QNO QVF7411 User Manual

Ssl / ipsec vpn qos router 2x100mbps wan plus 4x100mbps switch lan, wan2/dmz, fully integrated smb ssl & ipsec vpn solution
Table of Contents

Advertisement

Quick Links

SSL / IPSec VPN QoS Router
2x100Mbps WAN + 4x100Mbps Switch LAN
(WAN2/DMZ)
Fully Integrated SMB SSL & IPSec VPN Solution
English User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for QNO QVF7411

  • Page 1 SSL / IPSec VPN QoS Router 2x100Mbps WAN + 4x100Mbps Switch LAN (WAN2/DMZ) Fully Integrated SMB SSL & IPSec VPN Solution English User’s Manual...
  • Page 2 Manual, and the relevant rights and obligations between the users and Qno Technology Inc (hereafter "Qno"), and is the exclusion to remit or limit the liability of Qno. The users who obtain the file of this manual directly or indirectly, and users who use the relevant services, must obey this Agreement.
  • Page 3 【5-2】The power of interpretation, potency and dispute are applicable for the law of Taiwan. If there is any dissension or dispute between the users and Qno, it should be attempted to solve by consultation first. If it is not solved by consultation, user agrees that the dissension or dispute is brought to trial in the jurisdiction of the court in the location of Qno.
  • Page 4: Table Of Contents

    Content Introduction ........................1 Multi- WAN VPN Router Installation ................3 Systematic Setting Process ......................3 Setting Flow Chart ..........................3 III. Hardware Installation ....................6 LED Signal ............................6 VPN Router Network Connection ..................... 9 Login ..........................10 V. Device Spec Verification, Status Display and Login Password and Time Setting12 Home Page .............................
  • Page 5 Port Group Management ........................ 73 VIII. QoS (Quality of Service) ....................75 Bandwidth Management ......................... 76 8.1.1 The Maximum Bandwidth provided by ISP ................77 8.1.2 QoS ............................78 Session control ..........................82 Hardware Optimization(Future) ...................... 85 Smart QoS ............................87 Firewall .........................
  • Page 6 12.4 Domain Management ........................172 12.5 User Management ......................... 173 12.6 Service Resource Management ....................175 12.7 Link to Portal..........................176 12.8 Advanced Settings ......................... 176 12.8.1 Virtual Passage ........................177 12.8.2 Advanced Configurations ..................... 179 12.8.3 Password Protection ......................180 12.8.4 SSL Upgrade Serial Number ....................
  • Page 7 Appendix II: : : : Troubleshooting ....................24 (1) Block BT Download ..........................24 (2)Shock Wave and Worm Virus Prevention ..................25 (3)Block QQLive Video Broadcast Setting..................27 (4)ARP Virus Attack Prevention ......................29 Appendix III: : : : Qno Technical Support Information ..............38...
  • Page 8: Introduction

    VPN functionality. Qno is a supporter of the IPSec and SSL Protocol. IPSec/SSL VPN provides DES, 3DES, AES-128 encryption, MD5, SH1 certification, IKE Pre-Share Key, or manual password interchange. VPN Router also supports aggressive mode.
  • Page 9 the application process; therefore, it can refuse links to non-standard communication protocols. VPN Router supports network address translation (NAT) function and routing modes. It makes the network environment more flexible and easier to manage. Through web- based UI, VPN Router enables enterprises to have their own network access rules . To control web access, users can build and edit filter lists.
  • Page 10: Multi- Wan Vpn Router Installation

    Multi- WAN VPN Router Installation In this chapter we are going to introduce hardware installation. Through the understanding of multi-WAN setting process, users can easily setup and manage the network,making VPN Router functioning and having best performance. 2.1 Systematic Setting Process Users can set up and enable the network by utilizing bandwidth efficiently.
  • Page 11 Setting Content Purpose Configure the Install the device hardware based on user Hardware installation network to meet physical requirements. user’s demand. Login Login the device with Login the device web- based UI. Web Browser. Verify device Verify Firmware Verify the device specification, Firmware specification version and working version and working status.
  • Page 12 Advanced Settings: DMZ/Forwarding, DMZ/Forwarding, UPnP, Routing Mode, DMZ/Forwarding, UpnP, Routing Mode, multiple WAN IP, DDNS and MAC Clone UPnP, DDNS, MAC multiple WAN IP, Clone DDNS and MAC Clone Monitor VPN Router Administrators can look up system log and Management and working status and monitor system status and inbound/outbound maintenance settings:...
  • Page 13: Hardware Installation

    III. Hardware Installation In this chapter we are going to introduce hardware interface as well as physical installation. 3.1 LED Signal LED Signal Description Color Description Power Green Green LED on: Power ON DIAG Amber Amber LED on: System self-test is running. Amber LED blinking: System not ready Amber LED off: System self-test is completed successfully.
  • Page 14: System Statistic

    Installing the device on a Standard 19” Rack on a Standard 19” Rack We suggest to either place t the device on a desk or install it in a rack with attached brackets. Do not k or install it in a rack with attached brackets. Do not place other heavy objects together with place other heavy objects together with the device on a rack.
  • Page 15 The Router has two wall-mount slots on its bottom panel. When mounting the device on a wall, please ensure that the heat dissipation holes are facing sideways as shown in the following picture for safety reasons. Qno is not responsible for damages incurred by insecure wall-mounting hardware.
  • Page 16: Vpn Router Network Connection

    3.2 VPN Router Network Connection WAN connection:A WAN port can be connected with xDSL Modem, Fiber Modem, Switching Hub, or through an external router to connect to the Internet. LAN Connection: The LAN port can be connected to a Switching Hub or directly to a PC. Users can use servers for monitoring or filtering through the port after “Physical Port Mangement”...
  • Page 17: Login

    IV. Login This chapter is mainly introducing Web- based UI after conneting the device. First, check up the device’s IP address by connecting to DOS through the LAN PC under the device. Go to Start → Run, enter cmd to commend DOS, and enter ipconfig for getting Default Gateway address, as the graphic below, 192.168.1.1.
  • Page 18: Ip/ Port Statistic

    Then, open webpage browser, IE for example, and key in 192.168.1.1 in the website column. The login window will appear as below: The device’s default username and password are both “admin”. Users can change the login password in the setting later. Attention! For security, we strongly suggest that users must change password after login.
  • Page 19: Home Page

    V. Device Spec Verification, Status Display and Login Password and Time Setting This chapter introduces the device specification and status after login as well as change password and system time settings for security. 5.1 Home Page In the Home page, all the device’s parameters and status are listed for users’ reference. 5.1.1 WAN Status IP Address:...
  • Page 20: Physical Port Status

    Upstream Indicates the current upstream bandwidth usage(%) for each WAN. Bandwidth Usage(%): Indicates if Dynamic Domain Name is activated. The default configuration is “Off”. DDNS: Indicates how many QoS rules are set. Quality of Service: When “Obtain an IP automatically” is selected, two buttons (Release and Manual Connect:...
  • Page 21 The current port setting status information will be shown in the Port Information Table. Examples: type (10Base-T/100Base-TX), iniferface (WAN/ LAN/ DMZ), link status (Up/ Down), physical port status (Port Enabled/ Port Disabled), priority (high or normal), speed status (10Mbps or 100Mbps), duplex status (Half/ Full), auto negotiation (Enabled or Disabled).
  • Page 22: System Information

    5.1.3 System Information LAN IP/Subnet Mask: : : : Identifies the current device IP address. The default is 192.168.1.1. Working Mode: : : : Indicates the current working mode. Can be NAT Gateway or Router mode. The default is “NAT Gateway” mode. System Active Time:...
  • Page 23: Firewall Status

    5.1.4 Firewall Status SPI (Stateful Packet Inspection): Indicates whether SPI (Stateful Packet Inspection) is on or off. The default configuration is “On”. DoS (Denial of Service):Indicates if DoS attack prevention is activated. The default configuration is “On”. Block WAN Request:Indicates that denying the connection from Internet is activated. The default configuration is “On”.
  • Page 24: Change And Set Login Password And Time

    You can press Reset button for more than 10 sec, the device will return back to default. User Name: The default is “admin”. Old Password: Input the original password.(The default is “admin”.) New User Name: Input the new user name. i.e.Qno New Password: Input the new password.
  • Page 25: Time

    Confirm New Input the new password again for verification. Password: Apply: Click “Apply” to save the configuration. Cancel: Click “Cancel" to leave without making any change. This action will be effective before ”Apply” to save the configuration. 5.2.2 Time The device can adjust time setting. Users can know the exact time of event occurrences that are recorded in the System Log, and the time of closing or opening access for Internet resources.
  • Page 26 Daylight Saving: If there is Daylight Saving Time in your area, input the date range. The device will adjust the time for the Daylight Saving period automatically. NTP Server: If you have your own preferred time server, input the server IP address. Apply:...
  • Page 27: Network

    VI. Network This Network page contains the basic settings. For most users, completing this general setting is enough for connecting with the Internet. However, some users need advanced information from their ISP. Please refer to the following descriptions for specific configurations. 6.1 Network Connection 6.1.1 Host Name and Domain Name...
  • Page 28: Lan Setting

    necessary in most environments, some ISPs in some countries may require it. 6.1.2 LAN Setting This is configuration information for the device current LAN IP address. The default configuration is 192.168.1.1 and the default Subnet Mask is 255.255.255.0. It can be changed according to the actual network structure.
  • Page 29: Wan & Dmz Settings

    changes to internal PCs. Users can make changes according to their actual network structure. 6.1.3 WAN & DMZ Settings WAN Setting: Interface: An indication of which port is connected. Connection Type: Obtain an IP automatically, Static IP connection, PPPoE (Point-to-Point Protocol over Ethernet), PPTP (Point-to-Point Tunneling Protocol) or Transparent Bridge.
  • Page 30 Use the following DNS Server Select a user-defined DNS server IP address. Addresses: : : : DNS Server: : : : Input the DNS IP address set by ISP. At least one IP group should be input. The maximum acceptable groups is two IP groups. Enable Line-Dropped The WAN disconnection schedule will be activated by checking this Scheduling:...
  • Page 31 Backup Interface: : : : Select another WAN port as link backup when port binding is configured. Users should select the port that employs the same ISP. After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without making any changes.
  • Page 32 Input the DNS IP address issued by ISP. At least one IP group should be input. DNS Server The maximum acceptable is two IP groups. Enable The WAN disconnection schedule will be activated by checking this option. In Line-Dropped some areas, there is a time limitation for WAN connection service. For example: the optical fiber service will be disconnected from 0:00 am to 6:00 am.
  • Page 33 User Name Input the user name issued by ISP. Password Input the password issued by ISP. This function enables the auto-dialing function to be used in a PPPoE dial Connect on Demand connection. When the client port attempts to connect with the Internet, the device will automatically make a dial connection.
  • Page 34 Enable The WAN disconnection schedule will be activated by checking this option. Line-Dropped In some areas, there is a time limitation for WAN connection service. For Scheduling example: the optical fiber service will be disconnected from 0:00 am to 6:00 am. Although there is a standby system in the device, at the moment of WAN disconnection, all the external connections that go through this WAN will be disconnected too.
  • Page 35 This option is to configure a static IP address. The IP address to be WAN IP Address configured could be one issued by ISP. (The IP address is usually provided by the ISP when the PC is installed. Contact ISP for relevant information).
  • Page 36 This function enables the auto-dialing function to be used for a PPTP dial Connect on Demand connection. When the client port attempts to connect with the Internet, the device will automatically connect with the default ISP auto dial connection; when the network has been idle for a period of time, the system will break the connection automatically.
  • Page 37 integrate existing networks without changing the original structure. Select the Transparent Bridge mode for the WAN connection mode. In this way, users will be able to connect normally with the Internet while keeping the original Internet IP addresses in Intranet IP configuration. If there are two WANs configured, users still can select Transparent Bridge mode for WAN connection mode, and load balancing will be achieved as usual.
  • Page 38 DNS Server Input the DNS IP address set by ISP. At least one IP group should be input. The maximum acceptable is two IP groups. Input the available IP range issued by ISP. If ISP issued two Internal LAN IP discontinuous IP address ranges, users can input them into Internal Range LAN IP Range 1 and Internal LAN IP Range 2 respectively.
  • Page 39 WAN IP address Enter the public IP address. Subnet mask Enter the public IP address subnet mask. WAN Default Gateway Enter the WAN default gateway, which provided by your ISP. DNS Servers Enter the DNS server IP address, you must have to enter a DNS server IP address, maximum two DNS servers IP addresses available..
  • Page 40 LAN IP Addresses Range Enter your IP addresses range, which IP addresses are provided by ISP. If you have multiple IP ranges, you need setup group1 and group 2. You can also setup the default gateway and IP range in the group 2. DMZ Setting For some network environments, an independent DMZ port may be required to set up externally connected servers such as WEB and Mail servers.
  • Page 41 Range: DMZ and WAN within same Subnet IP Range: Input the IP range located at the DMZ port. After the changes are completed, click “Apply” to save the configuration, or click “Cancel" to leave without making any changes. DMZ IP ranges are the same with WAN IP ranges in Router Plus NAT mode:...
  • Page 42 LAN Default Gateway Enter the LAN Default Gateway that you configured at Router Plus NAT Mode Enter the usable static IP range that provide by ISP into the DMZ LAN IP Range service IP range. If you have other IP range, you can setup the default gateway and IP range into group 2.
  • Page 43: Multi- Wan Setting

    6.2 Multi- WAN Setting When you have multiple WAN gateways, you can use Traffic Management and Protocol Binding function to fulfill WAN road balancing, so that we can have highest network bandwidth efficiency.
  • Page 44: Load Balance Mode

    6.2.1 Load Balance Mode Auto Load Balance Mode When Auto Load Balance mode is selected, the device will use sessions or IP and the WAN bandwidth automatically allocate connections to achieve load balancing for external connections. The network bandwidth is set by what users input for it. For example, if the upload bandwidth of both WANs is 512Kbit/sec, the automatic load ratio will be 1:1;...
  • Page 45 addresses or servers that are configured in the connection rule will follow the rule for external connections; those which are not configured in the rule will still follow the device Auto Load Balance system. Please refer to the explanations in 6.2.3 Configuring Protocol Binding for setting up Protocol Binding and for examples of collocating router modes with Protocol Binding.
  • Page 46 routing policy (Division of traffic between Telecom and Netcom is to be used in China) embedded in the device. All you have to do is to select the WAN (or WAN group) which is connected with Netcom; the device will then automatically dispatch the traffic for Netcom through that WAN to connect with the Internet and dispatch traffic for Telecom to go through the WAN connected with Telecom to the Internet accordingly.
  • Page 47 Cancel: Click “Cancel” to cancel the modification. This only works before “Apply” is clicked. After the configuration is completed, in the China Netcom Policy window users can select WANs in combination to connect with Netcom. Import Strategy: A division of traffic policy can be defined by users too. In the “Import Strategy” window, select the WAN or WAN group (ex.
  • Page 48: Network Service Detection

    Note! China Netcom strategy and self-defined strategy can coexist. However, if a destination IP is assigned by both China Netcom strategy and self-defined strategy, China Netcom strategy will take priority. In other words, traffic to that destination IP will be transmitted through the WAN (or WAN group) under China Netcom strategy.
  • Page 49 Interface: Select the WAN Port that enables Network Service Detection. Retry: This selects the retry times for network service detection. The default is five times. If there is no feedback from the Internet in the configured “Retry Times", it will be judged as “External Connection Disconnected”. Delay time for external connection detection latency.
  • Page 50 connection failure is detected, no error message will be recorded in the System Log. The packet transmitted through this WAN will be shifted to the other WAN automatically, and be shifted back again when the connection for the original WAN is repaired and reconnected.
  • Page 51: Protocol Binding

    Therefore, in this mode, we recommend assigning one of the connections to the first WAN. When other WANs (WAN2) are broken and connection error remove (Remove the Connection) has been selected for the connection detection system, traffic will be shifted to the first WAN (WAN1). In addition, if the first WAN (WAN1) is broken, the traffic will be shifted to other WANs in turn.
  • Page 52 Protocol Binding Users can define specific IP addresses or specific application service ports to go through a user-assigned WAN for external connections. For any other unassigned IP addresses and services, WAN load balancing will still be carried out. Note! In the load balance mode of Assigned Routing, the first WAN (WAN1) cannot be assigned. It is to be saved for the IP addresses and the application Service Ports that are not assigned to other WANs (WAN2) for external connections.
  • Page 53 Service: This is to select the Binding Service Port to be activated. The default (such as ALL-TCP&UDP 0~65535, WWW 80~80, FTP 21 to 21, etc.) can be selected from the pull-down option list. The default Service is All 0~65535. Option List for Service Management: Click the button to enter the Service Port configuration page to add or remove default Service Ports on the option list.
  • Page 54 Show Priority: Click the “Show Table” button. A dialogue box as shown in the following figure will be displayed. Users can choose to sort the list by priorities or by interface. Click “Refresh” and the page will be refreshed; click “Close”...
  • Page 55 Add To List: Click the button to add the configuration into the Services List. Users can add up to 100 services into the list. To remove the selected activated Services. Delete selected service: Apply: Click the “Apply” button to save the modification. Cancel: Click the “Cancel”...
  • Page 56 As in the figure below, select “All Traffic” from the pull-down option list “Service”, and then in the boxes of “Source IP” input the source IP address “192.168.1.100” to “100”. Retain the original numbers “0.0.0.0” in the boxes of “Destination IP” (which means to include all Internet IP addresses). Select WAN2 from the pull-down option list “Interface”, and then click “Enable”.
  • Page 57 Example 3:How do I set up Auto Load Balance Mode to keep all Intranet IP addresses from going through WAN2 when the destination port is Port 80 and keep all other services from going through WAN1? As in the figure below, there are two rules to be configured. The first rule: select “HTTP [TCP/80~80]”...
  • Page 58 Configuring “Assigned Routing Mode” for load Balance: IP Group: This function allows users to assign packets from specific Intranet IP addresses or to specific destination Service Ports and to specific destination IP addresses through an assigned WAN to the Internet. After being assigned, the specific WAN will only support those assigned Intranet IP addresses, destination Service Ports, or destination IP addresses.
  • Page 59 Example 2:How do I configure Protocol Binding to keep traffic from all Intranet IP addresses from going through WAN2 when the destinations are IP 211.1.1.1 ~ 211.254.254.254 as well as the whole Class A group of 60.1.1.1 ~ 60.254.254.254, while traffic to other destinations goes through WAN1? As in the following figure, there are two rules to be configured.
  • Page 61: Intranet Configuration

    VII. Intranet Configuration This chapter introduces how to configure ports and understand how to configure intranet IP addresses. 7.1 Port Management Through the device, users can easily manage the setup for WAN ports, LAN ports and the DMZ port by choosing the number of ports, speed, priority, duplex and enable/disable the auto-negotiation feature for connection setting of each port.
  • Page 62 DisabledPort: This feature allows users turn on/off the Ethernet port. If selected, the Ethernet port will be shut down immediately and no connection can be made. The default value is "on". Priority: This feature allows users to set the high/low priority of the packet delivery for the Ethernet port.
  • Page 63 VLAN All: Set VLAN All port to be the public area of VLAN so that it can be connected to other VLAN networks. A server should be constructed for the intranet so that all VLAN group can visit this server. Set one of the network ports as VLAN All.
  • Page 64: Port Status

    7.2 Port Status Summary: There are Network Connection Type, Interface, Link Status (Up/Down), Port Activity (Port Enabled), Priority Setting (High or Normal), Speed Status (10Mbps or 100Mbps), Duplex Status (half duplex or full duplex), Auto Neg. (Enabled/Disabled), and VLAN. Statistics: The packet data of this specific port will be displayed.
  • Page 65 receive/ transmit packet Byte count and error packet count. Users may press the refresh button to update all real-time messages.
  • Page 66: Ip/ Dhcp

    7.3 IP/ DHCP With an embedded DHCP server, it supports automatic IP assignation for LAN computers. (This function is similar to the DHCP service in NT servers.) It benefits users by freeing them from the inconvenience of recording and configuring IP addresses for each PC respectively. When a computer is turned on, it will acquire an IP address from the device automatically.
  • Page 67 Dynamic IP: Client lease Time: Check the option to activate the DHCP server automatic IP lease function. If the function is activated, all PCs will be able to acquire IP automatically. Otherwise, users should configure static virtual IP for each PC individually.
  • Page 68 Range End: This is an initial IP automatically leased by DHCP. It means DHCP will start the lease from this IP. The default initial IP is 192.168.1.100. DNS (Domain Name Service): This is for checking the DNS from which an IP address has been leased to a PC port. Input the IP address of this server directly.
  • Page 69: Dhcp Status

    7.4 DHCP Status This is an indication list of the current status and setup record of the DHCP server. The indications are for the administrator’s reference when a network modification is needed. DHCP Server: This is the current DHCP IP. Dynamic IP Used:...
  • Page 70 Normally, DNS sever will be directed to ISP DNS server or internal self- defined DNS server. Qno router also provides “easy” self- defined DNS services, called “DNS Local Database”, which can map website host domain names and the corresponding IP addresses.
  • Page 71 Delete selected item Delete the items chosen. ※ ※ ※ ※ Note! (1) Users MUST enable DCHP server service to enable DNS local database. (2) Users must set DHCP server DNS IP address as the router LAN IP. For example, LAN is 10.10.10.1, as shown in the following figure.
  • Page 72 (1) System Tool => Diagnostic => DNS Name Lookup (2) Enter tw.yahoo.com for lookup. (3) The IP is 10.10.10.199, confirming the corresponding IP in DNS local database.
  • Page 73: Ip & Mac Binding

    7.5 IP & MAC Binding Administrators can apply IP & MAC Binding function to make sure that users can not add extra PCs for Internet access or change private IP addresses. There are two methods for setting up this function: Block MAC address not on the list This method only allows MAC addresses on the list to receive IP addresses from DHCP and have Internet access.
  • Page 74 IP & MAC Binding...
  • Page 75 Static IP: There are two ways to input static IP: If users want to set up a MAC address to acquire IP from DHCP, but the IP need not be a specific assigned IP, input 0.0.0.0 in the boxes. The boxes cannot be left empty.
  • Page 76 Name: For distinguishing clients, input the name or address of the client that is to be bound. The maximum acceptable characters are 12. Enabled: Activate this configuration. Add to list: Add the configuration or modification to the list. Delete selected item: Remove the selected binding from the list.
  • Page 77: Ip Group Management

    7.6 IP Group Management IP Group function can combine several IP addresses or IP address ranges into several groups. When you manage user internet access privileges by IP address, you can set up every management functions for users who have same internet access privileges in the same IP group in order to decrease the effort of setting rules for each IP address.
  • Page 78 User Edit IP The IP list will show the list which learns the IP addresses automatically on the left under side. You can also modify IP addresses manually. Input the name of IP address (or range) showed below. Name Input IP address (or range). For example, 192.168.1.200 ~ 250. IP Address Add to IP List After setting name and IP address, push this button to add the information into...
  • Page 79 It is the same setting methods. You should set the IP address or the range of remote IP from the left side first, and choose to add IP address information from the left side into the remote group.
  • Page 80: Port Group Management

    7.7 Port Group Management Service ports can be grouping as IP grouping. It is convenient to set QoS, firewall access rules, and other functions. Input the name, protocol, and port range for the specific service port. User edit port Name the Port in order to identify its property. For example, Virus 135. Name Protocol Choose the port protocol form the pull down list like TCP, UDP or TCP and UDP.
  • Page 81 Port GroupSet You can choose from the Port list on the left side to set up a Port group. When you add new groups, please note if the group name is in the column. For Group Name example, Virus. Delete Group Choose the group that you would like to delete from the pull- down list, and push the “Delete Group”...
  • Page 82: Qos (Quality Of Service)

    VIII. QoS (Quality of Service) QoS is an abbreviation for Quality of Service. The main function is to restrict bandwidth usage for some services and IP addresses to save bandwidth or provide priority to specific applications or services, and also to enable other users to share bandwidth, as well as to ensure stable and reliable network transmission.
  • Page 83: Bandwidth Management

    8.1 Bandwidth Management...
  • Page 84: The Maximum Bandwidth Provided By Isp

    8.1.1 The Maximum Bandwidth provided by ISP In the boxes for WAN1 and WAN2 bandwidth, input the upstream and downstream bandwidth which users applied for from bandwidth supplier. The bandwidth QoS will make calculations according to the data users input. In other words, it will guarantee a minimum rate of upstream and downstream for each IP and Service Port based on the total actual bandwidth of WAN1 and WAN2.
  • Page 85: Qos

    minimum guaranteed upstream bandwidth for each IP would be 1024Kbit/50=20Kbit/Sec. Thus, 20Kbit/Sec can be input for “Mini. Rate” Downstream bandwidth can be calculated in the same way. Attention! The unit of calculation in this example is Kbit. Some software indicates the downstream/upstream speed with the unit KB.
  • Page 86 Interface: Select on which WAN the QoS rule should be executed. It can be a single selection or multiple selections. Service Port: Select what bandwidth control is to be configured in the QoS rule. If the bandwidth for all services of each IP is to be controlled, select “All (TCP&UDP) 1~65535”.
  • Page 87 IP Address: This is to select which user is to be controlled. If only a single IP is to be restricted, input this IP address, such as “192.168.1.100 to 100”. The rule will control only the IP 192.168.1.100. If an IP range is to be controlled, input the range, such as “192.168.1.100 ~ 150”.
  • Page 88 : Sharing total bandwidth with all IP addresses: If this option is selected, all IP Bandwidth sharing addresses or Service Ports will share the bandwidth range (from minimum to maximum bandwidth). Assign bandwidth for each IP address: If this option is selected, every IP or Service Port in this range can have this bandwidth (minimum to maximum).
  • Page 89: Session Control

    8.2 Session control Session management controls the acceptable maximum simultaneous sessions of Intranet PCs. This function is very useful for managing connection quantity when P2P software such as BT, Thunder, or emule is used in the Intranet causing large numbers of sessions. Setting up proper limitations on sessions can effectively control the sessions created by P2P software.
  • Page 90 When single IP exceed __: If this function is selected, when the user’s port session reach the limit, this user will not be able to make a new session for five minutes. Even if the previous session has been closed, new sessions cannot be made until the setting time ends.
  • Page 91 Exempted Service Port or IP Address Service Port: Choose the service port. Source IP: Input the IP address range or IP group. Enabled: Activate the rule. Add to list: Add this rule to the list. Delete seleted item: Remove the rules selected from the Service List. Apply:...
  • Page 92: Hardware Optimization(Future)

    8.3 Hardware Optimization(Future) This flagship router not only provides high processing performance but also launches “hardware optimization’ function for bandwidth control and traffic prioritization. The main purpose is to process the bandwidth functions through hardware design, which can accerlate and prioritize the traffic distribution and usage without wasting CPU and system resources.
  • Page 93 (2) Destination MAC address: Hardware optimization will only be effective to guarantee the traffic in high priorities when the traffic rules match destination MAC addresses. (3) None: The traffic rules neither match traffic rules nor check MAC addresses. IP address Pull down menus includes: (1) Source IP address: Hardware optimization will only be effective to guarantee the traffic in high priorities when the traffic rules match source IP addresses.
  • Page 94: Smart Qos

    8.4 Smart QoS The smart QoS function enables the administrators to constrain the bandwidth occupied automatically without any configuring. Enabled QoS: Choose to apply QoS function. When the usage of any WAN’s bandwidth is Input the required rate value into the column. The over than___%, Enable Smart QoS default is 60%.
  • Page 95 Show Penalty IP: The IPs which are under penalty mechanism will be shown on the list. Scheduling: If “Always” is selected, the rule will be executed around the clock. If “From…” is selected, the rule will be executed according to the configured time range. For example, if the time control is from Monday to Friday, 8:00am to 6:00pm, users can refer to the following figure to set up the rule.
  • Page 96: Firewall

    IX. Firewall This chapter introduces firewall general policy, access rule, and content filter settings to ensure network security. 9.1 General Policy The firewall is enabled by default. If the firewall is set as disabled, features such as SPI, DoS, and outbound packet responses will be turned off automatically.
  • Page 97 DoS (Denial of Service): This averts DoS attacks such as SYN Flooding, Smurf, LAND, Ping of Death, IP Spoofing and so on. Block WAN request: If set as Enabled, then it will shut down outbound ICMP and abnormal packet responses in connection. If users try to ping the WAN IP from the external, this will not work because the default value is set as activated in order to decline the outbound responses.
  • Page 98 Advanced Setting Packet Type: This device provides three types of data packet transmission: TCP-SYN-Flood, UDP-Flood and ICMP-Flood. WAN Threshold: When all packet values from external attack or from single external IP attack reach the maximum amount (the default is 15000 packets/Sec and 2000 packets/Sec respectively), if these conditions above occurs, the IP will be blocked for 5 minutes ( the default is 5 minutes OBJ 176 ).
  • Page 99: Restrict Application

    Show Blocked IP: Show the blocked IP list and the remained blocked time. Restricted WEB It supports the block that is connected through: Java, Cookies, Active X, Features: and HTTP Proxy access. Don’t Block Java / If this option is activated, users can add trusted network or IP address into ActiveX / Cookies Proxy the trust domain, and it will not block items such as Java/ActiveX/Cookies to Trusted Domain:...
  • Page 100 Input the information of the QQ number, etc. User Name: Input the number. Exempted QQ Number: Add the number to the list. Add to list: Delete the selected rule in the list. Delete selected item: Block File Type...
  • Page 101 Exception IP address: Input Exception IP.
  • Page 102: Access Rule

    9.2 Access Rule Users may turn on/off the setting to permit or forbid any packet to access internet. Users may select to set different network access rules: from internal to external or from external to internal. Users may set different packets for IP address and communication port numbers to filter Internet access rules. Network access rule follows IP address, destination IP address, and IP communications protocol status to manage the network packet traffic and make sure whether their access is allowed by the firewall.
  • Page 103 In addition to the default rules, all the network access rules will be displayed as illustrated above. Users may follow or self- define the priority of each network access rule. The device will follow the rule priorities one by one, so please make sure the priority for all the rules can suit the setting rules. Edit:...
  • Page 104: Add New Access Rule

    9.2.1 Add New Access Rule Action: Allow: Permits the pass of packets compliant with this control rule Deny: Prevents the pass of packets not compliant with this control rule Service: From the drop-down menu, select the service that users grant or do not give permission.
  • Page 105 Dest. IP: Select the destination IP range (such as Any, Single, Range, or preset IP group name) If Single or Range is selected; please enter a single IP address or an IP address within a session. Scheduling: Select “Always” to apply the rule on a round-the-clock basis. Select “from”, and the operation will run according to the defined time.
  • Page 106: Content Filter

    9.3 Content Filter The device supports two webpage restriction modes: one is to block certain forbidden domains, and the other is to give access to certain web pages. Only one of these two modes can be selected. Block Forbidden Domain Fill in the complete website such as www.sex.com to have it blocked.
  • Page 107 Add: Enter the websites to be controlled such as www.playboy.com Add to list: Click ”Add to list” to create a new website to be controlled. Delete selected item: Click to select one or more controlled websites and click this option to delete.
  • Page 108 Website Blocking by Keywords: Enabled: Click to activate this feature. The default setting is disabled. For example: If users enter the string ”sex”, any websites containing ”sex” will be blocked. Enter keywords. Keywords(Only for English keyword) : Add this new service item content to the list. Add to List:...
  • Page 109 Activate the function. The default setting is “Disabled.” Enabled: Input the allowed domain name, etc. www.google.com Add: Add the rule to list. Add to list: Users can select one or more rules and click to delete. Delete selected item: Content Filter Scheduling Select “Always”...
  • Page 110 Always: Select “Always” to apply the rule on a round-the-clock basis. Select “from”, and the operation will run according to the defined time. …to…: Select "Always" to apply the rule on a round-the-clock basis. If “From” is selected, the activation time is introduced as below Day Control:...
  • Page 111: Vpn (Virtual Private Network)

    VPN (Virtual Private Network) 10.1. VPN 10.1.1. Display All VPN Summary This VPN Summary displays the real-time data with regard to VPN status. Detail: Push this button to display the following information with regard to all current VPN configurations to facilitate VPN connection management.
  • Page 112 Tunnel Status: The following describes VPN Tunnel Status, the current status of VPN tunnel in detail: This displays how many tunnels are enabled and how many tunnels __ Tunnel(s) Enabled: are set. __ Tunnel(s) Defined: Click Previous page or Next page to view the desired VPN tunnel Previous Page/Next page.
  • Page 113 display as “Manual” and there is no Tunnel test function available for this manual setting. Displays the current VPN tunnel connection name, such as XXX Name: Office. Users are well-advised to give them different names to avoid confusion should users have more than one tunnel settings. Note: If this tunnel is to be connected to other VPN device (not this device), some device requires that the tunnel name is identical to the name of the host end to facilitate verification.
  • Page 114 Displays the tunnel name of the Group VPN that is connected. Group Name: Displays the VPN Groups tunnel numbers. Connected Tunnels: Displays settings such as encryption (DES/3DES), authentication Phase2 (MD5/SHA1) and Group (1/2/5). Encrypt/Auth/DH: If users select Manual setting for IPSec, Phase 2 DH group will not be displayed.
  • Page 115: Add A New Vpn Tunnel

    10.1.2. Add a New VPN Tunnel The device supports Gateway to Gateway tunnel or Client to Gateway tunnel. The VPN tunnel connections are done by 2 VPN devices via the Internet. When a new tunnel is added, the setting page for Gateway to Gateway or Client to Gateway will be displayed. Gateway to Gateway:...
  • Page 116 10.1.2.1. Gateway to Gateway Setting The following instructions will guide users to set a VPN tunnel between two devices. Tunnel No.: Set the embedded VPN feature, please select the Tunnel number. Displays the current VPN tunnel connection name, such as XXX Office. Users Tunnel Name:...
  • Page 117 This local gateway authentication type comes with five operation Local Security modes, which are: GatewayType: IP only IP + Domain Name (FQDN) Authentication IP + E-mail Addr. (USER FQDN) Authentication Dynamic IP + Domain Name (FQDN) Authentication Dynamic IP + E-mail Addr. (USER FQDN) Authentication. Dynamic IP address + Email address name (1) IP only: If users decide to use IP only, entering the IP address is the only way...
  • Page 118 (4) Dynamic IP + Domain Name(FQDN) Authentication: If users use dynamic IP address to connect to the device, users may select this option to link to VPN. If the remote VPN gateway requires connection to the device for VPN connection, this device will start authentication and respond to this VPN tunnel connection;...
  • Page 119 2. Subnet This option allows local computers in this subnet can be connected to the VPN tunnel. Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN. 3.
  • Page 120 IP + E-mail Addr. (USER FQDN) Authentication, -IP + Email address Dynamic IP + Domain Name (FQDN) Authentication, -Dynamic IP address + Domain name Dynamic IP + E-mail Addr. (USER FQDN) Authentication. Dynamic IP address + Email address name (1) IP only: If users select the IP Only type, entering this IP allows users to gain access to this tunnel.
  • Page 121 (3) IP + E-mail Addr. (USER FQDN) Authentication: If users select IP address and E-mail type, entering the IP address and the E-mail allows users to gain access to this tunnel. If the remote IP address is unknown, choose IP by DNS Resolved, allowing DNS to translated the IP address.
  • Page 122 This option allows users to set the remote VPN connection access Remote Security Group type. The following offers a few items for remote settings. Please Type: select and set appropriate parameters: (1) IP address This option allows the only IP address which is entered to build the VPN tunnel.
  • Page 123 IPSec Setup Use IKE Protocol: Click the shared key generated by IKE to encrypt and authenticate the remote user. If PFS (Perfect Forward Secrecy) is enabled, the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication. When PFS is enabled, hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time.
  • Page 124 remote authentication mode: “MD5” or “SHA1”. Phase 1 SA Life Time: The life time for this exchange code is set to 28800 seconds (or 8hours) by default. This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security. Phase2 SA Life Time: The life time for this exchange code is set to 3600 seconds (or 1hours) by default.
  • Page 125 Advanced Setting- for IKE Protocol Only The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is set to VPN operation mode. The connection is the same to most of the VPN devices. Aggressive Mode: This mode is mostly adopted by remote devices. The IP connection ●...
  • Page 126 10.1.2.2. Client to Gateway Setting The following describes how an administrator builds a VPN tunnel between devices. Users can set this VPN tunnel to be used by one client or by a group of clients (Group VPN) at the client end. If it is used by a group of clients, the individual setting for remote clients can be reduced.
  • Page 127 Local Group Setup This local gateway authentication type (Local Security Gateway Type) must be identical with that of the remote type (Remote Security Gateway Type). This local gateway authentication type comes with five operation Local Security Gateway modes, which are: Type:...
  • Page 128 (3) IP + E-mail Addr. (USER FQDN) Authentication. If users select IP address and E-mail, enter the IP address and E-mail address to gain access to this tunnel and the WAN IP address will be automatically filled into this space. Users don't need to do further settings.
  • Page 129 Reference: When this VPN tunnel is connected, computers with the IP address of 192.168.1.0 can establish connection. 5. Subnet This option allows local computers in this subnet to be connected to the VPN tunnel. Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN.
  • Page 130 Remote Group Setup: This remote gateway authentication type (Remote Security Gateway Type) must be identical to the remotely-connected local security gateway authentication type (Local Security Gateway Type). This local gateway authentication type comes with five operation Remote Security Gateway modes, which are: Type:...
  • Page 131 refers to the combination of host name and domain name and can be retrieved from the Internet, i.e. vpn.server.com. This IP address and domain name must be identical to those of the VPN secure gateway setting type to establish successful connection. (3) IP + E-mail Addr.
  • Page 132 IPSec Setup If there is any encryption mechanism, the encryption mechanism of these two VPN tunnels must be identical in order to create connection. And the transmission data must be encrypted with IPSec key, which is known as the encryption "key". The device provides the following two encrypted Key Managements.
  • Page 133 IKE Protocol: Click the shared key generated by IKE to encrypt and authenticate the remote user. If PFS (Perfect Forward Secrecy) is enabled, the Phase 2 shared key generated during the IKE coordination will conduct further encryption and authentication. When PFS is enabled, hackers using brute force to capture the key will not be able to get the Phase 2 key in such a short period of time.
  • Page 134 time of the VPN connection so as to guarantee security. Phase2 SA Life Time: The life time for this exchange code is set to 3600 seconds (or 1hours) by default. This allows the automatic generation of other exchange password within the valid time of the VPN connection so as to guarantee security.
  • Page 135 Advanced Setting- for IKE Protocol Only The advanced settings include Main Mode and Aggressive mode. For the Main mode, the default setting is set to VPN operation mode. The connection is the same to most of the VPN devices. Aggressive Mode: This mode is mostly adopted by remote devices. The IP connection ●...
  • Page 136 Situation in Group VPN:(Future Feature) Group No.: Two Group VPN settings at most. Group Name: Displays the current VPN tunnel connection name, such as XXX Office. Users are well-advised to give them different names to avoid confusion. Note: If this tunnel is to be connected to other VPN device, some device requires that the tunnel name is identical to the name of the host end to facilitate verification.
  • Page 137 2. Subnet This option allows local computers in this subnet can be connected to the VPN tunnel. Reference: When this VPN tunnel is connected, only computers with the session of 192.168.1.0 and with subnet mask as 255.255.255.0 can connect with remote VPN. 3.
  • Page 138 (2) E-mail Addr. (USER FQDN) If users select this option, only filling in the E-mail address allows access to this tunnel. (3) Microsoft XP/2000 VPN Client If users select XP/2000 VPN Client end status, users don't need to do extra settings. IPSec Setup If there is any encryption mechanism, the encryption mechanism of these two VPN channel settings must be identical in order to establish connection.
  • Page 139 Perfect Forward Secrecy: When users check the PFS option, make sure to activate the PFS feature of the VPN device and that VPN Client as well. Phase 1/Phase 2 DH Group: This option allows users to select Diffie-Hellman groups: Group 1/ Group 2/ Group 5. Phase1/Phase2 Encryption: This option allows users to set this VPN channel to use any encryption mode.
  • Page 140 in the text of “Pre-shared Key” (the example here is set as test), and the system will automatically translate what users entered as exchange password and authentication mechanism during the VPN tunnel connection. This exchange password can be made up of up to 30 characters. Advanced Setting-for IKE Preshared Key Only The advanced settings include Main Mode and Aggressive mode.
  • Page 141: Pptp Server

    Dead Peer Detection (DPD): If this option is selected, the connected VPN tunnel will ● regularly transmit HELLO/ACK message packet to detect whether there is connection between the two ends of the VPN tunnel. If one end is disconnected, the device will disconnect the tunnel automatically and then create new connection.
  • Page 142 Enabled PPTP Server: When this option is selected, the point-to-point tunnel protocol PPTP server can be enabled. PPTP IP Address Range: Please enter PPTP IP address range so as to provide the remote users with an entrance IP into the local network. Enter Range Start: Enter the value into the last field.
  • Page 143: Vpn Pass Through

    Delete Selected Item. Delete selected item: 10.1.4. VPN Pass Through If this option is enabled, the PC is allowed to use VPN-IPSec IPSec Pass Through packet to pass in order to connect to external VPN device. Fixed Source Port This option is only required when having VPN connection with Cisco VPN Server and Client.
  • Page 144: Qnokey

    10.2. QnoKey Introduces how Qno VPN devices conducts preliminary configuration of the data from the user end and how to set the QnoKey user to successfully create QnoKey by using QnoKey management software. 10.2.1. QnoKey Summary Login to the web-based UI and click on the QnoKey menu to display the page that summarizes the current status information of QnoKey, as illustrated below:...
  • Page 145: Qnokey Group Setup

    If the number of days of using QnoKey is set, the remaining time is Available Time: displayed here. The upper limited number of QnoKey users. Account Number Limitation: The number of QnoKey in use. Used Number: Displays the number of connected devices that are using QnoKey. Online Number:...
  • Page 146 This page is designed for QnoKey group setup. Group parameters for QnoKey include WAN ports, valid time, and number of users, and protection actions for potential QnoKey losses. These setting options facilitate classified management for QnoKey users and enhance security. Select this option to activate this setting rule.
  • Page 147 the valid time of QnoKey as "1~99" days according to the desired number of days to be set. Account Number Set the maximum number of QnoKey users (from "1~100”) Limitation: allowed by the group setting rules. Stolen Key Login In the drop-down list, select operation options for the missing Action:...
  • Page 148: Qnokey Account List

    When a new rule is created, "Show List" and "Edit" button will be displayed behind the rule. Click on "Show List" to show the list of users applying this group rule. Click "Edit" to change settings. Click the trash can icon to delete this setting.
  • Page 149 If there is hardware binding, QnoKey can only execute on the Bind MAC: bound PC. If hardware binding function is enabled, it will show the MAC MAC Address: address which Qnokey is bound with, not the PC MAC address. Delete the user Qnokey connection information. Delete:...
  • Page 150: Qvm Vpn Function Setup

    10.3. QVM VPN Function Setup The QVM-series device provides three major convenient functions: 1. Smart Link IPSec VPN: Easy VPN setup replaces the conventional complicated VPN setup process by entering Server IP, User Name, and Password. 2. Central Control Feature: Displays a clear VPN connection status of all remote ends and branches.
  • Page 151 Account ID: Must be identical to that of the remote client end. Please enter the remote client user name in either English or Chinese. Password: Must be identical to that of the remote client end. Confirm Password: Please enter the password and confirm again. IP Address:...
  • Page 152: Qvm Status

    VPN Hub Function: After branch and headquarter are connected, branches can access each other easily without having other tunnels. Active this account. Active: Add a new account and password. Add to list: Delete selected item: Delete the selected user. After modification, push “Apply” button to save the network setting or push “Cancel” to keep the settings unchanged.
  • Page 153: Qvm Client Settings(Future Feature)

    Shows the status of this QVM: waiting for connection (Waiting), stop Control: the connection (Disconnect), and Disable this feature/ Enable this QVM to enter the status of waiting for connection. Click Edit to enter the setting items to be changed. Config.:...
  • Page 154 Dynamic Domain Name) : Status: Displays QVN connection status. Keep Alive: Redial Period This function is to set re- connect duration if QVM contention drops. The range is 1~60 mins. Mins: QVM Backup Tunnel: You can input at most 3 backup IP addresses or domain names for backup.
  • Page 155: Virtue Route

    XI. Virtue Route Virtual Router enable the branch only has single ISP service can enjoy two different broadband network. The branch can access another ISP network with connecting to headquarter server with dual-bradband connection. As the result, the linking problem between different ISP network will be sloved.
  • Page 156 Café A can enable virtual route function and link to Café B’s device. They can access another ISP service through Café B’s network. It seems that Café A employ dual ISP service, too. If users in Café A want to access to another ISP network, the link speed won’t be restricted.
  • Page 157: Virtual Route Server (Pptp Server)

    11.1 Virtual Route Server (PPTP Server) The Chapter intrduces how to configure a Virtue Route server. Virtue Route builds PPTP on the basis of PPP (Point-to-point Protocol), it strengthens the security of PPP. Virtue Route enables encryption transmission between PPTP server and client, and enables PPTP server to verify the remote clients.
  • Page 158: Virtue Route Client (Future Feature)

    Enabled PPTP Server: When this option is selected, the point-to-point tunnel protocol PPTP server can be enabled. PPTP IP Address Range: Please enter PPTP IP address range so as to provide the remote users with an entrance IP into the local network. Enter Range Start: Enter the value into the last field.
  • Page 159 Enabled To activate the function. Binding Interface To select which WAN port is binded: WAN1~WAN4 Binding Network To select the binding network: Netcome or Self-Defined. Import IP Range Click “Browse” to import binding IP range. To select the port that will execute virtual route: All port, Game, Binding Service Port or Self-defined.
  • Page 160 To build a self-defined IP, users can use a text-based editor, such as Notepad, which is included with Windows system. Follow the text format in the figure below to key in the destination IPs users want to assign. For example, if the destination IP address range users want to designate is 140.115.1.1 ~ 140.115.1.255, key in 140.115.1.1 ~ 140.115.1.255 in Notepad.
  • Page 161: Ssl Vpn

    XII. SSL VPN For SSL VPN, clients only need a web browser to access to Central servers. After verifying the ID, clients can access to the company’s internal resources, such as Internet services, Microsoft terminal services, remote desktop services, online neighborhood networks, and secure tunnel functions through the portal.
  • Page 162: Status

    12.1 Status Status shows current SSL VPN users' online status. Display the amount of previously set tunnels. Tunnel(s) Used: Tunnel(s) Available: Display the amount of unused tunnels. User: Display the current SSL tunnel user name. Group: Display the name of current SSL tunnel using Group. Display current users' SSL tunnel remote IP addresses.
  • Page 163: Group Management

    User: Click "Detail" to view a specific group's user names and types. Add New Group: Click the "Add New Group" tab, entering the group admin section to add a new group. 12.3 Group Management Group Management helps the web administrator organize users’ access to internal service resources in groups.
  • Page 165 Group Name: SSL VPN has build-in 4 groups (All Users, Supervisor, Mobile User, and Branch Staff). “All Users” is enabled by default, while others are be disabled. You can select ” Group Enable” to enable the group setting or click on “...
  • Page 166 simplified deployment. If no suitable authentication servers can be chosen from the list, click "Add New Domain" to create a new one. Assign: All authentication servers with defined settings will be displayed on Domain Management list. You are required to choose one authentication server to be assigned to this group.
  • Page 167 User Database: For external authentication servers, the user database will be: "Apply User Database” and "Customize User Database". Click "Apply User database", then there is no need to establish additional user data, and the system will directly apply the external authentication server's internal user database settings.
  • Page 168 Radius-PAP/CHAP/MSCHAP/MSCHSPV2, NT-Domain, Active Directory, and LDAP. 1. Local Data Base Select the authentication server type from the drop down menu. Authentication Type: Domain Names: Name the selected authentication server. Submit: Click on the "Submit" tab to save changes Cancel: Click "Cancel" to clear any recent changes to the settings. 2.
  • Page 169 Secret Password: Enter the password for RADIUS. Submit: Click on the "Submit" tab to save changes Cancel: Click "Cancel" to clear any recent changes to the settings. 3. Radius-CHAP Select the authentication server type from the drop down menu. Authentication Type: Domain Names: Name the selected authentication server.
  • Page 170 Authentication Type: Select the authentication server type from the drop down menu. Domain Names: Name the selected authentication server. Enter authentication server address. RADIUS Server: Secret Password: Enter the password for RADIUS. Submit: Click on the "Submit" tab to save changes Cancel: Click "Cancel"...
  • Page 171 Name the selected authentication server. NT Server Address: Enter the NT-Domain authentication server address. NT Domain Name: Enter NT-Domain authentication domain name. For example, qno.com. Submit: Click on the "Submit" tab to save changes Cancel: Click "Cancel" to clear any recent changes to the settings.
  • Page 172 Submit: Click on the "Submit" tab to save changes Cancel: Click "Cancel" to clear any recent changes to the settings. 8. LDAP Authentication Type: Select the authentication service type you wish to use from the drop down menu. Domain Names: Name the selected authentication server.
  • Page 173 Inactivity Timeout This option is activated on all users, no matter in which group. System can log off idle users to release connection, bandwidth and system resource. You can fill the idle time in minutes to the field. ※Attention There is also idle time settings in User Management as below figure:...
  • Page 174 Therefore, single users will have different idle logout time, which is dominated by single user setting; otherwise users will log out in accordance with group setting of idle time. Step 2: User Management User Management determines who belongs to this group and have the rights to use specific resources.
  • Page 175 Assign this Select a user from the user list to assign to this group. One user can be assigned to one group only. Group: User Name: Display customized user name. Please note: The built- in users of the authentication server database in Domain Management will not display on the user list.
  • Page 176 Display the authentication server name used by this group. Domain Name: User Name: Enter authentication server’s user name. Password: For Local Database, enter user passwords. Passwords do not need to be entered if Local Database is not used. Expiration Date Enter users' permitted time limit.
  • Page 177 (2) The SSL users can choose transferring the traffic to the router completely: To indicate the users can choose all the traffic to be directed to Qno Firewall Router, after Qno Firewall router allows users to connect Virtual Passage successfully. Therefore, users can...
  • Page 178 (3) Force the traffic of SSL users to transfer to the router completely: To incicate the traffic of each user connecting the Virtual Passage successful will be forwarded to central SSL VPN server of Qno Firewall Router and can not cancel “使用遠端 SSL 網路的預設 閘道” selection as figure below.
  • Page 179: Domain Management

    12.4 Domain Management In addition to selecting 12.3 “Group Management”, SSL VPN can also provide authentication to display Domain Management. All authentication services will be shown in the Domain Management list. Groups using authentication services will be displayed according to the authentication server name. All User Group Supervisor Mobile...
  • Page 180: User Management

    Add New Domain See 12.3 “Group Management”. 12.5 User Management In addition to selecting 12.3 Group Management to configure group settings, SSL VPN can also provide inter-group user management. On the user management list, each authentication server will display all self-defined users that can be appointed to groups. All User Group Supervisor Mobile...
  • Page 181 Edit: User passwords Local Database), expiration dates, user classifications, and inactive timeouts can be edited or modified, but user authentication servers and user names cannot. If you want to modify a user name, first delete it, and then add a new user name. You can also select an authentication server to edit IP address and domain name.
  • Page 182: Service Resource Management

    Password: For Local Database, enter user passwords. Passwords do not need to be entered if Local Database is not used. Expiration Date Enter users' permitted time limit. For example, if the expiration date is (yyyy/mm/dd): set to November 1, 2007, then the user will be denied beginning on November 2, 2007 at 12: 00 AM.
  • Page 183: Link To Portal

    12.7 Link to Portal If user management settings have the user type set to “Administrator”, the user will login on the router management UI. For login to the web portal, click “Link to Portal”. 12.8 Advanced Settings Advanced Settings can modify SSL connection ports & add SSL upgrades.
  • Page 184: Virtual Passage

    12.8.1 Virtual Passage A virtual passage is a type of point-to-point SSL client connection. When remote users use a secure tunnel to connect, SSL VPN will establish a virtual web interface. For this reason, you will need to set SSL VPN's secure tunnel client address range so it does not conflict with your company's Internet DHCP IP.
  • Page 185 The Unified IP Management configuration window can set LAN IP range, DHCP IP range, SSL virtual passage IP range, and PPTP IP address range. LAN Settings: The system default for LAN IP is 192.168.1.1, and subnet mask is 255.255.255.0. Changes can be made based on actual network architecture.
  • Page 186: Advanced Configurations

    to get IPs automatically (like DHCP service in NT server). So each PC isn't required to record or set other IP addresses. After a computer starting, SSL VPN firewall will automatically acquire an IP address. Range Start: The initial IP for the 4 ranges by default are 192.168.1.100, 192.168.2.100, 192.168.3.100, and 192.168.3.100.
  • Page 187: Password Protection

    12.8.3 Password Protection For enhance the robust security connection of SSL, you can avoid illegal users or brute-force-attack by selecting below options. (1) Enable restrict crack calculator administrators can set the number of error times for the single account login, when this account login times are over the number administrators set, system will block this account for a period of time.
  • Page 188: Ssl Upgrade Serial Number

    (2) Enable graphics verification When select “Enable graphics verification” and enter “Apply”, the login web page will display graphics verification as below figure when users login next time. Users not only key in the user name/password but also need to key in the correct graphics verification to login SSL connecting successful.
  • Page 189 In addition to SSL VPN default SSL tunnel, if you want to upgrade for additional tunnels, please contact your Qno distribution representatives to order the upgraded edition. After purchasing, an SSL upgrade serial number will be provided. Enter the serial number in the "SSL Upgrade Serial Number" blank and the tunnel quantity in "SSL Upgrade Tunnel Number".
  • Page 191 The browser older than IE8.0 may display as below figure.
  • Page 192 Please note that these warning messages won't influence the operation and usage of the SSL VPN. But if you want to apply a integrity SSL certificate from a third party organization, you need contact these third party organizations(for example: VeriSign) and follow their procedures to apply a integrity SSL certificate for your business.
  • Page 193 Generally, SSL certificate format looks like the diagram below, and it indicates a .PEM file format which is available in the Qno System. Users only need to copy all the letters (including the “Begin” and “End”) into the notepad file and save to .PEM file. Then, users can import this .PEM file into Qno System.
  • Page 194: Advanced Function

    XIII. Advanced Function 13.1 DMZ Host/ Port Range Forwarding 13.1.1 DMZ Host When the NAT mode is activated, sometimes users may need to use applications that do not support virtual IP addresses such as network games. We recommend that users map the device actual WAN IP addresses directly to the Intranet virtual IP addresses, as follows: If the “DMZ Host”...
  • Page 195 use the firewall function to set up the host as a virtual host, and then convert the actual IP addresses (the Internet IP addresses) with Port 80 (the service port of WWW is Port 80) to access the internal server directly. In the configuration page, if a web server address such as 192.168.1.50 and the Port 80 has been set up in the configuration, this web page will be accessible from the Internet by keying in the device actual IP address such as, http://211.243.220.43.
  • Page 196 Service Port Management The services in the list mentioned above are frequently used services. If the service users want to activate is not in the list, we recommend that users use “Service Port Management” to add or remove ports, as follows: Service Name:...
  • Page 197 Delete selected item: To remove the selected services. Apply: Click the “Apply” button to save the modification. Cancel: Click the “Cancel” button to cancel the modification. This only works before “Apply” is clicked. Close: Quit this configuration window.
  • Page 198: Upnp

    13.2 UPnP UPnP (Universal Plug and Play) is a protocol set by Microsoft. If the virtual host supports UPnP system (such as Windows XP), users could also activate the PC UPnP function to work with the device. Select the UPnP service number default list here; for example, Service Port: WWW is 80~80, FTP is 21~21.
  • Page 199: Routing

    13.3 Routing In this chapter we introduce the Dynamic Routing Information Protocol and Static Routing Information Protocol. 13.3.1 Dynamic Routing The abbreviation of Routing Information Protocol is RIP. There are two kinds of RIP in the IP environment – RIP I and RIP II. Since there is usually only one router in a network, ordinarily just Static Routing will be used.
  • Page 200: Static Routing

    RIP is a very simple routing protocol, in which Distance Vector is used. Distance Vector determines transmission distance in accordance with the number of routers, rather than based on actual session speed. Therefore, sometimes it will select a path through the least number of routers, rather than through the fastest routers.
  • Page 201 Dest. IP: Input the remote network IP locations and subnet that is to be Subnet Mask: routed. For example, the IP/subnet is 192.168.2.0/255.255.255.0. Gateway: The default gateway location of the network node which is to be routed. Hop Count: This is the router layer count for the IP. If there are two routers under the device, users should input “2”...
  • Page 202: One To One Nat

    13.4 One to One NAT As both the device and ATU-R need only one actual IP, if ISP issued more than one actual IP (such as eight ADSL static IP addresses or more), users can map the remaining real IP addresses to the intranet PC virtual IP addresses.
  • Page 203 Enabled One to One NAT: To activate or close the One-to-One NAT function. (Check to activate the function). Private IP Range Begin: Input the Private IP address for the Intranet One-to-One NAT function. Public IP Range Begin: Input the Public IP address for the Internet One-to-One NAT function. Range Length:...
  • Page 204: Ddns- Dynamic Domain Name Service

    IP of a cable modem will be changed from time to time. To overcome this problem for users who want to build services such as a website, it offers the function of dynamic web address transfer. This service can be applied from www.qno.cn/ddns, www.3322.org, www.dyndns.org, or www.dtdns.com, and these are free.
  • Page 205 Interface This is an indication of the WAN port the user has selected. DDNS Check either of the boxes before DynDNS.org, 3322.org, DtDNS.com and QnoDDNS.org.cn to select one of the four DDNS website address transfer functions. Username The name which is set up for DDNS. Input a complete website address such as abc.qnoddns.org.cn as a user name for QnoDDNS.
  • Page 206 Status An indication of the status of the current IP function refreshed by DDNS. Apply After the changes are completed, click “Apply” to save the network configuration modification. Cancel Click “Cancel" to leave without making any changes.
  • Page 207: Mac Clone

    13.6 MAC Clone Some ISP will request for a fixed MAC address (network card physical address) for distributing IP address, which is mostly suitable for cable mode users. Users can input the network card physical address (MAC address: 00-xx-xx-xx-xx-xx) here. The device will adopt this MAC address when requesting IP address from ISP.
  • Page 208: Inbound Load Balance

    Following introduces how to enable and setup Inbound Load Balance step by step. Attention! In For some models of Qno routers, user can try the function for a period but with time limit. If the function can match your network demand, you can apply for the official version License Key in Qno Official Website (www.qno.com.tw).
  • Page 210 4. Configure Domain Name and Host IP. Assign DNS service provider and Host IP address. Take the setting on TWNIC as an example, the network structure and IP are as following: WAN1:ADSL ISP A 210.10.1.1 WAN2:ADSL ISP B 200.1.1.1 Domain Name:abc.com.tw Name Server(NS):ns1.abc.com.tw /ns2.abc.com.tw Go to website of your DNS service provider to modify your own DNS Host/IP, as the following figure:...
  • Page 211 Input the Domain Name which is applied before. The domain name will be shown in Domain Name: following configuration automatically without entering again. Time To Live: Time To Live (the abbreviation is TTL) is time interval of DNS inquiring (second, 0~65535).
  • Page 212 TWNIC service provider. (Ex. ns1.abc.com.tw WAN1: 210.10.1.1, ns2.abc.com.tw WAN2: 200.1.1.1) 7. Host Record: Add or modify host record. (A Record) Host Input the host name which provides services. E.g. mail server or FTP. Name: Check corresponding A Record IP (WAN Port IP). If more than one IPs is checked, Inbound WAN IP: traffic will be distributed on this WANs.
  • Page 213 you change your server IP, you don’t have to modify every domain one by one. Just changing A record domain, and the other domains will be assigned to new IP address automatically. Alias: Input Alias Record corresponding to A Record. Target: Input the existed A Record domain name.
  • Page 214 service port as following description. 10. Enable DNS Query (DNS service port) in Access Rule of Firewall setting. Add a new access rule in Firewall setting to enable DNS service port of the WAN on which Inbound Load Balance need to be enabled. Action: Check “Allow”.
  • Page 215 Service Port: Activate the service port of A Record server, e.g. SMTP [TCP/25~25] for Mail. Internal IP: Input the internal IP of A Record, e.g. 192.168.8.100 of Mail server. Interface: Select the WAN port of A Record and corresponding IP. Enable: Activate the configuration.
  • Page 216: System Tool

    XIV. System Tool This chapter introduces the management tool for controlling the device and testing network connection. For security consideration, we strongly suggest to change the password. Password and Time setting is in Chapter 5.2. 14.1 Diagnostic The device provides a simple online network diagnostic tool to help users troubleshoot network-related problems.
  • Page 217 Ping This item informs users of the status quo of the outbound session and allows the user to know the existence of computers online. On this test screen, please enter the host IP that users want to test such as 192.168.5.20. Press "Go"...
  • Page 218: Firmware Upgrade

    14.2 Firmware Upgrade Users may directly upgrade the device firmware on the Firmware Upgrade page. Please confirm all information about the software version in advance. Select and browse the software file, click "Firmware Upgrade Right Now" to complete the upgrade of the designated file. Note!...
  • Page 219: Configration Backup

    14.3 Configration Backup Import Configuration File: This feature allows users to integrate all backup content of parameter settings into the device. Before upgrade, confirm all information about the software version. Select and browse the backup parameter file: "config.exp." Select the file and click "Import" to import the file. Export Configuration File:...
  • Page 220: Snmp

    14.4 SNMP Simple Network Management Protocol (SNMP) refers to network management communications protocol and it is also an important network management item. Through this SNMP communications protocol, programs with network management (i.e. SNMP Tools-HP Open View) can help communications of real-time management. The device supports standard SNMP v1/v2c and is consistent with SNMP network management software so as to get hold on to the operation of the online devices and the real-time network information.
  • Page 221 Enabled: Activate SNMP feature. The default is activated. Set the name of the device such as Qno. System Name: Set the name of the person who manages the device (i.e. John). System Contact: Define the location of the device (i.e. Taipei).
  • Page 222: System Recover

    14.5 System Recover Users can restart the device with System Recover button. System Recover As the figure below, if clicking “Restart Router” button, the dialog block will pop out, confirming if users would like to restart the device.
  • Page 223 Return to Factory Default Setting If clicking “Return to Factory Default Setting, the dialog block will pop out, if the device will return to factory default.
  • Page 224: High Availability

    Besides general HA, Qno also provides advanced HA function that enables two devices to operate simultaneously. It brings full cost efficiency without making another device idle. It does not have to be the same model.
  • Page 225 Master device and Backup device. In normal situation, Master device is major DHCP IP issuer, and Backup device will disable DHCP issuing automatically. When Master device fails transmitting, the Backup device will take over all outbound links and enable DHCP server to provide IP addresses. Following is the description of the two different modes.
  • Page 226 Operation-Backup Mode Indicates the backup device will take over when the master fails transmitting. WAN and LAN IP setting in backup device should be the same as those of master device. The backup device should not be in charge of network transmitting and DHCP server. ※...
  • Page 227 the DHCP server to issue LAN IP addresses. Although Slave device also supports outbound linking, its DHCP server is disabled. WAN Backup The checked WANs will works in the other device. For an example, if (The Checked WANs are not WAN1 works in this device, and WAN2 works in the other device, WAN2 should be checked.
  • Page 228 (The Checked WANs are not WAN1 works in this device, and WAN2 works in another, WAN2 should be checked. working in this device.) LAN Gateway Backup Input the LAN IP of Master device. It should be different from Slave device’s IP. (Must be in the same subnet.) MAC Address of the backup device Input the LAN MAC of Master device.
  • Page 229: License Key

    14.7 License Key Users have to purchase License Key to “enable” some functions in Qno Firwalls/Routers series or upgrade to “Official Version”(not trial version), such as QnoSniff or Inbound Load Balance, etc. Current Time: Before inputing License Key, the device will check whether current time is correct and whether License Key is still in valid period.
  • Page 230 Status Information: Indicate remaining trial date or supported amount of QnoSoftkey VPN Tunnels. Refresh: Refresh current system status and time.
  • Page 231 XV. Log From the log management and look up, we can see the relevant operation status, which is convenient for us to facilitate the setup and operation. 15.1 System Log Its system log offers three options: system log, E-mail alert, and log setting. System Log Enable:...
  • Page 232 Syslog Server: The device provides external system log servers with log collection feature. System log is an industrial standard communications protocol. It is designed to dynamically capture related system message from the network. The system log provides the source and the destination IP addresses during the connection, service number, and type.
  • Page 233 Log Setting Alert Log The device provides the following warning message. Click to activate these features: Syn Flooding, IP Spoofing, Win Nuke, Ping of Death / Unauthorized Login Attempt. Syn Flooding: Bulky syn packet transmission in a short time causes the overload of the system storage of record in connection information.
  • Page 234 System Error Message : Provides the system log with all kinds of error messages. For example, wrong settings, occurrence of abnormal functions, system reactivation, disconnection of PPPoE and so on. Deny Policies: If remote users fail to enter the system because of the access rules; for instance, message will be recorded in the system log.
  • Page 235 Log Time Threshold: Set the interval of sending the log, and the default is set to 10 minutes. Reaching this defined number, it will automatically send out the Mail log. The device will detect which parameter (either entries or intervals) reaches the threshold first and send the log message of that parameter to the user.
  • Page 236 Outgoing Packet Log: View system packet log which is sent out from the internal PC to the Internet. This log includes LAN IP, destination IP, and service port that is applied. It is illustrated as below. Incoming Packet Log: View system packet log of those entering the firewall. The log includes information about the external source IP addresses, destination IP addresses, and service ports.
  • Page 237 15.2 System Statistic The device has the real-time surveillance management feature that provides system current operation information such as port location, device name, current WAN link status, IP address, MAC address, subnet mask, default gateway, DNS, number of received/ sent/ total packets , number of received/ sent/ total Bytes, Received and Sent Bytes/Sec., total number of error packets received, total number of the packets dropped, number of session, number of the new Session/Sec., and upstream as well as downstream broadband usage (%).
  • Page 239 15.3 Traffic Statistic Six messages will be displayed on the Traffic Statistic page to provide better traffic management and control. Inbound IP Source Address: The figure displays the source IP address, bytes per second, and percentage. Outbound IP Source Address: The figure displays the source IP address, bytes per second, and percentage.
  • Page 240 Inbound IP Service: The figure displays the network protocol type, destination IP address, bytes per second, and percentage. Outbound IP Service: The figure displays the network protocol type, destination IP address, bytes per second, and percentage.
  • Page 241 Inbound IP Session: The figure displays the source IP address, network protocol type, source port, destination IP address, destination port, bytes per second and percentage. Outbound Session: The figure displays the source IP address, network protocol type, source port, destination IP address, destination port, bytes per second and percentage.
  • Page 242 Specific IP Status: Enter the IP address that users want to inquire, and then the entire destination IP connected to remote devices as well as the number of ports will be displayed.
  • Page 243 Specific Port Status: Enter the service port number in the field and IP that are currently used by this port will be displayed. 15.5 Connection Statistic (Future Feature) Connection Statistic function is used to record the numbers of network connections, including outbound sessions, and intranet users (PC).
  • Page 244 the PC does not boot up or is not connected to internet, it will not be counted in the statistic. LAN PC Data Ordering By: : : : Select this function to sort the data by [IP Address up to down], [IP Address down to up], [Session down to up], and [Session up to down].
  • Page 245: Qrtg (Qno Router Traffic Grapher)

    15.6 QRTG (Qno Router Traffic Grapher) QRTG utilizes dynamic GUI and simple statistic to display system status of Qno Firewall/ Router presently, including CPU Utilization(%), Memory Utilization(%), Session and WAN Traffic. Enable QRTG: The funcation is disabled by default. When you are going to enable the QRTG function, system will pop-up a warning massage to remind you this function will be enabled, which may influence router efficiency.
  • Page 246 II. WAN Traffic Statistic (hourly) graphic and average (up/down stream) (As in the following figures)
  • Page 247 * The UI might vary from model to model, depending on different product lines. III. WAN Traffic Statistic (Day) graphic and average (up/down stream)(As in the following figures)
  • Page 248 * The UI might vary from model to model, depending on different product lines. IV. WAN Traffic Statistic (Week) graphic and average (up/down stream)(As in the following figures)
  • Page 249 * The UI might vary from model to model, depending on different product lines.
  • Page 250: Xvi. Log Out

    XVI. Log out On the top right corner of the web- based UI, there is a Logout button. Click on it to log out of the web- based UI. To enter next time, open the Web browser and enter the IP address, user name and password to log in.
  • Page 251: Appendix I: User Interface And User Manual Chapter Cross Reference

    Appendix I: User Interface and User Manual Chapter Cross Reference This appendix is to show the corresponding index for each chapter and user interface. Users can find how to setup quickly and understand the VPN Router capability at the same time. VPN Router overall interface is as below.
  • Page 252 Please download the manual from Qno official website. http://www.Qno.com.tw VIII. QoS Bandwidth 8.1 (QoS) Management 8.3 Bandwidth Management Session Control 8.2 Session Limit IP/DHCP VII. Port Management Setup 7.3 DHCP/ IP Status 7.4 DHCP Status IP & MAC Binding 7.5 IP & MAC Binding IP Grouping 7.6 IP Grouping...
  • Page 253 SNMP 13.4 SNMP Time 5.2 Change and Set Login Password and Time System Recover 13.5 System Recover High Availibility 13.6 High Availibility License Key 13.7 License Key Port Management VII. Port Management Setup 7.1 Setup Status 7.2 Status X. VPN Summary 10.1.1 Summary Gateway to...
  • Page 254: Block Bt Download

    Appendix II:Troubleshooting (1) Block BT Download To block BT and prevent downloading by users, go to the “Firewall -> Content Filter" and select "Enable Website Block by Keywords," followed by the input of "torrent." This will prevent the users from downloading.
  • Page 255: Shock Wave And Worm Virus Prevention

    (2)Shock Wave and Worm Virus Prevention Since many users have been attacked by Shock Wave and Worm viruses recently, the internet transmission speed was brought down and the Session bulky increase result in the massive processing load of the device. The following guides users to block this virus' corresponding port for prevention. a.
  • Page 256 Use the same method to add UDP [UDP135~139] and TCP [445~445] Ports. c. Enhance the priority level of these three to the highest.
  • Page 257: Block Qqlive Video Broadcast Setting

    If the login onto the QQLive Server is blocked, the issue can be resolved. The following relates to Qno products and provides users with solutions by introducing users how to set up the device. a). Log into the device web- based UI, and enter “Firewall -> Access Rule’.
  • Page 258 c). Input the following IP address in Dest. IP with repeat operation. 121.14.75.115 60.28.234.117 60.28.235.119 222.28.155.17 QQ LiveVersion:QQ Live 2008 (7.0.4017.0) Tested on: 2008-07-29 After repeated addition, users may see the links to the QQLive Server blocked. Click "Apply" to block QQLive video broadcast.
  • Page 259: Arp Virus Attack Prevention

    (4)ARP Virus Attack Prevention ARP Issue and Information Recently, many cyber cafes in China experienced disconnection (partially or totally) for a short period of time, but connection is resumed quickly. This is caused by the clash with MAC address. When virus-contained MAC mirrors to such NAT equipments as host devices, there is complete disconnection within the network.
  • Page 260 For these two situations, the device and client setup must be done to prevent ARP virus attack, which is to guarantee the complete resolution of the issue. The device selection is advised to take into consideration the one with anti-ARP virus attack. Qno products come squarely with such a feature, which is very user-friendly compared to other products.
  • Page 261 Now we understand ARP, ARP cheat and attack, as well as how to identify this type of attack. What comes next is to find out effective prevention measures to stop the network from being attacked. The general solution provided by Qno can be divided into the following three options: a) Enable “Prevent ARP Virus Attack”: Enter the device IP address to log in the management webpage of the device.
  • Page 262 b) Bind the Gateway IP and MAC address for each PC b) Bind the Gateway IP and MAC address for each PC This prevents the ARP from cheating IP and its MAC address. First, find out the gateway IP and MAC This prevents the ARP from cheating IP and its MAC address.
  • Page 263 go online or there is packet loss of ping, in the DOS screen, input arp –a command to check if the MAC address of the gateway is the same with the device MAC address. If not, the PC corresponding to the MAC address is the source of attack.
  • Page 264 After an item is added to the list, the corresponding message will be displayed in the white block on the bottom. However, such method is not recommended because the inquiry of IP/MAC addresses of all hosts creates heavy workload. Another method to bind IP and MAC is more recommended because of easy operation, reducing workload and time efficiency.
  • Page 265 Click to display IP and MAC binding list dialog box. In this box, the unbinding IP and MAC address corresponding to the PC are displayed. Enter the "Name" of the computer and click on "Enabled" with the display of the “√” icon and push the option on the top right corner of the screen to confirm. Now the bound options will display on the IP and MAC binding list (as illustrated in Figure 5) and click "Apply”...
  • Page 266 Though these basic operations can help solve the problem but Qno's technical engineers suggest that further measures should be taken to prevent the ARP attack. 1. Deal with virus source as well as the source device affected by virus through virus killing and the system re-installation.
  • Page 267 4. Provide system administrators with a sophisticated and strong password for different accounts. It would be best if the password consists of a combination of more than 12 letters, digits, and symbols. Forbid and delete some redundant accounts. 5. Frequently update anti-virus software (virus data base), and set the daily upgrade that allows regular and automatic update.
  • Page 268 For more information about the Qno's product and technology, please log onto the Qno's bandwidth forum, refer to the examples of the FTP server, or contact the technical department of Qno's dealers as well as the Qno's Mainland technical center.

Table of Contents