Wireless Gigabit VPN Router EVR100 Wireless Gigabit VPN Router V1.
1 1. 2. Introduction............................................................................................................................................................................................................6 1.1. Package Contents ...................................................................................................................................................................................6 1.2. System Requirements.....................................................
2 7. 8. 9. Internet.................................................................................................................................................................................................................. 46 7.1. Status........................................................................................................................................................................................................ 46 7.2. Dynamic IP Address ..................................
3 10. 11. 9.5. MAC Filter ............................................................................................................................................................................................... 79 9.6. IP Filter ..................................................................................................................................................................................................... 80 9.7. URL Filter....................................................
4 12.2. Time....................................................................................................................................................................................................125 12.3. Dynamic DNS (DDNS)..................................................................................................................................................................126 12.4. Power .............................................................................................
5 Revision History Version 1.
6 1. Introduction 1.1. Package Contents • EnGenius WIRELESS GIGABIT VPN ROUTER • AC Adapter • RJ-45 Ethernet LAN Cable • CD-ROM with User Manual and Setup Wizard • Quick Guide 1.2.
7 1.3. Introduction EVR100 is a 2T2R Wireless 11N Gigabit VPN Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. EVR100 supports home network with superior throughput and performance and unparalleled wireless range. With easy to use on the WPS function, it helps users to connect to wireless device with just one push button. There's also a built-in 4-port full-duplex 10/100/1000 Fast Switch to connect your wired-Ethernet devices together.
8 1.4. LED Overview LED Lights Wireless LAN Internet LAN Power Description Icon Color – Blue Lights when Wireless signal is activated. Blinks when Wireless data transfer. Color – Blue Blinks when WPS handshake is initialized. Color – Blue Lights when wired network device is connected to RJ-45 port. Blinks when data transfer occurs on RJ-45 port. Color – Orange Lights when device is powered ON. Blinks device is Reset.
9 2. Before you Begin This section will guide you through the installation process. Placement of the EVR100 is very important to avoid poor signal reception and performance. Avoid placing the device in enclosed spaces such as a closet, cabinet or wardrobe. 2.1. Considerations for Wireless Installation The operating distance of all wireless devices cannot be pre-determined due to a number of unknown obstacles in the environment that the device is deployed.
10 2.2. Computer Settings (Windows XP/Windows Vista/Windows 7) Click Start button and open Control Panel.
11 Windows XP, click [Network Connection] Windows Vista, click [View Network Status and Tasks] then [Manage Network Connections] Windows 7, click [View Network Status and Tasks] then [Change adapter settings]
12 Right click on [Local Area Connection] and select [Properties]. Check “Client for Microsoft Networks”, “File and Printer Sharing for Microsoft Networks”, and “Internet Protocol (TCP/IP) is ticked. If not, please install them.
13 Select “Internet Protocol (TCP/IP)” and click [Properties] Select “Obtain an IP Address automatically” and “Obtain DNS server address automatically” then click [OK].
14 2.3. Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3. Plug one end of another Ethernet cable to WAN port of the device and the other end into you cable/DSL modem (Internet) 4. Insert the DC-inlet of the power adapter into the port labeled “DC-IN” and the other end into the power socket on the wall.
15 3. Configuring your Router This section will show you how to configure the device using the web-based configuration interface. Please use your wireless network adapter to connect the WIRELESS ROUTER. IP Address Default Settings 192.168.0.1 Username / Password admin / admin Wireless Mode Enable Wireless SSID EnGeniusxxxxxx Wireless Security None Note: xxxxxx represented in the wireless SSID above is the last 6 characters of your device MAC Address.
16 4. Setup Wizard 1. Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.0.1 Note: If you have changed the default LAN IP Address of the WIRELESS ROUTER, ensure you enter the correct IP Address. 2. The default username and password are admin. Once you have entered the correct username and password, click the OK button to open the web-base configuration page.
17 3. You will see the following webpage if login successfully.
18 4. Click Wizard to enter the Setup Wizard. Then click Next to begin the wizard.
19 5. Select the Operation Mode. Please ensure you have the proper cables connected as described in the Hardware Installation section.
20 AP Router Mode a) The device will search for the correct Internet settings automatically. b) The most appropriate WAN type will be determined and selected automatically. If it is incorrect, please select Others to set up the WAN settings manually.
21 c) There are many WAN service types available. Please obtain the correct settings from your Internet Service Provider (ISP). Static IP Address If your ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Secondary DNS (if available) of your ISP provider.
22 Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and will reject connections if the MAC address does not match. If your ISP has recorded the MAC address of your computer’s Ethernet LAN card, please connect only the computer with the authorized MAC address, and click the Clone MAC Address button. This will replace the AP Router MAC address to the computer MAC address. The correct MAC address is used to initiate the connection to the ISP.
23 PPP over Ethernet ISP requires an account username and password. PPP over Ethernet Username Username assigned to you by the ISP Password Password for this username. Service You can assign a name for this service. (Optional) MTU The maximum size of packets. Do not change unless mentioned by the ISP.
24 Point-to-Point Tunneling Protocol (PPTP) PPTP is used by some ISPs.
25 PPTP WAN Interface Settings WAN Interface Type Select whether the ISP is set to Static IP or Dynamic IP address. Hostname This is optional. Only required if specified by ISP MAC address The MAC address that is used to connect to the ISP. PPTP Settings Login Username assigned to you by the ISP Password Password for this username. Service IP Address The IP Address of the PPTP server. Connection ID This is optional. Only required if specified by ISP MTU The maximum size of packets.
26 Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs.
27 L2TP WAN Interface Settings WAN Interface Type Select whether the ISP is set to Static IP or Dynamic IP address. Hostname This is optional. Only required if specified by ISP MAC address The MAC address that is used to connect to the ISP. L2TP Settings Login Username assigned to you by the ISP Password Password for this username. Service IP Address The IP Address of the PPTP server. MTU The maximum size of packets. Do not change unless mentioned by the ISP.
28 d) Setup the level of wireless security to be used. EnGenius recommends the Highest level of security to be used. Note: 802.11n wireless speeds may not be achievable if the security level is setting the Lowest or Low. SSID Enter the name of your wireless network. Key Enter the security key for your wireless network.
29 e) Check the settings are correct, and then click Reboot to apply the settings.
30 5. VPN Wizard Using VPN Wizard, you can establish VPN connection easily. Please refer to 11.3.
31 6. System 6.1. Status This page will display status of the device. Status Model Description of this device. Mode The device is currently in which mode. Uptime The duration about the device has been operating without powering down or reboot. Current Date/Time The device’s system time. If this is incorrect, please set the time in the Tools / Time page. Hardware version and Serial Number Hardware information for this device. Application version Firmware information for this device.
32 WAN Settings Attain IP Protocol Method used to connect to the Internet IP address The WAN IP Address of the device. Subnet Mask The WAN Subnet Mask of the device. MAC address The MAC address of the device’s WAN Interface. Primary and Secondary DNS Primary and Secondary DNS servers assigned to the WAN connection.
33 LAN Settings IP address The LAN IP Address of the device. Subnet Mask The LAN Subnet Mask of the device. DHCP Server Whether the DHCP server is Enabled or Disabled. MAC address The MAC address of the device’s LAN Interface.
34 WLAN Settings Channel The wireless channel in use. ESSID The SSID (Network Name) of the wireless network. (up to 4 SSIDs are supported) Security Wireless encryption is enabled for this SSID. BSSID The MAC address of this SSID. Associated Clients The number of wireless clients connected to this SSID.
35 6.2. LAN This page allows you to modify the device’s LAN settings.
36 LAN IP IP address The LAN IP Address of this device. IP Subnet Mask The LAN Subnet Mask of this device. 802.1d Spanning Tree When Enabled, the Spanning Tree protocol will prevent network loops in your LAN network.
37 DHCP Server DHCP Server The DHCP Server automatically allocates IP addresses to your LAN device. Lease Time The duration of the DHCP server allocates each IP address to a LAN device. Start / End IP The range of IP addresses of the DHCP server will allocate to LAN device. Domain name The domain name for this LAN network.
38 Two DNS servers can be assigned for use by your LAN device. There are four modes available. DNS Servers From ISP The DNS server IP address is assigned from your ISP. User-Defined The DNS server IP address is assigned manually. DNS Relay LAN clients are assigned the device’s IP address as the DNS server. DNS requests are relayed to the ISP’s DNS server.
39 6.3. DHCP This page shows the status of the DHCP server and also allows you to control how the IP addresses are allocated.
40 The DHCP Client Table shows the LAN clients that have been allocated an IP address from the DHCP Server . DHCP Client Table IP address The LAN IP address of the client. MAC address The MAC address of the client’s LAN interface. Expiration Time The time that the allocated IP address will expire. Refresh Click this button to update the DHCP Client Table.
41 You can also manually specify the IP address that will be allocated to a LAN client by associating the IP address with its MAC address. Type the IP address you would like to manually assign to a specific MAC address and click Add to add the condition to the Static DHCP Table.
42 6.4. Schedule This page allows you to setup the schedule times that the Firewall and Power Saving features will be activated / deactivated. Click Add to create a Schedule entry.
43 Schedule Schedule Description Assign a name to the schedule. Service The service provides for the schedule. Days Define the Days to activate or deactivate the schedule. Time of day Define the Time of day to activate or deactivated the schedule. Please use 24-hour clock format.
44 6.5. Log This page displays the system log of the device. When powered down or rebooted, the log will be cleared. Log Save Save the log to a file. Clear Clear the log. Refresh Update the log.
45 6.6. Language This page allows you to change the Language of the User Interface.
46 7. Internet The Internet section allows you to manually set the WAN type connection and its related settings. 7.1. Status This page shows the current status of the device’s WAN connection.
47 7.2. Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and will reject connections if the MAC address does not match. If your ISP has recorded the MAC address of your computer’s Ethernet LAN card, please connect only the computer with the authorized MAC address, and click the Clone MAC button. This will replace the AP Router MAC address to the computer MAC address. The correct MAC address is used to initiate the connection to the ISP.
48 Dynamic IP Address Hostname This is optional. Only required if specified by ISP MAC address The MAC Address that is used to connect to the ISP. DNS Servers Two DNS servers can be assigned for use by your LAN devices. There are two modes available. From ISP LAN devices are assigned the DNS server IP address of your ISP. User-Defined Set the DNS server IP address manually.
49 7.3. Static IP Address If your ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Secondary DNS (if available) of your ISP provider. Static IP Address IP address Assign an IP address Manually. IP Subnet Mask Specify an IP address’s subnet mask. Default Gateway Specify the gateway of your network. Primary DNS Specify the primary DNS server’s IP address.
50 7.4. PPP over Ethernet ISP requires an account username and password.
51 PPP over Ethernet (PPPoE) Username Username assigned to you by the ISP Password Password for this username. Service You can assign a name for this service. (Optional) MTU The maximum size of packets. Do not change unless mentioned by the ISP. Authentication type Select whether the ISP uses PAP or CHAP methods for authentication. Select Auto if unsure. Type You can choose the method that the router maintains connection with the ISP.
52 7.5. Point-to-Point Tunneling Protocol (PPTP) PPTP is used by some ISPs.
53 Point-to-Point Tunneling Protocol (PPTP) WAN Interface Type Select whether the ISP is set to Static IP or will allocate Dynamic IP address. Hostname This is optional. Only required if specified by ISP MAC address The MAC Address that is used to connect to the ISP. Username Username assigned to you by the ISP Password Password for this username. Service IP Address The IP Address of the PPTP server. Connection ID This is optional.
54 7.6. Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs.
55 Layer-2 Tunneling Protocol (L2TP) WAN Interface Type Select whether the ISP is set to Static IP or will allocate Dynamic IP address. Hostname This is optional. Only required if specified by ISP MAC address The MAC Address that is used to connect to the ISP. Username Username assigned to you by the ISP Password Password for this username. Service IP Address The IP Address of the L2TP server. MTU The maximum size of packets. Do not change unless mentioned by the ISP.
56 8. Wireless The Wireless section allows you to configure the Wireless settings. 8.1. Basic This page shows the current status of the device’s Wireless settings.
57 Basic Radio Enable or Disable the device’s wireless signal. Mode Select between Access Point or Wireless Distribution System (WDS) modes. Band Select the types of wireless clients that the device will accept. eg: 2.4 GHz (B+G+N) Only 802.11b and 11g clients will be allowed. Enable SSID# Select the number of SSID’s (Wireless Network names) you would like. You can create up to 4 separate wireless networks. SSID# Enter the name of your wireless network. You can use up to 32 characters.
58 Wireless Distribution System (WDS) Using WDS to connect Access Point wirelessly, and in doing so extend a wired infrastructure to locations where cabling is not possible or inefficient to implement. Note that compatibility between different brands and models is not guaranteed. It is recommended that the WDS network be created using the same models for maximum compatibility. Also note that all Access Points in the WDS network needs to use the same Channel and Security settings.
59 8.2. Advanced This page allows you to configure wireless advance settings. It is recommended the default settings are used unless the user has experience with these functions.
60 Advanced Fragment Threshold Specifies the size of the packet per fragment. This function can reduce the chance of packet collision. However when this value is set too low, there will be increased overheads resulting in poor performance. RTS Threshold When the packet size is smaller than the RTS Threshold, then the packet will be sent without RTS/CTS handshake which may result in incorrect transmission. Beacon Interval The time interval that the device broadcasts a beacon.
61 8.3. Security This page allows you to set the wireless security settings. Security SSID Selection Select the SSID that the security settings will apply to. Broadcast SSID If Disabled, then the device will not be broadcasting the SSID. Therefore it will be invisible to wireless clients. WMM Wi-Fi Multi-Media is a Quality of Service protocol which prioritizes traffic in the order according to voice, video, best effort, and background.
62 Encryption The encryption method to be applied. You can choose from WEP, WPA pre-shared key or WPA RADIUS. • Disabled - no data encryption is used. • WEP - data is encrypted using the WEP standard. • WPA-PSK - data is encrypted using the WPA-PSK standard. This is a later standard than WEP, and provides much better security than WEP. If all your Wireless stations support WPA-PSK, you should use WPA-PSK rather than WEP.
63 802.1x Authentication RADIUS Server IP Address The IP Address of the RADIUS Server RADIUS Server port The port number of the RADIUS Server. RADIUS Server password The RADIUS Server’s password.
64 WEP Encryption: WEP Encryption Authentication Type Please ensure that your wireless clients use the same authentication type. Key type ASCII: regular text (recommended) HEX: for advanced users Key Length Select the desired option, and ensure the wireless clients use the same setting. • • Default Key 64 Bit - data is encrypted, using the default key, before being transmitted. You must enter at least the default key. For 64 Bit Encryption, the key size is 10 chars in HEX (0~9 and A~F).
65 WPA Pre-Shared Key Encryption: WPA Pre-Shared Key Encryption Authentication Type Please ensure that your wireless clients use the same authentication type. WPA type Select the WPA encryption you would like. Please ensure that your wireless clients use the same settings. Pre-shared Key Type Select whether you would like to enter the Key in HEX or Passphrase format. Pre-shared Key Wireless clients must use the same key to associate the device.
66 WPA RADIUS Encryption: WPA RADIUS Encryption WPA type Select the WPA encryption you would like. Please ensure that your wireless clients use the same settings. RADIUS Server IP Enter the IP address of the RADIUS Server address RADIUS Server Port Enter the port number used for connections to the RADIUS server. RADIUS Server Enter the password required to connect to the RADIUS server.
67 8.4. Filter This page allows you to create filters to control which wireless clients can connect to this device by only allowing the MAC addresses entered into the Filtering Table.
68 Wireless Filter Enable Wireless Access Tick the box to Enable Wireless Access Control. Control When Enabled, only wireless clients on the Filtering Table will be allowed. Description Enter a name or description for this entry. MAC address Enter the MAC address of the wireless client that you wish to allow connection. Add Click this button to add the entry. Reset Click this button if you have made a mistake and want to reset the MAC address and Description fields.
69 8.5. Wi-Fi Protected Setup (WPS) WPS feature is following the Wi-Fi Alliance WPS standard and it eases the set up of security-enabled Wi-Fi networks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers to configure a network and enable security.
70 Wi-Fi Protected Setup (WPS) WPS Tick to Enable the WPS feature. WPS Button Tick to Enable the WPS push button. Wi-Fi Protected Setup Information WPS Current Status Shows whether the WPS function is Configured or Un-configured. Configured means that WPS has been used to authorize connection between the device and wireless clients. SSID The SSID (wireless network name) used when connecting using WPS. Authentication Mode Shows the encryption method used by the WPS process.
71 Initializing WPS Feature There are two methods to initialize the WPS feature: Push Button and Pin code methods. 1. WPS Push Button Method Push the WPS button on the WIRELESS ROUTER device. The Wireless LED light will start to flash to indicate that the WPS process is ready. While the Wireless LED is flashing on the WIRELESS ROUTER, press the WPS button on your wireless client. This could either be a physical hardware button, or a software button in the utility.
72 2. Pin Code Method Note the Pin code of your WIRELESS ROUTER device. Please use this Pin code to initialize the WPS process from the wireless client configuration utility. This process will be different for each brand or model. Please consult the user manual of the wireless client for more information.
73 8.6. Client List This page shows the wireless clients that are connected to the WIRELESS ROUTER device.
74 8.7. Policy This page allows you to configure the access policies for each SSID (wireless network). Policy WAN Connection Allow wireless clients on this SSID to access the WAN port which typically is an Internet connection. Communication between Wireless Whether each wireless client can communicate with each other in this SSID. When clients Disabled, the wireless clients will be isolated from each other.
75 9. Firewall The Firewall section allows you to set the access control and Firewall settings. 9.1. Enable This page allows you to Enable / Disable the Firewall features. If Enabled Firewall service, the Denial of Service (DoS) and SPI (Stateful Packet Inspection) features will also be enabled.
76 9.2. Advanced You can choose whether to allow VPN (Virtual Private Network) packets to pass through the Firewall.
77 9.3. DMZ If enabled this feature, allows the DMZ computer on your LAN to be exposed to all users on the Internet. • This allows almost any application to be used on the server. • The “DMZ PC” will receive all Unknown connections and data. • If the DMZ feature is enabled, please enter the IP address of the PC to be used as the “DMZ PC” Note: The “DMZ PC” is effectively outside the Firewall, making it more vulnerable to attacks. For this reason, you should only enable the DMZ feature when required.
78 9.4. Denial of Service (DoS) Denial of Service (Denial of Service) is a type of Internet attack that sends a high amount of data to you with the intent to overload your Internet connection. Enable the DoS firewall feature to automatically detect and block these DoS attacks.
79 9.5. MAC Filter You can choose whether to Deny or only Allow those computers listed in the MAC Filtering table to access the Internet. MAC Filter Enable MAC filtering Tick this box to Enable the MAC filtering feature. Deny all clients with MAC addresses When selected, the computers listed in the MAC Filtering table will be Denied listed below to access the network access to the Internet.
80 9.6. IP Filter You can choose whether to Deny or only Allow, computer with those IP Addresses from accessing certain Ports. This can be used to control which Internet applications the computers can access. You may need to have certain knowledge of what Internet ports the applications use.
81 IP Filter Enable IP filtering Tick this box to Enable the IP filtering feature. Deny all clients with IP addresses When selected, the computers with IP addresses specified will be Denied access to listed below to access the network the indicated Internet ports. Allow all clients with IP addresses When selected, the computers with IP addresses specified will be Allowed access listed below to access the network only to the indicated Internet ports.
82 9.7. URL Filter You can deny access to certain websites by blocking keywords in the URL web address. For example, “gamer” has been added to the URL Blocking Table. Any web address that includes “gamer” will be blocked.
83 10. Advanced The Advanced section allows you to configure the Advanced settings of the router. 10.1. Network Address Translation (NAT) This page allows you to Enable / Disable the Network Address Translation (NAT) and Network Turbine features. The NAT is required to share one Internet account with multiple LAN users. Enabling Network Turbine will speed up your NAT throughput. It also is required for certain Firewall features to work properly.
84 10.2. Port Mapping Port Mapping allows you to redirect a particular range of ports to a computer on your LAN network. This helps you host servers behind the NAT and Firewall. In the example below, there is a Mail Server that requires ports 25. When there is a connection from the Internet on those ports, it will be redirected to the Mail Server at IP address 192.168.0.150. Port Mapping Enable Port Mapping Tick this box to Enable the Port Mapping feature.
85 10.3. Port Forwarding Port Forwarding allows you to redirect a particular public port to a computer on your LAN network. This helps you host servers behind the NAT and Firewall. In the example below, there is a WEB Server running on port 80 on the LAN. For security reasons, the Administrator would like to provide this server to Internet connection on port 1000. Therefore then there is a connection from the Internet on port 1000, it will be forwarded to the computer with the IP address 192.168.0.
86 10.4. Port Trigger If you use Internet applications which use non-standard connections or port numbers, you may find that they do not function correctly because they are blocked by the Wireless Router's firewall. Port Trigger will be required for these applications to work. Port Trigger Enable Port Forwarding Tick this box to Enable the Port Trigger feature. Popular applications This is a list of some common applications with preset settings.
87 10.5. Application Layer Gateway (ALG) Certain applications may require the use of ALG feature to function correctly. If you use any of the applications listed, please tick and select it to enable this feature.
88 10.6. Universal Plug and Play (UPnP) The UPnP function allows automatic discovery and configuration of UPnP enabled devices on your network. It also provides automatic port forwarding for supported applications to seamlessly bypass the Firewall. Universal Plug and Play (UPnP) Enable the UPnP Feature Tick this box to Enable the UPnP feature to allow supported devices to be visible on the network.
89 10.7. Quality of Service (QoS) QoS allows you to control the priority that the data is transmitted over the Internet, or to reserve a specific amount of Internet bandwidth. This is to ensure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user experience of time sensitive transmissions such as voice and video could be very poor.
90 Priority Queue Method Bandwidth priority is set to either High or Low. The transmissions in the High queue will be processed first. Unlimited Priority Queue Local IP Address The computer with this IP Address will not be bound by the QoS rules. High / Low Priority Queue Protocol The type of network protocol. High / Low Priority Sets the protocol to High or Low priority. Specific Port Each protocol uses a specific port range. Please specify the ports used by this protocol.
91 Bandwidth Allocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or you can set a minimum amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth Allocation Type Set whether the QoS rules apply to transmission that are Download, Upload or Both directions. Local IP range Enter the IP address range of the computers that you would like the QoS rules to apply to.
92 10.8. Routing If your WIRELESS ROUTER device is connected a network with different subnets, then this feature will allow the different subnets to communicate with each other. Static Routing Enable Static Routing Tick this box to Enable the Static Router feature. Destination LAN IP Enter the IP address of the destination LAN. Subnet Mask Enter the Subnet Mask of the destination LAN IP address Default Gateway Enter the IP address of the Default Gateway for this destination IP and Subnet.
93 Destination Subnet Mask Gateway Hop Interface 192.168.11.0 255.255.255.0 192.168.0.216 1 LAN 192.168.10.0 255.255.255.0 192.168.0.103 1 LAN So if, for example, Client3 wants to send an IP data packet to 192.168.10.2 (Client 2), it would use the above table to determine that it had to go via 192.168.0.103 (Router 2) And if it sends Packets to 192.168.11.11 (Client 1) will go via 192.168.0.216 (Router 1).
94 11. VPN A Virtual Private Network (VPN) provides a secure connection between two or more computers or protected networks over the public Internet. It provides authentication to ensure that the information is going to and from the correct parties. It provides security to protect the information from viewing or tampering en route. EVR100 supports IPSec (Site to Site, Remote to Site) and L2TP over IPSec methods to establish VPN connections and the maximum VPN session number is up to 5. 11.1.
