Avaya Business Secure Router 252 Configuration - Basics Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Sítě Avaya Business Secure Router 252 Configuration - Basics. Avaya Business Secure Router 252 Configuration - Basics Configuration manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 460
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Business Secure Router

BSR252Business Secure RouterDocument Number: NN47923-500Document Version: 1.2Date: May 2007Nortel Business Secure Router 252 Configuration — Basics

Strany 2 - Trademarks

10 ContentsNN47923-500Configuring attack alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190Thre

Strany 3 - Contents

100 Chapter 6 LAN screensNN47923-500Configuring IP Click LAN to open the IP screen.Figure 22 LAN IP

Strany 4 - Chapter 2

Chapter 6 LAN screens 101Nortel Business Secure Router 252 Configuration — BasicsTable 14 describes the fields in Figure 22.Table 14 LAN IPLabel Des

Strany 5 - Chapter 4

102 Chapter 6 LAN screensNN47923-500First DNS Server Second DNS Server Third DNS Server Select From ISP if your ISP dynamically assigns DNS server inf

Strany 6 - Chapter 5

Chapter 6 LAN screens 103Nortel Business Secure Router 252 Configuration — BasicsConfiguring Static DHCPWith Static DHCP, you can assign IP addresses

Strany 7

104 Chapter 6 LAN screensNN47923-500To change the static DHCP settings, click LAN, then the Static DHCP tab. The screen appears as shown in Figure 23.

Strany 8

Chapter 6 LAN screens 105Nortel Business Secure Router 252 Configuration — BasicsConfiguring IP AliasWith IP Alias, you can partition a physical netwo

Strany 9

106 Chapter 6 LAN screensNN47923-500Table 16 describes the fields in Figure 24.Table 16 IP AliasLabel DescriptionIP Alias 1,2 Select the check box t

Strany 10 - Chapter 13

107Nortel Business Secure Router 252 Configuration — BasicsChapter 7WAN screensThis chapter describes how to configure WAN settings. WAN overviewThis

Strany 11 - Chapter 14

108 Chapter 7 WAN screensNN47923-500The dial backup or traffic redirect routes cannot take priority over the WAN routes.Configuring RouteClick WAN to

Strany 12 - Chapter 16

Chapter 7 WAN screens 109Nortel Business Secure Router 252 Configuration — BasicsTable 17 describes the fields in Figure 25. PPPoE encapsulationThe Bu

Strany 13 - Chapter 18

Contents 11Nortel Business Secure Router 252 Configuration — BasicsSummary screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 14 - Chapter 20

110 Chapter 7 WAN screensNN47923-500By implementing PPPoE directly on the Business Secure Router (rather than individual computers), the computers on

Strany 15

Chapter 7 WAN screens 111Nortel Business Secure Router 252 Configuration — BasicsFigure 26 WAN: WAN ISP

Strany 16 - Appendix B

112 Chapter 7 WAN screensNN47923-500Table 18 describes the fields in Figure 26.Table 18 WAN: WAN ISPLabel DescriptionName Enter the name of your Int

Strany 17

Chapter 7 WAN screens 113Nortel Business Secure Router 252 Configuration — BasicsConfiguring WAN IP To change the WAN IP settings of your Business Sec

Strany 18

114 Chapter 7 WAN screensNN47923-500Figure 27 WAN: IP

Strany 19

Chapter 7 WAN screens 115Nortel Business Secure Router 252 Configuration — BasicsTable 19 describes the fields in Figure 27.Table 19 WAN: IPLabel De

Strany 20

116 Chapter 7 WAN screensNN47923-500RIP Direction With RIP (Routing Information Protocol), a router can exchange routing information with other router

Strany 21

Chapter 7 WAN screens 117Nortel Business Secure Router 252 Configuration — BasicsTraffic redirectTraffic redirect forwards WAN traffic to a backup gat

Strany 22

118 Chapter 7 WAN screensNN47923-500The network topology illustrated in Figure 29 avoids triangle route security issues when the backup gateway is con

Strany 23

Chapter 7 WAN screens 119Nortel Business Secure Router 252 Configuration — BasicsFigure 30 Traffic RedirectTable 20 describes the fields in Figure 3

Strany 24

12 ContentsNN47923-500Certificate file formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266Im

Strany 25

120 Chapter 7 WAN screensNN47923-500Figure 31 Dial Backup Setup

Strany 26

Chapter 7 WAN screens 121Nortel Business Secure Router 252 Configuration — BasicsTable 21 describes the fields in Figure 31.Table 21 Dial Backup Set

Strany 27

122 Chapter 7 WAN screensNN47923-500Used Fixed IP Address Select this check box if your ISP assigned you a fixed IP address and then enter the IP addr

Strany 28 - 28 Tables

Chapter 7 WAN screens 123Nortel Business Secure Router 252 Configuration — BasicsRIP Direction RIP (Routing Information Protocol) allows a router to e

Strany 29 - Text conventions

124 Chapter 7 WAN screensNN47923-500Advanced Modem SetupAT Command StringsFor regular telephone lines, the default Dial string tells the modem that th

Strany 30 - Hard copy technical manuals

Chapter 7 WAN screens 125Nortel Business Secure Router 252 Configuration — BasicsConfiguring Advanced Modem Setup Click the Edit button in the Dial Ba

Strany 31 - How to get Help

126 Chapter 7 WAN screensNN47923-500Table 22 describes the fields in Figure 32.Table 22 Advanced SetupLabel Description ExampleAT Command StringsDia

Strany 32 - 32 Preface

Chapter 7 WAN screens 127Nortel Business Secure Router 252 Configuration — BasicsApply Click Apply to save your changes to the Business Secure Router.

Strany 33 - Chapter 1

128 Chapter 7 WAN screensNN47923-500

Strany 34 - Features

129Nortel Business Secure Router 252 Configuration — BasicsChapter 8Network Address Translation (NAT) ScreensThis chapter discusses how to configure N

Strany 35 - Four-Port switch

Contents 13Nortel Business Secure Router 252 Configuration — BasicsEAP Authentication overview . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 36 - Nonphysical features

130 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Note that inside/outside refers to the location of a host, while global/local refers

Strany 37

Chapter 8 Network Address Translation (NAT) Screens 131Nortel Business Secure Router 252 Configuration — BasicsHow NAT worksEach packet has two addres

Strany 38

132 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500In Figure 34, B can send packets, with source IP address e.f.g.h and port 20202 to A

Strany 39 - Central Network Management

Chapter 8 Network Address Translation (NAT) Screens 133Nortel Business Secure Router 252 Configuration — BasicsFigure 35 NAT application with IP Ali

Strany 40 - Full network management

134 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Table 24 summarizes these types.Using NATSUA (Single User Account) versus NATSUA (Si

Strany 41 - Embedded FTP and TFTP Servers

Chapter 8 Network Address Translation (NAT) Screens 135Nortel Business Secure Router 252 Configuration — BasicsSUA Server A SUA server set is a list o

Strany 42 - Hardware Setup

136 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Port forwarding: Services and Port NumbersThe most often used port numbers are shown

Strany 43

Chapter 8 Network Address Translation (NAT) Screens 137Nortel Business Secure Router 252 Configuration — BasicsFigure 36 Multiple servers behind NAT

Strany 44

138 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Figure 37 SUA/NAT setupTable 26 describes the fields in Figure 37.Table 26 SUA/N

Strany 45 - Introducing the WebGUI

Chapter 8 Network Address Translation (NAT) Screens 139Nortel Business Secure Router 252 Configuration — BasicsConfiguring Address MappingOrdering you

Strany 46 - Figure 2 Login screen

14 ContentsNN47923-500Configuring TELNET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351Configu

Strany 47

140 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Figure 38 Address MappingTable 27 describes the fields in Figure 38.Table 27 Add

Strany 48

Chapter 8 Network Address Translation (NAT) Screens 141Nortel Business Secure Router 252 Configuration — BasicsConfiguring Address Mapping To edit an

Strany 49

142 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Figure 39 Address Mapping editTable 28 describes the fields in Figure 39.Table 28

Strany 50 - Figure 6 MAIN MENU Screen

Chapter 8 Network Address Translation (NAT) Screens 143Nortel Business Secure Router 252 Configuration — BasicsTrigger Port ForwardingSome services us

Strany 51 - Figure 7 Contact Support

144 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Figure 40 Trigger Port Forwarding process: example1 Jane (A) requests a file from

Strany 52

Chapter 8 Network Address Translation (NAT) Screens 145Nortel Business Secure Router 252 Configuration — BasicsConfiguring Trigger Port ForwardingTo c

Strany 53 - Wizard setup

146 Chapter 8 Network Address Translation (NAT) ScreensNN47923-500Table 29 describes the fields in Figure 41.Table 29 Trigger PortLabel DescriptionN

Strany 54

147Nortel Business Secure Router 252 Configuration — BasicsChapter 9Static Route screensThis chapter shows you how to configure static routes for your

Strany 55 - VPI and VCI

148 Chapter 9 Static Route screensNN47923-500Figure 42 Example of Static Routing topologyConfiguring IP Static RouteClick STATIC ROUTE to open the R

Strany 56 - Table 2 Wizard Screen 1

Chapter 9 Static Route screens 149Nortel Business Secure Router 252 Configuration — BasicsFigure 43 Static Route screenTable 30 describes the fields

Strany 57 - IP address assignment

Contents 15Nortel Business Secure Router 252 Configuration — BasicsChapter 21Call scheduling screens . . . . . . . . . . . . . . . . . . . . . . . .

Strany 58 - Private IP addresses

150 Chapter 9 Static Route screensNN47923-500Configuring Route entrySelect a static route index number and click Edit. The screen is illustrated in Fi

Strany 59 - Chapter 3 Wizard setup 59

Chapter 9 Static Route screens 151Nortel Business Secure Router 252 Configuration — BasicsMetric Metric represents the cost of transmission for routin

Strany 60 - 60 Chapter 3 Wizard setup

152 Chapter 9 Static Route screensNN47923-500

Strany 61 - Chapter 3 Wizard setup 61

153Nortel Business Secure Router 252 Configuration — BasicsChapter 10FirewallsThis chapter gives some background information on firewalls and introduc

Strany 62 - 62 Chapter 3 Wizard setup

154 Chapter 10 FirewallsNN47923-500Packet filtering firewallsPacket filtering firewalls restrict access based on the source or destination computer ne

Strany 63 - Chapter 3 Wizard setup 63

Chapter 10 Firewalls 155Nortel Business Secure Router 252 Configuration — BasicsIntroduction to the Business Secure Router firewallThe Business Secure

Strany 64 - 64 Chapter 3 Wizard setup

156 Chapter 10 FirewallsNN47923-500Figure 45 Business Secure Router firewall applicationDenial of ServiceDenial of Service (DoS) attacks are aimed a

Strany 65 - DHCP setup

Chapter 10 Firewalls 157Nortel Business Secure Router 252 Configuration — BasicsWhen computers communicate on the Internet, they use the client/server

Strany 66 - Figure 13 Wizard Screen 3

158 Chapter 10 FirewallsNN47923-5002 Weaknesses in the TCP/IP specification leave it open to SYN Flood and LAND attacks. These attacks are executed du

Strany 67 - Chapter 3 Wizard setup 67

Chapter 10 Firewalls 159Nortel Business Secure Router 252 Configuration — BasicsFigure 47 SYN floodIn a LAND Attack, hackers flood SYN packets into

Strany 68 - 68 Chapter 3 Wizard setup

16 ContentsNN47923-500Enabling Pop-up Blockers with Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . 417Internet Explorer JavaScript .

Strany 69 - Test your Internet connection

160 Chapter 10 FirewallsNN47923-500Figure 48 Smurf attack• ICMP vulnerability ICMP is an error reporting protocol that works in concert with IP. The

Strany 70 - 70 Chapter 3 Wizard setup

Chapter 10 Firewalls 161Nortel Business Secure Router 252 Configuration — BasicsAll SMTP commands are illegal except for those displayed in Table 35.•

Strany 71 - User Notes

162 Chapter 10 FirewallsNN47923-500• Allows all sessions originating from the LAN (local network) to the WAN (Internet).• Denies all sessions originat

Strany 72

Chapter 10 Firewalls 163Nortel Business Secure Router 252 Configuration — Basicsrule for this packet and it is not an attack, the Action for packets t

Strany 73

164 Chapter 10 FirewallsNN47923-500These custom rules work by evaluating the network traffic source IP address, destination IP address, IP protocol ty

Strany 74 - Security

Chapter 10 Firewalls 165Nortel Business Secure Router 252 Configuration — BasicsUDP/ICMP securityUDP and ICMP do not contain any connection informatio

Strany 75 - Advanced Router Configuration

166 Chapter 10 FirewallsNN47923-500Any protocol that operates in this way must be supported on a case-by-case basis. You can use the Custom Ports feat

Strany 76 - 76 Chapter 4 User Notes

Chapter 10 Firewalls 167Nortel Business Secure Router 252 Configuration — BasicsWhen to use filtering1 To block or allow LAN packets by their MAC addr

Strany 77 - Emulation)

168 Chapter 10 FirewallsNN47923-500distinguish traffic originating from an inside host or an outside host by IP address.4 The firewall performs better

Strany 78 - 78 Chapter 4 User Notes

169Nortel Business Secure Router 252 Configuration — BasicsChapter 11Firewall screensThis chapter shows you how to configure your Business Secure Rout

Strany 79 - Chapter 4 User Notes 79

17Nortel Business Secure Router 252 Configuration — BasicsFiguresFigure 1 Secure Internet Access and VPN Application . . . . . . . . . . . . . . . .

Strany 80 - 80 Chapter 4 User Notes

170 Chapter 11 Firewall screensNN47923-500By default, the Business Secure Router stateful packet inspection blocks packets traveling in the following

Strany 81 - System screens

Chapter 11 Firewall screens 171Nortel Business Secure Router 252 Configuration — BasicsRule logic overviewRule checklist1 State the intent of the rule

Strany 82 - Configuring General Setup

172 Chapter 11 Firewall screensNN47923-500Once these questions have been answered, adding rules is simply a matter of plugging the information into th

Strany 83 - Chapter 5 System screens 83

Chapter 11 Firewall screens 173Nortel Business Secure Router 252 Configuration — Basicsthe LAN interface is an example of traffic destined for the Bus

Strany 84 - 84 Chapter 5 System screens

174 Chapter 11 Firewall screensNN47923-500Figure 51 WAN to LAN trafficConfiguring firewallClick FIREWALL to open the Summary screen. Enable (or acti

Strany 85 - Configuring Dynamic DNS

Chapter 11 Firewall screens 175Nortel Business Secure Router 252 Configuration — BasicsIf you list a general rule before a specific rule, traffic that

Strany 86 - Table 9 DDNS

176 Chapter 11 Firewall screensNN47923-500Figure 52 Enabling the firewall Table 36 describes the fields in Figure 52.Table 36 Firewall rules summa

Strany 87 - Configuring Password

Chapter 11 Firewall screens 177Nortel Business Secure Router 252 Configuration — BasicsBypass Triangle RouteSelect this check box to have the Business

Strany 88 - Table 10 Password

178 Chapter 11 Firewall screensNN47923-500Configuring firewall rulesFollow these directions to create a new rule.In the Summary screen, type the index

Strany 89 - Chapter 5 System screens 89

Chapter 11 Firewall screens 179Nortel Business Secure Router 252 Configuration — BasicsFigure 53 Creating and editing a firewall rule Table 37 descr

Strany 90 - Configuring Time and Date

18 FiguresNN47923-500Figure 30 Traffic Redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Figure 31

Strany 91 - Figure 20 Time and Date

180 Chapter 11 Firewall screensNN47923-500Source Address Click SrcAdd to add a new address, SrcEdit to edit an existing one or SrcDelete to delete one

Strany 92 - Table 12 Time and Date

Chapter 11 Firewall screens 181Nortel Business Secure Router 252 Configuration — BasicsConfiguring source and destination addressesTo add a new source

Strany 93 - Chapter 5 System screens 93

182 Chapter 11 Firewall screensNN47923-500Configuring custom portsYou can also configure customized ports for services not predefined by the Business

Strany 94 - Configuring ALG

Chapter 11 Firewall screens 183Nortel Business Secure Router 252 Configuration — Basics Example firewall rule The following Internet firewall rule exa

Strany 95 - Table 13 ALG

184 Chapter 11 Firewall screensNN47923-5006 Configure the Firewall Rule Edit IP screen as follows and click Apply.Figure 57 Firewall rule edit IP ex

Strany 96 - 96 Chapter 5 System screens

Chapter 11 Firewall screens 185Nortel Business Secure Router 252 Configuration — BasicsFigure 59 MyService rule configuration exampleAfter completin

Strany 97 - LAN screens

186 Chapter 11 Firewall screensNN47923-500Figure 60 My Service example rule summary Predefined servicesThe Available Services list box in the Edit R

Strany 98 - LAN TCP/IP

Chapter 11 Firewall screens 187Nortel Business Secure Router 252 Configuration — Basicstype. For example, look at the default configuration labeled “(

Strany 99 - Multicast

188 Chapter 11 Firewall screensNN47923-500NEW-ICQ(TCP:5190) An Internet chat program.NEWS(TCP:144) A protocol for news groups.NFS(UDP:2049) Network

Strany 100 - Configuring IP

Chapter 11 Firewall screens 189Nortel Business Secure Router 252 Configuration — BasicsAlertsAlerts are reports on events, such as attacks, that you w

Strany 101 - Table 14 LAN IP

Figures 19Nortel Business Secure Router 252 Configuration — BasicsFigure 65 Transport and Tunnel mode IPSec encapsulation . . . . . . . . . . . . . .

Strany 102 - NN47923-500

190 Chapter 11 Firewall screensNN47923-500Configuring attack alertAttack alerts are the first defense against DOS attacks. In the Attack Alert screen

Strany 103 - Configuring Static DHCP

Chapter 11 Firewall screens 191Nortel Business Secure Router 252 Configuration — BasicsThe Business Secure Router measures both the total number of ex

Strany 104 - Table 15 Static DHCP

192 Chapter 11 Firewall screensNN47923-500The Business Secure Router also sends alerts whenever TCP Maximum Incomplete is exceeded. The global values

Strany 105 - Configuring IP Alias

Chapter 11 Firewall screens 193Nortel Business Secure Router 252 Configuration — BasicsOne Minute High This is the rate of new half-open sessions that

Strany 106 - Table 16 IP Alias

194 Chapter 11 Firewall screensNN47923-500

Strany 107 - WAN screens

195Nortel Business Secure Router 252 Configuration — BasicsChapter 12Content filtering This chapter provides a brief overview of content filtering usi

Strany 108 - Configuring Route

196 Chapter 12 Content filteringNN47923-500Configure Content FilteringClick Content Filter on the navigation panel, to open the screen show in Figure

Strany 109 - PPPoE encapsulation

Chapter 12 Content filtering 197Nortel Business Secure Router 252 Configuration — BasicsTable 42 describes the fields in Figure 62.Table 42 Content

Strany 110 - Configuring WAN ISP

198 Chapter 12 Content filteringNN47923-500Time of Day to BlockTime of Day to Block allows the administrator to define during which time periods conte

Strany 111 - Figure 26 WAN: WAN ISP

199Nortel Business Secure Router 252 Configuration — BasicsChapter 13VPNThis chapter introduces the basics of IPSec VPNs and covers the VPN WebGUI. Se

Strany 112 - Table 18 WAN: WAN ISP

2NN47923-500NN47923-500Copyright © Nortel 2005–2006All rights reserved.The information in this document is subject to change without notice. The state

Strany 113 - Configuring WAN IP

20 FiguresNN47923-500Figure 100 Bandwidth Manager: Edit class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306Figure 101 Bandwidth

Strany 114 - Figure 27 WAN: IP

200 Chapter 13 VPNNN47923-500or • As a VPN router that can have encrypted connections to multiple remote VPN routers. With this role, it can also serv

Strany 115 - Table 19 WAN: IP

Chapter 13 VPN 201Nortel Business Secure Router 252 Configuration — BasicsSecurity AssociationA Security Association (SA) is a contract between two pa

Strany 116 - 116 Chapter 7 WAN screens

202 Chapter 13 VPNNN47923-500Data confidentialityThe IPSec sender can encrypt packets before transmitting them across a network. Data integrityThe IPS

Strany 117 - Traffic redirect

Chapter 13 VPN 203Nortel Business Secure Router 252 Configuration — BasicsFigure 64 IPSec architectureIPSec algorithmsThe ESP (Encapsulating Securit

Strany 118 - Configuring Traffic Redirect

204 Chapter 13 VPNNN47923-500The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404), provide an authentication mechanism for the

Strany 119 - Configuring Dial Backup

Chapter 13 VPN 205Nortel Business Secure Router 252 Configuration — BasicsAn added feature of the ESP is payload padding, which further protects commu

Strany 120 - Figure 31 Dial Backup Setup

206 Chapter 13 VPNNN47923-500EncapsulationThe two modes of operation for IPSec VPNs are Transport mode and Tunnel mode. Figure 65 Transport and Tunn

Strany 121 - Table 21 Dial Backup Setup

Chapter 13 VPN 207Nortel Business Secure Router 252 Configuration — BasicsTunnel mode Tunnel mode encapsulates the entire IP packet to transmit it sec

Strany 122 - 122 Chapter 7 WAN screens

208 Chapter 13 VPNNN47923-500IPSec using ESP in Tunnel mode encapsulates the entire original packet (including headers) in a new IP packet. The new IP

Strany 123 - Chapter 7 WAN screens 123

Chapter 13 VPN 209Nortel Business Secure Router 252 Configuration — BasicsYou can also enter the domain name of the remote secure gateway in the Secur

Strany 124 - Advanced Modem Setup

Figures 21Nortel Business Secure Router 252 Configuration — BasicsFigure 135 UPnP Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 125 - Figure 32 Advanced Setup

210 Chapter 13 VPNNN47923-500Figure 67 SummaryIP Policies

Strany 126 - Table 22 Advanced Setup

Chapter 13 VPN 211Nortel Business Secure Router 252 Configuration — BasicsTable 47 describes the fields in Figure 67.Table 47 SummaryLabel Descripti

Strany 127 - Chapter 7 WAN screens 127

212 Chapter 13 VPNNN47923-500Keep AliveWhen you initiate an IPSec tunnel with keep alive enabled, the Business Secure Router automatically renegotiate

Strany 128 - 128 Chapter 7 WAN screens

Chapter 13 VPN 213Nortel Business Secure Router 252 Configuration — Basicsoffice rules. See the VPN Branch Office Rule Setup screen (Figure 71 on page

Strany 129 - Chapter 8

214 Chapter 13 VPNNN47923-500NAT traversal solves the problem by adding a UDP port 500 header to the IPSec packet. The NAT router forwards the IPSec p

Strany 130 - What NAT does

Chapter 13 VPN 215Nortel Business Secure Router 252 Configuration — BasicsFigure 69 VPN Contivity Client rule setupTable 48 VPN Contivity Client r

Strany 131 - How NAT works

216 Chapter 13 VPNNN47923-500Configuring Advanced SetupSelect one of the VPN rules in the VPN Summary screen and click Edit to configure the rule. If

Strany 132 - NAT application

Chapter 13 VPN 217Nortel Business Secure Router 252 Configuration — BasicsFigure 70 VPN Contivity Client advanced rule setupTable 49 describes the f

Strany 133 - NAT mapping types

218 Chapter 13 VPNNN47923-500ID Type and contentWith aggressive negotiation mode (see “Negotiation Mode” on page 240 for more information), the Busine

Strany 134 - Using NAT

Chapter 13 VPN 219Nortel Business Secure Router 252 Configuration — BasicsConfigure the ID type and content in the VPN Branch Office Rule Setup screen

Strany 135 - SUA Server

22 FiguresNN47923-500Figure 170 Restart screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409Figure 171

Strany 136

220 Chapter 13 VPNNN47923-500The two Business Secure Routers shown in Table 52 can complete negotiation and establish a VPN tunnel.The two Business Se

Strany 137 - Configuring SUA Server

Chapter 13 VPN 221Nortel Business Secure Router 252 Configuration — Basics• If the WAN connection goes down, the Business Secure Router uses the dial

Strany 138 - Table 26 SUA/NAT setup

222 Chapter 13 VPNNN47923-500Figure 71 VPN Branch Office rule setup

Strany 139 - Configuring Address Mapping

Chapter 13 VPN 223Nortel Business Secure Router 252 Configuration — BasicsTable 54 describes the fields in Figure 71.Table 54 VPN Branch Office rule

Strany 140 - Table 27 Address Mapping

224 Chapter 13 VPNNN47923-500Available/ Selected IP PolicyThe Available IP Policy table displays network routes. Use the Add, Edit and Delete buttons

Strany 141

Chapter 13 VPN 225Nortel Business Secure Router 252 Configuration — BasicsLocal IP Address This field displays the IP address (or range of IP addresse

Strany 142

226 Chapter 13 VPNNN47923-500Remote IP Address This field displays the IP addresses of computers on the remote network behind the remote IPSec router.

Strany 143 - Trigger Port Forwarding

Chapter 13 VPN 227Nortel Business Secure Router 252 Configuration — BasicsCertificate Use the drop-down list to select the certificate to use for this

Strany 144

228 Chapter 13 VPNNN47923-500Peer Content When you select IP in the Peer ID Type field, type the IP address of the computer with which you make the VP

Strany 145 - Figure 41 Trigger Port

Chapter 13 VPN 229Nortel Business Secure Router 252 Configuration — BasicsESP Select ESP if you want to use ESP (Encapsulation Security Payload). The

Strany 146 - Table 29 Trigger Port

23Nortel Business Secure Router 252 Configuration — BasicsTablesTable 1 Feature specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 147 - Static Route screens

230 Chapter 13 VPNNN47923-500Configuring an IP PolicySelect one of the IP policies in the VPN Branch Office screen and click Add or Edit to configure

Strany 148 - Configuring IP Static Route

Chapter 13 VPN 231Nortel Business Secure Router 252 Configuration — BasicsFigure 72 VPN Branch Office — IP Policy

Strany 149

232 Chapter 13 VPNNN47923-500Table 55 describes the fields in Figure 72.Table 55 VPN Branch Office — IP PolicyLabel DescriptionProtocol Enter a num

Strany 150 - Configuring Route entry

Chapter 13 VPN 233Nortel Business Secure Router 252 Configuration — BasicsType Select one of the following port mapping types. 1. One-to-One: One-to-o

Strany 151

234 Chapter 13 VPNNN47923-500Virtual Ending IP Address When the Type field is configured to One-to-one or Many-to-One, this field is N/A. When the Typ

Strany 152

Chapter 13 VPN 235Nortel Business Secure Router 252 Configuration — BasicsProtocol Enter a number to specify what type of traffic is allowed to go thr

Strany 153 - Firewalls

236 Chapter 13 VPNNN47923-500Port forwarding server A NAT server set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, tha

Strany 154 - Application level firewalls

Chapter 13 VPN 237Nortel Business Secure Router 252 Configuration — BasicsFigure 73 VPN Branch Office — IP Policy - Port Forwarding ServerTable 56 d

Strany 155 - Chapter 10 Firewalls 155

238 Chapter 13 VPNNN47923-500IKE phasesThere are two phases to every IKE (Internet Key Exchange) negotiation–phase 1 (Authentication) and phase 2 (Key

Strany 156 - Denial of Service

Chapter 13 VPN 239Nortel Business Secure Router 252 Configuration — BasicsFigure 74 Two phases to set up the IPSec SAIn Phase 1 you must:• Choose a

Strany 157 - Types of DoS attacks

24 TablesNN47923-500Table 30 IP Static Route summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149Table 31 Edit IP Sta

Strany 158 - 158 Chapter 10 Firewalls

240 Chapter 13 VPNNN47923-500• Set the IPSec SA lifetime. In this field, you can determine how long the IPSec SA will stay up before it times out. The

Strany 159 - Figure 47 SYN flood

Chapter 13 VPN 241Nortel Business Secure Router 252 Configuration — BasicsDiffie-Hellman (DH) Key GroupsDiffie-Hellman (DH) is a public-key cryptograp

Strany 160 - ICMP types trigger an alert:

242 Chapter 13 VPNNN47923-500Figure 75 VPN Branch Office advanced rule setupTable 57 describes the fields in Figure 75.Table 57 VPN Branch Office

Strany 161 - Stateful inspection

Chapter 13 VPN 243Nortel Business Secure Router 252 Configuration — BasicsMultiple Proposal Select this check box to allow the Business Secure Router

Strany 162 - Stateful inspection process

244 Chapter 13 VPNNN47923-500Multiple Proposal Select this check box to allow the Business Secure Router to use any of its phase 2 encryption and aut

Strany 163 - Chapter 10 Firewalls 163

Chapter 13 VPN 245Nortel Business Secure Router 252 Configuration — BasicsSA MonitorIn the WebGUI, click VPN and the SA Monitor tab. Use this screen t

Strany 164 - TCP security

246 Chapter 13 VPNNN47923-500Figure 76 VPN SA Monitor Table 58 describes the fields in Figure 76.Table 58 VPN SA MonitorLabel Description# This i

Strany 165 - Upper layer protocols

Chapter 13 VPN 247Nortel Business Secure Router 252 Configuration — Basics Global settingsIn the WebGUI, click VPN on the navigation panel, then click

Strany 166 - Packet filtering vs. firewall

248 Chapter 13 VPNNN47923-500VPN Client Termination Use these screens to configure the Business Secure Router for VPN connections from computers using

Strany 167 - Firewall

Chapter 13 VPN 249Nortel Business Secure Router 252 Configuration — BasicsFigure 78 VPN Client Termination

Strany 168 - 168 Chapter 10 Firewalls

Tables 25Nortel Business Secure Router 252 Configuration — BasicsTable 65 My Certificate Import . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 169 - Firewall screens

250 Chapter 13 VPNNN47923-500Table 60 describes the fields in Figure 78.Table 60 VPN Client TerminationLabel DescriptionEnable Client TerminationTu

Strany 170

Chapter 13 VPN 251Nortel Business Secure Router 252 Configuration — BasicsEncryption Select the combinations of protocol and encryption and authentic

Strany 171 - Rule logic overview

252 Chapter 13 VPNNN47923-500VPN Client Termination IP pool summaryIn the WebGUI, click VPN on the navigation panel and the Client Termination tab to

Strany 172 - Connection direction examples

Chapter 13 VPN 253Nortel Business Secure Router 252 Configuration — BasicsFigure 79 VPN Client Termination IP pool summaryTable 61 describes the fie

Strany 173 - WAN to LAN rules

254 Chapter 13 VPNNN47923-500VPN Client Termination IP pool editIn the WebGUI, click VPN on the navigation panel and the Client Termination tab to ope

Strany 174 - Configuring firewall

Chapter 13 VPN 255Nortel Business Secure Router 252 Configuration — BasicsVPN Client Termination advancedIn the WebGUI, click VPN on the navigation pa

Strany 175

256 Chapter 13 VPNNN47923-500Figure 81 VPN Client Termination advanced

Strany 176

Chapter 13 VPN 257Nortel Business Secure Router 252 Configuration — BasicsTable 63 describes the fields in Figure 81.Table 63 VPN Client Termination

Strany 177

258 Chapter 13 VPNNN47923-500Accept ISAKMP Initial Contact PayloadThe Business Secure Router can accept the INITIAL-CONTACT status messages to inform

Strany 178 - Configuring firewall rules

Chapter 13 VPN 259Nortel Business Secure Router 252 Configuration — BasicsPassword Management You can have the Business Secure Router use some passwor

Strany 179

26 TablesNN47923-500Table 100 Log settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377Table 101

Strany 180

260 Chapter 13 VPNNN47923-500

Strany 181

261Nortel Business Secure Router 252 Configuration — BasicsChapter 14CertificatesThis chapter gives background information about public-key certificat

Strany 182 - Configuring custom ports

262 Chapter 14 CertificatesNN47923-500The Business Secure Router uses certificates based on public-key cryptology to authenticate users attempting to

Strany 183 - Example firewall rule

Chapter 14 Certificates 263Nortel Business Secure Router 252 Configuration — BasicsConfiguration summaryThis section summarizes how to manage certific

Strany 184

264 Chapter 14 CertificatesNN47923-500Figure 83 My Certificates

Strany 185

Chapter 14 Certificates 265Nortel Business Secure Router 252 Configuration — BasicsTable 64 describes the labels in Figure 83.Table 64 My Certificat

Strany 186 - Predefined services

266 Chapter 14 CertificatesNN47923-500Certificate file formatsThe certification authority certificate that you want to import has to be in one of thes

Strany 187

Chapter 14 Certificates 267Nortel Business Secure Router 252 Configuration — Basics• Binary PKCS#7: This is a standard that defines the general syntax

Strany 188

268 Chapter 14 CertificatesNN47923-500Figure 84 My Certificate ImportTable 65 describes the labels in Figure 84.Table 65 My Certificate ImportLabe

Strany 189

Chapter 14 Certificates 269Nortel Business Secure Router 252 Configuration — BasicsCreating a certificateClick CERTIFICATES, My Certificates and then

Strany 190 - Configuring attack alert

Tables 27Nortel Business Secure Router 252 Configuration — BasicsTable 135 PKI Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 191

270 Chapter 14 CertificatesNN47923-500Figure 85 My Certificate create

Strany 192 - Table 41 Attack alert

Chapter 14 Certificates 271Nortel Business Secure Router 252 Configuration — BasicsTable 66 describes the labels in the Figure 85.Table 66 My Certif

Strany 193

272 Chapter 14 CertificatesNN47923-500Create a certification request and save it locally for later manual enrollment Select Create a certification req

Strany 194

Chapter 14 Certificates 273Nortel Business Secure Router 252 Configuration — BasicsAfter you click Apply in the My Certificate Create screen, you see

Strany 195 - Content filtering

274 Chapter 14 CertificatesNN47923-500Figure 86 My Certificate details

Strany 196 - Configure Content Filtering

Chapter 14 Certificates 275Nortel Business Secure Router 252 Configuration — BasicsTable 67 describes the labels in Figure 86.Table 67 My Certificat

Strany 197 - Table 42 Content filter

276 Chapter 14 CertificatesNN47923-500Issuer This field displays identifying information about the certification authority that issued the certificate

Strany 198

Chapter 14 Certificates 277Nortel Business Secure Router 252 Configuration — BasicsTrusted CAsClick CERTIFICATES, Trusted CAs to open the Trusted CAs

Strany 199

278 Chapter 14 CertificatesNN47923-500Figure 87 Trusted CAsTable 68 describes the labels in Figure 87.Table 68 Trusted CAsLabel DescriptionPKI Sto

Strany 200 - VPN screens overview

Chapter 14 Certificates 279Nortel Business Secure Router 252 Configuration — BasicsIssuer This field displays identifying information about the certif

Strany 202 - IPSec architecture

280 Chapter 14 CertificatesNN47923-500Importing a Trusted CA certificateClick CERTIFICATES, Trusted CAs to open the Trusted CAs screen and then click

Strany 203 - IPSec algorithms

Chapter 14 Certificates 281Nortel Business Secure Router 252 Configuration — BasicsTrusted CA Certificate detailsClick CERTIFICATES, Trusted CAs to op

Strany 204 - 204 Chapter 13 VPN

282 Chapter 14 CertificatesNN47923-500Figure 89 Trusted CA details

Strany 205 - Key management

Chapter 14 Certificates 283Nortel Business Secure Router 252 Configuration — BasicsTable 70 describes the labels in Figure 89.Table 70 Trusted CA de

Strany 206 - Encapsulation

284 Chapter 14 CertificatesNN47923-500Signature AlgorithmThis field displays the type of algorithm that was used to sign the certificate. Some certifi

Strany 207 - IPSec and NAT

Chapter 14 Certificates 285Nortel Business Secure Router 252 Configuration — BasicsTrusted remote hostsClick CERTIFICATES, Trusted Remote Hosts to ope

Strany 208 - Secure Gateway Address

286 Chapter 14 CertificatesNN47923-500Figure 90 Trusted remote hostsTable 71 describes the labels in Figure 90.Table 71 Trusted Remote HostsLabel

Strany 209 - Summary screen

Chapter 14 Certificates 287Nortel Business Secure Router 252 Configuration — BasicsVerifying a certificate of a trusted remote hostCertificates issued

Strany 210 - IP Policies

288 Chapter 14 CertificatesNN47923-5002 Make sure that the certificate has a “.cer” or “.crt” file name extension.Figure 91 Remote host certificates

Strany 211 - Table 47 Summary

Chapter 14 Certificates 289Nortel Business Secure Router 252 Configuration — BasicsImporting a certificate of a trusted remote hostClick CERTIFICATES,

Strany 212 - Nailed up

29Nortel Business Secure Router 252 Configuration — BasicsPrefaceBefore you beginThis guide assists you through the basic configuration of your Busine

Strany 213 - NAT Traversal

290 Chapter 14 CertificatesNN47923-500Table 72 describes the labels in Figure 93.Trusted remote host certificate detailsClick CERTIFICATES, Trusted Re

Strany 214 - Preshared key

Chapter 14 Certificates 291Nortel Business Secure Router 252 Configuration — BasicsFigure 94 Trusted remote host details

Strany 215 - Chapter 13 VPN 215

292 Chapter 14 CertificatesNN47923-500Table 73 describes the labels in Figure 94.Table 73 Trusted remote host detailsLabel DescriptionName This fiel

Strany 216 - Configuring Advanced Setup

Chapter 14 Certificates 293Nortel Business Secure Router 252 Configuration — BasicsValid To This field displays the date that the certificate expires.

Strany 217 - Chapter 13 VPN 217

294 Chapter 14 CertificatesNN47923-500Directory serversClick CERTIFICATES, Directory Servers to open the Directory Servers screen (Figure 95). This sc

Strany 218 - ID Type and content

Chapter 14 Certificates 295Nortel Business Secure Router 252 Configuration — BasicsTable 74 describes the labels in Figure 95.Add or edit a directory

Strany 219 - ID type and content examples

296 Chapter 14 CertificatesNN47923-500Figure 96 Directory server addTable 75 describes the labels in Figure 96.Table 75 Directory server addLabel

Strany 220 - My IP Address

Chapter 14 Certificates 297Nortel Business Secure Router 252 Configuration — BasicsServer Port This field displays the default server port number of t

Strany 221 - Chapter 13 VPN 221

298 Chapter 14 CertificatesNN47923-500

Strany 222 - 222 Chapter 13 VPN

299Nortel Business Secure Router 252 Configuration — BasicsChapter 15Bandwidth managementThis chapter describes the functions and configuration of ban

Strany 223 - Chapter 13 VPN 223

3Nortel Business Secure Router 252 Configuration — BasicsContentsPreface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 224 - 224 Chapter 13 VPN

30 PrefaceNN47923-500Related publicationsFor more information about using the Business Secure Router, refer to the following publications:• Nortel Bus

Strany 225 - Chapter 13 VPN 225

300 Chapter 15 Bandwidth managementNN47923-500Bandwidth classes and filtersUse bandwidth subclasses to allocate specific amounts of bandwidth capacity

Strany 226 - 226 Chapter 13 VPN

Chapter 15 Bandwidth management 301Nortel Business Secure Router 252 Configuration — BasicsFigure 97 Subnet based bandwidth management exampleApplic

Strany 227 - Chapter 13 VPN 227

302 Chapter 15 Bandwidth managementNN47923-500Configuring summaryClick BW MGMT to open the Summary screen. Enable bandwidth management on an interface

Strany 228 - 228 Chapter 13 VPN

Chapter 15 Bandwidth management 303Nortel Business Secure Router 252 Configuration — BasicsConfiguring class setupThe class setup screen displays the

Strany 229 - Chapter 13 VPN 229

304 Chapter 15 Bandwidth managementNN47923-500Figure 99 Bandwidth Manager: Class setupTable 78 describes the labels in Figure 99.Table 78 Bandwidt

Strany 230 - Configuring an IP Policy

Chapter 15 Bandwidth management 305Nortel Business Secure Router 252 Configuration — BasicsBandwidth Manager Class ConfigurationConfigure a bandwidth

Strany 231 - Chapter 13 VPN 231

306 Chapter 15 Bandwidth managementNN47923-500Figure 100 Bandwidth Manager: Edit classTable 79 describes the labels in Figure 100.Table 79 Bandwid

Strany 232 - 232 Chapter 13 VPN

Chapter 15 Bandwidth management 307Nortel Business Secure Router 252 Configuration — BasicsFilter ConfigurationEnable Bandwidth Filter Select Enable B

Strany 233 - Chapter 13 VPN 233

308 Chapter 15 Bandwidth managementNN47923-500Bandwidth management statisticsUse the Bandwidth Management Statistics screen to view network performanc

Strany 234 - 234 Chapter 13 VPN

Chapter 15 Bandwidth management 309Nortel Business Secure Router 252 Configuration — BasicsFigure 101 Bandwidth management statistics Table 81 descr

Strany 235 - Chapter 13 VPN 235

Preface 31Nortel Business Secure Router 252 Configuration — BasicsHow to get HelpThis section explains how to get help for Nortel products and service

Strany 236 - Port forwarding server

310 Chapter 15 Bandwidth managementNN47923-500MonitorTo view bandwidth usage and allotments, click BW MGMT, then the Monitor tab. The screen appears a

Strany 237 - Chapter 13 VPN 237

311Nortel Business Secure Router 252 Configuration — BasicsChapter 16IEEE 802.1xIEEE 802.1x overviewThe IEEE 802.1x standard outlines enhanced securit

Strany 238 - IKE phases

312 Chapter 16 IEEE 802.1xNN47923-500• Access-RequestSent by the Business Secure Router requesting authentication.• Access-RejectSent by a RADIUS serv

Strany 239 - Chapter 13 VPN 239

Chapter 16 IEEE 802.1x 313Nortel Business Secure Router 252 Configuration — BasicsYour Business Secure Router supports EAP-MD5 (Message-Digest Algorit

Strany 240 - Negotiation Mode

314 Chapter 16 IEEE 802.1xNN47923-500Figure 104 802.1X Table 83 describes the labels in Figure 104.Table 83 802.1X Label DescriptionAuthentication

Strany 241 - Perfect Forward Secrecy (PFS)

Chapter 16 IEEE 802.1x 315Nortel Business Secure Router 252 Configuration — BasicsAuthentication DatabasesThe authentication database contains user lo

Strany 242 - 242 Chapter 13 VPN

316 Chapter 16 IEEE 802.1xNN47923-500

Strany 243 - Chapter 13 VPN 243

317Nortel Business Secure Router 252 Configuration — BasicsChapter 17Authentication serverThe Business Secure Router can use either the local user dat

Strany 244 - 244 Chapter 13 VPN

318 Chapter 17 Authentication serverNN47923-500Figure 105 Local User databaseTable 84 describes the labels in Figure 105. Table 84 Local User data

Strany 245 - SA Monitor

Chapter 17 Authentication server 319Nortel Business Secure Router 252 Configuration — BasicsEdit Local User DatabaseTo change a local user database en

Strany 246 - Table 58 VPN SA Monitor

32 PrefaceNN47923-500Getting Help from a specialist by using an Express Routing CodeTo access some Nortel Technical Solutions Centers, you can use an

Strany 247 - Global settings

320 Chapter 17 Authentication serverNN47923-500Figure 106 Local User database edit

Strany 248 - VPN Client Termination

Chapter 17 Authentication server 321Nortel Business Secure Router 252 Configuration — BasicsTable 85 describes the labels in Figure 106. Table 85 Lo

Strany 249 - Chapter 13 VPN 249

322 Chapter 17 Authentication serverNN47923-500Current split networksIn the Local User Database Edit screen, click Configure Network to display the Cu

Strany 250 - 250 Chapter 13 VPN

Chapter 17 Authentication server 323Nortel Business Secure Router 252 Configuration — BasicsTable 86 describes the labels in Figure 107. Current split

Strany 251 - Chapter 13 VPN 251

324 Chapter 17 Authentication serverNN47923-500Figure 108 Current split networks editTable 87 describes the labels in Figure 108. Table 87 Current

Strany 252 - 252 Chapter 13 VPN

Chapter 17 Authentication server 325Nortel Business Secure Router 252 Configuration — BasicsConfiguring RADIUSUse RADIUS if you want to authenticate u

Strany 253 - Chapter 13 VPN 253

326 Chapter 17 Authentication serverNN47923-500Figure 109 RADIUSTable 88 describes the labels in Figure 109.Table 88 RADIUSLabel DescriptionAuthen

Strany 254 - 254 Chapter 13 VPN

Chapter 17 Authentication server 327Nortel Business Secure Router 252 Configuration — BasicsPort Number The default port of the RADIUS server for auth

Strany 255 - Chapter 13 VPN 255

328 Chapter 17 Authentication serverNN47923-500

Strany 256 - 256 Chapter 13 VPN

329Nortel Business Secure Router 252 Configuration — BasicsChapter 18Remote management screensThis chapter provides information on the Remote Manageme

Strany 257 - Chapter 13 VPN 257

33Nortel Business Secure Router 252 Configuration — BasicsChapter 1Getting to know your Business Secure RouterThis chapter introduces the main feature

Strany 258 - 258 Chapter 13 VPN

330 Chapter 18 Remote management screensNN47923-5001 A filter in SMT menu 3.1 (LAN) or in menu 11.1.4 (WAN) is applied to block a Telnet, FTP, or Web

Strany 259 - Chapter 13 VPN 259

Chapter 18 Remote management screens 331Nortel Business Secure Router 252 Configuration — BasicsIntroduction to HTTPSHTTPS (HyperText Transfer Protoco

Strany 260 - 260 Chapter 13 VPN

332 Chapter 18 Remote management screensNN47923-500Figure 110 HTTPS implementationConfiguring WWWTo change your Business Secure Router Web settings,

Strany 261 - Certificates

Chapter 18 Remote management screens 333Nortel Business Secure Router 252 Configuration — BasicsFigure 111 WWWTable 89 describes the labels in Figur

Strany 262 - Self-signed certificates

334 Chapter 18 Remote management screensNN47923-500HTTPS exampleTo change the default HTTPS port on the Business Secure Router, in your browser, enter

Strany 263 - My Certificates

Chapter 18 Remote management screens 335Nortel Business Secure Router 252 Configuration — BasicsInternet Explorer warning messagesWhen you attempt to

Strany 264 - Figure 83 My Certificates

336 Chapter 18 Remote management screensNN47923-500Select Accept this certificate permanently to import the Business Secure Router certificate into th

Strany 265 - Table 64 My Certificates

Chapter 18 Remote management screens 337Nortel Business Secure Router 252 Configuration — BasicsFigure 114 Security Certificate 2 (Netscape)Avoiding

Strany 266 - Certificate file formats

338 Chapter 18 Remote management screensNN47923-500a Click REMOTE MGMT. Write down the name of the certificate displayed in the Server Certificate fie

Strany 267 - Importing a certificate

Chapter 18 Remote management screens 339Nortel Business Secure Router 252 Configuration — BasicsFigure 115 Logon screen (Internet Explorer)

Strany 268 - 268 Chapter 14 Certificates

34 Chapter 1 Getting to know your Business Secure RouterNN47923-500FeaturesThis section lists the key features of the Business Secure Router.Physical

Strany 269 - Creating a certificate

340 Chapter 18 Remote management screensNN47923-500Figure 116 Login screen (Netscape)Click Login to proceed. The screen shown in Figure 117 appears.

Strany 270 - 270 Chapter 14 Certificates

Chapter 18 Remote management screens 341Nortel Business Secure Router 252 Configuration — BasicsFigure 117 Replace certificateClick Apply in the Rep

Strany 271 - Chapter 14 Certificates 271

342 Chapter 18 Remote management screensNN47923-500Figure 118 Device-specific certificateClick Ignore in the Replace Certificate screen to use the c

Strany 272 - 272 Chapter 14 Certificates

Chapter 18 Remote management screens 343Nortel Business Secure Router 252 Configuration — BasicsFigure 119 Common Business Secure Router certificate

Strany 273 - My Certificate details

344 Chapter 18 Remote management screensNN47923-500Figure 120 SSH Communication ExampleHow SSH worksFigure 121 summarizes how a secure connection is

Strany 274 - 274 Chapter 14 Certificates

Chapter 18 Remote management screens 345Nortel Business Secure Router 252 Configuration — BasicsThe client automatically saves any new server public k

Strany 275 - Chapter 14 Certificates 275

346 Chapter 18 Remote management screensNN47923-500Figure 122 SSHTable 90 describes the labels in Figure 122.Table 90 SSHLabel DescriptionServer H

Strany 276 - 276 Chapter 14 Certificates

Chapter 18 Remote management screens 347Nortel Business Secure Router 252 Configuration — BasicsSecure Telnet using SSH examplesThis section shows two

Strany 277 - Trusted CAs

348 Chapter 18 Remote management screensNN47923-500Example 2: LinuxThis section describes how to access the Business Secure Router using the OpenSSH c

Strany 278 - Table 68 Trusted CAs

Chapter 18 Remote management screens 349Nortel Business Secure Router 252 Configuration — BasicsFigure 125 SSH Example 2: Log on3 The SMT main menu

Strany 279 - Chapter 14 Certificates 279

Chapter 1 Getting to know your Business Secure Router 35Nortel Business Secure Router 252 Configuration — Basics• Extended-reach ADSL (ER ADSL)• SRA (

Strany 280 - Table 69 Trusted CA import

350 Chapter 18 Remote management screensNN47923-500Figure 126 Secure FTP: Firmware Upload ExampleTelnetYou can configure your Business Secure Router

Strany 281 - Chapter 14 Certificates 281

Chapter 18 Remote management screens 351Nortel Business Secure Router 252 Configuration — BasicsConfiguring TELNETClick REMOTE MANAGEMENT to open the

Strany 282 - 282 Chapter 14 Certificates

352 Chapter 18 Remote management screensNN47923-500Configuring FTPYou can upload and download the Business Secure Router firmware and configuration fi

Strany 283 - Table 70 Trusted CA details

Chapter 18 Remote management screens 353Nortel Business Secure Router 252 Configuration — BasicsConfiguring SNMPSimple Network Management Protocol is

Strany 284 - 284 Chapter 14 Certificates

354 Chapter 18 Remote management screensNN47923-500Figure 130 SNMP Management ModelAn SNMP-managed network consists of two main types of component:

Strany 285 - Trusted remote hosts

Chapter 18 Remote management screens 355Nortel Business Secure Router 252 Configuration — Basics• Get-Allows the manager to retrieve an object variabl

Strany 286 - 286 Chapter 14 Certificates

356 Chapter 18 Remote management screensNN47923-500REMOTE MANAGEMENT: SNMPTo change your Business Secure Router SNMP settings, click REMOTE MANAGEMENT

Strany 287 - Chapter 14 Certificates 287

Chapter 18 Remote management screens 357Nortel Business Secure Router 252 Configuration — BasicsConfiguring DNSUse DNS (Domain Name System) to map a d

Strany 288 - 288 Chapter 14 Certificates

358 Chapter 18 Remote management screensNN47923-500Figure 132 DNSTable 95 describes the fields in Figure 132.Configuring SecurityTo change your Busi

