TRENDnet Network Router BRV204 User Manual

Download from Www.Somanuals.com. All Manuals Search And Download.  
Table of Contents  
CHAPTER 1 INTRODUCTION ............................................................................................. 1  
TW100-BRV204 Features................................................................................................ 1  
Package Contents .............................................................................................................. 3  
Physical Details.................................................................................................................. 4  
CHAPTER 2 INSTALLATION............................................................................................... 7  
Requirements..................................................................................................................... 7  
Procedure........................................................................................................................... 7  
CHAPTER 3 SETUP ................................................................................................................ 9  
Overview ............................................................................................................................ 9  
Configuration Program .................................................................................................. 10  
Setup Wizard ................................................................................................................... 13  
LAN Screen...................................................................................................................... 16  
CHAPTER 4 PC CONFIGURATION .................................................................................. 18  
Overview .......................................................................................................................... 18  
Windows Clients.............................................................................................................. 18  
Macintosh Clients............................................................................................................ 29  
Linux Clients.................................................................................................................... 29  
Other Unix Systems......................................................................................................... 29  
CHAPTER 5 OPERATION AND STATUS......................................................................... 30  
Operation ......................................................................................................................... 30  
Status Screen.................................................................................................................... 30  
Connection Status - PPPoE ............................................................................................ 32  
Connection Status - PPTP .............................................................................................. 34  
Connection Status - Telstra Big Pond............................................................................ 35  
Connection Details - SingTel RAS ................................................................................. 36  
Connection Details - Fixed/Dynamic IP Address ......................................................... 38  
CHAPTER 6 INTERNET FEATURES ................................................................................ 40  
Overview .......................................................................................................................... 40  
WAN Port Configuration ............................................................................................... 41  
Advanced Internet........................................................................................................... 43  
Dynamic DNS (Domain Name Server) .......................................................................... 47  
Virtual Servers................................................................................................................. 49  
Options ............................................................................................................................. 51  
CHAPTER 7 SECURITY CONFIGURATION................................................................... 52  
Overview .......................................................................................................................... 52  
Admin Login.................................................................................................................... 52  
Access Control ................................................................................................................. 54  
Firewall Rules .................................................................................................................. 57  
Logs................................................................................................................................... 61  
E-mail ............................................................................................................................... 63  
Security Options.............................................................................................................. 65  
Scheduling........................................................................................................................ 67  
Services............................................................................................................................. 68  
CHAPTER 8 VPN (IPSEC).................................................................................................... 69  
Overview .......................................................................................................................... 69  
Common VPN Situations................................................................................................ 71  
i
Download from Www.Somanuals.com. All Manuals Search And Download.  
VPN Configuration ......................................................................................................... 73  
VPN Examples................................................................................................................. 83  
Certificates..................................................................................................................... 101  
CRLs............................................................................................................................... 105  
Status.............................................................................................................................. 106  
CHAPTER 9 MICROSOFT VPN ....................................................................................... 108  
Overview ........................................................................................................................ 108  
Server Setup................................................................................................................... 108  
Client Database.............................................................................................................. 109  
Status Screen.................................................................................................................. 111  
Windows Client Setup................................................................................................... 112  
CHAPTER 10 OTHER FEATURES & SETTINGS ......................................................... 120  
Overview ........................................................................................................................ 120  
Config File...................................................................................................................... 121  
Network Diagnostics ..................................................................................................... 122  
PC Database................................................................................................................... 123  
Remote Administration................................................................................................. 127  
Routing........................................................................................................................... 129  
Upgrade Firmware........................................................................................................ 134  
UPnP............................................................................................................................... 135  
APPENDIX A TROUBLESHOOTING.............................................................................. 136  
Overview ........................................................................................................................ 136  
General Problems.......................................................................................................... 136  
Internet Access............................................................................................................... 136  
APPENDIX B SPECIFICATIONS...................................................................................... 138  
TW100-BRV204 ............................................................................................................ 138  
FCC Statement .............................................................................................................. 138  
CE Marking Warning................................................................................................... 139  
P/N: 9560KZ0101  
Copyright © 2004. All Rights Reserved.  
Document Version: 1.1  
All trademarks and trade names are the properties of their respective owners.  
ii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Introduction  
1
This Chapter provides an overview of the TW100-BRV204 's features and  
capabilities.  
Congratulations on the purchase of your new TW100-BRV204 . The TW100-BRV204 is a  
multi-function device providing the following services:  
Shared Broadband Internet Access for all LAN users.  
VPN Gateway for IPSec VPN connections to remote PCs or sites.  
3-Port Switching Hub for 10BaseT or 100BaseT connections.  
Figure 1: TW100-BRV204  
TW100-BRV204 Features  
The TW100-BRV204 incorporates many advanced features, carefully designed to provide  
sophisticated functions while being easy to use.  
Internet Access Features  
Shared Internet Access. All users on the LAN or WLAN can access the Internet  
through the TW100-BRV204 , using only a single external IP Address. The local (invalid)  
IP Addresses are hidden from external sources. This process is called NAT (Network Ad-  
dress Translation).  
DSL & Cable Modem Support. The TW100-BRV204 has a 100BaseT Ethernet port  
for connecting a DSL or Cable Modem. All popular DSL and Cable Modems are sup-  
ported. SingTel RAS and Big Pond (Australia) login support is also included.  
PPPoE, PPTP, SingTel RAS and Telstra Big Pond Support. The Internet (WAN  
port) connection supports PPPoE (PPP over Ethernet), PPTP (Peer-to-Peer Tunneling Pro-  
tocol), SingTel RAS and Telstra Big Pond (Australia), as well as "Direct Connection" type  
services.  
Fixed or Dynamic IP Address. On the Internet (WAN port) connection, the TW100-  
BRV204 supports both Dynamic IP Address (IP Address is allocated on connection) and  
Fixed IP Address.  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
Advanced Internet Functions  
Communication Applications. Support for Internet communication applications, such  
as interactive Games, Telephony, and Conferencing applications, which are often difficult  
to use when behind a Firewall, is included.  
Special Internet Applications. Applications which use non-standard connections or  
port numbers are normally blocked by the Firewall. The ability to define and allow such  
applications is provided, to enable such applications to be used normally.  
Virtual Servers. This feature allows Internet users to access Internet servers on your  
LAN. The required setup is quick and easy.  
Multi-DMZ. For each WAN (Internet) IP address allocated to you, one (1) PC on your  
local LAN can be configured to allow unrestricted 2-way communication with Servers or  
individual users on the Internet. This provides the ability to run programs which are in-  
compatible with Firewalls.  
Physical DMZ Port. PCs connected to the DMZ port are effectively isolated from your  
LAN, while connected to the Internet. This provides additional security for your LAN  
while allowing your Servers to be accessed from the Internet.  
URL Filter. Use the URL Filter to block access to undesirable Web sites by LAN users.  
Internet Access Log. See which Internet connections have been made.  
VPN Pass through Support. PCs with VPN (Virtual Private Networking) software  
using PPTP, L2TP and IPSec are transparently supported - no configuration is required.  
LAN Features  
3-Port Switching Hub. The TW100-BRV204 incorporates a 3-port 10/100BaseT  
switching hub, making it easy to create or extend your LAN.  
DHCP Server Support. Dynamic Host Configuration Protocol provides a dynamic IP  
address to PCs and other devices upon request. The TW100-BRV204 can act as a DHCP  
Server for devices on your local LAN and WLAN.  
Multi Segment LAN Support. LANs containing one or more segments are supported,  
via the TW100-BRV204 's RIP (Routing Information Protocol) support and built-in static  
routing table.  
DMZ Port. Used when allowing Servers on your LAN to be accessed from the Internet,  
the DMZ port provides additional protection for both your Servers and your LAN.  
Configuration & Management  
Easy Setup. Use your WEB browser from anywhere on the LAN or WLAN for configu-  
ration.  
Remote Management. The TW100-BRV204 can be managed from any PC on your  
LAN. And, if the Internet connection exists, it can also (optionally) be configured via the  
Internet.  
UPnP Support. UPnP (Universal Plug and Play) allows automatic discovery and con-  
figuration of the TW100-BRV204 . UPnP is by supported by Windows ME, XP, or later.  
Configuration File Backup & Restore. You can backup (download) the TW100-  
BRV204 's configuration file to your PC, and restore (upload) a previously-saved configu-  
ration file to the TW100-BRV204 .  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
Introduction  
Security Features  
Password - protected Configuration. Optional password protection is provided to  
prevent unauthorized users from modifying the configuration data and settings.  
NAT Protection. An intrinsic side effect of NAT (Network Address Translation) tech-  
nology is that by allowing all LAN users to share a single IP address, the location and  
even the existence of each PC is hidden. From the external viewpoint, there is no network,  
only a single device - the TW100-BRV204 .  
Stateful Inspection Firewall. All incoming data packets are monitored and all incom-  
ing server requests are filtered, thus protecting your network from malicious attacks from  
external sources.  
Protection against DoS attacks. DoS (Denial of Service) attacks can flood your  
Internet connection with invalid packets and connection requests, using so much band-  
width and so many resources that Internet access becomes unavailable. The TW100-  
BRV204 incorporates protection against DoS attacks.  
Rule-based Policy Firewall. To provide additional protection against malicious pack-  
ets, you can define your own firewall rules. This can also be used to control the Internet  
services available to LAN users.  
IPSec VPN Gateway Features  
IPSec.. Support for IPSec standards, including IKE and certificates.  
10 Tunnels. Up to 10 VPN tunnels can be created.  
High performance. High performance encryption engine maintains high throughput  
even when using 3DES.  
Microsoft VPN Gateway Support  
PPTP Server. The TW100-BRV204 emulates a Microsoft PPTP VPN Server, allowing  
clients to use the Microsoft VPN client provided in Windows.  
Windows Client Support. Remote users can use the Microsoft VPN client (VPN  
Adapter) provided in recent versions of Windows.  
Easy Setup. For both the Administrator and remote users, the Microsoft VPN is much  
easier to configure than IPSec VPN.  
Package Contents  
The following items should be included:  
The TW100-BRV204 Unit  
Power Adapter  
Quick Installation Guide  
CD-ROM containing the on-line manual.  
If any of the above items are damaged or missing, please contact your dealer immediately.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
Physical Details  
Front-mounted LEDs  
Figure 2: Front Panel  
Power  
On - Power on.  
Off - No power.  
Status (Red)  
On - Error condition.  
Off - Normal operation.  
Blinking - This LED blinks during start up.  
Each port has 2 LEDs  
LAN  
Link/Act  
On - Corresponding LAN (hub) port is active.  
Off - No active connection on the corresponding LAN (hub) port.  
Flashing - Data is being transmitted or received via the corre-  
sponding LAN (hub) port.  
100  
On - Corresponding LAN (hub) port is using 100BaseT.  
Off - Corresponding LAN (hub) port connection is using  
10BaseT, or no active connection.  
DMZ  
Link/Act  
On - DMZ port is active.  
Off - No active connection to the DMZ port.  
Flashing - Data is being transmitted or received via the DMZ  
port.  
100  
On - DMZ port is using 100BaseT.  
Off - DMZ port connection is using 10BaseT, or no active con-  
nection.  
WAN  
On - Connection to the modem attached to the WAN (Internet) port is  
established.  
Off - No connection to a modem on the WAN (Internet) port.  
Flashing - Data is being transmitted or received via the WAN port.  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Introduction  
Rear Panel  
Figure 3: Rear Panel  
This button has two (2) functions:  
Reset Button  
Reboot. When pressed and released, the TW100-BRV204 will  
reboot (restart).  
Clear All Data. This button can also be used to clear ALL data  
and restore ALL settings to the factory default values.  
To Clear All Data and restore the factory default values:  
1. Power Off.  
2. Hold the Reset Button down while you Power On.  
3. Keep holding the Reset Button for a few seconds, until the RED  
LED has flashed TWICE.  
4. Release the Reset Button. The TW100-BRV204 is now using  
the factory default values.  
Connect the DSL or Cable Modem here. If your modem came with a  
cable, use the supplied cable. Otherwise, use a standard LAN cable.  
WAN port  
(10/100BaseT)  
PCs or devices connected to the DMZ port are isolated from the  
LAN.  
DMZ port  
If you have a server you wish to make available to the public, you  
can connect it here. To use multiple servers, use a standard LAN  
cable to connect the DMZ port to a normal port on another hub, and  
connect your servers to the hub.  
Use standard LAN cables (RJ45 connectors) to connect your PCs to  
these ports.  
10/100BaseT  
LAN connections  
Note:  
Any LAN port on the TW100-BRV204 will automatically function  
as an "Uplink" port when required. Just connect any port to a normal  
port on the other hub, using a standard LAN cable.  
Connect the supplied power adapter here.  
Power port  
Using the DMZ Port  
The DMZ port is intended for connection of a server you wish to make available to the public.  
To use multiple servers, use a standard LAN cable to connect the DMZ port to a normal port  
on another hub, and connect your servers to the hub.  
Please note the following points regarding the DMZ port.  
Although physically attached to the hub ports, the DMZ port is not part of the built-in hub.  
It is a separate single port which is isolated from the hub.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
PCs connected to the DMZ port are on the same LAN segment as PCs connected to the  
Hub ports. They must use the same IP address range.  
PCs connected to the DMZ port are NOT visible to PCs on the hub (LAN) ports. So you  
cannot use Microsoft networking or other networking protocols to connect to PCs on the  
DMZ. The connection must be made via the Internet.  
PCs connected to the DMZ port still share the WAN port IP address for Internet access.  
To make PCs on the DMZ port available from the Internet, the "Virtual Server" (Port  
Forwarding) feature must be configured to send incoming traffic to the appropriate server.  
Advantages of the DMZ Port  
If running any Servers on your LAN, you should connect them to the DMZ port, for the  
following reasons:  
Traffic passing between the DMZ and LAN passes through the firewall. The firewall will  
protect your LAN if your Server is compromised and used to launch an attack on your  
LAN.  
When using the Virtual Servers feature, (see Virtual Servers in Chapter 6) a firewall rule  
to allow incoming traffic from the Internet (WAN) to the DMZ is automatically created.  
If the Server is connected to the LAN (hub) ports, you must add the firewall rule manually.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2  
Installation  
2
This Chapter covers the physical installation of the TW100-BRV204 .  
Requirements  
Network cables. Use standard 10/100BaseT network (UTP) cables with RJ45 connectors.  
TCP/IP protocol must be installed on all PCs.  
For Internet Access, an Internet Access account with an ISP, and a Broadband modem  
(usually, DSL or Cable modem).  
Procedure  
Figure 4: Installation Diagram  
1. Choose an Installation Site  
Select a suitable place on the network to install the TW100-BRV204 .  
Ensure the TW100-BRV204 and the DSL/Cable modem are powered OFF.  
2. Connect LAN Cables  
Use standard LAN cables to connect PCs to the Switching Hub ports on the TW100-  
BRV204 . Both 10BaseT and 100BaseT connections can be used simultaneously.  
If required, you can connect any LAN port to another Hub. Any LAN port on the TW100-  
BRV204 will automatically function as an "Uplink" port when required. Just connect any  
LAN port to a normal port on the other hub, using a standard LAN cable.  
If desired, connect a PC (server) to the DMZ port. To use multiple servers, use a standard  
LAN cable to connect the DMZ port to a normal port on another hub, and connect your  
servers to the hub. PCs connected to the DMZ port are isolated from your LAN.  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
3. Connect WAN Cable  
Connect the Broadband modem to the WAN port on the TW100-BRV204 . Use the cable  
supplied with your Broadband modem. If no cable was supplied, use a standard LAN cable.  
4. Power Up  
Power on the Broadband modem.  
Connect the supplied power adapter to the TW100-BRV204 and power up.  
Use only the power adapter provided. Using a different one may cause hardware damage  
5. Check the LEDs  
The Power LED should be ON.  
The Status LED should blink during start up, then turn Off. If it stays on, there is a hard-  
ware error.  
For each LAN (PC) connection, the LAN Link/Act LED should be ON (provided the PC is  
also ON.)  
If a PC is connected to the DMZ port, the DMZ port's Link/Act LED should be ON (pro-  
vided the PC is also ON.)  
The WAN LED should be ON.  
For more information, refer to Front-mounted LEDs in Chapter 1.  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3  
Setup  
3
This Chapter provides Setup details of the TW100-BRV204 .  
Overview  
This chapter describes the setup procedure for:  
Internet Access  
LAN configuration  
PCs on your local LAN may also require configuration. For details, see Chapter 4 - PC Con-  
figuration.  
Other configuration may also be required, depending on which features and functions of the  
TW100-BRV204 you wish to use. Use the table below to locate detailed instructions for the  
required functions.  
To Do this:  
Refer to:  
Configure PCs on your LAN.  
Chapter 4:  
PC Configuration  
Check TW100-BRV204 operation and Status.  
Chapter 5:  
Operation and Status  
Use any of the following Internet features:  
Chapter 6:  
Internet Features  
WAN Port  
Advanced Setup  
Dynamic DNS  
Virtual Servers  
Options  
Change any of the following Security-related settings:  
Chapter 7:  
Security Configuration  
Admin Login  
Access Control  
Firewall Rules  
Logs  
E-mail  
Security Options  
Scheduling  
Services  
Use the IPSec VPN features:  
Chapter 8:  
VPN (IPSec)  
VPN Policies  
Certificates  
CRLs  
VPN Status  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
Use the Microsoft VPN feature:  
Chapter 9:  
Microsoft VPN  
PPTP Server in the TW100-BRV204 .  
User and Client setup.  
Checking VPN connection Status.  
Configure or use any of the following:  
Chapter 9:  
Other Features and Settings  
Configuration File backup and restore.  
Network Diagnostic  
PC Database  
Remote Administration  
Routing  
Upgrade Firmware  
UPnP  
Where use of a certain feature requires that  
PCs or other LAN devices be configured, this  
is also explained in the relevant chapter.  
Configuration Program  
The TW100-BRV204 contains an HTTP server. This enables you to connect to it, and config-  
ure it, using your Web Browser. Your Browser must support JavaScript. The configuration  
program has been tested on the following browsers:  
Netscape V4.08 or later  
Internet Explorer V4 or later  
Preparation  
Before attempting to configure the TW100-BRV204 , please ensure that:  
Your PC can establish a physical connection to the TW100-BRV204 . The PC and the  
TW100-BRV204 must be directly connected (using the Hub ports on the TW100-  
BRV204 ) or on the same LAN segment.  
The TW100-BRV204 must be installed and powered ON.  
If the TW100-BRV204 's default IP Address (192.168.0.1) is already used by another  
device, the other device must be turned OFF until the TW100-BRV204 is allocated a new  
IP Address during configuration.  
Using UPnP  
If your Windows system supports UPnP, an icon for the TW100-BRV204 will appear in the  
system tray, notifying you that a new network device has been found, and offering to create a  
new desktop shortcut to the newly-discovered device.  
Unless you intend to change the IP Address of the TW100-BRV204 , you can accept the  
desktop shortcut.  
Whether you accept the desktop shortcut or not, you can always find UPnP devices in My  
Network Places (previously called Network Neighborhood).  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setup  
Double - click the icon for the TW100-BRV204 (either on the Desktop, or in My Network  
Places) to start the configuration. Refer to the following section Setup Wizard for details  
of the initial configuration process.  
