681038
3
Verklein
Vergroot
Pagina terug
1/71
Pagina verder
Business LAN R800+
© 2006 LANCOM Systems GmbH, Wuerselen (Germany). All rights reserved.
While the information in this manual has been compiled with great care, it may not be deemed an assurance
of product characteristics. LANCOM Systems shall be liable only to the degree specified in the terms of sale
and delivery.
The reproduction and distribution of the documentation and software included with this product is subject to
written permission by LANCOM Systems. We reserve the right to make any alterations that arise as the result
of technical development.
All explanations and documents for registration of the products you find in the appendix of this documenta-
tion, if they were present at the time of printing.
Trademarks
Windows
®
, Windows XP
®
and Microsoft
®
are registered trademarks of Microsoft, Corp.
The LANCOM Systems logo, LCOS and the name LANCOM are registered trademarks of LANCOM Systems
GmbH. All other names mentioned may be trademarks or registered trademarks of their respective owners.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit http://
www.openssl.org/.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com
).
This product includes software developed by the NetBSD Foundation, Inc. and its contributors.
Subject to change without notice. No liability for technical errors or omissions.
LANCOM Systems GmbH
Adenauerstr. 20/B2
52146 Wuerselen
Germany
www.lancom.de
Wuerselen, March 2006
Preface 3
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Preface
Thank you for placing your trust in this product.
With the Business LAN R800+ you have chosen a powerful router that possesses integra-
ted ADSL and ISDN interfaces by default as well as an integrated 4-port switch. With this
router you can simply and comfortably connect individual PCs or whole local networks to
the high-speed Internet.
Security settings
For a carefree use of your device, we recommend to carry out all security settings (e.g.
Firewall, encryption, access protection, charge lock), which are not already activated at
the time of purchase of your device. The LANconfig wizard ’Check Security Settings’ will
support you accomplishing this. Further information regarding this topic can be found in
chapter 'Security settings'.
We ask you additionally to inform you about technical developments and actual hints to
your product on the Web page www.lancom.de
, and to download new software versions if
necessary.
User manual and reference manual
The documentation of your device consists of three parts: the installation guide, the user
manual and the reference manual.
You are now reading the user manual. It contains all information you need to start your
Router. It also contains the most important technical specification for the device.
The reference manual can be found on the CD as an Acrobat (PDF) document. It is desi-
gned as a supplement to the user manual and goes into detail on topics that apply to a
variety of devices. These include for example:
Systems design of the LCOS operating system
Configuration
Management
Diagnosis
Security
Routing and WAN functions
Firewall
Quality of Service (QoS)
Virtual Local Networks (VLAN)
Voice Communications for computer networks using voice over IP (VoIP)
4Preface
Backup Solutions
LANCAPI
Further server services (DHCP, DNS, charge management)
This documentation was compiled …
...by several members of the staff from a variety of departments in order to ensure you the
best possible support when using your product.
In case you encounter any errors, or just want to issue critics or enhancements, please do
not hesitate to send an email directly to: info@lancom.de
Note The online services ( www.lancom.de) are available to you around the clock
should you have any queries regarding the topics discussed in this manual
or require any further support. In addition support from LANCOM Systems is
also available to you. Telephone numbers and contact information for T-
Systems Router support can be found on a separate insert.
Notes symbols
Very important instructions. If not followed, damage may result.
Note Additional instructions which can be helpful, but are not required.
Contents 5
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Contents
Preface 3
Thank you for placing your trust in this product. 3
Security settings 3
User manual and reference manual 3
Contents 5
Introduction 9
How does ADSL and ADSL 2+ work? 9
Which use does VPN offer? 10
Firewall 12
What does a router do? 13
Bridgehead to the WAN 13
Areas of deployment for routers 13
The LANCOM VoIP Basic Option 14
Supplementing existing ISDN PBXs 15
Connecting subsidiaries or home offices to the headquarters
16
Connecting sites without a SIP PBX 17
What can your Business LAN R800+ do? 18
Installation 20
Package contents 20
System preconditions 20
Introducing the Business LAN R800+ 20
Status displays 21
The back of the unit 24
Hardware installation 25
Software installation 26
6Contents
Starting software setup 27
Which software should you install? 27
Basic configuration 28
Which information is necessary? 28
TCP/IP settings 28
Configuration protection 30
Settings for the DSL connection 30
Connect charge protection 30
Instructions for LANconfig 30
Instructions for WEBconfig 32
TCP/IP settings to workstation PCs 35
Setting up Internet access 37
Instructions for LANconfig 38
Instructions for WEBconfig 39
Linking two networks 40
What information is necessary? 40
General information 41
Settings for the TCP/IP router 43
Settings for the IPX router 44
Settings for NetBIOS routing 45
Instructions for LANconfig 45
Instructions for WEBconfig 46
Providing dial-up access 47
Which information is required? 47
General information 47
Settings for TCP/IP 49
Settings for IPX 49
Contents 7
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Settings for NetBIOS routing 50
Settings for the dial-in computer 50
Dial-up via VPN 50
Dial-up via ISDN 51
Instructions for LANconfig 52
Instructions for WEBconfig 52
Sending faxes with LANCAPI 53
Installation of the CAPI faxmodem 54
Installation of the MS Windows fax service 55
Sending a fax 55
Send a fax with any given office application 55
Send a fax with the MS Windows fax service 56
Security settings 57
The security settings wizard 57
Wizard for LANconfig 57
Wizard for WEBconfig 58
The firewall wizard 58
Wizard for LANconfig 58
Configuration under WEBconfig 59
The security checklist 59
Troubleshooting 62
No WAN connection is established 62
DSL data transfer is slow 62
Unwanted connections under Windows XP 63
Cable testing 63
Appendix 65
Performance data and specifications 65
8Contents
Contact assignment 66
ADSL interface 66
ISDN-S
0
interface 66
Ethernet interfaces 10/100Base-T 66
Configuration interface (Outband) 67
Disposal of old device 67
Declaration of conformity 67
Index 68
Introduction 9
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Introduction
Introduction
The models Business LAN R800+ are fully-featured routers that therefore also can be
used in combination with the integrated firewall for providing secure Internet access to a
complete local network (LAN).
With the integrated VPN option enables the devices act as powerful Dynamic VPN gate-
ways for external offices or mobile users.
The devices offer each an ADSL connector and also an ISDN connector. The ISDN line
can be used as back-up for the DSL connection, for remote management of the router, as
basis for the office communication via LANCAPI or for establishing VPN connections to
remote sites with dynamic IP addresses.
By using the Voice over IP function, these devices can transfer voice data over broadband
Internet connections as well.
How does ADSL and ADSL 2+ work?
ADSL (Asymmetric Digital Subscriber Line) is currently the most common broadband
Internet connection technology. Standard and almost ubiquitous telephone lines (analog
or DSL) are the basis for DSL data transfer to the nearest telephone exchange. From here,
the data is passed directly on to the Internet over high-speed connections.
The asymmetric ADSL version of DSL was designed for applications in which the user
receives high volumes of data but only transmits relatively small volumes, e.g. for acces-
sing the world wide web (www). With an ADSL connection, a user can download at up to 8
Mbps (“downstream”) and upload at up to 800 Kbps (“upstream”). These maximum rates
can be reduced as required by the ADSL provider.
To satisfy the strongly increasing demand for higher bandwidths, the standards ADSL 2
and ADSL 2+ provider higher data rates as a basis for applications such as video strea-
ming or high-definition TV (HDTV) over the Internet. Depending on the Internet provider,
ADSL 2 devices support data rates of up to 12 Mbps, and ADSL 2+ devices support up to
24 Mbps. Handshake routines during connection establishment ensure that the stan-
dards ADSL, ADSL 2 and ADSL 2+ are intercompatible.
With ADSL, all traditional telephony applications (telephone, fax, answering machine,
PBX) can still be used without restrictions. So-called splitters make this possible. Splitters
are devices that separate the telephone line's “voice frequencies” from the “data frequen-
cies” and ensure that the signals are forwarded to the appropriate networks.
10 Introduction
A splitter is also used at the subscriber end to permit ADSL modems/routers and conven-
tional telephone equipment to be used at the same time. The ADSL/ADSL 2+ modem is
integrated directly in the device. It can be directly connected to the splitter with the supp-
lied cable.
ADSL can operate over modern ISDN telephone service as well as conventional analog
service (POTS – Plain Old Telephone Service). Both telephone systems use different tech-
nical specifiations.
A Business LAN R800+ device can only be used with ADSL-over-ISDN
service, as they are offered at all T-DSL accounts from the Deutsche
Telekom.
Which use does VPN offer?
A VPN (Virtual Private Network) can be used to set up cost-effective, public IP networks,
for example via the Internet.
Router with integrated
ADSL modem
Internet
Splitter
Te l e p h o n e
Telephone
network
Splitter
ADSL provider
Switching node
DSL access
multiplexer
Subscriber
Introduction 11
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Introduction
The following structure results when using the Internet instead of direct connections :
All participants have fixed or dial-up connections to the Internet. Expensive dedicated
lines are no longer needed.
1. All that is required is the Internet connection of the LAN in the headquarters. Special
switching devices or routers for dedicated lines to individual participants are superflu-
ous.
2. The subsidiary also has its own connection to the Internet.
3. The RAS PCs connect to the headquarters LAN via the Internet.
The Internet is available virtually everywhere and typically has low access costs. Signifi-
cant savings can thus be achieved in relation to switched or dedicated connections, espe-
cially over long distances.
The physical connection no longer exists directly between two participants; instead, the
participants rely on their connection to the Internet. The access technology used is not
relevant in this case: ideally is the use of broadband technologies such as DSL (Digital
Subscriber Line). But also a conventional ISDN line can be used.
The technologies of the individual participants do not have to be compatible to one
another, as would be the case for conventional direct connections. A single Internet
access can be used to establish multiple simultaneous logical connections to a variety of
remote stations.
The resulting savings and high flexibility makes the Internet (or any other IP network) an
outstanding backbone for a corporate network.
Head Office
Workstation in remote
access
Internet
LAN
LAN
Subsidiary
12 Introduction
Firewall
The integrated Stateful Inspection Firewall ensures an effective protection against undesi-
red intrusion in your network by permitting only incoming data traffic as reaction to out-
going data traffic. The router’s IP masquerading function hides all workstations of the LAN
behind a single public IP address. The actual identities (IP addresses) of the individual
workstations remain concealed. Firewall filters of the router permit specific IP addresses,
protocols and ports to be blocked. With MAC address filters it is also possible to specifi-
cally monitor the access of workstations in the LAN to the IP routing function of the device.
Further important features of the Firewall are
Intrusion Detection
Break-in attempts into the local network or on the central Firewall are recognized,
repelled and logged by the Intrusion Detection system (IDS) of the Business LAN
R800+. Thereby it can be selected between logging within the device, email notifica-
tion, SNMP trap or SYSLOG alarms.
Denial-of-Service Protection
Attacks from the Internet can be break-in attempts as well as attacks with the aim of
blocking the accessibility and functionality of individual services. Therefore a Busi-
ness LAN R800+ is equipped with appropriate protective mechanisms, which recog-
nize well-known hacker attacks and which guarantee the functionality.
Quality-of-Service / Traffic management
The generic term Quality-of-Service (brief: QoS) summarizes the functions of the
device which guarantee certain service qualities. The advantage is that the QoS func-
tions can take place by means of the existing powerful classification methods of the
Firewall (e.g. limitation of subnetworks, single workstations or certain services).
Guaranteed minimum bandwidths give priority to enterprise critical applications, VoIP
PBX installations or certain user groups.
Note More details about the function of the Stateful Inspection Firewall of your
Router can be found in the reference manual on the CD.
Firewall
Internet
LAN
Business LAN
R800+
Introduction 13
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Introduction
What does a router do?
Note The following sections describe the functionality of routers in general. The
functions supported by your device are listed in the table “What can your
Business LAN R800+ do?” on page 18.
Routers connect LANs at different locations and individual PCs to form a Wide Area Net-
work (WAN). With the appropriate rights, any computer in this WAN can access other com-
puters and services of the complete WAN (as with 'PC 1' accessing 'Server A' in the remote
LAN in the diagram).
Connecting a LAN to the Internet does not technically differ from coupling two LANs. The
only difference is that it is not just a handful of computers behind the Internet provider's
router. Instead, it is the net of the networks - the public Internet.
Bridgehead to the WAN
All routers have at least two connections:
at least one for the LAN
at least one for WAN connections
In addition to LAN connectivity (10/100 Mbps Ethernet), several models also offer an inte-
grated switch. For the connecting to the WAN, the routers use ISDN, xDSL/cable or ADSL
connectors. Several devices contain additionally a wireless network card and can thus
integrate also stations of WLANs (Wireless LANs) into the routing.
The router's task is to transfer data from the local network to the target network via a suita-
ble WAN connection. Data is also transferred from the WAN to the desired recipients in the
LAN.
Areas of deployment for routers
Routers are mainly used for the following applications:
Internet access for a LAN (e.g. via DSL or ISDN)
router
LAN 1
PC 1
LAN 2
WAN connection
server A
router
14 Introduction
The Internet consists of countless large and small networks that are interconnected
into the world's largest WAN via routers. The router links all the workstation computers
on your local area network to the global Internet. Security functions such as IP mas-
querading protect your LAN against unauthorized access from outside.
LAN to LAN coupling (via VPN or ISDN)
LAN to LAN coupling links individual LANs to form one large network, even if this
means crossing continents. A typical example: A branch office is to be connected to
the LAN of the headquarters. In principle, you can connect LANs in two ways:
High-speed coupling via VPN
The fastest and most economical LAN to LAN links are possible with VPN (Virtual
Private Network) technology, as VPN uses the Internet as the basis for its commu-
nications. The fast xDSL connection of the router comes into its own here. The pre-
condition: a VPN gateway with access to the Internet is required on either side of
the network interconnection.
Conventional via ISDN
Without VPN, a LAN to LAN interconnection can alternatively be realized via
ISDN. In this case, an intelligent line management and sophisticated filter mecha-
nisms keeps connection costs low.
Remote access to the company network (via VPN or ISDN)
The work of many office workers in modern organizations is less and less dependent
on any definite location—the most important factor here is unimpaired access to
shared and freely available information.
Remote Access Service (RAS) is the magic word here. Employees working from home
or field staff can dial into the company network via VPN or ISDN. When working with
remote access via ISDN, the router protects the company network: the call back func-
tion only grants access to known and registered users.
The LANCOM VoIP Basic Option
The term Voice over IP (VoIP) refers to voice communications over computer networks
based on the Internet protocol (IP). The core idea is to provide the functions of traditional
telephony via cost-effective and wide-spread networking structures such as the Internet.
VoIP itself is not a standard, rather it is a collective term for the various technologies
(equipment, protocols, voice encoding, etc.) which make voice communications in IP net-
works possible.
VPN gateways
VPN tunnel via the
Internet
Introduction 15
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Introduction
Voice over IP solutions offers advantages across a broad spectrum of applications, star-
ting with small companies and extending to large corporations with extensive networks of
subsidiaries. In the following section, we will demonstrate a number of examples.
Note Detailed information about configuration is available in the LCOS reference
manual.
Supplementing existing ISDN PBXs
VoIP functions can be conveniently added in to existing telephone structures by using a
Business LAN Router with VoIP option. The Business LAN Router with VoIP option is con-
nected to an ISDN extension line of an ISDN PBX.
Telephone calls over the PBX and its ISDN telephones remain possible just as before; the
telephones remain available under the familiar telephone numbers. This application addi-
tionally offers the following options:
In addition to the ISDN telephones, VoIP telephones or VoIP softphones can be inclu-
ded in the telephone infrastructure. VoIP subscribers in the internal LAN are also able
to call external ISDN subscribers.
The ISDN telephones continue to function, and additionally they can call all of the
internal VoIP telephones and softphones in the LAN.
Calls to external SIP subscribers who use the same Internet provider are often avai-
lable at no cost.
With the appropriate connection to a public SIP provider, any other SIP subscriber
worldwide can be called, irrespective of the provider network. As an alternative to a
direct ISDN connection, ISDN network subscribers can also be reached over a diver-
sion via the SIP provider. The costs depend on the provider's particular tariff models.
ISDN PBX
Business LAN Router with VoIP option
Internet
ISDN
ISDN telephones
VoIP telephoneVoIP sof tphone
ISDN network
subscribers
Public SIP provider
ISDN NTBA
Analog fax
machines and
telephones
16 Introduction
Frequently, long-distance and overseas calls via an SIP provider are significantly che-
aper than the traditional telephone connection.
In this constellation, the Business LAN Router with VoIP option takes over the switching of
the calls. The device can be individually configured, for example, to use the access codes
to decide upon the switching of a call either via the ISDN interface, or via the Internet as a
VoIP call.
Note The extent of integration into the existing telephony infrastructure depends
on the possibilities available with the existing ISDN PBX. Certain systems
can handle calls over special lines by mapping and forwarding them to
extension lines. For further information, please consult the documentation
for your ISDN PBX.
Connecting subsidiaries or home offices to the headquarters
Many subsidiaries or home offices already have a connection to the network at headquar-
ters over VPN. These connections are normally limited to conventional data transmission.
By using VoIP, internal company calls can be made for free over the existing VPN connec-
tion and—thanks to the VPN encryption—these calls are secured against eavesdropping.
With a Business LAN Router with VoIP option located in the branch or home office, the
two worlds of traditional and VoIP telephony can be united in a single telephone: A VoIP
telephone or an existing analog telephone with ATA ("Analog Telephone Adpater") can be
used for free telephone calls via VPN to the headquarters, or to make standard calls via
ISDN.
The advantages of a telephone connection to headquarters:
Business LAN Router
with VoIP option
Internet
ISDN
VoIP telephone
VoIP PBX connected to the
ISDN network
VPN tunnel
VoIP telephones
Business
LAN R800+
Analog telephone
with ATA
Branch office Headquarters
Introduction 17
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Introduction
The configuration of telephone functions can be carried out centrally in the VoIP PBX
at headquarters.
Subscribers at their branch or home offices connect with the central PBX.
Calls within the company network are free.
Outgoing calls are automatically directed to the optimal line for cost optimization.
Connecting sites without a SIP PBX
It is also possible for companies with widely disperse offices and without their own SIP
PBX to take advantage of VoIP site coupling. In this "peer-to-peer" scenario, two sites are
equipped with Business LAN Router with VoIP option.
Along with data transfer via VPN, it is also possible to use VoIP functions between the two
locations.
The advantages of peer-to-peer site coupling
ISDN PBXs at different locations can form a common internal telephone network.
An SIP PBX is not necessary.
Calls within the company network are at no charge.
Outgoing calls are automatically directed to the optimal line for cost optimization.
Incoming calls can be switched directly to the appropriate employee at a different
location.
Business LAN Router with VoIP option
Internet
ISDN
VoIP subscribers
VPN tunnel
VoIP
subscribers
Business LAN Router
with VoIP option
ISDN PBX
ISDN telephones
Analog fax
machines and
telephones
ISDN PBX
18 Introduction
What can your Business LAN R800+ do?
The following table contains the properties and functions of your device:
Applications
Internet access
LAN to LAN coupling via VPN
LAN to LAN coupling via ISDN
RAS server (via VPN)
RAS server (via ISDN)
IP router
IPX router (via ISDN), e.g. for coupling of Novell networks or dial-
ling into Novell networks
NetBIOS proxy for coupling of Microsoft peer-to-peer networks
via ISDN
DHCP and DNS server (for LAN and WAN)
N:N mapping for coupling networks using the same IP address
ranges
Bridge function for coupling networks via ISDN connection
Port-Mapping to set up LAN ports as additional WAN ports
Policy-based routing for policy-based selection of target routes
Load-balancing for bundling of multiple DSL channels 2 channels
LANCAPI server for the operating with office applications as fax
or answering machine via ISDN interface
Prepared for VoIP functions
WAN connection
Connection for DSL or cable modem
Integrated ADSL modem (ADSL2+ ready)
ISDN S
0
bus in multi device-mode or in point-to-point mode with
automatic D-channel protocol identification. Supports static and
dynamic channel bundling per MLPPP and BACP as well as Stac
data compression (Hi/fn)
Port for external modem, analogue or GSM (requires LANCOM
modem adapter kit; from LCOS 5.0)
LAN connection
4 individual Fast Ethernet LAN ports, switchable separately, e.g.
as LAN switch or separate DMZ ports, auto crossover.
Security functions
3 integrated VPN tunnels for protection of network connections
Introduction 19
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Introduction
IP masquerading (NAT, PAT) to hide all workstations of the LAN
behind one common public IP address.
Stateful Inspection Firewall
Firewall filters for a selective locking of IP addresses, protocols
and ports
MAC address filter control e.g. the access of LAN workstations to
IP routing functions
Configuration protection to block “brute force attacks“
Configuration
Configuration with LANconfig or with web browser, additionally
terminal mode for Telnet or other terminal programs, SNMP inter-
face and TFTP server function.
Remote configuration via ISDN (with ISDN-PPP connections e.g.
via Windows network and dial-up connections)
Serial configuration interface
Callback function with PPP authentication mechanisms for
restriction to fixed ISDN telephone numbers
FirmSafe with firmware versions for absolutely secure software
upgrades
Optional software extensions
LANCOM VoIP Basic Option
Optional hardware extensions
LANCOM Modem Adapter Kit for connection of analog or GSM
modems to the serial interface
20 Installation
Installation
This chapter will assist you to quickly install hardware and software. First, check the pak-
kage contents and system requirements. The device can be installed and configured
quickly and easily if all prerequisites are fulfilled.
Package contents
Please check the package contents for completeness before starting the installation. In
addition to the device itself, the package should contain the following accessories:
If anything is missing, please contact your retailer or the address stated on the delivery slip
of the unit.
System preconditions
Computers that connect to a Router must meet the following minimum requirements:
Operating system that supports TCP/IP, e.g. Windows XP, Windows Millennium Edi-
tion (Me), Windows 2000, Windows 98, Windows 95, Windows NT, Linux, BSD Unix,
Apple Mac OS, OS/2, BeOS.
Access to the LAN via the TCP/IP protocol.
Note The LANtools and the LANCAPI functions also require a Windows operating
system. A web browser is required for access to WEBconfig.
Introducing the Business LAN R800+
This section introduces your device. We will give you an overview of all status displays,
connections and switches.
Note While the information in this section is useful for the installation of the
device, it is not absolutely essential. You may therefore skip this section for
Power adapter
LAN connector cable (green plugs)
ADSL connector cable (transparent plugs)
ISDN connector cable (light blue plugs)
Connector cable for the configuration interface
CD with software and documentation
Printed documentation
Installation 21
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Installation
the time being and go straight forward to “Hardware installation” on
page 25.
Status displays
The front and the rear panels of the unit feature a series The various Router models have
different numbers of indicators on the front panel depending on their functionality.
Front side
The various Router models have different numbers of indicators on the front panel depen-
ding on their functionality.
Top panel
The two LEDs on the top panel provide a convenient overview of the most important sta-
tus information, especially when the device is installed vertically.
Meanings of the LEDs
In the following sections we will use different terms to describe the behaviour of the LEDs:
Blinking means, that the LED is switched on or off at regular intervals in the respective
indicated colour.
Flashing means, that the LED lights up very briefly in the respective colour and stay
then clearly longer (approximately 10x longer) switched off.
Business LAN R800+
Business LAN R800+
Power
Power
ADSL Status
ADSL Status
Online
Online
ADSL Data
ADSL Data
ETH 3
ETH 3
ETH 4
ETH 4
ISDN Status
ISDN Status
ISDN Data
ISDN Data
ETH 1
ETH 1
ETH 2
ETH 2
VPN
VPN
==!"§==Systems=

Power
Online
22 Installation
Inverse flashing means the opposite. The LED lights permanently in the respective
colour and is only briefly interrupted.
Flickering means, that the LED is switched on and off in irregular intervals.
Power
This LED indicates that the device is operational. After the device has been switched on, it
will flash green for the duration of the self-test. After the self-test, either an error is output
by a flashing red light code or the device starts and the LED remains lit green.
Note The power LED flashes red/green in alternation until a configuration pass-
word has been specified. Without a configuration password, the configura-
tion data of the Business LAN R800+ is insecure. Under normal
circumstances, you would assign a configuration password during the basic
configuration (see instructions in the following chapter). For information
about a later assignment of the configuration password see the section
“Security settings” on page 57.
off Device off
green blinking Self-test when powering up
green constantly on Device ready for use
red/
green
blinking alternately Device insecure: configuration password not assi-
gned
red blinking Time or connect-charge reached
Flashing Power LED but no connection?
There's no need to worry if the Power LED blinks red and you can no longer
connect to the WAN. This simply indicates that a preset time or connect-
charge limit has been reached. There are three methods available for unlok-
king:
Reset connect charge protection.
Increase the limit that has been reached.
Completely deactivate the lock that has been triggered (set limit to '0').
If a time or connect charge limit has been reached, you will be notified in LANmonitor. To reset the con-
nect charge protection, select Reset Charge and Time Limits in the context menu (right mouse click).
You can configure the connect charge settings in LANconfig under Management Costs (you will
only be able to access this configuration if 'Complete configuration display' is selected under View
Options…).
You will find the connect charge protection reset in WEBconfig and all parameters under Expert Con-
figuration Setup Charges-module.
Signal for reached time
or connect-charge limit
Power
==!"§==Systems=
Installation 23
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Installation
Online
The Online LED indicates the overall status of all WAN ports:
ADSL
Status
Connection status of the ADSL link:
ADSL
Data
Data traffic via the ADSL link:
ISDN
status
Status of ISDN S
0
connection:
Note If the ISDN status LED goes out automatically, this does not indicate an S
0
bus error. Many ISDN connections and PBXs put the S
0
bus into a power-
off no active connection
green flashing Establishing first connection
green inverse
flashing
Establishing further connection
green constantly on At least one connection established
red constantly on Error establishing the previous connection
off not connected
green blinking Initialisation
green constantly on Synchronisation succsesful
red flickering Error (CRC error, framing error etc.)
red constantly on Synchronisation failed
red/
orange
blinking Hardware error
off
no logic connection
green flashing Establishing first connection
green inverse
flashing
Establishing further connection
green constantly on Connection(s) established
green flickering Data traffic (send or receive)
off Not connected or no S
0
voltage (no error message)
green blinking Initializing D-channel (establishing contact with the
connection point)
green constantly on D channel ready for use
red blinking Error (CRC error, framing error, etc.)
red constantly on Activation of D-channel failed
24 Installation
save mode after a certain time. The S
0
bus is automatically reactivated as
required, and the ISDN status LED will once again light up green.
ISDN
data
Separate status display for both ISDN B channels:
ETH 1 to
ETH 4
Status of the four LAN ports in the integrated switch:
VPN
Status of a VPN connection.
The back of the unit
The connections and switches of the router are located on the back panel:
off No connection established
green blinking Dialling
green flashing Establishing first connection
green flashing Establishing further connection
green constantly on Connection established via B channel
green flickering Data traffic (send or receive)
off No network device connected
green constantly on Connection to network device operational, no data traf-
fic
green flickering Data traffic
red flickering Collision of packets
off No VPN tunnel established
green blinking Negotiating VPN connection
green flashing Establishing first connection
green inverse
flashing
Establishing further connection
green constantly on VPN connection established
Reset
DC12V
ETH3ETH4 ETH2 ETH1
ISDN S
0
ADSL
Config(COM)
Installation 25
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Installation
1. Voltage switch
2. Connection for the included power adapter
3. Switch with four 10/100Base-Tx connections
4. Serial configuration port
5. ISDN/S
0
port
6. ADSL port
7. Reset switch
The reset switch has two different functions depending on the length of time that it is pres-
sed:
Restarting the device (soft reset) – push the button for less than five seconds.
The device will restart.
Resetting the configuration (hard reset) – push the button for more than five
seconds. All the device's LEDs will light up green and stay on. As soon as the reset
switch is released, the device will restart with factory default settings.
Hardware installation
The installation of the Router base station takes place in the following steps:
1. LAN connect the Router to your LAN or to an individual PC. For that purpose, plug the
included network cable (green plugs) into the LAN connector of the device
and the
other end into a free network connecting socket of your local network, into a free socket
of a hub/switch or into the network socket of an individual PC.
The LAN connector identifies automatically the transfer rate (10/100 Mbps) of the con-
nected network device (autosensing). A parallel connection of devices with different
speeds and types is possible.
Note You should never have more than one unconfigured Router in a network
segment at any given time. All unconfigured Router devices use the same IP
address (with the final digits '254'), which would result in an address conflict.
To avoid problems, always configure multiple Router devices one at a time,
immediately assigning each device a unique IP address (one that does not
end with '254').
2. ADSL – connect the ADSL interface
to the splitter using the supplied ADSL connec-
tor cable (transparent plugs).
3. ISDN – to connect the Router to the ISDN, plug one end of the supplied ISDN connector
cable (light blue plugs) in the ISDN/S
0
port of the router and the other end into an
ISDN/S
0
multi-device mode or point-to-point mode connection.
26 Installation
4. Configuration port – you may optionally connect the router directly to the serial port
(RS-232, V.24) of a PC. Use the cable supplied for this purpose. Connect the configu-
ration port of the Business LAN R800+ with a free serial port of the PC.
5. Alternatively you may connect an external modem (analogue or GSM) to the serial port
using the LANCOM modem adapter kit, if you would like to make use of an additional
WAN line for remote maintenance, backup connections or dynamic VPN.
6. Connect to power – Connect socket of the unit to a power supply using the inclu-
ded power adapter.
Note Use the supplied power supply unit only! Using an unsuitable power supply
unit may cause damage or injury.
7. Operational? – After a short device self-test the Power LED will be permanently lit.
Green LAN LEDs indicate the LAN sockets that have functioning connections.
Devices with integrated ADSL modem could become quite warm during
their operation. Concerning these models, please pay attention to the
ambient air temperature range of max. 35°C. Make sure that the ventila-
tion is sufficient. Do not stack the devices and do not expose them to
direct insolation!
Software installation
This section covers the installation of the included system software LANtools for Win-
dows.
Note You may skip this section if you use your Router exclusively with computers
running operating systems other than Windows.
PC for configuration with
serial interface
ISDN NT
ADSL
splitter phone line
Modem adapter kit with
external modem
Installation 27
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Installation
Starting software setup
Place the supplied CD in your CD drive. The setup program will start automatically.
Note If the setup program does not start automatically, run AUTORUN.EXE in the
root folder of the supplied CD.
In Setup select Install Software. The following selection menus will appear on the
screen:
Which software should you install?
LANconfig is the configuration program for your Business LAN R800+. WEBconfig
can be used alternatively or in addition via a web browser.
LANmonitor lets you monitor on a Windows PC your Business LAN R800+.
With LANCOM Online Documentation, you can copy the documentation files on
your PC.
Select the appropriate software options and confirm your choice with Next. The software
is automatically installed.
28 Basic configuration
Basic configuration
The basic configuration can be performed on a step-by-step basis using a convenient
setup wizard to guide you through the setup process and prompt you for the required
information.
First, this chapter will inform you which information is required for the basic configuration.
Use this section to assemble the information you will need before launching the wizard.
Next, enter the data in the setup wizard. Launching the wizard and the process itself are
described step by step - with separate sections for LANconfig and WEBconfig. Thanks to
the information that you have collected in advance, the basic configuration is quick and
effortless.
At the end of this chapter we will show you the settings that are needed for the LAN's work-
stations to ensure trouble-free access to the router (“TCP/IP settings to workstation PCs”
on page 35).
Which information is necessary?
The basic configuration wizard will take care of the basic TCP/IP configuration of the rou-
ter, protect the device with a configuration password, and will set up the ISDN connection
if required. The following descriptions of the information required by the wizard are grou-
ped in these three configuration sections:
TCP/IP settings
protection of the configuration
information on DSL connection
information on ISDN connection
configuring connect charge protection
TCP/IP settings
The TCP/IP configuration can be realized in two ways: either as a fully automatic configu-
ration or manually. No user input is required for the fully automatic TCP/IP configuration.
All parameters are set automatically by the setup wizard. During manual TCP/IP configu-
ration, the wizard will prompt you for the usual TCP/IP parameters: IP address, netmask
etc. (more on these topics later).
Fully automatic TCP/IP configuration is only possible in certain network environments.
The setup wizard therefore analyses the connected LAN to determine whether it supports
fully automatic configuration.
Basic configuration 29
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Configuration
New LAN—fully automatic configuration possible
If all connected network devices are still unconfigured, the setup wizard will suggest fully
automatic TCP/IP configuration. This may be the case in the following situations:
a single PC is connected to the router
setup of a new network
Fully automatic TCP/IP configuration will not be available when integrating the Business
LAN Router in an existing TCP/IP LAN. In this case, continue with the sectionInformation
required for manual TCP/IP configuration” on page 29.
The result of the fully automatic TCP/IP configuration: the router will be assigned the IP
address '172.23.56.1' (netmask '255.255.255.0'). In addition, the integrated DHCP server
will be enabled so that the Business LAN Router can automatically assign IP addresses to
the devices in the LAN.
Configure manually nevertheless?
The fully automatic TCP/IP configuration is optional. You may also select manual configu-
ration instead. Make your selection after the following considerations:
Choose automatic configuration if you are not familiar with networks and IP addres-
ses.
Select manual TCP/IP configuration if you are familiar with networks and IP addres-
ses, and one of the following conditions is applicable:
You have not yet used IP addresses in your network but would like to do so now.
You would like to specify the IP address for your router, selecting it from the
address range reserved for private use, e.g. '10.0.0.1' with the netmask
'255.255.255.0'. At the same time you will set the address range that the DHCP
server uses for the other devices in the network (provided that the DHCP server is
switched on).
You have previously used IP addresses for the computers in your LAN.
Information required for manual TCP/IP configuration
During manual TCP/IP configuration, the setup wizard will prompt you for the following
information:
IP address and netmask for the Business LAN Router
Assign a free IP address from the address range of your LAN to the Business LAN Rou-
ter and specify the netmask.
Enable DHCP server?
Disable the DHCP server function in the Business LAN Router if you would like to have
a different DHCP server assign the IP addresses in your LAN.
30 Basic configuration
Configuration protection
The password for configuration access to the Business LAN Router protects the configu-
ration against unauthorized access. The configuration of the router contains a considera-
ble amount of sensitive information such as your Internet access information. We
therefore strongly recommend protecting it with a password.
The setup wizard for the basic configuration automatically disables remote configuration
access via ISDN, thus protecting your configuration against tampering. ISDN remote con-
figuration access can be enabled at any time using the security wizard (see “Have you per-
mitted remote configuration?” on page 59).
Settings for the DSL connection
For the WAN connection it may be necessary to enter the transfer protocol being used.
The wizard will e.g. automatically enter the correct settings for major DSL providers. You
only need to enter the protocol used by your access provider if the wizard does not list
your provider.
Connect charge protection
Connect charge protection blocks connections that go beyond a previously set amount,
protecting you from unexpectedly high connection costs.
In Business LAN Routers, there are three independent budgets: For DSL access, you can
set a maximum connection time in minutes. In addition to this time budget, there is also a
budget for limiting ISDN connection charges.
Note In order for the limitations according to connect charge rates to function pro-
perly, it is necessary to enter the information for connect charge rates
through ISDN.
Any budget can be deactivated by entering the value '0'.
Instructions for LANconfig
1. Start up LANconfig by clicking Start Programme LANCOM LANconfig
LANconfig automatically detects the new Business LAN Router in the TCP/IP network.
Then the setup wizard starts that will help you make the basic settings of the device or
will even do all the work for you (provided a suitable network environment exists).
Basic configuration 31
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Configuration
If you cannot access an unconfigured Business LAN Router, the problem
may be due to the netmask of the LAN: with less than 254 possible hosts
(netmask > '255.255.255.0'), please ensure that the IP address 'x.x.x.254' is
located in your own subnet.
If you have chosen automatic TCP/IP configuration, please continue with Step
.
2. If you would like to configure the TCP/IP settings manually, assign an available address
from a suitable address range to the Business LAN Router. Confirm your choice with
Next.
3. Specify whether or not the router should act as a DHCP server. Make your selection and
confirm with Next.
4. In the following window, specify the password for configuration access. Note that the
password is case-sensitive and ensure that it is sufficiently long (at least 6 characters).
In addition, you may specify whether the device may only be configured from the local
network or whether remote configuration via the WAN (i.e. a remote network) is also
permissible.
Note Please note that enabling this will also permit remote configuration via the
Internet. You should always make sure that the configuration access is pro-
tected with a password.
5. In the next window, select your DSL provider from the list that is displayed. If you select
'My provider is not listed here,' you must enter the transfer protocol used by your DSL
provider manually. Confirm your choice with Next.
6. Enter the ISDN subscriber numbers (as MSNs, i.e. without area code) on which the rou-
ter will accept calls. Multiple numbers are separated by semicolons. If you do not spe-
cify any MSNs, the router will answer all incoming calls on the ISDN connection.
In addition, you can enter a trunk code for dialling into ISDN. Finally, you should spe-
cify whether or not the tariff information is to be transmitted at your ISDN connection.
Confirm your choice with Next.
7. Connect charge protection can limit the cost of DSL and ISDN connections to a prede-
termined amount if desired. Confirm your choice with Next.
8. Complete the configuration with Finish.
32 Basic configuration
Note Section ’TCP/IP settings to workstation PCs’ auf Seite 35 will describe the
settings required for the individual workstations in the LAN.
Instructions for WEBconfig
To configure the router with WEBconfig you must know how to address it in the LAN. The
reaction of the devices, as well as their accessibility for configuration via web browser is
dependent on whether a DHCP server and a DNS server are already active in the LAN,
and whether these two server processes exchange the assignment of IP addresses to
symbolic names within the LAN between each other.
After powered on, unconfigured T-Systems Router devices check first, whether a DHCP
server is already active in the LAN. Dependent on the situation, the device is able to switch
on its own DHCP server or, alternatively, to activate its DHCP client mode. In this second
operating mode, the device itself can obtain an IP address from a DHCP server already
existing in the LAN.
Network without DHCP server
In a network without DHCP server, unconfigured devices activate their own DHCP server
service after starting, and assign appropriate IP addresses and gateway information to the
other workstations within the LAN, provided that the workstations are set to obtain their IP
address automatically (auto-DHCP). In this constellation, the device can be accessed with
any web browser from each PC with activated auto-DHCP function through the name
T-Systems or by its IP address 172.23.56.254.
If the configuration PC does not obtain its IP address from the DHCP server in the router,
figure out the current IP address of this PC (with Start Execute cmd and command
ipconfig at the prompt under Windows 2000 or Windows XP, with Start Execute
cmd and the command winipcfg at the prompt under Windows Me and Windows 9x, or
with the command ifconfig on the console under Linux). In this case, the device is reacha-
ble under the IP address x.x.x.254 ( “x” stands for the first three blocks in the IP address of
the configuration PC).
Basic configuration 33
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Configuration
Network with DHCP server
If a DHCP server is active in the LAN to assign IP addresses, an unconfigured device will
turn off its own DHCP server. It will change into DHCP client mode and will obtain an IP
address from the DHCP server of the LAN. This IP address is not known at first. The acces-
sibility of the device depends on the name resolution:
If there is a DNS server for name resolution in the LAN, which interchanges the assign-
ment of IP addresses to names with the DHCP server, then the device can be accessed
by the name “T-Systems-<MAC address>” (e.g. “T-Systems-00a057xxxxxx”).
Note The MAC address can be found on a label at the bottom of the device.
If there is no DNS server in the LAN, or it is not linked to the DHCP server, then the
device can not be reached by the name. The following options remain in this case:
Figure out the DHCP-assigned IP address of the device by suitable tools and con-
tact the device directly with this IP address.
Use LANconfig.
Connect a PC with a terminal program via the serial configuration interface to the
device.
Starting the wizards in WEBconfig
1. Start your web browser (e.g. Internet Explorer, Netscape Navigator, Opera) and call the
Business LAN Router there:
http://<IP address of the Business LAN Router>
(or with a name as discribed above)
Note If you cannot access an unconfigured Business LAN Router, the problem
may be due to the netmask of the LAN: with less than 254 possible hosts
(netmask > '255.255.255.0'), please ensure that the IP address 'x.x.x.254' is
located in your own subnet.
The WEBconfig main menu will be displayed:
34 Basic configuration
Note The setup wizards are tailored precisely to the functionality of the specific
Business LAN Router. As a result, your device may offer different wizards
than those shown here.
If you have chosen automatic TCP/IP configuration, please continue with Step
.
2. If you would like to configure the TCP/IP settings manually, assign an available address
from a suitable address range to the Business LAN Router. Also set whether or not it is
to operate as a DHCP server. Confirm your entry with Apply.
3. Enter the wireless parameters. Select a network name (SSID) and a radio channel. Turn
on if necessary the function for ’closed network’. Confirm your choice with Next.
4. In the following 'Security settings' window, specify a password for configuration access.
Note that the password is case-sensitive and ensure that it is sufficiently long (at least 6
characters).
You may specify whether the device may only be configured from the local network or
whether remote configuration via the WAN (i.e. a remote network) is also permissible.
Note Please note that enabling this will also permit remote configuration via the
Internet. You should always make sure that the configuration access is sui-
tably protected, e.g. with a password.
Basic configuration 35
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Configuration
5. In the next window, select your DSL provider from the list that is displayed. Confirm your
choice with Apply.
If you select 'My provider is not listed here,' you must enter the transfer protocol used
by your DSL provider manually in the next window. Confirm your choice with Apply.
6. Connect charge protection can limit the cost of DSL connections to a predetermined
amount if desired. Confirm your choice with Apply.
7. The basic setup wizard reports that all the necessary information has been provided.
You can end the wizard with Go on.
TCP/IP settings to workstation PCs
The correct addressing of all devices within a LAN is extremely important for TCP/IP net-
works. In addition, all computers must know the IP addresses of two central points in the
LAN:
Default gateway – receives all packets that are not addressed to computers within the
local network.
DNS server – translates network names (www.lancom.de) or names of computers
(www.lancom.de) to actual IP addresses.
The Business LAN Router can perform the functions of both a default gateway and a DNS
server. In addition, as a DHCP server it can also automatically assign valid IP addresses to
all of the computers in the LAN.
The correct TCP/IP configuration of the PCs in the LAN depends on the method used to
assign IP addresses within the LAN:
IP address assignment via the Business LAN Router (default)
In this operating mode the Business LAN Router not only assigns IP addresses to the
PCs in the LAN, it also uses DHCP to specify its own IP address as that of the default
gateway and DNS server. The PCs must therefore be configured so that they automati-
cally obtain their own IP address and the IP addresses of the standard gateway and
DNS server (via DHCP).
Entering the password in the web browser
When you are prompted for a user name and password by
your web browser when accessing the device in the future,
enter your personal values to the corresponding fields.
Please note that the password is case-sensitive.
If you are using the common configuration account, enter
the corresponding password only. Leave the user name
field blank.
Entering the configuration password
36 Basic configuration
IP address assignment via a separate DHCP server
The workstation PCs must be configured so that they automatically obtain their own IP
address and the IP addresses of the standard gateway and DNS server (via DHCP).
The IP address of the Business LAN Router must be stored on the DHCP server so that
the DHCP server transmits it to the PCs in the LAN as the standard gateway. In addi-
tion, the DHCP server should also specify the Business LAN Router as a DNS server.
Manual IP address assignment
If the IP addresses in the network are assigned static ally, then for each PC the IP
address of the Business LAN Router must be set in the TCP/IP configuration as the
standard gateway and as a DNS server.
Note For further information and help on the TCP/IP settings of your Business
LAN Router, please see the reference manual. For more information on the
network configuration of the workstation computers, please refer to the
documentation of your operating system.
Setting up Internet access 37
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Internet Access
Setting up Internet access
All computers in the LAN can take advantage of the central Internet access of the Router.
The connection to the Internet provider can be established via any WAN connection. Inter-
net access via ISDN can be used as a backup connection for DSL, for example.
Does the setup wizard know your Internet provider?
A convenient wizard is available to help you set up Internet access. The wizard knows the
access information of major Internet providers and will offer you a list of providers to
choose from. If you find your Internet service provider on this list, you normally will not
have to enter any further transfer parameters to configure your Internet access. Only the
authentication data that are supplied by your provider are required.
Additional information for unknown Internet providers
If the setup wizard does not know your Internet provider, it will prompt you for all of the
required information step by step. Your provider will supply this information.
ADSL
Protocol: PPP (PPPoA), PPPoE, Plain IP (IPoA) or Plain Ethernet
ATM parameter: VPI (Virtual Path Identifier) and VCI (Virtual Circuit Identifier), VC
or LLC-based Multiplexing
Additionally for plain IP (IPoA) and Plain Ethernet: a dedicated public IP address
with netmask (not to be confused with the private LAN IP address), default gate-
way and DNS server. These values can be received automatically from providers
that support DHCP.
DSL
Protocol: PPPoE, PPTP or Plain Ethernet (IPoE)
DSL or ISDN
connection
Router
router in the LAN of
the Internet provider
Internet
38 Setting up Internet access
Additionally for Plain Ethernet: own public IP address with netmask (not to be con-
fused with the private LAN IP address), default gateway and DNS server. These
values can be received automatically from providers that support DHCP.
User name and password
ISDN
dial-in number
User name and password
Additional connection options
You may also enable or disable further options in the wizard, depending on whether or not
they are supported by your Internet provider:
Time-based billing or flat rate – select the accounting model used by your Internet pro-
vider.
When using time-based billing, you can set the Router to automatically close exis-
ting connections if no data has been transferred within a specified time (the so-
called idle time).
In addition, you can activate a line monitor that identifies inactive remote stations
faster and therefore can close the connection before the idle time has elapsed.
Active line monitoring can also be used with flat rate billing to continuously check
the function of the remote station.
You also have the option of keeping flat rate connections alive if required. Drop-
ped connections are then automatically re-established.
Dynamic channel bundling (ISDN only)
if required, the second ISDN B-channel will automatically be bundled to the con-
nection. This doubles the available bandwidth; it may also double your connect
charges as well, however. What's more, your ISDN connection will be busy in this
case, with all other incoming and outgoing calls being rejected.
Data compression
this permits an additional increase in data throughput.
Instructions for LANconfig
1. Highlight the Router in the selection window. From the menu bar, select Tools Setup
Wizard.
Setting up Internet access 39
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Internet Access
2. From the menu, select the Setup Internet access wizard and click Next.
3. In the following window select your country and your Internet provider if possible, and
enter your access information.
4. Depending on their availability, the wizard will display additional options for your Inter-
net connection.
5. The wizard will inform you as soon as the entered information is complete. Complete
the configuration with Finish.
Instructions for WEBconfig
1. In the main menu, select Setup Internet access.
2. In the following window select your country and your Internet provider if possible, and
enter your access information.
3. Depending on their availability, the wizard will display additional options for your Inter-
net connection.
4. The wizard will inform you as soon as the entered information is complete. Complete
the configuration with Apply.
LANconfig:
Quick access to the setup wizards
Under LANconfig, the fastest way to launch the setup
wizards is via the button on the toolbar.
40 Linking two networks
Linking two networks
With the network interconnection (also known as LAN to LAN coupling) of the Router, two
local networks are linked. The LAN to LAN coupling can be realized in principle in two dif-
ferent ways:
VPN: For coupling via VPN, the connection between both LANs is established over a
specially secured connection through the public Internet. A router with VPN support is
required in both LANs.
ISDN: For coupling via ISDN, a direct connection between both LANs is established
over an ISDN connection. A router with ISDN interface is required in both LANs.
A setup wizard handles the configuration of the connection in the usual convenient man-
ner.
Always configure both sides
Both routers involved in the network interconnection must be configured. Care must be
taken to ensure that the configuration information provided matches.
Note The following instructions will assume that T-Systems routers are being used
on both sides. A network interconnection may also be realized with routers
from other manufacturers. A mixed setup usually requires more extensive
configuration measures for both devices, however. Please refer to the refe-
rence manual for more information in this regard.
Security aspects
You must, of course, protect your LAN against unauthorized access. A Router therefore
offers a whole range of security mechanisms that can provide an outstanding level of pro-
tection:
VPN: Network couplings via VPN transmit data by IPSec. The data are encrypted by
AES, 3-DES, Blowfish or CAST encryption algorithms.
ISDN: For network couplings via ISDN, the connection password, the checking of the
ISDN number and the callback function ensure the security of the connection.
Note The ISDN call back function cannot be configured using the wizard. It can
only be set up in the expert configuration. For details, please see the refe-
rence manual.
What information is necessary?
The wizard will prompt you for the necessary information on a step-by-step basis. If possi-
ble, however, you should have it available before launching the wizard.
Linking two networks 41
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Linking Networks
To explain the significance of the information requested by the wizard, we will be using a
typical deployment as an example: setting up a link between a branch office and its head-
quarters. The routers involved are named 'HEAD_OFFICE' and 'BRANCH'.
Please refer to the following tables for the entries to be made for each of the routers.
Arrows mark the dependencies between the entries.
General information
The following details are required for the installation of LAN to LAN couplings. The first
column indicates, whether the information is required for network couplings over VPN
(standard method using “preshared keys“) and/or ISDN.
Note Further details to network couplings via VPN using enhanced methods (e.g.
digital certificates) can be found in the LCOS reference manual.
Coupling Entry Gateway 1 Gateway 2
VPN ISDN connection available? yes/no yes/no
VPN Type of the local IP address static/dynamic static/dynamic
VPN Type of the remote IP address static/dynamic static/dynamic
VPN +
ISDN
Name of the local device 'HEAD' 'BRANCH'
VPN +
ISDN
Name of the remote station 'BRANCH' 'HEAD'
VPN +
ISDN
Remote ISDN calling number (0123) 123456 (0789) 654321
VPN +
ISDN
Remote ISDN caller ID (0789) 654321 (0123) 123456
VPN +
ISDN
Password for secure transmission of
the IP address
'Password' 'Password'
VPN Shared secret for encryption 'Secret' 'Secret'
VPN IP address of remote station '10.0.2.100' '10.0.1.100'
VPN IP network address of the remote net-
work
'10.0.2.0' '10.0.1.0'
VPN Netmask of the remote network 255.255.255.0 255.255.255.0
VPN Domain name of the remote network 'head' 'branch'
VPN Hide local stations for access to remote
network (Extranet VPN)?
yes/no yes/no
ISDN TCP/IP routing for access to remote
network
yes/no yes/no
42 Linking two networks
In case your device has an ISDN connection, the wizard asks whether the remote site
has ISDN as well.
The type of IP address must be stated for both sides for VPN connections via the Inter-
net. There are two types of IP addresses: static and dynamic. An explanation of the two
IP address types can be found in the reference manual.
Thanks to Dynamic VPN, connections can be enabled not only between gateways
with fixed, static IP addresses, but even between gateways with dynamic IP addres-
ses. The active initiation of VPN connections towards remote sites with dynamic IP
addresses requires ISDN.
If you haven't already named your Router, the wizard will ask you for a new, unique
device name. With this entry, you will rename your Router. Be sure to give the two
devices different names.
The name of the remote station is needed for its identification.
Enter the subscriber number of the remote station in the ISDN subscriber number
field. The complete subscriber number including all necessary area and country
codes is required.
The stated ISDN caller ID is used to identify and authenticate callers. When a Router
receives a call, it compares the ISDN caller ID entered for the remote station with the
actual caller ID transferred via the D channel. An ISDN caller ID generally consists of
an area code and an MSN.
The password for the ISDN connection is an alternative to the use of the ISDN caller
ID. It is always used to authenticate callers that do not send an ISDN caller ID. The
exact same password must be entered on both sides. It is used for calls in both direc-
tions.
The Shared Secret is the central password for security within the VPN. The exact
same password has to be entered on both sides
Data compression increases the transfer speed of the connection at no additional
cost. This is completely unlike the bundling of two ISDN- channels with MLPPP (Multi
Link PPP): The transfer rate will be doubled but there will also be additional telephone
costs for two connections.
ISDN IPX routing for access to remote
network
yes/no yes/no
VPN +
ISDN
NetBIOS routing for access to remote
network?
yes/no yes/no
VPN +
ISDN
Name of remote workgroup (NetBIOS
only)
'workgroup1' 'workgroup2'
ISDN Data compression on/off on/off
ISDN Channel bundling on/off on/off
Coupling Entry Gateway 1 Gateway 2
Linking two networks 43
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Linking Networks
Settings for the TCP/IP router
In TCP/IP networks, addressing has a special significance. Please note that two intercon-
nected networks are logically separate from one another. Each must therefore have its
own network number (in our example, '10.0.1.x' and '10.0.2.x'). These network numbers
may not be identical.
Unlike when accessing the Internet, all of the IP addresses in the involved networks are
visible on the remote side when coupling networks, not just those of the router. The com-
puter with the IP address 10.0.2.10 in the branch office LAN sees the server 10.0.1.2 in
the headquarters and can access it (assuming it has the appropriate rights), and vice
versa.
DNS access to the remote LAN
Thanks to DNS, it is not only possible to access remote computers in a TCP/IP network via
their IP address, but also by using freely defined names.
For example, the computer with the name 'pc1.branch.company' (IP 10.0.2.10) will not
only be able to access the server of the head office via its IP address, but also via its name,
'server.head.company'. The only precondition: the domain of the remote network in the
wizard must be specified.
Note The domain can only be specified in the LANconfig wizard. In WEBconfig,
enter the appropriate information later in the expert configuration. For more
information, see the Router reference manual.
LAN of head office.
IP: 10.0.
1.0,
Netmask: 255.255.255.0
Domain: '
head.company'
10.0.
1.100
(0123) 123456
LAN of branch office.
IP: 10.0.
2.0,
Netmask: 255.255.255.0
Domain: '
branch.company'
10.0.
1.2
10.0.
2.10
10.0.
2.100
(0789) 654321
'
server.head.company'
'pc1.branch.company
VPN or ISDN con-
nection
44 Linking two networks
Extranet VPN
Finally, one can decide whether access to local stations is permitted. In this 'Extranet VPN'
operating mode, the IP stations do not expose their IP address to the remote LAN, rather
they will be hidden behind the VPN gateway's IP address instead.
Therefore, the stations within the remote LAN cannot access IP stations in the other LAN
directly. For example, if a headquarters. LAN in 'Extranet VPN' mode is hidden behind its
gateway's address '10.10.2.100', and on of its IP stations (e.g. '10.10.2.13') accesses the
IP station '10.10.1.2' of the branch office, then the branch office.s IP stations deems to be
a accessed by '10.10.2.100'. The true IP address of the accessor ('10.10.2.13') is hidden.
If two LANs shall be coupled in Extranet mode, please ensure to enter the 'outbound'
Extranet IP address of the remote site, not its Intranet address. According to the example,
this was '10.10.2.100'. The appropriate netmask for the Extranet IP address would be
'255.255.255.255' then.
Settings for the IPX router
Note The coupling of IPX networks via VPN cannot be configured using the
wizard. It can only be set up in the expert configuration. For details, please
see the reference manual.
Coupling two typical IPX networks to form a WAN requires three IPX network numbers:
for the LAN of the head office
for the LAN of the branch office
for the higher-level WAN
The IPX network numbers in the head and branch offices are specified to the respective
remote sides.
The three required network numbers are designated as “External Network Numbers” by
the IPX conventions. Like IP network addresses, the apply to an entire LAN segment. On
the other hand, internal IPX numbers are used to address specific Novell servers in the
LAN. All three specified network numbers must be distinct from one another and from all
used internal IPX network numbers.
In addition, it may be necessary to enter the frame type (“binding”).
Specifying the IPX network number and binding used is not necessary if the remote net-
work also contains a Novell server. It is only necessary to enter the network number for the
WAN manually in this case.
Linking two networks 45
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Linking Networks
Settings for NetBIOS routing
NetBIOS routing can be set up quickly: All that is required in addition to the information for
the TCP/IP protocol used is the name of a Windows workgroup from in the router's own
LAN.
Note Remote Windows workgroups do not appear in the Windows Network Neig-
hbourhood, but can only be contacted directly (e.g. via Find Computers).
Instructions for LANconfig
Perform the configuration on both routers, one at a time.
1. Launch the 'Connect two local area networks' wizard. Follow the wizard's instructions
and enter the required information.
LAN of the head office
IPX network no.: 00000001
Binding: Ethernet_II
(0123) 123456
LAN of the branch office
IPX network no.: 00000002
Binding: Ethernet_II
WAN
IPX network no.:
00000009
(0789) 654321
IPX internal net:
00020002
VPN or ISDN con-
nection
46 Linking two networks
2. The wizard will return a message to indicate that it has all the information it needs.
Close the wizard with Finish.
3. After finishing the configuration of both routers, you can test the network connection.
Try to contact a computer in the remote LAN (e.g. with a
ping
). The Router should auto-
matically set up a connection to the remote station and contact the required computer.
Instructions for WEBconfig
Note Under WEBconfig, the coupling of networks via VPN cannot be configured
using the wizard. It can only be set up in the expert configuration. For details,
please see the reference manual.
Perform the configuration on both routers, one at a time.
1. From the main menu, launch the 'Connect two local area networks' wizard. Follow the
wizard's instructions and enter the required information.
2. The wizard will return a message to indicate that it has all the information it needs.
Close the wizard with Te r m i n a t e .
3. After finishing the configuration of both routers, you can test the network connection.
Try to contact a computer in the remote LAN (e.g. with a
ping
). The Router should auto-
matically set up a connection to the remote station and contact the required computer.
Ping – quick testing for TCP/IP connections
To test a TCP/IP connection, simply send a
ping
from your computer to a computer in the remote net-
work. For more information on the 'ping' com-
mand, please see the documentation of your
operating system.
IPX and NetBIOS connection can be tested
by searching for a remote Novel Server or a
computer in the remote Windows workgroup
from your computer.
Providing dial-up access 47
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Remote Access
Providing dial-up access
Your Router supports dial-up connections to permit individual computers full access to
your network. This service is also known as RAS (Remote Access Service). In principle,
the RAS access can be realized in two different ways:
VPN: For a RAS access via VPN, the connection between the LAN and the dial-in PC
is established over a specially secured connection through the public Internet. The
router in the LAN requires VPN support, the dial-in PC an access to the Internet and
the LANCOM VPN Client.
ISDN: For a RAS access via ISDN, a direct connection between the LAN and the dial-
in PC is established over an ISDN dial-up connection. The router in the LAN requires
an ISDN interface, the dial-up PC an ISDN adapter or an ISDN modem. The data trans-
fer protocol is PPP. Therefore, the support of all usual devices and operating systems
is ensured.
A setup wizard handles the configuration of the dial-up connection in the usual conveni-
ent manner.
Security aspects
You must, of course, protect your LAN against unauthorized access. An Router therefore
offers a whole range of security mechanisms that can provide an outstanding level of pro-
tection:
VPN: Network couplings via VPN transmit data by IPSec. The data are encrypted by
AES, 3-DES, Blowfish or CAST encryption algorithms.
ISDN: For network couplings via ISDN, the connection password, the checking of the
ISDN number and the callback function ensure the security of the connection.
Note The ISDN call back function cannot be configured using the wizard. It can
only be set up in the expert configuration. For details, please see the refe-
rence manual.
Which information is required?
The wizard will set up dial-up access for only one user. Please run the wizard again for
each additional user.
General information
The following entries are required to set up a RAS connection. The first column indicates
whether the information is required for a connection via VPN (standard method using
“preshared keys“) and/or ISDN .
48 Providing dial-up access
Note Further details to RAS connections via VPN using enhanced methods (e.g.
digital certificates) can be found in the LCOS reference manual.
Notes to the individual values:
User name and password: Users authenticate themselves with this information when
dialling in.
Incoming number: The Router uses the optional ISDN caller ID as an additional user
authentication. This security function should not be used when users dial in from dif-
fering locations.
Note Please refer to chapter “Linking two networks” on page 40 for advice about
the other values required for the installation of a RAS access.
Coupling Entry
VPN +
ISDN
User name
VPN +
ISDN
Password
VPN Shared secret for encryption
VPN Hide local stations for access to remote network (Extranet VPN)?
ISDN Incoming number of remote station
ISDN TCP/IP routing for access to remote network
ISDN IPX routing for access to remote network
VPN +
ISDN
IP addresses for the dial-up PCs: static or dynamic by address range
(IP address pool)
VPN +
ISDN
NetBIOS routing for access to remote network?
VPN +
ISDN
Name of remote workgroup (NetBIOS only)
The ISDN calling line identity (CLI)
The ISDN caller IDalso known as CLI (Calling Line Identity)this is the telephone number of the
caller which is transmitted to the participant receiving the call. As a rule, it consists of the country
and area codes and an MSN.
The CLI is well-suited for authentication purposes for two reasons: it is very difficult to manipulate,
and the number is transferred free of charge via the ISDN control channel (D-channel).
Providing dial-up access 49
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Remote Access
Settings for TCP/IP
Each active RAS user must be assigned an IP address when using the TCP/IP protocol.
This IP address can be permanently assigned when setting up a user. However, it is sim-
pler to let the Router automatically assign free IP addresses to users when they dial in. In
this case you only need to specify the IP address range that the Router should use for RAS
users.
During both manual and automatic IP address assignment, please ensure that only free
addresses from the address range of your local network are used. In our example, the IP
address '10.0.1.101' will be assigned to the PC when connecting.
This IP address makes the computer a fully-fledged member of the LAN: with the appro-
priate rights, it can access all of the other devices in the LAN. The same applies in the
other direction as well: computers in the LAN will also be able to access the remote
machine.
Settings for IPX
Two IPX network numbers must be provided for remote access to an IPX network:
the IPX network number of the head office
an additional IPX network number for the higher-level WAN
10.0.1.100
(0123) 123456
User: 'SAMPLE'
(0123) 777888
ISDN adapter
Remote
workstation
IP:
10.0.
1.101
LAN of the head office.
IP: 10.0.
1.0
VPN or ISDN
connection
50 Providing dial-up access
The required network numbers are designated as “External Network Numbers”. Like IP
network addresses, they apply to an entire LAN segment. On the other hand, internal IPX
numbers are used to address specific Novell servers in the LAN. All three specified net-
work numbers must be distinct from one another and from all used internal IPX network
numbers.
In addition, it may be necessary to enter the frame type (“binding”).
Specifying the IPX network number and binding used is not necessary if the remote net-
work also contains a Novell server. A network number for the WAN must also be entered
manually in this case, however.
Settings for NetBIOS routing
All that is required to use NetBIOS is the name of a Windows workgroup from the router's
own LAN.
Note The connection is not established automatically. The RAS user must manu-
ally establish a connection to the Router via Dial-Up Networking first. When
connected, they can search for and access computers in the remote network
(via Find Computers, not through the Network Neighbourhood).
Settings for the dial-in computer
Dial-up via VPN
For dialing into a network via VPN a workstation requires:
LAN of the head office
IPX network no.: 00000001, Binding: Ethernet_II
(0123) 123456
WAN
IPX network no.:
00000009
IPX internal net:
00020002
Remote work-
station
ISDN adapter
User: 'SAMPLE'
(0123) 777888
VPN or ISDN
connection
Providing dial-up access 51
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Remote Access
an Internet access
a VPN client
You can find a 30 days trial version of the LANCOM Advanced VPN Client on the T-
Systems Router CD. A detailed description of the LANCOM Advanced VPN Client and a
description of its installation can also be found on the CD.
For configuring a new profile, select the option 'LANCOM Advanced VPN Client' in the
configuration wizard.
The wizard asks then for the values that have been defined during the installation of the
RAS access in the Router.
Dial-up via ISDN
A number of settings must be configured on the dial-in computer. These are briefly listed
here, based on a Windows computer:
Dial-Up Networking (or another PPP client) must be correctly configured
Network protocol (TCP/IP, IPX) installed and bound to the dial-up adapter
New connection in Dial-Up Networking with the call number of the router
Terminal adapter or ISDN card set to PPPHDLC
PPP selected as the Dial-Up server type, 'Enable software compression' and 'Require
data encryption' unchecked
Select desired network protocols (TCP/IP, IPX)
Additional TCP/IP settings:
Assignment of IP address and name server address enabled
'IP header compression' disabled
These settings will permit a PC to dial into a remote LAN via ISDN and access its
resources in the usual manner.
52 Providing dial-up access
Instructions for LANconfig
1. Launch the 'Provide Dial-In access (RAS)' wizard. Follow the wizard's instructions and
enter the required information.
2. The wizard will return a message to indicate that it has all the information it needs.
Close the wizard with Finish.
3. Configure Dial-Up Networking access on the dial-in PC as described. Next, test the con-
nection (see box “Ping – quick testing for TCP/IP connections” on page 46).
Instructions for WEBconfig
Note RAS access via VPN cannot be configured using the wizard under
WEBconfig yet. It can only be set up in the expert configuration. For details,
please refer to the reference manual.
4. From the main menu, launch the 'Connect two local networks' wizard. Follow the
wizard's instructions and enter the required information.
5. Configure Dial-Up Networking access on the dial-in PC as described. Next, test the con-
nection (see box “Ping – quick testing for TCP/IP connections” on page 46).
Sending faxes with LANCAPI 53
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Sending Faxes
Sending faxes with LANCAPI
LANCAPI from LANCOM Systems is a special version of the popular CAPI interface. CAPI
(Common ISDN Application Programming Interface) establishes the connection between
ISDN adapters and communications programs. For their part, these programs provide the
computers with office communications functions such as a fax machine or answering
machine.
The main advantages of using LANCAPI are economic. LANCAPI provides all Windows
workstations integrated in the LAN (local-area network) with unlimited access to office
communications functions such as fax machines, answering machines, online banking
and eurofile transfer. All functions are supplied via the network without the necessity of
additional hardware at each individual workstation, thus eliminating the costs of equip-
ping the workstations with ISDN adapters or modems. All you need do is install the office
communications software on the individual workstations.
With the LANCAPI it is possible to send faxes comfortably from your workstation PC, wit-
hout having connected a fax device. To do so, you need to install several components:
the LANCAPI client. It provides the connection between your workstation PC and the
LANCAPI server.
the CAPI Faxmodem. This tool simulates a fax device on your workstation PC.
the MS Windows fax service. This is the interface between the fax applications and the
virtual fax.
The installation of the LANCAPI client is described in the reference manual. This chapter
shows the installation of the CAPI Faxmodem and MS Windows fax service.
fax
ISDN
ISDN adapter
PCs with fax software
54 Sending faxes with LANCAPI
Installation of the CAPI faxmodem
1. Select the entry Install software in the setup program of the supplied CD.
2. Highlight the option CAPI Faxmodem, click Next and follow the instructions of the
installation routine.
When the installation was successful, the LANCOM CAPI Faxmodem is entered into the
Phone and Modem Options of the control panel.
Sending faxes with LANCAPI 55
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity Sending Faxes
Installation of the MS Windows fax service
1. Select the option Printers and Faxes from the control panel.
2. Select the option Set up faxing from the window ’Printers and Fax’. Follow, if neces-
sary, the instructions of the installation tool. Into the recent window, an icon will appear
for the newly installed fax printer.
For checking the installation, click with the right mouse button on the fax-icon and select
Properties. The CAPI Faxmodem should now be entered into register 'devices'.
Sending a fax
After installing all required components, you have several possibilities to send a fax from
your workstation PC. If you have already an existing data file, you can send it directly from
your respective application. If you only want to send a short message, select the MS Win-
dows fax service. You can use of course any other fax software alternatively.
Send a fax with any given office application
1. Open as usual a document in your office application and select the menu item File/
Print.
56 Sending faxes with LANCAPI
2. Adjust the fax device as printer.
3. Click on OK. A wizard appears, that will guide you through the remaining sending pro-
cess.
Send a fax with the MS Windows fax service
1. Open the window ’Printers and Faxes’ from the control panel.
2. Double click with the left mouse button the icon of the fax device.
3. The fax client console will open. Select the menu item Send a Fax. A wizard will assist
you through the remaining sending process.
Security settings 57
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecuritySecurity
Security settings
Your Router has numerous security functions. You find in this chapter all information you
need for an optimal protection.
The security settings wizard
Access to the configuration of a device permits not only to read out critical information
such as WEP key or Internet password. Rather, also the entire settings of the security
functions (e.g. firewall) can be altered then. So an unauthorized configuration access
endangers not only a single device, but the entire network.
Your Router has a password protection for the configuration access. This protection is
already activated during the basic configuration by entering a password.
The device locks access to its configuration for a specified period of time after a certain
number of failed log-in attempts. Both the number of failed attempts and the duration of
the lock can be set as needed. By default, access is locked for a period of five minutes
after the fifth failed log-in attempt.
Wizard for LANconfig
1. Mark your Router in the selection window. Select from the command bar Extras
Setup Wizard.
2. Select in the selection menu the setup wizard Control Security Settings and confirm
your choice with Next.
3. Enter your password in the following windows and select the allowed protocols for the
configuration access from local and remote networks. Additionally, enter the MSN for
remote configuration via ISDN.
4. In a next step parameters of the configuration lock like number of failed log-in attempts
and the duration of the lock can be adjusted.
5. Now activate Stateful Inspection, ping-blocking and Stealth mode in the the firewall
configuration.
58 Security settings
6. The wizard will inform you when entries are complete. Complete the configuration with
Finish.
Wizard for WEBconfig
Under WEBconfig you have the possibility to run the wizard Security settings to control
and change the settings. The following values are handled:
password for the device
allowed protocols for the configuration access of local and remote networks
the MSN for remote configuration via ISDN
parameters of configuration lock (number of failed log-in attempts and duration of the
lock)
The firewall wizard
The Router incorporates an effective protection of your LAN and WLAN when accessing
the Internet by its Stateful Inspection firewall and its firewall filters. Basic idea of the State-
ful Inspection firewall is that only self-initiated data transfer is considered allowable. All
unasked accesses, which were not initiated from the local network, are inadmissible.
The firewall wizard assists you to create new firewall rules quickly and comfortably.
Please find further information about the firewall of your Router and about its configura-
tion in the reference manual.
Wizard for LANconfig
The firewall wizard assists you to create new firewall rules quickly and comfortably .
1. Mark your Router in the selection window. Select from the command bar Extras
Setup Wizard.
2. Select in the selection menu the setup wizard Configuring Firewall and confirm your
choice with Next.
Security settings 59
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecuritySecurity
3. In the following windows, select the services/protocols the rule should be related to.
Then you define the source and destination stations for this rule and what actions will
be executed when the rule will apply to a data packet.
4. You finally give a name to the new rule, activate it and define, whether further rules
should be observed when the rule will apply to a data packet.
5. The wizard will inform you as soon as the entries are complete. Complete the configu-
ration with Finish.
Configuration under WEBconfig
Under WEBconfig it is possible to check and modify all parameters related to the protec-
tion of the Internet access under Configuration Firewall / QoS Rules Rule
Table.
The security checklist
The following checklist provides a comprehensive overview of all security settings for pro-
fessionals. Most of the points on this checklist are no subject of concern in simple confi-
gurations, since these generally adequate security settings are already implemented
during basic configuration and by the security wizard.
Note Detailed information on the security settings listed here can be found in the
reference manual.
Have you assigned a password for the configuration?
The simplest option for the protection of the configuration is the establishment of a
password. As long as a password hasn't been set, anyone can change the configura-
tion of the device. The field for entering the password is contained in LANconfig in the
'Management' configuration area on the 'Security' tab. It is particularly required to
assign a password to the configuration if you want to allow remote configuration.
Have you permitted remote configuration?
If you do not require remote configuration, then deactivate it. If you require remote con-
figuration, then be sure to assign a password protection for the configuration (see pre-
vious section). The field for deactivating the remote configuration is also contained in
LANconfig in the 'Management' configuration area on the 'Security' tab. Select here
under 'Access rights - of remote networks' for all types of configuration the option 'not
allowed'.
Have you provided the SNMP configuration with a password?
Also protect the SNMP configuration with a password. The field for protection of the
SNMP configuration with a password is also contained in LANconfig in the 'Manage-
ment' configuration area on the 'Security' tab.
60 Security settings
Have you activated the Firewall?
The Stateful Inspection Firewall of the Business LAN R800+ ensures that your local
network cannot be attacked from the outside . The Firewall can be enabled in LANcon-
fig under ’Firewall/QoS’ on the register card ’General’.
Do you make use of a ’Deny All’ Firewall strategy?
For maximum security and control you prevent at first any data transfer through the
Firewall. Only those connections, which are explicitly desired have to allowed by the a
dedicated Firewall rule then. Thus ’Trojans’ and certain Email viruses loose their com-
munication way back. The Firewall rules are summarized in LANconfig under ’Fire-
wall/Qos’ on the register card ’Rules.
Have you activated the IP masquerading?
IP masquerading is the hiding place for all local computers for connection to the Inter-
net. Only the router module of the unit and its IP address are visible on the Internet. The
IP address can be fixed or assigned dynamically by the provider. The computers in the
LAN then use the router as a gateway so that they themselves cannot be detected. The
router separates Internet and intranet, as if by a wall. The use of IP masquerading is set
individually for each route in the routing table. The routing table can be found in the
LANconfig in the 'IP router' configuration section on the 'Routing' tab.
Have you excluded certain stations from access to the router?
Access to the internal functions of the devices can be restricted using a special filter
list. Internal functions in this case are configuration sessions via LANconfig,
WEBconfig, Telnet or TFTP. This table is empty by default and so access to the router
can therefore be obtained by TCP/IP using Telnet or TFTP from computers with any IP
address. The filter is activated when the first IP address with its associated network
mask is entered and from that point on only those IP addresses contained in this initial
entry will be permitted to use the internal functions. The circle of authorized users can
be expanded by inputting further entries. The filter entries can describe both indivi-
dual computers and whole networks. The access list can be found in LANconfig in the
'TCP/IP' configuration section on the 'General' tab.
Have you closed critical ports with filters?
The firewall filters of the Router devices offer filter functions for individual computers
or entire networks. Source and target filters can be set for individual ports or for ranges
of ports. In addition, individual protocols or any combinations of protocols (TCP/UDP/
ICMP) can be filtered. It is particularly easy to set up the filters with LANconfig. The
'Rules' tab under 'Firewall/QoS' can assist you to define and change the filter rules.
Is your saved Router configuration stored in a safe place?
Protect the saved configurations against unauthorized access in a safe place. A saved
configuration could otherwise be loaded in another device by an unauthorized per-
son, enabling, for example, the use of your Internet connections at your expense.
Have you activated the mechanism that protects your WAN lines if the device is
stolen?
After being stolen, the device can theoretically be operated at another location by
unauthorized persons. Password-protected device configurations offer no protection
Security settings 61
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecuritySecurity
from the operation of the RAS access, LAN coupling or VPN connections that are set
up in the device; a thief could gain access to a protected network.
The device's operation can be protected by various means; for example, it will cease
to function if there is an interruption to the power supply, or if the device is switched on
in another location.
With the ISDN site verification, the device can only be operated at one particular ISDN
connection. After being switched on, the device calls itself at the corresponding tele-
phone number to check that it is still connected to the "proper" ISDN connection.
The scripting function can store the entire configuration in RAM only so that restarting
the device will cause the configuration to be deleted. The configuration is not written
to the non-volatile flash memory. A loss of power because the device has been reloca-
ted will cause the entire configuration to be deleted. Further information can be found
in the reference manual.
62 Troubleshooting
Troubleshooting
In this chapter, you will find suggestions and assistance for a few common difficulties.
No WAN connection is established
After start-up the router automatically attempts to connect to the access provider. During
this process, the Online LED will blink green. If successful, the LED will switch over to
steady green. If, however, the connection can't be established, the Online LED will light up
red. The reason for this is usually one of the following:
Problems with the cabling?
Only the cable provided with your device should be used to connect to the WAN. This
cable must be connected to the Ethernet port of your broadband access device. The WAN
link LED must light green indicating the physical connection.
Has the correct transfer protocol been selected?
The transfer protocol is set along with the basic settings. The basic setup wizard will enter
the correct settings for numerous DSL providers automatically. Only if your DSL provider is
not listed, you will have to enter manually the protocol being used. In any case, the proto-
col that your DSL provider supplies you with should definitely work.
You can monitor and correct the protocol settings under:
DSL data transfer is slow
The data transfer rate of an broadband (Internet) DSL connection is dependent upon
numerous factors, most of which are outside of one's own sphere of influence. Important
factors aside from the bandwidth of one's own Internet connection are the Internet con-
nection and current load of the desired target. Numerous other factors involving the Inter-
net itself can also influence the transfer rate.
Configuration tool Run command
LANconfig Management Interfaces Interface settings WAN
Interface
WEBconfig Expert Configuration Setup Interfaces WAN
Interface
Troubleshooting 63
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Increasing the TCP/IP window size under Windows
If the actual transfer rate of a DSL connection is significantly below the fastest rate listed
by the provider, there are only a few possible causes (apart from the above-mentioned
external factors) which may involve one's own equipment.
One common problem occurs when large amounts of data are sent and received simulta-
neously with a Windows PC using an asynchronous connection. This can cause a severe
decrease in download speed. The cause of this problem is what is known as the TCP/IP
receive window size of the Windows operating system that is set to a value too small for
asynchronous connections.
Instructions on how to increase the Windows size can be found in the Knowledge Base of
the support section of the LANCOM web site (www.lancom.de
).
Unwanted connections under Windows XP
Windows XP computers attempt to compare their clocks with a timeserver on the Internet
at start-up. This is why when a Windows XP in the WLAN is started, a connection to the
Internet is established by the Business LAN R800+.
To resolve this issue, you can turn off the automatic time synchronization on the Windows
XP computers under Right mouse click on the time of day Properties Internet
time.
Cable testing
A cabling defect might have occurred, if no data is transmitted over LAN or WAN connec-
tion, although the configuration of the devices does not show any discernible errors.
You can test the cabling with the built-in cable tester of your Business LAN R800+.
Change under WEBconfig to menu item Expert configuration Status LAN sta-
tistics Cable test. Enter here the name of the interface to be tested (e.g. “DSL1” or
64 Troubleshooting
“LAN-1”). Pay attention to the correct spelling of the interfaces. Start the test for the speci-
fied interface by clicking on Execute.
Change then to menu item Expert configuration Status LAN statistics Cable
test results. The results of the cable test for the individual interfaces are show up in a list.
The following results can occur:
OK: Cable plugged in correctly, line ok.
open with distance “0m”: No cable plugged in or interruption within less than 10
meters distance.
open with indication of distance: Cable is plugged in, but defect (short-circuited) at the
indicated distance.
Impedance error: The pair of cables is not terminated with the correct impedance at
the other end.
Appendix 65
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Appendix
Performance data and specifications
Business LAN R800+
Connections Ethernet LAN 4 x RJ-45 Ethernet IEEE 802.3 (Switch), 10/100Base-T-
Autosensing, Node/Hub-Autodetection
LAN ports switchable to ethernet WAN ports (e.g. for
connection of SDSL modems) with load balancing for
WAN interfaces
WAN/ADSL ADSL over ISDN as per ITU G.992.1 Annex B, as well as
proprietary ADSL over ISDN (Texas Instruments, ADI, Alca-
tel), ETSI TS 101 388, ITU G.992.3 and ITU G.992.5
Annex B, ADSL 2+
ISDN ISDN S0 bus
Outband serial V.24/V.28 port (8 pol. mini DIN), in combination with
LANCOM modem adapter kit suited for connection of
external analogue or GSM modems
Power supply 12V over external power adapter
Housing 210 x 143 x 45 mm (W x H x D), rugged plastic case, con-
nectors on the rear side, stackable, provision for wall
mounting
Standards EU (CE certification: EN 55022, EN 55024, EN 60950)
Environment /
temperature
range
Temperature range 0°C to + 40°C at 80 % max. humidity
(non condensing)
Options LANCOM VoIP Basic Option
Accessories LANCOM Modem Adapter Kit for connecting modems
(analogue or GSM) to the serial configuration interface
LANCOM Advanced VPN Client, single license, 10 or
25 bulk
66 Appendix
Contact assignment
ADSL interface
6-pin RJ45 socket
ISDN-S
0
interface
8-pin RJ45 socket, corresponding to ISO 8877, EN 60603-7
Ethernet interfaces 10/100Base-T
8-pin RJ45 socket, corresponding to ISO 8877, EN 60603-7
Connector Pin IAE
1–
2–
3a
4b
5–
6–
Connector Pin Line IAE
1––
2––
3T+2a
4R+1a
5R-1b
6T-2b
7––
8––
Connector Pin Line
1T+
2T-
3R+
4–
5–
6R-
7–
8–
Appendix 67
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Configuration interface (Outband)
8-pin mini-DIN socket
Disposal of old device
To dispose your Business LAN R800+ please take your device to a public
waste disposal authority. This symbol implies that the device must be dis-
posed separately from domestic waste. According to law for electronic
appliances holders must dispose their devices separately. Please help
protecting the environment and do not throw old devices into domestic
waste.
Declaration of conformity
The equipment referred to in these instructions conforms with the requi-
rements of the EU directive: 1995/7/EG - Directive on radio equipment
and telecommunications terminal equipment and mutual recognition of
conformitiy. Compliance with the above directive is confirmed by the CE marking affixed
to the equipment. The declaration of conformity can be viewed at:
Deutsche Telekom AG
T-Com Zentrale
CE-Management
Postfach 12 27
48542 Steinfurt
Germany
Connector Pin Line
1CTS
2RTS
3RxD
4RI
5TxD
6DSR
7DCD
8DTR
UGND
68 Index
Index
Numerics
10/100Base-TX
. . . . . . . . . . . . . . . . . . .25
3-DES
. . . . . . . . . . . . . . . . . . . . . . . .40, 47
A
ADSL
Connect
. . . . . . . . . . . . . . . . . .25
Connector cable
. . . . . . . . . . .20
Transmission rates . . . . . . . . . . 9
ADSL over ISDN . . . . . . . . . . . . . . . . . . . 65
AES
. . . . . . . . . . . . . . . . . . . . . . . . . .40, 47
Autosensing . . . . . . . . . . . . . . . . . . . . . .25
B
Basic configuration
. . . . . . . . . . . . . . . . 28
Blowfish
. . . . . . . . . . . . . . . . . . . . . .40, 47
C
Callback
. . . . . . . . . . . . . . . . . . . . . . . . . .14
Callback function
. . . . . . . . . .19, 40, 47
Calling Line Identity (CLI) . . . . . . . . . . .48
CAPI interface . . . . . . . . . . . . . . . . . . . . .53
CAST
. . . . . . . . . . . . . . . . . . . . . . . .40, 47
charge lock . . . . . . . . . . . . . . . . . . . . . . .22
Common ISDN Application
Programming Interface (CAPI)
. . . . . .53
Configuration access . . . . . . . . . .31, 34
Configuration file . . . . . . . . . . . . . . . . . .60
Configuration interface
. . . . . . . . . . . . . 19
Connector cable . . . . . . . . . . . 20
Configuration password
. . . . . . . . . . . . 59
Configuration port
. . . . . . . . . . . . . . . . . 25
Configuration protection . . . . . . .19, 30
Connect charge protection
.30, 31, 35
Contact assignment
. . . . . . . . . . . . . . . 66
ADSL interface . . . . . . . . . . . .66
Configuration interface
. . . . . 67
Ethernet interface
. . . . . . . . .66
Ethernet WAN interface
. . . . 66
ISDN-S
0
interface . . . . . . . . . . 66
LAN interface
. . . . . . . . . . . . . 66
Outband . . . . . . . . . . . . . . . . . .67
WAN interface . . . . . . . . . . . . . 66
D
Data frequencies . . . . . . . . . . . . . . . . . . . 9
Default gateway
. . . . . . . . . . . . . . . . . . . 35
Denial-of-Service Protecion . . . . . . . . . 12
DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
DHCP server
18, 29, 31, 34, 36
Dial-up access . . . . . . . . . . . . . . . . . . . . 47
Dial-up adapter . . . . . . . . . . . . . . . . . . . . 51
Disposal of old device
. . . . . . . . . . . . . . 67
DNS
access to the remote LAN . . 43
DNS server
. . . . . . . . . . . 18, 35
Documentation . . . . . . . . . . . . . . . . . . . . 20
Domain . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Download
. . . . . . . . . . . . . . . . . . . . . . . . . 9
downstream . . . . . . . . . . . . . . . . . . . . . . . 9
DSL
data transfer is too slow
. . . . 62
provider . . . . . . . . . . . . . . 31, 35
transfer protocol
. . . . . . . . . . . 35
DSL transfer protocol . . . . . . . . . . . . . . 31
E
Encryption
. . . . . . . . . . . . . . . . . . . .40, 47
F
Fax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Filter mechanisms
. . . . . . . . . . . . . . . . . 14
Firewall
. . . . . . . . . . . . . . .11, 12, 19, 60
Firewall filter
. . . . . . . . . . . . . . . . . . . . . . 58
FirmSafe . . . . . . . . . . . . . . . . . . . . . . . . . 19
Flat rate
. . . . . . . . . . . . . . . . . . . . . . . . . . 38
H
Hardware installation
. . . . . . . . . . . . . . 25
I
ICMP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Installation
. . . . . . . . . . . . . . . . . . . . . . . . 20
ADSL
. . . . . . . . . . . . . . . . . . . . 25
configuration port
. . . . . . . . . 26
ISDN
. . . . . . . . . . . . . . . . . . . . . 25
LAN
. . . . . . . . . . . . . . . . . . . . . . 25
LANtools . . . . . . . . . . . . . . . . . 26
power adapter . . . . . . . . . . . . 26
Index 69
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
Interconnection . . . . . . . . . . . . . . . . . . . 40
Security aspects . . . . . . . . . . .40
Internet access . . . . . . . . . . . .13, 18, 37
Authentication data
. . . . . . . .37
Default gateway . . . . . . . . . . . 38
DNS server . . . . . . . . . . . . . . . 38
Flat rate
. . . . . . . . . . . . . . . . . .38
IP address . . . . . . . . . . . . . . . . 38
Netmask . . . . . . . . . . . . . . . . . . 38
Internet provider
. . . . . . . . . . . . . . . . . . .37
Intrusion Detection . . . . . . . . . . . . . . . . 12
IP
Filter
. . . . . . . . . . . . . . . . . . . . . 60
Lock ports . . . . . . . . . . . . . . . . 60
IP address . . . . . . . . . . . . . . . . . . . .29, 44
IP address of the LANCOM
. . . . . . . . .25
IP masquerading . . . . . 12, 14, 19, 60
IP router . . . . . . . . . . . . . . . . . . . . . . . . . . 18
IPoE
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
IPSec . . . . . . . . . . . . . . . . . . . . . . . .40, 47
IPX
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Binding . . . . . . . . . . . . . . .45, 50
External Network Number 44, 50
Frame type
. . . . . . . . . . . . . . . .44
Internal-Net-Number . . . . . . . 50
IPX conventions . . . . . . . . . . . . . . . . . . . 44
IPX router
. . . . . . . . . . . . . . . . . . . . . . . . .18
Settings . . . . . . . . . . . . . . . . . . 44
ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
caller ID
. . . . . . . . . . . . . .42, 48
Connect charge information 31
connection
. . . . . . . . . . . . . . . 26
Connector cable
. . . . . . . . . . .20
D channel . . . . . . . . . . . . . . . .48
data compression
. . . . . . . . . 38
Dial-in number
. . . . . . . . . . . . 38
dynamic channel bundling .38
MSN
. . . . . . . . . . . . . . . . . . . . .31
NTBA
. . . . . . . . . . . . . . . . . . . .26
password for connection
. . . 42
S
0
port . . . . . . . . . . . . . . . . . . . 25
ISDN modem
. . . . . . . . . . . . . . . . . . . . . 47
ISDN S
0
connection . . . . . . . . . . . . . . .18
L
LAN
Connector cable
. . . . . . . . . . .20
LAN to LAN coupling
. . . . . .14, 18, 40
Required information . . . . . . 40
LANCAPI . . . . . . . . . . . . . . . . . . . . . . . . . 18
LANconfig
. . . . . . . . . . . . . . . . . . . . 27, 30
run setup wizards . . . . . . . . . . 39
LANmonitor . . . . . . . . . . . . . . . . . . . . . . . 27
LANtools
System preconditions
. . . . . . 20
Line management . . . . . . . . . . . . . . . . . 14
M
MAC address filter . . . . . . . . . . . . . 12, 19
Minimum bandwidth . . . . . . . . . . . . . . . 12
MSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
N
NAT – see IP masquerading
NetBIOS . . . . . . . . . . . . . . . . . . . . . . . . . . 45
NetBIOS proxy
. . . . . . . . . . . . . . . . . . . . 18
Netmask . . . . . . . . . . . . . . . . . . . . . . . . . 29
Network segment . . . . . . . . . . . . .25, 44
P
Package contents . . . . . . . . . . . . . . . . . 20
Password . . . . . . . . . . . . .30, 31, 40, 47
PAT – see IP masquerading
PBX
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Phone line . . . . . . . . . . . . . . . . . . . . . . . . 26
Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Plain Ethernet
. . . . . . . . . . . . . . . . . . . . . 37
Plain IP . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
POTS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Power adapter
. . . . . . . . . . . . . . . .20, 25
PPP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
PPP client
. . . . . . . . . . . . . . . . . . . . . . . . 51
PPPoE
. . . . . . . . . . . . . . . . . . . . . . . . . . . 37
PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Preshared Key
Shared Secret
. . . . . . . . . . . . . 42
Q
Quality-of-Service
. . . . . . . . . . . . . . . . . . 12
R
Remote Access Service (RAS)
Configuring the dial-in computer
50
70 Index
Enable software compression 51
Function . . . . . . . . . . . . . . . . . .14
IPX . . . . . . . . . . . . . . . . . . . . . . .49
NetBIOS
. . . . . . . . . . . . . . . . . .50
Searching for Windows work-
groups . . . . . . . . . . . . . . . . . . .50
Security aspects
. . . . . . . . . . . 47
Server . . . . . . . . . . . . . . . . . . . .18
setup . . . . . . . . . . . . . . . . . . . . .47
TCP/IP
. . . . . . . . . . . . . . . . . . . 49
User name . . . . . . . . . . . . . . . . 48
Remote configuration . . . . . . . . . .31, 34
Remote configuration access
. . . . . . . 30
Remote configuration via ISDN . . . . . . 19
Reset connect charge protection. . . . 22
Reset switch
. . . . . . . . . . . . . . . . . . . . . .25
Resetting the configuration . . . . . . . . . 25
Restarting the device . . . . . . . . . . . . . . 25
Router
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Router function . . . . . . . . . . . . . . . . . . . . . 9
S
Searching for Windows workgroups .45
Security
Firewall wizard . . . . . . . . . . . .58
Security settings wizard
. . . . 57
Security checklist . . . . . . . . . . . . . . . . . .59
Security features . . . . . . . . . . . . . . . . . .14
Security settings
. . . . . . . . . . . . . . . . . . . 62
Setting up access to the Internet
. . . . 37
SIP PBX
. . . . . . . . . . . . . . . . . . . . . . . . . . 17
SIP provider
. . . . . . . . . . . . . . . . . . . . . . .15
SNMP
Protection of the configuration
59
Software installation
. . . . . . . . . . . . . . . 26
SSID
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Stateful Inspection
. . . . . . . . . . . . . . . . .12
Stateful Inspection Firewall . . . . . . . . .58
Status displays
. . . . . . . . . . . . . . . . . . . .21
ADSL data
. . . . . . . . . . . . . . . .23
ADSL link
. . . . . . . . . . . . . . . . . 23
ISDN channel
. . . . . . . . . . . . . 24
ISDN status
. . . . . . . . . . . . . . .23
LAN . . . . . . . . . . . . . . . . . . . . . .24
Online . . . . . . . . . . . . . . . . . . . . 23
Power
. . . . . . . . . . . . . . . . . . . .22
VPN
. . . . . . . . . . . . . . . . . . . . . . 24
Statusanzeigen
Power . . . . . . . . . . . . . . . . . . . . 21
Switch
. . . . . . . . . . . . . . . . . . . . . . . . . . . 25
System preconditions . . . . . . . . . . . . . . 20
T
TCP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
TCP/IP
. . . . . . . . . . . . . . . . . . . . . . .20, 51
check connection . . . . . . . . . 46
Settings . . . . . . . . . .28, 31, 34
Settings to PCs in the LAN
. . 35
Windows size . . . . . . . . . . . . . 63
TCP/IP configuration
Automatic
. . . . . . . . . . . . . . . . 34
fully automatic . . . . . . . .28, 29
manual . . . . . . . . . . . . . . . 28, 29
TCP/IP filter
. . . . . . . . . . . . . .11, 19, 60
TCP/IP router
Settings
. . . . . . . . . . . . . . . . . . 43
Telephone . . . . . . . . . . . . . . . . . . . . . . . . . 9
Telephone answering device . . . . . . . . 9
Transfer protocol
. . . . . . . . . . . . . . . . . . 62
U
UDP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Upload . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
upstream
. . . . . . . . . . . . . . . . . . . . . . . . . . 9
V
Virtual Private Network (VPN)
. . . 14, 18
Voice communication
. . . . . . . . . . . . . . 14
Voice frequencies
. . . . . . . . . . . . . . . . . . 9
Voice over IP . . . . . . . . . . . . . . . . . . . . . . 14
VoIP
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Connecting subsidiaries or home
offices
. . . . . . . . . . . . . . . . . . . . 16
Peer-to-peer
. . . . . . . . . . . . . . 17
Supplementing the ISDN PBX
15
VoIP PBX
. . . . . . . . . . . . . . . . . . . . . . . . . 17
VoIP softphone
. . . . . . . . . . . . . . . . . . . . 15
Voltage switch
. . . . . . . . . . . . . . . . . . . . 25
VPN client
. . . . . . . . . . . . . . . . . . . . . . . . 51
W
WAN connection
problems establishing the con-
Index 71
IntroductionInstallationConfigurationInternet AccessLinking NetworksRemote AccessSending FaxesSecurity
nection . . . . . . . . . . . . . . . . . . .62
WEBconfig . . . . . . . . . . . . . . . . . . . . . . . .32
password . . . . . . . . . . . . . . . . .35
Starting the wizards
. . . . . . . .33
System preconditions . . . . . . 20
Wide Area Network (WAN) . . . . . . . . . . 13
3

Hulp nodig? Stel uw vraag in het forum

Spelregels

Misbruik melden

Gebruikershandleiding.com neemt misbruik van zijn services uitermate serieus. U kunt hieronder aangeven waarom deze vraag ongepast is. Wij controleren de vraag en zonodig wordt deze verwijderd.

Product:

Bijvoorbeeld antisemitische inhoud, racistische inhoud, of materiaal dat gewelddadige fysieke handelingen tot gevolg kan hebben.

Bijvoorbeeld een creditcardnummer, een persoonlijk identificatienummer, of een geheim adres. E-mailadressen en volledige namen worden niet als privégegevens beschouwd.

Spelregels forum

Om tot zinvolle vragen te komen hanteren wij de volgende spelregels:

Belangrijk! Als er een antwoord wordt gegeven op uw vraag, dan is het voor de gever van het antwoord nuttig om te weten als u er wel (of niet) mee geholpen bent! Wij vragen u dus ook te reageren op een antwoord.

Belangrijk! Antwoorden worden ook per e-mail naar abonnees gestuurd. Laat uw emailadres achter op deze site, zodat u op de hoogte blijft. U krijgt dan ook andere vragen en antwoorden te zien.

Abonneren

Abonneer u voor het ontvangen van emails voor uw Lancom Business LAN R800 plus bij:


U ontvangt een email met instructies om u voor één of beide opties in te schrijven.


Ontvang uw handleiding per email

Vul uw emailadres in en ontvang de handleiding van Lancom Business LAN R800 plus in de taal/talen: Engels als bijlage per email.

De handleiding is 1,4 mb groot.

 

U ontvangt de handleiding per email binnen enkele minuten. Als u geen email heeft ontvangen, dan heeft u waarschijnlijk een verkeerd emailadres ingevuld of is uw mailbox te vol. Daarnaast kan het zijn dat uw internetprovider een maximum heeft aan de grootte per email. Omdat hier een handleiding wordt meegestuurd, kan het voorkomen dat de email groter is dan toegestaan bij uw provider.

Stel vragen via chat aan uw handleiding

Stel uw vraag over deze PDF

Andere handleiding(en) van Lancom Business LAN R800 plus

Lancom Business LAN R800 plus Gebruiksaanwijzing - Deutsch - 74 pagina's


Uw handleiding is per email verstuurd. Controleer uw email

Als u niet binnen een kwartier uw email met handleiding ontvangen heeft, kan het zijn dat u een verkeerd emailadres heeft ingevuld of dat uw emailprovider een maximum grootte per email heeft ingesteld die kleiner is dan de grootte van de handleiding.

Er is een email naar u verstuurd om uw inschrijving definitief te maken.

Controleer uw email en volg de aanwijzingen op om uw inschrijving definitief te maken

U heeft geen emailadres opgegeven

Als u de handleiding per email wilt ontvangen, vul dan een geldig emailadres in.

Uw vraag is op deze pagina toegevoegd

Wilt u een email ontvangen bij een antwoord en/of nieuwe vragen? Vul dan hier uw emailadres in.



Info