2. Double-click the Network icon. 3. Click on the Protocols tab. 4. Double-click TCP/IP Protocol. 5. Click on the IP Address tab. 6. In the Adapt
6.5 | Verifying Your TCP/IP Connection After installing the TCP/IP communication protocols and configuring an IP address in the same network as the Ro
7 | Configuring Your Broadband VPN Router Before you attempt to log into the web-based Administration, please verify the following. 1. Your browser
Note that there are two different Web user interfaces, one for general users and one for the system administrator. To log on as an administrator, ente
Cable Modem The cable modem option allows you to configure a host name and MAC Address. The Host Name is optional, but may be required by some ISPs. T
Internet connection is maintained during inactivity. If the connection is inactive for longer than the Maximum Idle Time, it will be dropped. (Default
PPTP Point-to-Point Tunneling Protocol is a common connection method used for xDSL connections in Europe. It can be used to join different physical ne
L2TP Layer 2 Tunneling Protocol is a common connection method used for xDSL connections in Europe. It can be used to join different physical networks
7.4 | Advanced Setup – SYSTEM Time Zone Use the section below to configure the Barricade's system time. Select your timezone and configure the d
Copyright Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for
Password Settings Use this section to configure the 2 password accounts and idle time-out setting for your Barricade Router. There are 2 levels of adm
Syslog Server The Syslog Server tool will automatically download the Barricade log to the server IP address specified by the user. Enter the Server LA
7.5 | Advanced Setup - WAN Dynamic IP The cable modem option allows you to configure a host name and MAC Address. The Host Name is optional, but may
PPPoE Enter the PPPoE User Name and Password assigned by your Service Provider. The Service Name is normally optional, but may be required by some ser
PPTP Point-to-Point Tunneling Protocol is a common connection method used for xDSL connections in Europe. It can be used to join different physical ne
BigPond If you use the BigPond Internet Service which is available in Australia, enter your username and password and apply the changes. L2TP Laye
Enter the phone number, account name and password assigned to you by your ISP. The baud rate is the communication rate between the broadband router an
7.6 | Advanced Setup - LAN This is the local IP address of the router. All networked computers must use the LAN IP address of the router as their def
Clicking on the “Client List” link brings up the DHCP Client Table, showing all the clients that have obtained DHCP addresses from the router: 7.7
For example, if you have an FTP server (port 21) at 192.168.123.1, a Web server (port 80) at 192.168.123.2, and a VPN server at 192.168.123.6, you nee
Compliances FCC - Class B This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the
For a full list of ports and the services that run on them, see http://www.iana.org/assignments/port-numbers 7.7.3 | Virtual Computer Use the “Virtu
You can apply up to 8 rules for each direction, inbound or outbound. For each rule you can define the following: • Source IP address • Source port
7.8.3 | MAC Filter MAC Address Filtering allows you assign different access rights to various users and you can also assign a specific IP address to
7.8.4 | Schedule Rule Set scheduled times to be used to control what time of day a service or set of services is enabled. Use this section to configu
7.8.5 | Advanced In this section you can enable/disable Stateful Packet Inspection (SPI), Discard Ping from WAN, and PPTP and IPSec VPN Passthrough t
7.9 | Advanced Setup - VPN 7.9.1 | IPSec Tunnel VPN settings are used to create virtual private tunnels to remote VPN gateways. The tunnel technolog
• Local netmask: The local netmask combined with the local subnet forms a subnet domain. • Remote subnet: The subnet of a remote VPN gateway’s LAN s
• DH Group - Three groups can be selected: o Group 1 (MODP768) o Group 2 (MODP1024) o Group 5 (MODP1536) • Encryption algorithm - Two algorithms
7.9.3 | IPSec Proposal • IPSec Proposal index: A list of selected proposal indexes from the IPSec proposal pool. The selected activity is performed
7.9.4 | Dynamic VPN When using the VPN Dynamic IP Setting, the router functions as a Dynamic VPN server. The Dynamic VPN server does not check the
EC Conformance Declaration – Class B SMC contact for these products in Europe is: SMC Networks Europe, Edificio Conata II Calle Fructuos Gelabert 6-8
7.9.5 | PPTP/L2TP Server Point-to-Point and Layer 2 Tunneling Protocols (PPTP / L2TP) allows the secure remote access over the Internet by simply dia
7.10 | Advanced Setup - SNMP The Simple Network Management Protocol (SNMP) lets you manage a computer network remotely by polling and setting termi
each other. The settings in the routing table are used to support static and dynamic routing functions. RIPv1 is a protocol where the IP address is ro
If the host wants to send an IP data gram to 192.168.3.88, it uses the above table to determine that it has to go via the 192.168.1.33 gateway. If the
When this is enabled, the login page appears as follows: 7.14 | DDNS (Dynamic DNS) Dynamic DNS provides users on the Internet a method to tie th
7.15 | UPnP (Universal Plug-and-Play) The Universal Plug and Play architecture offers pervasive peer-to-peer network connectivity of PCs of all form
7.17 | Status You can use the Status screen to see the connection status for Barricade's WAN/LAN interfaces, firmware and hardware version numbe
8 | IPSec Settings Guide (For Reference/Example Only) 8.1 | Local Security Policy Settings Step 1: In Windows 2000/XP click the Start button, select
Step 2: Windows 2000/XP: Double-click “Administrative Tools”. The Administrative Tools window will now open. Step 3: Double-click the “Local Securi
8.2 | Create Two IP Filter Lists (PC -> Router / Router -> PC) Filter List 1 (XP PC -> Router) Step 1: From the “to_vpn_router” Properties w
1 | System Requirements • Internet access from your local telephone company or Internet Service Provider (ISP) using a DSL modem, cable modem, Dial-
Step 3: The “IP Filter List” window opens. Enter “xp->router” in the “Name” field. Step 4: Deselect the “Use Add Wizard” check box and click Add
Step 8: Select the protocol type you want and click “OK”. Step 9: You are returned to the “IP Filter List” window. Click “OK” to complete this part
Step 11: The “Required Security Properties” window opens. Select “Negotiate security” and then check the “Session key perfect forward security (PFS)”.
