background image

 

 

S

S

e

e

c

c

u

u

r

r

i

i

t

t

y

y

 

 

Q

Q

o

o

S

S

 

 

R

R

o

o

u

u

t

t

e

e

r

r

 

 

 

 

84 

8.3  Smart QoS 

The  smart  QoS  function  enables  the  administrators  to  constrain  the  bandwidth  occupied 

automatically without any configuring. 

 

Enabled QoS

 

Choose to apply QoS function. 

When the usage of any WAN

’s bandwidth is 

over than___%, Enable Smart QoS 

Input the required rate value into the column.    The 

default is 60%. 

Each IP

’s upstream bandwidth threshold 

(for all WAN)

 

Input the max. upstream rate for intranet IPs. 

Each IP

’s downstream bandwidth threshold 

(for all WAN) 

 

Input the max. downstream rate for intranet IPs. 

If any IP

’s bandwidth is over maximum 

threshold, its maximum bandwidth will 

remain

 

When any IP uses more bandwidth than the above 

upstream or downstream settings, the IP will be 

restricted for the following upstream or downstream 

bandwidth settings. 

Enabled Penalty Mechanism

 

After choosing 

“Enabled Penalty Mechanism”, the 

device will enable the penalty conditions internally. 

When the IP still uses more upstream or downstream 

bandwidth than the setting, the device will execute the 

penalty conditions automatically. 

Show Penalty IP

 

The IPs which are under penalty mechanism will be 

shown on the list. 

Summary of Contents for Security QoS Firewall Router

Page 1: ...English User s Manual Security QoS Firewall Router 2x100Mbps WAN 2x100Mbps Switch LAN WAN2 DMZ Fully Integrated SMB Solution...

Page 2: ...copyright and other regulations of intellectual property When the user copies the Manual this statement of intellectual property must also be copied and indicated Otherwise Qno regards it as tort and...

Page 3: ...nd or distributors hereby declares that no liability will be born for any guarantee and condition of the corresponding information The guarantee and condition include tacit guarantee and condition abo...

Page 4: ...Status 15 5 1 2 Physical Port Status 16 5 1 3 System Information 18 5 1 4 Firewall Status 19 5 1 5 Log Setting Status 19 5 2 Change and Set Login Password and Time 20 5 2 1 Password Setting 20 5 2 2...

Page 5: ...1 1 DMZ Host 104 10 1 2 Port Range Forwarding 104 10 2 UPnP 108 10 3 Routing 109 10 2 1 Dynamic Routing 109 10 2 2 Static Routing 110 10 4 One to One NAT 112 10 5 DDNS Dynamic Domain Name Service 114...

Page 6: ...rface and User Manual Chapter Cross Reference 148 Appendix II Troubleshooting 150 1 Block BT Download 150 2 Shock Wave and Worm Virus Prevention 151 3 Block QQLive Video Broadcast Setting 153 4 ARP Vi...

Page 7: ...acity are almost equal to those of expensive enterprise level Security QoS Routers This is why the device is so popular with modern enterprises The advanced built in firewall function enables Security...

Page 8: ...ck attacks and prevent security risks at the same time Through the process settings users can install and operate Security QoS Router easily This simplifies the management and maintenance making the u...

Page 9: ...ecification Firmware version and working status Set password and time Set time and re new password Modify the login password considering safe issue Synchronize time with WAN 4 Set WAN connection Verif...

Page 10: ...cking 8 Advanced Settings DMZ Forwarding UPnP DDNS MAC Clone DMZ Forwarding UpnP Routing Mode multiple WAN IP DDNS and MAC Clone DMZ Forwarding UPnP Routing Mode multiple WAN IP DDNS and MAC Clone 9 M...

Page 11: ...Green LED on WAN is connected and gets the IP address WAN1 Green Green LED on WAN1 is connected and IP address has been obtained WAN2 Green Green LED on WAN2 is connected and IP address has been obta...

Page 12: ...e Router has two wall mount slots on its bottom panel When mounting the device on a wall please ensure that the heat dissipation holes are facing sideways as shown in the following picture for safety...

Page 13: ...AN port can be connected with xDSL Modem Fiber Modem Switching Hub or through an external router to connect to the Internet LAN Connection The LAN port can be connected to a Switching Hub or directly...

Page 14: ...rt Run enter cmd to commend DOS and enter ipconfig for getting Default Gateway address as the graphic below 192 168 1 1 Make sure Default Gateway is also the default IP address of the router Attention...

Page 15: ...ge the login password in the setting later Attention For security we strongly suggest that users must change password after login Please keep the password safe or you can not login to the device Press...

Page 16: ...device s parameters and status are listed for users reference 5 1 1 WAN Status WAN IP Address Indicates the current IP configuration for WAN port Default Gateway Indicates current WAN gateway IP addre...

Page 17: ...e and Renew will appear If a WAN connection such as PPPoE or PPTP is selected Disconnect and Connect will appear DMZ IP Address Indicates the current DMZ IP address 5 1 2 Physical Port Status The stat...

Page 18: ...e 10Base T 100Base TX iniferface WAN LAN DMZ link status Up Down physical port status Port Enabled Port Disabled priority high or normal speed status 10Mbps or 100Mbps duplex status Half Full auto neg...

Page 19: ...how long the Router has been running Serial Number This number is the Router serial number Firmware Version Information about the Router present software version Current Time Indicates the device pre...

Page 20: ...ted The default configuration is On Prevent ARP Virus Attack Indicates that preventing Arp virus attack is acitvated The default configuration is Off Remote Management Indicates if remote management i...

Page 21: ...ity reasons we strongly recommend that you must change your password after first login Please keep the password safe or you might not login to the device You can press Reset button for more than 10 se...

Page 22: ...the System Log and the time of closing or opening access for Internet resources You can either select the embedded NTP Server synchronization function or set up a time reference Synchronize with exter...

Page 23: ...nfiguration Cancel Click Cancel to leave without making any change This action will be effective before Apply to save the configuration Select the Local Time Manually Input the correct time date and y...

Page 24: ...this general setting is enough for connecting with the Internet However some users need advanced information from their ISP Please refer to the following descriptions for specific configurations 6 1 N...

Page 25: ...ed according to the actual network structure Multiple Subnet Setting Click Unified IP Management to enter the configuration page as shown in the following figure Input the respective IP addresses and...

Page 26: ...nt Bridge Config A modification in an advanced configuration Click Edit to enter the advanced configuration page Obtain an Automatic IP automatically This mode is often used in the connection mode to...

Page 27: ...there is a standby system in the device at the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnec...

Page 28: ...P or eight IP addresses etc please select this connection mode and follow the steps below to input the IP numbers issued by an ISP into the relevant boxes WAN IP address Input the available static IP...

Page 29: ...new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule for disconnection of this WAN servic...

Page 30: ...nect with the Internet the device will automatically make a dial connection If the line has been idle for a period of time the system will break the connection automatically The default time for autom...

Page 31: ...an activate this function to arrange new connections to be made through another WAN to the Internet In this way the effect of any disconnection can be minimized Line Dropped Period Input the time rule...

Page 32: ...talled Contact ISP for relevant information Subnet Mask Input the subnet mask of the static IP address issued by ISP such as Issued eight static IP addresses 255 255 255 248 Issued 16 static IP addres...

Page 33: ...t the moment of WAN disconnection all the external connections that go through this WAN will be disconnected too Only after the disconnected lines are reconnected can they go through the standby syste...

Page 34: ...on If there are two WANs configured users still can select Transparent Bridge mode for WAN connection mode and load balancing will be achieved as usual WAN IP Address Input one of the static IP addres...

Page 35: ...to connect with the Internet Therefore to avoid a huge number of disconnection users can activate this function to arrange new connections to be made through another WAN to the Internet In this way th...

Page 36: ...classified by Subnet and Range Subnet The DMZ and WAN located in different Subnets For example If the ISP issued 16 real IP addresses 220 243 230 1 16 with Mask 255 255 255 240 users have to separate...

Page 37: ...i it ty y Q Qo oS S R Ro ou ut te er r 36 IP Range Input the IP range located at the DMZ port After the changes are completed click Apply to save the configuration or click Cancel to leave without mak...

Page 38: ...S S R Ro ou ut te er r 37 6 2 Multi WAN Setting When you have multiple WAN gateways you can use Traffic Management and Protocol Binding function to fulfill WAN road balancing so that we can have highe...

Page 39: ...tions based on session number to achieve network load balance IP Session Balance If By IP is selected the WAN bandwidth will automatically allocate connections based on IP amount to achieve network lo...

Page 40: ...cing Session Balance If By Session is selected the WAN bandwidth will automatically allocate connections based on session number to achieve network load balance IP Balance If By IP is selected the WAN...

Page 41: ...this way the traffic for Netcom and Telecom can be divided Set WAN Grouping If more than one WAN is connected with Netcom to apply a similar division of traffic policy to these WANs a combination for...

Page 42: ...guration window click Apply The device will then dispatch the traffic to the assigned destination IP through the WAN ex WAN 1 or WAN grouping users designated to the Internet To build a policy documen...

Page 43: ...l connections for example web banking encrypted connection Https or TCP443 is required to connect from the same WAN IP If one intranet IP visits web banking website and the connection is distributed i...

Page 44: ...to other IP not in the same Class B range as 61 222 81 100 the session will be distributed in the orginal session balance mechanism When the other intranet IP 192 168 1 101 visits 61 222 81 101 for th...

Page 45: ...define the service ports and destination IP If the destination IP is set as 0 0 0 0 to 0 this represents that the destination is to any IP range Note You can only choose either Destimation Auto Bindin...

Page 46: ...TCP443 port connections This rule is by default You can delete or add rules to meet your connection requirement 6 2 2 Network Service Detection This is a detection system for network external services...

Page 47: ...ction when WAN 1 is disconnected 2 Keep System Log and Remove the Connection If an ISP connection failure is detected no error message will be recorded in the System Log The packet transmitted through...

Page 48: ...he load balance mode for Assigned Routing the first WAN port WAN1 will be saved for the traffic of the IP addresses or the application service ports that are not assigned to other WANs WAN2 Therefore...

Page 49: ...ion refers to QoS configuration Therefore it should be set in QoS page Please refer to 8 1 QoS bandwidth configuration Protocol Binding Users can define specific IP addresses or specific application s...

Page 50: ...ce Port configuration page to add or remove default Service Ports on the option list Source IP Users can assign packets of specific Intranet virtual IP to go through a specific WAN port for external c...

Page 51: ...list Delete selected item To remove the rules selected from the Service List Moving Up Down The priority for rule execution depends on the rule order in the list A rule located at the top will be exe...

Page 52: ...r UDP for the Service Ports users want to activate Port range In the boxes input the range of Service Ports users want to add Add To List Click the button to add the configuration into the Services Li...

Page 53: ...choose for external connections Example 1 How do I set up Auto Load Balance Mode to assign the Intranet IP 192 168 1 100 to WAN2 for the Internet As in the figure below select All Traffic from the pu...

Page 54: ...ll be added to the mode Example 3 How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going through WAN2 when the destination port is Port 80 and keep all other services from...

Page 55: ...click Enable Finally click Add New and the rule will be added to the mode The device will transmit packets that are not going to Port 80 to the Internet through WAN1 Configuring Assigned Routing Mode...

Page 56: ...80 from the pull down option list Service and then in the boxes of Source IP input 192 168 1 0 0 which means to include all Intranet IP addresses Retain the original numbers 0 0 0 0 in the boxes of De...

Page 57: ...to include all Intranet IP addresses In the boxes for Destination IP input 211 1 1 1 211 254 254 254 Select WAN2 from the pull down option list Interface and then click Enable Finally click Add New an...

Page 58: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 57...

Page 59: ...umber of ports speed priority duplex and enable disable the auto negotiation feature for connection setting of each port DisabledPort This feature allows users turn on off the Ethernet port If selecte...

Page 60: ...s administrators to set the LAN port to be one or more disconnected network sessions All of them will be able to log on to the Internet through the device Members in the same network session within th...

Page 61: ...riority Setting High or Normal Speed Status 10Mbps or 100Mbps Duplex Status half duplex or full duplex Auto Neg Enabled Disabled and VLAN Statistics The packet data of this specific port will be displ...

Page 62: ...for LAN computers This function is similar to the DHCP service in NT servers It benefits users by freeing them from the inconvenience of recording and configuring IP addresses for each PC respectivel...

Page 63: ...e unit is minute Range End This is an initial IP automatically leased by DHCP It means DHCP will start the lease from this IP The default initial IP is 192 168 1 100 DNS Domain Name Service This is fo...

Page 64: ...cations are for the administrator s reference when a network modification is needed DHCP Server This is the current DHCP IP Dynamic IP Used The amount of dynamic IP leased by DHCP Static IP Used The a...

Page 65: ...released by DHCP Delete Remove a record of an IP lease DNS Local Database Feature Normally DNS sever will be directed to ISP DNS server or internal self defined DNS server Qno router also provides eas...

Page 66: ...DNS IP address as the router LAN IP For example LAN is 10 10 10 1 as shown in the following figure Therefore DCHP DNS IP address must be 10 10 10 1 to make DNS local database in effect 3 After enablin...

Page 67: ...ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 66 1 System Tool Diagnostic DNS Name Lookup 2 Enter tw yahoo com for lookup 3 The IP is 10 10 10 199 confirming the corresponding IP in DNS local data...

Page 68: ...ur ri it ty y Q Qo oS S R Ro ou ut te er r 67 7 5 IP MAC Binding Administrators can apply IP MAC Binding function to make sure that users can not add extra PCs for Internet access or change private IP...

Page 69: ...methods for setting up this function 1 Block MAC address not on the list This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet access When this method...

Page 70: ...d IP input 0 0 0 0 in the boxes The boxes cannot be left empty 2 If users want DHCP to assign a static IP for a PC every single time users should input the IP address users want to assign to this comp...

Page 71: ...the Internet Show New IP user This function can reduce administrator s effort on checking MAC addresses one by one for the binding Furthermore it is easy to make mistakes to fill out MAC addresses on...

Page 72: ...or provide priority to specific applications or services and also to enable other users to share bandwidth as well as to ensure stable and reliable network transmission To maximize the bandwidth effi...

Page 73: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 72 8 1 Bandwidth Management...

Page 74: ...ds it will guarantee a minimum rate of upstream and downstream for each IP and Service Port based on the total actual bandwidth of WAN1 and WAN2 For example if the upstream bandwidths of both WAN1 and...

Page 75: ...rs the device enables users to set up QoS Rate Control and Priority Control Users can select only one of the above QoS choices Rate Control The network administrator can set up bandwidth or usage limi...

Page 76: ...ingle selection or multiple selections Service Port Select what bandwidth control is to be configured in the QoS rule If the bandwidth for all services of each IP is to be controlled select All TCP UD...

Page 77: ...If a Server for external connection has been built in the device this option is to control the bandwidth for the traffic coming from outside to this Server Server in LAN Downstream If there are web s...

Page 78: ...oad information the total occupied bandwidth is fixed Enable Activate the rule Add to list Add this rule to the list Move up Move down QoS rules will be executed from the bottom of the list to the top...

Page 79: ...g 192 168 1 1 254 in Direction part open the dropdown box and choose Downstream Import 2Kbit Sec in Mini Rate which guarantees the minimum bandwidth for FTP downloading And import 50Kbit Sec in Max Ra...

Page 80: ...tion part open the dropdown box and choose Downstream Import 2Kbit Sec in Mini Rate which guarantees the minimum bandwidth And import 512Kbit Sec in Max Rate for a maximum limitation Choose Assign ban...

Page 81: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 80...

Page 82: ...th usage In addition if any Intranet PC is attacked by a virus like Worm Blaster and sends a huge number of session requests session control will restrict that as well Session Control and Scheduling D...

Page 83: ...on has been closed new sessions cannot be made until the setting time ends If this function is selected when the user s port connections reach the limit all the lines that this user is connected with...

Page 84: ...Choose the service port Source IP Input the IP address range or IP group Enabled Activate the rule Add to list Add this rule to the list Delete seleted item Remove the rules selected from the Service...

Page 85: ...nstream bandwidth threshold for all WAN Input the max downstream rate for intranet IPs If any IP s bandwidth is over maximum threshold its maximum bandwidth will remain When any IP uses more bandwidth...

Page 86: ...ys is selected the rule will be executed around the clock If From is selected the rule will be executed according to the configured time range For example if the time control is from Monday to Friday...

Page 87: ...the remote management feature will be activated The network access rules and content filter will be turned off Firewall This feature allows users to turn on off the firewall SPI Stateful Packet Inspec...

Page 88: ...the field of remote browser IP a valid external IP address WAN IP for the device should be filled in and the modifiable default control port should be adjusted the default is set to 80 modifiable Mult...

Page 89: ...the threshold value and the blocking duration to effectively deal with external attack The threshold value should be adjusted from high to low LAN Threshold When all packet values from internal attack...

Page 90: ...P Show the blocked IP list and the remained blocked time Restricted WEB Features It supports the block that is connected through Java Cookies Active X and HTTP Proxy access Apply Click Apply to save t...

Page 91: ...P address in the intranet users may check the following item and then enter the specific IP address or IP address session to use the services which are checked above The UI might vary from model to mo...

Page 92: ...y y Q Qo oS S R Ro ou ut te er r 91 User Name Input the information of the QQ number etc Exempted QQ Number Input the number Add to list Add the number to the list Delete selected item Delete the sele...

Page 93: ...etwork so as to protect all internet access The following describes the internet access rules All traffic from the LAN to the WAN is allowed by default All traffic from the WAN to the LAN is denied by...

Page 94: ...the priority of each network access rule The device will follow the rule priorities one by one so please make sure the priority for all the rules can suit the setting rules Edit Define the network acc...

Page 95: ...nu press Service Management to add the new service From the pop up window enter a service name and communications protocol and port and then click the Add to list button to add the new service Log No...

Page 96: ...ns this period of time will be under control everyday If users only certain days of a week should be under control users may select the desired days directly Apply Click Apply to save the configuratio...

Page 97: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 96...

Page 98: ...230 to access service port 80 Action Forbid Service Port TCP 80 Source Interface LAN Meaning to service port 80 which blocks the traffic from intranet to internet Source IP 192 168 1 200 192 168 1 23...

Page 99: ...device supports two webpage restriction modes one is to block certain forbidden domains and the other is to give access to certain web pages Only one of these two modes can be selected Block Forbidden...

Page 100: ...te er r 99 Add Enter the websites to be controlled such as www playboy com Add to list Click Add to list to create a new website to be controlled Delete selected item Click to select one or more contr...

Page 101: ...rds Only for English keyword Enter keywords Add to List Add this new service item content to the list Delete selected item Delete the service item content from the list Apply Click Apply to save the m...

Page 102: ...u ut te er r 101 Enabled Activate the function The default setting is Disabled Add Input the allowed domain name etc www google com Add to list Add the rule to list Delete selected item Users can sele...

Page 103: ...on to add new unrestricted IPs Delete selected item Select out one more unrestricted IPs click this button to delete them Content Filter Scheduling Select Always to apply the rule on a round the clock...

Page 104: ...is Select from and the operation will run according to the defined time to Select Always to apply the rule on a round the clock basis If From is selected the activation time is introduced as below Day...

Page 105: ...Intranet virtual IP addresses as follows If the DMZ Host function is selected to cancel this function users must input 0 in the following DMZ Private IP This function will then be closed After the cha...

Page 106: ...such as http 211 243 220 43 At this moment the device actual IP will be converted into 192 168 1 50 by Port 80 to access the web page In the same way to set up other services please input the server...

Page 107: ...e Service Port Management to add or remove ports as follows Service Name Input the name of the service port users want to activate on the list such as E donkey etc Protocol To select whether a service...

Page 108: ...r r 107 Delete selected item To remove the selected services Apply Click the Apply button to save the modification Cancel Click the Cancel button to cancel the modification This only works before Appl...

Page 109: ...21 Please refer to the default service number list Host Name or IP Address Input the Intranet virtual IP address or name that maps with UPnP such as 192 168 1 100 Enabled Activate this function Servi...

Page 110: ...g The abbreviation of Routing Information Protocol is RIP There are two kinds of RIP in the IP environment RIP I and RIP II Since there is usually only one router in a network ordinarily just Static R...

Page 111: ...he RIP function Receive RIP versions Use Up Down button to select one of None RIPv1 RIPv2 Both RIPv1 and v2 as the TX function for transmitting dynamic RIP Transmit RIP versions Use Up Down button to...

Page 112: ...the router layer count for the IP If there are two routers under the device users should input 2 for the router layer the default is 1 Max is 15 Interface This is to select WAN port or LAN port for ne...

Page 113: ...own public IP addresses For example if there are more than 2 web servers requiring public IP addresses administrators can map several public IP addresses directly to internal private IP addresses Exam...

Page 114: ...IP addresses Please do not include IP addresses in use by WANs Add to List Add this configuration to the One to One NAT list Delete Seleted Item Remove a selected One to One NAT list Apply Click Appl...

Page 115: ...modem will be changed from time to time To overcome this problem for users who want to build services such as a website it offers the function of dynamic web address transfer This service can be appli...

Page 116: ...e of the four DDNS website address transfer functions Username The name which is set up for DDNS Input a complete website address such as abc qnoddns org cn as a user name for QnoDDNS Password The pas...

Page 117: ...Apply After the changes are completed click Apply to save the network configuration modification Cancel Click Cancel to leave without making any changes Register for Qno DDNS 1 Please go to Qno websit...

Page 118: ...which users used to register this product and the serial number of the product to log in to the QnoDDNS Service System Be sure to input an available e mail address so that the password sent from the s...

Page 119: ...te er r 118 3 Rules for Applying a Domain Name The Domain should have at least 4 letters and no more than 63 letters The Domain name should only consist of a z lowercase letter and 0 9 numerals and th...

Page 120: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 119...

Page 121: ...can input the network card physical address MAC address 00 xx xx xx xx xx here The device will adopt this MAC address when requesting IP address from ISP Select the WAN port to which the configuratio...

Page 122: ...e setting is in Chapter 5 2 11 1 Diagnostic The device provides a simple online network diagnostic tool to help users troubleshoot network related problems This tool includes DNS Name Lookup Domain Na...

Page 123: ...orms users of the status quo of the outbound session and allows the user to know the existence of computers online On this test screen please enter the host IP that users want to test such as 192 168...

Page 124: ...rmware Upgrade page Please confirm all information about the software version in advance Select and browse the software file click Firmware Upgrade Right Now to complete the upgrade of the designated...

Page 125: ...nt of parameter settings into the device Before upgrade confirm all information about the software version Select and browse the backup parameter file config exp Select the file and click Import to im...

Page 126: ...ugh this SNMP communications protocol programs with network management i e SNMP Tools HP Open View can help communications of real time management The device supports standard SNMP v1 v2c and is consi...

Page 127: ...he name of the group or community that can view the device SNMP data The default setting is Public Set Community Name Set the name of the group or community that can receive the device SNMP data The d...

Page 128: ...ut te er r 127 11 5 System Recover Users can restart the device with System Recover button System Recover As the figure below if clicking Restart Router button the dialog block will pop out confirming...

Page 129: ...c cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 128 Return to Factory Default Setting If clicking Return to Factory Default Setting the dialog block will pop out if the device will return to factory d...

Page 130: ...d look up we can see the relevant operation status which is convenient for us to facilitate the setup and operation 12 1 System Log Its system log offers three options system log E mail alert and log...

Page 131: ...rning message Click to activate these features Syn Flooding IP Spoofing Win Nuke Ping of Death Unauthorized Login Attempt Syn Flooding Bulky syn packet transmission in a short time causes the overload...

Page 132: ...stance message will be recorded in the system log Allow Policies If remote users enter the system because of compliance with access rules for instance message will be recorded in the system log Config...

Page 133: ...o oS S R Ro ou ut te er r 132 Outgoing Packet Log View system packet log which is sent out from the internal PC to the Internet This log includes LAN IP destination IP and service port that is applied...

Page 134: ...et Log View system packet log of those entering the firewall The log includes information about the external source IP addresses destination IP addresses and service ports It is illustrated as below C...

Page 135: ...n such as port location device name current WAN link status IP address MAC address subnet mask default gateway DNS number of received sent total packets number of received sent total Bytes Received an...

Page 136: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 135...

Page 137: ...ll be displayed on the Traffic Statistic page to provide better traffic management and control Inbound IP Source Address The figure displays the source IP address bytes per second and percentage Outbo...

Page 138: ...er r 137 Inbound IP Service The figure displays the network protocol type destination IP address bytes per second and percentage Outbound IP Service The figure displays the network protocol type desti...

Page 139: ...ows administrators to inquire a specific IP or from a specific port about the addresses that this IP had visited or the users source IP who used this service port This facilitates the identification o...

Page 140: ...t ty y Q Qo oS S R Ro ou ut te er r 139 Specific IP Status Enter the IP address that users want to inquire and then the entire destination IP connected to remote devices as well as the number of ports...

Page 141: ...nnection Statistic Future Feature Connection Statistic function is used to record the numbers of network connections including outbound sessions and intranet users PC It also displays the user connect...

Page 142: ...to down Jump to___ ___Page Entries per page___ Select this function to display the data by how many entries of data per page will be displayed Also you can select the page you would like to see from...

Page 143: ...ult When you are going to enable the QRTG function system will pop up a warning massage to remind you this function will be enabled which may influence router efficiency You can use drop down menu to...

Page 144: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 143 II WAN Traffic Statistic hourly graphic and average up down stream As in the following figures...

Page 145: ...ri it ty y Q Qo oS S R Ro ou ut te er r 144 The UI might vary from model to model depending on different product lines III WAN Traffic Statistic Day graphic and average up down stream As in the follo...

Page 146: ...ri it ty y Q Qo oS S R Ro ou ut te er r 145 The UI might vary from model to model depending on different product lines IV WAN Traffic Statistic Week graphic and average up down stream As in the follo...

Page 147: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 146 The UI might vary from model to model depending on different product lines...

Page 148: ...ou ut te er r 147 XIII Log out On the top right corner of the web based UI there is a Logout button Click on it to log out of the web based UI To enter next time open the Web browser and enter the IP...

Page 149: ...ter overall interface is as below Category Sub category Chapter Home V Device Spec Verification Status Display and Login Password and Time Setting 5 1 Home Basic Setting VI Network Network Connection...

Page 150: ...ice Spec Verification Status Display and Login Password and Time Setting Password 5 2 Change and Set Login Password and Time Diagnostic 11 1 Diagnostic Firmware Upgrade 11 2 Firmware Upgrade Setting B...

Page 151: ...150 Appendix II Troubleshooting 1 Block BT Download To block BT and prevent downloading by users go to the Firewall Content Filter and select Enable Website Block by Keywords followed by the input of...

Page 152: ...m viruses recently the internet transmission speed was brought down and the Session bulky increase result in the massive processing load of the device The following guides users to block this virus co...

Page 153: ...S Se ec cu ur ri it ty y Q Qo oS S R Ro ou ut te er r 152 Use the same method to add UDP UDP135 139 and TCP 445 445 Ports c Enhance the priority level of these three to the highest...

Page 154: ...into the device web based UI and enter Firewall Access Rule b Click Add New Rule under Access Rule page Select Deny in Action under the Service rule setting followed by the selection of All Traffic TC...

Page 155: ...IP address in Dest IP with repeat operation 121 14 75 115 60 28 234 117 60 28 235 119 222 28 155 17 QQ LiveVersion QQ Live 2008 7 0 4017 0 Tested on 2008 07 29 After repeated addition users may see th...

Page 156: ...to the definition of ARP Address Resolution Protocol In LAN what is actually transmitted is frame in which there is MAC address of the destination host device So called Address Analysis refers to the...

Page 157: ...2000 XP 2003 There are two attack methods affecting the network connection speed cheat on the ARP table in the device or LAN PC The former intercepts the gateway data and send ceaselessly a series of...

Page 158: ...points to the same MAC address as 00 0f 3d 83 74 28 Evidently this is a cheat by ARP 3 ARP Solution Now we understand ARP ARP cheat and attack as well as how to identify this type of attack What come...

Page 159: ...01 as illustrated For other host devices within the network follow the same way to enter the IP and MAC address of the corresponding device to complete the binding work However if this act restarts th...

Page 160: ...m both of the PC and device ends in order to carry out the prevention work However this is more complicated because the search for the IP and address and MAC increases the workload Moreover there is g...

Page 161: ...thod is not recommended because the inquiry of IP MAC addresses of all hosts creates heavy workload Another method to bind IP and MAC is more recommended because of easy operation reducing workload an...

Page 162: ...IP and MAC address corresponding to the PC are displayed Enter the Name of the computer and click on Enabled with the display of the icon and push the option on the top right corner of the screen to...

Page 163: ...us killing and the system re installation This operation is more important because it solves the source PC which is attacked by ARP This can better shelter the network from being attacked 2 Cyber caf...

Page 164: ...sures for protection 6 Close some unnecessary services and some unnecessary sharing if the condition is applicable which includes such management sharing as C and D Single device user can directly clo...

Page 165: ...the Qno s bandwidth forum refer to the examples of the FTP server or contact the technical department of Qno s dealers as well as the Qno s Mainland technical center Qno Official Website http www Qno...

Reviews: