09.11.2012 Views

Router User's Guide - Optus Internet Help

Router User's Guide - Optus Internet Help

Router User's Guide - Optus Internet Help

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SpeedStream®<br />

<strong>Router</strong><br />

User’s <strong>Guide</strong><br />

Series 4100 and 4200<br />

Part No. 007-4035-001


© Copyright 2004, Siemens Subscriber Network.<br />

All rights reserved. Printed in the U.S.A.<br />

Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Siemens Subscriber Networks shall<br />

not be liable for technical or editorial errors or omissions in this document; nor for incidental or consequential damages resulting from the furnishing,<br />

performance, or use of this material.<br />

Siemens Subscriber Networks – End User Software License and Limited Warranty<br />

INSTALLATION OF THE HARDWARE AND SOFTWARE PROVIDED BY SIEMENS SUBSCRIBER NETWORKS (SSN) CONSTITUTES<br />

ACCEPTANCE BY YOU OF THE TERMS OF THE FOLLOWING SOFTWARE LICENSE AND LIMITED WARRANTY. IF YOU DO NOT ACCEPT<br />

THESE TERMS, PLEASE RETURN THE HARDWARE AND SOFTWARE IN ITS ORIGINAL PACKAGING TO THE STORE OR OTHER VENDOR<br />

FROM WHICH YOU PURCHASED IT FOR A FULL REFUND OF THE PURCHASE PRICE.<br />

The following describes your license to use the software (the “Software”) that has been provided with your SSN DSL customer premises equipment<br />

(“Hardware”) and the limited warranty that SSN provides on its Software and Hardware.<br />

Software License<br />

The Software is protected by copyright laws and international copyright treaties. The Software is licensed and not sold to you. Accordingly, while you<br />

own the media (CD ROM or floppy disk) on which the Software is recorded, SSN retains ownership of the Software itself.<br />

1. Grant of License. You may install and use one (and only one) copy of the Software on the computer on which the Hardware is being installed. If the<br />

Hardware is being installed on a network, you may install the Software on the network server or other server-side device on which the Hardware is<br />

being installed and onto the client-side devices connected to the network as necessary.<br />

2. Restrictions. The license granted is a limited license. You may NOT: sublicense, assign, or distribute copies of the Software to others; decompile,<br />

reverse engineer, disassemble or otherwise reduce the Software or any part thereof to a human perceivable form; modify, adapt, translate or create<br />

derivative works based upon the Software or any part thereof; or rent, lease, loan or otherwise operate for profit the Software.<br />

3. Transfer. You may transfer the Software only where you are also transferring the Hardware. In such cases, you must remove all copies of the<br />

Software from any devices onto which you have installed it, and must ensure that the party to whom you transfer the Hardware receives this License<br />

Agreement and Limited Warranty.<br />

4. Upgrades Covered. This license covers the Software originally provided to you with the Hardware, and any additional software that you may<br />

receive from SSN, whether delivered via tangible media (CD ROM or floppy disk), down loaded from SSN or delivered through customer support. Any<br />

such additional software shall be considered “Software” for all purposes under this License.<br />

5. Export Law Assurance. You acknowledge that the Software may be subject to export control laws and regulations of the U.S.A. You confirm that<br />

you will not export or re-export the Software to any countries that are subject to export restrictions.<br />

6. No Other Rights Granted. Other than the limited license expressly granted herein, no license, whether express or implied, by estoppel or<br />

otherwise, is granted to any copyright, patent, trademark, trade secret, or other proprietary rights of SSN.<br />

7. Termination. Without limiting SSN’s other rights, SSN may terminate this license if you fail to comply with any of these provisions. Upon termination,<br />

you must destroy the Software and all copies thereof.<br />

Limited Warranty<br />

The following limited warranties provided by SSN extend to the original end user of the Hardware/licensee of the Software and are not assignable or<br />

transferable to any subsequent purchaser/licensee.<br />

1. Hardware. SSN warrants that the Hardware will be free from defects in materials and workmanship and will perform substantially in compliance with<br />

the user documentation relating to the Hardware for a period of one year from the date the original end user received the Hardware.<br />

2. Software. SSN warrants that the Software will perform substantially in compliance with the end user documentation provided with the Hardware and<br />

Software for a period of ninety days from the date the original end user received the Hardware and Software. The end user is responsible for the<br />

selection of hardware and software used in the end user’s systems. Given the wide range of third-party hardware and applications, SSN does not<br />

warrant the compatibility or uninterrupted or error free operation of our Software with the end user’s system.<br />

3. Exclusive Remedy. Your exclusive remedy and SSN’s exclusive obligation for breach of this limited warranty is, in SSN’s sole option, either (a) a<br />

refund of the purchase price paid for the Hardware/Software or (b) repair or replacement of the Hardware/Software with new or remanufactured<br />

products. Any replacement Hardware or Software will be warranted for the remainder of the original warranty period or thirty (30) days, which ever is<br />

longer.<br />

4. Warranty Procedures. If a problem develops during the limited warranty period, the end user shall follow the procedure outlined below:<br />

A. Prior to returning a product under this warranty, the end user must first call SSN at (888) 286-9375, or send an email to SSN at<br />

support.ssn@siemens.com to obtain a return materials authorization (RMA) number. RMAs are issued between 8:00 a.m. and 5:00 p.m. Central Time,<br />

excluding weekends and holidays. The end user must provide the serial number(s) of the products in order to obtain an RMA.<br />

B. After receiving an RMA, the end user shall ship the product, including power supplies and cable, where applicable, freight or postage prepaid and<br />

insured, to SSN at 4849 Alpha Road, Dallas Texas 75244, U.S.A. Within five (5) days notice from SSN, the end user shall provide SSN with any<br />

missing items or, at SSN’s sole option, SSN will either (a) replace missing items and charge the end user or (b) return the product to the end user<br />

freight collect. The end user shall include a return address, daytime telephone number and/or fax. The RMA number must be clearly marked on the<br />

outside of the package.<br />

C. Returned Products will be tested upon receipt by SSN. Products that pass all functional tests will be returned to the end user.<br />

D. SSN will return the repaired or replacement Product to the end user at the address provided by the end user at SSN’s expense. For Products<br />

shipped within the United States of America, SSN will use reasonable efforts to ensure delivery within five (5) business days from the date received by<br />

SSN. Expedited service is available at additional cost to the end user.<br />

E. Upon request from SSN, the end user must prove the date of the original purchase of the product by a dated bill of sale or dated itemized receipt.<br />

5.Limitations.<br />

The end user shall have no coverage or benefits under this limited warranty if the product has been subject to abnormal use, abnormal conditions,<br />

improper storage, exposure to moisture or dampness, unauthorized modifications, unauthorized repair, misuse, neglect, abuse, accident, alteration,<br />

improper installation, or other acts which are not the fault of SSN, including acts of nature and damage caused by shipping.


SSN will not honor, and will consider the warranty voided, if: (1) the seal or serial number on the Product have been tampered with; (2) the Product’s<br />

case has been opened; or (3) there has been any attempted or actual repair or modification of the Product by anyone other than an SSN authorized<br />

service provider.<br />

The limited warranty does not cover defects in appearance, cosmetic, decorative or structural items, including framing, and any non-operative parts.<br />

SSN’s limit of liability under the limited warranty shall be the actual cash value of the product at the time the end user returns the product for repair,<br />

determined by the price paid by the end user for the product less a reasonable amount for usage. SSN shall not be liable for any other losses or<br />

damages.<br />

The end user will be billed for any parts or labor charges not covered by this limited warranty. The end user will be responsible for any expenses<br />

related to reinstallation of the product.<br />

THIS LIMITED WARRANTY IS THE ONLY WARRANTY SSN MAKES FOR THE PRODUCT AND SOFTWARE. TO THE EXTENT ALLOWED BY<br />

LAW, NO OTHER WARRANTY APPLIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING ANY WARRANTY OF<br />

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.<br />

6. Out of Warranty Repair. Out of warranty repair is available for fixed fee. Please contact SSN at the numbers provided above to determine the<br />

current out of warranty repair rate. End users seeking out of warranty repair should contact SSN as described above to obtain an RMA and to arrange<br />

for payment of the repair charge. All shipping charges will be billed to the end user.<br />

General Provisions<br />

The following general provisions apply to the foregoing Software License and Limited Warranty:<br />

1. No Modification. The foregoing limited warranty is the end user’s sole and exclusive remedy and is in lieu of all other warranties, express or<br />

implied. No oral or written information or advice given by SSN or its dealers, distributors, employees or agents shall in any way extend, modify or add<br />

to the foregoing Software License and Limited Warranty. This Software License and Limited Warranty constitutes the entire agreement between SSN<br />

and the end user, and supersedes all prior and contemporaneous representation, agreements or understandings, oral or written. This Software License<br />

and Limited Warranty may not be changed or amended except by a written instrument executed by a duly authorized officer of SSN.<br />

SSN neither assumes nor authorizes any authorized service center or any other person or entity to assume for it any other obligation or liability beyond<br />

that which is expressly provided for in this limited warranty including the provider or seller of any extended warranty or service agreement.<br />

The limited warranty period for SSN supplied attachments and accessories is specifically defined within their own warranty cards and packaging.<br />

2. EXCLUSION OF INCIDENTAL, CONSEQUENTIAL AND CERTAIN OTHER DAMAGES. TO THE FULL EXTENT PERMITTED BY LAW, IN NO<br />

EVENT SHALL SSN BE LIABLE, WHETHER UNDER CONTRACT, WARRANTY, TORT OR ANY OTHER THEORY OF LAW FOR ANY SPECIAL,<br />

INCIDENTAL OR CONSEQUENTIAL DAMAGES WHATSOEVER, INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OF PROFITS,<br />

BUSINESS INTERRUPTION, PERSONAL INJURY, LOSS OR IMPAIRMENT OF DATA OR BUSINESS INFORMATION, EVEN IF SSN HAS BEEN<br />

NOTIFIED OF THE POSSIBILITY OF SUCH DAMAGES. SSN’S LIABILITY TO YOU (IF ANY) FOR ACTUAL DIRECT DAMAGES FOR ANY CAUSE<br />

WHATSOEVER, AND REGARDLESS OF THE FORM OF THE ACTION, WILL BE LIMITED TO, AND SHALL NOT EXCEED, THE AMOUNT PAID<br />

FOR THE HARDWARE/SOFTWARE.<br />

3. General. This Software License and Limited Warranty will be covered by and construed in accordance with the laws of the State of Texas, United<br />

States (excluding conflicts of laws rules), and shall inure to the benefit of SSN and its successor, assignees and legal representatives. If any provision<br />

of this Software License and Limited Warranty is held by a court of competent jurisdiction to be invalid or unenforceable to any extent under applicable<br />

law, that provision will be enforced to the maximum extent permissible, and the remaining provisions of this Software License and Limited Warranty will<br />

remain in full force and effect. Any notices or other communications to be sent to SSN must be mailed by certified mail to the following address:<br />

Siemens Subscriber Networks<br />

4849 Alpha Road<br />

Dallas, TX 75244<br />

U.S.A.<br />

Attn: Customer Service


<strong>Router</strong> User’s <strong>Guide</strong><br />

Contents<br />

INTRODUCTION...........................................................................................................................................3<br />

Features of the SpeedStream ® <strong>Router</strong>............................................................................................... 3<br />

Network (LAN) Features .................................................................................................................. 3<br />

Security Features............................................................................................................................. 3<br />

Configuration & Management.......................................................................................................... 4<br />

Advanced <strong>Router</strong> Functions ............................................................................................................ 4<br />

Minimum System Requirements ........................................................................................................ 4<br />

General Safety <strong>Guide</strong>lines .................................................................................................................. 4<br />

PHYSICAL INSTALLATION......................................................................................................................... 5<br />

Minimum System Requirements ........................................................................................................ 5<br />

Hardware Installation........................................................................................................................... 5<br />

Basic Installation Procedure ............................................................................................................ 5<br />

Installing Line Filters ........................................................................................................................ 6<br />

Connecting Cables .......................................................................................................................... 7<br />

OPERATING SYSTEM CONFIGURATION ................................................................................................. 9<br />

Check TCP/IP Protocol Settings......................................................................................................... 9<br />

Checking TCP/IP Settings (Windows 9x/ME)................................................................................10<br />

Checking TCP/IP Settings (Windows 2000) ..................................................................................11<br />

Checking TCP/IP Settings (Windows XP) .....................................................................................12<br />

Checking TCP/IP Settings (MAC OS 8.6 through 9.x) ..................................................................13<br />

Checking TCP/IP Settings (MAC OSX) .........................................................................................14<br />

<strong>Internet</strong> Access Configuration .........................................................................................................15<br />

For Windows 9x/2000 ....................................................................................................................15<br />

For Windows XP ............................................................................................................................15<br />

SPEEDSTREAM ROUTER SETUP ...........................................................................................................16<br />

Before Configuring the <strong>Router</strong> .........................................................................................................16<br />

Connecting to the <strong>Router</strong>..................................................................................................................17<br />

Selecting PPP Connection.............................................................................................................18<br />

PPP Login......................................................................................................................................19<br />

Home Window ....................................................................................................................................20<br />

CONFIGURING USER PROFILES ............................................................................................................21<br />

Add User Profiles...............................................................................................................................21<br />

Editing User Profiles..........................................................................................................................24<br />

Deleting User Profiles........................................................................................................................24<br />

CONFIGURING ISP CONNECTION SETTINGS .......................................................................................25<br />

WAN Interface ....................................................................................................................................25<br />

Host .....................................................................................................................................................26<br />

DHCP...................................................................................................................................................27<br />

Static Routes ......................................................................................................................................29<br />

RFC2684..............................................................................................................................................30<br />

CONFIGURING NETWORK SETTINGS....................................................................................................31<br />

RIP (Routing Information Protocol)................................................................................................32<br />

Port Forwarding .............................................................................................................................33<br />

UPnP (Universal Plug and Play)....................................................................................................34<br />

Bridge Mode...................................................................................................................................35<br />

Server Ports...................................................................................................................................36<br />

i


<strong>Router</strong> User’s <strong>Guide</strong> Contents<br />

Dynamic DNS ................................................................................................................................37<br />

CONFIGURING SECURITY FEATURES...................................................................................................38<br />

