background image

37 

3

3

.

.

6

6

.

.

4

4

 

 

 

 

U

U

r

r

l

l

 

 

F

F

i

i

l

l

t

t

e

e

r

r

 

 

 

Url Filter has been created to filter web traffic. For user wants to block access to unsuitable websites then this is the 

right place to be. You can block domains, URL´s or certain phrases with little effort. 

 

3

3

.

.

6

6

.

.

5

5

 

 

 

 

L

L

2

2

T

T

P

P

 

 

 

L2TP (Layer 2 Tunneling Protocol) is a tunneling protocol used to support VPNs. It doesn’t provide any encryption or 

confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. 

L2TP allows a PPP session to travel over multiple links and networks. PPP  is used to encapsulate IP packets from the 

user's PC or mobile device to the ISP, and L2TP extends that session across the Internet. 

 

Summary of Contents for VDTU2-R240W

Page 1: ...1 VDTU2 R240W VDSL2 802 11 WIRELESS ROUTER ...

Page 2: ...y and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct t...

Page 3: ...2 VDSL2 802 11 Wireless Router User Manual Version 1 0 August 2016 2016 All Rights Reserved The contents of this document are subject to change without any prior notice ...

Page 4: ...13 3 1 1 Web Configuration 13 3 1 2 Installation 13 3 1 3 Login via Web Browser 14 3 2 HOME 15 3 2 1 System Status 15 3 3 QUICK SETUP 15 3 3 1 LAN Settings 15 3 3 2 WAN Settings 16 3 3 3 Default Gateway 16 3 3 4 DNS 16 3 3 5 Wireless Settings 16 3 4 NETWORK 17 3 4 1 VDSL 17 3 4 2 LAN 18 3 4 3 WAN 19 3 4 4 Wireless 20 3 4 5 DNS Domain Name System 21 3 4 6 DHCP 22 3 4 7 NAT 22 3 4 8 Virtual Server 2...

Page 5: ...Name 42 3 7 2 User 42 3 7 3 CA 43 3 7 4 SNTP 44 3 7 5 SNMP 44 3 7 6 UPnP 45 3 7 7 Syslog 45 3 7 8 Telnet 46 3 7 9 SSH 46 3 7 10 Web 47 3 7 11 SambaServer 47 3 8 SHOW 48 3 8 1 Information 48 3 8 2 Syslog 49 3 8 3 Arplist 49 3 8 4 DHCP Client 50 3 8 5 CPU Information 50 3 9 STATUS 50 3 9 1 VDSL 50 3 9 2 Switch 51 3 9 3 Wireless 51 3 9 4 Statics 51 3 9 5 Samba 52 3 9 6 RouteTable 52 3 9 7 WWAN 52 3 1...

Page 6: ...5 3 10 2 ConfigTool 53 3 10 3 Ping 54 3 10 4 TraceRoute 55 3 10 5 Reboot 55 4 TERMINOLOGY 56 ...

Page 7: ... 802 11n technology it can deliver Wi Fi speed up to 300 Mbps and is perfectly suitable for triple play applications video voice and data VDSL2 Wi Fi Router is designed to meet the requirements of ISPs and carriers that intend to use one DSL device to cover end users in different loop range areas it provides a great flexibility for their end users to comply today s rapid changing Internet demands ...

Page 8: ...sensing and auto cross switch support IPV6 USB USB Host X 1 Wi Fi 802 11b g n and 2 X 2 dbi internal antennas RST Factory reset button and reboot button WPS WPS push button Power ON OFF switch DSL Compliance Support VDSL2 ADSL and ADSL2 ADSL multimode standards G dmt ITU G 992 1 Annex A B G lite ITU G 992 2 Annex A B G hs ITU G 994 1 G bond ITU G 998 1 Maximum rate 8 Mbps for downstream 1 Mbps for...

Page 9: ...oA Support Classical IP according to RFC 2225 formerly RFC 1577 Support PPPoA according to RFC 2364 Support PPPoE default according to RFC 2516 Support multiple levels of QoS WLAN Compliant with IEEE 802 11b 802 11g and IEEE 802 11n standards 2 4GHz configurable Up to 300 Mbps Wi Fi operation rate RF Output Power 15 1 5 dBm in 2 4 GHz 64 128 bit Wi Fi security with WPA WPA PSK PA2 WPA2 PSK Mixed W...

