Gigabit Multi-Homing VPN Security Router User’s Manual
18B
2.2 Setting Flow Chart
Below is the description for each setting process, and the correspondent contents and purposes.
#
Setting
Content
Purpose
1
Hardware installation
user’s demand.
Install VPN Router hardware based on
user physical requirements.
2
Login
Login the device with
Web Browser.
Login VPN Router web-based UI.
Verify device
specification
Verify Firmware version
and working status.
Verify VPN Router specification, Firmware
version and working status.
3
Set password and time
Set time and re-new
password.
Modify the login password considering safe
issue.
Synchronize the VPN Router time with WAN.
4
Set WAN connection
Verify WAN connection
setting, bandwidth
allocation, and protocol
binding.
Connect to WAN. Configure bandwidth to
optimize data transmission.
5
Set LAN connection:
physical port and IP
address settings
Set mirror port and
VLAN. Allocate and
manage LAN IP.
Provide mirror port, port management and VLAN
setting functions. Support Static/DHCP IP
allocation to meet different needs. IP group will
simplize the management work.
6
Set QoS bandwidth
management: avoid
bandwidth occupation
Restrict bandwidth and
session of WAN ports,
LAN IP and application.
To assure transmission of important information,
manage and allocate the bandwidth further to
achieve best efficiency.
7
Set Firewall: prevent
attack and improper
access to network
resources
Block attack, Set
Access rule and restrict
Web access.
Administrators can block BT to avoid bandwidth
occupation, and enable access rules to restrict
employee accessing internet improperly or using
MSN, QQ and Skype during working time. They
can also protect network from Worm or ARP
attacking.
8
Advanced
Settings:DMZ/Forwardin
g, UPnP, DDNS, MAC
Clone
DMZ/Forwarding,
UpnP, Routing Mode,
multiple WAN IP, DDNS
and MAC Clone
DMZ/Forwarding, UpnP, Routing Mode, multiple
WAN IP, DDNS and MAC Clone
9
Management and
maintenance settings:
Syslog, SNMP, and
configuration backup
Monitor VPN Router
working status and
configuration backup.
Administrators can look up system log and
monitor system status and inbound/outbound
flow in real time.
10 VPN Virtual Private
Configure VPN tunnels, Configure different types of VPN to meet
- 7 -