User Manual
Page 5
... FIREWALL VPN ROUTER; Once enabled, an IP address of packets that pass through the firewall and monitoring controls. Up to two e-mail addresses can only read System settings but not modify them to download the latest firmware. Software Update: Administrators may manage, monitor, and configure firewall settings. or restore a configuration file to default factory settings. This will alert Administrator(s) automatically whenever the firewall has experienced unauthorized access or a network hit (hacking or flooding). The System Administrator can add/remove users...
... FIREWALL VPN ROUTER; Once enabled, an IP address of packets that pass through the firewall and monitoring controls. Up to two e-mail addresses can only read System settings but not modify them to download the latest firmware. Software Update: Administrators may manage, monitor, and configure firewall settings. or restore a configuration file to default factory settings. This will alert Administrator(s) automatically whenever the firewall has experienced unauthorized access or a network hit (hacking or flooding). The System Administrator can add/remove users...
User Manual
Page 10
... Settings window. Step 2. or restore a configuration file to default factory settings. or restore the firewall back to the device; Entering the Settings window: Click Setting in which to save ) them to an "Administrator" computer or anywhere on the network; The Firewall Configuration settings will be shown on the Download button next to Export System Settings to Client. Settings The Administrator may choose to rename the file if preferred. - 10 - The Administrator may use this function to backup firewall configurations...
... Settings window. Step 2. or restore a configuration file to default factory settings. or restore the firewall back to the device; Entering the Settings window: Click Setting in which to save ) them to an "Administrator" computer or anywhere on the network; The Firewall Configuration settings will be shown on the Download button next to Export System Settings to Client. Settings The Administrator may choose to rename the file if preferred. - 10 - The Administrator may use this function to backup firewall configurations...
User Manual
Page 12
Click OK at the bottom-right of the screen to restore the factory settings. - 12 - Select Reset Factory Settings under Firewall Configuration. Restoring Factory Default Settings: Step 1. Step 2.
Click OK at the bottom-right of the screen to restore the factory settings. - 12 - Select Reset Factory Settings under Firewall Configuration. Restoring Factory Default Settings: Step 1. Step 2.
User Manual
Page 21
... IP addresses for the office network. The private IP network will use a private IP scheme. Note: The IP Address of the Internal (LAN) network, the External (WAN) network, and the DMZ network. Entering the Interface menu: Click on the Internet. The Internal network will not be routable on Configuration in this section, the Administrator can set up the Internal (LAN) network. The current settings of the FIREWALL VPN ROUTER. The default IP address is the IP address of the Internal (LAN) port of the interface addresses...
... IP addresses for the office network. The private IP network will use a private IP scheme. Note: The IP Address of the Internal (LAN) network, the External (WAN) network, and the DMZ network. Entering the Interface menu: Click on the Internet. The Internal network will not be routable on Configuration in this section, the Administrator can set up the Internal (LAN) network. The current settings of the FIREWALL VPN ROUTER. The default IP address is the IP address of the Internal (LAN) port of the interface addresses...
User Manual
Page 22
... IP Addresses, and are required to be on the Internet. Service-On-Demand: Auto Disconnect: The PPPoE connection will respond to - 22 - a private IP address only. If set the IP Address on the computer to enter a username and password in the amount of idle time (no activities). The default netmask of the FIREWALL VPN ROUTER is given to you were given a static IP address. Current Status: Displays the current line status of the Firewall. IP Address...
... IP Addresses, and are required to be on the Internet. Service-On-Demand: Auto Disconnect: The PPPoE connection will respond to - 22 - a private IP address only. If set the IP Address on the computer to enter a username and password in the amount of idle time (no activities). The default netmask of the FIREWALL VPN ROUTER is given to you were given a static IP address. Current Status: Displays the current line status of the Firewall. IP Address...
User Manual
Page 23
....0) Default Gateway: This will respond to allow people from the External (WAN) network. WebUI: Select this to echo request packets from a user on the Internet. Some cable modem ISP assign a specific hostname in mind that the FIREWALL VPN ROUTER always requires a username and password to be configured from the external network. This will be configured from the External (WAN) network. The following fields apply: IP Address: The dynamic IP address obtained by your ISP, you . If set to...
....0) Default Gateway: This will respond to allow people from the External (WAN) network. WebUI: Select this to echo request packets from a user on the Internet. Some cable modem ISP assign a specific hostname in mind that the FIREWALL VPN ROUTER always requires a username and password to be configured from the external network. This will be configured from the External (WAN) network. The following fields apply: IP Address: The dynamic IP address obtained by your ISP, you . If set to...
User Manual
Page 24
... a user on the Internet. The IP address the Administrator chooses will be the netmask of the DMZ network. - 24 - Keep in the DMZ network so they can be a private IP address and cannot use the same network as FTP, SMTP, and HTTP (web). Broadcast messages from the External (WAN) network. This allows the server computers to ping the Firewall. This will allow the external network to set to enable, the FIREWALL VPN ROUTER will respond to be accessed from...
... a user on the Internet. The IP address the Administrator chooses will be the netmask of the DMZ network. - 24 - Keep in the DMZ network so they can be a private IP address and cannot use the same network as FTP, SMTP, and HTTP (web). Broadcast messages from the External (WAN) network. This allows the server computers to ping the Firewall. This will allow the external network to set to enable, the FIREWALL VPN ROUTER will respond to be accessed from...
User Manual
Page 25
... department by groups; For instance: The lease line of a company applies several real IP Addresses 168.85.88.0/24,and the company is the function of each department use the different WAN IP Address to connect to the internet. The settings of Multiple NAT. - 25 - Multiple NAT Multiple NAT allows local port to set by different subnetworks for the purpose of convenient management. The settings are as the following : 1.R&D department...
... department by groups; For instance: The lease line of a company applies several real IP Addresses 168.85.88.0/24,and the company is the function of each department use the different WAN IP Address to connect to the internet. The settings of Multiple NAT. - 25 - Multiple NAT Multiple NAT allows local port to set by different subnetworks for the purpose of convenient management. The settings are as the following : 1.R&D department...
User Manual
Page 33
NetMask: Netmask of destination network. Destination IP: IP address of destination network. Gateway: Gateway IP address for the networks. Configure: Change settings in which current route settings are shown. Entering the Route Table screen: Click Configuration on the left side menu bar, and then click Route Table below it. The Route Table window appears, in the route table. - 33 - Route Table functions: Interface: Destination network, internal or external networks. Route Table In this section, the Administrator can add static routes for connecting to destination network.
NetMask: Netmask of destination network. Destination IP: IP address of destination network. Gateway: Gateway IP address for the networks. Configure: Change settings in which current route settings are shown. Entering the Route Table screen: Click Configuration on the left side menu bar, and then click Route Table below it. The Route Table window appears, in the route table. - 33 - Route Table functions: Interface: Destination network, internal or external networks. Route Table In this section, the Administrator can add static routes for connecting to destination network.
User Manual
Page 44
... Modify to use this function is enabled, the IP address in the Configuration menu to delete the settings. 2. Update succeed; How to use dynamic DNS: The firewall provides 3 service providers, users have to register first to change the DNS parameters; How to register: First, Click Dynamic DNS in Dynamic DNS window: !:Update Status【 Connecting; The nouns in the Configuration menu to enter Dynamic DNS window, then click Add button, on...
... Modify to use this function is enabled, the IP address in the Configuration menu to delete the settings. 2. Update succeed; How to use dynamic DNS: The firewall provides 3 service providers, users have to register first to change the DNS parameters; How to register: First, Click Dynamic DNS in Dynamic DNS window: !:Update Status【 Connecting; The nouns in the Configuration menu to enter Dynamic DNS window, then click Add button, on...
User Manual
Page 49
.... Using group addresses can use these names as the source address or destination address of building control policies. The address table should be an address of the Internal network, Internal network group, External network, External network group, DMZ and DMZ group. If the Administrator needs to , an IP address can assign an easily recognized name to set Interface addresses of a computer or a sub network. The Administrator can be an internal IP address, external IP address or DMZ IP address. Address The FIREWALL VPN ROUTER Office Firewall allows...
.... Using group addresses can use these names as the source address or destination address of building control policies. The address table should be an address of the Internal network, Internal network group, External network, External network group, DMZ and DMZ group. If the Administrator needs to , an IP address can assign an easily recognized name to set Interface addresses of a computer or a sub network. The Administrator can be an internal IP address, external IP address or DMZ IP address. Address The FIREWALL VPN ROUTER Office Firewall allows...
User Manual
Page 74
... needs to set up control policies. The Administrator can define other computers through these available network services. What is Service? In the custom menu, users can add new service group names in the pre-defined service and cannot be added. Users then can simply follow the instructions below to access 5 different services on a server, such as HTTP, FTP, SMTP, POP3, and TELNET. When defining custom services, the client port ranges...
... needs to set up control policies. The Administrator can define other computers through these available network services. What is Service? In the custom menu, users can add new service group names in the pre-defined service and cannot be added. Users then can simply follow the instructions below to access 5 different services on a server, such as HTTP, FTP, SMTP, POP3, and TELNET. When defining custom services, the client port ranges...
User Manual
Page 116
... be generated after a set amount of time has passed or a certain threshold of the remote Firewall. Gateway IP: The external interface IP address of traffic has been exchanged. Status: Connect/Disconnect or Connecting/Disconnecting. The Key may be different for the two sites creating the tunnel. Autokey IKE This chapter describes steps to negotiate keys between two security gateways. Autokey IKE (Internet Key Exchange) provides a standard method to create a VPN connection using Autokey IKE.
... be generated after a set amount of time has passed or a certain threshold of the remote Firewall. Gateway IP: The external interface IP address of traffic has been exchanged. Status: Connect/Disconnect or Connecting/Disconnecting. The Key may be different for the two sites creating the tunnel. Autokey IKE This chapter describes steps to negotiate keys between two security gateways. Autokey IKE (Internet Key Exchange) provides a standard method to create a VPN connection using Autokey IKE.
User Manual
Page 120
... the PPTP Server window Step 1. User Name: Displays the PPTP Client user's name for PPTP Client connection. Client IP Range: 192.26.145.1-254:Display the IP addresses range for authentication. PPTP Server: Click Modify to remove the item. - 120 - Status:Displays current connection status between PPTP Server and Client. Select VPN→PPTP Server. Configure:Click 【Modify】to modify the PPTP Client settings or click 【Remove】to select Enable or Disable. Client IP:Displays the PPTP Client's IP address for...
... the PPTP Server window Step 1. User Name: Displays the PPTP Client user's name for PPTP Client connection. Client IP Range: 192.26.145.1-254:Display the IP addresses range for authentication. PPTP Server: Click Modify to remove the item. - 120 - Status:Displays current connection status between PPTP Server and Client. Select VPN→PPTP Server. Configure:Click 【Modify】to modify the PPTP Client settings or click 【Remove】to select Enable or Disable. Client IP:Displays the PPTP Client's IP address for...
User Manual
Page 121
Select VPN→PPTP Server. Step 3. Enable PPTP:Check to enable PPTPServer. 1.Encyption: the default is no activity for a predetermined period of time. Step 4. Click【Modify】after the Client IP Range. In the【Modify Server Design 】Window, enter appropriate settings. Auto-Disconnect if idle minutes: Configure this device to disconnect to the PPTP Server when there is set the number to the PPTP server. Refer to cancel modifications - 121 - Click OK...
Select VPN→PPTP Server. Step 3. Enable PPTP:Check to enable PPTPServer. 1.Encyption: the default is no activity for a predetermined period of time. Step 4. Click【Modify】after the Client IP Range. In the【Modify Server Design 】Window, enter appropriate settings. Auto-Disconnect if idle minutes: Configure this device to disconnect to the PPTP Server when there is set the number to the PPTP server. Refer to cancel modifications - 121 - Click OK...
User Manual
Page 127
... to save modifications or click Cancel to the PPTP Server when there is no activity for details. Multi-Machine: Check to allow multiple computers connected to the corresponding section for a predetermined period of time. IP Address:Enter the PPTP Client IP address. Adding a PPTP Client Step 1. Refer to the PPTP server. Remote Client: Single Machine: Check to connect to 0. User name: Specify the PPTP client. To keep the line always connected, set the number to single computer...
... to save modifications or click Cancel to the PPTP Server when there is no activity for details. Multi-Machine: Check to allow multiple computers connected to the corresponding section for a predetermined period of time. IP Address:Enter the PPTP Client IP address. Adding a PPTP Client Step 1. Refer to the PPTP server. Remote Client: Single Machine: Check to connect to 0. User name: Specify the PPTP client. To keep the line always connected, set the number to single computer...
User Manual
Page 136
... server's IP address into internal networks and external networks respectively. By applying the incoming policies, Virtual Server and IP mapping work by using the server's private IP address. A virtual server has set the real IP address of the Firewall's external network interface to the server by binding the IP address of the external - 136 - Virtual Server The FIREWALL VPN ROUTER Office Firewall separates an enterprise's Intranet and Internet into the private IP address of physical server in the Internal (LAN) network. Generally speaking, in the internal networks, outside users...
... server's IP address into internal networks and external networks respectively. By applying the incoming policies, Virtual Server and IP mapping work by using the server's private IP address. A virtual server has set the real IP address of the Firewall's external network interface to the server by binding the IP address of the external - 136 - Virtual Server The FIREWALL VPN ROUTER Office Firewall separates an enterprise's Intranet and Internet into the private IP address of physical server in the Internal (LAN) network. Generally speaking, in the internal networks, outside users...
User Manual
Page 147
... list that the virtual server will change the port number to four IP addresses can be provided by the Virtual Server. Click OK to save the settings of the internal network server(s), to which has already been set up with an IP address, click the New Service button in the Pre-defined and Custom section of the Service menu. Step 4. Setting the Virtual Server's services: Step 1. In the Virtual Server Configurations window: Virtual Server IP: displays the external IP address assigned to the Virtual Server External Service Port: select the port number...
... list that the virtual server will change the port number to four IP addresses can be provided by the Virtual Server. Click OK to save the settings of the internal network server(s), to which has already been set up with an IP address, click the New Service button in the Pre-defined and Custom section of the Service menu. Step 4. Setting the Virtual Server's services: Step 1. In the Virtual Server Configurations window: Virtual Server IP: displays the external IP address assigned to the Virtual Server External Service Port: select the port number...
User Manual
Page 150
... evaluate and troubleshoot the network, such as pinpointing the source of change, settings that pass through the FIREWALL VPN ROUTER Firewall. The Administrator mainly uses the Log menu to monitor and manage the FIREWALL VPN ROUTER and the networks. The Administrator may also download the log files for each control policy. The Administrator can use the log data to monitor the traffic passing through the Firewall's control policies. Log The FIREWALL VPN ROUTER Office Firewall supports traffic logging and event logging to log on...
... evaluate and troubleshoot the network, such as pinpointing the source of change, settings that pass through the FIREWALL VPN ROUTER Firewall. The Administrator mainly uses the Log menu to monitor and manage the FIREWALL VPN ROUTER and the networks. The Administrator may also download the log files for each control policy. The Administrator can use the log data to monitor the traffic passing through the Firewall's control policies. Log The FIREWALL VPN ROUTER Office Firewall supports traffic logging and event logging to log on...
User Manual
Page 168
... network information from the Configuration menu. A window will list the settings for computers connected to check the DHCP lease time and MAC addresses for Internal Interface, External Interface, and the DMZ Interface. - 168 - Interface Status Entering the Interface Status window: Click on Status in the menu bar, and then click Interface Status below it. Status In this section, the FIREWALL VPN ROUTER displays the status information about the Firewall. Interface Status will appear providing information from the Configuration menu. The Administrator may also use Status...
... network information from the Configuration menu. A window will list the settings for computers connected to check the DHCP lease time and MAC addresses for Internal Interface, External Interface, and the DMZ Interface. - 168 - Interface Status Entering the Interface Status window: Click on Status in the menu bar, and then click Interface Status below it. Status In this section, the FIREWALL VPN ROUTER displays the status information about the Firewall. Interface Status will appear providing information from the Configuration menu. The Administrator may also use Status...