configuration
page.
2.
Select Empty/Clear from the drop-down menu, and then click the OK button to delete
the route.
70
Click the Index Number that you want to disable from the Static Route Configuration
page.
2.
Select Inactive/Disable from the drop-down menu, and then click the OK button to
delete the route.
71
Firewall Facilities
The users on the LAN are provided with secured protection by the following firewall facilities:
z
Stateful Packet Inspection (SPI): tracks packets and denies unsolicited incoming data
IP Filters
Depending on whether there is an existing Internet connection, or in other words the WAN
link status is up or down, the IP filter architecture categorizes traffic into two: Call Filter and
Data Filter.
z
Call Filter - When there is no existing Internet connection, Call Filter is applied to all
traffic, all of which should be outgoing. It will check packets according to the filter rules.
If legal, the packet will pass. Then the router shall initiate a call to build the Internet
connection and send the packet to Internet.
72
Data Filter - When there is an existing Internet connection, Data Filter is applied to
incoming and outgoing traffic. It will check packets according to the filter rules. If legal,
the packet will pass the router.
The following illustrations are flow charts explaining how router will treat incoming traffic
and outgoing traffic respectively.
73
9. Smurf attack
10. SYN fragment
11. ICMP fragment
12. Tear drop attack
13. Fraggle attack
14. Ping of Death attack
15. TCP/UDP port scan
74
To edit or add a filter, click on the set number to edit the individual set. The following page
will be shown. Each filter set contains up to 7 rules. Click on the rule number button to edit
each rule. Check Active to enable the rule.
75
Filter Rule
Click a button numbered (1 ~ 7) to edit the filter rule. Click the button
will open Edit Filter Rule web page. For the detailed information,
refer to the following page.
Active
Comment
Set the link to the next filter set to be executed after the current filter
run. Do not make a loop with many filter sets.
To edit Filter Rule, click the Filter Rule index button to enter the Filter Rule setup page.
Comments
76
Pass or Block
Check this box to enable the log function. Use the Telnet command
log-f to view the logs.
Keep State
It is used for Data Filter only. Keep State is in the same nature of
modern term Stateful Packet Inspection. If enabled, this rule will be
added to State table when it is matched by a packet. When other
packets in the same session as the matched packet is applied to Data
Filer, they will be checked against the rules in State table first. If
matched, they can pass immediately without having to check any
rule in Data Filter. Only ICMP, TCP and UDP protocols can be
added to State table.
Direction
Set the direction of packet flow. It is for Data Filter only. For the
Call Filter, this setting is neglected since Call Filter is only applied
to outgoing traffic.
IN - Specify the rule of filtering incoming packets.
OUT - Specify the rule of filtering outgoing packets.
Protocol
Specify the protocol(s) which this filter rule will apply to.
Fragments
Specify the action for fragmented packets. And it is used for Data
Filter only.
77
Specify a source and destination IP address for this filter rule to apply
to. Click Edit to open the following page and type in the IP address.
The operator column specifies the port number settings. If the Start
Port is empty, the Start Port and the End Port column will be
ignored. The filter rule will filter out any port number.
(=) If the End Port is empty, the filter rule will set the port
number to be the value of the Start Port. Otherwise, the port
number ranges between the Start Port and the End Port (including
the Start Port and the End Port).
(!=)If the End Port is empty, the port number is not equal to the
value of the Start Port. Otherwise, this port number is not between
the Start Port and the End Port (including the Start Port and End
Port).
(>) Specify the port number is larger than the Start Port (includes
the Start Port).
(<) Specify the port number is less than the Start Port (includes the
Start Port).
Time Schedule
To invoke the rules during specific periods, enter the number of the
scheduler predefined in Call Schedule Setup on the Advanced
Setup group.
78
79
Call Filter
Check Enable to activate the Call Filter function. Assign a start filter
set for the Call Filter.
Data Filter
Check Enable to activate the Data Filter function. Assign a start filter
set for the Data Filter.
Log Flag
For troubleshooting needs you can specify the filter log here.
Some on-line games (for example: Half Life) will use lots of fragmented UDP packets to
transfer game data. Instinctively as a secure firewall, Vigor router will reject these fragmented
packets to prevent attack unless you enable Accept Incoming Fragmented UDP Packets. By
checking this box, you can play these kinds of on-line games. If security concern is in higher
priority, you cannot enable Accept Incoming Fragmented UDP Packets.
80
Active
MAC Address
Type in the MAC Address of the device that the router connects to.
Pass Scheduler (1..15) Let the device with the specific MAC address to be passed within
certain time interval only. You may choose up to 4 schedules out of
the 15 schedules pre-defined in Call Schedule Setup in Advanced
Setup group setup.
If the four boxes are left blank, that means the traffic for the MAC
address is always pass. If only one disabled schedule typed in the
box, it means the related MAC address will be always blocked.
For hosts not listed in
this table
This setting allows you to set for all other hosts that not listed in
the above table to be passed or be blocked in certain time. Again,
please choose four schedules from Call Schedule Setup.
81
Check the box to activate the SYN flood defense function. Once
detecting the Threshold of the TCP SYN packets has exceeded the
defined value, the Vigor router will start to discard the subsequent
TCP SYN packets for a period defined in Timeout. The goal for
this is prevent the TCP SYN packets attempt to exhaust the
limited-resource of Vigor router. By default, the threshold and
timeout values are set to 50 packets per second and 10 seconds,
respectively.
Check the box to activate the UDP flood defense function. Once
detecting the Threshold of the UDP packets has exceeded the
defined value, the Vigor router will start to discard the subsequent
UDP packets for a period defined in Timeout. The default setting
for threshold and timeout are 150 packets per second and 10
seconds, respectively.
Check the box to activate the ICMP flood defense function. Similar
to the UDP flood defense function, once if the Threshold of ICMP
packets has exceeded the defined value, the router will discard the
ICMP echo requests coming from the Internet. The default setting
for threshold and timeout are 50 packets per second and 10 seconds,
respectively.
Enable PortScan
detection
Block IP options
Check the box to activate the Block IP options function. The Vigor
router will ignore any IP packets with IP option field in the datagram
82
Check the box to enforce the Vigor router to defense the Land
attacks. The Land attack combines the SYN attack technology with
IP spoofing. A Land attack occurs when an attacker sends spoofed
SYN packets with the identical source and destination addresses, as
well as the port number to victims.
Block Smurf
Check the box to activate the Block Smurf function. The Vigor router
will ignore any broadcasting ICMP echo request.
Check the box to enforce the Vigor router not to forward any trace
route packets.
Check the box to activate the Block SYN fragment function. The
Vigor router will drop any packets having SYN flag and more
fragment bit set.
Check the box to activate the Block fraggle Attack function. Any
broadcast UDP packets received from the Internet is blocked.
Activating the DoS/DDoS defense functionality might block some
legal packets. For example, when you activate the fraggle attack
defense, all broadcast UDP packets coming from the Internet are
blocked. Therefore, the RIP packets from the Internet might be
dropped.
Check the box to activate the Block TCP flag scan function. Any TCP
packet with anomaly flag setting is dropped. Those scanning activities
include no flag scan, FIN without ACK scan, SYN FINscan, Xmas
scan and full Xmas scan.
Check the box to activate the Block Tear Drop function. Many
machines may crash when receiving ICMP datagrams (packets) that
exceed the maximum length. To avoid this type of attack, the Vigor
router is designed to be capable of discarding any fragmented ICMP
packets with a length greater than 1024 octets.
Check the box to activate the Block Ping of Death function. This
attack involves the perpetrator sending overlapping packets to the
target hosts so that those target hosts will hang once they
re-construct the packets. The Vigor routers will block any packets
realizing this attacking activity.
Block ICMP Fragment Check the box to activate the Block ICMP fragment function. Any
ICMP packets with more fragment bit set are dropped.
Block Land
Check the box to enforce the Vigor router to defense the Land
attacks. The Land attack combines the SYN attack technology with
IP spoofing. A Land attack occurs when an attacker sends spoofed
SYN packets with the identical source and destination addresses, as
well as the port number to victims.
Block Unknown
Protocol
83
the protocol types greater than 100 are reserved and undefined at
this time. Therefore, the router should have ability to detect and
reject this kind of packets.
Warning Messages
84
Keyword
The Vigor router provides 8 frames for users to define keywords and
each frame supports multiple keywords. The keyword could be a
noun, a partial noun, or a complete URL string. Multiple keywords
within a frame are separated by space, comma, or semicolon. In
addition, the maximal length of each frame is 32-character long.
After specifying keywords, the Vigor router will decline the
connection request to the website whose URL string matched to any
user-defined keyword. It should be noticed that the more simplified
the blocking keyword list, the more efficiently the Vigor router
perform.
85
Check the box to deny any web surfing activity using IP address,
such as http://202.6.3.2. The reason for this is to prevent someone
dodges the URL Access Control.
You must clear your browser cache first so that the URL content
filtering facility operates properly on a web page that you visited
before.
Enable Excepting
Subnets
Time Schedule
Specify what time should perform the URL content filtering facility.
86
87
3.7.7 IM Blocking
IM Blocking means instant messenger blocking. You will see a list of common IM (such as
MSN, Yahoo, ICQ/AQL) applications. Check Enable IM Blocking and select the one(s) that
you want to block. To block selected IM applications during specific periods, enter the number
of the scheduler predefined in Call Schedule Setup.
Choose IP Filter/Firewall Setup on the Advanced Setup group and click the IM Blocking
link.
88
Action
89
90
Dial-In PPP
Authentication
Start IP Address
91
There are two encapsulation methods used in IPSec, Transport and Tunnel. The Transport
mode will add the AH/ESP payload and use original IP header to encapsulate the data payload
only. It can just apply to local packet, e.g., L2TP over IPSec. The Tunnel mode will not only
add the AH/ESP payload but also use a new IP header (Tunneled IP header) to encapsulate the
whole original IP packet.
Authentication Header (AH) provides data authentication and integrity for IP packets passed
between VPN peers. This is achieved by a keyed one-way hash function to the packet to create
a message digest. This digest will be put in the AH and transmitted along with packets. On the
receiving side, the peer will perform the same one-way hash on the packet and compare the
value with the one in the AH it receives.
Encapsulating Security Payload (ESP) is a security protocol that provides data confidentiality
and protection with optional authentication and replay detection service.
IKE Authentication Method This usually applies to those are remote dial-in user or node
(LAN-to-LAN) which uses dynamic IP address and
IPSec-related VPN connections such as L2TP over IPSec and
IPSec tunnel.
Pre-Shared Key -Currently only support Pre-Shared Key
authentication. Specify a key for IKE authentication.
Re-type Pre-Shared Key -Confirm the pre-shared key.
IPSec Security Method
92
Click the number below Index to access into the setting page of
Remote Dial-in User.
User
Status
Click each index to edit one remote user profile. Each Dial-In Type requires you to fill the
different corresponding fields on the right. If the fields gray out, it means you may leave it
untouched. The following explanation will guide you to fill all the necessary fields.
93
ISDN
Allow the remote ISDN dial-in connection. You can further set
up Callback function below. You should set the User Name and
Password of remote dial-in user below. This feature is for i
model only.
PPTP
IPSec Tunnel
L2TP
User Name
Password
94
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy when you specify the remote node. Check the
Medium, DES, 3DES or AES box as the security method.
Medium -Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option is
invoked. You can uncheck it to disable it.
High-Encapsulating Security Payload (ESP) means payload
(data) will be encrypted and authenticated. You may select
encryption algorithm from Data Encryption Standard (DES),
Triple DES (3DES), and AES.
Local ID - Specify a local ID to be used for Dial-in setting in
the LAN-to-LAN Profile setup. This item is optional and can be
used only in IKE aggressive mode.
Callback Function
95
Status
Click each index to edit each profile and you will get the following page. Each LAN-to-LAN
profile includes 4 subgroups. If the fields gray out, it means you may leave it untouched. The
following explanations will guide you to fill all the necessary fields.
For the web page is too long, we divide the page into several sections for explanation.
96
Profile Name
Call Direction
Always On or Idle Timeout Always On-Check to enable router always keep VPN
connection.
Idle Timeout: The default value is 300 seconds. If the
connection has been idled over the value, the router will drop
the connection.
Enable PING to keep alive This function is to help the router to determine the status of
IPSec VPN connection, especially useful in the case of
abnormal VPN IPSec tunnel disruption. For details, please refer
to the note below. Check to enable the transmission of PING
packets to a specified IP address.
PING to the IP
ISDN
PPTP
IPSec Tunnel
L2TP with
97
User Name
Password
PPP Authentication
VJ compression
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy.
Medium
Advanced
Main mode.
IKE phase 1 proposal-To propose the local available
authentication schemes and encryption algorithms to the VPN
peers, and get its feedback to find a match. Two combinations
are available for Aggressive mode and nine for Main mode. We
suggest you select the combination that covers the most
schemes.
IKE phase 2 proposal-To propose the local available
algorithms to the VPN peers, and get its feedback to find a
match. Three combinations are available for both modes. We
suggest you select the combination that covers the most
algorithms.
IKE phase 1 key lifetime-For security reason, the lifetime of
key should be defined. The default value is 28800 seconds. You
may specify a value in between 900 and 86400 seconds.
IKE phase 2 key lifetime-For security reason, the lifetime of
key should be defined. The default value is 3600 seconds.
You may specify a value in between 600 and 86400 seconds.
Perfect Forward Secret (PFS)-The IKE Phase 1 key will be
reused to avoid the computation complexity in phase 2. The
default value is inactive this function.
Local ID -In Aggressive mode, Local ID is on behalf of the IP
address while identity authenticating with remote VPN server.
The length of the ID is limited to 47 characters.
Callback Function
(for I models only)
99
ISDN
Allow the remote ISDN dial-in connection. You can further set
up Callback function below. You should set the User Name and
Password of remote dial-in user below. This feature is useful for
i model only.
PPTP
IPSec Tunnel
L2TP
100
Password
VJ Compression
This group of fields is a must for IPSec Tunnels and L2TP with
IPSec Policy when you specify the remote node.
Medium- Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option is
active.
High- Encapsulating Security Payload (ESP) means payload
(data) will be encrypted and authenticated. You may select
encryption algorithm from Data Encryption Standard (DES),
Triple DES (3DES), and AES.
Callback Function
My WAN IP
Remote Gateway IP
101
More
RIP Direction
RIP Version
After setting Enable UPNP Service setting, an icon of IP Broadband Connection on Router
on Windows XP/Network Connections will appear. The connection status and control status
will be able to be activated. The NAT Traversal of UPnP enables the multimedia features of
102
your applications to operate. This has to manually set up port mappings or use other similar
methods. The screenshots below show examples of this facility.
The UPnP facility on the router enables UPnP aware applications such as MSN Messenger to
discover what are behind a NAT router. The application will also learn the external IP address
and configure port mappings on the router. Subsequently, such a facility forwards packets from
the external ports of the router to the internal ports used by the application.
The reminder as regards concern about Firewall and UPnP Can't work with Firewall Software
Enabling firewall applications on your PC may cause the UPnP function not
working properly. This is because these applications will block the accessing
ability of some network ports.
Security Considerations
Activating the UPnP function on your network may incur some security threats.
You should consider carefully these risks before activating the UPnP function.
103
Some Microsoft operating systems have found out the UPnP weaknesses and
hence you need to ensure that you have applied the latest service packs and
patches.
Non-privileged users can control some router functions, including removing
and adding port mappings.
The UPnP function dynamically adds port mappings on behalf of some
UPnP-aware applications. When the applications terminate abnormally, these
mappings may not be removed.
104
The major benefit of this mode is that you dont have to memorize your friends IP
address, which might change very frequently if its dynamic. Instead of that, you will
only have to using dial plan or directly dial your friends account name if you are with
the same SIP Registrar. Please refer to the Example 1 and 2 in the Calling Scenario.
z
Peer-to-Peer
Before calling, you have to know your friends IP Address. The Vigor VoIP Routers will
build connection between each other. Please refer to the Example 3 in the Calling
Scenario.
Our Vigor V models firstly apply efficient codecs designed to make the best use of
available bandwidth, but Vigor V models also equip with automatic QoS assurance.
QoS Assurance assists to assign high priority to voice traffic via Internet. You will
always have the required inbound and outbound bandwidth that is prioritized exclusively
for Voice traffic over Internet but you just get your data a little slower and it is tolerable
for data traffic.
Click VoIP Setup on the Advanced Setup group. You will get the following page:
105
Click any index number to display the dial plan setup page.
Enable
Phone Number
Display Name
SIP URL
Example 1:
If Tom gives you a SIP URL as sip:1112@fwd.pulver.com then you can input the number
just as the previous figure, except you can change any number in the Phone Number field.
Example 2:
If Kevin gives you an IP address 203.69.175.16 only, then you can use keypad on the phone to
dial directly as #203*69*175*16# to Kevin without setup any information on your DialPlan.
106
SIP Port
Domain
Proxy
You can enter IP address of SIP proxy server. For all SIP
messages destined the Domain defined above, Vigor router will
send to the Proxy and the Proxy will forward it.
Outbound Proxy
You can enter IP address of outbound SIP proxy server. For all
SIP messages, Vigor router will send to the Outbound Proxy
and the will Outbound Proxy forward it.
Register via
107
choose None and check the box to achieve the goal. Some SIP
server allows user to use VoIP function without registering. For
such server, please check the box of make call without
register. Choosing Auto is recommended. The system will
select a proper way for your VoIP call.
Display Name
You can enter any string as a display name in this field. This
will be shown on the caller side.
Account Name
You can enter the account name, usually the part of SIP URL
before the character @ provided by your service provider or IP
address for peer-to-peer connection.
Authentication ID
Password
Enter the password when you use a SIP registrar server that
needs password.
Expire Time
Stun server
Check and enter the IP address of the STUN server if you are
behind a NAT router.
108
Mic/Speaker Gain
Default Codec
There are five different CODECs you can choose as your prefer
CODEC that you wish to use. However, the real CODEC be
used was negotiate with peer party before session was
established. The default CODEC is G.729A/B; it occupied less
bandwidth while still have good voice quality. It is better for
you to have at least 256Kbps upstream if you would like to use
G.711.
The amount of data contains in a single packets (10, 20, 30, 40,
50 and 60). The default value is 20 ms, it means the data packet
109
DTMF Mode
InBand - Choose this one then the Vigor will send the DTMF
tone as audio directly when you press the keypad on the phone
OutBand - Choose this one then the Vigor will capture the
keypad number you pressed and transform it to digital form
then send to the other side; the receiver will generate the tone
according to the digital form it receive. This function is very
useful when the network traffic congestion occurs and it still
can remain the accuracy of DTMF tone.
SIP INFO- Choose this one then the Vigor will capture the
DTMF tone and transfer it into SIP form. Then it will be sent to
the remote end with SIP message.
Payload Type
Specify the start port for RTP stream. The default value is
10050.
Specify the end port for RTP stream. The default value is
15000.
RTP TOS
It decides the level of VoIP package. Use the drop down list to
choose any one of them.
110
This setting is used to adjust the loudness of the dial tone. The
smaller the number is, the louder the dial tone is. It is
recommended for you to use the default setting.
Ring Frequency
Region
Select the proper region which you are located. The common
settings of Caller ID Type, Dial tone, Ringing tone, Busy
tone and Congestion tone will be shown automatically on the
page.
111
Refresh Seconds
Refresh
Channel
Status
Codec
PeerID
Connect Time
Tx Pkts
112
Rx Pkts
Rx Losts
Rx Jitter
In Calls
Out Calls
Volume Gain
Log
113
Enable
P1 P4
VLAN0-3
Check this box to enable this function (for Rate Control). The
rate control will limit the transmission rate for data in and out.
Check the corresponding boxes to enable the rate control
function for different ports.
Out
In
If, VLAN 0 is consisted of hosts linked to P1 and P2 and VLAN 1 is consisted of hosts
linked to P3 and P4.
2.
After checking the box to enable VLAN function, you will check the table according to
the needs as shown below.
114
3.
To remove VLAN, uncheck the needed box and click OK to save the results.
The basic QoS implementation in Vigor routers is to classify and schedule packets based on
the service type information in the IP header. For instance, to ensure the connection with the
headquarter, a teleworker may enforce an index of QoS Control to reserve bandwidth for
HTTPS connection while using lots of application at the same time.
One more larger-scale implementation of QoS network is to apply DSCP (Differentiated
Service Code Point) and IP Precedence disciplines at Layer 3. Compared with legacy IP
Precedence that uses Type of Service (ToS) field in the IP header to define 8 service classes,
DSCP is a successor creating 64 classes possible with backward IP Precedence compatibility.
In a QoS-enabled network, or Differentiated Service (DiffServ or DS) framework, a DS
domain owner should sign a Service License Agreement (SLA) with other DS domain owners
to define the service level provided toward traffic from different domains. Then each DS node
in these domains will perform the priority treatment. This is called per-hop-behavior (PHB).
The definition of PHB includes Expedited Forwarding (EF), Assured Forwarding (AF), and
Best Effort (BE). AF defines the four classes of delivery (or forwarding) classes and three
levels of drop precedence in each class.
115
Vigor routers as edge routers of DS domain shall check the marked DSCP value in the IP
header of bypassing traffic, thus to allocate certain amount of resource execute appropriate
policing, classification or scheduling. The core routers in the backbone will do the same
checking before executing treatments in order to ensure service-level consistency throughout
the whole QoS-enabled network.
However, each node may take different attitude toward packets with high priority marking
since it may bind with the business deal of SLA among different DS domain owners. Its not
easy to achieve deterministic and consistent high-priority QoS traffic throughout the whole
network with merely Vigor routers effort.
The following QoS policies will be defined in the form of ratio of upstream/downstream speed.
We will also provide application QoS requirement as reference to help you accomplish this
task. The setting values will vary depending on the network condition.
Click on QoS Control on the Advanced Setup group. The following screen will appear.
WAN Inbound Bandwidth Type the inbound bandwidth for WAN interface.
WAN Outbound Bandwidth Type the outbound bandwidth for WAN interface.
Enable the QoS Control
Direction
Index
Class Name
116
Reserved Bandwidth Ratio It is reserved for the group index in the form of ratio of
reserved bandwidth to upstream speed and reserved
bandwidth to downstream speed.
Setup
Choose one of the items from the left box and click ADD>>.
The selected one will be shown on the right box. To remove the
selected on from the right box, simply choose the one again and
click <<Remove.
Advance - custom setting of Reserved Bandwidth Ratio based
on the source address, destination address, DiffServ CodePoint,
and service type. Click this button to open advanced
configuration for each index number. You can insert, move, edit
or delete select rule in this page.
117
level type by the system. Please assign one of the levels of the
data for processing with QoS control.
You can add a new service name for your necessity. Also, you
can Edit/Delete to change the one that you added before.
118
Check this and set the limited bandwidth ratio on the right
field. This is a protection of TCP application traffic since UDP
application traffic such as streaming video will exhaust lots of
bandwidth.
Limited_bandwidth Ratio
The ratio typed here is used to limit the total bandwidth of UDP
application.
119
120
System Management
Primary DNS
Secondary DNS
TX Packets
RX Packets
GW IP Addr
TX Packets(in WAN)
RX Packets(in WAN)
TX Rate
RX Rate
Up Time
State
121
VPN
Type
Remote IP
Virtual Network
Tx Pkts
Tx Rate
Rx Pkets
Rx Rate
Uptime
Drop
122
2.
3.
Click Save button to open another dialog for saving configuration as a file. In Save As
dialog, the default filename is config.cfg. You could give it another name by yourself.
123
4.
Click Save button, the configuration will download automatically to your computer as a
file named config.cfg.
The above example is using Windows platform for demonstrating examples. The Mac or
Linux platform will appear different windows, but the backup function is still available.
124
Restore Configuration
1.
2.
Click Browse button to choose the correct configuration file for uploading to the router.
3.
Click Restore button and wait for few seconds, the following picture will tell you that
the restoration procedure is successful.
125
Enable(Syslog Access) Check the Enable box to activate the SysLog service.
Server IP Address
Destination Port
Enable(Mail Alert)
Mail To
Return-Path
Just set your monitor PCs IP address in the field of Server IP Address
2.
Install the Router Tools in the Utility within provided CD. After installation, click on the
Router Tools>>Syslog from program menu.
126
3.
From the Syslog screen, select the router you want to monitor. Be reminded that in
Network Information, select the network adapter used to connect to the router.
Otherwise, you wont succeed in retrieving information from the router.
127
The Vigor router will send many types of SysLog messages. Some examples of the SysLog
messages with their individual formats are shown below.
An example of User Access log message:
An example of VPN (IPSec) log message to record the status of the VPN/IPSec tunnel:
128
Select this option to use the browser time from the remote
administrator PC host as routers system time.
Time Protocol
Server IP Address
Time Zone
129
Disable PING from the Internet Check the checkbox to reject all PING packets from the
Internet. For security issue, this function is enabled by default.
Access List
Default Ports
Get Community
Set Community
Manager Host IP
130
Trap Community
Notification Host IP
Set the IP address of the host that will receive the trap
community.
Trap Timeout
Otherwise, it
131
Dial ISDN
Activity
Drop B1
Drop B2
If the B
Broadband Access Mode/Status Display the broadband access mode and status. If the
broadband connection is active, it will show Internet
access mode is enabled. If the connection is idle, it
will show ---.
WAN IP Address
132
133
134
#Pseudo Port
Peer IP:Port
Ifno
If you want to reboot the router using the current configuration, check Using current
configuration and click OK. To reset the router settings to default values, check Using
factory default configuration and click OK. The router will take 5 seconds to reboot the
system.
135
Click OK. The following screen will appear. Please execute the firmware upgrade utility first.
136
Choose VPN and Remote Access Setup on the Advanced Setup group.
2.
Select Remote Access Control Setup. The following page will appear. Enable the
necessary VPN service and click OK.
3.
Then, return to VPN and Remote Access Setup page and choose PPP General Setup.
137
4.
For using PPP based services, such as PPTP, L2TP, you have to set general settings in
PPP General Setup.
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to set
general settings in IPSec General Setup, such as the pre-shared key that both parties
have known. Return to VPN and Remote Access Setup page and choose VPN
IKE/IPSec General Setup.
5.
Return to VPN and Remote Access Setup page and choose LAN-to-LAN Profile
Setup. Click on one index number to edit a profile.
138
6.
Set Common Settings as shown below. You should enable this profile.
7.
Set Dial-Out Settings as shown below to dial to connect to Router B aggressively with
the selected Dial-Out method.
If an IPSec-based service is selected, you should further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-Out
connection.
If a PPP-based service is selected, you should further specify the remote peer IP Address,
Username, Password, PPP Authentication and VJ Compression for this Dial-Out
connection.
139
8.
Set Dial-In settings as shown below to allow Router B dial-in to build VPN connection.
If an IPSec-based service is selected, you may further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-In
connection. Otherwise, it will apply the settings defined in IPSec General Setup above.
If a PPP-based service is selected, you should further specify the remote peer IP Address,
Username, Password, and VJ Compression for this Dial-In connection.
9.
At last, set the remote network IP/subnet in TCP/IP Network Settings so that Router A
can direct the packets destined to the remote network to Router B via the VPN
connection.
140
Choose VPN and Remote Access Setup on the Advanced Setup group.
2.
Select Remote Access Control Setup. The following page will appear. Enable the
necessary VPN service and click OK.
3.
Then, return to VPN and Remote Access Setup page and choose PPP General Setup.
4.
For using PPP based services, such as PPTP, L2TP, you have to set general settings in
PPP General Setup.
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to
set general settings in IPSec General Setup, such as the pre-shared key that both parties
have known.
141
5.
Return to VPN and Remote Access Setup page and choose LAN-to-LAN Profile
Setup. Click on one index number to edit a profile.
6.
Set Common Settings as shown below. You should enable both of VPN connections
because any one of the parties may start the VPN connection.
7.
Set Dial-Out Settings as shown below to dial to connect to Router B aggressively with
the selected Dial-Out method.
If an IPSec-based service is selected, you should further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-Out
connection.
142
If a PPP-based service is selected, you should further specify the remote peer IP Address,
Username, Password, PPP Authentication and VJ Compression for this Dial-Out
connection.
8.
Set Dial-In settings as shown below to allow Router A dial-in to build VPN connection.
If an IPSec-based service is selected, you may further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-In
connection. Otherwise, it will apply the settings defined in IPSec General Setup above.
143
If a PPP-based service is selected, you should further specify the remote peer IP Address,
Username, Password, and VJ Compression for this Dial-In connection.
9.
At last, set the remote network IP/subnet in TCP/IP Network Settings so that Router B
can direct the packets destined to the remote network to Router A via the VPN
connection.
144
Choose VPN and Remote Access Setup on the Advanced Setup group.
2.
Select Remote Access Control Setup. The following page will appear. Enable the
necessary VPN service and click OK.
3.
Then, return to VPN and Remote Access Setup page and choose PPP General Setup.
4.
For using PPP based services, such as PPTP, L2TP, you have to set general settings in
PPP General Setup.
145
For using IPSec-based service, such as IPSec or L2TP with IPSec Policy, you have to set
general settings in IKE/IPSec General Setup, such as the pre-shared key that both
parties have known.
5.
Return to VPN and Remote Access Setup page and choose Remote User Profile Setup
(Teleworker). Click on one index number to edit a profile.
6.
Set Dial-In settings as shown below to allow the remote user dial-in to build VPN
connection.
If an IPSec-based service is selected, you may further specify the remote peer IP
Address, IKE Authentication Method and IPSec Security Method for this Dial-In
146
connection. Otherwise, it will apply the settings defined in IPSec General Setup above.
If a PPP-based service is selected, you should further specify the remote peer IP Address,
Username, Password, and VJ Compression for this Dial-In connection.
For Win98/ME, you may use "Dial-up Networking" to create the PPTP tunnel to Vigor
router. For Win2000/XP, please use "Network and Dial-up connections" or Smart VPN
Client, complimentary software to help you create PPTP, L2TP, and L2TP over IPSec
tunnel. You can find it in CD-ROM in the package or go to www.draytek.com download
center. Install as instructed.
2.
After successful installation, for the first time user, you should click on the Step 0.
Configure button. Reboot the host.
147
3.
In Step 2. Connect to VPN Server, click Insert button to add a new entry.
If an IPSec-based service is selected as shown below,
You may further specify the method you use to get IP, the security method, and
authentication method. If the Pre-Shared Key is selected, it should be consistent with the
one set in VPN router.
148
If a PPP-based service is selected, you should further specify the remote VPN server IP
address, Username, Password, and encryption method. The User Name and Password
should be consistent with the one set up in the VPN router. To use default gateway on
remote network means that all the packets of remote host will be directed to VPN server
then forwarded to Internet. This will make the remote host seem to be working in the
enterprise network.
4.
Click Connect button to build connection. When the connection is successful, you will
find a green light on the right down corner.
149
Make sure the QoS Control on the left corner is checked. And select BOTH in Direction.
2.
Enter the Class Name of Index 1. In this index, she will set reserve bandwidth for Email
using protocol POP3 and SMTP. Click Basic button on the right.
3.
Select POP3 and SMTP on the left column and add to right column. Click OK to exit.
4.
Enter the Class Name of Index 2. In this index, she will set reserve bandwidth for
HTTPS. And click Basic button on the right.
5.
Select HTTPS in the list on the left column and click on ADD to add to right column.
Click OK to exit.
6.
Check the Enable UDP Bandwidth Control on the bottom to prevent enormous UDP
traffic of VoIP influent other application.
150
7.
If the worker has connected to the headquater using host to host VPN tunnel. (Please
refer to Chapter 3 VPN for detail instruction), he may set up an index for it. Enter the
Class Name of Index 3. In this index, he will set reserve bandwidth for 1 VPN tunnel.
And click Advanced button on the right.
8.
Click edit to open a new window. First, check the ACT box. Then click SrcEdit to set a
workers subnet address. Click DestEdit to set headquarters subnet address. Leave other
fields and click OK.
151
You can just set the settings wrapped inside the red rectangles to fit the request of NAT usage.
To use another DHCP server in the network rather than the built-in one of Vigor Router, you
have to change the settings as show below.
152
You can just set the settings wrapped inside the red rectangles to fit the request of NAT usage.
153
154
Example 2: Both John and David have SIP Addresses from the same service provider.
Johns SIP URL: 1234@draytel.org , Davids SIP URL: 4321@draytel.org
Settings for John
DialPlan index 1
Phone Number: 1111
Display Name: David
SIP URL: 4321@draytel.org
SIP Accounts Settings --Profile Name: draytel 1
Register via: Auto
SIP Port: 5060 (default)
Domain/Realm: draytel.org
Proxy: draytel.org
Display Name: John
Account Number/Name: 1234
Authentication ID: (blank)
Password: ****
Expiry Time: (use default value)
CODEC/RTP/DTMF --(Use default value)
155
156
4. The file RTSxxx.exe will be asked to copy onto your computer. Remember the place of
storing the execution file.
5. Go to www.draytek.com to find out the newly update firmware for your router.
6. Access into Support Center >> Downloads. Find out the model name of the router and
click the firmware link. The Tools of Vigor router will display as shown below.
7. Choose the one that matches with your operating system and click the corresponding link
to download correct firmware (zip file).
8. Next, decompress the zip file.
157
9. Double click on the icon of router tool. The setup wizard will appear.
10. Follow the onscreen instructions to install the tool. Finally, click Finish to end the
installation.
11. From the Start menu, open Programs and choose Router Tools XXX >> Firmware
Upgrade Utility.
158
159
160
Trouble Shooting
This section will guide you to solve abnormal situations if you cannot access into the Internet
after installing the router and finishing the web configuration. Please follow sections below to
check your basic installation status stage by stage.
z
If all above stages are done and the router still cannot run normally, it is the time for you to
contact your dealer for advanced help.
2.
Turn on the router. Make sure the ACT LED blink once per second and the
correspondent LAN LED is bright.
3.
If not, it means that there is something wrong with the hardware status. Simply back to
2.1 Hardware Installation to execute the hardware installation again. And then, try
again.
161
For Windows
2.
3.
162
4.
Select Obtain an IP address automatically and Obtain DNS server address automatically.
For MacOs
1.
2.
3.
On the Network screen, select Using DHCP from the drop down list of Configure IPv4.
163
For Windows
1.
2.
Type command (for Windows 95/98/ME) or cmd (for Windows NT/ 2000/XP). The
DOS command dialog will appear.
3.
Type ping 192.168.1.1 and press [Enter]. It the link is OK, the line of Reply from
192.168.1.1:bytes=32 time<1ms TTL=25 will appear.
4.
If the line does not appear, please check the IP address setting of your computer.
2.
3.
4.
Type ping 192.168.1.1 and press [Enter]. It the link is OK, the line of 64 bytes from
192.168.1.1: icmp_seq=0 ttl=255 time=xxxx ms will appear.
164
165
2.
Check if Username and Password are entered with correct values that you got from
your ISP.
Warning: After pressing factory default setting, you will loose all settings
you did before. Make sure you have recorded all useful settings before you
pressing. The password of factory default is null.
Software Reset
You can reset the router to factory default via Web page.
Go to System Management and choose Reboot System on the web page. The following
screen will appear. Choose Using factory default configuration and click OK. After few
seconds, the router will return all the settings to the factory settings.
166
Hardware Reset
While the router is running (ACT LED blinking), press the Factory Reset button and hold for
more than 5 seconds. When you see the ACT LED blinks rapidly, please release the button.
Then, the router will restart with the default configuration.
After restore the factory default setting, you can configure the settings for the router again to
fit your personal request.
167