DrayTek UG Vigor1000B V1.0
DrayTek UG Vigor1000B V1.0
DrayTek UG Vigor1000B V1.0
User’s Guide
Version: 1.0
Firmware Version: V3.9.6.3
(For future update, please visit DrayTek web site)
Date: August 25, 2021
ii
Vigor1000B Series User’s Guide
Copyrights
© All rights reserved. This publication contains information that is protected by copyright. No part may be
reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language without
written permission from the copyright holders.
Trademarks
The following trademarks are used in this document:
Microsoft is a registered trademark of Microsoft Corp.
Windows, 8, 10 and Explorer are trademarks of Microsoft Corp.
Apple and Mac OS are registered trademarks of Apple Inc.
Other products may be trademarks or registered trademarks of their respective manufacturers.
Safety Instructions
Read the installation guide thoroughly before you set up the router.
The router is a complicated electronic unit that may be repaired only be authorized and qualified personnel.
Do not try to open or repair the router yourself.
Do not place the router in a damp or humid place, e.g. a bathroom.
The router should be used in a sheltered area, within a temperature range of +5 to +40 Celsius.
Do not expose the router to direct sunlight or other heat sources. The housing and electronic components
may be damaged by direct sunlight or heat sources.
Do not deploy the cable for LAN connection outdoor to prevent electronic shock hazards.
Keep the package out of reach of children.
When you want to dispose of the router, please follow local regulations on conservation of the environment.
Warranty
We warrant to the original end user (purchaser) that the router will be free from any defects in workmanship
or materials for a period of two (2) years from the date of purchase from the dealer. Please keep your
purchase receipt in a safe place as it serves as proof of date of purchase. During the warranty period, and upon
proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials,
we will, at our discretion, repair or replace the defective products or components, without charge for either
parts or labor, to whatever extent we deem necessary tore-store the product to proper operating condition.
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and
will be offered solely at our discretion. This warranty will not apply if the product is modified, misused,
tampered with, damaged by an act of God, or subjected to abnormal working conditions. The warranty does
not cover the bundled or licensed software of other vendors. Defects which do not significantly affect the
usability of the product will not be covered by the warranty. We reserve the right to revise the manual and
online documentation and to make changes from time to time in the contents hereof without obligation to
notify any person of such revision or changes.
Be a Registered Owner
Web registration is preferred. You can register your Vigor router via https://myvigor.draytek.com.
Firmware & Tools Updates
Due to the continuous evolution of DrayTek technology, all routers will be regularly upgraded. Please consult
the DrayTek web site for more information on newest firmware, tools and documents.
https://www.draytek.com
iv
Vigor1000B Series User’s Guide
II-2-2-8 Details Page for IPv6 – Static IPv6.....................................................90
II-2-2-9 Details Page for IPv6 – 6in4 Static Tunnel ...........................................91
II-2-2-10 Details Page for IPv6 – 6rd ............................................................94
II-2-3 Multi-VLAN ....................................................................................................................... 96
II-2-4 WAN Budget................................................................................................................... 100
II-2-4-1 General Setup .......................................................................... 100
II-2-4-2 Status .................................................................................... 103
II-3 LAN .......................................................................................................................................... 104
Web User Interface .................................................................................................................. 106
II-3-1 General Setup ................................................................................................................ 106
II-3-1-1 Details Page for LAN1 – Ethernet TCP/IP and DHCP Setup ...................... 107
II-3-1-2 Details Page for IP Routed Subnet .................................................. 110
II-3-1-3 Details Page for LAN1 – IPv6 Setup.................................................. 112
II-3-1-4 DHCP Server Option ................................................................... 116
II-3-2 VLAN .............................................................................................................................. 117
II-3-3 Bind IP to MAC ............................................................................................................... 119
II-3-4 Port Mirror/Packet Capture............................................................................................. 122
II-3-5 PPPoE Server ................................................................................................................ 125
II-4 NAT .......................................................................................................................................... 126
Web User Interface .................................................................................................................. 127
II-4-1 Port Redirection.............................................................................................................. 127
II-4-2 DMZ Host ....................................................................................................................... 131
II-4-3 Open Ports ..................................................................................................................... 134
II-4-4 Port Triggering................................................................................................................ 136
II-4-5 ALG................................................................................................................................. 140
II-5 Applications .............................................................................................................................. 141
Web User Interface .................................................................................................................. 143
II-5-1 Dynamic DNS ................................................................................................................. 143
II-5-2 LAN DNS / DNS Forwarding .......................................................................................... 148
II-5-3 DNS Security .................................................................................................................. 152
II-5-3-1 General Setup .......................................................................... 152
II-5-3-2 Domain Diagnose ....................................................................... 153
II-5-4 Schedule......................................................................................................................... 154
II-5-5 RADIUS/TACACS+ ........................................................................................................ 157
II-5-5-1 External RADIUS ........................................................................ 157
II-5-5-2 Internal RADIUS ........................................................................ 159
II-5-5-3 External TACACS+...................................................................... 162
II-5-6 Active Directory/ LDAP ................................................................................................... 163
II-5-6-1 General Setup .......................................................................... 163
II-5-6-2 Active Directory / LDAP Profiles .................................................... 164
II-5-7 IGMP............................................................................................................................... 166
II-5-7-1 General Setting ........................................................................ 166
II-5-7-2 Working Status ......................................................................... 168
II-5-8 Wake on LAN ................................................................................................................. 169
II-5-9 SMS / Mail Alert Service................................................................................................. 170
vi
Vigor1000B Series User’s Guide
IV-1 Firewall.................................................................................................................................... 252
Web User Interface .................................................................................................................. 254
IV-1-1 General Setup ............................................................................................................... 254
IV-1-2 Filter Setup.................................................................................................................... 259
IV-1-3 Defense Setup .............................................................................................................. 269
IV-1-3-1 DoS Defense ............................................................................ 269
IV-1-3-2 Spoofing Defense...................................................................... 272
IV-1-4 Diagnose ....................................................................................................................... 272
IV-2 CSM (Central Security Management)..................................................................................... 275
Web User Interface .................................................................................................................. 276
IV-2-1 APP Enforcement Profile .............................................................................................. 276
IV-2-2 URL Content Filter Profile ............................................................................................. 278
IV-2-3 Web Content Filter Profile ............................................................................................. 282
IV-2-4 DNS Filter Profile .......................................................................................................... 285
Application Notes ..................................................................................................................... 287
A-1 How to Create an Account for MyVigor ................................................. 287
A-2 How to Block Facebook Service Accessed by the Users via Web Content Filter / URL
Content Filter .................................................................................... 291
A-3 How to use APP Enforcement to block application like Facebook, YouTube or
TeamViewer? ..................................................................................... 296
viii
Vigor1000B Series User’s Guide
V-6-1-2 Switch Hierarchy ....................................................................... 425
V-6-1-3 Detailed Info............................................................................ 425
V-6-2 Profile ............................................................................................................................. 428
V-6-3 Group ............................................................................................................................. 431
V-5-4 Maintenance................................................................................................................... 433
V-6-5 Alert and Log.................................................................................................................. 434
V-6-5-1 Alert Setup.............................................................................. 434
V-6-5-2 Switch and Port Setup ................................................................ 435
V-6-6 Database Setup ............................................................................................................. 437
V-6-7 Support List .................................................................................................................... 438
V-7 Central Management (External Devices)................................................................................. 439
Part VI Others.................................................................................................................441
VI-1 Objects Settings...................................................................................................................... 442
Web User Interface .................................................................................................................. 443
VI-1-1 IP Object ....................................................................................................................... 443
VI-1-2 IP Group........................................................................................................................ 446
VI-1-3 IPv6 Object.................................................................................................................... 447
VI-1-4 IPv6 Group .................................................................................................................... 449
VI-1-5 Service Type Object...................................................................................................... 450
VI-1-6 Service Type Group ...................................................................................................... 452
VI-1-7 Keyword Object............................................................................................................. 454
VI-1-8 Keyword Group ............................................................................................................. 456
VI-1-9 File Extension Object .................................................................................................... 457
VI-1-10 SMS/Mail Service Object ............................................................................................ 459
VI-1-11 Notification Object ....................................................................................................... 463
VI-1-12 String Object ............................................................................................................... 465
VI-1-13 Country Object ............................................................................................................ 466
Application Notes ..................................................................................................................... 468
A-1 How to Send a Notification to Specified Phone Number via SMS Service in WAN
Disconnection .................................................................................... 468
VI-2 USB Application ...................................................................................................................... 472
Web User Interface .................................................................................................................. 473
VI-2-1 USB General Settings ................................................................................................... 473
VI-2-2 USB User Management ................................................................................................ 473
VI-2-3 File Explorer .................................................................................................................. 476
VI-2-4 USB Disk Status............................................................................................................ 477
x
Vigor1000B Series User’s Guide
Part I Installation
This part will introduce Vigor router and guide to
install the device in hardware and software.
CSM (Content Security Management) provides users control and management in IM (Instant
Messenger) and P2P (Peer to Peer) more efficiently than before. By the way, DoS/DDoS
prevention and URL/Web content filter strengthen the security outside and control inside.
Attach the brackets to the chassis of a rack. The second bracket attaches the other side of the
chassis.
After the bracket installation, the Vigor1000B Series chassis can be installed in a rack by
using four screws for each side of the rack.
Before using it, please follow the steps below to configure settings for connected computers
(or wireless clients).
1. Connect the printer with the router through USB/parallel port.
2. Open All Programs>>Getting Started>>Devices and Printers.
5. In this dialog, choose Create a new port. In the field of Type of port, use the drop down
list to select Standard TCP/IP Port. Then, click Next.
13. Edit the property of the new printer you have added by clicking Configure Port.
Info If you fail to access to the web configuration, please go to “Trouble Shooting” for
detecting and solving your problem.
Info The home page will be different slightly in accordance with the type of the
router you have.
5. The web page can be logged out according to the chosen condition. The default setting
is Auto Logout, which means the web configuration system will logout after 5 minutes
without any operation. Change the setting for your necessity.
Please change the password for the original security of the router.
1. Open a web browser on your PC and type http://192.168.1.1. A pop-up window will
open to ask for username and password.
2. Please type “admin/admin” as Username/Password for accessing into the web user
interface with admin mode.
3. Go to System Maintenance page and choose Administrator Password.
4. Enter the login password (the default is “admin”) on the field of Old Password. Type
New Password and Confirm Password. Then click OK to continue.
Info The maximum length of the password you can set is 23 characters.
5. Now, the password has been changed. Next time, use the new password to access the
Web user interface for this router.
Dashboard shows the connection status including System Information, IPv4 Internet Access,
IPv6 Internet Access, Interface (physical connection), Security and Quick Access.
Click Dashboard from the main menu on the left side of the main page.
A web page with default selections will be displayed on the screen. Refer to the following
figure:
For detailed information about the LED display, refer to I-1-1 LED Indicators and
Connectors.
Besides, LAN, WAN interfaces, VPN security settings such as Remote Dial-in User and LAN to
LAN also can be accessed on this page easily. Scroll down the page to find them and move
your mouse cursor on the item to open the configuration web page.
All of the hosts (including wireless clients) displayed with Host ID, IP Address and MAC address
indicates that the traffic would be transmitted through LAN port(s) and then the WAN port.
The purpose is to perform the traffic monitor of the host(s).
All the functions the router supports are listed with table clearly in this page. Users can click
the function link to access into the setting page of the function for detailed configuration.
Click the icon on the top of the main screen to display all the functions.
It is not necessary to use the telnet command via DOS prompt. The changes made by using
web console have the same effects as modified through web user interface. The
functions/settings modified under Web Console also can be reviewed on the web user
interface.
Click the Web Console icon on the top of the main screen to open the following screen.
There is one way to store current used settings quickly by clicking the Config Backup icon. It
allows you to backup current settings as a file. Such configuration file can be restored by
using System Maintenance>>Configuration Backup.
Simply click the icon on the top of the main screen.
Click this icon to open online user’s guide of Vigor router. This document offers detailed
information for the settings on web user interface.
I-5-7 Logout
Item Description
LAN Status Primary DNS-Displays the primary DNS server address for
WAN interface.
Secondary DNS -Displays the secondary DNS server address
for WAN interface.
IP Address-Displays the IP address of the LAN interface.
TX Packets-Displays the total transmitted packets at the
LAN interface.
RX Packets-Displays the total received packets at the LAN
interface.
WAN1 to WAN8 Status Enable – Yes in red means such interface is available but
not enabled. Yes in green means such interface is enabled.
Line – Displays the physical connection (VDSL, ADSL,
Ethernet, or USB) of this interface.
Name – Display the name of the router.
Mode - Displays the type of WAN connection (e.g., PPPoE).
Up Time - Displays the total uptime of the interface.
IP - Displays the IP address of the WAN interface.
GW IP - Displays the IP address of the default gateway.
TX Packets - Displays the total transmitted packets at the
WAN interface.
Item Description
LAN Status IP Address- Displays the IPv6 address of the LAN interface.
TX Packets-Displays the total transmitted packets at the LAN
interface.
RX Packets-Displays the total received packets at the LAN
interface.
TX Bytes - Displays the speed of transmitted octets at the
LAN interface.
RX Bytes - Displays the speed of received octets at the LAN
interface.
WAN1 to WAN8 IPv6 Status Enable – No in red means such interface is available but not
enabled. Yes in green means such interface is enabled. No in
red means such interface is not available.
Mode - Displays the type of WAN connection (e.g., TSPC).
Up Time - Displays the total uptime of the interface.
IP - Displays the IP address of the WAN interface.
Gateway IP - Displays the IP address of the default gateway.
Info The words in green mean that the WAN connection of that interface is ready for
accessing Internet; the words in red mean that the WAN connection of that interface
is not ready for accessing Internet.
Quick Start Wizard can help you to deploy and use the router easily and quickly. Go to
Wizards>>Quick Start Wizard. The first screen of Quick Start Wizard is entering login
password. After typing the password, please click Next.
On the next page as shown below, please select the WAN interface that you use. If fiber is
used, please choose WAN1; if Ethernet is used, please choose other WAN. Then click Next for
next step.
WAN1 to WAN6 will bring up different configuration page. Refer to the following for detailed
information.
Item Description
Display Name Enter a name for the router.
Physical Type This setting will vary based on the Physical Mode.
In general, Auto negotiation is suggested.
On the next page as shown below, please select the appropriate Internet access type
according to the information from your ISP. For example, you should select PPPoE mode if the
ISP provides you PPPoE interface. Then click Next for next step.
2. Click PPPoE as the Internet Access Type to get the following page.
Item Description
Service Name Enter the description of the specific network service.
(Optional)
Username Assign a specific valid user name provided by the ISP.
Note: The maximum length of the user name you can set is
63 characters.
Password Assign a valid password provided by the ISP.
Note: The maximum length of the password you can set is 62
characters.
3. Please manually enter the Username/Password provided by your ISP. Click Next for
viewing summary of such connection.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
2. Click Static IP as the Internet Access type to get the following page.
Item Description
WAN IP Enter the IP address.
Subnet Mask Enter the subnet mask.
Gateway Enter the IP address of gateway.
Primary DNS Enter the primary IP address for the router.
Secondary DNS Enter the secondary IP address for necessity in the future.
Back Click it to return to previous setting page.
3. Please Enter the IP address information originally provided by your ISP. Then click Next
for next step.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
2. Click DHCP as the Internet Access type to get the following page.
Item Description
Host Name Enter the name of the host.
Note: The maximum length of the host name you can set is
39 characters.
MAC Some Cable service providers specify a specific MAC address
for access authentication. In such cases you need to enter
the MAC address.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
3. After finished the settings above, click Next for viewing summary of such connection.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
Item Description
Display Name Enter a name for the router.
Physical Type This setting will vary based on the Physical Mode.
In general, Auto negotiation is suggested.
On the next page as shown below, please select the appropriate Internet access type
according to the information from your ISP. For example, you should select PPPoE mode if the
ISP provides you PPPoE interface. Then click Next for next step.
Item Description
Service Name Enter the description of the specific network service.
(Optional)
Username Assign a specific valid user name provided by the ISP.
Note: The maximum length of the user name you can set is
63 characters.
Password Assign a valid password provided by the ISP.
Note: The maximum length of the password you can set is 62
characters.
Confirm Password Re-enter the password.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
Cancel Click it to give up the quick start wizard.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
2. Click Static IP as the Internet Access type to get the following page.
Item Description
WAN IP Enter the IP address.
Subnet Mask Enter the subnet mask.
Gateway Enter the IP address of gateway.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
Cancel Click it to give up the quick start wizard.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
2. Click DHCP as the Internet Access type to get the following page.
Item Description
Host Name Enter the name of the host.
Note: The maximum length of the host name you can set is
39 characters.
MAC Some Cable service providers specify a specific MAC address
for access authentication. In such cases you need to enter
the MAC address.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
3. After finished the settings above, click Next for viewing summary of such connection.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
Item Description
Display Name Enter a name for the router.
Physical Type This setting will vary based on the Physical Mode.
In general, Auto negotiation is suggested.
On the next page as shown below, please select the appropriate Internet access type
according to the information from your ISP. For example, you should select PPPoE mode if the
ISP provides you PPPoE interface. Then click Next for next step.
Item Description
Service Name Enter the description of the specific network service.
(Optional)
Username Assign a specific valid user name provided by the ISP.
Note: The maximum length of the user name you can set is
63 characters.
Password Assign a valid password provided by the ISP.
Note: The maximum length of the password you can set is 62
characters.
Confirm Password Re-enter the password.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
3. Please manually enter the Username/Password provided by your ISP. Click Next for
viewing summary of such connection.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
2. Click Static IP as the Internet Access type to get the following page.
Item Description
WAN IP Enter the IP address.
Subnet Mask Enter the subnet mask.
Gateway Enter the IP address of gateway.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
Cancel Click it to give up the quick start wizard.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
2. Click DHCP as the Internet Access type to get the following page.
Item Description
Host Name Enter the name of the host.
Note: The maximum length of the host name you can set is
39 characters.
MAC Some Cable service providers specify a specific MAC address
for access authentication. In such cases you need to enter
the MAC address.
Back Click it to return to previous setting page.
Next Click it to get into the next setting page.
3. After finished the settings above, click Next for viewing summary of such connection.
4. Click Finish. A page of Quick Start Wizard Setup OK!!! will appear. Then, the system
status of this protocol will be shown.
Service Activation Wizard can guide you to activate WCF service (Web Content Filter) with a
quick and easy way. For the Service Activation Wizard is only available for admin
operation, therefore, please type “admin/admin” on Username/Password while Logging
into the web user interface.
Service Activation Wizard is a tool which allows you to use trial version of WCF directly
without accessing into the server (MyVigor) located on http://myvigor.draytek.com. For
using Web Content Filter Profile, please refer to later section Web Content Filter Profile for
detailed information.
Now, follow the steps listed below to activate WCF feature for your router.
Info Cryan 30-day trial is WCF which offers 30-day trial period.
DT-DDNS, developed by DrayTek, offers one year free charge service of
dynamic DNS service for internal use.
Info The service will be activated and applied as the default rule configured in
Firewall>>General Setup.
4. The web page (CSM>>Web Content Filter Profile) will display the service that you have
activated according to your selection(s).
You have finished the configuration of Quick Start Wizard and you can surf the Internet at any
time. Now it is the time to register your Vigor router to MyVigor website for getting more
service. Please follow the steps below to finish the router registration.
1 Please login the web configuration interface of Vigor router by typing “admin/admin” as
User Name / Password.
3 A Login page will be shown on the screen. Please type the account and password that
you created previously. And click Login.
4 The following page will be displayed after you logging in MyVigor. Type a nickname for
the router, then click Submit.
5 When the following page appears, your router information has been added to the
database. Your router has been registered to myvigor website successfully.
The VPN Client Wizard will configure the router as a client to connect to a remote VPN server
using a LAN-to-LAN VPN tunnel. The wizard will guide you through the setup process.
1. On the menu bar, click on Wizards, and then VPN Client Wizard.
Item Description
LAN-to-LAN Client Route Mode – All traffic between the local network and the
Mode Selection remote network bear the originating IP addresses. Select
this if the VPN server can establish routes to handle
inter-LAN traffic routing.
NAT Mode – The VPN client (local router) uses a single IP
address assigned by the VPN server (remote router) and
uses NAT to keep track of the connections. Select this if the
VPN server expects only one IP address on the local
network to communicate with the remote network.
Please choose a The profile used to store this tunnel configuration.
LAN-to-LAN Profile Selecting an index that has already been setup previously
will result in the existing setup getting overwritten by the
wizard.
Item Description
Select VPN Type Select a VPN protocol for the LAN-to-LAN tunnel. Different
VPN protocols offer different levels or security and
performance.
Info The following descriptions for VPN Type are based on the Route Mode
specified in LAN-to-LAN Client Mode Selection.
If you have selected L2TP over IPsec (Nice to Have) or L2TP over IPsec (Must), the
following configuration screen appears.
3. After you have entered all the required information, click Next to proceed to the
confirmation page. The confirmation page shows a summary of all the settings. If you
need to make adjustments to the settings, click Back to return to the previous page.
Item Description
Go to the VPN Proceed to VPN and Remote Access>>Connection
Connection Management to manage VPN sessions.
Management
Do another VPN Rerun the VPN Client Wizard to configure another
Client Wizard Setup LAN-to-LAN VPN profile.
View more detailed Open this profile in VPN and Remote Access>>LAN to LAN
configuration to make additional configuration changes.
The VPN Server Wizard can be used to set the router up as a server that accepts inbound VPN
connections from a VPN server using a LAN-to-LAN VPN tunnel.
Site-to-Site (LAN-to-LAN)
A connection between two router's LAN networks.
Allows employees in branch offices and head office to share the same network resources.
1. On the menu bar, click on Wizards, and then VPN Server Wizard.
Item Description
VPN Server Mode Type of VPN Server to be configured.
Selection Site to Site VPN (LAN-to-LAN) - Configures the VPN server
for inbound connections from other routers.
Remote Dial-in User (Teleworker) - Configures VPN server
for inbound connections from remote users.
Please choose a If the VPN Server Mode selected was Site to Site VPN
LAN-to-LAN Profile (LAN-to-LAN), choose a LAN-to-LAN profile to store this
configuration.
Please choose a If the VPN Server Mode selected was Remote Dial-in User
Dial-in User Accounts (Teleworker), choose a Dial-in user profile to store this
configuration.
Allowed Dial-in Type Select all VPN protocols that are allowed for this LAN-to-LAN
Profile or Dial-in User Account.
Different Dial-in Type will lead to different configuration
page. In addition, adjustable items for each dial-in type will
be changed according to the VPN Server Mode (Site to Site
VPN and Remote Dial-in User) selected.
2. After making the choices for the server profile, please click Next.
3. The following dialog box appears, reminding you to not configure IPsec fields if the
remote location has a dynamic IP address.
4. The Site to Site VPN (LAN-to-LAN) configuration page appears as follows if you have
selected PPTP/SSL.
Item Description
Profile Name Name to identify this VPN profile.
If you have selected IPsec /L2TP with IPsec Policy (None)/ (Nice to Have)/ (Must), the
following configuration screen appears.
Item Description
User Name Used by the remote LAN to establish a VPN connection.
The length of the user name is limited to 11 characters.
Password Used by the remote LAN to establish a VPN connection.
The length of the password is limited to 11 characters.
Peer IP/VPN Client IP Enter the WAN IP address or VPN client IP address for the
6. After finishing the configuration, click Next to proceed to the confirmation page.
Item Description
Go to the VPN Proceed to VPN and Remote Access>>Connection
Connection Management to manage VPN sessions.
Management
Do another VPN Rerun the VPN Server Wizard to configure another
Server Wizard Setup LAN-to-LAN VPN profile.
View more detailed Open this profile in VPN and Remote Access>>LAN to LAN
configuration to make additional configuration changes.
7. Click Finish to save the profile, or Back to make changes, or Cancel to exit the wizard
without saving.
This page is used for configuring tranmission rate for LAN and WAN ports respectively.
Item Description
Port Display the physical ports on Vigor router.
Function P1 ~ P3 - These ports are switchable between WAN and LAN
ports.
Speed P1 ~ P2 - Available options include Auto, 10G, 2.5G, 1G and
1G_AN.
P3 ~ P10 - Available options include Auto, 1G, 100M, and 10
M.
Item Description
Load Balance Mode This option is available for multiple-WAN for getting enough
bandwidth for each WAN port. If you know the practical
bandwidth for your WAN interface, please choose the setting
of According to Line Speed. Otherwise, please choose Auto
Weight to let the router reach the best load balance.
IP Based - The same source / destination IP pair will select
the same WAN interface as policy. It is the default setting.
Session Based- All of the WAN interfaces will be used (as
out-going WAN) for passing through new sessions to get
better transmission speed. Though good speed test result for
throughput might be reached; however, some web site may
not open smoothly, especially the site need authentication,
e.g., FTP.
If you have no strong demand about speed test result, keep
default settings as IP based.
Index (WAN1 ~WAN6) Click the WAN interface link under Index to access into the
Item Description
Enable Choose Yes to invoke the settings for this WAN interface.
Choose No to disable the settings for this WAN interface.
Display Name Type the description for such WAN interface.
Physical Mode Display the physical mode of such WAN interface.
Item Description
Index Display the WAN interface.
Display Name It shows the name of the WAN1 ~ WAN6 that entered in
general setup.
Physical Mode / Port It shows the physical connection for WAN(Ethernet) /port
number according to the real network connection.
Access Mode Use the drop down list to choose a proper access mode. The
details page of that mode will be popped up. If not, click
Details Page for accessing the page to configure the settings.
Details Page This button will open different web page (based on IPv4)
according to the access mode that you choose in WAN
interface.
Note that Details Page will be changed slightly based on
physical mode.
IPv6 This button will open different web page (based on Physical
Mode) to setup IPv6 Internet Access Mode for WAN interface.
If IPv6 service is active on this WAN interface, the color of
“IPv6” will become green.
DHCP Client Option This button allows you to configure DHCP client options.
DHCP packets can be processed by adding option number and
data information when such function is enabled and
configured.
Info If you choose to configure option 61 here, the detailed settings in WAN>>Interface
Access will be overwritten.
Item Description
Enable/Disable Enable or disable PPPoE access mode.
ISP Access Setup Enter your allocated username, password and authentication
parameters according to the information provided by your
ISP.
Username – Username provided by the ISP for PPPoE
authentication.
Password – Password provided by the ISP for PPPoE
authentication.
More Options -
Service Name (Optional) - Sets the PPP service name
tag. Required by some ISPs. Leave blank unless
instructed otherwise by your ISP.
WAN Connection Configures how the WAN connection is monitored.
Detection Mode – Choose PPP Detect or Ping Detect for the system to
execute for WAN detection.
If you choose Ping Detect as the detection mode, you have
After finishing all the settings here, please click OK to activate them.
Item Description
Enable/Disable Enable or disable Static or Dynamic IP access mode.
IP Network Settings Obtain an IP address automatically – The router receives IP
configuration information from a DHCP server.
More Options - Click to set more options.
Router Name – Used by some ISPs. Contact your ISP for
the appropriate values.
Domain Name –Used by some ISPs. Contact your ISP for
the appropriate values.
Enable DHCP Client Identifier* - Used by some ISPs
that authenticates using DHCP Client Identifier (Option
61). To enable, tick this box and fill out the Username
and Password fields below.
Specify an IP address –Use the IP address, Subnet Mask and
Gateway values specified below.
IP Address –WAN IP address assigned by the ISP.
Subnet Mask –WAN subnet mask.
After finishing all the settings here, please click OK to activate them.
Item Description
WAN Connection Configures how the WAN connection is monitored.
Detection Mode – Choose Ping Detect or Always On for the system to
execute for the WAN detection.
Ping Detect - The router sends an ICMP (Internet
Control Message Protocol) echo request every second to
the host, whose address is specified in the Ping IP field,
to verify the WAN connection. If the remote host does
not respond within 30 seconds, the WAN connection is
deemed to have failed.
Always On - The router assumes the WAN connection is
always active.
If you choose Ping Detect as the detection mode, you have
to enter required settings for the following items.
Ping IP/Hostname – Enter IP address in this field for
RIPng Protocol RIPng (RIP next generation) offers the same functions and
benefits as IPv4 RIP v2.
Below shows an example for successful IPv6 connection based on PPP mode.
Info At present, the IPv6 prefix can be acquired via the PPPoE mode connection which is
available for the areas such as Taiwan (hinet), the Netherlands, Australia and UK.
Item Description
Username Type the name obtained from the broker. It is suggested for
you to apply another username and password for
http://gogonet.gogo6.com/page/freenet6-account.
The maximum length of the name you can set is 63
characters.
Password Enter the password assigned with the user name.
Tunnel Broker Enter the address for the tunnel broker IP, FQDN or an
optional port number.
WAN Connection Configures how the WAN connection is monitored.
Detection Mode – Choose Ping Detect or Always On for the system to
execute for the WAN detection.
Ping Detect - The router sends an ICMP (Internet
Control Message Protocol) echo request every second to
the host, whose address is specified in the Ping IP field,
to verify the WAN connection. If the remote host does
not respond within 30 seconds, the WAN connection is
deemed to have failed.
Always On - The router assumes the WAN connection is
always active.
If you choose Ping Detect as the detection mode, you have
to enter required settings for the following items.
Ping IP/Hostname – Enter IP address in this field for
pinging.
TTL (Time to Live) – Time To Live, the maximum
allowed number of hops to the ping destination. Valid
values range from 1 to 255.
Item Description
Always On If selected, always attempt to reconnect if connection is
lost.
If unselected, reconnect up to 3 times if connection is lost.
Username Login Username.
Enter the name obtained from the broker. Please apply new
account at http://www.sixxs.net/. It is suggested for you to
apply another username and password.
Password Login Password.
Enter the password.
Tunnel Broker Address of the tunnel broker. The server can provide IPv6
tunnels to sites or end users over IPv4.
Enter the address for the tunnel broker IP, FQDN or an
optional port number.
Tunnel ID One user account may have several tunnels. And, each
tunnel shall have one specified tunnel ID (e.g., T115394).
Type the ID offered by Tunnel Broker.
Subnet Prefix Type the subnet prefix address obtained from service
provider.
The maximum length of the prefix you can set is 128
characters.
Item Description
DHCPv6 Client IAID - Unique integer that identifies this WAN interface.
Configuration
WAN Connection Configures how the WAN connection is monitored.
Detection Mode – Choose Always On, Ping Detect or NS Detect for the
system to execute for WAN detection.
Ping Detect - The router sends an ICMP (Internet
Control Message Protocol) echo request every second to
the host, whose address is specified in the Ping IP field,
to verify the WAN connection. If the remote host does
not respond within 30 seconds, the WAN connection is
deemed to have failed.
Always On - The router assumes the WAN connection is
always active.
NS Detect - The router verifies connectivity by issuing
Neighbor Solicitation packets.
If you choose Ping Detect as the detection mode, you have
to enter required settings for the following items.
Ping IP/Hostname – Enter an IP address in this field for
pinging.
TTL (Time to Live) –Time To Live, the maximum
allowed number of hops to the ping destination. Valid
values range from 1 to 255.
RIPng Protocol RIPng (RIP next generation) offers the same functions and
benefits as IPv4 RIP v2.
Item Description
Static IPv6 Address IPv6 Address – WAN IPv6 address assigned by the ISP.
Configuration Prefix Length – Length of the IPv6 prefix.
Add – Click this button to add the values in the IPv6 Address
and Prefix Length fields to the IPv6 address table.
Update - Click it to modify an existed entry.
Delete – To remove an IPv6 address, select it by clicking on
RIPng Protocol RIPng (RIP next generation) offers the same functions and
benefits as IPv4 RIP v2.
Bridge Mode Enable Bridge Mode - If selected, the router will bridge the
WAN connection to a LAN group.
Enable Firewall – It is available when Bridge Mode is
enabled. When both Bridge Mode and Firewall check boxes
are enabled, the settings configured (user profiles) under
User Management will be ignored. And all of the filter rules
defined and enabled in Firewall menu will be activated.
Bridge Subnet – LAN subnet to be bridged.
Item Description
6in4 Static Tunnel Remote Endpoint IPv4 Address - WAN IPv6 address assigned
by the tunnel provider.
6in4 IPv6 Address - WAN IPv6 address and prefix length
assigned by the tunnel provider.
LAN Routed Prefix - LAN IPv6 address prefix and prefix
length.
Tunnel TTL - Time to live value, which is the maximum
number of hops allowed to the endpoint.
WAN Connection Configures how the WAN connection is monitored.
Detection Mode – Choose Always On or Ping Detect for the system to
execute for WAN detection.
Ping Detect - The router sends an ICMP (Internet
Control Message Protocol) echo request every second to
the host, whose address is specified in the Ping IP field,
to verify the WAN connection. If the remote host does
not respond within 30 seconds, the WAN connection is
deemed to have failed.
Always On - The router assumes the WAN connection is
always active.
If you choose Ping Detect as the detection mode, you have
to enter required settings for the following items.
Ping IP/Hostname – Enter an IP address in this field for
pinging.
TTL (Time to Live) –Time To Live, the maximum
allowed number of hops to the ping destination. Valid
values range from 1 to 255.
Item Description
6rd Settings Auto 6rd - Used in conjunction with DHCPv4, the router
automatically provisions IPv6 using option 212.
Static 6rd - IPv6 configuration information is manually
entered.
Static 6rd Settings IPv4 Border Relay - Enter the IPv4 addresses of the 6rd
Border Relay for a given 6rd domain.
IPv4 Mask Length - Number of high-order bits that are
identical in the IPv4 addresses within the 6rd domain. These
bits are excluded when constructing the 6rd delegated
prefix.
It may be any value between 0 and 32.
6rd Prefix - Enter the 6rd IPv6 address.
6rd Prefix Length - Enter the IPv6 prefix length for the 6rd
IPv6 prefix in number of bits.
General
The system allows you to set up to eight channels used as multi-VLAN.
Item Description
Channel Display the number of each channel.
Channels 1~6 are used by the Internet Access web user
interface and can not be configured here.
Channels 13 ~ 52 are configurable.
Enable Display whether the settings in this channel are enabled
(checked) or not (unchecked).
WAN Type Displays the physical medium that the channel will use.
VLAN Tag Displays the VLAN tag value that will be used for the packets
traveling on this channel.
Item Description
Enable Channel 13~52 Enable – Click it to enable the configuration of this channel.
Disable –Click it to disable the configuration of this channel.
WAN Type The connections and interfaces created in every channel may
select a specific WAN type to be built upon. In the
Multi-VLAN application, only the Ethernet WAN type is
available. The user will be able to select the physical WAN
interface the channel shall use here.
General Settings VLAN Tag – Type the value as the VLAN ID number. Valid
settings are in the range from 1 to 4095. The network traffic
flowing on each channel will be identified by the system via
their VLAN Tags. Channels using the same WAN type may not
configure the same VLAN tag value.
Priority – Choose the number to determine the packet
priority for such VLAN. The range is from 0 to 7.
Open Port-based Bridge If selected, bridge this channel to one or more LAN ports.
WAN IP Network Settings Obtain an IP address automatically – Select this option if the
router is to receive IP configuration information from a DHCP
server.
Router Name – Sets the value of DHCP Option 12, which
After finished the above settings, click OK to save the settings and return to previous page.
Item Description
Index The WAN port.
Click to configure WAN Budget for a particular WAN.
Enable Check the box to enable the WAN Budget.
Quota The current cycle’s Internet usage is expressed as x/y where
x is the cumulative usage and y is the upper limit. For
example, 100MB/200MB means the usage thus far in this
cycle is 100MB, and the upper limit is 200MB.
When quota exceeded Actions to be taken once the quota is reached.
Shutdown – WAN will be disabled.
Mail Alert – Email will be sent to the administrator.
Time cycle Reset frequency of the usage data.
Monthly – The Monthly option in the Criterion and Action
tab was used to set up the usage quota.
User Defined: The User Defined option in the Criterion and
Action tab was used to set up the usage qota.
Duration Start and end timestamps of the current cycle.
Click WAN1 (to WAN8) link to open the following web page.
Item Description
Enable When selected, WAN Budget is enabled for this WAN.
Quota Limit Enter the data traffic quota allowed for such WAN interface.
There are two unit (MB and GB) offered for you to specify.
When quota exceeded Check the box(es) as the condition(s) for the system to
perform when the traffic has exceeded the budget limit.
Shutdown WAN interface – All the outgoing traffic through
such WAN interface will be terminated.
Using Notification Object – The system will send out a
notification based on the content of the notification
object.
Set Mail Alert – The system will send out a warning
message to the administrator when the quota is running
out. However, the connection charges will be
calculated continuously.
Set SMS message - The system will send out SMS
message to the administrator when the quota is running
out.
Monthly Some ISP might apply for the network limitation based on the
traffic limit per month. This setting is to offer a mechanism
of resetting the traffic record every month.
If the WAN budget is exhausted, a lock will be displayed on the page if Shutdown WAN
interface is selected. Which means no data transmission will be carried out. Moreover, the
system will send out a warning message to the administrator if Mail Alert is selected. Or, the
system will send out SMS message to the administrator if SMS message is selected.
A LAN(Local Area Network) comprises a collection of LAN clients, which are networked
devices on your premises. A LAN client can be a computer, a printer, a Voice-over-IP (VoIP)
phone, a mobile phone, a gaming console, an Internet Protocol Television (IPTV), etc, and can
have either a wired (using Ethernet cabling) or wireless (using Wi-Fi) network connection.
LAN clients within the same LAN are normally able to communicate with one another directly,
as they are peers to one another, unless measures, such as firewalls or VLANs, have been put
in place to restrict such access. Nowadays the most common LAN firewalls are implemented
on the LAN client itself. For example, Microsoft Windows since Windows XP and Apple OS X
have built-in firewalls that can be configured to restrict traffic coming in and going out of the
computer. VLANs, on the other hand, are usually set up using network switches or routers.
To communicate with the hosts outside of the LAN, LAN clients have to go through a network
gateway, which in most cases is a router that sits between the LAN and the ISP network,
which is the WAN. The router acts as a director to ensure traffic between the LAN and the
WAN reach their intended destinations.
IP Address
On most broadband networks, the ISP assigns a single WAN IP address to the subscriber. All
LAN clients have to share this WAN IP address when accessing the Internet. To achieve this, a
technique called Network Address Translation (NAT) is used. Under NAT, a private block of IP
addresses is assigned to the LAN clients, which communicate with WAN hosts through the
router, also known as the gateway.
On outgoing traffic to the WAN, the router makes note that a LAN client has attempted to
reach a WAN host, and forwards the request to the intended WAN recipient.
On traffic incoming to the LAN from a WAN host, the router checks its records to see if a
matching outstanding request from a LAN client to this WAN host exists, and if so, forwards it
to the LAN client. Otherwise, the traffic is dropped.
There are 3 distinct blocks of IPv4 address that are reserved for use as private IP addresses on
a LAN.
The default beginning IP Address of LAN 1 is 192.168.1.1, and the Subnet Mask is
255.255.255.0, for a total of 254 assignable IP addresses, from 192.168.1.1 to 192.168.1.254.
The final IP address of the selected range is reserved for routing and cannot be assigned to a
LAN client.
In most cases, the default IP address block should work satisfactorily. However, there are
situations where you need to select a different address block, such as when you need to
communicate with other LANs that already use the same address block.
Private IP addresses can be assigned automatically to LAN clients using Dynamic Host
Configuration Protocol (DHCP), or manually assigned. The DHCP server can either be the
router (the most common case), or a separate server, that hands out IP addresses to DHCP
clients.
To begin configuring the LAN settings, select LAN>>General Settings from the menu bar of the
Web UI.
Item Description
General Setup Allow to configure settings for each subnet respectively.
Index - Display all of the LAN items.
When you finish the configuration, please click OK to save and exit this page.
Info To configure a subnet, select its Detials Page button to bring up the LAN
Details Page.
II-3-1-1 Details Page for LAN1 – Ethernet TCP/IP and DHCP Setup
This page has two tabs, LAN Ethernet TCP/IP and DHCP Setup, which sets up the IPv4 LAN
environment, and LAN IPv6 Setup, which sets up the IPv6 environment.
Item Description
Network Configuration For NAT Usage,
IP Address - This is the IP address of the router. (Default:
192.168.1.1).
Subnet Mask - The subnet mask, together with the IP Address
field, indicates the maximum number of clients allowed on
the subnet. (Default: 255.255.255.0/ 24).
LAN IP Alias –Such feature allows specifying multiple
gateways (under a switch) with different WAN interfaces for
accessing the Internet via the Vigor router.
When you finish the configuration, please click OK to save and exit this page.
Item Description
Network Configuration Enable/Disable - Click Enable to enable such configuration;
click Disable to disable such configuration.
For Routing Usage,
When you finish the configuration, please click OK to save and exit this page.
It provides 2 daemons for LAN side IPv6 address configuration. One is SLAAC(stateless) and
the other is DHCPv6 Server (Stateful).
Item Description
Enable IPv6 Enables or disables IPv6 on the LAN.
WAN Primary Interface Select the WAN to be used for IPv6 traffic.
Static IPv6 Address Enter IPv6 Address and Prefix length to be added, or click an
existing IPv6 address to be deleted in the Current IPv6
Address Table below and the values will be automatically
copied over.
IPv6 Address –Type static IPv6 address for LAN.
Prefix Length – Enter the fixed value for prefix length.
Add – Click it to add a new entry.
Delete – Click it to remove an existed entry.
Unique Local Address Unique Local Addresses (ULAs) are private IPv6 addresses
(ULA) configuration assigned to LAN clients.
Off - ULA is disabled.
Manually ULA Prefix - LAN clients will be assigned ULAs
generated based on the prefix manually entered.
Auto ULA Prefix - LAN clients will be assigned ULAs using an
automatically-determined prefix.
Current IPv6 Address Display current used IPv6 addresses.
Table
DNS Server IPv6 Address Deploy when WAN is up – The RA (router advertisement)
packets will be sent to LAN PC with DNS server information
only when network connection by any one of WAN interfaces
is up.
Enable – The RA (router advertisement) packets will be sent
to LAN PC with DNS server information no matter WAN
connection is up or not.
Primary DNS Sever – Enter the IPv6 address for Primary
DNS server.
Secondary DNS Server –Type another IPv6 address for
DNS server if required.
Disable – DNS server will not be used.
Management Configures the Managed Address Configuration flag (M-bit) in
Route Advertisements.
Off - No configuration information is sent using Route
Advertisements.
SLAAC(stateless) - M-bit is unset.
DHCPv6(stateful) - M-bit is set, which indicates to LAN
clients that they should acquire all IPv6 configuration
information from a DHCPv6 server. The DHCPv6 server
can either be the one built into the Vigor2860, or a
separate DHCPv6 server.
Other Option (O-bit) - When selected, the Other
Configuration flag is set, which indicates to LAN clients that
IPv6 configuration information besides LAN IPv6 addresses is
available from a DHCPv6 server.
Setting the M-bit (see Management above) has the same
effect as implicitly setting the O-bit, as DHCPv6 supplies all
IPv6 configuration information, including what is indicated as
available when the O-bit is set.
Advance setting The Advanced Settings page has additional settings for
Router Advertisement and enabling multiple WANs for IPv6
traffic.
After making changes on the Advance setting page, click the OK button to retain the changes
and return to the LAN IPv6 Setup page. Be sure to click OK on the LAN IPv6 Setup page or else
changes made on the Advance setting page will not be saved.
Item Description
Customized List Shows all the DHCP options that have been configured in the
system.
Enable If selected, DHCP option entry is enabled.
If unselected, DHCP option entry is disabled.
Interface LAN interface(s) to which this entry is applicable.
Next Server IP Overrides the DHCP Next Server IP address (DHCP Option 66)
Address/SIAddr supplied by the DHCP server.
Option Number DHCP option number (e.g., 100).
DataType Type of data in the Data field:
ASCII Character - A text string. Example: /path.
Hexadecimal Digit - A hexadecimal string. Valid characters
are from 0 to 9 and from a to f. Example: 2f70617468.
Address List - One or more IPv4 addresses, delimited by
commas.
Data Data of this DHCP option.
Add To add a DHCP option entry modeled after an existing entry,
click the model entry in Customized List. The data entry
fields will be populated with values from the model entry.
After making all necessary changes for the new entry, click
Add to create it.
Update To modify an existing DHCP option entry, click on it in
Customized List. The data entry fields will be populated
with the current values from the entry. After making all
necessary changes, click Update to save the changes.
Delete To delete a DHCP option entry, click on it in Customized
List, and then click Delete.
Reset Clear the current settings.
Tagged VLAN
The tagged VLANs (802.1q) can mark data with a VLAN identifier. This identifier can be
carried through an onward Ethernet switch to specific ports. The specific VLAN clients can
also pick up this identifier as it is just passed to the LAN. You can set the priorities for
LAN-side QoS. You can assign each of VLANs to each of the different IP subnets that the router
may also be operating, to provide even more isolation. The said functionality is tag-based
multi-subnet.
Info Settings in this page only applied to LAN port but not WAN port.
Item Description
Enable Enables or disables VLAN functionality.
VLAN# Virtual LANs.
LAN Port P2 – P10 – Physical Ethernet ports on the router. Select the
LAN port(s) to group them under the selected VLAN.
Subnet Select a LAN subnet from LAN 1 to LAN 100 to make the
selected VLAN mapping to the specified subnet only.
Inter-LAN Routing
The Vigor router supports up to 99 VLANs. Each VLAN can be set up to use one or more of the
Ethernet ports and wireless LAN Service Set Identifiers (SSIDs). Within the grid of VLANs
(horizontal rows) and LAN interfaces (vertical columns),
all hosts within the same VLAN (horizontal row) are visible to one another
all hosts connected to the same LAN or WLAN interface (vertical column) are visible to
one another if
- they belong to the same VLAN, or
- they belong to different VLANs, and inter-LAN routing (LAN>>General Setup) between
them is enabled (see below).
Item Description
Enable MAC addresses that have an IP address assigned on this page
will receive that IP address through DHCP.
Disable MAC address-to-IP address bindings configured on this page
are ignored by the DHCP server when assigning IP addresses
through DHCP.
ARP Table This table is the LAN ARP table of this router. The
information for IP and MAC will be displayed in this field.
Each pair of IP and MAC address listed in ARP table can be
selected and added to IP Bind List by clicking Add below.
Select All Select all entries in the ARP Table for manipulation.
Sort Sort the entries in the ARP Table by IP address.
Refresh Refresh the screen to reflect the current state of the ARP
table.
Add / Update to IP Bind IP Address – Enter the IP address to be associated with a
List MAC address.
Mac Address – Enter the MAC address of the LAN client’s
network interface.
Comment –Optional comment field to identify this IP
Address–MAC Address pair.
Add It allows you to add the one you choose from the ARP table or
the IP/MAC address typed in Add and Edit to the table of IP
Bind List.
Update It allows you to edit and modify the selected IP address and
MAC address that you create before.
Delete You can remove any item listed in IP Bind List. Simply click
and select the one, and click Delete. The selected item will
be removed from the IP Bind List.
IP Bind List It displays a list for the IP bind to MAC information.
Info Before you select Strict Bind, you have to bind one set of IP/MAC address for
one PC. If not, no one of the PCs can access into Internet. And the web user
interface of the router might not be accessed.
Item Description
Continuously Send All Select to send all packets to mirror port.
Packets to Mirror Port
Enable/Disable Select Enable to activate the function.
Select Disable to cancel the function.
Mirror Port One and only one port is selected as the mirror port, to
which traffic is to be forwarded.
Mirrored Tx Port Port(s) whose outbound traffic will be forwarded to the
mirror port.
Mirrored Rx Port Port(s) whose inbound traffic will be forwarded to the mirror
port.
OK Save the settings.
Item Description
Download .pcap If it is selected, the packets from the specified mirror port
can be downloaded for analysis.
Mirror Port One and only one port is selected as the mirror port, to
which traffic is to be forwarded.
Mirrored Tx Port Port(s) whose outbound traffic will be forwarded to the
mirror port.
Mirrored Rx Port Port(s) whose inbound traffic will be forwarded to the mirror
port.
Setting Capture All Packets - All packets will be captured for
analysis.
Capture with Filter - Only the packets filtered by ICMP, TCP,
UDP, or TCP/UDP will be captured for analysis.
Duration Set a period of time for Vigor router to capture the packets.
Filter Settings It is available only when Capture with Filter is selected.
Protocol - Filter the packet by using Any, ICMP, TCP, UDP,
and TCP/UDP.
IP Address - Filter the packet by IP address. If Customized IP
is selected, please enter an IP address in the entry box.
Port - It is available when TCP, UDP, or TCP/UDP is selected
as the Protocol. Select Any or Customize Port. If Customize
Port is selected, please enter a port number in the entry box.
Start Click to begin the packet capturing.
After finishing all the settings here, please click OK to save the configuration.
Most ISPs allocate one WAN IP address to each subscriber. In order to simultaneously connect
multiple devices to the Internet, a technique called Network Address Translation is
employed.
Usually, the router serves as an NAT (Network Address Translation) router. NAT is a
mechanism that one or more private IP addresses can be mapped into a single public one.
Public IP address is usually assigned by your ISP, for which you may get charged. Private IP
addresses are recognized only among internal hosts.
When the outgoing packets destined to some public server on the Internet reach the NAT
router, the router will change its source address into the public IP address of the router,
select the available public port, and then forward it. At the same time, the router shall list an
entry in a table to memorize this address/port-mapping relationship. When the public server
response, the incoming traffic, of course, is destined to the router’s public IP address and the
router will do the inversion based on its table. Therefore, the internal host can communicate
with external host smoothly.
The benefit of the NAT includes:
Save cost on applying public IP address and apply efficient usage of IP address. NAT
allows the internal IP addresses of local hosts to be translated into one public IP address,
thus you can have only one IP address on behalf of the entire internal hosts.
Enhance security of the internal network by obscuring the IP address. There are
many attacks aiming victims based on the IP address. Since the attacker cannot be
aware of any private IP addresses, the NAT function can protect the internal network.
Info On NAT page, you will see the private IP address defined in RFC-1918.
Usually we use the 192.168.1.0/24 subnet for the router. As stated before,
the NAT facility can map one or more IP addresses and/or service ports into
different specified services. In other words, the NAT function can be
achieved by using port mapping methods.
Item Description
Index Click to view and edit details of the rule.
Enable Select to enable the port redirection rule.
Service Name User-entered name that identifies the rule.
WAN Interface WAN interface(s) to which this rule applies. A particular WAN
interface or ALL interfaces.
Protocol The protocol to which this rule applies, TCP or UDP.
Public Port The port or range of WAN ports that is redirected by this rule.
Source IP The IP object of the source IP.
Private IP The LAN IP address(es) to which the traffic is redirected.
Press any number under Index to access into next page for configuring port redirection.
Item Description
Enable Select to enable the port redirection setting.
After finishing all the settings here, please click OK to save the configuration.
Note that the router has its own built-in services (servers) such as Telnet, HTTP and FTP etc.
Since the common port numbers of these services (servers) are all the same, you may need to
reset the router in order to avoid confliction.
For example, the built-in web user interface in the router is with default port 80, which may
conflict with the web server in the local network, http://192.168.1.13:80. Therefore, you
need to change the router’s http port to any one other than the default port 80 to avoid
conflict, such as 8080. This can be set in the System Maintenance >>Management Setup. You
then will access the admin screen of by suffixing the IP address with 8080, e.g.,
http://192.168.1.1:8080 instead of port 80.
The security properties of NAT are somewhat bypassed if you set up DMZ host. We suggest
you to add additional filter rules or a secondary firewall.
Click DMZ Host to open the following page. You can set different DMZ host for each WAN
interface. Click the WAN tab to switch into the configuration page for that WAN.
Item Description
Enables or disables DMZ host.
None - Disables DMZ host function.
Private IP - Allows WAN traffic to be sent to a specific LAN IP
address.
When you have selected one private IP from the above dialog,
the IP address will be shown on the screen. Click OK to save
the setting.
DMZ Host for other WAN interface is slightly different with WAN1.
See the following figure.
If you previously have set up WAN Alias for PPPoE or Static or Dynamic IP mode in WAN2
interface, you will find them in Aux. WAN IP for your selection.
Item Description
Enable Check to enable the DMZ Host function.
Private IP Enter the private IP address of the DMZ host, or click Choose
PC to select one.
Choose IP Click this button and then a window will automatically pop
up, as depicted below. The window consists of a list of
private IP addresses of all hosts in your LAN network. Select
one private IP address in the list to be the DMZ host.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Index Indicate the relative number for the particular entry (1 to
260) that you want to offer service in a local host. Click to
view and edit the rule.
Enable Select the box to enable the open port rule.
Comment User-entered label that identifies the rule.
WAN Interface The WAN port(s) whose incoming traffic will be forwarded to
a LAN client.
Aux. WAN IP Display the IP alias setting used by such index.
If no IP alias setting exists, this field will not appear.
Source IP The IP object of the source IP.
Local IP Address LAN client to receive the forwarded WAN traffic.
To add or edit port settings, click one index number on the page. The index entry setup page
will pop up. In each index entry, you can specify 10 port ranges for diverse services.
Item Description
Enable Open Ports Select to enable this rule.
Comment User-entered label that identifies the rule.
WAN Interface The WAN port(s) whose incoming traffic will be forwarded to
a LAN client. Select from a specific WAN interface WAN1 to
WAN52, or choose ALL to apply the rule to all WAN
interfaces.
WAN IP Specify the WAN IP address that will be used for this entry.
This setting is available when WAN IP Alias is configured.
Source IP Any - Any IP can be used as the source IP.
IP Object - Use the drop down list to specify an IP object
proifle.
IP Group - Use the drop down list to specify an IP group
profile.
Private IP IP address of LAN client to receive the forwarded WAN
traffic. Click Choose IP to select.
Choose IP - Click this button and, subsequently, a window
having a list of private IP addresses of local hosts will
automatically pop up. Select the appropriate IP address of
the local host in the list.
Protocol The protocol(s) to which this rule applies.
TCP - forward only TCP traffic.
UDP - forward only UDP traffic.
TCP/UDP - forward both TCP and UDP traffic.
Start Port The port number of the starting port to be forwarded.
End Port The port number of the ending port to be forwarded. If only
one port is to be forwarded, enter the same port number as
the Start Port.
Item Description
Index Rule number. Click to view or modify rule settings.
Enable Select to enable the Port Triggering rule.
Comment User-entered label that identifies the rule.
Triggering Protocol The protocol(s) of the outgoing traffic that this rule
monitors.
TCP- monitor only TCP traffic.
UDP- monitor only UDP traffic.
TCP/UDP- monitor both TCP and UDP traffic.
Source IP The IP object of the source IP.
Triggering Port Display the port of the triggering packets.
Outgoing traffic destined for these port numbers will trigger
the opening WAN ports to incoming traffic.
Incoming Protocol Display the protocol for the incoming data of such triggering
profile.
The protocol(s) of the incoming traffic.
TCP-open port(s) to TCP traffic.
UDP- open port(s) to UDP traffic.
TCP/UDP- open port(s) to both TCP and UDP traffic.
Incoming Port Display the port for the incoming data.
Item Description
Enable Select to enable rule.
Service Select from list of predefined service, or User Defined to
manually configure triggering and incoming protocols and
ports.
Comment Enter the text to memorize the application of this rule.
Source IP Any - Any IP can be used as the source IP.
IP Object - Use the drop down list to specify an IP object
proifle.
IP Group - Use the drop down list to specify an IP group
profile.
Triggering Protocol The protocol(s) of the outgoing traffic that this rule
monitors.
TCP - monitor only TCP traffic.
UDP - monitor only UDP traffic.
TCP/UDP - monitor both TCP and UDP traffic.
Triggering Port Outgoing traffic destined for these port numbers will trigger
the opening WAN ports to incoming traffic.
Enter the port or port range for such triggering profile.
Incoming Protocol The protocol(s) of the incoming traffic.
TCP-open port(s) to TCP traffic.
UDP- open port(s) to UDP traffic.
TCP/UDP- open port(s) to both TCP and UDP traffic.
Select the protocol (TCP, UDP or TCP/UDP) for the incoming
data of such triggering profile.
Incoming Port Incoming traffic from the WAN destined for these port
numbers be forwarded to the LAN client that triggered the
After finishing all the settings here, please click OK to save the configuration.
Item Description
Enable ALG Check to enable such function.
Listen Port Type a port number for SIP or RTSP protocol.
TCP Check the box to make correspond protocol message packet
from TCP transmit and receive via NAT.
UDP Check the box to make correspond protocol message packet
from UDP transmit and receive via NAT.
Dynamic DNS
Most ISPs assigns dynamic WAN IP addresses to their customers. Dynamic IP addresses
presents challenges to users who would like to accept remote connections to their LANs from
the Internet, as service could be disrupted due to the IP address changing without notice. By
setting up service with a Dynamic DNS (DDNS) provider, and configuring Dynamic DNS updates
on the Vigor router, you can have reliable access to your network by means of an
easy-to-remember domain address that resolves to the most current WAN IP address.
The Vigor router supports a wide range of DDNS providers, such as DynDNS, No-IP.com, DtDNS,
and ChangeIP. Please contact the DDNS provider of your choice to set up service before
configuring DDNS on the router.
Schedule
The Vigor router has a built-in clock which can update itself manually or automatically by
means of Network Time Protocols (NTP). As a result, you can not only schedule the router to
dialup to the Internet at a specified time, but also restrict Internet access to certain hours so
that users can connect to the Internet only during certain hours, say, business hours. The
schedule is also applicable to other functions.
RADIUS/TACACS+
Remote Authentication Dial-In User Service (RADIUS) is a security authentication
client/server protocol that supports authentication, authorization and accounting, which is
widely used by Internet service providers. It is the most common method of authenticating
and authorizing dial-up and tunneled network users.
The built-in RADIUS client feature enables the router to assist the remote dial-in user or a
wireless station and the RADIUS server in performing mutual authentication. It enables
centralized remote access authentication for network management.
Wake on LAN
Using the Wake on LAN (WoL) feature, LAN clients that support WoL can be powered on or
resume from sleep over the network, without the need for physical access to the device.
In order for LAN clients to be able to woken from sleep or off states, the network interface
card must be configured to monitor Wake-on-LAN messages. Consult the documentation of
the LAN client for details on setting up its network interface for Wake on LAN.
Item Description
Enable Dynamic DNS Setup Select to enable DDNS function.
Set to Factory Default Click to clear all profiles to factory settings.
View Log Select to display the most recent DDNS update messages.
Force Update Click to connect immediately to DDNS servers to update IP
address information.
Auto-Update interval The frequency, in minutes, at which the router connects to
DDNS servers to update IP address information.
After clicking on the index number, the detail configuration screen for the DDNS profile
appears:
If User-Defined is specified as the service provider, the web page will be changed slightly as
follows:
Item Description
Click OK to save changes, Clear to clear all settings, or Cancel to discard changes and return
to the main DDNS screen.
DrayDDNS Settings
DrayDDNS, a new DDNS service developed by DrayTek, can record multiple WAN IP (IPv4) on
single domain name. It is convenient for users to use and easily to set up. Each Vigor Router is
available to register one domain name.
Choose DrayTek Global as the service provider, the web page will be displayed as follows:
Item Description
To start configuring LAN DNS or DNS Forwarding, from the main menu, click Applications,
followed by LAN DNS / DNS Forwarding.
Item Description
Set to Factory Default Click to clear all profiles to factory settings.
To configure a LAN DNS profile, click on its index to bring up the configuration page.
Item Description
Enable Select to enable this profile.
Profile Enter a name to identify this profile.
Note: If you type a name here for LAN DNS and click OK to
save the configuration, the name also will be applied to
conditional DNS forwarding automatically.
Domain Name Enter the domain name for the router to look for in DNS
queries to intercept and reply to. Wildcards in the form of
asterisks (*) can be used to match a domain level. For
example, *.draytek.com will match domain names such as
www.draytek.com and ftp.draytek.com, whereas
www.draytek.* will match domain names such as
www.draytek.com and www.draytek.co.uk.
CNAME (Alias Domain Click Add to add an domain name alias for the domain name.
To save changes made to the LAN DNS profile, click OK. To clear the profile and restore the
factory default blank values, click Clear.
If you need to configure LAN DNS settings, click index 1 to edit the LAN DNS profile just
created. Or, you can click index 2 to use this profile as conditional DNS forwarding.
Item Description
Enable Check this box to enable such profile.
To save changes made to the LAN DNS profile, click OK. To clear the profile and restore the
factory default blank values, click Clear.
Item Description
Interface The WAN interface name for which DNS security is to be
configured.
Enable Select to enable DNS security for this WAN Interface.
Primary DNS Shows the primary DNS server IP address in effect for this
WAN.
Secondary DNS Shows the secondary DNS server IP address in effect for this
WAN.
Bogus DNS Reply Show action to be taken for DNS responses that fail
authentication. Choose Pass or Drop.
Pass – Pass DNS result.
Drop – Do not pass DNS result.
Item Description
Domain Enter domain address to be diagnosed.
Select the type of IP address to be looked up.
IPv4 – looks up A records.
IPv6 – looks up AAAA records.
Interface Select the WAN port to be used for the lookup.
DNS Server Enter the IPv4 address of the DNS server to be used for the
lookup.
Diagnose Click to begin DNS lookup.
Result The history of domain diagnosis is shown in the Result panel.
Item Description
Current System Time Shows the current time of the router.
System time set Click to navigate to System Maintenance >> Time and Date
to set the system time and date.
Set to Factory Default Reset all schedules to factory default values.
Index Shows the index number of the schedule entry.
Enable Select to enable the schedule; clear to disable it.
Comment Shows the name given to the schedule.
Time Shows the start and end times of the schedule. The time
interval of the schedule is indicated in dark grey.
Item Description
Enable Schedule Setup Select to enable the schedule; clear to disable it.
Comment Name to identify this schedule entry.
Start Date (yyyy-mm-dd) The date when the entry comes into effect.
Start Time (hh:mm) The time when the schedule is triggered. See the How Often
setting below for details.
Duration Time (hh:mm) How long the action lasts when the scheduled is triggered.
End Time (hh:mm) It will be calculated automatically when Start Time and
Duration Time are configured well.
Action Action to take when the schedule is triggered.
Force On – The feature with which this schedule is
associated will be turned on.
Force Down – The feature with which this schedule is
associated will be turned off.
To save changes made to the Schedule, click OK. To clear the schedule and restore the
factory default blank values, click Clear. To cancel the changes and return to the main
Schedule page, click Cancel.
Example
Suppose you want to control the PPPoE Internet access connection to be always on (Force On)
from 9:00 to 18:00 for whole week. Other time the Internet access connection should be
disconnected (Force Down).
Office
Hour:
(Force On)
1. Make sure the PPPoE connection and Time Setup is working properly.
2. Configure the PPPoE always on from 9:00 to 18:00 for whole week.
3. Configure the Force Down from 18:00 to next day 9:00 for whole week.
4. Assign these two profiles to the PPPoE Internet access profile. Now, the PPPoE Internet
connection will follow the schedule order to perform Force On or Force Down action
according to the time plan that has been pre-defined in the schedule profiles.
Item Description
RADIUS Server Status Log Display the record of current status of RADIUS server.
Enable Select to enable the profile.
Comment Displays the comment of the profile.
Primary Server Displays the IP address of the primary server.
Secondary Server Display the IP address of the secondary server.
Default Profile Select one of the profiles as the default profile for user
authentication.
Item Description
Enable this profile Check to enable RADIUS client profile.
Comment - Enter a brief description for this profile.
Enable Accounting After checking it, Vigor router supports the accounting
feature (available seconds for using, quantity of RX/TX data)
for external RADIUS server. Any client tries to access the
Internet shall be authenticated and accounted by an external
RADIUS server.
Accounting Port –The UDP port number that the RADIUS
server is using. The default value is 1813, based on RFC 2138.
Disconnect Message Port – Set a port number for listenning
the RADIUS disconnection message.
Interim Update Interval – Set a time interval for sending the
accounting request to the RADIUS server.
To save changes on the page, click OK. To discard changes, click Cancel. To reset all settings
to blank, click Clear.
Item Description
Enable Select to enable the router's internal RADIUS server.
Authentication Port The UDP port for authentication message.
RADIUS Client Access List Only clients that meet the criteria configured in the access
list are allowed to access the RADIUS server.
Index - The index number of the client entry.
Enable - Select to enable this client entry.
Shared Secret - A text string that is known to both the
router’s RADIUS server and the RADIUS client that is used to
authenticate messages sent between them. Maximum length
is 36 characters.
IP Address – Enter the base address of the IP block.
To add a User Profile to the RADIUS server, select it under Available List, then click the >>
button. To remove a User Profile from the RADIUS server, select it under Selected
Authentication List, then click the << button.
To save changes on the page, click OK. To discard changes, click Cancel. To reset all settings
to blank, click Clear.
Item Description
Enable Select to enable the use of an external TACACS+ server.
Server IP Address The IP address of the TACACS+ server.
Destination Port The port used by the TACACS+ server. Port 49 is most
common.
Shared Secret A text string that is known to both the TACACS+ server and
client (the router) that is used to authenticate messages sent
between them. Maximum length is 36 characters.
Confirm Shared Secret Enter the shared secret again for verification.
To save changes on the page, click OK. To discard changes, click Cancel. To reset all settings
to blank, click Clear.
Item Description
Enable Select to enable LDAP client.
Bind Type Select from one of 3 bind types:
Simple Mode – Initiate bind operation (authentication)
without performing user search. This mode can be used
when all users belong to the same branch in the LDAP
structure.
Anonymous – Bind anonymously, without supplying the
distinguished name (DN) and password, and perform user
search. This mode can be used when not all users belong
to the same branch and the server allows anonymous
searches.
Regular Mode – Same as Anonymous mode, except that
the DN and password are sent to the server. This mode
can be used when not all users belong to the same branch
and the server does not allow anonymous searches.
For the regular mode, you’ll need to Enter the Regular DN and
Regular Password.
Server Address The network address of the LDAP server.
Destination Port The network port that the LDAP server listens on. The default
ports are 389 for unsecured connections and 636 for LDAPS
(LDAP over SSL) connections.
To save changes on the page, select OK; to discard changes, select Cancel.
Item Description
Index The index of the LDAP profile. Click to show the profile
settings page.
Name Displays the user-defined name that identifies this entry.
Distinguished Name Displays the distinguished name (DN) configured in the profile.
To configure an LDAP profile, click on its index to show the following settings page.
Common Name Identifier The common name attribute, which is typically “cn” in most
LDAP configurations.
Base Distinguished Name The starting point of user search in the LDAP directory, for
example, dc=draytek,dc=com.
Group Distinguished The base DN of the tree in the LDAP directory that contains
Name groups, for example, ou=groups,dc=draytek,dc=com.
To save changes on the page, select OK; to discard changes, select Cancel.
Item Description
IGMP Proxy Check this box to enable this function. The application of
multicast will be executed through WAN /PVC/VLAN port.
In addition, such function is available in NAT mode.
Interface – Specify an interface for packets passing
through.
IGMP version – At present, two versions (v2 and v3) are
supported by Vigor router. Choose the correct version
based on the IPTV service you subscribe.
General Query Interval – Vigor router will periodically
check which IP obtaining IPTV service by sending query. It
might cause inconvenience for client. Therefore, set a
suitable time (unit: second) as the query interval to limit
the frequency of query sent by Vigor router.
Add PPP header – Check this box if the interface type for
IGMP is PPPoE. It depends on the specifications regulated
by each ISP. If you have no idea to enable or disable, simply
contact your ISP providers.
Enable IGMP syslog - Check the box to store the IGMP
status ontot Syslog.
To save changes on the page, select OK; to discard changes, select Cancel.
Item Description
Refresh Click to reload the Multicast Group Table with the latest
information.
Index Index number of the multicast group.
Group ID ID port of the multicast group, which is within the IP range
reserved for IGMP, 224.0.0.0 through 239.255.255.254.
P2 to P10 LAN ports that have IGMP hosts joined to this multicast
group.
Item Description
Wake by The type of address of the LAN client to be woken up.
If you choose Wake by MAC Address, you have to
Enter the correct MAC address of the host in MAC
Address boxes.
If you choose Wake by IP Address, you have to choose
the correct IP address.
IP Address The IP addresses that have been configured in
Firewall>>Bind IP to MAC will be shown in this drop down
list.
Select the IP address of the LAN client.
MAC Address Enter the MAC address of the LAN client.
Wake Up Click to send Wake-on-LAN message to the specified LAN
client.
Result Result of the transmission of the Wake-on-LAN message.
Item Description
Set to Factory Default Click to clear all SMS alert profiles.
Enable Select the checkbox to enable the profile.
SMS Provider Select the profile of the SMS provider to be used. To set up
or modify SMS provider profiles, click the hyperlink SMS
Provider to go to Objects Setting >> SMS/Mail Service
Object.
Recipient Number Enter the recipient’s SMS number.
Notify Profile Select the notification profile to be used. To set up or
modify notification object profiles, click the hyperlink
Notify Profile to go to Objects Setting >> Notification
Object.
Schedule (1-15) Enter up to 2 schedule profile indexes. To set up or modify
schedule profiles, click the hyperlink Schedule(1-15) to go
to Applications >> Schedule.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Set to Factory Default Click to clear all mail alert profiles.
Enable Select the checkbox to enable the profile.
Mail Service Select the profile of the mail provider to be used. To set up
or modify a mail provider profile, click the hyperlink Mail
Service to go to Objects Setting >> SMS/Mail Service
Object.
Mail Address Enter the recipient's email address.
Notify Profile Select the notification profile to be used. To set up or
modify a notification object profile, click the hyperlink
Notify Profile to go to Objects Setting >> Notification
Object.
Schedule (1-15) Enter up to 2 schedule profile indexes. To set up or modify
schedule profiles, click the hyperlink Schedule(1-15) to go
to Applications >> Schedule.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Enable Bonjour Service Select to enable the Bonjour service on the router. The rest
of the checkboxes will be enabled for selection when this
checkbox has been selected.
HTTP Server Select to allow the router’s HTTP server to be discovered
via Bonjour.
Telnet Server Select to allow the router’s telnet server to be discovered
via Bonjour.
SSH Server Select to allow the router’s SSH server to be discovered via
Bonjour.
Below shows an example for applying the bonjour feature that Vigor router can be used as the
FTP server.
1. Here, we use Firefox and DNSSD to discover the service in such case. Therefore, just
ensure the Bonjour client program and DNSSD for Firefox have been installed on the
computer.
4. Next, open Applications>>Bonjour. Check the service that you want to use via Bonjour.
5. Open the DNSSD page again. The available items will be changed as the follows. It means
the Vigor router (based on Bonjour protocol) is ready to be used as a printer server, FTP
server, SSH Server, Telnet Server, and HTTP Server.
Item Description
When you finish the configuration, please click OK to save and exit this page.
Item Description
Enable Config Sync (Max. Select to enable configuration synchronization.
Sync to 10 routers) All routers to be synchronized must have this checkbox
selected.
Note that config sync can be enabled by Hot-Standby
redundancy method only.
Config Sync Interval Day / Hour / Minute - The primary router will synchronize its
configuration with secondary routers at every specified time
interval.
Exclude the following This setting is available when the Redundancy Method is set
settings from config sync to Hot Standby.
Select the configuration settings to be excluded from
synchronization.
When you finish the configuration, please click OK to save and exit this page.
When the configuration method is set to “Hot Standby”, the following settings will not be
synchronized:
WAN (user selectable)
LAN
LAN IPv6
Example:
Take the following picture as an example. The upper Vigor1000B is regarded as primary
device, the lower Vigor1000B is regarded as secondary device. When primary Vigor1000B
Series is broken down, the secondary device could replace the primary role to take over all
jobs as soon as possible. However, once the primary device is working again, the secondary
device would be changed to original role to stand by.
After above configurations, users belong to either “rd1” or “shrd” group can access Internet
after inputting their credentials on LDAP server.
Route Policy (also well known as PBR, policy-based routing) is a feature where you may need
to get a strategy for routing. The packets will be directed to the specified interface if they
match one of the policies. You can setup route policies in various reasons such as load balance,
security, routing decision, and etc.
Through protocol, IP address, port number and interface configuration, Route Policy can be
used to configure any routing rules to fit actual request. In general, Route Policy can easily
reach the following purposes:
Load Balance
You may manually create policies to balance the traffic across network interface.
Specify Interface
Through dedicated interface (WAN/LAN/VPN), the data can be sent from the source IP to the
destination IP.
Address Mapping
Allows you specify the outgoing WAN IP address (es) for an internal private IP address or a
range of internal private IP addresses.
Priority
The router will determine which policy will be adopted for transmitting the packet according
to the priority of Static Route and Route Policy.
Failover to/Failback
Packets will be sent through another Interface or follow another Policy when the original
interface goes down (Failover to). Once the original interface resumes service (Failback),
the packets will be returned to it immediately.
Other routing
Specify routing policy to determine the direction of the data transmission.
Info For more detailed information about using policy route, refer to SUPPORT
>> TECH SUPPORT >>FAQs on www.draytek.com.
Index The number (1 to 300) under Index allows you to open next
page to set up static route.
Enable Enables or disables the static route.
Destination Address Beginning destination address.
Info There are two reasons that we have to apply RIP Protocol Control on
1st Subnet. The first is that the LAN interface can exchange RIP
packets with the neighboring routers via the 1st subnet
(192.168.1.0/24). The second is that those hosts on the internal
private subnets (ex. 192.168.10.0/24) can access the Internet via the
router, and continuously exchange of IP routing information with
different subnets.
2. Click the LAN >> Static Route and click on the Index Number 1. Check the Enable box.
Please add a static route as shown below, which regulates all packets destined to
192.168.10.0 will be forwarded to 192.168.1.2. Click OK.
Item Description
Enable Enables or disables the static route.
Destination IP Beginning destination address. Enter an IP address as the
Address destination of the static route.
Subnet Mask Subnet mask of the destination address. Enter the subnet
mask for the static route.
Gateway IP Address Enter the IP address of the gateway, which is the host that
the traffic needs to go through to reach the destination.
Network Interface Use the drop down list to specify an interface for such
static route. The LAN or WAN that should be used to
contact the gateway.
3. Return to Static Route Setup page. Click on another Index Number to add another
static route as show below, which regulates all packets destined to 211.100.88.0 will be
forwarded to 192.168.1.3. Click OK.
Item Description
Set to Factory Default Clear all of the settings and return to factory default
settings.
Viewing IPv6 Routing Displays the routing table for your reference.
Table
Index The number (1 to 300) under Index allows you to open next
page to set up static route.
Enable Enables or disables the static route.
Destination Address Beginning destination address.
Item Description
Enable Enables or disables the static route.
Destination IPv6 Address / Beginning destination address and the number of bits in the
Prefix Len subnet mask of the destination IPv6 address.
Enter the IP address with the prefix length for this entry.
Gateway IPv6 Address IP address of the gateway, which is the host that the traffic
needs to go through to reach the destination.
Network Interface The LAN or WAN that should be used to contact the
gateway.
When you finish the configuration, please click OK to save and exit this page.
Item Description
Rules per page The number of rules to display on a single page.
Set to Factory Default Clear the settings of all Load-Balance and Route Policy
rules.
Index Rule index. Click to bring up the configuration page of the
rule.
Enable Select to enable this rule.
Protocol Protocol(s) to which this rule applies.
Interface LAN, IP Routed Subnet, WAN or VPN interface that the
traffic described by this rule is to be directed.
Priority The priority of this rule.
Src IP Start The beginning source IP address.
Src IP End The ending source IP address.
Dest IP Start The beginning destination IP address.
If Wizard Mode is selected, you will be guided through the configuration process in three steps.
Only the most commonly used settings will be shown.
1. Click the Wizard Mode radio button.
2. Click Index 1. The setting page will appear as follows:
Item Description
Source IP Source IP addresses to which this rule is to be applied.
Any - This rule applies to all source IP addresses.
Src IP Start, Src IP End - This rule applies to the specified
range of source IP addresses. If there is only one source IP
address, enter the address in both the Start and End fields.
Destination IP Destination IP addresses to which this rule is to be applied.
Any - This rule applies to all destination IP addresses.
Dest IP Start, Dest IP End - This rule applies to the
specified range of destination IP addresses. If there is only
one destination IP address, enter the address in both the
Start and End fields.
Country Object – Specify a country object. All the IPs
coming from the country (countries) specified in the object
will be passed through the WAN interface.
Item Description
Interface You can select an interface from one of the following: WAN,
LAN, VPN, and IP Routed Subnet. Packets match with the
above criteria will be transferred to the interface chosen
here. Select an interface from the list.
4. Specify an interface and click Next. The following page will appear only if you choose
WAN1 ~WAN7 as Interface.
Item Description
Force NAT /Force It determines which mechanism that the router will use to
Routing forward the packet to WAN.
5. After choosing the mechanism, click Next to get the summary page for reference.
Item Description
Enable Select to enable rule and unlock all fields for configuration.
Comment Type a brief explanation for such profile.
Criteria Router examines outgoing LAN traffic to find the first rule
whose criteria are satisfied.
Protocol - Use the drop-down menu to choose a proper
protocol for the WAN interface.
Source - Source IP addresses to which this rule is to be
applied.
Any – This rule applies to all source IP addresses.
IP Range –This rule applies to the specified range of
source IP addresses.
- Start - Enter an address as the starting IP for such
profile.
Click Diagnose.
Item Description
Packet Information Specify the nature of the packets to be analyzed by Vigor
router.
Protocol - Specify a protocol for diagnosis.
Src IP – IP address of host where the traffic originates.
Specify an IP - One source IP address.
Any IP- Source IP address is not specified.
Subnet/IP Routed Subnet - Any source IP address on
the specified subnet.
Dst IP – IP address of the destination host.
Specify an IP - One destination IP address.
Any IP - Destination IP address is not specified.
Dst Port – Number of port to which the traffic is sent. This
setting is only applicable to UDP and TCP protocols. Use the
drop down list to specify the destination port.
Analyze – Click to analyze and display routes, route
policies and load balance rules with matching criteria. If
required, click export analysis to export the result as a
file.
The following shows an analysis example. The packet matched the criteria of one route
policy.
Item Description
Input File Browse – Click to browse folder structure and select an
input file.
Download and example input file - Click to download a
sample input file (blank “.csv” file). Then, click the Browse
button to select that blank “.csv” file for saving the result
of analysis.
The following shows the analysis of the sample input file. The matched routes and policies are
highlighted in green. The Final Result column shows the outcome.
A-1 How to Customize a Secure Route between VPN Router and Remote Router
by Using Route Policy
Example 1:
In the following figure, a LAN to LAN VPN tunnel is built between DrayTek VPN router (e.g.,
Vigor1000B Series) and the remote router. Firewall Router can receive all of the traffic
coming from remote PC which wants to access into Internet; and send back the packets to
Remote Router through VPN Router.
1. Establish a VPN tunnel between VPN Router and the Remote Router.
2. Change to default route for the router located in Remote Router.
3. Access into the web user interface of the router in VPN Router. Then, open Routing >>
Load-Balance / Route Policy and click Advance Mode.
Now, if you want such route policy will be applied by Vigor router with higher priority,
please adjust the value of Priority for such route policy. In general, default route is
specified with the lowest priority for it value is fixed as “250”. And Routes in Routing
Table are fixed as “150”. You can adjust the value for such route policy with lower value,
e.g., 100 to ensure it will be applied to packets transmission with the highest priority.
5. After finished the above settings, click OK to save the configuration.
6. To route the packets coming from the Firewall Router back to the remote router, access
into the web user interface of the Firewall Router. Then, set “192.168.1.1/24” as the
gateway IP address and set “172.16.3.0/24” as the destination IP address.
A Virtual Private Network (VPN) is the extension of a private network that encompasses links
across shared or public networks like the Internet. In short, by VPN technology, you can send
data between two computers across a shared or public network in a manner that emulates the
properties of a point-to-point private link.
The VPN built is suitable for:
Communication between home office and customer
Secure connection between Teleworker, staff on business trip and main office
Exchange data between remote office and main office
POS between chain store and headquarters
Item Description
Enable PPTP VPN Service This is the one of the earliest VPN protocols and is natively
supported by all Microsoft Windows versions since Windows
95, all Android devices, iOS devices before version 10, and
Mac OS X before version 10.12. It is easy to set up, has low
overhead, and moderately secure.
Enable IPSec VPN Service This is a network protocol that encrypts traffic between two
network locations. Windows, by means of Windows Firewall,
natively supports IPsec tunnels between endpoints with
static IP addresses. For computers with dynamically-assigned
IP addresses, DrayTek provides the SmartVPN client .
Enable L2TP VPN Service This is a tunneling protocol used in VPNs. It does not encrypt
network traffic unless used in conjunction with IPsec.
Enable SSL VPN Service This type of VPN uses Secure Sockets Layer (SSL) and
Transport Layer Security (TLS), which are also used to
encrypt traffic to and from websites. Since SSL and TLS work
on top of TCP and UDP, which are the most common internet
protocols, they are less likely to be have issues with firewalls
and gateways.
Enable OpenVPN Service This type of VPN offers a convenient way for users to build
VPN between local end and remote end.
To save changes on the page, select OK; to discard changes, select Cancel; to clear settings
on this page and revert to default settings, select Clear.
Item Description
Dial-In PPP Authentication PAP Only - Authenticate dial-in users using the PAP protocol
only.
PAP/CHAP/MS-CHAP/MS-CHAPv2 - Attempt to authenticate
dial-in users using various CHAP protocols, and if the remote
VPN client fails to authenticate, fall back to PAP.
Dial-In PPP Encryption Specifies if PPP encryption (MPPE) is to be used for dial-in
(MPPE) VPN connections.
Optional MPPE - MPPE is optional. If the VPN client supports
MPPE, PPP data will be encrypted.
Require MPPE (40/128bits) - Require PPP encryption for
dial-in VPN connections. Both 40- and 128-bit encryption
schemes are allowed. The remote dial-in user will use 40-bit
to perform encryption prior to using 128-bit for encryption.
In other words, if 128-bit MPPE encryption method is not
available, then 40-bit encryption scheme will be applied to
encrypt the data.
Maximum MPPE - Require 128-bit PPP encryption for all
dial-in VPN connections.
Mutual Authentication Specifies if mutual authentication is to be used. Some VPN
(PAP) peers (e.g., certain Cisco routers) require bi-directional
authentication used for providing stronger security.
When mutual authentication is enabled, Username and
Password fields should also be populated using values from
After finishing all the settings here, please click OK to save the configuration.
Encapsulating Security Payload (ESP) is a security protocol that provides data confidentiality
and protection with optional authentication and replay detection service.
Item Description
IKE Authentication This usually applies to those are remote dial-in user or node
Method (LAN-to-LAN) which uses dynamic IP address and
IPsec-related VPN connections such as L2TP over IPsec and
IPsec tunnel. There are two methods offered by Vigor router
for you to authenticate the incoming data coming from
remote dial-in user, Certificate (X.509) and Pre-Shared
Key.
Certificate – X.509 certificates can be used for IKE
authentication. To set up certificates on the router, go to
the Certificate Management section.
Preferred Local ID - Specify the preferred local ID
information (Alternative Subject Name First or Subject
Name First) for IPsec authentication while the client is using
the general setting (without a specific Peer IP or ID in the
VPN profile).
General Pre-Shared Key- Define the PSK key for general
authentication.
Confirm General Pre-Shared Key- Re-enter the characters
to confirm the pre-shared key.
XAuth User Pre-Shared Key - Define the PSK key for IPsec
XAuth authentication.
Confirm XAuth User Pre-Shared Key- Re-enter the
characters to confirm the pre-shared key for IPsec XAuth
authentication.
Note: Any packets from the remote dial-in user which does
not match the rule defined in VPN and Remote
Access>>Remote Dial-In User will be applied with the
method specified here.
IPsec Security Method Available mthods include Basic, Medium and High. Each
method offers different encryption, HMAC and DH Group.
Basic - Authentication Header (AH) means data will be
authenticated, but not be encrypted. By default, this option
is active.
Medium - When this option is selected, the Authentication
Header (AH) protocol can be used to provide authentication
to IPsec traffic.
High - When this option is selected, the Encapsulating
Security Payload (ESP) protocol can be used to provide
authentication and encryption to IPsec traffic. Three
encryption standards are supported for ESP: DES, 3DES and
AES, in ascending order of security.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Set to Factory Default Click it to clear all indexes.
Index Click the index number of the profile the view or edit its
settings.
Enable Check to enable the profile.
Name User-entered name that identifies the profile.
Item Description
Enable this account Check to enable such account profile.
Profile Name A name that allows you to identify this profile. The maximum
length of the name you can set is 32 characters.
Accept Any Peer ID When this option is selected, the router accepts any subject
alternative name or subject name as valid, regardless of the
type and value.
Accept Subject When this option is selected, the router accepts the type and
Alternative Name value of the specified subject alternative name as valid
authentication. Supported subject alternative types are IP
Address, Domain Name and E-Mail.
Accept Subject Name When this option is selected, the router performs peer
authentication by matching the values of the different
subject name fields. These fields include Country (C), State
(ST), Location (L), Organization (O), Organization Unit
(OU), Common Name (CN), and Email (E).
To save changes on the page, select OK; to discard changes, select Cancel; to clear settings
on this page and revert to default settings, select Clear.
There is one limitation for the VPN connection. Both routers must be behind a cone NAT, but
not symmetric NAT.
Go to VPN and Remote Access>>VPN Matcher Setup to open the following page.
Item Description
Enable / Disable Click to enable / disable the function of VPN Matcher Setup.
VPN Matcher Server The IP address of the DrayTek VPN Matcher server is defined
as "vpn-matcher.draytek.com" with the port nubmer "31503".
Router List Key Enter the authentication key for finding a Vigor router with
the same group of this device from the VPN matcher server.
Then set a VPN link between Vigor routers on both ends via
With integrating of OpenVPN, Vigor router can help users to achieve more robust, reliable and
secure private connections for business needs.
OpenVPN offers a convenient way for users to build a VPN between the local end and the
remote end. There are two advantages of OpenVPN:
It can be operated on different systems such as Windows, Linux, and MacOS.
Based on the standard protocol of SSL encryption, OpenVPN can provide you with a
scalable client/server mode, permitting multi-client to connect to a single OpenVPN
Server process over a single TCP or UDP port.
In terms of credentials, the administrator can choose to let the router generate the
certificates, or import certificates issued by third-party certificate authorities (CAs). When
the router generates the certificates, it acts as the root CA to issue the trusted CA certificates
(stored under Certificate Management >> Trusted CA Certificate), which are used to generate
the server and client certificates used by OpenVPN (stored under Certificate Management >>
Local Certificate). If, however, a certificate issued by a third-party CA is used, both the CA's
certificate and the issued certificate need to be imported to the router in the Trusted CA
Certificate and Local Certificate sections, respectively.
OpenVPN requires the use of certificates. Before establishing OpenVPN connection, general
settings for OpenVPN service shall be configured first.
Item Description
General Setup
UDP Enable - Select checkbox to enable UDP protocol for
OpenVPN connections.
UDP Port – Enter the UDP port number.
TCP Enable - Select checkbox to enable TCP protocol for
OpenVPN connections.
TCP Port – Enter the TCP port number.
Cipher Algorithm Select the desired cipher algorithm. Two encryption
algorithms are supported: AES128 and AES256. AES256 is
more secure than AES128 but may result in lower
performance because it incurs higher computational
overhead.
HMAC Algorithm HMAC stands for Hash-based Message Authentication Code. It
is used to validate the data integrity and authenticity of the
VPN data.
Select the desired HMAC hash algorithm. Two hash
algorithms, SHA1 and SHA256, are supported. SHA256 is
preferred as it is more robust and reliable than SHA1.
Certificate Authentication Select this checkbox if you would like to validate that the
client certificate was issued by a trusted CA.
Certificate Setup
Certificate Source Select a source for the certificate to be used for OpenVPN.
Router generated certificates - Router-generated
certificates that will be used for OpenVPN.
GENERATE - Click to generate a certificate.
Delete all certificates - Click to remove all certificates
generated by the router.
Uploading certificates to Router - Third-party certificates
will be used for OpenVPN.
Trust CA - Use the dropdown list to select a trusted CA
certificate that has already been uploaded to the
router. To upload Trusted CA certificates to the router,
click the Trust CA label and you will be taken to the
Certificate Management >> Trusted CA Certificate
page to perform the operation.
Server Certificate - Use the dropdown list to select a
server certificate that has already been uploaded to
the router. To upload server certificates to the router,
click the Server Certificate label and you will be taken
to the Certificate Management >> Local Certificate
page to perform the operation.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Remote Server The OpenVPN client will use the IP address or domain name
to connect to the router. Select either IP or Domain.
IP – The OpenVPN configuration file will use the numeric IP
address as the server address.
Domain – The OpenVPN configuration file will use the domain
as the server address. You need to ensure that the domain
resolves to the IP address of a router WAN port.
VPN Matcher – The OpenVPN configuration file will use the
IP address / URL of VPN matcher server as the remote server.
Transport Protocol Select UDP or TCP for the protocol to be used by the
OpenVPN client to connect to the router.
Auto Dial-Out Enable - If selected, the remote client can auto-dial to this
Vigor router to build an OpenVPN tunnel.
Disable - Select to disable the function.
Set VPN as Default Enable - If selected, the Vigor router will be treated as a
Gateway "default" gateway for OpenVPN clients. The OpenVPN client
will redirect all the traffic to the Vigor router via the
OpenVPN tunnel.
Disable - Select to disable the function.
File Name Enter the filename of the configuration file to be
downloaded from the router.
Export Click this button to download the settings on this page as a
file, which can be imported into a VPN client to establish
OpenVPN connections.
Item Description
Set to Factory Default Click to clear all remote-dial-in user profiles.
Index Click the index number of the profile the view or edit its
settings.
Enable Check to enable the user profile.
User Display the username for the specific dial-in user of the
LAN-to-LAN profile. The symbol ??? represents that the
profile is empty.
Status Shows the LAN subnet and IP address assignment method.
Example: LAN1-DHCP means that the IP address of the VPN
To save changes on the page, select OK; to discard changes, select Cancel.
The following setup screen is shown after a profile index has been clicked.
Item Description
User account and Enable this account - Select to enable this profile to be used
Authentication by remote dial-in users.
Idle Timeout - Allowed idle time before the router
disconnects the VPN connection. Default timeout value is
300 seconds.
To save changes on the page, select OK; to discard changes, select Cancel; to clear settings
on this page and revert to default settings, select Clear.
The following figure shows the summary table according to the item (All/Trunk) selected for
View.
Item Description
Set to Factory Default Click to clear all indexes.
View All – Shows all LAN-to-LAN VPN profiles.
Trunk – Shows all Trunk profiles (see VPN and Remote Access
>> VPN TRUNK Management).
Index Click the index number of the profile to view or edit its
settings.
Enable Check to enable the LAN-to-LAN VPN profile.
The following figure shows profiles joined into VPN Load Balance and VPN Backup mechanism.
1. The setup screen is shown after a profile index has been clicked. There are 6 sections:
Common Settings, Dial-Out Settings, Dial-In Settings, Tunnel Settings, 6in4 Settings and
TCP/IP Network Settings.
Item Description
GRE over IPsec Enable IPsec Dial-Out function GRE over IPsec- Check this
Settings box to verify data and transmit data in encryption with GRE
over IPsec packet after configuring IPsec Dial-Out setting.
Both ends must match for each other by setting same virtual
IP address for communication.
Logical Traffic - Such technique comes from RFC2890.
Define logical traffic for data transmission between both
sides of VPN tunnel by using the characteristic of GRE. Even
hacker can decipher IPsec encryption, he/she still cannot ask
LAN site to do data transmission with any information. Such
function can ensure the data transmitted on VPN tunnel is
really sent out from both sides. This is an optional function.
However, if one side wants to use it, the peer must enable it,
too.
My GRE IP - Type the virtual IP for router itself for verified by
peer.
Peer GRE IP - Type the virtual IP of peer host for verified by
router.
TCP/IP Network This section configures the whether the local router applies
Settings NAT when linking the local network to the remote network,
and whether IP address translation occurs when.
The view changes depending on the setting of the field From
first subnet to remote network, you have to do. Select NAT if
the remote VPN server expects only one IP address on the
local network; otherwise, select Route. TCP/IP Network
Settings has different settings depending on whether NAT or
Route mode is selected.
My WAN IP –This field is only applicable when you select
PPTP or L2TP with or without IPsec policy above. The default
value is 0.0.0.0, which means the Vigor router will get a PPP
IP address from the remote router during the IPCP
negotiation phase. If the PPP IP address is fixed by remote
side, specify the fixed IP address here. Do not change the
default value if you do not select PPTP or L2TP.
Remote Gateway IP - This field is only applicable when you
2. To save changes on the LAN to LAN profile page, select OK; to reset the entire page to
blank, select Clear; to discard changes, select Cancel.
Item Description
Refresh Click to manually reload the page to refresh VPN connection
information.
Dial-out Tool The Dial-out Tool section can be used to initiate outgoing
LAN-to-LAN VPN sessions.
General Mode - It lists all LAN-to-LAN VPN profiles that do
not belong to enabled VPN Trunk profiles.
To manually dial a LAN-to-LAN VPN profile, select it from the
combo box, and click the Dial button to the right. The VPN
connection built by General Mode does not support VPN
backup function.
SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that encrypts traffic
using SSL, which is the same technology used on secured websites. Because of SSL’s
prominence as an encryption protocol on the Internet, most networks have few restrictions on
SSL traffic, and as a result SSL VPN is more likely to work when other VPN technologies
experience difficulties due to obstacles such as firewalls and Network Address Translation
(NAT).
In short,
It is not necessary for users to preinstall VPN client software for executing SSL VPN
connection.
There are less restrictions for the data encrypted through SSL VPN in comparing with
traditional VPN.
Item Description
Bind to WAN Select the WAN interfaces to accept inbound SSL VPN
connections.
Port The port to be used for SSL VPN server. This is separate from
the management port which is configured in System
Maintenance>>Management. The default setting is 443.
Server Certificate When the client does not set any certificate, default
certificate will be used for HTTPS and SSL VPN server.
Specify the certificate to be used for SSL connections. Select a
certificate from imported or generated certificates on the
router, or choose Self-signed to use the router’s built-in
default certificate. The selected certificate can be used in SSL
VPN server and HTTPS Web Proxy.
After finishing all the settings here, please click OK to save the configuration.
Info SSL VPN can work only with Smart VPN Client developed by DrayTek. After
configuring SSL VPN profile, download the utility of Smart VPN Client to
build SSL VPN connection.
Item Description
User account and Enable this account - Check the box to enable this function.
Authentication Idle Timeout- If the dial-in user is idle over the limitation of
the timer, the router will drop this connection. By default, the
Idle Timeout is set to 300 seconds.
User Name - This field is applicable when you select PPTP or
L2TP with or without IPsec policy above. The length of the
name/password is limited to 23 characters.
Password - This field is applicable when you select PPTP or
L2TP with or without IPsec policy above. The length of the
name/password is limited to 19 characters.
Enable Mobile One-Time Passwords (mOTP) - Check this box
to make the authentication with mOTP function.
PIN Code – Type the code for authentication (e.g, 1234).
Secret – Use the 32 digit-secret number generated by
mOTP in the mobile phone (e.g.,
e759bb6f0e94c7ab4fe6).
Allowed Dial-In Type Select the VPN protocols that this user is allowed to use.
PPTP - Allow the remote dial-in user to establish VPN
After finishing all the settings here, please click OK to save the configuration.
Item Description
Name Displays the Name that identifies the certificate.
Subject Displays the Subject Name entries of the certificate.
Status Displays the status of the certificate. Status is one of
Requesting.
Modify View – Click to view details about the certificate. A screen
that looks like the following will be displayed, showing the
Subject Name, Subject Alternative Name, and the certificate
content.
GENERATE
Use this screen to submit a request to your root CA to generate a certificate.
Item Description
Certificate Name Name that identifies the certificate.
Type Select the type of Subject Alternative Name and enter its
value.
Info Please be noted that “Common Name” must be configured with rotuer’s
WAN IP or domain name.
After clicking the Generate button, you will be taken back to the main Local Certificate
screen, showing the certificate request in progress:
IMPORT
Vigor router allows you to generate a certificate request and submit it the CA server, then
import it as “Local Certificate”. If you have already gotten a certificate from a third party,
you may import it directly. The supported types are PKCS12 Certificate and Certificate with a
private key.
Click this button to import a saved file as the certification information. There are three types
of local certificate supported by Vigor router.
Item Description
Upload Local Certificate Certificate file - Click Browse to select a local certificate file.
Import - Click to import selected certificate file to router.
Cancel - Click to return to the main Local Certificate screen.
If you have done well in certificate generation, the Status of
the certificate will be shown as “OK”.
Upload PKCS12 It allows users to import the certificate whose extensions are
Certificate usually .pfx or .p12. And these certificates usually
need passwords.
Note that PKCS12 is a standard for storing private keys and
certificates securely. It is used in (among other things)
Netscape and Microsoft Internet Explorer with their import
and export options.
PKCS12 file - Click Browse to select a PKCS12 certificate file.
Password - Enter the password associated with the certificate
and key files.
Import - Click to import selected certificate file to router.
If the import was successful, you will see the following confirmation screen:
REFRESH
Click this button to refresh the information listed below.
Info Root CA can be deleted but not edited. If you want to modify the settings
for a Root CA, please delete the one and create another one by clicking
Create Root CA.
You can create, import and view root and trusted certificate authority certificates on this
screen.
Item Description
Create Click to create a new root CA.
Name Name that identifies the certificate.
Subject Shows the Subject Name of the certificate.
Status Displays the status of the certificate.
Modify Create – Click to fill out details about a certificate, and start
the generation process.
View – Click to view details of the certificate.
Item Description
Certificate Name Display the name of root CA.
Type Select the type of Subject Alternative Name and enter its
value.
Country (C) Country in which your organization is located.
State (ST) State or province where your organization is located.
Location (L) City where you're your organization is located.
Organization (O) Legal name of your organization.
Organization Unit (OU) Department within your organization that you wish to be
associated with this certificate.
Common Name (CN) Fully-qualified domain name / WAN IP that will be used to
reach your server.
Email (E) Email address of the entry.
Key Type Key type is hard set to RSA.
Key Size Choose between 1024 and 2048 bit.
Algorithm Choose between SHA-1 and SHA-256.
Generate Click to submit generate request to the CA server.
Item Description
Browse Click Browse to select a local certificate file.
Import Click to import selected certificate file to router. The one you
imported will be listed on the Trusted CA Certificate window.
Cancel Click to return to the main Trusted CA Certificate screen.
Item Description
Backup
Encrypt password / Enter the password with which you wish to encrypt the
Confirm password certificate.
Backup Click to download the certificate.
Restoration
Select a backup file to Click Browse to select the backup file you wish to restore.
restore
Decrypt password Enter the password that was used to encrypt the certificates.
Click Regenerate to open the Regenerate Self-Signed Certificate window. Enter all requested
information including certificate name (used to differentiate different certificates), subject
alternative name type and relational settings for subject name. Then click GENERATE.
Basic
A network firewall monitors traffic travelling between networks, with the ability to
selectively allow or block traffic using a predefined set of security rules. This helps to
maintain the integrity of networks by stopping unauthorized access and the exchange of
sensitive information.
Firewall Facilities
LAN users are provided with secured protection by the following firewall facilities:
User-configurable IP filter (Call Filter/ Data Filter).
Stateful Packet Inspection (SPI): tracks packets and denies unsolicited incoming data
Selectable Denial of Service (DoS) /Distributed DoS (DDoS) attacks protection
IP Filters
Depending on whether there is an existing Internet connection, or in other words “the WAN
link status is up or down”, the IP filter architecture categorizes traffic into two: Call Filter
and Data Filter.
Call Filter - Whenever the router needs to initiate a PPP connection (such as PPPoE,
PPPoA, and VPN connections) to route traffic to the Internet, the traffic pattern that
triggers the connection is checked against the Call Filter rules. If the traffic is not
blocked by the filter, the router establishes the PPP connection to send the packet to
the Internet.
Data Filter - All traffic, both incoming and outgoing, that does not trigger a PPP
connection attempt (either because a PPP connection is not necessary, or the required
PPP connection has already been established) is checked against the Data Filter, and
will be allowed or blocked according to the rules configured within.
The following flowcharts show how the router treats incoming traffic and outgoing traffic
respectively.
Item Description
To save changes on the page, click OK. To discard changes, click Cancel.
Traffic is filtered by firewall functions in the following order:
1. Data Filter Sets and Rules
2. Block connections initiated from WAN
3. Default Rule
Item Description
Filter Select Pass or Block for the packets that do not match with
the filter rules. When the setting is Block, all other fields on
the page are disabled because they are not applicable.
Sessions Control The current number of sessions is shown before the slash,
followed by the maximum number of concurrent sessions
allowed, which is configurable. The default maximum is
60000, which is also the upper limit of the value.
Quality of Service Choose one of the QoS rules to be applied as firewall rule.
For detailed information of setting QoS, please refer to the
related section later.
User Management This setting is only available when Rule-Based is selected in
User Management>>General Setup. The default firewall
rule will be applied to the selected user or user group. Refer
to the chapter on User Management for more details on the
feature.
None: User Management does not apply to the default
rule.
User Object: The default rule only applies to the
selected user.
[Create New User]: Select this to create a new user.
User Group: The default rule only applies to the
After finishing all the settings here, please click OK to save the configuration.
To edit a filter set, click on its set number. The following Filter Set page will be shown. Each
filter set contains up to 30 rules.
Item Description
Rule To edit the filter rule, click the filter rule number (1 ~ 30) to
bring up the Edit Filter Rule page. See the following section
for details on the Edit Filter Rule page.
Enable Select to enable the filter rule.
Comments Optional comment entered in the settings page to identify
the rule.
Direction Displays the direction of packet.
Src IP / Dst IP Displays the IP address of source /destination.
Service Type Displays the type and port number of the packet.
Action Displays the packets to be passed /blocked.
CSM Displays the content security managed
Move Up/Down Use Up or Down link to change the order of the filter rules.
Next Filter Set Select the filter set for the firewall to process after the
current filter set, or None if the current filter set is the last
one to be processed. Be careful not to create a loop when
setting next filter sets.
Wizard Mode Allow to configure frequently used settings for filter rule via
several setting pages.
Advance Mode Allow to configure detailed settings of filter rule.
Item Description
Pass Immediately Packets matching the rule will be passed immediately.
APP Enforcement - Select an APP Enforcement profile for
application blocking, or None to disable APP Enforcement
for the Default Rule. Select [Create New] from the
dropdown list to create a new profile. Refer to the chapter
on APP Enforcement for more details on the feature.
4. After choosing the mechanism, click Next to get the summary page for reference.
Item Description
Enable Check this box to enable the filter rule.
Comments Enter filter set comments/description. Maximum length is
14- character long.
Schedule Profile Select Schedule indexes to allow the rule to be enabled at
specific times. You may choose up to 4 out of the 15
schedules in Applications >> Schedule. The rule is always
enabled when no indexes have been selected.
Clear sessions when Select this option to clear existing sessions when the rule is
schedule is ON changes is enabled by a schedule profile. All connections
will be reset.
Direction Specify the direction of traffic flow to which this filter rule
applies. Note that when the rule belongs to the Call Filter,
the WAN -> LAN/RT/VPN option has no effect as Call Filter
applies only to outgoing traffic.
Source IP/ Country Click Edit to bring up the following dialog box to configure
and the source and destination IP addresses or country objects.
Destination IP /
Country
3. When you finish the configuration, please click OK to save and exit this page.
Item Description
Enable Dos Defense Select to enable DoS Defense.
Select All - Click to select all DoS Defense options.
White/Black List Option – Set white/black list of IPv4/IPv6
address.
Enable SYN flood defense Select to enable SYN flood defense. When the arrival rate
of SYN packets exceeds the Threshold value, the router will
start to randomly discard TCP SYN packets for a period of
time as defined in Timeout. This is to prevent TCP SYN
packets from exhausting router resources.
The default values of threshold and timeout are 2000
packets per second and 10 seconds, respectively.
Enable UDP flood defense Select to enable UDP flood defense. When the arrival rate
of UDP packets exceeds the Threshold value, the router
will start to randomly discard TCP SYN packets for a period
of time as defined in Timeout.
The default values of threshold and timeout are 2000
After finishing all the settings here, please click OK to save the configuration.
IV-1-4 Diagnose
The purpose of this function is to test when the router receiving incoming packet, which
firewall rule will be applied to that packet. The test result, including firewall rule profile, IP
address translation in packet transmission, state of the firewall fuctions and etc., also will be
shown on this page.
Info The result obtained by using Diagnose is offered for RD debug. It will be
different according to actual state such as netework connection, LAN/WAN
settings and so on.
Item Description
Mode To have a firewall rule test, specify the service type (ICMP,
Content Security Management (CSM) allows the network administrator to restrict Internet
traffic based on the content type, thus ensuring appropriate use of network resources and
also reducing the likelihood of threats from malicious network content.
Info The priority of URL Content Filter is higher than Web Content Filter.
Item Description
Set to Factory Default Clear all profile settings.
Profile Index of the profile.
Click to bring up the configuration page of the profile.
Name Name of the profile.
Item Description
Profile Name Name that identifies this profile. Maximum length is 15
characters.
Category Apps are classified into several categories. Each category
contains several apps to be blocked.
Select All Click to select all of the items on this page.
Clear All Click to deselect all selected items.
Enable Select this checkbox to block the app.
To save changes on the page, click OK. To discard changes, click Cancel.
To set up a profile, click the profile number under Index column to bring up the configuration
page.
Item Description
Profile Name Name that identifies the URL Content Filter profile. The
maximum length of the Profile Name is 15 characters.
Priority The order of evaluation of URL Access Control and Web
Feature below:
Both: Pass – Router will allow access only to web resources
that match conditions specified in both URL Access Control
and Web Feature. The Action setting of both URL Access
Control and Web Feature will be disabled and the values set
to Pass.
Both:Block – Router will block access to web resources that
match conditions specified in both URL Access Control and
Web Feature. The Action setting of both URL Access Control
and Web Feature will be disabled and the values set to Block.
Either: URL Access Control First – Router will block or allow
access to web resources that match conditions specified in
either URL Access Control or Web Feature. URL Access
Control is applied first, followed by Web Feature.
Either: Web Feature First – Router will block or allow access
to web resources that match conditions specified in either
URL Access Control or Web Feature. Web Feature is applied
first, followed by URL Access Control.
Log Pass – Only passed access attempts will be recorded in
Syslog.
Block – Only blocked access attempts will be recorded in
Syslog.
All – Both passed and blocked access attempts will be
recorded in Syslog.
URL Access Control Enable URL Access Control - Select to activate URL Access
Control.
Prevent web access from IP address - URLs containing IP
addresses (e.g., 192.168.1.1) will be blocked. Only URLs with
domain addresses (e.g., www.draytek.com) will be allowed.
To save changes on the page, click OK. To discard changes, click Cancel. To clear all settings,
click Clear.
Info 1 Web Content Filter (WCF) is not a built-in service of Vigor router but a
service powered by Commtouch. If you want to use such service (trial or
formal edition), you have to perform the procedure of activation first. For
the service of formal edition, please contact with your dealer/distributor
for detailed information.
Info 2 Commtouch is merged by Cyren, and GlobalView services will be continued
to deliver powerful cloud-based information security solutions! Refer to:
http://www.prnewswire.com/news-releases/commtouch-is-now-cyren-239
025151.html
Item Description
Activate Click to visit the MyVigor webnsite to activate WCF service.
You will need to log in to your MyVigor account to proceed
with the activation process. If you do not already have a
MyVigor account, you can create one at this time.
Setup Query Server Specify a WCF query server by typing address of the server.
Click the Find more for a list of query servers. When the
default value auto-selected is used, the server is determined
automatically by looking up the geolocation of the WAN IP
address.
It is recommended that the default setting auto-selected be
used.
Setup Test Server Specify a WCF test server by typing address of the server.
Click the Find more for a list of test servers. When the
default value auto-selected is used, the server is determined
automatically by looking up the geolocation of the WAN IP
address.
It is recommended that the default setting auto-selected be
used.
Cache None – The router verifies every HTTP URL requested by
communicating with the WCF server on the Internet. This
mode provides the most precise URL matching but has the
lowest performance.
L1 – The router caches the HTTP URLs that have been
checked against the WCF server. URLs will be looked up in
the L1 cache before reaching out to the WCF server. When
the cache is full, the oldest entry will be deleted to
accommodate new URLs.
L2 – After a URL has been checked and found to pass WCF,
the source and destination IPs are cached for about 1 second
in the L2 cache. This is to allow a webpage to be loaded
without further verifying the same URLs against the L1 cache
or the WCF server.
L1+L2 Cache – The router will utilize both L1 and L2 caches.
Set to Factory Default Clear all profile settings.
Profile Index number of the profile.
Name Name that identifies the profile.
Administration Message The message to be displayed in the browser when access to a
website has been blocked. A custom message can be entered
with HTML formatting in the text box.
You can embed the following variables in the message:
%SIP% – The source IP address that attempted the HTTP
access.
%DIP% – The destination IP address to which access was
attempted.
%URL% – The URL of the destination website.
%CL% – The category to which the URL belongs.
%RNAME% – The name of the router.
Default Message - Click to reset the administration message
to the factory default.
Item Description
Profile Name Name that identifies the WCF profile. The maximum length
of the Profile Name is 15 characters.
Log Pass – Only passed access attempts will be recorded in
Syslog.
Block – Only blocked access attempts will be recorded in
Syslog.
All – Both passed and blocked access attempts will be
recorded in Syslog.
Black/White List Keyword objects and groups can be applied to the URL to
override WCF category filtering.
Enable – Select to enable blacklisting or whitelisting.
Action - Action to take when a URL matches keyword group
and object selections.
Pass – Allow access to the URL.
Block – Disallow access to the URL.
URL Keywords – Displays selected keyword group and
objects. Click the Edit button to modify keyword selections.
Groups and Categories Select categories to be included in the filter.
Action - Action to take when a URL matches keyword group
and object selections.
Pass – allow access to the URL.
Block – disallow access to the URL.
To save changes on the page, click OK. To discard changes, click Cancel.
To save changes on the page, click OK. To discard changes, click Cancel.
2. Click the Activate link. A login page for MyVigor web site will pop up automatically.
11. When you see the following page, please type in the account and password (that you just
created) in the fields of UserName and Password.
12. Now, click Login. Your account has been activated. You can access into MyVigor server to
activate the service (e.g., WCF) that you want.
4. Next time when someone accesses facebook via this router, the web page would be
blocked and the following message would be displayed instead.
5. When you finished the above steps, click OK. Then, open Firewall>>General Setup.
5. When you finished the above steps, please open Firewall>>General Setup.
6. Click the Default Rule tab. Choose the profile just configured from the drop down list in
the field of URL Content Filter. Now, users cannot open any web page with the word
“facebook” inside.
1. Create an APP Enforcement Profile: Click on an Index number to create a new profile at
CSM >> APP Enforcement Profile.
For the system setup, there are several items that you have to know the way of configuration:
System Status, TR-069, Administrator Password, User Password, Login Page Greeting,
Configuration Backup, Syslog /Mail Alert, Time and Date, Management, Panel Control, Reboot
System, Firmware Upgrade, Internal Service User List, Dashboard Control and NAT Sessions.
Below shows the menu items for System Maintenance.
Item Description
Model Name Displays the model name of the router.
Firmware Version Displays the firmware version of the router.
Build Date/Time Displays the date and time of the current firmware build.
LAN MAC Address
- Displays the MAC address of the LAN Interface.
IP Address
- Displays the IP address of the LAN interface.
Subnet Mask
- Displays the subnet mask address of the LAN interface.
DHCP Server
- Displays the current status of DHCP server of the LAN
interface.
DNS
- Displays the assigned IP address of the primary DNS.
WAN Link Status
- Displays current connection status of the WAN interface.
Select OK to save changes on the page, or Clear to reset all settings to factory defaults.
Item Description
Health Parameters Check the one that Vigor router will send the status
information to VigorACS.
Threshold (for VoIP R-Factor) - Once the quality of VoIP is
lower than warning limit value or critical limit value, the
router will send the result to VigorACS.
CPE Notification Settings CPE Notification Settings - Check the Enable box to
configure the following settings.
Web Login / Web Changed / High Availability - After
checking the box, Vigor device will inform VigorACS server
when the action of web login, the web changed and high
availability performed.
Bandwidth Utilization - Check the box to enable this
function. To administrator, this feature is useful to monitor
the bandwidth utilization of CPE(s). When the bandwidth
used is over the threshold level (percentage defined in
medium and high fields), a notification will be sent to
VigorACS. After a long time observation, the administrator
can determine if it is necessary to increase the bandwidth
setting for that CPE or not. The default is disabled.
Time Period – Choose the time interval (15 mins, 30
mins, 1hour, 3 hours, or 6 hours) for CPE to send a
notification of bandwidth utilization to VigorACS.
Item Description
Administrator Password The administrator can login web user interface of Vigor
router to modify all of the settings to fit the requirements.
Old Password - Enter the current password. The factory
default is “admin”.
New Password – Enter the new password. The maximum
length of the password is 23 characters.
Confirm Password – Enter the new password again for
confirmation.
Enable ‘admin’ account login to Web UI from the Internet –
Select to allow the administrator to log in from the Internet.
This option is enabled when Administrator Local User is
enabled (see below).
Use only advanced authentication method for Admin
“WAN” login – Advanced authentication method can offer a
more secure network connection. Select to require mOTP or
2-step authentication when logging in from the WAN.
Mobile one-Time Password (mOTP) – Select to allow
the use of mOTP passwords. Enter the PIN Code and
Secret settings for getting one-time passwords.
2-Step Auth code via SMS Profile and/or Mail Profile –
Select the SMS and/or Mail profiles and the destination
SMS number and/or email address for transmitting the
password.
Administrator Local User Usually, the system administrator has the highest privilege to
modify the settings on the web user interface of the Vigor
router. However, in some cases, it might be necessary to
have other users in LAN to access into the web user interface
of Vigor router.
This feature allows you to add more administrators who can
then log in to the web interface, with the same privileges as
the administrator.
Enable Local User – Check the box to allow other users to
administer the router.
Use only advanced authentication method for Admin
“WAN” login – Advanced authentication method can
offer a more secure network connection. In general,
the above basic password setting will be used for
authentication if such option is disabled. Simply check
the box to enable the following settings.
Local User List – Shows all the users that are set up to
administer the router.
Specific User – Create the new user account as the
local user. Then specify the authentication method
(dividing into Basic and Advanced) for the user account.
User Name – Enter a user name.
Authentication method – Select from Basic or
Advanced authentication methods.
Basic – Static passwords will be used to authenticate
users.
Local Password – Enter the password for the local
user.
Advanced - Mobile One-time Passwords (mOTP) or
Click OK to save changes on the page, and you will be directed to the login screen. Please log
in with the new password.
Item Description
Enable User Mode for Check this box to enable User Mode for web user interface
simple web configuration with the password typed here for simple web configuration.
The simple web user interface settings differ from those on
the full web user interface seen when logged in using the
administrator password.
Password Enter the password. The maximum length of the password is
31 characters.
Confirm Password Enter the password again for verification.
Password Strength Shows the security strength of the password specified above.
Set to Factory Default Click to return to the factory default setting.
Click OK to save changes on the page, and you will be directed to the login screen. Please
window will appear. Please log in with the new password.
Here are the steps involved in setting up the router for User Mode Access:
2. Check the box of Enable User Mode for simple web configuration to enable user mode
operation. Enter a new password in the field of New Password and click OK.
4. Log out the Vigor router web user interface by clicking the Logout button.
5. The following window will be shown. Enter the new user password in the Password field
and click Login.
Only basic settings are available in User Mode. These are a subset of the Admin Mode
settings.
This section allows you to customize the login page by adding a message and/or setting the
page title.
Item Description
Enable Check this box to enable the login customization function.
Login Page Title Enter a brief description (e.g., Welcome to DrayTek) which
will be shown on the heading of the login dialog.
Welcome Message and Enter words or sentences here. It will be displayed for
Bulletin bulletin message. In addition, it can be displayed on the
login dialog at the bottom.
Note that do not enter URL redirect link here.
Preview Click to preview the customized login window based on the
settings entered on this page.
Set to Factory Default Click to return to the factory default setting.
Below shows an example of a customized login page with the values entered in the Login Page
Title and Welcome Message and Bulletin fields.
Item Description
Restore Restore settings from an cfg file – Click the Select File
button to specify a file to be restored or click USB Storage (if
a USB storage disk connected) to choose the configuration
file.
This file is encrypted with password – Select to specify a
password.
Restore - Click to initiate restoration of configuration. If the
backup file is encrypted, you will be asked to enter the
password.
Backup Click it to perform the configuration backup of this router.
Normal backup - Select to backup without a password.
Protect full file with password- Select to encrypt the
backup with a password. You will be prompted to enter the
password as shown below:
The configuration will download automatically to your computer as a file named config.cfg.
The above example is using Windows platform for demonstrating examples. The Mac or Linux
platform will appear different windows, but the backup function is still available.
Info Configuration Backup does not include certificates stored on the router.
Please back up certificates separately by going to Certificate Management
>> Certificate Backup.
Item Description
Import This file is encrypted with password – Check the box and
enter a password for dencrypting the configuration file (if
the.exp file is encrypted).
Click the Select File button to specify an exp file.
Import - Click to import a configuration file. If the file is
encrypted, you will need to enter the password set on the
above password field.
Item Description
Router Name Shows the name of the router set in System Maintenance >>
Management. This name will be used to identify the router
in the Syslog entries.
To set or modify the router name, click the hyperlink and you
will be taken to System Maintenance >> Management where
you can enter the value.
Server IP Address /Hostname - Enter the IP address /
hostname of the Syslog server.
Destination Port - Enter the port for the Syslog server.
Mail Syslog – Select to enable sending Syslog messages by
email.
Enable syslog message - Select the events to be recorded by
syslog.
Select OK to save changes on the page, or Clear to reset all settings to factory defaults.
To view the Syslog message, please follow the steps below:
1. On the Syslog / Mail Alert Setup screen, enter the monitor PC’s IP address in the Server
IP Address field.
2. On the Syslog / Mail Alert Setup screen, enter the monitor PC’s IP address in the Server
IP Address field.
Item Description
Current System Time Click Inquire Time to retrieve the current time from the
time server.
Use Browser Time Select this option to let the router set its system time using
the time reported by the web browser.
Use Internet Time Select this option to let the router set its system time by
retrieving time information from the specified network time
server using the Network Time Protocol (NTP).
Time Server Enter the IP address / Host name of the time server.
Priority Select Auto or IPv6 First as the priority.
Time Zone Select the time zone where the router is located.
Enable Daylight Saving Check the box to enable Daylight Saving Time (DST) if it is
applicable to your location.
Advanced – Click to enter a custom schedule to enable DST.
Use the default time setting or set user defined time for your
requirement.
Select OK to save changes on the page, or Cancel to discard changes without saving.
V-1-10 SNMP
This section allows you to configure settings for SNMP and SNMPV3 services.
The SNMPv3 is more secure than SNMP through the use of encryption (supports AES and DES)
and authentication (supports MD5 and SHA) for the management needs.
Item Description
Enable SNMP Agent Check to enable SNMP function. Then, enable SNMPV1
agent/SNMPV2C agent.
Set Community Enter the Set Community string. The default setting is
private. Devices that send requests to change settings using
set commands must pass the correct Set Community string.
The maximum length of the text is 23 characters.
Manager Host IP (IPv4) Enter the IPv4 address of hosts that are allowed to issue
SNMP commands. If this field is left blank, any IPv4 LAN host
is allowed to issue SNMP commands.
Manager Host IP (IPv6) Enter the IPv6 address of hosts that are allowed to issue
SNMP commands. If this field is left blank, any IPv6 LAN host
is allowed to issue SNMP commands.
Trap Community Enter the Trap Community string. The default setting is
public. Devices that send unsolicited messages to the SNMP
console must pass the correct Trap Community string.
The maximum length of the text is 23 characters.
Notification Host IP (IPv4) Enter the IPv4 address of hosts that are allowed to send
SNMP traps.
Notification Host IP (IPv6) Enter the IPv6 address of hosts that are allowed to send
SNMP traps.
Trap Timeout The default setting is 10 seconds.
Enable SNMPV3 Agent Check it to enable SNMPV3.
USM User USM means user-based security mode.
Enter the username to be used for authentication. The
maximum allowed length is 23 characters.
Auth Algorithm Choose one of the hashing methods to be used with the
authentication algorithm.
Auth Password Enter a password for authentication. The maximum allowed
length is 23 characters.
Privacy Algorithm Choose an encryption method as the privacy algorithm.
Privacy Password Enter a password for privacy. The maximum allowed length is
23 characters.
Select OK to save changes on the page, or Cancel to discard changes without saving.
Item Description
Router Name Enter the router name as provided by ISP.
Default: Disable If enabled, the auto-logout function for the web user
Auto-Logout interface will be disabled.
Enable Validation Code in If enabled, Vigor router will require users to enter a
Internet/LAN Access validation code as shown in an image when they log in.
Internet Access Control Allow management from the Internet - Enable the checkbox
to allow system administrators to login from the Internet,
and then select the specific services that are allowed to be
remotely administered.
Domain name allowed – This setting is only available if DNS
filtering is enabled, applying DNS filter profile in firewall
rules, or enabling DNS Filter Local Setting. The router will
only allow connections to the WebUI using domain addresses
configured in either DDNS profiles or this section.
If DNS filtering is disabled, this setting will be disabled, and
any domain address that resolves to the router’s WAN IP
address can be used to connect to the WebUI.
Disable PING from the Internet - Select to reject all PING
packets from the Internet. For increased security, this
setting is enabled by default.
Access List from the The ability of system administrators to log into the router
Internet can be restricted to up to 10 specific hosts or networks.
Apply Access List to PING - When this option is checked and
Disable PING from the Internet is unchecked, pings
originating from the Internet will be accepted only if they
are from one of the IP addresses and/or subnet masks
specified below. This option has no effect if Disable PING
from the Internet is checked, which blocks all pings from
the Internet.
Type - Select IP Object.
Index - Select the index number of a configured IP object.
Description - Shows a brief comment for the selected IP
object (with subnet mask).
Management Port Setup User Define Ports - Check to specify user-defined port
numbers for the Telnet, HTTP, HTTPS, FTP, TR-069 and SSH
servers.
Default Ports - Check to use standard port numbers for the
Telnet and HTTP servers.
Brute Force Protection Any client trying to access into Internet via Vigor router will
be asked for passing through user authentication. Such
feature can prevent Vigor router from attacks when a hacker
tries every possible combination of letters, numbers and
symbols until find out the correct combination of password.
Item Description
Management Access Allow management from the Internet – Select to allow
Control system administrators to login from the Internet, and then
select the specific services that are allowed to be remotely
administered.
Disable PING from the Internet - Select to reject all PING
packets from the Internet. For increased security, this
setting is enabled by default.
Access List from the The ability of system administrators to log into the router
Internet can be restricted to up to 10 specific hosts or networks.
Apply Access List to PING - When this option is checked and
Disable PING from the Internet is unchecked, pings
originating from the Internet will be accepted only if they
are from one of the IP addresses and/or subnet masks
specified below. This option has no effect if Disable PING
from the Internet is checked, such that no pings from the
Internet are accepted.
Type - Select IPv6 Object.
Index - Select the index number of a configured IPv6 object.
Item Description
Allow management from Enable the checkbox to allow system administrators to login
LAN from LAN interface. There are several servers provided by
the system which allow you to manage the router from LAN
interface. Check the box(es) to specify.
Apply To Subnet Check the LAN interface for the administrator to use for
accessing into web user interface of Vigor router.
Index in IP Object- Type the index number of the IP object
profile. Related IP address will appear automatically.
Item Description
Reboot System Select one of the following options, and press the Reboot
Now button to reboot the router.
Using current configuration – Select this option to reboot
the router using the current configuration.
Using factory default configuration – Select this option to
reset the router’s configuration to the factory defaults
before rebooting.
Auto Reboot Time Schedule Profile - Select up to 4 user-configured schedules
Schedule to reboot the router on a scheduled basis.
Select OK to save changes on the page, or Cancel to discard changes without saving.
Info When the system pops up Reboot System web page after you configure web
settings, please click Reboot Now to reboot your router for ensuring normal
operation and preventing unexpected errors of the router in the future.
Item Description
Firmware Versiono Status Check The Latest Firmware – Click to check for updated
firmware.
Any available new firmware files will be displayed and you
can download any one of them by clicking Download. After
the file has been downloaded, click Select followed by
Upgrade to perform the firmware upgrade.
Web Firmware Upgrade Click Browse… to select the firmware file, followed by
Upgrade to start the upgrade process, or Preview to display
detailed information about the selected firmware file:
Item Description
User Name Display the name of the existed user profile. To modify the
detailed settings, simply click the user name link to access
into the web page for modification.
Radius Check the box to turn on the security authentication service
offered by internal RADIUS server for the user profile.
Uncheck the box to turn off ecurity authentication service
offered by internal RADIUS server for the user profile.
If you check the box next to such item, all of the user profiles
listed in this page will be enabled with RADIUS service
enabled vice versa.
Info For the detailed setting (such as IP address, port number) configuration of
internal RADIUS, refer to Applications>>RADIUS/TACACS+.
Sessions Limit
When LAN clients share a common public IP address by means of Network Address Translation
(NAT), the router must track NAT sessions so that traffic to and from the WAN can reach the
intended destinations. There is a finite number of sessions that can be tracked by the router,
and by setting session limits will ensure that the router does not run out of resources. This is
especially important when P2P applications are used. P2P applications, such as BitTorrent,
that attempt to simultaneously establish connections to as many WAN hosts as possible.
Bandwidth Limit
Bandwidth Limit ensures LAN clients get their fair share of network bandwidth by placing
restrictions on upstream and downstream network speeds.
APP QoS
APP QoS allows QoS to be applied to select protocols and applications.
Protocols and applications fall into two categories: Traceable and Untraceable. Traceable
applications are those whose traffic can be 100% traced, and can be assigned a specific QoS
class. Untraceable applications, on the other hand, are detected when they attempt to
establish connections to remote hosts, and all traffic between the remote hosts and the local
network will be placed under QoS, within the same QoS class.
To activate the function of limit session, simply click Enable and set the default session limit.
Available settings are explained as follows:
Item Description
Enable/Disable Enable - Select to activate session limit function.
Disable - Select to deactivate session limit function.
To activate the function of limit bandwidth, simply click Enable and set the default upstream
and downstream limit.
Available settings are explained as follows:
Item Description
Enable / Disable Enable - Select to activate bandwidth limit function.
Disable - Select to deactivate bandwidth limit function.
IP Routed Subnet – Check this box to apply the bandwidth
limit to the traffic via IP routed subnet.
Default Limit (Per User)
TX LImit - Default upstream speed limit for each LAN
client. Unit can be either Kbps or Mbps. Value must be
between 0 (unlimited) and 30000.
RX limit - Default downstream speed limit for each LAN
Item Description
General Setup Index – Link of WAN interface.
Enable – Check the box to enable the QoS function for WAN
interface. If it is enabled, you can configure general QoS
setting for each WAN interface.
Direction –Direction of traffic to which QoS is to be
applied (Inbound, Outbound, or Both).
- IN - Apply QoS to incoming traffic only.
- OUT - Apply QoS to outgoing traffic only.
- BOTH - Apply to both incoming and outgoing traffic.
Inbound/Outbound Bandwidth –
The inbound / outbound bandwidth of the WAN. This
option is not available on ADSL/VDSL WAN1 interface.
Class 1 ~ 3 / Others – Percentage of bandwidth reserved
for each class.
Status – Click to bring up the Online Statistics page that shows
snapshots of statistics for the given WAN interface.
Class Rule Define and list the Class rules.
Index – Displays the class number that you can edit.
Enable - Displays the status of this class rule.
Online Statistics
Click the Status link in the General Setup section to show real-time online statistics of the
WAN interface.
Item Description
Enable UDP Bandwidth Select to restrict the bandwidth available to UDP traffic. The
Control Limited_bandwidth Ratio value is the maximum percentage
of bandwidth that can be used by UDP traffic.
Limited_bandwidth Ratio - Enter a percentage value.
Outbound TCP ACK Select to give outbound ACK packets priority over other
Prioritize packets to ensure traffic is not slowed down because the
remote host is waiting for ACK packets before further traffic
will be sent.
Info The rate of outbound/inbound must be smaller than the real bandwidth to
ensure correct calculation of QoS. It is suggested to set the bandwidth value
for inbound/outbound as 80% - 85% of physical network speed provided by
ISP to maximize the QoS performance.
2. For adding a new rule, click Add to open the following page.
Item Description
Enable Select to enable this rule.
IP Version Protocol (IPv4 or IPv6) to which this rule applies.
3. After finishing all the settings here, please click OK to save the configuration.
Item Description
Enable/Disable Enables or disables the APP QoS feature.
Traceable Traceable applications are those whose traffic can be 100%
traced.
All protocols under this tab can have a specific QoS class
assigned.
Enable - Select to enable OoS for the application.
Apply to all - Select a QoS class to be applied to all
protocols. You can override the QoS class for specific
protocols using the Action dropdown listbox.
Untraceable Untraceable applications are detected when they attempt to
establish connections to remote hosts, and all traffic
between the remote hosts and the local network will be
placed under QoS, within the same QoS class.
All protocols under this tab can have a specific QoS class
assigned.
Enable - Select to enable OoS for the application.
Action - Select a QoS class to be applied to all applications.
Select All Click to select all Enabled checkboxes.
Clear All Click to deselect all Enabled checkboxes.
After changes have been made, click OK to save changes, or Cancel to discard.
User Management is a security feature which disallows any IP traffic (except DHCP-related
packets) from a particular host until that host has correctly supplied a valid username and
password. Instead of managing with IP address/MAC address, User Management function
manages hosts with user account. Network administrator can give different firewall policies
or rules for different hosts with different User Management accounts. This is more flexible
and convenient for network management. Not only offering the basic checking for Internet
access, User Management also provides additional firewall rules, e.g. CSM checking for
protecting hosts.
Info Filter rules configured under Firewall usually are applied to the host (the
one that the router installed) only. With user management, the rules can be
applied to every user connected to the router with customized profiles.
Item Description
Mode Selection There are two modes offered here for you to choose. Each
mode will bring different filtering effect to the users
involved.
User-Based - If you choose such mode, the router will apply
the filter rules configured in User Management>>User
Profile to the users.
Rule-Based –If you choose such mode, the router will apply
the filter rules configured in Firewall>>General Setup and
After finishing all the settings here, please click OK to save the configuration.
To set the user profile, please click any index number link to open the following page. Notice
that profile 1 (admin) and profile 2 (Dial-In User) are factory default settings. Profile 2 is
reserved for future use.
Item Description
Common Settings Enable this account - Check this box to enable such user
profile.
Username - Type a name for such user profile (e.g.,
LAN_User_Group_1, WLAN_User_Group_A,
WLAN_User_Group_B, etc). When a user tries to access
Internet through this router, an authentication step must be
performed first. The user has to type the User Name
specified here to pass the authentication. When the user
passes the authentication, he/she can access Internet via
this router. However the accessing operation will be
restricted with the conditions configured in this user profile.
The maximum length of the name you can set is 24
characters.
Password - Type a password for such profile (e.g., lug123,
wug123,wug456, etc). When a user tries to access Internet
through this router, an authentication step must be
performed first. The user has to type the password specified
here to pass the authentication. When the user passes the
authentication, he/she can access Internet via this router
– Click this box to set and increase the time quota for
such profile.
Enable Data Quota - Data Quota means the total amount for
data transmission allowed for the user. The unit is MB/GB.
– Click this box to set and increase the data quota for
such profile.
After finishing all the settings here, please click OK to save the configuration.
Please click any index number link to open the following page.
User defined
object – others
Item Description
Name Type a name for this user group.
Available User Objects You can gather user profiles (objects) from User Profile page
within one user group. All the available user objects that you
have created will be shown in this box. Notice that user
object, Admin and Dial-In User are factory settings. User
defined profiles will be numbered with 3, 4, 5 and so on.
Selected Keyword Objects
Click button to add the selected user objects in this
box.
After finishing all the settings here, please click OK to save the configuration.
Item Description
Refresh Seconds Use the drop down list to choose the time interval of
refreshing data flow that will be done by the system
automatically.
Refresh Click this link to refresh this page manually.
Index Display the number of the data flow.
User Display the users which connect to Vigor router currently.
You can click the link under the username to open the user
profile setting page for that user.
IP Address Display the IP address of the device.
Profile Display the authority of the account.
Last Login Time Display the login time that such user connects to the router
last time.
Expired Time Display the expired time of the network connection for the
user.
Data Quota Display the quota for data transmission.
Idle Time Display the idle timeout setting for such profile.
Action Block - can avoid specified user accessing into Internet.
Unblock – allow the user to access into Internet.
Logout – the user will be logged out forcefully.
Item Description
Refresh Seconds Use the drop down list to choose the time interval of
refreshing data flow that will be done by the system
automatically.
Refresh Click this link to refresh this page manually.
IP Address Displays the IP address of the client in LAN.
MAC Address Displays the MAC address of the client in LAN.
User Name Displays the name of user connecting to Vigor router
currently. You can click the link under the username to open
the user profile setting page for that user.
Rx Bytes Displays the speed of octets received through such PPPoE
user.
Tx Bytes Displays the speed of octets transmitted through such PPPoE
user.
Up Time Displays the connection time of such PPPoE user.
With User Management authentication function, before a valid username and password have
been correctly supplied, a particular client will not be allowed to access Internet through the
router. There are three ways for authentication: Web, Alert Tool and Telnet.
After that, the web authentication window will appear. Input the user name and the
password for your account (defined in User Management) and click Login.
Note, if you block the web browser to pop up any window, you will not see such window.
If the authentication is failed, you will get the error message, The username or password
you entered is incorrect. Please login again.
In above description, you access an external web site to trigger the authentication. You
may also directly access the router’s Web UI for authentication. Both HTTP and HTTPS
are supported, for example http://192.168.1.1 or https://192.168.1.1 . Replace
192.168.1.1 with your router’s real IP address, and add the port number if the default
management port has been modified.
If the authentication is successful, you will get the Welcome Message that is set in the
User Management >> General Setup page.
Also you will get a Tracking Window if you don’t block the pop-up window.
If SSL Tunnel or SSL Web Proxy is disabled in the VPN profile, a User
Management account and a remote dial-in VPN profile can use the same
Username, even with different passwords. However, we recommend you to use
different usernames for different user profiles in User Management and VPN
profiles.
2. Type the password for authentication and press Enter. The message User login
successful will be displayed with the expired time (if configured).
Info Here expired time is “Unlimited” means the Time Quota function is not
enabled for this account. After login, this account will not be expired
until it is logout.
3. In the Web interface of router, the configuration page of Time Quota is shown as below.
You will get the following message. The expired time is shown after you login.
After you run out the available time, you can’t use this account any more until the
administrator manually adds additional time for you.
2. You may get the VigorPro Alert Notice Tool from the following link:
http://www.draytek.com/user/SupportDLUtility.php
Info 1 Any modification to the Firewall policy will break down the
connections of all current users. They all have to authenticate again
for Internet access.
Info 2 The administrator may check the current users from User Online
Status page.
Example 1:Users can see the message for landing page after logging into Internet
successfully
1. Open the web user interface of Vigor1000B.
2. Open User Management -> General Setup to get the following page. In the field of
Landing Page, please type the words of “Login Success”. Please note that the
maximum number of characters to be typed here is 255.
3. Now you can enable the Landing Page function. Open User Management -> User Profile
and click one of the index number (e.g., index number 3) links.
5. Open any browser (e.g., FireFox, Internet Explorer). The logging page will appear and
asks for username and password. Please enter the correct username and password.
6. Click Login. If the logging is successful, you will see the message of Login Success from
the browser you use.
2. Next, enable the Landing Page function. Open User Management -> User Profile and
click one of the index number (e.g., index number 3) links.
4. Open any browser (e.g., FireFox, Internet Explorer). The logging page will appear and
asks for username and password. Please enter the correct username and password.
The Hotspot Web Portal feature allows you to set up profiles so that LAN users could either be
redirected to specific URLs, or be shown messages when they first attempt to connect to the
Internet through the router. Users could be required to read and agree to terms and
conditions, or authenticate themselves prior to gaining access to the Internet. Other
potential uses include the serving of advertisements and promotional materials, and
broadcast of public service announcements.
Item Description
Index Click the index number link to view or update the profile
settings.
Enable Check the box to enable the profile.
Comments Shows the description of the profile.
Login Mode Shows the login mode used by the profile. See the section
Login Mode for details.
(B) Click-through
The following page will be shown to the users when they first attempt to access the Internet
through the router. After clicking Accept on the page, users will be directed to the landing
page (defined in Captive Portal URL) and be granted access to the Internet.
Login Method
Click the index link (e.g., #1) of the selected profile to display the following page.
Item Description
Enable this profile Check to enable this profile.
Comments Enter a brief description to identify this profile.
Portal Server
Portal Method There are four methods to be selected as for portal server.
