background image

 

  

ALARM (Red) 

 

 

  

Bridging and VLAN

 

 

  

IEEE 802.1D Transparent Learning Bridge 

 

  

IEEE 802.1Q and Port Based VLAN 

 

  

Spanning Tree Protocol (STP) 

 

  

Up to 2K Mac Address 

 

  

Routing

 

 

  

Static routing and RIP v1/v2(RFC 1058/2453) 

 

  

NAT/PAT (RFC1631) 

 

  

NAT Application Level Gateways 

 

  

Skype/MSN/Yahoo Messenger (RFC2933) 

 

  

VoIP(SIP) pass through 

 

  

VPN PPTP/L2TP pass through 

 

  

Virtual Server 

 

  

Network Protocol

 

 

  

IPv4 (ARP/RARP, TCP/UDP,ICMP) 

 

  

DHCP Client/Server, Relay 

 

  

DNS Relay/Proxy, Dynamic DNS(DDNS) 

 

  

IGMP v1/v2/v3, IGMP Proxy, IGMP Snooping 

 

  

SNTP and UPnP 

 

  

ATM

 

 

  

8 PVC 

 

  

OAM F4/F5 Loopback 

 

  

AAL5 

 

  

VC Multiplexing and SNAP/LLC 

 

  

Ethernet over ATM (RFC 2684/RFC1483) 

 

  

Multiple protocol over ATM AAL5(MPOA, REF1483/2684) 

 

  

PPP over ATM (RFC 2364) 

 

  

Classic IP over ATM (RFC 1577) 

 

  

QoS(UBR/CBR/VBR/VBR-RT) 

 

  

PPP

 

 

  

PPPoE 

 

  

PAP/CHAP/MS-CHAP/MS-CHAPv2 

 

  

Configurable timer to auto-reconnect 

  

Configurable Idle times for timeout 

 

Summary of Contents for XL-EFM404V

Page 1: ...XL EFM404V G SHDSL BIS VPN ROUTER USER MANUAL...

Page 2: ...TECTIVE EARTH FRAME GROUND TERMINAL 12 3 CONFIGURATION 12 3 1 CONFIGURATION METHODS 12 3 1 1 Web Configuration 12 3 1 2 Serial Console Configuration 13 3 1 3 Telnet Configuration 13 3 1 4 Installation...

Page 3: ...MP 71 3 7 3 TR 069 72 3 7 4 UPnP 73 3 7 5 Sys Log 73 3 7 6 Telnet 74 3 7 7 SSH 74 3 7 8 Web 75 3 8 SHOW 75 3 8 1 Information 76 3 8 2 Sys Log 77 3 8 3 CPU Info 77 3 8 4 Script 78 3 9 STATUS 79 3 9 1 S...

Page 4: ...connection that DSL features XTENDLAN EFM series VPN routers provide advanced firewall with SPI Stateful Packet Inspection and DoS protection serving as a powerful firewall to protect from outside in...

Page 5: ...ntation over SHDSL bis PPPoA and PPPoE support user authentication with PAP CHAP MS CHAP MS CHAPv2 SNMP management with SNMPv1 v2c v3 agent and MIB II Getting enhancements and new features via Interne...

Page 6: ...P pass through Virtual Server Network Protocol IPv4 ARP RARP TCP UDP ICMP DHCP Client Server Relay DNS Relay Proxy Dynamic DNS DDNS IGMP v1 v2 v3 IGMP Proxy IGMP Snooping SNTP and UPnP ATM 8 PVC OAM F...

Page 7: ...ty queues IP Precedence Alternation VPN IPSec RFC2411 up to 4 Tunnels DES 3DES AES MD5 SHA 1 IKE Manual Key ISAKMP RFC 2407 2408 4306 IKE v1 RFC 2409 4109 PSK L2TP PPTP Firewall SPI Stateful Packet In...

Page 8: ...II RFC 1213 1493 Syslog with Remote Logging support Firmware Upgrade via TFTP Configuration Data Import Export Multiple Levels of Administration Privilege Support TR 069 WAN management protocol Physi...

Page 9: ...shed SHDSL bis line 3 handshake Blink LINK 4 Transmit or received data over SHDSL bis link 3 On SHDSL bis line 4 connection is established SHDSL bis line 4 handshake Blink LAN ALM LINK ACT1 LINK ACT2...

Page 10: ...LE RJ 45 for system configuration and maintenance RST Reset button for reboot or load factory default LAN 1 2 3 4 10 100BaseT auto sensing and auto MDIX for LAN port RJ 45 USB USB ports for EFM 2W U E...

Page 11: ...Loop1 2 3 and 4 have been used Channel A Channel B Channel C Channel D 2 wire model EFM 2W EFM 2W U 2 wire mode Loop1 4 5 4 wire model EFM 4W EFM 4W U 2 wire mode 4 wire mode Loop1 4 5 Loop1 4 5 Loop...

Page 12: ...9 T 568A Straight Through Ethernet Cable T 568B Straight Through Ethernet Cable Both the T 568A and the T 568B standard Straight Through cables are been used...

Page 13: ...to the optimum Ethernet speed 10 100 Mbps and duplex mode full duplex or half duplex of the connected device The auto crossover auto MDI MDI X ports automatically works with a straight through or cros...

Page 14: ...e female end of power adaptor s cord into the power receptacle on the rear panel Connect the power adaptor to an appropriate power source 2 6 Reset Button The reset button can be used only in one of t...

Page 15: ...VPN Router 3 1 1 Web Configuration Make sure that Ethernet Adapter had been installed in PC or NB used for configuration of the modem TCP IP protocol is necessary for web configuration so please check...

Page 16: ...d in order to remote login when using telnet please use root for username and root for password Please check the following screen shot for what you will see in your terminal window 3 1 3 Telnet Config...

Page 17: ...uickest way possible Please follow the instructions carefully Step 1 Connect the power adapter to the port labeled DC IN on the rear panel of the VPN Router Step 2 Connect the Ethernet cable to LAN po...

Page 18: ...15 Connection with VPN Router...

Page 19: ...pe http 192 168 0 1 in the address bar of the browser Step 2 The default IP address and sub net mask of the management port of VPN Router are 192 168 0 1 and 255 255 255 0 Step 3 If DHCP function is D...

Page 20: ...ser PPP Password Confirm Password PPP Connection Type PPPoA NAT PPPoE PPPoE NAT Primary DNS Secondary DNS DHCP mode Disable Server Relay SHDSL bis Mode STU R STU C WAN ENCAP WAN VPI VCI Default Gatewa...

Page 21: ...mary Secondary DHCP Mode Disable Server Relay DHCP Server Mode Subnet Netmask IP Range Gateway DNS Lease Time DHCP Relay IP Interface NAT Mode Entry 1 16 Enable Source IP Source Netmask Output Interfa...

Page 22: ...ull 100M Half 10M Full 10M Half Static Route Destination Netmask Gateway Interface QoS Mode Traffic Classify Mode Class ID Protocol Src IP Src Netmask Src Port Dst IP Dst Netmask Dst Port 802 1P Class...

Page 23: ...t available DDNS Mode Provider Host Name User Name Password IGMP IGMP Proxy Snooping Security Firewall Router Mode Mode Bridge Mode Not available VPN Router Mode IPSEC Mode Name WAN Perfect Forward Se...

Page 24: ...End Port Destination IP Mask Destination Start End Port MAC Filter Mode Default Policy Entry 1 16 Mode MAC Action Management SNTP Sync With PC SNTP Mode Time Server Time Zone SNMP SNMPv3 Mode V3 User...

Page 25: ...erver Mode Remote Server Address Remote Server Port Telnet Mode Port SSH Mode Port Web Refresh Time Service Port Show Information Hardware MCSV Software MCSV Software Version DSL Chip Name DSL Phy Fir...

Page 26: ...23 Restore Users User 1 4 Name Level Password Confirm Ping IP Address Size Count Update Trace Route Host name or IP Packet Datagram Update Interval...

Page 27: ...t to the Internet which include all the technical settings VCI encapsulation etc and the VPN router also connects to the ISP with your username and password You can basically just connect to your comp...

Page 28: ...are two mechanisms for identifying the protocol carried in ATM Adaptation Layer 5 AAL5 frames WAN VPI VIC There is an unique VPI and VCI value for Internet connection supported by ISP The range of VI...

Page 29: ...router device 1 WAN IP and WAN Netmask Fill up the IP address and the netmask of WAN 2 Protocol Nine options are available for this setup Disable EoA EoA NAT IPoA IPoA NAT PPPoA PPPoA NAT PPPoE PPPoE...

Page 30: ...in DNS section DHCP Mode Choose whether DHCP mode should be disabled or enabled If the DHCP mode should be enabled decide the mode should be Server or Relay PPP This section is only available when the...

Page 31: ...demand 3 3 1 3 SHDSL bis mode There are two SHDSL bis modes STU C and STU R STU C means the terminal of central office CO and STU R means customer premise equipment CPE Click STU R side or STU C side...

Page 32: ...net Mask In both Bridge mode and Router mode the IP address and subnet mask of LAN should be provided 3 3 1 5 Default Gateway Default Gateway allows users to fill up the gateway IP address in both Bri...

Page 33: ...ctions 3 4 1 SHDSL 1 Mode You are able to change your VPN router s mode to STU R or STU C in here 2 TC Layer Three options are available for this function ATM EFM or AUTO You are able to define the ne...

Page 34: ...ect 2 wire and 4 wire line types EFM 8W and EFM 8W U 8 wire model can select 2 wire 4 wire or 8 wire line types 4 Annex There are four Annex types Annex A Annex B Annex A F and Annex B G Please confir...

Page 35: ...is differed according to Annex type SHDSL bis VPN Router Annex A Annex B Annex A F Annex B G Range 3 36 3 36 3 89 3 89 8 Interop Mode This feature allows you to enable or disable the interoperability...

Page 36: ...g the connection life time This bandwidth is characterized by Peak Cell Rate PCR Based on the PCR of the CBR traffic specific cell slots are assigned for the VC in the schedule table The ATM always se...

Page 37: ...ecting with SHDSL bis it will enable the 3G 3 5G broadband connection automatically when SHDSL bis Internet connection is not available You can surf Internet anywhere and anytime via this device 3G 3...

Page 38: ...check the authentication method you want to use Most of telecomm service providers require you to input Dial Number and APN Access Point Name please those items provided by telecomm service provider A...

Page 39: ...with a connection to the Internet an IP address must be assigned to each machine Without DHCP the IP address must be entered manually at each computer If computers move to another location in another...

Page 40: ...EE 802 1D is a link management protocol that provides path redundancy while preventing undesirable loops in the network For an Ethernet network to function properly only one active path can exist betw...

Page 41: ...sources of another on the same LAN VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain In traditional switched environments all bro...

Page 42: ...39...

Page 43: ...VLAN ID is called an untagged packet Typically all packets leave untagged unless tagged by the adapter prior to arriving at the switch port Egress and Ingress Rules Egress rules determine which frame...

Page 44: ...ype equal to 8100H this frame carries the tag IEEE 802 1Q 802 1P Priority field defines user priority giving eight 2 3 8 priority levels IEEE 802 1P defines the operation for these 3 user priority bit...

Page 45: ...is traffic to the same VLAN s either manually or dynamically using GVRP However if you want a port on this VPN Router to participate in one or more VLANs but none of the intermediate network devices n...

Page 46: ...the interface will automatically be added to VLAN 1 as an untagged member For all other VLANs an interface must first be configured as an untagged member before you can assign its PVID to that group...

Page 47: ...been assigned to a VLAN the port cannot send to or receive from devices in another VLAN For example The default setting is all ports connected which means all ports can communicate with each other Tha...

Page 48: ...45 Mapping Total of 16 rules are allowed for users to setup By VLAN...

Page 49: ...46 By WAN...

Page 50: ...l 5 10M Half 3 5 5 Static Route A static route is one that is manually installed by your network administrator This is a very efficient way to transfer data from one subnet to another despite the fact...

Page 51: ...mportant that any network administrator have substantial knowledge about static routes Although this type of route may not be as effective with large networks they are quite useful in any size of netw...

Page 52: ...uses the tag field information which has been inserted into an Ethernet frame If a port has an 802 1Q compliant device attached such as this modem these tagged frames can carry VLAN membership inform...

Page 53: ...set up their Queue Weight form 1 to 15 IP DSCP Differentiated Services DiffServ is a class of service CoS model that enhances best effort Internet services by differentiating traffic by users service...

Page 54: ...then be allocated according to the DSCP values and the configured policies The following is an illustration about how the bits are used in DSCP field Bit 0 Bit 1 Bit 2 Precedence Usage 1 1 1 7 Stays t...

Page 55: ...Class 3 Class 4 Low Drop 001010 AF11 DSCP 10 010010 AF21 DSCP 18 011010 AF31 DSCP 26 100010 AF41 DSCP 34 Medium Drop 001100 AF12 DSCP 12 010100 AF22 DSCP 20 011100 AF32 DSCP 28 100100 AF42 DSCP 36 Hig...

Page 56: ...000 0 Undifferentiated applications Low Priority Data LBE CS1 001000 8 Mirror service remote backups etc Each DSCP value from 0 to 63 is mapped to a Queue value from 1 to 8 from the drop down list box...

Page 57: ...ns excess packets in a queue and then schedules the excess for later transmission over increments of time The result of traffic shaping is a smoothed packet output rate 3 5 7 RIP The RIP Routing Infor...

Page 58: ...rvers on your LAN have the same IP address The IP address is allocated by your ISP This address should be static rather than dynamic to make it easier for Interface users to connect to your Servers On...

Page 59: ...etimes referred to as a Perimeter Network The purpose of a DMZ is to add an additional layer of security to an organization s LAN Local Area Network an external attacker only has access to equipment i...

Page 60: ...mplied by the name is a feature that allows VPN Router to listen in on the IGMP conversation between hosts to this VPN Router by processing the IGMP packets sent in a multicast network When IGMP snoop...

Page 61: ...MP request packets to cause all CPU resources to be consumed serving the phony requests UDP Flood A UDP flood attack is a denial of service DoS attack using the User Datagram Protocol UDP A sender tra...

Page 62: ...he return address of the ping has been faked spoofed to appear to come from a machine on another network the victim The victim is then flooded with responses to the ping As many responses are generate...

Page 63: ...sed between the two VPN devices endpoints There are two security modes possible with IPsec Transport Mode the payload data part of the packet is encapsulated through encryption but the IP header remai...

Page 64: ...s indicates whether or not the policy is currently enabled Use the Enable Disable to toggle the state the selected policy Policy name The name of the policy When creating a policy you should select a...

Page 65: ...emote Network ID 192 168 1 0 24 192 168 0 0 24 Remote Router IP 69 1 121 3 69 1 121 30 IKE Pre shared Key 12345678 12345678 VPN Connection Type Tunnel mode Tunnel mode Security Algorithm ESP MD5 with...

Page 66: ...nel to provide privacy L2TP allows a PPP session to travel over multiple links and networks PPP is used to encapsulate IP packets from the user s PC or mobile device to the ISP and L2TP extends that s...

Page 67: ...int to Point Tunneling Protocol is a private network of computers that uses the public Internet to connect some nodes Because the Internet is essentially an open network the PPTP is used to ensure tha...

Page 68: ...installed in the office connected to a couple of PCs and Servers Example Configuring a PPTP LAN to LAN VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two pr...

Page 69: ...dpoint The 2 LANs must use different IP address ranges VPN Pass through Here a PC on the LAN behind the VPN router is using VPN software but the VPN router is not acting as CPN endpoint It is only all...

Page 70: ...VPN Endpoint The IP address of the remote VPN end point Gateway or client 3 6 3 Filter IP filter Source IP Address es Destination IP Address es This is the Address Filter used to allow or block traffi...

Page 71: ...plication Default is set from range 0 65535 It is recommended that this option be configured by an advanced user Destination Port This is the Port or Port Ranges that defines the application Applicati...

Page 72: ...es network access to specific devices through the use of black lists and white lists While the restriction of network access through the use of lists is straightforward an individual person is not ide...

Page 73: ...rk Time Protocol NTP used to synchronize computer clocks in the Internet SNTP can be used when the ultimate performance of the full NTP implementation The function only supported on router mode There...

Page 74: ...ple Network Management Protocol SNMP provides for the exchange of messages between a network management client and a network management agent for remote management of network nodes These messages cont...

Page 75: ...ent and ACS Auto Configuration Servers It includes both a safe auto configuration and the control of other CPE management functions within an integrated framework Using TR 069 the terminals can get in...

Page 76: ...CPE Periodic Inform Interval The duration in seconds of the interval for which the CPE must attempt to connect with the ACS and call the Inform method Connection Request Username Username used to aut...

Page 77: ...erver 3 Specify a UDP port number to which the syslog server is listening The default value is 514 Make sure this is not blocked from your firewall Press Apply to finish the setup 3 7 6 Telnet There a...

Page 78: ...l be prompted for your login name and login password You specified both your login name and login password when you ordered your VPN Router After the login process is successful you will have gained a...

Page 79: ...ry version and remains even after upgrading the router in the field This is for internal identification purposes Software Version This is the modem s current firmware version This is sometimes needed...

Page 80: ...77 3 8 2 Sys Log 3 8 3 CPU Info...

Page 81: ...78 3 8 4 Script...

Page 82: ...79 3 9 Status 3 9 1 SHDSL For 2 wire models For 4 wire models For 8 wire models...

Page 83: ...ion shows all eight WAN interface 3 9 3 Route Tabl Routing tables contain a list of IP address Each IP address identifies a remote router or other network gateway that the local router is configured t...

Page 84: ...field shows the number of received bytes on this port InPactets The field shows the number of received packets on this port OutOctets The field shows the number of transmitted bytes on this port OutP...

Page 85: ...82 3 9 6 Switch...

Page 86: ...de button to commence the firmware upgrade 3 10 2 Config Tool This configuration tool has three functions load Factory Default Restore Configuration and Backup Configuration Load Factory Default Load...

Page 87: ...parameters in the PC Select the Backup Configuration and then press Apply Browse the place of backup file name or put the name Then press OK The router will automatically backup the configuration If...

Page 88: ...ame and password for the VPN router If you don t set them all users on your network can be able to access your VPN router using the default Administrator Name and password is root You can authorize ot...

Page 89: ...ly identify the Web site or other remote server computer by its IP address The result of a ping test includes confirmation that connection was successful along with a series of numbers that represent...

Page 90: ...our VPN router to a destination address The length of the network connection is indicated by the number of Internet routers in the trace route path Trace routes can be useful to diagnose slow network...

Page 91: ...provide DSL services often use the EoA protocol for data transfer with their customers DSL modems EoA can be implemented to provide a bridged connection between a DSL modem and the ISP In a bridged c...

Page 92: ...customer premises equipment which is the telephone company s term for a modem and similar devices PPPoE and PPPoA can be used to office or building Users share a common Digital Subscriber Line DSL ca...

Page 93: ...90 PPPoE...

Reviews: