FBR-4000 Um V1.0
FBR-4000 Um V1.0
FBR-4000 Um V1.0
User Manual
V1.0
TABLE OF CONTENTS
1: INTRODUCTION ................................................................................................................................................1
INTERNET FEATURES.............................................................................................................................................1
OTHER FEATURES ................................................................................................................................................3
PACKAGE CONTENTS ............................................................................................................................................4
PHYSICAL DETAILS ................................................................................................................................................4
Front Panel .....................................................................................................................................................4
Rear Panel ......................................................................................................................................................6
2: BASIC SETUP ...................................................................................................................................................8
OVERVIEW ............................................................................................................................................................8
PROCEDURE .........................................................................................................................................................8
1. Configuring the Router for your LAN ..........................................................................................................8
2. Installing the Router in your LAN ..............................................................................................................12
3. Configuring the Router for Internet Access ..............................................................................................13
4. Enable Dedicated DMZ Port .....................................................................................................................15
5. Configure PCs on your LAN .....................................................................................................................16
Macintosh Clients .........................................................................................................................................18
Linux Clients .................................................................................................................................................18
3: ADVANCED PORT ..........................................................................................................................................19
OVERVIEW ..........................................................................................................................................................19
PORT OPTIONS ...................................................................................................................................................19
LOAD BALANCE ...................................................................................................................................................21
ADVANCED PPPOE .............................................................................................................................................23
ADVANCED PPTP ...............................................................................................................................................25
4: ADVANCED SETUP ........................................................................................................................................27
OVERVIEW ..........................................................................................................................................................27
HOST IP .............................................................................................................................................................28
ROUTING ............................................................................................................................................................30
VIRTUAL SERVER ................................................................................................................................................33
SPECIAL APPLICATION .........................................................................................................................................36
DYNAMIC DNS....................................................................................................................................................38
MULTI DMZ ........................................................................................................................................................40
UPNP SETUP .....................................................................................................................................................41
NAT SETUP ........................................................................................................................................................42
ADVANCED FEATURE...........................................................................................................................................44
5: SECURITY MANAGEMENT ............................................................................................................................47
OVERVIEW ..........................................................................................................................................................47
BLOCK URL........................................................................................................................................................47
ACCESS FILTER ..................................................................................................................................................49
SESSION LIMIT ....................................................................................................................................................51
SYSFILTER EXCEPTION .......................................................................................................................................52
6: VPN CONFIGURATION ...................................................................................................................................53
OVERVIEW ..........................................................................................................................................................53
IKE GLOBAL SETUP ............................................................................................................................................53
IPSEC POLICY SETUP .........................................................................................................................................56
MESH GROUP SETUP ..........................................................................................................................................63
VPN LOG ...........................................................................................................................................................65
7: QOS CONFIGURATION ..................................................................................................................................66
OVERVIEW ..........................................................................................................................................................66
QOS SETUP .......................................................................................................................................................66
i
POLICY CONFIGURATION .....................................................................................................................................67
8: MANAGEMENT ASSISTANT ..........................................................................................................................70
OVERVIEW ..........................................................................................................................................................70
ADMIN. SETUP ....................................................................................................................................................71
SETTINGS – ADMIN. SETUP..................................................................................................................................71
EMAIL ALERT ......................................................................................................................................................73
SNMP ...............................................................................................................................................................74
SYSLOG..............................................................................................................................................................75
UPGRADE FIRMWARE ..........................................................................................................................................77
9: NETWORK INFO .............................................................................................................................................78
OPERATION ........................................................................................................................................................78
SYSTEM STATUS .................................................................................................................................................78
Restore Factory Defaults ..............................................................................................................................80
WAN STATUS .....................................................................................................................................................81
APPENDIX A - SPECIFICATION .........................................................................................................................82
ii
1: Introduction
Congratulations on the purchase of your new Multi-WAN VPN Router. The Multi-WAN VPN
Router not only provides a selection of 1~4 WAN ports – it also provides Shared Broadband
Internet Access for all LAN users.
Internet Features
Flexible use of WAN ports
There are 4 WAN ports available for use on Multi-WAN Link Balancer. The user can decide how
many WAN ports to use by setting the web page on setup area.
Shared Broadband Internet Access
All LAN users can access the Internet through the Multi-WAN VPN Router by sharing from one
(1) up to four (4) Broadband modems and connections.
High-Performance multi ADSL Modem Support
The Multi-WAN VPN Router has four (4) WAN ports, allowing the connection of up to four (4)
Broadband modems at the same time.
This can provide a greater increase in bandwidth than is allowed by a single modem.
This flexible configuration allows each port to use a different type of modem and connection
method. Also, the Internet traffic that is shared between the 4 modems can be pre-determined.
Support for all common Connection Methods
All popular DSL, Cable Modems and connection methods are supported. These include - Fixed
IP, Dynamic IP, PPPoE and PPTP.
Page 1
Outbound Traffic Load Balancing and Failover
There are a variety of load balancing methods that allow administrators to manage the traffic from
LAN or WAN in order to maximize bandwidth - as well as smart health check methods to protect
against connection failure for failover.
PPPoE Session Management
Multiple PPPoE sessions are supported and you can choose “mapping” sessions to selected PCs
if desired.
Multiple IP Address Support
If your ISP allocates you multiple IP addresses, these are also supported and you can “map” IP
addresses to selected PCs if desired.
Special Application
This feature allows you to use some non-standard applications; for example, where the port
number used for the response is different to the port number used by the sender.
Virtual Server
This feature allows Internet users to access Internet servers on your LAN. For standard servers
such as Web, FTP or E-Mail servers, only the IP address of the server PC is required. You can
also define your own Server types if required.
Multiple DMZ
A "DMZ" PC will receive incoming connection requests which would otherwise be blocked. For
each IP address allocated by your ISP, a separate "DMZ" PC can be specified. So if your ISP has
given you multiple IP addresses, you can have multiple “DMZ” PCs. With the Multi-WAN VPN
Router, each “DMZ” PC has unrestricted 2-way Internet access, providing the ability to run
programs that are otherwise normally incompatible with NAT routers.
Access Filter
The network Administrator can use the Access Filter to gain fine control over the Internet access
and applications available to LAN users. Five (5) user groups are available and each group can
be assigned unique access rights.
Block URL
This feature can be used by the Administrator to block access to undesirable Web sites by LAN
users. You can even assign different settings for different groups of PCs.
Session Limit
With the Session Limit feature, if the number of new sessions for the system exceeds the
maximum allowance set by the Administrator in the sampling time, any new session in the system
will be dropped.
System Filter Exception
This feature ensures that every packet with an unrecognized port will be rejected so as to prevent
access to port scanning programs from hackers. However, in some situations this may incur
problems with some servers (e.g. SMTP server port 113) or WAN clients which require a
response packet to verify the availability of their communication peers.
VPN (Virtual Private Network)
Support is provided for up to 50 VPN tunnels with a failover and back-up mechanism.
Page 2
Other Features
12-Port Switching Hub
The Multi-WAN VPN Router incorporates a 12-port 10 /100BaseT switching hub, making it easy
to create or extend your LAN as needed.
DHCP Server Support
Dynamic Host Configuration Protocol provides a dynamic IP address to PCs and other devices
upon request. The Multi-WAN VPN Router can act as a DHCP Server for devices on your local
LAN.
Multi Segment LAN Support
LANs comprising of one or more segments or additional IPs are supported via the Multi-WAN
VPN Router's built-in static routing table.
Easy Setup
Setup and configuration is easily accomplished through your favorite WEB browser.
Remote Management
The Multi-WAN VPN Router can be managed from any PC on your LAN. Also, if an Internet
connection exists, it can (optionally) be configured via the Internet.
Password - protected Configuration
Optional password protection is provided to prevent unauthorized users from modifying the
configuration data and settings.
HTTP Firmware Upgrade and backup
The web management feature allows you to use HTTP upgrade for new firmware and backup
system configuration from a local or even remote site, as long as “Remote upgrade” and “Remote
web-based setup” is enabled in the Advanced feature web page.
Email Alert
The Email Alert will send a warning email message to the system administrator if any of the WAN
ports become disconnected when more than two WAN ports are enabled or if there is excessive
ping notification.
Syslog
This is a very useful feature for monitoring the device in that it can generate real time system
information on the web page or on a particular machine.
QoS Configuration.
This function will allow higher priority pass-through for specified packets such as real-time
applications like Internet phone, video conference, etc.
UPnP
When UPnP (Universal Plug & Play), is set to “Enable” - the Multi-WAN VPN Router becomes a
network device. This feature is useful for detecting and controlling network devices such as
Internet gateways.
Page 3
Package Contents
The following items are included in the Multi-WAN VPN Router package:
Multi-WAN VPN Router Unit
Power Cord
Quick Installation Guide
CD with Manual
If any of the above items are damaged or missing, please contact your dealer immediately.
Physical Details
Front Panel
Page 4
Ethernet Ports and Reset Button
Ethernet Ports WAN ports: Using Port 1 to Port 4 for connecting to Modem(s).
DMZ ports: Using Port 15 and Port 16
LAN ports: The remaining ports which are connected to PCs or a Hub.
Note:
Any port will automatically operate as an “Uplink” port if required. You can use a
normal LAN cable to connect to a normal port on another hub.
Reset Button When pressed and released, the Multi-WAN VPN Router will reboot (restart)
within 1 second. It will reset to default when pushed and held for more than 3
seconds.