Page 10: ...ng queuing and scheduling 802 1p IP DSCP Firewall IPV6 Firewall Packet filtering URL filtering Parental control Routing Static routing and RIP v1 v2 RFC 1058 2453 Support IP TCP UDP ARP IGMP IP multicast and GMP proxy RFC 1112 2236 Network address translation NA PAT DNS relay and caching RFC 1034 1035 DHCP server IP precedence RFC 791 Firewall router Power AC voltage Input 100V 240V 10 Output DC 1...

Page 11: ... not have Ethernet connection LINK ACT2 On Ethernet cable is connected to LAN 2 Blink Transmit or received data over LAN 2 Off LAN 2 does not have Ethernet connection LINK ACT3 On Ethernet cable is connected to LAN 3 Blink Transmit or received data over LAN 3 Off LAN 3 does not have Ethernet connection LINK ACT4 On Ethernet cable is connected to LAN 4 Blink Transmit or received data over LAN 4 Off...

Page 12: ...crossover support IPV6 WPS WPS ON OFF switch USB 1 x USB Host ports DSL 1 x RJ11 Connector for VDSL2 ADSL2 2 2 3 3 W Wa al ll l M Mo ou un nt t I In ns st ta al ll la at ti io on n 2 2 4 4 P Po ow we er r C Co on nn ne ec ct ti io on n Make sure you are using the correct power source as the AC DC adaptor Inset the female end of power adaptor s cord into the power receptacle on the rear panel Conne...

Page 13: ...for eight seconds will cause the product loading the factory default setting and losing all of yours configuration When you want to change its configuration but forget the user name or password or if the product is having problems connecting to the Internet and you want to configure it again clearing all configurations press the Reset Button for eight seconds with a paper clip or sharp pencil ...

Page 14: ... parameters from PC Web Configuration recommended Internet Explorer 6 0 or later or Netscape Navigator 7 0 and later versions The recommended screen resolution is 1024 by 768 pixels 3 3 1 1 2 2 I In ns st ta al ll la at ti io on n This following guide is designed to lead users through Web Configuration of VDSL2 Wi Fi Router in the easiest and quickest way possible Please follow the instructions ca...

Page 15: ...is configuration system offers all monitoring and management features which allow users to access VDSL2 Wi Fi routers from anywhere on the network with a standard browser such as Internet Explorer or Firefox Step 1 User can use any common browsers such as Internet Explorer on your computer to connect the VDSL2 Wi Fi Router Then please type http 192 168 1 1 in the address bar of the browser Step 2 ...

Page 16: ...me and password in the next login process 3 3 2 2 H Ho om me e 3 3 2 2 1 1 S Sy ys st te em m S St ta at tu us s 3 3 3 3 Q Qu ui ic ck k S Se et tu up p Quick Setup includes five sections guide users to setup their VDSL2 Wi Fi routers step by step The following sections show how to setup Enter the settings you want to configure and click on Apply to finalize the setup 3 3 3 3 1 1 L LA AN N S Se et...

Page 17: ...umn it allows users to connect to the service provider in the following chosen IP mode Static DhcpClient and Pppoe 3 3 3 3 3 3 D De ef fa au ul lt t G Ga at te ew wa ay y 3 3 3 3 4 4 D DN NS S 3 3 3 3 5 5 W Wi ir re el le es ss s S Se et tt ti in ng gs s This section allows users to configure the common Wireless parameters to all AP VAP in the system ...

Page 18: ...uto Channel Select Enable Select to enable the auto channel select function of the router Channel No The number of the channel Auth Mode To select the Auth mode WPA WPA2 WPA WPA2 WPA Key 12345678 Note 1 Device will reboot after apply Note 2 All Other configuration will be reset to default after apply 3 3 4 4 N Ne et tw wo or rk k 3 3 4 4 1 1 V VD DS SL L The default setting for VDSL Mode is auto ...

Page 19: ...network limited to the immediate area usually the same building or the same floor of a building The following section describes how to configure settings for the LAN port You can configure LAN settings of VDSL2 Wi Fi Router or add Virtual Interface LAN IP v4 Address and IP v6 Address on this page Click on Apply to finalize the configuration ...

Page 20: ...her network or the Internet It connects your private networks such as a LAN Local Area Network and other networks so that a computer in one location can communicate computers in other locations The WAN settings can be viewed in the column The following are the options available under WAN settings as shown Mtu The figure s range is from 266 to 1500 Wan Mode Bridge or Router mode IP Mode Options for...

Page 21: ...to perform tasks related to setting up and optimize your Wi Fi network It contains three parts Common SSID MAC Filter Common In the common column it includes following settings Objects Description Wifi Mode OFF or AP mode Region You may have a choice of frequency bands for your region Channel No The number of the channel Mode To select the Operational mode bgn b bg g gn Beacon Interval 100 RTS_CTS...

Page 22: ...erver translates hostnames or domain names to IP addresses Most ISPs provide a DNS server for speed and convenience Since your Service Provider may connect to the Internet with dynamic IP settings it is likely that the DNS server IP addresses are also provided dynamically However if there is a DNS server that you would rather use you need to specify the IP address below Then click on Apply to fina...

Page 23: ...central point and automatically sends a new IP address when a computer is plugged into a different place in the network The DHCP conditional server configuration page is effective only if DHCP mode in LAN settings page is set to Server or Relay Agent Click on check box OFF Server and Relay Then click on Apply to finalize the setting 3 3 4 4 7 7 N NA AT T NAT Network Address Translation is the tran...

Page 24: ...2 Wi Fi router as a virtual server so that remote users accessing services such as the Web or FTP at your local site via public IP addresses can be automatically redirected to local servers configured with private IP addresses In other words depending on the requested service TCP UDP port numbers the VDSL2 Wi Fi router redirects the external service request to the appropriate server located at ano...

Page 25: ...rom anywhere within the regional boundaries of cellular service Various computers can have integrated WWAN capabilities 3 3 4 4 1 10 0 D DM MZ Z D De em mi il li it ta ar ri iz ze ed d Z Zo on ne e In computer security DMZ demilitarized zone is a physical or logical sub network that contains and exposes an organization s external services to a larger un trusted network usually the Internet The ter...

Page 26: ...is experienced it does not automatically route around Although this is quite easy to configure it might not work for large and complicated networks It is important that any network administrator have substantial knowledge about static routes Although this type of route may not be as effective with large networks they are quite useful in any size of networks Meanwhile even if you have setup a dynam...

Page 27: ...Port Based VLAN You can also set Disable the VLAN function The VLAN Setup screen changes depending on whether you choose Tag Based VLAN type and Port Based VLAN types in this screen The IEEE 802 1Q defines the operation of VLAN bridges that permit the definition operation and administration of VLAN topologies within a bridged LAN infrastructure T Ta ag g B Ba as se ed d V VL LA AN N Click the Tag ...

Page 28: ...packet can only travel inside a member port when the member port is part of a VID port group Different VID groups aren t visible to one another VID Virtual LAN ID It is an definite number of ID which number is from 1 to 4094 PVID Port VID It is an untagged member from 1 to 4094 of default VLAN TCI Tag Control Information field including user priority Canonical format indicator CFI and VLAN ID TPID...

Page 29: ...orts VLANs then you should add this port to the VLAN as an untagged port Note VLAN tagged frames can pass through VLAN aware or VLAN unaware network Inter connection devices but the VLAN tags should be stripped off before passing it on to any end node host that does not support VLAN tagging VLAN Classification When the Router receives a frame it classifies the frame in one of two ways If the frame...

Page 30: ...rt should be members in the same VLAN The network administrator typically performs the VLAN assignment The port configuration is static and cannot be automatically changed to another VLAN without manual reconfiguration As with other VLAN approaches the packets forwarded using this method do not leak into other VLAN domains on the network After a port has been assigned to a VLAN the port cannot sen...

Page 31: ...her multicast or unicast RIP packets OSPF OSPF is an interior gateway protocol IGP for routing Internet Protocol IP packets solely within a single routing domain such as an autonomous system It gathers link state information from available routers and constructs a topology map of the network The topology is presented as a routing table to the Internet Layer which routes datagrams based solely on t...

Page 32: ...be chosen at will often administrators select the IP address of a main router in an area as area identification Each additional area must have a direct or virtual connection to the OSPF backbone area Such connections are maintained by an interconnecting router known as area border router ABR An ABR maintains separate link state databases for each area it serves and maintains summarized routes for ...

Page 33: ...link s about which the requesting device wants more current information Link State Update These messages contain updated information about the state of certain links on the LSDB They are sent in response to a Link State Request message and also broadcast or multicast by routers on a regular basis Their contents are used to update the information in the LSDBs of routers that receive them Link State...

Page 34: ...ticast routing It works by IGMP frame forwarding 3 3 6 6 S Se ec cu ur ri it ty y 3 3 6 6 1 1 F Fi ir re ew wa al ll l A firewall is a set of related programs that protects the resources of a private network from other networks It is helpful to users that allow preventing hackers to access its own private data resource accidentally There have three security levels for setting Low Medium and High ...

Page 35: ...address and Subnet Mask to 0 0 0 0 to inactive the Address Filter rule Protocol It is the packet protocol type used by the application select among from TCP or UDP or both of TCP UDP Source Port This Port or Port Ranges defines the port allowed to be used by the Remote WAN to connect to the application Default is set from range 0 65535 It is recommended that this option be configured by an advance...

Page 36: ...3 SMTP TCP 25 25 POP3 TCP 110 110 NEWS NNTP TCP 119 119 Real Audio Real Video UDP 7070 7070 PING ICMP N A N A H 323 TCP 1720 1720 T 120 TCP 1503 1503 SSH TCP 22 22 NTP SNTP UDP 123 123 HTTP HTTP Proxy TCP 8080 8080 HTTPS TCP 443 443 ICQ TCP 5190 5190 MSN 1863 TCP 1863 1863 MSN 7001 UDP 7001 7001 MSB video TCP 9000 9000 ...

Page 37: ... the use of black lists and white lists While the restriction of network access through the use of lists is straightforward an individual person is not identified by a MAC address rather a device only so an authorized person will need to have a white list entry for each device that he would use to access the network While giving a Wi Fi network some additional protection MAC Filtering can be circu...

Page 38: ... 6 6 5 5 L L2 2T TP P L2TP Layer 2 Tunneling Protocol is a tunneling protocol used to support VPNs It doesn t provide any encryption or confidentiality by itself it relies on an encryption protocol that it passes within the tunnel to provide privacy L2TP allows a PPP session to travel over multiple links and networks PPP is used to encapsulate IP packets from the user s PC or mobile device to the ...

Page 39: ...ith LAN to LAN application Functions of Pre shared Key VPN Connection Type and Security Algorithm must be identically set up on both sides 3 3 6 6 6 6 P PP PT TP P PPTP Point to Point Tunneling Protocol is a private network of computers that uses the public Internet to connect some nodes Because the Internet is essentially an open network the PPTP is used to ensure that messages transmitted from o...

Page 40: ...cation The router is installed in the office connected to a couple of PCs and Servers Example Configuring a PPTP LAN to LAN VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two private networks over the Internet The routers are installed in the head office and branch office accordingly Both office LAN networks MUST in different subnet with LAN to LAN appli...

Page 41: ... and authenticates and encrypts all packets traveling over the VPN Tunnel Thus it does not matter what applications are used on your PC Any application can use the VPN like any other network connection IPsec VPNs exchange information through logical connections called SAs Security Associations An SA is simply a definition of the protocols algorithms and keys used between the two VPN devices endpoi...

Page 42: ...ange Example Configuring a IPSec LAN to LAN VPN Connection Network Configuration and Security Plan Branch Office Head Office Local Network ID 192 168 0 0 24 192 168 1 0 24 Local Router IP 69 1 121 30 69 1 121 3 Remote Network ID 192 168 1 0 24 192 168 0 0 24 Remote Router IP 69 1 121 3 69 1 121 30 IKE Pre shared Key 12345678 12345678 VPN Connection Type Tunnel mode Tunnel mode Security Algorithm E...

Page 43: ...able to change your router s Host Name in here 3 3 7 7 2 2 U Us se er r For greater security change the Administrator Name and password for the router If you don t set them all users on your network can be able to access your router using the default Administrator Name and password is root ...

Page 44: ...y purpose Name Type the new User Name root is the default name when shipped Level Administrator Normal and Guest Password Type the existing password root is the default password when shipped Password Confirm Retype your new password for confirmation Click Apply to finish the setting 3 3 7 7 3 3 C CA A Certification authority CA is an entity that issues digital certificates A digital certificate ce...