Using your Web Browser  
To establish a connection from your PC to the TW100-BRV204 :  
1. After installing the TW100-BRV204 in your LAN, start your PC. If your PC is already  
running, restart it.  
2. Start your WEB browser.  
3. In the Address box, enter "HTTP://" and the IP Address of the TW100-BRV204 , as in  
this example, which uses the TW100-BRV204 's default IP Address:  
HTTP://192.168.0.1  
If you can't connect  
If the TW100-BRV204 does not respond, check the following:  
The TW100-BRV204 is properly installed, LAN connection is OK, and it is  
powered ON. You can test the connection by using the "Ping" command:  
Open the MS-DOS window or command prompt window.  
Enter the command:  
ping 192.168.0.1  
If no response is received, either the connection is not working, or your  
PC's IP address is not compatible with the TW100-BRV204 's IP Ad-  
dress. (See next item.)  
If your PC is using a fixed IP Address, its IP Address must be within the range  
192.168.0.2 to 192.168.0.254 to be compatible with the TW100-BRV204 's  
default IP Address of 192.168.0.1. Also, the Network Mask must be set to  
255.255.255.0. See Chapter 4 - PC Configuration for details on checking your  
PC's TCP/IP settings.  
Ensure that your PC and the TW100-BRV204 are on the same network  
segment. (If you don't have a router, this must be the case.)  
4. You will be prompted for a username and password, as shown below.  
Figure 5: Password Dialog  
Enter adminfor the User Name, and leave the Password blank.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
These are the default values. Both the name and password can (and should) be changed,  
using the Admin Login screen. Once you have changed either the name or the password,  
you must use the current values.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setup  
Setup Wizard  
The first time you connect to the TW100-BRV204 , the Setup Wizard will run automatically.  
(The Setup Wizard will also run if the TW100-BRV204 's default setting are restored.)  
1. Step through the Wizard until finished.  
You need to know the type of Internet connection service used by your ISP. Check  
the data supplied by your ISP.  
The common connection types are explained in the tables below.  
2. On the final screen of the Wizard, run the test and check that an Internet connection can be  
established.  
3. If the connection test fails:  
Check your data, the Cable/DSL modem, and all connections.  
Check that you have entered all data correctly.  
If using a Cable modem, your ISP may have recorded the MAC (physical) address of  
your PC. Run the Wizard, and on the Cable Modem screen, use the "Clone MAC ad-  
dress" button to copy the MAC address from your PC to the TW100-BRV204 .  
Common Connection Types  
Cable Modems  
Type  
Details  
ISP Data required  
Dynamic  
IP Address  
Your IP Address is allocated  
automatically, when you  
connect to you ISP.  
Usually, none.  
However, some ISP's may  
require you to use a particular  
Hostname, Domain name, or  
MAC (physical) address.  
Static (Fixed)  
IP Address  
Your ISP allocates a perma-  
nent IP Address to you.  
IP Address allocated to you,  
mask and gateway (if provided),  
and DNS address.  
Some ISP's may also require  
you to use a particular Host-  
name, Domain name, or MAC  
(physical) address.  
DSL Modems  
Type  
Details  
ISP Data required  
Dynamic  
IP Address  
Your IP Address is allocated  
automatically, when you  
connect to you ISP.  
None.  
Static (Fixed)  
IP Address  
Your ISP allocates a perma-  
nent IP Address to you.  
IP Address allocated to you,  
mask and gateway (if provided),  
and DNS address.  
PPPoE  
You connect to the ISP only  
when required. The IP address  
is usually allocated automati-  
cally.  
User name and password.  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
PPTP  
Mainly used in Europe.  
PPTP Server IP Address.  
User name and password.  
You connect to the ISP only  
when required. The IP address  
is usually allocated automati-  
cally, but may be Static  
(Fixed).  
IP Address allocated to  
you, if Static (Fixed).  
Other Modems (e.g. Broadband Wireless)  
Type  
Details  
ISP Data required  
Dynamic  
IP Address  
Your IP Address is allocated  
automatically, when you  
connect to you ISP.  
Usually, none.  
However, some ISP's may  
require you to use a particular  
Hostname, Domain name, or  
MAC (physical) address.  
Static (Fixed)  
IP Address  
Your ISP allocates a perma-  
nent IP Address to you.  
IP Address allocated to you,  
mask and gateway (if provided),  
and DNS address.  
Big Pond Cable (Australia)  
For this connection method, the following data is required:  
User Name  
Password  
Big Pond Server IP address  
SingTel RAS  
For this connection method, the following data is required:  
User Name  
Password  
RAS Plan  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setup  
Home Screen  
After finishing or exiting the Setup Wizard, you will see the Home screen. When you connect  
in future, you will see this screen when you connect. An example screen is shown below.  
Figure 6: Home Screen  
Navigation & Data Input  
Use the menu bar on the top of the screen, and the "Back" button on your Browser, for  
navigation.  
Changing to another screen without clicking "Save" does NOT save any changes you may  
have made. You must "Save" before changing screens or your data will be ignored.  
On each screen, clicking the "Help" button will  
display help for that screen.  
From any help screen, you can access the list of all  
help files (help index).  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User’s Guide  
LAN Screen  
Use the LAN link on the main menu to reach the LAN screen An example screen is shown  
below.  
Figure 7: LAN Screen  
Data - LAN Screen  
TCP/IP  
IP address for the TW100-BRV204 , as seen from the local LAN. Use  
the default value unless the address is already in use or your LAN is  
using a different IP address range. In the latter case, enter an unused IP  
Address from within the range used by your LAN.  
IP Address  
The default value 255.255.255.0 is standard for small (class "C")  
networks. For other networks, use the Subnet Mask for the LAN  
segment to which the TW100-BRV204 is attached (the same value as  
the PCs on that LAN segment).  
Subnet Mask  
DHCP Server  
If Enabled, the TW100-BRV204 will allocate IP Addresses to  
PCs (DHCP clients) on your LAN when they start up. The default  
(and recommended) value is Enabled.  
If you are already using a DHCP Server, this setting must be  
Disabled, and the existing DHCP server must be re-configured to  
treat the TW100-BRV204 as the default Gateway. See the follow-  
ing section for further details.  
The Start IP Address and Finish IP Address fields set the values  
used by the DHCP server when allocating IP Addresses to DHCP  
clients. This range also determines the number of DHCP clients  
supported.  
See the following section for further details on using DHCP.  
Buttons  
Save  
Save the data on screen.  
The "Cancel" button will discard any data you have entered and reload  
the file from the TW100-BRV204 .  
Cancel  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Setup  
DHCP  
What DHCP Does  
A DHCP (Dynamic Host Configuration Protocol) Server allocates a valid IP address to a  
DHCP Client (PC or device) upon request.  
The client request is made when the client device starts up (boots).  
The DHCP Server provides the Gateway and DNS addresses to the client, as well as  
allocating an IP Address.  
The TW100-BRV204 can act as a DHCP server.  
Windows 95/98/ME and other non-Server versions of Windows will act as a DHCP client.  
This is the default Windows setting for the TCP/IP network protocol. However, Windows  
uses the term Obtain an IP Address automatically instead of "DHCP Client".  
You must NOT have two (2) or more DHCP Servers on the same LAN segment. (If your  
LAN does not have other Routers, this means there must only be one (1) DHCP Server on  
your LAN.)  
Using the TW100-BRV204 's DHCP Server  
This is the default setting. The DHCP Server settings are on the LAN screen. On this screen,  
you can:  
Enable or Disable the TW100-BRV204 's DHCP Server function.  
Set the range of IP Addresses allocated to PCs by the DHCP Server function.  
You can assign Fixed IP Addresses to some devices  
while using DHCP, provided that the Fixed IP Addresses  
are NOT within the range used by the DHCP Server.  
Using another DHCP Server  
You can only use one (1) DHCP Server per LAN segment. If you wish to use another DHCP  
Server, rather than the TW100-BRV204 's, the following procedure is required.  
1. Disable the DHCP Server feature in the TW100-BRV204 . This setting is on the LAN  
screen.  
2. Configure the DHCP Server to provide the TW100-BRV204 's IP Address as the Default  
Gateway.  
To Configure your PCs to use DHCP  
This is the default setting for TCP/IP under Windows 95/98/ME.  
See Chapter 4 - Client Configuration for the procedure to check these settings.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 4  
PC Configuration  
4
This Chapter details the PC Configuration required on the local ("Internal")  
LAN.  
Overview  
For each PC, the following may need to be configured:  
TCP/IP network settings  
Internet Access configuration  
Windows Clients  
This section describes how to configure Windows clients for Internet access via the TW100-  
BRV204 .  
The first step is to check the PC's TCP/IP settings.  
The TW100-BRV204 uses the TCP/IP network protocol for all functions, so it is essential that  
the TCP/IP protocol be installed and configured on each PC.  
TCP/IP Settings - Overview  
If using the default TW100-BRV204 settings, and the default Windows  
TCP/IP settings, no changes need to be made.  
By default, the TW100-BRV204 will act as a DHCP Server, automatically providing a  
suitable IP Address (and related information) to each PC when the PC boots.  
For all non-Server versions of Windows, the default TCP/IP setting is to act as a DHCP  
client.  
If using a Fixed (specified) IP address, the following changes are re-  
quired:  
The Gateway must be set to the IP address of the TW100-BRV204  
The DNS should be set to the address provided by your ISP.  
If your LAN has a Router, the LAN Administrator must re-  
configure the Router itself. Refer to Chapter 8 - Other  
Features and Operations for details.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PC Configuration  
Checking TCP/IP Settings - Windows 9x/ME:  
1. Select Control Panel - Network. You should see a screen like the following:  
Figure 8: Network Configuration  
2. Select the TCP/IP protocol for your network card.  
3. Click on the Properties button. You should then see a screen like the following.  
Figure 9: IP Address (Win 95)  
Ensure your TCP/IP settings are correct, as follows:  
Using DHCP  
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default  
Windows setting. Using this is recommended. By default, the TW100-BRV204 will act as a  
DHCP Server.  
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204 .  
Using "Specify an IP Address"  
If your PC is already configured, check with your network administrator before making the  
following changes:  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
On the Gateway tab, enter the TW100-BRV204 's IP address in the New Gateway field  
and click Add, as shown below. Your LAN administrator can advise you of the IP Address  
they assigned to the TW100-BRV204 .  
Figure 10: Gateway Tab (Win 95/98)  
On the DNS Configuration tab, ensure Enable DNS is selected. If the DNS Server Search  
Order list is empty, enter the DNS address provided by your ISP in the fields beside the  
Add button, then click Add.  
Figure 11: DNS Tab (Win 95/98)  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PC Configuration  
Checking TCP/IP Settings - Windows NT4.0  
1. Select Control Panel - Network, and, on the Protocols tab, select the TCP/IP protocol, as  
shown below.  
Figure 12: Windows NT4.0 - TCP/IP  
2. Click the Properties button to see a screen like the one below.  
Figure 13: Windows NT4.0 - IP Address  
3. Select the network card for your LAN.  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
4. Select the appropriate radio button - Obtain an IP address from a DHCP Server or Specify  
an IP Address, as explained below.  
Obtain an IP address from a DHCP Server  
This is the default Windows setting. Using this is recommended. By default, the TW100-  
BRV204 will act as a DHCP Server.  
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204 .  
Specify an IP Address  
If your PC is already configured, check with your network administrator before making the  
following changes.  
1. The Default Gateway must be set to the IP address of the TW100-BRV204 . To set this:  
Click the Advanced button on the screen above.  
On the following screen, click the Add button in the Gateways panel, and enter the  
TW100-BRV204 's IP address, as shown in Figure 14 below.  
If necessary, use the Up button to make the TW100-BRV204 the first entry in the  
Gateways list.  
Figure 14 - Windows NT4.0 - Add Gateway  
2. The DNS should be set to the address provided by your ISP, as follows:  
Click the DNS tab.  
On the DNS screen, shown below, click the Add button (under DNS Service Search  
Order), and enter the DNS provided by your ISP.  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PC Configuration  
Figure 15: Windows NT4.0 - DNS  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Checking TCP/IP Settings - Windows 2000:  
1. Select Control Panel - Network and Dial-up Connection.  
2. Right - click the Local Area Connection icon and select Properties. You should see a  
screen like the following:  
Figure 16: Network Configuration (Win 2000)  
3. Select the TCP/IP protocol for your network card.  
4. Click on the Properties button. You should then see a screen like the following.  
Figure 17: TCP/IP Properties (Win 2000)  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PC Configuration  
5. Ensure your TCP/IP settings are correct, as described below.  
Using DHCP  
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default  
Windows setting. Using this is recommended. By default, the TW100-BRV204 will act as a  
DHCP Server.  
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204 .  
Using a fixed IP Address ("Use the following IP Address")  
If your PC is already configured, check with your network administrator before making the  
following changes.  
Enter the TW100-BRV204 's IP address in the Default gateway field and click OK. (Your  
LAN administrator can advise you of the IP Address they assigned to the TW100-  
BRV204 .)  
If the DNS Server fields are empty, select Use the following DNS server addresses, and  
enter the DNS address or addresses provided by your ISP, then click OK.  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Checking TCP/IP Settings - Windows XP  
1. Select Control Panel - Network Connection.  
2. Right click the Local Area Connection and choose Properties. You should see a screen  
like the following:  
Figure 18: Network Configuration (Windows XP)  
3. Select the TCP/IP protocol for your network card.  
4. Click on the Properties button. You should then see a screen like the following.  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PC Configuration  
Figure 19: TCP/IP Properties (Windows XP)  
5. Ensure your TCP/IP settings are correct.  
Using DHCP  
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default  
Windows setting. Using this is recommended. By default, the TW100-BRV204 will act as a  
DHCP Server.  
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204 .  
Using a fixed IP Address ("Use the following IP Address")  
If your PC is already configured, check with your network administrator before making the  
following changes.  
In the Default gateway field, enter the TW100-BRV204 's IP address and click OK. Your  
LAN administrator can advise you of the IP Address they assigned to the TW100-  
BRV204 .  
If the DNS Server fields are empty, select Use the following DNS server addresses, and  
enter the DNS address or addresses provided by your ISP, then click OK.  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Internet Access  
To configure your PCs to use the TW100-BRV204 for Internet access:  
Ensure that the DSL modem, Cable modem, or other permanent connection is functional.  
Use the following procedure to configure your Browser to access the Internet via the LAN,  
rather than by a Dial-up connection.  
For Windows 9x/ME/2000  
1. Select Start Menu - Settings - Control Panel - Internet Options.  
2. Select the Connection tab, and click the Setup button.  
3. Select "I want to set up my Internet connection manually, or I want to connect through a  
local area network (LAN)" and click Next.  
4. Select "I connect through a local area network (LAN)" and click Next.  
5. Ensure all of the boxes on the following Local area network Internet Configuration screen  
are unchecked.  
6. Check the "No" option when prompted "Do you want to set up an Internet mail account  
now?".  
7. Click Finish to close the Internet Connection Wizard.  
Setup is now completed.  
For Windows XP  
1. Select Start Menu - Control Panel - Network and Internet Connections.  
2. Select Set up or change your Internet Connection.  
3. Select the Connection tab, and click the Setup button.  
4. Cancel the pop-up "Location Information" screen.  
5. Click Next on the "New Connection Wizard" screen.  
6. Select "Connect to the Internet" and click Next.  
7. Select "Set up my connection manually" and click Next.  
8. Check "Connect using a broadband connection that is always on" and click Next.  
9. Click Finish to close the New Connection Wizard.  
Setup is now completed.  
Accessing AOL  
To access AOL (America On Line) through the TW100-BRV204 , the AOL for Windows  
software must be configured to use TCP/IP network access, rather than a dial-up connection.  
The configuration process is as follows:  
Start the AOL for Windows communication software. Ensure that it is Version 2.5, 3.0 or  
later. This procedure will not work with earlier versions.  
Click the Setup button.  
Select Create Location, and change the location name from "New Locality" to "TW100-  
BRV204 ".  
Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number  
blank.)  
Click Save, then OK.  
Configuration is now complete.  
Before clicking "Sign On", always ensure that you are using the "TW100-BRV204 "  
location.  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PC Configuration  
Macintosh Clients  
From your Macintosh, you can access the Internet via the TW100-BRV204 . The procedure is  
as follows.  
1. Open the TCP/IP Control Panel.  
2. Select Ethernet from the Connect via pop-up menu.  
3. Select Using DHCP Server from the Configure pop-up menu. The DHCP Client ID field  
can be left blank.  
4. Close the TCP/IP panel, saving your settings.  
Note:  
If using manually assigned IP addresses instead of DHCP, the required changes are:  
Set the Router Address field to the TW100-BRV204 's IP Address.  
Ensure your DNS settings are correct.  
Linux Clients  
To access the Internet via the TW100-BRV204 , it is only necessary to set the TW100-  
BRV204 as the "Gateway".  
Ensure you are logged in as "root" before attempting any changes.  
Fixed IP Address  
By default, most Unix installations use a fixed IP Address. If you wish to continue using a  
fixed IP Address, make the following changes to your configuration.  
Set your "Default Gateway" to the IP Address of the TW100-BRV204 .  
Ensure your DNS (Name server) settings are correct.  
To act as a DHCP Client (recommended)  
The procedure below may vary according to your version of Linux and X -windows shell.  
1. Start your X Windows client.  
2. Select Control Panel - Network  
3. Select the "Interface" entry for your Network card. Normally, this will be called "eth0".  
4. Click the Edit button, set the "protocol" to "DHCP", and save this data.  
5. To apply your changes  
Use the "Deactivate" and "Activate" buttons, if available.  
OR, restart your system.  
Other Unix Systems  
To access the Internet via the TW100-BRV204 :  
Ensure the "Gateway" field for your network card is set to the IP Address of the TW100-  
BRV204 .  
Ensure your DNS (Name Server) settings are correct.  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 5  
Operation and Status  
5
This Chapter details the operation of the TW100-BRV204 and the status  
screens.  
Operation  
Once both the TW100-BRV204 and the PCs are configured, operation is automatic.  
However, there are some situations where additional Internet configuration may be required:  
If using Internet-based Communication Applications, it may be necessary to specify  
which PC receives an incoming connection. Refer to Chapter 6 - Internet Features for  
further details.  
Applications which use non-standard connections or port numbers may be blocked by the  
TW100-BRV204 's built-in firewall. You can define such applications as Special Appli-  
cations to allow them to function normally. Refer to Chapter 6 - Internet Features for  
further details.  
Some non-standard applications may require use of the DMZ feature. Refer to Chapter 6 -  
Internet Features for further details.  
Status Screen  
Use the Status link on the main menu to view this screen.  
Figure 20: Status Screen  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Operation and Status  
Data - Status Screen  
Internet  
This indicates the current connection method, as set in the Setup  
Wizard.  
Connection Method  
This shows the connection status of the modem.  
Current connection status:  
Broadband Modem  
Internet Connection  
Active  
Idle  
Unknown  
Failed  
If there is an error, you can click the "Connection Details" button  
to find out more information.  