When Skip Loging, landing page only or Click through is selected as Portal Method
Captive Portal URL Enter the captive portal URL.
If you have chosen Skip Login, landing page only or External Portal Server as the portal
method, skip to step 4 Whitelisting below.
Otherwise, proceed to configure the login page by following steps 2 and 3.
If you have selected a Login Mode that requires authentication, select a background for the
login page.
Item Description
Choose Login Select either Color Background or Image Background as the login
Background page background scheme.
Browser Tab Title Enter the text to be shown as the webpage title in the browser.
Logo Image The DrayTek Logo will be displayed by default. However, you can
enter HTML text or upload an image to replace the default logo.
If you have selected Skip Login, landing page only or External Portal Server as the portal
method, proceed to Step 4 Whitelist Setting; otherwise, continue to Step 3 Login Page Setup.
In this step you can configure settings for the login page.
Click Through
This section describes the Login Page setup if you have selected Click Through as the Login
Method.
Item Description
Welcome Message Enter the text to be displayed as the welcome message.
Terms and Enter the text to be displayed as the Terms and Conditions
Settings that are common to Facebook, Google, PIN, and RADIUS authentication are:
Item Description
Welcome Message Enter the text to be displayed as the welcome message.
Terms and Enter the text to be displayed as the Terms and Conditions
Conditions hyperlink text.
Description
Terms and Enter the text to be displayed in the Terms and Conditions pop-up
Conditions Content window.
Item Description
Facebook Login Enter the text to be displayed on the Facebook login button.
Description
Item Description
Google Login Enter the text to be displayed on the Google login button.
Description
Item Description
Hint Message for PIN Enter the text used to suggest users to choose SMS authentication.
Receiving PIN via Enter the text to be displayed on the button that the user clicks to
SMS Description receive an SMS PIN.
Receiving PIN via Enter the message to be sent by SMS to inform the user of the PIN.
SMS Content The PIN variable is specified by <PIN> within the message.
Enter PIN Enter message to be displayed in the PIN textbox to prompt the
Description user to enter the PIN.
Submit Button Enter the text to be displayed on the submit PIN button
Description
Submit Button Color Select the color of the submit button from the predefined color
list, or select Customize Color and enter the RGB value. Click
Preview to preview the selected color.
Item Description
Hint Message for Enter the text used to prompt the user to login.
RADIUS
RADIUS Account Enter the text to prompt the user to enter the username.
Description
RADIUS Password Enter the text to prompt the user to enter the password.
Description
Login Button Enter the text to be displayed on the login button.
Description
Login Button Color Select the color of the login button from the predefined color list,
or select Customize Color and enter the RGB value. Click Preview
to preview the selected color.
And finally, the save and cancel buttons are always displayed.
Item Description
Save and Next Click to save the configuration on this page and proceed to the
next page.
Cancel Click to abort the configuration process and return to the profile
summary page.
Item Description
Back Button Enter text for the label of the hyperlink to return to the previous
Description page.
PIN Code Message Enter text to be displayed as the body text on the page.
In this step you can configure the whitelist settings. Users are allowed to send and receive
traffic that satisfies whitelist settings.
Item Description
NAT Rules To prevent web portal settings from conflicting with NAT rules
resulting in unexpected behavior, select the NAT rules that are
allowed to bypass the web portal. Hosts listed in selected NAT
rules can always access the Internet without being intercepted by
the web portal.
Dest Domain Enter up to 30 destination domains that are allowed to be
accessed.
Dest IP Enter up to 30 destination IP addresses that are allowed to be
accessed.
Dest Port Enter up to 30 destination protocols and ports that are allowed
through the router.
Source IP Enter up to 30 source IP addresses that are allowed through the
router.
Save and Next Click to save the configuration on this page and proceed to the
next page.
Cancel Click to abort the configuration process and return to the profile
summary page.
In this step you can configure advanced options for the Hotspot Web Portal.
Item Description
Quota Management
Quota Policy Profile Choose a policy profile to apply to web portal clients.
Web Portal Options
HTTPS Redirection If this option is selected, unauthenticated clients accessing HTTPS
websites will be redirected to the login page, but the browser may
alert the user of certificate errors. If this option is not selected,
attempts to access to HTTPS website will time out without
redirection.
Captive Portal If this option is selected, the web portal page is triggered
Detection automatically when an unauthenticated client tries to access the
Internet. This function is not available when the Login Mode is
Social Login, as the web portal page may not be shown correctly
due to the limitations of the operating system’s built-in Captive
Portal Detection.
Landing Page After Authentication
Fixed URL Specifies the webpage that will be displayed after the user has
Item Description
Select Columns to Simply specify the profile and the login method for filtering users
Filter Users who want to access Internet through the login method. It is useful
for system administrator to manage the user’s access based on
different conditions when there are a lot of users requiring to
access into Internet.
User Table Information for the users accessing into Internet via Hotsport Web
Portal will be displayed and recorded in this page.
Click the MAC address link for certain user, information page related to the selected device
will be shown as the following page.
Item Description
Enable database Check the box to record user information on router’s database.
Before checking this box, insert a USB disk with adequate storage
space, first.
Enable sending user Check the box to send user information to syslog.
information to
syslog
File Path If a USB disk has been inserted into the USB port of Vigor router,
the file path will be shown in this area.
Database Usage Display the usage and remaining space on the database.
Clear User Info – The user information will be displayed on the
page of User Info. You can delete the information by clicking this
button.
Notification and Action when Storage Exceeded
Notification Don’t send notification – Vigor router system will not send any
notification to any receipient.
Send notification - Vigor router system will send a notification
e-mail to specified receipient(s) that selected from Email
Notification Object and SMS Notification Object.
Action Stop recording user information – Vigor router system will stop to
record the user information onto USB disk.
Item Description
Bandwidth Limit Check the box to override the policy configured in Bandwidth
Management>>Bandwidth Limit.
Session Limit Check the box to override the policy configured in Bandwidth
Management>>Session Limit.
Quota Policy Profile Add - Create up to 20 policy profiles in such page.
Item Description
Profile Name Enter a name for a new profile.
Account Validity Set the duration for which the login is valid.
Expired Time After the First Login – Sets the days, hours, and
minutes. After the login has expired, Vigor router will block the
client from accessing the network/Internet.
Idle Timeout – When this option is selected, Vigor router will
terminate the network connection if the is no activity from the
user after the specified idle time has passed.
Device Control Set the maximum number of devices that can be connected for
each account, and the time restriction for the client accessing
Internet via the web portal.
Devices Allowed per account – Use the drop-down list to select
the maximum number of devices that can be connected to the
network using the same account.
Reconnection Time Restriction – Blocks the account from being
used to connect devices to the network in one of two ways:
At …. Everyday – After the login expires, the account cannot
be used to connect devices to the network until the set time
of day.
Hours.. min – After the login expires, the account cannot be
used to connect devices to the network for a set period of
time.
Bandwidth and Bandwidth Limit – Check the box to configure bandwidth limit for
After finishing all the settings here, please click OK to save the configuration.
A-1 How to allow users login to Vigor’s Hotspot with their social media accounts
(e.g., Facebook & Google)
Vigor Router supports Hotspot Web Portal function. The network administrator can set Vigor
Router as a Hotspot provider with web authentication and allow users to log in with their
social media accounts, such as Facebook and Google. We demonstrate how to set up the
hotspot web portal with Facebook login in the following paragraphs.
You can click the Step Icon on the top of the page to go to the step you want. The router
will save your setting automatically.
6. You can set the Whitelist for the profile here to allow specific clients to access the
internet or certain websites can be visited without login.
8. Then the Hotspot setup is finished. You may click Preview to check the login page.
Due to security concerns, the browser might warns that it cannot verify server
identity, the clients would need to tap "Continue" before they can proceed to
portal.draytek.com.
The client might not be able to access "portal.draytek.com" if this domain name
is resolved by a DNS server on LAN. If so, set up LAN DNS to make sure the domain
name will be resolved to the router's LAN IP.
10. Tap on a login method, and it will open the social media login page. Enter the social
media accounts and password to log in.
User Information
Network administrator can plug the USB disk to router, to record the basic information of the
users who connect to the Wi-Fi and login with their social media accounts. The users' basic
information will be listed on Hotspot Web Portal >> Users Information page.
Vigor1000B can manage the access points supporting AP management via Central AP
Management.
AP Maintenance
Vigor router can execute configuration backup, configuration restoration, firmware upgrade
and remote reboot for the APs managed by the router. It is very convenient for the
administrator to process maintenance without accessing into the web user interface of the
access point.
V-5-1 Dashboard
This page shows VigorAP’s information about Status, Event Log, Total Traffic or Station
Number by displaying VigorAP icon, text and histogram. Just move and click your mouse
cursor on Status, Event Log, Total Traffic or Station Number. Corresponding web pages will
be open immediately.
To access into the web user interface of VigorAP, simply move your mouse cursor on the
VigorAP icon and click it. The system will guide you to access into the web user interface of
VigorAP.
Item Description
Index Click the index number link for viewing the settings summary
of the access point.
Device Name The name of the AP managed by Vigor router will be displayed
here.
IP Address Display the true IP address of the access point.
SSID Display the SSID configured for the access point(s) connected
to Vigor1000B.
Ch. Display the channel used by the access point.
STA List Display the number of wireless clients (stations) connecting to
the access point.
In which, 0/64 means that up to 64 clients are allowed to
connect to the access point. But, now no one connects to the
access point.
The number displayed on the left side means 2.4GHz; and the
number displayed on the right side means 5GHz.
Uptime Display the duration of the AP powered up.
Version Display the firmware version used by the access point.
Password Vigor1000B can get related information of the access point by
accessing into the web user interface of the access point.
This button is used to modify the logging password of the
connected access point.
Click the number link of the selected profile to modify the content of the profile. Available
settings are explained as follows:
Item Description
Profile There are five WLAN profiles offered to be configured. Simply
click the index number link to open the modification page.
Name Display the name of the profile.
The default profile cannot be renamed.
Main SSID Display the SSID configured by such wireless profile.
Security Display the security mode selected by such wireless profile.
Multi-SSID Enable means multiple SSIDs (more than one) are active.
Disable means only SSID1 is active.
WLAN ACL Display the name of the access control list.
Rate Ctrl Display the upload and/or download transmission rate.
Clone It can copy settings from an existing WLAN profile to another
WLAN profile.
First, you have to check the box of the existing profile as the
original profile. Second, click Clone. The following dialog will
appear.
Simply choose the device you want from Existing Device field.
Click >> to move the device to Selected Device field. Then,
click OK.
The selected WLAN profile will be applied to the selected
access point immediately. Later the access point will reboot.
To Local WLAN Profile configured in this page is specified for VigorAP
connected to Vigor router.
If required, these settings also can be applied to Vigor router.
Select and check one of wireless profiles and click this button
to apply the settings onto the WI-Fi wireless settings
configured for such Vigor router.
Info The function of Auto Provision is available for the default WLAN profile.
5. When you finished the above web page configuration, click Finish to exit and return to
the first page. The modified WLAN profile will be shown on the web page.
Info Config Backup can be performed to one AP at one time. Others functions
(e.g., Config Restore, Firmware Upgrade, Remote Reboot can be performed
to more than one AP at one time by using Vigor1000B.
Item Description
Action There are four actions provided by Vigor router to manage the
access points.
After finishing all the settings here, please click OK to perform the action.
The horizontal axis represents time; the vertical axis represents the transmission rate (in
kbps).
Item Description
AP Load Balance It is used to determine the operation mode when the system
detects overload between access points.
Disable – Disable the function of AP load balance.
By Station Number –The operation of load balance will be
executed based on the station number configured in this page.
It is used to limit the allowed number for the station
connecting to the access point. The purpose is to prevent lots
of stations connecting to access point at the same time and
causing traffic unbalanced. Please define the required station
number for WLAN (2.4GHz) and WLAN (5GHz) separately.
By Traffic – The operation of load balance will executed
according to the traffic configuration in this page.
By Station Number or Traffic - The operation of load balance
will be executed based on the station number or the traffic
configuration.
Station Number Set the number of stations as a threshold to activate AP load
Threshold balance.
After finishing all the settings here, please click OK to save the configuration.
Vigor router can manage lots of VigorSwitch devices connected to it. Through profile and
group settings, the administrator can execute firmware/configuration backup, restore for
VigorSwitch device, reboot the device or return to factory default settings of VigorSwitch at
one time.
V-6-1 Status
Item Description
Group Display the name link of the group.
You can click the link to modify the group settings if
required.
Switch Name Display the name link of VigorSwitch.
You can click the name link to access into the switch profile.
IP Address Display the IP address of VigorSwitch.
Model Display the model name of VigorSwitch.
System Up Time Display the time accumulated since this Vigorwitch is
powered up.
Port in Use Display how many devices connected to VigorSwitch.
Clients Display the number of LAN ports used in VigorSwitch.
Firmware Version Display the firmware version that VigorSwitch current used.
Add Such button will appear only when there is more than one
switch connected to Vigor1000B .
The one under New Switch List is allowed to be managed
under current used group. Simply click Add.
Item Description
Switch List Displays the index number, switch name, IP address, model
name and MAC address of the VigorSwitch device.
Switch Name - The name link allows you to access into the
web user interface of the Vigor Switch.
IP - Displays the IP address of the switch.
Model - Displays the model name of the switch.
MAC - Displays the MAC address of the switch.
Search Search - After specifying IP address, MAC address or name of
the switch, click the Search button to find out the device and
display the searching result on this page.
Uplink Device - Displays the name of the server that Vigor
switch connects to.
Port - Indicates the port where the switch is connected to
the router. This number link allows you to click to view more
detailed information of the searched device.
Click the port number link (e.g., 3) to open the following page. Detailed information of the
name, port number, IP address, MAC address, description, type, VLAN number, PVID value
and PoE capability of the switch will be shown on this page.
Item Description
Index Click the number link to access into the switch profile.
Note: Each connected VigorSwitch will have one setting
profile. If there are many switches connected to Vigor1000B,
different index number will be used to represent different
VigorSwitch.
Name Display the user defined name of VigorSwitch.
Group Display the group name of VigorSwitch(es).
IP Address Display the IP address of VigorSwitch.
MAC Address Display the MAC address of VigorSwitch.
Model Display the model name of VigorSwitch.
Password Click it to display the account information including
username and password.
Delete Profile Click the mark of “X” to delete the switch profile.
Item Description
Switch Name Type a name for the Switch. The purpose of name is used for
identification.
It is useful when there are many VigorSwitch (same modes)
devices connecting to Vigor1000B seres.
Comment Enter the text in such field if additional explanation for the
switch is required.
Trap Community Enter the text in such field as trap community.
Name
Login Password Display the original login password for the VigorSwitch.
However, if Group Password (in Central Management
>>Switch>>Group) is configured with other string, then such
field is not allowed to type any other password. And only the
group password will be shown, instead.
IP Address Display the dynamic IP address (of the connected switch)
assigned by Vigor1000B.
Save Click it to save the settings.
Cancel Click it to return to previous web page without saving the
setting changes.
Send to Device Click it to transfer the configuration change (e.g, login
password, switch name, etc.) to the VigorSwitch
immediately.
2. After finished the settings, click VLAN tab to open following page.
Blank page due to LAN>>VLAN not configured previously:
3. Click Save to save VLAN configuration. Then, click Port tab to access the following page:
Item Description
Description If required, type a brief description to explain the device
connected to VigorSwitch via the LAN port.
Port Control Disable Port – The port (e.g, Port 2 in this case) which is used
to connect VigorSwitch and Vigor1000B will not be shutdown
by Vigor1000B series.
Other LAN ports of VigorSwitch allow to connect to any LAN
device. When it is checked, after clicking Save, the network
connection between that device and VigorSwitch will be
terminated.
4. Click Save to save the changes and then click Send to Device. Settings will be sent to
VigorSwitch immediately.
V-6-3 Group
Different switches can be classified into different group(s). Specifc password for a group can
be defined and applied to every switch uder that group.
Through the common password setting, it is not necessary for the system administrator to
remember various login passwords to access into different VigorSwitch devices.
Item Description
Group Name Type a name as the group name. Different switches can be
classified within a group.
Group Password Type a password that administrator can use to access into
the managed VigorSwitch connecting to Vigor1000B . All of
the switches under the same group can be accessed into via
such group password.
Existing Switch Display all of the VigorSwitch devices connecting to
Vigor1000B.
Member Switch Choose the switches you want to group and click the button
“>>” to move the selected devices onto the field of Member
Switch. Devices under Member Switch will be grouped under
such group profile.
OK Click it to save the configuration.
Cancel Click it to exit the setting page without saving any change.
Item Description
Select Action Action Type – Four actions including configuration backup,
configuration restore, remote reboot and factory reset are
offered by Vigor1000B to perform on VigorSwitch.
File/Path – Click the button to find out the required file.
Selected Device Use the drop down list to specify a VigorSwitch. Then the
MAC address and IP address related to the device will be
displayed on this area.
OK Click it to immediately perform the action (configuration
backup, configuration restore, remote reboot and factory
reset) on the device(s) listed in Selected Device.
Cancel Click it to cancel the setting changes.
Item Description
Alert and Log Check it to enable this feature.
Alert Levels and Action Level Name – Define names for representing the severity of
alert event. The default names for index 1 to index 4 will be
shown on each setting box. Index 5 to index 8 are reserved
for user-defined.
Color – Define the color for each level of alert. However, the
color of index 1 is No color and unable to be changed.
Create Log – Check the box to create log of alert. Such log
will be seen on Alert Logs page. Note that No Log for index 1;
and log for index 2 is enabled in default.
Send Notification – If it is checked, Vigor router’s system will
send notification to specified phone number via SMS.
SMS/Email Service Object – Choose the SMS object which
Item Description
Switch Alert Enable – Check it to enable alert mechanism for VigorSwitch.
Port Alert Enable - Check it to enable alert mechanism for each port of
VigorSwitch.
Click the Switch Name link (e.g., G2280 in this case) to get detailed settings.
Item Description
Switch Alert When VigorSwitch encounters the following alert events,
alert mechanism will perform corresponding actions based
Item Description
Enable Database to Record Check the box to make the database (in USB disk) to record
alert logs and traffic the alert logs and traffic history.
history
Notification and Action when Storage Exceeded
Notification Don’t send notification – No notification will be sent out
when there is no capacity for storage in USB.
Send notification – A notification will be sent out when there
is no capacity for storage in USB.
Action Stop recording user information – When the capacity of log
is full, the system will stop recording.
Backup and clean up all user infor, and start a new record
- Only the newest events will be recorded by the system.
Vigor router can be used to connect with many types of external devices. In order to control
or manage the external devices conveniently, open External Devices to make detailed
configuration.
Item Description
External Device Syslog Check this box to display information of the detected device
on Syslog.
External Device Auto Check this box to detect the external device automatically
Discovery and display on this page.
From this web page, check the box of External Device Auto Discovery and click OK. Later,
all the available devices will be displayed in this page with icons and corresponding
information. You can change the device name if required or remove the information for
off-line device whenever you want.
This section allows the creation of objects and object groups from IP addresses, service types,
keywords, file extensions, SMS and email recipients, and notification types. Once set up,
these objects can be applied to firewall and content management rules.
VI-1-1 IP Object
For IPs in a range and service ports in a limited range usually will be applied in configuring
router’s settings, therefore we can define them with objects and bind them with groups for
using conveniently. Later, we can select that object/group that can apply it. For example, all
the IPs in the same department can be defined with an IP object (a range of IP address).
You can set up to 192 sets of IP Objects with different conditions.
Item Description
View Use the drop down list to choose a type (Single Address,
Range Address, Subnet Address, Mac Address or all) that IP
object with the selected type will be shown on this page.
Set to Factory Default Clear all profiles.
Search Enter a string of the IP object that you wan to search.
Index Profile number of the IP object.
Name Name of the object.
Address Displays the IP address configured for the object profile.
Export IP Object Usually, the IP objects can be created one by one through
the web page of Objects>>IP Object. However, to a user
who wants to save more time in bulk creating IP objects, a
quick method is offered by Vigor router to modify the IP
objects with a single file, a CSV file.
All of the IP objects (or the template) can be exported as a
file by clicking Download. Then the user can open the CSV
file through Microsoft Excel and modify all the IP objects at
the same time.
Backup the current IP Objects with a CSV file – Click it to
backup current IP objecsts as a CSV file. Such file can be
restored for future use.
Download the default CSV template to edit – After clicking
it, press Download to store the default CSM template (a table
without any input data) to your hard disk.
Download – Download the CSV file from Vigor router and
store in your hard disk.
Restore IP Object Select – Click it to specify a predefined CSV file.
Restore – Import the selected CSV file onto Vigor router.
To set up a profile, click the profile number under Index column to bring up the configuration
page.
Item Description
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current IP object, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
To add an IP object to the IP Group, select it under Available IP Objects, then click the >>
button. To remove an IP object from the IP Group, select it under Selected IP Objects, then
click the << button.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current IP group, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
To set up a profile, click the profile number under Index column to bring up the configuration
page.
Item Description
Name Name that identifies this profile. Maximum length is 15
characters.
Address Type Type of Addresses.
Any Address - Object covers all IPv6 addresses.
Single Address - Object covers one IPv6 address.
Range Address - Object covers a range of IPv6 addresses.
Subnet Address - Object covers a range of IPv6 addresses
specified in subnet notation.
Mac Address - Object contains a MAC address.
Specify the match type (128 Bits or Suffix 64 Bits) for the
IPv6 address.
Mac Address Enter MAC address of the network device, if Address Type is
Mac Address.
Start IP Address Enter beginning IP address, if Address Type is one of Single
Address, Range Address and Subnet Address.
End IP Address Enter ending IP address, if Address type is one of Single
Address, Range Address and Subnet Address.
Prefix Length Enter IPv6 prefix length, if Address type is Subnet Address.
Invert Selection If selected, all addresses except the ones entered above will
be used.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the IPv6 object, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
To set up a profile, click the profile number under Index column to bring up the configuration
page.
To add an IPv6 object to the IPv6 Group, select it under Available IPv6 Objects, then click the
>> button. To remove an IPv6 object from the IPv6 Group, select it under Selected IPv6
Objects, then click the << button.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current IPv6 group, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
To set up a profile, click the profile number under Index column to bring up the configuration
page.
Item Description
Name Name that identifies this profile. Maximum length is 15
characters.
Protocol Protocol(s) to which this profile applies.
Any – All protocols.
ICMP – Internet Control Message Protocol
IGMP – Internet Group Management Protocol
TCP – Transmission Control Protocol
UDP – User Datagram Protocol
TCP/UDP – Transmission Control Protocol and User Datagram
Protocol
Other – Other protocols not listed above. Enter protocol
number in the textbox.
Source/Destination Port When protocol selected includes TCP or UDP, the source and
destination ports can be specified.
= – any port that falls within the specified range.
!= – any port that falls outside of the specified range.
– all port numbers that are greater than the specified value.
< – all port numbers that are smaller than the specified
value.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current service type object, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
To set up a profile, click the profile number under Index column to bring up the configuration
page.
To add a Service Type Object to the Service Type Group, select it under Available Service
Type Objects, then click the >> button. To remove a Service Type Object to the Service Type
Group, select it under Selected Service Type Objects, then click the << button.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current service type group, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
Item Description
Name Name that identifies this profile. Maximum length is 15
characters.
Contents Keywords to be matched. Enter the content for this profile.
For example, type gambling as Contents. When you browse
the webpage, the page with gambling information will be
watched out and be passed/blocked based on the
configuration on Firewall settings.
In addition, up to 3 key phrases, separated by spaces, for a
total length of 63 characters can be entered. For key phrases
that contain spaces, replace spaces with the sequence %20.
For example, the phrase “keep out” is to be entered as
“keep%20out”.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current keyword object, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
Objects Display the keyword objects under this group.
Item Description
To add a Service Type Object to the Service Type Group, select it under Available Service
Type Objects, then click the >> button. To remove a Service Type Object to the Service Type
Group, select it under Selected Service Type Objects, then click the << button.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the current keyword group, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Name Name that identifies the profile.
Item Description
Profile Name Name that identifies this profile. Maximum length is 7
characters.
Select All Selects all file extensions for the category.
Clear All Deselects all file extensions for the category.
Select the file extensions you wish to be included in the profile. To save changes on the page,
click OK. To discard changes, click Cancel. To blank out all settings in the current file
extension object, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Profile Name that identifies the profile.
SMS Provider The SMS provider selected for the profile.
To set up a profile, click the SMS Provider tab, and then click its index to bring up the
configuration page.
Item Description
Profile Name Name that identifies this profile. Maximum length is 31
characters.
Service Provider Select a Service Provider from the dropdown list.
Username Username used to log in to the service. Maximum length is 31
characters.
Password Password used to log in to the service. Maximum length is 31
characters.
Quota Remaining number of text messages allowed to be sent. The
quota value reduces by 1 every time the router sends an SMS
message. When the quota reaches 0, no SMS will be sent until it
is reset to greater than 0.
Sending Interval Minimum amount of time, in seconds, to wait between sending
SMS messages.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the SMS service object, click Clear.
To set up a customized profile, click the SMS Provider tab, and then click one of the 2 indexes
(9 and 10) to bring up the configuration page.
Item Description
Profile Name Display-only profile name, which is Custom 1 for Index 9 and
Custom 2 for Index 10.
Service Provider Enter an identifier for the service provider. Maximum length
is 23 characters.
Entry box Enter the URL for the SMS service. Maximum length is 255
characters. Contact the service provider for the appropriate
URL to use.
Username Username used to log in to the service. Maximum length is 31
characters.
Password Password used to log in to the service. Maximum length is 31
characters.
Quota Remaining number of text messages allowed to be sent. The
quota value reduces by 1 every time the router sends an SMS
message. When the quota reaches 0, no SMS will be sent until
it is reset to greater than 0.
Sending Interval Minimum amount of time, in seconds, to wait between
sending SMS messages.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the SMS service object, click Clear.
Item Description
Set to Factory Default Clear all profile settings.
Index Index number of the profile.
Profile Name that identifies the profile.
To set up a profile, click the Mail Server tab, and then click its index to bring up the
configuration page.
Item Description
Profile Name Name that identifies this profile. Maximum length is 31
characters.
SMTP Server IP address of the SMTP server.
SMTP Port Port number of the SMTP server.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the mail service object, click Clear.
Item Description
Profile Name Name that identifies this profile. Maximum length is 31
characters.
Category Areas to be monitored.
Status Select the states to be monitored.
To save changes on the page, click OK. To discard changes, click Cancel. To blank out all
settings in the notification object, click Clear.
Item Description
Add Click it to open the following page for adding a new string
object.
Set to Factory Default Click it to clear all of the settings in this page.
Index Display the number link of the string profile.
String Display the string defined.
Clear Choose the string that you want to remove. Then click this
check box to delete the selected string.
The country object, by grouping IP addresses for multiple countries, can be applied by other
functions such as router policy destination (refer to the following figure for example).
Item Description
Name Type a name for such profile. The maximum length of the
name you can set is 15 characters.
Available Country / Select any country from Available Country. Click >> to move
Selected Country the selected country and place on Selected Country.
Note that one country profile can contain 1 up to 16
countries.
3. After finishing all the settings here, please click OK to save the configuration.
A-1 How to Send a Notification to Specified Phone Number via SMS Service in
WAN Disconnection
Follow the steps listed below:
1. Log into the web user interface of Vigor router.
2. Configure relational objects first. Open Object Settings>>SMS/Mail Server Object to
get the following page.
Index 1 to Index 8 allows you to choose the built-in SMS service provider. If the SMS
service provider is not on the list, you can configure Index 9 and Index 10 to add the new
service provider to Vigor router.
3. Choose any index number (e.g., Index 1 in this case) to configure the SMS Provider
setting. In the following page, type the username and password and set the quota that
the router can send the message out.
6. Choose any index number (e.g., Index 1 in this case) to configure conditions for sending
the SMS. In the following page, type the name of the profile and check the Disconnected
and Reconnected boxes for WAN to work in concert with the topic of this paper.
8. Now, open Application >> SMS / Mail Alert Service. Use the drop down list to choose
SMS Provider and the Notify Profile (specify the time of sending SMS). Then, type the
phone number in the field of Recipient (the one who will receive the SMS).
9. Click OK to save the settings. Later, if one of the WAN connections fails in your router,
the system will send out SMS to the phone number specified. If the router has only one
WAN interface, the system will send out SMS to the phone number while reconnecting
the WAN interface successfully.
USB devices connected to the Vigor router can function as storage servers, WAN interfaces,
network printers or thermometers.
After setting the configuration in USB Application, a USB storage device can be accessed using
either the FTP or SMB protocol from LAN clients with the IP address of the Vigor router and
the username and password entered in USB Application>>USB User Management.
Info USB modems that are supported by the router are listed in USB
Application>>Modem Support List. For network connection via USB
modem, refer to WAN>>Internet Access and WAN>>General Setup for
detailed information.
Item Description
General Settings Simultaneous FTP Connections - Enter the maximum
number of simultaneous FTP sessions allowed. The router
allows up to 6 simultaneous sessions.
Default Charset - Select the character set for file and
directory names. Currently, the Vigor router supports four
character sets. The default charset is English.
Item Description
Enable Check to activate this profile (account) for FTP service and /
or SMB service. Later, the user can use the username
specified in this page to login into FTP server.
Username Enter the username for this user profile. Maximum allowed
length of the username is 11 characters.
Note: Anonymous user access is not supported.
Note: “Admin” cannot be used as a username, as it is
reserved for access to web pages on the Vigor router, and for
FTP firmware upgrade.
Note: Ensure that the FTP client does not use passive FTP
mode as it is not supported by the Vigor router.
Password Enter the password for this user profile. Maximum allowed
length of the username is 11 characters.
Confirm Password Enter the password again to confirm.
Home Folder Enter the folder which will be the root folder for FTP and
SMB sessions established using the credentials of this user
profile. Only folders and files inside this selected root folder
are accessible to the user. In addition, if the user types “/”
here, the user can access into all of the disk folders and files
To save changes on this page, ensure that a USB storage device is connected, and click OK. To
discard changes, click Cancel. To blank out all settings in the current IP object, click Clear.
Item Description
Click this icon to refresh the list of files and folders.
Refresh
Click this icon to return to the parent folder.
Back
Click this icon to add a new folder.
Create
Current Path Shows current folder.
Upload To upload a file to the USB storage device, click the
Browse... button to bring up the file selection dialog box.
Select the file you wish to upload, and click the Upload
button to initiate the upload process.
To maintain the data integrity of a USB disk that is connected to the router, always click
Disconnect USB Disk before unplugging the disk from the router.
Item Description
Connection Status Shows whether a USB disk is connected or not. If there is no
USB device connected to the Vigor router, “No Disk
Connected” will be displayed.
Disk Capacity Shows the total capacity of the USB storage disk.
Free Capacity Shows the free space on the USB storage disk. Click Refresh
at any time to get the most up-to-date free capacity.
USB Disk Users Connected Shows the clients that are connected to the SMB/FTP server.
Index – The profile index used by the LAN client to establish
the connection.
Service – Shows whether the connection is using FTP or SMB.
IP Address – Shows the client’s IP address.
Username – Shows the username used to establish the
After a USB storage device has been connected, the Connection Status will be updated within
a few seconds.
This section will guide you to solve abnormal situations if you cannot access into the Internet
after installing the router and finishing the web configuration. Please follow sections below to
check your basic installation status stage by stage.
Checking if the hardware status is OK or not.
Checking if the network connection settings on your computer are OK or not.
Pinging the router from your computer.
Checking if the ISP settings are OK or not.
Backing to factory default setting if necessary.
If all above stages are done and the router still cannot run normally, it is the time for you to
contact your dealer or DrayTek technical support for advanced help.
This section contains utilities that can assist you in analyzing issues and failures during the
setup and operation of the router.
Item Description
Decoded Format Shows the dial-out triggered packet header in hexadecimal
format.
Item Description
Refresh Click it to reload the page.
Item Description
Show Select the LAN(s) and VLAN(s) to display ARP table
information.
By default, information on all LANs and VLANs is displayed.
Refresh Click it to reload the page with the most up-to-date
information.
Item Description
Refresh Click it to reload the page with the most up-to-date
information.
Item Description
Index Shows the index of the DHCP entry.
IP Address Shows the IP address assigned by the router to the MAC
address.
MAC Address Shows the MAC address of this DHCP entry.
Leased Time Shows the remaining time of the DHCP lease of the device.
HOST ID Shows the host ID of this network device.
Refresh Click to reload this page with the most up-to-date
information.
Item Description
Private IP: Shows the IP address of the LAN host.
Port # Shows the port number used on the LAN host for this NAT
session.
Pseudo Port Shows the external port number used on the WAN interface
for this NAT session.
Peer IP: Shows the remote host’s IP address.
Port Shows the port number used on the remote host for this NAT
session.
Interface Shows the WAN interface used for this NAT session.
Refresh Click to reload this page with the most up-to-date
information.
Item Description
Clear Click to clear all cached DNS lookup entries.
Refresh Click it to reload the page.
When an entry’s TTL is When this box is checked, DNS entries whose TTL (time to
larger than…. live, in seconds) exceeds the valued specified here will be
deleted from the router’s cache automatically. Be sure to
click OK after making changes to have them saved.
or
Item Description
IPV4 / IPV6 Choose the interface for such function.
Select the protocol to perform the ping operation.
Ping through Select a WAN interface from drop down list to through which
you want to perform the ping operation, or choose Auto to
be let the router select the WAN interface.
Click Diagnostics and click Data Flow Monitor to load the web page. You can click IP Address,
TX rate, RX rate or Session links in the header to sort the displayed data.
Item Description
Enable Data Flow Monitor Check this box to enable this function.
Refresh Seconds Select the desired refresh time interval from the drop-down
APP QoS Use the drop down list to change the priority in data
transmission for the specified IP address (host).
Current /Peak/Speed Current means current transmission rate and receiving rate
for WAN interface.
Peak means the highest peak value detected by the router in
data transmission.
Speed means line speed specified in WAN>>General Setup.
If you do not specify any rate at that page, here will display
Auto for instead.
Item Description
Continuously Send All Select to send all packets to mirror port.
Packets to Mirror Port
Enable/Disable Select Enable to activate the function.
Select Disable to cancel the function.
Mirror Port One and only one port is selected as the mirror port, to
which traffic is to be forwarded.
Mirrored Tx Port Port(s) whose outbound traffic will be forwarded to the
mirror port.
Mirrored Rx Port Port(s) whose inbound traffic will be forwarded to the mirror
port.
OK Save the settings.
Item Description
Download .pcap If it is selected, the packets from the specified mirror port
can be downloaded for analysis.
Mirror Port One and only one port is selected as the mirror port, to
which traffic is to be forwarded.
Mirrored Tx Port Port(s) whose outbound traffic will be forwarded to the
mirror port.
Mirrored Rx Port Port(s) whose inbound traffic will be forwarded to the mirror
port.
Setting Capture All Packets - All packets will be captured for
analysis.
Capture with Filter - Only the packets filtered by ICMP, TCP,
UDP, or TCP/UDP will be captured for analysis.
Duration Set a period of time for Vigor router to capture the packets.
Filter Settings It is available only when Capture with Filter is selected.
Protocol - Filter the packet by using Any, ICMP, TCP, UDP,
and TCP/UDP.
IP Address - Filter the packet by IP address. If Customized IP
is selected, please enter an IP address in the entry box.
Port - It is available when TCP, UDP, or TCP/UDP is selected
as the Protocol. Select Any or Customize Port. If Customize
Port is selected, please enter a port number in the entry box.
Start Click to begin the packet capturing.
After finishing all the settings here, please click OK to save the configuration.
The horizontal axis represents time. Yet the vertical axis has different meanings. For
WAN1/WAN3/WAN4/WAN5/WAN6 Bandwidth chart, the numbers displayed on vertical axis
represent the numbers of the transmitted and received packets in the past.
For Sessions chart, the numbers displayed on vertical axis represent the numbers of the NAT
sessions during the past.
Item Description
Host to LAN/LAN to LAN Select Host to LAN to view log entries on VPN connections
that were initiated by VPN teleworkers.
Select LAN to LAN to view log entries on LAN-to-LAN VPN
connections to or from this router.
Index Select a VPN connection to view its log entries.
Item Description
Host to LAN/LAN to LAN Select Host to LAN to view log entries on VPN connections
that were initiated by VPN teleworkers.
Select LAN to LAN to view log entries on LAN-to-LAN VPN
connections to or from this router.
Index Select a VPN connection to view its log entries.
Date Select the date for which you wish to view traffic statistics.
The traffic information for this date will be shown in the
daily graph, and the traffic information for the week before
this date will be shown in the weekly graph.
or
Item Description
IPv4 / IPv6 Select the IP version used to perform the trace route.
Trace through Select the WAN interface used to perform the trace route.
Protocol Select either UDP or ICMP used to perform the trace route.
Host/IP Address Enter the hostname or the IP address of trace route
destination.
Item Description
Enable Web Syslog Check this box to enable Web Syslog.
Syslog Type Select the type of Syslog info to monitor.
Export Click to save the data as a file.
Refresh Click to refresh this page manually.
Clear Click to purge Syslog entries from the Web Syslog buffer.
Display Mode Two display modes are available.
Stop record when fulls – When the Web Syslog buffer is full,
no further logging will be performed.
Always record the new event – Events are recorded in a
Item Description
Refresh Click this link to refresh this page manually.
Item Description
Details/Back Details – Click to display detailed status about HA
configuration for the selected router.
Back – Click to return to the previous page.
HA Setup Click to navigate to Applications>>High Availability to modify
the HA configuration.
Renew Click to get the latest status of routers other than the primary
router.
Refresh Click to get the latest status of the primary router.
Status “!” means an error has occurred. Refer to Detailed
information and modify HA settings if required.
Router Name Display the name of the device.
IP Display the IPv4 address of such router.
Role "Down" means the function of HA is disabled.
"Primary" means the router is the primary HA router.
"Secondary" means the router is a secondary HA router.
Stable "No" means the primary router has not been identified yet.
DARP is still negotiating.
"YES" means the primary router is identified.
WAN "At Least One UP" means that at least one WAN interface is
connected to Internet.
"All WANs Down" means that no WAN interface is currently
connected to Internet.
To view detailed information of a router, click Status, Router Name IPv4 or Details, and the
following page will be shown:
Item Description
Enable Check to enable Authentication Information Log.
Refresh Click to refresh the Authentication Information Log.
Clear Click to clear the Authentication Information Log.
Syslog Type Select the type of authentication information to be displayed:
Radius, 802.1X, or ALL (both Radius and 802.1X).
Display Mode Choose the mode that the logging information will be shown.
Stop record when fulls – when the buffer is full, the system
will stop recording.
Always record the new event – when the buffer is full, the
oldest event will be purged to make room for the new event.
Time Display the time of the event.
Message Displays the details of the authentication event.
Info The icon - - means there is something wrong (e.g., attacking the
system) with that IP address.
or
Item Description
Mode Analyze a single packet – Choose such mode to make Vigor
router analyze how a single packet will be sent by a route
policy.
Analyze multiple packets… - Choose such mode to make Vigor
router analyze how multiple packets in a specified file will be
sent by a route policy.
Packet Information Specify the nature of the packets to be analyzed by Vigor
router.
ICMP/UDP/TCP/ANY- Specify a protocol for diagnosis.
Src IP – Type an IP address as the source IP.
Dst IP – Type an IP address as the destination IP.
Dst Port – Use the drop down list to specify the destination
3. If not, it means that there is something wrong with the hardware status. Simply back to
“I-2 Hardware Installation” to execute the hardware installation again. And then, try
again.
Sometimes the link failure occurs due to the wrong network connection settings. After trying
the above section, if the link is stilled failed, please do the steps listed below to make sure
the network connection settings is OK.
For Windows
Info The example is based on Windows 7. As to the examples for other operation
systems, please refer to the similar steps or find support notes in
www.DrayTek.com.
3. Icons of network connection will be shown on the window. Right-click on Local Area
Connection and click on Properties.
The default gateway IP address of the router is 192.168.1.1. For some reason, you might need
to use “ping” command to check the link status of the router. The most important thing is
that the computer will receive a reply from 192.168.1.1. If not, please check the IP
address of your computer. We suggest you setting the network connection as get IP
automatically. (Please refer to the section VIII-3)
Please follow the steps below to ping the router correctly.
For Windows
1. Open the Command Prompt window (from Start menu> Run).
2. Type command (for Windows 95/98/ME) or cmd (for Windows NT/ 2000/XP/Vista/7/8).
The DOS command dialog will appear.
3. Type ping 192.168.1.1 and press [Enter]. If the link is OK, the line of “Reply from
192.168.1.1:bytes=32 time<1ms TTL=255” will appear.
4. If the line does not appear, please check the IP address setting of your computer.
If WAN connection cannot be up, check if the LEDs (according to the LED explanations listed
on section I-1-1) are correct or not. If the LEDs are off, please:
Change the Physical Type from Auto negotiation to other values (e.g., 100M full duplex).
Next, change the physical type of modem (e.g., DSL/FTTX(GPON)/Cable modem) offered
by ISP with the same value configured in Vigor router. Check if the LEDs on Vigor router
are on or not.
If not, please install an additional switch for connecting both Vigor router and the modem
offered by ISP. Then, check if the LEDs on Vigor router are on or not.
If the problem of LEDs cannot be solved by the above measures, please contact with the
nearest reseller, or send an e-mail to DrayTek FAE for technical support.
Check if the settings offered by ISP are configured well or not.
When the LEDs are on and correct, yet the WAN connection still cannot be up, please:
Open WAN >> Internet Access page and then check whether the ISP settings are set
correctly. Click Details Page of WAN1~WAN8 to review the settings that you configured
previously.
Sometimes, a wrong connection can be improved by returning to the default settings. Try to
reset the router by software or hardware. Such function is available in Admin Mode only.
Info After pressing factory default setting, you will loose all settings you did
before. Make sure you have recorded all useful settings before you pressing.
The password of factory default is null.
Software Reset
You can reset the router to factory default via Web page. Such function is available in Admin
Mode only.
Go to System Maintenance and choose Reboot System on the web page. The following screen
will appear. Choose Using factory default configuration and click Reboot Now. After few
seconds, the router will return all the settings to the factory settings.
After restore the factory default setting, you can configure the settings for the router again
to fit your personal request.
If the router still cannot work correctly after trying many efforts, please contact your dealer
for further help right away. For any questions, please feel free to send e-mail to
support@DrayTek.com.
This chapter also gives you a general description for accessing telnet and describes the
firmware versions for the routers explained in this manual.
Info For Windows 7 user, please make sure the Windows Features of Telnet
Client has been turned on under Control Panel>>Programs.
Type cmd and press Enter. The Telnet terminal will be open later.
In the following window, type Telnet 192.168.1.1 as below and press Enter. Note that the IP
address in the example is the default address of the router. If you have changed the default,
enter the current IP address of the router.
Next, type admin/admin for Account/Password. Then, type ?. You will see a list of
valid/common commands depending on the router that your use.
Syntax
csm appe prof -i INDEX [-v | -n NAME|setdefault]
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 32.
-v View the configuration of the CSM profile.
-n Set a name for the CSM profile.
NAME Specify a name for the CSM profile, less then 15 characters.
setdefault Reset to default settings.
Example
> csm appe prof -i 1 -n games
The name of APPE Profile 1 was setted.
Syntax
csm appe set -i INDEX [-v GROUP| -e AP_IDX | -d AP_IDX]
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 32.
-v View the IM/P2P/Protocol and Others configuration of the CSM
profile.
-e Enable to block specific application.
-d Disable to block specific application.
GROUP Specify the category of the application. Available options are: IM,
P2P, Protocol and Others.
AP_IDX Each application has independent index number for identification in
CLI command.
Specify the index number of the application here. If you have no
idea of the inex number, do the following (Take IM as an example):
Type “csm appe set –I 1 –v IM”, the system will list all of the index
numbers of the applications categorized under IM.
Example
> csm appe set -i 1 -v IM
>
Syntax
csm appe show [-a|-i|-p|-t|-m]
Syntax Description
Parameter Description
-a View the configuration status for All groups.
-i View the configuration status of IM group.
-p View the configuration status of P2P group.
-t View the configuration status of protocol group.
-m View the configuration status of Others group.
Example
>csm appe show -t
Syntax
csm appe config -v INDEX [-i|-p|-t|-m]
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 32.
-i View the configuration status of IM group.
-p View the configuration status of P2P group.
-t View the configuration status of protocol group.
-m View the configuration status of Others group.
Example
> csm appe config -v 1 -m
Syntax
csm ucf show
Syntax Description
Parameter Description
show Display all of the profiles.
setdefault Return to default settings for all of the profile.
msg MSG Set the administration message.
MSG means the content (less than 255 characters) of the message
itself.
obj Specify the object for the profile.
INDEX Specify the index number of CSM profile, from 1 to 8.
-n PROFILE_NAME Set the profile name.
PROFILE_NAME - Specify the name of the profile (less than 16
characters)
-l P/B/A It means the log type of the profile. They are:
P: Pass,
B: Block,
A: All,
-p VALUE Set the priority (defined by the number specified in VALUE) for the
profile.
VALUE - Number 0 to 3 represent different conditions.
0: It means Bundle: Pass.
1: It means Bundle: Block.
2: It means Either: URL Access Control First.
3: It means Either: Web Feature First.
uac Set URL Access Control part.
wf Set Web Feature part.
Example
> csm ucf obj 1 -n game -l B
Profile Index: 1 Profile Name:[game]
Syntax
csm ucf obj INDEX uac -v
csm ucf obj INDEX uac -e
csm ucf obj INDEX uac -d
csm ucf obj INDEX uac -a P|B
csm ucf obj INDEX uac -i E|D
csm ucf obj INDEX uac -o KEY_WORD_Object_Index
csm ucf obj INDEX uac -g KEY_WORD_Group_Index
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 8.
-v View the protocol configuration of the CSM profile.
-e Enable the function of URL Access Control.
-d Disable the function of URL Access Control.
-a Set the action of specific application, P or B.
B: Block. The web access meets the URL Access Control will be
blocked.
P: Pass. The web access meets the URL Access Control will be passed.
-i Prevent the web access from any IP address.
E: Enable the function. The Internet access from any IP address will
be blocked.
D: Disable the function.
-o Set the keyword object.
KEY_WORD_Object_Index Specify the index number of the object profile.
-g Set the keyword group.
KEY_WORD_Group_Index Specify the index number of the group profile.
Example
> csm ucf obj 1 uac -i E
Log:[block]
Priority Select : [Either : Url Access Control First]
Syntax
csm ucf obj INDEX wf -v
csm ucf obj INDEX wf -e
csm ucf obj INDEX wf -d
csm ucf obj INDEX wf -a P|B
csm ucf obj INDEX wf -s WEB_FEATURE
csm ucf obj INDEX wf -u WEB_FEATURE
csm ucf obj INDEX wf -f File_Extension_Object_index
Syntax Description
Parameter Description
INDEX Specify the index number of CSM profile, from 1 to 8.
-v View the protocol configuration of the CSM profile.
-e Enable the restriction of web feature.
-d Disable the restriction of web feature.
-a Set the action of web feature, P or B.
B: Block. The web access meets the web feature will be blocked.
P: Pass. The web access meets the web feature will be passed.
-s Enable the the Web Feature configuration.
Features available for configuration are:
c: Cookie
p: Proxy
u: Upload
-u Cancel the web feature configuration.
-f Set the file extension object index number.
File_Extension_Object_inde Type the index number (1 to 8) for the file extension object.
x
Example
> csm ucf obj 1 wf -s c
-----------------------------------------------
Web Feature
[ ]Enable Restrict Web Feature Action:[pass]
Syntax
csm wcf show
csm wcf look
Syntax Description
Parameter Description
show Display the web content filter profiles.
look Display the license information of WCF.
cache Set the cache level for the profile.
server WCF_SERVER Set web content filter server.
msg MSG Set the administration message.
MSG means the content (less than 255 characters) of the message
itself.
setdefault Return to default settings for all of the profile.
obj Specify the object profile.
INDEX Specify the index number of web content filter profile, from 1 to 8.
-v View the web content filter profile.
-a P|B Set the action of web content filter profile, P or B.
B: Block. The web access meets the web feature will be blocked.
P: Pass. The web access meets the web feature will be passed.
-n PROFILE_NAME Set the profile name.
PROFILE_NAME: Specify the name of the profile (less than 16
characters)
-l P|B|A It means the log type of the profile. They are:
P: Pass,
B: Block,
A: All,
-o Set the keyword object.
KEY_WORD_Object_Index Specify the index number of the object profile.
-g Set the keyword group.
KEY_WORD_Group_Index Specify the index number of the group profile.
-w E|D|P|B Set the action for the black and white list.
E:Enable,
D:Disable,
P:Pass,
B:Block
Example
> csm wcf obj 1 -n test_wcf
Profile Index: 1
Profile Name:[test_wcf]
[]White/Black list
Action:[block]
Action:[block]
Log:[block]
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
Leisure Group
-------------------------------------------------------------------------------
Business Group
-------------------------------------------------------------------------------
Chating Group
-------------------------------------------------------------------------------
Other Group
>
Syntax
csm dnsf enable ON|OFF
csm dnsf syslog N|P|B|A
csm dnsf wcf INDEX
csm dnsf ucf INDEX
csm dnsf cachetime CACHE_TIME
csm dnsf blockpage show/on/off
csm dnsf profile_show
Syntax Description
Parameter Description
enable Enable or disable DNS Filter.
ON: enable.
OFF: disable.
syslog Determine the content of records transmitting to Syslog.
P: Pass. Records for the packets passing through DNS filter will be
sent to Syslog.
B: Block. Records for the packets blocked by DNS filter will be
sent to Syslog.
A: All. Records for the packets passing through or blocked by DNS
filter will be sent to Syslog.
N: None. No record will be sent to Syslog.
WCF INDEX Specify a WCF profile (1 to 8) as the base of DNS filtering. Type a
number to indicate the index number of WCF profile (1 is first
profile, 2 is second profile, and so on ...).
UCF INDEX Specify a UCF profile (1 to 8) as the base of DNS filtering. Type a
number to indicate the index number of UCF profile (1 is first
profile, 2 is second profile, and so on ...).
cachetime CACHE_TIME CACHE_TIME: It means to set the time for cache to live (available
values are 1 to 24; 1 is one hour, 2 is two hours, and so on ...) for
DNS filter.
blockpage DNS sends block page for redirect port. When a web page is
blocked by DNS filter, the router system will send a message page
to describe that the page is not allowed to be visisted.
ON: Enable the function of displaying message page.
OFF: Disable the function of displaying message page.
SHOW: Display the function of displaying message page is ON or
OFF.
profile_show Display the table of the DNS filter profile.
profile_edit Modify the content of the DNS filter profile.
-n PROFILE_NAME PROFILE_NAME: Type the name of the DNS filter profile that you
want to modify.
-l P|B|A Specify the log type of the profile.
P: Pass.
B: Block.
A: All.
-w WCF_PROFILE WCF_PROFILE: Type the index number of the WCF profile.
-u UCF_PROFILE UCF_PROFILE: Type the index number of the UCF profile.
-c CACHE_TIME -c means to set the cache time for DNS filter.
CACHE_TIME: It means to set the time for cache to live (available
values are 1 to 24; 1 is one hour, 2 is two hours, and so on ...) for
Example
> csm dnsf profile_setdefault
setdefault!!!
>csm dnsf cachetime 20
dns cache time set up!!!
> csm dnsf local_bw e
Enable the Block and White List.
> csm dnsf local_bw a 1 192.168.1.11
Address Type: 0:mask, 1:single, 2:any, 3:range, 4:object and group
Set the [SINGLE] Address type
> csm dnsf local_bw s
Show Block/White List information for DNS Filter Local Setting
Block/White List:[ENABLE]
Action:[PASS]
Address type:[SINGLE]
Start ip address:[192.168.1.11]
End/Mask ip address:[0.0.0.0]
Group 1:[0]
Group 2:[0]
Object 1:[0]
Object 2:[0]
Syntax
ddns enable <0/1>
Syntax Description
Parameter Description
0/1 0 – Disable the DDNS service.
1 – Enable the DDNS service.
Example
Syntax
ddns set option <value>
Syntax Description
Parameter Description
-i <value> It means index number of Dynamic DNS Account.
<value>=1~6
-S <value> It means to specify Servive Provider.
If user want to set User-Defined page, value must select 1.
<value>= 1~19
1: User-Defined
2:3322 DDNS (www.3322.org)
3: ChangeIP.com (www.changeip.com)
4:ddns.com.cn (www.ddns.com.cn)
5: DtDNS (www.dtdns.com)
6: dyn.com (www.dyn.com)
7: DynAccess (www.dynaccess.com)
8: dynami.co.za (www.dynami.co.za)
9: freedns.afraid.org (freedns.afraid.org)
10: NO-IP.COM Free (www.no-ip.com)
11: opendns.com (www.opendns.com)
12: OVH (www.ovh.com)
13: Strato (www.strato.eu)
14: TwoDNS (www.twodns.de)
15: TZO (www.tzo.com)
16: ubddns.org (ubddns.org)
17: Viettel DDNS (vddns.vn)
18: vigorddns.com (www.vigorddns.com)
19: ZoneEdit DDNS (dynamic.zoneedit.com)
T <value> It means to type Servive Type.
<value>= 1~3
1: Dynamic
2: Custom
3: Static
-D <Host Name> <sub Domain It means to type Domain Name.
Name> e.g.: Account index 1 setting Domain Name for Dynamic Service
Type
>> ddns set -i 1 -T 1 -D "host ddns.com.cn"
e.g.: Account index 2 setting Domain Name for Custom Service
Type
>> ddns set -i 2 -T 2 -D "domain name"
e.g.: Account index 3 setting Domain Name for Static Service Type
Example
> ddns set -i 1 -S 6 -T 1 -D "hostname dnsalias.net" -L user1 -P pwd1
> Save OK
Example
>ddns log
>
Syntax
ddns time <update in minutes>
Syntax Description
Parameter Description
Update in minutes Type the value as DDNS time. The range is from 1 to 14400.
Example
> ddns time
ddns time <update in minutes>
Valid: 1 ~ 14400
%Now: 14400
> ddns time 1000
> ddns time ?
ddns time <update in minutes>
Valid: 1 ~ 14400
%Now: 1000
Example
> ddns forceupdate
Now updating DDNS ...
Please check result by using command "ddns log"
Syntax
ddns show -i <value>
Syntax Description
Parameter Description
-I <value> Display the content of selected DDNS account.
value: value must be between 1-6.
Example
> ddns show -i 1
--------------------------------------------------
Index: 1
[ ] Enable Dynamic DNS Account
WAN Interface: WAN1 First
Service Provider: dyn.com (www.dyn.com)
Service Type: Dynamic
Domain Name: [].[]
Login Name:
[ ] Wildcards
[ ] Backup MX
Mail Extender:
Determine Real WAN IP: WAN IP
>
Syntax
dos <-V | D | A>
dos <-s ATTACK_F <THRESHOLD><TIMEOUT>>
dos <-a | e <ATTACK_F><ATTACK_0> | d <ATTACK_F><ATTACK_0>>
dos <-o >LOG_TYPE>|p <LOG_TYPE>|l <LOG_TYPE>>
dos -P <add4> <ipv4_addr> / <remove4><ipv4_addr/all> / <add6><ipv6_addr> /
<remove6><ipv6_addr/all> / <show>
dos -B <add4> <ipv4_addr> / <remove4><ipv4_addr/all> / <add6><ipv6_addr> /
<remove6><ipv6_addr/all> / <show>
dos -o <0/1>
dos -p <0/1>
Syntax Description
Parameter Description
-V View the configuration of DoS defense system.
-D Deactivate the DoS defense system.
-A Activate the DoS defense system.
-s Enable the defense function for a specific attack and set its
parameter(s).
ATTACK_F Specify the name of flooding attack(s) or portscan, e.g., synflood,
udpflood, icmpflood, or postscan.
THRESHOLD It means the packet rate (packet/second) that a flooding attack will
be detected. Set a value larger than 20.
TIMEOUT It means the time (seconds) that a flooding attack will be blocked.
Set a value larger than 5.
-a Enable the defense function for all attacks listed in ATTACK_0.
-e Enable defense function for a specific attack(s).
ATTACK_0 Specify a name of the following attacks: ip_option, tcp_flag, land,
teardrop, smurf, pingofdeath, traceroute, icmp_frag, syn_frag,
unknow_proto, fraggle.
-d Disable the defense function for a specific attack(s).
-P <add4> <ipv4_addr> / Add or remove the IPv4/IPv6 address in the white passing IP list.
<remove4><ipv4_addr/all> /
<add6><ipv6_addr> / add4/remove4: Add /remove an IPv4 address to/from the whitelist.
<remove6><ipv6_addr/all> / add6/remove6: Add/remove an IPv6 address to/from the whitelist.
<show> ipv4_addr: Enter the IPv4 address.
Ipv6_addr: Enter the IPv6 address.
all: It means all IPv4 or IPv6 addresses.
Show: Display the whitelist.
-B <add4> <ipv4_addr> / Add or remove the IPv4/IPv6 address in the black blocking IP list.
<remove4><ipv4_addr/all> / add4/remove4: Add /remove an IPv4 address to/from the blacklist.
<add6><ipv6_addr> / add6/remove6: Add/remove an IPv6 address to/from the blacklist.
<remove6><ipv6_addr/all> / ipv4_addr: Enter the IPv4 address.
Ipv6_addr: Enter the IPv6 address.
<show>
all: It means all IPv4 or IPv6 addresses.
Show: Display the blacklist.
Example
> dos -A
The DoS Denfense system is Activated
Syntax
internet -W n -M n [-<command> <parameter> | ... ]
Syntax Description
Example
>internet -M 1 -S tcom -u username -p password -a 0 -t -1 -i 0.0.0.0
WAN1 Internet Mode set to PPPoE/PPPoA
WAN1 ISP Name set to tcom
WAN1 Username set to username
Syntax
ip pubsubnet <enable/disable>
Syntax Description
Parameter Description
enable Enable the function.
disable Disable the function.
Example
> ip pubsubnet enable
public subnet enabled!
Syntax
ip pubaddr ?
ip pubaddr <public subnet IP address>
Syntax Description
Parameter Description
? Display an IP address which allows users set as the public subnet IP
address.
public subnet IP address Specify an IP address. The system will set the one that you specified
as the public subnet IP address.
Syntax
ip pubmask ?
ip pubmask <public subnet mask>
Syntax Description
Parameter Description
? Display an IP address which allows users set as the public subnet
mask.
public subnet IP address Specify a subnet mask. The system will set the one that you
specified as the public subnet mask.
Example
> ip pubmask ?
% ip pubmask <public subnet mask>
% Now: 255.255.255.0
Syntax
ip lanalias <idx><option>
Syntax Description
Parameter Description
<idx> It means the index number of the profile.
Idx: 1 to 5
<option> The available commands with parameters are listed below.
-e <0/1> It means to enable / disable the function of IP alias.
0: disable
1: enable
-a <IP address> It means to set auxiliary IP address.
-w n It means to add an address for the selected WAN interface (1 to 5).
N=0, none
Example
> ip lanalias 1 -a 192.168.1.56
> ip lanalias ?
Usage:
%% ip lanalias [idx] [Option]
idx :profile index from 1 to 5
Option:
-e 1 :1:enable, 0:disable
-a 192.168.1.2 :IP Address as alias
-w 1 :WAN number or 0(None)
-r :remove this profile
Syntax
ip addr <IP address>
Syntax Description
Parameter Description
IP address The LAN IP address.
Example
>ip addr 192.168.50.1
% Set IP address OK !!!
Info When the LAN IP address is changed, the start IP address of DHCP server are
still the same. To make the IP assignment of the DHCP server being
consistent with this new IP address (they should be in the same network
segment), the IP address of the PC must be fixed with the same LAN IP
address (network segment) set by this command for accessing into the web
user interface of the router. Later, modify the start addresses for the DHCP
server.
Syntax
ip nmask <IP netmask>
Syntax Description
Parameter Description
IP netmask The netmask of LAN IP.
Example
> ip nmask 255.255.0.0
% Set IP netmask OK !!!
Syntax
ip arp add <IP Address> <MAC Address> <LAN or WAN> <S>
ip arp del <IP Address> <LAN or WAN>
ip arp flush
ip arp status
ip arp accept <0/1/2/3/4/5/status>
ip arp setCacheLife <time>
In which, arp add allows users to add a new IP address into the ARP table; arp del allows users
to remove an IP address; arp flush allows users to clear arp cache; arp status allows users to
review current status for the arp table; arp accept allows to accept or reject the source
/destination MAC address; arp setCacheLife allows users to configure the duration in which
ARP caches can be stored on the system. If ip arp setCacheLife is set with “60”, it means you
have an ARP cache at 0 second. Sixty seconds later without any ARP messages received, the
system will think such ARP cache is expired. The system will issue a few ARP request to see if
this cache is still valid.
Syntax Description
Parameter Description
IP address It means the LAN IP address.
MAC address It means the MAC address of your router.
LAN or WAN It indicates the direction for the arp function.
0/1/2/3/4/5/status 0: disable to accept illegal source mac address
1: enable to accept illegal source mac address
2: disable to accept illegal dest mac address
3: enable to accept illegal dest mac address
4: Decline VRRP mac into arp table
5: Accept VRRP mac into arp table
status: display the setting status.
Time Available settings will be 10, 20, 30,....2550 seconds.
>
Syntax
ip dhcpc option
ip dhcpc option -h/l
ip dhcpc option -d <idx>
ip dhcpc option -e <1 or 0> -w <wan unmber> -c <option number> -v <option value>
ip dhcpc option -e <1 or 0> -w <wan unmber> -c <option number> -x <option value>
ip dhcpc option -e <1 or 0> -w <wan unmber> -c <option number> -a <option value>
ip dhcpc option -u <idx unmber>
ip dhcpc release <wan number>
ip dhcpc renew <wan number>
ip dhcpc status
Syntax Description
Parameter Description
option It is an optional setting for DHCP server.
-h: display usage
-l: list all custom set DHCP options
-a: set option value by address list (e.g., 192.168.1.20)
-c: set option number: 0~255
-d: delete custom dhcp client option by index number
-e: enable/disable option feature, 1:enable, 0:disable
-u: update by index number
-v: set option value by string
-w: set WAN number (e.g., 1=WAN1)
-x: set option value by raw byte (hex)
release It means to release current WAN IP address.
renew It means to renew the WAN IP address and obtain another new one.
status It displays current status of DHCP client.
Example
> ip dhcpc option -e 1 -w 1/2 -c 18 -v /path1
> ip dhcpc option -e 0 -w 2/6/7 -c 18 -x 2f70617468
% DHCP client option number and wan settings are duplicate!
=====================================
WAN2:
=====================================
WAN3:
=====================================
WAN4:
=====================================
WAN5:
=====================================
WAN6:
=====================================
WAN7:
=====================================
WAN8: <Virtual WAN>
...
...
=====================================
WAN52: <Virtual WAN>
Syntax
ip ping <IP address> <AUTO/WAN1/WAN2> <Source IP address>
Example
>ip ping 172.16.3.229 WAN1
Pinging 172.16.3.229 with 64 bytes of Data:
Receive reply from 172.16.3.229, time=0ms
Receive reply from 172.16.3.229, time=0ms
Receive reply from 172.16.3.229, time=0ms
Packets: Sent = 5, Received = 5, Lost = 0 <0% loss>
Syntax
ip tracert <Host/IP address>
<WAN1/WAN2/WAN3/WAN4/WAN5/WAN6/WAN7/WAN8/WAN9/WAN10/WAN11/WAN12>
<Udp/Icmp>
Syntax Description
Parameter Description
Host/IP address The target IP address.
WAN1 ~ WAN12 It means the WAN port that the above IP address passes through.
Udp/Icmp The UDP or ICMP.
Example
>ip tracert 22.128.2.62 WAN1
Traceroute to 22.128.2.62, 30 hops max
1 172.16.3.7 10ms
2 172.16.1.2 10ms
3 Request Time out.
4 168.95.90.66 50ms
5 211.22.38.134 50ms
6 220.128.2.62 50ms
Trace complete
Syntax
ip telnet <IP address><Port>
Syntax Description
Parameter Description
Example
> ip telnet 172.17.3.252 23
>
Syntax
ip rip <0/1/2>
Syntax Description
Parameter Description
0/1/2 0 means disable;
1 means LAN1 and 2 means IP Routed.
Example
> ip rip 1
%% Set RIP LAN1.
Syntax
ip wanrip <ifno> -e <0/1>
Syntax Description
Parameter Description
ifno It means the connection interface.
1: WAN1,2: WAN2, 3: PVC3,4: PVC4,5: PVC5
Note: PVC3 ~PVC5 are virtual WANs.
-e <0/1> It means to disable or enable RIP setting for specified WAN
interface.
1: Enable the function of setting RIP of WAN IP.
0: Disable the function.
Example
> ip wanrip ?
Valid ex:ip wanrip <ifno> -e <0/1>
<ifno> 1: WAN1,2: WAN2
3: PVC3,4: PVC4,5: PVC5
-e <0/1> 0: disable, 1: enable
Syntax
ip route add <dst> <netmask> <gateway> <ifno> <rtype>
ip route del <dst> <netmask> <rtype>
ip route status
ip route cnc
ip route tel
ip route default <off/?>
ip route clean <1/0>
Syntax Description
Parameter Description
add <dst> <netmask> It means to add an IP address as static route.
<gateway> <ifno> <dst> : It means the IP address of the destination.
<rtype>
<netmask>: It means the netmask of the specified IP address.
<gateway>: It means the gateway of the connected router.
<ifno>: It means the connection interface.
3=WAN1; 4=WAN2; 5=WAN3; 6=WAN4 ;7=WAN5; 8=WAN6;
9=WAN7;10=WAN8; 11=WAN9; 12=WAN10
<rtype>: It means the type of the route.
default : default route; static: static route.
del <dst> <netmask> It means to delete specified IP address.
<rtype> <dst> : It means the IP address of the destination.
<netmask>: It means the netmask of the specified IP address.
Example
> ip route add 172.16.2.0 255.255.255.0 172.16.2.4 3 static
> ip route status
Codes: C - connected, S - static, R - RIP, * - default, ~ - private,
B - BGP
C~ 192.168.1.0/ 255.255.255.0 is directly connected, LAN1
S 172.16.2.0/ 255.255.255.0 via 172.16.2.4, WAN1
>
Syntax
ip igmp_proxy set
ip igmp_proxy reset
ip igmp_proxy wan
ip igmp_proxy query <value>
ip igmp_proxy ppp <0/1>
ip igmp_proxy status
ip igmp_proxy version <v2, v3, auto, show>
ip igmp_proxy syslog <0/1>
Syntax Description
Parameter Description
set It means to enable proxy server.
reset It means to disable proxy server.
wan It means to specify the WAN interface for IGMP service.
query <value> It means to set IGMP general query interval.
value: Enter a number. The default value is 125000 ms.
ppp <0/1> 0 : No need to set IGMP with PPP header.
1 : Set IGMP with PPP header.
status It means to display the current status of the proxy server.
version <v2, v3, auto, show> It means to specify the IGMP version.
v2, v3, auto, show
syslog <0/1> Make IGMP log be recorded on the Syslog.
0: disable
1: enable
Example
> ip igmp_proxy set
% ip igmp_proxy [set|reset|wan|status], IGMP Proxy is ON
> ip igmp_proxy status
%% ip igmp_proxy [set|reset|wan|status], IGMP Proxy is ON
%%% igmp_proxy WAN:
224.0.0.251 state=1
224.0.0.252 state=1
224.0.0.251 timer=0
224.0.0.252 timer=0
> ip igmp_proxy query 130000
This command is for setting IGMP General Query Interval
The default value is 125000 ms
Current Setting is:130000 ms
>
Syntax
ip igmp_snoop enable
ip igmp_snoop disable
ip igmp_snoop status
ip igmp_snoop table
ip igmp_snoop txquery <on/off><v2/v3>
ip igmp_snoop mode <hw/sw>
ip igmp_snoop chkleave <on/off>
ip igmp_snoop separate <on/off>
ip igmp_snoop portchk <on/off>
Syntax Description
Parameter Description
enable It means to enable proxy server.
disable It means to disable proxy server.
status It means to display the current status for the proxy server.
table Display the whole table of IGMP Snoop configuration.
txquery <on/off><v2/v3> It means to send out IGMP QUERY to LAN periodically.
On: enable
Off: disable
v2: version v2
v3: version v3
mode <hw/sw> Make IGMP snooping work on software or hardware.
chkleave <on/off> It means to check the leave status.
On: enable the IGMP snoop leave checking function.
Off: it will drop LEAVE if still clients on the same group.
separate <on/off> It means to set IGMP packets being separated by NAT/Bridge.
On: The packets will be separated.
Off: The packets will not be separated by NAT/Bridge.
portchk <on/off> On- The portchk is enabled.
Example
> ip igmp_snoop mode sw
igmp snooping works on SW mode now.
Syntax
Syntax Description
Parameter Description
on Turn on session limit for each IP.
off Turn off session limit for each IP.
default<num> Set the default number of session num limit.
defautlp2p <num> Set the default number of session num limit for p2p.
status Display the current settings.
show Display all session limit settings in the IP range.
timer <num> Set when the IP session block works.
The unit is second.
<block/unblock><IP> Block/unblock the specified IP address.
Block: The IP cannot access Internet through the router.
Unblock: The specified IP can access Internet through the router.
<add/del><IP1-IP2> <num> add/del: Add or delete the session limits in an IP range.
<p2pnum> IP1-IP2 - It means the range of IP address specified for this
command.
num - It means the number of the session limits, e.g., 100.
p2pnum - It means the number of the session limits, e.g., 50 for P2P.
Example
> ip session default 100
> ip session add 192.168.1.5-192.168.1.100 100 50
> ip session on
> ip session status
IP range:
192.168.1.5 - 192.168.1.100 : 100
Syntax Description
Parameter Description
on It means to turn on the IP bandwidth limit.
off It means to turn off the IP bandwidth limit.
default <tx_rate><rx_rate> It means to set default tx and rx rate of bandwidth limit. The
range is from 0 – 65535 Kpbs.
status It means to display the current settings.
show It means to display all the bandwidth limits settings within the IP
range.
routing <on/off> on/off: Apply (on) or not apply (off) to the IP Routed Subnet.
schedule <s1> <s2> <s3> <s4> Set the schedule profile.
<s1> <s2> <s3> <s4>: Specify the profile index number. Up to four
profiles can be set at one time. Available profiles numbers range
from 1 to 16.
<add/del> <IP1-IP2> <tx> <rx> Add/del: Add or delete the bandwidth within the IP range.
<shared> IP1-IP2: Set the range of IP address specified for this command.
tx: Set transmission rate for bandwidth limit.
rx: set receiving rate for bandwidth limit.
shared: the bandwidth will be shared for the IP range.
Example
> ip bandwidth default 200 800
> ip bandwidth add 192.168.1.50-192.168.1.100 10 60
> ip bandwidth status
IP range:
192.168.1.50 - 192.168.1.100 : Tx:10K Rx:60K
Syntax Description
Parameter Description
on It means to turn on IP bandmac policy. Even the IP is not in the
policy table, it can still access into the network.
off It means to turn off all the bindmac policies.
strict_on It means that only those IP addresses in IP bindmac policy table can
access into the network.
strict_off It means to turn off IP bindmac policy.
add <IP> <MAC> <Comment> It means to add one ip bindmac.
<IP>: Enter the IP address for binding with specified MAC address.
<MAC>: Enter the MAC address for binding with the IP address
specified.
<Comment>: Enter words as a brief description.
del <IP/all> It means to delete one IP bindmac.
<IP>: Enter the IP address for binding with the specified MAC
address.
<all>: It means to delete all the IP bindmac settings.
subnet <all/set It means to set the LAN subnet(s) for applying the rules of Bind IP to
LAN_Index/unset MAC
LAN_Index/clear/show> all: Make all LAN subnets apply for the rules.
set <LAN_Index>: Specify certain LAN subnet, e.g., set LAN2.
unset <LAN_Index>: Remove certain LAN subnet by specifying the
index number of LAN port, e.g., unset LAN3.
clear: Remove all LAN subnets.
show: Display current LAN subnet settings.
show It means to display the IP address and MAC address of the pair of
bound ones.
Example
> ip bindmac add 192.168.1.46 00:50:7f:22:33:55 just for test
> ip bindmac show
ip bind mac function is turned OFF
ip bind mac function is STRICT OFF
Show all IP Bind MAC entries.
Syntax
ip bgp mode <0/1>
ip bgp as <0~4294967295>
ip bgp hold <10~65535>
ip bgp retry <3~255 >
ip bgp id <1~100>
ip bgp show
ip bgp neighbor <idx> mode <0/1>
ip bgp neighbor <idx> name <max len>
ip bgp neighbor <idx> ip <x.x.x.x>
ip bgp neighbor <idx> as <1~4294967295>
ip bgp neighbor <idx> weight <0~7>
ip bgp neighbor <idx> prepend <0~7>
ip bgp neighbor <idx> md5 <0/1>
ip bgp neighbor <idx> key <max len>
ip bgp neighbor <idx> show
ip bgp neighbor show all
ip bgp static <sidx> <ip> <netmask>
ip bgp static <sidx> delete
ip bgp static show
Syntax Description
Parameter Description
mode <0/1> Enable or disable the GMP.
0: disable
1: enable
as <0~4294967295> Set the AS number for local router.
<0~4294967295>
hold <10~65535> Set the time interval (in seconds) to determine the peer is dead
when the router is unable to receive any keepalive message from
the peer within the time.
<10~65535>: Default is 180 sec.
retry <3~255> Set the BGP conntion retry time.
<3~255>: Default is 120 sec
id <1~100> Select a number representing an enabled local subnet IP as router
ID.
Example
> ip bgp static 1 192.168.2.56 255.255.255.0
Set static network index: 1
IP addr: 192.168.2.56
Net mask: 255.255.255.0
> ip bgp static show
Syntax
ip ospf en
ip ospf dis
ip ospf status
ip ospf cfg show
ip ospf cfg set <idx> state <dis/en>
ip ospf cfg set <idx> area <value>
ip ospf cfg set <idx> lan <value>
ip ospf cfg set <idx> wan <value>
ip ospf nbr
Syntax Description
Parameter Description
en Enable the function of Open Short Path First.
dis Disable the function of Open Short Path First.
status Display interface status.
cfg show Display configuiration setting for all interfaces.
cfg set <idx> state <dis/en> Enable or disable the interface (LAN/WAN) setting.
<idx>: 1 to 64.
<dis/en>: disable or enable.
cfg set <idx> area <value> Set interface for area id:
<idx>: 1 to 64.
Example
> ip ospf cfg set 1 state en
> ip ospf cfg set 1 area 100
> ip ospf cfg set 1 wan 1
> ip ospf cfg show
OSPF: Enable
---------------------------------------------------
Idx State Area_id Interface Auth Key ID
0 En 100 WAN_1 Dis 0
1 Dis 0 LAN_1 Dis 0
2 Dis 0 LAN_1 Dis 0
...
...
>
Syntax
ip maxnatuser <user no>
Syntax Description
Parameter Description
<user no> A number specified here means the total NAT users that Vigor router
supports.
0 – It means no limitation.
Example
> ip maxnatuser 100
% Max NAT user = 100
Syntax
ip policy_rt [-<command> <parameter> | ... ]
Syntax Description
Example
> ip policy_rt diagnose -s 192.168.1.100 -d any -p any -t ICMP
-------------------------------------------------
Matched Route (Priority)
-------------------------------------------------
* No_Match
-------------------------------------------------
Matched Policy (Priority)
-------------------------------------------------
* Policy_1 (200)
Syntax
ip lanDNSRes [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-a <IP Address> It is used to configure IP address mapping (IPv4/IPv6 Address or
multiple subnet addresses).
IP Address: type the IP address (e.g., 192.168.1.56).
-c <CNAME> It is used to set CNAME.
CNAME: Enter a string.
-d <address mapping index It means to delete index number with address mapping configured.
number> address mapping index number : type the index number which
represents the address mapping profile.
-e <0/1> It means to enable or disable the function of LAN DNS or DNS
Forwarding Profile.
0: disable
1: enable
-i <profile setting index It means creating a LAN DNS profile with the specified domain
number> name.
profile setting index number: type the index number which
represents the profile with the domain name configured.
-l List the content of LAN DNS profile (including domain name, IP
address and message).
-n <domain name> Set domain name.
-p <profile name> Set profile name for LAN DNS.
-r Reset the settings for selected profile.
-R Set to factory default settings.
-s <0/1> It means to determine all subnet packets or only the packets with
the same subnet will be replied to for the address mapping profile.
0: reply to all subnet packets.
1: reply only same subnet packet.
-z Update LAN DNS config to DNS Cache.
Example
> ip lanDNSRes -i 1 -p test
% Configure Set1's Profile:test
> ip lanDNSRes -i 1 -l
% Idx: 1
% State: Disable
% Profile: test
% Domain Name:
% -------- Address Mapping Table --------
% Not Set Address Mapping.
Syntax
ip dnsforward [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command><parameter>|… The available commands with parameters are listed below.
] […] means that you can type in several commands in one line.
-a <IP Address/Domain Set forwarded DNS server IP Address or domain name.
Nmae> <IP Address/Domain Name>: Enter an IP address or the domain
name.
-d <DNS server mapping Delete the selected LAN DNS profile.
index number> <DNS server mapping index number>: Enter the index number.
-e <0/1> 0: disable such function.
1: enable such function.
-i <profile setting index Type the index number of the profile.
number> <profile setting index number>: Enter the index number.
-l List the content of the LAN DNS profile (including domain name, IP
address, and message).
-n <domain name> Set domain name.
-p <profile name> Set profile name for LAN DNS.
-r Reset the settings for the selected profile.
-R Set to factory default settings.
Example
> ip dnsforward -i 1 -n ftp.drayTek.com
% Configure Set1's DomainName:ftp.drayTek.com
> ip dnsforward -i 1 -a 172.16.1.1
% Configure Set1's IP:172.16.1.1
> ip dnsforward -i 1 -l
% Idx: 1
% State: Disable
% Profile: test
% Domain Name: ftp.drayTek.com
% DNS Server IP: 172.16.1.1
>
Syntax
ip spoofdef <WAN/LAN><0/1>
Example
> ip spoofdef WAN 0
% Setting saved:
> ip spoofdef LAN 1
Setting saved:
> ip spoof def ?
Invalid Paremeter
IP Spoofing Defense Usage:
Set IP Spoofing Defense: spoofdef <WAN/LAN> <0/1>
Ex: "spoofdef WAN 1" to block IP packet from WAN with inconsistent source
IP add
ress
Current setting:
Block IP packet from WAN with inconsistent source IP address : Disable
Block IP packet from LAN with inconsistent source IP address : Enable
Syntax
ip6 addr -s <prefix> <prefix-length> <LAN1/..LAN100/ WAN1/..WAN10/
USB1/USB2/VPN1/..VPN32>
ip6 addr -d <prefix> <prefix-length> <LAN1/..LAN100/ WAN1/..WAN10/
USB1/USB2/VPN1/..VPN32>
ip6 addr -a <LAN1/..LAN100/ WAN1/..WAN10/USB1/USB2/VPN1/..VPN32> -u
ip6 addr -v <LAN1/..LAN100/ WAN1/..WAN10/USB1/USB2>
ip6 addr -t <old-prefix><old-prefix-length><new-prefix> <new-prefix-length>
<LAN1/..LAN100/ WAN1/..WAN10/USB1/USB2>
ip6 addr -o <1/2>
ip6 addr -o 3 <prefix> <prefix-length> <WAN1/..WAN10/USB1/USB2>
ip6 addr -l <prefix> <prefix-length> <LAN1/..LAN100>
ip6 addr <-p/-b> <prefix> <prefix-length> <WAN1/..WAN10/USB1/USB2>
ip6 addr -x <LAN1/..LAN100 >
ip6 addr -c <LAN1/..LAN100>
ip6 addr -e <type> < LAN1/..LAN100>
Syntax Description
Parameter Description
Example
> ip6 addr -a
DMZ
Unicast Address:
FE80::21D:AAFF:FE4B:3E80/64 (Link)
Multicast Address:
FF02::1:FF00:0
FF02::1:FF4B:3E80
FF02::1
LAN100
Unicast Address:
FE80::21D:AAFF:FE4B:3E80/64 (Link)
Multicast Address:
FF02::1:FF00:0
FF02::1:FF4B:3E80
FF02::1
LAN99
Unicast Address:
FE80::21D:AAFF:FE4B:3E80/64 (Link)
Multicast Address:
FF02::1:FF00:0
FF02::1:FF4B:3E80
FF02::1
LAN98
Unicast Address:
FE80::21D:AAFF:FE4B:3E80/64 (Link)
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page] ---
Syntax
ip6 dhcp req_opt <LAN1|...|LAN100|WAN1|...|WAN10|USB1|USB2> [-<command>
<parameter>| ... ]
Example
> ip6 dhcp req_opt WAN2 -S 1
> ip6 dhcp req_opt WAN2 -r 1
> ip6 dhcp req_opt WAN2 -a
% Interface WAN2 is set to request following DHCPv6 options:
% sip name
% dns
% refresh time
>
Syntax
ip6 dhcp client <WAN1/.../WAN10/USB1/USB2> [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
client It means the dhcp client settings.
[<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-a It means to show current DHCPv6 status.
-r It means to send RELEASE MESSAGE.
-p <IAID> It means to request an identity association ID for Prefix
Delegation.
-n <IAID> It means to request an identity association ID for a Non-temporary
Address.
-t <time> It means to set solicit interval.
<time>: 0 ~ 7 seconds (default value is 0).
-c <parameter> It means to send rapid commit to server.
1: Enable
0: Disable
-i <parameter> It means to send information request to server.
1: Enable
0: Disable
-e <parameter> It means to enable or disable the DHCPv6 client.
1: Enable
0: Disable
-m <parameter> It means to enable/disable server DUID set by Link layer and time.
1: Enable
0: Disable
-d It means to display the client DUID.
-A <parameter> It means to set authentication protocol.
0: Undefine
2: delayed protocol
-R <parameter> It means to set realm value (max: 31 characters) in the delayed
protocol.
<parameter>: Enter a string.
-S <parameter> It means to set shared secret (max: 31 characters) in the delayed
protocol.
<parameter>: Enter a string.
-K <parameter> It means to set key ID (1~65535) in the delayed protocol.
<parameter>: Enter a number.
Example
> ip6 dhcp client WAN2 -p 2008::1
This setting will take effect after rebooting.
Syntax
ip6 dhcp server [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
server It means the dhcp server settings.
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can Enter several commands in one line.
-a It means to show the current DHCPv6 status.
-b It means to show the current DHCPv6 IP assignment table.
-n <name> It means to set a pool name.
-c <parameter> It means to send rapid commit to server.
1: Enable
0: Disable
-e <parameter> It means to enable or disable the DHCPv6 server.
1: Enable
0: Disable
-t <time> It means to set prefer lifetime.
Example
> ip6 dhcp server LAN1 pdadd 11:22:33 64 fe80::e202:1bff:fe65:4084
000100011d2ce39a00e06f25c839
% Add to PD list success!
%% PD status : invalid, no prefix available.
>
Syntax
ip6 internet -W n -M n [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
-W n W means to set WAN interface and n means different selections.
Default is WAN1.
n=1: WAN1
n=2: WAN2
n=3: WAN3
.
.
n=X: WANx
-M n M means to set Internet Access Mode (Mandatory) and n means
different modes (represented by 0 – 5)
n= 0: Offline,
n=1: PPP,
n=2: TSPC,
n=3: AICCU,
n=4: DHCPv6,
n=5: Static
n=6: 6in4-Static
n=7: 6rd
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-m n It means to set IPv6 MTU.
N = any value (0 means “unspecified”).
6rd
-C <n> It means to set 6rd connection mode.
n=0: Auto
n=1: Static
-s <server> It means to set 6rd IPv4 Border Relay.
<server>: Enter a string.
-m <n> It means to set 6rd IPv4 address mask length.
<n>: Enter a number.
-p <prefix> It means to set IPv6 prefix for 6rd connection.
<prefix>: Enter a prefix number of IPv6 address.
-l <n> It means to set the prefix length for 6rd connection.
<n>: It means to enter a fixed value as the length of the prefix.
6in4
-s <server> It means to set 6in4 remote endpoint IPv4 address.
-I <IPv6 Addr> It means to set the IPv6 address for 6in4 connection.
-P <n> It means to set IPv6 WAN prefix length for 6in4 connection.
-p <prefix> It means to set 6in4 LAN Routed Prefix.
-l <n> It means to set 6in4 LAN Routed Prefix length.
-T <n> It means to set 6in4 Tunnel TTL.
TSPC/AICCU
-u <username> It means to set username (max. 63 characters).
Example
> ip6 internet -W 1 -M 2 -u userid -p passwd -s broker.freenet6.net
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router..
> system reboot
Syntax Description
Parameter Description
-s <inet6_addr> <eth_addr> It means to add a neighbour.
<LAN1/..LAN100/WAN1/...W <inet6_addr>: Enter an IPv6 address.
AN10/ USB1/USB2>
<eth_addr>: Enter a submask address.
<LAN1/..LAN100/WAN1/...WAN10/ USB1/USB2>: Specify an
interface for the neighbor.
-d <inet6_addr> It means to delete a neighbour.
<LAN1/..LAN100/WAN1/...W <inet6_addr>: Enter an IPv6 address.
AN10/ USB1/USB2>
<LAN1/..LAN100/WAN1/...WAN10/ USB1/USB2>: Specify an
interface for the neighbor.
-a <inet6_addr> It means to show neighbour status.
<LAN1/..LAN100/WAN1/...W <inet6_addr>: Enter an IPv6 address.
AN10/ USB1/USB2>
<LAN1/..LAN100/WAN1/...WAN10/ USB1/USB2>: Specify an
interface for the neighbor.
Example
> ip6 neigh -s 2001:2222:3333::1111 00:50:7F:11:ac:22:WAN2
% Neighbour 2001:2222:3333::1111 successfully added!
> ip6 neigh -a
I/F ADDR MAC STATE
--------------------------------------------------------------------------
LAN1 2001:2222:3333::1111 FAILED
LAN1 FE80::25FB:7F12:1C77:FA51 14-49-bc-0a-8a-b8 STALE
LAN1 :: NONE
LAN1 FE80::21D:AAFF:FE73:4A78 00-1d-aa-73-4a-78 STALE
LAN1 FF02::1 33-33-00-00-00-01 CONNECTED
>
Syntax
ip6 pneigh -s <inet6_addr> <LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2>
ip6 pneigh -d <inet6_addr> <LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2>
ip6 pneigh -a <inet6_addr><-N LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2>
Syntax Description
Parameter Description
Example
> ip6 neigh -s FE80::250:7FFF:FE12:300 LAN1
% Neighbour FE80::250:7FFF:FE12:300 successfully added!
Syntax
ip6 route -s <prefix> <prefix-length> <gateway> <
LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2|VPN1|...|VPN32> <-D>
ip6 route -d <prefix> <prefix-length>
ip6 route -a <LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2|VPN1|...|VPN32>
ip6 route -D
ip6 route -l
Syntax Description
Parameter Description
-s <prefix> <prefix-length> It means to add a route.
<gateway> < <prefix>: It means to enter the prefix number of IPv6 address.
LAN1|LAN2|...|LAN100|WAN1 <prefix length>: It means to enter a fixed value as the length of
|...|WAN10|USB1|USB2|VPN1 the prefix.
|...|VPN32> <-D> <gateway>: It means to enter the gateway of the router.
<LAN1|...|LAN100|WAN1|...|WAN10|USB1|USB2|VPN1|...|VPN3
2>: It means to specify LAN or WAN or VPN interface for such
address.
<-D>: It means that such route will be treated as the default
route.
-d <prefix> <prefix-length> It means to delete a route.
<prefix>: It means to enter the prefix number of IPv6 address.
<prefix length>: It means to enter a fixed value as the length of
the prefix.
-a < It means to show the route status.
LAN1|LAN2|...|LAN100|WAN1 <LAN1|...|LAN100|WAN1|...|WAN10|USB1|USB2|VPN1|...|VPN3
|...|WAN10|USB1|USB2|VPN1 2>: It means to specify LAN or WAN or VPN interface for such
|...|VPN32> address.
-l It means to clear the routing table.
Example
Syntax
ip6 ping <IPV6 address/Host> <LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2> <send
count> <data_size>
Syntax Description
Parameter Description
<IPV6 address/Host> It means to specify the IPv6 address or host for ping.
<LAN1|LAN2|...|LAN100|W It means to specify LAN or WAN interface for such address.
AN1|...|WAN10|USB1|USB2 <send count>: Set how many packets sent for pinging.
> <send count> <data_size>
<data_size>: 1 to 1452. Set the data size for each packet to be
pinged.
Example
> ip6 ping 2001:4860:4860::8888 WAN2
Syntax
ip6 tracert <IPV6 address/Host> <LAN1|LAN2|...|LAN100|WAN1|...|WAN10|USB1|USB2>
Syntax Description
Parameter Description
<IPV6 address/Host> It means to specify the IPv6 address or host for ping.
Example
> ip6 tracert 2001:4860:4860::8888 LAN1
traceroute to 2001:4860:4860::8888, 30 hops max through protocol ICMP
1 2001:5C0:1400:B::10B8 340 ms
Syntax
ip6 tspc <ifno>
Syntax Description
Parameter Description
ifno It means the connection interface.
Ifno=1 (means WAN1)
Info=2 (means WAN2)
Example
> ip6 tspc 2
Local Endpoint v4 Address : 111.243.177.223
Local Endpoint v6 Address : 2001:05c0:1400:000b:0000:0000:0000:10b9
Router DNS name : 8886666.broker.freenet6.net
Remote Endpoint v4 Address :81.171.72.11
Remote Endpoint v6 Address : 2001:05c0:1400:000b:0000:0000:0000:10b8
Tspc Prefixlen : 56
Tunnel Broker: Amsterdam.freenet.net
Status: Connected
>
Syntax
Ip6 radvd <LAN1|LAN2|...|LAN100> [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
<<command> The available commands with parameters are listed below.
<parameter>/…> <…> means that you can Enter several commands in one line.
-s <0/1> It means to enable or disable the default lifetime of the
Example
> ip6 radvd LAN1 -s 1
% [LAN1] setting !
% Enable LAN1 radvd OK!
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.> ip6 radvd -V
> ip6 radvd LAN1 -d 1800
% [LAN1] setting !
% Set default lifetime ok: 1800 !
> ip6 radvd LAN1 -V
% [LAN1] setting !
% Default Lifetime : 0 seconds
% min interval time : 200 seconds
% MAX interval time : 600 seconds
% Hop limit : 64
% MTU : 0
% Reachable time : 0
% Retransmit time : 0
% Preference : Medium
>
Syntax
ip6 mngt list
ip6 mngt list [add <Index> <IPv6 Object Index> |remove <Index>|flush]
ip6 mngt status
ip6 mngt <internet|http|telnet|ping|https|ssh|enforce_https> <on|off>
Syntax Description
Parameter Description
list It means to show the setting information of the access list.
add <Index> <IPv6 Object It means to add an IPv6 address which can be used to execute
Index> |remove management through Internet.
<Index>|flush <Index >: 1 to 10. Ten profiles can be set for IPv6 access list.
<IPv6 Object Index>: It means the index number of IP object (1 to
64) .
remove <Index>: It means to remove (delete) the specified IP
object.
flush It means to clear the IPv6 access table.
status It means to show the status of IPv6 remote management.
internet/ These protocols are used for accessing Internet.
http/telnet/ping/https/ssh
/enforce_https
on/off It means to enable (on) or disable (off) the Internet accessing
through http/telnet/ping.
Example
> ip6 mngt list add 1 1
%% Set OK. Please do "sys re" to reboot the router!
> ip6 mngt status
% IPv6 Remote Management :
internet access : off, telnet : off, http : off, https : off, ssh :
off, ping : off, enforce_https : off
>
Syntax
ip6 online <WAN1/.../WAN10/USB1/USB2>
Syntax Description
Parameter Description
<WAN1/.../WAN10/USB1/US It means the connection interface.
B2>
Example
> ip6 online WAN1
% WAN1 online status :
Syntax
ip6 aiccu -i <ifno> -r
ip6 aiccu -i <ifno> -s
Syntax Description
Parameter Description
<Ifno> It means the connection interface.
1=WAN1
2=WAN2
-r It means to remove (delete) the specified index number with IPv6
settings.
-s It means to display the AICCU status.
Example
> ip6 aiccu -i 1 -s
ip6 aiccu -i 1 -s
>
Syntax
ip6 ntp –h
ip6 ntp –v
ip6 ntp –p <0/1>
Syntax Description
Parameter Description
–h It is used to display the usage of such command.
-v It is used to show the NTP state.
-p <0/1> It is used to specify NTP server for IPv6.
0 – Auto
1 – First Query IPv6 NTP Server.
Syntax
ip6 lan -l n <-<l:w:d:D:m:o:s> <parameter> / ... >
Syntax Description
Parameter Description
–h It is used to display the usage of such command.
-l <n> It means to selete LAN interface to be set.
n= 1: LAN1
n= 2: LAN2, ... x: LANx. Default is LAN1
-w <n> It means to selete WAN interface to be primary interface.
n= 0: None,
n=1: WAN1 ,
n=2: WAN2, ... x: WANx.
-d <server> It means to set 1st DNS Server IP.
<server>: Enter the IPv6 Address.
-D <server> It means to set 2nd DNS Server IP.
<server>: Enter the IPv6 Address.
-m <n> It means to set ipv6 LAN management.
n=0:OFF
n=1:SLAAC. Default is SLAAC
n=2:DHCPv6
-o <n> It means to enable Other option(O-bit) flag. (O-bit is redundant
when management is DHCPv6)
n=0: Disable
n=1: Enable.
-e <n> It means to add an extension WAN.
n: 1: WAN1, 2: WAN2, ... x: WANx.
-E <n> It means to delete an extension WAN.
n: 1: WAN1 ,2: WAN2, ... x: WANx.
-b <map> It means to set bit map(decimal) for extension WAN.
<map>: 0: WAN1; 1: WAN2, ... n: WAN(n+1).
-f <n> It means to disable IPv6.
n=1: Disable IPv6,
n=0: Enable IPv6.
-R <n> It means to enable /disable RIPng.
n=1: Enable RIPng,
n=0: Disable RIPng.
-s <n> It means to show IPv6 LAN setting.
n=0:show all. Default is show all.
n=1 to 8: LAN1 to LAN8.
n=17: DMZ.
Example
> ip6 lan -l 2 -w 1 -d 2001:4860:4860::8888 -o 1 -f 0 -s 2
% Set LAN2!
% [LAN2] setting:
% Primary WAN : WAN1
% Management : SLAAC
% Other Option : Enable
% WAN Exten : None
% Subnet ID : 2
% Static IP(0) : ::/0
% [ifno: 0, enable: 0]
% Static IP(1) : ::/0
% [ifno: 0, enable: 0]
% Static IP(2) : ::/0
% [ifno: 0, enable: 0]
% Static IP(3) : ::/0
% [ifno: 0, enable: 0]
% DNS1 : 2001:4860:4860::8888
% DNS2 : 2001:4860:4860::8844
% ULA Type : OFF
% RIPng : Enable
>
Syntax
ip6 session on
ip6 session off
ip6 session default <num>
ip6 session status
ip6 session show
ip6 session add <IP1-IP2><num>
ip6 session del <IP1-IP2><num>
Syntax Description
Parameter Description
default <num> It means to set the default number of session num limit.
<num>: Enter a number.
status It means to display the current settings.
add <IP1-IP2><num> <add/del>: It means to add the session limit for an IPv6 range.
<IP1-IP2> : Specify a range for IPv6 addresses.
<num>: Enter a number.
del <IP1-IP2><num> <add/del>: It means to add the session limit for an IPv6 range.
Example
> ip6 session on
> ip6 session add 2100:ABCD::2-2100:ABCD::10 100
> ip6 session status
IPv6 range:
2100:ABCD::2 - 2100:ABCD::10 : 100
Syntax
ip6 bandwidth on
ip6 bandwidth off
ip6 bandwidth default <tx_rate> <rx_rate>
ip6 bandwidth status
ip6 bandwidth show
ip6 bandwidth add <IP1-IP2> <tx><rx><shared>
ip6 bandwidth del <IP1-IP2> <tx><rx><shared>
Syntax Description
Parameter Description
IPv6 range:
2001:ABCD::2 - 2001:ABCD::10 : Tx:512K Rx:5M shared
Syntax
ipf view [-VcdhrtzZ]
Syntax Description
Parameter Description
-V It means to show the version of this IP filter.
-c It means to show the running call filter rules.
-d It means to show the running data filter rules.
-h It means to show the hit-number of the filter rules.
-r It means to show the running call and data filter rules.
-t It means to display all the information at one time.
-z It means to clear a filter rule’s statistics.
-Z It means to clear IP filter’s gross statistics.
Example
> ipf view -V -c -d
ipf: IP Filter: v3.3.1 (1824)
Kernel: IP Filter: v3.3.1
Running: yes
Log Flags: 0x80947278 = nonip
Default: pass all, Logging: available
Syntax
ipf set <Options>
ipf set <SET_NO><Options>
ipf set <SET_NO> rule <RULE_NO><Options>
Example
> ipf set 1 -m sansansan
> ipf set -c 3 -p 0 1
Setting saved.
> ipf set -R "v4 1"
Setting saved.
> ipf set -R "v6 1"
------------------------------------------------------------------
CodePage : ANSI(1252)-Latin I
Window size : 65535
Session timeout : 60
DrayTek Banner : Enable
------------------------------------------------------------------
Accept large incoming fragmented UDP or ICMP packets: Enable
Transparent Mode : Disable
------------------------------------------------------------------
Block routing packet from WAN:
[v] IPv4
[v] IPv6
------------------------------------------------------------------
[v] Enable Strict Security Firewall
>
Syntax
ipf rule s r [-<command> <parameter> | ...
ipf rule s r -v
Syntax Description
Parameter Description
s It means the Filter Set.
Example
> ipf rule 3 1 -e 1 -M testtest -s "u 1 192.168.1.20" -F "0 1
Status : Enable
Comments: testtest
Index(1-15) in Schedule Setup: <null>, <null>, <null>, <null>
Dst Interface : WAN1, WAN2, WAN3, WAN4, WAN5, WAN6, WAN7, WAN8, WAN9,
WAN10, WAN11, WAN12, WAN13, WAN14, WAN15, WAN16, WAN17, WAN18, WAN19,
WAN20, WAN21, WAN22, WAN23, WAN24, WAN25, WAN26, WAN27, WAN28, WAN29,
WAN30, WAN31, WAN32, WAN33, WAN34, WAN35, WAN36, WAN37, WAN38, WAN39,
WAN40, WAN41, WAN42, WAN43, WAN44, WAN45, WAN46, WAN47, WAN48, WAN49,
WAN50, WAN51, WAN52
Source IP : 192.168.1.20
Destination IP : Any
Service Type : Any
Fragments : Don't Care
-----------------------------------------------------------------
Syntax
ipf flowtrack set <-r/-e>
ipf flowtrack view <-f/-b>
ipf flowtrack set -i<IP address> -p<value>-t<value>
Syntax Description
Parameter Description
-r It means to refresh the flowtrack.
-e It means to enable or disable the flowtrack.
-f It means to show the sessions state of flowtrack. If you do not
specify any IP address, then all the session state of flowtrack will be
displayed.
-b It means to show all of IP sessions state.
- i <IP address> It means to specify IP address (e.g,, -i 192.168.2.55).
Example
> ipf flowtrack set -e
Current flowtrack ON
> ipf flowtrack set -i 192.168.1.102 -p 1024 -t tcp
> ipf flowtrack view -f
Start to show the flowtrack sessions state:
Syntax
log [-cfhiptwx?] [-F a| c | f | w]
Syntax Description
Parameter Description
-c It means to show the latest call log.
-f It means to show the IP filter log.
-F It means to show the flush log buffer.
a: flush all logs
c: flush the call log
f: flush the IP filter log
w: flush the WAN log
-h It means to show this usage help.
-p It means to show PPP/MP log.
-t It means to show all logs saved in the log buffer.
-w It means to show WAN log.
-x It means to show packet body hex dump.
Example
> log -w
25:36:25.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
25:36:33.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
25:36:41.580 ---->DHCP (WAN-5) Len = 548XID = 0x7880fdd4
Client IP = 0.0.0.0
Your IP = 0.0.0.0
Next server IP = 0.0.0.0
Relay agent IP = 0.0.0.0
Syntax
ldap user <INDEX><OPTION>
Syntax Description
Parameter Description
INDEX Specify the index number (1 to 8) of the LDAP profile.
OPTION
-n VALUE Setup Profile Name.
-b VALUE Setup Base Distinguished Name.
-a VALUE If you have added containers to be published, you may need to
specify additional LDAP filters for each class of objects included in
these containers.
Creating LDAP filters is a fairly complex task that should be
performed by advanced users only. LDAP filters must be
RFC2254-compliant.
For example, to exclude from publication all users who either
belong to the HR department of your company or are members of
the HR Group. For example:
>ldap user 1 -a
"(!(|(department=HR)(memberOf=CN=HRGroup,OU=Groups,
DC=acme,DC=com)))"
Additional Filter has been updated.
-g VALUE Setup Group Distinguished Name.
-c VALUE Setup Common Name Identifier.
-v View detail information of the LDAP profile.
Example
>ldap user 1 -n LD_user_test1
Profile Name has been updated!
> ldap user 1 -v
Profile Index:1
Profile Name:LD_user_test1
Common Name Identifier:
Base Distinguished Name:
Additional Filter:
Group distinguished Name:
>ldap user 1 -b ou=People,dc=example,dc=com
Syntax Description
Parameter Description
enable <0/1> Enable or disable LDAP function.
0 – Disable the function.
1 – Enable the function.
type <0/1/2> Set the bind type as Simple(0),Anonymous(1), and Regular(2).
ssl <0/1> Enable or disable LDAP function via SSL tunnel.
0 – Disable the function.
1 – Enable the function.
IP <VALUE> Set IP address for LDAP server.
port <VALUE> Set port number for LDAP server.
dn <VALUE> Set Regular DN value
PWD <VALUE> Set Regular password value.
Example
> ldap set enable 1
ldap enabled!
> ldap set ssl 1
LDAP with SSL has been enabled!
> ldap set IP 192.168.100.155
LDAP Server IP has been setting.
> ldap set port 389
LDAP Server Port has been setting.
> ldap set dn dc=example,dc=com
LDAP Regular DN has been setting.
> ldap set PWD 123456
LDAP Regular Password has been setting.
Syntax
ldap view
Example
> ldap view
LDAP Enable:Enable.