Page 5
Rear Panel
Default Settings
When the Multi-WAN VPN Router has finished booting, all configuration settings will be set to the
factory defaults, including:
IP Address set to its default value of 192.168.1.1, with a Network Mask of 255.255.255.0
DHCP Server is enabled
User Name: admin
Password cleared (no password)
TFTP Download
This setting should be used only if your Multi-WAN VPN Router becomes unusable and you are
attempting to restore it by upgrading the firmware. Follow this procedure:
1. Power-On the Multi-WAN VPN Router.
2. Use the supplied Windows utility or a TFTP client program to apply the new firmware. If using the
supplied Windows TFTP program, the screen will look like the following example:
Page 6
Enter the name of the firmware upgrade file located on your PC, or click the "Browse" button
to locate the file.
Enter the LAN IP address of the Multi-WAN VPN Router in the "Server IP" field.
Click "Upgrade Firmware" to send the file to the Multi-WAN VPN Router.
3. When the upgrade is finished, the Multi-WAN VPN Router should work normally. The factory
default settings will be applied.
Note:
The supplied Windows TFTP utility also allows you to perform three (3) additional operations:
Save the current configuration settings to your PC (use the "Save Configuration" button).
Restore a previously saved configuration file to the Multi-WAN VPN Router (use the "Upgrade
Firmware" button).
Set the Multi-WAN VPN Router to its default values (use the "Set to Default" button).
Page 7
2: Basic Setup
Overview
Basic Setup of your Multi-WAN VPN Router involves the following steps:
1. Attach the Multi-WAN VPN Router to a PC using any LAN port (5 to14) and configure it for your
LAN.
2. Install your Multi-WAN VPN Router in your LAN and connect the Broadband Modem(s).
3. Configure your Multi-WAN VPN Router for Internet Access.
4. Configure PCs on your LAN to use the Multi-WAN VPN Router.
Requirements
One (1) up to four (4) DSL or Cable modems, each with an ISP Internet Access account.
Network cables. Use standard 10/100BaseT network (UTP) cables with RJ45 connectors
TCP/IP network protocol must be installed on all PCs.
Procedure
Page 8
7. Enter admin for the "User Name" and leave the "Password" field blank.
The "User Name" is always set as admin
For security, it is highly recommended that you set a password. You may do this using the
Admin Setup screen.
8. After logging in, you will see the Administrator Password setup in the Admin Setup screen, as
shown below.
Assign a password by entering it in the "Password" and "Verify Password” Fields.
Page 9
9. Select LAN & DHCP from the menu. You will see a screen like in the example below.
10. If your LAN already has a DHCP Server and you wish to continue using it, the following
configuration is required:
The DHCP Server function in the Multi-WAN VPN Router must be disabled. You will find this
setting in the LAN & DHCP screen.
Your DHCP Server must be configured to provide the Multi-WAN VPN Router's LAN IP
Address as the "Default Gateway".
Your DHCP Server must provide correct DNS addresses to any connected PCs.
Page 10
Settings – LAN & DHCP
LAN IP Configuration IP Address – IP address for the Multi-WAN VPN Router, as seen
from the Local LAN. Use the default value unless the address is
already in use or your LAN is using a different IP Address range.
Subnet Mask –The default value 255.255.255.0 is standard for small
(class "C") networks. For other networks, use the Subnet Mask for
the LAN segment to which the Multi-WAN VPN Router is attached.
(The same value as the PCs on that LAN segment.)
Optional DHCP Server Setup – If set to “Enable”, the Multi-WAN VPN Router
Configuration will assign IP Addresses to the PCs (DHCP clients) on your LAN
when they start up. The default and recommended value is "Enable".
(Windows systems, by default, act as DHCP clients. This setting in
the Windows Internet Protocol (TCP/IP) Properties is: Obtain an IP
address automatically.)
LAN Any IP – By default this option is disabled. If you enable “LAN
Any IP”, then no matter what, the static IP address is held on the
client (your PC). The client does not need to change the IP address,
even though it has a different IP segment than the LAN segment. It
can still access the Internet through NAT.
DHCP Configuration Lease Time – This is a finite period of time for a DHCP server to
lease an IP address to a client.
DNS Server IP for Client – An IP address of the default DNS server
for the client requesting DNS service.
Offered IP Range – The fields set the values used by the DHCP
server when allocating IP addresses to DHCP clients. This range
also determines the number of DHCP clients supported.
View DHCP List This table shows the IP addresses which have been allocated by the
DHCP Server. For each address which has been allocated, the following
information is shown:
Free Entry – Indicates how many IP addresses the DHCP server can
allocate to DHCP clients.
Name – The "hostname" of the PC. In some cases, this may not be
known.
MAC Address – The physical address (network adapter address) of
the PC.
IP Address – The IP address that is allocated to this PC.
Type – Indicates whether the IP address is to be dynamic or static.
Status – If Dynamic, the IP address was allocated by this DHCP
Server. If Sniffed, the IP address was detected by examining the LAN
rather than allocated by the DHCP Server. In this case, the Name is
usually not known.
Time Left – The time expired since the IP address was leased.
12. Save your data, then go to Step 2, Installing the Multi-WAN VPN Router in your LAN.
Page 11
2. Installing the Router in your LAN
1. Ensure that the Multi-WAN VPN Router and any DSL/Cable modem(s) are powered-OFF.
Leave the modem or modems connected to their data lines.
2. Connect the Broadband modem(s) to the Multi-WAN VPN Router.
If using only one (1) Broadband modem, connect it to port 1.
Use the cable supplied with your DSL/Cable modem. If no cable was supplied, use a standard
cable.
3. Use standard LAN cables to connect PCs to the LAN ports on the Multi-WAN VPN Router.
Both 10BaseT and 100BaseT connections can be used simultaneously.
If you need to connect the Multi-WAN VPN Router to another Hub, just use a standard LAN
cable to connect any LAN port on the Multi-WAN VPN Router to a standard port on another
hub. Any LAN port on the Multi-WAN VPN Router will automatically act as an "Uplink" port
when required.
If devices are connected to the 4 WAN ports (1,2,3 & 4), the remaining ports (5 ~ 16), are
LAN ports. (You can enable Port 15 and Port 16 as dedicated DMZ ports)
4. Power-Up
Power-on the Cable or DSL modem(s).
Connect the supplied power cord to the Multi-WAN VPN Router and power-up.
5. Check the LEDs
The Power LED should be ON.
The Link/ACT LED should be ON if the corresponding WAN port is connected to a
broadband modem.
For each PC connected to the LAN ports, the corresponding LAN LED (either 10/Yellow or
100/Green) should be ON.
Page 12
3. Configuring the Router for Internet Access
Select Primary Setup from the menu. You will see a screen like in the example below.
Configure each WAN one by one through the Interface column pull-down menu.
For any of the following situations, refer to Chapter 3: Advanced Port Setup, for any further
configuration which may be required:
Using multiple WAN ports
Enabling multiple IP addresses on each WAN port
Enabling multiple PPPoE sessions
PPTP connection method
Page 13
Settings – Primary Setup
Connection Interface – A pull down menu for each WAN port that you are going to
Mode connect to the Internet.
Connect Mode – Enable – Select this if you have connected a broadband
modem to this port. Disable – Select this if there is no broadband modem
connected to this port.
Connection Check the data supplied by your ISP and select the appropriate option.
Type
Static IP – Select this if your ISP has provided a Fixed or Static IP address.
Enter the data into the Address Info fields.
Dynamic IP – Select this if your ISP provides an IP address automatically
when you connect. You can ignore the Address Info fields.
PPPoE – Select this if your ISP uses this method. (Usually, your ISP will
provide some PPPoE software; however, this software is not required and
should not be used.)
If this method is selected, you must complete the PPPoE dialup fields.
Note:
If using the PPTP connection method (enable PPTP Connection), select Static
IP or Dynamic IP as appropriate, according to the IP Address method used by
your ISP.
Address This is for Static IP users only. Enter the address information (IP Address,
Information Subnet Mask, Gateway) provided by your ISP. If your ISP provides multiple IP
address, you can use the Multi-DMZ screen to assign any additional IP
addresses.
PPPoE / PPTP This is for PPPoE or PPTP users only.
Dialup
Enter the Username and Password provided by your ISP.
If using PPTP, enable the PPTP Connection checkbox and enter the IP
address of the PPTP server.
PPPoE Host name (Optional) – This field is used by a Host to uniquely
associate an access concentrator with a particular Host request.
Note:
There are additional PPPoE/PPTP options on the Port Options screen.
To use multiple PPPoE sessions on either port, configure settings in the
Advanced PPPoE screen.
DNS If using a Fixed IP address, you MUST enter at least 1 DNS address.
If using a Dynamic IP, PPPoE or PPTP; DNS information is optional.
Page 14
Optional Host name – This is required by some ISPs. If your ISP provided a Host
Name, enter it here. Otherwise, you can use the default value.
Domain name – This is required by some ISPs. If your ISP provided a
Domain Name, enter it here. Otherwise, you can use the default value.
MAC address – Some ISP records your MAC address (also called "Physical
address" or "Network Adapter address"). If so, you can enter the MAC
address expected by your ISP in this field. Otherwise, this should be left at
the default value.
Setup of the Multi-WAN VPN Router is now complete. PCs on your LAN must now be configured.
See the following section for details.
DMZs allow computers behind the firewall to initiate requests outbound to the DMZ. Computers in the
DMZ in turn respond, forward or re-issue requests out to the Internet or other public network, as
proxy servers do
Select DMZ Setting from the Basic Configuration menu. You will see a screen like in the example
below.
Set Port15 or Port16 as dedicated DMZ port by select corresponding WAN Ports
Note:
Select LAN for Port15 and Port16, these ports will be the same as other LAN ports on the Router
Page 15
5. Configure PCs on your LAN
Overview
For each PC, the following settings may need to be configured:
TCP/IP network settings
Internet Access configuration
TCP/IP Settings
If using the default Multi-WAN VPN Router settings and the default Windows
95/98/ME/2000/XP TCP/IP settings, no changes need to be made. Just start (or restart) your
PC.
By default, the Multi-WAN VPN Router will act as a DHCP Server, automatically providing a
suitable IP Address (and related information) to each PC when the PC boots.
For all non-Server versions of Windows, the default TCP/IP setting is to act as a DHCP client. In
Windows, this setting is: Obtain an IP address automatically.
Just start (or restart) your PC and it will automatically obtain an IP address from the Multi-WAN
VPN Router.
If using fixed IP addresses on your LAN, or if you wish to check your TCP/IP settings, refer to
Appendix B – Windows TCP/IP Setup.
Internet Access
To configure your PCs to use the Multi-WAN VPN Router for Internet access, follow this procedure:
For Windows XP
1. Select Start Menu - Control Panel - Network Connections.
2. Select Create a new connection.
3. Click Next on the "New Connection Wizard" screen.
4. Select "Connect to the Internet" and click “Next”.
5. Select "Set up my connection manually" and click “Next”.
6. Check "Connect using a broadband connection that is always on" and click Next.
Page 16
7. Click Finish to close the New Connection Wizard.
Setup is now completed.
Accessing AOL
To access AOL (America On Line) through the Multi-WAN VPN Router, the AOL for Windows
software must be configured to use TCP/IP network access rather than a dial-up connection. The
configuration process is as follows:
Start the AOL for Windows communication software. Ensure that it is Version 2.5, 3.0 or later.
This procedure will not work with earlier versions.
Click the Setup button.
Select Create Location and change the location name from "New Locality" to " Multi-WAN VPN
Router".
Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number field blank.)
Click Save, then OK.
Configuration is now complete.
Before clicking "Sign On", always ensure that you are using the "Multi-WAN VPN Router"
location.
Page 17
Macintosh Clients
For Macintosh users, the procedure for accessing the Internet via the Multi-WAN VPN Router is as
follows.
1. Open the TCP/IP Control Panel.
2. Select Ethernet from the Connect via pop-up menu.
3. Select Using DHCP Server from the Configure pop-up menu. The DHCP Client ID field can be left
blank.
4. Close the TCP/IP panel, saving your settings.
Note:
If using manually assigned IP addresses instead of DHCP, the required changes are:
Set the Router Address field to the Multi-WAN VPN Router‟s IP Address.
Ensure your DNS settings are correct.
Linux Clients
To access the Internet via the Multi-WAN VPN Router using Linux, it is only necessary to set the
Multi-WAN VPN Router as the "Gateway" and ensure your Name Server settings are correct.
Ensure you are logged in as "root" before attempting any changes.
Fixed IP Address
By default, most Unix installations use a fixed IP Address. If you wish to continue using a fixed IP
Address, make the following changes to your configuration.
Set your Default Gateway to the IP Address of the Multi-WAN VPN Router.
Ensure your DNS (Name server) settings are correct.
Page 18
3: Advanced Port
Overview
Port Options contains some options which can be set on any WAN port. For most situations, the
default values are satisfactory.
Load Balance is only functional if you are using multiple WAN ports. It allows you to determine
the proportion of WAN traffic sent through each port.
Advanced PPPoE setup is required if you wish to use multiple sessions on each WAN port. It
can also be used to manually connect or disconnect a PPPoE session. Otherwise, this screen
can be ignored.
Advanced PPTP setup is required if using the PPTP connection method.
Port Options
Page 19
Settings – Port Options
WAN Port – Select a particular WAN port from the pull-down menu to
Interface setup WAN port configuration.
MTU – The Maximum Transmission Unit for the Ethernet data. This
is used to determine the packet size to be used on the WAN
interface. Normally, this does not need to be changed but if your ISP
advises you to use a particular MTU, enter it here. The default MTU
value is 1500 Bytes.
Connection Health Method – There are three methods available for checking if a WAN
Check port is alive or not. Multiple choices can be selected when using it.
Disable will not perform an Alive Indicator Check. By default, Health
Check is set to Enable. If the “Alive Indicator” input box is left blank,
Health Check performs an ICMP echo packet request to the specific
destination. This could be either a URL or an IP Address specified
by users in the “Alive Indicator” input box or WAN interface
gateway.
Interval – The interval time for device health check. The default
interval time is 60 seconds.
Alive Indicator – This is the IP address used to check if the WAN
connection is operating. The Multi-WAN VPN Router will contact
this system to check if the WAN connection is working or not. You
may change this address if you wish. Default is the gateway IP.
Note: This is not used for PPPoE connections.
Transparent Bridge Bridge Mode – If set to Enable, this WAN port doesn‟t use NAT &
Option Load Balance function when the LAN/WAN IP have the real IP
addresses on the same network segment.
NetBIOS Broadcast – If you enable the NetBIOS Broadcast, this
will allow you to access files through the Microsoft network
neighborhood.
Transparent Bridge Traffic Management –
Options (For all Strict Binding: Traffic from bridge hosts (eg. transparent to
interfaces) WAN1) can only go through the specified WAN interface
(eg. WAN1).
Loose Binding: This acts as a failover mechanism for transparent
bridge mode. Traffic from bridge hosts (eg. transparent to
WAN1) can go through any WAN interface (eg. WAN2 or
other) when bind interface (eg. WAN1) is down.
Load Balancing: This acts as a load balancing mechanism for
transparent bridge mode. Traffic from bridge hosts (eg. transparent
to WAN1) can go through any WAN interface (eg. WAN1, 2 or
other) based on the loading mechanism specified in the load
balance section.
ARP Table – The ARP Table is used by the device to determine
the bridge hosts‟ location (e.g. inside/outside WAN and which
WAN). Its size can be adjusted if needed. View ARP Tables
displays ON/OFF selection of bridge mode on each WAN port.
Clear ARP Tables disables bridge mode on all WAN ports.
Page 20
Load Balance
This screen is only operational if using Internet connections on multiple WAN ports
Only functional when using two (2) or more WAN ports - these settings determine the proportion of
traffic sent over each port.
Page 21
Settings – Load Balance
Load Balance Enable – This enables your Load Balance setting options and must be
Configuration checked for other settings on this screen to be effective.
Balance Type – You can select the Balance types based on:
Bytes Tx + Rx – Traffic is measured by Bytes. (Least load)
Packets Tx + Rx – Traffic is measured by Packets. (Least load)
Sessions established – Traffic is measured by Sessions. (Least load)
IP Address – Traffic is measured by IP address. (Least load)
Auto Learning – The largest unused upload/outgoing bandwidth.
Fastest – The largest upload bandwidth.
Priority – The highest priority.
Round Robin – Continuously repeating sequence.
Weight Round Robin – In sequence with weight placed accordingly.
Loading Share – Enter the percentage (%) of traffic to be sent over each
WAN port. If one WAN port connection has a greater bandwidth than another,
the one with the greater bandwidth is given a higher percentage of traffic than
the other.
Click the "submit" button to save your changes.
NAT This section displays the current data about any WAN port. You can use this
Statistics information to help you "fine-tune" the settings above.
Interface This section displays cumulative statistics.
Statistics
Use the "Restart Counters" button to restart the counters when required.
Buttons Refresh – Update the data entered on the screen.
Restart Counters – Restart the counters used in the "Interface Statistics"
section.
Page 22
Advanced PPPoE
The Advanced PPPoE screen is required in order to use multiple PPPoE sessions on the same WAN
port.
It can also be used to manually connect or disconnect a PPPoE session.
Page 23
Settings – Advanced PPPoE
Select WAN Port WAN Port – Selected WAN port only using PPPoE connection
& Session
PPPoE Session – ISPs can usually provide multiple floating real IPs for
PPPoE. Each WAN port can have up to eight (8) PPPoE sessions, each with
a different IP address if your WAN port is using PPPoE connectivity.
PPPoE Session MTU – The Maximum Transfer Unit for PPPoE packet data.
Leave it as default unless the ISP provides a different PPPoE packet data
size. The default MTU value is 1492 bytes.
WAN IP Account User Name – Enter the PPPoE user name assigned by your ISP.
Password – Enter the PPPoE password assigned by your ISP.
Verify Password – Re-enter the PPPoE password assigned by your ISP.
Options Specified Fix IP Address – If you have a fixed IP address, enter if here.
Otherwise, this field should be left at 0.0.0.0.
Assigned Host Name –This field is used by a Host to uniquely associate
an access concentrator with a particular Host request.
PPPoE Auto Auto Dialup (connect-on-demand) – If set to Enable, a connection will be
Dialup established whenever outgoing WAN traffic is detected. If not enabled,
you must establish a connection manually.
Disconnect after Idle – This determines when an idle connection will be
terminated. Enter the required time period. (-1: Always on)
Echo Time – This determines how often an Echo request is sent to the
PPPoE server. The Echo request is used to determine if the connection is
still alive. Normally, there is no need to change the default value.
Echo Retry – The number of times the Echo request will be sent, if there
is no response to the first request. Normally, there is no need to change
the default value.
Connection This displays the current connection status for each session.
Status
Page 24
Advanced PPTP
This Advanced PPTP screen is only useful if using the PPTP connection method.
Page 25
Settings – Advanced PPTP
WAN Port Select the desired WAN port (click desired WAN on Connection Status). The
data of the selected port will then be displayed in the WAN IP Account
section.