This IP Address is allocated by the ISP (Internet Service Pro-  
vider).  
Internet IP Address  
Click this button to open a sub-window and view a detailed  
description of the current connection. Depending on the type of  
connection, a "log" may also be available.  
"Connection Details"  
Button  
LAN  
The IP Address of the TW100-BRV204 .  
IP Address  
Network Mask  
DHCP Server  
The Network Mask (Subnet Mask) for the IP Address above.  
This shows the status of the DHCP Server function - either  
"Enabled" or "Disabled".  
For additional information about the PCs on your LAN, and the  
IP addresses allocated to them, use the PC Database option on  
the Other menu.  
System  
This displays the current name of the TW100-BRV204 .  
Device Name  
Firmware Version  
The current version of the firmware installed in the TW100-  
BRV204 .  
Clicking this button will open a Window which lists all system  
details and settings.  
"System Data"  
Button  
Buttons  
View the details of the current Internet connection. The sub-  
screen displayed will depend on the connection method used. See  
the following sections for details of each sub-screen.  
Connection Details  
Display all system information in a sub-window.  
System Data  
Restart (reboot) the Router. You will have to wait for the restart  
to be completed before continuing.  
Restart Router  
Update the data displayed on screen.  
Refresh Screen  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Connection Status - PPPoE  
If using PPPoE (PPP over Ethernet), a screen like the following example will be displayed  
when the "Connection Details" button is clicked.  
Figure 21: PPPoE Status Screen  
Data - PPPoE Screen  
Connection  
The hardware address of this device, as seen by remote devices  
on the Internet. (This is different to the hardware address seen by  
devices on the local LAN.)  
Physical Address  
The IP Address of this device, as seen by Internet users. This  
address is allocated by your ISP (Internet Service Provider).  
IP Address  
The Network Mask associated with the IP Address above.  
Network Mask  
This indicates whether or not the connection is currently estab-  
lished.  
PPPoE Link Status  
If the connection does not exist, the "Connect" button can be  
used to establish a connection.  
If the connection currently exists, the "Disconnect" button  
can be used to break the connection.  
Connection Log  
The Connection Log shows status messages relating to the  
existing connection.  
Connection Log  
The most common messages are listed in the table below.  
The "Clear Log" button will restart the Log, while the Re-  
fresh button will update the messages shown on screen.  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Operation and Status  
Buttons  
Connect  
If not connected, establish a connection to your ISP.  
If connected to your ISP, hang up the connection.  
Disconnect  
Clear Log  
Delete all data currently in the Log. This will make it easier to  
read new messages.  
Update the data on screen.  
Refresh  
Connection Log Messages  
Message  
Description  
Connect on Demand  
Connection attempt has been triggered by the "Connect  
automatically, as required" setting.  
Manual connection  
Connection attempt started by the "Connect" button.  
Preparing line for connection attempt.  
Reset physical connection  
Connecting to remote  
server  
Attempting to connect to the ISP's server.  
Remote Server located  
Start PPP  
ISP's Server has responded to connection attempt.  
Attempting to login to ISP's Server and establish a PPP  
connection.  
PPP up successfully  
Idle time-out reached  
Able to login to ISP's Server and establish a PPP connection.  
The connection has been idle for the time period specified in  
the "Idle Time-out" field. The connection will now be termi-  
nated.  
Disconnecting  
The current connection is being terminated, due to either the  
"Idle Time-out" above, or "Disconnect" button being clicked.  
Error: Remote Server not  
found  
ISP's Server did not respond. This could be a Server problem,  
or a problem with the link to the Server.  
Error: PPP Connection  
failed  
Unable to establish a PPP connection with the ISP's Server.  
This could be a login problem (name or password) or a Server  
problem.  
Error: Connection to  
Server lost  
The existing connection has been lost. This could be caused  
by a power failure, a link failure, or Server failure.  
Error: Invalid or unknown The data received from the ISP's Server could not be proc-  
packet type  
essed. This could be caused by data corruption (from a bad  
link), or the Server using a protocol which is not supported by  
this device.  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Connection Status - PPTP  
If using PPTP (Peer-to-Peer Tunneling Protocol), a screen like the following example will be  
displayed when the "Connection Details" button is clicked.  
Figure 22: PPTP Status Screen  
Data - PPTP Screen  
Connection  
The hardware address of this device, as seen by remote devices on  
the Internet. (This is different to the hardware address seen by  
devices on the local LAN.)  
Physical Address  
The IP Address of this device, as seen by Internet users. This address  
is allocated by your ISP (Internet Service Provider).  
IP Address  
This indicates whether or not the connection is currently established.  
PPTP Status  
If the connection does not exist, the "Connect" button can be  
used to establish a connection.  
If the connection currently exists, the "Disconnect" button can be  
used to break the connection.  
Connection Log  
The Connection Log shows status messages relating to the  
existing connection.  
Connection Log  
The "Clear Log" button will restart the Log, while the Refresh  
button will update the messages shown on screen.  
Buttons  
Connect  
If not connected, establish a connection to your ISP.  
If connected to your ISP, hang up the connection.  
Disconnect  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Operation and Status  
Delete all data currently in the Log. This will make it easier to read  
new messages.  
Clear Log  
Refresh  
Update the data on screen.  
Connection Status - Telstra Big Pond  
An example screen is shown below.  
Figure 23: Telstra Big Pond Status Screen  
Data - Telstra Big Pond Screen  
Connection  
The hardware address of this device, as seen by remote devices.  
Physical Address  
(This is different to the hardware address seen by devices on the  
local LAN.)  
The IP Address of this device, as seen by Internet users. This  
address is allocated by your ISP (Internet Service Provider).  
IP Address  
This indicates whether or not the connection is currently estab-  
lished.  
Connection Status  
If the connection does not exist, the "Connect" button can be  
used to establish a connection.  
If the connection currently exists, the "Disconnect" button can  
be used to break the connection.  
Normally, it is not necessary to use the Connect and Discon-  
nect buttons unless the setting "Connect automatically, as  
required" is disabled.  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Connection Log  
The Connection Log shows status messages relating to the  
existing connection.  
Connection Log  
The Clear Log button will restart the Log, while the Refresh  
button will update the messages shown on screen.  
Buttons  
Connect  
If not connected, establish a connection to Telstra Big Pond.  
If connected to Telstra Big Pond, terminate the connection.  
Disconnect  
Clear Log  
Delete all data currently in the Log. This will make it easier to read  
new messages.  
Update the data on screen.  
Refresh  
Connection Details - SingTel RAS  
If using the SingTel RAS access method, a screen like the following example will be displayed  
when the "Connection Details" button is clicked.  
Figure 24: Connection Details - SingTel RAS  
Data - SingTel RAS Screen  
Internet  
The RAS Plan which is currently used.  
RAS Plan  
The hardware address of this device, as seen by remote devices on  
the Internet. (This is different to the hardware address seen by  
devices on the local LAN.)  
Physical Address  
The IP Address of this device, as seen by Internet users. This address  
is allocated by your ISP (Internet Service Provider).  
IP Address  
The Network Mask associated with the IP Address above.  
Network Mask  
The IP Address of the remote Gateway or Router associated with the  
IP Address above.  
Default Gateway  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Operation and Status  
The IP Address of the Domain Name Server which is currently used.  
DNS IP Address  
DHCP Client  
This will show "Enabled" or "Disabled", depending on whether or  
not this device is functioning as a DHCP client.  
If "Enabled" the "Remaining lease time" field indicates when the IP  
Address allocated by the DHCP Server will expire. The lease is  
automatically renewed on expiry; use the "Renew" button if you wish  
to manually renew the lease immediately.  
Buttons  
This button is only useful if the IP address shown above is allocated  
automatically on connection. (Dynamic IP address). If you have a  
Fixed (Static) IP address, this button has no effect.  
Release/Renew  
Button will display  
EITHER  
"Release"  
OR  
If the ISP's DHCP Server has NOT allocated an IP Address for  
the TW100-BRV204 , this button will say "Renew". Clicking the  
"Renew" button will attempt to re-establish the connection and  
obtain an IP Address from the ISP's DHCP Server.  
"Renew"  
If an IP Address has been allocated to the TW100-BRV204 (by  
the ISP's DHCP Server), this button will say "Release". Clicking  
the "Release" button will break the connection and release the IP  
Address.  
Update the data shown on screen.  
Refresh  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Connection Details - Fixed/Dynamic IP Address  
If your access method is "Direct" (no login), a screen like the following example will be  
displayed when the "Connection Details" button is clicked.  
Figure 25: Connection Details - Fixed/Dynamic IP Address  
Data - Fixed/Dynamic IP address Screen  
Internet  
The hardware address of this device, as seen by remote devices on  
the Internet. (This is different to the hardware address seen by  
devices on the local LAN.)  
Physical Address  
The IP Address of this device, as seen by Internet users. This address  
is allocated by your ISP (Internet Service Provider).  
IP Address  
The Network Mask associated with the IP Address above.  
Network Mask  
The IP Address of the remote Gateway or Router associated with the  
IP Address above.  
Default Gateway  
The IP Address of the Domain Name Server which is currently used.  
DNS IP Address  
DHCP Client  
This will show "Enabled" or "Disabled", depending on whether or  
not this device is functioning as a DHCP client.  
If "Enabled" the "Remaining lease time" field indicates when the IP  
Address allocated by the DHCP Server will expire. The lease is  
automatically renewed on expiry; use the "Renew" button if you wish  
to manually renew the lease immediately.  
Buttons  
This button is only useful if the IP address shown above is allocated  
automatically on connection. (Dynamic IP address). If you have a  
Fixed (Static) IP address, this button has no effect.  
Release/Renew  
Button will display  
EITHER  
"Release"  
OR  
If the ISP's DHCP Server has NOT allocated an IP Address for  
the TW100-BRV204 , this button will say "Renew". Clicking the  
"Renew" button will attempt to re-establish the connection and  
obtain an IP Address from the ISP's DHCP Server.  
"Renew"  
If an IP Address has been allocated to the TW100-BRV204 (by  
the ISP's DHCP Server), this button will say "Release". Clicking  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Operation and Status  
the "Release" button will break the connection and release the IP  
Address.  
Update the data shown on screen.  
Refresh  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 6  
Internet Features  
6
This Chapter explains when and how to use the TW100-BRV204 's "Internet"  
Features.  
Overview  
The following advanced features are provided.  
WAN Port Configuration  
Advanced Internet  
Communication Applications  
Special Applications  
Multi-DMZ  
URL filter  
Dynamic DNS  
Virtual Servers  
Options  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Internet Features  
WAN Port Configuration  
The WAN Port Configuration screen provides an alternative to using the Wizard. It can be  
accessed from the Internet menu. An example screen is shown below.  
Figure 26: WAN Port Configuration Screen  
Data – WAN Port Configuration Screen  
Identification  
Normally, there is no need to change the default name, but if your  
ISP requests that you use a particular “Hostname”, enter it here.  
Hostname  
If your ISP provided a domain name, enter it here. Otherwise, this  
may be left blank.  
Domain name  
MAC Address  
Also called Network Adapter Address or Physical Address. This is a  
low-level identifier, as seen from the WAN port.  
Normally there is no need to change this, but some ISPs require a  
particular value, often that of the PC initially used for Internet access.  
You can use the Copy from PC button to copy your PC's address into  
this field, the Default button to insert the default value, or enter a  
value directly.  
IP Address  
IP Address  
is assigned auto-  
matically  
Also called Dynamic IP Address. This is the default, and the most  
common.  
Leave this selected if your ISP allocates an IP Address to the  
TW100-BRV204 upon connection.  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Specified  
Also called Static IP Address. Select this if your ISP has allocated  
IP Address  
you a fixed IP Address. If this option is selected, the following data  
must be entered.  
IP Address.  
The IP Address allocated by the ISP.  
Network Mask (Not required for PPPoE)  
This is also supplied by your ISP. It must be compatible with the  
IP Address above.  
Gateway IP Address (Not required for PPPoE)  
The address of the router or gateway, as supplied by your ISP.  
NAT  
NAT (Network Address Translation) is the technology which allows  
all PCs on your LAN to share the Internet IP address allocated to the  
WAN port on this Router. From the Internet, all PCs appear to have  
the same IP address.  
Enable NAT  
For normal operation, this setting must be ENABLED.  
Disable NAT  
Disabling NAT will disable Internet access, unless all PCs have  
valid Internet IP addresses.  
If you wish to use this device for Routing ONLY (and NOT for  
Internet access), then NAT should be disabled.  
DNS  
The DNS (Domain Name Server) address will be obtained automati-  
cally from your ISP's server. Note that if using a fixed IP address,  
with no login (login is set to "None"), then no Server is used, and this  
option cannot be used.  
Automatically  
obtain from  
Server  
If this option is selected, you must enter the IP address of the DNS  
(Domain Name Server) you wish to use.  
Use this DNS  
Note: If the DNS is unavailable, the "Backup DNS", entered on the  
Internet - Options screen, will be used.  
Login  
If your ISP does not use a login method (username, password) for  
Internet access, leave this at the default value "None (Direct connec-  
tion)"  
Login Method  
Otherwise, check the documentation from your ISP, select the login  
method used, and enter the required data.  
PPPoE - this is the most common login method, widely used  
with DSL modems. Normally, your ISP will have provided some  
software to connect and login. This software is no longer re-  
quired, and should not be used.  
PPTP - this is mainly used in Europe. You need to know the  
PPTP Server address as well as your name and password.  
Big Pond Cable - for Australia only.  
SingTel RAS - for Singapore only.  
42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Internet Features  
Advanced Internet  
Figure 27: Internet Screen  
This screen allows configuration of all advanced features relating to Internet access.  
Communication Applications  
Special Applications  
Multi-DMZ  
URL filter  
Communication Applications  
Most applications are supported transparently by the TW100-BRV204 . But sometimes it is not  
clear which PC should receive an incoming connection. This problem could arise with the  
Communication Applications listed on this screen.  
If this problem arises, you can use this screen to set which PC should receive an incoming  
connection, as described below.  
Communication Applications  
This lists applications which may generate incoming connections,  
where the destination PC (on your local LAN) is unknown.  
Select an Application  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
This lists the PCs on your LAN.  
Send incoming calls to  
If necessary, you can add PCs manually, using the PC  
Database option on the Other menu.  
For each application listed above, you can choose a destina-  
tion PC.  
There is no need to "Save" after each change; you can set the  
destination PC for each application, then click "Save".  
Special Applications  
If you use Internet applications which use non-standard connections or port numbers, you may  
find that they do not function correctly because they are blocked by the TW100-BRV204 's  
firewall. In this case, you can define the application as a "Special Application".  
Special Applications Screen  
This screen can be reached by clicking the Special Applications button on the Advanced  
Internet screen.  
You can then define your Special Applications. You will need detailed information about the  
application; this is normally available from the supplier of the application.  
Also, note that the terms "Incoming" and "Outgoing" on this screen refer to traffic from the  
client (PC) viewpoint  
Figure 28: Special Applications Screen  
Data - Special Applications Screen  
Use this to Enable or Disable this Special Application as required.  
Enter a descriptive name to identify this Special Application.  
Checkbox  
Name  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Internet Features  
Type - Select the protocol (TCP or UDP) used when you receive data  
from the special application or service. (Note: Some applications use  
different protocols for outgoing and incoming data).  
Incoming  
Ports  
Start - Enter the beginning of the range of port numbers used by the  
application server, for data you receive. If the application uses a single  
port number, enter it in both the "Start" and "Finish" fields.  
Finish - Enter the end of the range of port numbers used by the applica-  
tion server, for data you receive.  
Type - Select the protocol (TCP or UDP) used when you send data to  
the remote system or service.  
Outgoing  
Ports  
Start - Enter the beginning of the range of port numbers used by the  
application server, for data you send to it. If the application uses a sin-  
gle port number, enter it in both the "Start" and "Finish" fields.  
Finish - Enter the end of the range of port numbers used by the applica-  
tion server, for data you send to it. If the application uses a single port  
number, enter it in both the "Start" and "Finish" fields.  
Using a Special Application  
Configure the Special Applications screen as required.  
On your PC, use the application normally. Remember that only one (1) PC can use each  
Special application at any time. Also, when 1 PC is finished using a particular Special Ap-  
plication, there may need to be a "Time-out" before another PC can use the same Special  
Application. The "Time-out" period may be up to 3 minutes.  
If an application still cannot function correctly,  
try using the "DMZ" feature.  
Multi-DMZ  
This feature, if enabled, allows one (1) or more computers on your LAN to be exposed to all  
users on the Internet. You can set a DMZ PC for each WAN IP address. If you only have 1  
WAN IP addresses, only 1 DMZ PC can be used.  
This allows unrestricted 2-way communication between the "DMZ PC" and other Internet  
users or Servers.  
This allows almost any application to be used on the "DMZ PC".  
The "DMZ PC" will receive all "Unknown" connections and data.  
If the DMZ feature is enabled, you must select the PC to be used as the "DMZ PC".  
To use more than one (1) DMZ, your ISP must assign multiple fixed IP addresses to you.  
You must enter each IP address; you can then assign a DMZ PC for each IP address.  
The "DMZ PC" is effectively outside the Firewall, mak-  
ing it more vulnerable to attacks. For this reason, you  
should only enable the DMZ feature when required.  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
URL Filter  
The URL Filter allows you to block access to undesirable Web site  
To use this feature, you must define "filter strings". If the "filter string" appears in a  
requested URL, the request is blocked.  
Enabling the URL Filter also affects the Internet Access Log. If Enabled, the "Destination"  
field in the log will display the URL. Otherwise, it will display the IP Address.  
The URL Filter can be Enabled or Disabled on the Advanced Internet screen.  
URL Filter Screen  
Click the "Configure URL Filter" button on the Advanced Internet screen to access the URL  
Filter screen. An example screen is shown below.  
Figure 29: URL Filter Screen  
Data - URL Filter Screen  
Filter Strings  
This lists any existing entries. If you have not entered any values, this  
list will be empty.  
Current Entries  
To add an entry to the list, enter it here, and click the "Add" button.  
An entry may be a Domain name (e.g. www.trash.com) or simply a  
string. (e.g. ads/ )  
Add Filter String  
Any URL which contains ANY entry ANYWHERE in the URL will  
be blocked.  
Buttons  
Use these buttons to delete the selected entry or all entries, as required.  
Multiple entries can be selected by holding down the CTRL key while  
selecting. (On the Macintosh, hold the SHIFT key while selecting.)  
Delete/Delete All  
Use this to add the current Filter String to the site list.  
Add  
46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Internet Features  
Dynamic DNS (Domain Name Server)  
This free service is very useful when combined with the Virtual Server feature. It allows  
Internet users to connect to your Virtual Servers using a URL, rather than an IP Address.  
This also solves the problem of having a dynamic IP address. With a dynamic IP address, your  
IP address may change whenever you connect, which makes it difficult to connect to you.  
The Service works as follows:  
1. You must register for the service at one of the listed DDNS Service providers.  
2. After registration, follow the Service Provider's procedure to request a Domain Name, and  
have it allocated to you.  
3. Enter your DDNS data on the TW100-BRV204 's DDNS screen (shown below).  
4. The TW100-BRV204 will then automatically ensure that your current IP Address is  
recorded and updated at the DDNS server.  
