Page 196 / 270 Scroll up to view Page 191 - 195
Unified Services Router
User Manual
194
Verify that the network (subnet) address of your PC is different from the
network address of the remote device.
Verify that the cable or DSL modem is connected and functioning.
Ask your ISP if it assigned a hostname to your PC.
If yes, select
Network Configuration > WAN Settings > Ethernet ISP
Settings
and enter that hostname as the ISP account name.
As k your ISP if it rejects the Ethernet MAC addresses of all but one of
your PCs.
Many broadband ISPs restrict access by allowing traffic from the MAC address of
only your broadband modem; but some ISPs additionally restrict access to the MAC
address of just a single PC connected to that modem. If this is the case, configure
your firewall to clone or spoof the MAC address from the authorized PC.
11.4 Restoring factory-default configuration
settings
To restore factory-default configuration settings, do either of th e following:
1.
Do you know the account password and IP address?
If yes, select
Administration > Settings Backup & Upgrade
and
click default.
If no, do the following:
On the rear panel of the router, press and hold the Reset button about 10 seconds,
until the test LED lights and then blinks.
Release the button and wait for the router to reboot.
2.
If the router does not restart automatically; manually restart it to make the default settings
effective.
3.
After a restore to factory defaults
whether initiated from the configuration interface or
the Reset button
the following settings apply:
LAN IP address: 192.168.10.1
Username: admin
Password: admin
DHCP server on LAN: enabled
WAN port configuration: Get configuration via DHCP
Page 197 / 270
Chapter
12.
Credits
Microsoft, Windows are registered trademarks of Microsoft Corp.
Linux is a registered trademark of Linus Torvalds.
UNIX is a registered trademark of The Open Group.
Page 198 / 270
Unified Services Router
User Manual
196
Appendix A.
Glossary
ARP
Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC addresses.
CHAP
Challenge-Handshake Authentication Protocol. Protocol for authenticating users to an ISP.
DDNS
Dynamic DNS. System for updating domain names in real time. Allow s a domain name to be
assigned to a device w ith a dynamic IP address.
DHCP
Dynamic Host Configuration Protocol. Protocol for allocating IP addresses dynamically so that
addresses can be reused w hen hosts no longer need them.
DNS
Domain Name System. Mechanism for translating H.323 IDs, URLs, or e-mail IDs into IP
addresses. Also used to assist in locating remote gatekeepers and to map IP addresses to
hostnames of administrative domains.
FQDN
Fully qualified domain name. Complete domain name, including the host portion. Example:
serverA.companyA.com.
FTP
File Transfer Protocol. Protocol for transferring files between network nodes.
HTTP
Hypertext Transfer Protocol. Protocol used by w eb browsers and web servers to transfer files.
IKE
Internet Key Exchange. Mode for securely exchanging encryption keys in ISAKMP as part of
building a VPN tunnel.
IPsec
IP security. Suite of protocols for securing VPN tunnels by authenticating or encrypting IP
packets in a data stream. IPsec operates in either transport mode (encrypts payload but not
packet headers) or tunnel mode (encrypts both payload and packet headers).
ISAKMP
Internet Key Exchange Security Protocol. Protocol for establishing security associations and
cryptographic keys on the Internet.
ISP
Internet service provider.
MAC Address
Media-access-control address. Unique physical-address identifier attached to a netw ork
adapter.
MTU
Maximum transmission unit. Size, in bytes, of the largest packet that can be passed on. The
MTU for Ethernet is a 1500-byte packet.
NAT
Netw ork Address Translation. Process of rewriting IP addresses as a packet passes through a
router or firew all. NAT enables multiple hosts on a LAN to access the Internet using the single
public IP address of the LAN’s gatew ay router.
NetBIOS
Microsoft Window s protocol for file sharing, printer sharing, messaging, authentication, and
name resolution.
NTP
Netw ork Time Protocol. Protocol for synchronizing a router to a single clock on the netw ork,
know n as the clock master.
PAP
Passw ord Authentication Protocol. Protocol for authenticating users to a remote access server
or ISP.
Page 199 / 270
Unified Services Router
User Manual
197
PPPoE
Point-to-Point Protocol over Ethernet. Protocol for connecting a netw ork of hosts to an ISP
w ithout the ISP having to manage the allocation of IP addresses.
PPTP
Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data
from remote clients to private servers over the Internet.
RADIUS
Remote Authentication Dial-In User Service. Protocol for remote user authentication and
accounting. Provides centralized management of usernames and passw ords.
RSA
Rivest-Shamir-Adleman. Public key encryption algorithm.
TCP
Transmission Control Protocol. Protocol for transmitting data over the Internet w ith guaranteed
reliability and in-order delivery.
UDP
User Data Protocol. Protocol for transmitting data over the Internet quickly but w ith no
guarantee of reliability or in-order delivery.
VPN
Virtual private netw ork. Netw ork that enables IP traffic to travel securely over a public TCP/IP
netw ork by encrypting all traffic from one netw ork to another. Uses tunneling to encrypt all
information at the IP level.
WINS
Window s Internet Name Service. Service for name resolution. Allow s clients on different IP
subnets to dynamically resolve addresses, register themselves, and browse the network without
sending broadcasts.
XAUTH
IKE Extended Authentication. Method, based on the IKE protocol, for authenticating not just
devices (which IKE authenticates) but also users. User authentication is performed after device
authentication and before IPsec negotiation.
Page 200 / 270

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top