background image

56 

 

UDP  (User  Datagram Protocol) offers only  a  minimal transport service  (non-guaranteed datagram delivery) and  gives 

applications direct access to the datagram service of the IP layer. UDP is used by applications that do not require the 

level of service of TCP or that wish to use communications services (e.g., multicast or broadcast delivery) not available 

from TCP. 

 

 

 
 

  

 

3.5.9.

DMZ

 

 

 

 

 

In  computer  security,  DMZ  (demilitarized  zone)  is  a  physical  or  logical  sub-network  that  contains  and  exposes  an 

organization's external services to a larger untrusted network, usually the Internet. The term is normally referred to as 

a  DMZ  by  IT  professionals. It  is  sometimes referred  to  as  a  Perimeter  Network.  The  purpose of  a  DMZ  is  to  add  an 

additional  layer  of  security  to  an  organization's  LAN  (Local  Area  Network);  an  external  attacker  only  has  access  to 

equipment in the DMZ, rather than any other part of the network. 

 

If enabled this feature, allows one or more computers on your LAN to be exposed to all users on the internet. You can 

set a DMZ PC for each WAN IP address. If you only have 1 WAN IP address, only 1 DMZ PC can be used. 

 
 
 
 

 

  

 

3.1.6.

DDNS

 
 
 

 

 

DDNS (Dynamic DNS Free) allows you to create a hostname that points to your home or office IP address, providing an 

easy-to-remember URL for quick access. 

You must register for the service at one of the listed service providers. You can reach the service provider’s Web Site by 

 

selecting them in the list. Apply for a domain name, and ensure it is allocated to you. 

Содержание XL-EFM404V

Страница 1: ...XL EFM404V G SHDSL BIS VPN ROUTER USER MANUAL...

Страница 2: ...TECTIVE EARTH FRAME GROUND TERMINAL 12 3 CONFIGURATION 12 3 1 CONFIGURATION METHODS 12 3 1 1 Web Configuration 12 3 1 2 Serial Console Configuration 13 3 1 3 Telnet Configuration 13 3 1 4 Installation...

Страница 3: ...MP 71 3 7 3 TR 069 72 3 7 4 UPnP 73 3 7 5 Sys Log 73 3 7 6 Telnet 74 3 7 7 SSH 74 3 7 8 Web 75 3 8 SHOW 75 3 8 1 Information 76 3 8 2 Sys Log 77 3 8 3 CPU Info 77 3 8 4 Script 78 3 9 STATUS 79 3 9 1 S...

Страница 4: ...connection that DSL features XTENDLAN EFM series VPN routers provide advanced firewall with SPI Stateful Packet Inspection and DoS protection serving as a powerful firewall to protect from outside in...

Страница 5: ...ntation over SHDSL bis PPPoA and PPPoE support user authentication with PAP CHAP MS CHAP MS CHAPv2 SNMP management with SNMPv1 v2c v3 agent and MIB II Getting enhancements and new features via Interne...

Страница 6: ...P pass through Virtual Server Network Protocol IPv4 ARP RARP TCP UDP ICMP DHCP Client Server Relay DNS Relay Proxy Dynamic DNS DDNS IGMP v1 v2 v3 IGMP Proxy IGMP Snooping SNTP and UPnP ATM 8 PVC OAM F...

Страница 7: ...ty queues IP Precedence Alternation VPN IPSec RFC2411 up to 4 Tunnels DES 3DES AES MD5 SHA 1 IKE Manual Key ISAKMP RFC 2407 2408 4306 IKE v1 RFC 2409 4109 PSK L2TP PPTP Firewall SPI Stateful Packet In...

Страница 8: ...II RFC 1213 1493 Syslog with Remote Logging support Firmware Upgrade via TFTP Configuration Data Import Export Multiple Levels of Administration Privilege Support TR 069 WAN management protocol Physi...

Страница 9: ...shed SHDSL bis line 3 handshake Blink LINK 4 Transmit or received data over SHDSL bis link 3 On SHDSL bis line 4 connection is established SHDSL bis line 4 handshake Blink LAN ALM LINK ACT1 LINK ACT2...

Страница 10: ...LE RJ 45 for system configuration and maintenance RST Reset button for reboot or load factory default LAN 1 2 3 4 10 100BaseT auto sensing and auto MDIX for LAN port RJ 45 USB USB ports for EFM 2W U E...

Страница 11: ...Loop1 2 3 and 4 have been used Channel A Channel B Channel C Channel D 2 wire model EFM 2W EFM 2W U 2 wire mode Loop1 4 5 4 wire model EFM 4W EFM 4W U 2 wire mode 4 wire mode Loop1 4 5 Loop1 4 5 Loop...

Страница 12: ...9 T 568A Straight Through Ethernet Cable T 568B Straight Through Ethernet Cable Both the T 568A and the T 568B standard Straight Through cables are been used...

Страница 13: ...to the optimum Ethernet speed 10 100 Mbps and duplex mode full duplex or half duplex of the connected device The auto crossover auto MDI MDI X ports automatically works with a straight through or cros...

Страница 14: ...e female end of power adaptor s cord into the power receptacle on the rear panel Connect the power adaptor to an appropriate power source 2 6 Reset Button The reset button can be used only in one of t...

Страница 15: ...VPN Router 3 1 1 Web Configuration Make sure that Ethernet Adapter had been installed in PC or NB used for configuration of the modem TCP IP protocol is necessary for web configuration so please check...

Страница 16: ...d in order to remote login when using telnet please use root for username and root for password Please check the following screen shot for what you will see in your terminal window 3 1 3 Telnet Config...

Страница 17: ...uickest way possible Please follow the instructions carefully Step 1 Connect the power adapter to the port labeled DC IN on the rear panel of the VPN Router Step 2 Connect the Ethernet cable to LAN po...

Страница 18: ...15 Connection with VPN Router...

Страница 19: ...pe http 192 168 0 1 in the address bar of the browser Step 2 The default IP address and sub net mask of the management port of VPN Router are 192 168 0 1 and 255 255 255 0 Step 3 If DHCP function is D...

Страница 20: ...ser PPP Password Confirm Password PPP Connection Type PPPoA NAT PPPoE PPPoE NAT Primary DNS Secondary DNS DHCP mode Disable Server Relay SHDSL bis Mode STU R STU C WAN ENCAP WAN VPI VCI Default Gatewa...

Страница 21: ...mary Secondary DHCP Mode Disable Server Relay DHCP Server Mode Subnet Netmask IP Range Gateway DNS Lease Time DHCP Relay IP Interface NAT Mode Entry 1 16 Enable Source IP Source Netmask Output Interfa...

Страница 22: ...ull 100M Half 10M Full 10M Half Static Route Destination Netmask Gateway Interface QoS Mode Traffic Classify Mode Class ID Protocol Src IP Src Netmask Src Port Dst IP Dst Netmask Dst Port 802 1P Class...

Страница 23: ...t available DDNS Mode Provider Host Name User Name Password IGMP IGMP Proxy Snooping Security Firewall Router Mode Mode Bridge Mode Not available VPN Router Mode IPSEC Mode Name WAN Perfect Forward Se...

Страница 24: ...End Port Destination IP Mask Destination Start End Port MAC Filter Mode Default Policy Entry 1 16 Mode MAC Action Management SNTP Sync With PC SNTP Mode Time Server Time Zone SNMP SNMPv3 Mode V3 User...

Страница 25: ...erver Mode Remote Server Address Remote Server Port Telnet Mode Port SSH Mode Port Web Refresh Time Service Port Show Information Hardware MCSV Software MCSV Software Version DSL Chip Name DSL Phy Fir...

Страница 26: ...23 Restore Users User 1 4 Name Level Password Confirm Ping IP Address Size Count Update Trace Route Host name or IP Packet Datagram Update Interval...

Страница 27: ...t to the Internet which include all the technical settings VCI encapsulation etc and the VPN router also connects to the ISP with your username and password You can basically just connect to your comp...

Страница 28: ...are two mechanisms for identifying the protocol carried in ATM Adaptation Layer 5 AAL5 frames WAN VPI VIC There is an unique VPI and VCI value for Internet connection supported by ISP The range of VI...

Страница 29: ...router device 1 WAN IP and WAN Netmask Fill up the IP address and the netmask of WAN 2 Protocol Nine options are available for this setup Disable EoA EoA NAT IPoA IPoA NAT PPPoA PPPoA NAT PPPoE PPPoE...

Страница 30: ...in DNS section DHCP Mode Choose whether DHCP mode should be disabled or enabled If the DHCP mode should be enabled decide the mode should be Server or Relay PPP This section is only available when the...

Страница 31: ...demand 3 3 1 3 SHDSL bis mode There are two SHDSL bis modes STU C and STU R STU C means the terminal of central office CO and STU R means customer premise equipment CPE Click STU R side or STU C side...

Страница 32: ...net Mask In both Bridge mode and Router mode the IP address and subnet mask of LAN should be provided 3 3 1 5 Default Gateway Default Gateway allows users to fill up the gateway IP address in both Bri...

Страница 33: ...ctions 3 4 1 SHDSL 1 Mode You are able to change your VPN router s mode to STU R or STU C in here 2 TC Layer Three options are available for this function ATM EFM or AUTO You are able to define the ne...

Страница 34: ...ect 2 wire and 4 wire line types EFM 8W and EFM 8W U 8 wire model can select 2 wire 4 wire or 8 wire line types 4 Annex There are four Annex types Annex A Annex B Annex A F and Annex B G Please confir...

Страница 35: ...is differed according to Annex type SHDSL bis VPN Router Annex A Annex B Annex A F Annex B G Range 3 36 3 36 3 89 3 89 8 Interop Mode This feature allows you to enable or disable the interoperability...

Страница 36: ...g the connection life time This bandwidth is characterized by Peak Cell Rate PCR Based on the PCR of the CBR traffic specific cell slots are assigned for the VC in the schedule table The ATM always se...

Страница 37: ...ecting with SHDSL bis it will enable the 3G 3 5G broadband connection automatically when SHDSL bis Internet connection is not available You can surf Internet anywhere and anytime via this device 3G 3...

Страница 38: ...check the authentication method you want to use Most of telecomm service providers require you to input Dial Number and APN Access Point Name please those items provided by telecomm service provider A...

Страница 39: ...with a connection to the Internet an IP address must be assigned to each machine Without DHCP the IP address must be entered manually at each computer If computers move to another location in another...

Страница 40: ...EE 802 1D is a link management protocol that provides path redundancy while preventing undesirable loops in the network For an Ethernet network to function properly only one active path can exist betw...

Страница 41: ...sources of another on the same LAN VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain In traditional switched environments all bro...

Страница 42: ...39...

Страница 43: ...VLAN ID is called an untagged packet Typically all packets leave untagged unless tagged by the adapter prior to arriving at the switch port Egress and Ingress Rules Egress rules determine which frame...

Страница 44: ...ype equal to 8100H this frame carries the tag IEEE 802 1Q 802 1P Priority field defines user priority giving eight 2 3 8 priority levels IEEE 802 1P defines the operation for these 3 user priority bit...

Страница 45: ...is traffic to the same VLAN s either manually or dynamically using GVRP However if you want a port on this VPN Router to participate in one or more VLANs but none of the intermediate network devices n...

Страница 46: ...the interface will automatically be added to VLAN 1 as an untagged member For all other VLANs an interface must first be configured as an untagged member before you can assign its PVID to that group...

Страница 47: ...been assigned to a VLAN the port cannot send to or receive from devices in another VLAN For example The default setting is all ports connected which means all ports can communicate with each other Tha...

