Contents:

Introduction

Hardware Installation

Overview of the Web-based Management

Using the Connection Wizard

Security

Web Filtering

Advanced >

System Monitoring

Troubleshooting

Regulatory Information

Frequently Asked Questions

USRobotics Corporation Limited Warranty

Glossary

USR8200 Firewall/VPN/NAS User Guide

Advanced

This section of the Management Console is intended primarily for more advanced users. Some changes to settings within this section could adversely affect the operation of the USR8200 Firewall/VPN/NAS and the home network and should be made with caution.

 

DNS (Domain Name System) Server

DNS provides a service that translates domain names into IP addresses and vice versa. The gateway's DNS server is an auto-learning DNS, which means that when a new computer is connected to the network, the DNS server learns its name and automatically adds it to the DNS table. Other network users may immediately communicate with this computer using either its name or its IP address. In addition, your gateway's DNS:

  • Shares a common database of domain names and IP addresses with the DHCP server.
  • Supports multiple subnets within the LAN simultaneously.
  • Automatically appends a domain name to unqualified names.
  • Allows new domain names to be added to the database.
  • Permits a computer to have multiple host names.
  • Permits a host name to have multiple IPs (needed if a host has multiple network cards).
  • The DNS server does not require configuration. However, you may want to view the list of computers known by the DNS, edit the host name or IP address of a computer on the list, or manually add a new computer to the list.

View or Modify the DNS Table

To view the list of computers stored in the DNS table, click the DNS Server icon in the Advanced screen of the Management Console. The DNS table will be displayed.

To add a new entry to the list:

  1. Click New DNS Entry. The DNS Entry screen will appear.
  2. Enter the computer's host name and IP address.
  3. Click OK to save your changes.

To edit the host name or IP address of an entry:

  1. Click the Edit button which appears in the Action column. The DNS Entry screen will appear. If the host was manually added to the DNS Table, then you may modify its host name and/or IP address, otherwise you may only modify its host name.
  2. Click OK to save your changes.

To remove a host from the DNS table, click the Remove button which appears in the Action column. The entry will be removed from the table.

 

Dynamic DNS

The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname, allowing your computer to be more easily accessible from various locations on the Internet. Typically, when you connect to the Internet, your service provider assigns an unused IP address from a pool of IP addresses, and this address is used only for the duration of a specific connection. Dynamically assigning addresses extends the usable pool of available IP addresses, while maintaining a constant domain name. Each time the IP address provided by your ISP changes, the DNS database will change accordingly to reflect the change in IP address. In this way, even though a domain name's IP address will change often, your domain name will still be accessible.

To be able to use the Dynamic DNS feature you must open a DDNS account, free of charge, at http://www.DynDNS.org/account/create.html When applying for an account, you will need to specify a user name and password. Have them readily available when customising your DDNS support. For more information regarding Dynamic DNS, refer to http://www.DynDNS.org

Using Dynamic DNS

  1. Click the Dynamic DNS icon in the Advanced screen of the Management Console. The Dynamic DNS table will appear.
  2. Specify the Dynamic DNS operating parameters.
  • User Name - Enter your DynDNS user name.
  • Password - Enter your DynDNS password.
  • Host Name - Enter a subdomain name and select a suffix from the domain combo box to define your host name.
  • Mail Exchanger - Enter your mail exchange server address to redirect all e-mail messages arriving at your DynDNS address to your mail server.
  1. Select the Dynamic Update checkbox to enable the Dynamic DNS service.

 

IP Address Distribution

Your gateway's DHCP server makes it possible to easily add computers that are configured as DHCP clients to the home network. It provides a mechanism for allocating IP addresses to these hosts and for delivering network configuration parameters to them.

A client (host) sends out a broadcast message on the LAN requesting an IP address for itself. The DHCP server then checks its list of available addresses and leases a local IP address to the host for a specific period of time and simultaneously designates this IP address as "taken." The lease also contains other information about network services such as the gateway's netmask, route, and DNS server addresses. At this point the host is configured with an IP address for the duration of the lease.

The host can choose to renew an expiring lease or let it expire. If it chooses to renew a lease, then it will also receive current information about network services, as it did with the original lease, allowing it to update its network configurations to reflect any changes that may have occurred since it first connected to the network. If the host wants to terminate a lease before its expiration, it can send a release message to the DHCP server, which will then make the IP address available for use by others.

Your gateway's DHCP server:

  • Displays a list of all DHCP hosts devices connected to the USR8200 Firewall/VPN/NAS
  • Defines the range of IP addresses that can be allocated in the LAN
  • Defines the length of time for which dynamic IP addresses are allocated
  • Provides the above configurations for each LAN device and can be enabled/disabled for each LAN device separately
  • Can assign a static IP address (static lease) to a LAN computer so that it receives the same IP address each time it connects to the network, even if this IP address is within the range of addresses that the DHCP server may assign to other computers
  • Provides the DNS server with the host name and IP address of each computer that is connected to the LAN

DHCP Server Summary

To view a summary of the services currently being provided by the DHCP server, click the DHCP icon in the Advanced screen of the Management Console. The DHCP Server Summary screen will appear. Select Clear the Name check box to enable/disable the DHCP server for a device.

Note: If a device is listed as "Disabled" in the Status Column, then DHCP services are not being provided to hosts connected to the network through that device. This means that the gateway will not assign IP Addresses to these computers, which is useful if you want to work with Static IP Addresses only.

Editing DHCP Server Settings

To edit the DHCP server settings for a device:

  1. Click the Edit button in the Action column. The DHCP Settings for this device will appear.
  2. Choose whether to enable or disable the DHCP server for this device. This can also be done on the DHCP Server Summary screen.
  3. Complete the following fields and then click OK.
  • IP Address Range (Start and End): determines the number of hosts that may be connected to the network in this subnet. "Start" specifies the first IP address that may be assigned in this subnet and "End" specifies the last IP address in the range.
  • Subnet Mask: A mask used to determine what subnet an IP address belongs to. An example of a subnet mask value is 255.255.0.0.
  • Lease Time: Each device will be assigned an IP address by the DHCP server for a limited time ("Lease Time") when it connects to the network. When the lease expires, the server will determine if the computer has disconnected from the network. If it has, then the server may reassign this IP address to a newly-connected computer. This feature ensures that IP addresses that are not in use will become available for other computers on the network.
  • Provide host name if not specified by client: If the DHCP client does not have a host name, the gateway will assign the client a default name.

DHCP Connections

To view a list of computers currently recognized by the DHCP server, click the Connection List button that appears at the bottom of the DHCP Server Summary screen. The DHCP Connections screen will be displayed.

To edit the properties for a static connection:

Click the Edit button that appears in the Action column. The DHCP Connection Settings screen will appear.

To define a new connection with a fixed IP address:

  1. Click the New Static Connection button that appears on top of the DHCP Connections screen. The DHCP Connection Settings screen will appear.
  2. Enter a host name for this connection.
  3. Enter the fixed IP address that you would like to have assigned to the computer.
  4. Enter the MAC address of the computer's network card.
  5. Click OK to save your changes. To remove a host from the table, click the Delete button that appears in the Action column.

Note: A device's fixed IP Address is actually assigned to the specific network's card (NIC) MAC Address installed on the LAN computer. If you replace this network card, then you must update the device's entry in the DHCP Connections list with the new network card's MAC Address.

 

Network Objects

Network Objects is a method of abstractly defining a set of LAN hosts. Defining such a group can assist when configuring system rules. For example, network objects can be used when configuring the security filtering settings such as IP address filtering, host name filtering, or MAC address filtering.

You can use network objects in order to apply security rules based on host names instead of IP addresses. This may be useful, since IP addresses change from time to time. Moreover, it is possible to dene network objects according to MAC addresses, making rule application even more low-level.

To define a network object:

1. Click the Network Objects icon and the Network Objects screen will appear.

2. Click New Entry and the Network Objects screen will appear.

3. Specify a name for the network object in the Description field.

4. Click New Entry and the Item screen will appear.

5. Select the type of network object type from the Network Object Type pull-down menu:

  • IP Address
  • MAC Address
  • Host Name

6. Enter the appropriate description for the network object type and then click OK.

7. Click OK in the Network Object screen and then click Close.

 

Routing

Managing Routing Table Rules

You can access the routing table rules by clicking the Routing icon from the Advanced screen. The Routing screen will appear.

You can add, edit, and delete routing rules from the Routing Table. When adding a routing rule, you need to specify:

  • Device: Select the network device.
  • Destination: The destination is the destination host, subnet address, network address, or default route. The destination for a default route is 0.0.0.0.
  • Netmask: The network mask is used in conjunction with the destination to determine when a route is used.
  • Gateway: Enter the gateway's IP address.
  • Metric: A measurement of the preference of a route. Typically, the lowest metric is the most preferred route. If multiple routes exist to a given destination network, the route with the lowest metric is used.

Multicasting

The USR8200 Firewall/VPN/NAS provides support for IGMP multicasting, which allows hosts connected to a network to be updated whenever an important change occurs in the network. A multicast is simply a message that is sent simultaneously to a predefined group of recipients. When you join a multicast group, you will receive all messages addressed to the group, much like what happens when an e-mail message is sent to a mailing list.

IGMP multicasting enables UPnP capabilities over wireless networks and may also be useful when connected to the Internet through a router. When an application running on a computer in the home network sends out a request to join a multicast group, the USR8200 Firewall/VPN/NAS intercepts and processes the request. If the USR8200 Firewall/VPN/NAS is set to Minimum Security, no further action is required. However, if the USR8200 Firewall/VPN/NAS is set to Typical Security or Maximum Security, you must add the group's IP address to the USR8200 Firewall/VPN/NAS's Multicast Groups screen. This will allow incoming messages addressed to the group to pass through the Firewall and on to the correct LAN computer.

  1. Click the Routing icon in the Advanced screen.
  2. Select the Multicast Groups Management check box.
  3. Click OK.

 

Users

User Settings

This is the section you will use to add new users for utilizing the PPTP, File Server, and FTP Server functions.

To create an account, click New User.

  • Full Name: The user's full name.
  • User Name: The name the user will use to access your home network.
  • New Password: Type a new password for the user. If you do not want to change the user's password, leave this field empty.
  • Retype New Password: If a new password was assigned, type it again to verify it.
  • Permissions: Select the user's privileges on your home network.
    • Administrative Privileges: This gives users Administrative access to change setting via the Web-based management and Telnet.
    • Remote Access by PPTP: This gives users the ability to remotely connect to your internal network.
    • Read Files from the File Server: This gives users the ability to read files from either FTP or the File Servers.
    • Write Files to the File Server: This gives users the ability to write files from either FTP or the File Servers.
  • E-Mail Address: Type in the e-mail address of the user.
  • Choose the System Notify Level: None, Error, Warning, or Information
  • Choose the Security Notify Level: None, Error, Warning, or Information

The Notification levels are used to e-mail users the System and Security Log files. The type of information you will receive depends on the Level you choose for either.

Finally click OK to save the New User to the USR8200 Firewall/VPN/NAS. Note: User Names and Passwords are case sensitive

Note: Windows 95/98 users for File Server and FTP Server access, the username and password needs to be in all lowercase, not UPPERCASE.

 

Certificates

When working with public-key cryptography, you should be careful and make sure that you are using the correct person's public key. Man-in-the-middle attacks pose a potential threat, where an ill-intending third-party posts a phony key with the name and user ID of an intended recipient. Data transfer that is intercepted by the owner of the counterfeit key can fall into the wrong hands.

Digital certificates provide a means for establishing whether a public key truly belongs to the supposed owner. It is a digital form of credential. It has information on it that identifies you and an authorised statement to the effect that someone else has confirmed your identity.

Digital certificates are used to foil attempts by an ill-intending party to use an unauthorised public key. A digital certificate consists of the following:

  • A public key: Certificate information. The "identity" of the user, such as name, user ID, etc.
  • Digital signatures: A statement that tells that the information enclosed in the certificate has been vouched for by a Certificate Authority (CA). Binding this information together, a certificate is a public key with identification forms attached, coupled with a stamp of approval by a trusted party.

X.509 Certificate

The USR8200 Firewall/VPN/NAS supports X.509 certificates that comply with the ITU-T X.509 international standard. An X.509 certificate is a collection of a standard set of fields containing information about a user or device and their corresponding public 8.10 key. The X.509 standard defines what information goes into the certificate and describes how to encode it (the data format). All X.509 certificates have the following data:

The certificate holder's public key - the public key of the certificate holder, together with an algorithm identifier that specifies which cryptosystem the key belongs to and any associated key parameters.

The serial number of the certificate - the entity (application or person) that created the certificate is responsible for assigning it a unique serial number to distinguish it from other certificates it issues. This information is used in numerous ways; for example when a certificate is revoked, its serial number is placed on a Certificate Revocation List (CRL).

The certificate holder's unique identifier (or DN-distinguished name) - this name is intended to be unique across the Internet. A DN consists of multiple subsections and may look something like this: CN=John Smith, EMAIL=johndoe@usr.com, OU=R&D, O=USRobotics, C=US (These refer to the subject's Common Name, Organizational Unit, Organization, and Country.)

The certificate's validity period the certificate's start date/time and expiration date/time - indicates when the certificate will expire.

The unique name of the certificate issuer - the unique name of the entity that signed the certificate. This is normally a CA. Using the certificate implies trusting the entity that signed this certificate.

Note: In some cases, such as root or top-level CA certificates, the issuer signs its own certificate.

The digital signature of the issuer - the signature using the private key of the entity that issued the certificate.

The signature algorithm identifier - identifies the algorithm used by the CA to sign the certificate.

Obtaining an X509 Certificate

To obtain an X509 certificate, you must ask a CA to issue you one. You provide your public key, proof that you possess the corresponding private key, and some specific information about yourself. You then digitally sign the information and send the whole package - the certificate request - to the CA. The CA then performs some due diligence in verifying that the information you provided is correct and, if so, generates the certificate and returns it.

You might think of an X509 certificate as looking like a standard paper certificate with a public key taped to it. It has your name and some information about you on it, plus the signature of the person who issued it to you.

  1. Click the Certificates icon in the Advanced screen of the Management Console. The Certificates screen will appear.
  2. Click the USR8200 Firewall/VPN/NAS's Local Certificates button.
  3. Click the Create Certificate Request button. The Create X509 Request screen will appear.
  4. Enter the following certification request parameters and click the Generate button. A screen will appear stating that the certification request is being generated.
  • Certificate Name
  • Subject
  • Organization
  • State
  • Country

  1. After a short while, the screen will refresh and display your certification request.
  2. Store the exact contents of this request to a file, and send it to a CA for signing.
  3. Click Close. The main certificate management screen will appear, listing your certificate as "Not-signed."

  1. After receiving a reply from the CA in the form of a signed request, click Load Certificate. The Load Local Certificate screen will appear.






  2. Paste the signed request into the available space.

  1. Click the Load button to register the signed certificate. If the registration is successful, the certificate management screen will appear, displaying the certificate name and issuer.

 

 

Registering a CA's Certificate

  1. Click the Certificates icon in the Advanced screen of the Management Console. The Certificates screen will appear.
  2. Click the CA's Certificates button.
  3. Click the Load Certificate button. The Load CA's Certificate screen will appear.
  4. Paste the CA's certificate.
  5. Click the Load button.

 

Date & Time

Click the Date and Time icon in the Advanced screen of the Web-based Management to set the local date and time information for the USR8200 Firewall/VPN/NAS.

Localization:

Select the local time zone from the pull-down menu.

 

Daylight Saving Time:

Depending on which time zone you choose, you may or may not see the Daylight Saving Time option. The USR8200 Firewall/VPN/NAS can automatically adjust the local time that it stores internally when Daylight Savings Time (DST) begins and ends.

To do this select Enabled and then in the following fields enter the dates on which Daylight Savings Time begins and ends at your location.

Below is a chart for the years 2003 - 2005.

United States
Year
DST Begins at A.M.
DST Ends at A.M.
2003
April 6
October 26
2004
April 4
October 31
2005
April 3
October 30

 

European
Year
DST Begins at A.M.
DST Ends at A.M.
2003
March 30
October 26
2004
March 28
October 31
2005
March 27
October 30


For a very informative description of what Daylight Saving Time is and its history, along with a calculator, you can visit http://webexhibits.org/daylightsaving/index.html

 

For more information about this or any other feature, refer to the USR8200 Firewall/VPN/NAS Web Support page.

 

Automatic Time Update:

The USR8200 Firewall/VPN/NAS can keep the time always in sync with Universal time standards by connecting to Time servers throughout the world.

To do this select Enabled and then in the following fields enter the server address, the protocol used by the server, and how often you want the time to be updated.


Below are a few worldwide NTP Servers.

United States:
US IL ntp0.mcs.anl.gov (140.221.8.88)
US NY nist1-ny.glassey.com (208.184.49.9)
US CA clepsydra.dec.com (204.123.2.5

Europe:
FR canon.inria.fr (192.93.2.20)
DE ntp0.fau.de (131.188.3.220)

You can find a complete listing of public servers from the following Web site: http://www.eecis.udel.edu/~mills/ntp/servers.html

 

If you click Clock Set, you will be able to assign the settings for the Local Date and Local Time.

After you have set the date and time, click OK.

 

 

Scheduler Rules

Scheduler rules are used for limiting the application of Firewall rules to specific time periods, specified in days and hours.

To define a Rule:

1. Click the Scheduler Rules icon and the Scheduler Rules screen will appear.

2. Click New Scheduler Entry and the Scheduler Rule Edit screen will appear.

3. Specify a name for the rule in the Name field.

4. Specify if the rule will be active or inactive during the designated time period by selecting the appropriate Rule Activity Settings checkbox.

5. Click New Time Segment Entry to define the time segment that the rule will apply to. The Time Segment Edit screen will appear.

  • Select active and/or inactive days of the week.
  • Click New Time Segment Entry to define an active/inactive hourly range and then click OK.



  • Click OK.

6. Click OK and then click OK again to return to the Advanced screen.

 

 

Firmware Upgrade

There are two ways to upgrade the system software:

  • Upgrading from the Internet: automatically retrieve an updated system software file.
  • Upgrading from a local computer: use an update system software file located on a local disk drive. The following are instructions for each of these methods.

Upgrading From the Internet

To learn if an upgrade is available, click the Firmware Upgrade button from the Advanced screen. Then click Check Now. You may need to click Refresh after a few seconds. You will be informed whether an upgrade is available. If so, click Force Upgrade if you wish to upgrade to the latest code for the USR8200 Firewall/VPN/NAS.

 

If an upgrade is available:

  • To upgrade, click the Yes button.
  • To wait and upgrade later, do one of the following:

A) Click the No button. The system will continue to perform its daily checks for the availability of a software update as scheduled and will notify you the next time you log into the Management Console.

Note: The Gateway must be connected to the Internet in order to communicate with the Remote Update server. Those systems that store the time internally will attempt to connect and check for an update weekly. The default upgrade path is http://www.usr.com/support/8200/8200-files/usr8200.rmt

B) Move to another screen by clicking an icon in the left sidebar. Return to the Upgrade screen at a later time by clicking the Firmware Upgrade icon in the Advanced screen.

Upgrading From a Local Computer

To upgrade the USR8200 Firewall/VPN/NAS using a file that you have previously downloaded from the Internet or received on CD-ROM:

  1. When you receive notification that a new software version is available, retrieve the file as instructed and store it on a computer in the home network.
  2. Open the Management Console from this same computer and click the Firmware Upgrade icon in the Advanced screen In the Firmware Upgrade screen, click Upgrade Now.
  3. Click Browse. A dialog box will appear. Choose the file to upload to the USR8200 Firewall/VPN/NAS and click Open.
  4. Click OK at the bottom of the Upgrade screen. The file will be uploaded to the USR8200 Firewall/VPN/NAS.



  1. After the file has been transferred to the USR8200 Firewall/VPN/NAS, its validity will be verified and you will be asked to confirm that you want to upgrade the USR8200 Firewall/VPN/NAS with this new file.
  2. Click Yes to confirm. The upgrade process will begin and should take no longer than one minute to complete.
  3. At the conclusion of the upgrade process, the USR8200 Firewall/VPN/NAS will automatically reboot. The new software version of will be running, and your custom configurations and settings will be maintained.

 

 

Point-to-Point Tunneling Protocol (PPTP)

To access the PPTP settings, click the PPTP icon from the Advanced screen. The Advanced PPTP Settings screen will appear. This screen enables you to configure:

  • The remote users that will be granted access to your home network.
  • The IP address range an authorised remote user can use when accessing your home network.
  • Advanced PPTP client/server connection settings.

 

 

Managing Remote Users

Click Users to define and manage remote users. You can add, edit, and delete users. When adding a user, you need to specify the following parameters:

  • Full Name: The remote user's full name.
  • User Name: The name a remote user will use to access your home network.
  • New Password: Type a new password for the remote user. If you do not want to change the remote user's password, leave this field empty.
  • Retype New Password: If a new password was assigned, type it again to verify it.
  • Permissions: Select the remote user's privileges on your home network.
    • Administrative Privileges: This gives users Administrative access to change setting via the Web-based management and Telnet.
    • Remote Access by PPTP: This gives users the ability to remotely connect to your internal network.
    • Read Files from the File Server: This gives users the ability to read files from either FTP or the File Servers.
    • Write Files to the File Server: This gives users the ability to write files from either FTP or the File Servers.
  • E-Mail Address: The remote user's e-mail address.
  • Choose the System Notify Level: None, Error, Warning, or Information
  • Choose the Security Notify Level: None, Error, Warning, or Information

The Notification levels are used to e-mail users the System and Security Log files. The type of information you will receive depends on the Level you choose for either.

Note: Changing any of the user parameters will prompt the connection associated with the user to terminate. For changes to take effect, you should activate the connection manually after modifying user parameters.

 

Advanced PPTP Server Settings

To configure advanced PPTP server settings, click the Advanced button on the PPTP screen. The Advanced PPTP Settings screen will appear. This screen enables you to configure the following:

  • Enabled: Enable or disable the PPTP server.
  • Maximum Idle Time to Disconnect: Specify the amount of idle time (during which no data is sent or received) that should elapse before the gateway disconnects a PPTP connection.
  • Authentication Required: Enable or disable the authentication option.
  • Allowed Authentication Algorithms: Select the algorithms the server may use when authenticating its clients.
  • Encryption Required: Enable or disable the encryption option.
  • Allowed Encryption Algorithms: Select the algorithms the server may use when encrypting data.
  • MPPE Encryption Mode: You can select either Stateless or Stateful for the MPPE Encryption Mode.
  • Remote Address Range: Specify the range of IP addresses remote users can use to access your home network. Note that the client settings must be in tune with the server settings.

 

Creating a New Connection

To create a new PPTP connection, click New Connection at the bottom of the main PPTP screen. The new connection properties screen will be displayed. Enter the following information:

  • Host Name or Destination IP Address
  • Login User Name
  • Login Password

When you have entered this information, click Next.

On the next screen, verify the information you entered and click Finish if it is correct. If it is not correct, click Back and re-renter the information.

 

Advanced PPTP Client Settings

 

The PPTP connections are displayed in the Advanced PPTP Settings screen. To configure advanced PPTP client and server settings, perform the following steps:

  1. Click the connection's Edit button. The Connection Summary screen will appear.



  1. Click the Settings button. The Advanced PPTP Client Settings screen will appear, enabling you to configure the following advanced PPTP client settings.
  • Host Name: The host name of your PPTP server.
  • Login User Name: Your user name.
  • Login Password: Your password.
  • Idle Time Before Hanging Up: The period of idle time (during which no data is sent or received) that should elapse before the gateway disconnects the PPTP client connection.
  • PPP Authentication: Select the authentication algorithms your gateway may use when negotiating with a PPTP server. Select all the check boxes if no information is available about the server's authentication methods.
  • PPP Encryption: Select the encryption algorithms your gateway may use when negotiating with a PPTP server. Select all the check boxes if no information is available about the server's encryption methods.
  • Routing: Define the connection's routing rules.
  • DNS Server: Select whether the PPTP client should obtain a DNS server address automatically. If not, configure the DNS server's IP address.
  • Internet Connection Firewall: Select this check box to include the PPTP client connection as a network interface monitored by the gateway's Firewall.

 

 

 

Internet Protocol Security (IPSec)

To access the Advanced IPSec Settings, click the IPSec icon in the Advanced screen. The IPSec Connections screen will appear. This screen displays your IPSec connections and enables you to configure the following:

  • General IPSec settings
    - Key management
    - Log settings
  • Advanced IPSec connection settings

General IPSec Settings

Key Management

  1. Click Settings. The Key Management screen will appear.
  2. The Key Management screen displays the public key of the USR8200 Firewall/VPN/NAS. If necessary, you can copy the public key from this screen.
  3. Click Recreate Key to recreate the public key or click Refresh to refresh the key displayed in this screen.

Log Settings

The IPSec Log can be used to identify and analyze the history of the IPSec package commands, attempts to create connections, etc. IPSec activity, as well as that of other USR8200 Firewall/VPN/NAS modules, is displayed together in this view.

  1. Click the IPSec icon in the Advanced screen.
  2. Click Log Settings. The IPSec Log Settings screen will appear.
  3. Select the checkboxes relevant to the information you would like the IPSec log to record.

 

Advanced IPSec Connection Settings

The IPSec connections are displayed in the IPSec Connections screen. To configure advanced IPSec settings, perform the following steps:

  1. Click Edit for the connection. The Connection Summary screen will appear.
  2. Click Settings. The Advanced IPSec Settings screen will appear, allowing you to configure the following advanced IPSec settings:

    MTU Mode: Maximum Transmission Unit (MTU) is the largest physical packet size, measured in bytes that will be transmitted through the IPSec connection. Packets larger than the MTU are divided into smaller packets before being sent. You can set the MTU size manually, or select an automatic MTU mode.

    Host Name or IP Address of Remote Tunnel Endpoint: The IP address of your IPSec peer.

    Transport Type: Transport type can be Tunneling or Transport. Transport needs no explicit configuration. Transport type requires that you configure the following parameters:

  • Local Subnet
  • Local Subnet Mask
  • Remote Subnet
  • Remote Subnet Mask

Compress (Support IPCOMP protocol): Select this check box to use the IP Comp protocol.

Key Exchange Method: The key exchange method can be Manual or Automatic.

The following are the parameters that are required to configure an Automatic key exchange:

Negotiation attempts: Select the number of negotiation attempts to be performed in Phase 1 of the automatic key exchange method.

Life Time in Seconds: The length of time before a security association automatically performs a renegotiatation. A short Life Time increases security by forcing the VPN hosts to update the encryption and authentication keys. However, every time the VPN Tunnel renegotiates, users accessing remote resources are disconnected. Therefore, the default Life Time is recommended.

Re-key Margin: Specifies how long before a connection expires that attempts to negotiate a replacement should begin. It is similar to that of the Key Life Time and is given as an integer denoting seconds.

Re-key Fuzz Percent: Specifies the maximum percentage by which Re-key Margin should be randomly increased to randomize re-keying intervals.

Phase 1 Peer Authentication: Select the method by which the USR8200 Firewall/VPN/NAS will authenticate you IPSec peer:

  • Shared secret
  • RSA Signature
  • Certificate

Phase 1 Encryption Algorithm: Select the encryption algorithms that the USR8200 Firewall/VPN/NAS will attempt to use when negotiating with the IPSec peer.

Hash Algorithm: Select the hash algorithms that the USR8200 Firewall/VPN/NAS will attempt to use when negotiating with the IPSec peer.

Use Perfect Forward Secrecy (PFS): Select whether Perfect Forward Secrecy of keys is desired on the connections keying channel (with PFS, penetration of the key-exchange protocol does not compromise keys negotiated earlier).

ESP: Select the encryption and authentication algorithms the USR8200 Firewall/VPN/NAS will use during Phase 2 of the automatic key exchange method. You can choose 3DES-CBC, DES-CBC, or NULL encryption algorithms. Or you can choose MD5 or SHA1 authentication algorithms.

AH: Select the hash algorithms that the USR8200 Firewall/VPN/NAS will use during Phase 2 of the automatic key exchange method. You can choose MD5 or SHA1 authentication header algorithms.

The following are the parameters that are required to configure a Manual key exchange:

Security Parameter Index SPI: A 32-bit value that, together with IP address and security protocol, uniquely identifies a particular security association. This value must be the same for both Local and Remote Tunnel.

IPSec Protocol: Select the encryption and authentication algorithms. All algorithms values should be entered in HEX format.

Routing: Define the connections routing rules.

DNS Server: Select whether the connection should obtain a DNS server address automatically. If not, configure the DNS server's IP address.

Internet Connection Firewall: Select this check box to include the IPSec connection as a network interface monitored by the USR8200 Firewall/VPN/NAS's firewall.

VPNC Scenario Connection Instructions

This section describes how to configure a IPSec gateway-to-gateway connection with a pre-shared secret scenario developed by the VPN Consortium using USR8200 Firewall/VPN/NAS.

Network Configuration

An IPSec tunnel is established between Gateways A and B, serving as a transparent and secure network for clients from subnets A and B. Because the configuration of the Gateways is the same except for their IP addresses, this section describes only the configuration of Gateway A. Configuration of Gateway B is identical, where A and B are replaced by B and A respectively.

LAN Interface Settings

  1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear.
  2. Click LAN Ethernet to access the LAN Ethernet properties screen.
  3. Click Settings and the LAN settings page will appear. Configure the following parameters:
  • Internet Protocol: Select Use the Following IP Address.
  • IP Address: Specify 10.5.6.1
  • Subnet Mask: Specify 255.255.255.0
  • IP Address Distribution: Select DHCP Server.
  • Start IP Address: Specify 10.5.6.1
  • End IP Address: Specify10.5.6.254
  • Subnet Mask: Specify 255.255.255.0
  1. Click OK.

WAN Interface Settings

1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear.

2. Click WAN Ethernet to access the WAN Ethernet properties screen.

3. Click Settings and the WAN settings page will appear. Configure the following parameters:

  • Internet Protocol: Select Use the Following IP Address.
  • IP Address: Specify 14.15.16.17
  • Subnet Mask: Specify the appropriate subnet mask.
  • Default Gateway: Specify the appropriate Default Gateway in order to enable IP routing.

4. Click OK.

Gateway-to-Gateway with Preshared Secrets

The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Gateway A connects the internal LAN 10.5.6.0/24 to the Internet. Gateway AsLAN interface has the address 10.5.6.1, and its WAN (Internet) interface has the address 14.15.16.17.

Gateway B connects the internal LAN 172.23.9.0/24 to the Internet. Gateway BsWAN (Internet) interface has the address 22.23.24.25.

The IKE Phase 1 parameters used are:

  • Main mode
  • 3DES (Triple DES)
  • SHA-1
  • MODP group 2 (1024 bits)
  • Preshared secret of hr5xb84l6aa9r6
  • SA lifetime of 28800 seconds (eight hours) with no Kbytes re-keying

The IKE Phase 2 parameters used are:

  • 3DES (Triple DES)
  • SHA-1
  • ESP tunnel mode
  • MODP group 2 (1024 bits)
  • Perfect forward secrecy for re-keying
  • SA lifetime of 3600 seconds (one hour) with no Kbytes re-keying
  • Selectors for all IP protocols, all ports, between 10.5.6.0/24 and 172.23.9.0/24, using IPv4 subnets

To setup Gateway A for this scenario, use the following steps:

  1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear.
  2. Click New Connection and the Wizard screen will appear. Select Internet Protocol Security (IPSec). Click Next. The IPSec Topology screen will appear.
  3. Select Network-to-Network to create a secure connection between your LAN and a remote network. Click Next. The Remote Address Type screen will appear.
  4. Select Remote Gateway Address to allow an IPSec connection from a specific address. Select Remote Subnet to allow an IPSec connection from a specific remote subnet. Click Next. The Connection Parameters screen will appear.
  5. Specify the following parameters:
  • Remote Tunnel Endpoint Address: Specify 22.23.24.25
  • Remote Subnet IP Address: Specify 172.23.9.0
  • Remote Subnet Mask: Specify 255.255.255.0
  • Shared Secret: Specify hr5xb84l6aa9r6
  1. Click Next. The Connection Summary screen will appear. Click Finish. The Network Connections screen will now list the newly created IPSec connection.
  2. Click Edit. The Connection Properties screen will appear. Click Settings. The IPSec Configuration screen will appear.
  3. Deselect the Compress checkbox.
  4. Deselect the Allow Peers to Use MD5 checkbox (located under Hash Algorithm).
  5. Deselect the DH Group 5 (1536 bit) checkbox (located under Group Description Attribute).
  6. Deselect the Allow AH Protocol (No Encryption) checkbox (located under Encryption Algorithm).
  7. Click OK. The Connection Properties screen will appear.
  8. Click OK. The Network Connections screen will appear. Note that the IPSec connections status has changed to Connected.
  9. Click Home on the sidebar to view the Network Map depiction of the IPSec connection.

 

 

Universal Plug and Play (UPnP)

Select the checkbox to allow other users on the network to control the network features.

 

System Settings

In this area, you can view and modify the System, File Server, Management Console, Remote Administration, Management Application Ports, System Logging, Security Logging, and Outgoing Mail Server information.

System

Hostname:
Used to set the Hostname by which other computers will see the USR8200 Firewall/VPN/NAS in Network Neighborhood, SMB, etc.

Local Domain:
Used to set the Local Domain. This should be the same as the NetBIOS Workgroup under File Server.

File Server

NetBIOS Workgroup:
Used to set the Workgroup in which the USR8200 Firewall/VPN/NAS will reside in the Network. This should be the same as the Local Domain under System.

Management Console

Automatic Refresh of System Monitoring Web Pages
By default this is not enabled.

Note: If this is enabled when viewing System Monitoring, System Logs, and Security Logs, your unit will be open to security risk if you walk away without exiting those screens.

Warn User Before Network Configuration Changes
If this is enabled, you will receive a notification if any changes are made to the configuration of the network. By default, this is enabled.

Session Lifetime:
This is the inactivity time the USR8200 Firewall/VPN/NAS will wait before asking a user to re-log into the Web-based Management and Telnet. The maximum amount of time that can be entered is 1200 seconds.

Remote Administration

Refer to the Remote Administration section in this User Guide for information about this area.

Management Application Ports

You can modify the following fields:

  • Primary HTTP Port
  • Secondary HTTP Port
  • Primary HTTPS Port
  • Secondary HTTPS Port
  • Primary Telnet Port
  • Secondary Telnet Port
  • Secure Telnet over SSL Port

System Logging

You can change the System Log Buffer Size in Kb. It is recommended that you leave the Buffer at the default size. You can also select the Remote System Notify Level from one of the following:

  • None
  • Error
  • Warning
  • Information

Security Logging

You can change the Security Log Buffer Size in Kb. It is recommended that you leave the Buffer at the default size. You can also select the Remote Security Notify Level from one of the following:

  • None
  • Error
  • Warning
  • Information

Outgoing Mail Server

This is for the outgoing mail server that the USR8200 Firewall/VPN/NAS will use to send out notifications for individual users that have Logging turned on for their account. You will need to enter the Server, the From Email Address, and the Port. You can also select or deselect Server Requires Authentication. If you select Server requires Authentication, you will need to enter the User Name and the Password for the Email account.

 

 

Local FTP Server

This section will allow you to enable, set allowed connections, grant anonymous read/write access, and put in the path to the folder for Anonymous users.

General

Enable FTP server:

This will enable the FTP Server. Users are configured in the Users Settings section of the Advanced Menu.

 

Currently, a user added this way will have access to read or write to all hard disks installed onto the USR8200 Firewall/VPN/NAS.

Total FTP Sessions Allowed: This will allow you to choose how many concurrent FTP connections are allowed at a time.

Anonymous User Access

Read Access: This will allow an anonymous user to read files located in the path you provide in the Anonymous Home Directory.

Write Access: This will allow an anonymous user to write/modify files located in the path you provide in the Anonymous Home Directory.

Anonymous Home Directory: This is where you must fill in a path for anonymous users to access a specific folder on a selected Hard Disk partition.

Example Paths: (Drive names are case sensitive) /A/pub, /A/public, or /A/public access

 

MAC Cloning

A MAC address is the numeric code that identifies a device on a network, such as your external cable/DSL modem or a computer network card. Your service provider may ask you to supply the MAC address of your computer, external modem, or both.

When replacing an external modem with the USR8200 Firewall/VPN/NAS, you can simplify the installation process by copying the MAC address of your existing computer to the USR8200 Firewall/VPN/NAS. In such a case, you do not need to delay the setup process by informing your ISP of newly installed equipment.

 

Using MAC Cloning

  1. Click the MAC Cloning icon in the Advanced screen of the Management Console. The MAC Cloning screen will appear.
  2. Enter the physical MAC address to be cloned.
  3. Click the Clone My MAC Address button.

 

Diagnostics

The Diagnostics screen can assist you in testing network connectivity. This feature will enable you to ping (ICMP echo) an IP address and view statistics such as the number of packets transmitted and received, round trip time, and success status.

Diagnosing Network Connectivity

To diagnose network connectivity, perform the following steps:

  1. Click the Diagnostics icon from the Advanced screen in the management console. The Diagnostics screen will appear.
  2. Enter the IP address to be tested in the Destination field.
  3. Click Go.
  4. In a few seconds, diagnostics statistics will be displayed. If no new information is displayed, click Refresh.

 

Remote Administration

In its default state, the USR8200 Firewall/VPN/NAS blocks all external users from connecting to or communicating with your network. Therefore, the system is safe from hackers who may try to intrude on the network and damage it. However, you may want to enable certain services that grant remote users administrative privileges in your network.

Configuring Remote Administration Services

  1. Click the Remote Administration icon in the Advanced screen of the Management Console. The Remote Administration screen will appear.

  2. Select the check boxes next to the service names that you want to enable and then click OK.




 

Filesystems

The USR8200 Firewall/VPN/NAS can operate as a file server for storage devices that are connected via USB or FireWire. Your home network's LAN devices can share the storage device as a mapped network drive. The Web-based Management provides disk management utilities such as fdisk for partitioning the drive as a physical disk or logical disk, as well as format utilities for formatting the partitions.

The USR8200 Firewall/VPN/NAS supports up to 30 hard disks or 100 separate partitions, whichever comes first. The hard disks can be either daisy chained through FireWire hubs, USB 1.1/2.0 hubs, or a combination of both.

Note: Any hard disk connected through a USB 1.1 hub will not be running at full speed. The performance speed will be lowered as you add more hard disks through a USB 1.1 hub.

Note: For storage devices that come with both a USB 1.1/2.0 connection and a FireWire connection, only one port of the storage device can be used at a time.

When a hard disk or storage device is connected to the USR8200 Firewall/VPN/NAS via USB1.1/2.0 or FireWire, it will register on the network map. Viewing the network map as a list will display information about each storage device that is connected.

 

Note: Before disconnecting any hard disk, it is recommended to unmount the hard disks using the web-based management.

Each hard disk can have up to 16 partitions with an Extended partition and can have a maximum of four main partitions. Main partitions include primary and extended partitions. The following are some different partition configurations you can have in your hard disk.

  • You can have up to three primary partitions and one extended partition or up to four primary partitions. If you have four primary partitions for the main partitions, the hard disk is limited to a total of four partitions.

  • If you have three primary partitions and one extended partition, you can add 12 more partitions through the logical partition within the extended partition.

The File Systems that are supported by the USR8200 Firewall/VPN/NAS for formatting a hard disk(s) partitions are Linux (ext2) and Windows (FAT32).

The File Systems that the USR8200 Firewall/VPN/NAS supports in Read/Write form are Linux (ext2), Windows (FAT12), Windows (FAT16), and Windows (FAT32).

If you are not sure if the hard disk you have connected to the USR8200 Firewall/VPN/NAS is pre-formatted, look in the network map. If the hard disk is pre-formatted, below the hard disk name you will see \\usr8200\A, \\usr8200\B, \\usr8200\C, etc.

If the hard disk you are adding to the USR8200 Firewall/VPN/NAS is pre-formatted and you do not wish to create or modify any partitions, proceed to the Setting up User access rights to the storage devices section in this chapter.

If the hard disk is not pre-formatted, or you are unsure, please proceed to the Managing Partitions section in this chapter.

Note: It is recommended to format the hard disk using EXT2 if you will be transferring large files to the hard disk. If you will not be transferring any files over 4 gigabytes, it is recommended to format the hard disk using FAT32.

top of page

 

Managing Partitions

The following buttons are the different Action icons in the File Management screens. These will appear in the Action column for each hard disk and partition associated with the USR8200 Firewall/VPN/NAS. Only the icons for the actions that can be performed on a hard disk or partition will appear. For example, the Delete a partition icon will not appear if there are no partitions on the hard disk.

 

If you wish to perform an action on a hard disk, click the name of the hard disk in the Network Map screen or in the Network List screen.

 

After clicking the name of the hard disk, you will see an icon on the right for each of the actions that you can perform on that particular hard disk.

top of page

 

Adding New Partitions

When first creating a new partition you will be presented with a wizard to help ensure that nothing important is missed while setting up the hard disk(s).

Note: If you are connecting a new hard disk, it is recommended that you reformat the hard disk through the USR8200 Firewall/VPN/NAS.

Click the Add New partition icon in the Action column for the hard disk you want to partition. You will then need to select which type of partition you want to create: Primary or Extended.

Primary Partition:

  1. Select Primary Partition and then click Next.




  2. The Partition size option will automatically fill in with the maximum amount of free space available for the partition. You can change this size to accommodate the needs you have for the hard disk. Click Next when you are finished selecting the Partition size.




  3. Select Format the partition and click Next.




  4. Choose the type of partition file system for the hard disk that will best suit your needs.

    If the storage device will be connected to a Linux station, you want to choose Linux (EXT2) for the Partition File System. If the storage device will be connected to Windows PCs, then you want to choose Windows (FAT32) for the Partition File System.

    After you have selected the Partition File System, click Next.




  5. After selecting all the options for the partition, you will be shown a summary of these options. If there is a mistake or if you want to change a selection, click Back to restart the process or click Cancel to end the process without performing any operations. If everything is correct, click Finish to create the partition.

top of page

 

Extended Partition

  1. Select Extended Partition and then click Next.




  2. The Partition size option will automatically fill in with the maximum amount of free space available for the partition. You can change this size to accommodate the needs you have for the hard disk.

    If you want to use the remainder of the space on the hard disk to create an Extended partition, leave the Partition size amount as it is and click Next.

    If you think you might want to create another Primary partition, adjust the Partition size to the amount needed for your Extended partition and click Next.



  3. After selecting all the options for the partition, you will be shown a summary of these options. If there is a mistake or if you want to change a selection, click Back to restart the process or click Cancel to end the process without performing any operations. If everything is correct, click Finish to create the partition.


top of page

 

Logical Partition:

After creating an Extended Partition you will need to create Logical partitions.

  1. Click the Add New partition icon in the Action column for the Extended partition in which you want to create Logical partitions.




  2. Make sure Logical Drive is selected and click Next.




  3. The Partition size option will automatically fill in with the maximum amount of free space available for the partition. You can change this size to accommodate the needs you have for the hard disk. Click Next when you are finished selecting the Partition size.




  4. Select Format the partition and click Next.




  5. Choose the type of partition file system for the Logical partition that will best suit your needs.

    If the storage device will be connected to a Linux station, you want to choose Linux (EXT2) for the Partition File System. If the storage device will be connected to Windows PCs, then you want to choose Windows (FAT32) for the Partition File System.

    After you have selected the Partition File System, click Next.




  6. After selecting all the options for the partition, you will be shown a summary of these options. If there is a mistake or if you want to change a selection, click Back to restart the process or click Cancel to end the process without performing any operations. If everything is correct, click Finish to create the partition.






    Note: If you did not fill the Extended partition because you have a need for more logical partitions, you can continue to create Logical partitions until there is not room for any more in the Extended partition.

top of page

 

Scanning Partitions

Scanning a partition is similar to running a chkdsk or Scandisk in Windows or fsck in Linux. Scanning a partition will check the hard disk for errors and attempt to fix them if any are discovered.

  1. Click the Edit icon to the right of the partition you want to scan.



  2. Click Check Partition to perform a scan of the partition.



  3. A window will show you the status of the scan.




  4. When it is finished and you are returned to the Partition Properties screen, click Close to return to the File Server Disk Information screen.


 

If the hard disk has been formatted somewhere other than the USR8200 Firewall/VPN/NAS or if the hard disk is over 120 gigabytes in capacity, you may receive an error when performing a scan. The reason for this is either the method that the hard disk was formatted or the sector size. If you receive an error, you will need to connect the hard disk directly to a PC or Linux computer and perform the scan from within that computer.

 

top of page

 

Formatting a Partition

If you need to format a partition for any reason after initial setup, follow the steps below.

Note: It is recommended to format the hard disk using EXT2 if you will be transferring large files to the hard disk. If you will not be transferring any files over 4 gigabytes, it is recommended to format the hard disk using FAT32.

  1. Click the Format a partition icon in the Action column.




  2. Choose the type of partition format that will best suit your needs.

    If the storage device will be connected to a Linux station or if you will be transferring large files over 4 gigabytes, you want to choose Linux (EXT2) for the Partition Format. If the storage device will be connected to Windows PCs or if you will not be transferring any files larger than 4 gigabytes, then you want to choose Windows (FAT32) for the Partition Format.

    After you have selected the Partition File System, click Next.





  3. The following warning will appear because the partition is in use by the File Server and may contain files on it. If you are sure that you still want to format the partition, click OK.



top of page


Deleting a Partition

To delete a partition, click the Delete a partition icon in the Action column.

 

If you are certain that you want to delete the partition, click OK.

 

top of page

 

Unmounting a Hard Disk

Even though USB connections and FireWire connections are Plug and Play, any storage devices that you wish to disconnect from the USR8200 Firewall/VPN/NAS need to be unmounted properly. With the USR8200 Firewall/VPN/NAS, this is done in the File Server Disk Information interface of the Web-based management.

 

  1. Select the hard disk you want to unmount in the Network List View screen.




  2. Click Unmount in the File Server Disk Information screen.




  3. Once the hard disk has been Unmounted, you can either remount the drive or unplug it safely from the FireWire or USB connection of the USR8200 Firewall/VPN/NAS.

    Note: If you are unmounting a FireWire hard disk and there are more hard disks daisy chained behind the USR8200 Firewall/VPN/NAS, you will also need to unmount all the devices behind the one you need to disconnect. You can then re-connect the other hard disks in the daisy chain.



top of page

 

Renaming a partition

If you want to change the name of a partition on a hard disk, perform the following steps:

  1. Click Home in the left menu and then click the name of the Hard Drive in the Network map.



  2. Click the Edit icon for the partition you want to rename.



  3. Click Unmount in the Partition Properties screen.



  4. You will then be able to change the name of the partition in the Share Name field. When you are finished changing the name, click Mount and then click Close.



  5. You will then see the new partition name in the Share Name list.


top of page

 

Setting up User access rights to the storage devices

To assign User access rights, click Users in the Advanced Menu.

You can create users that have access only to the storage devices by selecting either Read Files from File Server or by selecting both Read Files from File Server and Write Files to File Server.

Note: Windows 95, Windows 98, and Windows Me clients that will be connecting to the USR8200 Firewall/VPN/NAS to access the File Server must enter the user name and password in all lowercase letters, not UPPERCASE or Capital Letters. This is because those Window versions pass everything to the server in lowercase.

Note: During any file disk utility action, none of the hard disks connected to the USR8200 Firewall/VPN/NAS can be accessed.

 

 

 

When a storage device is connected to the USR8200 Firewall/VPN/NAS via USB or FireWire, it will appear on the network map. Viewing the network map as a list will display information about the storage device.

Partition names are designated as "a", "b", "c", etc. To access the storage device's partitions from computers on the LAN, you must map a network drive using the designated partition name. The available partition names can be viewed in the network map list.
Managing Partitions

Use the following action buttons to perform disc utility and management operations on your storage device:

 

Adding a New Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

 

2. Click Add Partition and the Partition Settings screen will appear.

3. Enter the volume of the new partition (in MB).

4. Select the Make Partition Bootable checkbox to make the new partition bootable.

5. Click OK.

 

Deleting a Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

2. Click Delete Partition.

 

Formatting a Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

2. Click Partition Format and the Partition Format screen will appear.

3. Select the type of file system for the partition.

4. Click OK.

 

Scanning a Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

2. Click Scan Partition and the screen will refresh and display a summary of the partition scan.



 

Print Server

The USR8200 Firewall/VPN/NAS provides both LPD and Microsoft shared printing functionality. Microsoft shared printing offers easy installation and management. LPD printing offers robust services for large print jobs, without the need to dedicate large amounts of on board memory to job spooling.

Setting up an LPD Printer in Windows XP

1. Click the Printers and Faxes icon in Control Panel.

2. Click Add a Printer to activate the Add Printer Wizard and then click Next.

 

3. Select Local printer attached to this computer. Deselect Automatically detect and install my Plug and Play printer click Next.

 

4. In the Select a Printer Port screen, select Create a new port. Select Standard TCP/IP Port in the Type of port dropdown menu. Click Next to activate the Add Standard TCP/IP Printer Port Wizard. Click Next.

 

5. Specify 192.168.1.1 in the Printer Name or IP Address area and Next.

 

6. Select Custom and click Settings. Configure the following parameters:

  • Select LPR for the protocol.
  • Access the Web-based Management console of the USR8200. Click Home on the side-bar to display the Network Map. Locate the name of the printer in the Network Map and enter that name in the Queue Name of the Printer Wizard screen. Click OK.


 

7. Click Finish. The Add Printer Software wizard will appear.

8. Select your printer manufacturer and model from the lists. If your printer manufacturer or model do not appear in the lists, click Have disk to specify the driver location.

9. Specify the name you want to give the printer and whether you want it to be the default printer.

10. Click Next and then click Next again. Select Yes to print a test page.

11. Click Finish to complete the setup procedure.

 

Setting up a Microsoft Shared Printer

1. Open the Web-based Management console for the USR8200 by launching a Web browser and entering 192.168.1.1 The disk and printer shares available on the USR8200 will be displayed.

2. Click the printer icon.

3. Follow the instructions displayed by the printer installation wizard.

 

 

Restore Defaults

You may sometimes want to restore the USR8200 Firewall/VPN/NAS's factory default settings. This may happen, for example, when you want to build a new network from the beginning, or when you cannot recall changes made to the network and want to go back to the default configuration.

To restore default settings:

  1. Click the Restore Defaults icon in the Advanced screen of the Management Console. The Restore Defaults screen will be displayed.
  2. Click OK to restore the USR8200 Firewall/VPN/NAS's factory default settings.

Note: All Web-based settings and management parameters, not only those in the Advanced section, will be restored to their default values. This includes the Administrator password; a user-specified password will no longer be valid.

 

Restart

To restart your USR8200 Firewall/VPN/NAS:

  1. Click the Restart icon in the Advanced screen of the Management Console. The Restart screen will be displayed.
  2. Click OK to restart the USR8200 Firewall/VPN/NAS. This may take up to one minute. To reenter the Management Console after restarting the gateway, click the browser's Refresh button.

 

 

Technical Information

To view technical information regarding the USR8200 Firewall/VPN/NAS:

  1. Click the Technical Information icon in the Advanced screen of the Management Console. The Technical Information screen will be displayed.




  2. Click the Configuration File button to view the complete contents of the USR8200 Firewall/VPN/NAS's configuration file.

 



 

USRobotics