TP-Link TL-R480T+ SafeStream Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung TP-Link TL-R480T+ SafeStream an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von TP-Link TL-R480T+ SafeStream, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung TP-Link TL-R480T+ SafeStream die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung TP-Link TL-R480T+ SafeStream. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung TP-Link TL-R480T+ SafeStream sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts TP-Link TL-R480T+ SafeStream
- Den Namen des Produzenten und das Produktionsjahr des Geräts TP-Link TL-R480T+ SafeStream
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts TP-Link TL-R480T+ SafeStream
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von TP-Link TL-R480T+ SafeStream zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von TP-Link TL-R480T+ SafeStream und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service TP-Link finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von TP-Link TL-R480T+ SafeStream zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts TP-Link TL-R480T+ SafeStream, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von TP-Link TL-R480T+ SafeStream widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    TL-R480T+ Load Balance Broadband Router Rev: 5.0.0 1910010619[...]

  • Seite 2

    -I- COPYRIGHT & TRADEMARKS Specifications are subjec t to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., L TD. Other brands and product names are trademarks of their respective holders. No part of the specificat ions may be reproduced in any form or by any means or used to make any derivative such as translation, [...]

  • Seite 3

    -II- CONTENTS Package Contents .................................................................................................................. 1 Chapter 1 About this Guide ................................................................................................... 2 1.1 Intended Readers ....................................................[...]

  • Seite 4

    -III- 4.5.1 NA T ..........................................................................................................................51 4.5.2 T raf fic Control ..........................................................................................................60 4.5.3 Session Limit .......................................................[...]

  • Seite 5

    -1- Package Content s The following items should be found in your package: ¾ One TL-R480T+ Load Balance Broadband R outer ¾ One Power cord ¾ One Console Cable ¾ One Ethernet Cable ¾ Quick Installation Guide ¾ Mounting kits for installin g in a standard 19-inch rack ¾ Resource CD Note: ● Make sure that the pa ckage contains the above items.[...]

  • Seite 6

    -2- Chapter 1 About this Guide This User Guide contains information for setu p and management of TL-R480T+ Load Balance Broadband Router . Please read this gui de carefully before ope ration. 1.1 Intended Readers This Guide is intended for Network Engineer and Network Administrator. 1.2 Conventions In this Guide the following conventions are used: [...]

  • Seite 7

    -3- Appendix B F AQ Provides the possible solutions to the problems that may occur during the installation and operation of the router . Appendix C Glossary Lists the glossary used in this guide.[...]

  • Seite 8

    -4- Chapter 2 Introduction Thanks for choosing the Load Balance Broadband Router TL-R480T+. 2.1 Overview of the Router The Load Balance Broadband Router TL-R4 80T+ from TP-LINK possesses excellent data processing capability and multiple powerful func tions including Load Balance, Access Control, Bandwid th Con trol, Session Limit, PPPoE Server and [...]

  • Seite 9

    -5- + Featured Link Backup to switch all the new sessions from dropped line automatically to another for keeping an always on-line network. z Easy -to-use + Providing easy-to-use GUI with clear configur ation steps and detailed help information for the users to configure the Router simply . + Helping administrators to monitor the whole network stat[...]

  • Seite 10

    -6- Security ¾ Built-in firewall supporting URL/MAC Filtering ¾ Supports Access Control ¾ Supports App Control ¾ Supports Attack Defense ¾ Supports IP-MAC Binding ¾ Supports GARP (Gratuitous ARP) 2.3 Appearance 2.3.1 Front Panel The front panel of TL-R480T+ is show n as the following figure. z LEDs LED Status Indication On The Router is power[...]

  • Seite 11

    -7- z Interface Description Interface Port Description WAN 1~4 The WAN port is for connecting the Router to a DSL/Cable modem or Ethernet by the RJ45 cable. LAN 2~5 The LAN port is for connecting the Router to the l ocal PCs or switches by the RJ45 cable. Console / The Console port is for connecti ng with the serial port of a computer or terminal t[...]

  • Seite 12

    -8- Chapter 3 Quick Inst allation Guide After connecting the TL-R480T+ router into your network, you shoul d conf igure it. This chapter describes how to configure the basic functions of your TL-R480T+ Load Balance Broadband Router . These procedures only take you a few minutes. Y ou can access the Inte rnet via the router immediately after it has [...]

  • Seite 13

    -9- Step 2: In the next screen, right click Local Area Connection (LAN), and then select Properties . Figure 3-2 Step 3: In the next screen, select General tab, highlight Internet Protoc ol (TCP/IP), and then click the Properties button. Figure 3-3[...]

  • Seite 14

    -10- Step 4: Configure the IP address as shown in Figure 3-4 . After that, click OK . Figure 3-4 Note: Y ou can configure the PC to get an IP address automatically , select “ Obt ain an IP address automatically ” and “ Obt ain DNS server address automatically ” in the screen above. For Windows 98 OS or earlier , the PC and router ma y need [...]

  • Seite 15

    -1 1- Figure 3-6 Y ou can check it by following the steps below: Note: ● Is the connection between your PC and the Router correct? The LEDs of LAN port which you link to the devic e and the LEDs on your PC's adapter should be lit. ● Is the TCP/IP configuration for y our PC correct? If the Router's IP address is 192.168.0.1, your PC&ap[...]

  • Seite 16

    -12- Figure 3-7 Note: If the above screen ( Figure 3-7 ) does not prompt, it means that your web-browser may be set to a proxy . Choose To o l s m e n u → Internet Options → Connections → LAN Settings , in the screen that appears, cancel the Using Proxy checkbox , and click OK to finish it. After a successful login, the “Q uick Setup” scr[...]

  • Seite 17

    -13- Figure 3-9 W AN Mode Select the W AN port you want to use as the Figure 3-10 shown, and then click <Next> to load the W AN Connection T ype screen. Figure 3-10 W AN Port Select the connection type prov ided by your ISP as the Figure 3-1 1 shown. Three popular types are provided here. For other connecti on types, please refer to the 4.3.1[...]

  • Seite 18

    -14- Figure 3-1 1 W AN Connection T ype 1) If you choose PPPoE , you will see the screen as the Figure 3-12 shown. Enter the Account Name and Password provided by yo ur ISP (Internet Service Provider). Figure 3-12 W AN Connection T ype - PPPoE Click <Next> to dial up, and the process will take a few minutes. The process of configuring the net[...]

  • Seite 19

    -15- Figure 3-13 W AN Connection T ype – PPPoE Connecting 2) If your ISP a ssigns the IP addr ess automatically , please choose the Dy namic IP connection type to obtain the parameters for W AN port automatic ally . The process for obtain the parameter may take a few minutes as Figure 3-14 shown. If you close the scr een during the process, the c[...]

  • Seite 20

    -16- Figure 3-15 W AN Connection T ype - S tatic IP Then click <Next>. The process for configuring the network parameters is shown as Figure 3-16 . If you close the screen during the process, the configuration will still be continued in the background. If you have difficulty in this process, please cont act your ISP . Figure 3-16 W AN Connect[...]

  • Seite 21

    -17- Figure 3-17 Configuration Completed[...]

  • Seite 22

    -18- Chapter 4 Configuration 4.1 Stat u s The S tatus page shows the system information, the port connection st atus and other information related to this Router . Choose the menu Statu s to load the following page. Figure 4-1 S t atus 4.2 Quick Setup Please refer to the Chapter 3 Quick Installation Guide .[...]

  • Seite 23

    -19- 4.3 Network 4.3.1 W AN 4.3.1.1 W AN Mode TL-R480T+ provides four available W AN port s. Y ou can set the number of W AN ports on this p age. Choose the menu Network → WA N → W AN Mode to load the following p age. Figure 4-6 W AN Mode ¾ W AN Mode W AN Ports: Select the total number of W AN port s you prefer to use. And the Router will adju[...]

  • Seite 24

    -20- Tips: ● It’ s allowed to set the IP addresses of multiple W AN port s within the same subnet. However , to guarantee a normal communication, make sure that the W AN ports can access the same network, such as Internet or a local area network. ● The amount of tab p ages for W A N port varies with the number of the W AN ports. For the confi[...]

  • Seite 25

    -21- Default Gateway: Optional. Enter the Gateway assigned by your ISP . MTU: MTU (Maximum T ransmission Unit) is the maximum data unit transmitted by the physical network . It can be set in the ran ge of 576-1500. The default MTU is 1500. Y ou are recommended to keep the default value if no other MTU va lue is provided by your ISP . Primary DNS: E[...]

  • Seite 26

    -22- Figure 4-8 W AN – Dynamic IP The following items are displayed on this screen: ¾ Dyn am ic I P Connection T ype: Select Dynamic IP if your ISP as signs the IP address automatically . Click <Obtain> to get the IP address from your ISP’s server . Click <Release> to release the current IP address of W AN port. Host Name: Optional[...]

  • Seite 27

    -23- Get IP Address b y Unicast: The broadcast requirement may not be supported by a few ISPs. Select this option if you can not get the IP address from your ISP even with a normal network connection. This option is not required generally . Use the following DNS Server: Select this option to enter the DNS (D omain Name Server) address manually . Pr[...]

  • Seite 28

    -24- Primary DNS: Displays the IP address of your ISP’ s Primary DNS. Secondary DNS: Displays the IP address of your ISP’ s Secondary DNS. 3) PPPoE If your ISP (Internet Service Provider) has provid ed the account information for the PPPoE connection, please choose the PPPoE connection type (Used mainly for DSL Internet service).[...]

  • Seite 29

    -25- Figure 4-9 W AN - PPPoE The following items are displayed on this screen: ¾ PPPoE Settings[...]

  • Seite 30

    -26- Connection T ype: Select PPPoE if your ISP provides xDSL Vir tual Dial-up connection. Click <Connect> to dial-up to the Internet and obtain the IP address. Click <Disconnect> to disconnect the Internet and release the current IP address. Account Name: Enter the Account Name provided by your ISP . If you are not clear , please consu[...]

  • Seite 31

    -27- Service Name: Optional. Enter the Service Name prov ided by your ISP . It's null by default. Primary DNS: Enter the IP address of y our ISP’s Primary DNS. Secondary DNS: Optional. Enter the IP address of your ISP’ s Secondary DNS. Secondary Connection: Here allows you to configure t he secondary connection. Dynamic IP and S t atic IP [...]

  • Seite 32

    -28- manually terminated or the Router gets no response from your ISP . Please ensure that your settings are correct and your network is connected well. Consult your ISP if this problem remains. IP Address: Displays the IP address a ssigned by your ISP . Gateway Address: Displays the Gateway Address assigned by your ISP . Primary DNS: Displays the [...]

  • Seite 33

    -29- Figure 4-10 W AN - L2TP The following items are displayed on this screen: ¾ L2TP Settings Connection T ype: Select L2TP if your ISP prov ides a L2TP connection. Click <Connect> to dial-up to the Internet and obtain the IP address. Click <Disconnect> to disconnect the Internet and release the current IP address.[...]

  • Seite 34

    -30- Account Name: Enter the Account Name provided by your ISP . If you are not clear , please consult your ISP . Password: Enter the Password provided by your IS P . Server IP: Enter the Server IP provided by your ISP . MTU: MTU (Maximum T ransmission Un it) is the maximum data unit transmitted by the physical network. It can be set in the range o[...]

  • Seite 35

    -31- Default Gateway: If S tatic IP is selected, configure the default gateway . If Dynamic IP is selected , the obtained default gateway is displayed. Primary DNS/Secondary DNS: If S tatic IP is selected, co nfi gure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Up stream Bandwidth: S pecify the b andwidth for transmitting p a[...]

  • Seite 36

    -32- 5) PPTP If your ISP (Internet Service Provider) has provi ded the account informati on for the PPTP connection, please choose the PPTP connection type. Figure 4-1 1 W AN - PPTP The following items are displayed on this screen: ¾ PPTP Settings Connection T ype: Select PPTP if your ISP provides a PPTP c onnection. Click <Connect> to dial-[...]

  • Seite 37

    -33- address. Click <Disconnect> to disconnect the Internet and release the current IP address. Account Name: Enter the Account Name provided by your ISP . If you are not clear , please consult your ISP . Password: Enter the Password provided by your IS P . Server IP: Enter the Server IP provided by your ISP . MTU: MTU (Maximum T ransmission [...]

  • Seite 38

    -34- Default Gateway: If S tatic IP is selected, c onfigure the default gateway . If Dynamic IP is selected, the obt ained default gateway is displayed. Primary DNS/Secondary DNS: If S tatic IP is selected, configure the DNS. If Dynamic IP is selected, the obtained DNS is displayed. Up stream Bandwidth: S pecify the b andwidth for transmitting p ac[...]

  • Seite 39

    -35- 6) BigPond If your ISP (Internet Service Provider) has provided the account inform ation for the BigPond connection, please choose t he BigPond connection type. Figure 4-12 W AN – Bigpond The following items are displayed on this screen: ¾ BigPond Settings Connection T ype: Select BigPond if your ISP prov ides a BigPond connection. Click &l[...]

  • Seite 40

    -36- Password: Enter the Password provided by your ISP . If you are not clear , please consult your ISP . Auth Server: Enter the address of authenticati on server . It can be IP address or server name. Auth Domain: Enter the domain name of authentication server . It's only required when the address of Auth Server is a server name. Auth Mode: Y[...]

  • Seite 41

    -37- network is connected we ll. Consult your ISP if this problem remains. IP Address: Displays the IP address a ssigned by your ISP . Subnet Mask: Displays the Subnet Mask assigned by your ISP . Default Gateway: Displays the IP address of the default gateway assigned by your ISP . Note: T o ensure the BigPond connection re-established norma lly , [...]

  • Seite 42

    -38- Note: If the LAN IP address is changed, you must use t he new IP address to login to the Router . T o guarantee a normal communication, please be sure that the Gateway address and the Subnet Mask of the Hosts are consistent with t hat of the Router accordingly . 4.3.2.2 DHCP The Router with its DHCP (Dynamic Host Configuration Protocol) server[...]

  • Seite 43

    -39- Lease Time: S pecify the length of ti me the DHCP server will reserve the IP address for each computer . After the IP address expired, the client will be automatically assigned a new one. Default Gateway: Optional. Enter the Gateway address to be assigned. It is recommended to enter the IP address of the LAN port of the Router . Default Domain[...]

  • Seite 44

    -40- Figure 4-16 DHCP Reservation The following items are displayed on this screen: ¾ DHCP Reservation MAC Address: Enter the MAC address of the computer for which you want to reserve the IP address. IP Address: Enter the reserved IP address. Description: Optional. Enter a description for the entry . Up to 28 characters can be entered. Statu s: Ac[...]

  • Seite 45

    -41- 4.3.3 MAC Address The MAC (Media Access Control) address, as the uni que identi fier of the rout er in network, does not need to be changed commonly . Set the MAC Address for LAN port: In a complex network topology with all the ARP bound devices, if you want to use TL-R480T+ instead of the current router in a network node, you can ju st set th[...]

  • Seite 46

    -42- MAC Clone: It’s only available for WAN port. Click the <Resto re Factory MAC> button to res tore the MAC address t o the factory default value or click the <Clone Curre nt PC’ s MAC> button to clone the MA C address of the PC you are currently u sing to configure the R outer . Then click <Save> to apply . Note: T o avoid [...]

  • Seite 47

    -43- The following items are displayed on this screen: ¾ St atistics Unicast: Displays the number of normal unica st packet s received or transmitted on the port. Broadcast: Displays the number of normal broadcast packet s received or transmitted on the port. Pause: Displays the number of flow contro l frames received or transmitted on the port. M[...]

  • Seite 48

    -44- Figure 4-22 Port Mirror The following items are displayed on this screen: ¾ General Enable Port Mirror: Check the box to enable the Port Mirr or function. If unchecked, it will be disabled. Mode: Select the mode for the port mirror function. Options include: z Ingress: When this mode is selected, only the incoming packet s sent by the mirrore[...]

  • Seite 49

    -45- Tips: If both the mirrored port and the mirroring port are the LAN ports, these two L AN ports should be in the same Port VLAN. For example, if port 3 (the mirror ing port) and port 4 (th e mirrored port) are the LAN ports, the Port Mirror function can ta ke effect only when port 3 and port 4 are in the same Port VLAN. Application Example: T o[...]

  • Seite 50

    -46- Figure 4-23 Rate Control The following items are displayed on this screen: ¾ Rate Control Port: Displays the port number . Ingress Limit: S pecify whether to enable t he Ingress Limit feature. Ingress Rate: S pecify the limit rate for the ingress packet s. Egress Limit: S pecify whether to enable Egress Limit feature. Egress Rate: S pecify th[...]

  • Seite 51

    -47- Figure 4-24 Port Config The following items are displayed on this screen: ¾ Port Config Statu s: S pecify whether to enable the port. The packets can be transported via this port after being enabled. Flow Control: Allows you to enable/disable the Flow Control function. Negotiation Mode: Select the Negotiation Mode for the port. All Port s: Al[...]

  • Seite 52

    -48- 4.3.4.6 Port VLAN A VLAN (Virtual Local Area Network) is a network topology configured accord ing to a logical scheme rather than the physical layout, which allows you to divide the physical LAN into multiple logical LANs so as to control the communication among the ports . The VLAN function can prevent t he broadcast storm in LANs and enhance[...]

  • Seite 53

    -49- 4.4.1 Group On this page you can define the group for management. Choose the menu User Group → Group to load the following page. Figure 4-27 Group Configuration The following items are displayed on this screen: ¾ Group Config Group Name: S pecify a unique name for the group. Description: Give a description for the group. It's optional.[...]

  • Seite 54

    -50- The following items are displayed on this screen: ¾ User Config User Name: S pecify a unique name for the user . IP Address: Enter the IP Address of the user . It cannot be the network address or broadcast address of the port. Description: Give a description to the user fo r identification. It's optional. ¾ List of User In this table, y[...]

  • Seite 55

    -51- ¾ Vie w Config View : Select the desired view for configuration. User Name: Select the name of the desired User . A vailable Group: Displays the Groups that the User can join. Selected Group: Displays the Groups to which this User belongs. Group Name: Select the name of the desired Group. Group Structure: Click this button to view the tree st[...]

  • Seite 56

    -52- Figure 4-30 NA T Setup The following items are displayed on this screen: ¾ NAPT Source Port Range: Enter the source port range between 2049 and 65000, the span of which must be not less than 100. ¾ NA T -DMZ NA T -DMZ: Enable or disable NA T -DMZ. NA T DM Z is a special service of NA T application, which can be considered as a default forwar[...]

  • Seite 57

    -53- Figure 4-31 NA T Setup The following items are displayed on this screen: ¾ One-to-One NA T Mapping IP Address: Enter the Original IP Address in the first checkbox and T ranslated IP Address in the second checkbox. TL-R480T+ allows mapping from LAN port to W AN port. Interface: Select an interface for forwarding data packe ts. DMZ Forwarding: [...]

  • Seite 58

    -54- 4.5.1.3 Multi-Net s NA T Multi-Nets NA T functions to allow the IP under LAN wi thin multiple subnets to access the Internet via NA T . Choose the menu Advanced → NA T → Multi-Net s NA T to load the following page. Figure 4-32 Multi-Nets NA T The following items are displayed on this screen: ¾ Multi-Net s NA T Subnet/Mask: Enter the subne[...]

  • Seite 59

    -55- Application Example: Network Requirements The LAN subnet of TL-R480T+ is 192. 168.0.0 /24, the subnet of VLAN2 under a three layer switch is 192.168.2.0 /24, while the subnet of VLAN3 is 192.168.3.0 /24. The IP of VLAN for cascading the switch to the Router is 192.168. 0.2. Now the hosts within VLAN2 and VLAN3 desire to access the Internet. Th[...]

  • Seite 60

    -56- 2. Then set the corresponding S t atic Route entry , en ter the IP address of t he interface connecting the Router and the three layer swit ch into the Next Hop field. Choose the menu Advanced → Routi ng → S t atic Route to load the following page. The set S tatic Route entry is as follows: 4.5.1.4 V irtual Server Virtual server can be use[...]

  • Seite 61

    -57- Figure 4-33 Virtual Server The following items are displayed on this screen: ¾ Virtual Server Name: Enter a name for Virtual Server ent ries. Up to 28 characters can be entered. External Port: Enter the service port or port range provided by Router for accessing external network. All requests from In ternet to this service port or port range [...]

  • Seite 62

    -58- Note: ● The External port and Internal Port should be set in the range of 1-65535. ● The external ports of dif ferent entries should be different, whereas the internal ports can be the same. ¾ List of Rules In this table, you can view the information of the entries and edit them by the Action buttons. The first entry in Figure 4-33 indica[...]