Страница 48: ...45 Mapping Total of 16 rules are allowed for users to setup By VLAN...

Страница 49: ...46 By WAN...

Страница 50: ...l 5 10M Half 3 5 5 Static Route A static route is one that is manually installed by your network administrator This is a very efficient way to transfer data from one subnet to another despite the fact...

Страница 51: ...mportant that any network administrator have substantial knowledge about static routes Although this type of route may not be as effective with large networks they are quite useful in any size of netw...

Страница 52: ...uses the tag field information which has been inserted into an Ethernet frame If a port has an 802 1Q compliant device attached such as this modem these tagged frames can carry VLAN membership inform...

Страница 53: ...set up their Queue Weight form 1 to 15 IP DSCP Differentiated Services DiffServ is a class of service CoS model that enhances best effort Internet services by differentiating traffic by users service...

Страница 54: ...then be allocated according to the DSCP values and the configured policies The following is an illustration about how the bits are used in DSCP field Bit 0 Bit 1 Bit 2 Precedence Usage 1 1 1 7 Stays t...

Страница 55: ...Class 3 Class 4 Low Drop 001010 AF11 DSCP 10 010010 AF21 DSCP 18 011010 AF31 DSCP 26 100010 AF41 DSCP 34 Medium Drop 001100 AF12 DSCP 12 010100 AF22 DSCP 20 011100 AF32 DSCP 28 100100 AF42 DSCP 36 Hig...

Страница 56: ...000 0 Undifferentiated applications Low Priority Data LBE CS1 001000 8 Mirror service remote backups etc Each DSCP value from 0 to 63 is mapped to a Queue value from 1 to 8 from the drop down list box...

Страница 57: ...ns excess packets in a queue and then schedules the excess for later transmission over increments of time The result of traffic shaping is a smoothed packet output rate 3 5 7 RIP The RIP Routing Infor...

Страница 58: ...rvers on your LAN have the same IP address The IP address is allocated by your ISP This address should be static rather than dynamic to make it easier for Interface users to connect to your Servers On...

Страница 59: ...etimes referred to as a Perimeter Network The purpose of a DMZ is to add an additional layer of security to an organization s LAN Local Area Network an external attacker only has access to equipment i...

Страница 60: ...mplied by the name is a feature that allows VPN Router to listen in on the IGMP conversation between hosts to this VPN Router by processing the IGMP packets sent in a multicast network When IGMP snoop...

Страница 61: ...MP request packets to cause all CPU resources to be consumed serving the phony requests UDP Flood A UDP flood attack is a denial of service DoS attack using the User Datagram Protocol UDP A sender tra...

Страница 62: ...he return address of the ping has been faked spoofed to appear to come from a machine on another network the victim The victim is then flooded with responses to the ping As many responses are generate...

Страница 63: ...sed between the two VPN devices endpoints There are two security modes possible with IPsec Transport Mode the payload data part of the packet is encapsulated through encryption but the IP header remai...

Страница 64: ...s indicates whether or not the policy is currently enabled Use the Enable Disable to toggle the state the selected policy Policy name The name of the policy When creating a policy you should select a...

Страница 65: ...emote Network ID 192 168 1 0 24 192 168 0 0 24 Remote Router IP 69 1 121 3 69 1 121 30 IKE Pre shared Key 12345678 12345678 VPN Connection Type Tunnel mode Tunnel mode Security Algorithm ESP MD5 with...

Страница 66: ...nel to provide privacy L2TP allows a PPP session to travel over multiple links and networks PPP is used to encapsulate IP packets from the user s PC or mobile device to the ISP and L2TP extends that s...

Страница 67: ...int to Point Tunneling Protocol is a private network of computers that uses the public Internet to connect some nodes Because the Internet is essentially an open network the PPTP is used to ensure tha...

Страница 68: ...installed in the office connected to a couple of PCs and Servers Example Configuring a PPTP LAN to LAN VPN Connection The branch office establishes a PPTP VPN tunnel with head office to connect two pr...

Страница 69: ...dpoint The 2 LANs must use different IP address ranges VPN Pass through Here a PC on the LAN behind the VPN router is using VPN software but the VPN router is not acting as CPN endpoint It is only all...

Страница 70: ...VPN Endpoint The IP address of the remote VPN end point Gateway or client 3 6 3 Filter IP filter Source IP Address es Destination IP Address es This is the Address Filter used to allow or block traffi...

Страница 71: ...plication Default is set from range 0 65535 It is recommended that this option be configured by an advanced user Destination Port This is the Port or Port Ranges that defines the application Applicati...

Страница 72: ...es network access to specific devices through the use of black lists and white lists While the restriction of network access through the use of lists is straightforward an individual person is not ide...

Страница 73: ...rk Time Protocol NTP used to synchronize computer clocks in the Internet SNTP can be used when the ultimate performance of the full NTP implementation The function only supported on router mode There...

Страница 74: ...ple Network Management Protocol SNMP provides for the exchange of messages between a network management client and a network management agent for remote management of network nodes These messages cont...

Страница 75: ...ent and ACS Auto Configuration Servers It includes both a safe auto configuration and the control of other CPE management functions within an integrated framework Using TR 069 the terminals can get in...

Страница 76: ...CPE Periodic Inform Interval The duration in seconds of the interval for which the CPE must attempt to connect with the ACS and call the Inform method Connection Request Username Username used to aut...

Страница 77: ...erver 3 Specify a UDP port number to which the syslog server is listening The default value is 514 Make sure this is not blocked from your firewall Press Apply to finish the setup 3 7 6 Telnet There a...

Страница 78: ...l be prompted for your login name and login password You specified both your login name and login password when you ordered your VPN Router After the login process is successful you will have gained a...

Страница 79: ...ry version and remains even after upgrading the router in the field This is for internal identification purposes Software Version This is the modem s current firmware version This is sometimes needed...

Страница 80: ...77 3 8 2 Sys Log 3 8 3 CPU Info...

Страница 81: ...78 3 8 4 Script...

Страница 82: ...79 3 9 Status 3 9 1 SHDSL For 2 wire models For 4 wire models For 8 wire models...

Страница 83: ...ion shows all eight WAN interface 3 9 3 Route Tabl Routing tables contain a list of IP address Each IP address identifies a remote router or other network gateway that the local router is configured t...

Страница 84: ...field shows the number of received bytes on this port InPactets The field shows the number of received packets on this port OutOctets The field shows the number of transmitted bytes on this port OutP...

Страница 85: ...82 3 9 6 Switch...

Страница 86: ...de button to commence the firmware upgrade 3 10 2 Config Tool This configuration tool has three functions load Factory Default Restore Configuration and Backup Configuration Load Factory Default Load...

Страница 87: ...parameters in the PC Select the Backup Configuration and then press Apply Browse the place of backup file name or put the name Then press OK The router will automatically backup the configuration If...

Страница 88: ...ame and password for the VPN router If you don t set them all users on your network can be able to access your VPN router using the default Administrator Name and password is root You can authorize ot...

Страница 89: ...ly identify the Web site or other remote server computer by its IP address The result of a ping test includes confirmation that connection was successful along with a series of numbers that represent...

Страница 90: ...our VPN router to a destination address The length of the network connection is indicated by the number of Internet routers in the trace route path Trace routes can be useful to diagnose slow network...

Страница 91: ...provide DSL services often use the EoA protocol for data transfer with their customers DSL modems EoA can be implemented to provide a bridged connection between a DSL modem and the ISP In a bridged c...

Страница 92: ...customer premises equipment which is the telephone company s term for a modem and similar devices PPPoE and PPPoA can be used to office or building Users share a common Digital Subscriber Line DSL ca...

Страница 93: ...90 PPPoE...

Отзывы: