background image

 

VigorPro5300 Series User’s Guide

 

98 

click 

Go

 to the specified page. Or you can click 

>, >>, <<

 or 

>

 button on the right side of the

 Go

 button to access to the 

home/previous/next/end page.

 

3

3

.

.

7

7

.

.

2

2

 

 

A

A

n

n

t

t

i

i

-

-

V

V

i

i

r

r

u

u

s

s

 

 

Vigor router can offer basic virus scanning, destroying and cut off the connection between 
questionable link and your computer for the files transmitted through specified protocol. In 
addition, several types of compressed file formats such as .zip, .gzip, .bzip2 are supported 
and can be scanned with this router. There is no limitation in the file size for the transmitted 
(incoming or outgoing) file. With this feature, all the files processed with the protocol 
specified in Anti-Virus web page will be scanned for finding out virus while passing through 
the router. 

Note:

 Files with three-layer compression (the files are compressed with six times) also 

can be scanned by this router. 

3

3

.

.

7

7

.

.

2

2

.

.

1

1

 

 

P

P

r

r

o

o

f

f

i

i

l

l

e

e

 

 

S

S

e

e

t

t

t

t

i

i

n

n

g

g

 

 

This page allows you to set eight profiles for anti-virus scanning. These profiles can be 
invoked through firewall configuration. It is recommended to build one profile at least. Thus 
you will have selectable anti-virus profile settings in 

Firewall>>General Setup

 

The Administration Message box allows you to fill in important notification directly for 
SMTP and POP3 protocols. It will be saved as a file. While receiving an e-mail, the user will 
receive an attached file with the content listed in this box. 

To edit a profile setting, please click the number link under Profile. You can see the 
following screen. You can check the boxes listed below for different operation respectively. 
If you uncheck this box, the corresponding settings for the protocol will not be performed. 

Summary of Contents for VigorPro 5300

Page 1: ...or translated into any language without written permission from the copyright holders The scope of delivery and other details are subject to change without prior notice Microsoft is a registered trad...

Page 2: ...ase should the product have indications of failure due to faulty workmanship and or materials we will at our discretion repair or replace the defective products or components without charge for either...

Page 3: ...adio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which...

Page 4: ...2 Configuring Basic Settings 15 2 1 Changing Password 15 2 2 Quick Start Wizard 17 2 2 1 PPPoE 18 2 2 2 PPTP 20 2 2 3 Static IP 21 2 2 4 DHCP 22 2 3 Online Status 23 2 4 Saving Configuration 25 3 Adv...

Page 5: ...Spam 103 3 7 4 Activation Anti Intrusion Anti Virus Anti Spam Service 106 3 7 5 Signature Upgrade 107 3 7 6 Status 109 3 8 Bandwidth Management 110 3 8 1 Sessions Limit 110 3 8 2 Bandwidth Limit 111...

Page 6: ...3 Configuration Backup 209 3 16 4 Syslog Mail Alert 211 3 16 5 Time and Date 214 3 16 6 Management 215 3 16 7 Reboot System 216 3 16 8 Firmware Upgrade 217 3 17 Diagnostics 218 3 17 1 Dial out Trigge...

Page 7: ...ing NAT 275 5 5 Calling Scenario for VoIP function 278 5 5 1 Calling via SIP Sever 278 5 5 2 Peer to Peer Calling 280 5 6 Upgrade Firmware for Your Router 281 5 7 Request a certificate from a CA serve...

Page 8: ......

Page 9: ...eer to Peer more efficiency than before By the way DoS DDoS prevention and URL Web content filter strengthen the security outside and control inside Object based firewall is flexible and allows your n...

Page 10: ...from Firewall General Setup or Filter Setup Such profile is established under CSM menu On The WAN1 or WAN2 port is connected WAN1 2 Blinking It will blink while transmitting data On The router is man...

Page 11: ...keep for more than 5 seconds When you see the ACT LED begins to blink rapidly than usual release the button Then the router will restart with the factory default configuration Restart Restart the rou...

Page 12: ...al condition after two minutes You need to setup WPS within 2 minutes On The WAN1 or WAN2 connection is ready WAN1 2 Blinking It will blink while transmitting data On The router is managed handled by...

Page 13: ...s connection Restore the default settings Usage Turn on the router ACT LED is blinking Press the hole and keep for more than 5 seconds When you see the ACT LED begins to blink rapidly than usual relea...

Page 14: ...es You need to setup WPS within 2 minutes On The WAN1 or WAN2 connection is ready WAN1 2 Blinking It will blink while transmitting data On The router is managed by Telnet MGMT Blinking It will blink w...

Page 15: ...s connection Restore the default settings Usage Turn on the router ACT LED is blinking Press the hole and keep for more than 5 seconds When you see the ACT LED begins to blink rapidly than usual relea...

Page 16: ...T ISDN S0 intern mode is active and an ISDN phone adapter is connected Left LED Orange Blinking ISDN NT ISDN S0 intern mode is active and an ISDN phone adapter is not connected On A phone has been con...

Page 17: ...e than 5 seconds When you see the ACT LED begins to blink rapidly than usual release the button Then the router will restart with the factory default configuration Restart Restart the router forcefull...

Page 18: ...A phone call comes LED on Connector On ISDN NT ISDN S0 intern mode is active and an ISDN phone adapter is connected Left LED Orange Blinking ISDN NT ISDN S0 intern mode is active and an ISDN phone ad...

Page 19: ...le WLAN LED off wireless connection Restore the default settings Usage Turn on the router ACT LED is blinking Press the hole and keep for more than 5 seconds When you see the ACT LED begins to blink r...

Page 20: ...ip this step 4 Connect one end of the power adapter to the router s power port on the rear panel and the other side into a wall outlet 5 Power on the device by pressing down the power switch on the re...

Page 21: ...er can connect several phones to Vigor5300VS for communication Refer to the following figure for reference Yet if the user configures ISDN S0 2 as TE Mode in VoIP Phone Settings the green LED will lig...

Page 22: ...VigorPro5300 Series User s Guide 14...

Page 23: ...d d To change the password for this device you have to access into the web browse with default password first 1 Make sure your computer connects to the router correctly Notice You may either simply se...

Page 24: ...Maintenance page and choose Administrator Password 5 Enter the login password the default is blank on the field of Old Password Type a new one in the field of New Password and retype it on the field...

Page 25: ...the configuration provide here can help you to deploy and use the router quickly The first screen of Quick Start Wizard is entering login password After typing the password please click Next On the ne...

Page 26: ...router supports the DSL WAN interface for Internet access 2 2 2 2 1 1 P PP PP Po oE E PPPoE stands for Point to Point Protocol over Ethernet It relies on two widely accepted standards PPP and Etherne...

Page 27: ...shown User Name Assign a specific valid user name provided by the ISP Password Assign a valid password provided by the ISP Confirm Password Retype the password for confirmation Click Next for viewing...

Page 28: ...lick PPTP as the protocol Type in all the information that your ISP provides for this protocol Click Next for viewing summary of such connection Click Finish A page of Quick Start Wizard Setup OK will...

Page 29: ...c IP as the protocol Type in all the information that your ISP provides for this protocol After finishing the settings in this page click Next to see the following page Click Finish A page of Quick St...

Page 30: ...he protocol Type in all the information that your ISP provides for this protocol After finishing the settings in this page click Next to see the following page Click Finish A page of Quick Start Wizar...

Page 31: ...us WAN status ADSL Information and other status related to this router within one page If you select PPPoE PPTP as the protocol you will find out a link of Dial PPPoE PPPoA or Drop PPPoE PPPoA in the...

Page 32: ...n WAN1 WAN web page Mode Displays the type of WAN connection e g PPPoE Up Time Displays the total uptime of the interface IP Displays the IP address of the WAN interface GW IP Displays the IP address...

Page 33: ...a at ti io on n Each time you click OK on the web page for saving the configuration you can find messages showing the system interaction with you Ready indicates the system is ready for you to input s...

Page 34: ...VigorPro5300 Series User s Guide 26 This page is left blank...

Page 35: ...255 255 From 192 168 0 0 to 192 168 255 255 W Wh ha at t a ar re e P Pu ub bl li ic c I IP P A Ad dd dr re es ss s a an nd d P Pr ri iv va at te e I IP P A Ad dd dr re es ss s As the router plays a r...

Page 36: ...unication service such as DSL Cable modem etc If any connection problem occurred on one of the ISP connections all the traffic will be guided and switched to the normal communication port for proper o...

Page 37: ...PPPoE and PPTP access modes in the Details Page of WAN Internet Access In addition there are three selections for you to choose for different purposes WAN2 Fail It means the connection for WAN1 will b...

Page 38: ...e Internet WAN2 is the optional WAN interface for accessing into the Internet when WAN 1 is inactive for some reason Display Name It shows the name of the WAN1 WAN2 that entered in general setup Physi...

Page 39: ...in this field Password Type in the password provided by ISP in this field Index 1 15 in Schedule Setup You can type in four sets of time schedule for your request All the schedules can be set previous...

Page 40: ...vice to always assign you the same IP address whenever you request In this case you can fill in this IP address in the Fixed IP field Please contact your ISP before you want to use this function WAN I...

Page 41: ...ting this function If you click Disable this function will be closed and all the settings that you adjusted in this page will be invalid ISDN Dial Backup Setup This setting is available for the router...

Page 42: ...rk Settings This group allows you to obtain an IP address automatically and allows you type in IP address manually WAN IP Alias If you have multiple public IP addresses and would like to utilize them...

Page 43: ...le to enable a PPTP client to establish a tunnel to a DSL modem on the WAN interface PPTP Server Specify the IP address of the PPTP server ISP Access Setup Username Type in the username provided by IS...

Page 44: ...his function and type in a fixed IP address in the box Fixed IP Address Type a fixed IP address WAN IP Alias If you have multiple public IP addresses and would like to utilize them on the WAN interfac...

Page 45: ...are supported by this router Note Load Balance Policy is running only when both WAN1 and WAN2 are activated Index Click the number of index to access into the load balance policy configuration web pa...

Page 46: ...rt for the specified WAN interface Src IP End Type the source IP end for the specified WAN interface If this field is blank it means that all the source IPs inside the LAN will be passed through the W...

Page 47: ...T does is to translate the packets from public IP address to private IP address to forward the right packets to the right host and vice versa Besides Vigor router has a built in DHCP server that assig...

Page 48: ...St ta at ti ic c R Ro ou ut te e When you have several subnets in your LAN sometimes a more effective and quicker way for connection is the Static routes function rather than other method You may sim...

Page 49: ...ult 192 168 1 1 1st Subnet Mask Type in an address code that determines the size of the network Default 255 255 255 0 24 For IP Routing Usage Click Enable to invoke this function The default setting i...

Page 50: ...ubnet with neighboring routers DHCP Server Configuration DHCP stands for Dynamic Host Configuration Protocol The router by factory default acts a DHCP server for your network so it automatically dispa...

Page 51: ...ry IPAddress You can specify secondary DNS server IP address here because your ISP often provides you more than one DNS Server If your ISP does not provide it the router will automatically apply defau...

Page 52: ...ubnet can talk to each other via the router Assuming the Internet access has been configured and the router works properly z use the Main Router to surf the Internet z create a private subnet 192 168...

Page 53: ...and continuously exchange of IP routing information with different subnets 1 Click the LAN Static Route and click on the Index Number 1 Check the Enable box Please add a static route as shown below w...

Page 54: ...em based on the physical port You can also manage the in out rate of each port Go to LAN page and select VLAN The following page will appear Click Enable to invoke VLAN function To add or remove a VLA...

Page 55: ...annot be changed If you modified the binding IP or MAC address it might cause you not access into the Internet Click LAN and click Bind IP to MAC to open the setup page Enable Click this radio button...

Page 56: ...for which you may get charged Private IP addresses are recognized only among internal hosts When the outgoing packets destined to some public server on the Internet reach the NAT router the router wil...

Page 57: ...zed by all users Since the server is actually located inside the LAN the network well protected by NAT of the router and identified by its private IP address port the goal of Port Redirection function...

Page 58: ...late and display the ending IP of private IP automatically Service Name Enter the description of the specific network service Protocol Select the transport layer protocol TCP or UDP Public Port Specif...

Page 59: ...lt in services servers such as Telnet HTTP and FTP etc Since the common port numbers of these services servers are all the same you may need to reset the router in order to avoid confliction For examp...

Page 60: ...s will continue to work without inappropriate interruption DMZ Host allows a defined internal user to be totally exposed to the Internet which usually helps some special applications such as Netmeetin...

Page 61: ...er the private IP address of the DMZ host or click Choose PC to select one Choose PC Click this button and then a window will automatically pop up as depicted below The window consists of a list of pr...

Page 62: ...e relative number for the particular entry that you want to offer service in a local host You should click the appropriate index number to edit or clear the corresponding entry Comment Specify the nam...

Page 63: ...click Choose PC to select one Choose PC Click this button and subsequently a window having a list of private IP addresses of local hosts will automatically pop up Select the appropriate IP address of...

Page 64: ...with objects and bind them with groups for using conveniently Later we can select that object service keyword for applying For example all the IPs in the same department can be defined with an IP obj...

Page 65: ...Type Determine the address type for the IP address Select Single Address if this object contains one IP address only Select Range Address if this object contains several IPs within a range Select Subn...

Page 66: ...for settings in detail Name Type a name for this profile Maximum 15 characters are allowed Interface Choose WAN LAN or Any to display all the available IP objects with the specified interface Availabl...

Page 67: ...detail Name Type a name for this profile Protocol Specify the protocol s which this profile will apply to Source Destination Port Source Port and the Destination Port column are available for TCP UDP...

Page 68: ...e are available for this service type the port number greater than this value is available the port number less than this value is available for this profile Below is an example of service type object...

Page 69: ...ts will be shown in this box Selected Service Type Objects Click button to add the selected IP objects in this box 3 3 4 4 5 5 K Ke ey yw wo or rd d O Ob bj je ec ct t You can set 100 keyword object p...

Page 70: ...be watched out and be passed blocked based on the configuration on Firewall settings 3 3 4 4 6 6 K Ke ey yw wo or rd d G Gr ro ou up p This page allows you to bind several keyword objects into one gr...

Page 71: ...s si io on n O Ob bj je ec ct t This page allows you to set eight profiles which will be applied in CSM URL Content Filter and Defense Configuration Anti Virus All the files with the extension names s...

Page 72: ...Series User s Guide 64 Profile Name Type a name for this profile Type a name for such profile and check all the items of file extension that will be processed in the router Finally click OK to save t...

Page 73: ...to Factory Default Clear all profiles Click the number under Profile column for configuration in details There are several types of Instant Messenger IM provided here for you to choose to disallow peo...

Page 74: ...rPro5300 Series User s Guide 66 Profile Name Type a name for this profile Type a name for such profile and check all the items that not allowed to be used in the host Finally click OK to save this pro...

Page 75: ...ing Set to Factory Default Clear all profiles Click the number under Profile column for configuration in details There are several items for P2P protocols provided here for you to choose to disallow p...

Page 76: ...ro5300 Series User s Guide 68 Profile Name Type a name for this profile Type a name for such profile and check all the protocols that not allowed to be used in the host Finally click OK to save this p...

Page 77: ...ault Clear all profiles Click the number under Profile column for configuration in details Applications for tunneling and streaming are listed in the page for you to choose to disallow people using Si...

Page 78: ...ly environment hence to increase the employee work efficiency How can URL Content Filter work better than traditional firewall in the field of filtering Because it checks the URL strings or some of HT...

Page 79: ...n define policy profiles for different policy of IM Instant Messenger P2P Peer to Peer application CSM profile can be used in Filter Setup page Set to Factory Default Clear all profiles Click the numb...

Page 80: ...connection For example if you add key words such as sex Vigor router will limit web access to web sites or web pages such as www sex com www backdoor net images sex p_386 html Or you may simply speci...

Page 81: ...rmine the priority for the actions executed For this one the router will process the packages with the conditions set below for web feature first then URL second Log None There is no log file will be...

Page 82: ...o the website whose URL string matched to any user defined keyword It should be noticed that the more simplified the blocking keyword list the more efficiently the Vigor router perform Web Feature Ena...

Page 83: ...media files downloading from web pages File Extension Profile Choose one of the profiles that you configured in Object Setting File Extension Objects previously for passing or blocking the file downlo...

Page 84: ...ass Only the log about Pass will be recorded in Syslog Block Only the log about Block will be recorded in Syslog All All the actions Pass and Block will be recorded in Syslog For this section please r...

Page 85: ...n go to System Maintenance to set up your password F Fi ir re ew wa al ll l F Fa ac ci il li it ti ie es s The users on the LAN are provided with secured protection by the following firewall facilitie...

Page 86: ...vely S St ta at te ef fu ul l P Pa ac ck ke et t I In ns sp pe ec ct ti io on n S SP PI I Stateful inspection is a firewall architecture that works at the network layer Unlike legacy static packet fil...

Page 87: ...about the security in the network for data transmission if the functions of anti virus and anti intrusion are activated The VigorPro router offers the mechanism of anti virus and anti intrusion What y...

Page 88: ...information refer to the section of CSM profile setup For troubleshooting needs you can specify to record information for IM P2P by checking the Log box It will be sent to Syslog server Please refer...

Page 89: ...ct one of the anti spam profile settings created in Anti Spam Profile Setting for applying with this router Please set at least one profile for anti spam in Anti Spam Profile Setting web page first Fo...

Page 90: ...to use the default settings here Codepage This function is used to compare the characters among different languages Choose correct codepage can help the system obtaining correct ASCII after decoding d...

Page 91: ...tion is not stable you can set large number for this setting to get better performance Yet large value will consume large resource Retransmission queue length Type the number here as a base for the ro...

Page 92: ...Click a button numbered 1 7 to edit the filter rule Click the button will open Edit Filter Rule web page For the detailed information refer to the following page Active Enable or disable the filter r...

Page 93: ...up to 4 schedules out of the 15 schedules pre defined in Applications Schedule setup The default setting of this filed is blank and the function will always work Direction Set the direction of packet...

Page 94: ...se Group and Objects as the Address Type From the IP Group drop down list choose the one that you want to apply Or use the IP Object drop down list to choose the object that you want Service Type Clic...

Page 95: ...kets matching the rule will be dropped immediately Pass Immediately Packets matching the rule will be passed immediately Block If No Further Match A packet matching the rule and that does not match fu...

Page 96: ...ert for more detailed information Anti Intrusion Check the Enable box to invoke anti intrusion filter function For troubleshooting needs you can specify to record information for Anti Intrusion by che...

Page 97: ...or TCP protocol only session timeout is configured for the data flow which matched with the firewall rule Max Queue length When the network connection is not stable you can set large number for this s...

Page 98: ...VigorPro5300 Series User s Guide 90...

Page 99: ...activate the UDP flood defense function Once detecting the Threshold of the UDP packets from the Internet has exceeded the defined value the Vigor router will start to randomly discard the subsequent...

Page 100: ...oS defense functionality might block some legal packets For example when you activate the fraggle attack defense all broadcast UDP packets coming from the Internet are blocked Therefore the RIP packet...

Page 101: ...rom Vigor router The user as a Syslog Server shall receive the report sending from Vigor router which is a Syslog Client All the warning messages related to DoS defense will be sent to user and user c...

Page 102: ...intrusion it is suggested for you to register your router by entering www vigorpro com When you finished the registration you can get and activate a wide range of anti intrusion rules from the websit...

Page 103: ...g outgoing packets which match all the severity rules including high medium and low The degree of severity for each rule is defined in Advance Setup Medium Security Click this radio button to activate...

Page 104: ...Search It can help the user to find out specific anti intrusion rule quickly Type links Click any anti intrusion type link to access into next page for configuring the rules settings Here we provide...

Page 105: ...type will cause small affection which might not crash your computer Log In order to show the detection log with such rule on the window of Draytek Syslog you have to check the log box here and enable...

Page 106: ...gh the router Note Files with three layer compression the files are compressed with six times also can be scanned by this router 3 3 7 7 2 2 1 1 P Pr ro of fi il le e S Se et tt ti in ng g This page a...

Page 107: ...us for your reference The system will not do any advanced action for such condition Destroy Destroy the infected file found by the router system Reset Break down the communication between your compute...

Page 108: ...POP3 protocols If you check it the message typed under the box of Administration Message will be sent out with e mail File Filter Click this link to open Defense Configuration Anti Virus File Pattern...

Page 109: ...An nt ti i V Vi ir ru us s From the fourteen types of anti virus list click any one of them to access into next page The detailed view list for anti virus rule will be shown as below NAME A brief desc...

Page 110: ...you to set 32 entries rules of file names to be filtered by the router In such case the file format is ignored The router will destroy scan or non scan the specified filename according to the configu...

Page 111: ...which is found by the router system Non Scan The file will not be scanned and will not be processed by using general rules set in Anti Virus profile Scan Just scan the file with name specified here w...

Page 112: ...em for you to define Profile 1 16 There are sixteen profiles provided for you to define Simply click the number link under Profile the setting page for that number will be open for you to configure Na...

Page 113: ...the box of Message If the subject of some mail is license page and it is judged as spam then it will be shown as SPAM license page in your mail box Such tag can help users to identify which mail is u...

Page 114: ...stem timeout will be marked with timeout before the subjects of the mails Later these mails cab be identified easily and categorized manually Log Check the box to have the process record stated on Sys...

Page 115: ...am the process of authenticating will be displayed on this field for your reference 3 3 7 7 5 5 S Si ig gn na at tu ur re e U Up pg gr ra ad de e You can get the most updated signature from DrayTek s...

Page 116: ...change the setting if it is required to be Click the find more link to get more information Signature authentication downl oad message It displays the message of signature authentication or download p...

Page 117: ...and minutes that you set here Daily It means the downloading procedure will be automatically executed every day at the time hours and minutes that you set here Weekly It means the downloading procedur...

Page 118: ...e Internet via NAT router The router will generate the records of NAT sessions for such connection The P2P Peer to Peer applications e g BitTorrent always need many sessions for procession and also th...

Page 119: ...resses If you do not set the session number in this field the system will use the default session limit for the specific limitation you set for each index Add Adds the specific session limitation onto...

Page 120: ...ss for limit bandwidth End IP Define the end IP address for limit bandwidth TX limit Define the limitation for the speed of the upstream If you do not set the limit in this field the system will use t...

Page 121: ...assign packets to queues and associated service types The basic QoS implementation in Vigor routers is to classify and schedule packets based on the service type information in the IP header For inst...

Page 122: ...Setup link to access into next page for the general setup of WAN 1 2 interface As to class rule simply click the Edit link to access into next for configuration You can configure general setup for th...

Page 123: ...t 256kbps for this box The default value is 10000kbps Reserved Bandwidth Ratio It is reserved for the group index in the form of ratio of reserved bandwidth to upstream speed and reserved bandwidth to...

Page 124: ...le e f fo or r Q Qo oS S The first three Class 1 to Class 3 class rules can be adjusted for your necessity To add edit or delete the class rule please click the Edit link of that one After you click...

Page 125: ...ubnet Address you have to fill in Start IP address and Subnet Mask DiffServ CodePoint All the packets of data will be divided with different levels and will be processed according to the level type by...

Page 126: ...pe e f fo or r C Cl la as ss s R Ru ul le e To add a new service type edit or delete an existed service type please click the Edit link under Service Type field After you click the Edit link you will...

Page 127: ...If you select Range you have to type in the starting port number and the end porting number on the boxes below Port Number Type in the starting port number and the end porting number here if you choo...

Page 128: ...ehind the router Before you use the Dynamic DNS feature you have to apply for free DDNS service to the DDNS service providers The router provides up to three accounts from three different DDNS service...

Page 129: ...ppeared on the Active column of the previous web page in step 2 WAN Interface Select the WAN interface order to apply settings here Service Provider Select the service provider for the DDNS account Se...

Page 130: ...ialup to the Internet at a specified time but also restrict Internet access to certain hours so that users can connect to the Internet only during certain hours say business hours The schedule is also...

Page 131: ...Dial On Demand Specify the connection to be up when it has traffic on the line Once there is no traffic over idle timeout the connection will be down and never up again during the schedule Idle Timeo...

Page 132: ...It is the most common method of authenticating and authorizing dial up and tunneled network users The built in RADIUS client feature enables the router to assist the remote dial in user or a wireless...

Page 133: ...Messenger to allow full use of the voice video and messaging features Enable UPNP Service Accordingly you can enable either the Connection Control Service or Connection Status Service After setting E...

Page 134: ...ction on your network may incur some security threats You should consider carefully these risks before activating the UPnP function Some Microsoft operating systems have found out the UPnP weaknesses...

Page 135: ...his field displays the ID port for the multicast group The available range for IGMP starts from 224 0 0 0 to 239 255 255 254 P1 to P4 It indicates the LAN port used for the multicast group Refresh Cli...

Page 136: ...ake by IP Address you have to choose the correct IP address IP Address The IP addresses that have been configured in LAN Bind IP to MAC will be shown in this drop down list Choose the IP address from...

Page 137: ...a manner that emulates the properties of a point to point private link Below shows the menu items for VPN and Remote Access 3 3 1 10 0 1 1 R Re em mo ot te e A Ac cc ce es ss s C Co on nt tr ro ol l E...

Page 138: ...heme will be used to encrypt the data Require MPPE 40 128bits Selecting this option will force the router to encrypt packets by using the MPPE encryption algorithm In addition the remote dial in user...

Page 139: ...ination of the secure tunnel establishment There are two encapsulation methods used in IPSec Transport and Tunnel The Transport mode will add the AH ESP payload and use original IP header to encapsula...

Page 140: ...t ti it ty y To use digital certificate for peer authentication in either LAN to LAN connection or Remote User Dial In connection here you may edit a table of peer certificate for selection As shown b...

Page 141: ...e to accept the peer with matching value The field can be IP Address Domain or E mail address The box under the Type will appear according to the type you select and ask you to fill in corresponding s...

Page 142: ...ugh the built in RADIUS client function The following figure shows the summary table Set to Factory Default Click to clear all indexes Index Click the number below Index to access into the setting pag...

Page 143: ...ion through the Internet You should set the User Name and Password of remote dial in user below IPSec Tunnel Allow the remote dial in user to make an IPSec VPN connection through Internet L2TP Allow t...

Page 144: ...used in IKE aggressive mode Uncheck the checkbox This means the connection type you select above will apply the authentication methods and security methods in the general settings Netbios Naming Pack...

Page 145: ...th or without IPSec policy above IKE Authentication Method This group of fields is applicable for IPSec Tunnels and L2TP with IPSec Policy when you specify the IP address of the remote node The only e...

Page 146: ...Specify the callback number The option is for extra security Once enabled the router will ONLY call back to the specified Callback Number Check to enable callback budget control By default the callba...

Page 147: ...e fields gray out it means you may leave it untouched The following explanations will guide you to fill all the necessary fields For the web page is too long we divide the page into several sections f...

Page 148: ...to keep alive This function is to help the router to determine the status of IPSec VPN connection especially useful in the case of abnormal VPN IPSec tunnel disruption For details please refer to the...

Page 149: ...CHAP is the most common selection due to wild compatibility VJ compression This field is applicable when you select ISDN PPTP or L2TP with or without IPSec policy above VJ Compression is used for TCP...

Page 150: ...its feedback to find a match Three combinations are available for both modes We suggest you select the combination that covers the most algorithms IKE phase 1 key lifetime For security reason the life...

Page 151: ...nnection You should set the User Name and Password of remote dial in user below This feature is useful for i model only In addition you can further set up Callback function below PPTP Allow the remote...

Page 152: ...applicable when you select ISDN PPTP or L2TP with or without IPSec policy above IKE Authentication Method This group of fields is applicable for IPSec Tunnels and L2TP with IPSec Policy when you spec...

Page 153: ...ly applicable when you select ISDN PPTP or L2TP with or without IPSec policy above The default value is 0 0 0 0 which means the Vigor router will get a remote Gateway PPP IP address from the remote ro...

Page 154: ...lable when both WAN interfaces are enabled 3 3 1 10 0 7 7 C Co on nn ne ec ct ti io on n M Ma an na ag ge em me en nt t You can find the summary table of all VPN connections You may disconnect any VPN...

Page 155: ...09 Any entity wants to utilize digital certificates should first request a certificate issued by a CA server It should also retrieve certificates of other trusted CA servers so it can authenticate the...

Page 156: ...n Import Click this button to import a saved file as the certification information Refresh Click this button to refresh the information listed below View Click this button to view the detailed setting...

Page 157: ...click IMPORT to open the following window Use Browse to find out the saved text file Then click Import The one you imported will be listed on the Trusted CA Certificate window Then click Import to use...

Page 158: ...nd mobility in VoIP structure Every one who wants to talk using his her SIP Uniform Resource Identifier SIP Address The standard format of SIP URI is sip user password host port Some fields may be opt...

Page 159: ...ou have to know your friend s IP Address The Vigor VoIP Routers will build connection between each other Please refer to the section 4 5 2 Our Vigor V models firstly apply efficient codecs designed to...

Page 160: ...ke calls quickly and easily by using speed dial Phone Number There are total 60 index entries in the phonebook for you to store all your friends and family members SIP addresses Loop through and Backu...

Page 161: ...o5300 VSn The selection of Loop through and Backup Phone Number is only available for 2930VSn model Enable Click this to enable this entry Phone Number The speed dial number of this index This can be...

Page 162: ...up phone number PSTN number for this VoIP phone setting D Di ig gi it t M Ma ap p For the convenience of user this page allows users to edit prefix number for the SIP account with adding number stripp...

Page 163: ...to 88631111111 and sent to SIP server OP Number The front number you type here is the first part of the account number that you want to execute special function according to the chosen mode by using...

Page 164: ...is entry Call Direction Determine the direction for the phone call IN incoming call OUT outgoing call IN OUT both incoming and outgoing calls Barring Type Determine the type of the VoIP phone call URI...

Page 165: ...ous Block Unknown Domain or Block IP Address Simply click the relational links to open the web page For Block Anonymous this function can block the incoming calls without caller ID on the interface Ph...

Page 166: ...d in this field to know where the last phone call comes from and call back to that one Last Call Return In You have finished an incoming phone call however you want to call back again for some reason...

Page 167: ...ll the incoming calls with unknown ID Block Anonymous Deact Dial the number typed in this field to release this function Block Unknown Domain Act Dial the number typed in this field to block all the i...

Page 168: ...VigorPro5300 Series User s Guide 160 Index Click this link to access into next page for setting SIP account Profile Display the profile name of the account...

Page 169: ...rs STUN Server Type in the IP address or domain of the STUN server External IP Type in the gateway IP address SIP PING interval The default value is 150 sec It is useful for a Nortel server NAT Traver...

Page 170: ...setting value is the same as Account Name it is not necessary for you to check the box and set any value in this field Password The password provided to you when you registered with a SIP service Exp...

Page 171: ...PSTN phones ISDN1 S0 and ISDN2 TE allow you to set common settings for ISDN network connection ISDN2 port is configurable Please use the drop down list to choose ISDN2 TE for Internet connection or c...

Page 172: ...ission going through on both ends of local router and remote router not misleading due to IP lost for example sending data from the public IP of remote router to the private IP of local router you can...

Page 173: ...incoming calls will be forwarded into SIP URL only when the local system is busy No answer means if the incoming calls do not receive any response they will be forwarded to the SIP URL by the time out...

Page 174: ...e negotiated with the peer party before each session and so may not be your default choice The default codec is G 729A B it occupies little bandwidth while maintaining good voice quality If your upstr...

Page 175: ...Advanced setting is provided for fitting the telecommunication custom for the local area of the router installed Wrong tone settings might cause inconvenience for users To set the sound pattern of the...

Page 176: ...use the default setting DTMF DTMF Mode There are four DTMF modes for you to choose InBand Choose this one then the Vigor will send the DTMF tone as audio directly when you press the keypad on the pho...

Page 177: ...ssion Timer Check the box to enable the function In the limited time that you set in this field if there is no response the connecting call will be closed automatically Call Forwarding There are four...

Page 178: ...ar to tell the user new phone call is waiting for your response Click hook flash to pick up the waiting phone call Call Transfer Check this box to invoke this function Click hook flash to initiate ano...

Page 179: ...all into VoIP call please dial the character in this field for transferring The character that you can type can be and 0 9 To VoIP for ISDN The router is set by using VoIP call To change VoIP call int...

Page 180: ...ringing tone busy tone congestion tone by yourself for VoIP phone Also you can specify each field for your necessity It is recommended for you to use the default settings for VoIP communication Volume...

Page 181: ...it still can remain the accuracy of DTMF tone SIP INFO Choose this one then the Vigor will capture the DTMF tone and transfer it into SIP form Then it will be sent to the remote end with SIP message...

Page 182: ...IP URL only when the local system is busy No answer means if the incoming calls do not receive any response they will be forwarded to the SIP URL by the time out SIP URL Type in the SIP URL e g aaa dr...

Page 183: ...ans the data packet will contain 20 ms voice information Voice Active Detector This function can detect if the voice on both sides is active or not If not the router will do something to save the band...

Page 184: ...set the sound pattern of the phone set simply choose a proper region to let the system find out the preset tone settings and caller ID type automatically Or you can adjust tone settings manually if y...

Page 185: ...m zero to nine Check for VoIP to ISDN Calls Set a pin code for the router to authenticate which one is allowed to dial VoIP to ISDN call The figure that you can type in this field is limited from thre...

Page 186: ...ne1 Phone2 ISDN1 and ISDN2 The ISDN1 2 appears only when the router is equipped with ISDN interface ISDN1 means B1 channel for the physical ISDN port ISDN2 means B2 channel for the physical ISDN port...

Page 187: ...ber of received voice packets during this connection session Rx Losts Total number of lost packets during this connection session Rx Jitter The jitter of received voice packets In Calls The accumulati...

Page 188: ...lows you to configure ISDN layer2 protocol as Point to Point Configure ISDN port to use static TEI Terminal Endpoint Identifier Point to Multipoint Configure ISDN port to use Dynamic TEI Own Number En...

Page 189: ...ttings on MSN number field There are ten internal lines 30 39 under ISDN1 S0 for you to configure as dedicated line You can setup your ISDN phone with one of these 10 different internal MSN numbers Tr...

Page 190: ...DN phones under ISDN1 S0 port and configured with internal MSN number 5972729 ringing When remote user calls you by dialing 5972720 the router will make all of ISDN phones under ISDN1 S0 port ringing...

Page 191: ...nt purpose Link Disable disables the ISDN dial out function Dialup 64Kbps allows you to use one ISDN B channel for Internet access Dialup 128Kbps allows you to use both ISDN B channels for Internet ac...

Page 192: ...check this box to activate the Callback Control Protocol during the PPP negotiation PPP MP Setup Link Type There are three link types provided here for different purpose Link Disable disables the ISDN...

Page 193: ...ry ISP Setup ISP Name Enter the secondary ISP name Dial Number Enter the ISDN access number provided by the ISP Username Enter the username provided by your ISP Password Enter the password provided by...

Page 194: ...Of course a fixed IP address is required for WAN connection and some internal network resource has to be exposed for remote users such as FTP WWW Call Control Setup Dial Retry It specifies the dial r...

Page 195: ...utilization Idle Timeout Because our IDSN link type is Dial On Demand the connection will be initiated only when needed Bandwidth On Demand BOD Setup Bandwidth On Demand is for Multiple Link PPP ML P...

Page 196: ...liant with the standard IEEE 802 11g protocol To boost its performance further the Vigor Router is also loaded with advanced wireless technology Super G TM to lift up data rate up to 108 Mbps Hence yo...

Page 197: ...Personal a pre defined key is used for encryption during data transmission WPA applies Temporal Key Integrity Protocol TKIP for data encryption while WPA2 applies AES The WPA Enterprise combines not o...

Page 198: ...ernet without hassle of the confidential information leakage For a more flexible deployment you may add filters of MAC addresses to isolate users access from wired LAN Manage Wireless Stations Station...

Page 199: ...nformation except SSID or just cannot see any thing about Vigor wireless router while site surveying The system allows you to set four sets of SSID for different usage In default the first set of SSID...

Page 200: ...h sides of Access Point and Station in wireless client invoke this function at the same time That is the wireless client must support this feature and invoke the function too Note Vigor N61 wireless a...

Page 201: ...WPA2 PSK Accepts WPA and WPA2 clients simultaneously and the encryption key should be entered in PSK WPA The WPA encrypts each frame transmitted from the radio using the key which either PSK entered m...

Page 202: ...ows you to restrict the network access right by controlling the wireless LAN MAC address of client Only the valid MAC address that has been configured can access the wireless LAN interface By clicking...

Page 203: ...address in the list Edit Edit the selected MAC address in the list Cancel Give up the access control set up OK Click it to save the access control list Clear All Clean all entries in the MAC address l...

Page 204: ...n of network card z If you want to use PIN code you have to know the PIN code specified in wireless client Then provide the PIN code of the wireless client you wish to connect to the vigor router For...

Page 205: ...en WPS is in progress It will return to normal condition after two minutes You need to setup WPS within two minutes Configure via Client PinCode Please input the PIN code specified in wireless client...

Page 206: ...er peer AP through WDS links Yet in Bridge mode packets received from a WDS link will only be forwarded to local wired or wireless hosts In other words only Repeater mode can do WDS to WDS packet forw...

Page 207: ...k WDS from Wireless LAN menu The following page will be shown Mode Choose the mode for WDS setting Disable mode will not invoke any WDS setting Bridge mode is designed to fulfill the first type of app...

Page 208: ...in these fields Two peer MAC addresses are allowed to be entered in this page at one time Similarly if you want to invoke the peer MAC address remember to check Enable box in the front of the MAC add...

Page 209: ...d to Later the MAC address of the AP will be added to Bridge or Repeater field of WDS settings page 3 3 1 14 4 7 7 S St ta at ti io on n L Li is st t Station List provides the knowledge of connecting...

Page 210: ...ton to add current selected MAC address into Access Control 3 3 1 14 4 8 8 R Ra at te e C Co on nt tr ro ol l This page allows you to control the upload and download rate of each wireless client stati...

Page 211: ...kbps 3 3 1 15 5 S SS SL L V VP PN N An SSL VPN Secure Sockets Layer virtual private network is a form of VPN that can be used with a standard Web browser There are two benefits that SSL VPN provides I...

Page 212: ...e proxy server Host IP Address If you type function variation as URL you have to type corresponding IP address in this filed Such field must match with URL setting Access Method There are three modes...

Page 213: ...er management are implemented through deploying user accounts Therefore the user account for SSL VPN must be set together with remote dial in user web page Such menu item will guide to access into VPN...

Page 214: ...shown below 3 3 1 15 5 3 3 O On nl li in ne e U Us se er r S St ta at tu us s If you have finished the configuration of SSL Web Proxy server users can find out corresponding settings when they access...

Page 215: ...ctive User Display current user who visit SSL VPN server Host IP Displays the IP address for the host Time out Display the time remaining for logging out ActionYou can click Drop to drop certain login...

Page 216: ...em Maintenance 3 3 1 16 6 1 1 S Sy ys st te em m S St ta at tu us s The System Status provides basic network settings of Vigor router It includes LAN and WAN interface information Also you could get t...

Page 217: ...ble channels supported by the wireless products in different countries are various Firmware Version It indicates information about equipped WLAN miniPCi card This also helps to provide availability of...

Page 218: ...e it another name by yourself 4 Click Save button the configuration will download automatically to your computer as a file named config cfg The above example is using Windows platform for demonstratin...

Page 219: ...3 1 16 6 4 4 S Sy ys sl lo og g M Ma ai il l A Al le er rt t SysLog function is provided for users to monitor router There is no bother to directly get into the Web Configurator of the router or borr...

Page 220: ...r name for authentication Password Type the password for authentication Enable E mail Alert Check the box to send alert message to the e mail box while the router detecting the item s you specify here...

Page 221: ...VigorPro5300 Series User s Guide 213...

Page 222: ...o use the browser time from the remote administrator PC host as router s system time Use Internet Time Select to inquire time information from Time Server on the Internet using assigned protocol Time...

Page 223: ...the checkbox to reject all PING packets from the Internet For security issue this function is enabled by default External Device Auto Discovery Check the checkbox to detect external devices connected...

Page 224: ...s 3 3 1 16 6 7 7 R Re eb bo oo ot t S Sy ys st te em m The Web Configurator may be used to restart your router Click Reboot System from System Maintenance to open the following page If you want to reb...

Page 225: ...ng an example Note that this example is running over Windows OS Operating System Download the newest firmware from DrayTek s web site or FTP site The DrayTek web site is www draytek com or local DrayT...

Page 226: ...iagnostics 3 3 1 17 7 1 1 D Di ia al l o ou ut t T Tr ri ig gg ge er r Click Diagnostics and click Dial out Trigger to open the web page The internet connection e g ISDN PPPoE PPPoA etc is triggered b...

Page 227: ...o reload the page 3 3 1 17 7 3 3 A AR RP P C Ca ac ch he e T Ta ab bl le e Click Diagnostics and click ARP Cache Table to view the content of the ARP Address Resolution Protocol cache held in the rout...

Page 228: ...d PC MAC Address It displays the MAC address for the specified PC that DHCP assigned IP address for it Leased Time It displays the leased time of the specified PC HOST ID It displays the host ID name...

Page 229: ...agement You have to enable IP bandwidth limit and IP session limit before invoke Data Flow Monitor If not a notification dialog box will appear to remind you enabling it Click Diagnostics and click Da...

Page 230: ...umber that you specified in Limit Session web page Action Block can prevent specified PC accessing into Internet within 5 minutes Unblock the device with the IP address will be blocked in five minutes...

Page 231: ...3 3 1 17 7 8 8 P Pi in ng g D Di ia ag gn no os si is s Click Diagnostics and click Ping Diagnosis to pen the web page Ping through Use the drop down list to choose the WAN interface that you want to...

Page 232: ...box and click Run The result of route trace will be shown on the screen Trace through Use the drop down list to choose the WAN interface that you want to ping through or choose Unspecified to be deter...

Page 233: ...One is created by accessing www vigorpro com refer to section 4 1 the other is from router s web configurator refer to section 4 2 After activating the new account you have to register your router fr...

Page 234: ...VigorPro5300 Series User s Guide 226 2 Check to confirm that you accept the Agreement and click Accept 3 Type your personal information in this page and then click Continue...

Page 235: ...uide 227 4 Choose proper selection for your computer and click Continue 5 Now you have created an account successfully 6 Check to see the confirmation email with the title of New Account Confirmation...

Page 236: ...to verify the register process is finished Please click Login 8 When you see the following page please type in the account and password that you just created in the fields of UserName and Password Th...

Page 237: ...can created and register a new account from the web configurator of the VigorPro router 1 Open a web browser on your PC and type http 192 168 1 1 A pop up window will open to ask for username and pass...

Page 238: ...4 A Re login page will be shown on the screen 5 Locate and click Create an account now link on the bottom of this page You will access into the following page Check the box below to confirm that you a...

Page 239: ...VigorPro5300 Series User s Guide 231 6 Type your personal information in this page and then click Continue 7 Choose proper selection for your computer and click Continue...

Page 240: ...9 Check to see the confirmation email with the title of New Account Confirmation Letter from www vigorpro com 10 Click the Activate my Account link to enable the account that you created The following...

Page 241: ...Code according to the value displayed on the right side of it 12 Now click Login Your account has been activated And the following page will be shown automatically DrayTek will maintain a database of...

Page 242: ...e just for once If the router has been registered previously the system will not allow you to register the router again After finishing the router registration you can activate Anti Virus Anti Intrusi...

Page 243: ...4 A Re login page will be shown on the screen Please type the account and password that you created previously And click Login 5 The following page will be displayed after you logging in VigorPro ser...

Page 244: ...and choose the right purchase date from the popup calendar it appears when you click on the box of Purchase Date 7 After adding the basic information for the router please click Submit 8 Now your rout...

Page 245: ...spam service to obtain full security for your computer 4 4 4 4 1 1 F Fo or r A An nt ti i V Vi ir ru us s a an nd d A An nt ti i I In nt tr ru us si io on n S Se er rv vi ic ce e 1 Open a web browser...

Page 246: ...the screen Please type the account and password that you created previously And click Login 5 On the web page of My Product you can find a list of the devices that you add with the above steps Current...

Page 247: ...elete account name used currently Transfer It allows you to transfer the VigorPro device together with applied license to someone who has already registered another account in www vigorpro com Be sure...

Page 248: ...the date for you to activate this version of service Then click Next Note DT DT means you can acquire the anti intrusion and anti virus services from DrayTek Corporation 8 When this page appears clic...

Page 249: ...web configurator The start date and expire date for the license are shown in this page 12 Click Activate to access into VigorPro website again Open the following page You will see the AI AV with prov...

Page 250: ...Ge et tt ti in ng g 3 30 0 D Da ay ys s o of f F Fr re ee e C Ch ha ar rg ge e 1 Open a web browser on your PC and type http 192 168 1 1 A pop up window will open to ask for username and password 2 F...

Page 251: ...the screen Please type the account and password that you created previously And click Login 5 On the web page of My Product you can find a list of the devices that you add with the above steps Current...

Page 252: ...or AS Anti Spam service 7 In this page check the box of I have read and accept the above Agreement The system will find out the date for you to activate this version of service Then click Next Note CT...

Page 253: ...n for your router In addition you will be informed with an e mail before expire date of this version U Up pg gr ra ad de e L Li ic ce en ns se e f fo or r A An nt ti i S Sp pa am m When thirty days fo...

Page 254: ...ser s Guide 246 3 Click the Activate link from Anti Spam License to activate Anti Spam service 4 A Re login page will be shown on the screen Please type the account and password that you created previ...

Page 255: ...ge of My Product you can find a list of the devices that you add with the above steps Currently you just have added VigorPro 5300 Please click the serial number link 6 From the Device s Service sectio...

Page 256: ...er s Guide 248 7 In this page type the License Number stated on the Anti Spam license card in the field of License Number Then click Add License 8 Now the license number will be displayed on the page...

Page 257: ...out the date for you to activate this version of service Then click Next 10 When this page appears click Apply Above figure supposes you have not activated Anti Virus yet 11 Confirm Message window wi...

Page 258: ...VigorPro5300 Series User s Guide 250 13 Click Close to exit...

Page 259: ...can apply for a new license by following the steps below 1 Open a web browser on your PC and type http 192 168 1 1 A pop up window will open to ask for username and password Do not type any word on th...

Page 260: ...the screen Please type the account and password that you created previously And click Login 5 On the web page of My Product you can find a list of the devices that you add with the above steps Current...

Page 261: ...shown on the License Key card Enter the number and click Add License Note DT KL allows you to acquire the anti intrusion service from DrayTek and anti virus service from Kaspersky DT DT allows you to...

Page 262: ...VigorPro5300 Series User s Guide 254 9 Check the box of I have read and accept the above Agreement and click Next 10 When this page appears click Apply...

Page 263: ...for you to make a confirmation Click Confirm 12 The Service Activation screen will be shown as the following 13 Click Close Return to Defense Configuration Status page of the router s web configurator...

Page 264: ...WEB user interface of VigorPro 5300 or account information from www vigorpro com 1 Open a web browser on your PC and type http 192 168 1 1 A pop up window will open to ask for username and password D...

Page 265: ...he Schedule Update box and click OK to activate the time settings 4 4 7 7 S Sw wi it tc ch hi in ng g b be et tw we ee en n D DT T D DT T a an nd d D DT T K KL L You can change anti virus and anti int...

Page 266: ...click Login 5 The following page will be shown automatically You will find there are two devices service added to your router If you activated only one service before it must be only one service disp...

Page 267: ...r account and router you have to access into the web page of Vigor router to enable Anti Virus Anti Intrusion functions There are two ways to enable it A For the default rule of firewall please open F...

Page 268: ...Guide 260 If you did not check the Anti Intrusion box and choose a proper profile for Anti Virus Anti Spam you still cannot use the Anti Intrusion Anti Virus Anti Spam function even if you finished a...

Page 269: ...ay want to connect to network securely such as the remote branch office and headquarter According to the network structure as shown in the below illustration you may follow the steps to create a LAN t...

Page 270: ...x number to edit a profile 4 Set Common Settings as shown below You should enable both of VPN connections because any one of the parties may start the VPN connection 5 Set Dial Out Settings as shown b...

Page 271: ...mpression for this Dial Out connection 6 Set Dial In settings to as shown below to allow Router B dial in to build VPN connection If an IPSec based service is selected you may further specify the remo...

Page 272: ...on for this Dial In connection 7 At last set the remote network IP subnet in TCP IP Network Settings so that Router A can direct the packets destined to the remote network to Router B via the VPN conn...

Page 273: ...oth parties have known 3 Go to LAN to LAN Click on one index number to edit a profile 4 Set Common Settings as shown below You should enable both of VPN connections because any one of the parties may...

Page 274: ...VJ Compression for this Dial Out connection 6 Set Dial In settings to as shown below to allow Router A dial in to build VPN connection If an IPSec based service is selected you may further specify the...

Page 275: ...further specify the remote peer IP Address Username Password and VJ Compression for this Dial In connection 7 At last set the remote network IP subnet in TCP IP Network Settings so that Router B can d...

Page 276: ...e as shown in the below illustration you may follow the steps to create a Remote User Profile and install Smart VPN Client on the remote host Settings in VPN Router in the enterprise office 1 Go to VP...

Page 277: ...connection If an IPSec service is selected you may further specify the remote peer IP Address IKE Authentication Method and IPSec Security Method for this Dial In connection Otherwise it will apply th...

Page 278: ...complimentary software to help you create PPTP L2TP and L2TP over IPSec tunnel You can find it in CD ROM in the package or go to www draytek com download center Install as instructed 2 After successf...

Page 279: ...PP based service is selected you should further specify the remote VPN server IP address Username Password and encryption method The User Name and Password should be consistent with the one set up in...

Page 280: ...at home and takes care of children When working time he would use Vigor router at home to connect to the server in the headquarter office downtown via either HTTPS or VPN to check email and access int...

Page 281: ...ical network speed provided by ISP to maximize the QoS performance 4 Return to previous page Enter the Name of Index Class 1 by clicking Edit link Type the name E mail for Class 1 5 For this index the...

Page 282: ...t enormous UDP traffic of VoIP influent other application and click OK 9 If the worker has connected to the headquarter using host to host VPN tunnel Please refer to Chapter 3 VPN for detail instructi...

Page 283: ...subnet address Leave other fields and click OK 5 5 4 4 L LA AN N C Cr re ea at te ed d b by y U Us si in ng g N NA AT T An example of default setting and the corresponding deployment are shown below...

Page 284: ...276 You can just set the settings wrapped inside the red rectangles to fit the request of NAT usage To use another DHCP server in the network rather than the built in one of Vigor Router you have to c...

Page 285: ...VigorPro5300 Series User s Guide 277 You can just set the settings wrapped inside the red rectangles to fit the request of NAT usage...

Page 286: ...org Proxy draytel org Act as outbound proxy unhecked Display Name John Account Number Name 1234 Authentication ID unchecked Password Expiry Time use default value CODEC RTP DTMF Use default value John...

Page 287: ...use default value CODEC RTP DTMF Use default value John calls David He picks up the phone and dials 1111 DialPlan Phone Number for David Or He picks up the phone and dials 4321 David s Account Name S...

Page 288: ...main Realm blank Proxy blank Act as outbound proxy unchecked Display Name Arnor Account Name 1234 Authentication ID unchecked Password blank Expiry Time use default value CODEC RTP DTMF Use default va...

Page 289: ...ty click Install Now under Syslog description to install the corresponding program 4 The file RTSxxx exe will be asked to copy onto your computer Remember the place of storing the execution file 5 Go...

Page 290: ...n Programs and choose Router Tools XXX Firmware Upgrade Utility 12 Type in your router IP usually 192 168 1 1 13 Click the button to the right side of Firmware file typing box Locate the files that yo...

Page 291: ...uide 283 14 Click Send 15 Now the firmware update is finished 5 5 7 7 R Re eq qu ue es st t a a c ce er rt ti if fi ic ca at te e f fr ro om m a a C CA A s se er rv ve er r o on n W Wi in nd do ow ws...

Page 292: ...te Management and choose Local Certificate 2 You can click GENERATE button to start to edit a certificate request Enter the information in the certificate request 3 Copy and save the X509 Local Certif...

Page 293: ...take a Windows 2000 CA server for example Select Request a Certificate Select Advanced request Select Submit a certificate request a base64 encoded PKCS 10 file or a renewal request using a base64 en...

Page 294: ...ate Now you should get a certificate cer file and save it 5 Back to Vigor router go to Local Certificate Click IMPORT button and browse the file to import the certificate cer file into Vigor router Wh...

Page 295: ...t ti if fi ic ca at te e a an nd d S Se et t a as s T Tr ru us st te ed d o on n W Wi in nd do ow ws s C CA A S Se er rv ve er r 1 Use web browser connecting to the CA server that you would like to re...

Page 296: ...ted CA Certificate Click IMPORT button and browse the file to import the certificate cer file into Vigor router When finished click refresh and you will find the below illustration 4 You may review th...

Page 297: ...I If f t th he e H Ha ar rd dw wa ar re e S St ta at tu us s I Is s O OK K o or r N No ot t Follow the steps below to verify the hardware status 1 Check the power line and WLAN LAN cable connections...

Page 298: ...o the examples for other operation systems please refer to the similar steps or find support notes in www draytek com 1 Go to Control Panel and then double click on Network Connections 2 Right click o...

Page 299: ...matically and Obtain DNS server address automatically F Fo or r M Ma ac cO Os s 1 Double click on the current used MacOs on the desktop 2 Open the Application folder and get into Network 3 On the Netw...

Page 300: ...e router correctly F Fo or r W Wi in nd do ow ws s 1 Open the Command Prompt window from Start menu Run 2 Type command for Windows 95 98 ME or cmd for Windows NT 2000 XP The DOS command dialog will ap...

Page 301: ...ot t Click WAN Internet Access and then check whether the ISP settings are set correctly Click Details Page of WAN1 WAN2 to review the settings that you configured previously F Fo or r P PP PP Po oE...

Page 302: ...uide 294 F Fo or r S St ta at ti ic c D Dy yn na am mi ic c I IP P U Us se er rs s 1 Check if the Enable option is selected 2 Check if IP address Subnet Mask and Gateway are entered with correct value...

Page 303: ...improved by returning to the default settings Try to reset the router by software or hardware Warning After pressing factory default setting you will loose all settings you did before Make sure you ha...

Page 304: ...n Then the router will restart with the default configuration After restore the factory default setting you can configure the settings for the router again to fit your personal request 6 6 6 6 C Co on...

Reviews: