DrayTek UG Vigor3910 V1.0 01
DrayTek UG Vigor3910 V1.0 01
DrayTek UG Vigor3910 V1.0 01
User’s Guide
Version: 1.0
Firmware Version: V3.9.1.2
(For future update, please visit DrayTek web site)
Date: December 18, 2019
ii
Vigor3910 Series User’s Guide
Copyrights
© All rights reserved. This publication contains information that is protected by copyright. No part may be
reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without
written permission from the copyright holders.
Trademarks
The following trademarks are used in this document:
Microsoft is a registered trademark of Microsoft Corp.
Windows, Windows 95, 98, Me, NT, 2000, XP, Vista, 7, 10 and Explorer are trademarks of Microsoft Corp.
Apple and Mac OS are registered trademarks of Apple Inc.
Other products may be trademarks or registered trademarks of their respective manufacturers.
Safety Instructions
Read the installation guide thoroughly before you set up the router.
The router is a complicated electronic unit that may be repaired only be authorized and qualified personnel.
Do not try to open or repair the router yourself.
Do not place the router in a damp or humid place, e.g. a bathroom.
The router should be used in a sheltered area, within a temperature range of +5 to +40 Celsius.
Do not expose the router to direct sunlight or other heat sources. The housing and electronic components
may be damaged by direct sunlight or heat sources.
Do not deploy the cable for LAN connection outdoor to prevent electronic shock hazards.
Keep the package out of reach of children.
When you want to dispose of the router, please follow local regulations on conservation of the environment.
Warranty
We warrant to the original end user (purchaser) that the router will be free from any defects in workmanship
or materials for a period of two (2) years from the date of purchase from the dealer. Please keep your
purchase receipt in a safe place as it serves as proof of date of purchase. During the warranty period, and upon
proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials,
we will, at our discretion, repair or replace the defective products or components, without charge for either
parts or labor, to whatever extent we deem necessary tore-store the product to proper operating condition.
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and
will be offered solely at our discretion. This warranty will not apply if the product is modified, misused,
tampered with, damaged by an act of God, or subjected to abnormal working conditions. The warranty does
not cover the bundled or licensed software of other vendors. Defects which do not significantly affect the
usability of the product will not be covered by the warranty. We reserve the right to revise the manual and
online documentation and to make changes from time to time in the contents hereof without obligation to
notify any person of such revision or changes.
Be a Registered Owner
Web registration is preferred. You can register your Vigor router via http://www.DrayTek.com.
Firmware & Tools Updates
Due to the continuous evolution of DrayTek technology, all routers will be regularly upgraded. Please consult
the DrayTek web site for more information on newest firmware, tools and documents.
http://www.DrayTek.com
iv
Vigor3910 Series User’s Guide
II-3-1-2 Details Page for LAN1 – IPv6 Setup....................................................66
II-3-1-3 Details Page for IP Routed Subnet ....................................................71
II-3-1-4 DHCP Server Option .....................................................................72
II-3-2 VLAN ................................................................................................................................ 74
II-3-3 Bind IP to MAC ................................................................................................................. 76
II-3-4 PPPoE Server .................................................................................................................. 78
II-4 NAT ............................................................................................................................................ 79
Web User Interface .................................................................................................................... 80
II-4-1 Port Redirection................................................................................................................ 80
II-4-2 DMZ Host ......................................................................................................................... 84
II-4-3 Open Ports ....................................................................................................................... 87
II-4-4 Port Triggering.................................................................................................................. 89
II-4-5 ALG................................................................................................................................... 92
II-5 Applications ................................................................................................................................ 93
Web User Interface .................................................................................................................... 95
II-5-1 Dynamic DNS ................................................................................................................... 95
II-5-2 LAN DNS / DNS Forwarding .......................................................................................... 100
II-5-3 DNS Security .................................................................................................................. 103
II-5-3-1 General Setup .......................................................................... 103
II-5-3-2 Domain Diagnose ....................................................................... 104
II-5-4 Schedule......................................................................................................................... 105
II-5-5 RADIUS/TACACS+ ........................................................................................................ 108
II-5-5-1 External RADIUS ........................................................................ 108
II-5-5-2 Internal RADIUS ........................................................................ 110
II-5-5-3 External TACACS+...................................................................... 112
II-5-6 Active Directory/ LDAP ................................................................................................... 113
II-5-7 IGMP............................................................................................................................... 116
II-5-7-1 General Setting ........................................................................ 116
II-5-7-2 Working Group ......................................................................... 117
II-5-8 Wake on LAN ................................................................................................................. 118
II-5-9 SMS / Mail Alert Service................................................................................................. 119
II-5-10 Bonjour ......................................................................................................................... 121
II-5-11 High Availability ............................................................................................................ 124
II-5-11-1 General Setup ......................................................................... 124
II-5-11-2 Config Sync ............................................................................ 126
Application Notes ..................................................................................................................... 128
A-1 How to Implement the LDAP/AD Authentication for User Management? ......... 128
A-2 How to use DrayDDNS? ..................................................................... 130
II-6 Routing..................................................................................................................................... 135
Web User Interface .................................................................................................................. 136
II-6-1 Static Route .................................................................................................................... 136
II-6-2 Load-Balance /Route Policy ........................................................................................... 140
II-6-2-1 General Setup .......................................................................... 140
II-6-2-2 Diagnose for Route Policy ............................................................ 146
II-6-3 OSPF .............................................................................................................................. 148
vi
Vigor3910 Series User’s Guide
Application Notes ..................................................................................................................... 236
A-1 How to Configure Certain Computers Accessing to Internet ........................ 236
IV-2 CSM (Central Security Management)..................................................................................... 239
Web User Interface .................................................................................................................. 240
IV-2-1 APP Enforcement Profile .............................................................................................. 240
IV-2-2 URL Content Filter Profile ............................................................................................. 242
IV-2-3 Web Content Filter Profile ............................................................................................. 246
IV-2-4 DNS Filter Profile .......................................................................................................... 250
Application Notes ..................................................................................................................... 252
A-1 How to Create an Account for MyVigor ................................................. 252
A-2 How to Block Facebook Service Accessed by the Users via Web Content Filter / URL
Content Filter .................................................................................... 257
A-3 How to use APP Enforcement to block application like Facebook, YouTube or
TeamViewer? ..................................................................................... 262
Part VI Others.................................................................................................................379
VI-1 Objects Settings...................................................................................................................... 380
Web User Interface .................................................................................................................. 381
VI-1-1 IP Object ....................................................................................................................... 381
VI-1-2 IP Group........................................................................................................................ 385
VI-1-3 IPv6 Object.................................................................................................................... 386
VI-1-4 IPv6 Group .................................................................................................................... 388
VI-1-5 Service Type Object...................................................................................................... 389
VI-1-6 Service Type Group ...................................................................................................... 391
VI-1-7 Keyword Object............................................................................................................. 393
VI-1-8 Keyword Group ............................................................................................................. 395
VI-1-9 File Extension Object .................................................................................................... 396
VI-1-10 SMS/Mail Service Object ............................................................................................ 398
VI-1-11 Notification Object ....................................................................................................... 403
VI-1-12 String Object ............................................................................................................... 405
VI-1-13 Country Object ............................................................................................................ 406
Application Notes ..................................................................................................................... 408
A-1 How to Send a Notification to Specified Phone Number via SMS Service in WAN
Disconnection .................................................................................... 408
viii
Vigor3910 Series User’s Guide
VII-1-2 Routing Table............................................................................................................... 416
VII-1-3 ARP Cache Table ........................................................................................................ 417
VII-1-4 IPv6 Neighbour Table .................................................................................................. 418
VII-1-5 DHCP Table ................................................................................................................. 419
VII-1-6 NAT Sessions Table .................................................................................................... 420
VII-1-7 DNS Cache Table ........................................................................................................ 421
VII-1-8 Ping Diagnosis ............................................................................................................. 422
VII-1-9 Data Flow Monitor ........................................................................................................ 424
VII-1-10 Traffic Graph .............................................................................................................. 426
VII-1-11 Trace Route ............................................................................................................... 427
VII-1-13 Syslog Explorer .......................................................................................................... 428
VII-1-14 IPv6 TSPC Status ...................................................................................................... 429
VII-1-15 High Availability Status .............................................................................................. 430
VII-1-16 Authentication Information ......................................................................................... 432
VII-1-17 DoS Flood Table ........................................................................................................ 433
VII-1-18 Route Policy Diagnosis .............................................................................................. 434
VII-2 Checking If the Hardware Status Is OK or Not ...................................................................... 436
VII-3 Checking If the Network Connection Settings on Your Computer Is OK or Not.................... 437
VII-4 Pinging the Router from Your Computer ............................................................................... 440
VII-5 Checking If the ISP Settings are OK or Not........................................................................... 442
VII-6 Backing to Factory Default Setting If Necessary ................................................................... 443
VII-7 Contacting DrayTek ............................................................................................................... 444
Attach the brackets to the chassis of a rack. The second bracket attaches the other side of the
chassis.
After the bracket installation, the Vigor3910 Series chassis can be installed in a rack by using
four screws for each side of the rack.
Before using it, please follow the steps below to configure settings for connected computers
(or wireless clients).
1. Connect the printer with the router through USB/parallel port.
2. Open All Programs>>Getting Started>>Devices and Printers.
5. In this dialog, choose Create a new port. In the field of Type of port, use the drop down
list to select Standard TCP/IP Port. Then, click Next.
13. Edit the property of the new printer you have added by clicking Configure Port.
Info If you fail to access to the web configuration, please go to “Trouble Shooting” for
detecting and solving your problem.
Info The home page will be different slightly in accordance with the type of the
router you have.
5. The web page can be logged out according to the chosen condition. The default setting
is Auto Logout, which means the web configuration system will logout after 5 minutes
without any operation. Change the setting for your necessity.
Please change the password for the original security of the router.
1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password.
2. Please type “admin/admin” as Username/Password for accessing into the web user
interface with admin mode.
3. Go to System Maintenance page and choose Administrator Password.
4. Enter the login password (the default is “admin”) on the field of Old Password. Type
New Password and Confirm Password. Then click OK to continue.
Info The maximum length of the password you can set is 23 characters.
5. Now, the password has been changed. Next time, use the new password to access the
Web user interface for this router.
Dashboard shows the connection status including System Information, IPv4 Internet Access,
IPv6 Internet Access, Interface (physical connection), Security and Quick Access.
Click Dashboard from the main menu on the left side of the main page.
A web page with default selections will be displayed on the screen. Refer to the following
figure:
For detailed information about the LED display, refer to I-1-1 LED Indicators and
Connectors.
Besides, LAN, IP Routed Subnet, WAN interfaces, VPN security settings such as Remote Dial-in
User and LAN to LAN also can be accessed on this page easily. Scroll down the page to find
them and move your mouse cursor on the item to open the configuration web page.
All of the hosts (including wireless clients) displayed with Host ID, IP Address and MAC address
indicates that the traffic would be transmitted through LAN port(s) and then the WAN port.
The purpose is to perform the traffic monitor of the host(s).
All the functions the router supports are listed with table clearly in this page. Users can click
the function link to access into the setting page of the function for detailed configuration.
Click the icon on the top of the main screen to display all the functions.
It is not necessary to use the telnet command via DOS prompt. The changes made by using
web console have the same effects as modified through web user interface. The
functions/settings modified under Web Console also can be reviewed on the web user
interface.
Click the Web Console icon on the top of the main screen to open the following screen.
There is one way to store current used settings quickly by clicking the Config Backup icon. It
allows you to backup current settings as a file. Such configuration file can be restored by
using System Maintenance>>Configuration Backup.
Simply click the icon on the top of the main screen.
Click this icon to open online user’s guide of Vigor router. This document offers detailed
information for the settings on web user interface.
I-5-7 Logout
Item Description
LAN Status Primary DNS-Displays the primary DNS server address for
WAN interface.
Secondary DNS -Displays the secondary DNS server address
for WAN interface.
IP Address-Displays the IP address of the LAN interface.
TX Packets-Displays the total transmitted packets at the
LAN interface.
RX Packets-Displays the total received packets at the LAN
interface.
WAN1 to WAN8 Status Enable – Yes in red means such interface is available but
not enabled. Yes in green means such interface is enabled.
Line – Displays the physical connection (VDSL, ADSL,
Ethernet, or USB) of this interface.
Name – Display the name of the router.
Item Description
LAN Status IP Address- Displays the IPv6 address of the LAN interface..
TX Packets-Displays the total transmitted packets at the LAN
interface.
RX Packets-Displays the total received packets at the LAN
interface.
TX Bytes - Displays the speed of transmitted octets at the
LAN interface.
RX Bytes - Displays the speed of received octets at the LAN
interface.
WAN1 to WAN8 IPv6 Status Enable – No in red means such interface is available but not
enabled. Yes in green means such interface is enabled. No in
red means such interface is not available.
Mode - Displays the type of WAN connection (e.g., TSPC).
Up Time - Displays the total uptime of the interface.
IP - Displays the IP address of the WAN interface.
Gateway IP - Displays the IP address of the default gateway.
Info The words in green mean that the WAN connection of that interface is ready for
accessing Internet; the words in red mean that the WAN connection of that interface
is not ready for accessing Internet.
You have finished the configuration of Quick Start Wizard and you can surf the Internet at any
time. Now it is the time to register your Vigor router to MyVigor website for getting more
service. Please follow the steps below to finish the router registration.
1 Please login the web configuration interface of Vigor router by typing “admin/admin” as
User Name / Password.
3 A Login page will be shown on the screen. Please type the account and password that
you created previously. And click Login.
4 The following page will be displayed after you logging in MyVigor. Type a nickname for
the router, then click Add.
5 When the following page appears, your router information has been added to the
database.
This page is used for configuring tranmission rate for LAN and WAN ports respectively.
Due to hardware restriction, the speed of P3 is the same as the speed of P4. So whenever P3 is
changed, P4 is changed too and vice versa.
Item Description
Port Display the physical ports on Vigor router.
Function P1 ~ P8 - These ports are switchable between WAN and LAN
ports.
Speed P1 ~ P2 - Available options include Auto, 10G and 1G.
P3 ~ P4 - Available options include Auto and 2.5G. Due to the
hardware limitation, the speed for P4 is the same as P3.
P5 ~ P12- Available options include Auto, 1G, 100M, and 10
M.
Item Description
Load Balance Mode This option is available for multiple-WAN for getting enough
bandwidth for each WAN port. If you know the practical
bandwidth for your WAN interface, please choose the setting
of According to Line Speed. Otherwise, please choose Auto
Weight to let the router reach the best load balance.
IP Based - The same source / destination IP pair will select
the same WAN interface as policy. It is the default setting.
Session Based- All of the WAN interfaces will be used (as
out-going WAN) for passing through new sessions to get
better transmission speed. Though good speed test result for
throughput might be reached; however, some web site may
not open smoothly, especially the site need authentication,
e.g., FTP.
If you have no strong demand about speed test result, keep
default settings as IP based.
Index (WAN1 ~WAN8) Click the WAN interface link under Index to access into the
To configure WAN interface settings, click the WAN# link to open the following page.
Item Description
Enable Choose Yes to invoke the settings for this WAN interface.
Choose No to disable the settings for this WAN interface.
Display Name Type the description for such WAN interface.
Physical Mode Display the physical mode of such WAN interface.
Physical Type You can change the physical type for WAN or choose Auto
Item Description
Index Display the WAN interface.
Display Name It shows the name of the WAN1 ~ WAN8 that entered in
general setup.
Physical Mode / Port It shows the physical connection for WAN(Ethernet) /port
number according to the real network connection.
Access Mode Use the drop down list to choose a proper access mode. The
details page of that mode will be popped up. If not, click
Details Page for accessing the page to configure the settings.
Details Page This button will open different web page (based on IPv4)
according to the access mode that you choose in WAN
interface.
Note that Details Page will be changed slightly based on
physical mode.
IPv6 This button will open different web page (based on Physical
Mode) to setup IPv6 Internet Access Mode for WAN interface.
If IPv6 service is active on this WAN interface, the color of
“IPv6” will become green.
DHCP Client Option This button allows you to configure DHCP client options.
DHCP packets can be processed by adding option number and
data information when such function is enabled and
configured.
Info If you choose to configure option 61 here, the detailed settings in WAN>>Interface
Access will be overwritten.
Item Description
Enable/Disable Click Enable for activating this function. If you click Disable,
this function will be closed and all the settings that you
adjusted in this page will be invalid.
ISP Access Setup Enter your allocated username, password and authentication
parameters according to the information provided by your
ISP.
Username – Type in the username provided by ISP in this
field.
The maximum length of the user name you can set is 63
characters.
Password – Type in the password provided by ISP in this field.
The maximum length of the password you can set is 62
characters.
More Options - It shows optional settings for configuration.
Service Name - Enter the description of the specific
network service.
PPPoE Pass-through The router offers PPPoE dial-up connection. Besides, you
After finishing all the settings here, please click OK to activate them.
Item Description
Enable / Disable Click Enable for activating this function. If you click Disable,
this function will be closed and all the settings that you
adjusted in this page will be invalid.
IP Network Settings This group allows you to obtain an IP address automatically
and allows you type in IP address manually.
Obtain an IP address automatically – Click this button to
obtain the IP address automatically if you want to use
Dynamic IP mode.
More Options - It shows optional settings for configuration.
Router Name: Type in the router name provided by ISP.
Domain Name: Type in the domain name that you have
assigned.
Enable DHCP Client Identifier: Check the box to
specify username and password as the DHCP client
identifier for some ISP.
- Username: Type a name as username. The maximum
length of the user name you can set is 63 characters.
- Password: Type a password. The maximum length of
the password you can set is 62 characters.
After finishing all the settings here, please click OK to activate them.
Item Description
WAN Connection Such function allows you to verify whether network
Detection connection is alive or not through Ping Detect.
Mode – Choose Always On or Ping Detect for the system to
execute for WAN detection. Always On means no detection
will be executed. The network connection will be on always.
Ping IP/Hostname – If you choose Ping Detect as
detection mode, you have to type IP address in this field
for pinging.
Below shows an example for successful IPv6 connection based on PPP mode.
Info At present, the IPv6 prefix can be acquired via the PPPoE mode connection which is
available for the areas such as Taiwan (hinet), the Netherlands, Australia and UK.
Item Description
Username Type the name obtained from the broker. It is suggested for
you to apply another username and password for
http://gogonet.gogo6.com/page/freenet6-account.
The maximum length of the name you can set is 63
characters.
Password Type the password assigned with the user name.
The maximum length of the name you can set is 19
characters.
Tunnel Broker Type the address for the tunnel broker IP, FQDN or an
optional port number.
WAN Connection Such function allows you to verify whether network
Detection connection is alive or not through Ping Detect.
Mode – Choose Always On or Ping Detect for the system to
execute for WAN detection. Always On means no detection
will be executed. The network connection will be on always.
Ping IP/Hostname – If you choose Ping Detect as
detection mode, you have to type IP address in this field
for pinging.
TTL (Time to Live) –If you choose Ping Detect as
detection mode, you have to type TTL value.
Item Description
Always On Check this box to keep the network connection always.
Username Type the name obtained from the broker. Please apply new
account at http://www.sixxs.net/. It is suggested for you to
apply another username and password.
The maximum length of the name you can set is 19
characters.
Password Type the password assigned with the user name.
The maximum length of the password you can set is 19
characters.
Tunnel Broker It means a server of AICCU. The server can provide IPv6
tunnels to sites or end users over IPv4.
Type the address for the tunnel broker IP, FQDN or an
optional port number.
Tunnel ID One user account may have several tunnels. And, each
tunnel shall have one specified tunnel ID (e.g., T115394).
Type the ID offered by Tunnel Broker.
Subnet Prefix Type the subnet prefix address obtained from service
provider.
The maximum length of the prefix you can set is 128
characters.
Item Description
IAID Type a number as IAID.
WAN Connection Such function allows you to verify whether network
Detection connection is alive or not through NS Detect or Ping Detect.
Mode – Choose Always On, Ping Detect or NS Detect for the
system to execute for WAN detection. With NS Detect mode,
the system will check if network connection is established or
not, like IPv4 ARP Detect. Always On means no detection
will be executed. The network connection will be on always.
Ping IP/Hostname – If you choose Ping Detect as
detection mode, you have to type IP address in this field
for pinging.
TTL (Time to Live) –If you choose Ping Detect as
detection mode, you have to type TTL value.
RIPng Protocol RIPng (RIP next generation) offers the same functions and
benefits as IPv4 RIP v2.
Bridge Mode Enable Bridge Mode - If the function is enabled, the router
will work as a bridge modem.
Enable Firewall – It is available when Bridge Mode is
enabled. When both Bridge Mode and Firewall check boxes
are enabled, the settings configured (user profiles) under
User Management will be ignored. And all of the filter rules
defined and enabled in Firewall menu will be activated.
Bridge Subnet – Make a bridge between the selected LAN
subnet and such WAN interface.
Item Description
Static IPv6 Address IPv6 Address – Type the IPv6 Static IP Address.
configuration Prefix Length – Type the fixed value for prefix length.
Add – Click it to add a new entry.
Update - Click it to modify an existed entry.
Delete – Click it to remove an existed entry.
Current IPv6 Address Display current interface IPv6 address.
Table
Static IPv6 Gateway IPv6 Gateway Address - Type your IPv6 gateway address
Configuration here.
WAN Connection Such function allows you to verify whether network
Detection connection is alive or not through Ping Detect.
Mode – Choose Always On, NS Detect or Ping Detect for the
II-2-2-9 Details Page for IPv6 – 6in4 Static Tunnel in Ethernet WAN
This type allows you to setup 6in4 Static Tunnel for WAN interface.
Such mode allows the router to access IPv6 network through IPv4 network.
However, 6in4 offers a prefix outside of 2002::0/16. So, you can use a fixed endpoint rather
than anycast endpoint. The mode has more reliability.
Item Description
Item Description
6rd Mode Auto 6rd – Retrieve 6rd prefix automatically from 6rd service
provider. The IPv4 WAN must be set as "DHCP".
Static 6rd - Set 6rd options manually.
IPv4 Border Relay Type the IPv4 addresses of the 6rd Border Relay for a given
6rd domain.
IPv4 Mask Length Type a number of high-order bits that are identical across all
CE IPv4 addresses within a given 6rd domain.
It may be any value between 0 and 32.
6rd Prefix Type the 6rd IPv6 address.
6rd Prefix Length Type the IPv6 prefix length for the 6rd IPv6 prefix in number
of bits.
WAN Connection Such function allows you to verify whether network
Detection connection is alive or not through Ping Detect.
Mode – Choose Always On or Ping Detect for the system to
execute for WAN detection. Always On means no detection
will be executed. The network connection will be on always.
Ping IP/Hostname – If you choose Ping Detect as
detection mode, you have to type IP address in this field
for pinging.
TTL (Time to Live) –If you choose Ping Detect as
detection mode, you have to type TTL value.
General
The system allows you to set up to eight channels used as multi-VLAN.
Item Description
Channel Display the number of each channel.
Channels 1~8 are used by the Internet Access web user
interface and can not be configured here.
Channels 13 ~ 52 are configurable.
Enable Display whether the settings in this channel are enabled
(checked) or not (unchecked).
WAN Type Displays the physical medium that the channel will use.
VLAN Tag Displays the VLAN tag value that will be used for the packets
traveling on this channel.
Item Description
Enable Channel 13~52 Enable – Click it to enable the configuration of this channel.
Disable –Click it to disable the configuration of this channel.
WAN Type The connections and interfaces created in every channel may
select a specific WAN type to be built upon. In the
Multi-VLAN application, only the Ethernet WAN type is
available. The user will be able to select the physical WAN
interface the channel shall use here.
General Settings VLAN Tag – Type the value as the VLAN ID number. Valid
settings are in the range from 1 to 4095. The network traffic
flowing on each channel will be identified by the system via
their VLAN Tags. Channels using the same WAN type may not
configure the same VLAN tag value.
Priority – Choose the number to determine the packet
priority for such VLAN. The range is from 0 to 7.
Open WAN Interface for Check the box to enable relating function.
this Channel WAN Application –
Management – It can be specified for general
management (Web configuration/telnet/TR-069). If
you choose Management, the configuration for this
After finished the above settings, click OK to save the settings and return to previous page.
Local Area Network (LAN) is a group of subnets regulated and ruled by router. The design of
network structure is related to what type of public IP addresses coming from your ISP.
The most generic function of Vigor router is NAT. It creates a private subnet of your own. As
mentioned previously, the router will talk to other public hosts on the Internet by using public
IP address and talking to local hosts by using its private IP address. What NAT does is to
translate the packets from public IP address to private IP address to forward the right packets
to the right host and vice versa. Besides, Vigor router has a built-in DHCP server that assigns
private IP address to each local host. See the following diagram for a briefly understanding.
In some special case, you may have a public IP subnet from your ISP such as 220.135.240.0/24.
This means that you can set up a public subnet or call second subnet that each host is
equipped with a public IP address. As a part of the public subnet, the Vigor router will serve
for IP routing to help hosts in the public subnet to communicate with other public hosts or
servers outside. Therefore, the router should be set as the gateway for public hosts.
Item Description
General Setup Allow to configure settings for each subnet respectively.
Index - Display all of the LAN items.
Enable - Basically, LAN1 status is enabled in default.
LAN2 –LAN50 and IP Routed Subnet can be configured after
enabling via LAN>>VLAN.
DHCP- LAN1 is configured with DHCP in default. If required,
please check the DHCP box for each LAN.
IP Address - Display the IP address for each LAN item. Such
information is set in default and you can not modify it.
Details Page - Click it to access into the setting page. Each
When you finish the configuration, please click OK to save and exit this page.
Info To configure a subnet, select its Detials Page button to bring up the LAN
Details Page.
II-3-1-1 Details Page for LAN1 – Ethernet TCP/IP and DHCP Setup
There are two configuration pages for LAN1, Ethernet TCP/IP and DHCP Setup (based on IPv4)
and IPv6 Setup. Click the tab for each type and refer to the following explanations for
detailed information.
Item Description
Network Configuration For NAT Usage,
When you finish the configuration, please click OK to save and exit this page.
Private IP addresses can be assigned automatically to LAN clients using Dynamic Host
Configuration Protocol (DHCP), or manually assigned. The DHCP server can either be the
Item Description
Enable IPv6 Check the box to enable the configuration of LAN 1 IPv6
Setup.
WAN Primary Interface Use the drop down list to specify a WAN interface for IPv6.
Static IPv6 Address IPv6 Address –Type static IPv6 address for LAN.
Prefix Length – Type the fixed value for prefix length.
Add – Click it to add a new entry.
Delete – Click it to remove an existed entry.
Unique Local Address Unique Local Addresses (ULAs) are private IPv6 addresses
(ULA) configuration assigned to LAN clients.
Off - ULA is disabled.
Manually ULA Prefix - LAN clients will be assigned ULAs
generated based on the prefix manually entered.
Auto ULA Prefix - LAN clients will be assigned ULAs using an
automatically-determined prefix.
DNS Server IPv6 Address Primary DNS Sever – Type the IPv6 address for Primary DNS
server.
Secondary DNS Server –Type another IPv6 address for DNS
server if required.
Management Configures the Managed Address Configuration flag (M-bit) in
Route Advertisements.
Off - No configuration information is sent using Route
Advertisements.
SLAAC(stateless) - M-bit is unset.
DHCPv6(stateful) - M-bit is set, which indicates to LAN
clients that they should acquire all IPv6 configuration
information from a DHCPv6 server. The DHCPv6 server
can either be the one built into the Vigor2860, or a
separate DHCPv6 server.
Other Option(O-bit) When selected, the Other Configuration flag is set, which
indicates to LAN clients that IPv6 configuration information
besides LAN IPv6 addresses is available from a DHCPv6
server.
Setting the M-bit (see Management above) has the same
effect as implicitly setting the O-bit, as DHCPv6 supplies all
IPv6 configuration information, including what is indicated as
available when the O-bit is set.
DHCPv6 Server Enable Server –Click it to enable DHCPv6 server. DHCPv6
Advance setting The Advanced Settings page has additional settings for
Router Advertisement and enabling multiple WANs for IPv6
traffic.
After making changes on the Advance setting page, click the OK button to retain the changes
and return to the LAN IPv6 Setup page. Be sure to click OK on the LAN IPv6 Setup page or else
changes made on the Advance setting page will not be saved.
Item Description
Network Configuration Enable/Disable - Click Enable to enable such configuration;
click Disable to disable such configuration.
For Routing Usage,
IP Address - This is the IP address of the router. (Default:
192.168.1.1).
Subnet Mask - The subnet mask, together with the IP Address
field, indicates the maximum number of clients allowed on
the subnet. (Default: 255.255.255.0/ 24).
RIP Protocol Control,
Enable – When Enabled, the router will attempt to exchange
routing information with neighbouring routers using the
Routing Information Protocol.
DHCP Server DHCP stands for Dynamic Host Configuration Protocol. The
Configuration router by factory default acts a DHCP server for your network
so it automatically dispatch related IP settings to any local
user configured as a DHCP client. It is highly recommended
that you leave the router enabled as a DHCP server if you do
not have a DHCP server for your network.
If you want to use another DHCP server in the network other
than the Vigor Router’s, you can let Relay Agent help you to
redirect the DHCP request to the specified location.
Start IP Address - Enter a value of the IP address pool for the
DHCP server to start with when issuing IP addresses. If the
1st IP address of your router is 192.168.1.1, the starting IP
address must be 192.168.1.2 or greater, but smaller than
192.168.1.254.
IP Pool Counts - Enter the maximum number of PCs that you
When you finish the configuration, please click OK to save and exit this page.
Item Description
Customized List Shows all the DHCP options that have been configured in the
Tagged VLAN
The tagged VLANs (802.1q) can mark data with a VLAN identifier. This identifier can be
carried through an onward Ethernet switch to specific ports. The specific VLAN clients can
also pick up this identifier as it is just passed to the LAN. You can set the priorities for
LAN-side QoS. You can assign each of VLANs to each of the different IP subnets that the router
may also be operating, to provide even more isolation. The said functionality is tag-based
multi-subnet.
Info Settings in this page only applied to LAN port but not WAN port.
Item Description
Enable Click it to enable VLAN configuration.
LAN Port Check the boxes to group them under the selected VLAN.
VLAN Tag Enable – Check the box to enable the function of VLAN with
tag.
The router will add specific VLAN number to all packets on
the LAN while sending them out.
Please type the tag value and specify the priority for the
packets sending by LAN.
VID – Type the value as the VLAN ID number. The range is
form 0 to 4095. VIDs must be unique.
Priority – Valid values are from 0 to 7, where 1 has the
lowest priority, followed by 0, and finally from 2 to 7 in
increasing order of priority.
Permit untagged device in Select to allow untagged hosts connected to LAN port P12 to
P12 to access router access the router. In case you have incorrectly configured
VLAN functionality, you will still be able to access the router
via the Web UI, and telnet and SSH shells to adjust the
configuration.
The Vigor router supports up to 50 VLANs. Within the grid of VLANs (vertical columns) and LAN
interfaces (horizontal rows), all hosts within the same VLAN (horizontal row) are visible to
one another.
Inter-LAN Routing allows different LAN subnets to be interconnected or isolated. It is only
available when the VLAN functionality is enabled. In the Inter-LAN Routing matrix, a selected
checkbox means that the 2 intersecting LANs can communicate with each other.
Item Description
Enable Click this radio button to invoke this function. However,
IP/MAC which is not listed in IP Bind List also can connect to
Internet.
Disable Click this radio button to disable this function. All the
settings on this page will be invalid.
Strict Bind Check the box to block the connection of the IP/MAC which is
ARP Table This table is the LAN ARP table of this router. The
information for IP and MAC will be displayed in this field.
Each pair of IP and MAC address listed in ARP table can be
selected and added to IP Bind List by clicking Add below.
Select All Select all entries in the ARP Table for manipulation.
Sort Reorder the entry based on the IP address.
Refresh Refresh the ARP table listed below to obtain the newest ARP
table information.
Add / Update to IP Bind IP Address – Type the IP address to be associated with a
List MAC address.
Mac Address – Type the MAC address of the LAN client’s
network interface.
Comment – Type a brief description for the entry.
Add It allows you to add the one you choose from the ARP table or
the IP/MAC address typed in Add and Edit to the table of IP
Bind List.
Update It allows you to edit and modify the selected IP address and
MAC address that you create before.
Delete You can remove any item listed in IP Bind List. Simply click
and select the one, and click Delete. The selected item will
be removed from the IP Bind List.
IP Bind List It displays a list for the IP bind to MAC information.
Backup IP Bind List Click Backup and enter a filename to back up IP Bind List to a
file.
Info Before you select Strict Bind, you have to bind one set of IP/MAC address for
one PC. If not, no one of the PCs can access into Internet. And the web user
interface of the router might not be accessed.
Usually, the router serves as an NAT (Network Address Translation) router. NAT is a
mechanism that one or more private IP addresses can be mapped into a single public one.
Public IP address is usually assigned by your ISP, for which you may get charged. Private IP
addresses are recognized only among internal hosts.
When the outgoing packets destined to some public server on the Internet reach the NAT
router, the router will change its source address into the public IP address of the router,
select the available public port, and then forward it. At the same time, the router shall list an
entry in a table to memorize this address/port-mapping relationship. When the public server
response, the incoming traffic, of course, is destined to the router’s public IP address and the
router will do the inversion based on its table. Therefore, the internal host can communicate
with external host smoothly.
The benefit of the NAT includes:
Save cost on applying public IP address and apply efficient usage of IP address. NAT
allows the internal IP addresses of local hosts to be translated into one public IP address,
thus you can have only one IP address on behalf of the entire internal hosts.
Enhance security of the internal network by obscuring the IP address. There are
many attacks aiming victims based on the IP address. Since the attacker cannot be
aware of any private IP addresses, the NAT function can protect the internal network.
Info On NAT page, you will see the private IP address defined in RFC-1918.
Usually we use the 192.168.1.0/24 subnet for the router. As stated before,
the NAT facility can map one or more IP addresses and/or service ports into
different specified services. In other words, the NAT function can be
achieved by using port mapping methods.
Item Description
Index Display the number of the profile.
Enable Check the box to enable the port redirection profile.
Service Name Display the description of the specific network service.
WAN Interface Display the WAN IP address used by the profile.
Protocol Display the transport layer protocol (TCP or UDP).
Public Port Display the port number which will be redirected to the
specified Private IP and Port of the internal host.
Source IP Display the IP object of the source IP.
Private IP Display the IP address of the internal host providing the
service.
Press any number under Index to access into next page for configuring port redirection.
Item Description
Enable Check this box to enable such port redirection setting.
Mode Two options (Single and Range) are provided here for you to
choose. To set a range for the specific service, select Range.
In Range mode, if the public port (start port and end port)
and the starting IP of private IP had been entered, the
system will calculate and display the ending IP of private IP
automatically.
Service Name Enter the description of the specific network service.
Protocol Select the transport layer protocol (TCP or UDP).
WAN Interface Select the WAN IP used for port redirection. There are eight
WAN IP alias that can be selected and used for port
redirection. The default setting is All which means all the
incoming data from any port will be redirected to specified
range of IP address and port.
Public Port Specify which port can be redirected to the specified Private
IP and Port of the internal host. If you choose Range as the
port redirection mode, you will see two boxes on this field.
Type the required number on the first box (as the starting
port) and the second box (as the ending port).
Source IP Use the drop down list to specify an IP object. Or click IP
Object link to create a new one for applying.
Private IP Specify the private IP address of the internal host providing
the service. If you choose Range as the port redirection
mode, you will see two boxes on this field. Type a complete
IP address in the first box (as the starting point). The second
one will be assigned automatically later.
Private Port Specify the private port number of the service offered by the
internal host.
After finishing all the settings here, please click OK to save the configuration.
Note that the router has its own built-in services (servers) such as Telnet, HTTP and FTP etc.
Since the common port numbers of these services (servers) are all the same, you may need to
reset the router in order to avoid confliction.
The security properties of NAT are somewhat bypassed if you set up DMZ host. We suggest
you to add additional filter rules or a secondary firewall.
Click DMZ Host to open the following page. You can set different DMZ host for each WAN
interface. Click the WAN tab to switch into the configuration page for that WAN.
Item Description
Choose Private IP or None first.
Private IP Enter the private IP address of the DMZ host, or click Choose
PC to select one.
Choose IP Click this button and then a window will automatically pop
up, as depicted below. The window consists of a list of private
IP addresses of all hosts in your LAN network. Select one
private IP address in the list to be the DMZ host.
When you have selected one private IP from the above dialog,
the IP address will be shown on the screen. Click OK to save
the setting.
DMZ Host for other WAN interface is slightly different with WAN1. Active True IP selection is
available for WAN1 only.
See the following figure.
If you previously have set up WAN Alias for PPPoE or Static or Dynamic IP mode in WAN2
interface, you will find them in Aux. WAN IP for your selection.
Item Description
Enable Check to enable the DMZ Host function.
Private IP Enter the private IP address of the DMZ host, or click Choose
PC to select one.
Choose IP Click this button and then a window will automatically pop
up, as depicted below. The window consists of a list of
private IP addresses of all hosts in your LAN network. Select
one private IP address in the list to be the DMZ host.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Index Indicate the relative number for the particular entry that you
want to offer service in a local host. You should click the
appropriate index number to edit or clear the corresponding
entry.
Enable Check the box to enable the open port profile.
Comment Specify the name for the defined network service.
WAN Interface Display the WAN interface used by such index.
Aux. WAN IP Display the IP alias setting used by such index. If no IP alias
setting exists, such field will not appear.
To add or edit port settings, click one index number on the page. The index entry setup page
will pop up. In each index entry, you can specify 10 port ranges for diverse services.
Item Description
Enable Open Ports Check to enable this entry.
Comment Make a name for the defined network application/service.
WAN Interface Specify the WAN interface that will be used for this entry.
WAN IP Specify the WAN IP address that will be used for this entry.
This setting is available when WAN IP Alias is configured.
Source IP Use the drop down list to specify an IP object. Or click IP
Object link to create a new one for applying.
Private IP Enter the private IP address of the local host or click Choose
PC to select one.
Choose IP - Click this button and, subsequently, a window
having a list of private IP addresses of local hosts will
automatically pop up. Select the appropriate IP address of
the local host in the list.
Protocol Specify the transport layer protocol. It could be TCP, UDP,
or ----- (none) for selection.
Start Port Specify the starting port number of the service offered by
the local host.
End Port Specify the ending port number of the service offered by the
local host.
Item Description
Index Indicate the relative number for the port triggering profile.
You should click the appropriate index number to edit or
clear the corresponding entry.
Enable Check the box to enable the Port Triggering profile.
Comment Display the text which memorizes the application of this
rule.
Triggering Protocol Display the protocol of the triggering packets.
Source IP Display the source IP address.
Triggering Port Display the port of the triggering packets.
Incoming Protocol Display the protocol for the incoming data of such triggering
profile.
Incoming Port Display the port for the incoming data of such triggering
profile.
Item Description
Enable Check to enable this entry.
Service Choose the predefined service to apply for such trigger
profile.
Comment Type the text to memorize the application of this rule.
Source IP Select any IP address, IP object or IP group as the source IP.
Triggering Protocol Select the protocol (TCP, UDP or TCP/UDP) for such
triggering profile.
Triggering Port Type the port or port range for such triggering profile.
Incoming Protocol When the triggering packets received, it is expected the
incoming packets will use the selected protocol. Select the
protocol (TCP, UDP or TCP/UDP) for the incoming data of
such triggering profile.
Incoming Port Type the port or port range for the incoming packets.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Enable ALG Check to enable such function.
Listen Port Type a port number for SIP or RTSP protocol.
TCP Check the box to make correspond protocol message packet
from TCP transmit and receive via NAT.
UDP Check the box to make correspond protocol message packet
from UDP transmit and receive via NAT.
Dynamic DNS
The ISP often provides you with a dynamic IP address when you connect to the Internet via
your ISP. It means that the public IP address assigned to your router changes each time you
access the Internet. The Dynamic DNS feature lets you assign a domain name to a dynamic
WAN IP address. It allows the router to update its online WAN IP address mappings on the
specified Dynamic DNS server. Once the router is online, you will be able to use the registered
domain name to access the router or internal virtual servers from the Internet. It is
particularly helpful if you host a web server, FTP server, or other server behind the router.
Before you use the Dynamic DNS feature, you have to apply for free DDNS service to the DDNS
service providers. The router provides up to three accounts from three different DDNS service
providers. Basically, Vigor routers are compatible with the DDNS services supplied by most
popular DDNS service providers such as www.dyndns.org, www.no-ip.com, www.dtdns.com,
www.changeip.com, www.dynamic- nameserver.com. You should visit their websites to
register your own domain name for the router.
Schedule
The Vigor router has a built-in clock which can update itself manually or automatically by
means of Network Time Protocols (NTP). As a result, you can not only schedule the router to
dialup to the Internet at a specified time, but also restrict Internet access to certain hours so
that users can connect to the Internet only during certain hours, say, business hours. The
schedule is also applicable to other functions.
RADIUS/TACACS+
Remote Authentication Dial-In User Service (RADIUS) is a security authentication
client/server protocol that supports authentication, authorization and accounting, which is
widely used by Internet service providers. It is the most common method of authenticating
and authorizing dial-up and tunneled network users.
The built-in RADIUS client feature enables the router to assist the remote dial-in user or a
wireless station and the RADIUS server in performing mutual authentication. It enables
centralized remote access authentication for network management.
Wake on LAN
A PC client on LAN can be woken up by the router it connects. When a user wants to wake up
a specified PC through the router, he/she must type correct MAC address of the specified PC
on this web page of Wake on LAN (WOL) of this router.
In addition, such PC must have installed a network card supporting WOL function. By the way,
WOL function must be set as “Enable” on the BIOS setting.
Item Description
Set to Factory Clear all profiles and recover to factory settings.
Default
Enable Dynamic DNS Check this box to enable DDNS function.
Setup
View Log Display DDNS log status.
Force Update Force the router updates its information to DDNS server.
3. Select Index number 1 to add an account for the router. Check Enable Dynamic DNS
Account, and choose correct Service Provider: dyndns.org, type the registered
hostname: hostname and domain name suffix: dyndns.org in the Domain Name block.
The following two blocks should be typed your account Login Name: test and Password:
test.
If User-Defined is specified as the service provider, the web page will be changed
slightly as follows:
Item Description
Enable Dynamic DNS Check this box to enable the current account. If you did
Account check the box, you will see a check mark appeared on the
Active column of the previous web page in step 2).
WAN Interface WANx First - While connecting, the router will use WANx as
the first channel for such account. If WANx fails, the router
will use another WAN interface instead.
WANx Only - While connecting, the router will use WANx as
the only channel for such account.
Service Provider Select the service provider for the DDNS account.
Service Type Select a service type (Dynamic, Custom or Static). If you
choose Custom, you can modify the domain that is chosen in
the Domain Name field.
Domain Name Type in one domain name that you applied previously. Use
the drop down list to choose the desired domain.
Login Name Type in the login name that you set for applying domain.
Password Type in the password that you set for applying domain.
Wildcard and The Wildcard and Backup MX (Mail Exchange) features are
Backup MX not supported for all Dynamic DNS providers. You could get
more detailed information from their websites.
Mail Extender If the mail server is defined with another name, please type
the name in this area. Such mail server will be used as
backup mail exchange.
Determine WAN IP If a Vigor router is installed behind any NAT router, you can
enable such function to locate the real WAN IP.
When the WAN IP used by Vigor router is private IP, this
function can detect the public IP used by the NAT router and
use the detected IP address for DDNS update.
4. Click OK button to activate the settings. You will see your setting has been saved.
DrayDDNS Settings
DrayDDNS, a new DDNS service developed by DrayTek, can record multiple WAN IP (IPv4) on
single domain name. It is convenient for users to use and easily to set up. Each Vigor Router is
available to register one domain name.
Choose DrayTek Global as the service provider, the web page will be displayed as follows:
Item Description
Enable Dynamic DNS Check this box to enable the current account. If you did check the
Account box, you will see a check mark appeared on the Active column of
the previous web page in step 2).
Service Provider Choose DrayTek Global as the service provider.
Status Display if the license is actvtaed or not.
Determine WAN IP If a Vigor router is installed behind any NAT router, you can enable
such function to locate the real WAN IP.
When the WAN IP used by Vigor router is private IP, this function
can detect the public IP used by the NAT router and use the
detected IP address for DDNS update.
There are two methods offered for you to choose:
WAN IP - If it is selected and the WAN IP of Vigor router is
private, DDNS update will take place right away.
Internet IP – If it is selected and the WAN IP of Vigor router is
private, it will be converted to public IP before DDNS update
takes place.
WAN Interfaces WANx - While connecting, the router will use WANx as the channel
for such account.
Item Description
Set to Factory Default Clear all profiles and recover to factory settings.
Index Click the number below Index to access into the setting
page.
Item Description
Enable Check this box to enable such profile.
Profile Type a name for such profile.
Note: If you type a name here for LAN DNS and click OK to
save the configuration, the name also will be applied to
conditional DNS forwarding automatically.
Domain Name Type the domain name for such profile.
CNAME (Alias Domain CNAME is abbreviation of Canonical name record.
Name) Such option is used to record the domain name or the host
alias.
Add – Click it to add a new host with specified reference.
Delete – Click it to remove the setting.
IP Address List The IP address listed here will be used for mapping with the
domain name specified above. In general, one domain name
Item Description
Enable Check this box to enable such profile.
Profile Type a name for such profile.
Note: If you type a name here for conditional DNS forwarding
and click OK to save the configuration, the name also will be
applied to LAN DNS automatically.
Domain Name Type the domain name for such profile.
DNS Server IP Address Type the IP address of the DNS server you want to use for DNS
forwarding.
Item Description
Interface There are four WAN interfaces allowed to be set with DNS
security enabled.
Enable Check the box to enable the DNS security management.
Primary DNS Display the IP address of primary DNS obtained from DHCP
server or specified by Static WAN.
Secondary DNS Display the IP address of secondary DNS obtained from DHCP
server or specified by Static WAN.
Bogus DNS Reply Sometime, Vigor router might encounter packets from bogus
DNS inquiry. There are two ways to reply such DNS inquiry.
Drop – Discard the packets.
Pass – Accept the packets and let them pass through Vigor
router.
Item Description
Domain Type the domain name or IP address (IPv4/IPv6) that you
want to query.
Interface Specify the interface required for executing diagnose.
DNS Server Type the IP address of the DNS Server which will diagnose the
domain specified above.
Diagnose Click it to perform the diagnosis for the domain.
Result The diagnosed information will be displayed on such field.
Item Description
Current System Time Display the time Vigor router used.
System time set Click it to acess into the time setup page (System
Maintenance>>Time and Date).
Set to Factory Default Clear all profiles and recover to factory settings.
Index Click the index number link to access into the setting page of
schedule.
Enable Click the box to enable such schedule profile.
You can set up to 15 schedules. Then you can apply them to your Internet Access or VPN and
Remote Access >> LAN-to-LAN settings.
To add a schedule:
1. Click any index, say Index No. 1.
2. The detailed settings of the call schedule with index 1 are shown below.
Item Description
Enable Schedule Check to enable the schedule.
Setup
Comment Type a short description for such schedule.
Start Date Specify the starting date of the schedule.
(yyyy-mm-dd)
Start Time (hh:mm) Specify the starting time of the schedule.
Duration Time Specify the duration (or period) for the schedule.
(hh:mm)
End Time (hh:mm) It will be calculated automatically when Start Time and
Duration Time are configured well.
Action Specify which action Call Schedule should apply during the
period of the schedule.
Force On -Force the connection to be always on.
Force Down -Force the connection to be always down.
Example
Suppose you want to control the PPPoE Internet access connection to be always on (Force On)
from 9:00 to 18:00 for whole week. Other time the Internet access connection should be
disconnected (Force Down).
Office
Hour:
(Force On)
1. Make sure the PPPoE connection and Time Setup is working properly.
2. Configure the PPPoE always on from 9:00 to 18:00 for whole week.
3. Configure the Force Down from 18:00 to next day 9:00 for whole week.
4. Assign these two profiles to the PPPoE Internet access profile. Now, the PPPoE Internet
connection will follow the schedule order to perform Force On or Force Down action
according to the time plan that has been pre-defined in the schedule profiles.
Item Description
RADIUS Server Status Log Display the record of current status of RADIUS server.
Enable Select to enable the profile.
Comment Displays the comment of the profile.
Primary Server Displays the IP address of the primary server.
Secondary Server Display the IP address of the secondary server.
Click any index number to open the following page. It is used to configure settings for
external RADIUS server. Then users of the Vigor router will be authenticated by this server for
the network application.
Item Description
Enable this profile Check to enable RADIUS client profile.
Comment - Enter a brief description for this profile.
Primary Server Primary Server - Enter the IP address of RADIUS server.
Authentication Port - The UDP port number that the RADIUS
server is using. The default value is 1812, based on RFC 2138.
Secret - The RADIUS server and client share a secret that is
used to authenticate the messages sent between them. Both
sides must be configured to use the same shared secret. The
maximum length of the shared secret you can set is 36
characters.
Retry - Set the number of attempts to perform reconnection
with RADIUS server. If the connection (with the Primary
Server) still fails, stop the connection attempt and begin to
make connection with the secondary server.
Secondary Server Secondary Server - Enter the IP address of RADIUS server.
Authentication Port - The UDP port number that the RADIUS
server is using. The default value is 1812, based on RFC 2138.
Secret - The RADIUS server and client share a secret that is
used to authenticate the messages sent between them. Both
sides must be configured to use the same shared secret. The
maximum length of the shared secret you can set is 36
characters.
Retry - Set the number of attempts to perform reconnection.
If the connection (with the Secondary Server) still fails, stop
the connection attempt. The client authentication would be
determined as "failed".
After finished the above settings, click OK button to save the settings.
Item Description
Enable Select to enable the router's internal RADIUS server.
Authentication Port The UDP port for authentication message.
RADIUS Client Access List Only clients that meet the criteria configured in the access
list are allowed to access the RADIUS server.
Index - The index number of the client entry.
Enable - Select to enable this client entry.
Shared Secret - A text string that is known to both the
router’s RADIUS server and the RADIUS client that is used to
To add a User Profile to the RADIUS server, select it under Available List, then click the
button. To remove a User Profile from the RADIUS server, select it under Selected
To save changes on the page, click OK. To discard changes, click Cancel. To reset all settings
to blank, click Clear.
Item Description
Enable Select to enable the use of the external TACACS+ server.
Server IP Address Enter the IP address of TACACS+ server.
Destination Port The UDP port used by the TACACS+ server.
Shared Secret A text string that is known to both the TACACS+ server and
client (the router) is used to authenticate messages sent
between them. Maximum length is 36 characters.
Confirm Shared Secret Enter the Shared Secret for confirmation.
To save changes on the page, click OK. To discard changes, click Cancel. To reset all settings
to blank, click Clear.
General Setup
This page allows you to enable the function and specify general settings for LDAP server.
Item Description
Enable Check to enable such function.
Bind Type There are three types of bind type supported.
Simple Mode – Just simply do the bind authentication
without any search action.
Anonymous – Perform a search action first with
Anonymous account then do the bind authentication.
Regular Mode– Mostly it is the same with anonymous
mode. The different is that, the server will firstly check
if you have the search authority.
For the regular mode, you’ll need to type in the Regular DN
and Regular Password.
Server Address Enter the IP address of LDAP server.
Destination Port Type a port number as the destination port for LDAP server.
Use SSL Check the box to use the port number specified for SSL.
Regular DN Type this setting if Regular Mode is selected as Bind Type.
After finished the above settings, click OK button to save the settings.
Item Description
Name Type a name for such profile. The length of the user name is
limited to 19 characters.
Common Name Identifier Type or edit the common name identifier for the LDAP server.
The common name identifier for most LDAP server is “cn”.
Base Distinguished Name Type or edit the distinguished name used to look up entries on
/ Group Distinguished the LDAP server.
Name
Sometimes, you may forget the Distinguished Name since it’s
too long. Then you may click the button to list all the
account information on the AD/LDAP Server to assist you finish
After finished the above settings, click OK to save and exit this page. A new profile has been
created.
Item Description
IGMP Proxy Check this box to enable this function. The application of
multicast will be executed through WAN /PVC/VLAN port.
In addition, such function is available in NAT mode.
Interface – Specify an interface for packets passing
through.
IGMP version – At present, two versions (v2 and v3) are
supported by Vigor router. Choose the correct version
based on the IPTV service you subscribe.
General Query Interval – Vigor router will periodically
check which IP obtaining IPTV service by sending query. It
might cause inconvenience for client. Therefore, set a
suitable time (unit: second) as the query interval to limit
the frequency of query sent by Vigor router.
Add PPP header – Check this box if the interface type for
IGMP is PPPoE. It depends on the specifications regulated
by each ISP. If you have no idea to enable or disable, simply
contact your ISP providers.
Enable IGMP syslog - Check the box to store the IGMP
status ontot Syslog.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Refresh Click this link to renew the working multicast group status.
Group ID This field displays the ID port for the multicast group. The
available range for IGMP starts from 224.0.0.0 to
239.255.255.254.
P2 to P12 It indicates the LAN port used for the multicast group.
Item Description
Wake by Two types provide for you to wake up the binded IP.
MAC Address - If you choose Wake by MAC Address,
you have to enter the correct MAC address of the host
in MAC Address boxes.
IP Address - It is available when LAN >>Bind IP to
MAC is enabled. If you choose Wake by IP Address,
select an IP address.
IP Address The IP addresses that have been configured in LAN>>Bind
IP to MAC will be shown in this drop down list. Choose the
IP address from the drop down list that you want to wake
up.
MAC Address Enter any one of the MAC address of the bound PCs.
Wake Up Click this button to wake up the selected IP. See the
following figure. The result will be shown on the box.
SMS Provider
This page allows you to specify SMS provider, who will get the SMS, what the content is and
when the SMS will be sent.
Item Description
Enable Check the box to enable such profile.
SMS Provider Use the drop down list to choose SMS service provider.
You can click SMS Provider link to define the SMS server.
Recipient Number Type the phone number of the one who will receive the
SMS.
Notify Profile Use the drop down list to choose a message profile. The
recipient will get the content stated in the message profile.
You can click the Notify Profile link to define the content
of the SMS.
Schedule (1-15) Type the schedule number that the SMS will be sent out.
You can click the Schedule(1-15) link to define the
schedule.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Enable Check the box to enable such profile.
Mail Service Use the drop down list to choose mail service object. All of
the available objects are created in Object
Settings>>SMS/Mail Service Option. If there is no object
listed, click Mail Service link to define a new one with
specified service provider.
Mail Address Type the e-mail address of the one who will receive the
notification message.
Notify Profile Use the drop down list to choose a message profile. The
recipient will get the content stated in the message profile.
You can click the Notify Profile link to define the content
of the mail message.
Schedule (1-15) Type the schedule number that the notification will be sent
out.
You can click the Schedule(1-15) link to define the
schedule.
After finishing all the settings here, please click OK to save the configuration.
Below shows an example for applying the bonjour feature that Vigor router can be used as the
FTP server.
1. Here, we use Firefox and DNSSD to discover the service in such case. Therefore, just
ensure the Bonjour client program and DNSSD for Firefox have been installed on the
computer.
4. Next, open Applications>>Bonjour. Check the service that you want to use via Bonjour.
5. Open the DNSSD page again. The available items will be changed as the follows. It means
the Vigor router (based on Bonjour protocol) is ready to be used as a printer server, FTP
server, SSH Server, Telnet Server, and HTTP Server.
Item Description
Enable High Abailablity Check this box to enable HA function.
Redundancy Method Select the redundancy method for high availability.
Hot-Standby -
Such method is suitable when there is only one ISP account.
When this method is selected,
During normal operation the secondary router will be
idling. When the primary router fails to operate
normally, the secondary router(s) will take over.
WAN settings of the primary and secondary routers
are identical.
Note: When Hot-Standby is used, the wireless LAN
function on secondary router will be “disabled”
directlly. Clients can not connect to the secondary
router any more.
Active-Standby -
This method is suitable when there are multiple
simultaneously active ISP connections. When this method is
selected,
All WANs on the secondary routers can be up at the
same time. LANs that are not configured under high
availability can be routed to secondary routers.
WAN settings of primary and secondary routers are
independently configured.
Config Sync may be enabled to synchronize most
configuration settings between the primary and
secondary routers.
All routers must be set to the same redundancy
method.
Group ID Type a value (1~255).
In LAN environment, multiple routers can be devided into
several groups. Each router must be specified with one group
ID. Different routers with the same ID value will be
categoried into the same group.
Only one of the routers in the same group will be selected as
the primary router.
Priority ID Type a value (1~30).
Different routers must be configured with different IDs.
All routers within a group must be assigned a priority ID.
Within a group, the router with the largest priority ID (i.e.,
the highest priority) will be the primary router. When
multiple routers in a group are assigned the same priority ID,
routers with lower LAN IP addresses (configured on the LAN
>> General Setup page) have higher priority.
Authentication Key Enter an authentication key up to 31 characters long. This is
used to encrypt the DARP (DrayTek Address Redundancy
Protocol) traffic to guard against malicious attacks.
Protocol Select the IP protocol to be used for DARP.
Management Interface Select the interface to be used for DARP negotiation
between routers. Only interfaces which are enabled in
LAN>>General Setup are available for selection.
When you finish the configuration, please click OK to save and exit this page.
Item Description
Enable Config Sync (Max. Check this box to enable configuration synchronization.
Sync to 10 routers) To sync configuration from primary to secondary router,
both primary and seconday routers need to enable “config
sync”. Note that config sync can be enabled by Hot-Standby
redundancy method only.
Config Sync Interval Day / Hour / Minute - Primary router will sync its
configuration to secondary router based on the time interval
set here.
Exclude the following Settings selected in this field will be excluded when
settings from config sync executing configuration synchronization. This setting is
When you finish the configuration, please click OK to save and exit this page.
When the configuration method is set to “Hot Standby”, the following settings will not be
synchronized:
WAN (user selectable)
LAN
LAN IPv6
router name
admin and user passwords.
Example:
Take the following picture as an example. The upper Vigor3910 is regarded as primary device,
the lower Vigor3910 is regarded as secondary device. When primary Vigor3910 Series is
broken down, the secondary device could replace the primary role to take over all jobs as
soon as possible. However, once the primary device is working again, the secondary device
would be changed to original role to stand by.
After above configurations, users belong to either “rd1” or “shrd” group can access Internet
after inputting their credentials on LDAP server.
Vigor router supports various DDNS service providers, user can set up user-defined profile to
update the DDNS even the service provider is not on the list. Now, DrayTek starts to support
our own DDNS service - DrayDDNS. We will provide a domain name for each Vigor router, this
single domain name can record IP addresses of all WAN.
2. Go to Wizards >> Service Activation Wizard page, wait for the router to connect to
MyVigor server, then:
(a) Select DT-DDNS.
(b) Enter the desired Domain Name.
Note that, if your router does not get the domain after you activating the license, it may
due to the router does not trigger the process, which to connect and get the license from
MyVigor server. You may reboot the router to trigger the process.
Currently, only the domain name is allowed to be modified MyVigor website. We will need to
register the router to MyVigor server, and log in to MyVigor website to modify it.
4. Vigor router will get the modified domain name when the it performs next DDNS
updating. We can click Sync domain to accelerate this process.
Route Policy (also well known as PBR, policy-based routing) is a feature where you may need
to get a strategy for routing. The packets will be directed to the specified interface if they
match one of the policies. You can setup route policies in various reasons such as load balance,
security, routing decision, and etc.
Through protocol, IP address, port number and interface configuration, Route Policy can be
used to configure any routing rules to fit actual request. In general, Route Policy can easily
reach the following purposes:
Load Balance
You may manually create policies to balance the traffic across network interface.
Specify Interface
Through dedicated interface (WAN/LAN/VPN), the data can be sent from the source IP to the
destination IP.
Address Mapping
Allows you specify the outgoing WAN IP address (es) for an internal private IP address or a
range of internal private IP addresses.
Priority
The router will determine which policy will be adopted for transmitting the packet according
to the priority of Static Route and Route Policy.
Failover to/Failback
Packets will be sent through another Interface or follow another Policy when the original
interface goes down (Failover to). Once the original interface resumes service (Failback),
the packets will be returned to it immediately.
Other routing
Specify routing policy to determine the direction of the data transmission.
Info For more detailed information about using policy route, refer to SUPPORT
>> TECH SUPPORT >>FAQs on www.draytek.com.
Info There are two reasons that we have to apply RIP Protocol Control on
1st Subnet. The first is that the LAN interface can exchange RIP
packets with the neighboring routers via the 1st subnet
(192.168.1.0/24). The second is that those hosts on the internal
private subnets (ex. 192.168.10.0/24) can access the Internet via the
router, and continuously exchange of IP routing information with
different subnets.
2. Click the LAN >> Static Route and click on the Index Number 1. Check the Enable box.
Please add a static route as shown below, which regulates all packets destined to
192.168.10.0 will be forwarded to 192.168.1.2. Click OK.
Item Description
Enable Click it to enable this profile.
Destination IP Type an IP address as the destination of such static route.
Address
Subnet Mask Type the subnet mask for such static route.
Gateway IP Address Type the gateway IP addres for such static route.
Network Interface Use the drop down list to specify an interface for such
static route.
3. Return to Static Route Setup page. Click on another Index Number to add another
static route as show below, which regulates all packets destined to 211.100.88.0 will be
forwarded to 192.168.1.3. Click OK.
Item Description
Index The number (1 to 40) under Index allows you to open next
page to set up static route.
Enable Check the box to enable such profile.
Destination Address Displays the destination address of the static route.
Set to Factory Default Clear all of the settings and return to factory default
settings.
Viewing IPv6 Routing Displays the routing table for your reference.
Table
Item Description
Enable Click it to enable this profile.
Destination IPv6 Address / Type the IP address with the prefix length for this entry.
Prefix Len
Gateway IPv6 Address Type the gateway address for this entry.
Network Interface Use the drop down list to specify an interface for this static
route.
When you finish the configuration, please click OK to save and exit this page.
Item Description
Index Click the number of index to access into the configuration
web page.
Enable Check this box to enable this policy.
Protocol Display the protocol used for this policy.
Interface Display the interface to send packets to once the policy is
matched.
Priority Display the priority value for such route policy profile.
Src IP Start Display the IP address for the start of the source IP.
Src IP End Display the IP address for the end of the source IP.
Dest IP Start Display the IP address for the start of the destination IP.
Dest IP End Display the IP address for the end of the destination IP.
Dest Port Start Display the IP address for the start of the destination port.
Dest Port End Display the IP address for the end of the destination port.
Move UP/Move Down Use Up or Down link to move the order of the policy.
Wizard Mode Allow to configure frequently used (simple and basic)
settings of route policy via three setting pages.
Advance Mode Allow to configure detailed settings of route policy.
Item Description
Source IP Any – Any IP can be treated as the source IP.
Src IP Start - Type the source IP start for the specified WAN
interface.
Src IP End - Type the source IP end for the specified WAN
interface. If this field is blank, it means that all the source
IPs inside the LAN will be passed through the WAN
interface.
Destination IP Any – Any IP can be treated as the destination IP.
Dest IP Start- Type the destination IP start for the specified
WAN interface.
Dest IP End - Type the destination IP end for the specified
WAN interface. If this field is blank, it means that all the
destination IPs will be passed through the WAN interface.
Country Object - Choose a country object. All the traffic
from destination IPs in that country is allowed pass through
the WAN interface.
Item Description
Interface Use the drop down list to choose an interface (LAN/WAN) or
VPN profile. Packets match with the above criteria will be
transferred to the interface chosen here.
4. After specifying the interface, click Next to get the following page.
Item Description
Force NAT /Force It determines which mechanism that the router will use to
Routing forward the packet to WAN.
5. After choosing the mechanism, click Next to get the summary page for reference.
Item Description
Enable Check this box to enable this policy.
Comment Type a brief explanation for this profile.
Criteria
Protocol Use the drop-down menu to choose a proper protocol for the
WAN interface.
3. When you finish the configuration, please click OK to save and exit this page.
or
Item Description
Mode Analyze how a packet will be sent – Choose such mode to
make Vigor router analyze how a single packet will be sent
by a route policy.
Analyze how multiple packets… - Choose such mode to
make Vigor router analyze how multiple packets in a
specified file will be sent by a route policy.
Packet Information Specify the nature of the packets to be analyzed by Vigor
router.
ICMP/UDP/TCP/ANY- Specify a protocol for diagnosis.
Src IP – Type an IP address as the source IP.
Dst IP – Type an IP address as the destination IP.
Dst Port – Use the drop down list to specify the destination
port.
Analyze – Click it to perform the job of analyzing. The
analyzed result will be shown on the page. If required, click
export analysis to export the result as a file.
Input File Select – Click the download link to get a blank example
file. Then, click such button to select that blank “.csv” file
for saving the result of analysis.
II-6-3 OSPF
OSPF(Open Shortest Path First), running within the AS, is a routing protocol based on IP
protocol. It uses the algorithm of SPF (Shortest Path First) to calculate the route metric. It is
suitable for large network and complicated data exchange. Vigor3910 supports up to OSPF
version 2(only for IPv4).
The Autonomous System (AS) used in OSPF can be divided into several areas. Usually, Area 0
will be used as OSPF backbone which distributing the routing information among areas.
When you need faster convergence than distance vector, want to support much larger
networks or want to have less susceptible to bad routing information, you can enable OSPF
feature to fit your request. Note that both routers must support OSPF function at the same
time to build the OSPF connection.
Open Routing >> OSPF to get the following page.
Item Description
Local
Enable OSPF Check the box to enable the function.
When you finish the configuration, please click OK to save and exit this page.
Item Description
Local
Enable BGP Check the box to enable basic BGP function for local
router.
Local AS Number Set the AS number for local router.
Hold Time Set the time interval (in seconds) to determine the peer is
dead when the router is unable to receive any keepalive
message from the peer within the time.
Connect Retry Time If the router fails to connect to neighboring router, it
requires a period of time to reconnect.
Set the time interval to do reconnection.
Router ID Specify the LAN subnet for the router.
Neighbor
Index Click the index number link to configure neighbor profile.
Enable Check the box to enable the basic BGP function for
neighboring router.
AS Number Display the AS Number for neighboring router.
Profile Name Display the name of the neighboring profile.
IP Address Display the IP address specified for the neighboring profile.
MD5 Auth Display the status (enable or disable) of MD5 Auth.
Status Display the connection status for local router and
neighboring router.
Item Description
Select Check the box to enable the configuration for the selected
index entry.
IP Address Enter the IP address for a router.
Subnet Mask Choose the mask value for the IP address.
A-1 How to Customize a Secure Route between VPN Router and Remote Router
by Using Route Policy
Example 1:
In the following figure, a LAN to LAN VPN tunnel is built between DrayTek VPN router (e.g.,
Vigor3910 Series) and the remote router. Firewall Router can receive all of the traffic coming
from remote PC which wants to access into Internet; and send back the packets to Remote
Router through VPN Router.
1. Establish a VPN tunnel between VPN Router and the Remote Router.
2. Change to default route for the router located in Remote Router.
3. Access into the web user interface of the router in VPN Router. Then, open Routing >>
Load-Balance / Route Policy and click Advance Mode.
Now, if you want such route policy will be applied by Vigor router with higher priority,
please adjust the value of Priority for such route policy. In general, default route is
specified with the lowest priority for it value is fixed as “250”. And Routes in Routing
Table are fixed as “150”. You can adjust the value for such route policy with lower value,
e.g., 100 to ensure it will be applied to packets transmission with the highest priority.
5. After finished the above settings, click OK to save the configuration.
6. To route the packets coming from the Firewall Router back to the remote router, access
into the web user interface of the Firewall Router. Then, set “192.168.1.1/24” as the
gateway IP address and set “172.16.3.0/24” as the destination IP address.
A Virtual Private Network (VPN) is the extension of a private network that encompasses links
across shared or public networks like the Internet. In short, by VPN technology, you can send
data between two computers across a shared or public network in a manner that emulates the
properties of a point-to-point private link.
The VPN built is suitable for:
Communication between home office and customer
Secure connection between Teleworker, staff on business trip and main office
Exchange data between remote office and main office
POS between chain store and headquarters
After finishing all the settings here, please click OK to save the configuration.
Item Description
Dial-In PPP Authentication PAP Only - elect this option to force the router to
authenticate dial-in users with the PAP protocol.
PAP/CHAP/MS-CHAP/MS-CHAPv2 - Selecting this option
means the router will attempt to authenticate dial-in users
with the CHAP protocol first. If the dial-in user does not
support this protocol, it will fall back to use the PAP protocol
for authentication.
Dial-In PPP Encryption Optional MPPE - This option represents that the MPPE
(MPPE) encryption method will be optionally employed in the router
for the remote dial-in user. If the remote dial-in user does
not support the MPPE encryption algorithm, the router will
transmit “no MPPE encrypted packets”. Otherwise, the MPPE
encryption scheme will be used to encrypt the data.
Require MPPE (40/128bits) - Selecting this option will
force the router to encrypt packets by using the MPPE
encryption algorithm. In addition, the remote dial-in
user will use 40-bit to perform encryption prior to using
128-bit for encryption. In other words, if 128-bit MPPE
encryption method is not available, then 40-bit
encryption scheme will be applied to encrypt the data.
Maximum MPPE - This option indicates that the router
will use the MPPE encryption scheme with maximum
bits (128-bit) to encrypt the data.
Mutual Authentication The Mutual Authentication function is mainly used to
(PAP) communicate with other routers or clients who need
After finishing all the settings here, please click OK to save the configuration.
Encapsulating Security Payload (ESP) is a security protocol that provides data confidentiality
and protection with optional authentication and replay detection service.
Item Description
IKE Authentication This usually applies to those are remote dial-in user or node
Method (LAN-to-LAN) which uses dynamic IP address and
IPsec-related VPN connections such as L2TP over IPsec and
IPsec tunnel. There are two methods offered by Vigor router
for you to authenticate the incoming data coming from
remote dial-in user, Certificate (X.509) and Pre-Shared
Key.
Certificate – X.509 certificates can be used for IKE
authentication. To set up certificates on the router, go to
the Certificate Management section.
Preferred Local ID - Specify the preferred local ID
information (Alternative Subject Name First or Subject
Name First) for IPsec authentication while the client is using
the general setting (without a specific Peer IP or ID in the
VPN profile).
General Pre-Shared Key- Define the PSK key for general
authentication.
Confirm General Pre-Shared Key- Re-enter the characters
to confirm the pre-shared key.
XAuth User Pre-Shared Key - Define the PSK key for IPsec
XAuth authentication.
Confirm XAuth User Pre-Shared Key- Re-enter the
characters to confirm the pre-shared key for IPsec XAuth
authentication.
Note: Any packets from the remote dial-in user which does
not match the rule defined in VPN and Remote
Access>>Remote Dial-In User will be applied with the
method specified here.
IPsec Security Method Available mthods include Basic, Medium and High. Each
method offers different encryption, HMAC and DH Group.
Basic - Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option
is active.
Medium - When this option is selected, the Authentication
Header (AH) protocol can be used to provide authentication
to IPsec traffic.
High - When this option is selected, the Encapsulating
Security Payload (ESP) protocol can be used to provide
authentication and encryption to IPsec traffic. Three
encryption standards are supported for ESP: DES, 3DES and
AES, in ascending order of security.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Set to Factory Default Click it to clear all indexes.
Index Click the number below Index to access into the setting page
of IPsec Peer Identity.
Enable Check the box to enable such profile.
Name Display the profile name of that index.
Click each index to edit one peer digital certificate. There are three security levels of digital
signature authentication: Fill each necessary field to authenticate the remote peer. The
following explanation will guide you to fill all the necessary fields.
Item Description
Enable this account Check it to enable such account profile.
Profile Name Type the name of the profile. The maximum length of the
name you can set is 32 characters.
Accept Any Peer ID Click to accept any peer regardless of its identity.
Accept Subject Click to check one specific field of digital signature to accept
Alternative Name the peer with matching value. The field can be IP Address,
Domain, or E-mail address. The box under the Type will
appear according to the type you select and ask you to fill in
corresponding setting.
Accept Subject Name Click to check the specific fields of digital signature to
accept the peer with matching value. The field includes
Country (C), State (ST), Location (L), Organization (O),
Organization Unit (OU), Common Name (CN), and Email
(E).
After finishing all the settings here, please click OK to save the configuration.
With integrating of OpenVPN, Vigor router can help users to achieve more robust, reliable and
secure private connections for business needs.
Before establishing OpenVPN connection, general settings for OpenVPN service shall be
configured first.
Item Description
Enable UDP Check the box to enable UDP port setting for OpenVPN.
UDP Port – Enter a number.
Enable TCP Check the box to enable TCP port setting for OpenVPN.
TCP Port – Enter a number.
Cipher Algorithm Two encryptions are supported, AES128 and AES256.
HMAC Algorithm The HMAC algorithm only supports SHA1/SHA256.
Certificate Authentication If certificate authentication is required for OpenVPN, simply
check the box to apply the trusted CA certificate and local
certificate for OpenVPN tunnel.
Certificate authentication can offer more secure VPN tunnel
between the client and the router.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Remote Server Click IP and use the drop down list to specify an IP address of
WAN for VPN connection. Or click Domain to enter a domain
name for the remote server.
Transport Protocol Simply choose UDP or TCP as protocol for building OpenVPN
connection between the server and the remote client.
Fine Name Enter a name for the configuration file.
CA cert Enter the certificate authority (CA) file name obtained from
3rd party provider
Client cert Each client in an OpenVPN connection must have its
certificate and private key.
Enter the certificate file name obtained from 3rd party
provider
Client key Enter the private key file name obtained from 3rd party
provider
Export The settings in this page can be saved as a file after clicking
such button. Later, the downloaded file can be imported to
the VPN client for building OpenVPN connection.
The router provides 500 access accounts for dial-in users. Besides, you can extend the user
accounts to the RADIUS server through the built-in RADIUS client function. The following
figure shows the summary table.
Item Description
Set to Factory Default Click to clear all indexes.
View All – Click it to display the all of the user accounts.
Online – Click it to display the online user accounts.
Offline – Click it to display the offline user accounts.
Index Click the number below Index to access into the setting page
of Remote Dial-in User.
Click each index to edit one remote user profile. Each Dial-In Type requires you to fill the
different corresponding fields on the right. If the fields gray out, it means you may leave it
untouched. The following explanation will guide you to fill all the necessary fields.
Item Description
User account and Enable this account - Select to enable this profile to be used
Authentication by remote dial-in users.
Idle Timeout - Allowed idle time before the router
disconnects the VPN connection. Default timeout value is
300 seconds.
Allowed Dial-In Type Select all VPN protocols allowed for this profile.
For L2TP, specify how IPsec should be applied. Options are
None – IPsec cannot be used with L2TP connections.
Nice to Have – IPsec is preferred but not mandatory for
L2TP connections.
After finishing all the settings here, please click OK to save the configuration.
The following figure shows the summary table according to the item
(All/Trunk/Online/Offline) selected for View.
Item Description
Set to Factory Default Click to clear all indexes.
View All – Shows all LAN-to-LAN VPN profiles.
Trunk – Shows all Trunk profiles (see VPN and Remote Access
>> VPN TRUNK Management).
Index Click the index number of the profile to view or edit its
settings.
Enable Check to enable the LAN-to-LAN VPN profile.
Name Display the name of the LAN-to-LAN profile. The symbol ???
represents that the profile is empty.
Remote Network Display the name of the remote network.
Status Shows the status of the profile.
Online – LAN-to-LAN VPN is connected.
Offline – LAN-to-LAN VPN is disconnected.
--- – Profile is disabled.
Pass Routing LAN to VPN Check the box to allow the packets from the Routing LAN to
pass over the VPN tunnel.
Default setting is "Disable".
Pass Packets to NAT when If enabled, the Vigor router will send the packets to the
VPN disconnects default gateway once the VPN disconnects.
Default setting is "Enable".
Backup Click Backup to save the configuration.
Restore Click Select to choose a configuration file. Then click
Restore to apply the file.
1. Click each index to edit each profile and you will get the following page. Each
LAN-to-LAN profile includes 5 subgroups. If the fields gray out, it means you may leave it
untouched. The following explanations will guide you to fill all the necessary fields.
Item Description
Common Settings Profile Name – Specify a name for the profile of the
LAN-to-LAN connection.
Enable this profile - Check here to activate this profile.
VPN Dial-Out Through - Use the drop down menu to choose a
proper WAN interface for this profile. This setting is useful
for dial-out only.
WANx First- While connecting, the router will use
WANx as the first channel for VPN connection. If WANx
fails, the router will use another WAN interface
instead.
WANx Only - While connecting, the router will use
WANx as the only channel for VPN connection.
WAN1 Only: Only establish VPN if WAN2 down - If
WAN2 failed, the router will use WAN1 for VPN
connection.
WAN2 Only: Only establish VPN if WAN1 down - If
WAN1 failed, the router will use WAN2 for VPN
connection.
Netbios Naming Packet
Pass – click it to have an inquiry for data transmission
between the hosts located on both sides of VPN Tunnel
Item Description
Dial-In Settings Allowed Dial-In Type - Determine the dial-in connection
with different types.
PPTP - Allow the remote dial-in user to make a PPTP
VPN connection through the Internet. You should set
the User Name and Password of remote dial-in user
below.
IPsec Tunnel- Allow the remote dial-in user to trigger
an IPsec VPN connection through Internet.
L2TP with IPsec Policy - Allow the remote dial-in user
to make a L2TP VPN connection through the Internet.
You can select to use L2TP alone or with IPsec. Select
from below:
None - Do not apply the IPsec policy. Accordingly,
the VPN connection employed the L2TP without
IPsec policy can be viewed as one pure L2TP
connection.
Nice to Have - Apply the IPsec policy first, if it is
applicable during negotiation. Otherwise, the
dial-in VPN connection becomes one pure L2TP
connection.
Must - Specify the IPsec policy to be definitely
applied on the L2TP connection.
SSL Tunnel- Allow the remote dial-in user to trigger an
SSL VPN connection through Internet.
Specify Remote VPN Gateway - You can specify the IP
address of the remote dial-in user or peer ID (should be the
same with the ID setting in dial-in type) by checking the box.
GRE over IPsec Enable IPsec Dial-Out function GRE over IPsec: Check this
Settings box to verify data and transmit data in encryption with GRE
over IPsec packet after configuring IPsec Dial-Out setting.
Both ends must match for each other by setting same virtual
IP address for communication.
Logical Traffic: Such technique comes from RFC2890. Define
logical traffic for data transmission between both sides of
VPN tunnel by using the characteristic of GRE. Even hacker
can decipher IPsec encryption, he/she still cannot ask LAN
site to do data transmission with any information. Such
TCP/IP Network My WAN IP –This field is only applicable when you select
Settings PPTP or L2TP with or without IPsec policy above. The default
value is 0.0.0.0, which means the Vigor router will get a PPP
IP address from the remote router during the IPCP
negotiation phase. If the PPP IP address is fixed by remote
side, specify the fixed IP address here. Do not change the
default value if you do not select PPTP or L2TP.
Remote Gateway IP - This field is only applicable when you
select PPTP or L2TP with or without IPsec policy above. The
default value is 0.0.0.0, which means the Vigor router will
get a remote Gateway PPP IP address from the remote router
during the IPCP negotiation phase. If the PPP IP address is
fixed by remote side, specify the fixed IP address here. Do
not change the default value if you do not select PPTP or
L2TP.
Remote Network IP/ Remote Network Mask - Add a static
route to direct all traffic destined to this Remote Network IP
Address/Remote Network Mask through the VPN connection.
For IPsec, this is the destination clients IDs of phase 2 quick
mode.
Local Network IP / Local Network Mask - Display the local
network IP and mask for TCP / IP configuration. You can
modify the settings if required.
More - Add a static route to direct all traffic destined to
more Remote Network IP Addresses/ Remote Network Masks
through the VPN connection. This is usually used when you
find there are several subnets behind the remote VPN router.
2. After finishing all the settings here, please click OK to save the configuration.
Item Description
Backup Profile List Set to Factory Default - Click to clear all VPN TRUNK-VPN
Backup mechanism profile.
No – The order of VPN TRUNK-VPN Backup mechanism
profile.
Status - “v” means such profile is enabled; “x” means such
profile is disabled.
Name - Display the name of VPN TRUNK-VPN Backup
mechanism profile.
Member1 - Display the dial-out profile selected from the
Member1 drop down list below.
Active - “Yes” means normal condition. “No” means the
state might be disabled or that profile currently is set with
Dial-in mode (for call direction) in LAN-to-LAN.
Type - Display the connection type for that profile, such as
IPsec, PPTP, L2TP, L2TP over IPsec (NICE), L2TP over
IPsec(MUST) and so on.
Member2 - Display the dial-out profile selected from the
Member2 drop down list below.
Advanced – This button is available only when LAN to LAN
profile (or more) is created.
Time for activating VPN TRUNK – VPN Load Balance mechanism profile
After finishing the connection for one tunnel, the other tunnel will dial out automatically
within two seconds. Therefore, you can choose any one of members under VPN Load Balance
for dialing out.
Time for activating VPN TRUNK –Dial-out when VPN Load Balance Disconnected
For there is one Tunnel created and connected successfully, to keep the load balance effect
between two tunnels, auto-dial will be executed within two seconds.
To close two tunnels of load balance after connecting, please click Disable for Status in
General Setup field.
4. Take a look for LAN-to-LAN profiles. Index 1 is chosen as Member1; index 2 is chosen as
Member2. For such reason, LAN-to-LAN profiles of 1 and 2 will be expressed in red to
indicate that they are fixed. If you delete the VPN TRUNK – VPN Backup/Load Balance
mechanism profile, the selected LAN-to-LAN profiles will be released and expressed in
black.
After setting profiles for load balance, you can choose any one of them and click Advance for
more detailed configuration. The windows for advanced load balance and backup are
different. Refer to the following explanation:
Item Description
Profile Name List the load balance profile name.
Load Balance Algorithm Round Robin – Based on packet base, both tunnels will send
the packet alternatively. Such method can reach the balance
of packet transmission with fixed rate.
Weighted Round Robin – Such method can reach the balance
of packet transmission with flexible rate. It can be divided
into Auto Weighted and According to Speed Ratio. Auto
Weighted can detect the device speed (10Mbps/100Mbps)
and switch with fixed value ratio (3:7) for packet
transmission. If the transmission rate for packets on both
sides of the tunnels is the same, the value of Auto Weighted
should be 50:50. According to Speed Ratio allows user to
adjust suitable rate manually. There are 100 groups of rate
ratio for Member1:Member2 (range from 1:99 to 99:1).
VPN Load Balance Policy Below shows the algorithm for Load Balance.
Edit – Click this radio button for assign a blank table for
configuring Binding Tunnel.
Insert after – Click this radio button to adding a new binding
Advanced Backup
Item Description
Profile Name List the backup profile name.
ERD Mode ERD means “Environment Recovers Detection”.
Normal – choose this mode to make all dial-out VPN TRUNK
backup profiles being activated alternatively.
Resume – when VPN connection breaks down or disconnects,
Item Description
Dial-out Tool General Mode - This filed displays the profile configured in
LAN-to-LAN (with Index number and VPN Server IP address).
The VPN connection built by General Mode does not support
VPN backup function.
A-1 How to Build a LAN-to-LAN VPN Between Remote Office and Headquarter
via IPsec Tunnel (Main Mode)
3. Click any index number to open the configuration page. Type a name which is easy for
identification for such profile (in this case, type VPN Server), and check the box of
Enable This Profile. For Vigor router will be set as a server, the call direction shall be
set as Dial-in and set 0 as Idle Timeout.
5. Continue to navigate to the TCP/IP Network Settings for setting the LAN IP for remote
side.
3. Click any index number to open the configuration page. Type a name which is easy for
identification for such profile (in this case, type VPN Client), and check the box of
Enable This Profile. For such Vigor router will be set as a client, the call direction shall
be set as Dial-out. Check the box of Always on for a permanent VPN connection.
5. Continue to navigate to the TCP/IP Network Settings for setting the LAN IP for the
remote side.
SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that encrypts traffic
using SSL, which is the same technology used on secured websites. Because of SSL’s
prominence as an encryption protocol on the Internet, most networks have few restrictions on
SSL traffic, and as a result SSL VPN is more likely to work when other VPN technologies
experience difficulties due to obstacles such as firewalls and Network Address Translation
(NAT).
In short,
It is not necessary for users to preinstall VPN client software for executing SSL VPN
connection.
There are less restrictions for the data encrypted through SSL VPN in comparing with
traditional VPN.
Item Description
Bind to WAN Select the WAN interfaces to accept inbound SSL VPN
connections.
Port The port to be used for SSL VPN server. This is separate from
the management port which is configured in System
Maintenance>>Management. The default setting is 443.
Server Certificate When the client does not set any certificate, default
certificate will be used for HTTPS and SSL VPN server.
Specify the certificate to be used for SSL connections. Select a
certificate from imported or generated certificates on the
router, or choose Self-signed to use the router’s built-in
default certificate. The selected certificate can be used in SSL
VPN server and HTTPS Web Proxy.
After finishing all the settings here, please click OK to save the configuration.
Info SSL VPN can work only with Smart VPN Client developed by DrayTek. After
configuring SSL VPN profile, download the utility of Smart VPN Client to
build SSL VPN connection.
Item Description
User account and Enable this account - Check the box to enable this function.
Authentication Idle Timeout- If the dial-in user is idle over the limitation of
the timer, the router will drop this connection. By default, the
Idle Timeout is set to 300 seconds.
User Name - This field is applicable when you select PPTP or
L2TP with or without IPsec policy above. The length of the
name/password is limited to 23 characters.
Password - This field is applicable when you select PPTP or
L2TP with or without IPsec policy above. The length of the
name/password is limited to 19 characters.
Enable Mobile One-Time Passwords (mOTP) - Check this box
to make the authentication with mOTP function.
PIN Code – Type the code for authentication (e.g, 1234).
Secret – Use the 32 digit-secret number generated by
mOTP in the mobile phone (e.g.,
e759bb6f0e94c7ab4fe6).
Allowed Dial-In Type Select the VPN protocols that this user is allowed to use.
PPTP - Allow the remote dial-in user to establish VPN
connections with the PPTP protocol. You should set the User
After finishing all the settings here, please click OK to save the configuration.
A digital certificate works as an electronic ID, which is issued by a certification authority (CA).
It contains information such as your name, a serial number, expiration dates etc., and the
digital signature of the certificate-issuing authority so that a recipient can verify that the
certificate is real. Here Vigor router support digital certificates conforming to standard
X.509.
Any entity wants to utilize digital certificates should first request a certificate issued by a CA
server. It should also retrieve certificates of other trusted CA servers so it can authenticate
the peer with certificates issued by those trusted CA servers.
Here you can manage generate and manage the local digital certificates, and set trusted CA
certificates. Remember to adjust the time of Vigor router before using the certificate so that
you can get the correct valid period of certificate.
Item Description
Generate Click this button to open Generate Certificate Request
window.
Type in all the information that the window requests. Then
click Generate again.
Import Click this button to import a saved file as the certification
information.
Refresh Click this button to refresh the information listed below.
View Click this button to view the detailed settings for certificate
request.
Delete Click this button to delete selected name with certification
information.
GENERATE
Click this button to open Generate Certificate Signing Request window. Type in all the
information that the window request such as certifcate name (used for identifying different
certificate), subject alternative name type and relational settings for subject name. Then
click GENERATE again.
After clicking GENERATE, the generated information will be displayed on the window below:
IMPORT
Vigor router allows you to generate a certificate request and submit it the CA server, then
import it as “Local Certificate”. If you have already gotten a certificate from a third party,
you may import it directly. The supported types are PKCS12 Certificate and Certificate with a
private key.
Click this button to import a saved file as the certification information. There are three types
of local certificate supported by Vigor router.
Item Description
Upload Local Certificate It allows users to import the certificate which is generated by
Vigor router and signed by CA server.
If you have done well in certificate generation, the Status of
the certificate will be shown as “OK”.
Upload PKCS12 It allows users to import the certificate whose extensions are
Certificate usually .pfx or .p12. And these certificates usually
need passwords.
Note: PKCS12 is a standard for storing private keys and
certificates securely. It is used in (among other things)
Netscape and Microsoft Internet Explorer with their import
and export options.
Upload Certificate and It is useful when users have separated certificates and private
Private Key keys. And the password is needed if the private key is
encrypted.
View
Click this button to view the detailed settings for certificate request.
Info You have to copy the certificate request information from above window.
Next, access your CA server and enter the page of certificate request, copy
the information into it and submit a request. A new certificate will be
issued to you by the CA server. You can save it.
Delete
Click this button to remove the selected certificate.
Info Root CA can be deleted but not edited. If you want to modify the settings
for a Root CA, please delete the one and create another one by clicking
Create Root CA.
Importing a Trusted CA
To import a pre-saved trusted CA certificate, please click IMPORT to open the following
window. Use Browse… to find out the saved text file. Then click Import. The one you
imported will be listed on the Trusted CA Certificate window.
For viewing each trusted CA certificate, click View to open the certificate detail information
window. If you want to delete a CA certificate, choose the one and click Delete to remove all
the certificate information.
While the broadband users demand more bandwidth for multimedia, interactive applications,
or distance learning, security has been always the most concerned. The firewall of the Vigor
router helps to protect your local network against attack from unauthorized outsiders. It also
restricts users in the local network from accessing the Internet. Furthermore, it can filter out
specific packets that trigger the router to build an unwanted outgoing connection.
Firewall Facilities
The users on the LAN are provided with secured protection by the following firewall facilities:
User-configurable IP filter (Call Filter/ Data Filter).
Stateful Packet Inspection (SPI): tracks packets and denies unsolicited incoming data
Selectable Denial of Service (DoS) /Distributed DoS (DDoS) attacks protection
IP Filters
Depending on whether there is an existing Internet connection, or in other words “the WAN
link status is up or down”, the IP filter architecture categorizes traffic into two: Call Filter
and Data Filter.
Call Filter - When there is no existing Internet connection, Call Filter is applied to all
traffic, all of which should be outgoing. It will check packets according to the filter rules.
If legal, the packet will pass. Then the router shall “initiate a call” to build the Internet
connection and send the packet to Internet.
Data Filter - When there is an existing Internet connection, Data Filter is applied to
incoming and outgoing traffic. It will check packets according to the filter rules. If legal,
the packet will pass the router.
The following illustrations are flow charts explaining how router will treat incoming traffic
and outgoing traffic respectively.
Item Description
Item Description
Filter Select Pass or Block for the packets that do not match with
the filter rules.
Sessions Control The number typed here is the total sessions of the packets
that do not match the filter rule configured in this page.
Quality of Service Choose one of the QoS rules to be applied as firewall rule.
For detailed information of setting QoS, please refer to the
related section later.
User Management Such item is available only when Rule-Based is selected in
User Management>>General Setup. The general firewall
rule will be applied to the user/user group/all users
specified here.
Note: When there is no user profile or group profile existed,
Create New User or Create New Group item will appear for
you to click to create a new one.
APP Enforcement Select an APP Enforcement profile for global IM/P2P
application blocking. If there is no profile for you to select,
please choose [Create New] from the drop down list in this
page to create a new profile. All the hosts in LAN must follow
the standard configured in the APP Enforcement profile
selected here. For detailed information, refer to the section
of APP Enforcement profile setup. For troubleshooting
needs, you can specify to record information for IM/P2P by
After finishing all the settings here, please click OK to save the configuration.
To edit or add a filter, click on the set number to edit the individual set. The following page
will be shown. Each filter set contains up to 7 rules. Click on the rule number button to edit
each rule. Check Active to enable the rule.
Item Description
Filter Rule Click a button numbered (1 ~ 7) to edit the filter rule. Click
the button will open Edit Filter Rule web page. For the
detailed information, refer to the following page.
Active Enable or disable the filter rule.
Comment Enter filter set comments/description. Maximum length is
23–character long.
Direction Display the direction of packet.
Src IP / Dst IP Display the IP address of source /destination.
Service Type Display the type and port number of the packet.
Item Description
Comments Enter filter set comments/description. Maximum length is
14- character long.
Direction Set the direction of packet flow. It is for Data Filter only.
For the Call Filter, this setting is not available since Call
Filter is only applied to outgoing traffic.
Item Description
Pass Immediately Packets matching the rule will be passed immediately.
APP Enforcement - Select an APP Enforcement profile for
global IM/P2P application blocking. If there is no profile for
you to select, please choose [Create New] from the drop
down list in this page to create a new profile. All the hosts
in LAN must follow the standard configured in the APP
Enforcement profile selected here. For detailed
information, refer to the section of APP Enforcement
profile setup. For troubleshooting needs, you can specify to
record information for IM/P2P by checking the Log box. It
will be sent to Syslog server. Please refer to section
Syslog/Mail Alert for more detailed information.
URL Content Filter - Select one of the URL Content Filter
profile settings (created in CSM>> URL Content Filter) for
applying with this router. Please set at least one profile for
choosing in CSM>> URL Content Filter web page first. Or
choose [Create New] from the drop down list in this page
to create a new profile. For troubleshooting needs, you can
specify to record information for URL Content Filter by
checking the Log box. It will be sent to Syslog server. Please
refer to section Syslog/Mail Alert for more detailed
information.
Web Content Filter - Select one of the Web Content Filter
profile settings (created in CSM>> Web Content Filter) for
applying with this router. Please set at least one profile for
anti-virus in CSM>> Web Content Filter web page first. Or
choose [Create New] from the drop down list in this page
4. After choosing the mechanism, click Next to get the summary page for reference.
Item Description
Enable Check this box to enable the filter rule.
Comments Enter filter set comments/description. Maximum length is
14- character long.
Schedule Profile Set PCs on LAN to work at certain time interval only. You
may choose up to 4 schedules out of the 15 schedules
pre-defined in Applications >> Schedule setup. The
default setting of this field is blank and the function will
always work.
Clear sessions when Check this box to clear the sessions when the above
schedule is ON schedule profiles are applied.
Direction Set the direction of packet flow. It is for Data Filter only.
For the Call Filter, this setting is not available since Call
Filter is only applied to outgoing traffic.
Note: RT means routing domain for 2nd subnet or other
LAN.
Source IP / Country Click Edit to access into the following dialog to choose the
source/destination IP or IP ranges.
Destination IP /
Country
From the IP Group drop down list, choose the one that you
want to apply. Or use the IP Object drop down list to
choose the object that you want.
Service Type Click Edit to access into the following dialog to choose a
suitable service type.
3. When you finish the configuration, please click OK to save and exit this page.
Item Description
Enable Dos Defense Check the box to activate the DoS Defense Functionality.
Select All - Click this button to select all the items listed
below.
White/Black List Option – Set white/black list of IPv4/IPv6
address.
Enable SYN flood defense Check the box to activate the SYN flood defense function.
Once detecting the Threshold of the TCP SYN packets from
the Internet has exceeded the defined value, the Vigor
router will start to randomly discard the subsequent TCP
SYN packets for a period defined in Timeout. The goal for
this is prevent the TCP SYN packets’ attempt to exhaust the
limited-resource of Vigor router.
By default, the threshold and timeout values are set to
2000 packets per second and 10 seconds, respectively. That
means, when 2000 packets per second received, they will
be regarded as “attack event” and the session will be
paused for 10 seconds.
IV-1-4 Diagnose
The purpose of this function is to test when the router receiving incoming packet, which
firewall rule will be applied to that packet. The test result, including firewall rule profile, IP
address translation in packet transmission, state of the firewall fuctions and etc., also will be
shown on this page.
Info The result obtained by using Diagnose is offered for RD debug. It will be
different according to actual state such as netework connection, LAN/WAN
settings and so on.
Item Description
Mode To have a firewall rule test, specify the service type (ICMP,
UDP, TCP) of the packet and type of the IP address
(IPv4/IPv6).
Direction Set the way (from WAN or from LAN) that Vigor router
receives the first packet for test. Different way means the
firewall will process the connection initiated from LAN or
from WAN.
Test View This is a dynamic display page.
According to the direction specified, test view will display
the figure to guide you typing IP address, port number, and
MAC address.
Later, after clicking the Analyze button, the information for
the firewall rule profile and address translation will be
shown on this page.
Src IP Type the IPv4/IPv6 address of the packet’s source.
Src Port Type the port number of the packet’s source.
Src MAC Type the MAC address of the packet’s source.
Dst IP Type the IPv4/IPv6 address of the packet’s destination.
Dst Port Type the port number of the packet’s destination.
Packet & Payload In firewall diagnose, two packets belong to one connection.
In general, two packets are enough for Vigor router to
perform this test.
Enable – Check the box to send out the test packet.
Direction – The first packet of the firewall test will follow
the direction specified above. However, the direction for
the second packet might be different. Simply choose the
direction (from Computer A to B or from the B to A) for the
second packet.
Protocol – It displays the mode selected above and the
sate. If required, click the mode link to configure advanced
setting. The common service type (Customize, Ping, Trace
The following figure shows the test result after clicking Analyze. Processing state for the
fuctions (MAC Filter, QoS, User management, etc.,) related to the firewall will be displayed
by green or red LED.
The way we can use is to set two rules under Firewall. For Rule 1 of Set 2 under
Firewall>>Filter Setup is used as the default setting, we have to create a new rule starting
from Filter Rule 2 of Set 2.
1. Access into the web user interface of Vigor router.
2. Open Firewall>>Filter Setup. Click the Set 2 link and choose the Filter Rule 2 button.
Info In default, the router will check the packets starting with Set 2, Filter
Rule 2 to Filter Rule 7. If Block If No Further Match for is selected for
Filter, the firewall of the router would check the packets with the
rules starting from Rule 3 to Rule 7. The packets not matching with
the rules will be processed according to Rule 2.
4. Next, set another rule. Just open Firewall>>Filter Setup. Click the Set 2 link and
choose the Filter Rule 3 button.
5. Check Enable to enable the filter rule. Type the comments (e.g., open_ip). Click the
Edit button for Source IP.
6. A dialog box will be popped up. Choose Range Address as Address Type by using the
drop down list. Type 192.168.1.10 in the field of Start IP, and type 192.168.1.20 in the
field of End IP. Then, click OK to save the settings. The computers within the range can
access into the Internet.
Now, all the settings are configured well. Only the computers with the IP addresses within
192.168.1.10 ~ 192.168.1.20 can access to Internet.
Info The priority of URL Content Filter is higher than Web Content Filter.
Item Description
Set to Factory Default Clear all profiles.
Profile Display the number of the profile which allows you to click to
set different policy.
Name Display the name of the APP Enforcement Profile.
Item Description
Profile Name Type a name for the CSM profile. The maximum length of the
name you can set is 15 characters.
Select All Click it to choose all of the items in this page.
Clear All Uncheck all the selected boxes.
Enable Check the box to select the APP to be blocked by Vigor
router.
The profiles configured here can be applied in the Firewall>>General Setup and
Firewall>>Filter Setup pages as the standard for the host(s) to follow.
You can set eight profiles as URL content filter. Simply click the index number under Profile
to open the following web page.
Item Description
Profile Name Type a name for the CSM profile. The maximum length of the
name you can set is 15 characters.
Priority It determines the action that this router will apply.
Both: Pass – The router will let all the packages that match
with the conditions specified in URL Access Control and Web
Feature below passing through. When you choose this
setting, both configuration set in this page for URL Access
Control and Web Feature will be inactive.
Both:Block –The router will block all the packages that
match with the conditions specified in URL Access Control
and Web Feature below. When you choose this setting, both
configuration set in this page for URL Access Control and Web
Feature will be inactive.
Either: URL Access Control First – When all the packages
matching with the conditions specified in URL Access Control
and Web Feature below, such function can determine the
priority for the actions executed. For this one, the router
will process the packages with the conditions set below for
URL first, then Web feature second.
Either: Web Feature First –When all the packages matching
with the conditions specified in URL Access Control and Web
Feature below, such function can determine the priority for
the actions executed. For this one, the router will process
the packages with the conditions set below for web feature
first, then URL second.
URL Access Control Enable URL Access Control - Check the box to activate URL
Access Control. Note that the priority for URL Access
Control is higher than Restrict Web Feature. If the web
content match the setting set in URL Access Control, the
router will execute the action specified in this field and
ignore the action specified under Restrict Web Feature.
Prevent web access from IP address - Check the box to deny
any web surfing activity using IP address, such as
http://202.6.3.2. The reason for this is to prevent someone
dodges the URL Access Control. You must clear your browser
cache first so that the URL content filtering facility operates
properly on a web page that you visited before.
Action – This setting is available only when Either : URL
Access Control First or Either : Web Feature First is
selected.
Pass - Allow accessing into the corresponding webpage
with the keywords listed on the box below.
Block - Restrict accessing into the corresponding
webpage with the keywords listed on the box below.
If the web pages do not match with the keyword set
here, it will be processed with reverse action.
Exception List – Specify the object profile(s) as the
exception list which will be processed in an opposite manner
to the action selected above.
Group/Object Selections – The Vigor router provides several
frames for users to define keywords and each frame supports
multiple keywords. The keyword could be a noun, a partial
noun, or a complete URL string. Multiple keywords within a
frame are separated by space, comma, or semicolon. In
addition, the maximal length of each frame is 32-character
long. After specifying keywords, the Vigor router will decline
the connection request to the website whose URL string
matched to any user-defined keyword. It should be noticed
that the more simplified the blocking keyword list is, the
more efficiently the Vigor router performs.
After finishing all the settings, please click OK to save the configuration.
Info 1 Web Content Filter (WCF) is not a built-in service of Vigor router but a
service powered by Commtouch. If you want to use such service (trial or
formal edition), you have to perform the procedure of activation first. For
the service of formal edition, please contact with your dealer/distributor
for detailed information.
Info 2 Commtouch is merged by Cyren, and GlobalView services will be continued
to deliver powerful cloud-based information security solutions! Refer to:
http://www.prnewswire.com/news-releases/commtouch-is-now-cyren-239
025151.html
Item Description
Activate Click it to access into MyVigor for activating WCF service.
Setup Query Server It is recommended for you to use the default setting,
auto-selected. You need to specify a server for categorize
searching when you type URL in browser based on the web
content filter profile.
Setup Test Server It is recommended for you to use the default setting,
auto-selected.
Find more Click it to open http://myvigor.draytek.com for searching
another qualified and suitable server.
Cache None – the router will check the URL that the user wants to
access via WCF precisely, however, the processing rate is
normal. Such item can provide the most accurate URL
matching.
L1 – the router will check the URL that the user wants to
access via WCF. If the URL has been accessed previously, it
will be stored in the router to be accessed quickly if
required. Such item can provide accurate URL matching with
faster rate.
L2 – the router will check the URL that the user wants to
access via WCF. If the data has been accessed previously, the
IP addresses of source and destination IDs will be memorized
for a short time (about 1 second) in the router. When the
user tries to access the same destination ID, the router will
check it by comparing the record stored. If it matches, the
page will be retrieved quickly. Such item can provide URL
Eight profiles are provided here as Web content filters. Simply click the index number under
Profile to open the following web page.
The items listed in Categories will be changed according to the different service providers. If
you have and activate another web content filter license, the items will be changed
simultaneously. All of the configuration made for web content filter will be deleted
automatically. Therefore, please backup your data before you change the web content filter
license.
Item Description
Profile Name Type a name for the CSM profile. The maximum length of the
name you can set is 15 characters.
Log Pass – Only the log about Pass will be recorded in Syslog.
Block – Only the log about Block will be recorded in Syslog.
All – All the actions (Pass and Block) will be recorded in
Syslog.
Black/White List Enable – Activate white/black list function for such profile.
Group/Object Selections – Click Edit to choose the group or
object profile as the content of white/black list.
Pass - allow accessing into the corresponding webpage with
the characters listed on Group/Object Selections. If the web
pages do not match with the specified feature set here, they
After finishing all the settings, please click OK to save the configuration.
Info For DNS filter must use the WCF service profile to filter the packets,
therefore WCF license must be activated first. Otherwise, DNS filter does
not have any effect on packets.
Item Description
DNS Filter Profile Table It displays a list of different DNS filter profiles (with
After finishing all the settings, please click OK to save the configuration.
Or
Click System Maintenance>>Activation to open the following page.
6. In the following page, enter your personal information in this page and then click
Continue.
10. Click the Activate my Account link to enable the account that you created. The following
screen will be shown to verify the register process is finished. Please click Login.
12. Now, click Login. Your account has been activated. You can access into MyVigor server to
activate the service (e.g., WCF) that you want.
4. Next time when someone accesses facebook via this router, the web page would be
blocked and the following message would be displayed instead.
5. When you finished the above steps, click OK. Then, open Firewall>>General Setup.
5. When you finished the above steps, please open Firewall>>General Setup.
6. Click the Default Rule tab. Choose the profile just configured from the drop down list in
the field of URL Content Filter. Now, users cannot open any web page with the word
“facebook” inside.
1. Create an APP Enforcement Profile: Click on an Index number to create a new profile at
CSM >> APP Enforcement Profile.
For the system setup, there are several items that you have to know the way of configuration:
System Status, TR-069, Administrator Password, User Password, Login Page Greeting,
Configuration Backup, Syslog /Mail Alert, Time and Date, Management, Panel Control, Reboot
System, Firmware Upgrade, Activation, Internal Service User List and Dashboard Control.
Below shows the menu items for System Maintenance.
Item Description
Model Name Displays the model name of the router.
Firmware Version Displays the firmware version of the router.
Build Date/Time Displays the date and time of the current firmware build.
LAN MAC Address
- Displays the MAC address of the LAN Interface.
IP Address
- Displays the IP address of the LAN interface.
Subnet Mask
- Displays the subnet mask address of the LAN interface.
DHCP Server
- Displays the current status of DHCP server of the LAN
interface.
DNS
- Displays the assigned IP address of the primary DNS.
WAN Link Status
- Displays current connection status of the WAN interface.
Item Description
TR-069 Enables or disables TR-069 functionality.
ACS Server On Choose the interface for connecting the router to the Auto
Configuration Server.
ACS Server This section specifies the settings of the ACS Server.
URL – Enter the URL for connecting to the ACS. Please refer
Select OK to save changes on the page, or Clear to reset all settings to factory defaults.
Item Description
Health Parameters Check the one that Vigor router will send the status
information to VigorACS.
Threshold (for VoIP R-Factor) - Once the quality of VoIP is
lower than warning limit value or critical limit value, the
router will send the result to VigorACS.
CPE Notification Settings Enable - Check the box to select the notification item(s).
Vigor router will send the utilization status to VigorACS.
Item Description
Administrator Password The administrator can login web user interface of Vigor
router to modify all of the settings to fit the requirements.
Old Password - Enter the current password. The factory
default is “admin”.
New Password – Enter the new password. The maximum
length of the password is 23 characters.
Confirm Password – Enter the new password again for
confirmation.
Enable ‘admin’ account login to Web UI from the Internet –
Select to allow the administrator to log in from the Internet.
This option is enabled when Administrator Local User is
enabled (see below).
Use only advanced authentication method for Admin
“WAN” login – Advanced authentication method can offer a
more secure network connection. Select to require mOTP or
2-step authentication when logging in from the WAN.
Mobile one-Time Password (mOTP) – Select to allow
the use of mOTP passwords. Enter the PIN Code and
Secret settings for getting one-time passwords.
2-Step Auth code via SMS Profile and/or Mail Profile –
Select the SMS and/or Mail profiles and the destination
SMS number and/or email address for transmitting the
password.
Administrator Local User Usually, the system administrator has the highest privilege to
modify the settings on the web user interface of the Vigor
router. However, in some cases, it might be necessary to
have other users in LAN to access into the web user interface
of Vigor router.
This feature allows you to add more administrators who can
then log in to the web interface, with the same privileges as
the administrator.
Enable Local User – Check the box to allow other users to
administer the router.
Use only advanced authentication method for Admin
“WAN” login – Advanced authentication method can
offer a more secure network connection. In general,
the above basic password setting will be used for
authentication if such option is disabled. Simply check
the box to enable the following settings.
Local User List – Shows all the users that are set up to
administer the router.
Specific User – Create the new user account as the
local user. Then specify the authentication method
(dividing into Basic and Advanced) for the user account.
User Name – Enter a user name.
Authentication method – Select from Basic or
Advanced authentication methods.
Basic – Static passwords will be used to authenticate
users.
Local Password – Enter the password for the local
user.
Advanced - Mobile One-time Passwords (mOTP) or
Click OK to save changes on the page, and you will be directed to the login screen. Please log
in with the new password.
Item Description
Enable User Mode for Check this box to enable User Mode for web user interface
simple web configuration with the password typed here for simple web configuration.
The simple web user interface settings differ from those on
the full web user interface seen when logged in using the
administrator password.
Password Enter the password. The maximum length of the password is
31 characters.
Confirm Password Enter the password again for verification.
Password Strength Shows the security strength of the password specified above.
Set to Factory Default Click to return to the factory default setting.
Click OK to save changes on the page, and you will be directed to the login screen. Please
window will appear. Please log in with the new password.
Here are the steps involved in setting up the router for User Mode Access:
2. Check the box of Enable User Mode for simple web configuration to enable user mode
operation. Enter a new password in the field of New Password and click OK.
4. Log out the Vigor router web user interface by clicking the Logout button.
5. The following window will be shown. Enter the new user password in the Password field
and click Login.
Only basic settings are available in User Mode. These are a subset of the Admin Mode
settings.
This section allows you to customize the login page by adding a message and/or setting the
page title.
Item Description
Enable Check this box to enable the login customization function.
Login Page Title Enter a brief description (e.g., Welcome to DrayTek) which
will be shown on the heading of the login dialog.
Welcome Message and Enter words or sentences here. It will be displayed for
Bulletin bulletin message. In addition, it can be displayed on the
login dialog at the bottom.
Note that do not enter URL redirect link here.
Preview Click to preview the customized login window based on the
settings entered on this page.
Set to Factory Default Click to return to the factory default setting.
Below shows an example of a customized login page with the values entered in the Login Page
Title and Welcome Message and Bulletin fields.
Item Description
Restore This file is encrypted with password – Check the box and
enter a password for encrypting the configuration file.
Click the Select File button to specify a configuration file to
be restored.
Restore - Click to initiate restoration of configuration. If the
backup file is encrypted, you will be asked to enter the
password.
Backup Normal backup - Click it to perform the configuration
backup of this router.
Protect full file with password- Select to encrypt the
backup with a password. You will be prompted to enter the
password as shown below:
Info Configuration Backup does not include certificates stored on the router.
Please back up certificates separately by going to Certificate Management
>> Certificate Backup.
Item Description
Import This file is encrypted with password – Check the box and
enter a password for dencrypting the configuration file (if
the.exp file is encrypted).
Click the Select File button to specify an exp file.
Import - Click to import a configuration file. If the file is
encrypted, you will need to enter the password set on the
above password field.
Item Description
Router Name Display the name for such router configured in System
Maintenance>>Management.
If there is no name here, simply lick the link to access into
System Maintenance>>Management to set the router name.
Server IP / Hostname - The IP address / hostname of the
Syslog server.
Destination Port - Assign a port for the Syslog protocol.
Mail Syslog – Check the box to recode the mail event on
Syslog.
Enable syslog message - Check the box listed on this web
page to send the corresponding message of firewall, VPN,
User Access, Call, WAN, Router/DSL information to Syslog.
Item Description
Current System Time Click Inquire Time to retrieve the current time from the
time server.
Use Browser Time Select this option to let the router set its system time using
the time reported by the web browser.
Use Internet Time Select this option to let the router set its system time by
retrieving time information from the specified network time
server using the Network Time Protocol (NTP).
Time Server Enter the IP address / Host name of the time server.
Priority Select Auto or IPv6 First as the priority.
Time Zone Select the time zone where the router is located.
Enable Daylight Saving Check the box to enable Daylight Saving Time (DST), if it is
applicable to your location.
Advanced – Click to enter a custom schedule to enable DST.
Use the default time setting or set user defined time for your
requirement.
Default – uses the default DST schedule for the time
Select OK to save changes on the page, or Cancel to discard changes without saving.
V-1-10 SNMP
This section allows you to configure settings for SNMP and SNMPV3 services.
The SNMPv3 is more secure than SNMP through the use of encryption (supports AES and DES)
and authentication (supports MD5 and SHA) for the management needs.
Item Description
Set Community Enter the Set Community string. The default setting is
private. Devices that send requests to change settings using
set commands must pass the correct Set Community string.
The maximum length of the text is 23 characters.
Manager Host IP (IPv4) Enter the IPv4 address of hosts that are allowed to issue
SNMP commands. If this field is left blank, any IPv4 LAN host
is allowed to issue SNMP commands.
Manager Host IP (IPv6) Enter the IPv6 address of hosts that are allowed to issue
SNMP commands. If this field is left blank, any IPv6 LAN host
is allowed to issue SNMP commands.
Trap Community Enter the Trap Community string. The default setting is
public. Devices that send unsolicited messages to the SNMP
console must pass the correct Trap Community string.
The maximum length of the text is 23 characters.
Notification Host IP (IPv4) Enter the IPv4 address of hosts that are allowed to send
SNMP traps.
Notification Host IP (IPv6) Enter the IPv6 address of hosts that are allowed to send
SNMP traps.
Trap Timeout The default setting is 10 seconds.
Enable SNMPV3 Agent Check it to enable SNMPV3.
USM User USM means user-based security mode.
Enter the username to be used for authentication. The
maximum allowed length is 23 characters.
Auth Algorithm Choose one of the hashing methods to be used with the
authentication algorithm.
Select OK to save changes on the page, or Cancel to discard changes without saving.
Item Description
Router Name Enter the router name provided by ISP.
Default: Disable If enabled, the auto-logout function for the web user
Auto-Logout interface will be disabled.
The web user interface session will not terminate until you
manually click the Logout icon.
Item Description
Management Access Allow management from the Internet – Select to allow
Control system administrators to login from the Internet, and then
select the specific services that are allowed to be remotely
administered.
Disable PING from the Internet - Select to reject all PING
packets from the Internet. For increased security, this
setting is enabled by default.
Access List from the The ability of system administrators to log into the router
Internet can be restricted to up to 10 specific hosts or networks.
Apply Access List to PING - When this option is checked and
Disable PING from the Internet is unchecked, pings
originating from the Internet will be accepted only if they
are from one of the IP addresses and/or subnet masks
specified below. This option has no effect if Disable PING
Item Description
Allow management from Enable the checkbox to allow system administrators to login
LAN from LAN interface. There are several servers provided by
the system which allow you to manage the router from LAN
interface. Check the box(es) to specify.
Apply To Subnet Check the LAN interface for the administrator to use for
accessing into web user interface of Vigor router.
Index in IP Object- Type the index number of the IP object
profile. Related IP address will appear automatically.
Item Description
Reboot System Select one of the following options, and press the Reboot
Now button to reboot the router.
Using current configuration – Select this option to reboot
the router using the current configuration.
Using factory default configuration – Select this option to
reset the router’s configuration to the factory defaults
before rebooting.
Auto Reboot Time Schedule Profile - Select up to 4 user-configured schedules
Schedule to reboot the router on a scheduled basis.
Select OK to save changes on the page, or Cancel to discard changes without saving.
Info When the system pops up Reboot System web page after you configure web
settings, please click Reboot Now to reboot your router for ensuring normal
operation and preventing unexpected errors of the router in the future.
Choose the right firmware by clicking Select. Then, click Upgrade. The system will upgrade
the firmware of the router automatically.
Click OK. The following screen will appear. Please execute the firmware upgrade utility first.
Item Description
Activate via Interface Choose WAN interface used by such device for activating Web
Content Filter.
Activate The Activate link brings you accessing into www.vigorpro.com
to finish the activation of the account and the router.
Authentication Message As for authentication information of web filter, the process of
authenticating will be displayed on this field for your
reference.
Item Description
User Name Display the name of the existed user profile. To modify the
detailed settings, simply click the user name link to access
into the web page for modification.
Radius Check the box to turn on the security authentication service
offered by internal RADIUS server for the user profile.
Uncheck the box to turn off ecurity authentication service
offered by internal RADIUS server for the user profile.
If you check the box next to such item, all of the user profiles
listed in this page will be enabled with RADIUS service
enabled vice versa.
Info For the detailed setting (such as IP address, port number) configuration of
internal RADIUS, refer to Applications>>RADIUS/TACACS+.
Sessions Limit
A PC with private IP address can access to the Internet via NAT router. The router will
generate the records of NAT sessions for such connection. The P2P (Peer to Peer) applications
(e.g., BitTorrent) always need many sessions for procession and also they will occupy over
resources which might result in important accesses impacted. To solve the problem, you can
use limit session to limit the session procession for specified Hosts.
Bandwidth Limit
The downstream or upstream from FTP, HTTP or some P2P applications will occupy large of
bandwidth and affect the applications for other programs. Please use Limit Bandwidth to
make the bandwidth usage more efficient.
However, each node may take different attitude toward packets with high priority marking
since it may bind with the business deal of SLA among different DS domain owners. It’s not
easy to achieve deterministic and consistent high-priority QoS traffic throughout the whole
network with merely Vigor router’s effort.
To activate the function of limit session, simply click Enable and set the default session limit.
Available settings are explained as follows:
Item Description
Enable/Disable Enable - Click this button to activate the function of limit
session.
Disable - Click this button to close the function of limit
session.
Default Max Sessions - Defines the default session number
After finishing all the settings, please click OK to save the configuration.
To activate the function of limit bandwidth, simply click Enable and set the default upstream
and downstream limit.
Available settings are explained as follows:
Item Description
Enable / Disable Enable - Click this button to activate the function of limit
bandwidth.
IP Routed Subnet – Check this box to apply the
bandwidth limit to the second subnet specified in
LAN>>General Setup. It is available for IPv4 settings
only.
Disable - Click this button to close the function of limit
bandwidth.
Default Limit (Per User) TX Limit - Define the default speed of the upstream for each
computer in LAN.
RX Limit - Define the default speed of the downstream for
Item Description
General Setup Index – Display the WAN interface number link that you can
edit.
Enable – Check the box to enable the QoS function for WAN
interface. If it is enabled, you can configure general QoS
setting for each WAN interface.
Direction –Define which traffic the QoS Control settings
will apply to.
IN- apply to incoming traffic only.
OUT-apply to outgoing traffic only.
BOTH- apply to both incoming and outgoing traffic.
Inbound/Outbound Bandwidth –Set the connecting
rate of data input/output for other WAN. For example, if
your ADSL supports 1M of downstream and 256K
upstream, please set 1000kbps for this box. The default
value is 10000kbps.
Class 1 ~ 3 / Others –Define the ratio of bandwidth to
upstream speed and bandwidth to downstream speed.
There are four queues allowed for QoS control. The first
You can configure general setup for the WAN/LTE interface, edit the Class Rule, and edit the
Service Type for the Class Rule for your request. Click the link (WAN1 to WAN8) under Index to
access into next page for the general setup of WAN interface. As to class rule, simply click the
Add link to access into next page for configuration.
Online Statistics
Display an online statistics for quality of service for your reference. This feature is available
only when the Quality of Service for WAN interface is enabled.
Item Description
Enable UDP Bandwidth Set the limited bandwidth ratio. This is a protection of TCP
Control application traffic since UDP application traffic such as
streaming video will exhaust lots of bandwidth.
Limited_bandwidth Ratio - The ratio typed here is reserved
for limited bandwidth of UDP application.
Outbound TCP ACK The difference in bandwidth between download and upload
Prioritize are great in ADSL2+ environment. For the download speed
might be impacted by the uploading TCP ACK, you can check
this box to push ACK of upload faster to speed the network
traffic.
Info The rate of outbound/inbound must be smaller than the real bandwidth to
ensure correct calculation of QoS. It is suggested to set the bandwidth value
for inbound/outbound as 80% - 85% of physical network speed provided by
ISP to maximize the QoS performance.
2. For adding a new rule, click Add to open the following page.
Item Description
Enable Check this box to invoke these settings.
IP Version Please specify which protocol (IPv4 or IPv6) will be used for
this rule.
By the way, you can set up to 20 rules for one Class. If you want to edit an existed rule, please
select the radio button of that one and click Edit to open the rule edit page for modification.
User Management is a security feature which disallows any IP traffic (except DHCP-related
packets) from a particular host until that host has correctly supplied a valid username and
password. Instead of managing with IP address/MAC address, User Management function
manages hosts with user account. Network administrator can give different firewall policies
or rules for different hosts with different User Management accounts. This is more flexible
and convenient for network management. Not only offering the basic checking for Internet
access, User Management also provides additional firewall rules, e.g. CSM checking for
protecting hosts.
Info Filter rules configured under Firewall usually are applied to the host (the
one that the router installed) only. With user management, the rules can be
applied to every user connected to the router with customized profiles.
Item Description
Mode Selection There are two modes offered here for you to choose. Each
mode will bring different filtering effect to the users
involved.
User-Based - If you choose such mode, the router will apply
the filter rules configured in User Management>>User
After finishing all the settings here, please click OK to save the configuration.
To set the user profile, please click any index number link to open the following page. Notice
that profile 1 (admin) and profile 2 (Dial-In User) are factory default settings. Profile 2 is
reserved for future use.
Item Description
Common Settings Enable this account - Check this box to enable such user
profile.
Username - Type a name for such user profile (e.g.,
LAN_User_Group_1, WLAN_User_Group_A,
WLAN_User_Group_B, etc). When a user tries to access
Internet through this router, an authentication step must be
performed first. The user has to type the User Name
specified here to pass the authentication. When the user
passes the authentication, he/she can access Internet via
this router. However the accessing operation will be
restricted with the conditions configured in this user profile.
The maximum length of the name you can set is 24
characters.
Password - Type a password for such profile (e.g., lug123,
wug123,wug456, etc). When a user tries to access Internet
through this router, an authentication step must be
performed first. The user has to type the password specified
here to pass the authentication. When the user passes the
– Click this box to set and increase the time quota for
such profile.
Enable Data Quota - Data Quota means the total amount for
data transmission allowed for the user. The unit is MB/GB.
– Click this box to set and increase the data quota for
such profile.
After finishing all the settings here, please click OK to save the configuration.
Please click any index number link to open the following page.
User defined
object – others
Item Description
Name Type a name for this user group.
Available User Objects You can gather user profiles (objects) from User Profile page
within one user group. All the available user objects that you
have created will be shown in this box. Notice that user
object, Admin and Dial-In User are factory settings. User
defined profiles will be numbered with 3, 4, 5 and so on.
Selected Keyword Objects
Click button to add the selected user objects in this
box.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Refresh Seconds Use the drop down list to choose the time interval of
refreshing data flow that will be done by the system
automatically.
Refresh Click this link to refresh this page manually.
Index Display the number of the data flow.
User Display the users which connect to Vigor router currently.
You can click the link under the username to open the user
profile setting page for that user.
IP Address Display the IP address of the device.
Profile Display the authority of the account.
Last Login Time Display the login time that such user connects to the router
last time.
Expired Time Display the expired time of the network connection for the
user.
Data Quota Display the quota for data transmission.
Idle Time Display the idle timeout setting for such profile.
Action Block - can avoid specified user accessing into Internet.
Unblock – allow the user to access into Internet.
Logout – the user will be logged out forcefully.
Item Description
Refresh Seconds Use the drop down list to choose the time interval of
refreshing data flow that will be done by the system
automatically.
Refresh Click this link to refresh this page manually.
IP Address Displays the IP address of the client in LAN.
MAC Address Displays the MAC address of the client in LAN.
User Name Displays the name of user connecting to Vigor router
currently. You can click the link under the username to open
the user profile setting page for that user.
Rx Bytes Displays the speed of octets received through such PPPoE
user.
Tx Bytes Displays the speed of octets transmitted through such PPPoE
user.
Up Time Displays the connection time of such PPPoE user.
With User Management authentication function, before a valid username and password have
been correctly supplied, a particular client will not be allowed to access Internet through the
router. There are three ways for authentication: Web, Alert Tool and Telnet.
After that, the web authentication window will appear. Input the user name and the
password for your account (defined in User Management) and click Login.
Note, if you block the web browser to pop up any window, you will not see such window.
If the authentication is failed, you will get the error message, The username or password
you entered is incorrect. Please login again.
In above description, you access an external web site to trigger the authentication. You
may also directly access the router’s Web UI for authentication. Both HTTP and HTTPS
are supported, for example http://192.168.1.1 or https://192.168.1.1 . Replace
192.168.1.1 with your router’s real IP address, and add the port number if the default
management port has been modified.
If the authentication is successful, you will get the Welcome Message that is set in the
User Management >> General Setup page.
Also you will get a Tracking Window if you don’t block the pop-up window.
Don’t setup a user profile in User Management and a VPN Remote Dial-in user profile
with the same Username. Otherwise, you may get unexpected result. It is because the
VPN Remote Dial-in User profiles can be extended to the User profiles in User
Management for authentication.
There are two different behaviors when a User Management account and a VPN profile
share the same Username:
If SSL Tunnel or SSL Web Proxy is disabled in the VPN profile, a User
Management account and a remote dial-in VPN profile can use the same
Username, even with different passwords. However, we recommend you to use
different usernames for different user profiles in User Management and VPN
profiles.
2. Type the password for authentication and press Enter. The message User login
successful will be displayed with the expired time (if configured).
Info Here expired time is “Unlimited” means the Time Quota function is not
enabled for this account. After login, this account will not be expired
until it is logout.
3. In the Web interface of router, the configuration page of Time Quota is shown as below.
You will get the following message. The expired time is shown after you login.
After you run out the available time, you can’t use this account any more until the
administrator manually adds additional time for you.
2. You may get the VigorPro Alert Notice Tool from the following link:
http://www.draytek.com/user/SupportDLUtility.php
Info 1 Any modification to the Firewall policy will break down the
connections of all current users. They all have to authenticate again
for Internet access.
Info 2 The administrator may check the current users from User Online
Status page.
Example 1:Users can see the message for landing page after logging into Internet
successfully
1. Open the web user interface of Vigor3910.
2. Open User Management -> General Setup to get the following page. In the field of
Landing Page, please type the words of “Login Success”. Please note that the
maximum number of characters to be typed here is 255.
3. Now you can enable the Landing Page function. Open User Management -> User Profile
and click one of the index number (e.g., index number 3) links.
5. Open any browser (e.g., FireFox, Internet Explorer). The logging page will appear and
asks for username and password. Please enter the correct username and password.
6. Click Login. If the logging is successful, you will see the message of Login Success from
the browser you use.
2. Next, enable the Landing Page function. Open User Management -> User Profile and
click one of the index number (e.g., index number 3) links.
4. Open any browser (e.g., FireFox, Internet Explorer). The logging page will appear and
asks for username and password. Please enter the correct username and password.
5. Click Login. If the logging is successful, you will be directed into the website of
www.draytek.com.
The Hotspot Web Portal feature allows you to set up profiles so that LAN users could either be
redirected to specific URLs, or be shown messages when they first attempt to connect to the
Internet through the router. Users could be required to read and agree to terms and
conditions, or authenticate themselves prior to gaining access to the Internet. Other
potential uses include the serving of advertisements and promotional materials, and
broadcast of public service announcements.
Item Description
Index Click the index number link to view or update the profile
settings.
Enable Check the box to enable the profile.
Comments Shows the description of the profile.
Login Mode Shows the login mode used by the profile. See the section
Login Mode for details.
Applied Interface Shows the interfaces to which this profile applies.
Preview Click this button to preview the Hotspot Web Portal page that
will be displayed to users.
(B) Click-through
The following page will be shown to the users when they first attempt to access the Internet
through the router. After clicking Accept on the page, users will be directed to the landing
page (defined in Captive Portal URL) and be granted access to the Internet.
Login Method
Click the index link (e.g., #1) of the selected profile to display the following page.
Item Description
Enable this profile Check to enable this profile.
Comments Enter a brief description to identify this profile.
Portal Server
Portal Method There are four methods to be selected as for portal server.
When Skip Loging, landing page only or Click through is selected as Portal Method
Captive Portal URL Enter the captive portal URL.
If you have chosen Skip Login, landing page only or External Portal Server as the portal
method, skip to step 4 Whitelisting below.
Otherwise, proceed to configure the login page by following steps 2 and 3.
If you have selected a Login Mode that requires authentication, select a background for the
login page.
Item Description
Choose Login Select either Color Background or Image Background as the login
Background page background scheme.
Browser Tab Title Enter the text to be shown as the webpage title in the browser.
If you have selected Skip Login, landing page only or External Portal Server as the portal
method, proceed to Step 4 Whitelist Setting; otherwise, continue to Step 3 Login Page Setup.
In this step you can configure settings for the login page.
Click Through
This section describes the Login Page setup if you have selected Click Through as the Login
Method.
Item Description
Welcome Message Enter the text to be displayed as the welcome message.
Terms and Enter the text to be displayed as the Terms and Conditions
Settings that are common to Facebook, Google, PIN, and RADIUS authentication are:
Item Description
Welcome Message Enter the text to be displayed as the welcome message.
Terms and Enter the text to be displayed as the Terms and Conditions
Conditions hyperlink text.
Description
Terms and Enter the text to be displayed in the Terms and Conditions pop-up
Conditions Content window.
Item Description
Facebook Login Enter the text to be displayed on the Facebook login button.
Description
Item Description
Google Login Enter the text to be displayed on the Google login button.
Description
Item Description
Hint Message for PIN Enter the text used to suggest users to choose SMS authentication.
Receiving PIN via Enter the text to be displayed on the button that the user clicks to
SMS Description receive an SMS PIN.
Receiving PIN via Enter the message to be sent by SMS to inform the user of the PIN.
SMS Content The PIN variable is specified by <PIN> within the message.
Enter PIN Enter message to be displayed in the PIN textbox to prompt the
Description user to enter the PIN.
Submit Button Enter the text to be displayed on the submit PIN button
Description
Submit Button Color Select the color of the submit button from the predefined color
list, or select Customize Color and enter the RGB value. Click
Preview to preview the selected color.
Item Description
Hint Message for Enter the text used to prompt the user to login.
RADIUS
RADIUS Account Enter the text to prompt the user to enter the username.
Description
RADIUS Password Enter the text to prompt the user to enter the password.
Description
Login Button Enter the text to be displayed on the login button.
Description
Login Button Color Select the color of the login button from the predefined color list,
or select Customize Color and enter the RGB value. Click Preview
to preview the selected color.
And finally, the save and cancel buttons are always displayed.
Item Description
Save and Next Click to save the configuration on this page and proceed to the
next page.
Cancel Click to abort the configuration process and return to the profile
summary page.
Item Description
Back Button Enter text for the label of the hyperlink to return to the previous
Description page.
PIN Code Message Enter text to be displayed as the body text on the page.
Default Country Select the default country code to be displayed using the dropdown
In this step you can configure the whitelist settings. Users are allowed to send and receive
traffic that satisfies whitelist settings.
Item Description
NAT Rules To prevent web portal settings from conflicting with NAT rules
resulting in unexpected behavior, select the NAT rules that are
allowed to bypass the web portal. Hosts listed in selected NAT
rules can always access the Internet without being intercepted by
the web portal.
Dest Domain Enter up to 30 destination domains that are allowed to be
accessed.
Dest IP Enter up to 30 destination IP addresses that are allowed to be
accessed.
Dest Port Enter up to 30 destination protocols and ports that are allowed
through the router.
Source IP Enter up to 30 source IP addresses that are allowed through the
router.
Save and Next Click to save the configuration on this page and proceed to the
next page.
Cancel Click to abort the configuration process and return to the profile
summary page.
In this step you can configure advanced options for the Hotspot Web Portal.
Item Description
Quota Management
Expired Time After Enter the time duration that users are allowed to have Internet
Activation access after logging in.
Item Description
Bandwidth Limit Check the box to override the policy configured in Bandwidth
Management>>Bandwidth Limit.
Session Limit Check the box to override the policy configured in Bandwidth
Management>>Session Limit.
Quota Policy Profile Add - Create up to 20 policy profiles in such page.
Item Description
Profile Name Enter a name for a new profile.
Account Validity Set the duration for which the login is valid.
Expired Time After the First Login – Sets the days, hours, and
minutes. After the login has expired, Vigor router will block the
client from accessing the network/Internet.
Idle Timeout – When this option is selected, Vigor router will
terminate the network connection if the is no activity from the
user after the specified idle time has passed.
Device Control Set the maximum number of devices that can be connected for
each account, and the time restriction for the client accessing
Internet via the web portal.
Devices Allowed per account – Use the drop-down list to select
the maximum number of devices that can be connected to the
network using the same account.
Reconnection Time Restriction – Blocks the account from being
used to connect devices to the network in one of two ways:
At …. Everyday – After the login expires, the account cannot
be used to connect devices to the network until the set time
of day.
Hours.. min – After the login expires, the account cannot be
used to connect devices to the network for a set period of
time.
Bandwidth and Bandwidth Limit – Check the box to configure bandwidth limit for
After finishing all the settings here, please click OK to save the configuration.
A-1 How to allow users login to Vigor’s Hotspot with their social media accounts
(e.g., Facebook & Google)
Vigor Router supports Hotspot Web Portal function. The network administrator can set Vigor
Router as a Hotspot provider with web authentication and allow users to log in with their
social media accounts, such as Facebook and Google. We demonstrate how to set up the
hotspot web portal with Facebook login in the following paragraphs.
You can click the Step Icon on the top of the page to go to the step you want. The router
will save your setting automatically.
6. You can set the Whitelist for the profile here to allow specific clients to access the
internet or certain websites can be visited without login.
8. Then the Hotspot setup is finished. You may click Preview to check the login page.
Due to security concerns, the browser might warns that it cannot verify server
identity, the clients would need to tap "Continue" before they can proceed to
portal.draytek.com.
The client might not be able to access "portal.draytek.com" if this domain name
is resolved by a DNS server on LAN. If so, set up LAN DNS to make sure the domain
name will be resolved to the router's LAN IP.
10. Tap on a login method, and it will open the social media login page. Enter the social
media accounts and password to log in.
User Information
Network administrator can plug the USB disk to router, to record the basic information of the
users who connect to the Wi-Fi and login with their social media accounts. The users' basic
information will be listed on Hotspot Web Portal >> Users Information page.
2. Create an SMS Object to send SMS messages. Go to Objects Setting >> SMS Service
Object, and click on an available profile.
5. Enable the profile, give a comment, and choose “PIN Code Login”. Then click Next.
10. Now, the hotspot settings are applied to the selected interfaces. You may click Preview
to check how the login page looks.
12. Enter the mobile phone number to receive the SMS message.
14. Enter the password on the login page, and click Login.
Define objects such as IP address, service type, keyword, file extension and others. These
pre-defined objects can be applied in CSM.
VI-1-1 IP Object
For IPs in a range and service ports in a limited range usually will be applied in configuring
router’s settings, therefore we can define them with objects and bind them with groups for
using conveniently. Later, we can select that object/group that can apply it. For example, all
the IPs in the same department can be defined with an IP object (a range of IP address).
You can set up to 192 sets of IP Objects with different conditions.
Item Description
View Use the drop down list to choose a type (Single Address,
Range Address, Subnet Address, Mac Address or all) that IP
object with the selected type will be shown on this page.
Set to Factory Default Clear all profiles.
Search Type a string of the IP object that you want to search.
Index Display the profile number that you can configure.
Name Display the name of the object profile.
Address Display the IP address configured for the object profile.
Export IP Object Usually, the IP objects can be created one by one through
the web page of Objects>>IP Object. However, to a user
who wants to save more time in bulk creating IP objects, a
quick method is offered by Vigor router to modify the IP
objects with a single file, a CSV file.
All of the IP objects (or the template) can be exported as a
file by clicking Download. Then the user can open the CSV
file through Microsoft Excel and modify all the IP objects at
the same time.
Backup the current IP Objects with a CSV file – Click it to
backup current IP objecsts as a CSV file. Such file can be
Item Description
Name Type a name for this profile. Maximum 15 characters are
allowed.
Interface Choose a proper interface.
For example, the Direction setting in Edit Filter Rule will
ask you specify IP or IP range for WAN or LAN/RT/VPN or any
IP address. If you choose LAN/RT/VPN as the Interface here,
and choose LAN/RT/VPN as the direction setting in Edit
Filter Rule, then all the IP addresses specified with LAN
/RT/VPN interface will be opened for you to choose in Edit
Filter Rule page.
Address Type Determine the address type for the IP address.
Select Single Address if this object contains one IP address
only.
Select Range Address if this object contains several IPs
within a range.
Select Subnet Address if this object contains one subnet for
IP address.
Select Any Address if this object contains any IP address.
Select Mac Address if this object contains Mac address.
MAC Address Type the MAC address of the network card which will be
controlled.
Start IP Address Type the start IP address for Single Address type.
4. After finishing all the settings here, please click OK to save the configuration. Below is
an example of IP objects settings.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the group profile.
3. After finishing all the settings here, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the object profile.
Item Description
Name Type a name for this profile. Maximum 15 characters are
allowed.
Address Type Determine the address type for the IPv6 address.
Select Single Address if this object contains one IPv6 address
only.
Select Range Address if this object contains several IPv6s
within a range.
Select Subnet Address if this object contains one subnet for
IPv6 address.
Select Any Address if this object contains any IPv6 address.
Select Mac Address if this object contains Mac address.
Mac Address Type the MAC address of the network card which will be
controlled.
Start IP Address Type the start IP address for Single Address type.
End IP Address Type the end IP address if the Range Address type is
selected.
Prefix Length Type the number (e.g., 64) for the prefix length of IPv6
address.
Invert Selection If it is checked, all the IPv6 addresses except the ones listed
above will be applied later while it is chosen.
3. After finishing all the settings, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the group profile.
Item Description
Name Type a name for this profile. Maximum 15 characters are
allowed.
Available IPv6 All the available IPv6 objects with the specified interface
Objects chosen above will be shown in this box.
Selected IPv6 Objects Click >> button to add the selected IPv6 objects in this box.
3. After finishing all the settings, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the object profile.
Item Description
Name Type a name for this profile. Maximum 15 characters are
allowed.
Protocol Specify the protocol(s) which this profile will apply to.
Source/Destination Source Port and the Destination Port columns are available
Port for TCP/UDP protocol. It can be ignored for other protocols.
The filter rule will filter out any port number.
(=) – when the first and last value are the same, it indicates
one port; when the first and last values are different, it
indicates a range for the port and available for this profile.
(!=) – when the first and last value are the same, it indicates
all the ports except the port defined here; when the first and
last values are different, it indicates that all the ports
except the range defined here are available for this service
type.
(>) – the port number greater than this value is available.
(<) – the port number less than this value is available for this
profile.
3. After finishing all the settings, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the group profile.
Item Description
Name Type a name for this profile. Maximum 15 characters are
allowed.
Available Service All the available service objects that you have added on
Type Objects Objects Setting>>Service Type Object will be shown in this
box.
Selected Service Type Click >> button to add the selected IP objects in this box.
Objects
3. After finishing all the settings, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the object profile.
Item Description
Name Type a name for this profile, e.g., game. Maximum 15
characters are allowed.
Contents Type the content for such profile. For example, type
gambling as Contents. When you browse the webpage, the
page with gambling information will be watched out and be
passed/blocked based on the configuration on Firewall
settings.
3. After finishing all the settings, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the group profile.
Item Description
Name Type a name for this group. Maximum 15 characters are
allowed.
Available Keyword You can gather keyword objects from Keyword Object page
Objects within one keyword group. All the available Keyword
objects that you have created will be shown in this box.
Selected Keyword
Objects Click button to add the selected Keyword objects in
this box.
3. After finishing all the settings, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all profiles.
Index Display the profile number that you can configure.
Name Display the name of the object profile.
Item Description
Profile Name Type a name for this profile. The maximum length of the
name you can set is 7 characters.
3. Type a name for such profile and check all the items of file extension that will be
processed in the router. Finally, click OK to save this profile.
Item Description
Set to Factory Default Clear all of the settings and return to factory default
settings.
Index Display the profile number that you can configure.
Profile Display the name for such SMS profile.
SMS Provider Display the service provider which offers SMS service.
Item Description
Profile Name Type a name for such SMS profile. The maximum length of
the name you can set is 31 characters.
Service Provider Use the drop down list to specify the service provider which
offers SMS service.
Username Type a user name that the sender can use to register to
selected SMS provider.
The maximum length of the name you can set is 31
characters.
Password Type a password that the sender can use to register to
selected SMS provider.
The maximum length of the password you can set is 31
characters.
Quota Type the number of the credit that you purchase from the
service provider chosen above.
Note that one credit equals to one SMS text message on the
standard route.
Sending Interval To avoid quota being exhausted soon, type time interval for
sending the SMS.
3. After finishing all the settings here, please click OK to save the configuration.
You can click the number (e.g., #9) under Index column for configuration in details.
Item Description
Profile Name Display the name of this profile. It cannot be modified.
Service Provider Type the website of the service provider.
Type the URL string in the box under the filed of Service
Provider. You have to contact your SMS provider to obtain
the exact URL string.
Username Type a user name that the sender can use to register to
selected SMS provider.
The maximum length of the name you can set is 31
After finishing all the settings here, please click OK to save the configuration.
Item Description
Set to Factory Default Clear all of the settings and return to factory default
settings.
Index Display the profile number that you can configure.
Profile Display the name for such mail server profile.
Item Description
Profile Name Type a name for such mail service profile. The maximum
length of the name you can set is 31 characters.
SMTP Server Type the IP address of the mail server.
SMTP Port Type the port number for SMTP server.
Sender Address Type the e-mail address of the sender.
Use SSL Check this box to use port 465 for SMTP server for some
e-mail server uses https as the transmission method.
Authentication The mail server must be authenticated with the correct
username and password to have the right of sending message
out. Check the box to enable the function.
Username – Type a name for authentication. The maximum
length of the name you can set is 31 characters.
Password – Type a password for authentication. The
maximum length of the password you can set is 31
characters.
Sending Interval Define the interval for the system to send the SMS out.
Item Description
Profile Name Type a name for such notification profile. The maximum
length of the name you can set is 15 characters.
Category Display the types that will be monitored.
Status Display the status for the category. You can check the box
you want to be monitored.
For example, the check box of CPE firmware Upgrade Fail
under the category of Central VPN Management is checked.
Once such profile is enabled, Vigor router system will send
out notification to the recipient via SMS.
3. After finishing all the settings here, please click OK to save the configuration.
Item Description
Add Click it to open the following page for adding a new string
object.
Set to Factory Default Click it to clear all of the settings in this page.
Index Display the number link of the string profile.
String Display the string defined.
Clear Choose the string that you want to remove. Then click this
check box to delete the selected string.
The country object, by grouping IP addresses for multiple countries, can be applied by other
functions such as router policy destination (refer to the following figure for example).
Item Description
Name Type a name for such profile. The maximum length of the
name you can set is 15 characters.
Available Country / Select any country from Available Country. Click >> to move
Selected Country the selected country and place on Selected Country.
Check the box(es) for the country/countries to be blocked by
Firewall.
Note that one country profile can contain 1 up to 16
countries.
3. After finishing all the settings here, please click OK to save the configuration.
A-1 How to Send a Notification to Specified Phone Number via SMS Service in
WAN Disconnection
Follow the steps listed below:
1. Log into the web user interface of Vigor router.
2. Configure relational objects first. Open Object Settings>>SMS/Mail Server Object to
get the following page.
Index 1 to Index 8 allows you to choose the built-in SMS service provider. If the SMS
service provider is not on the list, you can configure Index 9 and Index 10 to add the new
service provider to Vigor router.
3. Choose any index number (e.g., Index 1 in this case) to configure the SMS Provider
setting. In the following page, type the username and password and set the quota that
the router can send the message out.
6. Choose any index number (e.g., Index 1 in this case) to configure conditions for sending
the SMS. In the following page, type the name of the profile and check the Disconnected
and Reconnected boxes for WAN to work in concert with the topic of this paper.
8. Now, open Application >> SMS / Mail Alert Service. Use the drop down list to choose
SMS Provider and the Notify Profile (specify the time of sending SMS). Then, type the
phone number in the field of Recipient (the one who will receive the SMS).
9. Click OK to save the settings. Later, if one of the WAN connections fails in your router,
the system will send out SMS to the phone number specified. If the router has only one
WAN interface, the system will send out SMS to the phone number while reconnecting
the WAN interface successfully.
This section will guide you to solve abnormal situations if you cannot access into the Internet
after installing the router and finishing the web configuration. Please follow sections below to
check your basic installation status stage by stage.
Checking if the hardware status is OK or not.
Checking if the network connection settings on your computer are OK or not.
Pinging the router from your computer.
Checking if the ISP settings are OK or not.
Backing to factory default setting if necessary.
If all above stages are done and the router still cannot run normally, it is the time for you to
contact your dealer or DrayTek technical support for advanced help.
Fisrt, take a look at the menu items under Diagnostics. Diagnostic Tools provide a useful way
to view or diagnose the status of your Vigor router.
Item Description
Decoded Format It shows the source IP address (local), destination IP
(remote) address, the protocol and length of the package.
Refresh Click it to reload the page.
Item Description
Refresh Click it to reload the page.
Item Description
Refresh Click it to reload the page.
Item Description
Refresh Click it to reload the page.
Item Description
Index It displays the connection item number.
IP Address It displays the IP address assigned by this router for specified
PC.
MAC Address It displays the MAC address for the specified PC that DHCP
assigned IP address for it.
Leased Time It displays the leased time of the specified PC.
HOST ID It displays the host ID name of the specified PC.
Refresh Click it to reload the page.
Item Description
Private IP:Port It indicates the source IP address and port of local PC.
#Pseudo Port It indicates the temporary port of the router used for NAT.
Peer IP:Port It indicates the destination IP address and port of remote
host.
Interface It displays the representing number for different interface.
Refresh Click it to reload the page.
Item Description
Clear Click this link to remove the result on the window.
Refresh Click it to reload the page.
When an entry’s TTL is Check the box the type the value of TTL (time to live) for
larger than…. each entry. Click OK to enable such function.
It means when the TTL value of each DNS query reaches the
threshold of the value specified here, the corresponding
record will be deleted from router’s Cache automatically.
or
Item Description
IPV4 / IPV6 Choose the interface for such function.
Ping through Use the drop down list to choose the WAN interface that you
want to ping through or choose Auto to be determined by the
router automatically.
Ping to Use the drop down list to choose the destination that you
Click Diagnostics and click Data Flow Monitor to open the web page. You can click IP Address,
TX rate, RX rate or Session link for arranging the data display.
Item Description
Enable Data Flow Monitor Check this box to enable this function.
Refresh Seconds Use the drop down list to choose the time interval of
refreshing data flow that will be done by the system
The horizontal axis represents time. Yet the vertical axis has different meanings. For
WAN1/WAN3/WAN5/WAN6/WAN7/WAN8 Bandwidth chart, the numbers displayed on vertical
axis represent the numbers of the transmitted and received packets in the past.
For Sessions chart, the numbers displayed on vertical axis represent the numbers of the NAT
sessions during the past.
or
Item Description
IPv4 / IPv6 Click one of them to display corresponding information for it.
Trace through Use the drop down list to choose the interface that you want
to ping through.
Item Description
Enable Web Syslog Check this box to enable the function of Web Syslog.
Syslog Type Use the drop down list to specify a type of Syslog to be
displayed.
Export Click this link to save the data as a file.
Refresh Click this link to refresh this page manually.
Clear Click this link to clear information on this page.
Display Mode There are two modes for you to choose.
Item Description
Refresh Click this link to refresh this page manually.
Item Description
Details/Back Details – Click it to display detailed status about HA
configuration for the selected router.
Back – Return to previous page.
HA Setup Click it to open Applications>>High Availability for modifying
the configuration.
Renew Click it to get the newest status of other router (except the
primary router).
Refresh Click it to get the newest status of the primary router.
Status “!” means an error has occurred. Refer to Detailed
information and modify HA settings if required.
Router Name Display the name of the device.
IP Display the IPv4 address of such router.
Role “Down” means the function of HA is disabled.
“Primary” means such router stands for the primary router in
HA.
“Secondary” means such router stands for the secondary
router in HA.
Stable “No” means the primary router has not been determined yet.
DARP is negotiating.
“YES” means the primary router is determined.
WAN “At Least One UP” means that at least one WAN interface
connects to Internet.
Cick the link of Status, Router Name, IPv4 or Details, the following page will be displayed on
the screen.
Item Description
Enable Check the box to enable such function.
Refresh Click it to update current page.
Clear Click it to remove all of the records.
Syslog Type Specify RADIUS, 802.1X or All to display related authentication
information log.
Display Mode Choose the mode you want to display the related information
on the following table.
Stop record when fulls – when the capacity of CVM log is
full, the system will stop recording.
Always record the new event – only the newest events
will be recorded by the system.
Time Display the time the user authenticated by Vigor3910 series.
Message Display authentication information done by Vigor3910 series.
Info The icon - - means there is something wrong (e.g., attacking the
system) with that IP address.
or
Item Description
Mode Analyze a single packet – Choose such mode to make Vigor
router analyze how a single packet will be sent by a route
policy.
Analyze multiple packets… - Choose such mode to make Vigor
router analyze how multiple packets in a specified file will be
sent by a route policy.
Packet Information Specify the nature of the packets to be analyzed by Vigor
router.
ICMP/UDP/TCP/ANY- Specify a protocol for diagnosis.
Src IP – Type an IP address as the source IP.
Dst IP – Type an IP address as the destination IP.
Dst Port – Use the drop down list to specify the destination
port.
Analyze – Click it to perform the job of analyzing. The
analyzed result will be shown on the page..
3. If not, it means that there is something wrong with the hardware status. Simply back to
“I-2 Hardware Installation” to execute the hardware installation again. And then, try
again.
Sometimes the link failure occurs due to the wrong network connection settings. After trying
the above section, if the link is stilled failed, please do the steps listed below to make sure
the network connection settings is OK.
For Windows
Info The example is based on Windows 7. As to the examples for other operation
systems, please refer to the similar steps or find support notes in
www.DrayTek.com.
3. Icons of network connection will be shown on the window. Right-click on Local Area
Connection and click on Properties.
The default gateway IP address of the router is 192.168.1.1. For some reason, you might need
to use “ping” command to check the link status of the router. The most important thing is
that the computer will receive a reply from 192.168.1.1. If not, please check the IP
address of your computer. We suggest you setting the network connection as get IP
automatically. (Please refer to the section VIII-3)
Please follow the steps below to ping the router correctly.
For Windows
1. Open the Command Prompt window (from Start menu> Run).
2. Type command (for Windows 95/98/ME) or cmd (for Windows NT/ 2000/XP/Vista/7/8).
The DOS command dialog will appear.
3. Type ping 192.168.1.1 and press [Enter]. If the link is OK, the line of “Reply from
192.168.1.1:bytes=32 time<1ms TTL=255” will appear.
4. If the line does not appear, please check the IP address setting of your computer.
If WAN connection cannot be up, check if the LEDs (according to the LED explanations listed
on section I-1) are correct or not. If the LEDs are off, please:
Change the Physical Type from Auto negotiation to other values (e.g., 100M full duplex).
Next, change the physical type of modem (e.g., DSL/FTTX(GPON)/Cable modem) offered
by ISP with the same value configured in Vigor router. Check if the LEDs on Vigor router
are on or not.
If not, please install an additional switch for connecting both Vigor router and the modem
offered by ISP. Then, check if the LEDs on Vigor router are on or not.
If the problem of LEDs cannot be solved by the above measures, please contact with the
nearest reseller, or send an e-mail to DrayTek FAE for technical support.
Check if the settings offered by ISP are configured well or not.
When the LEDs are on and correct, yet the WAN connection still cannot be up, please:
Open WAN >> Internet Access page and then check whether the ISP settings are set
correctly. Click Details Page of WAN1~WAN8 to review the settings that you configured
previously.
Sometimes, a wrong connection can be improved by returning to the default settings. Try to
reset the router by software or hardware. Such function is available in Admin Mode only.
Info After pressing factory default setting, you will loose all settings you did
before. Make sure you have recorded all useful settings before you pressing.
The password of factory default is null.
Software Reset
You can reset the router to factory default via Web page. Such function is available in Admin
Mode only.
Go to System Maintenance and choose Reboot System on the web page. The following screen
will appear. Choose Using factory default configuration and click Reboot Now. After few
seconds, the router will return all the settings to the factory settings.
After restore the factory default setting, you can configure the settings for the router again
to fit your personal request.
If the router still cannot work correctly after trying many efforts, please contact your dealer
for further help right away. For any questions, please feel free to send e-mail to
support@DrayTek.com.
DrayTek provided free SmartVPN for Windows-based users to easily establish VPN tunnels.
There were million downloads. Now, DrayTek released Android-based SmartVPN app for those
who would like to set up SSL VPN connection with the VPN server working at the main office.
The SmartVPN app is available for your free download! Then, you can use the SmartVPN App
on smartphone/tablet PC to establish SSL VPN tunnels with your main office.
2. Download the APP from Google play, and run the APP.
This chapter also gives you a general description for accessing telnet and describes the
firmware versions for the routers explained in this manual.
Info For Windows 7 user, please make sure the Windows Features of Telnet
Client has been turned on under Control Panel>>Programs.
Type cmd and press Enter. The Telnet terminal will be open later.
In the following window, type Telnet 192.168.1.1 as below and press Enter. Note that the IP
address in the example is the default address of the router. If you have changed the default,
enter the current IP address of the router.
Next, type admin/admin for Account/Password. Then, type ?. You will see a list of
valid/common commands depending on the router that your use.
Syntax
csm appe prof -i INDEX [-v | -n NAME|setdefault]
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 32.
-v View the configuration of the CSM profile.
-n Set a name for the CSM profile.
NAME Specify a name for the CSM profile, less then 15 characters.
setdefault Reset to default settings.
Example
> csm appe prof -i 1 -n games
The name of APPE Profile 1 was setted.
Syntax
csm appe set -i INDEX [-v GROUP| -e AP_IDX | -d AP_IDX| -a AP_IDX [ACTION]]
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 32.
-v View the IM/P2P/Protocol and Others configuration of the CSM
profile.
-e Enable to block specific application.
-d Disable to block specific application.
-a Set the action of specific application
GROUP Specify the category of the application. Available options are: IM,
P2P, Protocol and Others.
AP_IDX Each application has independent index number for identification in
CLI command.
Specify the index number of the application here. If you have no
idea of the inex number, do the following (Take IM as an example):
Type “csm appe set –I 1 –v IM”, the system will list all of the index
numbers of the applications categorized under IM.
ACTION Specify the action of the application, 0 or 1.
0: Block. All of the applications meet the CSM rule will be blocked.
1: Pass. All of the applications meet the CSM rule will be passed.
Syntax
csm appe show [-a|-i|-p|-t|-m]
Syntax Description
Parameter Description
-a View the configuration status for All groups.
-i View the configuration status of IM group.
-p View the configuration status of P2P group.
-t View the configuration status of protocol group.
-m View the configuration status of Others group.
Example
>csm appe show -t
Syntax
csm appe config -v INDEX [-i|-p|-t|-m]
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 32.
-i View the configuration status of IM group.
-p View the configuration status of P2P group.
Example
> csm appe config -v 1 -m
Syntax
csm appe interface [AUTO/WAN#]
Syntax Description
Parameter Description
AUTO Vigor router specifies WAN interface automatically.
WAN Specify the WAN interface for signature downloading.
Example
> csm appe interface wan1
Download interface is set as "WAN1" now.
> csm appe interface auto
Download interface is set as "auto-selected" now.
Syntax
csm appe email [-e|-d|-s]
Syntax Description
Example
> csm appe email -e
Enable APPE email.
Syntax
csm ucf show
csm ucf setdefault
csm ucf msg MSG
csm ucf obj INDEX [-n PROFILE_NAME | -l [P|B|A|N] | uac | wf ]
csm ucf obj INDEX -n PROFILE_NAME
csm ucf obj INDEX -p VALUE
csm ucf obj INDEX -l P|B|A|N
csm ucf obj INDEX uac
csm ucf obj INDEX wf
Syntax Description
Parameter Description
show Display all of the profiles.
setdefault Return to default settings for all of the profile.
msg MSG Set the administration message.
MSG means the content (less than 255 characters) of the message
itself.
obj Specify the object for the profile.
INDEX Specify the index number of CSM profile, from 1 to 8.
-n Set the profile name.
PROFILE_NAME Specify the name of the profile (less than 16 characters)
-p Set the priority (defined by the number specified in VALUE) for the
profile.
VALUE Number 0 to 3 represent different conditions.
0: It means Bundle: Pass.
1: It means Bundle: Block.
2: It means Either: URL Access Control First.
3: It means Either: Web Feature First.
-l It means the log type of the profile. They are:
P: Pass,
B: Block,
A: All,
Example
> csm ucf obj 1 -n game -l B
Profile Index: 1
Profile Name:[game]
Log:[none]
Priority Select : [Bundle : Pass]
Syntax
csm ucf obj INDEX uac -v
csm ucf obj INDEX uac -e
csm ucf obj INDEX uac -d
csm ucf obj INDEX uac -a P|B
csm ucf obj INDEX uac -i E|D
csm ucf obj INDEX uac -o KEY_WORD_Object_Index
csm ucf obj INDEX uac -g KEY_WORD_Group_Index
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 8.
-v View the protocol configuration of the CSM profile.
-e Enable the function of URL Access Control.
-d Disable the function of URL Access Control.
-a Set the action of specific application, P or B.
B: Block. The web access meets the URL Access Control will be
blocked.
P: Pass. The web access meets the URL Access Control will be passed.
-i Prevent the web access from any IP address.
E: Enable the function. The Internet access from any IP address will
Example
> csm ucf obj 1 uac -i E
Profile Index: 1
Profile Name:[game]
Log:[none]
Priority Select : [Bundle : Pass]
Syntax
csm ucf obj INDEX wf -v
csm ucf obj INDEX wf -e
csm ucf obj INDEX wf -d
csm ucf obj INDEX wf -a P|B
csm ucf obj INDEX wf -s WEB_FEATURE
csm ucf obj INDEX wf -u WEB_FEATURE
csm ucf obj INDEX wf -f File_Extension_Object_index
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 8.
-v View the protocol configuration of the CSM profile.
-e Enable the restriction of web feature.
-d Disable the restriction of web feature.
-a Set the action of web feature, P or B.
B: Block. The web access meets the web feature will be blocked.
P: Pass. The web access meets the web feature will be passed.
-s Enable the the Web Feature configuration.
Features available for configuration are:
c: Cookie
p: Proxy
u: Upload
-u Cancel the web feature configuration.
-f Set the file extension object index number.
File_Extension_Object_inde Type the index number (1 to 8) for the file extension object.
x
Example
> csm ucf obj 1 wf -s c
Profile Index: 1
Profile Name:[game]
Log:[none]
Priority Select : [Bundle : Pass]
Syntax
csm wcf show
csm wcf look
csm wcf cache
csm wcf server WCF_SERVER
csm wcf msg MSG
csm wcf setdefault
csm wcf obj INDEX -v
csm wcf obj INDEX -a P|B
csm wcf obj INDEX -n PROFILE_NAME
csm wcf obj INDEX -l N|P|B|A
csm wcf obj INDEX -o KEY_WORD Object Index
csm wcf obj INDEX -g KEY_WORD Group Index
csm wcf obj INDEX -w E|D|P|B
csm wcf obj INDEX -s CATEGORY|WEB_GROUP
csm wcf obj INDEX -u CATEGORY|WEB_GROUP
Syntax Description
Parameter Description
show Display the web content filter profiles.
Look Display the license information of WCF.
Cache Set the cache level for the profile.
Server WCF_SERVER Set web content filter server.
Msg MSG Set the administration message.
MSG means the content (less than 255 characters) of the message
itself.
setdefault Return to default settings for all of the profile.
obj Specify the object profile.
INDEX Specify the index number of web content filter profile, from 1 to 8.
-v View the web content filter profile.
-a Set the action of web content filter profile, P or B.
B: Block. The web access meets the web feature will be blocked.
P: Pass. The web access meets the web feature will be passed.
-n Set the profile name.
PROFILE_NAME Specify the name of the profile (less than 16 characters)
-l It means the log type of the profile. They are:
P: Pass,
Syntax
csm dnsf enable ON|OFF
csm dnsf syslog N|P|B|A
csm dnsf service WCF_PROFILE
csm dnsf service_ucf UCF_PROFILE
csm dnsf time CACHE_TIME
csm dnsf blockpage show/on/off
csm dnsf profile_show
csm dnsf profile_edit INDEX
csm dnsf profile_edit INDEX -n PROFILE_NAME
csm dnsf profile_edit INDEX -l N|P|B|A
Syntax Description
Parameter Description
enable Enable or disable DNS Filter.
ON: enable.
OFF: disable.
syslog Determine the content of records transmitting to Syslog.
P: Pass. Records for the packets passing through DNS filter will be
sent to Syslog.
B: Block. Records for the packets blocked by DNS filter will be
sent to Syslog.
A: All. Records for the packets passing through or blocked by DNS
filter will be sent to Syslog.
N: None. No record will be sent to Syslog.
service WCF_PROFILE WCF_PROFILE: Specify a WCF profile as the base of DNS filtering.
Type a number to indicate the index number of WCF profile (1 is
first profile, 2 is second profile, and so on ...).
time CACHE_TIME CACHE_TIME: It means to set the time for cache to live (available
values are 1 to 24; 1 is one hour, 2 is two hours, and so on ...) for
DNS filter.
blockpage DNS sends block page for redirect port. When a web page is
blocked by DNS filter, the router system will send a message page
to describe that the page is not allowed to be visisted.
ON: Enable the function of displaying message page.
OFF: Disable the function of displaying message page.
SHOW: Display the function of displaying message page is ON or
OFF.
profile_show Display the table of the DNS filter profile.
profile_edit Modify the content of the DNS filter profile.
-n PROFILE_NAME PROFILE_NAME: Type the name of the DNS filter profile that you
want to modify.
-l N|P|B|A Specify the log type of the profile.
P: Pass.
B: Block.
A: All.
N: None.
-w WCF_PROFILE WCF_PROFILE: Type the index number of the WCF profile.
-u UCF_PROFILE UCF_PROFILE: Type the index number of the UCF profile.
-c CACHE_TIME -c means to set the cache time for DNS filter.
CACHE_TIME: It means to set the time for cache to live (available
values are 1 to 24; 1 is one hour, 2 is two hours, and so on ...) for
DNS filter.
Example
> csm dnsf service 2
dns service set up!!!
>csm dnsf service 3
wcf profile 3 is empty.....
>csm dnsf cachetime 1
Syntax
ddns enable [0/1]
Syntax Description
Parameter Description
0/1 0 – Disable the DDNS service.
1 – Enable the DDNS service.
Example
> ddns enable 1
Enable Dynamic DNS Setup
>
Syntax
ddns set [option]
ddns set -i [account index] -S [service provider] -T [service type] -D [hostname] -L [username]
-P [password]
Syntax Description
Parameter Description
-i [value] It means index number of Dynamic DNS Account.
value: 1-6
-E [value] It means to enable /disable Dynamic DNS Account.
value: 0: Disable, 1:Enable
-W [value] It means to specify WAN Interface.
[value]: Must be between 1-8
1: WAN1 First
2: WAN1 Only
3: WAN2 First
4: WAN2 Only
example: To set WAN Interface: WAN1 First
-L [value] It means to type Login Name.
[value]: limit up to 64 characters
-P [value] It means to type Password.
[value]: limit up to 24 characters
-C [value] It means to enable /disable Wildcards.
[value]: 0: Disable, 1:Enable
-B [value] It means to enable / disable Backup MX.
Example
Example
>ddns log
>
Syntax
ddns time <update in minutes>
Syntax Description
Parameter Description
Update in minutes Type the value as DDNS time. The range is from 1 to 14400.
Example
> ddns time
ddns time <update in minutes>
Valid: 1 ~ 14400
%Now: 14400
> ddns time 1000
ddns time <update in minutes>
Valid: 1 ~ 14400
%Now: 1000
Example
> ddns forceupdate
Now updating DDNS ...
Please check result by using command "ddns log"
Example
>ddns setdefault
>Set to Factory Default.
Syntax
ddns show -i [value]
Syntax Description
Parameter Description
-I [value] Display the content of selected DDNS account.
[value]: value must be between 1-6
Example
> ddns show -i 1
--------------------------------------------------
Index: 1
[ ] Enable Dynamic DNS Account
WAN Interface: WAN1 First
Service Provider: dyn.com (www.dyn.com)
Service Type: Dynamic
Domain Name: [].[]
Login Name:
[ ] Wildcards
[ ] Backup MX
Mail Extender:
Determine Real WAN IP: WAN IP
DrayTek>
Syntax
dos [-V | D | A]
dos [-s ATTACK_F [THRESHOLD][ TIMEOUT]]
dos [-a | e [ATTACK_F][ATTACK_0] | d [ATTACK_F][ATTACK_0]]
Syntax Description
Parameter Description
-V View the configuration of DoS defense system.
-D Deactivate the DoS defense system.
-A Activate the DoS defense system.
-s Enable the defense function for a specific attack and set its
parameter(s).
ATTACK_F Specify the name of flooding attack(s) or portscan, e.g., synflood,
udpflood, icmpflood, or postscan.
THRESHOLD It means the packet rate (packet/second) that a flooding attack will
be detected. Set a value larger than 20.
TIMEOUT It means the time (seconds) that a flooding attack will be blocked.
Example
>dos –A
The Dos Defense system is Activated
>dos –s synflood 50 10
Synflood is enabled! Threshold=50 <pke/sec> timeout=10 <pke/sec>
Syntax
internet -W n -M n [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
-W n W means to set WAN interface.
1=WAN1, 2=WAN2,…. Default is WAN1.
-M n M means to set Internet Access Mode (Mandatory) and n means
different modes (represented by 0 – 3)
n=0: Offline
n=1: PPPoE
n=2: Dynamic IP
n=3: Static IP
n=4: PPTP with Dynamic IP,
n=5: PPTP with Static IP,
n=6: L2TP with Dynamic IP
n=7: L2TP with Static IP
n=A: 3G/4G USB Modem(PPP mode),
n=B: 3G/4G USB Modem(DHCP mode)
<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-S <isp name> Set ISP Name (max. 23 characters).
-P <on/off> Enable PPPoE Service.
-u <username> Set username (max. 49 characters) for Internet accessing.
-p <password> Set password (max. 49 characters) for Internet accessing.
-a n It means to set PPP Authentication Type and n means different
types (represented by 0-1).
n=0: PAP/CHAP (this is default setting)
n=1: PAP Only
-t n Set connection duration and n means different conditions.
n=-1: Always-on
n=1 ~ 999: Idle time for offline (default 180 seconds)
-i <ip address> It means that PPPoE server will assign an IP address specified here
for CPE (PPPoE client).
If you type 0.0.0.0 as the <ip address>, ISP will assign suitable IP
address for you. However, if you type an IP address here, the router
will use that one as a fixed IP.
-w <ip address> It means to assign WAN IP address for such connection. Please type
an IP address here for WAN port.
-n <netmask> It means to assign netmask for WAN connection. You have to type
255.255.255.xxx (x is changeable) as the netmask for WAN port.
-g <gateway> Assign gateway IP for such WAN connection.
Example
>internet -M 1 -S tcom -u username -p password -a 0 -t -1 -i 0.0.0.0
WAN1 Internet Mode set to PPPoE/PPPoA
WAN1 ISP Name set to tcom
WAN1 Username set to username
WAN1 Password set successful
WAN1 PPP Authentication Type set to PAP/CHAP
WAN1 Idle timeout set to always-on
WAN1 Gateway IP set to 0.0.0.0
> internet -V
WAN1 Internet Mode:PPPoE
ISP Name: tcom
Username: username
Authentication: PAP/CHAP
Syntax
ip pubsubnet <Enable/Disable>
Syntax Description
Parameter Description
Enable Enable the function.
Disable Disable the function.
Example
> ip 2ndsubnet enable
public subnet enabled!
Syntax
ip pubaddr ?
ip pubaddr <public subnet IP address>
Syntax Description
Parameter Description
? Display an IP address which allows users set as the public subnet IP
address.
public subnet IP address Specify an IP address. The system will set the one that you specified
as the public subnet IP address.
Example
> ip pubaddr ?
% ip addr <public subnet IP address>
% Now: 192.168.0.1
Syntax
ip pubmask ?
ip pubmask <public subnet mask>
Syntax Description
Parameter Description
? Display an IP address which allows users set as the public subnet
mask.
public subnet IP address Specify a subnet mask. The system will set the one that you
specified as the public subnet mask.
Example
> ip pubmask ?
% ip pubmask <public subnet mask>
% Now: 255.255.255.0
Syntax
ip lanalias [idx] [-e / -a / -w / -r]
Syntax Description
Parameter Description
idx Enter the index number (from 1 to 5) of the table displayed on your
screen.
-e [0/1] Enable / disable the IP alias.
-a [address] Set an IP alias.
[address] - Enter the IPv4 address (x.x.x.x)
-w [1/0] Specify a number of WAN interface. "0" means no WAN.
-r Delete an existed WAN IP address.
Example
> ip lanalias 1 -a 192.168.1.56
>
Syntax
ip addr [IP address]
Example
>ip addr 192.168.50.1
% Set IP address OK !!!
Info When the LAN IP address is changed, the start IP address of DHCP server are
still the same. To make the IP assignment of the DHCP server being
consistent with this new IP address (they should be in the same network
segment), the IP address of the PC must be fixed with the same LAN IP
address (network segment) set by this command for accessing into the web
user interface of the router. Later, modify the start addresses for the DHCP
server.
Syntax
ip nmask [IP netmask]
Syntax Description
Parameter Description
IP netmask The netmask of LAN IP.
Example
> ip nmask 255.255.0.0
% Set IP netmask OK !!!
Syntax
ip arp add [IP address] [MAC address] [LAN or WAN]
ip arp del [IP address] [LAN or WAN]
ip arp flush
ip arp status
ip arp accept [0/1/2/3/4/5status]
ip arp setCacheLife [time]
In which, arp add allows users to add a new IP address into the ARP table; arp del allows users
to remove an IP address; arp flush allows users to clear arp cache; arp status allows users to
review current status for the arp table; arp accept allows to accept or reject the source
/destination MAC address; arp setCacheLife allows users to configure the duration in which
ARP caches can be stored on the system. If ip arp setCacheLife is set with “60”, it means you
have an ARP cache at 0 second. Sixty seconds later without any ARP messages received, the
Syntax Description
Parameter Description
IP address It means the LAN IP address.
MAC address It means the MAC address of your router.
LAN or WAN It indicates the direction for the arp function.
0/1/2/3/4/5 0: disable to accept illegal source mac address
1: enable to accept illegal source mac address
2: disable to accept illegal dest mac address
3: enable to accept illegal dest mac address
4: Decline VRRP mac into arp table
5: Accept VRRP mac into arp table
status: display the setting status.
Time Available settings will be 10, 20, 30,....2550 seconds.
Example
> ip arp status
[ARP Table]
Index IP Address MAC Address Netbios Name Interface VLAN
Port
1 192.168.1.5 00-05-5D-E4-D8-EE LAN1
VLAN0 P1
>
Syntax
ip dhcpc option
ip dhcpc option -h|l
ip dhcpc option -d [idx]
ip dhcpc option -e [1 or 0] -w [wan unmber] -c [option number] -v [option value]
ip dhcpc option -e [1 or 0] -w [wan unmber] -c [option number] -x "[option value]"
ip dhcpc option -e [1 or 0] -w [wan unmber] -c [option number] -a [option value]
ip dhcpc option -u [idx unmber]
ip dhcpc release [wan number]
ip dhcpc renew [wan number]
ip dhcpc status
Syntax Description
Parameter Description
option It is an optional setting for DHCP server.
Example
>ip dhcpc status
I/F#3 DHCP Client Status:
Syntax
ip ping [IP address] [WAN1/WAN2]
Syntax Description
Parameter Description
IP address It means the WAN IP address.
WAN1/WAN2 It means the WAN interface that the above IP address passes
through.
Example
>ip ping 172.16.3.229 WAN1
Pinging 172.16.3.229 with 64 bytes of Data:
Receive reply from 172.16.3.229, time=0ms
Receive reply from 172.16.3.229, time=0ms
Receive reply from 172.16.3.229, time=0ms
Syntax
ip tracert [Host/IP address] [WAN1 / WAN2 / WAN3 / WAN4 / WAN5 / WAN6 / WAN7 / WAN8
/ WAN9 / WAN10 / WAN11 / WAN12] [Udp/Icmp]
Syntax Description
Parameter Description
IP address The target IP address.
WAN1 ~ WAN12 It means the WAN port that the above IP address passes through.
Udp/Icmp The UDP or ICMP.
Example
>ip tracert 22.128.2.62 WAN1
Traceroute to 22.128.2.62, 30 hops max
1 172.16.3.7 10ms
2 172.16.1.2 10ms
3 Request Time out.
4 168.95.90.66 50ms
5 211.22.38.134 50ms
6 220.128.2.62 50ms
Trace complete
Syntax
ip telnet [IP address][Port]
Syntax Description
Parameter Description
IP address Type the WAN or LAN IP address of the remote device.
Port Type a port number (e.g., 23).
Available settings: 0 ~65535.
Example
> ip telnet 172.17.3.252 23
>
Syntax
Syntax Description
Parameter Description
0/1/2 0 means disable;
1 means LAN1 and 2 means IP Routed.
Example
> ip rip 1
%% Set RIP LAN1.
Syntax
ip wanrip [ifno] -e [0/1]
Syntax Description
Parameter Description
ifno It means the connection interface.
1: WAN1,2: WAN2, 3: PVC3,4: PVC4,5: PVC5
Note: PVC3 ~PVC5 are virtual WANs.
-e It means to disable or enable RIP setting for specified WAN
interface.
1: Enable the function of setting RIP of WAN IP.
0: Disable the function.
Example
> ip wanrip ?
Valid ex:ip wanrip <ifno> -e <0/1>
<ifno> 1: WAN1,2: WAN2
3: PVC3,4: PVC4,5: PVC5
-e <0/1> 0: disable, 1: enable
Now status:
WAN[1] Rip Protocol disable
WAN[2] Rip Protocol disable
WAN[3] Rip Protocol disable
WAN[4] Rip Protocol disable
WAN[5] Rip Protocol disable
> ip wanrip 5 -e 1
> ip wanrip ?
Valid ex:ip wanrip <ifno> -e <0/1>
<ifno> 1: WAN1,2: WAN2
3: PVC3,4: PVC4,5: PVC5
-e <0/1> 0: disable, 1: enable
Now status:
WAN[1] Rip Protocol disable
Syntax
ip route add [dst] [netmask][gateway][ifno][rtype]
ip route del [dst] [netmask][rtype]
ip route status
ip route cnc
ip route default [wan1/wan2/off/?]
ip route clean [1/0]
Syntax Description
Parameter Description
add It means to add an IP address as static route.
del It means to delete specified IP address.
status It means current status of static route.
dst It means the IP address of the destination.
netmask It means the netmask of the specified IP address.
gateway It means the gateway of the connected router.
ifno It means the connection interface.
3=WAN1, 4=WAN2, 5=WAN3, 6=WAN4
rtype It means the type of the route.
default : default route;
static: static route.
cnc It means current IP range for CNC Network.
default Set WAN1/WAN2/off as current default route.
clean Clean all of the route settings.
1: Enable the function.
0: Disable the function.
Example
> ip route add 172.16.2.0 255.255.255.0 172.16.2.4 3 static
> ip route status
Syntax
ip igmp_proxy set
ip igmp_proxy reset
ip igmp_proxy wan
ip igmp_proxy query
ip igmp_proxy ppp [0/1]
ip igmp_proxy status
Syntax Description
Parameter Description
set It means to enable proxy server.
reset It means to disable proxy server.
wan It means to specify WAN interface for IGMP service.
query It means to set IGMP general query interval.
The default value is 125000 ms.
ppp 0 – No need to set IGMP with PPP header.
1 – Set IGMP with PPP header.
status It means to display current status for proxy server.
Example
This command is for setting IGMP General Query Interval
The default value is 125000 ms
Current Setting is:130000 ms
> ip igmp_proxy set
% ip igmp_proxy [set|reset|wan|status], IGMP Proxy is ON
> ip igmp_proxy status
%% ip igmp_proxy [set|reset|wan|status], IGMP Proxy is ON
%%% igmp_proxy WAN:
239.255.255.250 state=1
239.255.255.250 timer=0
Syntax
ip igmp_snoop enable
ip igmp_snoop disable
ip igmp_snoop status
ip igmp_snoop table
ip igmp_snoop txquery [on|off] [v2|v3]
ip igmp_snoop mode [hw/sw]
ip igmp_snoop chkleave [on|off]
ip igmp_snoop separate [on|off]
ip igmp_snoop portchk [on|off]
Syntax Description
Parameter Description
enable It means to enable proxy server.
disable It means to disable proxy server.
status It means to display current status for proxy server.
table Display the whole table of IGMP Snoop configuration.
txquery [on|off] [v2|v3] IGMP query will be sent out to LAN periodically.
mode [hw/sw] Make IGMP snooping work on software or hardware.
chkleave [on|off] Off – Vigor router will drop LEAVE if clients still on the same group.
separate [on|off] On – IGMP packets will be separated by NAT/Bridge mode.
Example
> ip igmp_snoop mode sw
igmp snooping works on SW mode now.
Syntax
ip session on
ip session off
ip session default [num]
ip session defaultp2p [num]
ip session status
ip session show
ip session timer [num]
ip session [block/unblock][IP]
Syntax Description
Parameter Description
on Turn on session limit for each IP.
off Turn off session limit for each IP.
default [num] Set the default number of session num limit.
Defautlp2p [num] Set the default number of session num limit for p2p.
status Display the current settings.
show Display all session limit settings in the IP range.
timer [num] Set when the IP session block works.
The unit is second.
[block/unblock][IP] Block/unblock the specified IP address.
Block: The IP cannot access Internet through the router.
Unblock: The specified IP can access Internet through the router.
add Add the session limits in an IP range.
del Delete the session limits in an IP range.
IP1-IP2 It means the range of IP address specified for this command.
num It means the number of the session limits, e.g., 100.
p2pnum It means the number of the session limits, e.g., 50 for P2P.
Example
>ip session default 100
> ip session add 192.168.1.5-192.168.1.100 100 50
> ip session on
> ip session status
IP range:
192.168.1.5 - 192.168.1.100 : 100
Syntax
ip bandwidth on
ip bandwidth off
ip bandwidth default [tx_rate][rx_rate]
ip bandwidth status
ip bandwidth show
ip bandwidth [add/del] [IP1-IP2][tx][rx][shared]
Example
> ip bandwidth default 200 800
> ip bandwidth add 192.168.1.50-192.168.1.100 10 60
> ip bandwidth status
IP range:
192.168.1.50 - 192.168.1.100 : Tx:10K Rx:60K
Syntax
ip bindmac on
ip bindmac off
ip bindmac strict_on
ip bindmac show
ip bindmac add [IP][MAC][Comment]
ip bindmac del [IP]/all
Syntax Description
Parameter Description
on Turn on IP bandmac policy. Even the IP is not in the policy table, it
can still access into network.
off Turn off all the bindmac policy.
Example
> ip bindmac add 192.168.1.46 00:50:7f:22:33:55 just for test
> ip bindmac show
ip bind mac function is turned ON
IP : 192.168.1.46 bind MAC : 00-50-7f-22-33-55 Comment : just
Syntax
ip bgp mode [0/1]
ip bgp as [value]
ip bgp hold [value]
ip bgp retry [value]
ip bgp id [value]
ip bgp show
ip bgp neighbor [idx] mode [0/1]
ip bgp neighbor [idx] name [max len: 20]
ip bgp neighbor [idx] ip [x.x.x.x]
ip bgp neighbor [idx] as [1~4294967295]
ip bgp neighbor [idx] md5 <0/1>
ip bgp neighbor [idx] key [max len: 20]
ip bgp neighbor [idx] show
ip bgp neighbor show all
ip bgp static [sidx][ip][<netmask]
ip bgp static [sidx] delete
ip bgp static show
Syntax Description
Parameter Description
mode <0/1> It means to enable / disable BGP mode.
0: disable
1: enable
Example
> ip bgp static 1 192.168.2.56 255.255.255.0
Set static network index: 1
Syntax
ip maxnatuser user no
Syntax Description
Parameter Description
User no A number specified here means the total NAT users that Vigor router
supports.
0 – It means no limitation.
Example
> ip maxnatuser 100
% Max NAT user = 100
Syntax
ip policy_rt [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
General Setup for Policy Route
-i [value] Specify an index number for setting policy route profile.
Value: 1 to 60. “-1” means to get a free policy index automatically.
-e [0/1] 0: Disable the selected policy route profile.
1: Enable the selected policy route profile.
-o [value] Determine the operation of the policy route.
Value:
add – Create a new policy rotue profile.
del – Remove an existed policy route profile.
edit – Modify an existed policy route profile.
flush – Reset policy route to default setting.
-1 [any/range] Specify the source IP mode.
Range: Indicate a range of IP addresses.
Any: It means any IP address will be treated as source IP address.
-2 Specify the destination IP mode.
[any/ip_range/ip_subnet/do Any: No need to specify an IP address for any IP address will be
main] treated as destination IP address.
ip_range: Indicates a range of IP addresses.
ip_subnet: Indicates the IP subnet.
domain: Indicates the domain name.
-3 [any/range] Specify the destination port mode.
Range: Indicate a range of port number.
Example
> ip policy_rt diagnose -s 192.168.1.100 -d any -p any -t ICMP
-------------------------------------------------
Matched Route (Priority)
-------------------------------------------------
* No_Match
-------------------------------------------------
Matched Policy (Priority)
-------------------------------------------------
* Policy_1 (200)
Syntax
ip lanDNSRes [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-a <IP Address> Set IP Address that domain name mapped.
-c <CNAME> Set CNAME value.
-d <address mapping index Delete the selected LAN DNS profile.
number>
-e <0/1> 0: disable the selected LAN DNS profile.
1: enable the selected LAN DNS profile.
-i <profile setting index Type the index number of the profile.
number>
-l List the content of LAN DNS profile (including domain name, IP
address and message).
-n <domain name> Set domain name.
-p <profile name> Set profile name for LAN DNS.
-r Reset the settings for selected profile.
-s <0/1> 0:reply all
1:reply only same subnet packet.
-z Update LAN DNS config to DNS Cache.
Example
>
ip lanDNSRes -i 1 -p test
% Configure Set1's Profile:test
> ip lanDNSRes -i 1 -l
% Idx: 1
% State: Disable
% Profile: test
% Domain Name:
% -------- Address Mapping Table --------
% Not Set Address Mapping.
>
Syntax
ip dnsforward [-<command> <parameter> | ... ]
Syntax Description
Example
> ip dnsforward -i 1 -n ftp.drayTek.com
% Configure Set1's DomainName:ftp.drayTek.com
> ip dnsforward -i 1 -a 172.16.1.1
% Configure Set1's IP:172.16.1.1
> ip dnsforward -i 1 -l
% Idx: 1
% State: Disable
% Profile: test
% Domain Name: ftp.drayTek.com
% DNS Server IP: 172.16.1.1
>
Syntax
ip6 addr -s [prefix] [prefix-length] [LAN|WAN1|WAN2|iface#]
ip6 addr -d [prefix] [prefix-length] [LAN|WAN1|WAN2|iface#]
ip6 addr -a [LAN|WAN1|WAN2|iface#]
Syntax Description
Parameter Description
-s It means to add a static ipv6 address.
-d It means to delete an ipv6 address.
-a It means to show current address(es) status.
-u It means to show only unicast addresses.
prefix It means to type the prefix number of IPv6 address.
prefix-length It means to type a fixed value as the length of the prefix.
LAN|WAN1|WAN2|iface# It means to specify LAN or WAN interface for such address.
Syntax
ip6 dhcp req_opt [LAN|WAN1|WAN2|iface#] [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
req_opt It means option-request.
LAN|WAN1|WAN2|iface# It means to specify LAN or WAN interface for such address.
<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-a It means to show current DHCPv6 status.
-s It means to ask the SIP.
-S It means to ask the SIP name.
-d It means to ask the DNS setting.
-D It means to ask the DNS name.
-n It means to ask NTP.
-i It means to ask NIS.
-I It means to ask NIS name.
-p It means to ask NISP.
-P It means to ask NISP name.
-b It means to ask BCMCS.
-B It means to ask BCMCS name.
-r It means to ask refresh time.
Parameter 1: the parameter related to the request will be displayed.
0: the parameter related to the request will not be displayed.
Example
> ip6 dhcp req_opt WAN2 -S 1
> ip6 dhcp req_opt WAN2 -r 1
> ip6 dhcp req_opt WAN2 -a
% Interface WAN2 is set to request following DHCPv6 options:
% sip name
Syntax
ip6 dhcp client [WAN1|WAN2|iface#] [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
client It means the dhcp client settings.
[<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-a It means to show current DHCPv6 status.
-p [IAID] It means to request identity association ID for Prefix Delegation.
-n [IAID] It means to request identity association ID for Non-temporary
Address.
-c [parameter] It means to send rapid commit to server.
-i [parameter] It means to send information request to server.
-e[parameter] It means to enable or disable the DHCPv6 client.
1: Enable
0: Disable
Example
> ip6 dhcp client WAN2 –p 2008::1
> ip6 dhcp client WAN2 –a
Interface WAN2 has following DHCPv6 client settings:
DHCPv6 client enabled
request IA_PD whose IAID equals to 2008
> ip6 dhcp client WAN2 –n 1023456
> ip6 dhcp client WAN2 –a
Interface WAN2 has following DHCPv6 client settings:
DHCPv6 client enabled
request IA_NA whose IAID equals to 2008
> system reboot
Syntax
ip6 dhcp server [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
server It means the dhcp server settings.
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
Example
> ip6 dhcp server -d FF02::1
> ip6 dhcp server -i ff02::1
> ip6 dhcp server -x ff02::3
> ip6 dhcp server -a
% Interface LAN has following DHCPv6 server settings:
% DHCPv6 server disabled
% maximum address of the pool: FF02::3
% minimum address of the pool: FF02::1
% 1st DNS IPv6 Addr: FF02::1
Syntax
ip6 internet -W n -M n [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
-W n W means to set WAN interface and n means different selections.
Default is WAN1.
n=1: WAN1
n=2: WAN2
n=3: WAN3
.
.
n=X: WANx
-M n M means to set Internet Access Mode (Mandatory) and n means
different modes (represented by 0 – 5)
n= 0: Offline,
n=1: PPP,
n=2: TSPC,
n=3: AICCU,
n=4: DHCPv6,
Example
> ip6 internet -W 2 -M 2 -u 88886666 -p draytek123456 –s
amsterdam.freenet6.net
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
> system reboot
Syntax
ip6 neigh -s[ inet6_addr] [eth_addr] [LAN|WAN1|WAN2]
ip6 neigh -d [inet6_addr] [LAN|WAN1|WAN2]
ip6 neigh -a [inet6_addr] [-N LAN|WAN1|WAN2]
Syntax Description
Parameter Description
-s It means to add a neighbour.
-d It means to delete a neighbour.
-a It means to show neighbour status.
inet6_addr Type an IPv6 address
eth_addr Type submask address.
Example
> ip6 neigh -s 2001:2222:3333::1111 00:50:7F:11:ac:22:WAN2
Neighbour 2001:2222:3333::1111 successfully added!
> ip6 neigh -a
Syntax
ip6 pneigh -s inet6_addr [LAN|WAN1|WAN2]
ip6 pneigh -d inet6_addr [LAN|WAN1|WAN2]
ip6 pneigh -a [inet6_addr] [-N LAN|WAN1|WAN2]
Syntax Description
Parameter Description
-s It means to add a proxy neighbour.
-d It means to delete a proxy neighbour.
-a It means to show proxy neighbour status.
inet6_addr Type an IPv6 address
LAN|WAN1|WAN2 Specify an interface for the proxy neighbor.
Example
> ip6 neigh -s FE80::250:7FFF:FE12:300 LAN
% Neighbour FE80::250:7FFF:FE12:300 successfully added!
Syntax
ip6 route -s [prefix] [prefix-length] [gateway] [LAN|WAN1|WAN2|iface#> [-D]
ip6 route -d [prefix] [prefix-length]
ip6 route -a [LAN|WAN1|WAN2|iface#]
Syntax Description
Parameter Description
-s It means to add a route.
-d It means to delete a route.
-a It means to show the route status.
-D It means that such route will be treated as the default route.
prefix It means to type the prefix number of IPv6 address.
prefix-length It means to type a fixed value as the length of the prefix.
gateway It means the gateway of the router.
LAN|WAN1|WAN2|iface# It means to specify LAN or WAN interface for such address.
Example
> ip6 route -s FE80::250:7FFF:FE12:500 16 FE80::250:7FFF:FE12:100 LAN
% Route FE80::250:7FFF:FE12:500/16 successfully added!
> ip6 route -a LAN
Syntax
ip6 ping [IPV6 address/Host] [LAN/WAN1/WAN2]
Syntax Description
Parameter Description
IPV6 address/Host It means to specify the IPv6 address or host for ping.
LAN/WAN1/WAN2 It means to specify LAN or WAN interface for such address.
Example
> ip6 ping 2001:4860:4860::8888 WAN2
Syntax
ip6 tracert [IPV6 address/Host]
Syntax Description
Parameter Description
IPV6 address/Host It means to specify the IPv6 address or host for ping.
Example
> ip6 tracert 2001:4860:4860::8888
traceroute to 2001:4860:4860::8888, 30 hops max through protocol ICMP
1 2001:5C0:1400:B::10B8 340 ms
2 2001:4DE0:1000:A22::1 330 ms
3 2001:4DE0:A::1 330 ms
4 2001:4DE0:1000:34::1 340 ms
5 2001:7F8:1: :A501:5169:1 330 ms
6 2001:4860::1:0:4B3 350 ms
7 2001:4860::8:0:2DAF 330 ms
8 2001:4860::2:0:66E 340 ms
9 Request timed out. *
10 2001:4860:4860::8888 350 ms
Trace complete.
>
Syntax
ip6 tspc [ifno]
Syntax Description
Parameter Description
ifno It means the connection interface.
Ifno=1 (means WAN1)
Info=2 (means WAN2)
Example
> ip6 tspc 2
Local Endpoint v4 Address : 111.243.177.223
Local Endpoint v6 Address : 2001:05c0:1400:000b:0000:0000:0000:10b9
Router DNS name : 8886666.broker.freenet6.net
Remote Endpoint v4 Address :81.171.72.11
Remote Endpoint v6 Address : 2001:05c0:1400:000b:0000:0000:0000:10b8
Tspc Prefixlen : 56
Tunnel Broker: Amsterdam.freenet.net
>
Syntax
Ip6 radvd –s [1|0] [lifetime]
ip6 radvd –V
Syntax Description
Parameter Description
-s It means to enable or disable the default lifetime of the RADVD
server.
1: Enable the RADVD server.
0: Disable the RADVD server.
Lifetime It means to set the lifetime.
The lifetime associated with the default router in units of seconds.
It’s used to control the lifetime of the prefix. The maximum value
corresponds to 18.2 hours. A lifetime of 0 indicates that the router
is not a default router and should not appear on the default router
list.
Type the number (unit: second) you want.
-V It means to show the RADVD configuration.
-r It means RA default test.
-r [num] It means RA test for item [num].
Example
> ip6 radvd -s 1 1800
> ip6 radvd -V
% IPv6 Radvd Config:
Radvd : Enable, Default Lifetime : 1800 seconds
Syntax
ip6 mngt list
ip6 mngt list [add<index> <prefix> <prefix-length>|remove <index>|flush]
ip6 mngt status
ip6 mngt [http|telnet|ping|https|ssh] [on|off]
Syntax Description
Parameter Description
list It means to show the setting information of the access list.
status It means to show the status of IPv6 management.
add It means to add an IPv6 address which can be used to execute
Example
> ip6 mngt list add 1 FE80::250:7FFF:FE12:1010 128
> ip6 mngt list add 2 FE80::250:7FFF:FE12:1020 128
> ip6 mngt list add 3 FE80::250:7FFF:FE12:2080 128
> ip6 mngt list
% IPv6 Access List :
Index IPv6 Prefix Prefix Length
========================================
1 FE80::250:7FFF:FE12:1010 128
2 FE80::250:7FFF:FE12:1020 128
3 FE80::250:7FFF:FE12:2080 128
Syntax
ip6 online [ifno]
Syntax Description
Parameter Description
ifno It means the connection interface.
0=LAN1
1=WAN1
2=WAN2
Example
> ip6 online 0
% LAN 1 online status :
% Interface : UP
% IPv6 DNS Server: :: Static
% IPv6 DNS Server: :: Static
% IPv6 DNS Server: :: Static
Syntax
ip6 aiccu [ifno]
ip6 aiccu subnet [add <ifno> <prefix> <prefix-length>|remove <ifno>|show <info>]
Syntax Description
Parameter Description
ifno It means the connection interface.
1=WAN1
2=WAN2
add It means to add an IPv6 address which can be used to execute
management through Internet.
prefix It means to type the IPv6 address which will be used for accessing
Internet.
prefix-length It means to type a fixed value as the length of the prefix.
remove It means to remove (delete) the specified index number with IPv6
settings.
show It means to display the AICCU status.
Example
> ip6 aiccu subnet add 2 2001:1111:0000::1111 64
> ip6 aiccu 2
Status: Connecting
Syntax
Syntax Description
Parameter Description
–h It is used to display the usage of such command.
-v It is used to show the NTP state.
-p <0/1> It is used to specify NTP server for IPv6.
0 – Auto
1 – First Query IPv6 NTP Server.
Example
> ip6 ntp -p 1
% Set NTP Priority: IPv6 First
Syntax
ip6 lan -l n [-<l:w:d:D:m:o:s> <parameter> | ... ]
Syntax Description
Parameter Description
–h It is used to display the usage of such command.
-l n It means to selete LAN interface to be set.
n= 1: LAN1
n= 2: LAN2, ... x: LANx. Default is LAN1
-w n It means to selete WAN interface to be primary interface.
n= 0: None,
n=1: WAN1 ,
n=2: WAN2, ... x: WANx.
Example
> ip6 lan -l 1 -w 1 -d 2001:4860:4860::8888 -o 1 -f 0 -s 2
% Set LAN1!
% Set primary WAN1!
% Set 1st DNS server 2001:4860:4860::8888
% Set Other Option Enable!
% [LAN1] support ipv6!
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
% [LAN2] setting:
% Primary WAN : WAN1
% Management : SLAAC
% Other Option : Disable
% WAN Exten : None
% Subnet ID : 2
% Static IP(0) : ::/0
% [ifno: 0, enable: 0]
% Static IP(1) : ::/0
% [ifno: 0, enable: 0]
% Static IP(2) : ::/0
% [ifno: 0, enable: 0]
% Static IP(3) : ::/0
% [ifno: 0, enable: 0]
% DNS1 : 2001:4860:4860::8888
Syntax
ip6 session [on/off/default num/status/show]
ip6 session [add/del] [IP1-IP2] [num]
Syntax Description
Parameter Description
Example
> ip6 session on
> ip6 session add 2100:ABCD::2-2100:ABCD::10 100
> ip6 session status
IPv6 range:
2100:ABCD::2 - 2100:ABCD::10 : 100
Syntax
ip6 Bandwidth [on/off/default tx_rate rx_rate/status/show]
ip6 Bandwidth [add/del] [IP1-IP2] [tx][rx][shared]
Syntax Description
Parameter Description
del It means to delete the bandwidth limit for an IPv6 range by first IP
(IP1) or 'del all'.
Example
> ip6 bandwidth on
> ip6 bandwidth add 2001:ABCD::2-2001:ABCD::10 512 5M shared
> ip6 bandwidth status
IPv6 range:
2001:ABCD::2 - 2001:ABCD::10 : Tx:512K Rx:5M shared
Syntax
ipf view [-VcdhrtzZ]
Syntax Description
Parameter Description
-V It means to show the version of this IP filter.
-c It means to show the running call filter rules.
-d It means to show the running data filter rules.
-h It means to show the hit-number of the filter rules.
-r It means to show the running call and data filter rules.
-t It means to display all the information at one time.
-z It means to clear a filter rule’s statistics.
-Z It means to clear IP filter’s gross statistics.
Example
> ipf view -V -c -d
ipf: IP Filter: v3.3.1 (1824)
Syntax
ipf set [Options]
ipf set [SET_NO] rule [RULE_NO] [Options]
Syntax Description
Parameter Description
Options There are several options provided here, such as -v, -c [SET_NO], -d
[SET_NO],… and etc.
SET_NO It means to specify the index number (from 1 to 12) of filter set.
RULE_NO It means to specify the index number (from 1 to 7) of filter rule set.
-v Type “-v” to view the configuration of general set.
-c [SET_NO] It means to setup Call Filter, e.g., -c 2. The range for the index
number you can type is “0” to “12” (0 means “disable).
-d [SET_NO] It means to setup Data Filter, e.g., -d 3. The range for the index
number you can type is “0” to “12” (0 means “disable).
-l [VALUE] It means to setup Log Flag, e.g., -l 2
Type “0” to disable the log flag.
Type “1” to display the log of passed packet.
Type “2” to display the log of blocked packet.
Type “3” to display the log of non-matching packet.
- p [VALUE] It means to setup actions for packet not matching any rule, e.g., -p
1
Type “0” to let all the packets pass;
Type “1” to block all the packets.
-M [P2P_NO] It means to configure IM/P2P for the packets not matching with any
rule, e.g., -M 1
Type “0” to let all the packets pass;
Type “1” to block all the packets.
-U [URL_NO] It means to configure URL content filter for the packets not
matching with any rule, e.g., -U 1
Type “0” to let all the packets pass;
Type “1” to block all the packets.
-a [AD_SET] It means to configure the advanced settings.
-f [VALUE] It means to accept large incoming fragmented UDP or ICMP packets.
-E [VALUE] It means to set the maximum count for session limitation.
-F [VALUE] It means to configure the load-balance policy.
-Q [VALUE] It means to set the QoS class.
Example
> ipf set -c 1 #set call filter start from set 1
Syntax
ipf rule s r [-<command> <parameter> | ...
ipf rule s r -v
Syntax Description
Parameter Description
s Such word means Filter Set, range form 1~12.
r Such word means Filter Rule, range from 1~7.
[<command><parameter>|… The available commands with parameters are listed below.
] […] means that you can type in several commands in one line.
-e It means to enable or disable the rule setting.
0- disable
1- enable
Example
> ipf rule 2 1 -e 1 -s "o 1" -d "o 2" -S "o 1" -F 2
> ipf rule 2 1 -v
Status : Enable
Comments: xNetBios -> DNS
Index(1-15) in Schedule Setup: <null>, <null>, <null>, <null>
------------------------------------------------------------------
---
Strict Security Checking
[ ]APP Enforcement
Syntax
ipf flowtrack set [-re]
ipf flowtrack view [-f]
Syntax Description
Parameter Description
-r It means to refresh the flowtrack.
-e It means to enable or disable the flowtrack.
-f It means to show the sessions state of flowtrack. If you do not
specify any IP address, then all the session state of flowtrack will be
displayed.
-b It means to show all of IP sessions state.
- i [IP address] It means to specify IP address (e.g,, -i 192.168.2.55).
-p[value] It means to type a port number (e.g., -p 1024).
Available settings are 0 ~ 65535.
-t [value] It means to specify a protocol (e.g., -t tcp).
Available settings include:
tcp
udp
icmp
Example
>ipf flowtrack set -r
Refresh the flowstate ok
> ipf flowtrack view -f
Start to show the flowtrack sessions state:
Syntax
log [-cfhiptwx?] [-F a| c | f | w]
Syntax Description
Example
> log -w
25:36:25.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
25:36:33.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
25:36:41.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
25:36:49.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
25:36:57.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
Syntax
ldap user [INDEX][OPTION]
Syntax Description
Example
>ldap user 1 -n LD_user_test1
Profile Name has been updated!
> ldap user 1 -v
Profile Index:1
Profile Name:LD_user_test1
Common Name Identifier:
Base Distinguished Name:
Additional Filter:
Group distinguished Name:
>ldap user 1 -b ou=People,dc=example,dc=com
Syntax Description
Parameter Description
enable [0-1] Enable or disable LDAP function.
0 – Disable the function.
1 – Enable the function.
type [0-2] Set the bind type as Simple(0),Anonymous(1), and Regular(2).
ssl [0-1] Enable or disable LDAP function via SSL tunnel.
0 – Disable the function.
1 – Enable the function.
IP <VALUE> Set IP address for LDAP server.
Example
>ldap set enable 1
>ldap enabled.
> ldap set ssl 1
LDAP with SSL has been enabled!
> ldap set IP 192.168.100.155
LDAP Server IP has been setting.
> ldap set port 389
LDAP Server Port has been setting.
> ldap set dn dc=example,dc=com
LDAP Regular DN has been setting.
> ldap set PWD 123456
LDAP Regular Password has been setting.
Syntax
ldap view
Example
> ldap view ?
LDAP Enable:Disabled.
LDAP Bind Type:Simple
LDAP with SSL:Disabled
LDAP Regular DN:
LDAP Regular Password:
LDAP Server IP:
LDAP Server Port:389
Syntax
tacacspluse set [Options][Value]
Syntax Description
Parameter Description
Example
Syntax
tacacspluse view
Example
> tacacsplus view
TACACS+ Enable:Enable.
TACACS+ Server IP:192.168.1.59
TACACS+ Server Port:49
TACACS+ Type:ASCII
TACACS+ Shared Secret:
Syntax
mngt ftpport [FTP port]
Syntax Description
Parameter Description
FTP port It means to type the number for FTP port. The default setting is
21.
Example
> mngt ftpport 21
% Set FTP server port to 21 done.
Syntax
mngt httpport [Http port]
Example
> mngt httpport 80
% Set web server port to 80 done.
Syntax
mngt httpsport [Https port]
Syntax Description
Parameter Description
Https port It means to type the number for HTTPS port. The default setting is
443.
Example
> mngt httpsport 443
% Set web server port to 443 done.
Syntax
mngt telnetport [Telnet port]
Syntax Description
Parameter Description
Telnet port It means to type the number for telnet port. The default setting is
23.
Example
> mngt telnetport 23
% Set Telnet server port to 23 done.
Syntax
mngt sshport [ssh port]
Syntax Description
Example
> mngt sshport 23
% Set ssh port to 23 done.
Syntax
mngt ftpserver [enable]
mngt ftpserver [disable]
Syntax Description
Parameter Description
enable It means to activate FTP server function.
disable It means to inactivate FTP server function.
Example
> mngt ftpserver enable
%% FTP server has been enabled.
Syntax
mngt noping [on]
mngt noping [off]
mngt noping [viewlog]
mngt noping [clearlog]
Syntax Description
Parameter Description
on All PING packets will be forwarded from LAN PC to Internet.
off All PING packets will be blocked from LAN PC to Internet.
viewlog It means to display a log of ping action, including source MAC and
source IP.
clearlog It means to clear the log of ping action.
Example
> mngt noping off
Syntax
mngt defenseworm [on]
mngt defenseworm [off]
mngt defenseworm [add port]
mngt defenseworm [del port]
mngt defenseworm [viewlog]
mngt defenseworm [clearlog]
Syntax Description
Parameter Description
on It means to activate the function of defense worm packet out.
off It means to inactivate the function of defense worm packet out.
add port It means to add a new TCP port for block.
del port It means to delete a TCP port for block.
viewlog It means to display a log of defense worm packet, including source
MAC and source IP.
clearlog It means to remove the log of defense worm packet.
Example
> mngt defenseworm add 21
Add TCP port 21
Block TCP port list: 135, 137, 138, 139, 445, 21
> mngt defenseworm del 21
Delete TCP port 21
Block TCP port list: 135, 137, 138, 139, 445
Syntax
mngt rmtcfg [status]
mngt rmtcfg [enable]
mngt rmtcfg [disable]
mngt rmtcfg [http/https/ftp/telnet/ssh/tr069] [on/off]
Syntax Description
Parameter Description
status It means to display current setting for your reference.
enable It means to allow the system administrators to login from the
Internet.
disable It means to deny the system administrators to login from the
Example
> mngt rmtcfg ftp on
Enable server fail
Remote configure function has been disabled
please enable by enter mngt rmtcfg enable
Syntax
mngt lanaccess -e [0/1] –s [value] –i [value]
mngt lanaccess –f
mngt lanaccess –d
mngt lanaccess –v
mngt lanaccess –h
Syntax Description
Parameter Description
-e[0/1] It means to enable/disable the function.
0-disable the function.
1-enable the function.
-s[value] It means to specify service offered.
Available values include:
FTP, HTTP, HTTPS, TELNET, SSH, None, All
-i[value] It means the interface which is allowed to access.
Available values include:
LAN2~LAN6, DMZ, IP Routed Subnet, None, All
Note: LAN1 is always allowed for accessing into the router.
-f It means to flush all of the settings.
-d It means to restore the factory default settings.
-v It means to view current settings.
-h It means to get the usage of such command.
Example
> mngt lanaccess -e 1
> mngt lanaccess -s FTP,TELNET
Note: the settings do NOT apply to LAN1, LAN1 is always allowed to access
the router
Syntax
mngt echoicmp [enable]
mngt echoicmp [disable]
Syntax Description
Parameter Description
enable It means to accept the echo ICMP packet.
disable It means to drop the echo ICMP packet.
Example
> mngt echoicmp enable
%% Echo ICMP packet enabled.
Syntax
mngt accesslist list
mngt accesslist add [index][ip addr][mask]
mngt accesslist remove [index]
mngt accesslist flush
Example
> mngt accesslist add 1 192.168.1.89 255.255.255.0
%% Set OK.
> mngt accesslist list
%% Access list :
Index IP address Subnet mask
==========================================
1 192.168.1.89 255.255.255.0
Syntax
mngt snmp [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e <1/2> 1: Enable the SNMP function.
2: Disable the SNMP function.
-g<Community name> It means to set the name for getting community by typing a proper
character. (max. 23 characters)
-s <Community name> It means to set community by typing a proper name. (max. 23
characters)
-m <IP address> It means to set one host as the manager to execute SNMP function.
Please type in IPv4 address to specify certain host.
-t <Community name> It means to set trap community by typing a proper name. (max. 23
characters)
-n <IP address> It means to set the IPv4 address of the host that will receive the
trap community.
-T <seconds> It means to set the trap timeout <0~999>.
-V It means to list SNMP setting.
Example
> mngt snmp -e 1 -g draytek -s DK -m 192.168.1.1 -t trapcom -n 10.20.3.40
Syntax
mngt bfp [<command><parameter>|…]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e 0/1 Enable / disable the BFP function.
0 – Disable
1 – Enable
-s [service] It means to enable different service.
service - Available types are FTP, HTTP, HTTPS, TELNET, TR069, SSH,
None and All.
-l [failure] It means to set login failure retry times.
failure - Available number is from 1 to 255.
-p [penalty] It means to set penalty time for BFP. The unit is sec.
-v It means to view current settings.
Example
> mngt bfp -e 1
> mngt bfp -s FTP
> mngt bfp -l 10
> mngt bfp -v
Current Brute Force Protection Setting:
* Enable: yes
* Service:
- FTP: yes
- HTTP: no
- HTTPS: no
- TELNET: no
- TR069: no
- SSH: no
* Maximum login failures: 10
* Penalty period: 0
Syntax Description
Parameter Description
2/3/4/5/6 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
On/Off On means turning on the subnet for the specified LAN interface.
Off means turning off the subnet.
Example
> msubnet switch 2 On
% LAN2 Subnet On!
Syntax
msubnet addr [2~50][IP address]
Syntax Description
Parameter Description
2 ~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ..............
IP address Type the private IP address for the specified LAN interface.
Example
> msubnet addr 2 192.168.5.1
% Set LAN2 subnet IP address done !!!
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ....................
IP address Type the subnet mask address for the specified LAN interface.
Example
> msubnet nmask 2 255.255.0.0
% Set 3/44/45/46/47/48/49/50 subnet mask done !!!
Syntax
msubnet status [2~50]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ..........
Example
> msubnet status 2
% LAN2 Off: 0.0.0.0/0.0.0.0, PPP Start IP: 0.0.0.60
% DHCP server: Off
% Dhcp Gateway: 0.0.0.0, Start IP: 0.0.0.10, Pool Count: 50
Syntax
msubnet dhcps [2~50 [On/Off]
Syntax Description
Example
> msubnet dhcps 3 off
% LAN3 Subnet DHCP Server disabled!
Syntax
msubnet nat [2~50] [On/Off]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ..................
On/Off On – It means the subnet will be configured for NAT usage.
Off - It means the subnet will be configured for Routing usage.
Example
> > msubnet nat 2 off
% LAN2 Subnet is for Routing usage!
%Note: If you have multiple WAN connections, please be reminded to setup
a Load-Balance policy so that packets from this subnet will be forwarded
to the right WAN interface!
Syntax
msubnet gateway [2~50] [Gateway IP]
Example
> msubnet gateway 2 192.168.1.13
% Set LAN2 Dhcp Gateway IP done !!!
Syntax
msubnet ipcnt [2~50] [IP counts]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 .....
IP counts Specify a total number of IP address allowed for each LAN interface.
The available range is from 0 to 220.
Example
> msubnet ipcnt 2 15
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Syntax
msubnet talk [2~50] [2~50] [On/Off]
Syntax Description
Parameter Description
Example
> msubnet talk 1 2 on
% Enable routing between LAN1 and LAN2 !
Syntax
msubnet startip [2~50] [Gateway IP]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ......
Gateway IP Type an IP address as the starting IP address for a subnet.
Example
> msubnet startip 2 192.168.2.90
%Set LAN2 Dhcp Start IP done !!!
Syntax
msubnet pppip [2~50] [Start IP]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ......
Start IP Type an IP address as the starting IP address for PPP connection.
Example
> msubnet pppip 2 192.168.2.250
% Set LAN2 PPP(IPCP) Start IP done !!!
Syntax
msubnet nodetype [2~50][count]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
Example
> msubnet nodetype ?
% msubnet nodetype <2/3/4/5/6> <count>
% Now: LAN2 0; LAN3 0; LAN4 0; LAN5 0; LAN6 0
Syntax
msubnet primWINS [2~50] [WINS IP]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ......
WINS IP Type the IP address as the WINS IP.
Example
> msubnet primWINS ?
% msubnet primWINS
<2/3/4/5/6/7/8/9/10/11/12/13/14/15/16/17/18/19/20/21/22/23/24
/25/26/27/28/29/30/31/32/33/34/35/36/37/38/39/40/41/42/43/44/45/46/
47/48/49/50>
<WINS IP>
% Now: 3/44/45/46/47/48/49/50 0.0.0.0; 7/48/49/50 0.0.0.0; 0.0.0.0;
Syntax
msubnet secWINS [2~50 [WINS IP]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ......
WINS IP Type the IP address as the WINS IP.
Example
> msubnet secWINS 2 192.168.3.89
% Set 3/44/45/46/47/48/49/50 Dhcp Secondary WINS IP done !!!
Syntax
msubnet tftp [2~50] [TFTP server name]
Syntax Description
Parameter Description
2~50 It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ......
TFTP server name Type a name to indicate the TFTP server.
Example
DrayTek> msubnet tftp ?
% msubnet tftp
<2/3/4/5/6/7/8/9/10/11/12/13/14/15/16/17/18/19/20/21/22/23/24/25/
26/27/28/29/30/31/32/33/34/35/36/37/38/39/40/41/42/43/44/45/46/47/4
8/49/50> <TFTP server name>
% Now: 3/44/45/46/47/48/49/50
7/48/49/50
Syntax
msubnet mtu [interface][value]
Syntax Description
Parameter Description
interface Available settings include LAN1~LAN50, IP_Routed_Subnet.
value 1000 ~ 1508 (Bytes), default: 1500 (Bytes)
<interface>: LAN1~LAN6,IP_Routed_Subnet,DMZ
<value>: 1000 ~ 1508 (Bytes), default: 1500 (Bytes)
Current Settings:
Syntax
msubnet leasetime [1~50][Lease Time (sec.)]
Syntax Description
Parameter Description
Example
> DrayTek> msubnet leasetime ?
% msubnet leasetime
<1/2/3/4/5/6/7/8/9/10/11/12/13/14/15/16/17/18/19/20/21/22/23
/24/25/26/27/28/29/30/31/32/33/34/35/36/37/38/39/40/41/42/43/44/45/46/47/4
Syntax
object ip obj setdefault
object ip obj INDEX -v
object ip obj INDEX -n NAME
object ip obj INDEX -i INTERFACE
object ip obj INDEX -s INVERT
object ip obj INDEX -a TYPE [START_IP] [END/MASK_IP]
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified object profile.
-v It means to view the information of the specified object profile.
Example: object ip obj 1 -v
-n NAME It means to define a name for the IP object.
NAME: Type a name with less than 15 characters.
Example: object ip obj 9 -n bruce
-i INTERFACE It means to define an interface for the IP object.
INTERFACE=0, means any
INTERFACE=1, means LAN
INTERFACE=3, means WAN
Example: object ip obj 8 -i 0
-s INVERT It means to set invert seletion for the object profile.
INVERT=0, means disableing the function.
INVERT=1, means enabling the function.
Example: object ip obj 3 -s 1
-a TYPE It means to set the address type and IP for the IP object profile.
TYPE=0, means Mask
TYPE=1, means Single
Example
> object ip obj 1 -n marketing
> object ip obj 1 -a 1 192.168.1.45
> object ip obj 1 -v
IP Object Profile 1
Name :[marketing]
Interface:[Any]
Address type:[single]
Start ip address:[192.168.1.45]
End/Mask ip address:[0.0.0.0]
Invert Selection:[0]
Syntax
object ip grp setdefault
object ip grp INDEX -v
object ip grp INDEX -n NAME
object ip grp INDEX -i INTERFACE
object ip grp INDEX -a IP_OBJ_INDEX
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified group profile.
-v It means to view the information of the specified group profile.
Example: object ip grp 1 -v
-n NAME It means to define a name for the IP group.
NAME: Type a name with less than 15 characters.
Example: object ip grp 8 -n bruce
-i INTERFACE It means to define an interface for the IP group.
INTERFACE=0, means any
INTERFACE=1, means LAN
INTERFACE=2, means WAN
Example: object ip grp 3 -i 0
-a IP_OBJ_INDEX It means to specify IP object profiles for the group profile.
Example: :object ip grp 3 -a 1 2 3 4 5
The IP object profiles with index number 1,2,3,4 and 5 will be group
Example
> object ip grp 2 -n First
IP Group Profile 2
Name :[First]
Interface:[Any]
Included ip object index:
[0:][0]
[1:][0]
[2:][0]
[3:][0]
[4:][0]
[5:][0]
[6:][0]
[7:][0]
Syntax
object ip obj setdefault
object ip obj INDEX -v
object ip obj INDEX -n NAME
object ip obj INDEX -i INTERFACE
object ip obj INDEX -s INVERT
object ip obj INDEX -a TYPE [START_IP] [END/MASK_IP]
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified object profile.
-v It means to view the information of the specified object profile.
Example: object ip obj 1 -v
-n NAME It means to define a name for the IP object.
NAME: Type a name with less than 15 characters.
Example: object ip obj 9 -n bruce
-i INTERFACE It means to define an interface for the IP object.
INTERFACE=0, means any
INTERFACE=1, means LAN
INTERFACE=3, means WAN
Example: object ip obj 8 -i 0
-s INVERT It means to set invert seletion for the object profile.
INVERT=0, means disableing the function.
INVERT=1, means enabling the function.
Example: object ip obj 3 -s 1
-a TYPE It means to set the address type and IP for the IP object profile.
TYPE=0, means Mask
TYPE=1, means Single
TYPE=2, means Any
TYPE=3, means Rang
Example: object ip obj 3 -a 2
[START_IP] When the TYPE is set with 2, you have to type an IP address as a
starting point and another IP address as end point.
Type an IP address.
[END/MASK_IP] Type an IP address (different with START_IP) as the end IP address.
Example
> object ip obj 1 -n marketing
> object ip obj 1 -a 1 192.168.1.45
> object ip obj 1 -v
IP Object Profile 1
Name :[marketing]
Syntax
object ip grp setdefault
object ip grp INDEX -v
object ip grp INDEX -n NAME
object ip grp INDEX -i INTERFACE
object ip grp INDEX -a IP_OBJ_INDEX
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified group profile.
-v It means to view the information of the specified group profile.
Example: object ip grp 1 -v
-n NAME It means to define a name for the IP group.
NAME: Type a name with less than 15 characters.
Example: object ip grp 8 -n bruce
-i INTERFACE It means to define an interface for the IP group.
INTERFACE=0, means any
INTERFACE=1, means LAN
INTERFACE=2, means WAN
Example: object ip grp 3 -i 0
-a IP_OBJ_INDEX It means to specify IP object profiles for the group profile.
Example: :object ip grp 3 -a 1 2 3 4 5
The IP object profiles with index number 1,2,3,4 and 5 will be group
under such profile.
Example
> object ip grp 2 -n First
IP Group Profile 2
Name :[First]
Interface:[Any]
Included ip object index:
[0:][0]
[1:][0]
[2:][0]
[3:][0]
[4:][0]
[5:][0]
[6:][0]
Syntax
object service obj setdefault
object service obj INDEX -v
object service obj INDEX -n NAME
object service obj INDEX -p PROTOCOL
object service obj INDEX -s CHK [START_P] [END_P]
object service obj INDEX -d CHK [START_P] [END_P]
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified service object profile.
-v It means to view the information of the specified service object
profile.
Example: object service obj 1 -v
-n NAME It means to define a name for the IP object.
NAME: Type a name with less than 15 characters.
Example: object service obj 9 -n bruce
-i PROTOCOL It means to define a PROTOCOL for the service object profile.
PROTOCOL =0, means any
PROTOCOL =1, means ICMP
PROTOCOL =2, means IGMP
PROTOCOL =6, means TCP
PROTOCOL =17, means UDP
PROTOCOL =255, means TCP/UDP
Other values mean other protocols.
Example: object service obj 8 -i 0
CHK It means the check action for the port setting.
0=equal(=), when the starting port and ending port values are the
Example
> object service obj 1 -n limit
> object service obj 1 -p 255
> object service obj 1 -s 1 120 240
> object service obj 1 -d 1 200 220
> object service obj 1 -v
Service Object Profile 1
Name :[limit]
Protocol:[255]
Source port check action:[!=]
Source port range:[120~240]
Destination port check action:[!=]
Destination port range:[200~220]
Syntax
object service grp setdefault
object service grp INDEX -v
object service grp INDEX -n NAME
object service grp INDEX -a SER_OBJ_INDEX
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified group profile.
-v It means to view the information of the specified group profile.
Example: object service grp 1 -v
-n NAME It means to define a name for the service group.
Example
>object service grp 1 -n Grope_1
Service Group Profile 1
Name :[Grope_1]
Included service object index:
[0:][0]
[1:][0]
[2:][0]
[3:][0]
[4:][0]
[5:][0]
[6:][0]
[7:][0]
Syntax
object kw obj setdefault
object kw obj show PAGE
object kw obj INDEX -v
object kw obj INDEX -n NAME
object kw obj INDEX -a CONTENTS
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
show PAGE It means to show the contents of the specified profile.
Example
> object kw obj 1 -n children
Profile 1
Name :[children]
Content:[]
> object kw obj 1 -a gambling
Profile 1
Name :[children]
Content:[gambling]
Syntax
object fe show
object fe setdefault
object fe obj INDEX -v
object fe obj INDEX -n NAME
object fe obj INDEX -e CATEGORY|FILE_EXTENSION
object fe obj INDEX -d CATEGORY|FILE_EXTENSION
Syntax Description
Parameter Description
show It means to show the contents for all of the profiles.
setdefault It means to return to default settings for all profiles.
INDEX It means the index number (from 1 to 8) of the specified file
extension object profile.
-v It means to view the information of the specified file extension
object profile.
-n NAME It means to define a name for the file extension object profile.
NAME: Type a name with less than 15 characters.
-e It means to enable the specific CATEGORY or FILE_EXTENSION.
Example
> object fe obj 1 -n music
> object fe obj 1 -e Audio
> object fe obj 1 -v
Profile Index: 1
Profile Name:[music]
-------------------------------------------------------------------------
------
Image category:
[ ].bmp [ ].dib [ ].gif [ ].jpeg [ ].jpg [ ].jpg2 [ ].jp2 [ ].pct
[ ].pcx [ ].pic [ ].pict [ ].png [ ].tif [ ].tiff
-------------------------------------------------------------------------
------
Video category:
[ ].asf [ ].avi [ ].mov [ ].mpe [ ].mpeg [ ].mpg [v].mp4 [ ].qt
[ ].rm [v].wmv [ ].3gp [ ].3gpp [ ].3gpp2 [ ].3g2
-------------------------------------------------------------------------
------
Audio category:
[v].aac [v].aiff [v].au [v].mp3 [v].m4a [v].m4p [v].ogg [v].ra
[v].ram [v].vox [v].wav [v].wma
-------------------------------------------------------------------------
------
Java category:
[ ].class [ ].jad [ ].jar [ ].jav [ ].java [ ].jcm [ ].js [ ].jse
[ ].jsp [ ].jtk
-------------------------------------------------------------------------
------
ActiveX category:
[ ].alx [ ].apb [ ].axs [ ].ocx [ ].olb [ ].ole [ ].tlb [ ].viv
[ ].vrm
-------------------------------------------------------------------------
------
Compression category:
[ ].ace [ ].arj [ ].bzip2 [ ].bz2 [ ].cab [ ].gz [ ].gzip [ ].rar
[ ].sit [ ].zip
Example
> object sms obj 1 –n CTC
> object sms obj 1 -n CTC
> object sms obj 1 -s 0
> object sms obj 1 -u carrie
> object sms obj 1 -p 19971125cm
> object sms obj 1 -q 2
> object sms obj 1 -i 50
> object sms obj 1 -v
Profile Index: 1
Profile Name:[CTC]
SMS Provider:[kotsms.com.tw (TW)]
Username:[carrie]
Password:[******]
Quota:[2]
Sending Interval:[50(seconds)]
Example
> object mail obj 1 –n buyer
> object mail obj 1 -n buyer
> object mail obj 1 -s 192.168.1.98
> object mail obj 1 -m 25
> object mail obj 1 -t 1
> object mail obj 1 -u john
> object mail obj 1 -p happy123456
> object mail obj 1 -i 25
> object mail obj 1 -v
Profile Index: 1
Profile Name:[buyer]
SMTP Server:[192.168.1.98]
SMTP Port:[25]
Sender Address:[]
Use SSL:[disable]
Authentication:[enable]
Username:[john]
Password:[******]
Sending Interval:[25(seconds)]
Example
> object noti obj 1 –n markbei
> object noti obj 1 –e 1 1
> object noti obj 1 –e 2 1
> object noti obj 1 –e 5 3
> object noti obj 1 –v
> object noti obj 1 -e 1 1
> object noti obj 1 -e 2 1
> object noti obj 1 -e 5 3
> object noti obj 1 -v
Profile Index: 1
Profile Name:[]
Category Status
WAN [v]Disconnected [ ]Reconnected
VPN Tunnel [v]Disconnected [ ]Reconnected
Temperature Alert [ ]Out of Range
WAN Budget Alert [ ]Limit Reached
CVM Alert [ ]CPE Offline
[ ]CPE Config Backup Fail
[v]CPE Config Restore Fail
[ ]CPE Firmware Fpgrade Fail
[ ]CPE VPN Profile Setup Fail
High Availability [ ]Failover Occurred
Config Sync Fail
Router Unstable
Example
> object schedule set 1 –e 1
> object schedule set 1 –c Working
> object schedule set 1 –D “2016 11 8”
> object schedule set 1 –T “8 1”
> object schedule set 1 –d “2 30”
> object schedule set 1 –a 0
> object schedule set 1 –h “1 Mon Wed”
> object schedule view 1
Index No.1
--------------------------------------------------
[v] Enable Schedule Setup
Comment [ Working ]
Start Date (yyyy-mm-dd) [ 2016 ]-[ 11 ]-[ 8 ]
Start Time (hh:mm) [ 8 ]:[ 1 ]
Duration Time (hh:mm) [ 2 ]:[ 30 ]
Action [ Force On ]
Idle Timeout [ 0 ] minute(s).(max. 255, 0 for
default)
----------------------------------------------------------------
How Often
[ ] Once
[v] Weekdays
[ ]Sun [v]Mon [ ]Tue [v]Wed [ ]Thu [ ]Fri [ ]Sat
>
Syntax
port [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, all][AN, 100F, 100H, 10F, 10H, status]
port status
port jumbo
port wanfc
Syntax Description
Parameter Description
1, 2, 3, 4, 5, 6, 7, 8, 9, 10, It means the number of LAN port and WAN port.
11, 12, all
AN… 10H It means the physical type for the specific port.
AN: auto-negotiate.
100F: 100M Full Duplex.
100H: 100M Half Duplex.
10F: 10M Full Duplex.
10H: 10M Half Duplex.
Example
> port 1 100F
%Set Port 1 Force speed 100 Full duplex OK !!!
Syntax
portmaptime [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-t <sec> It means “TCP” protocol.
<sec>: Type a number to set the TCP session timeout.
-u <sec> It means “UDP” protocol.
<sec>: Type a number to set the UDP session timeout.
-i <sec> It means “IGMP” protocol.
<sec>: Type a number to set the IGMP session timeout.
-w <sec> It means “TCP WWW” protocol.
<sec>: Type a number to set the TCP WWW session timeout.
-s <sec> It means “TCP SYN” protocol.
<sec>: Type a number to set the TCP SYN session timeout.
-f It means to flush all portmaps (useful for diagnostics).
-l <List> List all settings.
Example
> portmaptime -t 86400 -u 300 -i 10
> portmaptime -l
------ Current setting ------
TCP Timeout : 86400 sec.
UDP Timeout : 300 sec.
IGMP Timeout : 10 sec.
TCP WWW Timeout: 60 sec.
TCP SYN Timeout: 60 sec.
Syntax
prn status
Syntax
qos setup [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-h Type it to display the usage of this command.
-m <mode> It means to define which traffic the QoS control settings will apply
to and eable QoS control.
0: disable.
1: in, apply to incoming traffic only.
2: out, apply to outgoing traffic only.
3: both, apply to both incoming and outgoing traffic.
Default is enable (for outgoing traffic).
-i <bandwidth> It means to set inbound bandwidth in kbps (Ethernet WAN only)
The available setting is from 1 to 100000.
-o <bandwidth> It means to set outbound bandwidth in kbps (Ethernet WAN only).
The available setting is from 1 to 100000.
-r <index:ratio> It means to set ratio for class index, in %.
-u <mode> It means to enable bandwidth control for UDP.
0: disable
1: enable
Default is disable.
-p <ratio> It means to enable bandwidth limit ratio for UDP.
-t <mode> It means to enable/disable Outbound TCP ACK Prioritize.
0: disable
1: enable
-V Show all the settings.
-D Set all to factory default (for all WANs).
[…] It means that you can type in several commands in one line.
Example
> qos setup -m 3 -i 9500 -o 8500 -r 3:20 -u 1 -p 50 -t 1
Syntax
qos class -c [no] –[a|e|d] [no][-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-h Type it to display the usage of this command.
-c <no> Specify the inde number for the class.
Available value for <no> contains 1, 2 and 3. The default setting is
class 1.
-n <name> It means to type a name for the class.
-a It means to add rule for specified class.
-e <no> It means to edit specified rule.
<no>: type the index number for the rule.
-d <no> It means to delete specified rule.
<no>: type the index number for the rule.
-m <mode> It means to enable or disable the specified rule.
0: disable,
1: enable
-l <addr> Set the local address.
Addr1 – It means Single address. Please specify the IP address
directly, for example, “-l 172.16.3.9”.
addr1:addr2 – It means Range address. Please specify the IP
addresses, for example, “-l 172.16.3.9: 172.16.3.50.”
addr1:subnet – It means the subnet address with start IP address.
Please type the subnet and the IP address, for example, “-l
172.16.3.9:255.255.0.0”.0
any – It means Any address. Simple type “-l” to specify any address
for this command.
-r <addr> Set the remote address.
addr1 – It means Single address. Please specify the IP address
directly, for example, “-l 172.16.3.9”.
addr1:addr2 – It means Range address. Please specify the IP
addresses, for example, “-l 172.16.3.9: 172.16.3.50.”
addr1:subnet – It means the subnet address with start IP address.
Please type the subnet and the IP address, for example, “-l
172.16.3.9:255.255.0.0”.0
Example
> qos class -c 2 -n draytek -a -m 1 -l 192.168.1.50:192.168.1.80
Syntax
qos type [-a <service name> | -e <no> | -d <no>].
Syntax Description
Parameter Description
-a <name> It means to add rule.
-e <no> It means to edit user defined service type. “no” means the index
number. Available numbers are 1~40.
-d <no> It means to delete user defined service type. “no” means the index
number. Available numbers are 1~40.
-n <name> It means the name of the service.
-t <type> It means protocol type.
6: tcp(default)
17: udp
0: tcp/udp
<1~254>: other
-p <port> It means service port. The typing format must be [start:end] (ex.,
510:330).
-l List user defined types. “no” means the index number. Available
numbers are 1~40.
Example
> show lan
The LAN settings:
ip mask dhcp star_ip pool gateway
-------------------------------------------------------------------------
-----
[V]LAN1 192.168.1.1 255.255.255.0 [V] 192.168.1.10 200
192.168.1.1
[X]LAN2 192.168.2.1 255.255.255.0 [V] 192.168.2.10 100
192.168.2.1
[X]LAN3 192.168.3.1 255.255.255.0 [V] 192.168.3.10 100
192.168.3.1
[X]LAN4 192.168.4.1 255.255.255.0 [V] 192.168.4.10 100
192.168.4.1
[X]LAN5 192.168.5.1 255.255.255.0 [V] 192.168.5.10 100
192.168.5.1
[X]LAN6 192.168.6.1 255.255.255.0 [V] 192.168.6.10 100
192.168.6.1
[X]Route 192.168.0.1 255.255.255.0 [V] 0.0.0.0 0 192.168.0.1
Example
> show dmz
% WAN1 DMZ mapping status:
Index Status WAN1 aux IP Private IP
----------------------------------------------------
1 Disable 172.16.3.221
2 Disable 192.168.1.65
Example
> show dns
%% Domain name server settings:
% Primary DNS: [Not set]
% Secondary DNS: [Not set]
Example
> show openport
%% Openport settings:
Index Status Comment Local IP Address
********************************************************
No data entry.
Example
> show nat
Port Redirection Running Table:
Example
> show portmap
-------------------------------------------------------------------------
-
Private_IP:Port Pseudo_IP:Port Peer_IP:Port [Timeout/Protocol/Flag]
-------------------------------------------------------------------------
-
Example
> show pmtime
Level0 TCP=86400001 UDP=300001 ICMP=10001
Level1 TCP=600000 UDP=90000 ICMP=7000
Level2 TCP=60000 UDP=30000 ICMP=5000
Example
> show session
% Maximum Session Number: 10000
% Maximum Session Usage: 49
% Current Session Usage: 0
% Current Session Used(include waiting for free): 0
% WAN1 Current Session Usage: 0
Syntax
show statistic
show statistic reset [interface]
Syntax Description
Parameter Description
reset It means to reset the transmitted/received bytes to Zero.
interface It means to specify WAN1 ~WAN5 (including multi-PVC) interface for
displaying related statistics.
Example
> show statistic
WAN1 total TX: 0 Bytes ,RX: 0 Bytes
WAN2 total TX: 0 Bytes ,RX: 0 Bytes
WAN3 total TX: 0 Bytes ,RX: 0 Bytes
WAN4 total TX: 0 Bytes ,RX: 0 Bytes
WAN5 total TX: 0 Bytes ,RX: 0 Bytes
>
Syntax
srv dhcp public start [IP address]
srv dhcp public cnt [IP counts]
srv dhcp public status
srv dhcp public add [MAC Addr XX-XX-XX-XX-XX-XX]
srv dhcp public del [MAC Addr XX-XX-XX-XX-XX-XX/all/ALL]
Example
Vigor> ip route add 192.168.1.56 255.255.255.0 192.168.1.12 3 default
Vigor> srv dhcp public status
Index MAC Address
Syntax
srv dhcp dns1 [?]
srv dhcp dns1 [DNS IP address]
Syntax Description
Parameter Description
? It means to display current IP address of DNS 1 for the DHCP server.
DNS IP address It means the IP address that you want to use as DNS1.
Note: The IP Routed Subnet DNS must be the same as NAT Subnet
DNS).
Example
> srv dhcp dns1 168.95.1.1
% srv dhcp dns1 <DNS IP address>
% Now: 168.95.1.1
(IP Routed Subnet dns same as NAT Subnet dns)
Syntax
srv dhcp dns2 [?]
srv dhcp dns2 [DNS IP address]
Syntax Description
Parameter Description
? It means to display current IP address of DNS 2 for the DHCP server.
DNS IP address It means the IP address that you want to use as DNS2.
Note: The IP Routed Subnet DNS must be the same as NAT Subnet
DNS).
Example
> srv dhcp dns2 10.1.1.1
% srv dhcp dns2 <DNS IP address>
% Now: 10.1.1.1
(IP Routed Subnet dns same as NAT Subnet dns)
Syntax
srv dhcp frcdnsmanl [on]
srv dhcp frcdnsmanl [off]
Syntax Description
Parameter Description
? It means to display the current status.
on It means to use manual setting for DNS setting.
Off It means to use auto settings acquired from ISP.
Example
> srv dhcp frcdnsmanl on
% Domain name server now is using manual settings!
> srv dhcp frcdnsmanl off
% Domain name server now is using auto settings!
Syntax
srv dhcp gateway [?]
srv dhcp gateway [Gateway IP]
Syntax Description
Parameter Description
? It means to display current gateway that you can use.
Gateway IP It means to specify a gateway address used for DHCP server.
Example
> srv dhcp gateway 192.168.2.1
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Syntax
srv dhcp ipcnt [?]
srv dhcp ipcnt [IP counts]
Syntax Description
Parameter Description
? It means to display current used IP count number.
IP counts It means the number that you have to specify for the DHCP server.
Example
> srv dhcp ipcnt ?
% srv dhcp ipcnt <IP counts>
% Now: 150
Syntax
srv dhcp relay servip [server ip]
srv dhcp relay subnet [index]
Syntax Description
Parameter Description
server ip It means the IP address that you want to used as DHCP server.
Index It means subnet 1 or 2. Please type 1 or 2. The router will invoke
this function according to the subnet 1 or 2 specified here.
Example
> srv dhcp relay servip 192.168.1.46
> srv dhcp relay subnet 2
> srv dhcp relay servip ?
% srv dhcp relay servip <server ip>
% Now: 192.168.1.46
Syntax
srv dhcp startip [?]
srv dhcp startip [IP address]
Syntax Description
Parameter Description
? It means to display current used start IP address.
IP address It means the IP address that you can specify for the DHCP server as
the starting point.
Example
> srv dhcp startip 192.168.1.53
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Example
> srv dhcp status
DHCP server: Relay Agent
Default gateway: 192.168.1.1
Index IP Address MAC Address Leased Time HOST ID
1 192.168.1.113 00-05-5D-E4-D8-EE 17:20:08 A1000351
Syntax
srv dhcp leasetime [?]
srv dhcp leasetime [Lease Time (sec)]
Syntax Description
Parameter Description
? It means to display current leasetime used for the DHCP server.
Lease Time (sec) It means the lease time that DHCP server can use. The unit is
second.
Example
> srv dhcp leasetime ?
% srv dhcp leasetime <Lease Time (sec.)>
% Now: 86400
>
Syntax
srv dhcp nodetype <count>
Syntax Description
Parameter Description
count It means to specify a type for node.
1. B-node
2. P-node
4. M-node
8. H-node
Example
> srv dhcp nodetype 1
> srv dhcp nodetype ?
%% srv dhcp nodetype <count>
%% 1. B-node 2. P-node 4. M-node 8. H-node
% Now: 1
Syntax
srv dhcp primWINS [WINS IP address]
srv dhcp primWINS clear
Syntax Description
Parameter Description
WINS IP address It means the IP address of primary WINS server.
clear It means to remove the IP address settings of primary WINS server.
Example
> srv dhcp primWINS 192.168.1.88
> srv dhcp primWINS ?
%% srv dhcp primWINS <WINS IP address>
%% srv dhcp primWINS clear
% Now: 192.168.1.88
Syntax
srv dhcp secWINS [WINS IP address]
srv dhcp secWINS clear
Syntax Description
Parameter Description
WINS IP address It means the IP address of secondary WINS server.
clear It means to remove the IP address settings of second WINS server.
Example
> srv dhcp secWINS 192.168.1.180
> srv dhcp secWINS ?
%% srv dhcp secWINS <WINS IP address>
%% srv dhcp secWINS clear
% Now: 192.168.1.180
Syntax
srv dhcp expRecycleIP <sec time>
Syntax Description
Parameter Description
sec time It means to set the time (5~300 seconds) for checking if the IP can be
assigned again or not.
Example
Vigor> srv dhcp expRecycleIP 250
% DHCP expired_RecycleIP = 250
Syntax
srv dhcp tftp <TFTP server name>
Syntax Description
Parameter Description
TFTP server name It means to type the name of TFTP server.
Example
> srv dhcp tftp TF123
> srv dhcp tftp ?
%% srv dhcp tftp <TFTP server name>
% Now: TF123
Syntax
srv dhcp option -h
srv dhcp option -l
srv dhcp option -d [idx]
srv dhcp option -e [1 or 0] -c [option number] -v [option value]
srv dhcp option -e [1 or 0] -c [option number] -a [option value]
srv dhcp option -e [1 or 0] -c [option number] -x [option value]
srv dhcp option -u [idx unmber]
Syntax Description
Example
> srv dhcp option -e 1 -c 18 -v /path
> srv dhcp option -l
% state idx interface opt type data
Syntax
Srv nat dmz n m [-<command> <parameter> | … ]
Syntax Description
Parameter Description
n It means to map selected WAN IP to certain host.
1: wan1
2: wan2
m It means the index number of the DMZ host.
Default setting is “1” (WAN 1). It is only available for Static IP
mode. If you use other mode, you can set 1 ~ 8 in this field. If WAN
IP alias has been configured, then the number of DMZ host can be
added more.
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e It means to enable/disable such feature.
1:enable
0:disable
-i It means to specify the private IP address of the DMZ host.
-r It means to remove DMZ host setting.
-v It means to display current status.
Example
> srv nat dmz 1 1 -i 192.168.1.96
> srv nat dmz -v
% WAN1 DMZ mapping status:
Index Status WAN1 aux IP Private IP
----------------------------------------------------
1 Disable 0.0.0.0 192.168.1.96
Syntax
Srv nat ipsecpass [options]
Syntax Description
Parameter Description
[options] The available commands with parameters are listed below.
on It means to enable IPSec ESP tunnel passthrough and IKE source port
(500) preservation.
off It means to disable IPSec ESP tunnel passthrough and IKE source
port (500) preservation.
Example
> srv nat ipsecpass status
%% Status: IPsec ESP pass-thru and IKE src_port:500 preservation is
OFF.
Syntax
srv nat openport n m [-<command> <parameter> | … ]
Syntax Description
Parameter Description
n It means the index number for the profiles. The range is from 1 to
20.
m It means to specify the sub-item number for this profile. The range
is from 1 to 10.
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-a <enable> It means to enable or disable the open port rule profile.
0: disable
1:enable
-c <comment> It means to type the description (less than 23 characters) for the
defined network service.
-i <local ip> It means to set the IP address for local computer.
Local ip: Type an IP address in this field.
-w <idx> It means to specify the public IP.
1: WAN1 Default,
2: WAN1 Alias 1,
…and so on.
-p <protocol> Specify the transport layer protocol.
Available values are TCP, UDP and ALL.
-s<start port> It means to specify the starting port number of the service offered
by the local host. The range is from 0 to 65535.
-e<end port> It means to specify the ending port number of the service offered by
the local host.
The range is from 0 to 65535.
-v It means to display current settings.
-r <remove> It means to delete the specified open port setting.
remove: Type the index number of the profile.
-f <flush> It means to return to factory settings for all the open ports profiles.
Example
> srv nat openport 1 1 -a 1 -c games -i 192.168.1.100 -w 1 -p TCP -s
23 -e 83
> srv nat openport -v
%% Status: Disable
%% Comment:
%% Private IP address: 0.0.0.0
Index Protocal Start Port End Port
*****************************************************************
%% Status: Disable
%% Comment:
%% Private IP address: 0.0.0.0
Index Protocal Start Port End Port
*****************************************************************
>
Syntax
srv nat portmap add [idx][serv name][proto][pub port][pri ip][pri port][wan1/wan2]
srv nat portmap del [idx]
srv nat portmap disable [idx]
srv nat portmap enable [idx] [proto]
srv nat portmap flush
srv nat portmap table
Syntax Description
Parameter Description
Add[idx] It means to add a new port redirection table with an index number.
Available index number is from 1 to 10.
serv name It means to type one name as service name.
proto It means to specify TCP or UDP as the protocol.
pub port It means to specify which port can be redirected to the specified
Private IP and Port of the internal host.
pri ip It means to specify the private IP address of the internal host
providing the service.
pri port It means to specify the private port number of the service offered
by the internal host.
wan1/wan2 It means to specify WAN interface for the port redirection.
del [idx] It means to remove the selected port redirection setting.
disable [idx] It means to inactivate the selected port redirection setting.
enable [idx] It means to activate the selected port redirection setting.
flush It means to clear all the port mapping settings.
Example
> srv nat portmap add 1 game tcp 80 192.168.1.11 100 wan1
> srv nat portmap table
19 0 0 0 -2
20 0 0 0 -2
Example
> srv nat status
NAT Port Redirection Running Table:
20 0 0 0.0.0.0 0
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
Example
> srv nat showall ?
Index Proto WAN IP:Port Private IP:Port Act
*************************************************************************
****
R01 TCP 0.0.0.0:80 192.168.1.11:100 Y
Syntax
switch -i [switch idx_no] [option]
Syntax Description
Parameter Description
switch idx_no It means the index number of the switch profile.
option The available commands with parameters are listed below.
cmd
acc
traffic [on/off/status/tx/rx]
Example
> switch -i 1 traffic on
External Device NO. 1 traffic statistic function is enable
Example
> switch on
Enable Extrnal Device auto discovery!
Example
> switch off
Disable External Device auto discovery!
Example
> switch list?
No. Mac IP status Dur Time Model_Name
------------------------------------------------------------------
---------
[1] 00-50-7f-cd-07-48 192.168.1.3 On-Line 00:01:01
Vigor2920 Series
Syntax
switch clear [idx]
Syntax Description
Parameter Description
idx It means the index number of each item shown on the table.
The range is from 1 to 8.
-f It means to clear all of the data.
Example
Example
> switch query on
Extern Device status query is Enable
> switch query off
Extern Device status query is Disable
Syntax
sys adminuser [option]
sys adminuser edit [index] username password
Syntax Description
Parameter Description
option Available options includes:
Local [0-1]
LDAP [0-1]
edit [INDEX]
delete [INDEX]
view [INDEX]
Local [0-1] 0 – Disable the local user.
1 – Enable the local user.
LDAP [0-1] 0 – Disable the LDAP.
1 – Enable the LDAP.
edit [INDEX] username Edit an existed user account or create a new local user account.
password [INDEX] – 1 ~8. There are eight profiles to be added / edited.
Username – Type a new name for local user.
Password – Type a password for local user.
delete [INDEX] Delete a local user account.
view [INDEX] Show the user account/password detail information.
Example
> sys adminuser Local 1
Local User has enabled!
Index:1
User Name:carrie
User Password:test123
Syntax
sys bonjour [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e <enable> It is used to disable/enable bonjour service (0: disable, 1: enable).
-h <enable> It is used to disable/enable http (web) service (0: disable, 1:
enable).
-t <enable> It is used to disable/enable telnet service (0: disable, 1: enable).
-f <enable> It is used to disable/enable FTP service (0: disable, 1: enable).
-s <enable> It is used to disable/enable SSH service (0: disable, 1: enable).
-p <enable> It is used to disable/enable printer service (0: disable, 1: enable).
-6 <enable> It is used to disable/enable IPv6 (0: disable, 1: enable).
Example
> sys bonjour -s 1
>
Syntax
sys cfg default
sys cfg status
Syntax Description
Parameter Description
default It means to reset current settings with default values.
status It means to display current profile version and status.
Example
> sys cfg status
Profile version: 3.0.0 Status: 1 (0x491e5e6c)
> sys cfg default
>
Example
> sys cmdlog
% Commands Log: (The lowest index is the newest !!!)
[1] sys cmdlog
[2] sys cmdlog ?
[3] sys ?
[4] sys cfg status
[5] sys cfg ?
Syntax
sys ftpd on
sys ftpd off
Syntax Description
Parameter Description
on It means to turn on the FTP server of the system.
off It means to turn off the FTP server of the system.
Example
> sys ftpd on
% sys ftpd turn on !!!
Syntax
sys domainname [wan1/wan2] [Domain Name Suffix]
sys domainname [wan1/wan2] clear
Syntax Description
Parameter Description
wan1/wan2 It means to specify WAN interface for assigning a name for it.
Domain Name Suffix It means the name for the domain of the system. The maximum
number of characters that you can set is 40.
clear It means to remove the domain name of the system.
Example
> sys domainname wan1 clever
> sys domainname wan2 intellegent
> sys domainname ?
% sys domainname <wan1/wan2> <Domain Name Suffix (max. 40 characters)>
% sys domainname <wan1/wan2> clear
% Now: wan1 == clever, wan2 ==intelligent
>
Example
> sys iface
Interface 0 Ethernet:
Status: UP
IP Address: 192.168.1.1 Netmask: 0xFFFFFF00 (Private)
IP Address: 0.0.0.0 Netmask: 0xFFFFFFFF
MAC: 00-50-7F-00-00-00
Interface 4 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-02
Interface 5 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-03
Interface 6 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-04
Interface 9 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-07
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
>
Syntax
sys name [wan1] [ASCII string]
sys name [wan1] clear
Syntax Description
Parameter Description
wan1 It means to specify WAN interface for assigning a name for it.
ASCII string It means the name for router. The maximum character that you can
set is 20.
Example
> sys name wan1 drayrouter
> sys name ?
% sys name <wan1/wan2> <ASCII string (max. 20 characters)>
% sys name <wan1/wan2> clear
% Now: wan1 == drayrouter, wan2 ==
Note: Such name can be used to recognize router’s identification in SysLog dialog.
Syntax
sys passwd [ASCII string]
Syntax Description
Parameter Description
ASCII string It means the password for administrator. The maximum character
that you can set is 23.
Example
> sys passwd admin123
>
Example
> sys reboot
>
Syntax
sys autoreboot [on/off/hour(s)]
Syntax Description
Parameter Description
on/off On – It means to enable the function of auto-reboot.
Off – It means to disable the function of auto-reboot.
hours It means to set the time schedule for router reboot.
For example, if you type “2” in this field, the router will reboot
with an interval of two hours.
Example
> sys autoreboot on
autoreboot is ON
> sys autoreboot 2
autoreboot is ON
autoreboot time is 2 hour(s)
Example
> sys commit
>
Example
> sys tftpd
% TFTP server enabled !!!
Example
> sys cc
Country Code : 0x 0 [International]
Wireless Region Code: 0x30
>
Example
> sys version
Router Model: Vigor3910Vn+ Version: 3.7.4.1 English
Profile version: 3.0.0 Status: 1 (0x49165e6c)
Router IP: 192.168.1.1 Netmask: 255.255.255.0
Firmware Build Date/Time: Mar 20 2014 14:09:50
Router Name: drayrouter
Revision: 40055 2860_374
VDSL2 Firmware Version: 05-04-08-00-00-06
Example
> sys qrybuf
System Memory Status and Leakage List
Syntax
sys pollbuf [on]
sys pollbuf [off]
Syntax Description
Parameter Description
on It means to turn on pulling buffer.
Example
> sys pollbuf on
% Buffer polling is on!
Syntax
sys tr069 get [parm] [option]
sys tr069 set [parm] [value]
sys tr069 getnoti [parm]
sys tr069 setnoti [parm] [value]
sys tr069 log
sys tr069 debug [on/off]
sys tr069 save
sys tr069 inform [event code]
sys tr069 port [port num]
sys tr069 cert_auth [on/off]
Syntax Description
Parameter Description
get [parm] [option] It means to get parameters for tr-069.
option=<nextlevel>: only gets nextlevel for GetParameterNames.
set [parm] [value] It means to set parameters for tr-069.
getnoti [parm] It means to get parameter notification value.
setnoti [parm] [value] It means to set parameter notification value.
log It means to display the TR-069 log.
debug [on/off] on: turn on the function of sending debug message to syslog.
off: turn off the function of sending debug message to syslog.
save It means to save the parameters to the flash memory of the router.
Inform [event code] It means to inform parameters for tr069 with different event codes.
[event code] includes:
0-"0 BOOTSTRAP",
1-"1 BOOT",
2-"2 PERIODIC",
3-"3 SCHEDULED",
4-"4 VALUE CHANGE",
5-"5 KICKED",
6-"6 CONNECTION REQUEST",
7-"7 TRANSFER COMPLETE",
8-"8 DIAGNOSTICS COMPLETE",
Example
> sys tr069 get Int. nextlevel
Total number of parameter is 24
Total content length of parameter is 915
InternetGatewayDevice.LANDeviceNumberOfEntries
InternetGatewayDevice.WANDeviceNumberOfEntries
InternetGatewayDevice.DeviceInfo.
InternetGatewayDevice.ManagementServer.
InternetGatewayDevice.Time.
InternetGatewayDevice.Layer3Forwarding.
InternetGatewayDevice.LANDevice.
InternetGatewayDevice.WANDevice.
InternetGatewayDevice.Services.
InternetGatewayDevice.X_00507F_InternetAcc.
InternetGatewayDevice.X_00507F_LAN.
InternetGatewayDevice.X_00507F_NAT.
InternetGatewayDevice.X_00507F_Firewall.
InternetGatewayDevice.X_00507F_Bandwidth.
InternetGatewayDevice.X_00507F_Applications.
InternetGatewayDevice.X_00507F_VPN.
InternetGatewayDevice.X_00507F_VoIP.
InternetGatewayDevice.X_00507F_WirelessLAN.
InternetGatewayDevice.X_00507F_System.
InternetGatewayDevice.X_00507F_Status.
InternetGatewayDevice.X_00507F_Diagnostics.
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
Syntax
sys sip_alg [1]
sys sip_alg [0]
Syntax Description
Parameter Description
1 It means to turn on SIP ALG.
0 It means to turn off SIP ALG.
Example
> sys sip_alg ?
Syntax
sys license licmsg
sys license licauth
sys license regser
sys license licera
sys license licifno
sys license lic_wiz [set/reg/qry]
sys license dev_chg
sys license dev_key
Syntax Description
Parameter Description
licmsg It means to display license message.
licauth It means the license authentication time setting.
regser It means the license register server setting.
licera It means to erase license setting.
licifno It means license and signature download interface setting.
lic_wiz [set/reg/qry] It means the license wizard setting.
qry: query service support status
set [idx] [trial] [service type] [sp_id] [start_date] [License Key]
reg: register service in portal
dev_chg It means to change the device key.
dev_key It means to show device key.
Example
> sys license licifno
Example
>upnp off
UPNP say bye-bye
Example
>upnp on
UPNP start.
Example
> upnp nat ?
****************** IGD NAT Status ****************
((0))
InternalClient >>192.168.1.10<<, RemoteHost >>0.0.0.0<<
InternalPort >>21<<, ExternalPort >>21<<
PortMapProtocol >>TCP<<
The tmpvirtual server index >>0<<
PortMapLeaseDuration >>0<<, PortMapEnabled >>0<<
Ftp Example [MICROSOFT]
((1))
InternalClient >>0.0.0.0<<, RemoteHost >>0.0.0.0<<
InternalPort >>0<<, ExternalPort >>0<<
PortMapProtocol >><NULL><<
The tmpvirtual server index >>0<<
PortMapLeaseDuration >>0<<, PortMapEnabled >>0<<
PortMapProtocol >><NULL><<
The tmpvirtual server index >>0<<
PortMapLeaseDuration >>0<<, PortMapEnabled >>0<<
0<<
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page] ---
Example
> upnp on
UPNP start.
Example
> upnp on
UPNP start.
> upnp subscribe
Vigor> upnp subscribe
>>>> (1) serviceType urn:schemas-microsoft-com:service:OSInfo:1
sid = 7a2bbdd0-0047-4fc8-b870-4597b34da7fb
expireTime =6926
active =1
DeliveryURLs
=<http://192.168.1.113:2869/upnp/eventing/twtnpnsiun>
sid = d9cd47a5-d9c9-4d3d-8043-d03a82f27983
Example
Vigor> upnp tmpvs
****************** Temp virtual server status ****************
((0))
real_addr >>192.168.1.10<<, pseudo_addr >>172.16.3.229<<
real_port >>0<<, pseudo_port >>0<<
hit_portmap_index >>0<<
The protocol >>TCP<<
time >>0<<
((1))
real_addr >>0.0.0.0<<, pseudo_addr >>0.0.0.0<<
real_port >>0<<, pseudo_port >>0<<
hit_portmap_index >>0<<
The protocol >>0<<
time >>0<<
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
Syntax
upnp wan [n]
Syntax Description
Parameter Description
n It means to specify WAN interface to apply UPnP.
n=0, it means to auto-select WAN interface.
n=1, WAN1
n=2, WAN2 ……….
Example
Example
> usb list ?
Brand Module Standard
------------------------ --------
Aiko Aiko 83D 3.5G Y
BandRich Bandluxe C170 3.5G Y
BandRich Bandluxe C270 3.5G Y
BandRich Bandluxe C321 3.5G Y
BandRich Bandluxe C330 3.5G Y
BandRich Bandluxe C331 3.5G Y
BandRich Bandluxe C502 3.5G Y
Huawei Huawei E169u 3.5G Y
Huawei Huawei E220 3.5G Y
Huawei Huawei E303D 3.5G Y
Huawei Huawei E392 3.5G Y
Huawei Huawei E398 3.5G Y
Sony Erics Sony Ericsson MD30 3.5G Y
TP-LINK TP-LINK MA180 3.5G Y
TP-LINK TP-LINK MA260 3.5G Y
Vodafone Vodafone K3765-Z 3.5G Y
Vodafone Vodafone K4605 3.5G Y
ZTE ZTE MF626 3.5G Y
ZTE ZTE MF627 plus 3.5G Y
ZTE ZTE MF633 3.5G Y
ZTE ZTE MF636 3.5G Y
Example
> vigbrg on
%Enable Vigor Bridge Function!
Example
Example
> vigbrg status
%Vigor Bridge Function is enable!
Syntax
vigbrg cfgip [IP Address]
Syntax Description
Parameter Description
IP Address It means to type an IP address for users to manage the router.
Example
> vigbrg cfgip 192.168.1.15
> vigbrg cfgip ?
% Vigor Bridge Config IP,
% Now: 192.168.1.15
Syntax
vpn l2lset [list index] peerid [peerid]
vpn l2lset [list index] localid [localid]
vpn l2lset [list index]main [auto/proposal index]
vpn l2lset [list index] aggressive [g1/g2]
vpn l2lset [list index]pfs [on/off]
vpn l2lset [list index] phase1[lifetime]
vpn l2lset [list index] phase2[lifetime]
Syntax Description
Parameter Description
list index It means the index number of L2L (LAN to LAN) profile.
peerid It means the peer identity for aggressive mode.
localid It means the local identity for aggressive mode.
main It means to choose proposal for main mode.
auto index It means to choose default proposals.
proposal index It means to choose specified proposal.
aggressive It means the chosen DH group for aggressive mode
pfs It means “perfect forward secrete”.
on/off It means to turn on or off the PFS function.
phase1 It means phase 1 of IKE.
lifetime It means the lifetime value (in second) for phase 1 and phase 2.
phase2 It means phase 2 of IKE.
Example
> vpn l2lDrop
>
Syntax
vpn dinset <list index>
vpn dinset <list index> <on/off>
vpn dinset <list index> motp <on/off>
vpn dinset <list index> pin_secret <pin> <secret>
Syntax Description
Parameter Description
<list index> It means the index number of the profile.
<on/off> It means to enable or disable the profile.
on – Enable.
off – Disable.
motp <on/off> It means to enable or disable the authentication with mOTP
function.
on – Enable.
off – Disable.
pin_secret<pin> <secret> It means to set PIN code with secret.
<pin> - Type the code for authentication (e.g, 1234).
<secret> - Use the 32 digit-secret number generated by mOTP in the
mobile phone (e.g., e759bb6f0e94c7ab4fe6)
Example
> vpn dinset 1
Password:
PIN: 1234
Secret: e759bb6f0e94c7ab4fe6
Syntax
vpn subnet [index] [1/2/3/4/5/6]
Syntax Description
Parameter Description
<index> It means the index number of the VPN profile.
<1/2/3/4/5/6> 1 – it means LAN1
2 – it means LAN2.
3 – it means LAN3
4 – it means LAN4.
5 – it means LAN51
6 – it means LAN6.
Example
> vpn subnet 1 2
>
Syntax
Command of PPTP Dial-Out
vpn setup <index> <name> pptp_out <ip> <usr> <pwd> <nip> <nmask>
Syntax Description
Parameter Description
For PPTP Dial-Out
<index> It means the index number of the profile.
<name> It means the name of the profile.
<ip> It means the IP address to dial to.
<usr> <pwd> It means the user and the password required for the PPTP
connection.
<nip> <nmask> It means the remote network IP and the mask.
e.g.,
vpn setup 1 name1 pptp_out 1.2.3.4 vigor 1234 192.168.1.0
255.255.255.0
For IPsec Dial-Out
<index> It means the index number of the profile.
<name> It means the name of the profile.
<ip> It means the IP address to dial to.
<key> It means the value of IPsec Pre-Shared Key.
<nip> <nmask> It means the remote network IP and the mask.
e.g.,
vpn setup 1 name1 ipsec_out 1.2.3.4 1234 192.168.1.0
255.255.255.0
For L2TP Dial-Out
<index> It means the index number of the profile.
<name> It means the name of the profile.
<ip> It means the IP address to dial to.
<usr> <pwd> It means the user and the password required for the L2TP
connection.
<nip> <nmask> It means the remote network IP and the mask.
e.g.,,
vpn setup 1 name1 l2tp_out 1.2.3.4 vigor 1234 192.168.1.0
255.255.255.0
For Dial-In
<index> It means the index number of the profile.
<name> It means the name of the profile.
<ip> It means the IP address allowed to dial in.
<usr> <pwd> It means the user and the password required for the PPTP/L2TP
connection.
<key> It means the value of IPsec Pre-Shared Key.
Example
> vpn setup 1 name1 dialin 1.2.3.4 vigor 1234 abc 192.168.1.0
255.255.255.0
% Profile Change Log ...
% Profile Index : 1
% Profile Name : name1
% Username : vigor
% Password : 1234
% Pre-share Key : abc
% Call Direction : Dial-In
% Type of Server : ISDN PPTP IPSec L2TP
% Dial from : 1.2.3.4
% Remote NEtwork IP : 192.168.1.0
% Remote NEtwork Mask : 255.255.255.0
>
Syntax
vpn option <index> <cmd1>=<param1> [<cmd2>=<para2> | ... ]
Syntax Description
Parameter Description
<index> It means the index number of the profile.
Available index numbers:
1 ~ 32
For Common Settings
<index> It means the index number of the profile.
pname It means the name of the profile.
ena It means to enable or disable the profile.
on – Enable
off - Disable
thr It means the way that VPN connection passes through. Available
settings are wlf, wlo, w2f, and w2o.
w1f – WAN1 First.
w1o – WAN1 Only.
w2f – WAN2 First.
w2o – WAN2 Only.
nnpkt It means the NetBios Naming Packet.
on – Enable the function to pass the packet.
off – Disable the function to block the packet.
Example
> vpn option 1 idle=250
% Change Log..
Syntax
vpn mroute <index> list
vpn mroute <index> add <network ip>/<mask>
vpn mroute <index> del <network ip>/<mask>
Syntax Description
Parameter Description
list It means to display all of the route settings.
add It means to add a new route.
del It means to delete specified route.
<index> It means the index number of the profile.
Available index numbers:
1 ~ 32
<network ip>/<mask> Type the IP address with the network mask address.
Example
> vpn mroute 1 add 192.168.5.0/24
% 192.168.5.0/24
% Add new route 192.168.5.0/24 to profile 1
Syntax
vpn list <index> all
vpn list <index>com
vpn list<index>out
vpn list <index> in
vpn list<index>net
Syntax Description
Parameter Description
Example
> vpn list 32 all
% Common Settings
% Dial-out Settings
% Dial-In Settings
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page] ---
> vpn list 1 com
% Common Settings
Syntax
vpn remote [PPTP/IPSec/L2TP] [on/off]
Syntax Description
Parameter Description
PPTP/IPSec/L2TP There are four types to be selected.
on/off on – enable VPN remote setting.
off – disable VPN remote setting.
Example
> vpn remote PPTP on
Set PPTP VPN Service : On
Syntax
vpn NetBios set <H2l/L2l> <index> <Block/Pass>
Syntax Description
Parameter Description
<H2l/L2l> H2l means Remote Access User Accounts.
L2l means LAN-to-LAN Profile.
Specify which one will be applied by NetBios.
<index> The index number of the profile.
<Block/Pass> Pass – Have an inquiry for data transmission between the hosts
located on both sides of VPN Tunnel while connecting.
Block – When there is conflict occurred between the hosts on both
sides of VPN Tunnel in connecting, set it block data transmission of
Netbios Naming Packet inside the tunnel.
Example
> vpn NetBios set H2l 1 Pass
% Remote Dial In Profile Index [1] :
% NetBios Block/Pass: [PASS]
Syntax
Syntax Description
Parameter Description
show It means to display current setting status.
default TCP maximum segment size for all the VPN connection will be set as
1360 bytes.
set Use it to specify the connection type and value of MSS.
<connection type> 1~4 represent various type.
1 – PPTP
2 – L2TP
3 – IPSec
4 – L2TP over IPSec
<TCP maximum segment size Each type has different segment size range.
range> PPTP – 1 ~ 1412
L2TP – 1 ~ 1408
IPSec – 1 ~ 1381
L2TP over IPSec – 1 ~ 1361
Example
>vpn mss set 1 1400
% VPN TCP maximum segment size (MSS) :
PPTP = 1400
L2TP = 1360
IPSec = 1360
L2TP over IPSec = 1360
>vpn mss show
VPN TCP maximum segment size (MSS) :
PPTP = 1400
L2TP = 1360
IPSec = 1360
L2TP over IPSec = 1360
Syntax
vpn ike -q
Example
> vpn ike -q
IKE Memory Status and Leakage List
Syntax
vpn Multicast set <H2l/L2l> <index> <Block/Pass>
Syntax Description
Parameter Description
<H2l/L2l> H2l means Host to LAN (Remote Access User Accounts).
L2l means LAN-to-LAN Profile.
<index> The index number of the profile.
<Block/Pass> Set Block/Pass the Multicast Packets.
The default is Block.
Example
> vpn Multicast set L2l 1 Pass
% Lan to Lan Profile Index [1] :
% Status Block/Pass: [PASS]
Syntax
vpn pass2nd[on]
vpn pass2nd [off]
Syntax Description
Parameter Description
on/off on – the packets can pass through NAT.
off – the packets cannot pass through NAT.
Example
> vpn pass2nd on
% 2nd subnet is allowed to pass VPN tunnel!
Syntax
vpn pass2nat [on]
vpn pass2nat [off]
Example
> vpn pass2nat on
% Packets would go through by NAT when VPN disconnect!!
Syntax
wan ppp_mru <WAN interface number> <MRU size >
Syntax Description
Parameter Description
<WAN interface number> Type a number to represent the physical interface. For Vigor130,
the number is 1 (which means WAN1).
<MRU size > It means the number of PPP LCP MRU. The available range is from
1400 to 1600.
Example
>wan ppp_mru 1 ?
% Now: 1492
Syntax
wan mtu [value]
wan mtu2 [value]
Syntax Description
Parameter Description
value It means the number of MTU for PPP. The available range is from
1000 to 1500.
Example
> wan mtu 1100
> wan mtu ?
Static IP/DHCP (Max MSS: 1500)
PPPoE(Max MSS: 1492)
PPTP/L2TP(Max MSS: 1460)
% wan ppp_mss <MSS size: 1000 ~ 1500>
% Now: 1100
Syntax
wan DF_check [on]
wan DF_check [off]
Syntax Description
Parameter Description
on/off It means to enable or disable DF.
Example
> wan DF_check on
%DF bit check enable!
Example
> wan disable WAN
%WAN disabled.
Example
> wan enable WAN
%WAN1 enabled.
Syntax
Syntax Description
Parameter Description
on/off It means to enable or disable WAN forward.
Example
> wan forward ?
%WAN forwarding is Disable!
Example
> wan status
WAN1: Offline, stall=N
Mode: ---, Up Time=00:00:00
IP=---, GW IP=---
TX Packets=0, TX Rate(Bps)=0, RX Packets=0, RX Rate(Bps)=0
Primary DNS=0.0.0.0, Secondary DNS=0.0.0.0
Syntax
wan modem [init/init2/dial/pin][string]
wan modem paponly [on/off]
wan modem backup_wait [value]
wan modem pipe [Int][Din][Dout]
Syntax Description
Parameter Description
init Set initial modem AT command (default value is
“AT&FE0V1X1&D2&C1S0=0”).
Init2 Set the second initial modem AT command.
dial Set dial modem AT command (default value is “ATDT*99#”).
pin Set PIN code for SIM card.
“0”:disable
paponly It means PAP Only. Set the PPP authentication of the USB WAN.
on: None.
off: PAP or CHAP.
backup_wait Set waiting time after boot if USB WAN is in backup mode. This
waiting time is reserved for the dial of main WANs so that the
backup USB WAN will not go up first.
Available setting is from 1 to 255. Unit is second.
pipe It is for RD debug only. Please don’t use it without our advice.
wakeup [on/off] It is for RD debug only. Please don’t use it without our advice.
vid Set VID of VID/PID match to bind the USB modem to specify WAN
interface. By default, this match is not set (0x0/0x0) and the router
specifies WAN interface by USB port.
pid Set PID of VID/PID match to bind the USB modem to specify WAN
interface. By default, this match is not set (0x0/0x0) and the router
specifies WAN interface by USB port.
status Display current status of USB modem.
Example
> wan modem pin 0000
> wan modem status
Modem Link Speed=0
Current Signal Strength=0
Last Fail Message:
Current Connect Stage:
Syntax
wan detect [wan1][on/off/always_on]
wan detect [wan1]target [ip addr]
wan detect [wan1]ttl [1-255]
wan detect status
Example
> wan detect status
WAN1: always on
WAN2: off
WAN3: off
WAN4: off
WAN5: off
> wan detect wan1 target 192.168.1.78
Set OK
Syntax
wan lb [wan1/wan2/…] on
wan lb [wan1/wan2/…] off
Syntax Description
Parameter Description
wan1/wan2 It means to specify which WAN will be applied with load balance.
on It means to make WAN interface as the member of load balance.
off It means to cancel WAN interface as the member of load balance.
Syntax
wan mvlan [pvc_no/status/save/enable/disable] [on/off/clear/tag tag_no] [service
type/vlan priority] [px ... ][ Keep Tag]
Syntax Description
Parameter Description
pvc_no It means index number of PVC. There are 10 PVC, 0(Channel-1) to
9(Channel-9) allowed to be configured.
However, only 2 to 9 are available for configuration.
status It means to display the whole Bridge status.
save It means to save the configuration into flash of Vigor router.
enable/disable It means to enable/disable the Multi-VLAN function.
on/off It means to turn on/off bridge mode for the specific channel.
clear It means to turn off/clear the port.
tag tag_no It means to tag a number for the VLAN.
-1: No need to add tag number.
1-4095: Available setting numbers used as tagged number.
service type It means to specify the service type for VLAN.
0: Normal.
1: IGMP.
vlan priority It means to specify the priority for the VALN setting.
Range is from 0 to 7.
px It means LAN port. Available setting number is from 2 to 4. Port
number 1 is locked for NAT usage.
Keep Tag It means Multi-VLAN packets will keep their VLAN headers to LAN.
Example
PVC 7 will map to LAN port 2/3/4 in bridge mode; service type is Normal. No tag added.
Syntax
wan multifno [channel #] [WAN interface #]
wan multifno status
Syntax Description
Parameter Description
channel # There are 4 (?) channels including VLAN and PVC.
Available settings are:
1=Channel 1
3=Channel 3
4=Channel 4
5=Channel 5
WAN interface # Type a number to indicate the WAN interface.
1=WAN1
status It means to display current bridge status.
Example
> wan multifno 5 1
% Configured channel 5 uplink to WAN1
> wan multifno status
% Channel 3 uplink ifno: 3
% Channel 4 uplink ifno: 3
% Channel 5 uplink ifno: 3
% Channel 6 uplink ifno: 3
% Channel 7 uplink ifno: 3
>
Syntax
wan vlan wan [#] tag [value]
wan vlan wan [#] [enable|disable]
wan vlan stat
Syntax Description
Parameter Description
# It means the number of WAN interface.
1: means WAN1
2: means WAN2.
value It means the number to be tagged on packets.
Example
> wan vlan stat
%Interface Pri Tag Enabled
%======================================
% WAN1 (ADSL) 0 0
% WAN1 (VDSL) 0 0
%WAN2 0 0
Syntax
wan detect_mtu -w [number] -i [Host/IP address] -s [base_size] -d [decrease_size] (-c
[count])
Syntax Description
Parameter Description
-w [number] Specify the WAN interface.
Value: Type the number of WAN interface. 1: WAN1; 2:WAN2….and
etc.
-I [Host/IP address] Specify the IPv4 target to detect. If can be an IPv4 address or
domain name.
Host/IP address: Type the IP address/domain name of the target.
-s [base_size] Set the MTU size base for Discovery.
base_size: Available setting is 1000 ~ 1500.
-d [decrease size] Set the MTU size to decrease between detections.
decrease size: Available setting is 1 ~ 100.
-c [count] Set the maximum times of ping failure during a Discovery.
count: Available settings are 1 ~ 10. Default value is 3.
Example
> wan detect_mtu -w 2 -i 8.8.8.8 -s 1500 -d 30 -c 10
detecting mtu size:1500!!!
mtu size:1470!!!
Syntax
wan detect_mtu6 –w [number] –i [IPv6 address] –s [base_size]
Syntax Description
Parameter Description
-w [number] Specify the WAN interface
number: Type the number of WAN interface. 1: WAN1; 2:WAN2….and
etc.
Example
> wan detect_mtu6 -w 2 -i 2404:6800:4008:c06::5e -s 1500
>
Syntax
wol up [MAC Address]/[IP Address]
wol fromWan [on/off/any]
wol fromWan_Setting [idx][ip address][mask]
Syntax Description
Parameter Description
MAC Address It means the MAC address of the host.
IP address It means the LAN IP address of the host. If you want to wake up LAN
host by using IP address, be sure that that IP address has been
bound with the MAC address (IP BindMAC).
on/off/any It means to enable or disable the function of WOL from WAN.
on: enable
off: disable
any: It means any source IP address can pass through NAT and wake
up the LAN client.
This command will allow the user to choose whether WoL packets
can be passed from the Internet to the LAN network from a specific
WAN interface.
[idx][ip address] [mask] It means the index number (from 1 to 4).
These commands will allow the user to configure the LAN clients
that the user may wake up from the Internet through the use of the
WoL packet.
ip address - It means the WAN IP address.
mask - It means the mask of the IP address.
Example
> wol fromWan on
> wol fromWan_Setting 1 192.168.1.45 255.255.255.0
>
Syntax
user set [-e|-d|-c|-l|-o|-a|-r|-b]
Syntax Description
Parameter Description
set It means to configure general setup for the user management.
edit It means to modify the selected user profile.
account It means to
User Set
-e Enable User management function.
-d Disable User management function.
-a[Profile idx][User It means to pass an IP Address.
name][IP_Address] Profile idx- type the index number of the selected profile.
User name- type the user name that you want it to pass.
IP_Address- type the IP address that you want it to pass.
-l all Show online user.
-l userl all – all of the users will be displayed on the screen.
-l ip user name – type the user name that you want to view on the
screen.
ip – type the IP address that you want to view on the screen.
-o It means to show user account information.
e.g.,-o
-c[user name] Clear the user record.
-c all user name – type the user name that you want to get clear
corresponding record.
all – all of the records will be removed.
-buser [user name] Block specifies user or IP address.
-b ip [ ip address] user name – type the user name that you want to block.
ip address –– type the IP address that you want to block.
-u user [user name] Unblock specifies user or IP address.
-u ip [ ip address] user name – type the user name that you want to unblock.
ip address –– type the IP address that you want to unblock.
-r [user name | all] Remove the user record.
user name – type the name of the user profile.
all – all of the user profile settings will be removed.
-q It means to trigger the alert tool to do authentication.
-s It means to set login service.
0:HTTPS
1:HTTP
e.g.,-s 1
User edit
PROFILE_IDX Type the index number of the profile that you want to edit.
-e Enable User profile function.
-d Disable User profile function.
-n It means to set a user name for a profile.
e.g.,-n fortest
-p It means to configure user password.
Example
> user account admin -d 1
Enable the [admin] data quota limited
Syntax
nand bad
nand usage
Example
>nand usage
Show NAND Flash Usage:
Partition Total Used Available Use%
cfg 4194304 7920 4186384 0%
bin_web 33554432 11869493 21684939 35%
cfg-bak 4194304 7920 4186384 0%
bin_web-bak 33554432 11869493 21684939 35%
> nand bad
Show NAND Flash Bad Blocks:
Block Address Partition
1020 0x07f80000 unused
1021 0x07fa0000 unused
1022 0x07fc0000 unused
1023 0x07fe0000 unused
Syntax
ha set [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
Example
> ha set -h LAN1 192.168.1.5
% Enable Virtual IP on LAN1
>
Syntax
ha show –c
ha show –g
Syntax Description
Parameter Description
Example
> ha show -g
% High Availability : Disable
% Redundancy Method : Active-Standby
% Group ID : 1
>
Syntax
ha status –a [Detail Level]
ha status –m [Detail Level]
Syntax Description
Parameter Description
Example
> ha status -m 2
% [Local Router] DrayTek
% IPv4 : 192.168.1.1
% Status : !
% High Availability : ! Disable
% Redundancy Method : Active-Standby
% Group ID : 1
% Priority ID : 10
% Preempt Mode : Enable
% Update DDNS : Disable
% Management Interface : LAN1
% Authentication Key : draytek
% Virtual IP: (Max. 7 Virtual IPs)
% ! OFF
% Config Sync : Disable
% Config Sync Interval : 0 Day 0 Hour 15 Minute
% Cached Time : 0 (s)
> ha status -m 0