TW100-BRV204
VPN Firewall Router
Cable/DSL Internet Access
4-Port Switching Hub
User's Guide
Download from Www.Somanuals.com. All Manuals Search And Download.
Examples .......................................................................................................................... 81
Using Certificates ............................................................................................................ 99
CHAPTER 9 OTHER FEATURES AND SETTINGS...................................................... 104
Overview ........................................................................................................................ 104
Config File...................................................................................................................... 105
PC Database................................................................................................................... 106
Remote Administration................................................................................................. 110
Routing........................................................................................................................... 111
Upgrade Firmware........................................................................................................ 115
UPNP .............................................................................................................................. 116
APPENDIX A TROUBLESHOOTING.............................................................................. 117
Overview ........................................................................................................................ 117
General Problems.......................................................................................................... 117
Internet Access............................................................................................................... 117
APPENDIX B SPECIFICATIONS...................................................................................... 119
TW100-BRV204 ............................................................................................................ 119
FCC Statement .............................................................................................................. 119
CE Marking Warning................................................................................................... 120
P/N: 9560KZ0101
Copyright 2003. All Rights Reserved.
Document Version: 1.0
All trademarks and trade names are the properties of their respective owners.
ii
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 1
Introduction
1
This Chapter provides an overview of the TW100-BRV204's features and ca-
pabilities.
Congratulations on the purchase of your new TW100-BRV204. The TW100-BRV204 is a
multi-function device providing the following services:
•
•
Shared Broadband Internet Access for all LAN users.
4-Port Switching Hub for 10BaseT or 100BaseT connections.
TW100-BRV204
Figure 1: TW100-BRV204
TW100-BRV204 Features
The TW100-BRV204 incorporates many advanced features, carefully designed to provide
sophisticated functions while being easy to use.
Internet Access Features
•
Shared Internet Access. All users on the LAN or WLAN can access the Internet
through the TW100-BRV204, using only a single external IP Address. The local (invalid)
IP Addresses are hidden from external sources. This process is called NAT (Network Ad-
dress Translation).
•
•
DSL & Cable Modem Support. The TW100-BRV204 has a 10/100BaseT Ethernet
port for connecting a DSL or Cable Modem. All popular DSL and Cable Modems are sup-
ported. SingTel RAS and Big Pond (Australia) login support is also included.
PPPoE, PPTP, SingTel RAS and Telstra Big Pond Support. The Internet (WAN
port) connection supports PPPoE (PPP over Ethernet), PPTP (Peer-to-Peer Tunneling Pro-
tocol), SingTel RAS and Telstra Big Pond (Australia), as well as "Direct Connection" type
services.
•
Fixed or Dynamic IP Address. On the Internet (WAN port) connection, the TW100-
BRV204 supports both Dynamic IP Address (IP Address is allocated on connection) and
Fixed IP Address.
1
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Advanced Internet Functions
•
Communication Applications. Support for Internet communication applications, such
as interactive Games, Telephony, and Conferencing applications, which are often difficult
to use when behind a Firewall, is included.
•
Special Internet Applications. Applications which use non-standard connections or
port numbers are normally blocked by the Firewall. The ability to define and allow such
applications is provided, to enable such applications to be used normally.
•
•
Virtual Servers. This feature allows Internet users to access Internet servers on your
LAN. The required setup is quick and easy.
DMZ. One (1) PC on your local LAN can be configured to allow unrestricted 2-way
communication with Servers or individual users on the Internet. This provides the ability
to run programs which are incompatible with Firewalls.
•
•
•
URL Filter. Use the URL Filter to block access to undesirable Web sites by LAN users.
Internet Access Log. See which Internet connections have been made.
VPN Pass through Support. PCs with VPN (Virtual Private Networking) software
using PPTP, L2TP and IPSec are transparently supported - no configuration is required.
LAN Features
•
4-Port Switching Hub. The TW100-BRV204 incorporates a 4-port 10/100BaseT
switching hub, making it easy to create or extend your LAN.
•
DHCP Server Support. Dynamic Host Configuration Protocol provides a dynamic IP
address to PCs and other devices upon request. The TW100-BRV204 can act as a DHCP
Server for devices on your local LAN and WLAN.
•
Multi Segment LAN Support. LANs containing one or more segments are supported,
via the TW100-BRV204 's RIP (Routing Information Protocol) support and built-in static
routing table.
Configuration & Management
•
Easy Setup. Use your WEB browser from anywhere on the LAN or WLAN for configu-
ration.
•
Remote Management. The TW100-BRV204 can be managed from any PC on your
LAN. And, if the Internet connection exists, it can also (optionally) be configured via the
Internet.
•
UPnP Support. UPnP (Universal Plug and Play) allows automatic discovery and con-
figuration of the TW100-BRV204. UPnP is by supported by Windows ME, XP, or later.
Security Features
•
Password - protected Configuration. Optional password protection is provided to
prevent unauthorized users from modifying the configuration data and settings.
•
NAT Protection. An intrinsic side effect of NAT (Network Address Translation) tech-
nology is that by allowing all LAN users to share a single IP address, the location and
even the existence of each PC is hidden. From the external viewpoint, there is no network,
only a single device - the TW100-BRV204.
•
Stateful Inspection Firewall. All incoming data packets are monitored and all incom-
ing server requests are filtered, thus protecting your network from malicious attacks from
external sources.
2
Download from Www.Somanuals.com. All Manuals Search And Download.
Introduction
•
•
Protection against DoS attacks. DoS (Denial of Service) attacks can flood your
Internet connection with invalid packets and connection requests, using so much band-
width and so many resources that Internet access becomes unavailable. The TW100-
BRV204 incorporates protection against DoS attacks.
Rule-based Policy Firewall. To provide additional protection against malicious pack-
ets, you can define your own firewall rules. This can also be used to control the Internet
services available to LAN users.
VPN Gateway Features
•
•
•
IPSec.. Support for IPSec standards, including IKE and certificates.
5 Tunnels. Up to 5 VPN tunnels can be created.
High performance. High performance encryption engine maintains high throughput
even when using 3DES.
Package Contents
The following items should be included:
•
•
•
•
The TW100-BRV204 Unit
Power Adapter
Quick Installation Guide
CD-ROM containing the on-line manual.
If any of the above items are damaged or missing, please contact your dealer immediately.
3
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Physical Details
Front-mounted LEDs
Figure 2: Front Panel
Power
(Green)
On - Power on.
Off - No power.
Status
(Red)
On - Error condition.
Off - Normal operation.
Blinking - This LED blinks during start up.
For each port, there are 2 LEDs
LAN
•
Link/Act (Green)
•
•
•
On - Corresponding LAN (hub) port is active.
Off - No active connection on the corresponding LAN (hub) port.
Flashing - Data is being transmitted or received via the corre-
sponding LAN (hub) port.
•
100 (Yellow)
•
•
On - Corresponding LAN (hub) port is using 100BaseT.
Off - Corresponding LAN (hub) port connection is using
10BaseT, or no active connection.
WAN
On - Connection to the modem attached to the WAN (Internet) port is
(Green)
established.
Flashing - Data is being transmitted or received via the WAN port.
4
Download from Www.Somanuals.com. All Manuals Search And Download.
Introduction
Rear Panel
Figure 3: Rear Panel
This button has two (2) functions:
Reset Button
•
Reboot. When pressed and released, the TW100-BRV204 will
reboot (restart).
•
Clear All Data. This button can also be used to clear ALL data
and restore ALL settings to the factory default values.
To Clear All Data and restore the factory default values:
1. Power Off.
2. Hold the Reset Button down while you Power On.
3. Keep holding the Reset Button down for five (5) seconds, until
the Red Status LED has flashed TWICE.
4. Release the Reset Button. The TW100-BRV204 is now using the
factory default values.
Connect the DSL or Cable Modem here. If your modem came with a
cable, use the supplied cable. Otherwise, use a standard LAN cable.
WAN port
(10/100BaseT)
Use standard LAN cables (RJ45 connectors) to connect your PCs to
these ports.
10/100BaseT
LAN connections
Note:
Any LAN port on the TW100-BRV204 will automatically function
as an "Uplink" port when required. Just connect any port to a normal
port on the other hub, using a standard LAN cable.
Connect the supplied power adapter here.
Power port
5
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 2
Installation
2
This Chapter covers the physical installation of the TW100-BRV204.
Requirements
•
•
•
Network cables. Use standard 10/100BaseT network (UTP) cables with RJ45 connectors.
TCP/IP protocol must be installed on all PCs.
For Internet Access, an Internet Access account with an ISP, and either of a DSL or Cable
modem (for WAN port usage)
Procedure
Figure 4: Installation Diagram
1. Choose an Installation Site
Select a suitable place on the network to install the TW100-BRV204.
Ensure the TW100-BRV204 and the DSL/Cable modem are powered OFF.
2. Connect LAN Cables
•
Use standard LAN cables to connect PCs to the Switching Hub ports on the TW100-
BRV204. Both 10BaseT and 100BaseT connections can be used simultaneously.
•
If required, you can connect any LAN port to another Hub. Any LAN port on the TW100-
BRV204 will automatically function as an "Uplink" port when required. Just connect any
LAN port to a normal port on the other hub, using a standard LAN cable.
6
Download from Www.Somanuals.com. All Manuals Search And Download.
Installation
3. Connect WAN Cable
Connect the DSL or Cable modem to the WAN port on the TW100-BRV204. Use the ca-
ble supplied with your DSL/Cable modem. If no cable was supplied, use a standard cable.
4. Power Up
•
•
Power on the Cable or DSL modem.
Connect the supplied power adapter to the TW100-BRV204 and power up.
Use only the power adapter provided. Using a different one may cause hardware damage
5. Check the LEDs
•
•
•
The Power LED should be ON.
The Status LED should flash, then turn Off. If it stays on, there is a hardware error.
For each LAN (PC) connection, the LAN Link/Act LED should be ON (provided the PC is
also ON.)
•
The WAN LED should be ON.
For more information, refer to Front-mounted LEDs in Chapter 1.
7
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 3
Setup
3
This Chapter provides Setup details of the TW100-BRV204.
Overview
This chapter describes the setup procedure for:
•
•
Internet Access
LAN configuration
PCs on your local LAN may also require configuration. For details, see Chapter 4 - PC Con-
figuration.
Other configuration may also be required, depending on which features and functions of the
TW100-BRV204 you wish to use. Use the table below to locate detailed instructions for the
required functions.
To Do this:
Refer to:
Configure PCs on your LAN.
Chapter 4:
PC Configuration
Check TW100-BRV204 operation and Status.
Chapter 5:
Operation and Status
Use any of the following Internet features:
Chapter 6:
Internet Features
•
Advanced Internet Setup (Special Applications,
DMZ, URL filter)
•
•
•
Dynamic DNS
Virtual Servers
Options (Backup DNS, MTU)
Change any of the following Security-related settings:
Chapter 7:
Security Configuration
•
•
•
•
•
•
•
Admin Login
Access Control
Firewall Rules
Logs
Security Options (TFTP, Firewall)
Scheduling (used by Access Control)
Services
Understand the VPN capabilities, and the configuration
required for common situations.
Chapter 8:
VPN
8
Download from Www.Somanuals.com. All Manuals Search And Download.
Setup
Configure or use any of the following:
Chapter 9:
Other Features and Settings
•
•
•
•
•
•
Config File backup/restore
PC Database
Remote Admin
Routing (RIP and static Routing)
Upgrade Firmware
UPnP
Where use of a certain feature requires that
PCs or other LAN devices be configured, this
is also explained in the relevant chapter.
Configuration Program
The TW100-BRV204 contains an HTTP server. This enables you to connect to it, and config-
ure it, using your Web Browser. Your Browser must support JavaScript. The configuration
program has been tested on the following browsers:
•
•
Netscape V4.08 or later
Internet Explorer V4 or later
Preparation
Before attempting to configure the TW100-BRV204, please ensure that:
•
Your PC can establish a physical connection to the TW100-BRV204. The PC and the
TW100-BRV204 must be directly connected (using the Hub ports on the TW100-BRV204)
or on the same LAN segment.
•
•
The TW100-BRV204 must be installed and powered ON.
If the TW100-BRV204 's default IP Address (192.168.0.1) is already used by another
device, the other device must be turned OFF until the TW100-BRV204 is allocated a new
IP Address during configuration.
Using UPnP
If your Windows system supports UPnP, an icon for the TW100-BRV204 will appear in the
system tray, notifying you that a new network device has been found, and offering to create a
new desktop shortcut to the newly-discovered device.
•
•
•
Unless you intend to change the IP Address of the TW100-BRV204, you can accept the
desktop shortcut.
Whether you accept the desktop shortcut or not, you can always find UPnP devices in My
Network Places (previously called Network Neighborhood).
Double - click the icon for the TW100-BRV204 (either on the Desktop, or in My Network
Places) to start the configuration. Refer to the following section Setup Wizard for details
of the initial configuration process.
9
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Using your Web Browser
To establish a connection from your PC to the TW100-BRV204:
1. After installing the TW100-BRV204 in your LAN, start your PC. If your PC is already
running, restart it.
2. Start your WEB browser.
3. In the Address box, enter "HTTP://" and the IP Address of the TW100-BRV204, as in this
example, which uses the TW100-BRV204 's default IP Address:
HTTP://192.168.0.1
If you can't connect
If the TW100-BRV204 does not respond, check the following:
•
The TW100-BRV204 is properly installed, LAN connection is OK, and it is
powered ON. You can test the connection by using the "Ping" command:
•
•
Open the MS-DOS window or command prompt window.
Enter the command:
ping 192.168.0.1
If no response is received, either the connection is not working, or your
PC's IP address is not compatible with the TW100-BRV204 's IP Address.
(See next item.)
•
•
If your PC is using a fixed IP Address, its IP Address must be within the range
192.168.0.2 to 192.168.0.254 to be compatible with the TW100-BRV204 's
default IP Address of 192.168.0.1. Also, the Network Mask must be set to
255.255.255.0. See Chapter 4 - PC Configuration for details on checking your
PC's TCP/IP settings.
Ensure that your PC and the TW100-BRV204 are on the same network seg-
ment. (If you don't have a router, this must be the case.)
4. You will be prompted for a username and password, as shown below.
Figure 5: Password Dialog
•
•
Enter admin for the User Name, and leave the Password blank.
Both the name and password can (and should) be changed, using the Admin Login screen.
10
Download from Www.Somanuals.com. All Manuals Search And Download.
Setup
Setup Wizard
The first time you connect to the TW100-BRV204, the Setup Wizard will run automatically.
(The Setup Wizard will also run if the TW100-BRV204's default setting are restored.)
1. Step through the Wizard until finished.
•
You need to know the type of Internet connection service used by your ISP. Check
the data supplied by your ISP.
•
The common connection types are explained in the tables below.
2. On the final screen of the Wizard, run the test and check that an Internet connection can be
established.
3. If the connection test fails:
•
•
•
Check your data, the Cable/DSL modem, and all connections.
Check that you have entered all data correctly.
If using a Cable modem, your ISP may have recorded the MAC (physical) address of
your PC. Run the Wizard, and on the Cable Modem screen, use the "Clone MAC ad-
dress" button to copy the MAC address from your PC to the TW100-BRV204.
Common Connection Types
Cable Modems
Type
Details
ISP Data required
Dynamic
IP Address
Your IP Address is allocated
automatically, when you
connect to you ISP.
Usually, none.
However, some ISPs may
require you to use a particular
Hostname, Domain name, or
MAC (physical) address.
Static (Fixed)
IP Address
Your ISP allocates a perma-
nent IP Address to you.
IP Address allocated to you,
mask and gateway (if provided),
and DNS address.
Some ISP's may also require
you to use a particular Host-
name, Domain name, or MAC
(physical) address.
DSL Modems
Type
Details
ISP Data required
Dynamic
IP Address
Your IP Address is allocated
automatically, when you
connect to you ISP.
None.
Static (Fixed)
IP Address
Your ISP allocates a perma-
nent IP Address to you.
IP Address allocated to you,
mask and gateway (if provided),
and DNS address.
PPPoE
You connect to the ISP only
when required. The IP address
is usually allocated automati-
cally.
User name and password.
11
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
PPTP
Mainly used in Europe.
•
•
•
PPTP Server IP Address.
User name and password.
You connect to the ISP only
when required. The IP address
is usually allocated automati-
cally, but may be Static
(Fixed).
IP Address allocated to
you, if Static (Fixed).
Other Modems (e.g. Broadband Wireless)
Type
Details
ISP Data required
Dynamic
IP Address
Your IP Address is allocated
automatically, when you
connect to you ISP.
Usually, none.
However, some ISP's may
require you to use a particular
Hostname, Domain name, or
MAC (physical) address.
Static (Fixed)
IP Address
Your ISP allocates a perma-
nent IP Address to you.
IP Address allocated to you,
mask and gateway (if provided),
and DNS address.
Big Pond Cable (Australia)
For this connection method, the following data is required:
•
•
•
User Name
Password
Big Pond Server IP address
SingTel RAS
For this connection method, the following data is required:
•
•
•
User Name
Password
RAS Plan
12
Download from Www.Somanuals.com. All Manuals Search And Download.
Setup
Home Screen
After finishing or exiting the Setup Wizard, you will see the Home screen. When you connect
in future, you will see this screen when you connect. An example screen is shown below.
Figure 6: Home Screen
Navigation & Data Input
•
Use the menu bar on the top of the screen, and the "Back" button on your Browser, for
navigation.
•
Changing to another screen without clicking "Save" does NOT save any changes you may
have made. You must "Save" before changing screens or your data will be ignored.
On each screen, clicking the "Help" button will
display help for that screen.
From any help screen, you can access the list of all
help files (help index).
13
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
WAN Port Configuration Screen
The WAN Port Configuration screen provides an alternative to using the Wizard. It can be
accessed from the Internet menu. An example screen is shown below.
Figure 7: WAN Port Screen
Data - WAN Port Screen
Identification
Normally, there is no need to change the default name, but if your
ISP requests that you use a particular “Hostname”, enter it here.
Hostname
If your ISP provided a domain name, enter it here. Otherwise, this
may be left blank.
Domain name
IP Address
IP Address
is assigned auto-
matically
Also called Dynamic IP Address. This is the default, and the most
common.
Leave this selected if your ISP allocates an IP Address to the Wire-
less Router upon connection.
14
Download from Www.Somanuals.com. All Manuals Search And Download.
Setup
Specified
Also called Static IP Address. Select this if your ISP has allocated
IP Address
you a fixed IP Address. If this option is selected, the following data
must be entered.
•
IP Address.
The IP Address allocated by the ISP.
•
Network Mask (Not required for PPPoE)
This is also supplied by your ISP. It must be compatible with the
IP Address above.
•
•
Gateway IP Address (Not required for PPPoE)
The address of the router or gateway, as supplied by your ISP.
DNS IP Address
The DNS (Domain Name Server) IP Address provided by your
ISP. If required, additional DNS entries can be made on the
Internet Options screen.
Login
If your ISP does not use a login method (username, password) for
Internet access, leave this at the default value "None (Direct connec-
tion)"
Login Method
Otherwise, check the documentation from your ISP, select the login
method used, and enter the required data.
•
PPPoE - this is the most common login method, widely used
with DSL modems. Normally, your ISP will have provided some
software to connect and login. This software is no longer re-
quired, and should not be used.
•
PPTP - this is mainly used in Europe. You need to know the
PPTP Server address as well as your name and password.
•
•
Big Pond Cable - for Australia only.
SingTel RAS - for Singapore only.
The User Name (or account name) provided by your ISP.
Enter the password for the login name above.
Login User Name
Login Password
RAS Plan
For SingTel customers only, select the RAS plan you are on.
If using PPTP or Big Pond Cable, enter the IP address of your ISP's
server.
Server IP Address
If Enabled (default), a connection will automatically be made as
required. If disabled, you need to establish the connection manually,
using the Connect button on the Connection Details screen (accessed
from the Status screen).
Connect
automatically
Enable this if you wish an idle connection to be terminated.
If enabled, enter the idle time-out period (in minutes) in the field
provided. After the connection to your ISP has been idle for this time
period, the connection will be terminated.
Disconnect
after Idle
If not enabled, the connection will remain open until terminated
manually, or by the remote server. (Many ISPs will terminate an idle
connection.)
15
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
MAC Address
Also called Network Adapter Address or Physical Address. This is a
MAC Address
low-level identifier, as seen from the WAN port.
Normally there is no need to change this, but some ISPs require a
particular value, often that of the PC initially used for Internet access.
You can use the Copy from PC button to copy your PC's address into
this field, the Default button to insert the default value, or enter a
value directly.
16
Download from Www.Somanuals.com. All Manuals Search And Download.
Setup
LAN Screen
Use the LAN link on the main menu to reach the LAN screen. An example screen is shown
below.
Figure 8: LAN Screen
Data - LAN Screen
TCP/IP
IP address for the TW100-BRV204, as seen from the local LAN. Use
the default value unless the address is already in use or your LAN is
using a different IP address range. In the latter case, enter an unused IP
Address from within the range used by your LAN.
IP Address
The default value 255.255.255.0 is standard for small (class "C")
networks. For other networks, use the Subnet Mask for the LAN
segment to which the TW100-BRV204 is attached (the same value as
the PCs on that LAN segment).
Subnet Mask
DHCP Server
•
If Enabled, the TW100-BRV204 will allocate IP Addresses to PCs
(DHCP clients) on your LAN when they start up. The default (and
recommended) value is Enabled.
•
If you are already using a DHCP Server, this setting must be
Disabled, and the existing DHCP server must be re-configured to
treat the TW100-BRV204 as the default Gateway. See the follow-
ing section for further details.
•
The Start IP Address and Finish IP Address fields set the values
used by the DHCP server when allocating IP Addresses to DHCP
clients. This range also determines the number of DHCP clients
supported.
See the following section for further details on using DHCP.
Buttons
Save
Save the data on screen.
The "Cancel" button will discard any data you have entered and reload
the file from the TW100-BRV204.
Cancel
17
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
DHCP
What DHCP Does
A DHCP (Dynamic Host Configuration Protocol) Server allocates a valid IP address to a
DHCP Client (PC or device) upon request.
•
•
The client request is made when the client device starts up (boots).
The DHCP Server provides the Gateway and DNS addresses to the client, as well as
allocating an IP Address.
•
•
The TW100-BRV204 can act as a DHCP server.
Windows 95/98/ME and other non-Server versions of Windows will act as a DHCP client.
This is the default Windows setting for the TCP/IP network protocol. However, Windows
uses the term Obtain an IP Address automatically instead of "DHCP Client".
•
You must NOT have two (2) or more DHCP Servers on the same LAN segment. (If your
LAN does not have other Routers, this means there must only be one (1) DHCP Server on
your LAN.)
Using the TW100-BRV204 's DHCP Server
This is the default setting. The DHCP Server settings are on the LAN screen. On this screen,
you can:
•
•
Enable or Disable the TW100-BRV204 's DHCP Server function.
Set the range of IP Addresses allocated to PCs by the DHCP Server function.
You can assign Fixed IP Addresses to some devices
while using DHCP, provided that the Fixed IP Addresses
are NOT within the range used by the DHCP Server.
Using another DHCP Server
You can only use one (1) DHCP Server per LAN segment. If you wish to use another DHCP
Server, rather than the TW100-BRV204 's, the following procedure is required.
1. Disable the DHCP Server feature in the TW100-BRV204. This setting is on the LAN
screen.
2. Configure the DHCP Server to provide the TW100-BRV204 's IP Address as the Default
Gateway.
To Configure your PCs to use DHCP
This is the default setting for TCP/IP under Windows 95/98/ME.
See Chapter 4 - Client Configuration for the procedure to check these settings.
18
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 4
PC Configuration
4
This Chapter details the PC Configuration required on the local ("Internal")
LAN.
Overview
For each PC, the following may need to be configured:
•
•
TCP/IP network settings
Internet Access configuration
Windows Clients
This section describes how to configure Windows clients for Internet access via the TW100-
BRV204.
The first step is to check the PC's TCP/IP settings.
The TW100-BRV204 uses the TCP/IP network protocol for all functions, so it is essential that
the TCP/IP protocol be installed and configured on each PC.
TCP/IP Settings - Overview
If using the default TW100-BRV204 settings, and the default Windows
TCP/IP settings, no changes need to be made.
•
•
By default, the TW100-BRV204 will act as a DHCP Server, automatically providing a
suitable IP Address (and related information) to each PC when the PC boots.
For all non-Server versions of Windows, the default TCP/IP setting is to act as a DHCP
client.
If using a Fixed (specified) IP address, the following changes are re-
quired:
•
•
The Gateway must be set to the IP address of the TW100-BRV204
The DNS should be set to the address provided by your ISP.
If your LAN has a Router, the LAN Administrator must re-
configure the Router itself. Refer to Chapter 8 - Other
Features and Operations for details.
19
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Checking TCP/IP Settings - Windows 9x/ME:
3. Select Control Panel - Network. You should see a screen like the following:
Figure 9: Network Configuration
4. Select the TCP/IP protocol for your network card.
5. Click on the Properties button. You should then see a screen like the following.
Figure 10: IP Address (Win 95)
Ensure your TCP/IP settings are correct, as follows:
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting. Using this is recommended. By default, the TW100-BRV204 will act as a
DHCP Server.
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204.
Using "Specify an IP Address"
If your PC is already configured, check with your network administrator before making the
following changes:
20
Download from Www.Somanuals.com. All Manuals Search And Download.
PC Configuration
•
On the Gateway tab, enter the TW100-BRV204 's IP address in the New Gateway field
and click Add, as shown below. Your LAN administrator can advise you of the IP Address
they assigned to the TW100-BRV204.
Figure 11: Gateway Tab (Win 95/98)
•
On the DNS Configuration tab, ensure Enable DNS is selected. If the DNS Server Search
Order list is empty, enter the DNS address provided by your ISP in the fields beside the
Add button, then click Add.
Figure 12: DNS Tab (Win 95/98)
21
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Checking TCP/IP Settings - Windows NT4.0
1. Select Control Panel - Network, and, on the Protocols tab, select the TCP/IP protocol, as
shown below.
Figure 13: Windows NT4.0 - TCP/IP
2. Click the Properties button to see a screen like the one below.
22
Download from Www.Somanuals.com. All Manuals Search And Download.
PC Configuration
Figure 14: Windows NT4.0 - IP Address
3. Select the network card for your LAN.
4. Select the appropriate radio button - Obtain an IP address from a DHCP Server or Specify
an IP Address, as explained below.
Obtain an IP address from a DHCP Server
This is the default Windows setting. Using this is recommended. By default, the TW100-
BRV204 will act as a DHCP Server.
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204.
Specify an IP Address
If your PC is already configured, check with your network administrator before making the
following changes.
1. The Default Gateway must be set to the IP address of the TW100-BRV204. To set this:
•
•
Click the Advanced button on the screen above.
On the following screen, click the Add button in the Gateways panel, and enter the
TW100-BRV204 's IP address, as shown in Figure 15 below.
•
If necessary, use the Up button to make the TW100-BRV204 the first entry in the
Gateways list.
23
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 15 - Windows NT4.0 - Add Gateway
2. The DNS should be set to the address provided by your ISP, as follows:
•
•
Click the DNS tab.
On the DNS screen, shown below, click the Add button (under DNS Service Search
Order), and enter the DNS provided by your ISP.
24
Download from Www.Somanuals.com. All Manuals Search And Download.
PC Configuration
Figure 16: Windows NT4.0 - DNS
25
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Checking TCP/IP Settings - Windows 2000:
1. Select Control Panel - Network and Dial-up Connection.
2. Right - click the Local Area Connection icon and select Properties. You should see a
screen like the following:
Figure 17: Network Configuration (Win 2000)
3. Select the TCP/IP protocol for your network card.
4. Click on the Properties button. You should then see a screen like the following.
26
Download from Www.Somanuals.com. All Manuals Search And Download.
PC Configuration
Figure 18: TCP/IP Properties (Win 2000)
5. Ensure your TCP/IP settings are correct, as described below.
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting. Using this is recommended. By default, the TW100-BRV204 will act as a
DHCP Server.
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204.
Using a fixed IP Address ("Use the following IP Address")
If your PC is already configured, check with your network administrator before making the
following changes.
•
Enter the TW100-BRV204 's IP address in the Default gateway field and click OK. (Your
LAN administrator can advise you of the IP Address they assigned to the TW100-
BRV204.)
•
If the DNS Server fields are empty, select Use the following DNS server addresses, and
enter the DNS address or addresses provided by your ISP, then click OK.
27
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Checking TCP/IP Settings - Windows XP
1. Select Control Panel - Network Connection.
2. Right click the Local Area Connection and choose Properties. You should see a screen
like the following:
Figure 19: Network Configuration (Windows XP)
3. Select the TCP/IP protocol for your network card.
4. Click on the Properties button. You should then see a screen like the following.
28
Download from Www.Somanuals.com. All Manuals Search And Download.
PC Configuration
Figure 20: TCP/IP Properties (Windows XP)
5. Ensure your TCP/IP settings are correct.
Using DHCP
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting. Using this is recommended. By default, the TW100-BRV204 will act as a
DHCP Server.
Restart your PC to ensure it obtains an IP Address from the TW100-BRV204.
Using a fixed IP Address ("Use the following IP Address")
If your PC is already configured, check with your network administrator before making the
following changes.
•
In the Default gateway field, enter the TW100-BRV204 's IP address and click OK. Your
LAN administrator can advise you of the IP Address they assigned to the TW100-
BRV204.
