Corega COR-BAR-AWLA-54 User Manual Download Page 13

11

2. 

IP Address:

Selecting this item allows only the specific PC with the IP address you enter in the IP field to the Tunnel.

Figure 17. Restricting IP Access

Refer to the above figure as an example. Only the PC with IP Address 192.168.1.101 will have the access from the local side of Tunnel. Similarly, only the PC with IP 
Address 192.168.2.51 can access the Tunnel from the other end.

3. 

IP Range:

Selecting this item allows a specific group of PCs access to theTunnel.

Figure 18. Multiple IP Access

Refer to the above figure as an example. Only the PCs with the IP addresses between 192.168.1.2 and 192.168.1.200 can access the local side of the Tunnel. 
Similarly, PCs with IP Address between 192.168.2.2 and 192.168.2.100 can access the Tunnel from the other end.

4. 

Host: 

If you select “Host”, the value set here should be the same as the Remote Security Gateway setting.

5. 

Any:

When this option is selected, the router accepts remote requests from any IP address, such as mobile users or telecommunications device using dynamic IP 

address. Note that the router cannot initial VPN connection when “Any” is selected as Remote Security Group,

Remote Security Gateway:

Defines the end point of VPN Tunnel at the other side of the internet. The remote VPN Tunnel end point can be either a:

-

VPN Router, 

-

VPN Server, 

-

Host with VPN software. 

For example, if the VPN device at the other end of the Tunnel is a VPN router, enter the WAN IP Address of that VPN router in this section. For more detail, refer to the 
description of “

Example - establish the VPN connection

” on the next few pages.

IP Address:

Use IP Address to identify the remote VPN Tunnel end point.

FQDN:

Use domain name to identify the remote VPN Tunnel end point.

Any:

Accepts remote requests from any IP address. Note that the router cannot initial VPN connection when “Any” is selected.

Encryption:

This gives the VPN connection added security. There are two different types of encryption: “

DES

” or “

3DES

”. Both ends of the Tunnel must use the 

same encryption type

. You may also choose to disable encryption by selecting “

Disable

”.

Authentication:

This item adds another level of security. There are two types of authentication: “

MD5

” and “

SHA

”.  Both ends of the Tunnel must use the same 

authentication type

. You may also choose to disable authentication by selecting “

Disable

”.

Key Management:

For encryption to work, both ends of the Tunnel need to know the encryption key. By using the 

Key Management 

drop down list, you can 

choose two of two methods to set the Encryption Key: “

key

”: 

Auto (IKE)

or 

Manual

. Both ends of the Tunnel must use the 

key management

.

Figure 19. Key Management

With 

Auto (IKE)

, users must enter a series of characters in the “

Pre-shared Key

” field. In the example shown in the figure above, the word 

Test

has been used. 

The program will automatically generate the correct codes to be used in the encryption and authentication based on the word you entered. You may use any 
combination of up to 23 alphanumeric characters in this field. No special characters or spaces are allowed.

ENGLISH

Summary of Contents for COR-BAR-AWLA-54

Page 1: ...LECTRIC SHOCK HAZARD Install product in accordance with local and National Electrical Codes To de energise equipment disconnect the power cord D Warnhinweise STROMSCHLAGGEFAHR Dieses Produkt muss ents...

Page 2: ...ADSL WIRELESS 802 11g 54MBPS ROUTER HUBS SWITCHES ADAPTERS WIRELESS LAN USB KVMs MEDIA CONVERTERS ROUTERS ADSL COR BAR AWLA 54 COR BAR AWLB 54 ALL IN ONE ROUTER...

Page 3: ...CONFIGURATION 14 4 4 WEB CONTROL 15 4 5 TIME OF DAY ToD CONTROL 15 4 6 ACCESS CONTROL 16 4 7 VIRTUAL SERVER SETTINGS 17 4 8 SPECIAL APPLICATIONS 19 4 9 DMZ HOST 19 4 10 DYNAMIC ROUTING 20 4 11 STATIC...

Page 4: ...es without notice and does not represent a commitment on the part of vendor No warranty or representation either expressed or implied is made with respect to the quality accuracy or fitness for any pa...

Page 5: ...apter The front panel of the router is shown in Figure 3 Figure 3 Front Panel Power 0ff No power applied Green Power to the router Diag Transaction Red Glows when the router performs a self test on po...

Page 6: ...I VCI Operating Mode LLC Encapulation with Dynamic IP LLC Encapulation with Static IP Gateway Classical IP PPPoE PPPoA Router using Classical IP PPP Authentication Login Name Password Depending on you...

Page 7: ...f the router This is the address that is used to configure the router The default values are 192 168 1 1 for IP Address and 255 255 255 0 for Subnet Mask Changing this factory default setting is optio...

Page 8: ...ton Four 64 bit encryption keys or one 128 bit encryption key will be created automatically You can enter the WEP key manually You may need to enter the WEP key manually to join the existing wireless...

Page 9: ...disconnection because the system on the ISP site may need a little time to restore You may need to check with your ISP to find out how much time is required before the router can start to re build th...

Page 10: ...ons 1 You want to employ NAT NAT allows you to use a single IP address as the external one to share internet access for all of your PCs as well as protect them from outside intruders 2 Your ISP uses C...

Page 11: ...apply for the service However as you have chosen to make this device act as an modem you have to know how to configure your PCs When you have properly configured the Setup page click Apply You can now...

Page 12: ...y Number Note The Tunnel name set here does not always have to match the name used at the other end of the Tunnel However certain VPN applications require a Tunnel to have the same name at both ends o...

Page 13: ...e WAN IP Address of that VPN router in this section For more detail refer to the description of Example establish the VPN connection on the next few pages IP Address Use IP Address to identify the rem...

Page 14: ...oblem exists preventing the successful creation of the Tunnel In this case you should firstly ensure that your wiring is securely connected Next double check that correct values have been entered in t...

Page 15: ...sure security at the IP packet level Keep Alive Check the box to re establish the VPN Tunnel connection whenever it is dropped After the Tunnel has been created this function will keep the connection...

Page 16: ...ion to Disable Starting IP Address Enter a numerical value from 2 to 254 for the DHCP server to start at when assigning IP Addresses Number of Users Enter the maximum number of PCs that you want the D...

Page 17: ...y LAN PCs that will not be restricted by this rule Click the Apply button after making any changes or click the Cancel button to exit the screen without saving any changes 4 5 Time of Day ToD Control...

Page 18: ...e rule the PCs which have the MAC addresses matching in MAC field and their IP addresses matching in the Source IP field will be allowed blocked for certain applications Protocol Select the protocol t...

Page 19: ...of the router is set to the default value of 192 168 1 1 Ports Enter the desired service port numbers in the Ports fields You can specify the protocol type as TCP or UDP from the drop down list If you...

Page 20: ...numbers for incoming and outgoing data packets In this case you have to enter the port number used by the incoming data packets Protocol Specify the protocol type as TCP or UDP which is used by speci...

Page 21: ...ar applications Figure 33 Popular Application Port Numbers 4 9 DMZ Host The DMZ Host application allows unrestricted 2 way communication between a single LAN PC and other internet users or servers Thi...

Page 22: ...to five public IP addresses can be entered 2 Click the Apply button after making any changes or click the Cancel button to exit the screen without saving any changes 4 10 Dynamic Routing The Dynamic R...

Page 23: ...P Address and Subnet Mask of the destination LAN that the immediate LAN is to communicate with Taking the above diagram as an example enter 192 168 2 0 in the Destination LAN IP field and 255 255 255...

Page 24: ...Filter Enabled Yellow MAC Address have been blocked see MAC Filter Table Red MAC Address Filter Disabled Wireless Station MAC Filter This function allows you to restrict wireless users access to the i...

Page 25: ...tem so a system that allocates domain name such as www dyndns org provides an easier method If you type 66 37 215 53 or www dyndns org in the web browser s address bar the browser will show the same w...

Page 26: ...about this router or have the authority to change the configuration Also the administrator can define any specific community and configure its limits as Read Only or Read Write from the right side dro...

Page 27: ...or Static IP on the OnePage Setup page Device Status This section shows the connection information of the router The Modem status shows Up or Down to indicate that the router is connected or disconne...

Page 28: ...your ISP s outgoing e mail server You may find this information when you apply for e mail service from your ISP E mail Alert to Enter the e mail address you wish to send to Return Address Enter the e...

Page 29: ...o the latest version of firmware to keep your router up to date Before you upgrade the firmware you have to get the latest firmware and save it on the PC you use to configure the router Figure 46 Upgr...

Page 30: ...tion between the router and the destination device Chapter 6 0 Macintosh Setup This chapter provides information on using Macintosh computers in your network The instructions given here are for system...

Page 31: ...er 3 0 Internet Access section 3 3 To configure advanced settings see Chapter 4 0 Advanced Configuration 6 4 Adding router to Existing Network If the router is to be added to an existing Macintosh com...

Page 32: ...to verify the network connection Ping 127 0 0 1 to check the TCP IP stack of your computer Ping gateway IP Default 192 168 1 1 to check the internal link of network If you re not able to get to the we...

Page 33: ...users The router combines the following technologies to enable this function NAT Network address translation NAT is a technology which can create a private network domain behind a public IP It is usu...

Page 34: ...on configuring the Microsoft Windows 2000 server at the Microsoft website Microsoft KB Q252735 How to Configure IPSec Tunneling in Windows 2000 http support microsoft com support kb articles Q252 7 35...

Page 35: ...on key Perfect Forward Secrecy PFS and remember to check the PFS option on the Broadband VPN Router and then click the OK button 5 From the Authentication Methods tab click the Edit button 6 Change th...

Page 36: ...Addresses Domain names are used in URLs to identify particular web pages For example in the URL http www pcwebopedia com index html the domain name is pcwebopedia com DNS Short for Domain Name Server...

Page 37: ...ver standard telephone lines between devices from different manufacturers PPPoE Short for PPP over Ethernet relying on two widely accepted standards Ethernet and the Point to Point Protocol It s a com...

Page 38: ...ENGLISH 36 THIS PAGE IS INTENTIONALLY LEFT BLANK...

Page 39: ...37 ENGLISH THIS PAGE IS INTENTIONALLY LEFT BLANK...

Page 40: ...ENGLISH 38 THIS PAGE IS INTENTIONALLY LEFT BLANK...

Reviews: