QNO VPN QoS User manual

English User’s Manual
VPN QoS Wireless Router
1x100Mbps WAN + 4x100Mbps Switch LAN + 2xUSB
Family &Small Business IPSec VPN Solution

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
I
Product Manual Using Permit Agreement
[Product Manual (hereafter the "Manual") Using Permit Agreement] hereafter the "Agreement" is the using
permit of the Manual, and the relevant rights and obligations between the users and Qno Technology Inc
(hereafter "Qno"), and is the exclusion to remit or limit the liability of Qno. The users who obtain the file of this
manual directly or indirectly, and users who use the relevant services, must obey this Agreement.
Important Notice: Qno would like to remind the users to read the clauses of the "Agreement" before
downloading and reading this Manual. Unless you accept the clauses of this "Agreement", please return this
Manual and relevant services. The downloading or reading of this Manual is regarded as accepting this
"Agreement" and the restriction of clauses in this "Agreement".
【1】Statement of Intellectual Property
Any text and corresponding combination, diagram, interface design, printing materials or electronic file are
protected by copyright of our country, clauses of international copyright and other regulations of intellectual
property. When the user copies the "Manual", this statement of intellectual property must also be copied and
indicated. Otherwise, Qno regards it as tort and relevant duty will be prosecuted as well.
【2】Scope of Authority of "Manual"
The user may install, use, display and read this "Manual on the complete set of computer.
【3】User Notice
If users obey the law and this Agreement, they may use this "Manual" in accordance with "Agreement". The
"hardcopy or softcopy" of this Manual is restricted using for information, non-commercial and personal
purpose. Besides, it is not allowed to copy or announce on any network computer. Furthermore, it is not
allowed to disseminate on any media. It is not allowed to modify any part of the "file". Using for other purposes
is prohibited by law and it may cause serious civil and criminal punishment. The transgressor will receive the
accusation possibly.
【4】Legal Liability and Exclusion
【4-1】Qno will check the mistake of the texts and diagrams with all strength. However, Qno, distributors, and
resellers do not bear any liability for direct or indirect economic loss, data loss or other corresponding
commercial loss to the user or relevant personnel due to the possible omission.
【4-2】In order to protect the autonomy of the business development and adjustment of Qno, Qno reserves

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
II
the right to adjust or terminate the software / Manual any time without informing the users. There will be no
further notice regarding the product upgrade or change of technical specification. If it is necessary, the change
or termination will be announced in the relevant block of the Qno website.
【4-3】All the set parameters are examples and they are for reference only. You may also purpose your
opinion or suggestion. We will take it as reference and they may be amended in the next version.
【4-4】This Manual explains the configuration of all functions for the products of the same series. The actual
functions of the product may vary with the model. Therefore, some functions may not be found on the product
you purchased.
【4-5】Qno reserves the right to change the file content of this Manual and the Manual content may not be
updated instantly. To know more about the updated information of the product, please visit Qno official
website.
【4-6】Qno (and / or) distributors hereby declares that no liability will be born for any guarantee and condition
of the corresponding information. The guarantee and condition include tacit guarantee and condition about
marketability, suitability for special purposes, ownership, and non-infringement. The name of the companies
and products mentioned may be the trademark of the owners. Qno (and/or) the distributors do not provide the
product or software of any third party company. Under any circumstance, Qno and / or distributors bear no
liability for special, indirect, derivative loss or any type of loss in the lawsuit caused by usage or information on
the file, no matter the lawsuit is related to agreement, omission, or other tort.
【5】Other Clauses
【5-1】The potency of this Agreement is over any other verbal or written record. The invalidation of part or
whole of any clause does not affect the potency of other clauses.
【5-2】The power of interpretation, potency and dispute are applicable for the law of Taiwan. If there is any
dissension or dispute between the users and Qno, it should be attempted to solve by consultation first. If it is
not solved by consultation, user agrees that the dissension or dispute is brought to trial in the jurisdiction of
the court in the location of Qno. In Mainland China, the "China International Economic and Trade Arbitration
Commission" is the arbitration organization.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
III
Content
I. Introduction ............................................................................................................... 6
II. Multi- WAN VPN Router Installation ........................................................................... 8
2.1 Systematic Setting Process ................................................................................................ 8
2.2 Setting Flow Chart ............................................................................................................. 8
III. Hardware Installation............................................................................................... 11
3.1 LED Signal ........................................................................................................................ 11
3.2 VPN Router Network Connection.................................................................................... 12
IV. Login ........................................................................................................................ 13
V. V. Device Spec Verification, Status Display and Login Password and Time Setting ...... 15
5.1 Home Page....................................................................................................................... 15
5.1.1 WAN Status................................................................................................................15
5.1.2 Physical Port Status....................................................................................................16
5.1.3 System Information ...................................................................................................18
5.1.4 Firewall Status ...........................................................................................................19
5.2 Change and Set Login Password and Time...................................................................... 20
5.2.1 Password Setting .......................................................................................................20
5.2.2 Time...........................................................................................................................21
VI. Network................................................................................................................... 23
6.1 Network Connection ....................................................................................................... 23
6.1.1 Host Name and Domain Name..................................................................................23
6.1.2 LAN Setting ................................................................................................................23
6.1.3 WAN Settings.............................................................................................................25
6.2 Multi- WAN Setting.......................................................................................................... 37
6.2.1 Load Balance Mode ...................................................................................................38
6.2.2 Network Service Detection........................................................................................42
6.2.3 Protocol Binding ........................................................................................................45
6.3 Advanced features of 3G/3.5G USB Modems ...................................................................... 55
6.3.1 Performance Mode (Always Connected).....................................................................58
6.3.2 Backup Mode ...............................................................................................................58
6.3.3 Smart Mode .................................................................................................................59
6.3.4 Scheduling Mode .........................................................................................................62
VII. Intranet Configuration .............................................................................................. 63
7.1 Port Management ........................................................................................................... 63
7.2 IP/ DHCP .......................................................................................................................... 64
7.3 DHCP Status..................................................................................................................... 66

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
IV
7.4 IP & MAC Binding ............................................................................................................ 70
VIII. Wireless Network......................................................................................................74
8.1 Basic Configuration.............................................................................................................. 75
8.2 Security Setting.................................................................................................................... 77
8.3 Station List ........................................................................................................................... 85
8.4 Statistic ................................................................................................................................ 85
IX. QoS (Quality of Service)............................................................................................ 86
9.1 Bandwidth Management................................................................................................. 87
9.1.1 The Maximum Bandwidth provided by ISP ...............................................................88
9.1.2 QoS ............................................................................................................................89
9.2 Session control ................................................................................................................ 95
9.3 Smart QoS........................................................................................................................ 98
X. Firewall...................................................................................................................100
10.1 General Policy................................................................................................................ 100
10.2 Access Rule .................................................................................................................... 104
10.2.1 Add New Access Rule...............................................................................................105
10.3 Content Filter ................................................................................................................ 108
XI. L7 Management ......................................................................................................113
11.1 L7 Filter (1) Rule list:..................................................................................................... 113
11.2 L7 VIP Priority Channel .................................................................................................... 117
11.3 L7 QoS.............................................................................................................................. 122
11.4 Application Define ........................................................................................................... 128
11.5 Applicatios Status ............................................................................................................ 130
11.6 Database Update ............................................................................................................. 131
XII. VPN (Virtual Private Network) .................................................................................134
10.1. VPN ................................................................................................................................. 134
10.1.1. Add a New VPN Tunnel ...........................................................................................135
10.1.2. PPTP Server.............................................................................................................156
10.1.3. VPN Pass Through ...................................................................................................158
10.2. QVM VPN Function Setup .............................................................................................. 159
XIII. Advanced Function..................................................................................................161
11.1 DMZ Host/ Port Range Forwarding ................................................................................. 161
11.1.1 DMZ Host .................................................................................................................161
11.1.2 Port Range Forwarding ............................................................................................161
11.2 UPnP ................................................................................................................................ 164
11.3 Routing ............................................................................................................................ 165

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
V
11.4 One to One NAT............................................................................................................... 167
10.5 DDNS- Dynamic Domain Name Service........................................................................... 169
11.6 MAC Clone ....................................................................................................................... 175
XIV. System Tool .............................................................................................................176
12.1 Diagnostic ........................................................................................................................ 176
12.2 Firmware Upgrade........................................................................................................... 178
12.3 Configuration Backup ...................................................................................................... 179
12.4 SNMP ............................................................................................................................... 180
12.5 System Recover ............................................................................................................... 182
XV. Log..........................................................................................................................184
13.1 System Log....................................................................................................................... 184
13.2 System Statistic................................................................................................................ 189
13.3 Traffic Statistic ................................................................................................................. 190
13.4 IP/ Port Statistic ............................................................................................................... 192
XVI. Log out....................................................................................................................195
Appendix I:Troubleshooting................................................................................................196
(1) Block BT Download............................................................................................................. 196
(2)Shock Wave and Worm Virus Prevention ..................................................................... 197
(3)Block QQLive Video Broadcast Setting.......................................................................... 199
(4)ARP Virus Attack Prevention ......................................................................................... 201
Appendix II:Qno Technical Support Information ..................................................................209

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
6
I. Introduction
IPSec VPN QoS Router (referred as VPN Router hereby) is a business level security router that
efficiently integrates new generation multiple WAN-port devices. It meets the needs of medium
enterprises, internet cafés, campus, dorm and communities, etc.
VPN Router has 2 10/100 Base-T/TX Ethernets (RJ45) WAN ports. These WAN ports can support
auto load balance mode, exclusive mode (remaining WAN balance), and stategy routing mode for
high-efficiency network. They offer super flexibility for network set-up. Moreover, these WAN ports also
support DHCP, fixed IP, PPPoE, transparent bridge, VPN connection, port binding, static routing,
dynamic routing, NAT, one to one NAT, PAT, MAC Clone, as well as DDNS. As for LAN ports including
one DMZ, they support 2 10/100 Base-T/TX Ethernet (RJ45) ports and provide the features of Microsoft
UPnP, and transparent bridge mode. Internet IP addresses can also be used in intranet.
To fulfill the requirement for a highly secure and integrated firewall, VPN Router has a 64-bit
hardware acceleration, high-speed, high-efficiency processor embedded. With high processing speed,
plusing high standard SDRAM and Flash, VPN Router brings users super networking efficiency. Its
processing speed and capacity are almost equal to those of expensive enterprise-level VPN Routers.
This is why the device is so popular with modern enterprises.
In addition to internet connectability, for the broadband market, VPN Router has the function of VPN
virtual network connection. It is equipped with a virtual private network hardware acceleration mode
which is widely used in modern enterprises, and offers full VPN functionality.
Qno is a supporter of the IPSec Protocol. IPSec VPN provides DES, 3DES, AES128, AES192,
AES256 encryption, MD5, SH1 certification, IKE Pre-Share Key, or manual password interchange. VPN
Router also supports aggressive mode. When a connection is lost, VPN Router will automatically
re-connect. In addition, the device features NetBIOS transparency.
VPN Router offers the function of a standard PPTP server, which is equipped with connection
setting status. Each WAN port can be set up with multiple DDNS at the same time. It is also capable of
establishing VPN connections with dynamic IP addresses.
VPN Router also has unique QVM VPN- SmartLink IPSec VPN. Just input VPN server IP, user
name, and password, and IPSec VPN will be automatically set up. Through VPN Router exclusive QVM
function, it offers easy VPN allocation for users; users can do it even without a network administrator.
VPN Router enables enterprises to benefit from VPN without being troubled with technical and network
management problems. The central control function enables the host to log in remote client computers at
any time. Security and secrecy are guaranteed to meet the IPSec standard, so as to ensure the
continuity of VPN service.
The advanced built-in firewall function enables VPN Router to resist most attacks from the Internet.
It utilizes active detection technology SPI (Stateful Packet Inspection). The SPI firewall functions mainly
within the network by dynamically inspecting each link. The SPI firewall also has a warning function for
the application process; therefore, it can refuse links to non-standard communication protocols. VPN
Router supports network address translation (NAT) function and routing modes. It makes the network
environment more flexible and easier to manage.
Through web- based UI, VPN Router enables enterprises to have their own network access rules .
To control web access, users can build and edit filter lists. It also enables users to ban or monitor

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
7
websites according to their needs. By the filter setting and complete OS management, school and
business internet management will be clearly improved. VPN Router offers various on-line SysLog
records. It supports on-line management setup tools; it makes setting up networks easy to understand. It
also reinforces the management of network access rules, VPN, and all other network services.
VPN Router fully protects the safety of communication between all offices and branches of an
organization. It helps to free enterprises from increasing hacker intrusion. With an exclusive independent
operation platform, users are able to set up and use a firewall without professional network knowledge.
VPN Router setting up and management can be carried out through web browsers, such as IE, Netscape,
etc.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
8
II. Multi- WAN VPN Router Installation
In this chapter we are going to introduce hardware installation. Through the understanding of
multi-WAN setting process, users can easily setup and manage the network,making VPN Router
functioning and having best performance.
2.1 Systematic Setting Process
Users can set up and enable the network by utilizing bandwidth efficiently. The network can
achieve the ideal efficientness,block attacks, and prevent security risks at the same time. Through the
process settings, users can install and operate VPN Router easily. This simplifies the management
and maintenance, making the user network settings be done at one time. The main process is as
below:
1. Hardware installation
2. Login
3. Verify device specification and set up password and time
4. Set WAN connection
5. Set LAN connection: physical port and IP address settings
6. Set QoS bandwidth management: avoid bandwidth occupation
7. Set Firewall: prevent attack and improper access to network resources
8. Other settings: UPnP, DDNS, MAC Clone
9. Management and maintenance settings: Syslog, SNMP, and configuration backup
10. VPN (Virtual Private Network)
11. Logout
2.2 Setting Flow Chart
Below is the description for each setting process, and the crospondent contents and purposes. For
detailed functions, please refer to Appendix I: Setting Inferface and Chapter Index.
#
Setting
Content
Purpose

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
9
1
Hardware installation
Configure the
network to meet
user’s demand.
Install the device hardware based on user
physical requirements.
2
Login
Login the device with
Web Browser.
Login the device web- based UI.
3
Verify device
specification
Verify Firmware
version and working
status.
Verify the device specification, Firmware
version and working status.
Set password and time
Set time and re- new
password.
Modify the login password considering safe
issue.
Synchronize time with WAN.
4
Set WAN connection
Verify WAN
connection setting,
bandwidth allocation,
and protocol binding.
Connect to WAN. Configure bandwidth to
optimize data transmission.
5
Set QoS bandwidth
management: avoid
bandwidth occupation
Restrict bandwidth
and session of WAN
ports, LAN IP and
application.
To assure transmission of important
information, manage and allocate the
bandwidth further to achieve best efficiency.
6
Set Firewall: prevent
attack and improper
access to network
resources
Block attack, Set
Access rule and
restrict Web access.
Administrators can block BT to avoid bandwidth
occupation, and enable access rules to restrict
employee accessing internet improperly or
using MSN, QQ and P2P during working time.
They can also protect network from Worm or
ARP attacking.
7
Advanced Settings:
DMZ/Forwarding,
UPnP, DDNS, MAC
Clone
DMZ/Forwarding,
UpnP, Routing Mode,
multiple WAN IP,
DDNS and MAC
Clone
DMZ/Forwarding, UPnP, Routing Mode,
multiple WAN IP, DDNS and MAC Clone

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
10
8
Management and
maintenance settings:
Syslog, SNMP, and
configuration backup
Monitor VPN Router
working status and
configuration backup.
Administrators can look up system log and
monitor system status and inbound/outbound
flow in real time.
9
VPN Virtual Private
Network
Configure VPN
tunnels
Configure different types of VPN to meet
different application environment.
10
Logout
Close configuration
window.
Logout VPN Router web- based UI.
We will follow the process flow to complete the network setting in the following chapters.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
11
III. Hardware Installation
In this chapter we are going to introduce hardware interface as well as physical installation.
3.1 LED Signal
LED Signal Description
LED
Color
Description
Power
Green
Green LED on: Power ON
DIAG
Amber
Amber LED on: System self-test is running.
Amber LED blinking: System not ready
Amber LED off: System self-test is completed successfully.
Link/Act
Green
Green LED on: Port has been connected & Get IP.
Green LED blinking: Packets are transmitting through Ethernet port.
100M- Speed
Amber
Amber LED on: Ethernet is running at 100Mbps.
Amber LED off: Ethernet is running at 10Mbps.
WLAN
Green
Green LED on: Wireless function is enabled.
Green LED blinking: Packets are transmitting.
WPS
Green
Green LED on: WPS function is working.
Reset
Action
Description
Press Reset Button For 5 Secs
Warm Start
DIAG indicator: Amber LED flashing slowly.
Press Reset Button Over 10 Secs
Factory Default
DIAG indicator: Amber LED flashing quickly.
System Built-in Battery
A system timing battery is built into the device. The lifespan of the battery is about 1~2 years. If the
battery life is over or it can not be charged, the device will not be able to record time correctly, nor
synchronize with internet NTP time server. Please contact your system supplier for information on how to
replace the battery.
Attention!
Do not replace the battery yourself; otherwise irreparable damage to the product may be caused.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
12
3.2 VPN Router Network Connection
WAN connection:AWAN port can be connected with xDSL Modem, Fiber Modem, Switching Hub, or
through an external router to connect to the Internet.
LAN Connection: The LAN port can be connected to a Switching Hub or directly to a PC. Users can
use servers for monitoring or filtering through the port after “Physical Port Mangement” configuration is
done.
DMZ : The DMZ port can be connected to servers that have legal IP addresses, such as Web servers,
mail servers, etc.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
13
IV. Login
This chapter is mainly introducing Web- based UI after conneting the device.
First, check up the device’s IP address by connecting to DOS through the LAN PC under the device. Go
to Start → Run, enter cmd to commend DOS, and enter ipconfig for getting Default Gateway address, as the
graphic below, 192.168.1.1. Make sure Default Gateway is also the default IP address of the router.
Attention!
When not getting IP address and default gateway by using “ipconfig”, or the received IP address is
0.0.0.0 and 169.X.X.X, we recommend that users should check if there is any problem with the circuits
or the computer network card is connected nicely.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
14
Then, open webpage browser, IE for example, and key in 192.168.1.1 in the website column. The login
window will appear as below:
The device’s default username and password are both “admin”. Users can change the login password
in the setting later.
Attention!
For security, we strongly suggest that users must change password after login. Please keep the
password safe, or you can not login to the device. Press Reset button for more than 10 sec, all the
setting will return to default.
After login, the device’s web- based UI will be shown. Select the language on the upper right corner of the
webpage. The language chosen will be in blue. Please select “English’ as below.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
15
V. V. Device Spec Verification, Status Display and Login Password and Time Setting
This chapter introduces the device specification and status after login as well as change password and
system time settings for security.
5.1 Home Page
In the Home page, all the device’s parameters and status are listed for users’ reference.
5.1.1WAN Status
IPAddress:
Indicates the current IP configuration for WAN port.
Default Gateway:
Indicates current WAN gateway IP address from ISP.
DNS Server:
Indicates the current DNS IP configuration.
Session:
Indicates the current session number for each WAN in the device.
Downstream
Bandwidth
Usage(%):
Indicates the current downstream bandwidth usage(%) for each WAN.
Upstream
Bandwidth
Indicates the current upstream bandwidth usage(%) for each WAN.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
16
Usage(%):
DDNS:
Indicates if Dynamic Domain Name is activated. The default configuration is “Off”.
Quality of Service:
Indicates how many QoS rules are set.
Manual Connect:
When “Obtain an IP automatically” is selected, two buttons (Release and
Renew) will appear. If a WAN connection, such as PPPoE or PPTP, is selected,
“Disconnect” and “Connect” will appear.
DMZ IP Address:
Indicates the current DMZ IP address.
5.1.2Physical Port Status
The status of all system ports, including each connected and enabled port, will be shown on this
Home page (see above table). Click the respective status button and a separate window will appeare to
show detailed data (including setting status summary and statisitcs) of the selected port.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
17
The current port setting status information will be shown in the Port Information Table. Examples: type
(10Base-T/100Base-TX), iniferface (WAN/ LAN/ DMZ), link status (Up/ Down), physical port status (Port
Enabled/ Port Disabled), priority (high or normal), speed status (10Mbps or 100Mbps), duplex status (Half/
Full), auto negotiation (Enabled or Disabled). The tabble also shows statistics of Receive/ Transmit Packets,
Receive/Transmit Packets Byte Count as well as Error Packets Count.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
18
5.1.3System Information
LAN IP/Subnet Mask:Identifies the current device IP address. The default is 192.168.1.1.
Working Mode:Indicates the current working mode. Can be NAT Gateway or Router mode. The default
is “NAT Gateway” mode.
System Active Time:Indicates how long the Router has been running.
Serial Number:This number is the Router serial number.
Firmware Version:Information about the Router present software version.
Current Time:Indicates the device present time. Please note: To have the correct time, users must
synchronize the device with the remote NTP server first.
CPU Usage:Indicates the current router CPU usage percentage.
Memory Usage:Indicates the current router memory usage percentage.
Total Session:Indicates the current router session connection quantity.

V
VP
PN
N
Q
Qo
oS
S
W
Wi
ir
re
el
le
es
ss
s
R
Ro
ou
ut
te
er
r
19
5.1.4Firewall Status
SPI (Stateful Packet Inspection):Indicates whether SPI (Stateful Packet Inspection) is on or off. The
default configuration is “On”.
DoS (Denial of Service):Indicates if DoS attack prevention is activated. The default configuration is
“On”.
Block WAN Request:Indicates that denying the connection from Internet is activated. The default
configuration is “On”.
Prevent ARP Virus Attack:Indicates that preventing Arp virus attack is acitvated. The default
configuration is “Off”.
Remote Management: Indicates if remote management is activated (on or off). Click the hyperlink to
enter and manage the configuration. The default configuration is “Off”.
Access Rule:Indicates the number of access rule applied in the device.
Table of contents