Contents:Overview of the Web-based Management Advanced > |
USR8200 Firewall/VPN/NAS User Guide
AdvancedThis section of the Management Console is intended primarily for more advanced users. Some changes to settings within this section could adversely affect the operation of the USR8200 Firewall/VPN/NAS and the home network and should be made with caution. DNS (Domain Name System) ServerDNS provides a service that translates domain names into IP addresses and vice versa. The gateway's DNS server is an auto-learning DNS, which means that when a new computer is connected to the network, the DNS server learns its name and automatically adds it to the DNS table. Other network users may immediately communicate with this computer using either its name or its IP address. In addition, your gateway's DNS:
View or Modify the DNS TableTo view the list of computers stored in the DNS table, click the DNS Server icon in the Advanced screen of the Management Console. The DNS table will be displayed. To add a new entry to the list:
To edit the host name or IP address of an entry:
To remove a host from the DNS table, click the Remove button which appears in the Action column. The entry will be removed from the table. Dynamic DNSThe Dynamic DNS service allows you to alias a dynamic IP address to a static hostname, allowing your computer to be more easily accessible from various locations on the Internet. Typically, when you connect to the Internet, your service provider assigns an unused IP address from a pool of IP addresses, and this address is used only for the duration of a specific connection. Dynamically assigning addresses extends the usable pool of available IP addresses, while maintaining a constant domain name. Each time the IP address provided by your ISP changes, the DNS database will change accordingly to reflect the change in IP address. In this way, even though a domain name's IP address will change often, your domain name will still be accessible. To be able to use the Dynamic DNS feature you must open a DDNS account, free of charge, at http://www.DynDNS.org/account/create.html When applying for an account, you will need to specify a user name and password. Have them readily available when customising your DDNS support. For more information regarding Dynamic DNS, refer to http://www.DynDNS.org Using Dynamic DNS
IP Address DistributionYour gateway's DHCP server makes it possible to easily add computers that are configured as DHCP clients to the home network. It provides a mechanism for allocating IP addresses to these hosts and for delivering network configuration parameters to them. A client (host) sends out a broadcast message on the LAN requesting an IP address for itself. The DHCP server then checks its list of available addresses and leases a local IP address to the host for a specific period of time and simultaneously designates this IP address as "taken." The lease also contains other information about network services such as the gateway's netmask, route, and DNS server addresses. At this point the host is configured with an IP address for the duration of the lease. The host can choose to renew an expiring lease or let it expire. If it chooses to renew a lease, then it will also receive current information about network services, as it did with the original lease, allowing it to update its network configurations to reflect any changes that may have occurred since it first connected to the network. If the host wants to terminate a lease before its expiration, it can send a release message to the DHCP server, which will then make the IP address available for use by others. Your gateway's DHCP server:
DHCP Server Summary To view a summary of the services currently being provided by the DHCP server, click the DHCP icon in the Advanced screen of the Management Console. The DHCP Server Summary screen will appear. Select Clear the Name check box to enable/disable the DHCP server for a device. Note: If a device is listed as "Disabled" in the Status Column, then DHCP services are not being provided to hosts connected to the network through that device. This means that the gateway will not assign IP Addresses to these computers, which is useful if you want to work with Static IP Addresses only. Editing DHCP Server Settings To edit the DHCP server settings for a device:
DHCP Connections To view a list of computers currently recognized by the DHCP server, click the Connection List button that appears at the bottom of the DHCP Server Summary screen. The DHCP Connections screen will be displayed. To edit the properties for a static connection: Click the Edit button that appears in the Action column. The DHCP Connection Settings screen will appear. To define a new connection with a fixed IP address:
Note: A device's fixed IP Address is actually assigned to the specific network's card (NIC) MAC Address installed on the LAN computer. If you replace this network card, then you must update the device's entry in the DHCP Connections list with the new network card's MAC Address.
Network ObjectsNetwork Objects is a method of abstractly defining a set of LAN hosts. Defining such a group can assist when configuring system rules. For example, network objects can be used when configuring the security filtering settings such as IP address filtering, host name filtering, or MAC address filtering. You can use network objects in order to apply security rules based on host names instead of IP addresses. This may be useful, since IP addresses change from time to time. Moreover, it is possible to dene network objects according to MAC addresses, making rule application even more low-level. To define a network object: 1. Click the Network Objects icon and the Network Objects screen will appear. 2. Click New Entry and the Network Objects screen will appear. 3. Specify a name for the network object in the Description field. 4. Click New Entry and the Item screen will appear. 5. Select the type of network object type from the Network Object Type pull-down menu:
6. Enter the appropriate description for the network object type and then click OK. 7. Click OK in the Network Object screen and then click Close.
RoutingManaging Routing Table Rules You can access the routing table rules by clicking the Routing icon from the Advanced screen. The Routing screen will appear. You can add, edit, and delete routing rules from the Routing Table. When adding a routing rule, you need to specify:
Multicasting The USR8200 Firewall/VPN/NAS provides support for IGMP multicasting, which allows hosts connected to a network to be updated whenever an important change occurs in the network. A multicast is simply a message that is sent simultaneously to a predefined group of recipients. When you join a multicast group, you will receive all messages addressed to the group, much like what happens when an e-mail message is sent to a mailing list. IGMP multicasting enables UPnP capabilities over wireless networks and may also be useful when connected to the Internet through a router. When an application running on a computer in the home network sends out a request to join a multicast group, the USR8200 Firewall/VPN/NAS intercepts and processes the request. If the USR8200 Firewall/VPN/NAS is set to Minimum Security, no further action is required. However, if the USR8200 Firewall/VPN/NAS is set to Typical Security or Maximum Security, you must add the group's IP address to the USR8200 Firewall/VPN/NAS's Multicast Groups screen. This will allow incoming messages addressed to the group to pass through the Firewall and on to the correct LAN computer.
UsersUser SettingsThis is the section you will use to add new users for utilizing the PPTP, File Server, and FTP Server functions. To create an account, click New User.
The Notification levels are used to e-mail users the System and Security Log files. The type of information you will receive depends on the Level you choose for either. Finally click OK to save the New User to the USR8200 Firewall/VPN/NAS. Note: User Names and Passwords are case sensitive Note: Windows 95/98 users for File Server and FTP Server access, the username and password needs to be in all lowercase, not UPPERCASE. CertificatesWhen working with public-key cryptography, you should be careful and make sure that you are using the correct person's public key. Man-in-the-middle attacks pose a potential threat, where an ill-intending third-party posts a phony key with the name and user ID of an intended recipient. Data transfer that is intercepted by the owner of the counterfeit key can fall into the wrong hands. Digital certificates provide a means for establishing whether a public key truly belongs to the supposed owner. It is a digital form of credential. It has information on it that identifies you and an authorised statement to the effect that someone else has confirmed your identity. Digital certificates are used to foil attempts by an ill-intending party to use an unauthorised public key. A digital certificate consists of the following:
X.509 CertificateThe USR8200 Firewall/VPN/NAS supports X.509 certificates that comply with the ITU-T X.509 international standard. An X.509 certificate is a collection of a standard set of fields containing information about a user or device and their corresponding public 8.10 key. The X.509 standard defines what information goes into the certificate and describes how to encode it (the data format). All X.509 certificates have the following data: The certificate holder's public key - the public key of the certificate holder, together with an algorithm identifier that specifies which cryptosystem the key belongs to and any associated key parameters. The serial number of the certificate - the entity (application or person) that created the certificate is responsible for assigning it a unique serial number to distinguish it from other certificates it issues. This information is used in numerous ways; for example when a certificate is revoked, its serial number is placed on a Certificate Revocation List (CRL). The certificate holder's unique identifier (or DN-distinguished name) - this name is intended to be unique across the Internet. A DN consists of multiple subsections and may look something like this: CN=John Smith, EMAIL=johndoe@usr.com, OU=R&D, O=USRobotics, C=US (These refer to the subject's Common Name, Organizational Unit, Organization, and Country.) The certificate's validity period the certificate's start date/time and expiration date/time - indicates when the certificate will expire. The unique name of the certificate issuer - the unique name of the entity that signed the certificate. This is normally a CA. Using the certificate implies trusting the entity that signed this certificate. Note: In some cases, such as root or top-level CA certificates, the issuer signs its own certificate. The digital signature of the issuer - the signature using the private key of the entity that issued the certificate. The signature algorithm identifier - identifies the algorithm used by the CA to sign the certificate. Obtaining an X509 CertificateTo obtain an X509 certificate, you must ask a CA to issue you one. You provide your public key, proof that you possess the corresponding private key, and some specific information about yourself. You then digitally sign the information and send the whole package - the certificate request - to the CA. The CA then performs some due diligence in verifying that the information you provided is correct and, if so, generates the certificate and returns it. You might think of an X509 certificate as looking like a standard paper certificate with a public key taped to it. It has your name and some information about you on it, plus the signature of the person who issued it to you.
Registering a CA's Certificate
Date & TimeClick the Date and Time icon in the Advanced screen of the Web-based Management to set the local date and time information for the USR8200 Firewall/VPN/NAS. Localization:Select the local time zone from the pull-down menu.
Daylight Saving Time:Depending on which time zone you choose, you may or may not see the Daylight Saving Time option. The USR8200 Firewall/VPN/NAS can automatically adjust the local time that it stores internally when Daylight Savings Time (DST) begins and ends. To do this select Enabled and then in the following fields enter the dates on which Daylight Savings Time begins and ends at your location. Below is a chart for the years 2003 - 2005.
For a very informative description of what Daylight Saving Time is and its history, along with a calculator, you can visit http://webexhibits.org/daylightsaving/index.html
For more information about this or any other feature, refer to the USR8200 Firewall/VPN/NAS Web Support page.
Automatic Time Update:The USR8200 Firewall/VPN/NAS can keep the time always in sync with Universal time standards by connecting to Time servers throughout the world. To do this select Enabled and then in the following fields enter the server address, the protocol used by the server, and how often you want the time to be updated.
If you click Clock Set, you will be able to assign the settings for the Local Date and Local Time. After you have set the date and time, click OK.
Scheduler RulesScheduler rules are used for limiting the application of Firewall rules to specific time periods, specified in days and hours. To define a Rule: 1. Click the Scheduler Rules icon and the Scheduler Rules screen will appear. 2. Click New Scheduler Entry and the Scheduler Rule Edit screen will appear. 3. Specify a name for the rule in the Name field. 4. Specify if the rule will be active or inactive during the designated time period by selecting the appropriate Rule Activity Settings checkbox. 5. Click New Time Segment Entry to define the time segment that the rule will apply to. The Time Segment Edit screen will appear.
6. Click OK and then click OK again to return to the Advanced
screen.
Firmware UpgradeThere are two ways to upgrade the system software:
Upgrading From the InternetTo learn if an upgrade is available, click the Firmware Upgrade button from the Advanced screen. Then click Check Now. You may need to click Refresh after a few seconds. You will be informed whether an upgrade is available. If so, click Force Upgrade if you wish to upgrade to the latest code for the USR8200 Firewall/VPN/NAS.
If an upgrade is available:
A) Click the No button. The system will continue to perform its daily checks for the availability of a software update as scheduled and will notify you the next time you log into the Management Console. Note: The Gateway must be connected to the Internet in order to communicate with the Remote Update server. Those systems that store the time internally will attempt to connect and check for an update weekly. The default upgrade path is http://www.usr.com/support/8200/8200-files/usr8200.rmt B) Move to another screen by clicking an icon in the left sidebar. Return to the Upgrade screen at a later time by clicking the Firmware Upgrade icon in the Advanced screen. Upgrading From a Local ComputerTo upgrade the USR8200 Firewall/VPN/NAS using a file that you have previously downloaded from the Internet or received on CD-ROM:
Point-to-Point Tunneling Protocol (PPTP)To access the PPTP settings, click the PPTP icon from the Advanced screen. The Advanced PPTP Settings screen will appear. This screen enables you to configure:
Managing Remote UsersClick Users to define and manage remote users. You can add, edit, and delete users. When adding a user, you need to specify the following parameters:
The Notification levels are used to e-mail users the System and Security Log files. The type of information you will receive depends on the Level you choose for either. Note: Changing any of the user parameters will prompt the connection associated with the user to terminate. For changes to take effect, you should activate the connection manually after modifying user parameters.
Advanced PPTP Server SettingsTo configure advanced PPTP server settings, click the Advanced button on the PPTP screen. The Advanced PPTP Settings screen will appear. This screen enables you to configure the following:
Creating a New ConnectionTo create a new PPTP connection, click New Connection at the bottom of the main PPTP screen. The new connection properties screen will be displayed. Enter the following information:
When you have entered this information, click Next. On the next screen, verify the information you entered and click Finish if it is correct. If it is not correct, click Back and re-renter the information.
Advanced PPTP Client Settings
The PPTP connections are displayed in the Advanced PPTP Settings screen. To configure advanced PPTP client and server settings, perform the following steps:
Internet Protocol Security (IPSec)To access the Advanced IPSec Settings, click the IPSec icon in the Advanced screen. The IPSec Connections screen will appear. This screen displays your IPSec connections and enables you to configure the following:
General IPSec SettingsKey Management
Log Settings The IPSec Log can be used to identify and analyze the history of the IPSec package commands, attempts to create connections, etc. IPSec activity, as well as that of other USR8200 Firewall/VPN/NAS modules, is displayed together in this view.
Advanced IPSec Connection SettingsThe IPSec connections are displayed in the IPSec Connections screen. To configure advanced IPSec settings, perform the following steps:
VPNC Scenario Connection Instructions This section describes how to configure a IPSec gateway-to-gateway connection
with a pre-shared secret scenario developed by the VPN Consortium using
USR8200 Firewall/VPN/NAS. Network Configuration An IPSec tunnel is established between Gateways A and B, serving as a
transparent and secure network for clients from subnets A and B. Because
the configuration of the Gateways is the same except for their IP addresses,
this section describes only the configuration of Gateway A. Configuration
of Gateway B is identical, where A and B are replaced by B and A respectively.
WAN Interface Settings 1. Click the Network Connections icon on the sidebar and the Network Connections screen will appear. 2. Click WAN Ethernet to access the WAN Ethernet properties screen. 3. Click Settings and the WAN settings page will appear. Configure the following parameters:
4. Click OK. The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Gateway A connects the internal LAN 10.5.6.0/24 to the Internet. Gateway AsLAN interface has the address 10.5.6.1, and its WAN (Internet) interface has the address 14.15.16.17. Gateway B connects the internal LAN 172.23.9.0/24 to the Internet. Gateway BsWAN (Internet) interface has the address 22.23.24.25. The IKE Phase 1 parameters used are:
The IKE Phase 2 parameters used are:
To setup Gateway A for this scenario, use the following steps:
Universal Plug and Play (UPnP)Select the checkbox to allow other users on the network to control the network features.
System SettingsIn this area, you can view and modify the System, File Server, Management Console, Remote Administration, Management Application Ports, System Logging, Security Logging, and Outgoing Mail Server information. System
File Server
Management Console
Remote Administration
Management Application Ports
System Logging
Security Logging
Outgoing Mail Server
Local FTP ServerThis section will allow you to enable, set allowed connections, grant anonymous read/write access, and put in the path to the folder for Anonymous users. GeneralEnable FTP server:This will enable the FTP Server. Users are configured in the Users Settings section of the Advanced Menu.
Currently, a user added this way will have access to read or write to all hard disks installed onto the USR8200 Firewall/VPN/NAS. Total FTP Sessions Allowed: This will allow you to choose how many concurrent FTP connections are allowed at a time. Anonymous User Access Read Access: This will allow an anonymous user to read files located in the path you provide in the Anonymous Home Directory. Write Access: This will allow an anonymous user to write/modify files located in the path you provide in the Anonymous Home Directory. Anonymous Home Directory: This is where you must fill in a path for anonymous users to access a specific folder on a selected Hard Disk partition. Example Paths: (Drive names are case sensitive) /A/pub, /A/public, or /A/public access MAC CloningA MAC address is the numeric code that identifies a device on a network, such as your external cable/DSL modem or a computer network card. Your service provider may ask you to supply the MAC address of your computer, external modem, or both. When replacing an external modem with the USR8200 Firewall/VPN/NAS, you can simplify the installation process by copying the MAC address of your existing computer to the USR8200 Firewall/VPN/NAS. In such a case, you do not need to delay the setup process by informing your ISP of newly installed equipment.
Using MAC Cloning
DiagnosticsThe Diagnostics screen can assist you in testing network connectivity. This feature will enable you to ping (ICMP echo) an IP address and view statistics such as the number of packets transmitted and received, round trip time, and success status. Diagnosing Network Connectivity To diagnose network connectivity, perform the following steps:
Remote AdministrationIn its default state, the USR8200 Firewall/VPN/NAS blocks all external users from connecting to or communicating with your network. Therefore, the system is safe from hackers who may try to intrude on the network and damage it. However, you may want to enable certain services that grant remote users administrative privileges in your network. Configuring Remote Administration Services
FilesystemsThe USR8200 Firewall/VPN/NAS can operate as a file server for storage devices that are connected via USB or FireWire. Your home network's LAN devices can share the storage device as a mapped network drive. The Web-based Management provides disk management utilities such as fdisk for partitioning the drive as a physical disk or logical disk, as well as format utilities for formatting the partitions. The USR8200 Firewall/VPN/NAS supports up to 30 hard disks or 100 separate partitions, whichever comes first. The hard disks can be either daisy chained through FireWire hubs, USB 1.1/2.0 hubs, or a combination of both. Note: Any hard disk connected through a USB 1.1 hub will not be running at full speed. The performance speed will be lowered as you add more hard disks through a USB 1.1 hub. Note: For storage devices that come
with both a USB 1.1/2.0 connection and a FireWire connection, only one
port of the storage device can be used at a time. When a hard disk or storage device is connected to the USR8200 Firewall/VPN/NAS via USB1.1/2.0 or FireWire, it will register on the network map. Viewing the network map as a list will display information about each storage device that is connected.
Note: Before disconnecting any hard
disk, it is recommended to unmount the hard disks using the web-based
management. Each hard disk can have up to 16 partitions with an Extended partition and can have a maximum of four main partitions. Main partitions include primary and extended partitions. The following are some different partition configurations you can have in your hard disk.
The File Systems that are supported by the USR8200 Firewall/VPN/NAS for formatting a hard disk(s) partitions are Linux (ext2) and Windows (FAT32). The File Systems that the USR8200 Firewall/VPN/NAS supports in Read/Write form are Linux (ext2), Windows (FAT12), Windows (FAT16), and Windows (FAT32). If you are not sure if the hard disk you have connected to the USR8200 Firewall/VPN/NAS is pre-formatted, look in the network map. If the hard disk is pre-formatted, below the hard disk name you will see \\usr8200\A, \\usr8200\B, \\usr8200\C, etc. If the hard disk you are adding to the USR8200 Firewall/VPN/NAS is pre-formatted and you do not wish to create or modify any partitions, proceed to the Setting up User access rights to the storage devices section in this chapter. If the hard disk is not pre-formatted, or you are unsure, please proceed to the Managing Partitions section in this chapter. Note: It is recommended to format the hard disk using EXT2 if you will be transferring large files to the hard disk. If you will not be transferring any files over 4 gigabytes, it is recommended to format the hard disk using FAT32.
Managing PartitionsThe following buttons are the different Action icons in the File Management screens. These will appear in the Action column for each hard disk and partition associated with the USR8200 Firewall/VPN/NAS. Only the icons for the actions that can be performed on a hard disk or partition will appear. For example, the Delete a partition icon will not appear if there are no partitions on the hard disk.
If you wish to perform an action on a hard disk, click the name of the hard disk in the Network Map screen or in the Network List screen.
After clicking the name of the hard disk, you will see an icon on the right for each of the actions that you can perform on that particular hard disk.
Adding New PartitionsWhen first creating a new partition you will be presented with a wizard to help ensure that nothing important is missed while setting up the hard disk(s). Note: If you are connecting a new hard disk, it is recommended that you reformat the hard disk through the USR8200 Firewall/VPN/NAS. Click the Add New partition icon in the Action column for the hard disk you want to partition. You will then need to select which type of partition you want to create: Primary or Extended.
After creating an Extended Partition you will need to create Logical
partitions.
Scanning PartitionsScanning a partition is similar to running a chkdsk or Scandisk in Windows or fsck in Linux. Scanning a partition will check the hard disk for errors and attempt to fix them if any are discovered.
If the hard disk has been formatted somewhere other than the USR8200
Firewall/VPN/NAS or if the hard disk is over 120 gigabytes in capacity,
you may receive an error when performing a scan. The reason for this is
either the method that the hard disk was formatted or the sector size.
If you receive an error, you will need to connect the hard disk directly
to a PC or Linux computer and perform the scan from within that computer.
Formatting a PartitionIf you need to format a partition for any reason after initial setup, follow the steps below. Note: It is recommended to format the hard disk using EXT2 if you will be transferring large files to the hard disk. If you will not be transferring any files over 4 gigabytes, it is recommended to format the hard disk using FAT32.
Deleting a PartitionTo delete a partition, click the Delete a partition icon in the Action column.
If you are certain that you want to delete the partition, click OK.
Unmounting a Hard DiskEven though USB connections and FireWire connections are Plug and Play, any storage devices that you wish to disconnect from the USR8200 Firewall/VPN/NAS need to be unmounted properly. With the USR8200 Firewall/VPN/NAS, this is done in the File Server Disk Information interface of the Web-based management.
Renaming a partitionIf you want to change the name of a partition on a hard disk, perform the following steps:
Setting up User access rights to the storage devicesTo assign User access rights, click Users in the Advanced Menu. You can create users that have access only to the storage devices by selecting either Read Files from File Server or by selecting both Read Files from File Server and Write Files to File Server. Note: Windows 95, Windows 98, and Windows Me clients that will be connecting to the USR8200 Firewall/VPN/NAS to access the File Server must enter the user name and password in all lowercase letters, not UPPERCASE or Capital Letters. This is because those Window versions pass everything to the server in lowercase. Note: During any file disk utility
action, none of the hard disks connected to the USR8200 Firewall/VPN/NAS
can be accessed.
When a storage device is connected to the USR8200 Firewall/VPN/NAS via USB or FireWire, it will appear on the network map. Viewing the network map as a list will display information about the storage device. Partition names are designated as "a", "b", "c",
etc. To access the storage device's partitions from computers on the LAN,
you must map a network drive using the designated partition name. The
available partition names can be viewed in the network map list. Use the following action buttons to perform disc utility and management operations on your storage device:
Adding a New Partition 1. Click the File Server icon on the Network Map and the File server information screen will appear.
2. Click Add Partition and the Partition Settings screen will appear. 3. Enter the volume of the new partition (in MB). 4. Select the Make Partition Bootable checkbox to make the new partition bootable. 5. Click OK.
Deleting a Partition 1. Click the File Server icon on the Network Map and the File server information screen will appear. 2. Click Delete Partition.
Formatting a Partition 1. Click the File Server icon on the Network Map and the File server information screen will appear. 2. Click Partition Format and the Partition Format screen will appear. 3. Select the type of file system for the partition. 4. Click OK.
Scanning a Partition 1. Click the File Server icon on the Network Map and the File server information screen will appear. 2. Click Scan Partition and the screen will refresh and display
a summary of the partition scan.
Print ServerThe USR8200 Firewall/VPN/NAS provides both LPD and Microsoft shared printing functionality. Microsoft shared printing offers easy installation and management. LPD printing offers robust services for large print jobs, without the need to dedicate large amounts of on board memory to job spooling. Setting up an LPD Printer in Windows XP1. Click the Printers and Faxes icon in Control Panel. 2. Click Add a Printer to activate the Add Printer Wizard and then click Next.
3. Select Local printer attached to this computer. Deselect Automatically detect and install my Plug and Play printer click Next.
4. In the Select a Printer Port screen, select Create a new port. Select Standard TCP/IP Port in the Type of port dropdown menu. Click Next to activate the Add Standard TCP/IP Printer Port Wizard. Click Next.
5. Specify 192.168.1.1 in the Printer Name or IP Address area and Next.
6. Select Custom and click Settings. Configure the following parameters:
7. Click Finish. The Add Printer Software wizard will appear. 8. Select your printer manufacturer and model from the lists. If your printer manufacturer or model do not appear in the lists, click Have disk to specify the driver location. 9. Specify the name you want to give the printer and whether you want it to be the default printer. 10. Click Next and then click Next again. Select Yes to print a test page. 11. Click Finish to complete the setup procedure.
Setting up a Microsoft Shared Printer1. Open the Web-based Management console for the USR8200 by launching a Web browser and entering 192.168.1.1 The disk and printer shares available on the USR8200 will be displayed. 2. Click the printer icon. 3. Follow the instructions displayed by the printer installation wizard. Restore DefaultsYou may sometimes want to restore the USR8200 Firewall/VPN/NAS's factory default settings. This may happen, for example, when you want to build a new network from the beginning, or when you cannot recall changes made to the network and want to go back to the default configuration. To restore default settings:
Note: All Web-based settings and management parameters, not only those in the Advanced section, will be restored to their default values. This includes the Administrator password; a user-specified password will no longer be valid. RestartTo restart your USR8200 Firewall/VPN/NAS:
Technical InformationTo view technical information regarding the USR8200 Firewall/VPN/NAS:
|