Contents:

Introduction

Hardware Installation

Overview of the Web-based Management

Using the Connection Wizard

Security

Web Filtering

Advanced >

System Monitoring

Tutorials

Troubleshooting

Regulatory Information

Frequently Asked Questions

U.S. Robotics Corporation Limited Warranty

Glossary

USR8200 Firewall/VPN/NAS User Guide

Advanced Features

This section of the Management Console is intended primarily for more advanced users. Some changes to settings within this section should be made with caution, as they could adversely affect the operation of the USR8200 Firewall/VPN/NAS and the home network. Click on one of these links to learn about the different functions on the advanced feature page:

This is the Advanced page:

 

DNS (Domain Name System) Server

A DNS translates domain names into IP addresses and vice versa. The gateway's DNS server is an auto-learning DNS, which means that when a new computer is connected to the network, the DNS server learns its name and automatically adds it to the DNS table. Other network users may immediately communicate with this computer using either its name or its IP address. In addition, the gateway's DNS:

  • Shares a common database of domain names and IP addresses with the DHCP server.
  • Supports multiple subnets within the LAN simultaneously.
  • Automatically appends a domain name to unqualified names.
  • Allows new domain names to be added to the database.
  • Permits a computer to have multiple host names.
  • Permits a host name to have multiple IP addresses (needed if a host has multiple network cards).
  • Does not require configuration. However, you may want to view the list of computers known by the DNS, edit the host name or IP address of a computer on the list, or manually add a new computer to the list.

View or Modify the DNS Table

To view the list of computers stored in the DNS table, click the DNS Server icon in the Advanced screen of the Management Console. The DNS table will be displayed.

To add a new entry to the list:

  1. Click New DNS Entry. The DNS Entry screen will appear.
  2. Enter the computer's host name and IP address.
  3. Click OK to save your changes.

To edit the host name or IP address of an entry:

  1. In the Action column of the DNS Server page, click the Edit button. The DNS Entry screen will appear. If the host was manually added to the DNS table, then you may modify its host name and/or IP address. Otherwise you may only modify its host name.
  2. Click OK to save your changes.

To remove a host from the DNS table, click the Remove button in the Action column. The entry will be removed from the table.

 

Dynamic DNS

The Dynamic DNS service allows you to alias a dynamic IP address to a static host name, allowing your computer to be more easily accessible from various locations on the Internet. Typically, when you connect to the Internet, your service provider assigns an unused IP address from a pool of IP addresses, and this address is used only for the duration of a specific connection. Dynamically assigning addresses extends the usable pool of available IP addresses, while maintaining a constant domain name. Each time the IP address provided by your ISP changes, the DNS database will change accordingly to reflect the change in IP address. In this way, even though a domain name's IP address will change often, your domain name will still be accessible.

To be able to use the Dynamic DNS feature you must open a DDNS account, free of charge, at http://www.DynDNS.org/account/create.html. When applying for an account, you need to specify a user name and password. Have them readily available when customising your DDNS support. For more information regarding Dynamic DNS, refer to http://www.DynDNS.org

Using Dynamic DNS

  1. Click the Dynamic DNS icon in the Advanced screen of the Management Console. The Dynamic DNS table will appear.
  2. Specify the Dynamic DNS operating parameters.
    • User Name - Enter your DynDNS user name.
    • Password - Enter your DynDNS password.
    • Host Name - Enter a subdomain name and select a suffix from the domain list to define your host name.
    • Mail Exchanger - Enter your mail exchange server address to redirect all e-mail messages arriving at your DynDNS address to the mail server.
  3. Select the Dynamic Update checkbox to enable the Dynamic DNS service.

 

IP Address Distribution

Your gateway's DHCP server lets you easily add computers that are configured as DHCP clients in the home network. It provides a mechanism for allocating IP addresses to these hosts and for delivering network configuration parameters to them.

Here's how it works: A client (host) sends out a broadcast message on the LAN requesting an IP address for itself. The DHCP server then checks its list of available addresses and "leases" a local IP address to the host for a specific period of time. It also simultaneously designates this IP address as "taken." The lease also contains other information about network services such as the gateway's netmask, route, and DNS server addresses. When the process is complete, the host is configured with an IP address for the duration of the lease.

When a lease nears expiration, the host can renew it or let it expire. If it renews the lease, then it will also receive current information about network services, as it did with the original lease. This allows it to update its network configuration to reflect any changes that have occurred since it first connected to the network. If the host wants to terminate a lease before its expiration, it can send a release message to the DHCP server, which then makes the IP address available for use by others.

The gateway's DHCP server:

  • Displays a list of all DHCP hosts connected to the USR8200 Firewall/VPN/NAS
  • Defines the range of IP addresses that can be allocated in the LAN
  • Defines the length of time for which dynamic IP addresses are allocated (lease time)
  • Can assign a static IP address (also called a static lease) to a LAN computer so it receives the same IP address each time it connects to the network, even if this IP address is within the range of addresses that the DHCP server may assign to other computers
  • Provides the DNS server with the host name and IP address of each computer that is connected to the LAN

DHCP Server Summary

To view a summary of the services currently being provided by the DHCP server, click the DHCP icon in the Advanced screen of the Management Console. The DHCP Server Summary screen appears. Select Clear the Name check box to enable or disable DHCP services for a device.

Note: If a device is listed as "Disabled," it means that DHCP services are not being provided to hosts connected to the network through that device. The gateway will not assign IP addresses to these computers, which is useful if you want to work with static IP addresses only.

Editing DHCP Server Settings

To edit the DHCP server settings for a device:

  1. Click the Edit button in the Action column. The DHCP Settings for this device appears.
  2. Choose whether to enable or disable the DHCP service for this device. You can also do this on the DHCP Server Summary screen.
  3. Complete the following fields and then click OK.
  • IP Address Range (Start and End): This determines the number of hosts that may be connected to the network in this subnet. "Start" specifies the first IP address in the range that may be assigned in this subnet and "End" specifies the last IP address in the range.
  • Subnet Mask: A mask used to determine which subnet an IP address belongs to. An example of a subnet mask value is 255.255.0.0.
  • Lease Time: This the length of the machine's lease period (described above). When the lease expires, the server determines if the computer has disconnected from the network. If so, the server may reassign this IP address to the next newly-connected computer. This ensures that IP addresses that are not in use will become available for other computers on the network.
  • Provide Host Name If Not Specified by Client: If the DHCP client does not have a host name, the gateway will assign the client a default name.

DHCP Connections

To view a list of computers currently recognized by the DHCP server, click the Connection List button that appears at the bottom of the DHCP Server Summary screen. The DHCP Connections screen will be displayed.

To edit the properties for a static connection:

Click the Action column's Edit button. The DHCP Connection Settings screen appears.

To define a new connection with a fixed IP address:

  1. Click the New Static Connection button that appears on top of the DHCP Connections screen. The DHCP Connection Settings screen appears.
  2. Enter a host name for this connection.
  3. Enter the fixed IP address that you would like to have assigned to the computer.
  4. Enter the MAC address of the computer's network card.
  5. Click OK to save your changes. To remove a host from the table, click the Delete button that appears in the Action column.

Note: A device's fixed IP address is actually assigned to the specific network interface card (NIC) installed on the LAN computer. If you ever replace the NIC, you must update the device's entry in the DHCP Connections list with the new network card's MAC address.

 

Network Objects

The Network Objects screen provides a method of abstractly defining a set of LAN hosts. You can then apply system rules to the group to implement filtering by IP address, host name, or MAC address.

To define a network object:

1. Click the Network Objects icon and the Network Objects screen will appear.

2. Click New Entry and the Network Objects screen will appear.

3. Specify a name for the network object in the Description field.

4. Click New Entry and the Item screen will appear.

5. Select the type of network object type from the Network Object Type pull-down menu:

  • IP Address
  • MAC Address
  • Host Name

6. Enter the appropriate description for the network object type and then click OK.

7. Click OK in the Network Object screen and then click Close.

 

Routing

Managing Routing Table Rules

You can access the routing table rules by clicking the Routing icon from the Advanced screen. The Routing screen will appear.

You can add, edit, and delete routing rules from the Routing Table. When adding a routing rule, you need to specify:

  • Device: Select the network device.
  • Destination: The destination is the destination host, subnet address, network address, or default route. The destination for a default route is 0.0.0.0.
  • Netmask: The network mask is used in conjunction with the destination to determine when a route is used.
  • Gateway: Enter the gateway's IP address.
  • Metric: A measurement of the preference of a route. Typically, the lowest metric is the most preferred route. If multiple routes exist to a given destination network, the route with the lowest metric is used.

Multicasting

The USR8200 Firewall/VPN/NAS provides support for IGMP multicasting, which allows hosts connected to a network to be updated whenever an important change occurs in the network. A multicast is simply a message that is sent simultaneously to a predefined group of recipients. When you join a multicast group, you will receive all messages addressed to the group, much like what happens when an e-mail message is sent to a mailing list.

IGMP multicasting enables UPnP capabilities over wireless networks and may also be useful when connected to the Internet through a router. When an application running on a computer in the home network sends out a request to join a multicast group, the USR8200 Firewall/VPN/NAS intercepts and processes the request. If the USR8200 Firewall/VPN/NAS is set to Minimum Security, no further action is required. However, if the USR8200 Firewall/VPN/NAS is set to Typical Security or Maximum Security, you must add the group's IP address to the USR8200 Firewall/VPN/NAS's Multicast Groups screen. This will allow incoming messages addressed to the group to pass through the Firewall and on to the correct LAN computer.

  1. Click the Routing icon in the Advanced screen.
  2. Select the Multicast Groups Management check box.
  3. Click OK.

 

Users

User Settings

This is the section you will use to add new users for utilizing the PPTP, File Server, and FTP Server functions.

To create an account, click New User.

  • Full Name: The user's full name.
  • User Name: The name the user will use to access your home network.
  • New Password: Type a new password for the user. If you do not want to change the user's password, leave this field empty.
  • Retype New Password: If a new password was assigned, type it again to verify it.
  • Permissions: Select the user's privileges on your home network.
    • Administrative Privileges: This gives users Administrative access to change setting via the Web-based management and Telnet.
    • Remote Access by PPTP: This gives users the ability to remotely connect to your internal network.
    • Read Files from the File Server: This gives users the ability to read files from either FTP or the File Servers.
    • Write Files to the File Server: This gives users the ability to write files from either FTP or the File Servers.
  • E-Mail Address: Type in the e-mail address of the user.
  • Choose the System Notify Level: None, Error, Warning, or Information
  • Choose the Security Notify Level: None, Error, Warning, or Information

The Notification levels are used to e-mail users the System and Security Log files. The type of information you will receive depends on the Level you choose for either.

Finally click OK to save the New User to the USR8200 Firewall/VPN/NAS. Note: User Names and Passwords are case sensitive

Note: Windows 95/98 users for File Server and FTP Server access, the username and password needs to be in all lowercase, not UPPERCASE.

 

Certificates

When working with public-key cryptography, you should be careful and make sure that you are using the correct person's public key. Man-in-the-middle attacks pose a potential threat, where an ill-intending third-party posts a phony key with the name and user ID of an intended recipient. Data transfer that is intercepted by the owner of the counterfeit key can fall into the wrong hands.

Digital certificates provide a means for establishing whether a public key truly belongs to the supposed owner. It is a digital form of credential. It has information on it that identifies you and an authorised statement to the effect that someone else has confirmed your identity.

Digital certificates are used to foil attempts by an ill-intending party to use an unauthorised public key. A digital certificate consists of the following:

  • A public key: Certificate information. The "identity" of the user, such as name, user ID, etc.
  • Digital signatures: A statement that tells that the information enclosed in the certificate has been vouched for by a Certificate Authority (CA). Binding this information together, a certificate is a public key with identification forms attached, coupled with a stamp of approval by a trusted party.

X.509 Certificate

The USR8200 Firewall/VPN/NAS supports X.509 certificates that comply with the ITU-T X.509 international standard. An X.509 certificate is a collection of a standard set of fields containing information about a user or device and their corresponding public 8.10 key. The X.509 standard defines what information goes into the certificate and describes how to encode it (the data format). All X.509 certificates have the following data:

The certificate holder's public key - the public key of the certificate holder, together with an algorithm identifier that specifies which cryptosystem the key belongs to and any associated key parameters.

The serial number of the certificate - the entity (application or person) that created the certificate is responsible for assigning it a unique serial number to distinguish it from other certificates it issues. This information is used in numerous ways; for example when a certificate is revoked, its serial number is placed on a Certificate Revocation List (CRL).

The certificate holder's unique identifier (or DN-distinguished name) - this name is intended to be unique across the Internet. A DN consists of multiple subsections and may look something like this: CN=John Smith, EMAIL=johndoe@usr.com, OU=R&D, O=U.S. Robotics, C=US (These refer to the subject's common name, organizational unit, organization, and country.)

The certificate's validity period the certificate's start date/time and expiration date/time - indicates when the certificate will expire.

The unique name of the certificate issuer - the unique name of the entity that signed the certificate. This is normally a CA. Using the certificate implies trusting the entity that signed this certificate.

Note: In some cases, such as root or top-level CA certificates, the issuer signs its own certificate.

The digital signature of the issuer - the signature using the private key of the entity that issued the certificate.

The signature algorithm identifier - identifies the algorithm used by the CA to sign the certificate.

Obtaining an X509 Certificate

To obtain an X509 certificate, you must ask a CA to issue you one. You provide your public key, proof that you possess the corresponding private key, and some specific information about yourself. You then digitally sign the information and send the whole package - the certificate request - to the CA. The CA then performs some due diligence in verifying that the information you provided is correct and, if so, generates the certificate and returns it.

You might think of an X509 certificate as looking like a standard paper certificate with a public key taped to it. It has your name and some information about you on it, plus the signature of the person who issued it to you.

  1. Click the Certificates icon in the Advanced screen of the Management Console. The Certificates screen will appear.
  2. Click the USR8200 Firewall/VPN/NAS's Local Certificates button.
  3. Click the Create Certificate Request button. The Create X509 Request screen will appear.
  4. Enter the following certification request parameters and click the Generate button. A screen will appear stating that the certification request is being generated.
    • Certificate Name
    • Subject
    • Organization
    • State
    • Country

  5. After a short while, the screen will refresh and display your certification request.
  6. Store the exact contents of this request to a file, and send it to a CA for signing.
  7. Click Close. The main certificate management screen will appear, listing your certificate as "Not-signed."
  8. After receiving a reply from the CA in the form of a signed request, click Load Certificate. The Load Local Certificate screen will appear.



  9. Paste the signed request into the available space.
  10.  

  11. Click the Load button to register the signed certificate. If the registration is successful, the certificate management screen will appear, displaying the certificate name and issuer.

 

Registering a CA's Certificate

  1. Click the Certificates icon in the Advanced screen of the Management Console. The Certificates screen will appear.
  2. Click the CA's Certificates button.
  3. Click the Load Certificate button. The Load CA's Certificate screen will appear.
  4. Paste the CA's certificate.
  5. Click the Load button.

 

Date & Time

Click the Date and Time icon in the Advanced screen of the Web-based Management to set the local date and time information for the USR8200 Firewall/VPN/NAS.

Localization:

Select the local time zone from the pull-down menu.

 

Daylight Saving Time:

Depending on which time zone you choose, you may or may not see the Daylight Saving Time option. The USR8200 Firewall/VPN/NAS can automatically adjust the local time that it stores internally when Daylight Savings Time (DST) begins and ends.

To do this select Enabled and then in the following fields enter the dates on which Daylight Savings Time begins and ends at your location.

Below is a chart for the years 2003 - 2005.

United States
Year
DST Begins at A.M.
DST Ends at A.M.
2003
April 6
October 26
2004
April 4
October 31
2005
April 3
October 30

 

European
Year
DST Begins at A.M.
DST Ends at A.M.
2003
March 30
October 26
2004
March 28
October 31
2005
March 27
October 30


For a very informative description of what Daylight Saving Time is and its history, along with a calculator, you can visit http://webexhibits.org/daylightsaving/index.html

 

For more information about this or any other feature, refer to the USR8200 Firewall/VPN/NAS Web Support page.

 

Automatic Time Update:

The USR8200 Firewall/VPN/NAS can keep the time always in sync with Universal time standards by connecting to Time servers throughout the world.

To do this select Enabled and then in the following fields enter the server address, the protocol used by the server, and how often you want the time to be updated.


Below are a few worldwide NTP Servers.

United States:
US IL ntp0.mcs.anl.gov (140.221.8.88)
US NY nist1-ny.glassey.com (208.184.49.9)
US CA clepsydra.dec.com (204.123.2.5

Europe:
FR canon.inria.fr (192.93.2.20)
DE ntp0.fau.de (131.188.3.220)

You can find a complete listing of public servers from the following Web site: http://www.eecis.udel.edu/~mills/ntp/servers.html

 

If you click Clock Set, you will be able to assign the settings for the Local Date and Local Time.

After you have set the date and time, click OK.

 

 

Scheduler Rules

Scheduler rules are used for limiting the application of Firewall rules to specific time periods, specified in days and hours.

To define a rule:

1. Click the Scheduler Rules icon and the Scheduler Rules screen will appear.

2. Click New Scheduler Entry and the Scheduler Rule Edit screen will appear.

3. Specify a name for the rule in the Name field.

4. Specify if the rule will be active or inactive during the designated time period by selecting the appropriate Rule Activity Settings checkbox.

5. Click New Time Segment Entry to define the time segment that the rule will apply to. The Time Segment Edit screen will appear.

  • Select active and/or inactive days of the week.
  • Click New Time Segment Entry to define an active/inactive hourly range and then click OK.



  • Click OK.

6. Click OK and then click OK again to return to the Advanced screen.

 

Firmware Upgrade

There are two ways to upgrade the system software:

  • Upgrading from the Internet: automatically retrieve an updated system software file.
  • Upgrading from a local computer: use an update system software file located on a local disk drive. The following are instructions for each of these methods.

Upgrading From the Internet

To learn if an upgrade is available, click the Firmware Upgrade button from the Advanced screen. Then click Check Now. You may need to click Refresh after a few seconds. You will be informed whether an upgrade is available. If so, click Force Upgrade if you wish to upgrade to the latest code for the USR8200 Firewall/VPN/NAS.

 

If an upgrade is available:

  • To upgrade, click the Yes button.
  • To wait and upgrade later, do one of the following:

A) Click the No button. The system will continue to perform its daily checks for the availability of a software update as scheduled and will notify you the next time you log into the Management Console.

Note: The Gateway must be connected to the Internet in order to communicate with the Remote Update server. Those systems that store the time internally will attempt to connect and check for an update weekly. The default upgrade path is http://www.usr.com/support/8200/8200-files/usr8200.rmt

B) Move to another screen by clicking an icon in the left sidebar. Return to the Upgrade screen at a later time by clicking the Firmware Upgrade icon in the Advanced screen.

Upgrading From a Local Computer

To upgrade the USR8200 Firewall/VPN/NAS using a file that you have previously downloaded from the Internet or received on CD-ROM:

  1. When you receive notification that a new software version is available, retrieve the file as instructed and store it on a computer in the home network.
  2. Open the Management Console from this same computer and click the Firmware Upgrade icon in the Advanced screen In the Firmware Upgrade screen, click Upgrade Now.
  3. Click Browse. A dialog box will appear. Choose the file to upload to the USR8200 Firewall/VPN/NAS and click Open.
  4. Click OK at the bottom of the Upgrade screen. The file will be uploaded to the USR8200 Firewall/VPN/NAS.


  5. After the file has been transferred to the USR8200 Firewall/VPN/NAS, its validity will be verified and you will be asked to confirm that you want to upgrade the USR8200 Firewall/VPN/NAS with this new file.
  6. Click Yes to confirm. The upgrade process will begin and should take no longer than one minute to complete.
  7. At the conclusion of the upgrade process, the USR8200 Firewall/VPN/NAS will automatically reboot. The new software version of will be running, and your custom configurations and settings will be maintained.

 

 

Point-to-Point Tunneling Protocol (PPTP)

There are two modes in which the USR8200 Firewall/VPN/NAS can use PPTP:

  • Server mode, where the USR8200 allows remote users to log in to the local network, and
  • Client mode, in which a local machine connects to a remote network over the Internet.

To access the PPTP settings, click the PPTP icon from the Advanced screen. The Advanced PPTP Settings screen will appear. This screen enables you to configure:

  • The remote users that will be granted access to your home network.
  • The IP address range an authorised remote user can use when accessing your home network.
  • Advanced PPTP client/server connection settings.

 

 

Managing Remote Users

Click Users to define and manage remote users. You can add, edit, and delete users. When adding a user, you need to specify the following parameters:

  • Full Name: The remote user's full name.
  • User Name: The name a remote user will use to access your home network.
  • New Password: Type a new password for the remote user. If you do not want to change the remote user's password, leave this field empty.
  • Retype New Password: If a new password was assigned, type it again to verify it.
  • Permissions: Select the remote user's privileges on your home network.
    • Administrative Privileges: This gives users Administrative access to change setting via the Web-based management and Telnet.
    • Remote Access by PPTP: This gives users the ability to remotely connect to your internal network.
    • Read Files from the File Server: This gives users the ability to read files from either FTP or the File Servers.
    • Write Files to the File Server: This gives users the ability to write files from either FTP or the File Servers.
  • E-Mail Address: The remote user's e-mail address.
  • Choose the System Notify Level: None, Error, Warning, or Information
  • Choose the Security Notify Level: None, Error, Warning, or Information

The notification levels are used to e-mail users the System and Security Log files. The type of information you will receive depends on the Level you choose for either.

Note: Changing the settings for any active user connection (i.e., where the user is currently connected) terminates that user's session. For changes to take effect, you should activate the connection manually after modifying the user parameters.

 

Advanced PPTP Server Settings

In server mode, the USR8200 Firewall/VPN/NAS enables remote users to access your local network. To configure advanced PPTP server settings, click the Advanced button on the PPTP screen. The Advanced PPTP Settings screen will appear. This screen enables you to configure the following:

  • Enabled: Use this checkbox to enable or disable the PPTP server.
  • Maximum Idle Time to Disconnect: Specify the amount of idle time (during which no data is sent or received) that should elapse before the gateway disconnects a PPTP connection.
  • Authentication Required: Enable or disable the authentication option.
  • Allowed Authentication Algorithms: Select the algorithms the server may use when authenticating its clients.
  • Encryption Required: Enable or disable the encryption option.
  • Allowed Encryption Algorithms: Select the algorithms the server may use when encrypting data.
  • Remote Address Range: Specify the range of IP addresses remote users can use to access your home network. Note that the server settings you choose here must be the same as the corresponding client settings (on the machines that will access your local network). The USR8200 Firewall/VPN/NAS has its own DHCP server to allocate its available IP addresses to remote clients.

 

Creating a New Connection

To create a new PPTP connection, click New Connection at the bottom of the main PPTP screen. The new connection properties screen will be displayed. Enter the following information:

  • Host Name or Destination IP Address
  • Login User Name
  • Login Password

When you have entered this information, click Next.

On the next screen, verify the information you entered and click Finish if it is correct. If it is not correct, click Back and re-renter the information.

 

Advanced PPTP Client Settings

In client mode, the USR8200 Firewall/VPN/NAS helps local users access a remote network.The PPTP connections are displayed in the Advanced PPTP Settings screen.

All settings entered here must be the same as those entered in the remote PPTP server. If they do not match and you cannot change them in the client, you can switch to the PPTP client built into the operating system and configure it as you need.

To configure advanced PPTP client and server settings, perform the following steps:

  1. Click the connection's Edit button. The Connection Summary screen will appear.

  2. Click the Settings button. The Advanced PPTP Client Settings screen will appear, enabling you to configure the following advanced PPTP client settings.
    • Device Name: This is a connection name chosen by the USR8200 Firewall/VPN/NAS.
    • Status: This shows the current PPTP state.
    • Schedule: A schedule defines when the tunnel is available. You can define a scheduler rule that lists days of the week and hours of the day when the tunnel is enabled. Click here for more information on this.
    • Network: This indicates where the tunnel's other endpoint is. Use WAN if the USR8200 Firewall/VPN/NAS will communicate with its peer machine over the Internet.
    • Connection Type: This is the type of PPTP connection you are configuring.
    • MTU: The Maximum Transmission Unit (MTU) is the largest physical packet size, measured in bytes that will be transmitted through the PPTP connection. Packets larger than the MTU are divided into smaller packets before being sent. You can set the MTU size manually, or select an automatic MTU mode.
    • Host Name or IP Address of Destination: This tells the USR8200 Firewall/VPN/NAS where the endpoint of the PPTP connection is.
    • On Demand: If you enable this check box, the USR8200 only tries to connect to its peer machine when there is data to transmit. If you disable this, the USR8200 makes the connection when it starts up.
    • Time Before Reconnect Attempts: This is how long the USR8200 Firewall/VPN/NAS waits after losing its connection to the peer before it tries to re-establish the connection.
    • Login User Name: This is the user name for logging in to the peer machine.
    • Login Password: The password for logging in to the peer machine.
    • Support Unencrypted Password (PAP): Enable this item if you want the login to the peer machine to include sending a non-encrypted password.
    • Support Challenge Handshake Authentication (CHAP): Enable this check box if you want the login to the peer machine to include sending an encrypted password. CHAP is much more secure than the PAP method.
    • Support Microsoft CHAP: This is a more recent (and more secure) version of CHAP.
    • Support Microsoft CHAP Version 2: This is the most recent (and most secure) version of CHAP.
    • Require Encryption: Set this item if you want the USR8200 Firewall/VPN/NAS and its peer to use PPP encryption in messages sent to each other. If this box is checked, a connection is not set up if the peer machine declines encryption.
    • Support Encryption: Check this box if you want the USR8200 Firewall/VPN/NAS to encrypt messages sent to the peer with standard-size encryption keys.
    • Support Maximum Strength Encryption: Check this box if you want to use encryption with larger keys for added security.
    • Internet Protocol: This item affects how the local machine gets its IP address to use the tunnel. Select Use the Following IP Address and enter the address below if the remote system administrator gave you a specific IP address to use. If not, choose Obtain an IP Address Automatically and the machine will use its normal IP address.
    • Override Subnet Mask: You can use this mask to specify the subnets your local machines wish to access on the remote network.
    • DNS Server: Select whether the PPTP client should obtain a domain name service (DNS) address automatically. If not, you need to enter primary and secondary IP addresses for DNS servers.
    • Routing: This setting lets you define the routing rules for the PPTP client's connections. If you select Advanced, With Advanced, you can set up the routing mode and the maximum number of hops to reach the peer machine in (this is called Device Metric; we suggest that only experienced network administrators change it). You can also enable or disable the default route to the tunnel, enable broadcast messages, and have the USR8200 listen for RIP (Routing Information Protocol) data.
    • Internet Connection Firewall: Select this check box to include the PPTP client connection as a network interface monitored by the USR8200's firewall. Click on the words Internet Connection Firewall to go to the main firewall configation page.

 

 

 

Internet Protocol Security (IPSec)

To access the Advanced IPSec Settings, click the IPSec icon in the Advanced screen. The IPSec Connections screen will appear. This screen displays your IPSec connections and enables you to configure the following:

  • General IPSec settings
    - Key management
    - Log settings
  • Advanced IPSec connection settings

General IPSec Settings

Key Management

  1. Click Settings. The Key Management screen will appear.
  2. The Key Management screen displays the public key of the USR8200 Firewall/VPN/NAS. If necessary, you can copy the public key from this screen.
  3. Click Recreate Key to recreate the public key or click Refresh to refresh the key displayed in this screen.

Log Settings

The IPSec log can be used to identify and analyze the history of the IPSec package commands, attempts to create connections, etc. IPSec activity, as well as that of other USR8200 Firewall/VPN/NAS modules, is displayed together in this view.

  1. Click the IPSec icon in the Advanced screen.
  2. Click Log Settings. The IPSec Log Settings screen will appear.
  3. Select the checkboxes relevant to the information you would like the IPSec log to record.

Setting up IPSec

Follow this procedure to configure an IPSec connection:

  1. Starting at the IPSec configuration page, click on New Connection (just above the OK button).
  2. To set up a connection from the USR8200 Firewall/VPN/NAS to a peer network rather than to a single machine, select Network-to-Network and click OK. Otherwise, select Network-to-Host and click OK.
  3. In the following page, choose whether you want to make the IPSec connection with a specific host or any host, and with a specific subnet or any subnet.
  4. In the next page, you can enter a shared secret (described below) and information on the remote peer (depending on what you selected in the previous step):
  5. (Skip this step if you selected Any Remote Gateway above.) Enter the URL for the tunnel's endpoint.
  6. (Skip this step if you selected Any Remote Subnet above.) Enter an IP address and mask for the remote subnet.
  7. Enter a shared secret, which is simply a text string that only the USR8200 Firewall/VPN/NAS and its IPSec peer know. For improved security, we suggest that you pick a string that will be difficult for attackers to guess. The same text string must also be entered in the peer's IPSec configuration.
  8. When the following page appears, click Finish to save the IPSec connection:

 

Advanced IPSec Connection Settings

All settings entered here must be the same as those entered in the IPSec peer. If they do not match and you cannot change them on your end, you can switch to the IPSec client built into the operating system and configure it as you need.

The IPSec connections are displayed in the IPSec Connections screen. To configure advanced IPSec settings, perform the following steps:

  1. Click Edit for the connection. The Connection Summary screen will appear.
  2. Click Settings. The Advanced IPSec Settings screen will appear, allowing you to configure the following advanced IPSec settings:

    Device Name: This is a name assigned by the USR8200 Firewall/VPN/NAS for the IPSec peer -- the machine at the other endpoint of the tunnel.

    Status: Connected means that the tunnel is up. Waiting for Connection means that the USR8200 Firewall/VPN/NAS is ready to accept a VPN connection from the peer system. Inactive says that the tunnel exists but is not being used by either side. Resolving Hostname appears when the USR8200 Firewall/VPN/NAS is trying to find a transmission route to the peer.

    Schedule: A schedule defines when the tunnel is available. You can define a scheduler rule that lists days of the week and hours of the day when the tunnel is enabled. Click here for more information on this.

    Network: This indicates where the tunnel's other endpoint is. Use WAN if the USR8200 Firewall/VPN/NAS will communicate with the peer over the Internet.

    Remote Tunnel Endpoint Address: This is the location of the IPSec peer. The tunnel will not work unless the USR8200 and the machine specified here are the systems trying to use it. Any Remote Gateway means that the tunnel can accept a connection request from any device that wants to try to connect (though it's virtually impossible that the tunnel will work unless the peer has the correct shared secret, RSA signature, or certificate).

    Security Association Mode: This can be either Tunneling or Transport. In Tunneling, the entire IP datagram is protected, while in Transport mode only the data for the higher-level protocols is protected. Transport mode needs no explicit configuration. Tunneling requires that you configure the local and remote subnet addresses and masks (described below). Use transport mode when the cryptographic endpoint is the same as the communication endpoint -- in other words, if the final message recipient is also the machine that decrypts the data.

    Local Subnet: Here you tell the USR8200 Firewall/VPN/NAS which system or systems will use the tunnel at your (local) end -- a subnet, a range of IP addresses, or a single machine. If you specify multiple machines, any of them can use the tunnel, though only one can use it at a time. Below Local Subnet, you can enter the IP address(es) and/or the subnet mask.

    Remote Subnet: This specifies which system or systems will use the tunnel at the peer end -- a subnet, a range of IP addresses, or a single machine. If you specify multiple machines, any of them can use the tunnel, though only one can use it at a time. Below Remote Subnet, you can enter the IP address(es) and/or the subnet mask.

    Compress (Support IPCOMP): Select this check box to use the IP Comp data compression protocol.

Route NetBIOS Broadcasts: You can enable this item if you want to look up other computers by their names rather than by x.x.x.x IP addresses. This convenience is offset by how the USR8200 Firewall/VPN/NAS will send messages to the peer even when the tunnel is not in use.

Key Exchange Method: To communicate securely over the Internet, the two ends of the tunnel must exchange encryption keys. This item specifies whether the key exchange is automatic or manual. Automatic is recommended unless the peer system does not support automated key exchange.

Auto Reconnect: If you enable this item, the USR8200 Firewall/VPN/NAS will automatically attempt to re-connect to the peer if it loses the connection.

The following are the parameters that are required to configure an Automatic key exchange (see below for the Manual key exchange settings):

Mode: Your choices here are Main Mode and Aggressive Mode. Aggressive mode is quicker but less flexible than main mode. However, in aggressive mode, the USR8200 Firewall/VPN/NAS sends its IPSec peer useful information that it doesn't send in main mode.

Negotiation attempts: Select the number of negotiation attempts to perform in Phase 1 of the automatic key exchange. If one of the peers is unable to authenticate the other in this many connection attempts, the tunnel will not be opened. If this item says Infinite, the USR8200 Firewall/VPN/NAS will attempt to negotiate a connection indefinitely.

Life Time in Seconds: The length of time before a security association automatically performs a renegotiatation. A short Life Time improves security by forcing the VPN hosts to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, users accessing remote resources are disconnected. Therefore, the default Life Time is recommended.

Rekey Margin: Specifies how long before a connection expires that attempts to negotiate a replacement should begin. It is similar to that of the Key Life Time and is given as an integer denoting seconds.

Rekey Fuzz Percent: Specifies the maximum percentage by which Rekey Margin should be randomly increased to randomize re-keying intervals.

Peer Authentication: Select the method by which the USR8200 Firewall/VPN/NAS will authenticate your IPSec peer:

  • Shared Secret -- a shared secret is simply a text string. You enter the same string here and in the peer's IPSec setup. The machines authenticate each other by performing complex processing on the string. If the calculated result is the same as that sent by the other machine, it authenticates the other machine.
  • RSA Signature -- RSA is a popular encryption method that uses complex mathematical operations involving large prime numbers. It is an asymmetric system -- the message is encoded and later decoded with two separate keys.
  • Certificate -- with certificates, digitally signed identity statements are created by certifying agencies or individuals vouching for others. This is the most secure peer authentication method.

Encryption Algorithm: Select one or more encryption methods to use in the phase 1 of the negotiation. If the algorithms you check don't exactly match the ones specified by the IPSec peer, the tunnel does not open. DES-CBC is an early algorithm that has been cracked. 3DES-CBC uses three different encryption operations, each with 56-bit keys. The Advanced Encryption Standard (AES) is a collection of algorithms using 128-bit, 192-bit, or 256-bit keys.

Hash Algorithm: Select the hash algorithms that the USR8200 Firewall/VPN/NAS will attempt to use when negotiating with the IPSec peer.

Group Description Attribute: Here you can select which algorithm group to use for Diffie-Hellman key exchanges in phase 1. Group 5 is more secure than group 2, which in turn is more secure than group 1.

Life Time in Seconds: The length of time before a security association automatically performs a renegotiatation. A short Life Time improves security by forcing the VPN hosts to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, users accessing remote resources are disconnected. Therefore, the default Life Time is recommended.

Use Perfect Forward Secrecy (PFS): Select whether Perfect Forward Secrecy of keys is desired on the connections keying channel. With PFS, penetration of the key-exchange protocol does not compromise keys negotiated earlier.

Group Description Attribute: Here you can select which algorithm group to use for Diffie-Hellman key exchanges in phase 2. Group 5 is more secure than group 2, which in turn is more secure than group 1.

Encryption Algorithm: Select one or more encryption methods to use in the phase 2 of the negotiation. If the algorithms you check don't exactly match the phase 2 methods specified by the IPSec peer, the tunnel does not open. If you do not want encryption for phase 2, select either Allow AH Protocol or Allow ESP Protocol with Null-Encryption, depending on whether you're using IPSec's AH or ESP protocols.

Authentication Algorithm (for ESP Protocol): Select the encryption and authentication algorithms the USR8200 Firewall/VPN/NAS will use during Phase 2 of the automatic key exchange. You can choose 3DES-CBC, DES-CBC, or NULL encryption algorithms. Or you can choose MD5 or SHA1 authentication algorithms.

Hash Algorithm (for AH Protocol): Select the hash algorithms that the USR8200 Firewall/VPN/NAS will use during phase 2 of the automatic key exchange. You can choose the MD5 or SHA1 algorithms.

Routing: You can choose to use basic routing functions or more advanced routing. With Advanced, you can set up the maximum number of hops to reach the peer machine in (this is called Device Metric; we suggest that only experienced network administrators change this). You can also change the default route to the tunnel, enable broadcast messages, and have the USR8200 Firewall/VPN/NAS listen for RIP (Routing Information Protocol) data.

Internet Connection Firewall: Select this check box to include the IPSec connection as a network interface monitored by the USR8200 Firewall/VPN/NAS's firewall.

The following are the parameters that are required to configure a Manual key exchange (Automatic key exchange settings appear above):

Security Parameter Index (SPI): A 32-bit value that, together with IP address and security protocol, uniquely identifies a particular security association (SA). This value must be the same for both the local and remote tunnels.

Use Different Encryption Keys: Uncheck this box if you want the USR8200 Firewall/VPN/NAS and its peer to use the same keys. If you check the box, the local key must be identical to the peer's remote key, and the remote key must be the same as the peer's local key.

IPSec Protocol: Select the encryption and authentication algorithms. The choices are ESP and AH. ESP uses encryption, while AH does not.

Encryption Algorithm & Keys: All key values should be entered in hexadecimal (base 16) format.

Authentication Algorithm & Key: The algorithm choices are SHA1 & MD5. All key values should be entered in hexadecimal (base 16) format.

Routing: Define the connection's routing rules. Choices are Basic and Advanced.

Internet Connection Firewall: Select this check box to include the IPSec connection as a network interface monitored by the USR8200 Firewall/VPN/NAS's firewall.

VPNC Scenario Connection Instructions

This section describes how to use the USR8200 Firewall/VPN/NAS to configure an IPSec gateway-to-gateway connection with a pre-shared secret scenario developed by the VPN Consortium.

Network Configuration

An IPSec tunnel is established between Gateways A and B, serving as a transparent and secure network for clients from subnets A and B. Because the configuration of the Gateways is the same except for their IP addresses, this section describes only the configuration of Gateway A. Configuration of Gateway B is identical, where A and B are replaced by B and A respectively.

LAN Interface Settings

  1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear.
  2. Click LAN Ethernet to access the LAN Ethernet properties screen.
  3. Click Settings and the LAN settings page will appear. Configure the following parameters:
    • Internet Protocol: Select Use the Following IP Address.
    • IP Address: Specify 10.5.6.1
    • Subnet Mask: Specify 255.255.255.0
    • IP Address Distribution: Select DHCP Server.
    • Start IP Address: Specify 10.5.6.1
    • End IP Address: Specify10.5.6.254
    • Subnet Mask: Specify 255.255.255.0
  4. Click OK.

WAN Interface Settings

1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear.

2. Click WAN Ethernet to access the WAN Ethernet properties screen.

3. Click Settings and the WAN settings page will appear. Configure the following parameters:

  • Internet Protocol: Select Use the Following IP Address.
  • IP Address: Specify 14.15.16.17
  • Subnet Mask: Specify the appropriate subnet mask.
  • Default Gateway: Specify the appropriate Default Gateway in order to enable IP routing.

4. Click OK.

Example: Gateway-to-Gateway VPN with Preshared Secrets

The following is an example gateway-to-gateway VPN setup that uses a preshared secret for authentication. In this example, Gateway A connects the internal LAN 10.5.6.0/24 to the Internet. Gateway A's LAN interface has the address 10.5.6.1, and its WAN (Internet) interface has the address 14.15.16.17.

Gateway B connects the internal LAN 172.23.9.0/24 to the Internet. Gateway B's WAN (Internet) interface has the address 22.23.24.25.

The IKE Phase 1 parameters used are:

  • Main mode
  • 3DES (Triple DES)
  • SHA-1
  • MODP group 2 (1024 bits)
  • Preshared secret of hr5xb84l6aa9r6
  • SA lifetime of 28800 seconds (eight hours) with no Kbytes re-keying

The IKE Phase 2 parameters used are:

  • 3DES (Triple DES)
  • SHA-1
  • ESP tunnel mode
  • MODP group 2 (1024 bits)
  • Perfect forward secrecy for re-keying
  • SA lifetime of 3600 seconds (one hour) with no Kbytes re-keying
  • Selectors for all IP protocols, all ports, between 10.5.6.0/24 and 172.23.9.0/24, using IPv4 subnets

To set up Gateway A for this scenario, use the following steps:

  1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear.
  2. Click New Connection and the wizard screen will appear. Select Internet Protocol Security (IPSec). Click Next. The IPSec Topology screen will appear.
  3. Select Network-to-Network to create a secure connection between your LAN and a remote network. Click Next. The Remote Address Type screen will appear.
  4. Select Remote Gateway Address to allow an IPSec connection from a specific address. Select Remote Subnet to allow an IPSec connection from a specific remote subnet. Click Next. The Connection Parameters screen will appear.
  5. Specify the following parameters:
    • Remote Tunnel Endpoint Address: Specify 22.23.24.25
    • Remote Subnet IP Address: Specify 172.23.9.0
    • Remote Subnet Mask: Specify 255.255.255.0
    • Shared Secret: Specify hr5xb84l6aa9r6
  6. Click Next. The Connection Summary screen will appear. Click Finish. The Network Connections screen will now list the newly created IPSec connection.
  7. Click Edit. The Connection Properties screen will appear. Click Settings. The IPSec Configuration screen will appear.
  8. Deselect the Compress checkbox.
  9. Deselect the Allow Peers to Use MD5 checkbox (located under Hash Algorithm).
  10. Deselect the DH Group 5 (1536 bit) checkbox (located under Group Description Attribute).
  11. Deselect the Allow AH Protocol (No Encryption) checkbox (located under Encryption Algorithm).
  12. Click OK. The Connection Properties screen will appear.
  13. Click OK. The Network Connections screen will appear. Note that the IPSec connections status has changed to Connected.
  14. Click Home on the sidebar to view the Network Map depiction of the IPSec connection.

 

 

Universal Plug and Play (UPnP)

Select the checkbox to allow other users on the network to control the network features.

 

Simple Network Management Protocol (SNMP)

SNMP is a protocol that gathers information on network performance. It helps network administrators find problems and plan for future needs. In an SNMP-managed network, one computer acts as a network management system (NMS). The NMS runs an SNMP application that gathers and displays statistical data about what's happening on the network, storing the data in a management information base (MIB). The USR8200 Firewall/VPN/NAS and other network devices send data to the NMS when it asks. The USR8200 software calls the NMS the trusted peer.

To open the SNMP screen, click on SNMP from the advanced options page.

These are the fields on this screen:

Item Description
Enable SNMP Agent Enable this to have the USR8200 Firewall/VPN/NAS respond to SNMP data collection requests.
Read-Only Community Name A community is a collection of SNMP agents and network management systems. This item identifies what community the USR8200 Firewall/VPN/NAS has read-only access to. The USR8200 Firewall/VPN/NAS can read all of the data in a MIB but not write to it.
Read-Write Community Name This identifies what community the USR8200 Firewall/VPN/NAS has read-write access to. The system can view and change all MIB data for this community.
Trusted Peer This is the IP address of the network management system (NMS), which collects network performance information.
SNMP Traps An SNMP trap is a notification that a specific event (such as a system restart) has occurred on the network. This checkbox enables or disables the generation of SNMP traps by the USR8200 Firewall/VPN/NAS whenever the NMS wants to monitor trap events.

 

System Settings

In this area, you can view and modify the System, File Server, Management Console, Remote Administration, Management Application Ports, System Logging, Security Logging, and Outgoing Mail Server information.

System

Hostname:
Used to set the Hostname by which other computers will see the USR8200 Firewall/VPN/NAS in Network Neighborhood, SMB, etc.

Local Domain:
Used to set the Local Domain. This should be the same as the NetBIOS Workgroup under File Server.

File Server

NetBIOS Workgroup:
Used to set the Workgroup in which the USR8200 Firewall/VPN/NAS will reside in the Network. This should be the same as the Local Domain under System.

Management Console

Automatic Refresh of System Monitoring Web Pages
By default this is not enabled.

Note: If this is enabled when viewing System Monitoring, System Logs, and Security Logs, your unit will be open to security risk if you walk away without exiting those screens.

Warn User Before Network Configuration Changes
If this is enabled, you will receive a notification if any changes are made to the configuration of the network. By default, this is enabled.

Session Lifetime:
This is the inactivity time the USR8200 Firewall/VPN/NAS will wait before asking a user to re-log into the Web-based Management and Telnet. The maximum amount of time that can be entered is 1200 seconds.

Remote Administration

Refer to the Remote Administration section in this User Guide for information about this area.

Management Application Ports

You can modify the following fields:

  • Primary HTTP Port
  • Secondary HTTP Port
  • Primary HTTPS Port
  • Secondary HTTPS Port
  • Primary Telnet Port
  • Secondary Telnet Port
  • Secure Telnet over SSL Port

System Logging

You can change the System Log Buffer Size in Kb. It is recommended that you leave the Buffer at the default size. You can also select the Remote System Notify Level from one of the following:

  • None
  • Error
  • Warning
  • Information

Security Logging

You can change the Security Log Buffer Size in Kb. It is recommended that you leave the Buffer at the default size. You can also select the Remote Security Notify Level from one of the following:

  • None
  • Error
  • Warning
  • Information

Outgoing Mail Server

This is for the outgoing mail server that the USR8200 Firewall/VPN/NAS will use to send out notifications for individual users that have Logging turned on for their account. You will need to enter the Server, the From Email Address, and the Port. You can also select or deselect Server Requires Authentication. If you select Server requires Authentication, you will need to enter the User Name and the Password for the Email account.

 

 

Local FTP Server

This section will allow you to enable, set allowed connections, grant anonymous read/write access, and put in the path to the folder for anonymous users.

General

Enable FTP Server:

This will enable the FTP Server. Users are configured in the Users Settings section of the Advanced Menu.

 

Currently, a user added this way will have access to read or write to all hard disks installed onto the USR8200 Firewall/VPN/NAS.

WAN Access: This will enable a non-local client to make FTP file transfers to and from the USR8200 Firewall/VPN/NAS.

Total FTP Sessions Allowed: This will allow you to choose how many concurrent FTP connections are allowed at a time.

Anonymous User Access

Read Access: This will allow an anonymous user to read files located in the path you provide in the Anonymous Home Directory.

Write Access: This will allow an anonymous user to write/modify files located in the path you provide in the Anonymous Home Directory.

Anonymous Home Directory: This is where you must fill in a path for anonymous users to access a specific folder on a selected Hard Disk partition.

Example paths (drive names are case sensitive): /A/pub, /A/public, or /A/public access

Bandwidth Control

Maximum Tx rate: If you want to limit the FTP data transmission rate, enter the limit here. Enter 0 if you do not want to limit the transmission rate.

Maximum Rx rate: If you want to limit the FTP data receipt rate, enter the limit here. Enter 0 if you do not want to limit the receipt rate.

 

MAC Cloning

A MAC address is the numeric code that identifies a device on a network, such as your external cable/DSL modem or a computer network card. Your service provider may ask you to supply the MAC address of your computer, external modem, or both.

When replacing an external modem with the USR8200 Firewall/VPN/NAS, you can simplify the installation process by copying the MAC address of your existing computer to the USR8200 Firewall/VPN/NAS. In such a case, you do not need to delay the setup process by informing your ISP of newly installed equipment.

 

Using MAC Cloning

  1. Click the MAC Cloning icon in the Advanced screen of the Management Console. The MAC Cloning screen will appear.
  2. Enter the physical MAC address to be cloned.
  3. Click the Clone My MAC Address button.

 

Diagnostics

The Diagnostics screen can assist you in testing network connectivity. This feature will enable you to ping (ICMP echo) an IP address and view statistics such as the number of packets transmitted and received, round trip time, and success status.

Diagnosing Network Connectivity

To diagnose network connectivity, perform the following steps:

  1. Click the Diagnostics icon from the Advanced screen in the management console. The Diagnostics screen will appear.
  2. Enter the IP address to be tested in the Destination field.
  3. Click Go.
  4. In a few seconds, diagnostics statistics will be displayed. If no new information is displayed, click Refresh.

 

Remote Administration

In its default state, the USR8200 Firewall/VPN/NAS blocks all external users from connecting to or communicating with your network. Therefore, the system is safe from hackers who may try to intrude on the network and damage it. However, you may want to enable certain services that grant remote users administrative privileges in your network.

Configuring Remote Administration Services

  1. Click the Remote Administration icon in the Advanced screen of the Management Console. The Remote Administration screen will appear.

  2. Select the check boxes next to the service names that you want to enable and then click OK.




 

Filesystems

The USR8200 Firewall/VPN/NAS can operate as a file server for storage devices that are connected via USB or FireWire. Your home network's LAN devices can share the storage device as a mapped network drive. The Web-based Management provides disk management utilities such as fdisk for partitioning the drive as a physical disk or logical disk, as well as format utilities for formatting the partitions.

The USR8200 Firewall/VPN/NAS supports up to 30 hard disks or 100 separate partitions, whichever comes first. The hard disks can be either daisy chained through FireWire hubs, USB 1.1/2.0 hubs, or a combination of both.

Note: Any hard disk connected through a USB 1.1 hub will not be running at full speed. The performance speed will be lowered as you add more hard disks through a USB 1.1 hub.

Note: For storage devices that come with both a USB 1.1/2.0 connection and a FireWire connection, only one port of the storage device can be used at a time.

When a hard disk or storage device is connected to the USR8200 Firewall/VPN/NAS via USB1.1/2.0 or FireWire, it will register on the network map. Viewing the network map as a list will display information about each storage device that is connected.

 

Note: Before disconnecting any hard disk, it is recommended to unmount the hard disks using the web-based management.

Each hard disk can have up to 16 partitions with an Extended partition and can have a maximum of four main partitions. Main partitions include primary and extended partitions. The following are some different partition configurations you can have in your hard disk.

  • You can have up to three primary partitions and one extended partition or up to four primary partitions. If you have four primary partitions for the main partitions, the hard disk is limited to a total of four partitions.

  • If you have three primary partitions and one extended partition, you can add 12 more partitions through the logical partition within the extended partition.

The File Systems that are supported by the USR8200 Firewall/VPN/NAS for formatting a hard disk(s) partitions are Linux (ext2) and Windows (FAT32).

The File Systems that the USR8200 Firewall/VPN/NAS supports in Read/Write form are Linux (ext2), Windows (FAT12), Windows (FAT16), and Windows (FAT32).

If you are not sure if the hard disk you have connected to the USR8200 Firewall/VPN/NAS is pre-formatted, look in the network map. If the hard disk is pre-formatted, below the hard disk name you will see \\usr8200\A, \\usr8200\B, \\usr8200\C, etc.

If the hard disk you are adding to the USR8200 Firewall/VPN/NAS is pre-formatted and you do not wish to create or modify any partitions, proceed to the Setting up User access rights to the storage devices section in this chapter.

If the hard disk is not pre-formatted, or you are unsure, please proceed to the Managing Partitions section in this chapter.

Note: It is recommended to format the hard disk using EXT2 if you will be transferring large files to the hard disk. If you will not be transferring any files over 4 gigabytes, it is recommended to format the hard disk using FAT32.

top of page

 

Managing Partitions

The following buttons are the different Action icons in the File Management screens. These will appear in the Action column for each hard disk and partition associated with the USR8200 Firewall/VPN/NAS. Only the icons for the actions that can be performed on a hard disk or partition will appear. For example, the Delete a partition icon will not appear if there are no partitions on the hard disk.

 

If you wish to perform an action on a hard disk, click the name of the hard disk in the Network Map screen or in the Network List screen.

 

After clicking the name of the hard disk, you will see an icon on the right for each of the actions that you can perform on that particular hard disk.

top of page

 

Adding New Partitions

When first creating a new partition you will be presented with a wizard to help ensure that nothing important is missed while setting up the hard disk(s).

Note: If you are connecting a new hard disk, it is recommended that you reformat the hard disk through the USR8200 Firewall/VPN/NAS.

Click the Add New partition icon in the Action column for the hard disk you want to partition. You will then need to select which type of partition you want to create: Primary or Extended.

Primary Partition:

  1. Select Primary Partition and then click Next.




  2. The Partition size option will automatically fill in with the maximum amount of free space available for the partition. You can change this size to accommodate the needs you have for the hard disk. Click Next when you are finished selecting the Partition size.




  3. Select Format the partition and click Next.




  4. Choose the type of partition file system for the hard disk that will best suit your needs.

    If the storage device will be connected to a Linux station, you want to choose Linux (EXT2) for the Partition File System. If the storage device will be connected to Windows PCs, then you want to choose Windows (FAT32) for the Partition File System.

    After you have selected the Partition File System, click Next.




  5. After selecting all the options for the partition, you will be shown a summary of these options. If there is a mistake or if you want to change a selection, click Back to restart the process or click Cancel to end the process without performing any operations. If everything is correct, click Finish to create the partition.

top of page

 

Extended Partition

  1. Select Extended Partition and then click Next.




  2. The Partition size option will automatically fill in with the maximum amount of free space available for the partition. You can change this size to accommodate the needs you have for the hard disk.

    If you want to use the remainder of the space on the hard disk to create an Extended partition, leave the Partition size amount as it is and click Next.

    If you think you might want to create another Primary partition, adjust the Partition size to the amount needed for your Extended partition and click Next.



  3. After selecting all the options for the partition, you will be shown a summary of these options. If there is a mistake or if you want to change a selection, click Back to restart the process or click Cancel to end the process without performing any operations. If everything is correct, click Finish to create the partition.


top of page

 

Logical Partition:

After creating an Extended Partition you will need to create Logical partitions.

  1. Click the Add New partition icon in the Action column for the Extended partition in which you want to create Logical partitions.




  2. Make sure Logical Drive is selected and click Next.




  3. The Partition size option will automatically fill in with the maximum amount of free space available for the partition. You can change this size to accommodate the needs you have for the hard disk. Click Next when you are finished selecting the Partition size.




  4. Select Format the partition and click Next.




  5. Choose the type of partition file system for the Logical partition that will best suit your needs.

    If the storage device will be connected to a Linux station, you want to choose Linux (EXT2) for the Partition File System. If the storage device will be connected to Windows PCs, then you want to choose Windows (FAT32) for the Partition File System.

    After you have selected the Partition File System, click Next.




  6. After selecting all the options for the partition, you will be shown a summary of these options. If there is a mistake or if you want to change a selection, click Back to restart the process or click Cancel to end the process without performing any operations. If everything is correct, click Finish to create the partition.






    Note: If you did not fill the Extended partition because you have a need for more logical partitions, you can continue to create Logical partitions until there is not room for any more in the Extended partition.

top of page

 

Scanning Partitions

Scanning a partition is similar to running a chkdsk or Scandisk in Windows or fsck in Linux. Scanning a partition will check the hard disk for errors and attempt to fix them if any are discovered.

  1. Click the Edit icon to the right of the partition you want to scan.



  2. Click Check Partition to perform a scan of the partition.



  3. A window will show you the status of the scan.




  4. When it is finished and you are returned to the Partition Properties screen, click Close to return to the File Server Disk Information screen.


 

If the hard disk has been formatted somewhere other than the USR8200 Firewall/VPN/NAS or if the hard disk is over 120 gigabytes in capacity, you may receive an error when performing a scan. The reason for this is either the method that the hard disk was formatted or the sector size. If you receive an error, you will need to connect the hard disk directly to a PC or Linux computer and perform the scan from within that computer.

 

top of page

 

Formatting a Partition

If you need to format a partition for any reason after initial setup, follow the steps below.

Note: It is recommended to format the hard disk using EXT2 if you will be transferring large files to the hard disk. If you will not be transferring any files over 4 gigabytes, it is recommended to format the hard disk using FAT32.

  1. Click the Format a partition icon in the Action column.




  2. Choose the type of partition format that will best suit your needs.

    If the storage device will be connected to a Linux station or if you will be transferring large files over 4 gigabytes, you want to choose Linux (EXT2) for the Partition Format. If the storage device will be connected to Windows PCs or if you will not be transferring any files larger than 4 gigabytes, then you want to choose Windows (FAT32) for the Partition Format.

    After you have selected the Partition File System, click Next.





  3. The following warning will appear because the partition is in use by the File Server and may contain files on it. If you are sure that you still want to format the partition, click OK.



top of page


Deleting a Partition

To delete a partition, click the Delete a partition icon in the Action column.

 

If you are certain that you want to delete the partition, click OK.

 

top of page

 

Unmounting a Hard Disk

Even though USB connections and FireWire connections are Plug and Play, any storage devices that you wish to disconnect from the USR8200 Firewall/VPN/NAS need to be unmounted properly. With the USR8200 Firewall/VPN/NAS, this is done in the File Server Disk Information interface of the Web-based management.

 

  1. Select the hard disk you want to unmount in the Network List View screen.




  2. Click Unmount in the File Server Disk Information screen.




  3. Once the hard disk has been Unmounted, you can either remount the drive or unplug it safely from the FireWire or USB connection of the USR8200 Firewall/VPN/NAS.

    Note: If you are unmounting a FireWire hard disk and there are more hard disks daisy chained behind the USR8200 Firewall/VPN/NAS, you will also need to unmount all the devices behind the one you need to disconnect. You can then re-connect the other hard disks in the daisy chain.



top of page

 

Renaming a partition

If you want to change the name of a partition on a hard disk, perform the following steps:

  1. Click Home in the left menu and then click the name of the Hard Drive in the Network map.



  2. Click the Edit icon for the partition you want to rename.



  3. Click Unmount in the Partition Properties screen.



  4. You will then be able to change the name of the partition in the Share Name field. When you are finished changing the name, click Mount and then click Close.



  5. You will then see the new partition name in the Share Name list.


top of page

 

Setting up User access rights to the storage devices

To assign User access rights, click Users in the Advanced Menu.

You can create users that have access only to the storage devices by selecting either Read Files from File Server or by selecting both Read Files from File Server and Write Files to File Server.

Note: Windows 95, Windows 98, and Windows Me clients that will be connecting to the USR8200 Firewall/VPN/NAS to access the File Server must enter the user name and password in all lowercase letters, not UPPERCASE or Capital Letters. This is because those Window versions pass everything to the server in lowercase.

Note: During any file disk utility action, none of the hard disks connected to the USR8200 Firewall/VPN/NAS can be accessed.

 

 

 

When a storage device is connected to the USR8200 Firewall/VPN/NAS via USB or FireWire, it will appear on the network map. Viewing the network map as a list will display information about the storage device.

Partition names are designated as "a", "b", "c", etc. To access the storage device's partitions from computers on the LAN, you must map a network drive using the designated partition name. The available partition names can be viewed in the network map list.
Managing Partitions

Use the following action buttons to perform disc utility and management operations on your storage device:

 

Adding a New Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

 

2. Click Add Partition and the Partition Settings screen will appear.

3. Enter the volume of the new partition (in MB).

4. Select the Make Partition Bootable checkbox to make the new partition bootable.

5. Click OK.

 

Deleting a Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

2. Click Delete Partition.

 

Formatting a Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

2. Click Partition Format and the Partition Format screen will appear.

3. Select the type of file system for the partition.

4. Click OK.

 

Scanning a Partition

1. Click the File Server icon on the Network Map and the File server information screen will appear.

2. Click Scan Partition and the screen will refresh and display a summary of the partition scan.



 

Print Server

The USR8200 Firewall/VPN/NAS provides both LPD and Microsoft shared printing functionality. Microsoft shared printing offers easy installation and management. LPD printing offers robust services for large print jobs, without the need to dedicate large amounts of on board memory to job spooling.

Setting up an LPD Printer in Windows XP

1. Click the Printers and Faxes icon in Control Panel.

2. Click Add a Printer to activate the Add Printer Wizard and then click Next.

 

3. Select Local printer attached to this computer. Deselect Automatically detect and install my Plug and Play printer click Next.

 

4. In the Select a Printer Port screen, select Create a new port. Select Standard TCP/IP Port in the Type of port dropdown menu. Click Next to activate the Add Standard TCP/IP Printer Port Wizard. Click Next.

 

5. Specify 192.168.1.1 in the Printer Name or IP Address and click Next.

 

6. Select Custom and click Settings. Configure the following parameters:

  • Select LPR for the protocol.
  • Access the Web-based Management console of the USR8200. Click Home on the side-bar to display the Network Map. Locate the name of the printer in the Network Map and enter that name in the Queue Name of the Printer Wizard screen. Click OK.


 

7. Click Finish. The Add Printer Software wizard will appear.

8. Select your printer manufacturer and model from the lists. If your printer manufacturer or model do not appear in the lists, click Have disk to specify the driver location.

9. Specify the name you want to give the printer and whether you want it to be the default printer.

10. Click Next and then click Next again. Select Yes to print a test page.

11. Click Finish to complete the setup procedure.

 

Setting up a Microsoft Shared Printer

1. Open the Web-based Management console for the USR8200 by launching a Web browser and entering 192.168.1.1 The disk and printer shares available on the USR8200 will be displayed.

2. Click the printer icon.

3. Follow the instructions displayed by the printer installation wizard.

 

 

Restore Defaults

You may sometimes want to restore the USR8200 Firewall/VPN/NAS's factory default settings. This may happen, for example, when you want to build a new network from the beginning, or when you cannot recall changes made to the network and want to go back to the default configuration.

To restore default settings:

  1. Click the Restore Defaults icon in the Advanced screen of the Management Console. The Restore Defaults screen will be displayed.
  2. Click OK to restore the USR8200 Firewall/VPN/NAS's factory default settings.

Note: All Web-based settings and management parameters, not only those in the Advanced section, will be restored to their default values. This includes the Administrator password; a user-specified password will no longer be valid.

 

Restart

To restart your USR8200 Firewall/VPN/NAS:

  1. Click the Restart icon in the Advanced screen of the Management Console. The Restart screen will be displayed.
  2. Click OK to restart the USR8200 Firewall/VPN/NAS. This may take up to one minute. To reenter the Management Console after restarting the gateway, click the browser's Refresh button.

 

 

Technical Information

To view technical information regarding the USR8200 Firewall/VPN/NAS:

  1. Click the Technical Information icon in the Advanced screen of the Management Console. The Technical Information screen will be displayed.




  2. Click the Configuration File button to view the complete contents of the USR8200 Firewall/VPN/NAS's configuration file.


 

Using Telnet

The USR8200 Firewall/VPN/NAS supports Telnet. If your computer runs Windows, you can use Telnet by clicking on Start and selecting Run. Enter telnet followed by the IP address of the USR8200 Firewall/VPN/NAS.

Log in with the user name and password you normally use.

Once you're logged in, you can open a UNIX-like shell by entering the shell command:

 

USRobotics