The “Custom Security Method Settings” window opens. Step 14: Check “Data integrity and encryption (ESP)”. • Select MD5 from the Integrity algorit
Step 15: Select the “Authentication Methods” tab and click “Add”. The “Edit Authentication Method Properties” window will appear. Step 16: Select “Us
Step 18: Select the “Tunnel Setting” tab. Step 19: Check “The tunnel endpoint is specified by this IP address” and enter “192.168.1.254.” Step 20: Se
Step 7: Select “A specific IP Address” from the “Destination address” field and enter the IP address (192.168.1.1). Step 8: If you want to select a pr
Step 13: Click OK to complete the tunnel 1 router->xp configuration. 8.3 | Configuring the IKE Properties Step 1: From the “to_vpn_router Propert
The “Key Exchange Security Methods” window opens. Step 4: Click the “Add” button. The “IKE Security Algorithms” window opens. Step 5: Select “SH
8.4 | Example IPSec VPN Configuration VPN Router WAN IP Address: 192.168.1.254 LAN IP Address: 192.168.2.1 PC 192.168.2.xxx Set the VPN settings
3 | Functions and Features Broadband Modem and NAT Router Connects multiple computers to a broadband (cable or DSL) modem, and/or Ethernet router to
VPN Settings – Tunnel 1 – IKE Set the Tunnel 1 IKE settings as follows: Tunnel 1: 1 Local Subnet: 192.168.2.0 Local Netmask: 255.255.255.0 Remo
VPN Settings – Tunnel 1 – Set IKE Proposal Set the Tunnel 1 IKE Proposal settings as follows: ID: 1 Proposal Name: 1 DH Group: Group2 Encypt. a
VPN Settings – Tunnel 1 – Set IPSec Proposal Set the Tunnel 1 IPSec Proposal settings as follows: ID: 1 Proposal Name: 1 DH Group: Group2 Encap
9 | Troubleshooting A. Verifying your connection to the router If you are unable to access the Router’s web-based administration pages, then you may
F. I am having problems establishing a PPPoE xDSL WAN connection Some ISP’s require you to enter the domain name in addition to your username and pass
J. I forgot my password and can no longer log into the router. You should restore your router to factory defaults via its hardware reset button. Loca
10 | Technical Specifications Standards: IEEE 802.3 10Base-T Ethernet IEEE 802.3u 100Base-TX Fast Ethernet Hardware / Ports: LAN Port 4x RJ45, 10
Dynamic IP L2TP PPTP BigPond Static IP Input Power: 5V 2A Operating Temperature: 0~40oC Humidity: 10%~90% non-condensing Compliances: FCC CE VCCI
11 | Terminology 10BaseT - Physical Layer Specification for Twisted-Pair Ethernet using Unshielded Twisted Pair wire at 10Mbps. This is the most popu
DHCP - Dynamic Host Configuration Protocol. This protocol automatically configures the TCP/IP settings of every computer on your home network. DMZ -
4 | Panel Layout The following figure shows the front panel layout, which is followed by a table describing in detail the status and function of eac
ISP - Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations
to the Internet with a single user account, or to map the local address for an IP server (such as Web or FTP) to a public address. This secures your n
TCP - Transmission Control Protocol - TCP and UDP (User Datagram Protocol) are the two transport protocols in TCP/IP. TCP ensures that a message is se
SMCBR18VPN Front Panel: 8 LAN, 1 WAN, and 1 COM port Port Type Description 5 VDC Receptor for power adapter: 5 VDC, 2 A (minimum) WAN This is th
you have not previously installed TCP/IP protocols on your client PCs, refer to the following section. 6.1 | Installing TCP/IP Windows 95/98/Me 1.
Komentáře k této Příručce