  • Seite 63

    -59- ¾ Port T riggering Name: Enter a name for Port Triggering entri es. Up to 28 characters can be entered. T rigger Port: Enter the trigger port number or range of port numbers. Only when the trigger port initiates connection w ill all the corresponding incoming ports open and provide service for the applications, otherwise the incoming ports wi[...]

  • Seite 64

    -60- Choose the menu Advanced → NA T → ALG to load the following p age. Figure 4-35 ALG The following items are displayed on this screen: ¾ ALG FTP ALG: Enable or disable FTP ALG . The default setting is enabled. It is recommended to keep the def ault setting if no special requirement. H.323 ALG: Enable or disable H.323 ALG . The default setti[...]

  • Seite 65

    -61- Figure 4-36 Configuration The following items are displayed on this screen: ¾ General Disable Bandwidth Control: Select this option to disable Bandwidth Control. Enable Bandwidth Control all the time: Select this option to enable Bandwidth Control all the time. Enable Bandwidth Control When: With this option selected, the Bandwidth Control wi[...]

  • Seite 66

    -62- ¾ Interface Bandwidth Interface: Displays the current enabled W AN port(s). The T otal bandwid th is equal to the sum of bandwidth of the enabled W AN port s. Up stream Bandwidth: Displays the bandwidth of each W A N port for transmitting dat a. The Upstream Bandwid th of W AN port can be configured on W AN page. Downstream Bandwidth: Display[...]

  • Seite 67

    -63- ¾ Bandwidth Control Rule Direction: Select the data stream dir ection for the entry . The direction of arr owhead indicates the data stream direction W AN-ALL means all W A N port s through which the data flow might pa ss. Individual W AN port cannot be selected after W A N-ALL rules are added. Group: Select the group to defin e the controlle[...]

  • Seite 68

    -64- Note: ● The premise for single r ule taking ef fect is that the bandwidth of the interface for this rule is sufficient and not used up. ● It is impossible to satisfy all the guaranteed bandw idth if the tota l guaranteed bandwidth specified by all Bandwidth Control rules for certain in terface exceeds the physical bandwid th of this interf[...]

  • Seite 69

    -65- ¾ Session Limit Group: Select a group to define the controlled user . Max. Sessions: Enter the max. Sessions for the users. Description: Give a description for the entry . Statu s: Activate or inactivate the entry . ¾ List of Session Limit Y ou can view the informati on of the entries and edit t hem by the Action buttons. The first entry in [...]

  • Seite 70

    -66- Figure 4-40 Configuration With the box before Enable Application Optimized Routing checked, the Router will consider the source IP address and destination IP address of the packet s as a whole and record the W AN port they pass through. And then the p acket s with the sa me source IP address and destination IP address or destination port will [...]

  • Seite 71

    -67- The following items are displayed on this screen: ¾ General Protocol: Select the protocol for the entry in the drop-down list. If the protocol you want to set is not in the lis t, you can add it to the list on 4.3.4.4 Protocol page. Source IP: Enter the source IP range for the entry . 0.0.0.0 - 0.0.0.0 means any IP is acceptable. Destination [...]

  • Seite 72

    -68- On this page, you can configur e the Link Backup function based on actual need to reduce the traffic burden of W AN port and improve the network efficie ncy . Choose the menu Advanced → Load Balance → Li nk Backup to load the following p age. Figure 4-42 Link Backup The following items are displayed on this screen: ¾ General W AN Ports: D[...]

  • Seite 73

    -69- Timing: Link Backup will be enabled if the specified effective time is reached. All the traffic on the primary W AN will switch to the backup W AN at the beginning of the effective time; the tr affic on the backup W AN will switch to the primary W AN at the ending of the ef fective time. Failover: S pecify the premise for Failover Mode. The ba[...]

  • Seite 74

    -70- Figure 4-43 Protocol The following items are displayed on this screen: ¾ Protocol Name: Enter a name to indicate a protocol. The name will display in the drop-down list of Protocol on Access Rule page. Number: Enter the Number of the prot ocol in the range of 0-255. ¾ List of Protocol Y ou can view the informati on of the entries and edit t [...]

  • Seite 75

    -71- Choose the menu Advanced → Routi ng → S t atic Route to load the following page. Figure 4-44 Static Route The following items are displayed on this screen: ¾ St atic Route Destination: Enter the destination hos t the route leads to. Subnet Mask: Enter the Subnet Mask of the destination network. Next Hop: Enter the gateway IP address to wh[...]

  • Seite 76

    -72- The first entry in Figure 4-44 indicates: If there are packets being sent to a device with IP address of 21 1.162.1.0 and subnet mask of 255.255.255.0, the Rout er will forward the packet s from W A N1 port to the next hop of 21 1.200.1.1. Application Example There is a network topology as the following figure shown: If the LAN port of TL-R480[...]

  • Seite 77

    -73- 4.6 Firewall 4.6.1 Anti ARP S poofing ARP (Address Resolution Protocol) is used to analyze and map IP addresses to the corresponding MAC addresses so that packet s can be de livered to their destinations correctly . ARP functio ns to translate the IP address into the corresponding MAC address and maintain an ARP T able, where the latest used I[...]

  • Seite 78

    -74- ¾ General It is recommended to check all the options. Y ou s hould import the IP and MAC address of the host to List of IP-MAC Binding and enable the correspo nding entry before e nabling “Permit the packet s matching the IP-MAC Binding entries only”. When suffered ARP attack, the correct ARP informat ion will be sent to the device suf fe[...]

  • Seite 79

    -75- Figure 4-48 ARP Scanning Enter the start and the end IP addresses in the Scanni ng IP Range field. Then c lick the <Scan> button, the Router will scan all the active hosts within t he scanning range and display t he result in the list. The entries displayed on the Li st of Scanning Result do not m ean the IP and MAC addresses are already[...]

  • Seite 80

    -76- Figure 4-49 ARP List The configurations for t he entries is the same as the confi guration of List of Scanning Re sult on 4.4.1.2 ARP Scanning p age. The unbound IP-MAC inform ation will be replaced by new IP-MAC information or be automatically removed from the list if it has not been communica ted with others for a long time. This period is r[...]

  • Seite 81

    -77- Figure 4-50 Attack Defense The following items are displayed on this screen: ¾ General Flood Defense: Flood attack is a kind of commonly used DoS (Denial of Service), which including TCP SYN, UDP , ICMP and so on. It is recommended to check all the Fl ood Defense options and specify the corresponding thresholds. Keep the default settings if y[...]

  • Seite 82

    -78- Packet Anomaly Defense: Packet Anomaly refers to the abnormal p ackets. It is recommended to select all the Packet Anomaly Defense options. Enable Att ack Defense Logs: With this box checked, the Rout er will record the defense logs. 4.6.3 MAC Filtering On this page, you can control the access to the Internet of local host by specifying their [...]

  • Seite 83

    -79- ¾ List of Rules Y ou can view the informati on of the entries and edit t hem by the Action buttons. 4.6.4 Access Control 4.6.4.1 URL Filtering URL (Uniform Resource Locator) specifies wher e an identified resource is available and the mechanism for retrieving it. URL Filt er functions to filter the Internet URL address, so as to provide a con[...]

  • Seite 84

    z Group: URL Filtering will take ef fect to all the users in group. Mode: Select the mode for URL Filtering. “Keyword’’ indicates that all the URL addresses including the specif ied keywords will be filtered. “URL Path” indicates that the URL address will be filtered only when it exactly matches the specified URL. Description: Give a desc[...]

  • Seite 85

    -81- 4.6.4.2 Web Filtering On this page, you can filter the desired web components. Choose the menu Firewall → Access Control → Web Filtering to load the following p age. Figure 4-53 Web Filtering Check the box before Enable Web Filt ering and select the web components to be filtered. 4.6.4.3 Access Rules Choose the menu Firewall → Access Con[...]

  • Seite 86

    -82- Policy: Select a policy for the entry: z Block: When this option is select ed, the packet s obeyed the rule will not be allowed to pass through the Router . z Allow: When this option is selected, the packe ts obeyed the rule will be allowed to pass through the Router . Service: Select the service for the entry . Only the service belonging to t[...]

  • Seite 87

    -83- ¾ List of Rules Y ou can view the information of the entries and edit them by the Action butt ons. The smaller the valu e is, the higher the priority is. The first entry in Figure 4-54 indicates: The TELNET p acket s transmitted from the hosts within the network of 192.168.0.0/24 will be not allowed to pass through the Router at 8:00-20:00 fr[...]

  • Seite 88

    -84- ¾ Service Name: Enter a name for the service. T he name should not be more than 28 characters. The name will display in the drop-down list of Protocol on Access Rule page. Protocol: Select the protocol for the servic e. The system predefined protocols include TCP , UDP and TCP/UDP . Dest. Port: Enter the start and end ports to make a destinat[...]

  • Seite 89

    -85- Figure 4-56 Application Rules The following items are displayed on this screen: ¾ General Check the box before Enable Application Control to make the Applicat ion Control function take ef fect. The specified applic ation used by the specified loca l users will be not allowed to access the Internet if the App lication Control entry is enabled.[...]

  • Seite 90

    -86- Effective Time: S pecify the t ime for the entry to take e ffect . Description: Give a description for the entry . Statu s: Activate or inactivate the entry . ¾ List of Rules Y ou can view the informati on of the entries and edit t hem by the Action buttons. The first entry in Figure 4-56 indicates: The group1 is applied with Application Rule[...]

  • Seite 91

    -87- 4.7.1.1 General On this page, you can conf igure PPPoE function globally . Choose the menu Services → PPPoE Server → General to load the following page. Figure 4-58 General The following items are displayed on this screen: ¾ General PPPoE Server: S pecify whether to enable t he PPPoE Server function. Dial-up Access Only: S pecify whether [...]

  • Seite 92

    -88- Max Echo-Request s: S pecify the maximum number of Echo-R equests sent by the server to wait for response. The default is 10. The link will be dropped when the number of the unacknowledged LCP echo requests reaches your specified Max Echo-Requests. Idle Timeou t: Enter the maximum idle time. The session will be terminated af ter it has been in[...]

  • Seite 93

    -89- Figure 4-59 IP Address Pool The following items are displayed on this screen: ¾ IP Address Pool Pool Name: S pecify a unique name to the IP A ddress Pool for identification and management purposes. IP Address Range: S pecify the start and the end IP address for IP Pool. The start IP address should not exceed the end address and the IP address[...]

  • Seite 94

    -90- Figure 4-60 Account The following items are displayed on this screen: ¾ Account Account Name: Enter the account name. This name should not be the same with the one in L2TP/PPTP connection settings. Password: Enter the password. IP Address Assigned Mode: Select the IP Address Assigned Mode for IP assignment. z Static: Select this option to ass[...]

  • Seite 95

    -91- Description: Enter the description for management and search purposes. Up to 28 characters can be entered. Statu s: Activate or inactivate the entry . MAC Binding: Select a MAC Binding type from t he pull-down list. Options include: z Disable: Select this option to disable the MAC Binding function. z Manual: Select this option to bi nd the acc[...]

  • Seite 96

    -92- Figure 4-61 Exceptional IP The following items are displayed on this screen: ¾ Exceptional IP IP Address Range: S pecify the st art and the end IP address to make an exceptional IP address range. This range should be in the same IP range with LAN port of the Router . The start IP address should not exceed the end address and the IP address ra[...]

  • Seite 97

    -93- 4.7.2 E-Bulletin With E-Bulletin function, bulletin in formation can be released to the s pecified users. On this page you can edit the bulletin c ontent and specify the re ceiving user group. Choose the menu Services → E-Bulletin to load the following page. Figure 4-63 E-Bulletin The following items are displayed on this screen: ¾ General [...]

  • Seite 98

    -94- Enable Logs: S pecify whether to log the E-Bulletin. ¾ E-Bulletin Tit le : Enter a title for the bulletin. Content: Enter the content of the bulletin. Object: Select the object of this bulletin. Options include: z ANY: The bulletin will be released to all the users and the PCs on the LAN. z Group: The bulletin will be released to the users in[...]

  • Seite 99

    -95- As many ISPs use DHCP to assi gn public IP addresses in W AN, the public IP address assigned to the client is unfixed. In this way , it’s very dif ficult for other clients to get the latest IP address of this client for access. DDNS (Dynamic DNS) server provides a fixed d oma in name for DDNS client and maps its late st IP address to this do[...]

  • Seite 100

    -96- Account Name: Enter the Account Name of your DDNS account. If you have not registered , click <Go to register> to go to t he website of Dyndns for register . Password: Enter the password of your DDNS account. Domain Name: Enter the Domain Name that you registered with your DDNS service provider . DDNS Service: Activate or inactivate DDNS[...]

  • Seite 101

    -97- Figure 4-65 NO-IP DDNS The following items are displayed on this screen: ¾ No-IP DDNS Account Name: Enter the Account Name of your DDNS account. If you have not registered , click <Go to register> to go to t he website of No-IP for register . Password: Enter the password of your DDNS account. Domain Name: Enter the Domain Name that you [...]

  • Seite 102

    -98- 4.7.3.3 PeanutHull On this page you can confi gure PeanutHull DDNS client. Choose the menu Services → Dynamic DNS → PeanutHull to load the following page. Figure 4-66 PeanutHull DDNS The following items are displayed on this screen: ¾ PeanutHull DDNS Account Name: Enter the Account Name of your DDNS account. If you have not registered , c[...]

  • Seite 103

    -99- DDNS St atus: Displays the current status of DDNS service z Offline: DDNS service is disabled. z Connecting: client is connecting to the server. z Online: DDNS works normally. z Authorization fails: The Account Name or Password is incorrect. Please check and enter it again. Domain Name: Displays the domain names obtained fr om the DDNS server [...]

  • Seite 104

    -100- Account Name: Enter the Account Name of your DDNS account. If you have not registered , click <Go to register> to go to t he website of Comexe for register . Password: Enter the password of your DDNS account. Domain Name 1: Enter the Domain Name that you registered with your DDNS service provider . Domain Name 2: Optional. Enter the Dom[...]

  • Seite 105

    -101- If UPnP groupware are installed in the host in LAN and UPnP function is enabled for the Router , the host in LAN can automatically open the corresponding port to allow the UP nP application in W AN to access the resource of the host in LAN via this port, so that the functions limited to NA T can work normally . For example, MSN Messenger inst[...]

  • Seite 106

    -102- 4.8 Maintenance 4.8.1 Admin Setup 4.8.1.1 Administrator On this page, you can modify the factory default user name and p assword of the Router . Choose the menu Maintenance → Admin Setup → Administrator to load the following page. Figure 4-69 Administrator The following items are displayed on this screen: ¾ Administrator Current User Nam[...]

  • Seite 107

    -103- 4.8.1.2 Login Parameter On this page, you can configure and modify the W eb and T elnet port. Choose the menu Maintenance → Admin Setup → Login Parameter to load the following page. Figure 4-70 Login Parameter The following items are displayed on this screen: ¾ General Web Management Port: Enter the Web Management Port for the Router . T[...]

  • Seite 108

    -104- T ype 210.10. 10.0/24 in the Subnet/Mask field on Remo te Management page and enable the entry as the following figure shows. Then type the corresponding port number in Web Managem ent Port and T elnet Management Port fields as the following figure shows. Finally , start the web browser and type 210.10.10.50 in the URL field to log in the Web[...]

  • Seite 109

    -105- ¾ List of Subnet In this list, you can view the Remote Management entries and edit them by the Action buttons. The first entry in Figure 4-71 indicates that: The hosts with IP address in subnet of 192.168.2.0/24 are allowed to access the Router and this entry is activated. 4.8.2 Management 4.8.2.1 Factory Defaults Choose the menu Maintenance[...]

  • Seite 110

    -106- ¾ Export Click the <Export> button to save the current conf iguration a s a file to your computer . Y ou are suggested to take this measure before upgrading or modifying the configuration. ¾ Import Click the <Browse> button to locate the update file for the device, or enter the exact path to the saved file in the text box. Then [...]

  • Seite 111

    -107- T ype the path and file name of the updat e file into the “File” field. Or cl ick the <Browse> button to locate the update file. Then click the <Upgrade> button to complete. Note: ● After upgrading, the devic e will reboot automatically . ● T o avoid damage, please don't turn off the device while upgrading. ● Y ou a[...]

  • Seite 112

    -108- Interface: Displays the interface. IP Fragment Rx: Displays the amount of IP Fragment s received by W A N port. Abnormal IP Packet s Rx: Displays the rate for transmitting data frames. 4.8.3.2 IP T raffic St atistics IP T r affic S tatistics screen displays the det ailed traffic information of each PC on LAN. Choose the menu Maintenance → S[...]

  • Seite 113

    -109- Choose the menu Maintenance → Diagnostics → Diagnostics to load the following p age. Figure 4-78 Diagnostics The following items are displayed on this screen: ¾ Ping Destination IP/Domain: Enter destination IP address or Domain name here. Then select a port for testing, if you select “A uto”, the Router will select the interface of d[...]

  • Seite 114

    -1 10- Destination IP/Domain: Enter destination IP address or Domain name here. Then select a port for testing, if Auto is selected, the Router will select the interface of destination automatically . After clicking the <S tart> button, the Router will send T racert pa ckets to test the connectivity of the gateways during the journey from th [...]

  • Seite 115

    - 111 - Port: Displays the detected W AN port. Detection: Displays whether the Online Detection is enabled. W AN St atus: Display the detecting results. 4.8.5 Ti me System T ime is the time displayed while the Rout er is running. On this page you can configure the system time and the settings here will be used for ot her time-based functions like A[...]

  • Seite 116

    -1 12- Manual: With this option selected, you can set the date and time manually . Synchronize with PC’S Clock: With this option selected, the admin istrator PC’ s clock is utilized. Note: ● If Get GMT function cannot be used properly , pl ease add an entry with UDP port of 123 to the firewall software of the PC. ● The time will be lost whe[...]

  • Seite 117

    -1 13- Severity Level Description emergencies 0 The system is unusable. alerts 1 Action must be taken imme diately . critical 2 Critical conditions errors 3 Error conditions warnings 4 W arnings conditions notifications 5 Normal but significant conditions informational 6 Informational messages debugging 7 Debug-level messages[...]

  • Seite 118

    -1 14- Appendix A Hardware S pecifications St andards and Protocols IEEE 802.3, 802.3u TCP/IP , PPPoE, DHCP , ICMP , NA T , SNTP ,HTTP ,DNS One 10/100 Auto-Negotiation W AN RJ45 port (Auto MDI/MDIX) Three adjustable 10/100M Auto-Negot iation WAN/LAN RJ45 port s (Auto MDI/MDIX) One 10/100M Auto-Negotiation LAN RJ45 port (Auto MDI/MDIX) Port s One Co[...]

  • Seite 119

    -1 15- Appendix B F AQ Q1. What can I do if I cannot access the web-based configuration page? 1. For the first login, pl ease try the following step s: 1) Make sure the cable is well connected to t he LAN port of the Router . The correspon ding LED should flash or be solid light. 2) Make sure the IP address of your PC is set in the same subnet addr[...]

  • Seite 120

    -1 16- Q3: What can I do if the Router with the re mote management function enabled cannot be accessed by the remote computer? 1. Make sure th at the IP address of the remote com puter is in the subnet allowed to remotely access the router . 2. If the router ’s management por t has been modified, please log in to the Router with the new address, [...]

  • Seite 121

    -1 17- Appendix C Glossary Glossary Description DSL(Digital Subscriber Line) A technology that allows data to be sent or received over existing traditional phone lines. ALG ( Application Layer Gateway ) Application Level Gateway (A LG) is application specifi c translation agent that allows an application on a host in one address realm to connec[...]

  • Seite 122

    -1 18- Glossary Description H.323 H.323 allows dissimilar communica tion devices to communicate with each other by using a standardized communication protocol. H.323 defines a comm on set of CODECs, call setup and negotiating procedures, and basic data transport methods. H HTTP ( Hypertext Transfer Protocol ) The protocol used by Web browsers a[...]

  • Seite 123

    -1 19- Glossary Description MAC address ( Media Access Control address ) S tandardized data link layer address that is required for every port or device that connects to a LAN. Other devices in th e network use these addresses to lo cate specific ports in the network and to create and update routing tables and data structures. MAC addresses are[...]

  • Seite 124

    -120- Glossary Description T elnet ( T elecommunication Network protocol ) T elnet is used for remote terminal connection, enabling users to log in to remote systems and us e resources as if they we re connected to a local system. UDP ( User Datagram Protocol ) UDP is a simple protocol t hat exchanges dat agrams without acknowledgments or g[...]