Strany 289 - Chapter 14 Certificates 289

Chapter 18 Remote management screens 359Nortel Business Secure Router 252 Configuration — BasicsIf an outside user attempts to probe an unsupported po

Strany 290 - 290 Chapter 14 Certificates

36 Chapter 1 Getting to know your Business Secure RouterNN47923-500Autonegotiating 10/100 Mb/s Ethernet LANThe LAN interfaces automatically detect if

Strany 291 - Chapter 14 Certificates 291

360 Chapter 18 Remote management screensNN47923-500Do not respond to requests for unauthorized servicesSelect this option to prevent hackers from find

Strany 292 - 292 Chapter 14 Certificates

361Nortel Business Secure Router 252 Configuration — BasicsChapter 19UPnPThis chapter introduces the Universal Plug and Play feature. Universal Plug a

Strany 293 - Chapter 14 Certificates 293

362 Chapter 19 UPnPNN47923-500Windows Messenger is an example of an application that supports NAT traversal and UPnP. Cautions with UPnPThe automated

Strany 294 - Directory servers

Chapter 19 UPnP 363Nortel Business Secure Router 252 Configuration — BasicsFigure 134 Configuring UPnPTable 97 describes the fields in Figure 134.Ta

Strany 295 - Secure Router can access

364 Chapter 19 UPnPNN47923-500Displaying UPnP port mappingClick UPnP and then Ports to display the screen as shown in Figure 135. Use this screen to v

Strany 296 - 296 Chapter 14 Certificates

Chapter 19 UPnP 365Nortel Business Secure Router 252 Configuration — BasicsInstalling UPnP in Windows exampleThis section shows how to install UPnP in

Strany 297 - Chapter 14 Certificates 297

366 Chapter 19 UPnPNN47923-500Figure 136 Add/Remove programs: Windows setup3 In the Communications window, select the Universal Plug and Play check

Strany 298 - 298 Chapter 14 Certificates

Chapter 19 UPnP 367Nortel Business Secure Router 252 Configuration — Basics1 Click Start and Control Panel. 2 Double-click Network Connections.3 In th

Strany 299 - Bandwidth management

368 Chapter 19 UPnPNN47923-5005 In the Networking Services window, select the Universal Plug and Play check box. Figure 140 Windows XP networking se

Strany 300 - Bandwidth classes and filters

Chapter 19 UPnP 369Nortel Business Secure Router 252 Configuration — Basics2 Right-click the icon and select Properties. Figure 141 Internet gateway

Strany 301 - SIP 64 Kb/s 64 Kb/s

Chapter 1 Getting to know your Business Secure Router 37Nortel Business Secure Router 252 Configuration — BasicsNortel Contivity Client Termination Th

Strany 302 - Configuring summary

370 Chapter 19 UPnPNN47923-5004 You can edit or delete the port mappings or click Add to manually add port mappings.Figure 143 Internet connection p

Strany 303 - Configuring class setup

Chapter 19 UPnP 371Nortel Business Secure Router 252 Configuration — Basics5 Select the Show icon in notification area when connected check box and cl

Strany 304

372 Chapter 19 UPnPNN47923-5003 Select My Network Places under Other PlacesFigure 147 Network connections 4 An icon with the description for each UP

Strany 305

373Nortel Business Secure Router 252 Configuration — BasicsChapter 20Logs ScreensThis chapter contains information about configuring general log setti

Strany 306

374 Chapter 20 Logs ScreensNN47923-500Figure 149 View LogTable 99 describes the fields in Figure 149.Table 99 View LogLabel DescriptionDisplay Th

Strany 307

Chapter 20 Logs Screens 375Nortel Business Secure Router 252 Configuration — BasicsConfiguring Log settingsTo change your Business Secure Router log s

Strany 308

376 Chapter 20 Logs ScreensNN47923-500Figure 150 Log settings

Strany 309

Chapter 20 Logs Screens 377Nortel Business Secure Router 252 Configuration — BasicsTable 100 describes the fields in Figure 150.Table 100 Log settin

Strany 310

378 Chapter 20 Logs ScreensNN47923-500Configuring ReportsTo change your Business Secure Router log reports, click Logs, and then the Reports tab. The

Strany 311 - IEEE 802.1x

Chapter 20 Logs Screens 379Nortel Business Secure Router 252 Configuration — Basics• How much traffic has been sent to and from the LAN IP addresses t

Strany 312 - EAP Authentication overview

38 Chapter 1 Getting to know your Business Secure RouterNN47923-500Brute force password guessing protectionThe Business Secure Router has a special pr

Strany 313 - Configuring 802.1X

380 Chapter 20 Logs ScreensNN47923-500Table 101 describes the fields in Figure 151.Viewing Web site hitsIn the Reports screen, select Web Site Hits fr

Strany 314 - Table 83 802.1X

Chapter 20 Logs Screens 381Nortel Business Secure Router 252 Configuration — BasicsFigure 152 Web site hits report exampleTable 102 describes the fi

Strany 315 - Chapter 16 IEEE 802.1x 315

382 Chapter 20 Logs ScreensNN47923-500Viewing Protocol/PortIn the Reports screen, select Protocol/Port from the Report Type drop-down list to have the

Strany 316 - 316 Chapter 16 IEEE 802.1x

Chapter 20 Logs Screens 383Nortel Business Secure Router 252 Configuration — BasicsTable 103 describes the fields in Figure 153.Viewing LAN IP address

Strany 317 - Authentication server

384 Chapter 20 Logs ScreensNN47923-500Figure 154 LAN IP address report exampleTable 104 describes the fields in Figure 154.Table 104 LAN IP Addres

Strany 318

Chapter 20 Logs Screens 385Nortel Business Secure Router 252 Configuration — BasicsReports specificationsTable 105 lists detailed specifications on th

Strany 319 - Edit Local User Database

386 Chapter 20 Logs ScreensNN47923-500

Strany 320

387Nortel Business Secure Router 252 Configuration — BasicsChapter 21Call scheduling screensWith call scheduling (applicable for PPPoA or PPPoE encaps

Strany 321

388 Chapter 21 Call scheduling screensNN47923-500Figure 155 Call schedule summaryTable 106 describes the fields in Figure 155.Table 106 Call Sched

Strany 322 - Current split networks

Chapter 21 Call scheduling screens 389Nortel Business Secure Router 252 Configuration — BasicsCall scheduling editTo configure a schedule set, click t

Strany 323 - Current split networks edit

Chapter 1 Getting to know your Business Secure Router 39Nortel Business Secure Router 252 Configuration — BasicsDynamic DNS supportWith Dynamic DNS (D

Strany 324

390 Chapter 21 Call scheduling screensNN47923-500If a connection has been already established, your Business Secure Router will not drop it. After the

Strany 325 - Configuring RADIUS

Chapter 21 Call scheduling screens 391Nortel Business Secure Router 252 Configuration — BasicsApplying Schedule Sets to a remote nodeOnce your schedul

Strany 326 - Table 88 RADIUS

392 Chapter 21 Call scheduling screensNN47923-500Figure 157 Applying Schedule Sets to a remote node

Strany 327

Chapter 21 Call scheduling screens 393Nortel Business Secure Router 252 Configuration — Basics

Strany 328

394 Chapter 21 Call scheduling screensNN47923-500

Strany 329 - Remote management screens

395Nortel Business Secure Router 252 Configuration — BasicsChapter 22MaintenanceThis chapter displays system information such as firmware, port IP add

Strany 330 - System timeout

396 Chapter 22 MaintenanceNN47923-500Figure 158 System Status Table 108 describes the fields in Figure 158.Table 108 System StatusLabel Descriptio

Strany 331 - Introduction to HTTPS

Chapter 22 Maintenance 397Nortel Business Secure Router 252 Configuration — BasicsSystem statisticsRead-only information here includes port status and

Strany 332 - Configuring WWW

398 Chapter 22 MaintenanceNN47923-500Figure 159 System Status: Show statisticsTable 109 describes the fields in Figure 159.Table 109 System Status

Strany 333 - Table 89 WWW

Chapter 22 Maintenance 399Nortel Business Secure Router 252 Configuration — BasicsDHCP Table screen With DHCP (Dynamic Host Configuration Protocol, RF

Strany 334 - HTTPS example

4 ContentsNN47923-500IPSec VPN capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36Nortel Contivity C

Strany 335

40 Chapter 1 Getting to know your Business Secure RouterNN47923-500Network Address Translation (NAT)NAT (Network Address Translation — NAT, RFC 1631)

Strany 336

400 Chapter 22 MaintenanceNN47923-500Figure 160 DHCP TableTable 110 describes the fields in Figure 160.Diagnostic ScreenFrom the Site Map screen, cl

Strany 337

Chapter 22 Maintenance 401Nortel Business Secure Router 252 Configuration — BasicsFigure 161 DiagnosticTable 111 describes the fields in Figure 161.

Strany 338 - Logon screen

402 Chapter 22 MaintenanceNN47923-500F/W Upload screenFind firmware at www.nortel.com/index.html in a file that usually uses the system model name wit

Strany 339

Chapter 22 Maintenance 403Nortel Business Secure Router 252 Configuration — BasicsFigure 162 Firmware uploadTable 112 describes the fields in Figure

Strany 340 - Secure Router models

404 Chapter 22 MaintenanceNN47923-500Figure 163 Firmware Upload In ProcessThe device automatically restarts in this time, causing a temporary networ

Strany 341

Chapter 22 Maintenance 405Nortel Business Secure Router 252 Configuration — BasicsConfiguration screenClick MAINTENANCE, and then the Configuration ta

Strany 342

406 Chapter 22 MaintenanceNN47923-500Figure 167 Reset warning messageYou can also press the RESET button on the rear panel to reset the factory defa

Strany 343 - SSH overview

Chapter 22 Maintenance 407Nortel Business Secure Router 252 Configuration — BasicsRestore configuration With restore configuration, you can upload a n

Strany 344 - How SSH works

408 Chapter 22 MaintenanceNN47923-500Figure 169 Network Temporarily DisconnectedIf you uploaded the default configuration file, you need to change t

Strany 345 - Configuring SSH

Chapter 22 Maintenance 409Nortel Business Secure Router 252 Configuration — BasicsFigure 170 Restart screen

Strany 346 - Table 90 SSH

Chapter 1 Getting to know your Business Secure Router 41Nortel Business Secure Router 252 Configuration — BasicsLogging and tracingThe Business Secure

Strany 347 - Example 1: Microsoft Windows

410 Chapter 22 MaintenanceNN47923-500

Strany 348 - Example 2: Linux

411Nortel Business Secure Router 252 Configuration — BasicsAppendix ATroubleshootingThis chapter covers potential problems and the corresponding remed

Strany 349 - Secure FTP using SSH example

412 Appendix A TroubleshootingNN47923-500Problems with the LAN LEDProblems with the LAN interfaceTable 115 Troubleshooting the LAN LEDProblem Correc

Strany 350

Appendix A Troubleshooting 413Nortel Business Secure Router 252 Configuration — BasicsProblems with the WAN interfaceProblems with Internet accessTabl

Strany 351 - Configuring TELNET

414 Appendix A TroubleshootingNN47923-500Problems accessing an Internet Web site Problems with the passwordTable 119 Troubleshooting Web Site Intern

Strany 352 - Configuring FTP

Appendix A Troubleshooting 415Nortel Business Secure Router 252 Configuration — BasicsProblems with the WebGUI Problems with Remote ManagementTable 12

Strany 353 - Configuring SNMP

416 Appendix A TroubleshootingNN47923-500Allowing Pop-up Windows, JavaScript and Java Permissions In order to use the WebGUI, you must allow:• Web bro

Strany 354

Appendix A Troubleshooting 417Nortel Business Secure Router 252 Configuration — Basics1 In Internet Explorer, select Tools, Internet Options, Privacy.

Strany 355 - SNMP Traps

418 Appendix A TroubleshootingNN47923-5002 Select Settings… to open the Pop-up Blocker Settings screen.Figure 173 Internet options3 Type the IP addr

Strany 356 - REMOTE MANAGEMENT: SNMP

Appendix A Troubleshooting 419Nortel Business Secure Router 252 Configuration — Basics4 Click Add to move the IP address to the list of Allowed sites.

Strany 357 - Configuring DNS

42 Chapter 1 Getting to know your Business Secure RouterNN47923-500Figure 1 Secure Internet Access and VPN ApplicationHardware SetupRefer to Nortel

Strany 358 - Configuring Security

420 Appendix A TroubleshootingNN47923-5001 In Internet Explorer, click Tools, Internet Options, and then the Security tab. Figure 175 Internet optio

Strany 359 - Table 96 Security

Appendix A Troubleshooting 421Nortel Business Secure Router 252 Configuration — Basics6 Click OK to close the window.Figure 176 Security Settings -

Strany 360

422 Appendix A TroubleshootingNN47923-5005 Click OK to close the window.Figure 177 Security Settings - Java JAVA (Sun)1 From Internet Explorer, clic

Strany 361

Appendix A Troubleshooting 423Nortel Business Secure Router 252 Configuration — Basics4 Close your existing browser session and open a new browser.Fig

Strany 362 - Configuring UPnP

424 Appendix A TroubleshootingNN47923-500Allowing Pop-ups1 In Netscape, click Tools, Popup Manager and then select Allow Popups From This Site. Figure

Strany 363 - Table 97 Configuring UPnP

Appendix A Troubleshooting 425Nortel Business Secure Router 252 Configuration — Basics3 Clear the Block unrequested popup windows check box. Figure 1

Strany 364 - Displaying UPnP port mapping

426 Appendix A TroubleshootingNN47923-5004 Click the Allowed Sites... button. Figure 182 Popup Windows5 Type the IP address of your device (the Web

Strany 365 - Installing UPnP in Windows Me

Appendix A Troubleshooting 427Nortel Business Secure Router 252 Configuration — Basics6 Click Add to move the IP address to the Site list.Figure 183

Strany 366 - Installing UPnP in Windows XP

428 Appendix A TroubleshootingNN47923-5004 Click OK to close the window.Figure 184 Advanced 5 Click the Advanced directory and then select Scripts &

Strany 367 - Chapter 19 UPnP 367

Appendix A Troubleshooting 429Nortel Business Secure Router 252 Configuration — Basics7 Click OK to close the window.Figure 185 Scripts & Plug-i

Strany 368 - 368 Chapter 19 UPnP

Chapter 1 Getting to know your Business Secure Router 43Nortel Business Secure Router 252 Configuration — BasicsNote: Please use only No. 26 AWG (Amer

Strany 369 - Chapter 19 UPnP 369

430 Appendix A TroubleshootingNN47923-500

Strany 370 - Figure 144 Service settings

431Nortel Business Secure Router 252 Configuration — BasicsAppendix BLog DescriptionsThis appendix provides descriptions of example log messages.Table

Strany 371 - WebGUI easy access

432 Appendix B Log DescriptionsNN47923-500TELNET Login Fail Someone has failed to log on to the router through Teln et.FTP Login Successfully Someone

Strany 372 - WebGUI logon screen displays

Appendix B Log Descriptions 433Nortel Business Secure Router 252 Configuration — Basicsattack ESP The firewall detected an ESP attack.attack GRE The f

Strany 373 - Logs Screens

434 Appendix B Log DescriptionsNN47923-500For type and code details, see Table 130.teardrop ICMP (type:%d, code:%d)The firewall detected an ICMP teard

Strany 374 - Table 99 View Log

Appendix B Log Descriptions 435Nortel Business Secure Router 252 Configuration — BasicsFirewall default policy: ICMP (set:%d, type:%d, code:%d)ICMP ac

Strany 375 - Configuring Log settings

436 Appendix B Log DescriptionsNN47923-500Firewall rule match: (set:%d, rule:%d)Access matched the listed firewall rule and the Business Secure Router

Strany 376 - Figure 150 Log settings

Appendix B Log Descriptions 437Nortel Business Secure Router 252 Configuration — BasicsFilter default policy DROP!Access matched a default filter poli

Strany 377 - Table 100 Log settings

438 Appendix B Log DescriptionsNN47923-500(set:%d) With firewall messages, this is the number of the ACL policy set and denotes the packet's dire

Strany 378 - Configuring Reports

Appendix B Log Descriptions 439Nortel Business Secure Router 252 Configuration — BasicsFor type and code details, see Table 130.Table 129 ACL Settin

Strany 379 - Figure 151 Reports

44 Chapter 1 Getting to know your Business Secure RouterNN47923-500

Strany 380 - Viewing Web site hits

440 Appendix B Log DescriptionsNN47923-500VPN/IPSec LogsTo view the IPSec and IKE connection log, type 3 in menu 27 and press [ENTER] to display the I

Strany 381 - Chapter 20 Logs Screens 381

Appendix B Log Descriptions 441Nortel Business Secure Router 252 Configuration — BasicsFigure 186 Example VPN Initiator IPSec LogVPN Responder IPSec

Strany 382 - Viewing Protocol/Port

442 Appendix B Log DescriptionsNN47923-500Figure 187 Example VPN Responder IPSec LogThis menu is useful for troubleshooting your Business Secure Rou

Strany 383 - Viewing LAN IP address

Appendix B Log Descriptions 443Nortel Business Secure Router 252 Configuration — BasicsTable 132 Sample IKE Key Exchange LogsLog Message Description

Strany 384 - 384 Chapter 20 Logs Screens

444 Appendix B Log DescriptionsNN47923-500!! Remote IP <IP start> / <IP end> conflictsIf the security gateway is “0.0.0.0”, the Business

Strany 385 - Reports specifications

Appendix B Log Descriptions 445Nortel Business Secure Router 252 Configuration — BasicsTable 133 shows sample log messages during packet transmission.

Strany 386 - 386 Chapter 20 Logs Screens

446 Appendix B Log DescriptionsNN47923-500Table 134 shows RFC 2408 ISAKMP payload types that the log displays. Refer to RFC 2408 for detailed informat

Strany 387 - Call scheduling

Appendix B Log Descriptions 447Nortel Business Secure Router 252 Configuration — BasicsFailed to resolve <CMP CA server url>The CMP online certi

Strany 388

448 Appendix B Log DescriptionsNN47923-500Table 136 Certificate Path Verification Failure Reason CodesCode Description1 Algorithm mismatch between t

Strany 389 - Call scheduling edit

Appendix B Log Descriptions 449Nortel Business Secure Router 252 Configuration — BasicsTable 137 IEEE 802.1X LogsLog Message DescriptionLocal User D

Strany 390

45Nortel Business Secure Router 252 Configuration — BasicsChapter 2Introducing the WebGUIThis chapter describes how to access the Business Secure Rout

Strany 391

450 Appendix B Log DescriptionsNN47923-500Log CommandsGo to the command interpreter interface (the Command Interpreter Appendix explains how to access

Strany 392

Appendix B Log Descriptions 451Nortel Business Secure Router 252 Configuration — BasicsUse the sys logs save command to store the settings in the Busi

Strany 393

452 Appendix B Log DescriptionsNN47923-500Log Command ExampleThis example shows how to set the Business Secure Router to record the access logs and al

Strany 394

Nortel Business Secure Router 252 Configuration — Basics453IndexNumbers3DES 2054-Port Switch 35AAction 177Action for Matched Packets 180ActiveX 197Adm

Strany 395 - Maintenance

454 IndexNN47923-500Call Scheduling 38, 387Maximum Number of Schedule Sets 387, 391Precedence 387Precedence Example 387Called ID 126Calling Line Ident

Strany 396 - Table 108 System Status

Index 455Nortel Business Secure Router 252 Configuration — BasicsEECHO 136Enable Wildcard 87Encapsulating Security Payload 204Encapsulation 53, 56ENET

Strany 397 - System statistics

456 IndexNN47923-500IGMP 99, 116, 123IGMP-V1 116IGMP-v1 123IGMP-V2 116IGMP-v2 123Illegal Commands 160Initial Contact Payload 258Inside 130Inside Globa

Strany 398 - 398 Chapter 22 Maintenance

Index 457Nortel Business Secure Router 252 Configuration — BasicsMulticast Version 123Multiplexing 35, 54LLC-based 55VC-based 55multiplexing method 54

Strany 399 - DHCP Table screen

458 IndexNN47923-500PVC 54QQuick Start Guide 45RRADIUS 311Shared Secret Key 312RADIUS Message Types 311reboot 402regulatory information 2reinitialize

Strany 400 - Diagnostic Screen

Index 459Nortel Business Secure Router 252 Configuration — BasicsSSH 37, 343SSH Implementation 345Start Port 146Stateful Inspection 37, 153, 154, 161,

Strany 401 - Table 111 Diagnostic

46 Chapter 2 Introducing the WebGUINN47923-5001 Launch your web browser.2 Type 192.168.1.1 as the URL.3 Type the username (“nnadmin” is the default) a

Strany 402 - F/W Upload screen

460 IndexNN47923-500VPN Client Termination 248WWAN to LAN Rules 173Web Proxy 197Web Site Hits 380WebGUI 45, 49, 155, 166, 172Windows Networking 116, 2

Strany 403 - Table 112 Firmware Upload

Chapter 2 Introducing the WebGUI 47Nortel Business Secure Router 252 Configuration — BasicsFigure 3 Change password screen5 Click Apply in the Repla

Strany 404 - 404 Chapter 22 Maintenance

48 Chapter 2 Introducing the WebGUINN47923-500The MAIN MENU screen appears.Restoring the factory-default configuration settingsIf you just want to res

Strany 405 - Configuration screen

Chapter 2 Introducing the WebGUI 49Nortel Business Secure Router 252 Configuration — Basicsmessage Press Any key to enter Debug Mode within 3 seconds,

Strany 406 - Backup configuration

Contents 5Nortel Business Secure Router 252 Configuration — BasicsProcedure to use the reset button . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 407 - Restore configuration

50 Chapter 2 Introducing the WebGUINN47923-500Figure 6 MAIN MENU ScreenClick the Contact link to display the customer support contact information. F

Strany 408 - Restart screen

Chapter 2 Introducing the WebGUI 51Nortel Business Secure Router 252 Configuration — BasicsFigure 7 Contact Support

Strany 409 - Figure 170 Restart screen

52 Chapter 2 Introducing the WebGUINN47923-500

Strany 410 - 410 Chapter 22 Maintenance

53Nortel Business Secure Router 252 Configuration — BasicsChapter 3Wizard setupThis chapter provides information on the Wizard screens in the WebGUI.W

Strany 411 - Troubleshooting

54 Chapter 3 Wizard setupNN47923-500PPP over EthernetPPP over Ethernet (PPPoE) provides access control and billing functionality in a manner similar t

Strany 412 - Problems with the LAN LED

Chapter 3 Wizard setup 55Nortel Business Secure Router 252 Configuration — BasicsVC-based multiplexingIn this case, by prior mutual agreement, each pr

Strany 413 - Problems with Internet access

56 Chapter 3 Wizard setupNN47923-500Figure 8 Wizard Screen 1Table 2 describes the fields in Figure 8.Table 2 Wizard Screen 1Label DescriptionMode

Strany 414 - Problems with the password

Chapter 3 Wizard setup 57Nortel Business Secure Router 252 Configuration — BasicsIP address and subnet maskSimilar to the way houses on a street share

Strany 415 - Problems with the WebGUI

58 Chapter 3 Wizard setupNN47923-500IP assignment with PPPoA or PPPoE encapsulationIf you have a dynamic IP, the IP Address and ENET ENCAP Gateway fie

Strany 416 - Permissions

Chapter 3 Wizard setup 59Nortel Business Secure Router 252 Configuration — BasicsYou can obtain your IP address from the IANA, from an ISP, or it can

Strany 417

6 ContentsNN47923-500General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Firewall

Strany 418 - Figure 173 Internet options

60 Chapter 3 Wizard setupNN47923-500Figure 9 Internet connection with PPPoATable 3 describes the fields in Figure 9.Table 3 Internet connection wi

Strany 419 - Internet Explorer JavaScript

Chapter 3 Wizard setup 61Nortel Business Secure Router 252 Configuration — BasicsFigure 10 Internet connection with RFC 1483Table 4 describes the fi

Strany 420

62 Chapter 3 Wizard setupNN47923-500Figure 11 Internet connection with ENET ENCAPTable 5 describes the fields in Figure 11.Network Address Translati

Strany 421

Chapter 3 Wizard setup 63Nortel Business Secure Router 252 Configuration — BasicsFigure 12 Internet connection with PPPoEENET ENCAP GatewayYou must

Strany 422 - JAVA (Sun)

64 Chapter 3 Wizard setupNN47923-500Table 6 describes the fields in Figure 12.Table 6 Internet connection with PPPoELabel DescriptionService Name T

Strany 423 - Netscape Pop-up Blockers

Chapter 3 Wizard setup 65Nortel Business Secure Router 252 Configuration — BasicsDHCP setupUsing Dynamic Host Configuration Protocol (DHCP), individua

Strany 424 - Allowing Pop-ups

66 Chapter 3 Wizard setupNN47923-500Figure 13 Wizard Screen 32 To change your Business Secure Router LAN settings, click Change LAN Configuration to

Strany 425 - Figure 181 Popup Windows

Chapter 3 Wizard setup 67Nortel Business Secure Router 252 Configuration — BasicsFigure 14 Wizard: LAN configurationTable 7 describes the fields in

Strany 426 - Figure 182 Popup Windows

68 Chapter 3 Wizard setupNN47923-500DHCP With DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) individual clients (workstations) can

Strany 427 - Figure 183 Allowed Sites

Chapter 3 Wizard setup 69Nortel Business Secure Router 252 Configuration — BasicsWizard setup configuration: connection testsThe Business Secure Route

Strany 428 - Figure 184 Advanced

Contents 7Nortel Business Secure Router 252 Configuration — BasicsChapter 6LAN screens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 429

70 Chapter 3 Wizard setupNN47923-500

Strany 430

71Nortel Business Secure Router 252 Configuration — BasicsChapter 4User NotesGeneral NotesThere are some router functions that, although performing as

Strany 431 - Log Descriptions

72 Chapter 4 User NotesNN47923-500If the Administrator Timeout is set to 0, and an administration session is terminated without logging off, the route

Strany 432

Chapter 4 User Notes 73Nortel Business Secure Router 252 Configuration — BasicsVPN Client Termination1 Change of User Account Does Not Drop Existing C

Strany 433 - Table 127 Attack Logs

74 Chapter 4 User NotesNN47923-500VPN Clients can have dynamically assigned IP addresses, or they can have a statically assigned addresses. However,

Strany 434 - Table 128 Access Logs

Chapter 4 User Notes 75Nortel Business Secure Router 252 Configuration — BasicsThe number controls the operating mode:None (disabled)RIP-1 onlyRIP-2 o

Strany 435

76 Chapter 4 User NotesNN47923-500b Enter the authentication information, with either a pre-shared key or an imported certificate.c Enter the IP Addre

Strany 436

Chapter 4 User Notes 77Nortel Business Secure Router 252 Configuration — BasicsScenario 2: A BCM50 in each site, each acting as the backup call server

Strany 437

78 Chapter 4 User NotesNN47923-500Allowing remote management of a LAN-connected BCM50 1 Create the appropriate NAT server rules to add the BCM50.Go to

Strany 438

Chapter 4 User Notes 79Nortel Business Secure Router 252 Configuration — Basics5 In the FIREWALL, set up a LAN-to-LAN rule to block traffic between th

Strany 439 - Table 130 ICMP Notes

8 ContentsNN47923-500What NAT does . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130How NAT wor

Strany 440 - VPN/IPSec Logs

80 Chapter 4 User NotesNN47923-500Under VPN / Global Setting, enable Exclusive Mode, and fill in the MAC address of the telephone set.Under Bandwidth

Strany 441 - VPN Responder IPSec Log

81Nortel Business Secure Router 252 Configuration — BasicsChapter 5System screensThis chapter provides information on the System screens.System overvi

Strany 442

82 Chapter 5 System screensNN47923-500Figure 16 depicts an example where three VPN tunnels are created from Business Secure Router A; one to branch of

Strany 443

Chapter 5 System screens 83Nortel Business Secure Router 252 Configuration — BasicsFigure 17 System general setupTable 8 describes the fields in Fig

Strany 444

84 Chapter 5 System screensNN47923-500System DNS Servers (if applicable)DNS (Domain Name System) is for mapping a domain name to its corresponding IP

Strany 445

Chapter 5 System screens 85Nortel Business Secure Router 252 Configuration — BasicsDynamic DNSWith Dynamic DNS, you can update your current dynamic IP

Strany 446 - Table 135 PKI Logs

86 Chapter 5 System screensNN47923-500Figure 18 DDNSTable 9 describes the fields in Figure 18.Table 9 DDNSLabel DescriptionActive Select this chec

Strany 447

Chapter 5 System screens 87Nortel Business Secure Router 252 Configuration — BasicsConfiguring PasswordTo change the password of your Business Secure

Strany 448

88 Chapter 5 System screensNN47923-500Figure 19 PasswordTable 10 describes the fields in Figure 19.Table 10 PasswordLabel DescriptionAdministrator

Strany 449 - Table 137 IEEE 802.1X Logs

Chapter 5 System screens 89Nortel Business Secure Router 252 Configuration — BasicsPredefined NTP time server listThe Business Secure Router uses the

Strany 450 - Log Commands

Contents 9Nortel Business Secure Router 252 Configuration — BasicsStateful inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 451 - Displaying Logs

90 Chapter 5 System screensNN47923-500When the Business Secure Router uses the predefined list of NTP time servers, it randomly selects one server and

Strany 452 - Log Command Example

Chapter 5 System screens 91Nortel Business Secure Router 252 Configuration — BasicsFigure 20 Time and Date

Strany 453

92 Chapter 5 System screensNN47923-500Table 12 describes the fields in Figure 20.Table 12 Time and DateLabel DescriptionCurrent Time and DateCurrent

Strany 454

Chapter 5 System screens 93Nortel Business Secure Router 252 Configuration — BasicsTime Zone SetupTime Zone Choose the time zone of your location. Thi

Strany 455

94 Chapter 5 System screensNN47923-500ALG With Application Layer Gateway (ALG), an application can pass through NAT and the firewall. You must also c

Strany 456

Chapter 5 System screens 95Nortel Business Secure Router 252 Configuration — BasicsTable 13 describes the labels in Figure 21.Table 13 ALGLabel Desc

Strany 457

96 Chapter 5 System screensNN47923-500

Strany 458

97Nortel Business Secure Router 252 Configuration — BasicsChapter 6LAN screens This chapter describes how to configure LAN settings.LAN overviewLocal

Strany 459

98 Chapter 6 LAN screensNN47923-500DNS serversUse the LAN IP screen to configure the DNS server information that the Business Secure Router sends to t

Strany 460

Chapter 6 LAN screens 99Nortel Business Secure Router 252 Configuration — BasicsBoth RIP-2B and RIP-2M send routing data in RIP-2 format; the differen

Komentáře k této Příručce

Žádné komentáře