If the DDNS Service provides software to perform this "IP address update"; you should  
disable the "Update" function, or not use the software at all.  
5. From the Internet, users will be able to connect to your Virtual Servers (or DMZ PC)  
using your Domain name, as shown on this screen.  
Dynamic DNS Screen  
Select Internet on the main menu, then Dynamic DNS, to see a screen like the following:  
Figure 30: DDNS Screen  
Data - Dynamic DNS Screen  
DDNS Service  
DDNS Service  
You must register for the service at one of the listed Service  
Providers. You can reach the Service provider's Web Site by se-  
lecting them in the list and clicking the "Web Site" button.  
Apply for a Domain Name, and ensure it is allocated to you.  
Details of your DDNS account (Name, password, Domain name)  
must then be entered and saved on this screen.  
This device will then automatically ensure that your current IP  
Address is recorded by the DDNS Service Provider. (You do  
47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
NOT need to use the "Client" program provided by some DDNS  
Service providers.)  
From the Internet, users will now be able to connect to your  
Virtual Servers (or DMZ PC) using your Domain name.  
DDNS Data  
Select the desired DDNS Service provider.  
Enter your Username for the DDNS Service.  
Enter your current password for the DDNS Service.  
DDNS Service  
User Name  
Password/Key  
Domain Name  
Enter the domain name allocated to you by the DDNS Service. If you  
have more than one name, enter the name you wish to use.  
This message is returned by the DDNS Server  
DDNS Status  
Normally, this message should be something like "Update  
successful" or "IP address updated".  
If the message indicates some problem, you need to connect to  
the DDNS Service provider and correct this problem.  
48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Internet Features  
Virtual Servers  
This feature allows you to make Servers on your LAN accessible to Internet users. Normally,  
Internet users would not be able to access a server on your LAN because:  
Your Server does not have a valid external IP Address.  
Attempts to connect to devices on your LAN are blocked by the firewall in this device.  
The "Virtual Server" feature solves these problems and allows Internet users to connect to your  
servers, as illustrated below.  
Figure 31: Virtual Servers  
IP Address seen by Internet Users  
Note that, in this illustration, both Internet users are connecting to the same IP Address, but  
using different protocols.  
To Internet users, all virtual Servers on your LAN have the same IP Address.  
This IP Address is allocated by your ISP.  
This address should be static, rather than dynamic, to make it easier for Internet users to  
connect to your Servers.  
However, you can use the DDNS (Dynamic DNS) feature to allow users to connect to your  
Virtual Servers using a URL, instead of an IP Address.  
Using the DMZ port for Virtual Servers  
You should connect your Virtual Servers to the DMZ port, for the following reasons:  
Traffic passing between the DMZ and LAN passes through the firewall. The firewall will  
protect your LAN if your Server is compromised and used to launch an attack on your  
LAN.  
49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
For each enabled Virtual Server, a firewall rule to allow incoming traffic from the Internet  
(WAN) to the DMZ is automatically created. If the Server is connected to the LAN (hub)  
ports, you must add the firewall rule manually.  
Note that the DMZ port is a normal port, not an "uplink" port. If connecting to a hub, connect  
to the standard port on the hub.  
Virtual Servers Screen  
The Virtual Servers screen is reached by the Virtual Servers link on the Internet menu. An  
example screen is shown below.  
Figure 32: Virtual Servers Screen  
This screen lists a number of pre-defined Servers, providing a quick and convenient method to  
set up the common server types.  
Data - Virtual Servers Screen  
Servers  
This lists a number of pre-defined Servers, plus any Servers you  
have defined. Details of the selected Server are shown in the  
"Properties" area.  
Servers  
Properties  
Use this to Enable or Disable support for this Server, as required.  
Enable  
If Enabled, any incoming connections will be forwarded to the  
selected PC.  
If Disabled, any incoming connection attempts will be blocked.  
Select the PC for this Server. The PC must be running the appro-  
priate Server software.  
PC (Server)  
Defining your own Virtual Servers  
If the type of Server you wish to use is not listed on the Virtual Servers screen, you can use the  
Firewall Rules to allow particular incoming traffic and forward it to a specified PC (Server).  
Connecting to the Virtual Servers  
Once configured, anyone on the Internet can connect to your Virtual Servers. They must use  
the Internet IP Address (the IP Address allocated to you by your ISP).  
e.g.  
50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Internet Features  
http://203.70.212.52  
ftp://203.70.212.52  
It is more convenient if you are using a Fixed IP Address from your ISP, rather than Dynamic.  
However, you can use the Dynamic DNS feature, described in the following section, to allow  
users to connect to your Virtual Servers using a URL, rather than an IP Address.  
Options  
This screen allows advanced users to enter or change a number of settings. For normal opera-  
tion, there is no need to use this screen or change any settings.  
Figure 33: Options Screen  
Data - Options Screen  
Backup DNS  
Enter the IP Address of the DNS (Domain Name Servers) here. These  
DNS will be used only if the primary DNS is unavailable.  
IP Address  
MTU  
MTU (Maximum Transmission Unit) value should only be changed if  
advised to do so by Technical Support.  
MTU size  
Enter a value between 1 and 1500.  
This device will still auto-negotiate with the remote server, to set  
the MTU size. The smaller of the 2 values (auto-negotiated, or en-  
tered here) will be used.  
For direct connections (not PPPoE or PPTP), the MTU used is  
always 1500.  
51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 7  
Security Configuration  
7
This Chapter explains the settings available via the security configuration  
section of the "Security" menu.  
Overview  
The following advanced configurations are provided.  
Admin Login  
Access Control  
Firewall Rules  
Logs  
E-mail  
Security Options  
Scheduling  
Services  
Admin Login  
The Admin Login screen allows you to assign a user name and password to the TW100-  
BRV204 .  
Figure 34: Admin Login Screen  
1. The default login name is "admin". Change this to the desired value.  
2. The default password is blank (no password). Enter the desired password in the New  
Password and Verify Password fields.  
3. Save your changes.  
You will see a login prompt when you connect to the TW100-BRV204 , as shown below.  
52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Figure 35: Password Dialog  
Enter the "User Name" and "Password" you set on the Admin Login screen above.  
53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Access Control  
This feature is accessed by the Access Control link on the Security menu.  
The Access Control feature allows administrators to restrict the level of Internet Access avail-  
able to PCs on your LAN. With the default settings, everyone has unrestricted Internet access.  
To use this feature:  
1. Set the desired restrictions on the "Default" group. All PCs are in the "Default" group  
unless explicitly moved to another group.  
2. Set the desired restrictions on the other groups ("Group 1", "Group 2", "Group 3" and  
"Group 4") as needed.  
3. Assign PC to the groups as required.  
Restrictions are imposed by blocking "Services", or types of  
connections. All common Services are pre-defined.  
If required, you can also define your own Services.  
Access Control Screen  
To view this screen, select the Access Control link on the Security menu.  
Figure 36: Access Control Screen  
Data - Access Control Screen  
Group  
Select the desired Group. The screen will update to display the  
settings for the selected Group. Groups are named "Default",  
"Group 1", "Group 2", "Group 3" and "Group 4", and cannot be re-  
named.  
Group  
54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Click this button to add or remove members from the current  
Group.  
"Members" Button  
If the current group is "Default", then members can not be  
added or deleted. This group contains PCs not allocated to any  
other group.  
To remove PCs from the Default Group, assign them to an-  
other Group.  
To assign PCs to the Default Group, delete them from the  
Group they are currently in.  
See the following section for details of the Group Members screen.  
Internet Access  
Select the desired options for the current group:  
Restrictions  
None - Nothing is blocked. Use this to create the least restric-  
tive group.  
Block all Internet access - All traffic via the WAN port is  
blocked. Use this to create the most restrictive group.  
Block selected Services - You can select which Services are to  
block. Use this to gain fine control over the Internet access for  
a group.  
If Internet access is being blocked, you can choose to apply the  
blocking only during scheduled times. (If access is not blocked, no  
Scheduling is possible, and this setting has no effect.)  
Block by Schedule  
Services  
To define the schedule, use the Schedule option on the menu.  
This lists all defined Services. Select the Services you wish to  
block. To select multiple services, hold the CTRL key while  
selecting. (On the Macintosh, hold the SHIFT key rather than  
CTRL.)  
Buttons  
Click this button to add or remove members from the current  
Group.  
Members  
If the current group is "Default", then members can not be added or  
deleted. This group contains PCs not allocated to any other group.  
See the following section for details of the Group Members screen.  
Save the data on screen.  
Save  
Reverse any changes made since the last "Save".  
Cancel  
View Log  
Click this to open a sub-window where you can view the "Access  
Control" log. This log shows attempted Internet accesses which  
have been blocked by the Access Control feature.  
Click this to clear and restart the "Access Control" log, making new  
entries easier to read.  
Clear Log  
55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Group Members Screen  
This screen is displayed when the Members button on the Access Control screen is clicked.  
Figure 37: Group Members  
Use this screen to add or remove members (PCs) from the current group.  
The "Del >>" button will remove the selected PC (in the Members list) from the current  
group.  
The "<< Add" button will add the selected PC (in the Other PCs list) to the current group.  
PCs not assigned to any group will be in the  
"Default" group.  
PCs deleted from any other Group will be added  
to the "Default" group.  
Access Control Log  
To check the operation of the Access Control feature, an Access Control Log is provided.  
Click the View Log button on the Access Control screen to view this log.  
This log shows attempted Internet accesses which have been blocked by the Access Control  
function.  
Data shown in this log is as follows:  
Date and Time of the attempted access.  
Date/Time  
Name  
If known, the name of the PC whose access was blocked. This  
name is taken from the Network Clients database  
The IP Address of the PC or device whose access request was  
blocked  
Source IP address  
MAC address  
Destination  
The hardware or physical address of the PC or device whose access  
request was blocked  
The destination URL or IP address  
56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Firewall Rules  
For normal operation and LAN protection, it is not necessary to use this screen.  
The Firewall will always block DoS (Denial of Service) attacks. A DoS attack does not attempt  
to steal data or damage your PCs, but overloads your Internet connection so you can not use it  
- the service is unavailable.  
As well, you can use this screen to create Firewall rules to block or allow specific traffic. But  
incorrect configuration may cause serious problems.  
This feature is for advanced administrators only!  
Firewall Rules Screen  
Click the Firewall Rules option on the Security menu to see a screen like the following exam-  
ple. This example contains two (2) rules for outgoing traffic.  
Since the default rule for outgoing (LAN => WAN) traffic is  
"Allow", having an "Allow" rule for LAN => WAN only makes  
sense in combination with another rule.  
For example, the screen below shows a rule blocking all traffic to  
a MSN Game Server, followed by another rule allowing access by  
a specific PC.  
Figure 38: Firewall Rules Screen  
Data - Firewall Rules Screen  
Rule List  
Select the desired option; the screen will update and list any current  
rules. If you have not defined any rules, the list will be empty.  
View Rules for ..  
57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
For each rule, the following data is shown:  
Data  
Name - The name you assigned to the rule.  
Source - The traffic covered by this rule, defined by the source IP  
address. If the IP address is followed by ... this indicates there is  
range of IP addresses, rather than a single address.  
Destination - The traffic covered by this rule, defined by destina-  
tion IP address. If the IP address is followed by ... this indicates  
there is range of IP addresses, rather than a single address.  
Action - Action will be "Forward" or "Block"  
To add a new rule, click the "Add" button, and complete the resulting  
screen. See the following section for more details.  
Add  
To Edit or modify an existing rule, select it and click the "Edit" button.  
Edit  
There are 2 ways to change the order of rules  
Move  
Use the up and down indicators on the right to move the selected  
rule. You must confirm your changes by clicking "OK". If you  
change your mind before clicking "OK", click "Cancel" to reverse  
your changes.  
Click "Move" to directly specify a new location for the selected  
rule.  
To delete an existing rule, select it and click the "Delete" button.  
Delete  
Clicking the "View Log" button will open a new window and display  
the Firewall log.  
View Log  
Clicking the "System Rules" button will open a new window and  
display the default firewall rules currently applied by the system. These  
rules cannot be edited, but any rules you create will take precedence  
over the default rules.  
System Rules  
58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Define Firewall Rule  
Clicking the "Add" button in the Firewall Rules screen will display a screen like the example  
below.  
Figure 39: Define Firewall Rule  
Data - Define Firewall Rule Screen  
Enter a suitable name for this rule.  
Name  
Type  
This determines the source and destination ports for traffic  
covered by this rule. Select the desired option.  
These settings determine which traffic, based on their source IP  
address, is covered by this rule.  
Source IP  
Select the desired option:  
Any - All traffic from the source port is covered by this rule.  
Single address - Enter the required IP address in the "Start IP  
address" field". You can ignore the "Subnet Mask" field.  
Range address - If this option is selected, you must complete  
both the "Start IP address" and "Finish IP address" fields.  
You can ignore the "Subnet Mask" field.  
Subnet address - If this option is selected, enter the required  
mask in the "Subnet Mask" field.  
59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
These settings determine which traffic, based on their destination  
IP address, is covered by this rule.  
Dest IP  
Select the desired option:  
Any - All traffic from the source port is covered by this rule.  
Single address - Enter the required IP address in the "Start IP  
address" field". You can ignore the "Subnet Mask" field.  
Range address - If this option is selected, you must complete  
both the "Start IP address" and "Finish IP address" fields.  
You can ignore the "Subnet Mask" field.  
Subnet address - If this option is selected, enter the required  
mask in the "Subnet Mask" field.  
Select the desired Service or Services. This determines which  
packets are covered by this rule, based on the protocol (TPC or  
UDP) and port number. If necessary, you can define a new  
Service on the "Services" screen, by defining the protocols and  
port numbers used by the Service.  
Services  
Select the desired action for packets covered by this rule:  
Action  
Log  
This determines whether packets covered by this rule are logged.  
Select the desired option.  
60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Logs  
The Logs record various types of activity on the TW100-BRV204 . This data is useful for  
troubleshooting, but enabling all logs will generate a large amount of data and adversely affect  
performance.  
Since only a limited amount of log data can be stored in the TW100-BRV204 , log data can  
also be E-mailed to your PC or sent to a Syslog Server.  
Figure 40: Logs Screen  
Data - Logs Screen  
Enable Logs  
Select the desired option:  
Incoming Traffic  
All IP traffic - this will log all incoming TCP/IP connections, of  
any type. This will generate the largest logs, and fill the internal  
log buffer more quickly.  
All TCP/UDP/ICMP traffic - These 3 protocols are used by most  
internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and  
other common Internet protocols and applications. UDP is used by  
Video streams and other communications where speed is more im-  
portant than guaranteed delivery. ICMP is used by the "ping" and  
"trace route" applications, and other network diagnostics.  
61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Select the desired option:  
Outgoing Traffic  
All IP traffic - - this will log all outgoing TCP/IP connections, of  
any type. This will generate the largest logs, and fill the internal  
log buffer more quickly.  
All TCP/UDP/ICMP traffic - These 3 protocols are used by most  
internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and  
other common Internet protocols and applications. UDP is used by  
Video streams and other communications where speed is more im-  
portant than guaranteed delivery. ICMP is used by the "ping" and  
"trace route" applications, and other network diagnostics.  
Because most connections are logged, the logs will still be large.  
Selected Traffic only - This selection will reduce the size of the  
log considerably. Only HTTP connections are logged. Select the  
traffic you wish to include:  
Attempted access to blocked sites - This will only log Web  
connections which are blocked by the URL filter.  
Websites and news groups - This logs successful (allowed)  
connections to Web Sites and newsgroup servers.  
Select the desired option:  
System Log  
Router operations (start up, get time etc) - This option will log  
normal Router operations.  
Connections to the Web - based interface of this Router - This  
option will log each connection to the Router itself, whenever the  
Web-based management interface is used.  
Other connections and traffic to this Router - This option will  
log other traffic sent to the Router itself, such as "pings" or RIP  
(Router Information Protocol) packets.  
Known DoS attacks and Port Scans - This will log details of  
DoS (Denial of Service) attacks which have been blocked by the  
built-in Firewall. This Firewall uses "Stateful Inspection" technol-  
ogy to block packets which are individually valid, but collectively  
form an attack. Port scans, where a series of ports are checked to  
see if they are open (available) are also logged.  
If enabled, the VPN log will record incoming and outgoing VPN  
connections.  
VPN  
Use this to view each log, as required.  
View Log Button  
Use this to restart the required log. This makes it easier to read the  
latest entries.  
Clear Log  
Button  
Timezone  
Select the correct Timezone for your location. This is required for the  
date/time shown on the logs to be correct.  
Timezone  
Syslog Server  
Enable Syslog  
Syslog Server  
Include  
If enabled, log data will be sent to your Syslog Server.  
Enter the IP address of your Syslog Server.  
Select the logs you wish to be included in the data sent to the Syslog  
Server.  
62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
E-mail  
Figure 41: E-Mail Screen  
Data – E-Mail Screen  
E-Mail Alerts  
If enabled, an E-mail will be sent immediately if a DoS (Denial of  
Service) attack is detected. If enabled, the E-mail address infor-  
mation must be provided.  
Send E-Mail alert  
E-Mail Logs  
If enabled, logs will be logs to the specified E-mail address. You  
need to select the Logs to be E-mailed, and complete the E-mail  
address settings on this screen.  
Send Logs by E-Mail  
Select the log items to be included in the E-mail.  
Include  
Send  
Select the desired option for sending the log by E-mail.  
When log is full - The time is not fixed. The log will be sent  
when the log is full, which will depend on the volume of traf-  
fic.  
Every day, Every Monday... - The log is sent on the inter-  
val specified.  
If "Every day" is selected, the log is sent at the time  
specified.  
If the day is specified, the log is sent once per week, on  
the specified day.  
Select the time of day you wish the E-mail to be sent.  
If the log is full before the time specified to send it, it  
will be sent regardless.  
Enter the E-mail address the Log is to be sent to. The E-mail will  
also show this address as the Sender's address.  
E-mail address  
63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Enter the text string to be shown in the "Subject" field for the E-  
mail.  
Subject  
Enter the address or address or IP address of the SMTP (Simple  
Mail Transport Protocol) Server you use for outgoing E-mail.  
SMTP Server  
Port No.  
Enter the port number used to connect to the SMTP Server. The  
default value is 25.  
64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Security Options  
This screen allows you to set Firewall and other security-related options.  
Figure 42: Security Options Screen  
Data - Security Options Screen  
Firewall  
If enabled, DoS (Denial of Service) attacks will be detected and  
blocked. The default is enabled. It is strongly recommended that this  
setting be left enabled.  
Enable DoS  
Firewall  
Note:  
A DoS attack does not attempt to steal data or damage your PCs,  
but overloads your Internet connection so you can not use it - the  
service is unavailable.  
This device uses "Stateful Inspection" technology. This system can  
detect situations where individual TCP/IP packets are valid, but  
collectively they become a DoS attack.  
This setting affects the number of "half-open" connections allowed.  
Threshold  
A "half-open" connection arises when a remote client contacts the  
Server with a connection request, but then does not reply to the  
Server's response.  
