ShareTech LB-1105 User manual

LB-1105 User Manual

LB-1105 User Manual
2
Copyright Notice
Copyright Incorporated 2000-2008. All rights reserved.
Disclaimer
Incorporated shall not be liable for technical or editorial errors or omissions
contained herein; nor for incidental or consequential damages resulting from
furnishing this material, or the performance or use of this product.
Incorporated reserves the right to change the product specification without notice.
Information in this document may change without notice.
Trademarks
Microsoft, Windows 95, 98, ME, 2000, NT, and XP are registered trademarks of
the Microsoft Corporation. All other brand and product names mentioned herein
may be registered trademarks of their respective owners.
Customers should ensure that their use of this product does not infringe upon
any patent rights. Trademarks mentioned in this publication are sued for
identification purposes only and are properties of their respective companies.

LB-1105 User Manual
3
Table of Contents
Introduction ......................................................................................................................5
Features ............................................................................................................................5
Minimum Requirements...................................................................................................6
Hardware ..........................................................................................................................6
Installation........................................................................................................................6
Configuring the Clients....................................................................................................7
Status ................................................................................................................................8
System Profile ..........................................................................................................8
PPTP Server Tunnels ............................................................................................9
PPTP Client Tunnels ..............................................................................................9
Online Users.............................................................................................................9
L2TP Server Tunnels .............................................................................................9
IPSec Tunnels........................................................................................................10
DHCP IP Assignment...........................................................................................10
DDNS........................................................................................................................10
Network Setup................................................................................................................11
WAN Interface........................................................................................................11
Virtual Server..........................................................................................................12
Software DMZ ........................................................................................................12
Multi-DMZ................................................................................................................13
LAN Interface..........................................................................................................13
Destination Route..................................................................................................14
DDNS........................................................................................................................14
Alias IP .....................................................................................................................15
Wireless..........................................................................................................................15
WDS..........................................................................................................................15
Settings ....................................................................................................................16
Security ....................................................................................................................18
MAC Filter................................................................................................................19
Firewall...........................................................................................................................20
Special Rules..........................................................................................................20
Service Management ...........................................................................................21
MAC Filter................................................................................................................22
Access Rules..........................................................................................................23
Traffic Control ...............................................................................................................24
Service Management ...........................................................................................24
Link Bandwidth.......................................................................................................24
IP Management......................................................................................................25
VPN................................................................................................................................26

LB-1105 User Manual
4
Users.........................................................................................................................26
PPTP Client ............................................................................................................26
PPTP.........................................................................................................................28
L2TP .........................................................................................................................28
IPSec ........................................................................................................................29
Access Control ...............................................................................................................30
RADIUS....................................................................................................................30
Local Account.........................................................................................................31
Authentication Setting ..........................................................................................32
Log .................................................................................................................................33
View Log ..................................................................................................................33
Log Setting ..............................................................................................................33
System Service...............................................................................................................34
Version .....................................................................................................................34
UPNP........................................................................................................................35
Time ..........................................................................................................................35
Restore.....................................................................................................................37
Diagnostic................................................................................................................37
Centralized Control ...............................................................................................38
Backup .....................................................................................................................38
Administrator...........................................................................................................39
MISC ..............................................................................................................................40
Reboot......................................................................................................................40
Logout.......................................................................................................................40

LB-1105 User Manual
5
Introduction
The Wireless Guard features zero configuration connectivity, which means that
as an administrator you do not need to reconfigure every computer’s TCP/IP
information, which attempts to connect to your network. However, given the
simplicity of connecting, other access control methods needed to be designed.
The Wireless Guard solves this solution by requiring all users to authenticate
themselves before they are allowed to use the Internet. Authentication is simple
and easy, all users need to attempt to connect to some web site, and the
Wireless Guard will automatically redirect them to an authentication page, where
they enter their username and password. If the administrator should so choose,
the Wireless Guard will also verify if the MAC address of the computer attempting
to connect with a specific username and password is valid, denying access if not.
Once the user has authenticated himself with the Wireless Guard, he will be
redirected to his originally intended website, if it is a legal URL, and his computer
is now free to use other services such as email and instant messaging. The last
of which is of course at the discretion of the network administrator as the
Wireless Guard can be configured to block services with its firewall capabilities.
Features
zZero configuration connectivity
zSimple and powerful access control system
zSupports up to 128bit-WEP encryption
zSupports IPSec and PPTP pass through
zConfigurable as a DHCP server
zPort Filtering, MAC address filtering
zUniversal Plug and Play
zRemote administration
zPPTP VPN tunneling for wireless clients
zSoftware DMZ
zPort forwarding
zNAT firewall

LB-1105 User Manual
6
Minimum Requirements
•One PC equipped with:
oTCP/IP Protocol
oA web browser
oAn Ethernet adapter with a UTP CAT 5 network cable OR A
wireless Ethernet adapter supporting 802.11n.
•Internet access via cable modem or DSL modem with an Ethernet
connection.
Hardware
The Wireless Guard has 6 LEDs on the front panel, 4 of which are network
connection LEDs which correspond to network connections made by connecting
cables to the LAN interfaces (Green) of the device. They are paired to show
connectivity and whether the link is a 10 megabit or 100 megabit connection. One
LED corresponds to the connection to the WAN interface (Green), and whether
its link is 10 megabit or 100 megabit respectively. One LED for power (Blue).
Installation
Installation of the Wireless Guard is simple:
1. Plug in the network cable from the WAN interface of the Wireless Guard to
your DSL modem or cable modem.
2. Plug in a network cable from your computer to one of the four LAN interfaces
on the Wireless Guard OR configure your computer’s wireless interface to
use the Wireless Guard which has a default SSID of “AP001”. You do not
need to change your computer’s TCP/IP settings in either case.
3. Plug in the power to your Wireless Guard.
4. The Wireless Guard comes with default DHCP server enabled for range
(192.168.1.2- 192.168.1.254), Set the networking TCP/IP properties of the
system connected to Wireless Guard to get IP automatically from the DHCP
server. The Wireless Guard will assign a IP address to the connected PC.
5. Open a web browser. Change the URL shown at the top to use port 9953 by
typing http://192.168.1.1:9953
6. Once you have hit enter, the Wireless Guard will prompt you to enter a
username and password. The default username and password to log into the
administrative user interface is admin and admin.

LB-1105 User Manual
7
7. Once you login you will see the administrative interface to configure.
8. Click on Network Setup>Click on WAN Interface.
9. Select the radio button corresponding to your type of network connection.
10.Enter the pertinent information.
DSL providers generally use PPPoE connections, in which case you
have a username and password.
Cable modem providers generally use DHCP connections, in which
case you do not need to provide anymore information to connect.
DSL and cable modem providers sometimes provide static IP services
as well as other type of installations. This will require the Fixed IP
setting and you will need to provide the IP, net mask, and gateway for
the Wireless Guard.
11. When you are done, you can logout or just attempt to connect to the Internet.
You must always authenticate yourself using the web interface before other
services will be available to you.
Configuring the Clients
Clients using the Wireless Guard as a gateway do not need any special
configuration unless you are planning to use them as virtual servers. If you
are planning on making a virtual server out of one of the computers in your
local area network (LAN), you will need to know how to change the IP, net
mask, and gateway of your client computer, or at least know how to get that
information to update your Wireless Guard should your IP, net mask, and
gateway of your virtual server should ever change.

LB-1105 User Manual
8
Status
The status pages of the Wireless Guard Web-based User Interface allow the
administrator to quickly gather information about the workings of the
Wireless Guard, what users are using the Wireless Guard, and other
important at-a-glance information.
System Profile
This page shows the administrator basic network information about how the
Wireless Guard is configured.

LB-1105 User Manual
9
PPTP Server Tunnels
This page shows all the PPTP VPN tunnels connected to Wireless Guard.
The Wireless Guard supports PPTP VPN tunneling to both clients in its LAN
and WAN.
PPTP Client Tunnels
This page shows all the PPTP Client tunnels connected to UTM6000i. If everything is
configured correctly, you should see a green bar under Tunnel Status which indicates an
established tunnel.
Online Users
This page shows what users are connected through the Wireless Guard,
their username, login time, what service they are currently using, their MAC
and IP address, the remote server they are connected to, and how much of
the bandwidth they are using. Users that are highlighted have been
configured by the administrator to use MAC binding and their connections
will not be timed out.
L2TP Server Tunnels
This page shows what L2TP VPN tunnels are connected to the Wireless
Guard.

LB-1105 User Manual
10
IPSec Tunnels
This Page shows the status information of IPSec Tunnels. As you can see, the
tunnels on the list could be enabled or disabled, removed or edited. Just click
on the option buttons to perform those actions.
DHCP IP Assignment
This page shows what IP addresses have been assigned by the Wireless
Guard and to which MAC addresses they have been assigned.
DDNS
Under this page, the administrator can setup a DDNS service. This is very
useful if you want to use the WG100n as your gateway but the IP you get from
your
ISP is not static. This page allows you to set the DDNS update and data
refresh rate on a minute and second base.

LB-1105 User Manual
Network Setup
Under these pages, the administrator could configure the network interfaces.
WAN Interface
This page allows the administrator to configure the WAN interface. Just pick
the desired mode to get WAN’s IP and enter the pertinent information for that
option. Click on “Update” to finalize the configuration.

LB-1105 User Manual
Virtual Server
This page allows the administrator to forward ports to computers with virtual
IPs in the LAN. This is used for creating virtual servers in your LAN and will
work with DHCP assigned IPs, however we recommend that you use a static
virtual IP for dedicated virtual servers. Using this page the administrator can
forward a range of ports or a single port to a computer in the LAN.
Software DMZ
This page allows the administrator to add computers into the software DMZ.
The Wireless Guard is designed such that the software DMZ supports only
IP addresses that are in the subnet of the WAN interface. If you wish to put
servers into your LAN using a virtual IP, please see the section on One to
One NAT. Computers in the software DMZ cannot connect to the Wireless
Guard administration page.

LB-1105 User Manual
13
Multi-DMZ
This function allows the administrator to map real IP addresses to virtual IP
addresses in the LAN of the device. This is a one to one correspondence,
meaning one virtual IP address maps to one virtual IP address. Users on the
Internet can connect to the real IP address to connect to these computers’
services, such as a web server or email server. LAN users can use the
virtual IP or the corresponding real IP address to access the server.
The IPs of the machines Multi-DMZ must be in the same subnet of the WAN
IP
LAN Interface
This page allows the administrator to configure the LAN interface and DHCP
server. Enter pertinent information for all the fields and click “Update” to
finalize the configuration. Administrator could enable or disable the DHCP
server, assign fixed IP for a specific MAC address and control the PnP
mechanism.

LB-1105 User Manual
14
Destination Route
This function allows the administrator to route packets through a user-
defined route. This is convenient when you have more than one subnet
under the machine. Enter the destination IP and the gateway IP for that
destination machine and the packets will be routed correctly
DDNS
The DDNS function allows you to, virtually, bind a DNS to any dynamic IP.
To do this, you must employee the server of some DDNS servers. Under this
page, the administrator can fill in the Designated Name 、DDNS Server 、
User Name、Password、IP Address and Domain Name in the page, or
click the Status> DDNS to inquire, delete, or modify. The username and
password must be acquired from any of the DDNS server on the menu by
applying for their service.

LB-1105 User Manual
Alias IP
Alias IP function allows the administrator to set more than one IP for the LAN
interface. In effect, the machine can have more than one LAN subnet. Use
the following picture as an example; you can see that an Alias IP of
172.16.2.254/24 has been set for this machine. This allows any pc within the
IP range of 172.16.2.1/24~172.16.2.253/24 to connect to this machine and
also enjoy all the services this machine provides.
Wireless
WDS
The basic principle of WDS is to send the data to a Wired Network by using the wireless
connection. The virtual network is composed by wireless network, so it is called WDS.
WDS is usually one to one, but WDS can also bring one to many and the target can be a
Wireless Network card or a wired system. WDS should at least have two AP with the
same functions.
Under this page, the administrator can Disable or Enable WDS and fill in pertinent MAC
address to the field. Hit the “Update" button to finalize the configuration.

LB-1105 User Manual
16
Settings
This page allows the administrator to configure the basic settings of the
wireless interface. Choose to enable or disable to interface and then enter
the pertinent information for each field. Click on “Update” to finalize the
configuration.
ESSID: The service set identifier (SSID) or network name. It is case sensitive,
must not exceed 32characters and may be any keyboard character. You
shall have selected the same SSID for all the APs that will be
communicating with mobile wireless stations
Broadcast SSID: Default value is “Visible” so that wireless client can see SSID
in site surveys. If “Invisible” is selected, Wireless client will not see SSID
in site surveys. Wireless client have to manually enter SSID to access
wireless network.
AP Operational Mode: Support wireless interface mode 802.11b, 802.11g,
802.11n and mixed mode 802.11b/g, 802.11g/n, 802.11b/g/n.

LB-1105 User Manual
17
Channel: Select the appropriate channel from the list provided to correspond
with your network settings. You shall assign a different channel for each
AP to avoid signal interference. If “Auto” is selected, it will auto scan all
channel and auto select one to use.
Channel Width: This field only available when 802.11n mode is selected. When
in 802.11n mode. You can select channel width 20MHz, 20/40MHz, or
40MHz.
Extension Channel Offset: This field only available when 802.11n mode is
selected and channel width is 40MHz only. You can select channel offset
to PLUS or MINUS.
Preamble Type: The default value is “Short”. It defines the length of the CRC
(Cyclic Redundancy Check) block for communication between the Access
Point and roaming wireless adapters.
Beacon Interval: The default value is “100”. It used to synchronize a wireless
network from Access Point.
Fragmentation Threshold: The default value is “2346”.It used to divide 802.11
frames into smaller pieces.
RTS Threshold: The default value is “2347”. It used to minimize collisions
among wireless stations.
DTIM Interval: The default value is “3”. DTIM(Delivery Traffic Indication Message)
is a countdown informing clients of next messages.
Client Isolation: This field allows you to prevent wireless client from
communicating with each other.
Protection Mode: .This function used to improve the 802.11g performance in
802.11 mixed environments.
Frame Burst: This setting can speed up data transmissions if you have a small
network and all of your clients support Frame Burst.
WMM: .This field WMM(Wi-Fi Multimedia) is used to support higher audio/video
priority for media streaming.
WMM No-Acknowledgement: No-Acknowledgement refers to the acknowledge
policy used at the MAC level. Enabling no-acknowledgement can result in
more efficient throughput but higher error rates in a noisy Radio
Frequency (RF) environment.

LB-1105 User Manual
Security
This page allows the administrator to configure the security settings of the
wireless interface.
WPA
WPA (Wi-Fi Protected Access) applies IEEE802.1x and Extensible
Authentication Protocol (EAP) to authenticate wireless clients using an
external RADIUS database. WPA improves data encryption by using
Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard
(AES). TKIP uses 128-bit keys that are dynamically generated and
distributed by the authentication server.
WEP
WEP(Wired Equivalent Privacy) encrypts data frames before transmitting
over the wireless network.
802.1x Authentication
Support wireless authentication with remote RADIUS server. Now only
support with encryption WEP, WPA.

LB-1105 User Manual
19
MAC Filter
Filter traffic from wireless according by wireless MAC address. Now support
White List or Black List

LB-1105 User Manual
Firewall
Special Rules
This page allows the administrator to refine existing rules to exclude or
include specific machines, for finer control over the firewall. Administrators
can use the functionality of this page to deny access to certain services/ports
for specific segments of their network while allowing access to the rest.
Conversely, administrators can also use the functionality of this page to limit
access to a specific machine or machines. Just select the Action to be
“Deny” or “Allow” and then enter pertinent Source and Destination IP range
and then click on “Add” to see the new rule being added to the “Network
Access Rule List.” To delete a rule on that list, just check the corresponding
“Delete” box on the list and then click “Delete” at the bottom of the page.
Multiple rules can be deleted at the same time.
Table of contents