Admin User ....................................................................................................................................39<br />

Time Client..........................................................................................................................................40<br />

NAT/NAPT Server...............................................................................................................................41<br />

Firewall................................................................................................................................................42<br />

Level ..............................................................................................................................................43<br />

Snooze...........................................................................................................................................44<br />

DMZ ...............................................................................................................................................45<br />

Filter Rules.....................................................................................................................................46<br />

Log.......................................................................................................................................................52<br />

ADS......................................................................................................................................................53<br />

MONITORING ROUTER HEALTH.............................................................................................................55<br />

Status and Statistics..........................................................................................................................55<br />

System Summary ..........................................................................................................................56<br />

System Log....................................................................................................................................56<br />

Diagnostics.........................................................................................................................................59<br />

Tools....................................................................................................................................................60<br />

Interface Map.................................................................................................................................60<br />

Reboot ...........................................................................................................................................61<br />

Update ...........................................................................................................................................62<br />

TROUBLESHOOTING................................................................................................................................63<br />

Basic Troubleshooting Steps ...........................................................................................................63<br />

Interpreting the LED Display.............................................................................................................64<br />

Resolving Specific Issues.................................................................................................................65<br />

POST Failure (red pwr LED)..........................................................................................................65<br />

Contacting Technical Support..........................................................................................................66<br />

CONFIGURATION DATA SHEETS ...........................................................................................................67<br />

Administrative User Setup................................................................................................................67<br />

Attack Detection System...................................................................................................................67<br />

DHCP...................................................................................................................................................68<br />

Firewall – Custom IP Filter Configuration .......................................................................................68<br />

Firewall - DMZ.....................................................................................................................................71<br />

Firewall – Level ..................................................................................................................................71<br />

Firewall – Snooze Control.................................................................................................................71<br />

Host .....................................................................................................................................................71<br />

LAN IP .................................................................................................................................................71<br />

NAT/NAPT...........................................................................................................................................71<br />

Port Forwarding .................................................................................................................................73<br />

PPP Login ...........................................................................................................................................74<br />

RIP .......................................................................................................................................................75<br />

Static Route ........................................................................................................................................75<br />

System Log.........................................................................................................................................75<br />

Time Client..........................................................................................................................................75<br />

UPnP....................................................................................................................................................76<br />

TECHNICAL SPECIFICATIONS ................................................................................................................77<br />

FIREWALL SECURITY LEVELS ...............................................................................................................79<br />

ii


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 1<br />

Introduction<br />

3<br />

1<br />

Congratulations on the purchase of the SpeedStream ® <strong>Router</strong> with SecureRoute TM SpeedStream ® <strong>Router</strong><br />

(<strong>Router</strong>) is a powerful yet simple communication device for connecting your computer or local area<br />

network (LAN) to the <strong>Internet</strong>. This manual covers the SpeedStream model series 4100 and 4200.<br />

SpeedStream 4100 Series (Ethernet) SpeedStream 4200 Series (Ethernet and USB)<br />

Features of the SpeedStream ® <strong>Router</strong><br />

Your <strong>Router</strong> provides high-speed <strong>Internet</strong> and corporate network access to homes, networked home<br />

offices, and small offices. In addition, if you are working from a branch office, the <strong>Router</strong> provides a fast<br />

and effective means of communicating over a remote LAN with the main office. The <strong>Router</strong> can also be<br />

used to connect the corporate LAN to the <strong>Internet</strong> over the WAN.<br />

Network (LAN) Features<br />

• Ethernet Switch<br />

Ethernet connectivity (all models) to the <strong>Internet</strong> or network through a network interface card (NIC),<br />

providing full 10/100 megabits per second (Mbps) bandwidth to the port.<br />

• USB Connection<br />

Universal Serial Bus (USB) connection (4200 model) providing added flexibility for connecting your<br />

computer via the Ethernet or USB port.<br />

• Support of G.lite and Full-Rate DsL<br />

Ensures compatibility with most DSL networks.<br />

Security Features<br />

• Password-protected Configuration<br />

Password protection prevents unauthorized users from modifying the <strong>Router</strong>’s configuration settings.<br />

• Firewall Security<br />

Firewall security with four conveniently pre-set standard levels of security (Off, Low, Medium, High), an<br />

ICSA-compliant mode, and a custom setting for advanced users.<br />

• NAT Protection<br />

Network Address Port Translation (NAPT) and a secure firewall to protect your data while your<br />

computer is connected to the <strong>Internet</strong>.<br />

• Stateful Inspection Firewall<br />

All incoming data packets are monitored and all incoming server requests are filtered, thus protecting<br />

your network from malicious attacks from external sources.<br />

• Attack Protection System<br />

Attacks can flood your <strong>Internet</strong> connection with invalid data packets and connection requests, using so<br />

much bandwidth and so many resources that <strong>Internet</strong> access becomes unavailable. The <strong>Router</strong><br />

incorporates protection against these types of attacks as well as other common hacker attacks.


<strong>Router</strong> User’s <strong>Guide</strong> Introduction<br />

• Virtual Private Network<br />

Virtual Private Network allows remote users to establish a secure connection to a corporate network<br />

by setting pass-through of the three most commonly used VPN protocols: PPTP, L2TP, and IPSec.<br />

Configuration & Management<br />

• Easy Setup<br />

Use your Web browser for quick and easy configuration.<br />

• UPnP Support<br />

Universal Plug and Play (UPnP) allows automatic discovery and configuration of the SpeedStream<br />

<strong>Router</strong>. UPnP is supported by Windows Me, XP, or later, operating systems.<br />

Advanced <strong>Router</strong> Functions<br />

• DMZ<br />

One computer on your local network can be configured to allow unrestricted two-way communication<br />

with servers or individual users on the <strong>Internet</strong>. This provides the ability to run programs that are<br />

incompatible with firewalls.<br />

• Port Forwarding<br />

Port Forwarding provides flexibility by allowing you to change internal IP addresses without affecting<br />

outside access to your network.<br />

• Session Tracking<br />

Some protocols, such as FTP, require secondary network connections on ports other than the main<br />

control port. These connections are usually made using port numbers in the dynamic range (> 1024).<br />

The firewall allows traffic on secondary sessions without manual configuration.<br />

Minimum System Requirements<br />

At a minimum, your computer must be equipped with the following to successfully install the <strong>Router</strong>. Your<br />

<strong>Internet</strong> Service Provider may have additional requirements for use of their service.<br />

• Ethernet connection method<br />

− A network interface card (NIC) that supports Ethernet 10/100Base-T full-/half-duplex.<br />

− Operating system that supports TCP/IP.<br />

− Microsoft <strong>Internet</strong> Explorer or Netscape Navigator versions 5.0 or later.<br />

• USB connection method<br />

− 32 MB RAM<br />

− Pentium-compatible 166 MHz processor (or faster).<br />

− 12 MB available hard disk space.<br />

− Windows 98 or later operating system.<br />

General Safety <strong>Guide</strong>lines<br />

When using the SpeedStream <strong>Router</strong>, observe the following safety guidelines:<br />

• Never install telephone wiring during a storm.<br />

• Avoid using a telephone during an electrical storm. Lightening increases the risk of electrical shock.<br />

• Do not install telephone jacks in wet locations and never use the product near water.<br />

• Do not exceed the maximum power load ratings for the product.<br />

4


Residential Gateway Family User <strong>Guide</strong><br />

Chapter 2<br />

Physical Installation<br />

This chapter covers the physical installation of the SpeedStream <strong>Router</strong>.<br />

Minimum System Requirements<br />

• DSL service and an <strong>Internet</strong> access account from an <strong>Internet</strong> Service Provider (ISP).<br />

• Network cables for the device you intend to connect to the <strong>Router</strong>. Use standard CAT5 Ethernet<br />

cables with RJ45 connectors.<br />

• TCP/IP network protocol must be installed on all computers.<br />

• For USB connection to the <strong>Router</strong>, the following operating systems are supported (if your <strong>Router</strong><br />

model supports USB):<br />

− Windows 98, 98SE<br />

− Windows 2000<br />

− Windows ME or XP<br />

− Mac OS versions 8.6 through 10.2.4<br />

Note: Your configuration may vary slightly from the instructions and illustrations in this chapter. Refer to<br />

your service provider’s documentation, or contact them with questions regarding your specific<br />

configuration.<br />

Hardware Installation<br />

You may position the SpeedStream <strong>Router</strong> at any convenient location in your office or home. No special<br />

wiring or cooling requirements are needed; however, you should comply with the safety guidelines<br />

specified in the General Safety <strong>Guide</strong>lines section.<br />

Basic Installation Procedure<br />

1. Install line filters if necessary.<br />

2. Connect the cables.<br />

3. Install USB drivers if necessary.<br />

4. Configure network settings on your computer.<br />

5. Configure the <strong>Router</strong> via the Web-based management interface.<br />

6. Reboot the computer if prompted. Whenever you are required to reboot the <strong>Router</strong>, allow five<br />

seconds between turning off the unit and powering it back on.<br />

5<br />

2


Residential Gateway Family User <strong>Guide</strong> Installation<br />

Installing Line Filters<br />

Because DSL shares your telephone line, you may need to separate the two signals so they do not<br />

interfere with each other. A line filter (may be included with some models) prevents DSL traffic from<br />

disrupting the voice signal on the telephone line, and vice versa. Follow the procedures below to install<br />

line filters on any device (telephones, fax machines, caller ID boxes) that shares the same telephone line<br />

with your DSL. (Note, this section may not apply to you. Consult your provider if you are unsure.)<br />

There are two types of filters to connect between the telephone and the wall plate:<br />

• In-line filter: For use with standard desktop telephones.<br />

• Wall-mount filter: For use with wall-mounted telephones.<br />

DSL performance may be significantly degraded if the line filters are not installed in the correct direction,<br />

as illustrated below.<br />

In-Line Filter<br />

For each device sharing the same telephone line:<br />

1. Unplug the device’s cord from the telephone jack.<br />

2. Plug the filter into the telephone jack.<br />

3. Plug the telephone cord (or other device cord) into the<br />

filter.<br />

Wall-Mount Filter<br />

For a wall-mounted telephone, install a wall mount filter:<br />

1. Remove the telephone.<br />

2. Connect the wall mount filter to the wall plate.<br />

3. Reconnect the telephone.<br />

6


Residential Gateway Family User <strong>Guide</strong> Installation<br />

Connecting Cables<br />

The <strong>Router</strong> provides ports for either a USB or an Ethernet connection to your primary computer. Select<br />

the interface you will use to connect the <strong>Router</strong>, and follow the step-by-step instructions below for your<br />

chosen installation method.<br />

Ethernet Installation Method<br />

To connect the SpeedStream <strong>Router</strong> via the Ethernet interface, your<br />

computer must have an Ethernet adapter (also called a network interface<br />

card, or “NIC”) installed.<br />

If your computer does not have this adapter, install it before proceeding<br />

further. Refer to your Ethernet adapter documentation for complete<br />

installation instructions.<br />

2. Connect the DSL cable<br />

1. Connect the Ethernet cable(s)<br />

1) With your computer powered off, connect the Ethernet<br />

cable to an Ethernet port (1-4) on the <strong>Router</strong>.<br />

2) Connect the other end of the Ethernet cable to the<br />

Ethernet port on your computer.<br />

3) If desired, use standard 10/100 CAT5 Ethernet cables<br />

to connect additional computers to the remaining<br />

Ethernet ports on the <strong>Router</strong>.<br />

1) Connect the DSL cable (resembles a telephone cord) to the DSL port on the <strong>Router</strong>.<br />

2) Plug the other end of the DSL cable into the phone jack.<br />

3. Connect the power<br />

1) Connect the power adapter to the rear of the <strong>Router</strong>.<br />

2) Plug the power adapter into the electrical wall outlet.<br />

3) Flip the power switch to power on the SpeedStream <strong>Router</strong>.<br />

4) Power on all connected computers.<br />

4. Check the LEDs<br />

1) For each active Ethernet connection, the LAN Link LED for the corresponding port number should<br />

be lit.<br />

2) The DSL and Power LEDs should be lit.<br />

When using the Ethernet installation method, you do not have to install any software. Refer to your<br />

<strong>Internet</strong> Service Provider’s instructions for installing their software and/or connecting to the <strong>Internet</strong>. You<br />

can now configure the TCP/IP settings as detailed in Chapter 3, Operating System Configuration.<br />

7


Residential Gateway Family User <strong>Guide</strong> Installation<br />

USB Installation Method (Microsoft Windows)<br />

2. Connect the DSL Cable<br />

1. Connect the USB Cable<br />

1) With your computer off, connect the provided USB cable to<br />

the USB port on the <strong>Router</strong>.<br />

2) Connect the other end of the USB cable to an open USB<br />

port on your computer.<br />

3) If desired, use standard 10/100 CAT5 Ethernet cables to<br />

connect additional computers to the Ethernet ports on the<br />

<strong>Router</strong>.<br />

1) Connect the DSL cable (resembles a telephone cord) to the DSL port on the <strong>Router</strong>.<br />

2) Plug the other end of the DSL cable into the phone jack.<br />

3. Connect the Power<br />

1) Connect the power adapter to the rear of the <strong>Router</strong>.<br />

2) Plug the power adapter into the electrical wall outlet.<br />

3) Flip the power switch to power on the <strong>Router</strong>.<br />

4) Power on all connected computers.<br />

4. Install USB Driver Software<br />

1) Insert the USB driver CD-ROM into the CD-ROM drive of your computer.<br />

2) When prompted, follow the on-screen instructions to complete the driver installation.<br />

5. Check the LEDs<br />

1) The DSL, USB, and Power LEDs should be lit.<br />

You can now configure the TCP/IP settings as detailed in Chapter 3, Operating System Configuration.<br />

USB Driver Installation (Macintosh Systems)<br />

When using the USB installation method on a Macintosh, follow these steps to install the USB drivers:<br />

1. Insert the SpeedStream Installation CD into your CD-Rom drive.<br />

2. Open the SpeedStream icon from the desktop.<br />

3. Click Readme.txt to open it.<br />

4. Follow the directions in the Readme.txt file.<br />

You can now configure the TCP/IP settings as detailed in Chapter 3, Operating System Configuration.<br />

.<br />

8


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 3<br />

Operating System Configuration<br />

This chapter explains how to configure your computer to work with the <strong>Router</strong>.<br />

To access the <strong>Internet</strong> through the SpeedStream <strong>Router</strong>, the TCP/IP protocol must be installed on your<br />

computer. If TCP/IP is not already installed on your computer, refer to your system documentation or<br />

online help for instructions. Once installed, you should check the TCP/IP protocol settings to make sure<br />

they are correct for use with the <strong>Router</strong>.<br />

Once TCP/IP is installed and configured properly, the next step is to configure your computer to use the<br />

<strong>Router</strong> for <strong>Internet</strong> access by configuring the Web browser to access the <strong>Internet</strong> via the LAN rather than<br />

by a dial-up connection.<br />

Check TCP/IP Protocol Settings<br />

Because the <strong>Router</strong> uses the TCP/IP network protocol for all functions, it is essential that the TCP/IP<br />

protocol be installed and configured properly.<br />

The default network settings for the SpeedStream <strong>Router</strong> are:<br />

IP Address: 192.168.254.254<br />

Subnet Mask: 255.255.255.0<br />

If using the default <strong>Router</strong> settings and the default Windows TCP/IP settings, you do not need to make<br />

any changes.<br />

By default, the <strong>Router</strong> will act as a DHCP server, automatically providing a suitable IP address and<br />

related information to each computer when the computer boots up. For all non-server versions of<br />

Windows, the TCP/IP setting defaults to act as a DHCP client.<br />

The instructions to check TCP/IP protocol settings differ between operating system. Check the settings<br />

using the instructions for your operating system:<br />

• Windows 9x/ME<br />

• Windows 2000<br />

• Windows XP<br />

• MAC OS 8.6 through 9.x<br />

• MAC OSX<br />

9


<strong>Router</strong> User’s <strong>Guide</strong> Operating System Configuration<br />

Checking TCP/IP Settings (Windows 9x/ME)<br />

1. Select Start>Control Panel >Network. This displays the Configuration tab on the “Network”<br />

window.<br />

2. Select the TCP/IP protocol for your network card.<br />

3. Click Properties. This displays the “TCP/IP Properties” window.<br />

4. Click the IP Address tab.<br />

5. Ensure that the Obtain an IP address automatically option is selected. This is the default Windows<br />

settings.<br />

6. Close this window.<br />

7. Restart your computer to ensure it obtains an IP address from the <strong>Router</strong>.<br />

8. Configure internet access using the procedure described in <strong>Internet</strong> Access Configuration.<br />

10


<strong>Router</strong> User’s <strong>Guide</strong> Operating System Configuration<br />

Checking TCP/IP Settings (Windows 2000)<br />

1. On the Windows taskbar click Start>Settings>Control Panel. This<br />

displays the “Control Panel” window.<br />

2. Double-click Network and Dial-up Connections. This displays the<br />

“Network and Dial-up Connections” window.<br />

3. Right-click Local Area Connection and select Properties. This<br />

displays the “Local Area Connections Properties” window.<br />

4. Select the TCP/IP protocol for your network card.<br />

5. Click Properties. This displays the “<strong>Internet</strong> Protocol (TCP/IP)<br />

Properties” window.<br />

6. Select the Obtain an IP address automatically and Obtain DNS server address automatically<br />

options. Exit back to the Control Panel.<br />

7. Restart your computer to ensure it obtains an IP address from the <strong>Router</strong>.<br />

8. Configure internet access using the procedure described in <strong>Internet</strong> Access Configuration.<br />

11


<strong>Router</strong> User’s <strong>Guide</strong> Operating System Configuration<br />

Checking TCP/IP Settings (Windows XP)<br />

1. On the Windows taskbar click Start>Control Panel. This displays the<br />

“Control Panel” window.<br />

2. Double-click the Network Connection icon. This displays the “Network<br />

Connections” window.<br />

3. Right-click Local Area Connection, then click Properties. This displays<br />

the “Local Area Connection Properties” window.<br />

4. Select the TCP/IP protocol for your network card.<br />

5. Click Properties. This displays the “<strong>Internet</strong> Protocol (TCP/IP)<br />

Properties” window.<br />

6. Ensure that Obtain an IP address automatically and Obtain DNS server address automatically<br />

are selected.<br />

7. Exit back to the Control Panel.<br />

8. Restart the computer to ensure it obtains an IP address from the <strong>Router</strong>.<br />

9. Configure internet access using the procedure described in <strong>Internet</strong> Access Configuration.<br />

12


<strong>Router</strong> User’s <strong>Guide</strong> Operating System Configuration<br />

Checking TCP/IP Settings (MAC OS 8.6 through 9.x)<br />

1. Select Apple >Control Panel >TCP/IP. This displays the “TCP/IP” window.<br />

2. Select one of the following from the Connect via drop-down menu.<br />

• Ethernet or Ethernet built-in if connecting via Ethernet.<br />

• Ethernet Adaptor [en0,en1,…] if connecting via USB.<br />

3. Select Using DHCP Server from the Configure drop-down menu.<br />

4. Close the “TCP/IP window” and click Save.<br />

5. Reboot when configuration is saved. Once rebooted, the computer will pull an IP address from the<br />

DHCP server on the <strong>Router</strong>.<br />

6. Configure the <strong>Router</strong> using the procedure described in the next chapter.<br />

13


<strong>Router</strong> User’s <strong>Guide</strong> Operating System Configuration<br />

Checking TCP/IP Settings (MAC OSX)<br />

1. Click Apple -> System Preferences. This displays the “System Preferences” window.<br />

2. Double-click the Network icon under the <strong>Internet</strong> & Network section. This displays the “Network”<br />

window.<br />

3. Select one of the following from the Show drop-down menu:<br />

• Built-in Ethernet if connecting via Ethernet.<br />

• Ethernet Adaptor [en0,en1,…] if connecting via USB.<br />

4. Select Using DHCP Server from the Configure IPv4 drop-down menu.<br />

5. Click Apply Now and quit window.<br />

6. Configure the <strong>Router</strong> using the procedure described in the next chapter.<br />

14


<strong>Router</strong> User’s <strong>Guide</strong> Operating System Configuration<br />

<strong>Internet</strong> Access Configuration<br />

Windows users must configure their computers to use the <strong>Router</strong> for <strong>Internet</strong> access. Ensure that the<br />

<strong>Router</strong> is installed correctly and the DSL line is functional. Then follow the appropriate procedure below to<br />

configure your Web browser to access the <strong>Internet</strong> via the LAN, rather than by a dial-up connection.<br />

For Windows 9x/2000<br />

1. Select Start>Settings>Control Panel to display the Control Panel.<br />

2. Double-click the <strong>Internet</strong> Options icon. This displays the “<strong>Internet</strong> Properties” window.<br />

3. Click the Connections tab.<br />

4. Click Setup.<br />

5. Click I want to set up my <strong>Internet</strong> connection manually, or I want to connect through a local<br />

area network (LAN), then click Next. This displays the “<strong>Internet</strong> Connection Wizard” window.<br />

6. Click I connect through a local area network (LAN), then click Next. This displays the “Local Area<br />

Network <strong>Internet</strong> Configuration” window.<br />

7. Ensure all the boxes are deselected, then click Next. This displays the “Set Up your <strong>Internet</strong> Mail<br />

Account” window.<br />

8. Click No, then click Next. This displays the “Completing the <strong>Internet</strong> Connection Wizard” window.<br />

9. Click Finish to close the <strong>Internet</strong> Connection Wizard. Setup is now complete.<br />

10. Configure the <strong>Router</strong> using the procedure described in the next chapter.<br />

For Windows XP<br />

1. Select Start>Control Panel.<br />

2. Double-click the <strong>Internet</strong> Options icon. This displays the “<strong>Internet</strong> Options” window.<br />

3. Click the Connections tab.<br />

4. Click Setup. This starts the New Connection Wizard.<br />

5. Click Next.<br />

6. Select Connect to the <strong>Internet</strong>, then click Next.<br />

7. Select Setup my connection manually, then click Next.<br />

8. Select Connect using a broadband connection that is always on, then click Next.<br />

9. Click Finish.<br />

10. Configure the <strong>Router</strong> using the procedure described in the next chapter.<br />

15


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 4<br />

SpeedStream <strong>Router</strong> Setup<br />

This chapter provides details for the <strong>Router</strong> setup processes.<br />

This chapter describes the steps to set up the SpeedStream <strong>Router</strong> configuration using the <strong>Router</strong> Setup<br />

Wizard. Other configuration may also be required on the <strong>Router</strong>, depending on which features and<br />

functions of the SpeedStream <strong>Router</strong> you wish to use. Use the table below to locate detailed instructions<br />

for the required functions.<br />

To do this: Refer to:<br />

Configure users on the <strong>Router</strong>. Chapter 5, “Configuring User Profiles”<br />

Configure ISP configuration parameters. This should only be<br />

done when instructed by your ISP.<br />

16<br />

Chapter 6, “Configuring ISP<br />

Connection Settings”<br />

Configure network related information. Chapter 7, “Configuring Network<br />

Settings”<br />

Add security to your network.<br />

Refer to, for details.<br />

Chapter 8, “Configuring Security<br />

Features”<br />

Monitor the health of the <strong>Router</strong>. Chapter 9, “Monitoring <strong>Router</strong> Health”<br />

Before Configuring the <strong>Router</strong><br />

Before attempting to configure the <strong>Router</strong>, please ensure that:<br />

• Your computer can establish a physical connection to the <strong>Router</strong>. The computer and the <strong>Router</strong> must<br />

be directly connected using either the USB or Ethernet port on the <strong>Router</strong>.<br />

• The SpeedStream <strong>Router</strong> is installed correctly and powered on.<br />

• The TCP/IP protocol is installed on all computers on your network. (If you need to install TCP/IP, refer<br />

to your system documentation or Windows <strong>Help</strong>.)<br />

• The network settings on each computer are correctly configured.<br />

From this point on, you will perform all configuration of the SpeedStream <strong>Router</strong> from your computer<br />

using the Web browser-based setup program.<br />

4


<strong>Router</strong> User’s <strong>Guide</strong> SpeedStream <strong>Router</strong> Setup<br />

Connecting to the <strong>Router</strong><br />

The SpeedStream <strong>Router</strong> contains an HTTP server that allows you to connect to the <strong>Router</strong> and<br />

configure it from your Web browser (Microsoft <strong>Internet</strong> Explorer or Netscape Navigator, versions 5.0 or<br />

later).<br />

To establish a connection from your computer to the <strong>Router</strong>:<br />

1. After installing the <strong>Router</strong>, start your computer. If your computer is already running, reboot it.<br />

2. Open your <strong>Internet</strong> Explorer or Netscape Navigator Web browser.<br />

3. In the Address bar, enter the default router IP address: http://speedstream and press Enter. This<br />

displays the “Gateway Administrator Setup” window.<br />

The first time you connect to the <strong>Router</strong> via the Web browser, you must set up an administrator account<br />

on the “Gateway Administrator Setup” window before you can proceed.<br />

4. Specify a user name for the administrator. You may accept the default user name, admin, or enter a<br />

new user name in User Name. The user name is case-sensitive.<br />

5. Enter a password in New Password; then enter the same password in Confirm New Password. The<br />

password field is case-sensitive.<br />

6. Select a login security level from one of the following:<br />

• Require admin login to access entire Web site<br />

Before you can access any screen in the Web interface, you must log in with your network user<br />

name and password. (Security level = High)<br />

• Require admin login to access configuration pages<br />

Before you can access any screen in the Web interface that allows you to make configuration<br />

changes, you must log in with your network user name and password. (Security level = Medium)<br />

• Do not require admin login:<br />

After you log in for the first time, you will not be required to log in again at any screen. (Security<br />

level = Low)<br />

7. Click Save Settings. Depending on your connection(s), one of the following screens will display:<br />

• If you have no Point-to-Point (PPP) connections configured, the System Summary screen is<br />

displayed.<br />

• If you have one Point-to-Point (PPP) connection configured, the PPP Login screen for that<br />

connection is displayed. Refer to PPP Login for more details.<br />

17


<strong>Router</strong> User’s <strong>Guide</strong> SpeedStream <strong>Router</strong> Setup<br />

• If you have multiple Point-to-Point (PPP) connections configured, the PPP Login [choose<br />

connection] screen displays the available connections. Refer to Selecting PPP Connection for<br />

more details.<br />

Point-to-Point offers the Connect on Demand feature whereby the router will attempt to log on to a<br />

disconnected PPP session if there is requested traffic from the LAN side, and if there is a saved user<br />

name and password. This is especially useful with the Idle Timeout feature. Connect on Demand is<br />

non-configurable, but is always enabled.<br />

8. If you selected either option that requires admin login, you will be required to log in again before you<br />

are permitted to perform any activity. When you select any menu option the following login window is<br />

displayed.<br />

9. Enter the user name and password you assigned to the administrator to perform the remaining<br />

configuration activities.<br />

10. Click OK. This displays the screen for the menu option you selected.<br />

11. Refer to the following chapters for details on configuring and managing the SpeedStream <strong>Router</strong>.<br />

Selecting PPP Connection<br />

If you have configured multiple PPP (Point-to-Point) sessions on your computer, the “Login” window<br />

showing the available PPP connections is displayed after you log on using the “Administrative User<br />

Setup” window.<br />

Click the connection you wish use.<br />

18


<strong>Router</strong> User’s <strong>Guide</strong> SpeedStream <strong>Router</strong> Setup<br />

PPP Login<br />

If you have configured only one PPP (Point-to-Point) session on your computer, the “Login” window for<br />

that PPP connection is displayed after you log on using the “Administrative User Setup” window.<br />

1. Front the PPP Login window, enter the Username and Password.<br />

2. To save the settings so you won’t be asked for the user name and password in the future, click Save<br />

Settings on Connect.<br />

3. To configure additional PPP options, click Show Options. This expands the window to show<br />

configurable options for the PPP connection.<br />

4. Specify any desired PPP options from the following:<br />

• Access Concentrator<br />

Enter the name of the access concentrator as provided by your ISP.<br />

• Service Name<br />

Enter the service name provided by your ISP.<br />

• Auto-Connect on Disconnect<br />

If selected, the <strong>Router</strong> will attempt to login every time the DSL trains if you selected Save<br />

Settings on Connect.<br />

• Idle Timeout (with time value)<br />

Select to disconnect the PPP session if the router has had no traffic for a specified amount of time.<br />

Enter the time in minutes. (This option cannot be used with Autoconnect.)<br />

19


<strong>Router</strong> User’s <strong>Guide</strong> SpeedStream <strong>Router</strong> Setup<br />

Home Window<br />

After initial startup, the “Home” window is displayed on startup.<br />

In the left navigation pane of the “Home” window, there are configuration, diagnostic, status and statistic<br />

options for the <strong>Router</strong>. The list of options displayed differs depending on how a user is logged into the<br />

system. An administrator has full configuration rights (shown above) so will see a complete set of options,<br />

while a user has limited configuration rights and will see the subset specified for that user profile.<br />

Refer to the following chapters for information on how to use each of these options.<br />

• Refer to Chapter 5, “Configuring User Profiles”, for details on adding, modifying, or deleting user<br />

profiles.<br />

• Refer to Chapter 6, “Configuring ISP Connection Settings”, for details on setting ISP configuration<br />

parameters. This should only be done when instructed by your ISP.<br />

• Refer to Chapter 7, “Configuring Network Settings”, for details on configuring network related<br />

information.<br />

• Refer to Chapter 8, “Configuring Security Features”, for details on adding security to your network.<br />

• Refer to Chapter 9, “Monitoring <strong>Router</strong> Health”, for details on viewing network statistics and<br />

connection status.<br />

20


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 5<br />

Configuring User Profiles<br />

This chapter contains details for configuring users on the SpeedStream <strong>Router</strong>.<br />

User profiles are used as a means for controlling <strong>Router</strong> and network access by individual users. Access<br />

to the configuration and management of the <strong>Router</strong> should be restricted to authorized users only. This<br />

chapter describes how to:<br />

• Add user profiles<br />

• Edit user profiles<br />

• Delete User Profiles<br />

Add User Profiles<br />

To add a new user profile:<br />

1. Select Setup>User Profiles from the left navigation pane of the Web interface. This displays the<br />

“Current Profiles” window. User profiles are added using a Wizard accessed from this window.<br />

2. Optionally select the Force all users to be identified before surfing option.<br />

3. Select Click New Profile. This displays the “Profile User Information” window.<br />

4. Enter a Username for the user.<br />

5. Optionally enter a Password for the user and Confirm it.<br />

21<br />

5


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Use Profiles<br />

6. Click Next. This displays the “Profile Content Filtering” window. Content filtering restricts access to<br />

undesirable Web sites and Web content.<br />

7. Select one of the following content filtering options:<br />

• Disable all Content Filtering<br />

User has access to all <strong>Internet</strong> content without restrictions.<br />

• Allow access only to website addresses containing the following words<br />

User has access only to the specified Web addresses or to addresses containing specified word<br />

entries defined in the Website word/name table.<br />

• Deny all access to website addresses containing the following words<br />

User is denied access to all Web addresses specified as well as addresses that contain any words<br />

specified in the Website word/name table.<br />

8. If the Allow access only… or Deny all access… option is selected, type a word or Web address in<br />

the box under the Website word/name table and click Add Entry. The system responds by adding the<br />

word or Web address to the Website word/name table. This can be done multiple times to add<br />

different entries to the table.<br />

9. Note: The entries in the Website word/name table may be either modified or deleted at any time by<br />

clicking either Edit or Delete next to the corresponding word or Web address.<br />

10. Click Next. This displays the “Profile Configuration Access” window. Profile configuration access<br />

defines the access permission for a user controlling what functions and features are available to that<br />

user.<br />

22


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Use Profiles<br />

11. Optionally do one of the following:<br />

• Click one or more of the available features permitting the user to access that feature. This places<br />

a checkmark in the corresponding box. (Click again if you want to remove the checkmark and<br />

deny access).<br />

• Click All Items to select all features in the list.<br />

• Click Reset to clear all selected items and deny the user access to those feature.<br />

12. Click Next. This displays the “Profile Security Access” window.<br />

13. Click one of the following:<br />

• Require admin login to access configuration pages<br />

User must login as admin to change the <strong>Router</strong> configuration. This is the recommended setting.<br />

• Do not require admin login<br />

User will be able to change the <strong>Router</strong> configuration without a password.<br />

14. Click Next. This displays the “Constant Profile IP Address” window.<br />

15. Optionally enter an IP Address to always be associated with this profile.<br />

16. Click Next.<br />

17. This completes the User Profile Wizard. Click Finish to close the Wizard and return to the “Current<br />

Profiles” window.<br />

23


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Use Profiles<br />

Editing User Profiles<br />

This section describes how to edit a user.<br />

To edit a user:<br />

1. Select Setup>User Profiles from the left navigation pane of the Web interface. This displays the<br />

“Current Profiles” window.<br />

2. Click the name of the user you want to change. This displays the “Profile User Information” window.<br />

Make any desired changes.<br />

3. Click Next to get to the next window you want to change. Make any desired changes.<br />

4. Click Finish at any time when you are done making changes.<br />

Deleting User Profiles<br />

This section describes how to delete a user.<br />

To delete a user:<br />

1. Select Setup>User Profiles from the left navigation pane of the Web interface. This displays the<br />

“Current Profiles” window.<br />

2. Click the Delete button next to the name of the user you want to delete.<br />

24


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 6<br />

Configuring ISP Connection Settings<br />

This chapter describes how to set advanced ISP configuration settings. The options in this section should<br />

only be configured with the help and guidance of your ISP. Incorrect changes to any of these options<br />

could result in the failure of your <strong>Internet</strong> connection.<br />

The ISP connection options are listed below.<br />

WAN Interface Wizard for configuring the WAN Interface. The information requested by the Wizard<br />

should be supplied by the service provider.<br />

Host Configure the basic networking attributes of the <strong>Router</strong> (the host).<br />

DHCP Configure and control Dynamic Host Configuration Protocol (DHCP) and DNS<br />

functionality.<br />

Static Routes Add and monitor static IP routes assigned by your ISP. The routing functionality of the<br />

<strong>Router</strong> supports both Dynamic Routing and Static Routing. Static routing pertains to<br />

those routes between network-connected hosts that do not change over time.<br />

RFC2684 Configure WAN-side DHCP functionality for RFC2684 based connections.<br />

WAN Interface<br />

Connectivity to the Wide Area Network (WAN) is achieved by means of one or more Virtual Circuits (VC).<br />

Virtual Circuits are configured using the WAN Interface Configuration Wizard. The information requested<br />

by the Wizard should be supplied by the service provider<br />

25<br />

6


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

Host<br />

Host configuration attributes identify the <strong>Router</strong> on the network and, optionally, specify a default<br />

“gateway” to the Wide Area Network (WAN). Default values for many host IP address, netmask, default<br />

router and host name are automatically generated for the SpeedStream <strong>Router</strong> and should not be<br />

changed unless directed by your ISP. The ISP may ask you to change this information if, for example,<br />

you are assigned a static IP address.<br />

To specify host configuration settings:<br />

1. Select Setup>Host from the left navigation pane of the Web interface. This displays the “Host<br />

Configuration” window.<br />

2. Change settings as specified by your ISP.<br />

3. Click Save Settings. This displays a confirmation screen displays notification that the new setting will<br />

not take affect until you reboot the router. You may do so at this point or later.<br />

26


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

DHCP<br />

DHCP, the Dynamic Host Configuration Protocol, describes the means by which a system can connect to<br />

a network and obtain the necessary information for communication upon that network. Do not change the<br />

default DHCP Configuration settings unless directed by your ISP.<br />

Note: All addresses must be entered as an Ipv4 subnet mask in dotted-decimal notation (for example,<br />

255.255.255.0).<br />

To configure the DHCP feature:<br />

1. Select Setup>DHCP from the left navigation pane of the Web interface. This displays the “DHCP<br />

Configuration” window.<br />

2. Select one of the following:<br />

• Enable<br />

The <strong>Router</strong> will operate as a DHCP server to handle DHCP requests received from connected<br />

LAN-side hosts (DHCP clients). The DHCP server does not serve WAN-side DHCP clients.<br />

The DHCP operating mode defaults to Enable, and the system auto-generates the current IP<br />

address range, IP netmask, and default router. Do not change these default settings unless<br />

directed by your ISP.<br />

• Disable<br />

Disables DHCP. If you are using a static IP address, you may need to disable DHCP and enter<br />

different addresses in the text boxes.<br />

• DHCP Relay<br />

Instead of getting an IP address from the <strong>Router</strong>, the IP address is gotten from the computer as<br />

defined in Relay IP. Used when DHCP information is received from a DHCP server on the WAN<br />

side. DHCP requests are forwarded to the WAN side to Relay IP, and DHCP responses are<br />

forwarded back to the LAN side.<br />

3. In Start IP Range, enter the beginning IP address of the range of addresses from which the DHCP<br />

server will lease to requesting DHCP clients.<br />

27


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

4. In End IP Range, enter the ending IP address of the range of addresses from which the DHCP server<br />

will lease to requesting DHCP clients.<br />

This range definition should consider the following address restrictions:<br />

• The range of IP addresses may extend over only one IP subnet.<br />

• The maximum size of the address pool that may be managed by the DHCP server is 64.<br />

Therefore, the range of addresses must not exceed 64.<br />

• The range of IP addresses should not include any IP address maintained internally by your<br />

SpeedStream device for other purposes. This includes the device’s LAN-side static IP address, as<br />

well as the Default <strong>Router</strong> IP address, Primary or Secondary DNS IP addresses, and Primary or<br />

Secondary Relay IP addresses.<br />

• Commonly used non-<strong>Internet</strong> routed IP address ranges include:<br />

10.0.0.0 - 10.255.255.255<br />

172.16.0.0 - 172.31.255.255<br />

192.168.0.0 - 192.168.255.255<br />

5. In IP Netmask, enter the IP subnet mask that corresponds to the range of IP addresses defined<br />

above.<br />

6. In Default Gateway, do one of the following:<br />

• Enter the IP address of a default gateway, or router, to be provided to DHCP clients.<br />

• Click Self to specify that the SpeedStream <strong>Router</strong> is to be used as the default gateway.<br />

7. In DNS Server (primary), do one of the following:<br />

• Enter IP address of the primary Domain Name System (DNS) server to be provided to DHCP<br />

clients. A DNS server may be used by clients to resolve domain names to IP addresses.<br />

• Click Use WAN to specify that the address of the DNS server provided by your ISP is provided to<br />

DHCP clients on the LAN.<br />

8. In Domain Name, optionally enter the DNS domain name for the DHCP server resident on your<br />

SpeedStream device. This value must be entered as an alpha-numeric string.<br />

9. In Lease Time, do one of the following:<br />

• Enter the period of time an IP addresses leased from the DHCP server is valid. At the end of the<br />

lease period, the DHCP client will transmit a request to the server to extend the lease, at which<br />

time the server will extend the lease period of the IP address assigned to the client. If the lease<br />

period expires without the server receiving a request from the client to extend the lease, the server<br />

will assume the client’s connection no longer exists. The server will release the IP address<br />

assigned to the client and return the address back to the pool of available addresses. (If you select<br />

this option, you must specify a DNS Server.)<br />

• Click Infinite Time:<br />

Leaves the lease time open-ended, preventing the server from releasing the IP address.<br />

10. Click Save Settings.<br />

28


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

Static Routes<br />

The SpeedStream DSL <strong>Router</strong> directs data traffic by “learning” source and destination information, then<br />

building a routing table. In some cases, network mappings cannot be learned because of incompatible<br />

addressing schemes. Sometimes a different source and destination path may be desired over the learned<br />

paths for example when your ISP assigns you a static route. In these situations, Static Routes can be<br />

configured to map a desired pathway.<br />

Use the static routes advanced option to configure static routes to remote equipment. Static routing<br />

allows a pre-defined route to be set for the transmission of data. Static routes take precedence over all<br />

dynamic routing options and also provide enhanced security over dynamic routing.<br />

To configure a static route:<br />

1. Select Setup>Static Routes from the left navigation pane of the Web interface. This displays the<br />

“Static Route Configuration” window.<br />

2. Under Add Route, type the IP address of the destination device in the Destination box.<br />

3. Type the net mask of the destination device in the Net Mask box.<br />

4. Optionally, type the IP address where the data packets will be forwarded in the Next Hop box.<br />

5. Select a connection type from the Interface drop-down menu. This is the interface that will forward<br />

the packets.<br />

6. Click Apply. The system responds by adding your new route to the routing table.<br />

7. You can repeat this procedure for each static route you wish to add.<br />

Note: To edit a static route, click the Edit column for the static route you want to edit.<br />

Note: To delete a static route, click the Delete column for the static route you want to delete.<br />

29


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

RFC2684<br />

The SpeedStream <strong>Router</strong> supports two basic types of connections: Point-to-Point (PPP) and RFC2684.<br />

By default, RFC2684 connections rely on a server located on the Wide Area Network (WAN) to supply the<br />

<strong>Router</strong> a dynamic IP address and other IP-based configuration parameters for the <strong>Router</strong>’s WAN-side<br />

interface. To accomplish this, the <strong>Router</strong> executes a Dynamic Host Configuration Protocol (DHCP) client<br />

associated with the WAN-side connection. This client, in turn, communicates with the DHCP server<br />

located on the WAN.<br />

Under some circumstances, this automated procedure may not be desirable or even possible. In such<br />

situations, you will need to disable the DHCP client on the router and manually define the required IP<br />

configuration parameters, as supplied by your service provider.<br />

To configure RFC2684 functionality:<br />

1. Select Setup>RFC2684 from the left navigation pane of the Web interface. This displays the<br />

“RFC2684 Configuration” window.<br />

2. Select the connection you want to configure from the Connection drop-down menu.<br />

3. Select one of the following from DHCP:<br />

• Enabled<br />

Enables the Dynamic Host Configuration Protocol for the selected connection.<br />

• Disable<br />

Disables the Dynamic Host Configuration Protocol for the selected connection.<br />