While the optimum number of "half-open" connections allowed  
(the "Threshold") depends on many factors, the most important  
factor is the available bandwidth of your Internet connection.  
Select the setting to match the bandwidth of your Internet connec-  
tion.  
65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Options  
The ICMP protocol is used by the "ping" and "trace route" programs,  
and by network monitoring and diagnostic programs.  
Respond to ICMP  
(ping)  
If checked, the TW100-BRV204 will respond to ICMP packets  
received from the Internet.  
If not checked, ICMP packets from the Internet will be ignored.  
Disabling this option provides a slight increase in security.  
If enabled, PCs on the LAN can use VPN software to connect to  
remote clients via the Internet connection. The protocols supported  
are:  
Allow VPN pass-  
through  
IPSec  
IPSec protocol is used to establish a secure connection, and is  
widely used by VPN (Virtual Private Networking) programs.  
PPTP  
PPTP (Point to Point Tunneling Protocol) is widely used by  
VPN (Virtual Private Networking) programs.  
L2TP  
L2TP is a protocol developed by Cisco for VPNs (Virtual Pri-  
vate Networks).  
If enabled, fragmented IP packets are discarded, forcing re-  
transmission of these packets. In some situations, this could prevent  
successful communication.  
Drop fragmented  
IP packets  
Normally, this setting should be disabled.  
A TCP flood is excessively large number of TCP connection re-  
quests. This is usually a DoS (Denial of Service) attack.  
Block TCP Flood  
Block UDP Flood  
This setting should normally be enabled.  
A UDP flood is excessively large number of UDP packets. This is  
usually a DoS (Denial of Service) attack.  
This setting should normally be enabled.  
Abnormal packets are often used by hackers and in DoS attacks, but  
may also be generated by incorrectly configured network devices.  
(PCs will normally not generate non-standard packets.)  
Block non-  
standard packets  
This setting should normally be enabled.  
66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Security Configuration  
Scheduling  
This schedule can be (optionally) applied to any Access Control Group.  
Blocking will be performed during the scheduled time (between the "Start" and "Finish"  
times.)  
Two (2) separate sessions or periods can be defined.  
Times must be entered using a 24 hr clock.  
If the time for a particular day is blank, no action will be performed.  
Define Schedule Screen  
This screen is accessed by the Scheduling link on the Security menu.  
Figure 43: Define Schedule Screen  
Data - Define Schedule Screen  
Each day of the week can scheduled independently.  
Day  
Two (2) separate sessions or periods can be defined. Session 2 can be  
left blank if not required.  
Session 1  
Session 2  
Enter the start using a 24 hr clock.  
Start Time  
Enter the finish time using a 24 hr clock.  
Finish Time  
67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Services  
Services are used in defining traffic to be blocked or allowed by the Access Control or Fire-  
wall Rules features. Many common Services are pre-defined, but you can also define your own  
services if required.  
To view the Services screen, select the Services link on the Security menu.  
Figure 44: Services Screen  
Data - Services Screen  
Available Services  
This lists all defined Services.  
Available Services  
Delete Button  
Use this to delete the selected Service from the list.  
Note that you can only delete Services you have added; the pre-  
defined services can not be deleted.  
Add New Service  
Name  
Enter a suitable name for this Service.  
Select the correct type for this Service.  
Type  
If the "Type" (above) is TCP, UDP, or TCP/UDP, enter the port  
number for this Service. If a port range is required, enter the begin-  
ning of the range here, and the end of the range in the "Finish Port"  
field.  
Start Port  
If the "Type" (above) is TCP, UDP, or TCP/UDP, this field can be  
used to enter the end of range of port numbers. This can be left blank  
if not required.  
Finish Port  
ICMP Type  
If the "Type" (above) is ICMP, enter the ICMP type here. Otherwise,  
this field should be left blank.  
68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 8  
VPN (IPSec)  
8
This Chapter describes the VPN capabilities and configuration required for  
common situations.  
Overview  
This section describes the VPN (Virtual Private Network) support provided by your TW100-  
BRV204 .  
A VPN (Virtual Private Network) provides a secure connection between 2 points, over an  
insecure network - typically the Internet. This secure connection is called a VPN Tunnel.  
There are many standards and protocols for VPNs. The standard implemented in the TW100-  
BRV204 is IPSec.  
IPSec  
IPSec is a near-ubiquitous VPN security standard, designed for use with TCP/IP networks. It  
works at the packet level, and authenticates and encrypts all packets traveling over the VPN  
Tunnel. Thus, it does not matter what applications are used on your PC. Any application can  
use the VPN like any other network connection.  
IPsec VPNs exchange information through logical connections called SAs (Security Associa-  
tions). An SA is simply a definition of the protocols, algorithms and keys used between the  
two VPN devices (endpoints).  
Each IPsec VPN has two SAs - one in each direction. If IKE (Internet Key Exchange) is used  
to generate and exchange keys, there are also SAs for the IKE connection as well as the IPsec  
connection.  
There are two security modes possible with IPSec:  
Transport Mode - the payload (data) part of the packet is encapsulated through encryp-  
tion but the IP header remains in the clear (unchanged).  
The TW100-BRV204 does NOT support Transport Mode.  
Tunnel Mode - everything is encapsulated, including the original IP header, and a new IP  
header is generated. Only the new header in the clear (i.e. not protected). This system pro-  
vides enhanced security.  
The TW100-BRV204 always uses Tunnel Mode.  
IKE  
IKE (Internet Key Exchange) is an optional, but widely used, component of IPsec. IKE pro-  
vides a method of negotiating and generating the keys and IDs required by IPSec. If using IKE,  
only a single key is required to be provided during configuration. Also, IKE supports using  
Certificates (provided by CAs - Certification Authorities) to authenticate the identify of the  
remote user or gateway.  
If IKE is NOT used, then all keys and IDs (SPIs) must be entered manually, and Certificates  
can NOT be used. This is called a "Manual Key Exchange".  
When using IKE, there are 2 phases to establishing the VPN tunnel:  
69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Phase I is the negotiation and establishment up of the IKE connection.  
Phase II is the negotiation and establishment up of the IPsec connection.  
Because the IKE and IPsec connections are separate, they have different SAs (security associa-  
tions).  
Policies  
VPN configuration settings are stored in Policies.  
Note that different vendors use different terms. Generally, the terms "VPN Policy", "IPSec  
Policy", and "IPSec Proposal" have the same meaning. However, some vendors separate IKE  
Policies (Phase 1 parameters) from IPSec Policies (Phase 2 parameters).  
For the TW100-BRV204 ; each VPN policy contains both Phase 1 and Phase 2 parameters (if  
IKE is used). Each policy defines:  
The address of the remote VPN endpoint  
The traffic which is allowed to use the VPN connection.  
The parameters (settings) for the IPsec SA (Security Association)  
If IKE is used, the parameters (settings) for the IKE SA (Security Association)  
Generally, you will need at least one (1) VPN Policy for each remote site for which you wish  
to establish VPN connections.  
It is possible, and sometimes necessary, to have multiple Policies for the same remote site.  
However, you should only Enable one (1) policy at a time. If multiple policies for the same  
remote site are enabled, the policies are examined in the order in which they are listed, and the  
first matching policy will be used. While it is possible to change the order of the policies, it  
may not be easy to get the desired action from multiple policies.  
VPN Configuration  
The general rule is that each endpoint must have matching Policies, as follows:  
Each VPN endpoint must be configured to initiate or accept connec-  
tions to the remote VPN client or Gateway.  
VPN Endpoint  
address  
Usually, this requires having a fixed Internet IP address. However, it is  
possible for a VPN Gateway to accept incoming connections from a  
remote client where the client's IP address is not known in advance.  
This determines which outgoing traffic will cause a VPN connection  
to be established, and which incoming traffic will be accepted. Each  
endpoint must be configured to pass and accept the desired traffic  
from the remote endpoint.  
Traffic Selector  
If connecting 2 LANs, this requires that:  
Each endpoint must be aware of the IP addresses used on the  
other endpoint.  
The 2 LANs MUST use different IP address ranges.  
If using IKE (recommended), the IKE parameters must match (except  
for the SA lifetime, which can be different).  
IKE parameters  
IPsec parameters  
The IPsec parameters at each endpoint must match.  
70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Common VPN Situations  
VPN Pass-through  
Figure 45: VPN Pass-through  
Here, a PC on the LAN behind the Router/Gateway is using VPN software, but the  
Router/Gateway is NOT acting as a VPN endpoint. It is only allowing the VPN connection.  
The PC software can use any VPN protocol supported by the remote VPN.  
The remote VPN Server must support client PCs which are behind a NAT router, and so  
have an IP address which is not valid on the Internet.  
The Router/Gateway requires no VPN configuration, since it is not acting as a VPN  
endpoint.  
Client PC to VPN Gateway  
Figure 46: Client PC to VPN Server  
In this situation, the PC must run appropriate VPN client software in order to connect, via the  
Internet, to the TW100-BRV204 . Once connected, the client PC has the same access to LAN  
resources as PCs on the local LAN (unless restricted by the network administrator).  
IPsec is not the only protocol which can be used in this situation, but the TW100-BRV204  
supports IPsec ONLY.  
Windows 2000 and Windows XP include a suitable IPsec VPN client program. Configura-  
tion of this client program for use with the TW100-BRV204 is covered later in this  
document.  
71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Connecting 2 LANs via VPN  
Figure 47: Connecting 2 VPN Gateways  
This allows two (2) LANs to be connected. PCs on each endpoint gain secure access to the  
remote LAN.  
The 2 LANs MUST use different IP address ranges.  
The VPN Policies at each end determine when a VPN tunnel will be established, and what  
systems on the remote LAN can be accessed once the VPN connection is established.  
It is possible to have simultaneous VPN connections to many remote sites.  
72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
VPN Configuration  
This section covers the configuration required on the TW100-BRV204 when using Manual  
Key Exchange (Manual Policies) or IKE (Automatic Policies).  
Details of using Certificates are covered in a later section.  
VPN Policies Screen  
To view this screen, select VPN Policies from the VPN menu. This screen lists all existing  
VPN policies. If no policies exist, the list will be empty.  
Figure 48: VPN Policies Screen  
Note that the order of policies is important if you have more than one policy for a particular  
site. In that case, the first matching policy (for the traffic under consideration) will be used.  
Data - VPN Policies Screen  
VPN List  
The name of the policy. When creating a policy, you should select a  
suitable name.  
Policy Name  
This indicates whether or not the policy is currently enabled. Use the  
"Enable/Disable" button to toggle the state of the selected policy.  
Enable  
The IP address of the remote VPN endpoint (Gateway or client).  
Remote VPN  
Endpoint  
This will indicate "Manual" (manual key exchange) or "IKE" (Internet  
Key Exchange)  
Key Type  
Operations  
To add a new policy, click the "Add" button. See the following section  
for details.  
Add  
To Edit or modify an existing policy, select it and click the "Edit"  
button.  
Edit  
73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
The order in which policies are listed is only important if you have  
Move  
multiple polices for the same remote site. In that case, the first matching  
policy is used. There are 2 ways to change the order of policies:  
Use the up and down indicators on the right to move the selected  
row. You must confirm your changes by clicking "OK". If you  
change your mind before clicking "OK", click "Cancel" to reverse  
your changes.  
Click "Move" to directly specify a new location for the selected  
policy.  
Use this to toggle the On/Off state of the selected policy.  
Enable/Disable  
Copy  
If you wish to create a policy which is similar to an existing policy,  
select the policy and click the "Copy" button.  
Remember that the new policy must have a different name, and there can  
only be one active (enabled) policy for each remote VPN endpoint.  
To delete an exiting policy, select it and click the "Delete" button.  
Delete  
Clicking the "View Log" button will open a new window and display the  
VPN log.  
View Log  
Adding a New Policy  
1. To create a new VPN Policy, click the Add New Policy button on the VPN Policies screen.  
This will start the VPN Wizard, as shown below.  
Figure 49: VPN Wizard – Start Screen  
If you prefer to use a single setup screen instead of a Wizard, click the Setup Screen  
button. This is recommended for experienced users only.  
Otherwise, click Next to continue. You will see a screen like the following.  
74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 50: VPN Wizard – General Screen  
General Settings  
Enter a suitable name. This name is not supplied to the remote VPN. It is  
used only to help you manage the policies.  
Policy Name  
Enable or disable the policy as required. For each remote VPN, only 1  
policy can be enabled at any time.  
Enable Policy  
Enable this if you require NetBIOS traffic to be transferred through the  
VPN tunnel. NetBIOS is used by Microsoft (Windows) networking. This  
setting should not be enabled unless necessary, because it increases  
traffic volume.  
Allow NetBIOS  
traffic  
The Internet IP address of the remote VPN endpoint (Gateway or client).  
Remote VPN  
Endpoint  
Dynamic. Select this if the Internet IP address is unknown. In this  
case, only incoming connections are possible.  
Fixed. Select this if the remote endpoint has a fixed Internet IP  
address. If selected, enter the Internet IP address of the remote end-  
point.  
Domain Name. Select this if the remote endpoint has a Domain  
Name associated with it. If selected, enter the Domain Name of the  
remote endpoint.  
Select Manually assigned or IKE (Internet Key Exchange) as required.  
Keys  
If you are setting up both endpoints, using IKE is recommended.  
2. Click Next to continue. You will see a screen like the following:  
75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 51: VPN Wizard - Traffic Selector Screen  
For outgoing VPN connections, these settings determine which traffic will cause a VPN  
tunnel to be created, and which traffic will be sent through the tunnel.  
For incoming VPN connections, these settings determine which systems on your local  
LAN will be available to the remote endpoint.  
The 2 VPN endpoints MUST use different address ranges.  
If the addresses were in the same range, traffic intended for the remote VPN would be  
considered local LAN traffic. So it would not be forwarded to the Gateway.  
Local IP addresses  
Any - no additional data is required. Any IP address is accept-  
able.  
Type  
For outgoing connections, this allows any PC on the LAN to  
use the VPN tunnel.  
For incoming connections, this allows any PC using the re-  
mote endpoint to access any PC on your LAN.  
Single address - enter an IP address in the "Start IP address"  
field.  
Range address - enter the starting IP address in the "Start IP  
address" field, and the finish IP address in the "Finish IP ad-  
dress" field.  
Subnet address - enter the desired IP address in the "Start IP  
address" field, and the network mask in the "Subnet Mask" field.  
The remote VPN must have these IP addresses entered as it's "Re-  
mote" addresses.  
76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Remote IP addresses  
Single address - enter an IP address in the "Start IP address"  
field.  
Type  
Range address - enter the starting IP address in the "Start IP  
address" field, and the finish IP address in the "Finish IP ad-  
dress" field.  
Subnet address - enter the desired IP address in the "Start IP  
address" field, and the network mask in the "Subnet Mask" field.  
The remote VPN should have these IP addresses entered as it's  
"Local" addresses.  
3. Click Next to continue. The screen you will see depends on whether you previously  
selected "Manual Key Exchange" or "IKE".  
Manual Key Exchange  
Figure 52: VPN Wizard - Manual Key Exchange Screen  
These settings must match the remote VPN. Note that you cannot use both AH and ESP.  
Manually assigned Keys  
AH (Authentication Header) specifies the authentication protocol  
for the VPN header, if used. (AH is often NOT used)  
AH Authentication  
If AH is not enabled, the following settings can be ignored.  
Keys  
The "in" key here must match the "out" key on the remote  
VPN, and the "out" key here must match the "in" key on the  
remote VPN.  
Keys can be in ASCII or Hex (0..9 A..F)  
For MD5, the keys should be 32 hex/16 ASCII characters.  
77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
For SHA-1, the keys should be 40 hex/20 ASCII characters.  
Each SPI (Security Parameter Index) must be unique.  
SPI  
The "in" SPI here must match the "out" SPI on the remote  
VPN, and the "out" SPI here must match the "in" SPI on the  
remote VPN.  
Each SPI should be at least 3 characters.  
ESP (Encapsulating Security Payload) provides security for the  
payload (data) sent through the VPN tunnel. Generally, you will  
want to enable both Encryption and Authentication.  
ESP Encryption  
Encryption Algorithm  
The 3DES algorithm provides greater security than DES, but is  
slower.  
If using AES, you must select the Key Size. If using DES or  
3DES, this field is ignored.  
Key - In / Key - Out  
The "In" key here must match the "Out" key on the remote  
VPN, and the "Out" key here must match the "In" key on the  
remote VPN.  
For DES, keys should be 8 ASCII characters (16 HEX chars).  
For 3DES, keys should be 24 ASCII characters (48 HEX  
chars).  
If using AES encryption, the key input size must match the  
Key Size selected above.  
Generally, you should enable ESP Authentication. There is little  
difference between the available algorithms. Just ensure each  
endpoint use the same setting.  
ESP Authentication  
The "In" key here must match the "Out" key on the remote  
VPN, and the "Out" key here must match the "In" key on the  
remote VPN.  
Keys can be in ASCII or Hex (0 ~ 9 and A ~ F)  
For MD5, the keys should be 32 hex/16 ASCII characters.  
For SHA-1, the keys should be 40 hex/20 ASCII characters.  
ESP SPI  
This is required if either ESP Encryption or ESP Authentica-  
tion is enabled.  
Each SPI (Security Parameter Index) must be unique.  
The "in" SPI here must match the "out" SPI on the remote  
VPN, and the "out" SPI here must match the "in" SPI on the  
remote VPN.  
Each SPI should be at least 3 characters.  
For Manual Key Exchange, configuration is now complete.  
Click "Next" to view the final screen.  
On the final screen, click "Finish" to save your settings, then "Close" to exit the Wizard.  
78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
IKE Phase 1  
If you selected IKE, the following screen is displayed after the Traffic Selector screen. This  
screen sets the parameters for the IKE SA.  
Figure 53: VPN Wizard - IKE Phase 1 Screen  
IKE Phase 1 (IKE SA)  
This setting must match the "Remote Identity" on the remote VPN.  
Select the desired option, and enter the required data in the "Local  
Identity Data" field.  
Local Identity  
WAN IP Address - This is the most common method. If se-  
lected, no input is required.  
Fully Qualified Domain Name - enter the Domain Name  
assigned to this device.  
Fully Qualified User name - This name does not have to a valid  
Internet Domain Name. E-mail addresses are often used for this  
entry.  
DER ANS.1 DN - This must be a DER ANS.1 Domain Name.  
This setting must match the "Local Identity" on the remote VPN.  
Select the desired option, and enter the required data in the "Remote  
Identity Data" field.  
Remote Identity  
IP Address - This is the most common method. If selected, no  
input is required.  
Fully Qualified Domain Name - enter the Domain Name  
assigned to this device.  
Fully Qualified User name - This name does not have to a valid  
Internet Domain Name. E-mail addresses are often used for this  
entry.  
DER ANS.1 DN - This must be a DER ANS.1 Domain Name.  
79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
RSA Signature requires that both VPN endpoints have valid  
Certificates issued by a CA (Certification Authority).  
Authentication  
For Pre-shared key, enter the same key value in both endpoints.  
The key should be at least 8 characters (maximum is 128 charac-  
ters). Note that this key is used for the IKE SA only. The keys  
used for the IPsec SA are automatically generated.  