PPTP MTU – Maximum transfer unit for PPTP. The default value is 1460
WAN IP Account User Name – The PPTP user name (login name) assigned by your ISP.
Password – The PPTP password associated with the User Name above.
This is assigned by your ISP, and used to login to the PPTP Server.
Verify Password – Re-enter the PPTP password assigned by your ISP.
Server IP Address – Enter the IP address of the PPTP Server, as
provided by your ISP.
Static IP Address – If you have a fixed IP address, enter if here.
Otherwise, this field should be left at 0.0.0.0.
PPTP Auto Dialup Auto Dialup (connect-on-demand) – If set to Enable, a connection will be
established whenever outgoing WAN traffic is detected. If not enabled,
you must establish a connection manually.
Disconnect after Idle – This determines when an idle connection will be
terminated. Enter the required time period. (-1: Always on)
Echo Time – This determines how often an Echo request is sent to the
PPTP server. The Echo request is used to determine if the connection is
still alive. Normally, there is no need to change the default value.
Echo Retry – The number of times the Echo request will be sent, if there
is no response to the first request. Normally, there is no need to change
the default value.
Connection This displays the current PPTP connection status.
Status
Page 26
4: Advanced Setup
Overview
The following features are provided in Advanced Setup:
Host IP
Routing
Virtual Server
Special Application
Dynamic DNS
Multi DMZ
UPnP Setup
NAT Setup
Advanced Feature
This chapter contains details on the configuration and use of each of these features.
Page 27
Host IP
This feature is used in the following situations:
You have Multi-Session PPPoE and wish to bind each session to a particular PC on your LAN.
You wish to use the Access Filter feature. This requires that each PC is identified by using the
Host IP screen.
You wish to have different Block URL settings for different PCs. This requires that each PC is
identified by using the Host IP screen. (You do not have to use the Host IP feature to apply the
same Block URL settings to all PCs.)
You wish to reserve a particular (LAN) IP address for a particular PC on your LAN. This allows the
PC to use DHCP (In Windows this setting is configured as: "Obtain an IP address automatically")
while gaining the benefits of a fixed IP address. The PC's IP address will never change, allowing it
to be provided to other users and applications.
Page 28
Settings – Host IP
Host Network This section identifies each Host (PC)
Identity
Host name – Enter a suitable name. Generally, you should use the
"Hostname" (computer name) as defined on the Host itself.
MAC Address – Also called Physical Address or Network Adapter Address.
Enter the MAC address of this Host.
Select Group – Select the group you wish this Host to be included in.
Reserve in DHCP – Select Enable to reserve a particular (LAN) IP address
for a particular PC on your LAN. This allows the PC to use DHCP (In Windows
this setting is configured as: "Obtain an IP address automatically") while
retaining an IP address that never changes.
Reserved IP Address – Enter the IP address you wish to reserve, if the
setting above (Reserve in DHCP) is set to Enable. Otherwise, ignore this field.
Host Network Binding WAN Port / Session – Select Enable if you wish to associate this
Binding PC with a particular PPPoE session. All traffic for that PC will then use the
selected PPPoE port and session.
Binding Method – Suppose your PC is bound to WAN1 port and you select
“Strict Binding.” If WAN1 port is disconnected, your packets cannot go
through another WAN port, if it is still alive. If you select “Loose Binding” then
if WAN1 port becomes disconnected, your packets will automatically go to
another WAN port, if it is alive.
Select WAN Port / Select PPPoE session – If the Binding Method setting
above is set to Enable, select the desired Port and Session. Otherwise, ignore
these settings.
Note: Multiple PPPoE sessions are defined on the Advanced PPPoE screen.
Buttons Add – Use this to add a new entry to the database, using the data shown on
screen.
Delete – Click this to delete the selected entry.
Update – After making the desired changes, use this to update the selected
entry
Reset – Reverse any changes you have made since loading the data from the
Multi-WAN VPN Router.
Host & Group This table shows the current bindings.
List
Page 29
Routing
This section is only relevant if your LAN has other Routers or Gateways.
If you don't have other Routers or Gateways on your LAN, you can ignore the Static Routing
page completely.
If your LAN has other Gateways and Routers, you must configure the Static Routing screen as
described below. You also need to configure the other Routers.
Note:
If there is an entry or entries in the Routing table with an Index of zero (0), these are System entries.
You cannot modify or delete these entries.
Settings – Routing
Dynamic RIP v2 – This acts as a “master” switch. If enabled, the selected WAN or LAN
Routing will run RIPv1/v2, otherwise RIP function will not be available.
Interface – If LAN or other WAN are enabled, the specified WAN or LAN can
execute RIP function.
Page 30
Static Network Address – The network address of the remote LAN segment. For
Routing standard class "C" LANs, the network address is the first 3 fields of the
Destination IP Address. The 4th (last) field can be left at 0.
Netmask –The Network Mask for the remote LAN segment. For class "C"
networks, the default mask is 255.255.255.0
Gateway – The IP Address of the Gateway or Router that the Multi-WAN VPN
Router must use to communicate with the destination IP address entered
above. (NOT the router attached to the remote segment.)
Interface – Select the correct interface - usually "LAN". The "WAN" interface
is only available if NAT (Network Address Translation) is disabled.
Metric – The number of "hops" (routers) to pass through to reach the remote
LAN segment. The shortest path will be used.
Routing List This shows the current routing table set by the user.
All traffic for devices not on the local LAN must be forwarded to the Multi-WAN VPN Router so that it
can be forwarded to the Internet. This is done by configuring other Routers to use the Multi-WAN VPN
Router as the Default Route or Default Gateway, as illustrated by the example below.
Segment 1
(192.168.2.xx) (192.168.2.80) (192.168.1.100) Segment 0
(192.168.1.xx)
Router A
(192.168.1.1)
Router B
(192.168.2.90) (192.168.3.70)
Segment 2
(192.168.3.xx)
Page 31
For the Multi-WAN VPN Router Gateway's Routing Table
For the LAN shown above, with 2 routers and 3 LAN segments - the Multi-WAN VPN Router requires
2 entries as follows:
Entry 1 (Segment 1)
Destination IP 192.168.2.0
Address
Network Mask 255.255.255.0
Gateway IP Address 192.168.1.100
Interface LAN
Metric 2
Entry 2 (Segment 2)
Destination IP 192.168.3.0
Address
Network Mask 255.255.255.0 (Standard Class C)
Gateway IP Address 192.168.1.100
Interface LAN
Metric 3
Page 32
Virtual Server
This feature allows you to make Servers on your LAN accessible to Internet users. Normally, Internet
users would not be able to access a server on your LAN because:
Your Server's IP address is only valid on your LAN, not on the Internet.
Attempts to connect to devices on your LAN are blocked by the firewall in the Multi-WAN VPN
Router.
The "Virtual Server" feature solves these problems and allows Internet users to connect to your
servers, as illustrated below.
Web Server
(192.168.1.45)
FTP Server
(192.168.1.20)
Note that, in this illustration, both Internet users are connecting to the same IP Address but using
different protocols.
Once configured, anyone on the Internet can connect to your Virtual Servers. They must use the
Multi-WAN VPN Router's Internet IP Address (the IP Address allocated by your ISP).
e.g.
http://205.20.45.34
ftp://205.20.45.34
To Internet users, all virtual Servers on your LAN have the same IP Address. This IP Address is
allocated by your ISP.
This address should be static, rather than dynamic, to make it easier for Internet users to connect
to your Servers. However, you can use the Dynamic DNS feature (explained later in this chapter)
to allow users to connect to your Virtual Servers using a URL, instead of an IP Address.
e.g.
Page 33
http://my_domain_name.dyndns.org
ftp://my_domain_name.dyndns.org
Page 34
Settings – Virtual Server
Virtual Server Enable – The enable checkbox is to Enable or Disable each Virtual
Configuration server as required.
Server Name – Enter a suitable name for this server. (By default, 12
well-known virtual servers have been listed on the Custom Virtual
Server List)
Protocol – Select the network protocol (TCP/UDP) used by this sever.
IP Address – LAN, Enter the IP address of the server on your LAN
which is running the required Server software.
Each Host (server) should have a fixed IP address, or have a reserved
IP address. (See the Host IP section earlier in this Chapter for details
on reserving an IP address.)
Each Host (server) must be running the appropriate Server software
WAN – This selection allows this server to bind to any WAN port (1-4),
or even bind to all WAN ports together.
LAN Port Range – Enter the range of port number used for outgoing
traffic from this Server. If only a single port is required, enter it in both
fields.
WAN Port Range -– Enter the range of port numbers used for incoming
traffic to this Server. If only a single port is required, enter it in both fields
Allowed Remote IP – It allows only a range of remote side IP
addresses to access the virtual servers. The default entry 0.0.0.0 ~
0.0.0.0, means all remote side IP address can access it.
Buttons Add – Create a new Virtual Server entry.
Delete – Delete the selected entry.
Update – Save any changes you have made to the current entry.
Cancel – Cancel any changes you have made since the last saved
operation.
Virtual Server List This table shows the details of all Custom Virtual Servers configuration data
which have been defined. You can modify their configuration data by
selecting and clicking on a row.
Page 35
Special Application
If you use Internet applications which have non-standard connections or port numbers, you may find
that they do not function correctly because they are blocked by the firewall in the Multi-WAN VPN
Router. In this case, you can define the application as a "Special Application" in order to make it work.
Note that the terms "Incoming" and "Outgoing" on this screen refer to traffic from the client (PC)
viewpoint
Page 36
Buttons Add – Create a new Special Application entry.
Delete – Delete the selected entry.
Update – Save any changes you have made to the current entry.
Cancel – Cancel any changes you have made since the last saved
operation.
Special Application This shows the details of all Special Applications which are currently
List defined. You can modify its configuration data by selecting and clicking on
a row.
Once the Special Applications screen is configured correctly, you can use the application on your
PC normally. Remember that only one (1) PC can use each Special application at any time.
Also, when 1 PC is finished using a particular Special Application, there may need to be a "Time-
out" period before another PC can use the same Special Application.
If an application still cannot function correctly, try using the "DMZ" feature, if possible.
Page 37
Dynamic DNS
Dynamic DNS is very useful when combined with the Virtual Server feature. It allows Internet users to
connect to your Virtual Servers using a URL, rather than an IP Address.
This also solves the problem of having a dynamic IP address. With a dynamic IP address, your IP
address may change each time you connect to your ISP, making it difficult to connect to you.
You must register for the Dynamic DNS service. The Multi-WAN VPN Router supports 3 types of
service providers:
Standard client, available at http://www.dyndns.org
(Other sites may offer the same service, but can not be guaranteed to work)
TZO at http://www.tzo.com
3322 is available in China at http://www.3322.org
Page 38
Settings – Dynamic DNS
Dynamic DNS This pull-down menu can Enable/Disable the Dynamic DNS feature and select
Service the required service provider.
Disable – Dynamic DNS is not used.
TZO – Select this to use the TZO service (www.tzo.com). You must
configure the TZO section of this screen.
DynDNS – Select this to use the standard service (from www.dyndns.org
or other provider). You must configure the Standard Client section of this
screen.
3322(in China) – This is available in China. It is similar to “DynDNS”
User Defined DDNS Server – This is the user defined DDNS server. If the
DDNS provider is other than TZO, dyndns.org or 3322.
Additional These options are available if using the standard client.
Settings
Enable Wildcard – If selected, traffic sent to sub-domains (of your Domain
name) will also be forwarded to you.
Enable backup MX – If enabled, you must enter the Mail Exchanger
address below.
Mail Exchanger – If the setting above is enabled, enter the address of the
backup Mail Exchanger.
WAN Port Select the WAN port used by the Dynamic DNS.
Binding
The "Force Update" button will update your record on the Dynamic DNS
Server immediately.
Page 39
Multi DMZ
This feature allows each WAN port IP address to be associated with one (1) computer on your LAN.
All outgoing traffic from that PC will be associated with that WAN port IP address. Any traffic sent to
that IP address will be forwarded to the specified PC, allowing unrestricted 2-way communication
between the "DMZ PC" and other Internet users or Servers.
Note:
The "DMZ PC" is effectively outside the Firewall, making it more vulnerable to hacker attacks or other
intrusions. For this reason, you should only enable the DMZ feature when required.
Page 40
UPnP Setup
With the UPnP (Universal Plug & Play) function, you can easily setup and configure an entire network
as well as enable detection and control of networked devices and services.
Page 41
NAT Setup
NAT (Network Address Translation) is the technology which allows one (1) WAN (Internet) IP address
to be used by multiple LAN users.
Page 42
Settings – NAT Setup
NAT NAT Routing – You can enable or disable NAT through the check box. If
Configuration you disable the NAT checkbox, it will act as a bridge or Static Router. Most
features will be unavailable.
TCP Timeout – Enter the desired value to use on each WAN port. The
default is 300
UDP Timeout – Enter the desired value to use on each WAN port. The
default is 120
TCP Window Limit – Enter the desired value to use on each WAN port.
The default is 0 (no limit).
TCP MSS Limit – Enter the required MSS (Maximum Segment Size) to
use on each WAN port. The default is 0 (no limit).
NAT Port If some packets whose port number cannot be translated for special
Options applications, you must set state to “Enable” and input value in port range.
Alternatively, if its port cannot be translated in the specified time period, you
must set Enable and enter a seconds value in Timeout.
NAT Alias For each alias entry, the WAN IP acts as an alias of the host with Local LAN IP
accessing the Internet via the specified WAN port for the specified protocol
packets, i.e. 1-1 NAT.
NAT Alias List NAT Alias List shows the list of all NAT alias configuration data which are
currently defined. You can modify its configuration data by selecting and
clicking on a row.
Check NAT Shows all detailed NAT configuration data.
Detail
NAT Connection This shows the current details of all NAT entries which include interface,
List protocol, state, destination IP, WAN IP, local IP, idle time and in/out packets.
Page 43
Advanced Feature
External Filters Configuration – These settings determine whether the Multi-WAN VPN Router
should respond to ICMP (ping) requests received from the WAN port or not.
Interface Binding – Use these settings to ensure that certain traffic is sent by a particular WAN
port and thereby a particular ISP account. These settings are only useful on some WAN ports.
Protocol & Port Binding – This allows you to bind any WAN port by selecting the protocol type
you want.
Page 44
Settings – Advanced Feature
External Filters Block Selected ICMP Types – These settings determine whether or not
Configuration this device should respond to ICMP requests received from the WAN port.
If checked, the selected packet types are blocked. Otherwise, the packets
are accepted.
Echo Request / Information Request / Timestamp / Address Mask
Request : The ICMP standard (RFC 792) also specifies timestamp
request, information request, and address mask request packets as codes
13, 15, and 17, respectively. While the ostensible purpose for these
queries is to learn information such as address masks and current times,
they can easily be used for host discovery. A system that replies is up and
available. A timestamp reply (ICMP code 14) or address mask (code 18)
discloses that the host is available
DNS Loopback Used when you have some servers on the LAN and their domain names have
already been registered on public DNS. To avoid DNS loop back problems,
please enter the following fields:
Domain Name – Enter the domain name specified by you for the local
server.
Private IP – Enter the private IP address of your local server.
Application IDENT Port – Port 113 is associated with the Internet's (Identification /
Authentication) service. When a client program in your computer contacts a
remote server for services such as POP, IMAP, SMTP, that remote server
sends back a query to the "Ident" server running in many systems listening
for these queries on port 113. This means that hackers can probe port 113
as a rich source of your personal information. The default value of this
check box is “Disable”
SMTP Binding – Unless you are using E-mail accounts from different ISPs
on each port, you can ignore these settings.
Some ISPs configure their E-mail Servers so they will not accept E-mail from
IP addresses not allocated by them. If you are using accounts from different
ISPs, sending E-mail over the wrong WAN port may result in the mail not being
accepted. In this case, you can use these settings to correct the problem:
-Enable – If enabled, the WAN port you specify below will be used for all
outgoing SMTP traffic. If not enabled, either WAN ports will be used.
-WAN – Select the desired WAN port to be bound.
IPSec Passthrough – Enable/Disable IPSec passthrough, and designate it
to a WAN port. By default IPSec passthrough is “Enable
PPTP Passthrough – Enable/Disable PPTP passthrough, and designate it
to a WAN port. By default PPTP passthrough is “Enable
Page 45
Protocol & Port Protocol and Port Binding
Binding
Use these settings if you wish to ensure that particular traffic is sent by a
specific WAN port, and thereby a particular ISP account.
Enable - Enable or disable each item as required.
Source IP - IP address of source from which packets are sent.
Destination IP – IP address of destination to which packets are sent.
Subnet Mask – With a subnet mask other than 255.255.255.255, you can
make an IP sub-network as your destination.
Protocol – Select protocol type used by the traffic you wish to configure.
Port Range - Enter the beginning and end of the port range used by the
traffic you wish to configure. If only a single port is used, enter the port
number in both fields.
WAN - Select the WAN port you wish this traffic to use.
Protocol & Port This list shows the details of all protocol and port configuration data which are
Binding List currently defined. You can modify them by clicking on a selected row.
Page 46
5: Security Management
Overview
Block URL – Ability to block a specific website by configuring IP address, URL or Keywords.
Access Filter – Ability to block all Internet access, a known port or user defined ports by group
access.
Session Limit – Ability to limit users Internet access when the device detects new sessions that
exceed the maximum value in the sampling time, for example, virus, syn flood, etc.
SysFilter Exception – This feature allows you to configure an unrecognized port, allowing those
packets to be processed, enabling some programs to run more smoothly. This is also applicable
for some future applications that may need this mechanism in order to work well.
Block URL
This feature allows you to block access to undesirable Web sites. You can block by URL, IP address,
or Keyword. You can also have different blocking settings for different groups of PCs.
In operation, every URL is searched to see if it matches or contains any of the URLs or keywords
entered here. Then, after a DNS lookup, it determines the IP address of the requested site and
checks it against IP address entries on this screen.
Note that a single IP address may host many Web sites (shared IP). Entering an IP address on
this screen will block all Web sites that may be hosted on that IP address.
Page 47
Settings – Block URL
Access Group This allows you to have different blocking rules for different Groups of PCs.
All PCs (users) are in the Default Group unless moved to another specified
group on the Host IP screen.
If you want the same restrictions to apply to everyone, select Default for the
Group. In this case, there is no need to enter any Hosts in the Host IP
screen.
If you wish to apply different restrictions on different Groups, select the
desired Group, and click the "Select" button. The screen will update the
data for the selected Group.
URL List Type – Block Internet Access: If you select Black List, It will
block the URL that you keep it on Access Item. Allow Internet Access: If
you are select White List type, it will block the entire URL except you keep it
on the Access Item.
Set Type Button – Button to submit Black List or White List.
Access Item Enable/Disable – Use this to Enable or Disable each setting as required.
Block URL/IP/Keyword – Enter the URL, IP address or Keyword you wish
to block.
Internet Access The list will display all block rules that you have setup. You can modify it by
List clicking on a selected row.
Page 48
Access Filter
The network Administrator can use the Access Filter to gain fine control over the Internet access and
applications available to LAN users.
Five (5) user groups are available and each group can have different access rights assigned to
them.
All PCs (users) are in the Default group, unless assigned to another group on the Host IP screen.
Page 49
Settings – Access Filter
Access Group This allows you have different access rights for different Groups of PCs.
If you want the same restrictions to apply to everyone, select Default
for the Group. In this case, there is no need to enter any Hosts on
the Host IP screen.
If you wish to apply different restrictions to different Groups, select
the desired Group. The screen will update data for the selected
Group.
Filter Setting Select the desired option for this Group:
No filtering – Nothing is blocked, Internet access is not restricted.
Block All Access – Everything is blocked, Internet access is not
available.
Block selected items – Items selected on this screen are blocked.
You can block known services by using the checkboxes, or you may
define your own filters.
ICMP Filters If you enable ICMP Filter that means it will block ICMP request packet
types specified by users from local host to remote side.
User-Defined Filter This section is optional. It allows you to define your own filters as
required. For each filter, the following information is required:
Filter Name – Enter a name for this filter.
Protocol Type – Select a protocol type you wish to block.
Port No. Range – Enter the range of port numbers used that you
wish to block. If only a single port is required, enter it in both fields.
User-Defined Filter List This List shows the details of all User-Defined Filter configurations which
are currently defined. You can modify its configuration data by clicking
on a selected row.
Page 50
Session Limit
This new feature allows to drop the new sessions from both WAN and LAN side, if the number of
new sessions exceeds the maximum value set by you in the Sampling Time field.
Page 51
SysFilter Exception
System Filter Exception - This will reject every packet with an unrecognized port to block port scan
programs from hackers. This, however, also incurs problems in some situations where servers (e.g.
SMTP server port 113) or WAN clients need to send a response packet to verify the activity of their
communication peers.
Page 52
6: VPN Configuration
Overview
Virtual Private Network (VPN) uses encryption to create the connection between two end points
(computers or networks). It allows private data to be sent securely over a public network or the
Internet without the risk of outside intruders gaining unauthorized access. VPN establishes a private
network that can send data securely between two networks. We call this by creating a “tunnel”. A VPN
tunnel connects the two PCs or networks
Note: The VPN Router uses industry standard IPSec encryption. However, due to the variations in
how manufactures interpret these standards, many VPN products are not interoperable.
Although the Multi-WAN VPN Router can interoperate with many other VPN products, it is not
possible for the Multi-WAN VPN Router to provide specific technical support for every other
product.
Page 53
Settings – IKE Global Setup
Global List (Phase 1) The list will only show the approximate information of all Global Settings
on each WAN port. You can modify it by clicking on a selected row.
Global Parameters Enable Setting – If set to Enable, it enables the VPN function to
work.
ISAkmp Port – Internet Security Association and Key Protocol
Management (ISAkmp) is designed to negotiate, establish, modify
and delete security associations and their attributes. By default, it is
assigned UDP port 500 by the IANA. You can set it to use a port
other than port 500. The remote IPsec site will attempt to connect
on it.
Phase 1 DH Group – There are three levels of cryptography from
the Diffie-Hellman group. The DH method illustrates key generation
using public key cryptography. It uses the public and secret key
information held by both users to generate a key.
Phase 1 Encryption Method – There are three data encryption
methods available: DES, 3DES and AES.
Phase 1 Authentication Method – There are two authentication
methods available: MD5 and SHA1 (Secure Hash Algorithm)
Phase 1 SA Life Time – By default the Security Association lifetime
is 28800 seconds. When it is expired, a new key is re-negotiated.
During the negotiation period, the VPN tunnel isn‟t available.
Retry Counter – This indicates how many times the process of
Phase 1 will be restarted if it‟s unsuccessful. There will be an error
message in the VPN log once it is expired.
Retry Interval – This indicates the time period between two
consecutive retries.
Maxtime to complete Phase 1 – This indicates the maximum time
allowed for negotiation in Phase 1. If it expires, it is recommended
to increase the Maxtime period or reduce the DH group level.
Default value is 30 sec.
Maxtime to complete Phase 2 – It indicates the maximum time
allowed for negotiation in Phase 2. If it expires, it is recommended
to increase the Maxtime period or reduce the DH group level.
Default value is 30 sec.
Count Per Send – This indicates the maximum amount of duplicate
packets to be resent if the remote side does not respond to the first
packet.
Force Deletion after Expiry – When set to Enable, once SA has
expired, the tunnel session will be removed and all related
resources will be cleared.
Log Level This function allows you to select which information you want to see on
the VPN log. It has six different message levels: None, Critical, Error,
Warning, Information and Debug.
Page 54
Planning the VPN
When planning your VPN, you must make the following choices first:
1. If the remote site is a LAN network, the two end-point networks must have different LAN IP
address ranges. If the remote end-point is a single PC running a VPN client, its destination
address must be a single IP address with subnet mask of 255.255.255.255
2. Will you be using the Internet Key Exchange (IKE) setup, or Manual Keying? Whichever method is
used, you must specify each phase of the connection.
3. At least one side must have a fixed IP address. The other side with a dynamic IP address must
always be the initiator of the connection.
4. What encryption level will you use (DES, 3DES or AES)?
5. What authentication method will you use (MD5, SHA1 or SHA2)?
Page 55
IPSec Policy Setup
The VPN Policy Setup is to define the VPN phase 2 policy including the encryption and authentication
method. Once you have finished the configuration, you can press the “Connect” button to make the
VPN connection. You can also press the “Set Options” button for advanced setting details of VPN
policy.
Page 56
Settings – IPSec Policy Setup
Policy Entry Name – In order to distinguish the tunnel, you have to give
“Tunnel” a name.
State Enable – If set to Enable, this will allow the tunnel to
connect.
Traffic Binding
WAN port – You can choose any WAN port to make the VPN
connection.
Session – If you are using a multi-session PPPoE connection,
you can select which PPPoE session will create a VPN tunnel
between two sites.
Local Identity Type – You can select how the router will identify
itself to the destination VPN site. There are three options to select
from:
IP address – This allows the authentication by using its public
IP address.
Domain Name – This allows the authentication by using a
domain name.
Distinguished Name – This allows the authentication by using
a distinguished name such as an email address or alpha-
numeric characters.
Traffic Selector Service – Protocol Type: You can choose TCP, UDP, ICMP or
GRE protocol as your connection protocol. By default the protocol
type is “Any”.
Local Security Network – These entries identify the private
network on this VPN gateway - the hosts of which can use the
LAN-to-LAN connection. You can choose a single IP address, the
subnet, or a selected IP range to make VPN LAN-to-LAN
connection.
Remote Security Network – These entries identify the private
network on the remote peer VPN gateway whose hosts can use
the LAN-to-LAN connection. You can choose a single IP address,
the subnet, or a selected IP range to make VPN connection
Remote Security Gateway – You can select either the remote
side by a domain name, a remote side IP address (WAN IP
address) or a distinguished name as your remote side security
gateway.
Page 57
Security Level Encryption Method – Specifies the encryption mechanism to use.
Data encryption makes the data unreadable if intercepted. There
are three encryption methods available: DES, 3DES and AES. The
default setting is null.
Authentication Method – Specifies the packets authentication
mechanism to use. Packets authentication confirms if the data‟s
source is correct or not. There are three authentication methods
available - MD5, SHA1 and SHA2.
ESP Mode – Only Tunnel Mode is available. It offers the most
protection against an intruder trying to intercept VPN packets.
Key Management Key Type – Two key types are available for the key exchange
management - Manual Key and Auto Key:
Manual Key – If manual key is selected, no key negotiation is
needed. The following fields to be set are:
1. Encryption Key –This field specifies a key to encrypt and
decrypt IP traffic.
2. Authentication Key – This field specifies a key to use to
authenticate IP traffic.
3. Inbound/out bound SPI (Security Parameter Index) – This
information is carried on the ESP header. Each tunnel must
have a unique inbound and outbound SPI and no two tunnels
share the same SPI. Note that the Inbound SPI must match the
other router‟s outbound SPI.
AutoKey (IKE) – There are two types of operation modes which
can be used in Phase 1 Negotiation:
1. Main mode – Accomplishes a Phase 1 IKE exchange by
establishing a secure channel.
2. Aggressive Mode – This is another way of accomplishing a
phase one exchange. It is faster and simpler than Main Mode
but does not provide identity protection for the negotiating
nodes.
Perfect Forward Secrecy (PFS) – If PFS is enabled, Phase 2 IKE
negotiation will generate new key data for IP traffic encryption &
authentication. If set to Enable, a hacker using brute force in an
attempt to break encryption keys is not able to obtain other or
future IPSec keys.
Preshared Key – This field is used to authenticate the remote IKE
peer.
It is a “pass code” or “password” which must be the same one
used between both the local site and remote site. Otherwise the
VPN tunnel will not be established.
Key Lifetime – This specifies the lifetime of the IKE generated
Key. If the time expires or passed data exceeds the allowed
volume, a new key will be renegotiated. By default, 0 is set for No
Limit.
Page 58
Security Association The list will display the details of all Policy Setup configuration data
List that you have entered. Modification can be made by clicking on a
selected row.
Action Connect – Manually trigger the tunnel negotiation with selected
IKE/IPSec proposals
Disconnect –Manually shut down the established tunnel and
clear all the SA in use, inform peer by sending Delete payload.
Flush – Manually clear the established, unfinished or in
progressing tunnel disregarding current negotiation state.
Reload Policy – Bring current policy configuration into effect, use
this when policy has been updated
Tunnel Status – Display the current tunnel Runtime attributes and
Traffic Statistics.
Set Option –Option set provided for setting advanced tunnel
attributes eg: DPD(health checking), NATT, triggering, filtering..
etc.
Page 59
Figure 6-3: IPSec Policy Options
Page 60
aliveness
3. DPD (RFC 3706) – Uses a bi-directional (‘HELLO/ACK’) message
to determine connection aliveness.
Check After Idle – Indicates the time period in which no traffic
passes - a Detection packet is sent to the peer.
Retry Times – The number of times a device will attempt to send the
Detection packet before the Check After Idle time expires.
Action – This will execute one of the following actions after the
Detection is determined:
Failover - ignores the dead tunnel.
Remove Tunnel - disconnects the dead tunnel.
Keep Tunnel Alive - attempts to keep the tunnel alive.
Logging – If set to Enable, all DPD activity of will show up in the
VPN log.
NAT Traversal Feature NAT Traversal (NAT-T)– NAT Traversal is a VPN Gateway feature
that circumvents IPSec NATing problems. It is a more effective
solution than IPSec Passthrough. If you enable the checkbox it will
turn on NAT-T mechanism. By default is “Disable”.
Keep Alive Interval – It is usually necessary for the IPSec to send
periodic keep-alive packets, so that the NAT mapping does not
change until the phase1 and phase2 SAs expire. By default is “0”
second mean always keep alive.
UDP Checksum – All UDP packets contain a UDP checksum, a
calculated value that ensures UDP packets are free of transmission
errors. The device (Multi-WAN router) does not require use of UDP
checksum for NAT-T. Therefore, the checkbox keep it always
“Disable”.
Page 61
Options NetBIOS Broadcast – This option is used to forward NetBIOS
packets across the Internet from remote side to local side and vice
versa. When enabled, the remote side computer can be reached by
a host name.
Auto Triggered – If set to Enable, a device will automatically
attempt to connect the remote VPN gateway without any user input.
Anti Replay – This ensures that IP packet-level security is kept
track of in order.
Passive (Responder) Mode – When enabled, the tunnel state will
remain idle until an attempt is made to connect to the remote side.
This setting will override the Auto Triggered option.
Check ESP Pad – If set to Enable, a device will check the ESP
(Encapsulating Security Payload) padding of each packet. ESP is a
key protocol in the IPSec architecture which is designed to provide
a mix of security services in IPv4 and IPv6.
Allow Full ECN – If set to Enable, it will allow full Explicit
Congestion Notification (ECN). ECN is a standard proposed by the
IETF that will minimizes congestion on a network and prevent the
gateway from dropping data packets.
Copy DF Flag – When an IP packet is encapsulated as payload
inside another IP packet, some of the outer header fields can be
newly written while others are determined by the inner header.
Among these fields is the IP DF (Do not Fragment) flag. When the
inner packet DF flag is clear, the outer packet may copy it or set it.
However, when the inner DF flag is set, the outer header MUST
copy it.
Set DF Flag- If the DF (Do not Fragment) flag is set; it means that
the fragmentation of this packet at the IP level is not permitted.
Page 62
Mesh Group Setup
The Multi-WAN VPN Link Balancer not only provides VPN failover and backup but is also capable
of offering VPN load balance.
If you have setup IPSec policy on the “IPSec Policy Setup” web page, then you don‟t have to enter
IPSec policy setup again here. You can press the “Scan Policies” button to copy the IPSec Policy
into the Mesh Group Setup web page. You also can configure your IPSec Policy on the Mesh Group
web page by pressing the “Create” button. To use the VPN load balance option, it is necessary to use
a static IP.
For configuring Mesh Group Setup you can refer to the IPSec Policy Setup:
Once you have added your VPN Policy to the Mesh Group, you can set up your Mesh Group through
the VPN Mesh Group Configuration.
Page 63
Figure 6-5: Mesh Group Configuration
Delete Button – This button can delete one or all IPSec Policies.
Set Button – Once you have enabled/disabled the check box, you
have to press the Set button to submit it.
Edit Button – The Edit button will let you edit the IPSec policy.
View Button – This will let you monitor the connection status.
Connection Button – Allows you connect or disconnect the VPN
manually,
Page 64
VPN Log
You can monitor the VPN status through the VPN Logs web page. The log level (priority) can be
chosen from the VPN IKE Global Settings web page.
Page 65
7: QoS Configuration
Overview
The Multi-WAN VPN Router incorporates a QoS (Quality of Service) utility to provide high quality
network support service.
Because it classifies outgoing packets based on policies defined by users, real-time applications
should respond or perform better.
QoS Setup
The following web page instructs you on setting up and enabling QoS.
Page 66
Policy Configuration
Setting the QoS policy can allocate Inbound/Outbound bandwidth (based on your configuration) to
pass through this device. You can define some policies which classify received packets based on
Local/Remote IP, MAC, port and protocol type. This feature is useful when the WAN link is very busy
or congested or when using special applications that need real time services such as Internet phone,
video conference...etc.
Page 67
Setup Bandwidth Control QoS Example
The following is teaching you how to setup bandwidth control QoS.
( A)
* 51200 k bit/Sec is the maximum bandwidth that device CPU can handle.
1. First, you have to “Enable” QoS, once you have enabled it. It will start QoS mechanisms.
2. From now on, you can dispatch the network bandwidth (inbound /outbound) to the WAN ports.
By default, the device dispatches each WAN port for inbound & outbound is 6400 kbit/sec
(51200/8)=6400 kbit/Sec. However, your local ISP provides the real bandwidth for each WAN
bandwidth. Therefore, you fill-out the inbound & outbound bandwidth that your local ISP offer to you.
3. Once you fill-out each WAN port bandwidth, then you can move to the next step, setting up each
WAN port inbound/outbound bandwidth policy.
Page 68
(B)
Page 69
8: Management Assistant
Overview
The following advanced features are provided:
Admin. Setup
Email Alert
SNMP
Syslog
Upgrade Firmware
This chapter contains details of the configuration and use of each of these features.
Page 70
Admin. Setup
Remote Access Configuration – This feature allows you to manage the Multi-WAN VPN Router via
the Internet. You can restrict access to a specified IP address or address range.
Administrator Password – This feature allows you to assign a password for remote upgrade and
access to the Multi-WAN VPN Router.
Page 71
Using Remote Web-based Setup
To connect to the Multi-WAN VPN Router from a remote PC via the Internet:
1. Ensure that both your PC and the Multi-WAN VPN Router are connected to the Internet.
2. Open your Web Browser.
3. In the "Address" bar, enter "HTTP://" followed by the Internet IP Address of the Multi-WAN VPN
Router. If the port number is not 80, then the port number is also required. (After the IP Address,
enter ":" followed by the port number.)
e.g.
HTTP://123.123.123.123:8080
This example assumes that the WAN IP Address is 123.123.123.123 and the port number is
8080.
If using the Dynamic DNS feature, you can connect using the domain name allocated to you.
e.g.
HTTP://my_domain_name.dyndns.org:8080
Management password
Enter the desired password, re-enter it in the Verify Password field, then save it.
When you connect to the Multi-WAN VPN Router with your Browser, you will be prompted for the
password when you connect, as shown below:
Page 72
Email Alert
This feature will send a warning Email to the system administrator when any WAN port is
disconnected, has received excessive ping flooding, exceeded session limitation, etc.
Page 73
SNMP
This section is only useful if you have SNMP (Simple Network Management Protocol) software on
your PC. If you have SNMP software, you can use a standard MIB II file with the Multi-WAN VPN
Router.
Settings – SNMP
System Contact Person – The name of the person responsible for this device.
Information
Device name – The name of this device.
Physical Location – The location of the device.
Community Community Name – This is a password or key used between this device and
the management station. The administrator/manager must use the same
name when monitoring the device.
Access Control – Access privileges which allow the management station to
manage this device. This value may be: Read/Write, Read Only or No Access.
Trap Targets Enter the IP addresses of any targets (PCs running SNMP software) to which you
want traps to be sent. All traps are level 1.
Page 74
Syslog
This feature can send the real time system information to a web page or to specified PCs.
Syslog Configuration – Syslog Configuration allows you to select whether to send the system
information to another machine or not. Up to three machines can be chosen to send the system log to.
Message Status – Messages are only sent and kept when “Keep Sent Message” is enabled.
Currently 100 messages are retained in RAM and will be cleared when the system is rebooted or
powered off.
Page 75
Settings – Syslog
Syslog Delivery Sending Out – Set to “Enable”, if you want to send system log messages
to other machines (PCs).
Keep Sent Message – If set to Enable, it means you want to keep sent
messages; otherwise the sent messages will be deleted.
Syslog Server – Up to 3 syslog servers can be used.
IP Address: The IP address(es) of the syslog server(s) that you want to
send to.
Port: If your syslog server does not use the default port, you can
change it.
Log Priority Level: The syslog messages are divided into 8 levels from
Emergency to Debug. The lower the level, the more messages will be
generated. Emergency is the highest priority level and Debug is the
lowest.
Log Priority for By pressing the “Expand” button, selection can be made as to which syslog
Modules module and level should be sent to the syslog server. You can arrange all items
on a line by pressing the “Collapse” button.
SNTP (Simple SNTP is an Internet protocol to synchronize the computer (device) clock. You
Network Time can select your location from the pull-down menu and fill in the SNTP server‟s
Protocol) IP address. The local clock will then synchronize with your device which
Configuration updates with the correct time received from the SNTP server, then adds the
Time Zone.
Page 76
Upgrade Firmware
The Upgrade Firmware Screen allows you to upgrade the firmware or backup the system
configuration.
You can backup your system configuration by pressing the Save System Configuration “Save”
button. This will save the system configuration for future use.
You also can upgrade the firmware by inputting the correct password, browsing to the firmware
upgrade file and then pressing the “Upgrade” button. Do not reset or restart the device while
updating the firmware as this may cause the system to crash.
Pressing the “Factory Settings” button will reset the configuration data to its default value.
Page 77
9: Network Info
Operation
Once the Multi-WAN VPN Router and the PCs are configured, operation is automatic.
However, there are some situations where additional Internet configuration may be required.
Refer to Chapter 4 - Advanced Setup for further details.
System Status
Use the System Status link on the main menu to view this screen.
Page 78
Data – System Status
WAN Interface Connection Type – The type of connection used – DHCP, Fixed IP, PPPoE
or PPTP.
Connection Status – Either "Connected" or "Disconnected”.
"Force Renew" button– Only available if using a dynamic IP address
(DHCP). Clicking this button will perform a DHCP "Renew" transaction with
the ISP's DHCP server. This will extend the period for which the current
WAN IP address is allocated to you.
Connect/Disconnect – Used for dial-up/connection of PPPoE or PPTP.
IP Address – The IP address of the Multi-WAN VPN Router, as seen from
the Internet. This IP Address is allocated by the ISP (Internet Service
Provider).
Subnet Mask – The Network Mask (Subnet Mask) for the IP Address above.
Domain Name IP Address – The address of the current DNS (Domain
Name Server)
Gateway – The address of the Multi-WAN VPN Router gateway.
MAC Address – The MAC (physical) address of the Multi-WAN VPN
Router, as seen from the Internet.
LAN Interface IP Address – The LAN IP Address of the Multi-WAN VPN Router.
Subnet Mask – The Network Mask (Subnet Mask) for the IP Address above.
MAC Address – The MAC (physical) address of the Multi-WAN VPN
Router, as seen from the local LAN.
DHCP Server – The status of the DHCP Server function - either "Enabled"
or "Disabled".
Device Hardware ID – The manufacturers ID for this particular device.
Information
Firmware Version – Version of the Firmware currently installed.
NAT – Status of the NAT feature – either “Enable” or “Disable”.
Load Balance – Status of the Load Balance feature – either “Enable” or
“Disable”.
Virtual Server – Status of the Virtual Server feature – either "Enabled" or
"Disabled".
Special Applications – Status of the Special Applications feature – either
"Enabled" or "Disabled".
Multi DMZ – Status of the Multi DMZ feature – either "Enabled" or
"Disabled".
Block URL – Status of the Block URL feature – either “Enable” or “Disable”.
Page 79
Device System UpTime – The time since the device system was last reinitialized.
Statistics
CPU Usage – The current CPU percentage usage.
Memory Heap – The current Memory percentage usage (Heap & Queue).
Packet Queue – The current Packet Queue percentage usage.
Buttons Refresh – Updates the on-screen data.
Restart – Restarts (reboots) the Multi-WAN VPN Router.
Restore Factory Defaults – This will delete all existing settings and restore
the factory default settings. See below for details.
When the "Restore Factory Defaults" button on the Status screen above is clicked, the following
screen is displayed:
Page 80
WAN Status
Use the WAN Status link on the main menu to view this screen.
Page 81
Appendix A - Specification
Technical Specification
Networking Management
Standards Compliance Management via WAN & LAN port
IEEE 802.3 10BaseT Ethernet
HTTP web based management
IEEE 802.3u 100Base-TX Fast Ethernet
SNMP
Ports
WAN: 4 x Auto-MDI/MDIX 10/100 Mbps RJ-45 ports E-mail Alert
Network: TCP/IP, HTTP, DHCP, DDNS, PPP, UPAP, Muti-session Support with H.323 VoIP products
PPPoE, ARP Proxy Mutu-session PPPoE
Security: NAT, UPAP, CHAP SMTP bind
Routing: Static Route; RIP I and II UPnP
Connection: Static/Dynamic IP; PPPoE, PPTP; Virtual server
VPN Multi-DMZ
PPTP & IPSec Pass Through Dynamic DNS
IPSec Tunnels: 40 NAT status & connection list & alias
Encryption: DES, 3DES, AES (128/193/256-bit) MTU changeable for WAN
Authentication: MD5, SHA1, SHA2 (256/384/512-bit) Dial-on-demand & Auto-disconnect
Manual Key & IKE (Internet Key Exchange) MAC address clone
Load Balance (Mesh Group) Transparent Bridge Mode
Firewall DNS Loopback
NAPT (Network Address Port Translation) Any IP on LAN
DoS (Denial of Service) SNTP
Access Control by Group Hardware
Ping to Death CPU
Port Scan CAVIUM NITROX 166MHz
RAM/ROM
SPI(Statefule Packet Inspection)
32MB/2MB
ICMP Filter for WAN LEDs
Packet Filter System power and status indicator
URL Block System activity and Network link indicator
Session Limit Microphone status indicator
System Filter Exception Power
AC100~240V
QoS Temperature
Policy Priority set by source and destination IP, source and Operating: 0°C -40°C (32°F -102°F)
destination MAC address, and service types
Storage: -10°C -70°C (-4°F -158°F)
Security Humidity
Admin passwords Operating: 85% (RH)
Dimension
Authenctication with UPAP and CHAP for PPPoE
427mm(L) * 155mm(W) * 44mm(H)
Firmware Upgrade EMI and Safety
HTTP web based download FCC, CE
TFTP download
Page 82
Appendix B - Windows TCP/IP Setup
Overview
If using the default Multi-WAN VPN Router settings and the default Windows
95/98/ME/2000 TCP/IP settings, no changes need to be made.
By default, the Multi-WAN VPN Router will act as a DHCP Server, automatically providing a
suitable IP Address (and related information) to each PC when the PC boots.
For all non-Server versions of Windows, the default TCP/IP setting is to act as a DHCP client.
If you wish to check your TCP/IP settings, the procedure is described in the following sections.
If your LAN has a router, it must be reconfigured by the LAN Administrator.
Page 83
Figure B-2: IP Address (Win 95)
Ensure your TCP/IP settings are correct as follows:
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting.
Restart your PC to ensure it obtains an IP Address from the Multi-WAN VPN Router.
Page 84
On the DNS Configuration tab, ensure Enable DNS is selected. If the DNS Server Search Order
list is empty, enter the DNS address provided by your ISP in the field beside the Add button, then
click Add.
Page 85
Figure B-6: TCP/IP Properties (Win 2000)
5. Ensure your TCP/IP settings are correct:
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting.
Restart your PC to ensure it obtains an IP Address from the Multi-WAN VPN Router.
Page 86
Figure B-7: Network Configuration (Windows XP)
Page 87
5. Ensure your TCP/IP settings are correct.
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting.
Restart your PC to ensure it obtains an IP Address from the Multi-WAN VPN Router.
Page 88
Appendix C - Troubleshooting
Overview
This chapter covers some common problems that may be encountered while using the Multi-WAN
VPN Router and some possible solutions to them. If you follow the suggested steps and the Multi-
WAN VPN Router still does not function properly, contact your dealer for further advice.
General Problems
Problem 1: Can't connect to the Multi-WAN VPN Router to configure it.
Solution 1: Check the following:
The Multi-WAN VPN Router is properly installed, LAN connections are OK,
and it is powered ON. By default, Port 1-2 of this device are WAN ports, the
others are LAN ports. Otherwise you have changed Maximum WAN ports.
Ensure that your PC and the Multi-WAN VPN Router are on the same network
segment. (If you don't have a router, this must be the case.)
If your PC is set to "Obtain an IP Address automatically" (DHCP client), restart
it.
If your PC uses a Fixed (Static) IP address, ensure that it is using an IP
Address within the range 192.168.1.2 to 192.168.1.254 and thus compatible
with the Multi-WAN VPN Router‟s default IP Address of 192.168.1.1.
Also, the Network Mask should be set to 255.255.255.0 to match the Multi-
WAN VPN Router. In Windows, you can check these settings by accessing
Control Panel-Network to check the Properties for the TCP/IP protocol.
Page 89
Internet Access
Problem 1: When I enter a URL or IP address I get a time out error.
Solution 1: A number of things could be causing this. Try the following troubleshooting steps.
Check if other PCs are working. If they are, ensure that your PC‟s IP settings
are correct. If using a Fixed (Static) IP Address, check the Network Mask,
Default gateway and DNS as well as the IP Address.
If the PCs are configured correctly, but still not working, check the Multi-WAN
VPN Router. Ensure that it is connected and ON. Connect to it and check its
settings. (If you can't connect to it, check the LAN and power connections.)
If the Multi-WAN VPN Router is configured correctly, check your Internet
connection (DSL/Cable modem etc.) to see if it is working correctly.
Problem 2: Some applications do not run properly when using the Multi-WAN VPN
Router.
Solution 2: The Multi-WAN VPN Router processes the data passing through it, so it is not
transparent.
Use the Special Applications feature to allow the use of Internet applications which
are not functioning correctly.
If this does solve the problem, you can use the DMZ function. This should work with
most applications, however:
It is a security risk, since the firewall is disabled for the DMZ PC.
Only one (1) PC can use this feature.
Page 90
FCC Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
(1) This device may not cause harmful interference.
(2) This device must accept any interference received, including interference that may cause
undesired operation.
Tested to comply with FCC Standards for Home or Office use.
CE Marking Warning
This is a Class B product. In a domestic environment this product may cause radio interference in
which case the user may be required to take adequate measures.
Page 91