4. In IP Address, enter the IP address to be used for the WAN-side of the <strong>Router</strong>, normally obtained<br />

from a DHCP server located on the WAN.<br />

5. In IP Netmask, enter the netmask corresponding to IP Address.<br />

6. In Default Gateway, optionally enter the IP address of a router located on the WAN to be used as the<br />

"gateway" to the WAN.<br />

7. In DNS Server, optionally enter the IP address of a DNS server located on the WAN to be used to<br />

resolve domain name/IP addresses.<br />

8. Click Save.<br />

30


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 7<br />

Configuring Network Settings<br />

This section contains details for configuring network-related information. The network settings options are<br />

listed below.<br />

RIP Activate and control RIP functionality. Using RIP, the <strong>Router</strong> is able to determine the<br />

shortest distance between two points on the network based on the addresses of the<br />

originating devices.<br />

Port Forwarding Control WAN-side access to LAN-side servers through private IP addressing.<br />

UPnP Configure and control UPnP interoperability and security.<br />

Bridge Mode Configure the <strong>Router</strong> as a true WAN/LAN bridge.<br />

Server Ports Specify server ports used by common applications such as HTTP (Web site traffic), FTP,<br />

and Telnet.<br />

Dynamic DNS Set up Dynamic DNS. Dynamic DNS translates IP addresses into alphanumeric names.<br />

For example, an IP address of 333.136.249.80 could be translated into siemens.com.<br />

31<br />

7


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

RIP (Routing Information Protocol)<br />

By default, the SpeedStream <strong>Router</strong> does not support routing protocols. However, support for the Routing<br />

Information Protocol (RIP), versions 1, 2 or 1 and 2, can be activated. This support may be configured for<br />

any WAN connection currently configured or for the LAN in general.<br />

Using RIP, the <strong>Router</strong> is able to determine the shortest distance between two points on the network<br />

based on the addresses of the originating devices. RIP is based on distance algorithms to calculate the<br />

shortest path using information in the routing table. The shortest path is based on the number of hops<br />

between two points.<br />

To use the RIP option:<br />

1. Select Setup>RIP from the left navigation pane of the Web interface. This displays the “RIP<br />

Configuration” window.<br />

2. Select one of the following options from under the RIP Version heading next to the connection of<br />

your choice:<br />

• 1: Provides essential RIP packet formatting for routing information packets.<br />

• 2: Provides enhanced packet formatting for routing information packets by providing the following:<br />

IP address, subnet mask, next hop, and metric (shows how many routers the routing packet<br />

crossed to its destination.<br />

• 1&2: A combination of both types of RIP packets.<br />

3. Select an Active Mode checkbox next to a corresponding connection to enable it.<br />

4. Click Apply. This displays the “Your Settings Have Been Saved” window.<br />

5. Optionally, click Reboot if you wish for the settings to immediately be implemented. The system<br />

responds by restarting your <strong>Router</strong>.<br />

32


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

Port Forwarding<br />

Port forwarding allows selected servers running on the LAN side of the router to be accessed from the<br />

WAN side. Requests from the WAN to a configured TCP or UDP port will be forwarded to the selected IP<br />

address on the LAN. NAPT functionality ensures that the LAN-side server is known to the WAN only<br />

through the public IP address. The server’s actual private IP address remains unknown to any WAN-side<br />

hosts.<br />

To configure port forwarding:<br />

1. Select Setup>Port Forwarding from the left navigation pane of the Web interface. This displays the<br />

“Port Forwarding Configuration” window.<br />

2. Under Add/Edit Entry, do one of the following:<br />

• Select the service you want to configure from the Select service by name drop-down menu.<br />

• Select the protocol you want to configure from the Select protocol drop down menu. This can be<br />

TCP, UDP, ICMP, or GRE. If you select TCP or UDP you must also specify either a single port or<br />

range of ports that apply.<br />

3. Select one of the following:<br />

• Redirect selected protocol/service to this router<br />

Select this option if you want inbound traffic forwarded to the SpeedStream.<br />

• Redirect selected protocol/service to IP address<br />

Select this option if you want inbound traffic forwarded to a host located on the LAN. In this case,<br />

you must specify the IP address of the host on which the server resides.<br />

4. Click Apply.<br />

33


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

UPnP (Universal Plug and Play)<br />

Microsoft UPnP allows the <strong>Router</strong> to communicate directly with certain Windows operating systems to<br />

trade information about the special needs of certain applications (such as messaging programs and<br />

interactive games) as well as provide information about other devices on the network, where applicable.<br />

This communication between the operating system and <strong>Router</strong> greatly reduces the amount of manual<br />

configuration required to use new applications and devices.<br />

Only certain versions of Windows XP and computer support the UPnP (Universal Plug and Play) function.<br />

Before configuring this option, you must ensure that the UPnP component is installed on your computer<br />

and enabled.<br />

To enable UPnP functionality:<br />

1. Select Setup>UPnP from the left navigation pane of the Web interface. This displays the “UPnP<br />

Configuration” window.<br />

2. Select one of the following control options.<br />

• Disable UPnP<br />

Prevents the <strong>Router</strong> from using the UPnP feature to communicate with other devices or your<br />

operating system. Also may be disabled if your operating system does not support UPnP.<br />

• Enable Discovery and Advertisement only (SSDP)<br />

Sends information about new devices (hardware) detected only. No information concerning<br />

software applications or services is transmitted.<br />

• Enable full <strong>Internet</strong> Gateway Device (IGD) support<br />

Allows the <strong>Router</strong> to communicate freely with computers on the network about new devices,<br />

software applications, and services as needed to ensure they are working with minimal manual<br />

configuration required.<br />

3. Select one of the following options:<br />

• Enable access logging<br />

Generates a system log message whenever an UPnP client accesses the router.<br />

• Read-only mode<br />

Restricts the kind of access an UPnP client can have into the router. Only requests in the UPnP<br />

protocol that query the status of the router are allowed. Any requests that could potentially modify<br />

the router’s behavior are blocked.<br />

4. Click Apply to accept the settings. This displays the “UPnP Finish” window.<br />

34


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

Bridge Mode<br />

The <strong>Router</strong> supports two fundamental modes of operation with respect to connectivity between the Local<br />

Area Network (LAN) and the Wide Area Network (WAN): bridge/routing mode and bridge mode.<br />

The default mode of operation is bridge/routing mode. With bridge/routing mode, the <strong>Router</strong> provides<br />

typical routing functionality between the WAN side and the LAN side. However, all LAN-side interfaces<br />

are "bridged."<br />

The second mode of operation provides only "bridging" functionality. This applies to both WAN-to-LAN<br />

connectivity as well as to all LAN-side interfaces. Point-to-Point (PPP) connections are not available<br />

under the bridge mode of operation.<br />

Important! If you switch to Bridge mode, you will lose access to the Web management interface and can<br />

only return to <strong>Router</strong> mode by resetting the <strong>Router</strong> to factory defaults.<br />

To change to bridge mode:<br />

1. Select Setup>Bridge Mode from the left navigation pane of the Web interface. This displays the<br />

“Change to Bridge Mode” window.<br />

2. Click Apply.<br />

35


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

Server Ports<br />

Common applications such as HTTP (Web site traffic), FTP, and Telnet use pre-defined incoming port<br />

numbers for compatibility with other services. If you wish to change the ports used by these applications<br />

you may do so using this option. This feature is recommended for use by advanced users only.<br />

To configure the server port option:<br />

1. Select Setup>Server Ports from the left navigation pane of the Web interface. This displays the<br />

“SpeedStream Gateway Server Ports” window.<br />

2. Optionally, type a port number in the HTTP box. The default port for this field is 80.<br />

3. Optionally, type a port number in the FTP box. The default port for this field is 21.<br />

4. Optionally, type a port number in the Telnet box. The default port for this field is 23.<br />

5. Click Apply. This displays the “Your settings have been saved” window.<br />

6. Optionally, click Reboot if you wish for the settings to immediately be implemented. The system<br />

responds by restarting your <strong>Router</strong>.<br />

36


<strong>Router</strong> User’s <strong>Guide</strong> Configuring Network Settings<br />

Dynamic DNS<br />

Use the dynamic DNS advanced option to set up Dynamic DNS. Dynamic DNS translates IP addresses<br />

into alphanumeric names. For example, an IP address of 333.136.249.80 could be translated into<br />

siemens.com. To use the DDNS service, you must register for the service. You can register from the<br />

following web page: www.dydns.org/services/dydns.<br />

Once registered, you must set up your DNS data on the <strong>Router</strong>. Once this is done, users can connect to<br />

your servers (or DMZ computer) from the <strong>Internet</strong> using your Domain name. Refer to the section in this<br />

document titled DMZ for more information on DMZs.<br />

To set up Dynamic DNS on the <strong>Router</strong>:<br />

1. Select Setup>Dynamic DNS from the left navigation pane of the Web interface. This displays the<br />

“Set Up Dynamic DNS” window.<br />

2. Select the Enable option under Dynamic DNS Client.<br />

3. Type the name provided to you by www.dydns.org in the Service Username box.<br />

4. Type your www.dydns.org password in the Password box.<br />

5. Type the domain or host name provided by www.dydns.org in the Host Name 1 box.<br />

6. Optionally, if you have more than one domain or host name, type it in the Host Name 2 box.<br />

7. Click Apply. The system responds by registering your domain or host name to www.dydns.org.<br />

37


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 8<br />

Configuring Security Features<br />

The <strong>Router</strong> provides broad security measures against unwanted users. Security also allows for the<br />

configuration of the firewall, administrator password, (NAT) Network Address Translation, and DMZ<br />

(Demilitarized Zone) configuration. The security options are listed below.<br />

Admin User Manage administrator login name and password.<br />

Time Client Configure network-based date and time functionality. An accurate date and time is of use<br />

when logging system and firewall events, and is a requirement for some firewall<br />

functionality (e.g., ICSA-compliant firewall operation).<br />

NAT/NAPT Configure and control IP addressing on the Local Area Network through either NAT or<br />

NAPT.<br />

Firewall Configure and control the internal firewall. Many of these features require a thorough<br />

understanding of networking principles and firewall operations. The firewall options are<br />

listed below.<br />

38<br />

8


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Admin User<br />

The Administrator profile controls the requirements for logging into the Web interface and accessing<br />

configuration pages, as well as defining the administrator login name and password.<br />

To configure administrator settings:<br />

1. Select Setup>Admin User from the left navigation pane of the Web interface. This displays the<br />

“Gateway Administrator Setup” window.<br />

2. Specify a user name for the administrator. You may accept the default user name, admin, or enter a<br />

new user name in User Name. The user name is case-sensitive.<br />

3. Enter a password in New Password; then enter the same password in Confirm New Password. The<br />

password field is case-sensitive.<br />

4. Select a login security level from one of the following:<br />

• Require admin login to access entire Web site<br />

Before you can access any screen in the Web interface, you must log in with your network user<br />

name and password. (Security level = High)<br />

• Require admin login to access configuration pages<br />

Before you can access any screen in the Web interface that allows you to make configuration<br />

changes, you must log in with your network user name and password. (Security level = Medium)<br />

• Do not require admin login<br />

After you log in for the first time, you will not be required to log in again at any screen. (Security<br />

level = Low)<br />

5. Click Save Settings.<br />

39


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Time Client<br />

An accurate log timestamp is one of the requirements of the ICSA Labs firewall criteria (ver 3.0a). In order<br />

to maintain accurate timestamps in each log message, the firewall implements a Simple Network Time<br />

Protocol (SNTP) client. This allows the system to automatically synchronize its date and time with<br />

Coordinated Universal, the international time standard. The system date and time are set and corrected<br />

automatically via the designated server(s).<br />

To configure the time client:<br />

1. Select Setup>Time Client from the left navigation pane of the Web interface. This displays the “Time<br />

Client Configuration” window.<br />

2. Select Enable from Enable Time Client.<br />

3. In Primary Server IP Address, enter the IP address of the primary server to use as the time server<br />

(a “well-known” Network Time Protocol Server).<br />

4. In Secondary Server IP Address enter the IP address of the secondary server to use as the time<br />

server if the router does not receive a response from the primary server.<br />

5. In Select Time Zone, enter the time zone in minutes from UTC.<br />

6. Click Apply.<br />

40


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

NAT/NAPT Server<br />

Hosts located on a Local Area Network (LAN) are often required to use private IP addresses as opposed<br />

to public IP addresses. Private IP addresses, however, are not known on the public Wide Area Network<br />

(WAN). In order to expose LAN-side hosts assigned private IP addresses to the public WAN, the <strong>Router</strong><br />

can be configured to use one of two methodologies: Network Address Translation (NAT) or Network<br />

Address Port Translation (NAPT). NAT can expose a single LAN-side host to the WAN; NAPT can<br />

expose multiple LAN-side hosts. NAT/NAPT functionality can be individually configured for each WAN<br />

connection.<br />

To configure NAT/NAPT functionality:<br />

1. Select Setup>NAT/NAPT from the left navigation pane of the Web interface. This displays the<br />

“NAT/NAPT Configuration” window showing the WAN Interface connections.<br />

2. Select one of the following for the desired connection:<br />

• NAT & NAPT Disabled<br />

Disable both NAT and NAPT in order, for example, to set up static routes assigned by your ISP.<br />

• NAT Only Enabled<br />

Enable NAT and specify the destination IP address for incoming packets. Depending on your<br />

configuration, NAT is sometimes enabled by default.<br />

• NAPT Only Enabled<br />

Use NAPT only to handle multiple addresses based on port forwarding rules.<br />

• NAT&NAPT Enabled<br />

Some service providers support a concurrent NAT/NAPT. Under this configuration, a single WAN<br />

interface may support multiple NAT connections with each NAT connection again exposing a<br />

single LAN-side host through a single WAN-side public IP address. Through either NAT or NAPT,<br />

the <strong>Router</strong> ensures that the LAN-side host is known to the WAN side only through the public IP<br />

address of the <strong>Router</strong>’s WAN-side connection. The host’s actual private IP address remains<br />

unknown to any WAN-side hosts or servers.<br />

3. Click Apply when you have finished configuring all desired connections.<br />

41


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Firewall<br />

A firewall is a system designed to prevent unauthorized access to or from a private network. The firewall<br />

is designed to protect hosts located on the Local Area Network (LAN) from attacks initiated on the Wide<br />

Area Network (WAN). Protection is not provided for attacks initiated from the LAN. Due to the nature of<br />

firewall operations and the system resources required to service these operations, firewall operations may<br />

degrade the performance of the <strong>Router</strong> – especially under heavy network traffic loads.<br />

The firewall menu item accessible from the left navigation pane of the Web interface expands to provide a<br />

list of options to be enabled or disabled as well as links to configure the more complex details of each<br />

security feature.<br />

Level Set the firewall security level.<br />

Snooze Temporarily disable the firewall. It is important to note that when the firewall is snoozing<br />

all protection provided by the firewall is disabled.<br />

DMZ Configure firewall DMZ for controlling a virtual DMZ on the Local Area Network. The<br />

purpose of the DMZ is to redirect suspicious network traffic received from a public WAN<br />

to a secured LAN-side host dedicated to this purpose.<br />

Filter Rules Add and delete custom inbound and outbound firewall rules.<br />

Log View log listing of firewall activity including records of denial of access, reason codes,<br />

and descriptions.<br />

ADS Configure what events the internal Attack Detection System (ADS) will protect against<br />

and log from a list of well-known attacks initiated on the Wide Area Network.<br />

42


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Level<br />

The firewall contained within the <strong>Router</strong> may be configured to operate in one of several modes, referred<br />

to as levels. For ease of use, three generic levels are preconfigured – Low, Medium and High. A separate<br />

level, ICSA 3.0a Compliant, is provided for those users who require compliance with the criteria set forth<br />

by ICSA Labs for firewall behavior. (Please refer to Appendix D, “Firewall Security Levels,” in the User<br />

<strong>Guide</strong> on CD-ROM for a detailed description of these preconfigured levels.)<br />

In addition to the preconfigured levels, a Custom level is provided for advanced users who require the<br />

capability to define a unique custom set of firewall rules. To specify the firewall security level:<br />

1. Select Setup>Firewall>Level from the left navigation pane of the Web interface. This displays the<br />

“Firewall Level Configuration” window.<br />

2. Select one of the following from the Select Firewall Level drop-down menu.<br />

• Off<br />

No restrictions are applied to either inbound or outbound traffic. In addition, Network Address Port<br />

Translation (NAPT) functionality is disabled. Because there is no address/port translation when<br />

the firewall is placed in this mode, all LAN-side connected hosts must be assigned a valid public<br />

IP address.<br />

• Low<br />

Minimal restrictions with respect to outbound traffic. Outbound traffic is allowed for all supported<br />

IP-based applications and Application Level <strong>Router</strong>s (ALGs). The only inbound traffic allowed is<br />

traffic received within the context of an outbound session initiated on the local host.<br />

• Medium<br />

Moderate restrictions with respect to outbound traffic. Outbound traffic is allowed for most<br />

supported IP-based applications and Application Level <strong>Router</strong>s (ALGs). The only inbound traffic<br />

allowed is traffic received within the context of an outbound session initiated on the local host.<br />

• High<br />

High restrictions with respect to outbound traffic. Outbound traffic is allowed only for a very<br />

restricted set of supported IP-based applications and ALGs. The only inbound traffic allowed is<br />

traffic received within the context of an outbound session initiated on the local host and permitted<br />

by this firewall mode.<br />

• ICSA 3.0a-compliant<br />

Supports the ICSA Labs criteria for firewall behavior. (For more information, visit the ICSA site at<br />

http://www.icsalabs.com).<br />

• Custom<br />

Allows advanced users to add, modify, and delete their own firewall rules. If you select this option,<br />

you must set customized rules for both inbound and outbound traffic using the IP Filtering option.<br />

3. Click Apply.<br />

43


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Snooze<br />

The snooze feature allows you to temporarily disable the firewall for a set amount of time so outside<br />

support personnel can access your <strong>Router</strong> or network or so you can run an application that conflicts with<br />

the firewall. Note: Important! This function is recommended for use only when you require this special<br />

level of unrestricted access as it leaves your <strong>Router</strong> and network exposed to the <strong>Internet</strong> with no firewall<br />

protection.<br />

To enable and configure snooze control:<br />

1. Select Setup>Firewall>Snooze from the left navigation pane of the Web interface. This displays the<br />

“Firewall Snooze Control” window.<br />

2. Select one of the following:<br />

• Disable Snooze<br />

Disables all snooze control. In this mode, the firewall is not disabled.<br />

• Enable Snooze, and set the Snooze time interval to<br />

Enables snooze for a specified time period. Be sure to enter the number of minutes to define how<br />

long the firewall should be disabled.<br />

• Reset the Snooze time interval to<br />

Reset the snooze control time period. Use this option if you need a time extension for an open<br />

snooze session. Be sure to specify the additional amount of time (minutes) the firewall should be<br />

disabled.<br />

3. Click Apply.<br />

44


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

DMZ<br />

The firewall supports virtual DMZ in single (LAN) port router models. Virtual DMZ redirects traffic to a<br />

specified IP address rather than a physical port. Because this redirection is a logical application rather<br />

than physical, it is called “virtual DMZ.”<br />

Using virtual DMZ, a single node on the LAN can be made “visible” to the WAN IP network. Any incoming<br />

network traffic not handled by port forwarding rules is automatically forwarded to an enabled DMZ node.<br />

Outbound traffic from the virtual DMZ node circumvents all firewall rules. The DMZ feature allows a<br />

computer on your home network to circumvent the firewall and have direct access to the internet. This<br />

feature is primarily used for gaming. Under this mode of operation all network traffic received from the<br />

WAN that is not destined for a host specifically exposed through NAT or for a server exposed through<br />

Port Forwarding will be redirected to the designated DMZ host. If the DMZ feature is enabled, you must<br />

select the computer to be used as the DMZ computer/host.<br />

This function is recommended for use only when you require this special level of unrestricted access as it<br />

leaves your <strong>Router</strong> and network exposed to the <strong>Internet</strong> with no firewall protection. To enable and<br />

configure the DMZ:<br />

1. Select Setup>Firewall>DMZ from the left navigation pane of the Web interface. This displays the<br />

“Firewall DMZ Configuration” window.<br />

2. Select one of the following DMZ enable options:<br />

• Disable DMZ<br />

The firewall is not bypassed.<br />

• Enable DMZ with this Host IP address<br />

The firewall is bypassed through an IP address typed in the box next to this field.<br />

• Enable DMZ with this Host IP address<br />

The firewall is bypassed through an IP address that is selected from the Select Host drop-down<br />

menu next to this field. Select the desired host from the drop-down menu.<br />

3. Select one of the following time element options:<br />

• Make Settings Permanent<br />

DMZ settings are permanent unless changed by the administrator.<br />

• Make Settings Last for<br />

DMZ settings last for only the time (in minutes) entered in the box next to this option.<br />

4. Click Apply.<br />

45


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Filter Rules<br />

If the firewall security level is set to Custom, this features allows you to specify a unique set of firewall<br />

rules for handling inbound and outbound traffic customized to the user’s specific requirements. In this<br />

mode of operation the firewall provides an extensive amount of configurability. As such, only advanced<br />

users should employ this feature.<br />

Rules can be filter-based on any of the following:<br />

• Source and destination router interfaces<br />

• IP protocols<br />

• Direction of traffic flow<br />

• Source and destination network/host IP address<br />

• Protocol-specific attributes such as ICMP message types<br />

• Source and destination port ranges (for protocols that support them), and support for port comparison<br />

operators such as less than, greater than, and equal to.<br />

Rules can specifically allow or deny packets to flow through the router. Default actions taken when no<br />

specific rule applies can also be configured.<br />

To define inbound and outbound IP filter rules:<br />

1. Select Setup>Firewall>Filter Rules from the left navigation pane of the Web interface. This displays<br />

the “Firewall IP Filter Configuration Wizard” window.<br />

2. Do one of the following:<br />

• To add new IP filter rules as you define them, click Add New IP Filter Rule. This displays the<br />

“Basic Rule Definition” window.<br />

• To clone IP filter rules already defined, click Clone IP Filter Level. This displays the “Clone Rule<br />

Definition” window. Once cloned, you can modify the existing rules.<br />

46


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Creating Custom IP Filter Rules<br />

To add a new rule:<br />

1. Type up to a five digit numeric value in the Rule No box to uniquely identify the rule.<br />

2. Select either Permit or Deny from the Access drop-down menu. Select Permit to allow the rule and<br />

Deny to prohibit the rule.<br />

3. Select either Inbound or Outbound from the Direction drop-down menu. Inbound refers to data<br />

coming into the <strong>Router</strong>, while Outbound refers to data transmitted from the <strong>Router</strong>.<br />

4. Optionally, select the Disable stateful inspection for packets matching this rule to prevent the<br />

firewall from creating a stateful inspection session for packets matched on this rule.<br />

5. Optionally, select the Create a log entry for packets matching this rule. When selected, an entry is<br />

placed in the log file when packets match this rule.<br />

6. Click Next. This displays the “Source & Destination Definition” window.<br />

7. Under the Source heading, select a network connection from the Network Interface drop-down<br />

menu.<br />

8. Select one of the following options:<br />

• Any IP Address<br />

Select this option if this rule applies to any IP address from the source.<br />

• This IP Address<br />

Select this option if a rule applies to a specific IP address from the source.<br />

47


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

9. If you selected This IP Address, enter an IP address in the IP Address field. And do one of the<br />

following:<br />

• Enter a netmask in the Netmask field.<br />

• Or, select or Host to use your <strong>Router</strong> netmask as the source netmask.<br />

10. Under the Destination heading, select a network connection from the Network Interface drop-down<br />

menu.<br />

11. Select one of the following options:<br />

• Any IP Address<br />

Select this option if this rule applies to any IP address of the destination.<br />

• This IP Address<br />

Select this option if a rule applies to a specific IP address of the destination.<br />

12. If you selected This IP Address, enter an IP address in the IP Address field. And do one of the<br />

following:<br />

• Enter a netmask in the Netmask field.<br />

• Or, select or Host to use your <strong>Router</strong> netmask as the destination netmask.<br />

13. Click Next. This displays the “Protocol Definition” window.<br />

14. Do one of the following:<br />

• Select one of the following protocol options from the Select by Name drop-down menu. This<br />

defines the types of packets filtered.<br />

− Any Protocol<br />

− TCP (Transmission Control Protocol)<br />

Provides reliable, sequenced, and unduplicated delivery of bytes to remote or local users.<br />

Click Next to display the “TCP/UDP Options” window.<br />

− UDP (User Datagram Protocol)<br />

Provides for the exchange of datagrams without acknowledgement or guaranteed delivery.<br />

Click Next to display the “TCP/UDP Options” window.<br />

− ICMP (<strong>Internet</strong> Control Message Protocol)<br />

A mechanism that provides for peer communication. The most commonly used application for<br />

this protocol is the PING command. Click Next to display the “ICMP Options” window.<br />

− GRE (Generic Routing Encapsulation):<br />

A tunneling protocol that is used primarily for VPN (Virtual Private Networks).<br />

• Type a protocol number in the Select by Number field.<br />

15. Click Finish.<br />

48


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

TCP/UDP Options Window<br />

The “TCP/UDP Options” window is displayed if you select TCP or UDP protocol from the “Protocol<br />

Definition” window. If you selected either of these protocol types, you must identify the source and<br />

destination ports.<br />

1. Select one of the following options from the Source Port Operator drop-down menu and the<br />

Destination Port Operator drop-down menu:<br />

• any<br />

Any port is acceptable as the source/destination port.<br />

• less than or equal to<br />

A port less than or equal to the numeric value in the Port 1 field is acceptable as the<br />

source/destination port. Be sure to provide a value in the Port 1 field.<br />

• equal to<br />

A port equal to the numeric value in the Port 1 field is acceptable as the source/destination port.<br />

Be sure to provide a value in the Port 1 field.<br />

• greater than or equal to<br />

a port greater than or equal to the numeric value in the Port 1 field is acceptable as the<br />

source/destination port. Be sure to provide a value in the Port 1 field.<br />

• range<br />

Any port between the value of the entry in the Port 1 field and the value in the Port 2 field is<br />

acceptable as the source/destination port. Be sure to provide a value in the Port 1 and Port 2<br />

fields.<br />

2. Optionally, select the Check TCP syn packets checkbox if you wish this rule to prevent the blocking<br />

of synchronization packets for pre-existing sessions.<br />

3. Click Next.<br />

4. Click Finish.<br />

49


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

ICMP Options Window<br />

The “ICMP Options” window is displayed if you select ICMP protocol from the “Protocol Definition”<br />

window.<br />

1. Do one of the following:<br />

• Select any of the ICMP options you wish to filter.<br />

• Select the All Types checkbox to filter all options.<br />

2. Click Next.<br />

3. Click Finish.<br />

50


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Clone IP Filter Rules<br />

The “Clone Rule Definitions” window is displayed when you select Clone IP Filter Level from the<br />

“Firewall IP Configuration Wizard” window. Using this option, you can clone either high or low level rules<br />

and modify them according to your needs. If you choose to clone IP filter rules, the rules already defined<br />

in the Rule Definition table are discarded.<br />

To clone IP filter rules:<br />

1. Click Clone IP Filter Level from the “Firewall IP Filter Configuration Wizard” window. This displays<br />

the “Clone Rule Definition” window.<br />

2. Select one of the following from the Select preconfigured firewall level for cloning drop-down<br />

menu.<br />

• Low<br />

Clones low-level IP filter rules.<br />

• Medium<br />

Clones medium-level IP filter rules.<br />

• High<br />

Clones high-level IP filter rules.<br />

3. Click Apply. This displays the “Firewall IP Filter Configuration Wizard” window with the selected rule<br />

set showing in the Rule Definition table.<br />

4. Disable or delete any rule as desired.<br />

51


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Log<br />

Firewall Logging displays attempts (both failures and successes) to access data through he firewall.<br />

Firewall log entries are defined on the Firewall Settings Configuration screen found under the Security<br />

menu.<br />

To view the firewall log, select Setup>Firewall>Log from the left navigation pane of the Web interface.<br />

This displays the “Firewall Log” window.<br />

52


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

ADS<br />

The firewall provides an advanced Attack Detection System (ADS) that may be used to detect and<br />

identify various types of attacks initiated on the Wide Area Network (WAN). The system has the capability<br />

to detect such attacks the moment they start and to protect the Local Area Network (LAN) from such<br />

attacks.<br />

If the Attack Detection System is enabled, the SpeedStream <strong>Router</strong> provides protection against the most<br />

common hacker attacks that attempt to access your computer/network from the <strong>Internet</strong>. Intrusion<br />

attempts can also be logged to provide a record of attempts and their source (when available).<br />

To enable and configure the attack detection feature:<br />

1. Select Setup>Firewall>ADS from the left navigation pane of the Web interface. This displays the<br />

“Firewall Attack Detection System” window.<br />

2. Select Enable Attack Detection.<br />

3. Select the Filter checkbox for each event in the list you want to filter or, if you want to filter all events,<br />

select the Filter All checkbox. This provides maximum protection against malicious intrusion from<br />

outside your network.<br />

4. Select the Log checkbox for each event in the list you want to log or, if you want to log all events,<br />

select the Log All checkbox. When logging is selected for a particular offending packet, the ADS will<br />

write an entry to the firewall log once a minute for as long as the attack persists. This shows that a<br />

long-term attack is taking place without completely filling up the firewall log with entries for every<br />

single packet.<br />

5. Click Apply.<br />

Below is a description of each event that can be monitored.<br />

• Same Source and Destination Address<br />

An outside device can send a SYN (synchronize) packet to a host with the same source and<br />

destination address (including port) causing the system to hang. When the receiving host tries to<br />

respond to the source address in the packet, it ends up just sending it back to itself. This packet could<br />

ping-pong back and forth over 200 times (consuming CPU resources) before being discarded.<br />

• Broadcast Source Address<br />

An outside device can send a ping to your <strong>Router</strong> broadcast address using a forged source address.<br />

When your system responds to these pings, it is brought down by echo replies.<br />

53


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

• LAN Source Address on LAN<br />

An outside device can send a forged source address in an incoming IP packet to block trace back.<br />

• Invalid IP Packet Fragment<br />

An outside device can send fragmented data packets that can bring down your system. IP packets can<br />

be fairly large in size. If a link between two hosts transporting a packet can only handle smaller<br />

packets, the large packet may be split (or fragmented) into smaller ones. When the packet fragments<br />

get to the destination host, they must be reassembled into the original large packet like pieces of a<br />

puzzle. A specially crafted invalid fragment can cause the host to crash<br />

• TCP NULL<br />

An outside device can send an IP packet with the protocol field set to TCP but with an all null TCP<br />

header and data section. If your <strong>Router</strong> responds to this attack, it will bring down your system.<br />

• TCP FIN<br />

An outside device can send an attack using TCP FIN. This attack never allows a data packet to finish<br />

transmitting and brings down your system.<br />

• TCP XMAS<br />

An outside device can send an attack using TCP packets with all the flags set. This causes your<br />

system to slow to a halt.<br />

• Fragmented TCP Packet<br />

An outside device can send an attack using fragmented packets to allow an outside user Telnet<br />

access to a device on your network.<br />

• Fragmented TCP Header<br />

An outside device can send an attack using TCP packets with only a header and no payload. When<br />

numerous packets are sent through the <strong>Router</strong> in this manner, your system slows and halts.<br />

• Fragmented UDP Header<br />

An outside device can send an attack using fragmented UDP headers to bring down a device on your<br />

network.<br />

• Fragmented ICMP Header<br />

An outside device can send an attack using fragmented ICMP headers to bring down a device on your<br />

network.<br />

• Inconsistent UDP/IP header lengths<br />

An outside device can send an attack using inconsistent UDP/IP headers to bring down a device on<br />

your network.<br />

• Inconsistent IP header lengths<br />

An outside device can send an attack using changes in the IP header to zero the fragment offset field.<br />

This will be treated as a complete packet when received and cause your system to halt.<br />

54


<strong>Router</strong> User’s <strong>Guide</strong><br />

Chapter 9<br />

Monitoring <strong>Router</strong> Health<br />

This chapter describes how to monitor the health of the <strong>Router</strong>.<br />

The <strong>Router</strong> health options listed below are used to gauge the <strong>Router</strong>’s health.<br />

Status and Statistics View <strong>Internet</strong>, home networking, security statistics, system and firewall<br />

log files.<br />

Diagnostics Run a diagnostic program against a selected connection on your <strong>Router</strong>.<br />

Tools Reset, reboot, or update firmware.<br />

Status and Statistics<br />

You can display statistics for the <strong>Internet</strong>, Home Networking, Security, and Logging.<br />

System Summary Basic descriptive information that identifies the router.<br />

System Log Displays a record of all system activity, including what actions were<br />

performed, what packets were dropped and what packets were<br />

forwarded.<br />

ATM/AAL Displays status information about the ATM connection.<br />

DSL Displays status information about the DSL connection.<br />

Ethernet Displays status information about the Ethernet connection.<br />

USB Displays status information about the USB connection.<br />

Routes Displays status information about the current routing table.<br />

55<br />

9


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

System Summary<br />

The “System Summary” window provides basic descriptive information that identifies the router, system<br />

type, current software and firmware versions, the MAC address (unique device identifier), and the status<br />

of currently configured connections.<br />

Connection information includes the identification and current status of configured point-to-point (PPP)<br />

and static connections. Select Status and Statistics>System Summary from the left navigation pane of<br />

the Web interface to view this information.<br />

System Log<br />

The “System Log” window displays a record of all system activity, including what actions were performed,<br />

what packets were dropped and what packets were forwarded. This information allows you to make<br />

informed decisions about the need to add new filter rules.<br />

The System Log contains a maximum of 200 entries; each entry may contain a maximum of 200<br />

characters. Select Status and Statistics>System Log from the left navigation pane of the Web interface<br />

to view the “System Log” window.<br />

• To update the display, click Refresh.<br />

• To clear the log, click Clear Log.<br />

• To change the events displayed in the log, modify the Log Display Options, then click Apply.<br />

56


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

ATM Statistics<br />

View status and statistical information for the<br />

WAN-side Asynchronous Transfer Mode (ATM)<br />

network connection. WAN-side connection to<br />

the service provider is based on an<br />

Asynchronous Transfer Mode (ATM) network<br />

connection. In addition, statistical information is<br />

provided for each Virtual Circuit (VC)<br />

configured under the ATM Adaptation Layer<br />

(AAL).<br />

Select Status and Statistics>ATM/AAL from<br />

the left navigation pane of the Web interface to<br />

view ATM/AAL statistics. This window displays<br />

ATM connection status, uptime, and<br />

transmit/receive data, VPI/VCIs and related<br />

data for each circuit<br />

DSL Statistics<br />

View status and statistical information for the<br />

Digital Subscriber Line (DSL) when the<br />

physical WAN-side connection to the service<br />

provider is achieved through a DSL line.<br />

Statistical information is accumulated over<br />

periodic intervals and may be displayed for up<br />

to a 24 hour period.<br />

Select Status and Statistics>DSL from the left<br />

navigation pane of the Web interface to view<br />

DSL statistics. This displays information about<br />

the DSL connection.<br />

57


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Ethernet Statistics<br />

View status and statistical information for LAN-side<br />

Ethernet connectivity.<br />

Pay special attention to the status (up or down)<br />

reported for each Ethernet port to verify that each<br />

cable is connected properly and detected by the<br />

<strong>Router</strong>.<br />

Select Status and Statistics>Ethernet from the<br />

left navigation pane of the Web interface to view<br />

Ethernet statistics.<br />

USB Statistics<br />

View status and statistical information for LAN-side USB<br />

connectivity.<br />

Pay special attention to the status (up or down) reported<br />

for each USB port to verify that each cable is connected<br />

properly and detected by the <strong>Router</strong>.<br />

Select Status and Statistics>USB from the left<br />

navigation pane of the Web interface to view USP<br />

statistics.<br />

Routes<br />

View all IP routes currently known by the <strong>Router</strong>.<br />

Both static and dynamic routes are shown along<br />

with their respective netmask, <strong>Router</strong>, and the<br />

corresponding interface.<br />

Select Status and Statistics>Routes from the left<br />

navigation pane of the Web interface to view the<br />

current routing table, which contains the data<br />

pertaining to all currently known static and dynamic<br />

IP routes<br />

58


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Diagnostics<br />

The <strong>Router</strong> provides a considerable amount of diagnostic functionality for testing connectivity on both the<br />

Local Area Network (LAN) and the Wide Area Network (WAN). This includes LAN-side connections within<br />

the home and WAN-side connections to the carrier, service provider and <strong>Internet</strong>. WAN-side testing may<br />

be performed for each of the WAN-side connections currently configured. This data is commonly<br />

requested by technical support to assist in troubleshooting.<br />

Note: This option may not be available on your <strong>Router</strong> configuration.<br />

To run diagnostics:<br />

1. Select Diagnostics from the left navigation pane of the Web interface. This displays “Diagnostics”<br />

window.<br />

2. Select the connection you want to test from the Connection to Test drop-down menu.<br />

3. Click Run Diagnostics. The test results display under the Results column.<br />

If one of the following failed, contact your Service Provider.<br />

• Connections at the Carrier<br />

• Independent Service Provider<br />

• <strong>Internet</strong> Connectivity<br />

4. If a test displays a FAIL status for any other reason then listed above, click Run Diagnostics again<br />

to confirm the failure.<br />

5. If the test still displays a FAIL status, check all connections and passwords; then click Run<br />

Diagnostics again.<br />

6. If the test still displays a FAIL status, contact your Service Provider for further assistance.<br />

59


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Tools<br />

This section describes how to use the tools listed below.<br />

Interface Map View a graphical representation of the current LAN and WAN<br />

configurations.<br />

Reboot Reboot the <strong>Router</strong>.<br />

Update Update <strong>Router</strong> firmware.<br />

Interface Map<br />

Some <strong>Router</strong> configurations provide a graphical representation of the current LAN and WAN<br />

configurations. This is particularly useful for Technical Support in verifying that correct protocol<br />

encapsulations are assigned and Virtual Circuits (VCs) are mapped to the correct network interfaces.<br />

Note: This option may not be available on your <strong>Router</strong> configuration.<br />

To display the interface map, select Tools>Interface Map from the left navigation pane of the Web<br />

interface. This displays the “Interface Map” window.<br />

60


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Reboot<br />

You can reboot the <strong>Router</strong> using the Reboot option, or you can reset the <strong>Router</strong> to factory defaults using<br />

the Reset option. Reboot should be used when the <strong>Router</strong> needs to be restarted without losing your<br />

current configuration settings.<br />

Note: This option may not be available on your <strong>Router</strong> configuration.<br />

To reboot the <strong>Router</strong>, select Tools>Reboot from the left navigation pane of the Web interface. This<br />

displays “System Reboot” window.<br />

The “System Reboot” window displays a countdown while processing. When the <strong>Router</strong> has finished<br />

rebooting, the “System Summary” window is displayed.<br />

Reset to system defaults:<br />

Reset the <strong>Router</strong> to system defaults should be done when you find it necessary to recover the factory<br />

default settings. This may be necessary when a custom configuration did not go as planned, when a new<br />

configuration is desired, or when the <strong>Router</strong> does not appear to be working properly. Important: This<br />

option resets all custom settings, users, and passwords on your <strong>Router</strong>.<br />

Note: This option may not be available on your <strong>Router</strong> configuration.<br />

To reset the <strong>Router</strong>:<br />

1. Using the tip of a ballpoint pen or unfolded paperclip, press and hold the Reset button located on the<br />

bottom of the router. The pwr LED will blink red once, indicating that the reset has begun.<br />

2. Continue depressing the Reset button for four seconds or until the pwr LED begins to blink<br />

alternating red-to-green.<br />

3. Release the Reset button.<br />

To cancel the reset:<br />

Continue depressing the Reset button for longer than 10 seconds. The pwr LED will return to green, and<br />

the action will be cancelled.<br />

61


<strong>Router</strong> User’s <strong>Guide</strong> Monitoring Network Health<br />

Update<br />

This features updates the firmware of your <strong>Router</strong> through the <strong>Internet</strong> or from a device connected to your<br />

<strong>Router</strong>.<br />

Note: This option may not be available on your <strong>Router</strong> configuration.<br />

To update the firmware:<br />

1. Select Tools>Update from the left navigation pane of the Web interface. This displays “System<br />

Update” window.<br />

2. Select one of the following:<br />

• Remote<br />

Checks the <strong>Internet</strong> for the appropriate upgrade file. This is the recommended method.<br />

• Local<br />

Download the firmware update file from a location on your network. Before doing this, you must<br />

download the upgrade file to your computer.<br />

Important: Do not turn off or interrupt the <strong>Router</strong> during a firmware upgrade session. The <strong>Router</strong> could be<br />

rendered inoperable!<br />

62


<strong>Router</strong> User’s <strong>Guide</strong><br />

Appendix A<br />

Troubleshooting<br />

Connection problems usually occur when the router’s software configuration contains incomplete or<br />

incorrect information. The router’s diagnostic tools can help you identify and solve many of these<br />

problems.<br />

Basic Troubleshooting Steps<br />

Before contacting Technical Support, you should attempt to resolve the issue by following these steps:<br />

1. Check the LEDs on the front panel to diagnose the possible problem.<br />

2. Check specific issues addressed in this chapter, and follow the instructions for resolving the problem.<br />

3. Reboot the router. Any settings you have configured will be saved.<br />

4. Reset the router only as a last resort. You will lose any settings you have configured.<br />

63<br />

A


<strong>Router</strong> User’s <strong>Guide</strong> Troubleshooting<br />

Interpreting the LED Display<br />

The LED indicators on the front of the router give you a visual clue to the router activity. When the router<br />

is configured and working correctly, all LED indicator lights briefly turn a solid green. The following table<br />

shows the possible states indicated by the LEDs. If the LEDs indicate a problem, refer to “Resolving<br />

Specific Issues” later in this chapter.<br />

LED pwr dsl USB enet*<br />

Off No power to<br />

router<br />

Green Normal system<br />

operation<br />

Blinking<br />

Green<br />

Blinking<br />

Red/<br />

Green<br />

- No power to router<br />

- DSL signal not<br />

detected<br />

Connected and ready for<br />

data traffic<br />

N/A - Steady blinking:<br />

DSL attempting to<br />

connect<br />

- Sporadic blinking:<br />

DSL connected and<br />

user traffic flowing<br />

Flash Write in<br />

progress<br />

Red - POST tests in<br />

progress (first<br />

30 sec. after<br />

powering on or<br />

rebooting)<br />

- POST error<br />

occurred<br />

- No power to<br />

router<br />

- No USB device<br />

connected<br />

- USB driver not<br />

installed or<br />

installed<br />

incorrectly<br />

Normal USB<br />

operation, link okay,<br />

no user traffic<br />

USB user traffic<br />

flowing in either<br />

direction<br />

N/A N/A N/A<br />

N/A N/A N/A<br />

64<br />

- No power to<br />

router<br />

- No Ethernet<br />

device connected<br />

- Wrong Ethernet<br />

cable used<br />

(cross- over<br />

instead of<br />

straight-through)<br />

Normal Ethernet<br />

operation, link okay,<br />

no user traffic<br />

Ethernet user traffic<br />

flowing in either<br />

direction


<strong>Router</strong> User’s <strong>Guide</strong> Troubleshooting<br />

Resolving Specific Issues<br />

pwr LED Not Lit<br />

If the pwr (power) LED is not lit, it is not connecting to the power source. Verify that the power cord is<br />

firmly plugged into the back panel of the router and that the other end is plugged into an active AC wall or<br />

power-strip outlet.<br />

dsl LED Not Lit<br />

If the DSL LED is not lit, it is not detecting a valid signal from the Central Office (CO). Verify that the DSL<br />

cable is plugged into the correct router port and the router power cord is plugged into the electrical outlet.<br />

If the cables are secure, you should contact your Service Provider.<br />

enet LED Not Lit<br />

This indicates that there is no Ethernet link detected. If you are using the Ethernet connection method,<br />

check the Ethernet cable connection from the computer to the router. If you have used the wrong cable,<br />

the LED on the Ethernet (NIC) card in your computer will not be lit either.<br />

USB LED Not Lit<br />

This indicates that there is no USB link detected. If you are using the USB installation method, check the<br />

USB cable connection from the computer to the router.<br />

Login Password Error<br />

If after being prompted for the login password, you receive the error message: Login Password is<br />

invalid:<br />

• Retype the password, and then click Save Settings.<br />

• If you forget your password, you must reset the router.<br />

Note: The password is case-sensitive. Be sure that you have not accidentally activated the Caps key.<br />

POST Failure (red pwr LED)<br />

POST is the router’s “power-on self-test.” When you power on or reboot the router, the pwr LED goes to a<br />

solid red until one of two things occurs: it either fails its initial POST tests, or it comes fully up and is ready<br />

to run.<br />

• If POST passes, the router continues through the rest of its initialization, and the pwr LED changes to<br />

solid green.<br />

• If the initial POST diagnostic tests fail, the pwr LED will remain red, indicating a POST failure, and will<br />

lock the router. You will need to contact Efficient Networks Technical Support to resolve this issue.<br />

65


<strong>Router</strong> User’s <strong>Guide</strong> Troubleshooting<br />

Contacting Technical Support<br />

If you still cannot resolve the issue after following the recommended troubleshooting procedures, contact<br />

Efficient Networks Technical Support.<br />

Telephone: (972) 852-1000<br />

Fax: (972) 852-1001<br />

Email: ssn@siemens.com<br />

<strong>Internet</strong>: http://www.support.ssn@siemens.com<br />

66


<strong>Router</strong> User’s <strong>Guide</strong><br />

Appendix B<br />

Configuration Data Sheets<br />

Your router is preconfigured with settings specific to your network. We strongly suggest that you record<br />

these settings in case you need to reestablish your original configuration.<br />

Administrative User Setup<br />

Parameter Default Value Your Value<br />

User Name admin<br />

Password<br />

Attack Detection System<br />

Parameter Default Value Your Value<br />

Enable ADS<br />

Same Source/Destination<br />

Address<br />

Filter: Log: Filter: Log:<br />

Broadcast Source Address Filter: Log: Filter: Log:<br />

LAN Source Address On WAN Filter: Log: Filter: Log:<br />

Invalid IP Packet Fragment Filter: Log: Filter: Log:<br />

TCP NULL Filter: Log: Filter: Logx:<br />

TCP FIN Filter: Log: Filter: Log<br />

TCP Xmas Filter: Log Filter: Log<br />

Fragmented TCP Packet Filter: Log Filter: Log<br />

Fragmented TCP Header Filter: Log Filter: Log<br />

Fragmented UDP Header Filter: Log Filter: Log:<br />

Fragmented ICMP Header Filter: Log Filter: Log<br />

67<br />

B


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

DHCP<br />

Parameter Default Value Your Value<br />

DHCP Server<br />

Start IP Range<br />

End IP Range<br />

IP Netmask<br />

Default <strong>Router</strong><br />

Or Self<br />

DNS Server<br />

Or Use Wan<br />

Domain Name<br />

Lease Time (Mins)<br />

Or Infinite Time<br />

Firewall – Custom IP Filter Configuration<br />

Parameter Default Value Your Value<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

68


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

Parameter Default Value Your Value<br />

Destination Port Operator<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

69


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

Parameter Default Value Your Value<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

Enable/Disable<br />

Rule #<br />

Status<br />

Access<br />

Direction<br />

Protocol<br />

Source Interface<br />

Source Address<br />

Source Mask<br />

Destination Port Operator<br />

Enable/Disable<br />

70


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

Firewall - DMZ<br />

Parameter Default Value Your Value<br />

Status<br />

Enable With Host IP Address<br />

Enable With Host Name<br />

Settings Duration<br />

Firewall – Level<br />

Parameter Default Value Your Value<br />

Level<br />

Firewall – Snooze Control<br />

Parameter Default Value Your Value<br />

Snooze Control<br />

Disable<br />

Enable, Set Time Interval To:<br />

Reset Time Interval To<br />

Host<br />

Parameter Default Value Your Value<br />

IP Address<br />

IP Netmask<br />

Default <strong>Router</strong><br />

Host Name<br />

LAN IP<br />

Parameter Default Value Your Value<br />

IP Address<br />

Subnet Mask<br />

NAT/NAPT<br />

Parameter Default Value Your Value<br />

Interface 1<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

71


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

Parameter Default Value Your Value<br />

NAPT Enabled<br />

Interface 2<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Interface 3<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Interface 4<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Interface 5<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Interface 6<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Interface 7<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Interface 8<br />

NAT/NAPT Disabled<br />

NAT Enabled<br />

72


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

Parameter Default Value Your Value<br />

Internal (LAN) IP Address<br />

NAPT Enabled<br />

Port Forwarding<br />

Parameter Default Value Your Value<br />

73


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

PPP Login<br />

Parameter Default Value Your Value<br />

Connection 1<br />

User Name<br />

Password<br />

Access Connection<br />

Service Name<br />

Auto-Connect On Disconnect<br />

Use Idle Time-Out<br />

Connection 2<br />

User Name<br />

Password<br />

Access Connection<br />

Service Name<br />

Auto-Connect On Disconnect<br />

Use Idle Time-Out<br />

Connection 3<br />

User Name<br />

Password<br />

Access Connection<br />

Service Name<br />

Auto-Connect On Disconnect<br />

Use Idle Time-Out<br />

Connection 4<br />

User Name<br />

Password<br />

Access Connection<br />

Service Name<br />

Auto-Connect On Disconnect<br />

Use Idle Time-Out<br />

74


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

RIP<br />

Parameter Default Value Your Value<br />

Static Route<br />

Parameter Default Value Your Value<br />

Destination<br />

Netmask<br />

Next Hop<br />

Interface<br />

System Log<br />

Parameter Default Value Your Value<br />

Log Capture Level<br />

Time Client<br />

Parameter Default Value Your Value<br />

Disabled<br />

Primary Server IP Address<br />

Secondary Server IP Address<br />

75


<strong>Router</strong> User’s <strong>Guide</strong> Configuration Data Sheets<br />

UPnP<br />

Parameter Default Value Your Value<br />

Disabled<br />

Discovery and Advertisement<br />

Only<br />

Full IGD-Supported<br />

Enable Access Logging<br />

Read-Only Mode<br />

76


<strong>Router</strong> User’s <strong>Guide</strong><br />

Appendix C<br />

Technical Specifications<br />

AAL and ATM Support VCI 0-65535 address range<br />

VPI 0-255 address range<br />

AAL5 support<br />

Bridging IEEE 802.1.d Transparent Learning Bridge<br />

(dynamic learning of up to 255 addresses)<br />

Certifications<br />

Spanning Tree support<br />

FCC Part 15, Class B<br />

CE certification<br />

Connectors DSL interface: RJ-11 or RJ-45 (Europe)<br />

Diagnostic LEDs<br />

Ethernet interface: RJ-45<br />

USB Type B interface (5200, 5500 series)<br />

Power, DSL, Activity, Ethernet status;<br />

USB status (5200, 5500 series)<br />

Management Intuitive, Web-based GUI management access<br />

Media Interface<br />

SNMP support<br />

Comprehensive hardware diagnostics<br />

RJ-11 or RJ-45 (European) DSL WAN connection<br />

10/100Base-T RJ-45 Ethernet LAN connection<br />

USB Type B LAN connection (5200, 5500 series)<br />

Power 12V power supply included, 700ma max.<br />

5400/5500 - 12 VDC, 1000ma max.<br />

77<br />

C


<strong>Router</strong> User’s <strong>Guide</strong> Technical Specifications<br />

Routing<br />

Standards Compliance<br />

DHCP server/DHCP client<br />

Network Address Port Translation (NAPT)<br />

Network Address Translation (NAT)<br />

Packet filtering<br />

RFC 2364 Point-to-Point Protocol over ATM PVCs (PPPoA)<br />

RFC 2516 Point-to-Point Protocol over Ethernet (PPPoE)<br />

RFC 2684 (formerly 1483) Bridged Ethernet and routed encapsulation<br />

Routing<br />

IEEE 802.3<br />

USB 1.1<br />

T1.413 issue 2<br />

G.992.1 (G.DMT)<br />

G.992.2 (G.Lite)<br />

78


<strong>Router</strong> User’s <strong>Guide</strong><br />

Appendix D<br />

Firewall Security Levels<br />

The following table shows the security of each mode of the firewall for specific applications and protocols.<br />

Note: All applications and protocols are conditionally allowed IN if the outbound session was initiated<br />

locally and allowed OUT.<br />

Application/<br />

Protocol<br />

Security<br />

High Medium Low NAPT Off<br />

79<br />

ICSA-<br />

Compliant<br />

In Out In Out In Out In Out In Out<br />

Abuse.Net √ √ √<br />

Age of Empires √ √ √<br />

AOL √ √ √ √<br />

AOL IM √ √<br />

Asherons Call √ √ √<br />

Baldur’s Gate II √ √ √<br />

BattleNet √ √ √<br />

Buddy Telephone √ √ √<br />

Bungie.Net √ √ √<br />

Calista IP Telephone √ √ √<br />

Counterstrike √ √ √<br />

CUSeeMe √ √<br />

Delta Force √ √ √<br />

Descent II/III √ √ √<br />

Diablo √ √ √<br />

Diablo 2 √ √ √<br />

Dialpad √ √ √<br />

DirectPlay √ √ √<br />

DNS √ √ √ √ √<br />

Doom √ √ √<br />

Dune 2000 √ √ √<br />

EverQuest √ √ √ √<br />

FTP √ √ √<br />

GNUtella √ √<br />

D


<strong>Router</strong> User’s <strong>Guide</strong> Firewall Security Levels<br />

Application/<br />

Protocol<br />

Security<br />

High Medium Low NAPT Off<br />

ICSA-<br />

Compliant<br />

In Out In Out In Out In Out In Out<br />

H.323 √ √<br />

Half Life √ √ √<br />

Heretic II √ √ √<br />

Hexen II √ √ √<br />

HTTP √ √ √ √ √<br />

HTTPS √ √ √ √ √<br />

ICMP √ √ √ √<br />

ICQ 2000 √ √<br />

ICU II √ √<br />

IGMP √ √ √<br />

IPSec multi-session √ √ √<br />

IPSec single-session √ √ √<br />

IRC √ √<br />

Kali √ √ √<br />

L2TP √ √ √<br />

MechWarrior 4 √ √ √<br />

Mplayer √ √ √<br />

MS Netmeeting √ √<br />

MSN Gaming Zone √ √ √<br />

MSN Messenger √ √<br />

Myth √ √ √<br />

Napster √ √<br />

Need for Speed √ √ √<br />

Net2telephone √ √ √<br />

Netshow Client √ √<br />

NNTP √ √<br />

NTP √ √ √ √<br />

PCAnywhere √ √<br />

Ping √ √ √ √<br />

POP3 √ √ √<br />

80


<strong>Router</strong> User’s <strong>Guide</strong> Firewall Security Levels<br />

Application/<br />

Protocol<br />

Security<br />

High Medium Low NAPT Off<br />

ICSA-<br />

Compliant<br />

In Out In Out In Out In Out In Out<br />

PPPoE √ √ √<br />

PPTP multi-session √ √ √<br />

PPTP single-session √ √ √<br />

Quake Arena √ √ √<br />

Quake II √ √ √<br />

Quicktime 4 √ √ √ √<br />

Rainbow Six √ √ √<br />

Real Audio √ √ √ √<br />

Real Video √ √ √ √<br />

Red Alert II √ √ √<br />

Rogue Spear √ √ √<br />

RTSP √ √ √ √<br />

SIP √ √ √<br />

SMTP √ √ √<br />

Soldier of Fortune √ √ √<br />

SSH √ √ √<br />

Starcraft √ √ √<br />

T.120 √ √<br />

Telnet √ √ √ √<br />

Tiberian Sun √ √ √<br />

Traceroute √ √ √ √<br />

Ultima Online √ √ √<br />

Unreal Tournament √ √ √<br />

VNC √ √<br />

Warcraft √ √ √<br />

Windows Media Player √ √ √ √<br />

XDM √ √<br />

Yahoo Messenger √ √<br />

81


<strong>Router</strong> User’s <strong>Guide</strong><br />

Siemens Subscriber Networks<br />

4849 Alpha Road<br />

Dallas, TX 75244 USA<br />

(972) 852-1000 Tel<br />

(972) 852-1001 Fax<br />

support.ssn@siemens.com<br />

http://www.support.siemens.com<br />

82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!