Select the desired option, and ensure that both endpoints have the  
same settings.  
Authentication  
Algorithm  
Select the desired method, and ensure the remote VPN endpoint uses  
the same method.  
Encryption  
Algorithm  
The 3DES algorithm provides greater security than DES, but is  
slower.  
If using AES, you must select the Key Size. If using DES or  
3DES, this field is ignored.  
Select the desired option, and ensure the remote VPN endpoint uses  
the same mode.  
IKE Exchange  
Mode  
Main Mode provides identity protection for the hosts initiating  
the IPSec session, but takes slightly longer to complete.  
Aggressive Mode provides no identity protection, but is quicker.  
Select the desired option:  
Direction  
Initiator - Only outgoing connections will be created. Incoming  
connection attempts will be rejected.  
Responder - Only incoming connections will be accepted.  
Outgoing traffic which would otherwise result in a connection  
will be ignored.  
Both Directions - Both incoming and outgoing connections are  
allowed.  
This setting does not have to match the remote VPN endpoint; the  
shorter time will be used. Although measured in seconds, it is com-  
mon to use time periods of several hours, such 28,800 seconds.  
IKE SA Life Time  
Select the desired method, and ensure the remote VPN endpoint uses  
the same method. The smaller bit size is slightly faster.  
DH Group  
IKE PFS  
If enabled, PFS (Perfect Forward Security) enhances security by  
changing the IPsec key at regular intervals, and ensuring that each  
key has no relationship to the previous key. Thus, breaking 1 key  
will not assist in breaking the next key.  
This setting should match the remote endpoint.  
IKE Keep Alive  
Click Next to see the following IKE Phase 2 screen.  
80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
IKE Phase 2 Screen  
This screen sets the parameters for the IPSec SA. When using IKE, there are separate connec-  
tions (SAs) for IKE and IPSec.  
Figure 54: VPN Wizard - IKE Phase 2 Screen  
IKE Phase 2 (IPsec SA)  
This setting does not have to match the remote VPN endpoint; the  
shorter time will be used. Although measured in seconds, it is  
common to use time periods of several hours, such 28,800 seconds.  
IPsec SA Life Time  
If enabled, PFS (Perfect Forward Security) enhances security by  
changing the IPsec key at regular intervals, and ensuring that each  
key has no relationship to the previous key. Thus, breaking 1 key  
will not assist in breaking the next key.  
IPSec PFS  
AH (Authentication Header) specifies the authentication protocol  
for the VPN header, if used.  
AH Authentication  
ESP Encryption  
AH is often NOT used. If you do enable it, ensure the algorithm  
selected matches the other VPN endpoint.  
ESP (Encapsulating Security Payload) provides security for the  
payload (data) sent through the VPN tunnel. Generally, you will  
want to enable both ESP Encryption and ESP Authentication.  
Select the desired method, and ensure the remote VPN endpoint  
uses the same method.  
The 3DES algorithm provides greater security than DES, but is  
slower.  
If using AES, you must select the Key Size. If using DES or  
3DES, this field is ignored.  
Generally, you should enable ESP Authentication. There is little  
difference between the available algorithms. Just ensure each  
endpoint use the same setting.  
ESP Authentication  
81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
For IKE, configuration is now complete.  
Click "Next" to view the final screen.  
Figure 55: VPN Wizard - Final Screen  
On the final screen, click "Finish" to save your settings, then "Close" to exit the Wizard.  
82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
VPN Examples  
This section describes some examples of using the TW100-BRV204 in common VPN situa-  
tions.  
Example 1: Connecting 2 TW100-BRV204 s  
In this example, 2 LANs are connected via VPN.  
Figure 56: Connecting 2 TW100-BRV204 s  
Note  
The LANs MUST use different IP address ranges.  
Both endpoints have fixed WAN (Internet) IP addresses.  
Configuration Settings  
Setting  
LAN A Gate-  
way  
LAN B Gate-  
way  
Notes  
Name  
Policy 1  
Policy 1  
Name does not affect  
operation. Select a mean-  
ingful name.  
Remote Endpoint  
205.17.11.43  
Any  
202.11.13.211  
Any  
Other endpoint's WAN  
(Internet) IP address.  
Local  
IP addresses  
Use a more restrictive  
definition if possible.  
Remote  
IP addresses  
192.168.1.1 to  
192.168.1.254  
192.168.0.1 to  
192.168.0.254  
Address range on other  
endpoint.  
Use a more restrictive  
definition if possible.  
Key Exchange  
IKE  
IKE  
Must match  
IKE SA Parameters  
IKE Direction  
Both ways  
Both ways  
Does not have to match.  
Either endpoint can block  
1 direction.  
Local Identity  
IP address  
IP address  
IP address  
IP address  
IP address is the most  
common ID method  
Remote Identity  
IP address is the most  
common ID method  
83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
IKE Authentication Pre-shared Key  
method  
Pre-shared Key  
Certificates are not widely  
used.  
Pre-shared Key  
Xxxxxxxxxx  
Xxxxxxxxxx  
MD5  
Must match  
Must match  
IKE Authentication MD5  
algorithm  
IKE Encryption  
DES  
DES  
Must match  
Must match  
IKE Exchange  
mode  
Main Mode  
Main Mode  
DH Group  
Group 1 (768 bit) Group 1 (768 bit) Must match  
IKE SA Life time  
28800  
28800  
Does not have to match.  
Shorter period will be  
used.  
IKE PFS  
Disable  
Disable  
28800  
Must match  
IPSec SA Parameters  
IPSec SA Life time 28800  
Does not have to match.  
Shorter period will be  
used.  
IPSec PFS  
Disabled  
Disabled  
Must match  
AH authentication  
ESP authentication  
ESP encryption  
Disabled  
Disabled  
AH is rarely used  
Must match  
Enable/MD5  
Enable/DES  
Enable/MD5  
Enable/DES  
Must match  
84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Example 2: Windows 2000/XP Client to LAN  
In this example, a Windows 2000/XP client connects to the TW100-BRV204 and gains access  
to the local LAN.  
Figure 57: Windows 2000/XP Client to TW100-BRV204  
To use 3DES encryption on Windows 2000, you  
need Service Pack 3 or later installed.  
TW100-BRV204 Configuration  
Setting  
Value  
Notes  
Name  
Win Client  
Name does not affect operation. Select a  
meaningful name.  
Remote Endpoint  
172.16.9.10  
Other endpoint's WAN (Internet) IP address.  
Local  
IP addresses  
Subnet address:  
192.168.0.0  
Allows access to entire LAN. Use a more  
restrictive definition if possible.  
255.255.255.0  
Remote  
IP addresses  
172.16.9.10  
IKE  
For a single client, this address is the same as  
the endpoint address.  
Key Exchange  
Must match client PC  
IKE SA Parameters  
IKE Direction  
Both ways  
IP address  
IP address  
Using "Responder only" is not possible.  
Required.  
Local Identity  
Remote Identity  
Required  
IKE Authentication Pre-shared Key  
method  
Certificates are not widely used.  
Pre-shared Key  
Xxxxxxxxxx  
Must match client PC  
Must match client PC  
IKE Authentication SHA-1  
algorithm  
IKE Encryption  
3DES  
Must match client PC  
IKE Exchange  
mode  
Main Mode  
Windows 2000 only supports Main Mode.  
85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
DH Group  
Group 1 (768 bit)  
Must match client PC  
IKE SA Life time  
28800  
Does not have to match client PC. Shorter  
period will be used.  
IKE PFS  
Disable  
Must match client PC  
IPSec SA Parameters  
IPSec SA Life time 28800  
Do not have to match. Shorter period will be  
used.  
IPSec PFS  
Disable  
Must match client PC  
AH is rarely used  
AH authentication  
ESP authentication  
ESP encryption  
Disabled  
Enable/MD5  
Enable/DES  
Must match client PC  
Must match client PC  
Windows Client Configuration  
1. Select Start - Programs - Administrative Tools - Local Security Policy.  
2. Right click IP Security Policy on Local Machine and select Create IP Security Policy  
Figure 58: Windows 2000/XP - Local Security Settings  
3. Click "Next", then enter a policy name, for example "DUT To Win2K", then click "Next".  
4. Step through the Wizard:  
Deselect Activate the default response rule. Click "Next",  
Leave Edit Properties checked. Click "Finish".  
5. The following "Properties - Rules" screen will be displayed.  
86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 59: Windows 2000/XP - Policy Properties  
Note that no rules are in use. Two (2) rules are required - incoming and outgoing.  
The outgoing rule will be added first.  
6. Deselect the "Use Add Wizard" checkbox, then click "Add" to view the screen below.  
Figure 60: IP Filter List  
7. Type "To DUT" for the name, then click "Add" to see a screen like the following.  
87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 61: Filter Properties: Addressing  
8. Enter the Source IP address and the Destination IP address.  
Since this is the outgoing filter, the Source IP address is "My IP address" and the  
Destination IP address is the address range used on the remote LAN.  
Ensure the Mirrored option is checked.  
9. Click "OK" to save your settings and close this dialog.  
Figure 62: New Rule Properties: IP Filter List  
10. On the resulting screen (above), ensure the "To DUT" filter is selected, then click the  
Filter Action tab to see a screen like the following  
88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 63: New Rule Properties: Filter Action  
11. Select Require Security, then click the "Edit" button, to view the Require Security Proper-  
ties screen.  
Figure 64: Require Security Properties  
12. Select Negotiate security (this selects IKE), then click "Add".  
89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 65: Modify Security Method  
13. On the resulting screen (above), select High [ESP] then click "OK" to save your changes  
and return to the Require Security Properties screen.  
Figure 66: Require Security Properties  
14. Ensure the following settings are correct, then click "OK" to return to the Filter Action tab  
of the Edit Rule Properties screen.  
VPN Setting  
Windows Setting  
IKE enabled  
Negotiate security  
AH disabled  
AH Integrity: <None>  
ESP Confidentially: DES  
ESP Integrity: MD5  
ESP encryption: Enable/DES  
ESP authentication: Enable/MD5  
90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
15. Click the Tunnel Setting tab, then select The tunnel endpoint is specified by this IP address.  
Enter the WAN (Internet) IP address of the TW100-BRV204 , as shown below.  
Figure 67: Tunnel Setting  
16. Click the Authentication Methods tab, then click the "Edit" to see the screen like the  
example below.  
Figure 68: Authentication Method  
17. Select Use this string to protect the key exchange (preshared key), then enter your pre-  
shared key in the field provided.  
18. Click "OK" to save your changes and return to the Authentication Methods tab of the Edit  
Rule Properties screen.  
19. Click "Close" to return to the DUT to Win2K properties screen. The "To DUT" filter  
should now be listed, as shown below.  
91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 69: Windows 2000/XP Client to TW100-BRV204  
20. To add the second (incoming) rule, click "Add". For the name, enter "To Win2K", then  
click "Add".  
Figure 70: Windows 2000/XP Client to TW100-BRV204  
21. Enter the Source IP address and the Destination IP address as shown below.  
Since this is the incoming filter, the Source IP address is the address range used on  
the remote LAN and the Destination IP address is "My IP address".  
Ensure the Mirrored option is checked.  
92  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 71: Filter Properties: Addressing  
22. Click "OK" to save your changes, then "Close".  
Figure 72: Filter List  
23. Ensure the "To Win2K" filter is selected, then click the Filter Action tab.  
93  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 73: Filter Action  
24. Select Require Security, then click "Edit". On the Require Security Methods screen below,  
select Negotiate security.  
Figure 74: Security Methods  
25. Click the "Add" button. On the resulting Modify Security Method screen below, select  
High [ESP].  
94  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 75: Modify Security Method  
26. Click "OK" to save your changes, then click "OK" again to return to the Filter Action  
screen.  
27. Select the Tunnel Setting tab, and enter the WAN (Internet) IP address of this PC  
(172.16.9.10 in this example).  
Figure 76: Tunnel Setting  
28. Select the Authentication Methods tab, and click the "Edit" button to see the screen below.  
95  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 77: Authentication Method  
29. Select Use this string to protect the key exchange (preshared key), then enter your pre-  
shared key in the field provided.  
30. Click "OK" to save your settings, then "Close" to return to the DUT to Win2K Properties  
screen. There should now be 2 IP Filers listed, as shown below.  
Figure 78: DUT to Win2K Properties  
31. Select the General tab.  
96  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 79: Properties - General Tab  
32. Click the "Advanced" button to see the screen below.  
Figure 80: Key Exchange Settings  
33. Click the "Methods" button to see the screen below.  
97  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 81: Key Exchange Security Methods  
34. Select the first entry, and click the "Edit" button to see the following screen.  
Figure 82: IKE Security Algorithms  
35. Select "SHA1" for Integrity Algorithm, "3DES" for Encryption algorithm, and "Low(1)"  
for the Diffie-Hellman Group.  
36. Click "OK" to save, then "OK" again, and then "Close" to return to the Local Security  
Settings screen.  
37. Right click the DUT to Win2K Policy and select "Assign" to make your policy active.  
Figure 83: Windows 2000/XP Client to TW100-BRV204  
Configuration is now complete.  
98  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Example 3: Windows 2000 Server to VPN Gateway  
In this example, a Windows 2000 Server connects to the TW100-BRV204 . Users on each  
LAN can then gain access to the remote LAN.  
Figure 84: TW100-BRV204 to Windows 2000 Server  
TW100-BRV204 Configuration  
This is the same as for the client setup earlier, with the exception of the IP address range for  
the remote endpoint.  
Setting  
Single Client  
Server/Gateway  
Remote  
IP addresses  
172.16.9.10  
Subnet address:  
11.5.0.0  
255.255.0.0  
For a single client, this is the  
same as the Gateway address  
Address range used on the remote LAN.  
99  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Windows 2000 Server Configuration  
Configuration is the same as for Example 2: Windows 2000/XP Client to except for specify-  
ing the Source and Destination addresses for the "Filter Properties". Instead, for both IP Filters,  
the Filter Properties- Addressing should be completed as follows.  
Figure 85: Windows 2000 Server - Addressing  
The Source Address should be set to "A specific IP Subnet", and the IP address and  
Subnet mask set to the address range used on the TW100-BRV204 's LAN.  
The Destination Address should be set to "A specific IP Subnet", and the IP address and  
Subnet mask set to the address range used on the Windows 2000 LAN.  
100  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Certificates  
Certificates are used to authenticate users. Certificates are issued to you by various CAs  
(Certification Authorities). These Certificates are called "Self Certificates".  
Each CA also issues a certificate to itself. This Certificate is required in order to validate  
communication with the CA. These certificates are called "Trusted Certificates."  
The Certificates screen lists either the Trusted Certificates - the certificates of each CA itself  
- or Self Certificates - the certificates issued to you.  
Use the radio button in the Type section of the screen to choose which type of Certificate you  
wish to view.  
Trusted Certificates  
Figure 86: Trusted Certificates Screen  
Data – Trusted Certificates Screen  
Trusted Certificates  
The "Subject Name" is always the company or person to whom the  
Certificate is issued. For trusted certificates, this will be a CA.  
Subject Name  
(CA)  
The CA (Certification Authority) which issued the Certificate.  
Issuer Name  
Expiry Time  
The date on which the Certificate expires. You should renew the  
Certificate before it expires.  
Use this button to delete a Trusted Certificate. Select the checkbox in  
the Delete column for any Certificates you wish to delete, then click  
the "Delete" button.  
Delete button  
Use this to add a new Trusted Certificate to the table. See below for  
details.  
Add Trusted  
Certificate button  
Requesting a Trusted Certificate  
1. After obtaining a new Certificate from the CA, you need to upload it to the TW100-  
BRV204 .  
2. On the "Certificates" screen, click the "Add Trusted Certificate" button to view the Add  
Trusted Certificate screen, shown below.  
101  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 87: Add Trusted Certificate  
3. Click the "Browse" button, and locate the certificate file on your PC  
4. Select the file. The name will appear in the "Certificate File" field.  
5. Click "Upload" to upload the certificate file to the TW100-BRV204 .  
6. Click "Back" to return to the Trusted Certificate list. The new Certificate will appear in the  
list.  
Self Certificates  
Figure 88: Self Certificates Screen  
Data – Self Certificates Screen  
Active Self Certificates  
The name you assigned to this Certificate. You should select a name  
which helps to identify this particular certificate.  
Name  
The company or person to whom the Certificate is issued.  
The CA (Certification Authority) which issued the Certificate.  
Subject Name  
Issuer Name  
Expiry Time  
The date on which the Certificate expires. You should renew the  
Certificate before it expires.  
102  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Use this button to delete a Self Certificate. Select the checkbox in the  
Delete column for any Certificates you wish to delete, then click the  
"Delete" button.  
Delete button  
Self Certificate Requests  
Any current requests are listed. These requests are generated by  
using the New Request button described below.  
Request List  
After you have received the Certificate file for a request, you  
must select the request in the list, and upload the certificate file.  
The request will then be deleted from this list, and the Certificate  
will appear in the Active Self Certificates table.  
If for some reason you never obtain the Certificate, you can  
manually delete the request by using the Delete Request button.  
Use this to delete the selected certificate request.  
Delete Request  
Button  
After you have received a Certificate, use this to upload the certifi-  
cate to the Broadband VPN Router.  
Upload Certificate  
You must select the correct certificate request, so the Broadband  
VPN Router can correctly match the request and the certificate.  
Use this to generate a new request to be supplied to a CA (Certifica-  
tion Authority). See the following section for details.  
New Request  
Button  
Requesting a Self Certificate  
The TW100-BRV204 must generate a request for the CA. This request must then be supplied  
to the CA. The procedure is as follows:  
1. On the Self Certificates screen, click the New Request button to view the first screen of the  
Self Certificate Request procedure, shown below.  
Figure 89: Self Certificate Request (1)  
2. Complete this screen.  
103  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Enter a name which helps to identify this particular certifi-  
cate. This name is only for your reference, it is not visible to  
other people.  
Name  
This is the name which other organizations will see as the  
Holder (owner) of this Certificate. This should be your  
registered business name or official company name. Gener-  
ally, all Certificates should have the same value in the  
Subject field.  
Subject Name  
Select the desired option.  
Hash Algorithm  
Select the desired option. RSA is recommended.  
Signature Algorithm  
Signature Key Length  
Select the desired option. Normally, 1024 bits provides  
adequate security.  
Enter your public (Internet) IP address.  
IP address  
This is optional. If you have a domain name, enter it here.  
Domain Name  
E-mail Address  
This is optional. If you have permanent E-mail address,  
enter it here.  
3. Click "Next" to continue to the following screen.  
Figure 90: Self Certificate Request (2)  
4. Check that the data displayed in the Certificate Details section is correct. This data is used  
to generate the Certificate request. If the data is not correct, click the "Back" button and  
correct the previous screen.  
5. If the data is correct, copy the text in the Data to supply to CA panel  
(including "-----BEGIN CERTIFICATE REQUEST-----"  
and "-----END CERTIFICATE REQUEST-----") to a new document in a text editor such as  
Notepad, and save the file.  
6. Click Finish to return to the Self Certificates screen.  
Your request will be listed under Self Certificate Requests.  
7. Apply for a Certificate:  
Connect to the CA's web site.  
104  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Start the Self Certificate request procedure.  
When prompted for the request data, supply the data you copied and saved in step 5  
above.  
Submit the CA's form.  
If there are no problems, the Certificate will then be issued.  
8. After obtaining a new Certificate, as described above, you need to upload it the TW100-  
BRV204 .  
Return to the Self Certificates screen.  
In the Self Certificate Requests list, select the request matching this certificate.  
Click the Upload Certificate button.  
You will see a screen like the one below.  
Figure 91: Upload Self Certificate  
9. Upload the Certificate:  
Click the Browse button, and locate the certificate file on your PC  
Select the file. The name will appear in the Certificate File field.  
Click the Upload button to upload the certificate file to the TW100-BRV204 .  
Click Back to return to the Self Certificates screen.. The new Certificate will appear  
in the Active Self Certificates list.  
CRLs  
CRLs are only necessary if using Certificates.  
CRL (Certificate Revocation List) files show Certificates which have been revoked, and are no  
longer valid. Each CA issues their own CRLs.  
It is VERY IMPORTANT to keep your CRLs up-to-date. You need to obtain the CRL for each  
CA regularly. The "Next Update" field in the CRL shows when the next update will be avail-  
able.  
To add a New CRL  
1. Obtain the CRL file from your CA.  
2. Select CRL from the VPN menu. You will see a screen like the example below.  
105  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 92: Certificate Revocation Lists  
3. Click the "Add New CRL" button. You will see a screen like the following:  
Figure 93: Upload CRL  
4. Upload the CRL file:  
Click the "Browse" button, and locate the CRL file on your PC  
Select the file. The name will appear in the "File to Upload" field.  
Click "Upload" to upload the CRL file to the TW100-BRV204 .  
Click "Back" to return to the CRL list. The new CRL will appear in the list.  
5. Use the "Delete" button to delete the previous (now outdated) CRL.  
Status  
This screen lists all VPN SAs (Security Association) which exist at the current time.  
If no VPN tunnels exist at the current time, the table will be empty.  
To update the display, click the "Refresh" button.  
If using IKE, there is one SA for the IKE connection, and another SA for the IPSec  
connection.  
For each VPN SA the following data is displayed.  
Figure 94: VPN Status Screen  
106  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Data – VPN Status Screen  
VPN Status  
The name of the VPN Policy which triggered this VPN connection.  
Policy Name  
SPI  
Each SA (Security Association) has a unique SPI. For manual keys,  
this SPI is specified by user input. If using IKE, the SPI is generated  
by the IKE negotiation process.  
Each SAs (Security Association) will be either IKE or IPSec.  
The IP address of the remote VPN Endpoint.  
SA Type  
VPN Endpoint  
Data Transfered  
Buttons  
Measures the quantity of data which has been transferred via this SA.  
Update the data shown on screen.  
Refresh  
Open a new window and view the contents of the VPN log.  
View Log  
107  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 9  
Microsoft VPN  
9
This Chapter explains the screens and settings available for the Microsoft  
VPN function.  
Overview  
Microsoft VPN uses the Microsoft VPN Adapter which is provided in recent versions of  
Windows. This feature can be used to provide remote access to your LAN by individual PCs.  
This method provides an alternative to using IPSec VPN, which is described in the previous  
chapter. Using Microsoft VPN provides easier setup than using IPSec VPN.  
The following Microsoft VPN configuration screens are provided.  
Server  
Clients  
Status  
Server Setup  
The TW100-BRV204 incorporates a PPTP (Peer-to-Peer Tunneling Protocol) server which is  
compatible with the "VPN Adapter" provided with recent versions of Microsoft Windows.  
Remote Windows clients are able to connect to this Server. Once connected, they can access  
the LAN as if they connected locally.  
The Server setup screen is accessed by selecting the Server option on the Microsoft VPN menu.  
Figure 95: Microsoft VPN Screen  
108  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Data – Microsoft VPN Screen  
PPTP Server  
Use this checkbox to enable or disable this feature as required.  
Enable  
To allow connection by remote Windows clients, you must enable this  
feature, and enter the client details (on the Clients screen) to allow  
them to login to this Server.  
Enable the desired authentication methods. The methods are listed with  
the most secure first, least secure last. If multiple methods are checked,  
the most secure will be tried first. If the remote client does not support  
this, then the other checked methods are tried in order.  
Authentication  
Methods  
You must enable at least one method.  
Client Database  
To login to the PPTP Server (above) using the Microsoft Windows VPN Adapter, remote users  
must be entered in the VPN client database.  
The Client setup screen is accessed by selecting the Client option on the Microsoft VPN menu.  
Figure 96: Microsoft VPN Client Database Screen  
Data - Microsoft VPN Client Database Screen  
Existing Users  
All existing users are listed. If you have not added any users, this list  
will be empty.  
User List  
When a user is selected, their details are displayed in the Properties  
panel. You can then edit the user's information as required; click  
Update Selected User to save your changes. (If you select another user  
before saving your changes, your changes are lost.)  
109  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Use this to delete the selected user if required.  
Delete Button  
Properties  
Use this to enable or disable access by this user, as required.  
Allow connection  
Login Name  
Enter the login name. The remote user must provide this name when  
they connect. The name must not contain spaces, punctuation, or  
special characters.  
Enter the login password. The remote user must provide this password  
when they connect.  
Login Password  
Re-enter the password above.  
Verify Password  
Button  
Use this to prepare the form for a new entry. Any existing data will be  
cleared.  
Clear Form  
Use this to save the data in the "Properties" area as a new entry. (If a  
user is selected in the "Existing User" list, the selection is ignored.)  
Add as New User  
Use this to update the data for the user selected in the Existing User  
list. To change an existing user's data, follow this procedure.  
Update Selected  
User  
1. Select the desired user in the Existing Users list. Their information  
will be displayed in the Properties panel.  
2. Change the data in the Properties panel as required.  
3. Click the Update Selected User button to save your changes.  
110  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Status Screen  
The Status screen is accessed by selecting the Status option on the Microsoft VPN menu.  
Figure 97: Microsoft VPN Status Screen  
Data - Microsoft VPN Status Screen  
Server Status  
This indicates whether or not the PPTP (VPN) Server is enabled.  
Status  
This indicates the number of remote clients currently logged into the  
PPTP (VPN) Server.  
Current Connec-  
tions  
Server Log  
This displays details of each connection or connection attempt.  
Server Log  
You can use the Clear Log button to re-start the log, making new  
messages easier to read.  
111  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Windows Client Setup  
To connect to the PPTP (VPN) Server in the VPN Broadband Gateway:  
The Microsoft VPN feature in the VPN Broadband Gateway must be enabled and config-  
ured, as described in the previous section.  
Each user must have a login (username and password) on the VPN client database on the  
VPN Broadband Gateway.  
The remote client PC must be configured as described in the following sections.  
It is assumed that remote users have a Broadband (not dial-up) connection to the Internet.  
Windows 98/ME  
1. Click Start - Settings - Dial-up Networking  
2. Select Make New Connection  
Figure 98: Windows ME VPN Adapter  
3. Type a name for this connection, and ensure that "Microsoft VPN Adapter" is selected.  
Click "Next" to continue.  
Figure 99: Windows ME VPN Remote Host  
4. Enter the Internet IP address or domain name of this device. (If you don't have a fixed IP  
address, you can use a Dynamic DNS service to obtain a domain name.)  
Click "Next" to continue.  
112  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
5. Click "Finish" to exit the Wizard.  
The new entry will now be listed in "Dial-up Networking".  
If necessary, you can change the settings for this connection by right-clicking on it, and select-  
ing Properties.  
To force all outgoing traffic to be sent via VPN, enable the setting This is the default Internet  
connection on the Dialing tab. (Do NOT enable this setting if using Dial-up or PPPoE client  
software.)  
Windows ME VPN Dialing Properties  
To establish a connection:  
1. Ensure you are connected to the Internet.  
2. Select Start - Settings - Dial-up Networking  
3. Double-click the new VPN entry in Dial-up Networking.  
4. Enter your User name and Password, as recorded in the Client database on the TW100-  
BRV204 .  
5. Click the "Connect" button.  
113  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Windows 2000  
Ensure you have logged on with Administrator rights before attempting this procedure.  
1. Open "Network Connections", and start the "New Connection" Wizard.  
Figure 100: Windows 2000 Network Connection  
2. Select the VPN option ("Connect to a private network through the Internet"), as shown  
above, and click Next.  
Figure 101: Windows 2000 Public Network  
3. On the screen above:  
Select "Do not dial the initial connection" if Internet access is via the LAN.  
If using a PPPoE software client, select "Automatically dial this initial connection"  
and select the PPPoE connection.  
Click Next to continue.  
114  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Figure 102: Windows 2000 VPN Host  
4. On the screen above, enter the Domain Name or Internet IP address of the TW100-  
BRV204 you wish to connect to.  
Click Next to continue.  
Figure 103: Windows 2000 Connection Availability  
5. Choose whether to allow this connection for everyone, or only for yourself, as required.  
Click Next to continue.  
115  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 104: Windows 2000 Finish Wizard  
6. Enter a suitable name, and click "Finish" to save and exit.  
Setup is now complete.  
To establish a connection:  
1. Right-click the connection in "Network Connections", and select "Connect".  
2. You will then be prompted for the username and password. Enter the username and  
password assigned to you, as recorded in the VPN client database on the TW100-  
BRV204 .  
3. You can choose to have Windows remember the password if desired, so you do not have  
to enter it again.  
Changing the connection settings  
The PPTP (VPN) Server in the TW100-BRV204 is designed to work with the default  
Windows settings.  
If necessary, you can change the Windows settings by right-clicking the VPN connection  
in Network Connections, and selecting Properties.  
The Properties dialog has a Networking tab with a "Type of VPN" setting. If you have  
trouble connecting, you can change this setting from "Automatic" to "PPTP VPN".  
116  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
Windows XP  
Ensure you have logged on with Administrator rights before attempting this procedure.  
1. Open Network Connections (Start-Settings-Network Connections), and start the New  
Connection Wizard.  
Figure 105: Windows XP Network Connection Type  
2. Select the option "Connect to the network at my workplace", as shown above, and click  
Next.  
Figure 106: Windows XP Network Connection  
3. On the next screen, shown above, select the "Virtual Private Network connection" option.  
Click Next to continue.  
117  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 107: Windows XP Connection Name  
4. Enter a suitable name for this connection.  
Click Next to continue.  
Figure 108: Windows XP Public Network  
5. On the screen above, select "Do not dial the initial connection".  
Click Next to continue.  
Figure 109: Windows XP VPN Server  
118  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Microsoft VPN  
6. On the screen above, enter the Domain Name or Internet IP address of the TW100-  
BRV204 you wish to connect to.  
Click Next to continue.  
Figure 110: Windows XP Connection Availability  
7. Choose whether to allow this connection for everyone, or only for yourself, as required.  
Click Next to continue.  
8. On the final screen, click Finish to save and exit.  
Setup is now complete.  
To establish a connection:  
1. Right-click the connection in "Network Connections", and select "Connect".  
2. You will then be prompted for the username and password. Enter the username and  
password assigned to you, as recorded in the VPN client database on the TW100-  
BRV204 .  
3. You can choose to have Windows remember the password if desired, so you do not have  
to enter it again.  
Changing the connection settings  
The PPTP (VPN) Server in the TW100-BRV204 is designed to work with the default  
Windows settings.  
If necessary, you can change the Windows settings by right-clicking the VPN connection  
in Network Connections, and selecting Properties.  
The Properties dialog has a Networking tab with a "Type of VPN" setting. If you have  
trouble connecting, you can change this setting from "Automatic" to "PPTP VPN".  
119  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 10  
Other Features & Settings  
10  
This Chapter explains the screens and settings available via the "Other"  
menu.  
Overview  
Normally, it is not necessary to use these screens, or change any settings. These screens and  
settings are provided to deal with non-standard situations, or to provide additional options for  
advanced users.  
The screens available are:  
Backup or restore the configuration file for the TW100-BRV204 . This  
file contains all the configuration data.  
Config File  
Ping, DNS Lookup.  
Network  
Diagnostics  
This is the list of PCs shown when you select the "DMZ PC", "Virtual  
Server", or "Internet Application". This database is maintained automati-  
cally, but you can add and delete entries for PCs which use a Fixed  
(Static) IP Address.  
PC Database  
This feature allows you to manage the TW100-BRV204 via the Internet.  
Only required if your LAN has other Routers or Gateways.  
Remote Admin  
Routing  
The firmware (software) in the TW100-BRV204 can be upgraded using  
your Web Browser.  
Upgrade  
Firmware  
UPnP (Universal Plug and Play) allows automatic discovery and con-  
figuration of the TW100-BRV204  
UPnP  
120  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
Config File  
This feature allows you to backup (download) the current settings from the TW100-BRV204 ,  
and save them to a file on your PC.  
You can restore a previously-downloaded configuration file to the TW100-BRV204 , by  
uploading it to the TW100-BRV204 .  
This screen also allows you to set the TW100-BRV204 back to its factory default configura-  
tion. Any existing settings will be deleted.  
An example Config File screen is shown below.  
Figure 111: Config File Screen  
Data - Config File Screen  
Use this to download a copy of the current configuration, and store the  
Backup Config  
file on your PC. Click Download to start the download.  
This allows you to restore a previously-saved configuration file back to  
the TW100-BRV204 .  
Restore Config  
Click Browse to select the configuration file, then click Restore to  
upload the configuration file.  
WARNING !  
Uploading a configuration file will destroy (overwrite) ALL of the  
existing settings.  
Clicking the Factory-e Defaults button will reset the TW100-BRV204  
Default Config  
to its factory default settings.  
WARNING !  
This will delete ALL of the existing settings.  
121  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Network Diagnostics  
This screen allows you to perform a "Ping" or a "DNS lookup". These activities can be useful  
in solving network problems.  
An example Network Diagnostics screen is shown below.  
Figure 112: Network Diagnostics Screen  
Data - Network Diagnostics Screen  
Ping  
Enter the IP address you wish to ping. The IP address can be on your  
LAN, or on the Internet. Note that if the address is on the Internet,  
and no connection currently exists, you could get a "Timeout" error.  
In that case, wait a few seconds and try again.  
IP Address  
After entering the IP address, click this button to start the "Ping"  
Ping Button  
procedure. The results will be displayed in the Ping Results pane.  
DNS Lookup  
Enter the Domain name or URL for which you want a DNS (Domain  
Name Server) lookup. Note that if the address in on the Internet, and  
no connection currently exists, you could get a "Timeout" error. In  
that case, wait a few seconds and try again.  
Internet name  
After entering the Domain name/URL, click this button to start the  
"DNS Lookup" procedure.  
Lookup Button  
122  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
PC Database  
The PC Database is used whenever you need to select a PC (e.g. for the "DMZ" PC). It elimi-  
nates the need to enter IP addresses. Also, you do not need to use fixed IP addresses on your  
LAN.  
PC Database Screen  
An example PC Database screen is shown below.  
Figure 113: PC Database  
PCs which are "DHCP Clients" are automatically added to the database, and updated as  
required.  
By default, non-Server versions of Windows act as "DHCP Clients"; this setting is called  
"Obtain an IP Address automatically".  
The TW100-BRV204 uses the "Hardware Address" to identify each PC, not the name or  
IP address. The "Hardware Address" can only change if you change the PC's network card  
or adapter.  
This system means you do NOT need to use Fixed (static) IP addresses on your LAN.  
However, you can add PCs using Fixed (static) IP Addresses to the PC database if re-  
quired.  
123  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Data - PC Database Screen  
This lists all current entries. Data displayed is name (IP Address) type.  
Known PCs  
The "type" indicates whether the PC is connected to the LAN.  
If adding a new PC to the list, enter its name here. It is best if this  
matches the PC's "hostname".  
Name  
Enter the IP Address of the PC. The PC will be sent a "ping" to deter-  
mine its hardware address. If the PC is not available (not connected, or  
not powered On) you will not be able to add it.  
IP Address  
Buttons  
This will add the new PC to the list. The PC will be sent a "ping" to  
determine its hardware address. If the PC is not available (not con-  
nected, or not powered On) you will not be able to add it.  
Add  
Delete the selected PC from the list. This should be done in 2 situa-  
tions:  
Delete  
The PC has been removed from your LAN.  
The entry is incorrect.  
Update the data on screen.  
Refresh  
Display a read-only list showing full details of all entries in the PC  
database.  
Generate Report  
View the Advanced version of the PC database screen. See below for  
Advanced  
details.  
Administration  
124  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
PC Database (Admin)  
This screen is displayed if the "Advanced Administration" button on the PC Database is  
clicked. It provides more control than the standard PC Database screen.  
Figure 114: PC Database (Admin)  
Data - PC Database ( Admin) Screen  
This lists all current entries. Data displayed is name (IP Address) type.  
Known PCs  
The "type" indicates whether the PC is connected to the LAN.  
PC Properties  
If adding a new PC to the list, enter its name here. It is best if this  
matches the PC's "hostname".  
Name  
Select the appropriate option:  
IP Address  
Automatic - The PC is set to be a DHCP client (Windows: "Ob-  
tain an IP address automatically"). The TW100-BRV204 will  
allocate an IP address to this PC when requested to do so. The IP  
address could change, but normally won't.  
DCHP Client - Reserved IP Address - Select this if the PC is set  
to be a DCHP client, and you wish to guarantee that the TW100-  
BRV204 will always allocate the same IP Address to this PC.  
Enter the required IP address. Only the last field is required; the  
other fields must match the TW100-BRV204 's IP address.  
Fixed IP Address - Select this if the PC is using a Fixed (Static)  
IP address. Enter the IP address allocated to the PC. (The PC must  
be configured to use this IP address.)  
125  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Select the appropriate option  
MAC Address  
Automatic discovery - Select this to have the TW100-BRV204  
contact the PC and find its MAC address. This is only possible if  
the PC is connected to the LAN and powered On.  
MAC is - Enter the MAC address on the PC. The MAC address is  
also called the "Hardware Address", "Physical Address", or "Net-  
work Adapter Address". The TW100-BRV204 uses this to  
provide a unique identifier for each PC. Because of this, the MAC  
address can NOT be left blank.  
Buttons  
Add a new PC to the list, using the data in the "Properties" box.  
If "Automatic discovery" (for MAC address) is selected, the PC will be  
sent a "ping" to determine its hardware address. This will fail unless  
the PC is connected to the LAN, and powered on.  
Add as New  
Entry  
Update (modify) the selected PC, using the data in the "Properties"  
box.  
Update Selected  
PC  
Clear the "Properties" box, ready for entering data for a new PC.  
Update the data on screen.  
Clear Form  
Refresh  
Display a read-only list showing full details of all entries in the PC  
database.  
Generate Report  
Click this to view the standard "PC Database" screen.  
Standard Screen  
126  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
Remote Administration  
Remote Administration allows you to connect to this interface via the Internet, using your Web  
browser.  
Figure 115: Remote Administration Screen  
Data - Remote Administration Screen  
Information  
To establish a connection from the Internet:  
Information  
1. Enable Remote Administration and configure this screen.  
2. From a remote location, start your Browser.  
3. In the "Address" or "Location" field, enter "HTTPS//" (NOT  
"HTTP//"), the Internet IP address of this device (NOT the  
LAN IP address), and the port number, as follows:  
HTTPS://ip_address:port_number  
Where:  
ip address is the Internet IP address of this device.  
port number is the port number assigned on this screen.  
4. You should then be prompted for the password for this device.  
(You must assign a password!)  
Settings  
Check this to allow administration/management via the Internet. (To  
connect, see above).  
Enable  
If Disabled, this device will ignore management connection attempts  
from the Internet.  
To manage this device via the Internet, you need to know the IP  
Address of this device, as seen from the Internet. This IP Address is  
allocated by your ISP, and is shown here if you are currently con-  
IP Address  
127  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
nected to the Internet. But if using a Dynamic IP Address, this value  
can change each time you connect to your ISP. There are 2 solutions  
to this problem:  
Have your ISP allocate you a Fixed IP address.  
Use the DDNS feature (Internet menu) so you can connect using  
a Domain Name, rather than an IP address.  
Enter a port number between 1024 and 65535. The default for HTTP  
connections is port 80, and for HTTPS port 443. Using either of  
these is NOT recommended. The default value is 8080.  
Port Number  
The port number must be specified in your Browser when you  
connect, as explained above.  
This allows you to restrict remote access by IP address. Select the  
desired option.  
Allow Remote  
Access  
Everyone - Remote user's IP address is not checked.  
IP address range - Only IP addresses in the range specified will  
be allowed. If selected, you must enter both the Start and Finish  
IP address.  
Only this PC - Only the specified IP address is allowed. If  
selected, you must enter an IP address in the field provided.  
To connect from a remote PC via the Internet  
1. Ensure your Internet connection is established, and start your Web Browser.  
2. In the "Address" bar, enter "HTTPS://" followed by the Internet IP Address of the  
TW100-BRV204 . If the port number is not 80, the port number is also required. (After  
the IP Address, enter ":" followed by the port number.)  
e.g.  
HTTPS://123.123.123.123:8080  
This example assumes the WAN IP Address is 123.123.123.123, and the port number is 8080.  
128  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
Routing  
Overview  
If you don't have other Routers or Gateways on your LAN, you can ignore the "Routing"  
page completely.  
If the TW100-BRV204 is only acting as a Gateway for the local LAN segment, ignore the  
"Routing" page even if your LAN has other Routers.  
If your LAN has a standard Router (e.g. Cisco) on your LAN, and the TW100-BRV204 is  
to act as a Gateway for all LAN segments, enable RIP (Routing Information Protocol) and  
ignore the Static Routing table.  
If your LAN has other Gateways and Routers, and you wish to control which LAN seg-  
ments use each Gateway, do NOT enable RIP (Routing Information Protocol). Configure  
the Static Routing table instead. (You also need to configure the other Routers.)  
If using Windows 2000 Data center Server as a software Router, enable RIP on the  
TW100-BRV204 , and ensure the following Windows 2000 settings are correct:  
Open Routing and Remote Access  
In the console tree, select Routing and Remote Access, [server name], IP Routing,  
RIP  
In the "Details" pane, right-click the interface you want to configure for RIP version 2,  
and then click "Properties".  
On the "General" tab, set Outgoing packet protocol to "RIP version 2 broadcast", and  
Incoming packet protocol to "RIP version 1 and 2".  
Routing Screen  
The routing table is accessed by the Routing link on the Other screen.  
Using this Screen  
Generally, you will use either RIP (Routing Information Protocol) OR the Static Routing Table,  
as explained above, although is it possible to use both methods simultaneously.  
Static Routing Table  
If RIP is not used, an entry in the routing table is required for each LAN segment on your  
Network, other than the segment to which this device is attached.  
The other Routers must also be configured. See Configuring Other Routers on your LAN  
later in this chapter for further details and an example.  
129  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Figure 116: Routing Screen  
Data - Routing Screen  
RIP  
Check this to enable the RIP (Routing Information Protocol) feature  
of the TW100-BRV204 .  
Enable RIP  
The TW100-BRV204 supports RIP 1 only.  
Static Routing  
This list shows all entries in the Routing Table.  
Static Routing  
Table Entries  
The "Properties" area shows details of the selected item in the  
list.  
Change any the properties as required, then click the "Update"  
button to save the changes to the selected entry.  
130  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
Destination Network - The network address of the remote LAN  
segment. For standard class "C" LANs, the network address is  
the first 3 fields of the Destination IP Address. The 4th (last)  
field can be left at 0.  
Properties  
Network Mask - The Network Mask for the remote LAN  
segment. For class "C" networks, the default mask is  
255.255.255.0  
Gateway IP Address - The IP Address of the Gateway or  
Router which the TW100-BRV204 must use to communicate  
with the destination above. (NOT the router attached to the  
remote segment.)  
Interface - Normally, this will be "LAN". If NAT is disabled,  
the "WAN" option can be used for Routers which are accessed  
via the WAN port.  
Metric - The number of "hops" (routers) to pass through to  
reach the remote LAN segment. The shortest path will be used.  
The default value is 1.  
Buttons  
Save  
Save the RIP setting. This has no effect on the Static Routing Table.  
Add a new entry to the Static Routing table, using the data shown in  
the "Properties" area on screen. The entry selected in the list is  
ignored, and has no effect.  
Add  
Update the current Static Routing Table entry, using the data shown  
in the "Properties" area on screen.  
Update  
Delete the current Static Routing Table entry.  
Delete  
Clear all data from the "Properties" area, ready for input of a new  
entry for the Static Routing table.  
Clear Form  
Generate a read-only list of all entries in the Static Routing table.  
Generate Report  
Configuring Other Routers on your LAN  
It is essential that all IP packets for devices not on the local LAN be passed to the TW100-  
BRV204 , so that they can be forwarded to the external LAN, WAN, or Internet. To achieve  
this, the local LAN must be configured to use the TW100-BRV204 as the Default Route or  
Default Gateway.  
Local Router  
The local router is the Router installed on the same LAN segment as the TW100-BRV204 .  
This router requires that the Default Route is the TW100-BRV204 itself. Typically, routers  
have a special entry for the Default Route. It should be configured as follows.  
Normally 0.0.0.0, but check your router documentation.  
Destination IP Address  
Network Mask  
Gateway IP Address  
Interface  
Normally 0.0.0.0, but check your router documentation.  
The IP Address of the TW100-BRV204 .  
LAN  
2
Metric  
131  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Other Routers on the Local LAN  
Other routers on the local LAN must use the TW100-BRV204 's Local Router as the Default  
Route. The entries will be the same as the TW100-BRV204 's local router, with the exception  
of the Gateway IP Address.  
For a router with a direct connection to the TW100-BRV204 's local Router, the Gateway  
IP Address is the address of the TW100-BRV204 's local router.  
For routers which must forward packets to another router before reaching the TW100-  
BRV204 's local router, the Gateway IP Address is the address of the intermediate router.  
Static Routing - Example  
Figure 117: Routing Example  
For the TW100-BRV204 's Routing Table  
For the LAN shown above, with 2 routers and 3 LAN segments, the TW100-BRV204 requires  
2 entries as follows.  
Entry 1 (Segment 1)  
Destination IP Address  
Network Mask  
192.168.1.0  
255.255.255.0 (Standard Class C)  
Gateway IP Address  
192.168.0.100 (TW100-BRV204 's local  
Router)  
Interface  
LAN  
2
Metric  
Entry 2 (Segment 2)  
Destination IP Address  
192.168.2.0  
Network Mask  
Gateway IP Address  
Interface  
255.255.255.0 (Standard Class C)  
192.168.0.100  
LAN  
132  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
Metric  
3
For Router A's Default Route  
Destination IP Address  
Network Mask  
0.0.0.0  
0.0.0.0  
Gateway IP Address  
Interface  
192.168.0.1 (TW100-BRV204 's IP Address)  
LAN  
For Router B's Default Route  
Destination IP Address  
Network Mask  
0.0.0.0  
0.0.0.0  
Gateway IP Address  
192.168.1.80 (TW100-BRV204 's local  
router)  
Interface  
LAN  
133  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Upgrade Firmware  
Use this screen to upgrade your TW100-BRV204 's firmware.  
You must download the required firmware file, and store it on your PC.  
During the upgrade process, all existing Internet connections will be terminated.  
The upgrade process must NOT be interrupted!.  
Figure 118: Upgrade Firmware Screen  
Data – Upgrade Firmware Screen  
Upgrade Firmware  
Enter the current password assigned to the TW100-BRV204 . If no  
password has been assigned, leave this blank.  
TW100-BRV204  
Password  
Click the "Browse" button and browse to the location on your PC  
where you stored the firmware upgrade file. Select this file.  
Upgrade File  
Click this button to start the Firmware upgrade. Note than any users  
accessing the Internet via the TW100-BRV204 will lose their con-  
nection. When the upgrade is finished, the TW100-BRV204 will  
restart, and this management connection will be unavailable during  
the restart.  
Start Upgrade  
Cancel does NOT stop the Upgrade process if it has started. It only  
clears the input for the "Upgrade File" field.  
Cancel  
To perform the Firmware Upgrade:  
1. Click the "Browse" button and navigate to the location of the upgrade file.  
2. Select the upgrade file. It's name will appear in the Upgrade File field.  
3. Click the "Start Upgrade" button to commence the firmware upgrade.  
The TW100-BRV204 is unavailable during the up-  
grade process, and must restart when the upgrade is  
completed. Any connections to or through the  
TW100-BRV204 will be lost.  
134  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Other Features and Settings  
UPnP  
An example UPnP screen is shown below.  
Figure 119: UPnP Screen  
Data - UPnP Screen  
UPnP  
UPnP (Universal Plug and Play) allows automatic discovery and  
configuration of equipment attached to your LAN. UPnP is by  
supported by Windows ME, XP, or later.  
Enable UPnP  
Services  
If Enabled, this device will be visible via UPnP.  
If Disabled, this device will not be visible via UPnP.  
If checked, then UPnP users can change the configuration.  
Allow Configu-  
ration...  
If Disabled, UPnP users can only view the configuration. But  
currently, this restriction only applies to users running Windows  
XP, who access the Properties via UPnP. (e.g. Right - click the  
TW100-BRV204 in My Network Places, and select Properties)  
If checked, then UPnP users can disable Internet access via this  
device.  
Allow Internet  
access to be  
disabled  
If Disabled, UPnP users can NOT disable Internet access via this  
device. But currently, this restriction only applies to users running  
Windows XP, who access the Properties via UPnP. (e.g. Right -  
click the TW100-BRV204 in My Network Places, and select  
Properties)  
135  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A  
Troubleshooting  
A
This Appendix covers the most likely problems and their solutions.  
Overview  
This chapter covers some common problems that may be encountered while using the TW100-  
BRV204 and some possible solutions to them. If you follow the suggested steps and the  
TW100-BRV204 still does not function properly, contact your dealer for further advice.  
General Problems  
Problem 1:  
Can't connect to the TW100-BRV204 to configure it.  
Check the following:  
Solution 1:  
The TW100-BRV204 is properly installed, LAN connections are OK,  
and it is powered ON.  
Ensure that your PC and the TW100-BRV204 are on the same network  
segment. (If you don't have a router, this must be the case.)  
If your PC is set to "Obtain an IP Address automatically" (DHCP  
client), restart it.  
If your PC uses a Fixed (Static) IP address, ensure that it is using an IP  
Address within the range 192.168.0.2 to 192.168.0.254 and thus com-  
patible with the TW100-BRV204 's default IP Address of 192.168.0.1.  
Also, the Network Mask should be set to 255.255.255.0 to match the  
TW100-BRV204 .  
In Windows, you can check these settings by using Control Panel-  
Network to check the Properties for the TCP/IP protocol.  
Internet Access  
Problem 1:  
When I enter a URL or IP address I get a time out error.  
A number of things could be causing this. Try the following troubleshooting  
steps.  
Solution 1:  
Check if other PCs work. If they do, ensure that your PCs IP settings  
are correct. If using a Fixed (Static) IP Address, check the Network  
Mask, Default gateway and DNS as well as the IP Address.  
If the PCs are configured correctly, but still not working, check the  
TW100-BRV204 . Ensure that it is connected and ON. Connect to it  
and check its settings. (If you can't connect to it, check the LAN and  
power connections.)  
If the TW100-BRV204 is configured correctly, check your Internet  
connection (DSL/Cable modem etc) to see that it is working correctly.  
Problem 2:  
Some applications do not run properly when using the TW100-  
BRV204 .  
136  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix A - Troubleshooting  
The TW100-BRV204 processes the data passing through it, so it is not  
Solution 2:  
transparent.  
Use the Special Applications feature to allow the use of Internet applications  
which do not function correctly.  
If this does solve the problem you can use the DMZ function. This should  
work with almost every application, but:  
It is a security risk, since the firewall is disabled.  
Only one (1) PC can use this feature.  
137  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B  
Specifications  
TW100-BRV204  
B
Model  
TW100-BRV204  
Dimensions  
141mm(W) * 100mm(D) * 27mm(H)  
0° C to 40° C  
Operating Temperature  
Storage Temperature  
Network Protocol:  
Network Interface:  
-10° C to 70° C  
TCP/IP  
5 Ethernet:  
3 * 10/100BaseT (RJ45) LAN connection  
1 * 10/100BaseT (RJ45) DMZ connection  
1 * 10/100BaseT (RJ45) for WAN  
LEDs  
11  
Power Adapter  
9 V DC External  
FCC Statement  
This equipment has been tested and found to comply with the limits for a Class B digital  
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable  
protection against harmful interference in a residential installation.  
This equipment generates, uses and can radiate radio frequency energy and, if not installed and  
used in accordance with the instructions, may cause harmful interference to radio communica-  
tions. However, there is no guarantee that interference will not occur in a particular installation.  
If this equipment does cause harmful interference to radio or television reception, which can be  
determined by turning the equipment off and on, the user is encouraged to try to correct the  
interference by one of the following measures:  
Reorient or relocate the receiving antenna.  
Increase the separation between the equipment and receiver.  
Connect the equipment into an outlet on a circuit different from that to which the receiver  
is connected.  
Consult the dealer or an experienced radio/TV technician for help.  
To assure continued compliance, any changes or modifications not expressly approved by the  
party responsible for compliance could void the user's authority to operate this equipment.  
(Example - use only shielded interface cables when connecting to computer or peripheral  
devices).  
138  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B - Specifications  
FCC Radiation Exposure Statement  
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled  
environment. This equipment should be installed and operated with a minimum distance of 20  
centimeters between the radiator and your body.  
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two  
conditions:  
(1) This device may not cause harmful interference, and  
(2) This device must accept any interference received, including interference that may cause  
undesired operation.  
This transmitter must not be co-located or operating in conjunction with any other antenna or  
transmitter.  
CE Marking Warning  
CE Standards  
This product complies with the 99/5/EEC directives, including the following safety and EMC  
standards:  
EN301489-1/-17  
EN60950  
This is a Class B product. In a domestic environment this product may cause radio interference  
in which case the user may be required to take adequate measures.  
139  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
Limited Warranty  
TRENDware warrants its products against defects in material and workmanship,  
under normal use and service, for the following lengths of time from the date of pur-  
chase.  
TW100-BRV204 – 5 Years Warranty  
If a product does not operate as warranted above during the applicable warranty  
period, TRENDware shall, at its option and expense, repair the defective product or  
part, deliver to customer an equivalent product or part to replace the defective item, or  
refund to customer the purchase price paid for the defective product. All products that  
are replaced will become the property of TRENDware. Replacement products may be  
new or reconditioned.  
TRENDware shall not be responsible for any software, firmware, information, or  
memory data of customer contained in, stored on, or integrated with any products  
returned to TRENDware pursuant to any warranty.  
There are no user serviceable parts inside the product. Do not remove or attempt to  
service the product by any unauthorized service center. This warranty is voided if (i)  
the product has been modified or repaired by any unauthorized service center, (ii) the  
product was subject to accident, abuse, or improper use (iii) the product was subject  
to conditions more severe than those specified in the manual.  
Warranty service may be obtained by contacting TRENDware office within the appli-  
cable warranty period for a Return Material Authorization (RMA) number,  
accompanied by a copy of the dated proof of the purchase. Products returned to  
TRENDware must be pre-authorized by TRENDware with RMA number marked on  
the outside of the package, and sent prepaid, insured and packaged appropriately for  
safe shipment.  
WARRANTIES EXCLUSIVE: IF THE TRENDWARE PRODUCT DOES NOT  
OPERATE AS WARRANTED ABOVE, THE CUSTOMER’S SOLE REMEDY SHALL  
BE, AT TRENDWARE’S OPTION, REPAIR OR REPLACEMENT. THE FOREGOING  
WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL  
OTHER WARRANTIES, EXPRESSED OR IMPLIED, EITHER IN FACT OR BY  
OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES  
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  
TRENDWARE NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO  
ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE,  
INSTALLATION MAINTENANCE OR USE OF TRENDWARE’S PRODUCTS.  
TRENDWARE SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING  
AND EXAMINATION DISCLOSE THAT THE ALLEGED DEFECT IN THE PRODUCT  
DOES NOT EXIST OR WAS CAUSED BY CUSTOMER’S OR ANY THIRD  
140  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Appendix B - Specifications  
PERSON’S MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING,  
UNAUTHORIZED ATTEMPTS TO REPAIR OR MODIFY, OR ANY OTHER CAUSE  
BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE,  
LIGHTNING, OR OTHER HAZARD.  
LIMITATION OF LIABILITY: TO THE FULL EXTENT ALLOWED BY LAW  
TRENDWARE ALSO EXCLUDES FOR ITSELF AND ITS SUPPLIERS ANY  
LIABILITY, WHETHER BASED IN CONTRACT OR TORT (INCLUDING  
NEGLIGENCE), FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR  
PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE OR PROFITS,  
LOSS OF BUSINESS, LOSS OF INFORMATION OR DATE, OR OTHER FINANCIAL  
LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION,  
MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF THE  
POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR,  
REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT  
TRENDWARE’S OPTION. THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL  
NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS  
ESSENTIAL PURPOSE.  
Governing Law: This Limited Warranty shall be governed by the laws of the state of  
California.  
Technical Support  
You can find the most recent driver/firmware/software and user documentations  
on the TRENDware website. TRENDware provides FREE technical support  
for all customers for the duration of the warranty period on this product.  
TRENDware Technical Support  
Tel: +1-310-891-1100  
Fax: +1-310-8911111  
www.TRENDnet.com  
141  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TW100-BRV204 User Guide  
142  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Therma Tru Door Fiber Classic User Manual
Toastmaster Food Warmer TTS2 User Manual
Toshiba Digital Camera IK 539A User Manual
Toshiba Flat Panel Television 26AV502RY User Manual
Toshiba TV VCR Combo DRS7000N User Manual
Tote Vision Computer Monitor LCD 410 User Manual
Uniflame Gas Grill NPG2322SS User Manual
Universal Gas Heater 150 FASNG User Manual
Vermont Casting Indoor Fireplace VCEF26 User Manual
WatchGuard Technologies Computer Accessories WG152071 User Manual