95 11.2. Profile Setting This page allows you to Enable, Add, Edit and Delete VPN profiles. Profile Setting Enable Tick the box to Enable the VPN profile. Add Click this button to add the entry. Edit Select one profile and click this button to edit the entry. Delete Selected Delete the selected entries.
96 10.1.1. IPSec IPSec (Internet Protocol Security) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPSec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPSec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite.
97 General Name Enter a name for your VPN policy. Connection Type Supports IPSec and L2TP over IPSec methods to establish VPN connection. Authentication Type Supports pre-shared key method for authentication. Shared Key Enter the Shared Key in box. Confirm Enter your Shared Key again for verification. Local ID Type Supports IP Address, Domain Name, Email Address methods for Local ID Type. Local ID Enter an ID to identify and authenticate the local VPN endpoint.
98 SA (Security Association) A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA may include attributes such as: cryptographic algorithm and mode; traffic encryption key; and parameters for the network data to be passed over the connection. Establishment of an SA is described in RFC 2408, the Internet Security Association and Key Management Protocol. This page allows you to configure SA.
99 Encryption EVR100 supports DES, 3DES, AES128, AES192, AES256 encryption methods for traffic through the VPN. Authentication EVR100 supports SHA1, MD5 methods for authentication. Life Time Enter the number of seconds for the IKE Lifetime. The period of time to pass before establishing a new IKE security association (SA) with the remote endpoint. The default value is 28800.
100 Network This page allows you to configure the VPN server and local/remote subnet. Network Security Gateway Type Security Gateway Type supports IP Address and Domain Name. Select one of them. Security Gateway The IP address or domain name of the VPN server. Local Network Enter the local (LAN) subnet and mask. (ex. 192.168.0.0/255.255.255.0) Remote Network Enter the remote subnet and mask. (ex. 192.168.9.0/255.255.255.
101 Advanced This page allows you to configure advanced VPN settings. Advanced NAT Traversal Enabling NAT Traversal allow IPSec traffic from this endpoint to traverse through the translation process during NAT. The remote VPN endpoint must also support this feature and it must be enabled to function properly over the VPN. Dead Peer Detection Enable DPD (Dead Peer Detection) to delete the VPN tunnel if there is no traffic detected. The VPN will re-establish once traffic is again sent through the tunnel.
102 10.1.2. L2TP over IPSec L2TP over IPSec VPNs enable a business to transport data over the Internet, while still maintaining a high level of security to protect data. You can use this type of secure connection for small or remote office clients that need access to the corporate network. You can also use L2TP over IPSec VPNs for routers at remote sites by using the local ISP and creating a demand-dial connection into corporate headquarters.
103 L2TP L2TP Setting Authentication Select the desired authentication protocol (PAP, CHAP, Auto). Select Auto by default. User Name Enter the username for authentication. Password Enter the password for authentication.
104 Network Network Server IP Enter the VPN Server IP address. Remote IP Range Assign a range of IP addresses. The assigned IP range should be on the same IP network but not the in the same range as your DHCP IP range.
105 11.3. Wizard You can use Wizard to create a VPN profile easily. 1. Click Next button to begin the wizard. 2. Enter the VPN policy name then click Next button to next page.
106 3. You can select [IPSec] or [L2TP over IPSec] in this page then click Next button to next page. If you select [IPSec] then go to step 3.1. If you select [L2TP over IPSec] then go to step 3.2. 3.1 IPSec You can select [Client to Site] or [Site to Site] in this page then click Next button to next page. Note. If you select [Client to Site], you will pass next step.
107 Enter the Security Gateway and remote network. Then click Next button to next page.
108 3.2 L2TP over IPSec Enter the username, password and VPN server IP setting. Then click Next button to next page.
109 4. Enter the shared key for the VPN connection. 5. Setup successfully, enable this policy immediately. If you don’t want enable this policy, you can un-tick the box. Then click Apply button to apply the settings.
110 How to establish a L2TP over IPSec VPN connection on Windows XP 1. Click Start button and open Control Panel. 2. Click [Network Connections], double click [New Connection Wizard] then click Next button.
111 3. Select [Connect to the network at my workplace] then click Next button. 4. Select [Virtual Private Network connection] then click Next button.
112 5. Enter the [Company Name] then click Next button. 6. Select [Do not dial the initial connection] then click Next button.
113 7. Enter the VPN server IP address then click Next button. 8. Select [Do not use my smart card] then click Next button.
114 9. Click Finish button to complete the wizard. 10. Click Properities button.
115 11. In Security, select [Advanced (custom settings)] then click Settings button. 12. Check [Unencrypted password (PAP)] and [Challenge Handshake Authentication Protocol (CHAP)] then click OK button.
116 13. Click [IPSec Settings] then tick [Use pre-shared key for authentication], Enter the Key then click OK button. 14. In Networking, select [L2TP IPSec VPN] then click OK button.
117 15. Click Connect button to connect VPN connection. 16. You can see the VPN Connection has been established.
118 How to establish a L2TP over IPSec VPN connection in Windows 7 1. Click Start button and open Control Panel. 2.
119 3. Click [Connect to a workplace] then [Use my Internet connection (VPN)] 4. Enter the VPN server IP address: [Internet address], [Destination name] and tick [Don’t connect now; just set it up so I can connect later], then click the Next button.
120 5. Enter the correct User name and Password then click the Create button. 6. Click the Close button to close the VPN connection setting.
121 7. Click [Change adapter settings] in Step 2, then select VPN Connection and click [Change settings of this connection] 8. Change Type of VPN to [Layer 2 Tunneling Protocol with IPSec (L2TP/IPSec)] and check [Unencrypted password (PAP)] in Security.
122 9. Click the Advanced settings button and select [Use preshared key for authentication] and enter the correct key. Then click OK button.
123 10. Double click the VPN Connection then click the Connect button. 11. You can see the VPN Connection has been established.
124 12. Tools This section allows you to configure some device system settings. 12.1. Admin This page allows you to change the system password and to configure remote management. Change Password Old Password: Enter the current password. New Password: Enter your new password. Repeat New Password: Enter your new password again for verification. Remote Management Host Address: You can only perform remote management from the specified IP address.
125 12.2. Time This page allows you to set the system time. Time Time Setup: Select the method you want to set the time. Time Zone: Select the time zone for your current location. NTP Time Server: Enter the address of the Network Time Protocol (NTP) Server to automatically synchronize with a server on the Internet. Daylight Savings: Check whether daylight savings applies to your area.
126 12.3. Dynamic DNS (DDNS) This free service is very useful when combined with the Virtual Server feature. It allows Internet users to connect to your Virtual Servers using a URL, rather than an IP Address. This also solves the problem of having a dynamic IP address. With a dynamic IP address, your IP address may change whenever you connect, which makes it difficult to connect to you. DDNS Services work as follows: 1. You must register for the service at one of the listed DDNS Service providers. 2.
127 12.4. Power This page allows you to Enable or Disable the wireless LAN power saving features.
128 12.5. Diagnosis This page allows you determine if the WIRELESS ROUTER device has an active Internet connection. Diagnosis Address to Ping: Enter the IP address you like to see if a successful connection can be made. Ping Result: The results of the Ping test.
129 12.6. Firmware The firmware (software) in the WIRELESS ROUTER device can be upgraded using your Web Browser. To perform the Firmware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in the Upgrade File field. 3. Click the Apply button to commence the firmware upgrade. Note: The Wireless Router is unavailable during the upgrade process, and must restart when the upgrade is completed.
130 12.7. Back-up Back-up Restore to factory Restores the device to factory default settings. default: Backup Settings: Save the current configuration settings to a file. Restore Settings: Restores a previously saved configuration file. Click Browse to select the file. Then Upload to load the settings.
131 12.8. Reset In some circumstances it may be required to force the device to reboot.
132 Appendix A – FCC Interference Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
133 IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. We declare that the product is limited in CH1~CH11 by specified firmware controlled in the USA. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
134 Appendix B – IC Interference Statement Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.