•
If the DNS Server fields are empty, select Use the following DNS server addresses, and
enter the DNS address or addresses provided by your ISP, then click OK.
29
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Internet Access
To configure your PCs to use the TW100-BRV204 for Internet access:
•
•
Ensure that the DSL modem, Cable modem, or other permanent connection is functional.
Use the following procedure to configure your Browser to access the Internet via the LAN,
rather than by a Dial-up connection.
For Windows 9x/ME/2000
1. Select Start Menu - Settings - Control Panel - Internet Options.
2. Select the Connection tab, and click the Setup button.
3. Select "I want to set up my Internet connection manually, or I want to connect through a
local area network (LAN)" and click Next.
4. Select "I connect through a local area network (LAN)" and click Next.
5. Ensure all of the boxes on the following Local area network Internet Configuration screen
are unchecked.
6. Check the "No" option when prompted "Do you want to set up an Internet mail account
now?".
7. Click Finish to close the Internet Connection Wizard.
Setup is now completed.
For Windows XP
1. Select Start Menu - Control Panel - Network and Internet Connections.
2. Select Set up or change your Internet Connection.
3. Select the Connection tab, and click the Setup button.
4. Cancel the pop-up "Location Information" screen.
5. Click Next on the "New Connection Wizard" screen.
6. Select "Connect to the Internet" and click Next.
7. Select "Set up my connection manually" and click Next.
8. Check "Connect using a broadband connection that is always on" and click Next.
9. Click Finish to close the New Connection Wizard.
Setup is now completed.
Accessing AOL
To access AOL (America On Line) through the TW100-BRV204, the AOL for Windows
software must be configured to use TCP/IP network access, rather than a dial-up connection.
The configuration process is as follows:
•
Start the AOL for Windows communication software. Ensure that it is Version 2.5, 3.0 or
later. This procedure will not work with earlier versions.
•
•
Click the Setup button.
Select Create Location, and change the location name from "New Locality" to "TW100-
BRV204 ".
•
•
•
Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number
blank.)
Click Save, then OK.
Configuration is now complete.
Before clicking "Sign On", always ensure that you are using the "TW100-BRV204 "
location.
30
Download from Www.Somanuals.com. All Manuals Search And Download.
PC Configuration
Macintosh Clients
From your Macintosh, you can access the Internet via the TW100-BRV204. The procedure is
as follows.
1. Open the TCP/IP Control Panel.
2. Select Ethernet from the Connect via pop-up menu.
3. Select Using DHCP Server from the Configure pop-up menu. The DHCP Client ID field
can be left blank.
4. Close the TCP/IP panel, saving your settings.
Note:
If using manually assigned IP addresses instead of DHCP, the required changes are:
•
•
Set the Router Address field to the TW100-BRV204 's IP Address.
Ensure your DNS settings are correct.
Linux Clients
To access the Internet via the TW100-BRV204, it is only necessary to set the TW100-BRV204
as the "Gateway".
Ensure you are logged in as "root" before attempting any changes.
Fixed IP Address
By default, most Unix installations use a fixed IP Address. If you wish to continue using a
fixed IP Address, make the following changes to your configuration.
•
•
Set your "Default Gateway" to the IP Address of the TW100-BRV204.
Ensure your DNS (Name server) settings are correct.
To act as a DHCP Client (recommended)
The procedure below may vary according to your version of Linux and X -windows shell.
1. Start your X Windows client.
2. Select Control Panel - Network
3. Select the "Interface" entry for your Network card. Normally, this will be called "eth0".
4. Click the Edit button, set the "protocol" to "DHCP", and save this data.
5. To apply your changes
•
•
Use the "Deactivate" and "Activate" buttons, if available.
OR, restart your system.
Other Unix Systems
To access the Internet via the TW100-BRV204:
•
Ensure the "Gateway" field for your network card is set to the IP Address of the TW100-
BRV204.
•
Ensure your DNS (Name Server) settings are correct.
31
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 5
Operation and Status
5
This Chapter details the operation of the TW100-BRV204 and the status
screens.
Operation
Once both the TW100-BRV204 and the PCs are configured, operation is automatic.
However, there are some situations where additional Internet configuration may be required:
•
•
If using Internet-based Communication Applications, it may be necessary to specify
which PC receives an incoming connection. Refer to Chapter 6 - Internet Features for fur-
ther details.
Applications which use non-standard connections or port numbers may be blocked by the
TW100-BRV204 's built-in firewall. You can define such applications as Special Applica-
tions to allow them to function normally. Refer to Chapter 6 - Internet Features for
further details.
•
Some non-standard applications may require use of the DMZ feature. Refer to Chapter 6 -
Internet Features for further details.
Status Screen
Use the Status link on the main menu to view this screen.
Figure 21: Status Screen
32
Download from Www.Somanuals.com. All Manuals Search And Download.
Operation and Status
Data - Status Screen
Internet
This indicates the current connection method, as set in the Setup
Wizard.
Connection Method
This shows the connection status of the modem.
Current connection status:
Broadband Modem
Internet Connection
•
•
•
•
Active
Idle
Unknown
Failed
If there is an error, you can click the "Connection Details" button
to find out more information.
This IP Address is allocated by the ISP (Internet Service Pro-
vider).
Internet IP Address
Click this button to open a sub-window and view a detailed
description of the current connection. Depending on the type of
connection, a "log" may also be available.
"Connection Details"
Button
LAN
The IP Address of the TW100-BRV204.
IP Address
Network Mask
DHCP Server
The Network Mask (Subnet Mask) for the IP Address above.
This shows the status of the DHCP Server function - either
"Enabled" or "Disabled".
For additional information about the PCs on your LAN, and the
IP addresses allocated to them, use the PC Database option on
the Advanced menu.
System
This displays the current name of the TW100-BRV204.
Device Name
Firmware Version
The current version of the firmware installed in the TW100-
BRV204.
Clicking this button will open a Window which lists all system
details and settings.
"System Data"
Button
Buttons
View the details of the current Internet connection. The sub-
screen displayed will depend on the connection method used. See
the following sections for details of each sub-screen.
Connection Details
Display all system information in a sub-window.
System Data
Restart (reboot) the Router. You will have to wait for the restart
to be completed before continuing.
Restart Router
Update the data displayed on screen.
Refresh Screen
33
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Connection Status - PPPoE
If using PPPoE (PPP over Ethernet), a screen like the following example will be displayed
when the "Connection Details" button is clicked.
Figure 22: PPPoE Status Screen
Data - PPPoE Screen
Connection
The hardware address of this device, as seen by remote devices
on the Internet. (This is different to the hardware address seen by
devices on the local LAN.)
Physical Address
The IP Address of this device, as seen by Internet users. This
address is allocated by your ISP (Internet Service Provider).
IP Address
The Network Mask associated with the IP Address above.
Network Mask
This indicates whether or not the connection is currently estab-
lished.
PPPoE Link Status
•
If the connection does not exist, the "Connect" button can be
used to establish a connection.
•
If the connection currently exists, the "Disconnect" button
can be used to break the connection.
Connection Log
•
The Connection Log shows status messages relating to the
existing connection.
Connection Log
•
•
The most common messages are listed in the table below.
The "Clear Log" button will restart the Log, while the Re-
fresh button will update the messages shown on screen.
34
Download from Www.Somanuals.com. All Manuals Search And Download.
Operation and Status
Buttons
Connect
If not connected, establish a connection to your ISP.
If connected to your ISP, hang up the connection.
Disconnect
Clear Log
Delete all data currently in the Log. This will make it easier to
read new messages.
Update the data on screen.
Refresh
Connection Log Messages
Message
Description
Connect on Demand
Connection attempt has been triggered by the "Connect
automatically, as required" setting.
Manual connection
Connection attempt started by the "Connect" button.
Preparing line for connection attempt.
Reset physical connection
Connecting to remote
server
Attempting to connect to the ISP's server.
Remote Server located
Start PPP
ISP's Server has responded to connection attempt.
Attempting to login to ISP's Server and establish a PPP
connection.
PPP up successfully
Idle time-out reached
Able to login to ISP's Server and establish a PPP connection.
The connection has been idle for the time period specified in
the "Idle Time-out" field. The connection will now be termi-
nated.
Disconnecting
The current connection is being terminated, due to either the
"Idle Time-out" above, or "Disconnect" button being clicked.
Error: Remote Server not
found
ISP's Server did not respond. This could be a Server problem,
or a problem with the link to the Server.
Error: PPP Connection
failed
Unable to establish a PPP connection with the ISP's Server.
This could be a login problem (name or password) or a Server
problem.
Error: Connection to
Server lost
The existing connection has been lost. This could be caused
by a power failure, a link failure, or Server failure.
Error: Invalid or unknown The data received from the ISP's Server could not be proc-
packet type
essed. This could be caused by data corruption (from a bad
link), or the Server using a protocol which is not supported by
this device.
35
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Connection Status - PPTP
If using PPTP (Peer-to-Peer Tunneling Protocol), a screen like the following example will be
displayed when the "Connection Details" button is clicked.
Figure 23: PPTP Status Screen
Data - PPTP Screen
Connection
The hardware address of this device, as seen by remote devices on
the Internet. (This is different to the hardware address seen by
devices on the local LAN.)
Physical Address
The IP Address of this device, as seen by Internet users. This address
is allocated by your ISP (Internet Service Provider).
IP Address
This indicates whether or not the connection is currently established.
PPTP Status
•
If the connection does not exist, the "Connect" button can be
used to establish a connection.
•
If the connection currently exists, the "Disconnect" button can be
used to break the connection.
Connection Log
•
•
The Connection Log shows status messages relating to the
existing connection.
Connection Log
The "Clear Log" button will restart the Log, while the Refresh
button will update the messages shown on screen.
Buttons
If not connected, establish a connection to your ISP.
Connect
36
Download from Www.Somanuals.com. All Manuals Search And Download.
Operation and Status
If connected to your ISP, hang up the connection.
Disconnect
Clear Log
Delete all data currently in the Log. This will make it easier to read
new messages.
Update the data on screen.
Refresh
Connection Status - Telstra Big Pond
An example screen is shown below.
Figure 24: Telstra Big Pond Status Screen
Data - Telstra Big Pond Screen
Connection
The hardware address of this device, as seen by remote devices.
Physical Address
(This is different to the hardware address seen by devices on the
local LAN.)
The IP Address of this device, as seen by Internet users. This
address is allocated by your ISP (Internet Service Provider).
IP Address
This indicates whether or not the connection is currently estab-
lished.
Connection Status
•
•
•
If the connection does not exist, the "Connect" button can be
used to establish a connection.
If the connection currently exists, the "Disconnect" button can
be used to break the connection.
Normally, it is not necessary to use the Connect and Discon-
nect buttons unless the setting "Connect automatically, as
required" is disabled.
37
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Connection Log
•
•
The Connection Log shows status messages relating to the
existing connection.
Connection Log
The Clear Log button will restart the Log, while the Refresh
button will update the messages shown on screen.
Buttons
Connect
If not connected, establish a connection to Telstra Big Pond.
If connected to Telstra Big Pond, terminate the connection.
Disconnect
Clear Log
Delete all data currently in the Log. This will make it easier to read
new messages.
Update the data on screen.
Refresh
Connection Details - SingTel RAS
If using the SingTel RAS access method, a screen like the following example will be displayed
when the "Connection Details" button is clicked.
Figure 25: Connection Details - SingTel RAS
Data - SingTel RAS Screen
Internet
The RAS Plan which is currently used.
RAS Plan
The hardware address of this device, as seen by remote devices on
the Internet. (This is different to the hardware address seen by
devices on the local LAN.)
Physical Address
The IP Address of this device, as seen by Internet users. This address
is allocated by your ISP (Internet Service Provider).
IP Address
38
Download from Www.Somanuals.com. All Manuals Search And Download.
Operation and Status
The Network Mask associated with the IP Address above.
Network Mask
The IP Address of the remote Gateway or Router associated with the
IP Address above.
Default Gateway
The IP Address of the Domain Name Server which is currently used.
DNS IP Address
DHCP Client
This will show "Enabled" or "Disabled", depending on whether or
not this device is functioning as a DHCP client.
If "Enabled" the "Remaining lease time" field indicates when the IP
Address allocated by the DHCP Server will expire. The lease is
automatically renewed on expiry; use the "Renew" button if you wish
to manually renew the lease immediately.
Buttons
This button is only useful if the IP address shown above is allocated
automatically on connection. (Dynamic IP address). If you have a
Fixed (Static) IP address, this button has no effect.
Release/Renew
Button will display
EITHER
"Release"
OR
•
If the ISP's DHCP Server has NOT allocated an IP Address for
the TW100-BRV204, this button will say "Renew". Clicking the
"Renew" button will attempt to re-establish the connection and
obtain an IP Address from the ISP's DHCP Server.
"Renew"
•
If an IP Address has been allocated to the TW100-BRV204 (by
the ISP's DHCP Server), this button will say "Release". Clicking
the "Release" button will break the connection and release the IP
Address.
Update the data shown on screen.
Refresh
39
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Connection Details - Fixed/Dynamic IP Address
If your access method is "Direct" (no login), a screen like the following example will be
displayed when the "Connection Details" button is clicked.
Figure 26: Connection Details - Fixed/Dynamic IP Address
Data - Fixed/Dynamic IP address Screen
Internet
The hardware address of this device, as seen by remote devices on
the Internet. (This is different to the hardware address seen by
devices on the local LAN.)
Physical Address
The IP Address of this device, as seen by Internet users. This address
is allocated by your ISP (Internet Service Provider).
IP Address
The Network Mask associated with the IP Address above.
Network Mask
The IP Address of the remote Gateway or Router associated with the
IP Address above.
Default Gateway
The IP Address of the Domain Name Server which is currently used.
DNS IP Address
DHCP Client
This will show "Enabled" or "Disabled", depending on whether or
not this device is functioning as a DHCP client.
If "Enabled" the "Remaining lease time" field indicates when the IP
Address allocated by the DHCP Server will expire. The lease is
automatically renewed on expiry; use the "Renew" button if you wish
to manually renew the lease immediately.
Buttons
This button is only useful if the IP address shown above is allocated
automatically on connection. (Dynamic IP address). If you have a
Fixed (Static) IP address, this button has no effect.
Release/Renew
Button will display
EITHER
"Release"
40
Download from Www.Somanuals.com. All Manuals Search And Download.
Operation and Status
OR
"Renew"
•
•
If the ISP's DHCP Server has NOT allocated an IP Address for
the TW100-BRV204, this button will say "Renew". Clicking the
"Renew" button will attempt to re-establish the connection and
obtain an IP Address from the ISP's DHCP Server.
If an IP Address has been allocated to the TW100-BRV204 (by
the ISP's DHCP Server), this button will say "Release". Clicking
the "Release" button will break the connection and release the IP
Address.
Update the data shown on screen.
Refresh
41
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 6
Internet Features
6
This Chapter explains when and how to use the TW100-BRV204's "Internet"
Features.
Overview
The following advanced features are covered in this Chapter:
•
Advanced Internet
•
•
•
•
Communication Applications
Special Applications
DMZ
URL filter
•
•
•
Dynamic DNS
Virtual Servers
Options
Advanced Internet Screen
Figure 27: Internet Screen
This screen allows configuration of all advanced features relating to Internet access.
•
•
•
•
Communication Applications
Special Applications
DMZ
URL filter
42
Download from Www.Somanuals.com. All Manuals Search And Download.
Internet Features
Communication Applications
Most applications are supported transparently by the TW100-BRV204. But sometimes it is not
clear which PC should receive an incoming connection. This problem could arise with the
Communication Applications listed on this screen.
If this problem arises, you can use this screen to set which PC should receive an incoming
connection, as described below.
Communication Applications
This lists applications which may generate incoming connections,
where the destination PC (on your local LAN) is unknown.
Select an Application
This lists the PCs on your LAN.
Send incoming calls to
•
•
•
If necessary, you can add PCs manually, using the "PC
Database" option on the advanced menu.
For each application listed above, you can choose a destina-
tion PC.
There is no need to "Save" after each change; you can set the
destination PC for each application, then click "Save".
Special Applications
If you use Internet applications which use non-standard connections or port numbers, you may
find that they do not function correctly because they are blocked by the TW100-BRV204 's
firewall. In this case, you can define the application as a "Special Application".
Special Applications Screen
This screen can be reached by clicking the Special Applications button on the Advanced
Internet screen.
You can then define your Special Applications. You will need detailed information about the
application; this is normally available from the supplier of the application.
Also, note that the terms "Incoming" and "Outgoing" on this screen refer to traffic from the
client (PC) viewpoint
43
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 28: Special Applications Screen
Data - Special Applications Screen
Use this to Enable or Disable this Special Application as required.
Enter a descriptive name to identify this Special Application.
Checkbox
Name
•
Type - Select the protocol (TCP or UDP) used when you receive data
from the special application or service. (Note: Some applications use
different protocols for outgoing and incoming data).
Incoming
Ports
•
Start - Enter the beginning of the range of port numbers used by the
application server, for data you receive. If the application uses a single
port number, enter it in both the "Start" and "Finish" fields.
•
•
•
Finish - Enter the end of the range of port numbers used by the applica-
tion server, for data you receive.
Type - Select the protocol (TCP or UDP) used when you send data to
the remote system or service.
Outgoing
Ports
Start - Enter the beginning of the range of port numbers used by the
application server, for data you send to it. If the application uses a sin-
gle port number, enter it in both the "Start" and "Finish" fields.
•
Finish - Enter the end of the range of port numbers used by the applica-
tion server, for data you send to it. If the application uses a single port
number, enter it in both the "Start" and "Finish" fields.
Using a Special Application
•
Configure the Special Applications screen as required.
•
On your PC, use the application normally. Remember that only one (1) PC can use each
Special application at any time. Also, when 1 PC is finished using a particular Special Ap-
plication, there may need to be a "Time-out" before another PC can use the same Special
Application. The "Time-out" period may be up to 3 minutes.
44
Download from Www.Somanuals.com. All Manuals Search And Download.
Internet Features
If an application still cannot function correctly,
try using the "DMZ" feature.
DMZ
This feature, if enabled, allows one (1) computer on your LAN to be exposed to all users on
the Internet, allowing unrestricted 2-way communication between the "DMZ PC" and other
Internet users or Servers.
•
•
•
•
This allows almost any application to be used on the "DMZ PC".
The "DMZ PC" will receive all "Unknown" connections and data.
If the DMZ feature is enabled, you must select the PC to be used as the "DMZ PC".
The DMZ feature can be Enabled and Disabled on the Advanced Internet screen.
The "DMZ PC" is effectively outside the Firewall, mak-
ing it more vulnerable to attacks. For this reason, you
should only enable the DMZ feature when required.
URL Filter
The URL Filter allows you to block access to undesirable Web site
•
•
•
To use this feature, you must define "filter strings". If the "filter string" appears in a
requested URL, the request is blocked.
Enabling the URL Filter also affects the Internet Access Log. If Enabled, the "Destination"
field in the log will display the URL. Otherwise, it will display the IP Address.
The URL Filter can be Enabled or Disabled on the Advanced Internet screen.
45
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
URL Filter Screen
Click the "Configure URL Filter" button on the Advanced Internet screen to access the URL
Filter screen. An example screen is shown below.
Figure 29: URL Filter Screen
Data - URL Filter Screen
Filter Strings
This lists any existing entries. If you have not entered any values, this
list will be empty.
Current Entries
To add an entry to the list, enter it here, and click the "Add" button.
An entry may be a Domain name (e.g. www.trash.com) or simply a
string. (e.g. ads/ )
Add Filter String
Any URL which contains ANY entry ANYWHERE in the URL will
be blocked.
Buttons
Use these buttons to delete the selected entry or all entries, as required.
Multiple entries can be selected by holding down the CTRL key while
selecting. (On the Macintosh, hold the SHIFT key while selecting.)
Delete/Delete All
Use this to add the current Filter String to the site list.
Add
46
Download from Www.Somanuals.com. All Manuals Search And Download.
Internet Features
Dynamic DNS (Domain Name Server)
This free service is very useful when combined with the Virtual Server feature. It allows
Internet users to connect to your Virtual Servers using a URL, rather than an IP Address.
This also solves the problem of having a dynamic IP address. With a dynamic IP address, your
IP address may change whenever you connect, which makes it difficult to connect to you.
The Service works as follows:
1. You must register for the service at http://www.dyndns.org (Registration is free). Your
password will be E-mailed to you.
2. After registration, use the "Create New Host" option (at www.dyndns.org) to request your
desired Domain name.
3. Enter your data from www.dyndns.org in the TW100-BRV204 's DDNS screen.
4. The TW100-BRV204 will then automatically ensure that your current IP Address is
recorded at http://www.dyndns.org
5. From the Internet, users will be able to connect to your Virtual Servers (or DMZ PC)
using your Domain name, as shown on this screen.
Dynamic DNS Screen
Select Internet on the main menu, then Dynamic DNS, to see a screen like the following:
Figure 30: DDNS Screen
Data - Dynamic DNS Screen
DDNS Service
DDNS Service
•
You must sign up first to create a new account before using the
service. The service is free.
•
•
Click this link to connect to the www.dyndns.org Web site.
Your initial password will be E-mailed to you; you can change
this later if you wish.
•
After registration, use the "Create New Host" link (on the
www.dyndns.org Web site) to request a domain name.
47
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
DDNS Data
Enter the "User name" specified at the www.dyndns.org Web site
when you registered.
User Name
Enter your current password for www.dyndns.org
Password
•
Enter your domain name, as allocated at www.dyndns.org.
Domain Name
•
The name should consist only of letters and the hyphen (dash).
Using any other characters may cause problems..
This message is returned by the DDNS Server at www.dyndns.org
DDNS Status
•
Normally, this message should be "Update successful" (current
IP address was updated on the www.dyndns.org server).
•
If the message is "No host", this indicates the host name entered
was not allocated to you. You need to connect to
www.dyndns.org and correct this problem.
48
Download from Www.Somanuals.com. All Manuals Search And Download.
Internet Features
Virtual Servers
This feature allows you to make Servers on your LAN accessible to Internet users. Normally,
Internet users would not be able to access a server on your LAN because:
•
•
Your Server does not have a valid external IP Address.
Attempts to connect to devices on your LAN are blocked by the firewall in this device.
The "Virtual Server" feature solves these problems and allows Internet users to connect to your
servers, as illustrated below.
Figure 31: Virtual Servers
IP Address seen by Internet Users
Note that, in this illustration, both Internet users are connecting to the same IP Address, but
using different protocols.
To Internet users, all virtual Servers on your LAN have the same IP Address.
This IP Address is allocated by your ISP.
This address should be static, rather than dynamic, to make it easier for Internet users to
connect to your Servers.
However, you can use the DDNS (Dynamic DNS) feature to allow users to connect to your
Virtual Servers using a URL, instead of an IP Address.
49
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Virtual Servers Screen
The Virtual Servers screen is reached by the Virtual Servers link on the Internet menu. An
example screen is shown below.
Figure 32: Virtual Servers Screen
This screen lists a number of pre-defined Servers,. providing a quick and convenient method to
set up the common server types.
Data - Virtual Servers Screen
Servers
This lists a number of pre-defined Servers, plus any Servers you
have defined. Details of the selected Server are shown in the
"Properties" area.
Servers
Properties
Use this to Enable or Disable support for this Server, as required.
Enable
•
If Enabled, any incoming connections will be forwarded to the
selected PC.
•
If Disabled, any incoming connection attempts will be blocked.
Select the PC for this Server. The PC must be running the appro-
priate Server software.
PC (Server)
Defining your own Virtual Servers
If the type of Server you wish to use is not listed on the Virtual Servers screen, you can use the
Firewall Rules to allow particular incoming traffic and forward it to a specified PC (Server).
Connecting to the Virtual Servers
Once configured, anyone on the Internet can connect to your Virtual Servers. They must use
the Internet IP Address (the IP Address allocated to you by your ISP).
e.g.
http://203.70.212.52
ftp://203.70.212.52
50
Download from Www.Somanuals.com. All Manuals Search And Download.
Internet Features
It is more convenient if you are using a Fixed IP Address from your ISP, rather than Dynamic.
However, you can use the Dynamic DNS feature, described in the following section, to allow
users to connect to your Virtual Servers using a URL, rather than an IP Address.
Options
This screen allows advanced users to enter or change a number of settings. For normal opera-
tion, there is no need to use this screen or change any settings.
Figure 33: Options Screen
Data - Options Screen
Backup DNS
Enter the IP Address of the DNS (Domain Name Servers) here. These
DNS will be used only if the primary DNS is unavailable.
IP Address
MTU
MTU (Maximum Transmission Unit) value should only be changed if
advised to do so by Technical Support.
MTU size
•
•
Enter a value between 1 and 1500.
This device will still auto-negotiate with the remote server, to set
the MTU size. The smaller of the 2 values (auto-negotiated, or en-
tered here) will be used.
•
For direct connections (not PPPoE or PPTP), the MTU used is
always 1500.
51
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 7
Security Configuration
7
This Chapter explains the settings available via the security configuration
section of the "Security" menu.
Overview
The following advanced configurations are provided.
•
•
•
•
•
•
•
Admin Login
Access Control
Firewall Rules
Logs
Security Options
Scheduling
Services
Admin Login
The Admin Login screen allows you to assign a user name and password to the TW100-
BRV204.
Figure 34: Admin Login Screen
1. The default login name is "admin". Change this to the desired value.
2. The default password is blank (no password). Enter the desired password in the New
Password and Verify Password fields.
3. Save your changes.
You will see a login prompt when you connect to the TW100-BRV204, as shown below.
52
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Figure 35: Password Dialog
Enter the "User Name" and "Password" you set on the Admin Login screen above.
53
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Access Control
This feature is accessed by the Access Control link on the Security menu.
The Access Control feature allows administrators to restrict the level of Internet Access avail-
able to PCs on your LAN. With the default settings, everyone has unrestricted Internet access.
To use this feature:
1. Set the desired restrictions on the "Default" group. All PCs are in the "Default" group
unless explicitly moved to another group.
2. Set the desired restrictions on the other groups ("Group 1", "Group 2", "Group 3" and
"Group 4") as needed.
3. Assign PC to the groups as required.
Restrictions are imposed by blocking "Services", or types of
connections. All common Services are pre-defined.
If required, you can also define your own Services.
Access Control Screen
To view this screen, select the Access Control link on the Security menu.
Figure 36: Access Control Screen
Data - Access Control Screen
Group
Select the desired Group. The screen will update to display the
settings for the selected Group. Groups are named "Default",
"Group 1", "Group 2", "Group 3" and "Group 4", and cannot be re-
named.
Group
54
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Click this button to add or remove members from the current
Group.
"Members" Button
•
If the current group is "Default", then members can not be
added or deleted. This group contains PCs not allocated to any
other group.
•
•
To remove PCs from the Default Group, assign them to an-
other Group.
To assign PCs to the Default Group, delete them from the
Group they are currently in.
See the following section for details of the Group Members screen.
Internet Access
Select the desired options for the current group:
Restrictions
•
•
•
None - Nothing is blocked. Use this to create the least restric-
tive group.
Block all Internet access - All traffic via the WAN port is
blocked. Use this to create the most restrictive group.
Block selected Services - You can select which Services are to
block. Use this to gain fine control over the Internet access for
a group.
If Internet access is being blocked, you can choose to apply the
blocking only during scheduled times. (If access is not blocked, no
Scheduling is possible, and this setting has no effect.)
Block by Schedule
Services
This lists all defined Services. Select the Services you wish to
block. To select multiple services, hold the CTRL key while
selecting. (On the Macintosh, hold the SHIFT key rather than
CTRL.)
Buttons
Click this button to add or remove members from the current
Group.
Members
If the current group is "Default", then members can not be added or
deleted. This group contains PCs not allocated to any other group.
See the following section for details of the Group Members screen.
Save the data on screen.
Save
Reverse any changes made since the last "Save".
Cancel
View Log
Click this to open a sub-window where you can view the "Access
Control" log. This log shows attempted Internet accesses which
have been blocked by the Access Control feature.
Click this to clear and restart the "Access Control" log, making new
entries easier to read.
Clear Log
55
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Group Members Screen
This screen is displayed when the Members button on the Access Control screen is clicked.
Figure 37: Group Members
Use this screen to add or remove members (PCs) from the current group.
•
The "Del >>" button will remove the selected PC (in the Members list) from the current
group.
•
The "<< Add" button will add the selected PC (in the Other PCs list) to the current group.
PCs not assigned to any group will be in the
"Default" group.
PCs deleted from any other Group will be added
to the "Default" group.
Access Control Log
To check the operation of the Access Control feature, an Access Control Log is provided.
Click the View Log button on the Access Control screen to view this log.
This log shows attempted Internet accesses which have been blocked by the Access Control
function.
Data shown in this log is as follows:
Date and Time of the attempted access.
Date/Time
Name
If known, the name of the PC whose access was blocked. This
name is taken from the Network Clients database
The IP Address of the PC or device whose access request was
blocked
Source IP address
MAC address
Destination
The hardware or physical address of the PC or device whose access
request was blocked
The destination URL or IP address
56
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Firewall Rules
For normal operation and LAN protection, it is not necessary to use this screen.
The Firewall will always block DoS (Denial of Service) attacks. A DoS attack does not attempt
to steal data or damage your PCs, but overloads your Internet connection so you can not use it
- the service is unavailable.
As well, you can use this screen to create Firewall rules to block or allow specific traffic. But
Incorrect configuration may cause serious problems.
This feature is for advanced administrators only!
