Manuel d'utilisation / d'entretien du produit 30 du fabricant Billion Electric Company
Aller à la page of 209
BiGuard 30 iBusiness Security Gateway SMB User ’ s Manual V ersion Release 7.01 (FW:1.06p).
2 BiGuard 30 User’s Manual (Updated March 28, 2007) Copyright Information © 2007 Billion Electric Corporation, Ltd. The contents of this publication may n o t be reproduced in whole or in part, transcribed, stored, tr anslated, or transmi tted in any form or any means, without the prior written con sent of Billion Electric Corporation.
3 Safety Warnings Y our BiGuard 30 is built for reliability and long service life. For your safety , be sure to read and follow the fol lowing safety w arnings. • Read this installation guide thoroughly bef ore attempting to set up your BiGuard 30. • Y our BiGuard 30 is a complex electronic device.
4 Table of Contents Chapter 1: Introduction 1.1 Overview 1.2 Product Highlights 1.2.1 Increased Bandwidth, Scalability and Resilience 1.2.2 Virtual Private Network Support 1.2.3 Advanced Firewall Security 1.2.4 Intelligent Bandwidth Management 1.3 Package Contents 1.
5 2.6.1 General VPN Setup 2.6.2 VPN Planning - Fail Over 2.6.3 Concentrato r Chapter 3: Getting Started 3.1 Overview 3.2 Before You Begin 3.3 Connecting Your Router 3.4 Configuring PCs for TCP/IP Networking 3.4.1 Overview 3.4.2 Windows XP 3.4.2.1 Configuri ng 3.
6 4.2.5 IPSec Status 4.2.6 PPTP Status 4.2.7 Traffic Stati stics 4.2.8 System Log 4.2.9 IPSec Log 4.3 Quick Start 4.3.1 DHCP 4.3.2 Static IP 4.3.3 PPPoE 4.3.4 PPTP 4.3.5 Big Pond 4.4 Configuration 4.4.1 LAN 4.4.1.1 Ethernet 4.4.1.2 DHCP Server 4.4.1.3 LAN Address Mapping 4.
7 4.4.4.8 Email Alert 4.4.5 Firewall 4.4.5.1 Packet Filter 4.4.5.2 URL Filter 4.4.5.3 LAN MAC Filter 4.4.5.4 Block WAN Request 4.4.5.5 Intrusion Detection 4.4.6 VPN 4.4.6.1 IPSec 4.4.6.1.1 IPSec Wizard 4.4.6.1.2 IPSec Policy 4.4.6.2 PPTP 4.4.7 QoS 4.4.
8 5.2.3.3 Java Permissions 5.3 WAN Interface 5.3.1 Can’t Get WAN IP Ad dress from the ISP 5.4 ISP Connection 5.5 Problems with Date and Time 5.6 Restoring Factory De faults Appendix A: Product Specifications Appendix B: Customer Support Appendix C: FCC Interference Statement Appendix D: Network, Routing, and Firewall Basics D.
9 E.2 What is IPSec? E.2.1 IPSec Security Components E.2.1.1 Authentication Header (AH) E.2.1.2 Encapsulating Security Payload (ESP) E.2.1.3 Security Associations (SA) E.
10 E.2.3 Tunnel Mode AH E.2.4 Tunnel Mode ESP E.2.5 Internet Key Exchange (IKE) Appendix F: IPSec Logs and Events F.1 IPSec Log Event Categories F.2 IPSec Log Event Table Appendix G: Bandwidth Management with QoS G.1 Overview G.2 What is Quality of Service? G.
11 Chapter 1: Introduction 1.1 Overview Congrat ulations on purchasi ng BiGuard 30 R outer from Billion. Combining a router with an Ethe rnet network switch, BiGuard 30 is a stat e-of -the-art devi ce that provides everything yo u need to get your ne twork connected to the Internet ov er your Cable or DSL connection quickly and easil y .
12 connections are possible on BiGuard 30, with performance of up to 10 Mbps. 1.2.3 Advanced Firewall Security Aside from intelligent broadband sharing, BiGuard 30 offers in tegrated firewall protection with adv anced fe atures to secure y our network from outside attacks.
13 LED Function Power A solid light indicates a steady connection to a power source. Status A blinking light indicates the device is writing to flash memory. LAN 1 – 8 Lit when connected to an Ethernet device. 10/100M : Lit green when connected at 100Mbps.
14 Port Function 1 RESET To reset the device and restor e factory default settings, after the device is fully booted, press and hold RESET until the Status LED begins to blink. 2 WAN2 WAN2 10/100M Ethernet port (w ith auto crossover support); connect xDSL/Cable modem here.
15 1.3.4 Cabling Most Ethernet networks cu rrently use unshielded tw isted pair (UTP) cabling. The UTP cable contains eigh t conductors, arr anged in four twisted pairs, and terminated with an RJ45 t ype connector . One of the most common causes of networking problems is bad cabling.
16 Chapter 2: Router Applications 2.1 Overview Y our BiGuard 30 router is a versatile device t hat can be configured t o not only protect your network from malicious attack ers, but also ensure optimal usage of available bandwidth with Quality of Service (QoS) and both Inbound and Outbo und Load Balancing.
17 2.2.2 QoS Policies for Different Applications By setting differen t QoS policies according to the applicatio ns you are running, you can use BiGuard 30 to optimiz e the bandwidt h that is being used on your network.
18 low network laten cies to function properly . If bandwidth is being used by other applications such as an FTP server , users using V oIP will experience netw ork lag and/or service interruption s during use. T o avoid this scenario, this network has assigned V oIP with a guaranteed bandwidt h and higher priority to ensure smooth communications.
19 policies for differen t PCs on the network. Policy based traffic shaping lets you better manage your bandwidth, providing reliable In ternet and network service to your organization.
20 2.2.6 Management by IP or MAC address BiGuard 30 can also be configured to apply tr affic policies based on a particular IP or MAC address. This allow s you to quickly assign differen t traffic policies to a specific computer on the network.
21 DiffServ (a.k .a. DSCP Marking) allows you to classify t raffic based on IP DSCP v alues. Other interfaces can match tr affic ba sed on the DSCP markings. DSC P markings are used to decide how packets sho uld be tr eated, and is a useful tool to give precedence to varying t ypes of data.
22 In the above example, PC 1 (I P_192. 168.2.2 ) and PC 2 (IP_192.168.2.3) are connected to the Internet via W AN1 (I P_230 .100.100.1) on BiGuard 30. Sho uld WAN1 fai l, Outbound F ail Over tells BiGuard 30 to reroute outgoi ng traffi c to W AN2 (IP_213.
23 In the above example, PC 1 (I P_192. 168.2.2 ) and PC 2 (IP_192.168.2.3) are connected to the Internet via W AN1 (IP_230.1 00.100.1) and W AN2 (IP_213.10.10.2) on BiGuard 30. Y ou can co nfigure BiGuard 30 to balance the load of each WA N port with one of two mechanisms: 1.
24 In the above example, an FTP Server (IP_192.168.2.2) and an HT TP Server (IP_192.168.2.3) are connected to the I nternet via W AN1 (ftp.billion.dyndns.org) on BiGuard 30. A remote computer is trying to access these servers via the Internet. Under normal circumstances, the remote compu ter will gain access to the network via WAN1.
25 In the above example, an FTP server (IP_192.168.2.2) and an HT TP server (IP_192.168.2.3) are connected to the I nternet via W AN1 (www.billion2.dyndns.org) an d W AN2 (www.billion3.dyndns.org) on BiGuard 30. Re mote PCs are attempting to access the serv ers via the Internet.
26 DNS Inbound is a three step process. First, a DNS request is made to the router via a remote PC. BiGuard 30, based on sett ings specified by the user , will direct the requesting PC to the correct W AN port by replying the selected W AN IP address through the bui lt-i n DNS server .
27 In the above example, an FTP Server (IP_192.168.2.2) and an HT TP Server (IP_192.168.2.3) are connected to the I n ternet via W AN1 (IP_200.20 0.200.1) on BiGuard 30. A remote computer is trying to access these servers via the Internet, and makes a DNS request.
28 In the above example, an FTP server (IP_192.168.2.2) and an HT TP server (IP_192.168.2.3) are connected to the I nternet via W AN1 (IP_200.200.200.1) and WAN2 (IP_1 00.100.100.1) on BiGuard 30. R e mote PCs are attempting to access the servers via the Internet by making a DNS request, entering a URL (www.
29 In the example above, the client is making a DNS reques t. The request is sent to the DNS server of BiGuard 30 through WAN2 (1). W AN2 will route th is request to the embedded DNS server of BiGu ard 30 (2). BiGuard 30 will analyze the bandwidth of both WAN1 and W AN2 and decide which WAN IP to repl y to the request ( 3).
30 The following section discusses Virtual Private Networking with BiGuard 30. 2.6.1 General VPN Setup There are typically thr ee different VPN scenarios. The first is a Gateway to Gateway setup, where two remote gatewa ys communicate o ver the Internet vi a a secure tunnel.
31 planning. The foll owing sections de monstrate the va rious wa ys of using BiGuard 30 to setup your VP N. 2.6.2 VPN Planning - Fail Over Configurin g your VPN with F ail Over allow s BiGuard 30 to automatically def ault to W AN2 should W AN1 fai l.
32 Configurin g BiGuard 30 for F ail Over provides added reliability to your VPN. 2.6.3 Concentrato r The VPN Concentr ator provides an easy way for branch offices to connect to headquarter through a VPN tunnel . All br anch office tr affic will be redirected to the VPN tunnel to headquarter with the exceptio n of LAN-side tr affic.
33 Chapter 3: Getting Started 3.1 Overview BiGuard 30 is designed to be a powe rful and flexible network device that is also easy to use. With an intu itive web-based configu ration, BiGuard 30 allows.
34 password for security reason. 4. Prepare to physically connect BiGuard 30 to Cable or DSL modems and a computer . Be sure to also review the Safety Warn ings located in the preface of this m anual before working with your BiGuard 30. 3.3 Connecting Your Router Connecting BiGuard 30 is an easy three-step process: 1.
35 3.4 Configuring PCs for TCP/IP Networking Now that your BiGuard 30 is connected properly t o your network, it’s time to configure your net worked PC s for T CP/IP networking. In order for your network ed PCs to communi cate with your router , they must have the following characteristics: 1.
36 - Mac OS 7 and later If you are using Windows 3.1, you must pu rchase a third-party TCP/IP application package. Any T CP/IP capable workstation can be used to communicate wi th or through BiGuard 30. T o configure other types of workstations, please consult the manufacturer’ s documentation.
37 3. Select Internet Protocol (TCP/IP) and click Properties . 4a. T o have your PC obtain an IP address au tomatically , select t he Obtain an IP.
38 address automaticall y and Obtain DNS server address aut omatically rad io buttons. 4b. T o manually assign your PC a fix ed IP address, select the Use the followin g IP address r adio button a nd enter your desired IP ad dress, subnet mask, and default gateway in the blanks provided.
39 3.4.2.2 Verifying Settings T o verify your setting s using a command prom pt: 1. Click Start > Programs > Accessories > Command Prompt . 2.
40 - An IP address between 192.168.1.1 and 192 .168.1.253 - A subnet mask of 255.255.255.0 T o verify your setting s using the Windows XP GUI: 1. Click Start > Settings > Network Connections .
41 2. Right click one of the networ k connections listed and select Status from the pop-up menu. 3. Click the Support tab ..
42 If you are usi ng BiGuard 30’ s defaul t settings, yo ur PC should: - Have an IP address be tween 192.168.1.1 and 192.168.1.253 - Have a subnet mask of 255.255.255.0 3.4.3 Windows 2000 3.4.3.1 Configuring 1. Select Start > Settings > Cont rol Panel .
43 2. In the Cont rol Panel window , double-click Network and Dial-up Connections . 3. In Network and Dial-up Connections, double -click Local Area Connection .
44 4. In the Local Area Connection window , click Properties . 5. Select Internet Protocol (TCP/IP) and cl ick Properties ..
45 6a. T o have your PC obtain an IP address au tomatically , select t he Obtain an IP address automaticall y and Obtain DNS server address aut omatically rad io buttons.
46 7. Click OK to finish the configurati on. 3.4.3.2 Verifying Settings 1. Click Start > Programs > Accessories > Command Prompt ..
47 2. In the Command Pro mpt window , type ipco nfig and then press ENTER . If you are using BiGuard 30’ s default settings, your PC should have: - An IP address between 192.
48 3.4.4 Windows 98 / Me 3.4.4.1 Installing Components T o prepare Windows 98/Me PCs for T CP/IP networking, you may need to manually install TCP/IP on each PC. T o do this, follow the steps below. Be sure to have your Windows CD handy , as you may need to insert it during the inst allation process.
49 Y ou mu st have the follow ing installed:.
50 - An Ethernet adapter - TCP/IP pr otocol - Client for Microsoft Networks If you need to in stall a new Ethern et adapter , follow these steps: a. Click Add . b. Select Adapter , then Add . c. Select the manufactu rer and model of your Ethernet adapt er , then click OK .
51 If you need TCP/IP: a. Click Add . b. Select Protocol , then click Add ..
52 c. Select Microsoft . Æ TCP/IP , then OK . If you need Client for Microsoft Networks: a. Click Add ..
53 b. Select Client , then click Add . c. Select Microsoft . Æ Client for Microsoft Networks , and then click OK . 3. Re start your PC to a pply your changes.
54 2. In the Con trol Panel, double-click Network and choose the Confi guratio n tab..
55 3. Select TCP / IP > ASUSTek or the name of any Network Interface Card (N IC) in your PC and click Properties . 4. Select the IP Address tab and click the Obtain an IP address au tomatic all y radio butto n.
56 5. Select the DNS Conf igura tion tab and select the Disable DN S r adio button. 6. Click OK to apply the configurati on..
57 3.4.4.3 Verifying Settings T o ch eck the TCP/IP configuration, use the winipcfg.exe utility: 1. Select Start > Run . 2. T y pe winipcfg , and then click OK.
58 The window i s updated to show your settings. Us ing the defaul t BiGuard 30 settings, your PC should h ave: - An IP address between 192.168.1.1 and 192 .
59 ISP setting in W AN si te: Obtain an IP Address automatically ( DHCP Clie nt) DHCP server: DHCP server is enabled. Start IP Address: 192.168.1.100 End IP Address: 192.16 8.1.199 3.5.1 User Name and Password The default user name and passw ord are "admin" and "admin" respectively .
60 Before configurin g this device, you have to check with your ISP (Internet Service P r o v i d e r ) t o f i n d o u t w h a t k i n d o f s e r v i c e is provided such as D HCP , St atic IP , PPP oE, or PPTP .
61 If an ISP technician co nfigured yo ur computer or if you c onfigured it usi ng instructions prov ided by your ISP , you n eed to copy the configuration information from your PC’ s Network T C P/IP Properti es wi ndow before reconfiguring yo ur computer for use with B iGuard 30.
62 3. In the Network Connections window , right-click Local Area Connection and select Properties . 4. Select Internet Protocol (TCP/IP) and click Properties .
63 5. If an IP address , subnet mask and a Default gateway are shown, write down the information. If no address is present, your account’ s IP address is dynamically assigned. Click the Obtain an IP address automatically radio button. 6. If any DNS ser ver addresses are shown, write them down.
64 server address automa ti cally r adio button. 7. Click OK to save your changes..
65 3.7 Web Configuration Interface BiGuard 30 includes a W eb Configur ation Inte rface for easy administr ation via virtually any browser on your network. T o access th is interface, open your web browser , enter the IP address of your ro uter , which by default is 192.
66 Chapter 4: Router Configuration 4.1 Overview The W eb Configuration Interface makes it ea sy for you to manage your net work via any PC connected to it. On the W eb Configur atio n homepage, you will see the navigation pane l ocated on the left ha nd si de.
67 access the page after a user-defined period (5 minutes by default). The following sectio ns will show y ou how to configure y our router usin g the W eb Configurati on Interface. 4.2 Status The Status menu displays the v arious option s that have been se lected and a number of statistics about your BiGuard 30.
68 No.: Numbe r of the list. IP Address: A list of IP addresses of devices on yo ur LAN. MAC Address: The Media Access Co ntrol (MAC) addresses for each device on your LAN. Interface: The interface name (on the router) that this IP address connects to.
69 4.2.3 Session Table The NA T Session T able displays a list of current sessions for both inco ming and outgoing tr affic with protoc ol type, source IP , source port, destination IP and destination port, each page shows 10 sessions. No.: Numbe r of the list.
70 your network via D ynamic Host Confi gurati on Protocol (DHCP) . No.: Numbe r of the list. IP Address: A list of IP addresses of devices on yo ur LAN. Device Name: The host name (c omputer name) of the client. MAC Address: The MAC address of cl ient.
71 4.2.6 PPTP Status The PPTP Status wi ndow displa ys the status of the PPTP T unnels that are currently configured on your BiGuard 30. Name: The name yo u assigned to t he particular PPTP entr y . Enable: Whether t he PPTP connection is cu rrently Enable or Disable.
72 WAN1: T ransmitted (Tx) and Received (Rx) bytes and packets for WAN1. WAN2: T ransmitted (Tx) and Received (Rx) bytes and packets for WAN2. Display: Allows you to change the units of me asurement for the tr affic gr aph. 4.2.8 System Log This window displays BiGuard 30’ s System Log entries.
73 Re fresh: R efresh the IPSec Log. Clear Log: Clear the IPSec Log. Send Log: Send IPSec Log to your email account. Y ou can set the email address in Configuration > System > Email Alert . See the Email Alert section for more details. Please refer to Appendix F: IPSec Log Events for more information on log events.
74 4.3.2 Static IP IP assigned by your ISP: Enter the assigned IP address from yo ur IP . IP Subnet Mask: Enter your IP sub net mask. ISP Gateway Address: Enter your ISP gatew ay address. Primary DNS: Enter your primary DNS. Secondary DNS: Enter yo ur secondary DNS .
75 4.3.4 PPTP Username: Enter your user name. Password : Enter your password. Re type Pas sword: R etype yo ur password. PPTP Clie nt IP: Enter the PPTP Client IP pro vided by yo ur ISP . PPTP Client IP Netmask: Enter th e PPTP Client IP N etmask provided by your ISP .
76 Username: Enter your user name. Password : Enter your password. Re type Pas sword: R etype yo ur password. Login Server: Enter the IP of the Lo gin server provided by your ISP . Click Apply to save y our changes. T o reset to defaul ts, click Reset .
77 4.4.1 LAN There are three items wi thin this section: Ethernet , DHC P Server and LAN Address Mapping. 4.4.1.1 Ethernet IP Address: Enter the internal LAN IP address for BiGuard 30 (192.168.1.254 by default). Subnet Mask: Enter the subnet ma sk (255.
78 4.4.1.2 DHCP Server In this menu, yo u can disabl e or enable the Dynamic Host Co nfigur ation Protocol (DHCP) server . The DHCP protocol allows your BiGuard 30 to dy namically assign IP addresses to PCs on your network if they are configured to aut omatically obtain IP addresses.
79 Name: Enter the name you want to give for the IP+Mac Address Fix ed Host account. Active: Select whether you wan t to Enable or Disable this particular Fixed Host account. IP Address: Enter the IP address that you w a nt to reserve for the above MAC address.
80 Please click Create to create a LAN Address Mapping rule. Name: Please input the name of the rule. IP Address: Please input the LAN Gate way I P Address you would lik e to use.
81 The W AN menu contains two items: ISP Settings , Bandwidth Settings and WAN IP Alias . 4.4.2.1 ISP Settings This W AN Servi ce T able displays th e different W AN conne ctions that are configured on BiGuard 30. T o edit any of these connections, click Edit .
82 Connection Meth od: Select how your router will connect t o the Internet. Selection s include Obtain an IP Address Automatically , Static IP Settings , PPPoE Settings , PPTP Settings , and Big Pond Settings . F or each WAN port, the factory default is DHCP .
83 and enter your primary and secondary DNS . RIP: T o activate RIP , select Send , Recei ve , or Both from the drop down menu. T o disable RIP , select Disa ble from the drop down menu. MTU: Enter the Max imum T ransmission Unit (MTU) f or your network.
84 would like to use router mode, you have to input the packet filter rules you wo uld like to forward in Configuration -> Firewall -> Packet filter Click Apply to save y our changes. T o reset to defaul ts, click Reset . 4.4.2.1.3 PPPoE Username: Enter your user name.
85 MAC Address: If your ISP requ ires you to input a WAN Ethern et MAC, check the checkbox and enter your MA C address in the blanks below . Candidates: Y o u can also select the MAC address from the list in the Candidat es. DNS: If your ISP requires you to manu ally setup DNS setting s, check the checkbox and enter your primary and secondary DNS .
86 PPTP Client IP Gateway: Ent er the PPTP Client IP Gateway provided by your ISP . PPTP Server IP: E nter the PPTP Serv er IP provided by your ISP . Connection: Select w hethe r the connection should Always Con nect or Trigger on Demand .
87 Username: Enter your user name. Password : Enter your password. Re type Pas sword: R etype yo ur password. Login Server: Enter the IP of the Lo gin server provided by your ISP . MAC Address: If your ISP requ ires you to input a WAN Ethern et MAC, check the checkbox and enter your MA C address in the blanks below .
88 bandwidth for each WA N port. W AN1: Enter yo ur ISP inbound a nd outbound b andwidth for W AN1. W AN2: Enter yo ur ISP inbound a nd outbound b andwidth for W AN2. NO TE: These values entered here are refe renced by both QoS and Load Balancing functions.
89 Name: Please input the name of the rule. IP Address: Please input the additional W AN IP address you would lik e to use. Interface: Please select th e W AN Interface that you would like to add the additional WAN I P t o. Click the Apply button to add the configur ation into the W AN IP Alias.
90 Mode: Y ou can select L oad Balance or F a il Over . Service Detection: En ables or disables the service detection feature. For fail over , the service detection fun ction is enabled.
91 Outbound Load Balancing on BiGuard 30 can be based on one of two methods: 1. By session mechanism 2. By IP address hash mechanism Choose one by clicking the corresponding r adio button. Based on Session Mechanism: The source IP address and destination IP address might go through WAN1 or W AN2 according to policy settings in this mechanism.
92 authenticate the source IP addres s. Balance by weight of lin k capacity: Uses an IP hash to balance tr affic based on weight of link ba ndwidth capaci ty . Balance by weight: U ses an IP hash to bal ance traffi c based on a r atio . Enter the desired ra tio into the blanks pro vided.
93 SOA: Domain Name: The domain name of DNS Server 1. It is the name that you register on DNS organizat ion. Y ou have to fill-out the Fu lly Qualified Do main Name (FQDN) with an ending character (a dot) for this text fiel d.
94 T o edit t he Host Mapping URL list, click Edit . This w ill open the Host Mapping URL table, which lists the c urrent Host Mapping UR Ls. T o add a host mapping URL to the list, click Create . Domain Name: The domain name of the local host. Host URL: The URL to be mapped.
95 Port R ange: The port r ange of all incomi ng packets are accepted and processed by a local host with the specif ied private IP address. Candidates: Y o u can also select the Ca ndidates which are referred from t he ARP table for automatic input. Name1: The Alias Host URL Name2: The Alias Host URL Click Apply to save your c hanges.
96 Interface: Choose which W AN port to use: W AN1, W AN2 Pack et T ype: The particular protocol of Internet traffic for the specified policy . Choose from TC P , UDP , or An y . Source IP R ange: All Source IP: Click it to specify all source IPs. Specified Source IP: Click to specify a sp ecific source IP address and source IP netmask.
97 4.4.4 System The System menu allows you to adjust a v ariety of basic router settings, upgr ade firmware, set up remote access, an d more. In this menu are the following sections: Time Zone , Remote Access , Firmware Upgrade , Backup /Res tore , Restart , Password , System Log an d E-mail Alert .
98 Time Z one: Select Enab le or Disable this f unction. Local Time Z one(+-GMT Time): Please select the time zone that belongs to your area. NTP Server Address: Please input the NTP serv er address you would lik e to use. Daylight Sa ving: T o hav e BiGuard 30 automaticall y adjust for Dayli ght Savings Time, please check the Automatic checkbo x.
99 Allow Re mote Access By: Everyone: Please check if you allow any IP addresses for the remote user to access. Only the PC: Please specify the IP A ddress that is allowed to access. PC from the subnet: Please specify th e subnet that is allowed t o access.
100 functionality , better reliability , and ensure trouble-f ree operation. T o upgrade your firmware, simpl y visit Billion’ s website ( http://www.billion.com ) and dow nload the latest firmware image file for BiGu ard 30. Next, click Browse and select the newly downloaded firmw are file.
101 T o rest ore a previously saved backup file, cl ick Browse . Y ou will be prompted to select a file from yo ur PC to restore. Be su re to only restore setti ng files that ha ve been genera ted by the Backup function, a n d that were created when using the same firmware version.
102 In order to prevent unauth orized access to your router ’ s configuration interface, it requires the admini strator to l ogin with a password. Y ou can change your pass word by entering your new password in both fields. Click Apply to save your c hanges.
103 activity . T o enable this functi on, select the Enable r adio button and enter your Syslog server IP addres s in the Log Server IP Address field. Click Apply to save your changes. T o disable this featur e, simply select the Disable r adio button and click Apply .
104 the five options: Immediately: The router will send an alert immediat ely . Hourly: The router will send an alert once ev ery hour . Daily: T h e r o u t e r w i l l s e n d a n a l e r t o n c e a day . The exact time can be specified using the pu ll down menu.
105 The Pack et Filter function is used to limit user access to ce rtain sites on the Internet or LAN. The Filt er T able displays all current filter ru les. If there is an ent ry in the Filter T ab le, you can click Edit to modify the setting of th is entry , click Delete to remove this entry , or click Move to change this entry’ s priority .
106 applications accessing your local n etwork from the In ternet. Outgoin g P acket Filter rules prevent unauthorized computers or a pplications accessing the Internet. Select if the new filter ru le is incoming or outgoin g. Source IP: Select An y , Subnet , IP Range or Single Address .
107 The URL Filter is a powerful t ool that can be used to limit access to certain URLs on the Internet. Y ou can block we b sites based on k eywords or even block out an e ntire domain. Certain web features ca n also be blocked to gr ant added security to your network.
108 Domains Filtering: Click the top checkb ox to enable this feature. Y ou can also choose to disable all web tr affic except for tr usted sites by clicking the bottom checkbox. T o edit t he list of filtered domain s, click Details. Enter a domain and select whether this domain is trusted or forbidden w ith the pull-down menu.
109 Enter a name for the IP Address and then enter the I P address itself . Click Ap ply to save your changes. The IP address will be ent ered into the Exception List, an d excluded from the URL f iltering rules in effect. 4.4.5.3 LAN MAC Filter LAN Mac Filter can decide that BiGuard will serve those dev ices at LAN side or not by MAC Address.
11 0 Create: Y ou can also input a specified MAC Add ress to be dropped or F orward without depending on the default rule. Rule: Enable or disable this ent ry . Action When Matched: Select to Drop or For ward the packet specified in this filter entry .
111 Blocking W AN requests is one w ay to prev ent DDOS attac ks by preve nting ping requests from the Internet . Use t his menu to enable or di sable function. 4.4.5.5 Intrusion Detection Intrusion Detection can prevent most common DoS attacks from the Internet or from LAN users.
11 2 Limit Maximum sessions per IP to (with reject an d dr op opti ons ): Jus t like the previous option, this option expands on w hat to do with additional sessions above the maximum limit. Y ou can either rej e ct the additional se ssions for a period of time or just drop all packets from those sessions for a period of time.
11 3 Connection Name: A user-defin ed name for the connection. Interface: Select t he interface the IP Sec tunnel will apply to. WAN1: Select interface WAN1 WAN2: Select interface WAN2 Auto: The devi ce will automatically apply t he tunnel to W AN1 or W AN 2 depending on which WAN interface is active when the IPSec tunn el is being established.
11 4 Secure Gateway Address (or Domain Name ): The IP address or hostname of the remote VPN gatewa y . Re mote Network: The subnet of the remote network. Allows y ou to enter an IP address and netmask. Back: Back to the Previous page. Next: Go to the next page.
11 5 Re mote Identifier: The Identifi er of the remote gatewa y . According to the input value, the ID type will be auto-defi ned as IP Address, FQDN(DNS) or FQ UN(E-mail). Re mote Network: The subnet of the remote network. Allows y ou to enter an IP address and netmask.
11 6 remote VPN device that is connected and establishes a VPN tunnel. Back: Back to the Previous page. Next: Go to the next page. (4)LAN to Mobile Host: BiGuard would lik e to establish an IPSec VP N tunnel with remote client software using Dynamic In ternet IP by using aggressive mode.
11 7 VPN Client IP Address: The VPN C lient Address for BiGuard VPN Client, this value will be applied on both remote I D and Remote Network as single address. Back: Back to the Previous page. Next: Go to the next page. After your confi gurati on is done, yo u will see a Configuration Summary .
11 8 4.4.6.1.2 IPSec Policy Click Create to create a new IPSec VPN connection account. Configuring a New VPN Connection.
11 9 Connection Name: A user-defin ed name for the connection. T unnel: Select Enable to activate this tunnel. Sel ect Disable to deacti vate this tunnel.
120 interface if Aut o is selected. Local: This section configures t he local host. ID: This is the ident ity type of th e local router or host. Choose from the following four options: WAN IP Add ress: Automatically use the current W AN Address as ID .
121 Any Local Address: Will enable any local address on the netw ork. Subnet: The subnet of the remote network. Selectin g this option allows you to enter an IP address and netmask. IP Ra nge: The IP Ra ng e of the remote netw ork. Single Address: The IP address of the remote host.
122 negotiation time. Diff ie-Hellman is a public-key cryptography protocol that allows two parties to establish a shar ed secret ov er the Internet. Pre-shared K ey: This is for the Intern et K ey Exchange (IKE) protocol. IKE is used to establi sh a shared security pol icy and authenticated k eys for services (suc h as IPSec) that require a key .
123 Local Subnet: Displays I P address and subnet of the local network. Re mote Subnet: Displays IP address and subnet of the remote netw ork. Re mote Gateway: This is the I P address or Domain Name of the remote VPN device that is connected and has an es tablished IPSec tunnel .
124 Connection Name: A user-defin ed name for the connection. T unnel: Select Enable to activate this tunnel. Sel ect Disable to deacti vate this tunnel. Username: Please input the userna me for this account. Password : Please input the password for this account.
125 The first menu screen gives you an overview of which WAN ports currently have QoS active, and the bandwidth settings for each. WA N1 Outbound: QoS Function: QoS status for W AN1 outbound. Select Enable to activ ate QoS for W AN1’ s outgoi ng traffi c.
126 Creating a New QoS Rule T o get started using QoS, you will need t o establish QoS rules. These rules tell BiGuard 30 how to handl e both incoming and outgoi ng tr affic. The followi ng example shows you how to configure WAN1 Outbound QoS. Configuring t he other traffic types follows the same process.
127 Interface: The current tr affic t ype. This can be W AN1 (ou tbound, inbound) and W AN2 (outbound, i nbound). Application: User defined appli cation name for the current rule . Packet Type: The type of packet this ru le applies to . Choose from Any , TCP , UDP , or ICMP .
128 Helper: Y ou could also select the application ty pe you would like to apply for automatic input. Click Apply to save your c hanges. For MAC Address: Source MAC Addre ss: The source MAC Address of the de vice this rule applies to. Candidates: Y ou can also select the Candidates whi ch are referred from the ARP table for automatic input.
129 ports to the PC on your netw ork running th e application. Y ou will also need to us e port forwarding if you want to host an onlin e game server .
130 table for automatic input. Select the Apply button to ap ply your change s. 4.4.8.2 Port Forwarding Table Because NA T can act as a "natural" Internet firewall, your router protect s you.
131 Application: User defined appli cation name for the current rule . Helper: Y ou could also select the application ty pe you would like to apply for automatic input. Protocol type: please select protocol type External Port: Enter the port number of the service that will be sent to the Internal IP address.
132 advantage of the more adv anced featur es of BiGuard 30. Users who do not understand the features shoul d not attempt to r econfigure their router , unless advised to do so by support sta ff . There are five items within the Adv anced section: Static Route , Dynamic DNS , Device Management , IGMP and VLAN Bridge .
133 Rule: Sele ct Enable to activ ate this rule , Disable to deactiv ate this rul e. Destination: This is the destination subnet IP address. Netmask: This is the subnet mask of the destination IP addresses base d on above destination subn et IP . Gateway: This is the gatewa y IP address to which pack ets are to be forwarded.
134 Y ou will first need t o register and establish an account with the Dyn amic DNS provider using their website, Example: DYNDNS http://www .dyndns.org/ (BiGuard 30 supports sever al Dynamic DNS providers , su ch as w ww .dynd ns.org , www .orgdns.org , www .
135 4.4.9.3 Device Management The Device Management Advan ced Configur ation settings allow you t o control your router’s security options and device monitoring features .
136 SNMP Function: Select Enable to activ ate this functi on, Disabl e to deactiv ate this function. SNMP V1 and V2 Read Community: In put the string for R ead community to match y our SNMP software. Write Community: Input the string for W rite community to match your SN MP software.
137 Click Apply to apply this f unc tion, and please note that the setting will become effective after y ou save to flash and restart th e router . 4.4.
138 Tagged Member port( s): Please check the interface th at y ou would lik e to use in this VLAN ID group. Untagged Member port(s): Please check the interface that you would like to use in this VLAN ID group.
139 Chapter 5: Troubleshooting 5.1 Basic Functionality This section deals with issues regarding your BiGuard 30’ s basic functions. 5.1.1 Router Won’t Turn O n If the Po wer and other LEDs fai l t.
140 or workstation. - Make sure that power is tur ned on to the connected hub or worksta tion. - Be sure you are using the correct cable. When connecting the firew all’ s Internet port to a cable or DSL modem, use the cabl e that w as supplied with the cable or DSL modem.
141 - Check the 10/100 LAN LEDs on BiGuard 30’ s front panel. One of these LEDs should be on. If they are both off , check the ca bles between BiGuard 30 and the hub or PC. - Check the correspondi ng LAN LEDs on y our PC’ s Ethernet device are on.
142 3. Make sur e that the Delete All O ffline Content checkbo x is checked, and click OK . 4. Click OK under Internet Options to close the dialogue. - In Windows, type ar p –d at the command p rompt to clear you computer’ s ARP table.
143 5.2.3.1 Pop-up Windows T o use the W eb Configuration Inte rface, you n eed to disable pop-up blocki ng. Y ou can either disable pop-up blocking, whic h is enabled by default in Windows X P Service Pack 2, or create an ex cept ion for your BiGuard 30’ s IP address.
144 3. Under Scripting , check to see if Active scripting is set to Enable . 4. Ensure that Scripting o f J ava applets i s set to Enabl ed . 5. Click OK to close the dialogue. 5.2.3.3 Java Permissions The following Java P ermissions should also be given for the W eb Configuration Interface to display properl y: 1.
145 4. Click OK to close the dialogue. NOTE: If Jav a from Sun Microsystems is installed, scroll d own to Java (Sun) and ensure that the ch eckbox is filled. 5.3 WAN Interface If you are ha ving problems with the W AN Interface, refer to the tips bel ow .
146 4. Check to see that the WA N port is properly connected to the ISP . If a Connected by (x) where (x) is yo ur connection method is not shown, your ro uter has not successfully obtained an IP address from your ISP . If an IP address cannot be obtained: 1.
147 If an IP address can be obtained, but yo ur PC cannot load an y web pages from the Internet: - Y our PC may not recognize DNS s erver addresses. Confi gure your PC manually with DNS addresses. - Y our PC may not hav e the router correctly confi gured as its T CP/IP ga teway .
148 Appendix A: Product Specifications Availability and Resilience - Dual- W AN ports - Load balancing for increased bandwi dth o f inbound and outbound tr affic - Automatic failo ver to redirect the pa cket whe n one broadband conne ction is broken. It will k eep your Internet connectio n alwa ys online whenever one connection should fail.
149 Firewall - Stateful P acket Inspe ction (SPI) and Denial of Service ( DoS) prevention - Pack et filter un- permitted inbound (W AN)/I nbound (LAN) Internet access by IP addre ss, port number and p.
150 Physical Interface Ethernet W AN 2 ports (10/100 Base- T), support Auto- Crossover (MDI/MDIX) Ethernet LAN 8 ports (10/100 Base- T) swit ch support Auto- Crossover (MDI/MDIX) Physical Specifications Dimensions: 18.98" x 6.54" x 1 .77" (482mm x 166 mm x 45mm, with Br acket) 9.
151 Appendix B: Customer Support Most problems can be solved by referring to the T roubleshooting section in the User’s Manual. If you cannot resolve the problem w ith the T roubleshootin g chapter , please contact the dealer wher e yo u purchased this prod uct.
152 Appendix C: FCC Interference Statement This device complies with Part 15 of FCC rules. Operation is subject to the follow ing two condition s: - This device may not c ause harmful interference. - This device must accept any interference received, includin g interference th at may cause undesired oper ations.
153 Appendix D: Network, Routing, and Firewall Basics D.1 Network Basics D.1.1 IP Addresses With the number of T CP/IP networks interconne cted across the globe, ensuring that transmitted data reaches the corre ct dest ination requires each computer on the Internet has a unique ident ifier .
154 back slash (/). F or example, a typica l Class C address could be written as 192.168.234.245/24, which means th at the net mask is 24 ones followed by 8 zeros. (11111111 11111111 11111111 00000000). D.1.1.2 Subnet Addressing Subnet addressing enables t he split of one IP network address into mu ltiple physical networks.
155 from these r anges. D.1.2 Network Address Translation (NAT) T raditionally , mult iple PCs that needed simult aneous Intern et access also required a range of IP addresses from the Internet Se rvice Provider (ISP). Not on ly was this method very costly , but t he number of available IP addresses for PCs is limited.
156 D.2 Router Basics D.2.1 What is a Router? A router is a device that forw ards da ta packets along netwo rks. A router is connected to at least two net works. Usua lly , th is is a LAN and a WAN that is connected to an ISP network. R outers ar e located at gateways, the places where two or more networks connect.
157 D.3 Firewall Basics D.3.1 What is a Firewall? Firewalls prevent un authoriz ed Internet users from accessing private networks connected to the Internet. All messages entering or leaving the int ranet pass through the fi rewall, whi ch examines each message and blocks those that do not meet the specified security criteria.
158 D.3.2 Why Use a Firewall? With a LAN connected to the Internet throug h a router , there is a chance for hackers to access or disrupt your networ k. A simp le NA T router provides a basic level of protection by sh ielding your network from the out side Internet .
159 Appendix E: Virtual Private Networking E.1 What is a VPN? A Virtual Private Network (VPN ) is a shared network where private data is segmented from other tr affic so that only the intended recipi ent has a ccess. It allows organizations to securely tr ansm it data over a publ ic medium like the Internet.
160 data authentication, inte grity , and confidentialit y as data is tr ansferred across IP networks. IPSec provides data security at the IP packet level, and protects against possible security risks by pr otecting data. IPSec is widely used to esta blish VPNs.
161 E.2.1.2 Encapsulating Security Payload (ESP) Encapsulating Security P ayload (ESP) pro vid es privacy for data through encryption. An encryption algorithm combi nes the data with a k ey to encrypt it. It then repackages the data using a speci al format, and tr ansmits it to the desti nation.
162 E.2.1.3 Security Associations (SA) Security Associations are a on e-way relationships between sender and receiver th at specify IPSec-related parameters. They provide data protection by using the defined IPSec protocols, and allow organizati ons to control according to the security policy in effect, wh ich resour ces may communicate securely .
163 T ransport Mode - This mode is used to provide data se cu rity between tw o networks. It provides protection for the entire IP packet and is sent by adding an outer IP header corresponding to the two tu nnel end-points. Since tunnel mode hides the original IP header , it provides security of the ne tworks with private I P address space.
164 E.2.4 Tunnel Mode ESP Here is an example of a packet with ESP applied: E.2.5 Internet Key Exchange (IKE) Before either AH or ESP can be used, it is necessary for the two communication devices to exchange a secret key that the security prot ocols themselves will use.
165 encryption, and is more vulnerable to Denial of Service attack s. Phase II, known as Quick M ode, establishes symmetrical IPSec Security Associations for both AH and ESP .
166 Appendix F: IPSec Logs and Events F.1 IPSec Log Event Categories There are three major categories of IPSe c Log Events for y our BiGuard 30. These include: 1.
167 Send Main mode second response message of ISAKMP Sending the main mode second response message. Done to exchange key values. Received Main mode second response message of ISAKMP Received the main mode second response message. Done to exchange key values.
168 Received Quick mode first response message Received the first response message of quick mode (Phase II). Done to exchange proposal and key values (IPSec). Send Quick mode second message Sending the second message of quick mode (Phase II). Received Quick mode second message Received the second message of quick mode (Phase II).
169 Received Delete SA payload: Deleting ISAKMP State ( integer ) (Main/Aggressive) mode peer ID is (identifier string) ISAKMP SA Established IPsec SA Established.
170 Appendix G: Bandwidth Management with QoS G.1 Overview In a home or office envi ronment, users cons tantly ha ve to transmi t data to and from the Internet. When too many are accessing the Internet at the same time, service can slow to a crawl, causing service interruption s and general frustration.
171 -Prioritizat ion: Assigns diff erent priority levels for diff erent applications, prioritizing traffic. Hi gh, Normal an d Low priority setting s. -Outbound and Inbound IP Throttling: Cont rols network tr affic and allows you to limit the speed of each application.
172 Application Data Ratio (%) Priority On-line games 30% High Skype 5% High Email 10% High FTP 20% Upload (High), Download (Normal) Other 35% G.4.2 Office Users QoS is also ideal for small businesses u sin g an office server as a web server .
173 Appendix H: Router Setup Examples H.1 Outbound Fa il Over Step 1: Go to Configur ation > WAN > ISP Settings . Select WAN1 and WAN2 and click Edit .
174 Step 3: Go to Configur ation > Dual W AN > Gener al Settings. Select t he Fail Over radio butto n. Under Connectivity Decision , input the num ber of times BiGuard 30 should probe the WAN before deciding that the ISP is in service or not (3 by default).
175 Please ensure the W AN ports are functioning by performing a ping oper ation on each before proceeding. Finally , choose whethe r or not BiGuard 30 should fail back to WAN 1 .
176 Step 2: Configure your WAN2 ISP settings and click Apply . Step 3: Go to Configuration > Dual WAN > Gener al Settings . Select the Load Balance radio button.
177 Step 4: Go to Configur ation > Dual WAN > Outbound Load Balance . Choose the Load Balance mechanism you want and click Apply . Step 5: Complete. T o check tr affic stati stics, go to Status > Tr affic Stati s tics . Step 6: Click Save Config to save all changes to flash memory .
178 H.3 Inbound Fail Over Configurin g your BiGuard 30 for Inbound Fail Over is a great way to ensure a more reliable connection for i ncoming requ ests. T o do so, follow these steps: NO TE: Before you begin, ensure that both W AN1 and W AN2 have been properly configured.
179 Step 2: Configure F ail Over options if necessary . Step 3: Go to Configuration > Adva nced > Dynamic DNS . Set the WAN1 DDNS settings..
180 Step 4: From the same menu, set the WAN2 DDNS settings. Step 5: Click Save Config to save all changes to flash memory ..
181 H.4 DNS Inbound Fail Over NO TE: Before proceeding, please ensure that both W AN1 and W AN2 are properly configured according to the sett ings provided by your ISP . If not, please refer to Chapter 4.2.2. 1 ISP Settings for details on h ow to configure your WAN ports.
182 Enable radio button an d configure DNS Server 1 by clicking Edit . Step 3: Input DNS Server 1 se ttings and click Ap ply . Step 4: Configure your Host URL Ma pping for DNS Server 1 by clicking Edit to enter the Host URL Mappings List. Click Create and input the settings for Host URL Mappings and click New .
183 Step 5: Click Save Config to save all changes to flash memory . H.5 DNS Inbound Load Balancing Step 1: Go to Configuration > Dual WAN > General Settings . Select the Load Built-in DNS 192.168.2. 2 192.168.2. 3 FTP HTTP 200.200.200.1 www .m ydomain.
184 Balance radio button. Step 2: Go to Configur ation > Dual WAN > Inbound Load Balance > Server Settings and configur e DNS Server 1. Step 3: Go to Configuration > Dual WAN > Inbound .
185 Mapping and configur e your FTP mappi ng. Step 4: Next configure your HTTP mapping. Step 5: Click Save Config to save all changes to flash memory .
186 H.6 Dynamic DNS Inbound Load Balancing Step 1: Go to Configuration > WAN > Bandwidth Settings. Configure your WA N inbound and outbound bandwidth. www.billion2.dyndns.org Remote Access from Internet www.billion3.dyndns.org www.billion3.dyndns.
187 Step 2: Go to Configuration > Dual WAN > General Settings and enable Load Balance mode. Y ou may then dec ide whether to enable Service Detection or not. Step 3: Go to Configur ation > Dual WA N > Outbound Load Balance . Choose your load balance policy and click Apply to apply your changes.
188 Step 4: Go to Configuration > Ad vanced > Dynamic DN S and input the dynamic DNS settings for W AN1 and W AN2. WAN 1 :.
189 WAN 2: Step 5: Go to Configuration > Virtual Se rver and set up a virtual server for both FTP a n d H T TP ..
190 Step 6: Click Save Config to save all changes to flash memory . H.7 VPN Configuration This section outlin es some concrete examples on how you can co nfigure BiGuard 30 for your VPN.
191 Branch Office Head Office Local ID IP Address IP Address Data 69.121.1.30 69.121.1.3 Network Any Local Address Any Local Address IP Address 192.168.0.0 192.168.1.0 Netmask 255.255.255.0 255.255.255.0 Remote Secure Gateway Address(or Hostname) 69.121.
192 H.7.2 Host to LAN Single client Head Office Local ID IP Address IP Address Data 69.121.1.30 69.121.1.3 Network Any Local Address Any Local Address IP Address 0.0.0.0 192.168.1.0 Netmask 0.0.0.0 255.255.255.0 Remote Secure Gateway Address(or Hostname) 69.
193 Network Subnet Single Address IP Address 192.168.1.0 69.121.1.30 Netmask 255.255.255.0 255.255.255.255 Proposal IKE Pre-shared Key 12345678 12345678 Security Algorithm Main Mode; ESP: MD5 3DES PFS Main ESP MD5 3DES PFS H.8 IP Sec Fail Over (Gateway to Gateway) Before Fail Over After Fail Over 192.
194 Step 1: Go to Configuration > Dual WAN > General Settings . Enable F a il Over by selecting the Fail Over radio button. Then, configure your F ail Over policy . Step 2: Go to Configur ation > Advanced > Dy namic DNS and configure your dynamic DNS settings (Both W AN1 and W AN2).
195 Step 3: Go to Configur ation > VPN > IPSec > IPSec Policy . Click Create to configure VPN settings. Step 4: Click Save Config to save all changes to flash memory .
196 H.9 VPN Concentrator Step 1: Go to Configur ation > VPN > IPSec > IPSec Policy and confi gure the link from BiGuard 30 to BiGuard 10 Br anch A. 100.100.100. 1 200.200.200. 1 192.168.2.x 192.168.3.x 201.201.201. 1 192.168.4.x Local ID T ype: Subnet Local subnet: 0.
197 Step 2: Go to Configur ation > VPN > IPSec > IPSec Policy and confi gure the link from BiGuard 30 to BiGuard 10 Br anch B. Step 3: Go to Configur ation > VPN > IPSec > IPSec Policy and confi gure the connection from BiGuard 10 Branch A to BiGuard 30.
198 Step 4: Go to Configur ation > VPN > IPSec > IPSec Policy and confi gure the connection from BiGuard 10 Branch B to BiGuard 30. Step 5: Click Save Config to save all changes to flash memory . H.10 Protocol Binding Step 1: Go to Configuration > Dual WAN > General Settings.
199 Step 2: Go to Configur ation > Dual WA N > Protocol Binding and configure settings for WA N1. Step 3: Go to Configur ation > Dual WA N > Protocol Binding and configure settings for WA N2. Step 4: Click Save Config to save all changes to flash memory .
200 H.11 Intrusion Detection Intrusion Detection on Internet Internet Detected! Dropped BiGuard Safe!! Server Safe!! Hacker DoS Attack DoS Attack Hacker Hacker DoS Attack DoS Attack Step 1: Go to Configur ation > Firewall > Intrusion Detection and Enable th e settings.
201 Step1: Go to Configuration > VP N > PPTP and Enable the PPTP f unction, Click Apply . Step2: Click Create to create a PPTP Account. Step3: Click Apply , you can see the account is successfully created.
202 Step4: Click Save Config to save all changes to flash me mory . Step5: In Windows XP , go Start > Settings > Network Connections ..
203 Step6: In Netwo rk T asks , Click Create a new connection , and press Next. Step7: Select Connect to the net work at my workplac e and press Next .
204 Step8: Select Virtual Private Netw ork connection and press Next . Step9: Input the user-defined na m e for this connection and press Next ..
205 Step10: Input PPTP Server Address and press Next . Step11: Please press Finish ..
206 Step12: Double cl ick the connection, a nd input Username and Passwor d that defined in BiGuard PPTP Account Settings . PS. Y ou can also refer the Properties > Security page as below , by default.
207 H.13 PPTP Remote Access by BiGuard Internet Internet Internet Internet 100. 10 0.10 0.1 Headquarter BiGuard &PPTP S erver PPTP Tunnel Branch Office 200.
208 Step2: Click Create to create a PPTP Account. Step3: Click Apply , you can see the account is successfully created. Step4: Click Save Config to save all changes to flash me mory .
209 Step5: In another BiGuard as Client, Go to Configur ation > WAN > ISP Settings . Step6: Click Apply , and Save CONFIG ..
Un point important après l'achat de l'appareil (ou même avant l'achat) est de lire le manuel d'utilisation. Nous devons le faire pour quelques raisons simples:
Si vous n'avez pas encore acheté Billion Electric Company 30 c'est un bon moment pour vous familiariser avec les données de base sur le produit. Consulter d'abord les pages initiales du manuel d'utilisation, que vous trouverez ci-dessus. Vous devriez y trouver les données techniques les plus importants du Billion Electric Company 30 - de cette manière, vous pouvez vérifier si l'équipement répond à vos besoins. Explorant les pages suivantes du manuel d'utilisation Billion Electric Company 30, vous apprendrez toutes les caractéristiques du produit et des informations sur son fonctionnement. Les informations sur le Billion Electric Company 30 va certainement vous aider à prendre une décision concernant l'achat.
Dans une situation où vous avez déjà le Billion Electric Company 30, mais vous avez pas encore lu le manuel d'utilisation, vous devez le faire pour les raisons décrites ci-dessus,. Vous saurez alors si vous avez correctement utilisé les fonctions disponibles, et si vous avez commis des erreurs qui peuvent réduire la durée de vie du Billion Electric Company 30.
Cependant, l'un des rôles les plus importants pour l'utilisateur joués par les manuels d'utilisateur est d'aider à résoudre les problèmes concernant le Billion Electric Company 30. Presque toujours, vous y trouverez Troubleshooting, soit les pannes et les défaillances les plus fréquentes de l'apparei Billion Electric Company 30 ainsi que les instructions sur la façon de les résoudre. Même si vous ne parvenez pas à résoudre le problème, le manuel d‘utilisation va vous montrer le chemin d'une nouvelle procédure – le contact avec le centre de service à la clientèle ou le service le plus proche.