Page 45: ...tocol which is an adaptation of the Network Time Protocol NTP used to synchronize computer clocks in the Internet SNTP can be used when the ultimate performance of the full NTP implementation The function only supported on router mode 3 3 7 7 5 5 S SN NM MP P Simple Network Management Protocol SNMP provides for the exchange of messages between a network management client and a network management a...

Page 46: ...r If enabled this Router will be visible via UPnP If disabled this Router will not be visible via UPnP Press Apply to finish the setup 3 3 7 7 7 7 S Sy ys sl lo og g Syslog is a standard method of centralizing various logs You can use a syslog server to store your server logs in a remote location for later perusal or long term storage To send logs to the LOG server you must configure the other ser...

Page 47: ...ient The only difference is that the communication is made via encrypted channels to and from your Router Once you have chosen a SSH or Telnet client connecting to your Virtual Server is extremely simple Although SSH and Telnet clients vary in their exact configuration most of them will simply require you to specify a remote host Your remote host is your VPN Router so you would specify your domain...

Page 48: ...umber If you change the default port number then you will have to let user who wish to use the service know the new port number The default value is 80 Press Apply to finish the setup 3 3 7 7 1 11 1 S Sa am mb ba aS Se er rv ve er r In this page you can configure SAMBA Server Settings in VDSL2 Wi Fi Router To Configure the SAMBA Server enable the SAMBA Server set the SAMBA Server name without whit...

Page 49: ...ersion This version is the original factory version and remains even after upgrading the router in the field This is for internal identification purposes Software Version This is the modem s current firmware version This is sometimes needed by technicians to help troubleshoot problems Firmware Version This is the chipset s firmware version Current Time This field display your VPN Router s present ...

Page 50: ...49 3 3 8 8 2 2 S Sy ys sl lo og g 3 3 8 8 3 3 A Ar rp pl li is st t Arplist page allows you to see which clients are connected to the VDSL2 Wi Fi Router via IP address and MAC address ...

Page 51: ...ins 15 mins Load Memory Information it shows the status for the memory User can see the total size used memory and remaining to use CPU Information it includes CPU running information also shows the rate for interrupt request Ireq is a hardware signal sent to the processor that temporarily stops a running program and allows a special program an interrupt handler to run instead 3 3 9 9 S St ta at t...

Page 52: ...51 3 3 9 9 2 2 S Sw wi it tc ch h 3 3 9 9 3 3 W Wi ir re el le es ss s This information shows Wireless status And Wireless is OFF 3 3 9 9 4 4 S St ta at ti ic cs s ...

Page 53: ... address the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept 3 3 9 9 7 7 W WW WA AN N 3 3 1 10 0 U Ut ti il li it ty y 3 3 1 10 0 1 1 U Up pg gr ra ad de e Upgrade Firmware Click the Open File button and browse to the location on your PC where you stored the firmware upgrade Select the upgrade file Thei...

Page 54: ...lick the Retore button to load factory default configuration setting R Re es st to or re e C Co on nf fi ig gu ur ra at ti io on n Click the Open file to select correct backup file and click the Restore button to restore your backup configuration to the device The router will automatically restore the saved configuration B Ba ac ck ku up p C Co on nf fi ig gu ur ra at ti io on n Click the BackUp b...

Page 55: ...n the server is down or unavailable Internet Web servers especially may be configured to disregard ping requests for security purposes The results of a ping test vary depending on the quality of the Internet network connection A good broadband Internet connection typically results in ping test latency of less than 100 ms often less than 30ms A satellite Internet connection normally suffers from la...

Page 56: ... usually reach an Internet site but it is slow today then a trace route to that site should show you one or more hops with either long times or marked with indicating the time was really long If so the blockage could be anywhere from your Internet service provider to a backbone provider and there is likely little you can do except wait with the infinite patience of the mighty oak Host name or IP T...

Page 57: ...te site through common customer premises equipment which is the telephone company s term for a modem and similar devices PPPoE can be used to office or building Users share a common Digital Subscriber Line DSL cable modem or Wi Fi connection to the Internet PPPoE combines the Point to Point Protocol PPP commonly used in dialup connections with the Ethernet protocol which supports multiple users in...

Page 58: ...57 This page is intentionally left blank ...

Page 59: ......

Reviews: