User manual AIRLIVE RS-1200

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual AIRLIVE RS-1200. We hope that this AIRLIVE RS-1200 user guide will be useful to you.


AIRLIVE RS-1200 : Download the complete user guide (14886 Ko)

You may also download the following manuals related to this product:

   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)
   AIRLIVE RS-1200 DATASHEET (341 ko)
   AIRLIVE RS-1200 QUICK SETUP GUIDE (5518 ko)

Manual abstract: user guide AIRLIVE RS-1200

Detailed instructions for use are in the User's Guide.

[. . . ] RS-1200 Dual WAN Security Gateway User's Manual Contents System Chapter 1 Administration . . . 90 94 97 99 101 103 Chapter 8 Chapter 9 Chapter 10 Virtual Server. . . 234 Chapter17 Chapter18 4 Chapter 1 Administration "System" the managing of settings such as the privileges is of packets that pass through the AirLive RS-1200 and monitoring controls. The System Administrators can manage, monitor, and configure AirLive RS-1200 settings. [. . . ] ISAKMP (Internet Security Association Key Management Protocol): An extensible protocol-encoding scheme that complies to the Internet Key Exchange (IKE) framework for establishment of Security Associations (SAs). Main Mode: This is another first phase of the Oakley protocol in establishing a security association, but instead of using three packets like in aggressive mode, it uses six packets. Aggressive mode: This is the first phase of the Oakley protocol in establishing a security association using three data packets. AH (Authentication Header): One of the IPSec standards that allows for data integrity of data packets. ESP (Encapsulating Security Payload): One of the IPSec standards that provides for the confidentiality of data packets. 125 DES (Data Encryption Standard): The Data Encryption Standard developed by IBM in 1977 is a 64-bit block encryption block cipher using a 56-bit key. Triple-DES (3DES): The DES function performed three times with either two or three cryptographic keys. AES (Advanced Encryption Standard): An encryption algorithm yet to be decided that will be used to replace the aging DES encryption algorithm and that the NIST hopes will last for the next 20 to 30 years. NULL Algorithm: It is a fast and convenient connecting mode to make sure its privacy and authentication without encryption. NULL Algorithm doesn't provide any other safety services but a way to substitute ESP Encryption SHA-1 (Secure Hash Algorithm-1): A message-digest hash algorithm that takes a message less than 264 bits and produces a 160-bit digest. MD5: MD5 is a common message digests algorithm that produces a 128-bit message digest from an arbitrary length input, developed by Ron Rivest. GRE/IPSec: The device Select GRE/IPSec (Generic Routing Encapsulation) packet seal technology. 126 Define the required fields of IPSec Function To display the VPN connection status via icon Chart Meaning Name: -Not be applied Disconnect Connecting The VPN name to identify the IPSec Autokey definition. The name must be the only one and cannot be repeated. Gateway IP: The WAN interface IP address of the remote Gateway. IPSec Algorithm: To display the Algorithm way. Configure: Click Modify to change the argument of IPSec; click Remove to remote the setting. (Figure11-1) Figure11-1 IPSec Autokey WebUI 127 Define the required fields of PPTP Server Function PPTP Server: To select Enable or Disable Client IP Range: Setting the IP addresses range for PPTP Client connection To display the VPN connection status via icon Chart Meaning User Name: -Not be applied Disconnect Connecting Display the PPTP Client user's name when connecting to PPTP Server. Client IP: Display the PPTP Client's IP address when connecting to PPTP Server. Uptime: Display the connection time between PPTP Server and Client. Configure: Click Modify to modify the PPTP Server Settings or click Remove to remove the setting (Figure11-2) Figure11-2 PPTP Server WebUI 128 Define the required fields of PPTP Client Function To display the VPN connection status via icon Chart Meaning User Name: -Not be applied Disconnect Connecting Displays the PPTP Client user's name when connecting to PPTP Server. Server IP or Domain Name: Display the PPTP Server IP addresses or Domain Name when connecting to PPTP Server. Encryption: Display PPTP Client and PPTP Server transmission, whether opens the encryption authentication mechanism. Uptime: Displays the connection time between PPTP Server and Client. Configure: Click Modify to change the argument of PPTP Client; click Remove to remote the setting. (Figure11-3) Figure11-3 PPTP Client WebUI 129 Define the required fields of Tunnel Function To display the VPN connection status via icon Chart Meaning Name: -Not be applied Disconnect Connecting The VPN name to identify the VPN tunnel definition. The name must be the only one and cannot be repeated. Source Subnet: Displays the Source Subnet. Destination Subnet: Displays the Destination Subnet. IPSec / PPTP: Displays the Virtual Private Network's(IPSec Autokey, PPTP Server, PPTP Client) settings of Tunnel function. Configure: Click Modify to change the argument of VPN Tunnel; click Remove to remote the setting. (Figure11-4) Figure11-4 VPN Tunnel Web UI 130 We set up two VPN examples in this chapter: No. Suitable Situation Example Page Ex1 IPSec Autokey Setting IPSec VPN connection between two 132 RS-1200 Ex2 PPTP Setting PPTP VPN connection between two 145 RS-1200 131 Setting IPSec VPN connection between two RS-1200 Preparation Company A Company B WAN IP: 61. 11. 11. 11 LAN IP: 192. 168. 10. X WAN IP: 211. 22. 22. 22 LAN IP: 192. 168. 20. X This example takes two RS-1200 as work platform. Suppose Company A 192. 168. 10. 100 create a VPN connection with Company B 192. 168. 20. 100 for downloading the sharing file. The Default Gateway of Company A is the LAN IP of the RS-1200 192. 168. 10. 1. Follow the steps below: STEP 1Enter the default IP of Gateway of Company A's RS-1200, 192. 168. 10. 1 and select IPSec Autokey in VPN. (Figure11-5) Figure11-5 IPSec Autokey WebUI STEP 2In the list of IPSec Autokey, fill in Name with VPN_A. (Figure11-6) Figure11-6 IPSec Autokey Name Setting 132 STEP 3 Select Remote Gateway-Fixed IP or Domain Name In To Destination list and enter the IP Address. (Figure11-7) Figure11-7 IPSec To Destination Setting STEP 4 Select Preshare in Authentication Method and enter the Preshared Key (max: 100 bits) (Figure11-8) Figure11-8 IPSec Authentication Method Setting STEP 5Select ISAKMP Algorithm in Encapsulation list. Please select ENC Algorithm (3DES/DES/AES), AUTH Algorithm (MD5/SHA1), and Group (GROUP1, 2, 5). [. . . ] Total TrafficThe RS-1200 will record the sum of time and show the percentage of each WAN user's upstream / downstream to LAN service server. Reset CounterClick the Reset Counter button to refresh the Accounting Report. 219 Figure16-6 Inbound Destination IP Statistics Report 220 STEP 2 Enter Inbound in Accounting Report and select Top Services to inquire the statistics website of Send/Receive packets, Downstream/Upstream, First packet/Last packet/Duration and the service from the WAN Server to pass the RS-1200. According to the downstream / upstream report of the selected TOP numbering to draw the Protocol Distribution chart. (Figure16-8) Pull-down menu selection ServiceThe report of Communication Service when WAN users use the RS-1200 to connect to LAN service server. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE AIRLIVE RS-1200




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual AIRLIVE RS-1200 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.