Go to page of
Similar user manuals
-
Network Router
Billion Electric Company BiPAC 7402NX(L)
8 pages 1.49 mb -
Network Router
Billion Electric Company 5200N
74 pages 3.06 mb -
Network Router
Billion Electric Company 5100S
72 pages 1.73 mb -
Network Router
Billion Electric Company 7001
61 pages 1.73 mb -
Network Router
Billion Electric Company 400G
88 pages 3.12 mb -
Network Router
Billion Electric Company 5102G
14 pages 0.65 mb -
Network Router
Billion Electric Company 7202GR2
96 pages 3.34 mb -
Network Router
Billion Electric Company 7404VNOX
9 pages 1.37 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of Billion Electric Company 7300(G), along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Billion Electric Company 7300(G) one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of Billion Electric Company 7300(G). A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of Billion Electric Company 7300(G) should contain:
- informations concerning technical data of Billion Electric Company 7300(G)
- name of the manufacturer and a year of construction of the Billion Electric Company 7300(G) item
- rules of operation, control and maintenance of the Billion Electric Company 7300(G) item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Billion Electric Company 7300(G) alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Billion Electric Company 7300(G), and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Billion Electric Company service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Billion Electric Company 7300(G).
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the Billion Electric Company 7300(G) item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
BiP AC 7300(G) (802.1 1g) ADSL2+ Router User ’ s Manual[...]
-
Page 2
Chapter 1 ................................................................................................. 1 1.1 Introducing the BiP AC 7300(G) ............................................. 1 1.2 Features................................................................................. 3 1.3 Applications of the BiP AC 7300(G) ......................[...]
-
Page 3
Chapter 1 Introduction 1.1 Introducing the BiP AC 7300(G) Thank you for purchasing the BiP AC 7300(G) AD SL2+ Modem/Router by Billion. Y our new router is an all-in-one unit that combines an ADSL modem, ADSL router and Ethernet network switch to provide everything you need to get the machines on your network connected to the Internet over an ADSL b[...]
-
Page 4
addresses making them invisible to outside users on the Internet, so it is much more dif ficult for a hacker to target a machine on your network . Second, it can block and redirect cert ain ports to limit the services that out side users can access. T o ensure that games and other Internet applications run properly , you can open specific ports for[...]
-
Page 5
1.2 Features Express Internet Access – ADSL2/2+ capable The BiP AC 7300(G) complies with ADSL worldwide standards. Supporting downstream rates of 8Mbps with ADSL, the router is ca pable of up to 12/24 Mbp s with ADSL2/2+, and upstream rates of up to 1 Mbp s. Users enjoy not only high-speed ADSL services but also broadband multimedia applications [...]
-
Page 6
Firewall NAT technology supports simple firewalls and provides options for blocking access from the Internet, like Telnet, FTP, TFTP, WEB, SNMP and IGMP. Domain Name System Relay Domain Name System (DNS) relay provides an easy way to map a domain name with a user-friendly name such as www. billion.com with an IP address. When a local machine sets i[...]
-
Page 7
addresses, including subnet masks and DNS IP addresses and distributes them to local computers. This provides an easy way to manage the local IP network. Rich Packet Filtering This feature filters the packet based on IP addresses as well as Port numbers. Filtering packets to and from the Internet provides a higher level of security control. St atic[...]
-
Page 8
1.3 Applications of the BiP AC 7300(G) 6[...]
-
Page 9
Chapter 2 Product Overview 2.1 Import ant Notes War n i n g Do not use the router in high humidity or high temperatures. Do not use the same power s ource for the router as othe r equipment. Do not open or repair the case yourself. If the router is too hot, turn off the power immediately and have it rep aired at a qualified service cent[...]
-
Page 10
2.3 The Front LEDs BiP AC 7300 BiP AC 7300G LED Description 1 PPP : Steady glow when there is a PPPoA / PPPoE connection. 2 ADSL: Lights when successfully connected to an ADSL DSLAM (linesync). 3 LAN Port 1-4: Steady glow when connected to an Ethernet device. Glows green for 100Mbps; Orange for 10Mbps. Blinking light when data is Transmitted / Rece[...]
-
Page 11
2.4The Rear Port s BiP AC 7300 1 3 4 2 BiP AC 7300G 4 3 5 1 2 Port Description 1 PWR Connect the supplied power adapter to this jack. 2 RESET After the router is powered on, press this recessed button using the end of paper clip or other sm all pointed object to reset the router or to restore it to factory default settings. 1. Recovery procedures f[...]
-
Page 12
default settings. The login will be reset to admin and the password will be reset to adm in , and the modem will be accessible via its default IP address at http://192.168.1.254/ 3 LAN Connect a UTP Ethernet cable (Cat-5 or Cat-5e) to one of the four LAN ports when connecting to a PC or an of fice/home network of 10Mbps or 100Mbp s. 4 ADSL (LINE) C[...]
-
Page 13
2.5 Cabling Link and ADSL line LEDs are lit. If they are not, verify that you are using the proper ables. and und can ause problems with your ADSL connection, including frequent disconnections. One of the most common causes of problems is bad cabling or ADSL line(s). Make sure that all connected devices are turned on. On the front of the product is[...]
-
Page 14
Chapter 3 Installation Y ou can configure the BiP AC 7300(G) router th rough the convenient and user-friendly interface of a web browser . Most popular operating systems such as Linux, Mac and Windows 98/NT/2000/XP/Me include a web br owser as a standard application. 3.1 Before Configuration PCs must have a properly install ed Ethernet interface an[...]
-
Page 15
Configuring a PC in Windows XP 1. Go to Start / Control Panel (in Classic View) . In the Control Panel, double-click on Network Connections 2. Double-click Local Area Connection . 3. In the Local Area Connection Status window, click Properties . 4. Select Internet Protocol (TCP/IP) and click Properties . 5. Select the Obtain an IP address automatic[...]
-
Page 16
Configuring a PC in Windows 2000 1. Go to Start / Settings / Control Panel . In the Control Panel, double-click on Network and Dial-up Connections . 2. Double-click Local Area Connection . 3. In the Local Area Connection Status window click Properties . 4. Select Internet Protocol (TCP/IP) and click Properties . 5. Select the Obtain an IP address a[...]
-
Page 17
Configuring PC in Windows 98/Me 1. Go to Start / Settings / Control Panel . In the Control Panel, double-click on Network and choose the Configuration tab. 2. Select TCP/IP ->NE2000 Compatible , or the name of your Network Interface Card (NIC) in your PC. 3. Select the Obtain an IP address automatically radio button. 4. Then select the DNS Confi[...]
-
Page 18
Configuring PC in Windows NT4.0 1. Go to Start / Settings / Control Panel . In the Control Panel, double-click on Network and choose the Protocols tab. 2. Select TCP/IP Protocol and click Properties . 3. Select the Obtain an IP address from a DHCP server radio button and click OK . 16[...]
-
Page 19
3.2 Factory Default Settings Before configuring the BiP AC 7300(G) rout er , you need to know the following default settings. Web Interface: Username: admin Password: admin LAN Device IP Settings: IP Address: 192.168.1.254 Subnet Mask: 255.255.255.0 ISP setting in W AN site: PPPoE DHCP Server: DHCP server is enabled. S tart IP Address: 192.168.1.10[...]
-
Page 20
3.3 LAN and W AN Port Addresses The parameters of LAN and W AN ports are preset at the factory . The default values are shown below . LAN Port W AN Port IP address 192.168.1.254 Subnet Mask 255.255.255.0 DHCP server function Enabled IP addresses for distribution to PCs 100 IP addresses continuing from 192.168.1.100 through 192.168.1.199 The PPPoE f[...]
-
Page 21
PPPoE With EZSO built-in, you can simply plug cables in as first installation and turn on host computer to surf Internet through WEB brow ser like IE. Y ou do not need to login into the router and search the router ’s WEB GUI configuration page to find out the right web p age for configuring your PPPoE/PPPoA cr edentials. EZSO feature in Billi on[...]
-
Page 22
PPPoA 1. Please wait when the connection is trying. 2. Enter the username and password provide by your ISP. 3. If login failed, Please input the correct username and password again. 4. Login Successfully. 20[...]
-
Page 23
DHCP With this method, user does not need to acce ss router to configure it and set lot of parameters. Besides, it eliminates the comp licated way to configure the device and will definitely reduce the service call from users. 1. Please wait when the connection is trying. 2. Login Successfully. Web Configuator: Open your web browser , enter the IP [...]
-
Page 24
Chapter 4 Configuration Once you have logged on to your BiP A C 7300(G) ADSL2+ Router via your web browser , you can begin to set it up according to your requi rements. On the configuration homep age, the left navigation p ane links you directly to the setup pages, which include: Stat us (ARP T able, Wireless Association, Rout ing T able, DHCP T ab[...]
-
Page 25
4.1 S t atus 23[...]
-
Page 26
Device Information Host Name: Provide a name for the router for i dentification purposes. Host Name lets you change the router name. System Up-T ime: Records system up-time. 24[...]
-
Page 27
Current time: Set the current time. See the T ime Zone section for more information. Hardware V ersion: Chipset version Sof tware V ersion: Firmware version LAN MAC Address: The LAN MAC address W AN MAC Address: The W AN MAC address Home URL: Connects to the Home W ebsite. LAN IP Address: LAN port IP address. Sub Net Mask: LAN port IP subnet mask. [...]
-
Page 28
4.1.1 ARP T able The router ’s ARP (Address Resolution Protocol ) T able shows the mappi ng of Internet (IP) addresses to Ethernet (MAC) addr esses. This is a quick way to determine the MAC address of the network interface of your PCs to use with the router ’s Firewall – MAC Address Filter function. See the Firewall section of this manual for[...]
-
Page 29
4.1.2 Wireless Association IP Address: It is IP Address of wireless client that join this network. MAC: The MAC address of wireless client. 27[...]
-
Page 30
4.1.3 Routing T able Routing T able: #: Item number Destination: IP address of the destination network. Netmask: The destination netmask address. Gateway/Interface: IP address of the gateway or existi ng interface that this route uses. Cost: The cost of transmission for routing pur poses. The number need not be precise, but it must be between 0 and[...]
-
Page 31
4.1.4 DHCP T able Leased: DHCP assigned IP addresses information. IP Address: IP addresses of devices on your LAN (Local Area Network). MAC Address: The MAC Address that you want to assign the fixed IP address Client Host Name: Expired IP addresses information Register T ime: Register time information 29[...]
-
Page 32
4.1.5 System Log Display system logs accumulated up to the pres ent time. Y ou can tra ce historical information with this function. 30[...]
-
Page 33
4.1.6 Security Log This screen displays security log information. If a hacker attacks your server , he is isolated by the firewall function and the router record s related information. This helps you know where the hacker comes from. 31[...]
-
Page 34
4.2 Quick S t art For detailed instructions on configuring W AN settings, see the WA N section of this manual. The information you need for the Quick S tart wizard to get you online are your login (of ten in the form of username@ispname ), your p assword, and the encapsulation type. Y our ISP can supply all the details you need. Alte rnatively , if[...]
-
Page 35
Connection Encap sulation: Select the encapsulation type your ISP uses or choose “Auto Scan”. Click Star t to begin scanning for encapsulation types of fered by your ISP . If the scan is successful, you are presented wit h a list of supported options. VCI: Enter the VCI assigned to you. This field may already be configured. VPI : Enter the VPI [...]
-
Page 36
Optional Setting IP Address: Type your ISP assigned IP address in the IP Address text box. Subnet Mask: Enter a subnet mask in dotted decimal notation. Default Gateway: You must specify a gateway IP address (supplied by your ISP) DNS Obtain DNS automatically : Select this check box to use DNS. Primary DNS: Enter the IP addresses of the DNS se rvers[...]
-
Page 37
4.3 Configuration Click this item to access the following sub- items that configur e the ADSL router: LAN, W AN, System, Firewall, QoS, V irtual Server and Advanced. These functions are described in the following sections. 35[...]
-
Page 38
4.3.1 LAN (Local Area Network) 4.3.1 LAN (Local Area Network) A Local Area Network (LAN) is a shared comm unication system to which many computers are attached and is limited to t he immediate area, usually the same building or floor of a building. A Local Area Network (LAN) is a shared comm unication system to which many computers are attached and[...]
-
Page 39
4.3.1.2 Wireless Mode: 802.1 1b + g (Mixed mode), 802.1 1b and 802.1 1g. The factory default is 802.1 1b + g. ESSID: Enter the unique ID given to the Access Poin t (AP), which is already built-in to the router ’s wireless interface. T o connect to this device, your wireless clients must have the same ESSID as the device. Regulation Domain: There [...]
-
Page 40
AP . WDS t akes advantages of cost saving and flexibility which no extra wireless client device is required to bridge between two acce ss points and extending an existing wired or wireless infrastructure network to create a larger network. In addition, WDS enhances its link connection security in WEP mode, WEP key encryption must be the same for bo[...]
-
Page 41
WPA2 Pre-Shared Key WP A2 Algorithms: TKIP (T emporal Key Integrity Protocol) utilizes a stronger encr yptio n method and incorporates Message Integrity C ode (MIC) to provide protection against hackers. WP A2 Shared Key: The key for network authentication . The input format is in character style and key size should be in the range between 8 and 63[...]
-
Page 42
Passphrase: This is used to generate WEP keys automatically based upon the input string and a pre-defined al gorithm in WEP64 or WEP128. Y ou can input the same string in both the AP and Client card se ttings to generate the same WEP keys. Please note that you do not have to enter Key (1-4) as below when the Passphrase is enabled.. Key (1-4): Enter[...]
-
Page 43
When the DHCP Server is disabled you need to manually assign a fixed IP address to each PC on your network, and set the default gateway fo r each PC to the IP address of the router (the default is 192.168.1.254). T o configure the router ’ s DHCP Server , check DHCP Server and click Next . Y ou can then configure parameters of the DHCP Server in [...]
-
Page 44
If you check DHCP Relay Agent and click Next then you must enter the IP address of the DHCP server which assigns an IP address back to the DHCP client in the LAN. Use this function only if advised to do so by your network administr ator or ISP . Click Ap ply to enable this function. 42[...]
-
Page 45
4.3.2 W AN (Wide Area Network) A W AN (Wide Area Network) is an outside connec tion to another network or the Internet. There are three items within the W AN section: ISP , DNS and ADSL. 4.3.2.1 ISP The factory default is PPPoE. If your IS P uses this access protocol, click Edit to input other parameters as below . If your ISP does not use PPPoE, y[...]
-
Page 46
VPI and VCI: Enter the information provided by your ISP . NA T: The NA T (Network Address T ranslation) feat ure allows multiple users to access t he Internet through a single IP account, sharing the single IP address. If users on your LAN have public IP addresses and can access the Inte rnet directly , the NA T function can be disabled. Encap sula[...]
-
Page 47
NA T: The NA T (Network Address T ranslation) feat ure allows multiple users to access t he Internet through a single IP account, sharing a single IP address. If users on your LAN have public IP addresses and can access the Internet directly , the NA T function can be disabled. Username: Enter the username provided by your ISP . Y ou can input up t[...]
-
Page 48
Description: A user-definable name for this connection. VPI/VCI: Enter the information provided by your ISP . NA T: The NA T (Network Address T ranslation) feat ure allows multiple users to access t he Internet through a single ISP account, shari ng a single IP address. If users on your LAN have public IP addresses and can access the Inte rnet dire[...]
-
Page 49
and to automatically re-establish the PPPo E session when disconnected by the ISP . Connect to Demand: If you want to establish a PPPoE session only when there is a packet requesting access to the Internet (i.e. when a program on your computer attempts to access the Internet). Idle T imeout: Auto-disconnect the broadband firewall gat eway when [...]
-
Page 50
4.3.2.2 DNS A Domain Name System (DNS) contains a mapping t able for domain name and IP addresses. On the Internet, every host has a unique and user-friendl y name (domain name) such as www .billion.com and an IP address. An IP address is a 32-bit number in the form of xxx.xxx.xxx.xxx , for example 192.168.1.254. Y ou can thin k of an IP address as[...]
-
Page 51
4.3.2.3 ADSL ADSL Mode: There are four modes “Open Annex T ype and Follow DSLAM’s Setting”, ”Annex A”, ”Annex L”, ”Annex M” and ”Annex J” that user can select for this connection. Modulator: There are four modes “ AUT O ”,” ADSL multimode ”,” ADSL2 ”and” ADSL2+ ” that user can select for this connection. DSP Fi[...]
-
Page 52
4.3.3 System There are six items within the System section: Time Zone, Remote Access, Firmware Upgrade, Backup/Restore, Rest art and User Management. 4.3.3.1 Time Zone The router does not have a real time clock on board; instead, it uses the Simple Network T ime Protocol (SNTP) to get the current time from an SNTP server out side your network. Choo[...]
-
Page 53
4.3.3.2 Remote Access T o temporarily permit remote administration of th e router (i.e. from outs ide your LAN), select a time period the router permits remote access for and click Enable. Y ou may change other configuration options for the w eb administration interface using Device Management options in the Advanced section of the GUI. 4.3.3.3 Fir[...]
-
Page 54
4.3.3.4 Backup / Restore These functions allow you to save and backup your router ’ s current settings to a file on your PC, or to restore a previously saved backup. This is useful if you wish to experiment with different settings, knowing that you have a backup handy in the case of any mist akes. It is advisable to backup your router ’s settin[...]
-
Page 55
If you wish to restart the rout er using the factory default se ttings (for example, af ter a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default settings. Y ou may also reset your router to factory se ttings by pressing in the small Reset pinhole button on the back of your [...]
-
Page 56
Y ou can change the user ’s p assw ord , whether their account is active and Va l i d , as well as add a comment to each user account. These opt ions are the same when creating a user account, with the exception that once creat ed you cannot change the username. Y ou cannot delete the default admin account; however y ou can delete any other creat[...]
-
Page 57
4.3.4 Firewall 4.3.4 Firewall Firewall and Access Control Firewall and Access Control Y our router includes a full SPI (S tateful Packet Inspection) firewall for controlling Internet access from your LAN, as well as helping to pr event atta cks from hackers. In addition to this, when using NA T (Network Address T ranslation) t he router acts as a ?[...]
-
Page 58
prevent unauthorized computers or applications accessing your local network from the Internet. Intrusion Detection : Enable Intrusion Detection to detect, prevent, and log malicious attacks. MAC Filter rules : Prevents unauthorized computers accessing the Internet. URL Filter : Blocks PCs on your local network from unwanted websites. A detailed exp[...]
-
Page 59
4.3.4.1 Packet Filter Packet filtering enables you to configure your router to block specified internal/external users ( IP a ddress ) from Internet access, or you can disable specific service requests ( Por t number ) to /from Internet. This conf iguration program allows you to set up to 6 dif ferent filter rules for different users based on their[...]
-
Page 60
Application: User can choose they want. Outgoing Incoming: Determine whether the rule is for outgoing p ackets or for incoming packet s. Active: Choose “Y es” to enable the rule, or choose “No” to disable the rule. Packet T ype: S pecify the packet type (TCP , UDP , ICMP or any) that the rule applies to. Select TCP if you wish to se[...]
-
Page 61
Schedule time: User can setup the time to use the packet filter. A ttention If the DHCP server option is enabled, y ou must be very careful in assigning IP addresses of a filtered private IP range to avoid conflict s because you do not know which PC in the LAN is a ssigned which IP address. The easiest and safest way is that t he filtered IP addres[...]
-
Page 62
Active: Select Yes from the drop down list box to enable MAC address filtering. Action When Matched: Select “Drop” or “Forward”. Log: Choose “Y es” if you wish to generate logs when the filer rule is applied to a p acket. MAC Address: Enter the MAC addresses you wish to manage. Candidates: it automatically detects devices connected to t[...]
-
Page 63
4.3.4.3 Wireless MAC Filter The MAC Address supports up to 30 wireless network machines and help s you to manage your network control to accept traffic from specific authorized machines or to restrict unwanted machine(s) to access your LAN. There are no pre-define MAC Addre ss filter rules; you can add the filter rules to meet your requirements Act[...]
-
Page 64
MAC Address: Enter the MAC addresses you wish to manage. Candidates: it automatically detects devices connected to the router through the Ethernet. 4.3.4.4 Intrusion Detection Check “Enable” if you wish to detect intruders accessing your computer without permission. The router automatically detects and blocks a DoS (Denial of Service) attack if[...]
-
Page 65
4.3.4.6 URL Filter URL (Uniform Resource Locator – e.g. an address in the form of http://www.billion.com or ht tp: //www. example.com ) filter rules allow you to prev ent users on your network from accessing particular websites from their URL. T here are no pre-defined UR L filter rules; you can add filter rules to m eet your requirements. Active[...]
-
Page 66
Always Block: Select to always check URL filter rules (i.e. at all hours of the day). Block from: S pecify the time period to check URL filter rules (e.g. during work hours). Keywords Filtering: Allows blocking by specific keywor ds within a particular URL rather than having to specify a complete URL (e.g. to block any image called “advertisement[...]
-
Page 67
Restrict URL Features Block Java Applet: Blocks Web content which includes the Java Applet to prevent someone who wants to damage your system via the st andard HTTP protocol. Block ActiveX : Blocks ActiveX Block Cookies: Blocks Cookies Block Proxy : Blocks Proxy 65[...]
-
Page 68
4.3.5 QoS (Quality of Service) Quality of Service Introduction If you’ve ever found your ‘net’ speed has slow ed to a crawl because another family member is using a P2P file sharing prog ram, you’ll underst and w hy the Quality of Service features in Billion’ s routers is such a breakthrough for home users and office users . QOS: Keeping [...]
-
Page 69
Application : A name that identifies an existing policy . Time Schedule : Scheduling your QOS policy to be applied. Direction : The traffic flow direction to be controlled by the QOS policy . There are two settings to be provided in the Router: LAN to W AN: Y ou want to control the traffic flow from the local network to the out side world. E.g.[...]
-
Page 70
configuration. If you want to make the change persistent in flash, choose in the left windows to save it into flash. When you press or buttons described above, the following page will show up in your browser . Y ou can use it to define a QOS policy . Controlled T raffic Flow: S pecify the traffic flow you want to control. For GRE protocol, there is[...]
-
Page 71
GRE: For PPTP VPN Connections. Assigned Dat a rate: Assign the data ratio for this policy to be controlled. For examples, we want to only allow 20% of t he total data transfer rate for t he LAN-to-W AN direction to be used for FTP server . Then we can specify here wit h data ratio = 20. If you have ADSL LINE with 256K/bps.rate, the estimated da[...]
-
Page 72
Best Effort Best Effort (000000) Premium Express Forwarding (101 1 10) Gold service (L) Class 1, Gold (001010) Gold service (M) Class 1, Silver (001 100) Gold service (H) Class 1, Bronze (001 1 10) Silver service (L) Class 2, Gold (010010) Silver service (M) Class 2, Silver (010100) Silver service (H) Class 2, Bronze (0101 10) Bronze service (L) Cl[...]
-
Page 73
QOS example for your Network Connection Diagram V oIP HTTP web browsing users FTP Server ADSL Subscription Rate Upstream: 256 kbp s Downstream: 2048 Mbps Example QOS Plan :. Application IP or Port s Control Flow Data Rate T ime Schedule V oIP User 192.168.0.1 Outgoing Minimal 20% with high priority for non-used bandwidth with SDCP marking Class 1 G[...]
-
Page 74
Example QOS Setup V oIP application V oice is latency-sensitive application. Most V o IP devices are use SIP protocol and the port number will be assigned by SIP module automatically . Better to use fixed IP address for catching V oIP packet s as high priority . 72[...]
-
Page 75
Above settings will help to improve quality of your V oIP service when traf fic is full loading. 73[...]
-
Page 76
FTP Server Application Some of companies will setup FTP server fo r customer downloading or home user sharing their files by using FTP . LAN to W AN direction: 74[...]
-
Page 77
W AN to LAN direction: With above settings that help to limit utilization of upstream of FTP . T ime schedule also help you to only limit utilization at day time. 75[...]
-
Page 78
HTTP Web Browsing Y ou can control the internet web browsing by specify the HTTP 80 (8080 for some proxy server). LAN to W AN direction: 76[...]
-
Page 79
W AN to LAN direction: 77[...]
-
Page 80
4.3.6 V irtual Server In TCP/IP and UDP networks a port is a 16-bi t number used to identify which application program (usually a server) incoming connecti ons should be delivered to. Some ports have numbers that are pre-assigned to them by the IANA (t he Internet Assigned Numbers Authority), and these are referre d to as “well-known ports”. Se[...]
-
Page 81
Well-known and Registered Ports Port Number Protocol Description 20 TCP FTP Data 21 TCP FTP Control 22 TCP & UDP SSH Remote Login Protocol 23 TCP T elnet 25 TCP SMTP (Simple Mail T r ansfer Protocol) 53 TCP & UDP DNS (Domain Name Server) 69 UDP TFTP (T rivial File T ransfer Protocol) 80 TCP World Wide W eb HTTP 1 10 TCP POP3 (Post Office Pr[...]
-
Page 82
Delete: Check the Rule No. you wish to delete, then click “Delete”. Item: Item number Service select: Select the service you wish to configure Protocol: Automatic when you choose Service select St art Port & End Port: Enter the public port number & range you wish to configure. IP Address: Enter the IP address of a specific inter nal ser[...]
-
Page 83
In addition to specifying the port number used, you also need to specify the protocol used. The protocol is determined by the particular app lication. Most applicat ions use TCP or UDP , however you can specify other protocols using the drop-down Protocol menu. Setting the protocol to “all” causes all incoming connection attempts using all prot[...]
-
Page 84
4.3.7 Advanced Configuration options within the Advanced section are for users who wish to take advantage of the more advanced features of the router . Users who do not understand the features should not attempt to reconfigure t heir router , unless advised to do so by support staf f. There are four items within the Advanced section: St atic Route,[...]
-
Page 85
of the router , which is assigned to you by your ISP . Y ou first need to register and est ablish an a ccount with the Dynamic DNS provider using their website, for example http://www .dyndns.org/ There are more than 5 DDNS services supported. Disable: Check to disable the Dynamic DNS function. Enable: Check to enable the Dynamic DNS function. The [...]
-
Page 86
4.3.7.4 Device Management The Device Management advanced configur ation setti ngs allow you to control your router ’ s security options and device monitoring features. Embedded Web Server: HTTP Port: The port number of the router ’ s embedded web se rver (for web-based configuration uses. The default value is t he standard HTTP port, 80. Y ou m[...]
-
Page 87
alternative if, for example, you are runni ng a web server on a PC within your LAN. For Example: User A changes HTTP port number to 100 , spec ifies their own IP address of 192.168.1.55 , and sets the logout time to be 100 seconds. The router only allows User A access from the IP address 192.168.1.55 to logon to the Web GUI by typing: http:// 192.1[...]
-
Page 88
from this IP address are sent SNMP T raps. SNMP V3: S pecify a name and password for authentication, and define access right s from the identified IP address. Once authentication has succeeded, us ers from this IP address are able to view and modify data. SNMP Version: SNMPv2c and SNMPv3 SNMPv2c is the combination of the enhanced protocol features [...]
-
Page 89
dot1dS tp group (if configured as spanning tree) From RFC 1471 (PPP/LCP MIB): pppLink group pppLqr group From RFC 1472 (PPP/Security MIB): PPP Security Group) From RFC 1473 (PPP/IP MIB): PPP IP Group From RFC 1474 (PPP/Bridge MIB): PPP Bridge Group From RFC1573 (IfMIB): ifMIBObjects Group From RFC[...]
-
Page 90
Universal Plug and Play (UPnP): UPnP offers peer-to-peer network connectivity for PCs and other network devices, along with control and data transfer between devices. UPnP offers many advant ages for users running NA T routers through UPnP NA T T rav ersal, and on supported systems makes tasks such as port forwarding much easier by letting the appl[...]
-
Page 91
Step 4: Click OK to go back to the Add/Remove Programs Properties window . Click Next. Step 5: Restart the computer when prompted. Follow the steps below to inst all the UPnP in Windows XP . Step 1: Click S tart and Control Panel. Step 2: Double-click Network Connections. Step 3: In the Network Connections window , click Advanced in the main menu a[...]
-
Page 92
Step 5: In the Networking Services window , select the Universal Plug and Play check box. Step 6: Click OK to go back to the Windows Op tional Networking Component Wizard window and click Next. Auto-discover Y our UPnP-enabled Network Device Step 1: Click start and Control Panel. Double-cli ck Network Connections. An icon displays under Internet Ga[...]
-
Page 93
Step 3: In the Internet Connection Properties window , click Settings to see the port mappings that were automatically created. Step 4: You may edit or delete the port mappings or click Add to manually add port mappings. Step 5: Select Show icon in notification area when connected option and click OK. An icon displays in the system tray 91[...]
-
Page 94
Step 6: Double-click on the icon to display your current Internet connection status. Web Configurator Easy Access With UPnP , you can access web-based configur ation for the BiP AC 7300(G) without first finding out the IP address of the r outer . This helps if you do not know the router ’s IP address. Follow the steps below to access web configur[...]
-
Page 95
4.3.7.5 IGMP IGMP , known as Internet Group Management Protocol , is used to management hosts from multicast group. IGMP Proxy: Accepting multicast p acket. Default is set to Disable. IGMP Snooping: Allowing switched Ethernet to check and make correct forwarding decisions. Default is set to Enable 4.3.7.6 WAN IP Change Alert Send a log via Email Wh[...]
-
Page 96
4.4 Save Configuration to Flash After changing the router ’s conf iguration settings, you must sa ve all of the configuration parameters to FLASH to avoid losing them after turning of f or resetting your router . Click Save to write your new configuration to FLASH. 94[...]
-
Page 97
4.5 Rest art Click Rest art with option Current Settings to reboot your router (and restore your last saved configuration). If you wish to restart the rout er using the factory default se ttings (for example, af ter a firmware upgrade or if you have saved an incorrect configuration), select Factory Default Settings to reset to factory default setti[...]
-
Page 98
Chapter 5 Troubleshooting If your ADSL Router is not functioning properly , y ou can refer first to this chapter for simple troubleshooting before contacting your service pr ovider or Billion support. This can save you time and effort but if symptoms persist, consult your service provider . Problems starting up the router Problem Corrective Action [...]
-
Page 99
Frequent loss of ADSL linesy nc (disconnections). Ensure that all other devices connected to the same telephone line as your router (e.g. telephones, fax machines, analogue modems) have a line f ilter connected between them and the wall socket (unless you are using a Central S plitter or Central Filter installed by a qualified and licensed electric[...]
-
Page 100
Appendix Support and Contact Information If you cannot resolve the problem after reading the T roubleshooting chapter , please contact the dealer where you purchased this product. Cont act Billion AUSTRALIA http://www .billion.com.au ©2006 Billion Electric Co., Ltd. PC Range P/L. All Rights Reserved. WORLDWIDE http://www .billion.com 98[...]