Firewall Rules Screen
Click the Firewall Rules option on the Security menu to see a screen like the following exam-
ple. This example contains two (2) rules for outgoing traffic.
Since the default rule for outgoing (LAN => WAN) traffic is
"Allow", having an "Allow" rule for LAN => WAN only makes
sense in combination with another rule.
For example, the screen below shows a rule blocking all traffic to
a MSN Game Server, followed by another rule allowing access by
a specific PC.
Figure 38: Firewall Rules Screen
Data - Firewall Rules Screen
Rule List
Select the desired option; the screen will update and list any current
rules. If you have not defined any rules, the list will be empty.
View Rules for ..
57
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
For each rule, the following data is shown:
Data
•
•
Name - The name you assigned to the rule.
Source - The traffic covered by this rule, defined by the source IP
address. If the IP address is followed by ... this indicates there is
range of IP addresses, rather than a single address.
•
•
Destination - The traffic covered by this rule, defined by destina-
tion IP address. If the IP address is followed by ... this indicates
there is range of IP addresses, rather than a single address.
Action - Action will be "Forward" or "Block"
To add a new rule, click the "Add" button, and complete the resulting
screen. See the following section for more details.
Add
To Edit or modify an existing rule, select it and click the "Edit" button.
Edit
There are 2 ways to change the order of rules
Move
•
•
Use the up and down indicators on the right to move the selected
rule. You must confirm your changes by clicking "OK". If you
change your mind before clicking "OK", click "Cancel" to reverse
your changes.
Click "Move" to directly specify a new location for the selected
rule.
To delete an existing rule, select it and click the "Delete" button.
Delete
Clicking the "View Log" button will open a new window and display
the Firewall log.
View Log
Clicking the "System Rules" button will open a new window and
display the default firewall rules currently applied by the system. These
rules cannot be edited, but any rules you create will take precedence
over the default rules.
System Rules
58
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Define Firewall Rule
Clicking the "Add" button in the Firewall Rules screen will display a screen like the example
below.
Figure 39: Define Firewall Rule
Data - Define Firewall Rule Screen
Enter a suitable name for this rule.
Name
Type
This determines the source and destination ports for traffic
covered by this rule. Select the desired option.
These settings determine which traffic, based on their source IP
address, is covered by this rule.
Source IP
Select the desired option:
•
•
Any - All traffic from the source port is covered by this rule.
Single address - Enter the required IP address in the "Start IP
address" field". You can ignore the "Subnet Mask" field.
•
•
Range address - If this option is selected, you must complete
both the "Start IP address" and "Finish IP address" fields.
You can ignore the "Subnet Mask" field.
Subnet address - If this option is selected, enter the required
mask in the "Subnet Mask" field.
59
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
These settings determine which traffic, based on their destination
IP address, is covered by this rule.
Dest IP
Select the desired option:
•
•
Any - All traffic from the source port is covered by this rule.
Single address - Enter the required IP address in the "Start IP
address" field". You can ignore the "Subnet Mask" field.
•
•
Range address - If this option is selected, you must complete
both the "Start IP address" and "Finish IP address" fields.
You can ignore the "Subnet Mask" field.
Subnet address - If this option is selected, enter the required
mask in the "Subnet Mask" field.
Select the desired Service or Services. This determines which
packets are covered by this rule, based on the protocol (TPC or
UDP) and port number. If necessary, you can define a new
Service on the "Services" screen, by defining the protocols and
port numbers used by the Service.
Services
Select the desired action for packets covered by this rule:
Action
Log
This determines whether packets covered by this rule are logged.
Select the desired option.
60
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Logs
The Logs record various types of activity on the TW100-BRV204. This data is useful for
troubleshooting, but enabling all logs will generate a large amount of data and adversely affect
performance.
Since only a limited amount of log data can be stored in the TW100-BRV204, log data can
also be E-mailed to your PC or sent to a Syslog Server.
Figure 40: Logs Screen
Data - Logs Screen
Enable Logs
If enabled, this log will show details of DoS (Denial of Service)
attacks which have been blocked by the built-in Firewall.
DoS Attacks
If selected, Outgoing Internet connections are logged. Normally,
the (Internet) "Destination" will be shown as an IP address. But if
the "URL Filter" is enabled, the "Destination" will be shown as a
URL.
Internet Connections
If enabled, the log will include attempted outgoing connections
which have been blocked by the "Access Control" feature.
Access Control
61
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
If enabled, the log will details of packets blocked by user-defined
Firewall rules. Logging can be set for each rule individually.
Only rules which have logging enabled will be included.
Firewall Rules
If enabled, the VPN log will record incoming and outgoing VPN
connections.
VPN
Timezone
Select the correct Timezone for your location. This is required for
the date/time shown on the logs to be correct.
Timezone
If your location uses Daylight Saving, you should enable this
when daylight saving starts, and disable it when daylight saving
finishes.
Enable Daylight
Saving
E-Mail Logs
If enabled, an E-mail will be sent immediately if a DoS (Denial of
Service) attack is detected. If enabled, the E-mail address infor-
mation must be provided.
Send E-mail alert
You can choose to have the logs E-mailed to you, by enabling
either or both checkboxes. If enabled, the Log will send to the
specified E-mail address. The interval between E-mails is deter-
mined by the "Send" setting.
E-mail Logs
Send
Select the desired option for sending the log by E-mail.
•
•
When log is full - The time is not fixed. The log will be sent
when the log is full, which will depend on the volume of traf-
fic.
Every day, Every Monday ... - The log is sent on the
interval specified.
•
If "Every day" is selected, the log is sent at the time
specified.
•
If the day is specified, the log is sent once per week, on
the specified day.
•
•
Select the time of day you wish the E-mail to be sent.
If the log is full before the time specified to send it, it
will be sent regardless of the day and time specified.
Enter the E-mail address the Log is to be sent to. The E-mail will
also show this address as the Sender's address.
E-mail Address
Subject
Enter the text string to be shown in the "Subject" field for the E-
mail.
Enter the address or IP address of the SMTP (Simple Mail Trans-
port Protocol) Server you use for outgoing E-mail.
SMTP Server
Port No.
Enter the port number used to connect to the SMTP Server. The
default value is 25.
Syslog Server
Enable Syslog
Syslog Server
Include
If enabled, log data will be sent to your Syslog Server.
Enter the IP address of your Syslog Server.
Select the logs you wish to be included.
62
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Security Options
This screen allows you to set Firewall and other security-related options.
Figure 41: Security Options Screen
Data - Security Options Screen
SPI Firewall
If enabled, DoS (Denial of Service) attacks will be detected and
blocked. The default is enabled. It is strongly recommended that this
setting be left enabled.
Enable DoS
Firewall
Note:
•
A DoS attack does not attempt to steal data or damage your PCs,
but overloads your Internet connection so you can not use it - the
service is unavailable.
•
This device uses "Stateful Inspection" technology. This system can
detect situations where individual TCP/IP packets are valid, but
collectively they become a DoS attack.
This setting affects the number of "half-open" connections allowed.
Threshold
•
•
•
A "half-open" connection arises when a remote client contacts the
Server with a connection request, but then does not reply to the
Server's response.
While the optimum number of "half-open" connections allowed
(the "Threshold") depends on many factors, the most important
factor is the available bandwidth of your Internet connection.
Select the setting to match the bandwidth of your Internet connec-
tion.
63
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Options
The ICMP protocol is used by the "ping" and "trace route" programs,
and by network monitoring and diagnostic programs.
Respond to
ICMP
•
If checked, the TW100-BRV204 will respond to ICMP packets
received from the Internet.
•
If not checked, ICMP packets from the Internet will be ignored.
Disabling this option provides a slight increase in security.
The IPSec protocol is used to establish a secure connection, and is
widely used by VPN (Virtual Private Networking) programs.
Allow IPsec
Allow PPTP
Allow L2TP
•
•
If checked, IPSec connections are allowed.
If not checked, IPSec connections are blocked.
PPTP (Point to Point Tunneling Protocol) is widely used by VPN
(Virtual Private Networking) programs.
•
•
If checked, PPTP connections are allowed.
If not checked, PPTP connections are blocked.
L2TP is a protocol developed by Cisco for VPNs (Virtual Private
Networks).
•
•
If checked, L2TP connections are allowed.
If not checked, L2TP connections are blocked.
If enabled, TFTP (Trivial FTP) connections can be made to this device.
Allow TFTP
firmware up-
grade
•
TFTP can be used to upgrade the firmware. This is normally not
required, and should not be enabled unless necessary.
•
You must obtain the firmware upgrade file first; instructions for
using TFTP will be available with the upgrade.
64
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Scheduling
•
•
This schedule can be (optionally) applied to any Access Control Group.
Blocking will be performed during the scheduled time (between the "Start" and "Finish"
times.)
•
•
•
Two (2) separate sessions or periods can be defined.
Times must be entered using a 24 hr clock.
If the time for a particular day is blank, no action will be performed.
Define Schedule Screen
This screen is accessed by the Scheduling link on the Security menu.
Figure 42: Define Schedule Screen
Data - Define Schedule Screen
Each day of the week can scheduled independently.
Day
Two (2) separate sessions or periods can be defined. Session 2 can be
left blank if not required.
Session 1
Session 2
Enter the start using a 24 hr clock.
Start Time
Enter the finish time using a 24 hr clock.
Finish Time
65
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Services
Services are used in defining traffic to be blocked or allowed by the Access Control or Fire-
wall Rules features. Many common Services are pre-defined, but you can also define your own
services if required.
To view the Services screen, select the Services link on the Security menu.
Figure 43: Services Screen
Data - Services Screen
Available Services
This lists all the available services.
Available Services
"Delete" button
Use this to delete any Service you have added. Pre-defined Services
can not be deleted.
Add New Service
Name
Enter a descriptive name to identify this service.
Select the protocol (TCP, UDP, ICMP) used to the remote system or
service.
Type
For TCP and UDP Services, enter the beginning of the range of port
numbers used by the service. If the service uses a single port number,
enter it in both the "Start" and "Finish" fields.
Start Port
Finish Port
ICMP Type
For TCP and UDP Services, enter the end of the range of port num-
bers used by the service. If the service uses a single port number,
enter it in both the "Start" and "Finish" fields.
For ICMP Services, enter the type number of the required service.
66
Download from Www.Somanuals.com. All Manuals Search And Download.
Security Configuration
Buttons
Delete
Add
Delete the selected service from the list.
Add a new entry to the Service list, using the data shown in the "Add
New Service" area on screen.
Clear the " Add New Service " area, ready for entering data for a new
Service.
Cancel
67
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 8
VPN
8
This Chapter describes the VPN capabilities and configuration required for
common situations.
Overview
This section describes the VPN (Virtual Private Network) support provided by your TW100-
BRV204.
A VPN (Virtual Private Network) provides a secure connection between 2 points, over an
insecure network - typically the Internet. This secure connection is called a VPN Tunnel.
There are many standards and protocols for VPNs. The standard implemented in the TW100-
BRV204 is IPSec.
IPSec
IPSec is a near-ubiquitous VPN security standard, designed for use with TCP/IP networks. It
works at the packet level, and authenticates and encrypts all packets traveling over the VPN
Tunnel. Thus, it does not matter what applications are used on your PC. Any application can
use the VPN like any other network connection.
IPsec VPNs exchange information through logical connections called SAs (Security Associa-
tions). An SA is simply a definition of the protocols, algorithms and keys used between the
two VPN devices (endpoints).
Each IPsec VPN has two SAs - one in each direction. If IKE (Internet Key Exchange) is used
to generate and exchange keys, there are also SA's for the IKE connection as well as the IPsec
connection.
There are two security modes possible with IPSec:
•
Transport Mode - the payload (data) part of the packet is encapsulated through encryp-
tion but the IP header remains in the clear (unchanged).
The TW100-BRV204 does NOT support Transport Mode.
•
Tunnel Mode - everything is encapsulated, including the original IP header, and a new IP
header is generated. Only the new header in the clear (i.e. not protected). This system pro-
vides enhanced security.
The TW100-BRV204 always uses Tunnel Mode.
IKE
IKE (Internet Key Exchange) is an optional, but widely used, component of IPsec. IKE pro-
vides a method of negotiating and generating the keys and IDs required by IPSec. If using IKE,
only a single key is required to be provided during configuration. Also, IKE supports using
Certificates (provided by CAs - Certification Authorities) to authenticate the identify of the
remote user or gateway.
If IKE is NOT used, then all keys and IDs (SPIs) must be entered manually, and Certificates
can NOT be used. This is called a "Manual Key Exchange".
When using IKE, there are 2 phases to establishing the VPN tunnel:
68
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
•
•
Phase I is the negotiation and establishment of the IKE connection.
Phase II is the negotiation and establishment of the IPsec connection.
Because the IKE and IPsec connections are separate, they have different SAs (security associa-
tions).
Policies
VPN configuration settings are stored in Policies.
Each policy defines:
•
•
•
•
The address of the remote VPN endpoint
The traffic which is allowed to use the VPN connection.
The parameters (settings) for the IPsec SA (Security Association)
If IKE is used, the parameters (settings) for the IKE SA (Security Association)
Generally, you will need at least one (1) VPN Policy for each remote site for which you wish
to establish VPN connections.
It is possible, and sometimes necessary, to have multiple Policies for the same remote site. In
this case, the order (sequence) of the policies is important. The policies are examined in turn,
and the first matching policy will be used.
VPN Configuration
The general rule is that each endpoint must have matching Policies, as follows:
Each VPN endpoint must be configured to initiate or accept con-
nections to the remote VPN client or Gateway.
Remote VPN address
Usually, this requires having a fixed Internet IP address. However,
it is possible for a VPN Gateway to accept incoming connections
from a remote client where the client's IP address is not known in
advance.
This determines which outgoing traffic will cause a VPN connec-
tion to be established, and which incoming traffic will be accepted.
Each endpoint must be configured to pass and accept the desired
traffic from the remote endpoint.
Traffic Selector
If connecting 2 LANs, this requires that:
•
Each endpoint must be aware of the IP addresses used on the
other endpoint.
•
The 2 LANs MUST use different IP address ranges.
If using IKE (recommended), the IKE parameters must match
(except for the SA lifetime, which can be different).
IKE parameters
IPsec parameters
The IPsec parameters at each endpoint must match.
69
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Common VPN Situations
VPN Pass-through
Figure 44: VPN Pass-through
Here, a PC on the LAN behind the Router/Gateway is using VPN software, but the
Router/Gateway is NOT acting as a VPN endpoint. It is only allowing the VPN connection.
•
•
The PC software can use any VPN protocol supported by the remote VPN.
The remote VPN Server must support client PCs which are behind a NAT router, and so
have an IP address which is not valid on the Internet.
•
The Router/Gateway requires no VPN configuration, since it is not acting as a VPN
endpoint.
Client PC to VPN Gateway
Figure 45: Client PC to VPN Server
In this situation, the PC must run appropriate VPN client software in order to connect, via the
Internet, to the TW100-BRV204. Once connected, the client PC has the same access to LAN
resources as PCs on the local LAN (unless restricted by the network administrator).
•
IPsec is not the only protocol which can be used in this situation, but the TW100-BRV204
supports IPsec ONLY.
•
Windows 2000 and Windows XP include a suitable IPsec VPN client program. Configura-
tion of this client program for use with the TW100-BRV204 is covered later in this
document.
70
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Connecting 2 LANs via VPN
Figure 46: Connecting 2 VPN Gateways
This allows two (2) LANs to be connected. PCs on each endpoint gain secure access to the
remote LAN.
•
•
The 2 LANs MUST use different IP address ranges.
The VPN Policies at each end determine when a VPN tunnel will be established, and what
systems on the remote LAN can be accessed once the VPN connection is established.
•
It is possible to have simultaneous VPN connections to many remote sites.
71
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
VPN Configuration
This section covers the configuration required on the TW100-BRV204 when using Manual
Key Exchange (Manual Policies) or IKE (Automatic Policies).
Details of using Certificates are covered in a later section.
VPN Policies Screen
To view this screen, select VPN Policies from the VPN menu. This screen lists all existing
VPN policies. If no policies exist, the list will be empty.
Figure 47: VPN Policies
Note that the order of policies is important if you have more than one policy for particular
traffic. In that case, the first matching policy (for the traffic under consideration) will be used.
Data - VPN Policies Screen
VPN List
The name of the policy. When creating a policy, you should select a
suitable name.
Policy Name
This indicates whether or not the policy is currently enabled. Use the
"Enable/Disable" button to toggle the state of the selected policy.
Enable
The IP address of the remote VPN endpoint (Gateway or client).
Remote VPN
Endpoint
This will indicate "Manual" (manual key exchange) or "IKE" (Internet
Key Exchange)
Key Type
Operations
To add a new policy, click the "Add" button. See the following section
for details.
Add
To Edit or modify an existing policy, select it and click the "Edit"
button.
Edit
72
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
There are 2 ways to change the order of policies:
Move
•
Use the up and down indicators on the right to move the selected
row. You must confirm your changes by clicking "OK". If you
change your mind before clicking "OK", click "Cancel" to reverse
your changes.
•
Click "Move" to directly specify a new location for the selected
policy.
Use this to toggle the On/Off state of the selected policy.
Enable/Disable
Copy
If you wish to create a policy which is similar to an existing policy,
select the policy and click the "Copy" button.
Remember that the new policy must have a different name, and there can
only be one active (enabled) policy for each remote VPN endpoint.
To delete an exiting policy, select it and click the "Delete" button.
Delete
Clicking the "View Log" button will open a new window and display the
VPN log.
View Log
Adding a New Policy
1. To create a new VPN Policy, click the "Add" button on the VPN Policies screen. This will
start the VPN Wizard, as shown below.
Figure 48: VPN Wizard - Start
•
•
If you prefer to use a single setup screen instead of a Wizard, click the Setup Screen
button. This is recommended for experienced users only.
Otherwise, click Next to continue. You will see a screen like the following.
73
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 49: VPN Wizard - General
General Settings
Enter a suitable name. This name is not supplied to the remote VPN. It is
used only to help you manage the policies.
Policy Name
Enable or disable the policy as required. For each remote VPN, only 1
policy can be enabled at any time.
Enable Policy
The Internet IP address of the remote VPN endpoint (Gateway or client).
Remote VPN
Endpoint
•
•
•
Dynamic. Select this if the Internet IP address is unknown. In this
case, only incoming connections are possible.
Fixed. Select this if the remote endpoint has a fixed Internet IP
address, and enter the IP address.
Domain Name. Select this if the remote endpoint has a Domain
Name, and enter the Domain Name.
Select Manually assigned or IKE (Internet Key Exchange) as required.
Keys
If you are setting up both endpoints, using IKE is recommended.
2. Click Next to continue. You will see a screen like the following:
74
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 50: VPN Wizard - Traffic Selector
•
•
•
For outgoing VPN connections, these settings determine which traffic will cause a VPN
tunnel to be created, and which traffic will be sent through the tunnel.
For incoming VPN connections, these settings determine which systems on your local
LAN will be available to the remote endpoint.
The 2 VPN endpoints MUST use different address ranges.
If the addresses were in the same range, traffic intended for the remote VPN would be
considered local LAN traffic. So it would not be forwarded to the Gateway.
Local IP addresses
•
Any - no additional data is required. Any IP address is accept-
able.
Type
•
For outgoing connections, this allows any PC on the LAN to
use the VPN tunnel.
•
For incoming connections, this allows an PC using the re-
mote endpoint to access any PC on your LAN.
•
•
Single address - enter an IP address in the "Start IP address"
field.
Range address - enter the starting IP address in the "Start IP
address" field, and the finish IP address in the "Finish IP ad-
dress" field.
•
Subnet address - enter the desired IP address in the "Start IP
address" field, and the network mask in the "Subnet Mask" field.
The remote VPN must have these IP addresses entered as it's "Re-
mote" addresses.
75
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Remote IP addresses
•
Single address - enter an IP address in the "Start IP address"
field.
Type
•
Range address - enter the starting IP address in the "Start IP
address" field, and the finish IP address in the "Finish IP ad-
dress" field.
•
Subnet address - enter the desired IP address in the "Start IP
address" field, and the network mask in the "Subnet Mask" field.
The remote VPN should have these IP addresses entered as it's
"Local" addresses.
3. Click Next to continue. The screen you will see depends on whether you previously
selected "Manual Key Exchange" or "IKE".
Manual Key Exchange
Figure 51: VPN Wizard - Manual Key Exchange
76
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
These settings must match the remote VPN. Note that you cannot use both AH and ESP.
Manually assigned Keys
AH (Authentication Header) specifies the authentication protocol
for the VPN header, if used. (AH is often NOT used)
AH Authentication
If AH is not enabled, the following settings can be ignored.
Keys
•
The "in" key here must match the "out" key on the remote
VPN, and the "out" key here must match the "in" key on the
remote VPN.
•
•
•
Keys can be in ASCII or Hex (0..9 A..F)
For MD5, the keys should be 32 hex/16 ASCII characters.
For SHA-1, the keys should be 40 hex/20 ASCII characters.
SPI
•
Each SPI (Security Parameter Index) must be unique.
•
The "in" SPI here must match the "out" SPI on the remote
VPN, and the "out" SPI here must match the "in" SPI on the
remote VPN.
•
Each SPI should be at least 3 characters.
ESP (Encapsulating Security Payload) provides security for the
payload (data) sent through the VPN tunnel. Generally, you will
want to enable both Encryption and Authentication.
ESP Encryption
•
The "3DES" algorithm provides greater security than "DES",
but is slower.
•
The "in" key here must match the "out" key on the remote
VPN, and the "out" key here must match the "in" key on the
remote VPN.
Generally, you should enable ESP Authentication. There is little
difference between the available algorithms. Just ensure each
endpoint use the same setting.
ESP Authentication
•
The "in" key here must match the "out" key on the remote
VPN, and the "out" key here must match the "in" key on the
remote VPN.
•
•
•
Keys can be in ASCII or Hex (0..9 A..F)
For MD5, the keys should be 32 hex/16 ASCII characters.
For SHA-1, the keys should be 40 hex/20 ASCII characters.
ESP SPI
This is required if either ESP Encryption or ESP Authentica-
tion is enabled.
•
•
Each SPI (Security Parameter Index) must be unique.
The "in" SPI here must match the "out" SPI on the remote
VPN, and the "out" SPI here must match the "in" SPI on the
remote VPN.
•
Each SPI should be at least 3 characters.
For Manual Key Exchange, configuration is now complete.
•
•
Click "Next" to view the final screen.
On the final screen, click "Finish" to save your settings, then "Close" to exit the Wizard.
77
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
IKE Phase 1
If you selected IKE, the following screen is displayed after the Traffic Selector screen.
Figure 52: VPN Wizard - IKE Phase 1
IKE Phase 1 (IKE SA)
Select the desired option:
Direction
•
Initiator - Only outgoing connections will be created. Incoming
connection attempts will be rejected.
•
Responder - Only incoming connections will be accepted.
Outgoing traffic which would otherwise result in a connection
will be ignored.
•
Both Directions - Both incoming and outgoing connections are
allowed.
This setting must match the "Remote Identity" on the remote VPN.
IP address is the more common method.
Local Identity
Remote Identity
Authentication
This setting must match the "Local Identity" on the remote VPN.
IP address is the more common method.
•
RSA Signature requires that both VPN endpoints have valid
Certificates issued by a CA (Certification Authority).
•
For Pre-shared key, enter the same key value in both endpoints.
The key should be at least 8 characters (maximum is 128 charac-
ters). Note that this key is used for the IKE SA only. The keys
used for the IPsec SA are automatically generated.
Select the desired method, and ensure the remote VPN endpoint uses
the same method. The "3DES" algorithm provides greater security
than "DES", but is slower.
Encryption
Select the desired option, and ensure the remote VPN endpoint uses
the same mode. Main Mode provides identity protection for the hosts
initiating the IPSec session, but takes slightly longer to complete.
Aggressive Mode provides no identity protection, but is quicker.
IKE Exchange
Mode
78
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
This setting does not have to match the remote VPN endpoint; the
IKE SA Life Time
shorter time will be used. Although measured in seconds, it is com-
mon to use time periods of several hours, such 28,800 seconds.
Select the desired method, and ensure the remote VPN endpoint uses
the same method. The smaller bit size is slightly faster.
DH Group
IKE PFS
If enabled, PFS (Perfect Forward Security) enhances security by
changing the IPsec key at regular intervals, and ensuring that each
key has no relationship to the previous key. Thus, breaking 1 key
will not assist in breaking the next key.
This setting should match the remote endpoint.
Click Next to see the following IKE Phase 2 screen.
Figure 53: VPN Wizard - IKE Phase 2
IKE Phase 2 (IPsec SA)
This setting does not have to match the remote VPN endpoint; the
IPsec SA Life Time
shorter time will be used. Although measured in seconds, it is
common to use time periods of several hours, such 28,800 seconds.
If enabled, PFS (Perfect Forward Security) enhances security by
changing the IPsec key at regular intervals, and ensuring that each
key has no relationship to the previous key. Thus, breaking 1 key
will not assist in breaking the next key.
IPSec PFS
AH (Authentication Header) specifies the authentication protocol
for the VPN header, if used.
AH Authentication
AH is often NOT used. If you do enable it, ensure the algorithm
selected matches the other VPN endpoint.
79
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
ESP (Encapsulating Security Payload) provides security for the
payload (data) sent through the VPN tunnel. Generally, you will
want to enable both ESP Encryption and ESP Authentication.
ESP Encryption
Select the desired method, and ensure the remote VPN endpoint
uses the same method. The "3DES" algorithm provides greater
security than "DES", but is slower.
Generally, you should enable ESP Authentication. There is little
difference between the available algorithms. Just ensure each
endpoint use the same setting.
ESP Authentication
For IKE, configuration is now complete.
•
•
Click "Next" to view the final screen.
On the final screen, click "Finish" to save your settings, then "Close" to exit the Wizard.
80
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Examples
This section describes some examples of using the TW100-BRV204 in common VPN situa-
tions.
Example 1: Connecting 2 TW100-BRV204s
In this example, 2 LANs are connected via VPN.
Figure 54: Connecting 2 TW100-BRV204s
Note
•
•
The LANs MUST use different IP address ranges.
Both endpoints have fixed WAN (Internet) IP addresses.
Configuration Settings
Setting
LAN A Gate-
way
LAN B Gate-
way
Notes
Name
Policy 1
Policy 1
Name does not affect
operation. Select a mean-
ingful name.
Remote Endpoint
205.17.11.43
Any
202.11.13.211
Any
Other endpoint's WAN
(Internet) IP address.
Local
IP addresses
Use a more restrictive
definition if possible.
Remote
IP addresses
192.168.1.1 to
192.168.1.254
192.168.0.1 to
192.168.0.254
Address range on other
endpoint.
Use a more restrictive
definition if possible.
Key Exchange
IKE
IKE
Must match
IKE SA Parameters
IKE Direction
Both ways
Both ways
Does not have to match.
Either endpoint can block
1 direction.
Local Identity
IP address
IP address
IP address
IP address
IP address is the most
common ID method
Remote Identity
IP address is the most
common ID method
81
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
IKE Authentication Pre-shared Key
method
Pre-shared Key
Certificates are not widely
used.
Pre-shared Key
Xxxxxxxxxx
Xxxxxxxxxx
MD5
Must match
Must match
IKE Authentication MD5
algorithm
IKE Encryption
DES
DES
Must match
Must match
IKE Exchange
mode
Main Mode
Main Mode
DH Group
Group 1 (768 bit) Group 1 (768 bit) Must match
IKE SA Life time
28800
28800
Does not have to match.
Shorter period will be
used.
IKE PFS
Disable
Disable
28800
Must match
IPSec SA Parameters
IPSec SA Life time 28800
Does not have to match.
Shorter period will be
used.
IPSec PFS
Disabled
Disabled
Must match
AH authentication
ESP authentication
ESP encryption
Disabled
Disabled
AH is rarely used
Must match
Enable/MD5
Enable/DES
Enable/MD5
Enable/DES
Must match
82
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Example 2: Windows 2000/XP Client to LAN
In this example, a Windows 2000/XP client connects to the TW100-BRV204 and gains access
to the local LAN.
Figure 55: Windows 2000/XP Client to TW100-BRV204
To use 3DES encryption on Windows 2000, you
need Service Pack 3 or later installed.
TW100-BRV204 Configuration
Setting
Value
Notes
Name
Win Client
Name does not affect operation. Select a
meaningful name.
Remote Endpoint
172.16.9.10
Other endpoint's WAN (Internet) IP address.
Local
IP addresses
Subnet address:
192.168.0.0
Allows access to entire LAN. Use a more
restrictive definition if possible.
255.255.255.0
Remote
IP addresses
172.16.9.10
IKE
For a single client, this address is the same as
the endpoint address.
Key Exchange
Must match client PC
IKE SA Parameters
IKE Direction
Both ways
IP address
IP address
Using "Responder only" is not possible.
Required.
Local Identity
Remote Identity
Required
IKE Authentication Pre-shared Key
method
Certificates are not widely used.
Pre-shared Key
Xxxxxxxxxx
Must match client PC
Must match client PC
IKE Authentication SHA-1
algorithm
IKE Encryption
3DES
Must match client PC
IKE Exchange
mode
Main Mode
Windows 2000 only supports Main Mode.
83
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
DH Group
Group 1 (768 bit)
28800
Must match client PC
IKE SA Life time
Does not have to match client PC. Shorter
period will be used.
IKE PFS
Disable
Must match client PC
IPSec SA Parameters
IPSec SA Life time 28800
Do not have to match. Shorter period will be
used.
IPSec PFS
Disable
Must match client PC
AH is rarely used
AH authentication
ESP authentication
ESP encryption
Disabled
Enable/MD5
Enable/DES
Must match client PC
Must match client PC
Windows Client Configuration
1. Select Start - Programs - Administrative Tools - Local Security Policy.
2. Right click IP Security Policy on Local Machine and select Create IP Security Policy
Figure 56: Windows 2000/XP - Local Security Settings
3. Click "Next", then enter a policy name, for example "DUT To Win2K", then click "Next".
4. Step through the Wizard:
•
•
Deselect Activate the default response rule. Click "Next",
Leave Edit Properties checked. Click "Finish".
5. The following "Properties - Rules" screen will be displayed.
84
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 57: Windows 2000/XP - Policy Properties
•
•
Note that no rules are in use. Two 2 rules are required - incoming and outgoing.
The outgoing rule will be added first.
6. Deselect the "Use Add Wizard" checkbox, then click "Add" to view the screen below.
Figure 58: IP Filter List
7. Type "To DUT" for the name, then click "Add" to see a screen like the following.
85
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 59: Filter Properties: Addressing
8. Enter the Source IP address and the Destination IP address.
•
Since this is the outgoing filter, the Source IP address is "My IP address" and the
Destination IP address is the address range used on the remote LAN.
•
Ensure the Mirrored option is checked.
9. Click "OK" to save your settings and close this dialog.
Figure 60: New Rule Properties: IP Filter List
10. On the resulting screen (above), ensure the "To DUT" filter is selected, then click the
Filter Action tab to see a screen like the following
86
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 61: New Rule Properties: Filter Action
11. Select Require Security, then click the "Edit" button, to view the Require Security Proper-
ties screen.
Figure 62: Require Security Properties
12. Select Negotiate security (this selects IKE), then click "Add".
87
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 63: Modify Security Method
13. On the resulting screen (above), select High [ESP] then click "OK" to save your changes
and return to the Require Security Properties screen.
Figure 64: Require Security Properties
14. Ensure the following settings are correct, then click "OK" to return to the Filter Action tab
of the Edit Rule Properties screen.
VPN Setting
Windows Setting
IKE enabled
Negotiate security
AH disabled
AH Integrity: <None>
ESP Confidentially: DES
ESP Integrity: MD5
ESP encryption: Enable/DES
ESP authentication: Enable/MD5
88
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
15. Click the Tunnel Setting tab, then select The tunnel endpoint is specified by this IP address.
Enter the WAN (Internet) IP address of the Broadband VPN Gateway, as shown below.
Figure 65: Tunnel Setting
16. Click the Authentication Methods tab, then click the "Edit" to see the screen like the
example below.
Figure 66: Authentication Method
17. Select Use this string to protect the key exchange (preshared key), then enter your pre-
shared key in the field provided.
18. Click "OK" to save your changes and return to the Authentication Methods tab of the Edit
Rule Properties screen.
19. Click "Close" to return to the DUT to Win2K properties screen. The "To DUT" filter
should now be listed, as shown below.
89
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 67: Windows 2000/XP Client to Broadband VPN Gateway
20. To add the second (incoming) rule, click "Add". For the name, enter "To Win2K", then
click "Add".
Figure 68: Windows 2000/XP Client to Broadband VPN Gateway
21. Enter the Source IP address and the Destination IP address as shown below.
•
Since this is the incoming filter, the Source IP address is the address range used on
the remote LAN and the Destination IP address is "My IP address".
•
Ensure the Mirrored option is checked.
90
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 69: Filter Properties: Addressing
22. Click "OK" to save your changes, then "Close".
Figure 70: Filter List
23. Ensure the "To Win2K" filter is selected, then click the Filter Action tab.
91
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 71: Filter Action
24. Select Require Security, then click "Edit". On the Require Security Methods screen below,
select Negotiate security.
Figure 72: Security Methods
25. Click the "Add" button. On the resulting Modify Security Method screen below, select
High [ESP].
92
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 73: Modify Security Method
26. Click "OK" to save your changes, then click "OK" again to return to the Filter Action
screen.
27. Select the Tunnel Setting tab, and enter the WAN (Internet) IP address of this PC
(172.16.9.10 in this example).
Figure 74: Tunnel Setting
28. Select the Authentication Methods tab, and click the "Edit" button to see the screen below.
93
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 75: Authentication Method
29. Select Use this string to protect the key exchange (preshared key), then enter your pre-
shared key in the field provided.
30. Click "OK" to save your settings, then "Close" to return to the DUT to Win2K Properties
screen. There should now be 2 IP Filers listed, as shown below.
Figure 76: DUT to Win2K Properties
31. Select the General tab.
94
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 77: Properties - General Tab
32. Click the "Advanced" button to see the screen below.
Figure 78: Key Exchange Settings
33. Click the "Methods" button to see the screen below.
95
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 79: Key Exchange Security Methods
34. Select the first entry, and click the "Edit" button to see the following screen.
Figure 80: IKE Security Algorithms
35. Select "SHA1" for Integrity Algorithm, "3DES" for Encryption algorithm, and "Low(1)"
for the Diffie-Hellman Group.
36. Click "OK" to save, then "OK" again, and then "Close" to return to the Local Security
Settings screen.
37. Right click the DUT to Win2K Policy and select "Assign" to make your policy active.
Figure 81: Windows 2000/XP Client to Broadband VPN Gateway
Configuration is now complete.
96
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Example 3: Windows 2000 Server to VPN Gateway
In this example, a Windows 2000 Server connects to the TW100-BRV204. Users on each
LAN can then gain access to the remote LAN.
Figure 82: TW100-BRV204 to Windows 2000 Server
TW100-BRV204 Configuration
This is the same as for the client setup earlier, with the exception of the IP address range for
the remote endpoint.
Setting
Single Client
Server/Gateway
Remote
IP addresses
172.16.9.10
Subnet address:
11.5.0.0
255.255.0.0
For a single client, this is the
same as the Gateway address
Address range used on the remote LAN.
97
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Windows 2000 Server Configuration
Configuration is the same as for Example 2: Windows 2000/XP Client to except for specifying
the Source and Destination addresses for the "Filter Properties". Instead, for both IP Filters, the
Filter Properties- Addressing should be completed as follows.
Figure 83: Windows 2000 Server - Addressing
•
•
The Source Address should be set to "A specific IP Subnet", and the IP address and
Subnet mask set to the address range used on the TW100-BRV204's LAN.
The Destination Address should be set to "A specific IP Subnet", and the IP address and
Subnet mask set to the address range used on the Windows 2000 LAN.
98
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Using Certificates
Certificates are used to authenticate users. Certificates are issued to you by various CAs
(Certification Authorities). These Certificates are called "Self Certificates".
Each CA also issues a certificate to itself. This Certificate is required in order to validate
communication with the CA. These certificates are called "Trusted Certificates."
The Certificates screen lists both the Trusted Certificate - the certificates of each CA itself -
and Self Certificates - the certificates issued to you.
Figure 84: Certificates Screen
Trusted Certificates
The "Subject Name" is always the company or person to whom the
Certificate is issued. For trusted certificates, this will be a CA.
Subject Name
(CA)
The CA (Certification Authority) which issued the Certificate.
Issuer Name
Expiry Time
The date on which the Certificate expires. You should renew the
Certificate before it expires.
Use this button to delete a Trusted Certificate. Select the checkbox in
the Delete column for any Certificates you wish to delete, then click
the "Delete" button.
Delete button
Self Certificates
The name you assigned to this Certificate. You should select a name
which helps to identify this particular certificate.
Name
The company or person to whom the Certificate is issued.
The CA (Certification Authority) which issued the Certificate.
Subject Name
Issuer Name
Expiry Time
The date on which the Certificate expires. You should renew the
Certificate before it expires.
Use this button to delete a Self Certificate. Select the checkbox in the
Delete column for any Certificates you wish to delete, then click the
"Delete" button.
Delete button
99
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Adding a Trusted Certificate
1. After obtaining a new Certificate from the CA, you need to upload it to the TW100-
BRV204.
2. On the "Certificates" screen, click the "Add Trusted Certificate" button to view the Add
Trusted Certificate screen, shown below.
Figure 85: Add Trusted Certificate
3. Click the "Browse" button, and locate the certificate file on your PC
4. Select the file. The name will appear in the "Certificate File" field.
5. Click "Upload" to upload the certificate file to the TW100-BRV204.
6. Click "Back" to return to the Trusted Certificate list. The new Certificate will appear in the
list.
Adding a Self Certificate
This process is different to obtaining a Trusted Certificate. The TW100-BRV204 must gener-
ate a request for the CA. You cannot request a Certificate directly. The correct procedure is as
follows:
1. On the "Certificates" screen, click the "Add Self Certificate" button to view the first screen
of the Add Self Certificate procedure, shown below.
Figure 86: Add Self Certificate (1)
2. Complete this screen.
Enter a name which helps to identify this particular certifi-
cate. This name is only for your reference.
Name
100
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
This is the name which other organizations will see as the
Holder (owner) of this Certificate. This should be your
Subject Name
registered business name or official company name. Gener-
ally, all Certificates should have the same value in the
Subject field.
Select the desired option.
Hash Algorithm
Select the desired option. RSA is recommended.
Signature Algorithm
Signature Key Length
Select the desired option. Normally, 1024 bits provides
adequate security.
3. Click "Next" to continue to the following screen.
Figure 87: Add Self Certificate (2)
4. Check that the data displayed in the Certificate Details section is correct. This data is used
to generate the Certificate request. If the data is not correct, click the "Back" button and
correct the previous screen.
5. If the data is correct, copy the text in the Data to supply to CA panel to the clipboard.
6. Apply for a Certificate:
•
•
•
Connect to the CA's web site.
Start the Self Certificate request procedure.
When prompted for the request data, copy this data (including "-----BEGIN
CERTIFICATE REQUEST-----" and "-----END CERTIFICATE REQUEST-----")
from this screen to the CA's form.
•
•
Submit the CA's form.
If there are no problems, the Certificate will then be issued.
7. After obtaining a new Certificate, as described above, you need to upload it the TW100-
BRV204. Click the "Next" button to see the screen below.
101
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 88: Add Self Certificate (3)
8. Upload the Certificate:
•
•
•
•
Click the "Browse" button, and locate the certificate file on your PC
Select the file. The name will appear in the "Certificate File" field.
Click "Upload" to upload the certificate file to the TW100-BRV204.
Click "Finished" to return to the Certificate list. The new Certificate will appear in the
list.
CRLs
CRLs are only necessary if using Certificates.
CRL (Certificate Revocation List) files show Certificates which have been revoked, and are no
longer valid. Each CA issues their own CRLs.
It is VERY IMPORTANT to keep your CRLs up-to-date. You need to obtain the CRL for each
CA regularly. The "Next Update" field in the CRL shows when the next update will be avail-
able.
To add a New CRL
1. Obtain the CRL file from your CA.
2. Select CRL from the VPN menu. You will see a screen like the example below.
Figure 89: Certificate Revocation Lists
3. Click the "Add New CRL" button. You will see a screen like the following:
102
Download from Www.Somanuals.com. All Manuals Search And Download.
VPN
Figure 90: Upload CRL
4. Upload the CRL file:
•
•
•
•
Click the "Browse" button, and locate the CRL file on your PC
Select the file. The name will appear in the "File to Upload" field.
Click "Upload" to upload the CRL file to the TW100-BRV204.
Click "Back" to return to the CRL list. The new CRL will appear in the list.
5. Use the "Delete" button to delete the previous (now outdated) CRL.
103
Download from Www.Somanuals.com. All Manuals Search And Download.
Chapter 9
Other Features and Settings
9
This Chapter explains the screens and settings available via the "Other"
menu.
Overview
Normally, it is not necessary to use these screens, or change any settings. These screens and
settings are provided to deal with non-standard situations, or to provide additional options for
advanced users.
The screens available are:
Backup or restore the configuration file for the Broadband Router. This
file contains all the configuration data.
Config File
This is the list of PCs shown when you select the "DMZ PC", "Virtual
Server", or "Internet Application". This database is maintained automati-
cally, but you can add and delete entries for PCs which use a Fixed
(Static) IP Address.
PC Database
This feature allows you to manage the TW100-BRV204 via the Internet.
Only required if your LAN has other Routers or Gateways.
Remote
Administration
Routing
The firmware (software) in the TW100-BRV204 can be upgraded using
your Web Browser.
Upgrade
Firmware
UPnP (Universal Plug and Play) allows automatic discovery and con-
figuration of the TW100-BRV204
UPNP
104
Download from Www.Somanuals.com. All Manuals Search And Download.
Other Features and Settings
Config File
This feature allows you to download the current settings from the Broadband Router, and save
them to a file on your PC.
You can restore a previously-downloaded configuration file to the Broadband Router, by
uploading it to the Broadband Router.
This screen also allows you to set the Broadband Router back to its factory default configura-
tion. Any existing settings will be deleted.
An example Config File screen is shown below.
Figure 91: Config Screen
Data - Config File Screen
Use this to download a copy of the current configuration, and store the
Backup Config
file on your PC. Click Download to start the download.
This allows you to restore a previously-saved configuration file back to
the Broadband Router.
Restore Config
Click Browse to select the configuration file, then click Restore to
upload the configuration file.
WARNING !
Uploading a configuration file will destroy (overwrite) ALL of the
existing settings.
Clicking the Restore Defaults button will reset the Broadband Router
Default Config
to its factory default settings.
WARNING !
This will delete ALL of the existing settings.
105
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
PC Database
The PC Database is used whenever you need to select a PC (e.g. for the "DMZ" PC). It elimi-
nates the need to enter IP addresses. Also, you do not need to use fixed IP addresses on your
LAN.
PC Database Screen
An example PC Database screen is shown below.
Figure 92: PC Database
•
•
•
PCs which are "DHCP Clients" are automatically added to the database, and updated as
required.
By default, non-Server versions of Windows act as "DHCP Clients"; this setting is called
"Obtain an IP Address automatically".
The TW100-BRV204 uses the "Hardware Address" to identify each PC, not the name or
IP address. The "Hardware Address" can only change if you change the PC's network card
or adapter.
•
This system means you do NOT need to use Fixed (static) IP addresses on your LAN.
However, you can add PCs using Fixed (static) IP Addresses to the PC database if re-
quired.
106
Download from Www.Somanuals.com. All Manuals Search And Download.
Other Features and Settings
Data - PC Database Screen
This lists all current entries. Data displayed is name (IP Address) type.
Known PCs
The "type" indicates whether the PC is connected to the LAN.
If adding a new PC to the list, enter its name here. It is best if this
matches the PC's "hostname".
Name
Enter the IP Address of the PC. The PC will be sent a "ping" to deter-
mine its hardware address. If the PC is not available (not connected, or
not powered On) you will not be able to add it.
IP Address
Buttons
This will add the new PC to the list. The PC will be sent a "ping" to
determine its hardware address. If the PC is not available (not con-
nected, or not powered On) you will not be able to add it.
Add
Delete the selected PC from the list. This should be done in 2 situa-
tions:
Delete
•
•
The PC has been removed from your LAN.
The entry is incorrect.
Update the data on screen.
Refresh
Display a read-only list showing full details of all entries in the PC
database.
Generate Report
View the Advanced version of the PC database screen. See below for
Advanced
details.
Administration
107
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
PC Database (Admin)
This screen is displayed if the "Advanced Administration" button on the PC Database is
clicked. It provides more control than the standard PC Database screen.
Figure 93: PC Database (Admin)
Data - PC Database ( Admin) Screen
This lists all current entries. Data displayed is name (IP Address) type.
Known PCs
The "type" indicates whether the PC is connected to the LAN.
PC Properties
If adding a new PC to the list, enter its name here. It is best if this
matches the PC's "hostname".
Name
108
Download from Www.Somanuals.com. All Manuals Search And Download.
Other Features and Settings
Select the appropriate option:
IP Address
•
Automatic - The PC is set to be a DHCP client (Windows: "Ob-
tain an IP address automatically"). The TW100-BRV204 will
allocate an IP address to this PC when requested to do so. The IP
address could change, but normally won't.
•
DCHP Client - Reserved IP Address - Select this if the PC is set
to be a DCHP client, and you wish to guarantee that the TW100-
BRV204 will always allocate the same IP Address to this PC.
Enter the required IP address. Only the last field is required; the
other fields must match the TW100-BRV204.
•
Fixed IP Address - Select this if the PC is using a Fixed (Static)
IP address. Enter the IP address allocated to the PC. (The PC must
be configured to use this IP address.)
Select the appropriate option
MAC Address
•
Automatic discovery - Select this to have the TW100-BRV204
contact the PC and find its MAC address. This is only possible if
the PC is connected to the LAN and powered On.
•
MAC is - Enter the MAC address on the PC. The MAC address is
also called the "Hardware Address", "Physical Address", or "Net-
work Adapter Address". The TW100-BRV204 uses this to provide
a unique identifier for each PC. Because of this, the MAC address
can NOT be left blank.
Buttons
Add a new PC to the list, using the data in the "Properties" box.
If "Automatic discovery" (for MAC address) is selected, the PC will be
sent a "ping" to determine its hardware address. This will fail unless
the PC is connected to the LAN, and powered on.
Add as New
Entry
Update (modify) the selected PC, using the data in the "Properties"
box.
Update Selected
PC
Clear the "Properties" box, ready for entering data for a new PC.
Update the data on screen.
Clear Form
Refresh
Display a read-only list showing full details of all entries in the PC
database.
Generate Report
Click this to view the standard "PC Database" screen.
Standard Screen
109
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Remote Administration
This feature allows you to manage the TW100-BRV204 via the Internet.
Figure 94: Remote Administration Screen
Data - Remote Administration Screen
Remote Administration
Enable to allow administration via the Internet. If Disabled, this
device will ignore management connection attempts from the Inter-
net.
Enable Remote
Administration
Enter a port number between 1024 and 65535 (8080 is recom-
mended). This port number must be specified when you connect (see
below).
Port Number
Note: The default port number for HTTP (Web) connections is port
80, but using port 80 here will prevent the use of a Web "Virtual
Server" on your LAN. (See Advanced Internet - Virtual Servers)
You must use this IP Address to connect (see below).
Current
IP Address
This IP Address is allocated by your ISP. But if using a Dynamic IP
Address, this value can change each time you connect to your ISP.
So it is better if your ISP allocates you a Fixed IP Address.
To connect from a remote PC via the Internet
1. Ensure your Internet connection is established, and start your Web Browser.
2. In the "Address" bar, enter "HTTP://" followed by the Internet IP Address of the TW100-
BRV204. If the port number is not 80, the port number is also required. (After the IP Ad-
dress, enter ":" followed by the port number.)
e.g.
HTTP://123.123.123.123:8080
This example assumes the WAN IP Address is 123.123.123.123, and the port number is 8080.
110
Download from Www.Somanuals.com. All Manuals Search And Download.
Other Features and Settings
Routing
Overview
•
•
•
If you don't have other Routers or Gateways on your LAN, you can ignore the "Routing"
page completely.
If the TW100-BRV204 is only acting as a Gateway for the local LAN segment, ignore the
"Routing" page even if your LAN has other Routers.
If your LAN has a standard Router (e.g. Cisco) on your LAN, and the TW100-BRV204 is
to act as a Gateway for all LAN segments, enable RIP (Routing Information Protocol) and
ignore the Static Routing table.
•
•
If your LAN has other Gateways and Routers, and you wish to control which LAN seg-
ments use each Gateway, do NOT enable RIP (Routing Information Protocol). Configure
the Static Routing table instead. (You also need to configure the other Routers.)
If using Windows 2000 Data center Server as a software Router, enable RIP on the
TW100-BRV204, and ensure the following Windows 2000 settings are correct:
•
•
Open Routing and Remote Access
In the console tree, select Routing and Remote Access, [server name], IP Routing,
RIP
•
•
In the "Details" pane, right-click the interface you want to configure for RIP version 2,
and then click "Properties".
On the "General" tab, set Outgoing packet protocol to "RIP version 2 broadcast", and
Incoming packet protocol to "RIP version 1 and 2".
Routing Screen
The routing table is accessed by the Routing link on the Other screen.
Using this Screen
Generally, you will use either RIP (Routing Information Protocol) OR the Static Routing Table,
as explained above, although is it possible to use both methods simultaneously.
Static Routing Table
•
If RIP is not used, an entry in the routing table is required for each LAN segment on your
Network, other than the segment to which this device is attached.
•
The other Routers must also be configured. See Configuring Other Routers on your LAN
later in this chapter for further details and an example.
111
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Figure 95: Routing Screen
Data - Routing Screen
RIP
Check this to enable the RIP (Routing Information Protocol) feature
of the TW100-BRV204.
Enable RIP
The TW100-BRV204 supports RIP 1 only.
Static Routing
This list shows all entries in the Routing Table.
Static Routing
Table Entries
•
•
•
The "Properties" area shows details of the selected item in the
list.
Change any the properties as required, then click the "Update"
button to save the changes to the selected entry.
Destination Network - The network address of the remote LAN
segment. For standard class "C" LANs, the network address is
the first 3 fields of the Destination IP Address. The 4th (last)
field can be left at 0.
Properties
•
•
Network Mask - The Network Mask for the remote LAN
segment. For class "C" networks, the default mask is
255.255.255.0
Gateway IP Address - The IP Address of the Gateway or
Router which the TW100-BRV204 must use to communicate
with the destination above. (NOT the router attached to the re-
mote segment.)
•
Metric - The number of "hops" (routers) to pass through to
reach the remote LAN segment. The shortest path will be used.
The default value is 1.
112
Download from Www.Somanuals.com. All Manuals Search And Download.
Other Features and Settings
Buttons
Save
Save the RIP setting. This has no effect on the Static Routing Table.
Add a new entry to the Static Routing table, using the data shown in
the "Properties" area on screen. The entry selected in the list is
ignored, and has no effect.
Add
Update the current Static Routing Table entry, using the data shown
in the "Properties" area on screen.
Update
Delete the current Static Routing Table entry.
Delete
Clear all data from the "Properties" area, ready for input of a new
entry for the Static Routing table.
Clear Form
Generate a read-only list of all entries in the Static Routing table.
Generate Report
Configuring Other Routers on your LAN
It is essential that all IP packets for devices not on the local LAN be passed to the TW100-
BRV204, so that they can be forwarded to the external LAN, WAN, or Internet. To achieve
this, the local LAN must be configured to use the TW100-BRV204 as the Default Route or
Default Gateway.
Local Router
The local router is the Router installed on the same LAN segment as the TW100-BRV204.
This router requires that the Default Route is the TW100-BRV204 itself. Typically, routers
have a special entry for the Default Route. It should be configured as follows.
Normally 0.0.0.0, but check your router documentation.
Normally 0.0.0.0, but check your router documentation.
The IP Address of the TW100-BRV204.
1
Destination IP Address
Network Mask
Gateway IP Address
Metric
Other Routers on the Local LAN
Other routers on the local LAN must use the TW100-BRV204 's Local Router as the Default
Route. The entries will be the same as the TW100-BRV204 's local router, with the exception
of the Gateway IP Address.
•
For a router with a direct connection to the TW100-BRV204 's local Router, the Gateway
IP Address is the address of the TW100-BRV204 's local router.
•
For routers which must forward packets to another router before reaching the TW100-
BRV204 's local router, the Gateway IP Address is the address of the intermediate router.
113
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
Static Routing - Example
Figure 96: Routing Example
For the TW100-BRV204 's Routing Table
For the LAN shown above, with 2 routers and 3 LAN segments, the TW100-BRV204 requires
2 entries as follows.
Entry 1 (Segment 1)
Destination IP Address
Network Mask
192.168.1.0
255.255.255.0 (Standard Class C)
Gateway IP Address
192.168.0.100 (TW100-BRV204 's local
Router)
Metric
2
Entry 2 (Segment 2)
Destination IP Address
192.168.2.0
Network Mask
Gateway IP Address
Metric
255.255.255.0 (Standard Class C)
192.168.0.100
3
For Router A's Default Route
Destination IP Address
Network Mask
0.0.0.0
0.0.0.0
Gateway IP Address
192.168.0.1 (TW100-BRV204 's IP Address)
For Router B's Default Route
Destination IP Address
Network Mask
0.0.0.0
0.0.0.0
Gateway IP Address
192.168.1.80 (TW100-BRV204 's local router)
114
Download from Www.Somanuals.com. All Manuals Search And Download.
Other Features and Settings
Upgrade Firmware
The firmware (software) in the TW100-BRV204 can be upgraded using your Web Browser.
You must first download the upgrade file, then select Upgrade on the Other menu. You will
see a screen like the following.
Figure 97: Upgrade Firmware Screen
To perform the Firmware Upgrade:
1. Click the "Browse" button and navigate to the location of the upgrade file.
2. Select the upgrade file. It's name will appear in the Upgrade File field.
3. Click the "Start Upgrade" button to commence the firmware upgrade.
The TW100-BRV204 is unavailable during the up-
grade process, and must restart when the upgrade is
completed. Any connections to or through the
TW100-BRV204 will be lost.
115
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
UPNP
An example UPNP screen is shown below.
Figure 98: UPNP Screen
Data - UPNP Screen
UPnP
•
UPnP (Universal Plug and Play) allows automatic discovery and
configuration of equipment attached to your LAN. UPnP is by
supported by Windows ME, XP, or later.
Enable UPnP
Services
•
•
If Enabled, this device will be visible via UPnP.
If Disabled, this device will not be visible via UPnP.
If checked, then UPnP users can change the configuration.
•
Allow Configu-
ration...
•
If Disabled, UPnP users can only view the configuration. But
currently, this restriction only applies to users running Windows
XP, who access the Properties via UPnP. (e.g. Right - click the
TW100-BRV204 in My Network Places, and select Properties)
•
•
If checked, then UPnP users can disable Internet access via this
device.
Allow Internet
access to be
disabled
If Disabled, UPnP users can NOT disable Internet access via this
device. But currently, this restriction only applies to users running
Windows XP, who access the Properties via UPnP. (e.g. Right -
click the TW100-BRV204 in My Network Places, and select Prop-
erties)
116
Download from Www.Somanuals.com. All Manuals Search And Download.
Appendix A
Troubleshooting
A
This Appendix covers the most likely problems and their solutions.
Overview
This chapter covers some common problems that may be encountered while using the TW100-
BRV204 and some possible solutions to them. If you follow the suggested steps and the
TW100-BRV204 still does not function properly, contact your dealer for further advice.
General Problems
Problem 1:
Can't connect to the TW100-BRV204 to configure it.
Check the following:
Solution 1:
•
•
•
•
The TW100-BRV204 is properly installed, LAN connections are OK,
and it is powered ON.
Ensure that your PC and the TW100-BRV204 are on the same network
segment. (If you don't have a router, this must be the case.)
If your PC is set to "Obtain an IP Address automatically" (DHCP
client), restart it.
If your PC uses a Fixed (Static) IP address, ensure that it is using an IP
Address within the range 192.168.0.2 to 192.168.0.254 and thus com-
patible with the TW100-BRV204 's default IP Address of 192.168.0.1.
Also, the Network Mask should be set to 255.255.255.0 to match the
TW100-BRV204.
In Windows, you can check these settings by using Control Panel-
Network to check the Properties for the TCP/IP protocol.
Internet Access
Problem 1:
When I enter a URL or IP address I get a time out error.
A number of things could be causing this. Try the following troubleshooting
steps.
Solution 1:
•
Check if other PCs work. If they do, ensure that your PCs IP settings
are correct. If using a Fixed (Static) IP Address, check the Network
Mask, Default gateway and DNS as well as the IP Address.
•
If the PCs are configured correctly, but still not working, check the
TW100-BRV204. Ensure that it is connected and ON. Connect to it and
check its settings. (If you can't connect to it, check the LAN and power
connections.)
•
If the TW100-BRV204 is configured correctly, check your Internet
connection (DSL/Cable modem etc) to see that it is working correctly.
Problem 2:
Some applications do not run properly when using the TW100-
BRV204.
117
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
The TW100-BRV204 processes the data passing through it, so it is not
Solution 2:
transparent.
Use the Special Applications feature to allow the use of Internet applications
which do not function correctly.
If this does solve the problem you can use the DMZ function. This should
work with almost every application, but:
•
•
It is a security risk, since the firewall is disabled.
Only one (1) PC can use this feature.
118
Download from Www.Somanuals.com. All Manuals Search And Download.
Appendix B
Specifications
TW100-BRV204
B
Model
TW100-BRV204
Dimensions
141mm(W) * 100mm(D) * 27mm(H)
0° C to 40° C
Operating Temperature
Storage Temperature
Network Protocol:
Network Interface:
-10° C to 70° C
TCP/IP
5 Ethernet:
4 * 10/100BaseT (RJ45) LAN connection
1 * 10/100BaseT (RJ45) for WAN
LEDs
11
Power Adapter
12V DC External
FCC Statement
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation.
This equipment generates, uses and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful interference to radio communica-
tions. However, there is no guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one of the following measures:
•
•
•
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
•
Consult the dealer or an experienced radio/TV technician for help.
To assure continued compliance, any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate this equipment.
(Example - use only shielded interface cables when connecting to computer or peripheral
devices).
119
Download from Www.Somanuals.com. All Manuals Search And Download.
TW100-BRV204 User Guide
FCC Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with a minimum distance of 20
centimeters between the radiator and your body.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause
undesired operation.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
CE Marking Warning
This is a Class B product. In a domestic environment this product may cause radio interference
in which case the user may be required to take adequate measures.
120
Download from Www.Somanuals.com. All Manuals Search And Download.
|