LDAP Bind Type:Simple
LDAP with SSL:Enable
LDAP Regular DN:dc=example,dc=com
LDAP Regular Password:123456
Syntax
tacacspluse set <Options><Value>
Syntax Description
Parameter Description
Example
> tacacsplus set enable 1
TACACS+ enabled!
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Syntax
tacacspluse view
Example
> tacacsplus view
TACACS+ Enable:Enable.
TACACS+ Server IP:192.168.1.59
TACACS+ Server Port:49
TACACS+ Type:ASCII
TACACS+ Shared Secret:
Syntax
mngt ftpport <FTP port>
Syntax Description
Parameter Description
FTP port It means to type the number for FTP port. The default setting is
21.
Example
> mngt ftpport 21
% Set FTP server port to 21 done.
Syntax
mngt httpport <Http port>
Syntax Description
Parameter Description
Http port It means to enter the number for HTTP port. The default setting is
80.
Example
> mngt httpport 80
% Set web server port to 80 done.
Syntax
mngt httpsport <Https port>
Syntax Description
Parameter Description
Https port It means to type the number for HTTPS port. The default setting is
443.
Example
> mngt httpsport 443
% Set web server port to 443 done.
Syntax
mngt sslvpnport <SSL VPN port>
Example
> mngt sslvpnport 443
% Set SSL VPN port to 443 done.
Syntax
mngt telnetport <Telnet port>
Syntax Description
Parameter Description
Telnet port It means to type the number for telnet port. The default setting is
23.
Example
> mngt telnetport 23
% Set Telnet server port to 23 done.
Syntax
mngt sshport <ssh port>
Syntax Description
Parameter Description
ssh port It means to type the number for SSH port. The default setting is
22.
Example
> mngt sshport 23
% Set ssh port to 23 done.
Syntax
mngt noping on
mngt noping off
mngt noping viewlog
Syntax Description
Parameter Description
on All PING packets will be forwarded from LAN PC to Internet.
off All PING packets will be blocked from LAN PC to Internet.
viewlog It means to display a log of ping action, including source MAC and
source IP.
clearlog It means to clear the log of ping action.
Example
> mngt noping off
No Ping Packet Out is OFF!!
Syntax
mngt defenseworm on
mngt defenseworm off
mngt defenseworm add port
mngt defenseworm del port
mngt defenseworm viewlog
mngt defenseworm clearlog
Syntax Description
Parameter Description
on It means to activate the function of defense worm packet out.
off It means to inactivate the function of defense worm packet out.
add port It means to add a new TCP port for block.
del port It means to delete a TCP port for block.
viewlog It means to display a log of defense worm packet, including source
MAC and source IP.
clearlog It means to remove the log of defense worm packet.
Example
> mngt defenseworm add 21
Add TCP port 21
Block TCP port list: 135, 137, 138, 139, 445, 21
> mngt defenseworm del 21
Delete TCP port 21
Block TCP port list: 135, 137, 138, 139, 445
>
Syntax
mngt rmtcfg status
mngt rmtcfg enable
mngt rmtcfg disable
mngt rmtcfg <http/https/ftp/telnet/ssh/tr069/snmp/enforce_https><on/off>
Syntax Description
Parameter Description
status It means to display current setting for your reference.
enable It means to allow the system administrators to login from the
Internet.
disable It means to deny the system administrators to login from the
Internet.
http/https/ftp/telnet/ssh/t It means to specify one of the servers/protocols for enabling or
r069/snmp/enforce_https disabling.
on/off on – enable the function.
off – disable the function.
Example
> mngt rmtcfg ftp on
Enable server fail
Remote configure function has been disabled
please enable by enter mngt rmtcfg enable
Syntax
mngt lanaccess -e <0/1> –s <value> –i <value> -I <value>
mngt lanaccess –E
mngt lanaccess –f
mngt lanaccess –d
mngt lanaccess –v
mngt lanaccess –h
Syntax Description
Parameter Description
-e <0/1> It means to enable/disable the function.
0-disable the function.
1-enable the function.
Example
> mngt lanaccess -e 1 -s FTP -i LAN1 -I 1
> mngt lanaccess -v
Current LAN Access Control Setting:
* Enable:Yes
* Service:
- FTP:Yes
- HTTP:No
- HTTPS:No
- TELNET:No
- SSH:No
- TR069:No
- Enforce HTTPS:No
* Subnet:
- LAN 1: enabled
- Specific IP(type:IP Object)(index:1) is disabled
- LAN 2: disabled
- Specific IP(type:IP Object)(index:0) is disabled
- LAN 3: disabled
- Specific IP(type:IP Object)(index:0) is disabled
- LAN 4: disabled
- Specific IP(type:IP Object)(index:0) is disabled
- LAN 5: disabled
- Specific IP(type:IP Object)(index:0) is disabled
- LAN 6: disabled
- Specific IP(type:IP Object)(index:0) is disabled
- LAN 7: disabled
- Specific IP(type:IP Object)(index:0) is disabled
- LAN 8: disabled
- Specific IP(type:IP Object)(index:0) is disabled
...
...
Syntax
mngt echoicmp enable
mngt echoicmp disable
Syntax Description
Parameter Description
Enable It means to accept the echo ICMP packet.
Disable It means to drop the echo ICMP packet.
Example
> mngt echoicmp enable
%% Echo ICMP packet enabled.
Syntax
mngt accesslist list
mngt accesslist add <Index><IP Object Index>
mngt accesslist remove <index>
mngt accesslist flush
Syntax Description
Parameter Description
list It can display current setting for your reference.
add It means adding a new entry.
<Index><IP Object Index> It means to specify the IP object. Available settings:
<index> - Enter the index number (1 to 10) of the accesslist profile.
<IP Object Index> - Enter the index number (1 to 192) of the IP
object.
remove <index> It means to delete the selected item.
<index> - Enter the index number (1 to 10) of the accesslist profile.
flush It means to remove all the settings in the access list.
Example
> mngt accesslist add 1 1
Syntax
mngt wanlogin enable
mngt wanlogin disable
Example
> mngt wanlogin enable
>
Syntax
mngt snmp [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e <1/2> 1: Enable the SNMP function.
2: Disable the SNMP function.
-a <1/2> 1: Enable the SNMPV1 function.
2: Disable the SNMPV1 function.
-b <1/2> 1: Enable the SNMPV2C function.
2: Disable the SNMPV2C function.
-c <1/2> 1: Enable the SNMPV3 function.
2: Disable the SNMPV3 function.
-g <Community name> It means to set the name for getting community by typing a proper
character. (max. 23 characters)
-s <Community name> It means to set community by typing a proper name. (max. 23
characters)
-m <IP address> It means to set one host as the manager to execute SNMP function.
-m <IP address>/<Subnet> Please type in IPv4 address to specify certain host.
It allows to set 3 IPs, separated by ",".
-t <Community name> It means to set trap community by typing a proper name. (max. 23
characters)
-n <IP address> It means to set the notification host.
It allows to set 2 IPs, separated by ",".
-T <seconds> It means to set the trap timeout <0~999>.
-o <username> It means to set a user account (maximum 23 characters) for user
management.
-p <0/1/2> It means to set the authentication algorithm.
0: No auth
1: MD5_AUTH
2: SHA_AUTH
-q <password> It means to set the password (maximum 23 characters) for
authentication.
-r <0,3/4/6> It means to set privacy algorithm
0, 3: No_PRIV
4: DES_PRIV
6: AES_PRIV
-u <password> It means to set the password (maximum 23 characters) for privacy.
-V It means to list SNMP setting.
Example
> mngt snmp -e 1 -g draytek -s DK -m 192.168.1.1 -t trapcom -n 10.20.3.40
Syntax
mngt bfp [<command><parameter>|…]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e 0/1 Enable / disable the BFP function.
0 – Disable
1 – Enable
-s <service> It means to enable different service.
service - Available types are FTP, HTTP, HTTPS, TELNET, TR069, SSH,
None and All.
-l <failure> It means to set login failure retry times.
failure - Available number is from 1 to 255.
-p <penalty> It means to set penalty time for BFP. The unit is sec.
-v It means to view current settings.
Example
> mngt bfp -e 1
> mngt bfp -s FTP
> mngt bfp -l 10
> mngt bfp -v
Current Brute Force Protection Setting:
* Enable: yes
* Service:
- FTP: yes
- HTTP: no
- HTTPS: no
- TELNET: no
- TR069: no
- SSH: no
* Maximum login failures: 10
* Penalty period: 0
Syntax Description
Parameter Description
local_cert url <URL> URL - Enter a URL(http://....) for downloading the
<password> certificate.
The file is encrypted with the file format of "xxxx.p12".
Password - Enter the password for decrypting the .p12
certificate.
trusted_ca <URL> URL - Enter a URL(http://....) for downloading the
certificate.
The file is encrypted with the file format of "xxxx.p12".
Syntax
mngt telnettimeout <value>
Syntax Description
Parameter Description
<value> Range from 60 to 300. The default value is 300 (seconds).
Example
> mngt telnettimeout 100
% Telnet timeout : 100s
>
Syntax
mngt sshtimeout <value>
Syntax Description
Parameter Description
<value> Range from 60 to 300. The default value is 300 (seconds).
Example
> mngt sshtimeout 200
% SSH timeout : 200s
>
Syntax
msubnet switch <2/3/.../100> <On/Off>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<On/Off> On means turning on the subnet for the specified LAN interface.
Off means turning off the subnet.
Example
> msubnet switch 99 On
% LAN2 Subnet On!
Syntax
msubnet addr <2/3/.../100> <IP address>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<IP address> Type the private IP address for the specified LAN interface.
Example
> msubnet addr 2 192.168.5.1
% Set LAN2 subnet IP address done !!!
Syntax
msubnet nmask <2/3/.../100> <IP address>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<IP address> Type the subnet mask address for the specified LAN interface.
Example
> msubnet nmask 2 255.255.0.0
% Set LAN2 subnet mask done !!!
Syntax
msubnet status <2/3/.../100>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
Example
Syntax
msubnet dhcps <2/3/.../100> <On/Off>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<On/Off> On means enabling the DHCP server for the specified LAN interface.
Off means disabling the DHCP server.
Example
> msubnet dhcps 3 off
% LAN3 Subnet DHCP Server disabled!
Syntax
msubnet nat <2/3/.../100> <On/Off>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<On/Off> On – It means the subnet will be configured for NAT usage.
Off - It means the subnet will be configured for Routing usage.
Syntax
msubnet gateway <2/3/.../100> <Gateway IP>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<Gateway IP> Specify an IP address as the gateway IP.
Example
> msubnet gateway 2 192.168.1.13
% Set LAN2 Dhcp Gateway IP done !!!
Syntax
msubnet ipcnt <2/3/.../100> <IP counts>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<IP counts> Specify a total number of IP address allowed for each LAN interface.
The available range is from 0 to 220.
Example
> msubnet ipcnt 2 15
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
> msubnet ipcnt ?
% msubnet ipcnt <2/3/.../100> <IP counts>
% Now: LAN2 15
LAN3 100
LAN4 100
LAN5 100
LAN6 100
LAN7 100
LAN8 100
LAN9 100
...
...
Syntax
msubnet talk <1/2/3/.../100> <1/2/3/.../100> <On/Off>
Syntax Description
Example
> msubnet talk 1 2 on
% Enable routing between LAN1 and LAN2 !
Syntax
msubnet startip <2/3/.../100> <Gateway IP>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<Gateway IP> Type an IP address as the starting IP address for a subnet.
Example
> msubnet startip 2 192.168.2.90
% Set LAN2 Dhcp Start IP done !!!
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Syntax
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6 ......
....
100=LAN100
<Start IP> Type an IP address as the starting IP address for PPP connection.
Example
> msubnet pppip 2 192.168.2.250
% Set LAN2 PPP(IPCP) Start IP done !!!
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
> msubnet pppip
% msubnet pppip <2/3/.../100> <Start IP>
% Now: LAN2 192.168.2.250
LAN3 192.168.3.200
LAN4 192.168.4.200
LAN5 192.168.5.200
LAN6 192.168.6.200
LAN7 192.168.7.200
LAN8 192.168.8.200
LAN9 192.168.9.200
...
...
>
Syntax
msubnet nodetype <2/3/.../100> <count>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
Example
> msubnet nodetype 2 1
% Set LAN2 Dhcp Node Type done !!!
> msubnet nodetype
% msubnet nodetype <2/3/.../100> <count>
% Now: LAN2 1
LAN3 0
LAN4 0
LAN5 0
LAN6 0
LAN7 0
LAN8 0
LAN9 0
LAN10 0
LAN11 0
...
...
>
Syntax
msubnet primWINS <2/3/.../100> <WINS IP>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<WINS IP> Type the IP address as the WINS IP.
Example
> msubnet primWINS 2 192.168.3.5
% Set LAN2 Dhcp Primary WINS IP done !!!
> msubnet primWINS
% msubnet primWINS <2/3/.../100> <WINS IP>
Syntax
msubnet secWINS <2/3/.../100> <WINS IP>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<WINS IP> Type the IP address as the WINS IP.
Example
> msubnet secWINS 2 192.168.3.89
% Set LAN2 Dhcp Secondary WINS IP done !!!
> msubnet secWINS
% msubnet secWINS <2/3/.../100> <WINS IP>
% Now: LAN2 192.168.3.89
LAN3 0.0.0.0
LAN4 0.0.0.0
LAN5 0.0.0.0
LAN6 0.0.0.0
LAN7 0.0.0.0
LAN8 0.0.0.0
LAN9 0.0.0.0
LAN10 0.0.0.0
Syntax
msubnet tftp <2/3/.../100><TFTP servername>
Syntax Description
Parameter Description
<2/3/.../100> It means LAN interface.
2=LAN2
3=LAN3
4=LAN4
5=LAN5
6=LAN6
....
100=LAN100
<TFTP servername> Type a name to indicate the TFTP server.
Example
> msubnet tftp 2 publish
% Set LAN2 TFTP Server Name done !!!
> msubnet tftp
msubnet tftp <2/3/.../100> <TFTP server name>
Now: LAN2 publish
LAN3
LAN4
LAN5
LAN6
LAN7
LAN8
LAN9
LAN10
LAN11
LAN12
LAN13
...
...
>
Syntax
msubnet mtu <interface> <value>
Syntax Description
Parameter Description
interface Available settings include LAN1~LAN100, IP_Routed_Subnet.
value 1000 ~ 1500 (Bytes), default: 1500 (Bytes)
Example
> msubnet mtu LAN1 1492
Set LAN1 subnet mtu as 1492
> msubnet mtu ?
Usage:
>msubnet mtu <interface> <value>
<interface>: LAN1~LAN100,IP_Routed_Subnet, <value>: 1000 ~
1500 (Bytes),
default: 1500 (Bytes)
e.x: >msubnet mtu LAN1 1492
Current Settings:
LAN1 MTU: 1492 (Bytes)
LAN2 MTU: 1500 (Bytes)
LAN3 MTU: 1500 (Bytes)
LAN4 MTU: 1500 (Bytes)
LAN5 MTU: 1500 (Bytes)
LAN6 MTU: 1500 (Bytes)
...
LAN100 MTU: 1500 (Bytes)
IP Routed Subnet MTU: 1500 (Bytes)
>
Syntax
msubnet leasetime <1/2/3/.../100><Lease Time (sec.)>
Syntax Description
Parameter Description
...
100=LAN100
Example
> msubnet leasetime 2 250000
% Set LAN2 lease time: 250000
> msubnet leasetime ?
% msubnet leasetime <1/2/3/.../100> <Lease Time (sec.)>
% Now: LAN1 86400
LAN2 250000
LAN3 259200
LAN4 259200
LAN5 259200
LAN6 259200
LAN7 259200
LAN8 259200
LAN9 259200
...
...
Syntax
object ip obj setdefault
object ip obj INDEX -v
object ip obj INDEX -n NAME
object ip obj INDEX -i INTERFACE
object ip obj INDEX -s INVERT
object ip obj INDEX -a TYPE <START_IP><END/MASK_IP>
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
Example
> object ip obj 1 -n marketing
OK.
> object ip obj 1 -a 1 192.168.1.45
OK.
> object ip obj 1 -v
IP Object Profile 1
Name :[marketing]
Interface:[Any]
Address type:[single]
Start ip address:[192.168.1.45]
End/Mask ip address:[0.0.0.0]
MAC Address:[00:00:00:00:00:00]
Invert Selection:[0]
>
Syntax
object ip grp setdefault
object ip grp INDEX -v
object ip grp INDEX -n NAME
object ip grp INDEX -i INTERFACE
object ip grp INDEX -a IP_OBJ_INDEX
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified group profile.
-v It means to view the information of the specified group profile.
Example: object ip grp 1 -v
-n NAME It means to define a name for the IP group.
NAME: Type a name with less than 15 characters.
Example: object ip grp 8 -n bruce
-i INTERFACE It means to define an interface for the IP group.
INTERFACE=0, means any
INTERFACE=1, means LAN
INTERFACE=2, means WAN
Example: object ip grp 3 -i 0
-a IP_OBJ_INDEX It means to specify IP object profiles for the group profile.
Example: :object ip grp 3 -a 1 2 3 4 5
The IP object profiles with index number 1,2,3,4 and 5 will be group
under such profile.
Example
> object ip grp 2 -n First
IP Group Profile 2
Name :[First]
Interface:[Any]
Included ip object index:
[0:][0]
[1:][0]
[2:][0]
[3:][0]
[4:][0]
[5:][0]
[6:][0]
[7:][0]
[8:][0]
[9:][0]
[10:][0]
[11:][0]
Set ok!
Syntax
object ipv6 obj setdefault
object ipv6 obj INDEX -v
object ipv6 obj INDEX -n NAME
object ipv6 obj INDEX -s INVERT
object ipv6 obj INDEX -e MATCH_TYPE
object ipv6 obj INDEX -a TYPE <START_IP><END_IP><Prefix Length>
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
Example
> obj ipv6 obj 3 -a 3 2607:f0d0:1002:51::4 2607:f0d0:1002:51::4
Syntax
object ipv6 grp setdefault
object ipv6 grp INDEX -v
object ipv6 grp INDEX -n NAME
object ipv6 grp INDEX -a IP_OBJ_INDEX
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified group profile.
-v It means to view the information of the specified group profile.
Example: object ipv6 grp 1 -v
-n NAME It means to define a name for the IP group.
NAME: Type a name with less than 15 characters.
Example: object ipv6 grp 8 -n bruce
-a IP_OBJ_INDEX It means to specify IP object profiles for the group profile.
Example: :object ipv6 grp 3 -a 1 2 3 4 5
The IP object profiles with index number 1,2,3,4 and 5 will be group
under such profile.
Example
> object ipv6 grp 1 -n marketingtest
IPv6 Group Profile 1
Name :[marketingtest]
Included ip object index:
[0:][0]
[1:][0]
[2:][0]
[3:][0]
[4:][0]
[5:][0]
Syntax
object country set INDEX -v
object country set INDEX -n NAME
object country set INDEX -a COUNTRY_INDEX
object country activate
object country setdefault
object country list
Syntax Description
Parameter Description
INDEX It means the index number of the specified country object
profile (1 to 32).
COUNTRY_INDEX It means the code number of a country. To get the detailed
information of the code number, use "object country list" to
get the one you need.
activate It means to activate the country object profile.
setdefault It means to return to default settings for all profiles.
list Displays a list of country with code number.
For example, "222" means "Taiwan"; "241" means "United
States".
Example
> object country set 1 -n Best
Country object Profile 1
Name :[Best]
Included country index:
Set ok!
> object country set 1 -a 222
Set ok!
>
Syntax
object service obj setdefault
object service obj INDEX -v
object service obj INDEX -n NAME
object service obj INDEX -p PROTOCOL
object service obj INDEX -s CHK <START_P><END_P>
object service obj INDEX -d CHK <START_P><END_P>
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified service object profile.
-v It means to view the information of the specified service object
profile.
Example: object service obj 1 -v
-n NAME It means to define a name for the IP object.
NAME: Type a name with less than 15 characters.
Example: object service obj 9 -n bruce
-p PROTOCOL It means to define a PROTOCOL for the service object profile.
PROTOCOL =0, means any
PROTOCOL =1, means ICMP
PROTOCOL =2, means IGMP
PROTOCOL =6, means TCP
PROTOCOL =17, means UDP
PROTOCOL =58, means ICMPv6
PROTOCOL =255, means TCP/UDP
Other values mean other protocols.
Example: object service obj 8 -i 0
CHK It means the check action for the port setting.
0=equal(=), when the starting port and ending port values are the
same, it indicates one port; when the starting port and ending port
values are different, it indicates a range for the port and available
for this service type.
1=not equal(!=), when the starting port and ending port values are
the same, it indicates all the ports except the port defined here;
when the starting port and ending port values are different, it
indicates that all the ports except the range defined here are
available for this service type.
2=larger(>), the port number greater than this value is available..
Example
> object service obj 1 -n limit
> object service obj 1 -p 255
> object service obj 1 -s 1 120 240
> object service obj 1 -d 1 200 220
> object service obj 1 -v
Service Object Profile 1
Name :[limit]
Protocol:[TCP/UDP]
Source port check action:[!=]
Source port range:[120~240]
Destination port check action:[!=]
Destination port range:[200~220]
>
Syntax
object service grp setdefault
object service grp INDEX -v
object service grp INDEX -n NAME
object service grp INDEX -a SER_OBJ_INDEX
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
INDEX It means the index number of the specified group profile.
-v It means to view the information of the specified group profile.
Example: object service grp 1 -v
-n NAME It means to define a name for the service group.
NAME: Type a name with less than 15 characters.
Example: object service grp 8 -n bruce
-a SER_OBJ_INDEX It means to specify service object profiles for the group profile.
Example
>object service grp 1 -n Grope_1
Service Group Profile 1
Name :[Grope_1]
Included service object index:
[0:][0]
[1:][0]
[2:][0]
[3:][0]
[4:][0]
[5:][0]
[6:][0]
[7:][0]
Syntax
object kw obj setdefault
object kw obj show PAGE
object kw obj INDEX -v
object kw obj INDEX -n NAME
object kw obj INDEX -a CONTENTS
object kw obj INDEX -c
Syntax Description
Parameter Description
setdefault It means to return to default settings for all profiles.
show PAGE It means to show the contents of the specified profile.
PAGE: type the page number.
Example
> object kw obj 1 -n children
Profile 1
Name :[children]
Content:[]
> object kw obj 1 -a gambling
Profile 1
Name :[children]
Content:[gambling]
Syntax
object fe show
object fe setdefault
object fe obj INDEX -v
object fe obj INDEX -n NAME
object fe obj INDEX -e CATEGORY|FILE_EXTENSION
object fe obj INDEX -d CATEGORY|FILE_EXTENSION
Syntax Description
Parameter Description
show It means to show the contents for all of the profiles.
setdefault It means to return to default settings for all profiles.
INDEX It means the index number (from 1 to 8) of the specified file
extension object profile.
-v It means to view the information of the specified file extension
object profile.
-n NAME It means to define a name for the file extension object profile.
Example
> object fe obj 1 -n music
> object fe obj 1 -e Audio
> object fe obj 1 -v
Profile Index: 1
Profile Name:[music]
-------------------------------------------------------------------------
Image category:
[ ].bmp [ ].dib [ ].gif [ ].jpeg [ ].jpg [ ].jpg2 [ ].jp2 [ ].pct
[ ].pcx [ ].pic [ ].pict [ ].png [ ].tif [ ].tiff
-------------------------------------------------------------------------
Video category:
[ ].asf [ ].avi [ ].mov [ ].mpe [ ].mpeg [ ].mpg [v].mp4 [ ].qt
[ ].rm [v].wmv [ ].3gp [ ].3gpp [ ].3gpp2 [ ].3g2
-------------------------------------------------------------------------
Audio category:
[v].aac [v].aiff [v].au [v].mp3 [v].m4a [v].m4p [v].ogg [v].ra
[v].ram [v].vox [v].wav [v].wma
-------------------------------------------------------------------------
Java category:
[ ].class [ ].jad [ ].jar [ ].jav [ ].java [ ].jcm [ ].js [ ].jse
[ ].jsp [ ].jtk
-------------------------------------------------------------------------
ActiveX category:
[ ].alx [ ].apb [ ].axs [ ].ocx [ ].olb [ ].ole [ ].tlb [ ].viv
[ ].vrm
-------------------------------------------------------------------------
Compression category:
[ ].ace [ ].arj [ ].bzip2 [ ].bz2 [ ].cab [ ].gz [ ].gzip [ ].rar
[ ].sit [ ].zip
------------------------------------------------------------------------
Executation category:
Example
> object sms obj 1 –n CTC
> object sms obj 1 -s 0
> object sms obj 1 -u carrie
> object sms obj 1 -p 19971125cm
> object sms obj 1 -q 2
> object sms obj 1 -i 50
> object sms obj 1 -v
Profile Index: 1
Profile Name:[CTC]
SMS Provider:[kotsms.com.tw (TW)]
Username:[carrie]
Password:[******]
Quota:[2]
Sending Interval:[50(seconds)]
>
Example
> object mail obj 1 –n buyer
> object mail obj 1 -s 192.168.1.98
> object mail obj 1 -m 25
> object mail obj 1 -t 1
> object mail obj 1 -u john
> object mail obj 1 -p happy123456
> object mail obj 1 -i 25
> object mail obj 1 -v
Profile Index: 1
Profile Name:[buyer]
SMTP Server:[192.168.1.98]
SMTP Port:[25]
Sender Address:[]
Use SSL:[disable]
Authentication:[enable]
Username:[john]
Password:[******]
Sending Interval:[25(seconds)]
Example
> object noti obj 1 –n markbei
> object noti obj 1 –e 1 1
> object noti obj 1 –e 2 1
> object noti obj 1 –e 5 3
> object noti obj 1 -v
Profile Index: 1
Profile Name:[]
Category Status
WAN [v]Disconnected [ ]Reconnected
VPN Tunnel [v]Disconnected [ ]Reconnected
Temperature Alert [ ]Out of Range
WAN Budget Alert [ ]Limit Reached
CVM Alert [ ]CPE Offline
[ ]CPE Config Backup Fail
[v]CPE Config Restore Fail
[ ]CPE Firmware Fpgrade Fail
[ ]CPE VPN Profile Setup Fail
High Availability [ ]Failover Occurred
Config Sync Fail
Router Unstable
>
Example
> object schedule set 1 –e 1
> object schedule set 1 –c Working
> object schedule set 1 –D “2020 11 8”
> object schedule set 1 –T “8 1”
> object schedule set 1 –d “2 30”
> object schedule set 1 –a 0
> object schedule set 1 –h “1 Mon Wed”
> object schedule view 1
Index No.1
--------------------------------------------------
[v] Enable Schedule Setup
Comment [ Working ]
Start Date (yyyy-mm-dd) [ 2020 ]-[ 11 ]-[ 8 ]
Start Time (hh:mm) [ 8 ]:[ 1 ]
Duration Time (hh:mm) [ 2 ]:[ 30 ]
Action [ Force On ]
Idle Timeout [ 0 ] minute(s).(max. 255, 0 for
default)
----------------------------------------------------------------
How Often
[v] Weekdays
[ ]Sun [v]Mon [ ]Tue [v]Wed [ ]Thu [ ]Fri [ ]Sat
>
Syntax
port setting -p <1, 2, 3, 4, 5, 6, 7, 8, 9, 10 >
port setting -s <AN, 10G, 2.5G, 1G, 100M, 10M>
port setting -d
Syntax Description
Parameter Description
-p <1, 2, 3, 4, 5, 6, 7, 8, 9, It means the to set the physical type for a LAN port.
10 > <1, 2, 3, 4, 5, 6, 7, 8, 9, 10 > - It means the number of LAN port.
-s <AN, 10G, 2.5G, 1G, <AN, 10G, 2.5G, 1G, 100M, 10M > - It means the physical type for
100M, 10M> the specific port.
-d It means to display current settings.
Example
> port setting -p 1 -s 10G
Port 1 , Speed Settings: 10G
Port 2 , Speed Settings: AN
Syntax
portmaptime [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-t <sec> It means “TCP” protocol.
<sec>: Type a number to set the TCP session timeout.
-u <sec> It means “UDP” protocol.
<sec>: Type a number to set the UDP session timeout.
-i <sec> It means “IGMP” protocol.
<sec>: Type a number to set the IGMP session timeout.
-w <sec> It means “TCP WWW” protocol.
<sec>: Type a number to set the TCP WWW session timeout.
-s <sec> It means “TCP SYN” protocol.
<sec>: Type a number to set the TCP SYN session timeout.
-f It means to flush all portmaps (useful for diagnostics).
-l <List> List all settings.
Example
> portmaptime -t 86400 -u 300 -i 10
> portmaptime -l
Syntax
prn status
prn enable <0/1>
Syntax Description
Parameter Description
enable <0/1> It means to enable / disable the function of USB pritner.
0: disable
1: enable
Example
> prn status
Interface: USB bus 2.0
Printer: READY
Connect speed: 0K bps
Status: (null)
Info: (null)
Syntax
qos setup [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-h Type it to display the usage of this command.
-W <1~12> It means to specify WAN interface. The default is WAN1.
1: WAN1; 2:WAN2;....
-m <mode> It means to define which traffic the QoS control settings will apply
to and eable QoS control.
0: disable.
1: in, apply to incoming traffic only.
2: out, apply to outgoing traffic only.
Example
> qos setup -m 3 -i 9500 -o 8500 -r 3:20 -u 1 -p 50 -t 1
Syntax
qos class -c <no> -<a|e|d <no>>[-<command> <parameter> | ... ]
Syntax Description
Example
> qos class -c 2 -n draytek -a -m 1 -l 192.168.1.50:192.168.1.80
Syntax
qos type [-a <service name> | -e <no> | -d <no>]
Syntax Description
Parameter Description
-a <name> It means to add rule.
-e <no> It means to edit user defined service type. “no” means the index
number. Available numbers are 1~40.
-d <no> It means to delete user defined service type. “no” means the index
number. Available numbers are 1~40.
-n <name> It means the name of the service.
-t <type> It means protocol type.
6: tcp(default)
17: udp
0: tcp/udp
<1~254>: other
-p <port> It means service port. The typing format must be [start:end] (ex.,
510:330).
-l List user defined types. “no” means the index number. Available
numbers are 1~40.
Example
> qos type -a draytek -t 6 -p 510:1330
Syntax
qos voip <on/off>
Syntax Description
Parameter Description
on/off On – Enable the QoS for VoIP.
Off – Disable th QoS for VoIP.
Example
> qos voip off
QoS for VoIP: Disable; SIP Port: 5060
>
Example
> show lan
The LAN settings:
Status IP Mask DHCP Start IP Pool Gateway
-------- ----------- -------------- ---- ----------- ---- ---------
[V]LAN1 192.168.100.1 255.255.255.0 V 192.168.100.10 200 192.168.100.1
...
[X]LAN100 192.168.101.1 255.255.255.0 V 192.168.101.10 100 192.168.101.1
Example
> show dmz
% WAN1 DMZ mapping status:
Index Status WAN1 aux IP Private IP
----------------------------------------------------
1 Disable 0.0.0.0
----------------------------------------------------
1 Disable 0.0.0.0
>
Example
> show dns
%% Domain name server settings:
% LAN1 Primary DNS: [Not set]
% LAN1 Secondary DNS: [Not set]
Example
> show openport ?
%% Openport settings:
Index Status Comment Local IP Address
********************************************************
1. Enable CARR_1 192.168.1.9
Total 1 items listed.
Example
> show nat
Port Redirection Running Table:
Index Protocol Public Port Private IP Private Port
1 6 20011 192.168.100.10 8080
2 6 20022 192.168.100.10 8443
3 0 0 0.0.0.0 0
4 0 0 0.0.0.0 0
5 0 0 0.0.0.0 0
6 0 0 0.0.0.0 0
7 0 0 0.0.0.0 0
8 0 0 0.0.0.0 0
9 0 0 0.0.0.0 0
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
....
Example
> show portmap
-------------------------------------------------------------------------------
Example
> show pmtime
Level0 TCP=86400001 UDP=300001 ICMP=10001
Level1 TCP=600000 UDP=90000 ICMP=7000
Level2 TCP=60000 UDP=30000 ICMP=5000
Example
> show session
% Maximum Session Number: 150000
% Maximum Session Usage: 2
% Current Session Usage: 2
% Current Session Used(include waiting for free): 15
% WAN1 Current Session Usage: 0
% WAN2 Current Session Usage: 0
% WAN3 Current Session Usage: 1
% WAN4 Current Session Usage: 0
% WAN5 Current Session Usage: 1
% WAN6 Current Session Usage: 0
% WAN7 Current Session Usage: 0
% WAN8 Current Session Usage: 0
% WAN9 Current Session Usage: 0
% WAN10 Current Session Usage: 0
% WAN11 Current Session Usage: 0
% WAN12 Current Session Usage: 0
## Session Create this Sec: 0
## Session Create Peak Sec: 17
Example
> show status
System Uptime:2:8:29
LAN Status
Primary DNS:168.95.192.1 Secondary DNS:168.95.1.1
IP Address:192.168.100.1 Tx Rate:103850 Rx Rate:68112
Syntax
show traffic <wan1/wan2~wan12><tx/rx> <weekly>
show traffic <ipaddr> <tx/rx>
show traffic session <weekly>
Example
> show traffic session weekly0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,0 ,
Syntax
show clienttraffic <device index><wan# or lan#><tx/rx> <weekly>
Syntax Description
Parameter Description
<device index> Enter the device index (01 – 30) in double-digit (ex: 01, 02)
for external device.
Use “switch list” to check which VigorSwitch connects to this
router. Then, Enter the index number of this VigorSwitch in
this field.
<wan# or lan#> wan# - Specify WAN interface (WAN1 to WAN2) for Vigor
router.
lan#- Specify LAN interface (LANA / LANB) for Vigor router.
<tx/rx> Tx – Inidcate transmitted data.
Rx – Indicate receivied data.
<weekly> Display the transmitted data or receivied data collected
weekly.
Syntax
show statistic
show statistic reset <interface>
Syntax Description
Parameter Description
reset <interface> It means to reset the transmitted/received bytes to Zero.
<interface> - It means to specify WAN1 ~WAN5 (including multi-PVC)
interface for displaying related statistics.
Example
> show statistic
Syntax
srv dhcp dhcp2 [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one
line.
-l <enable> The DHCP server assigns the IP addresses to the clients via
LAN port.
<enable> : Enter 0 (disable) or 1 (enable).
-m <enable> The DHCP server assigns the IP addresses to the clients via
MAC address configuration.
<enable> : Enter 0 (disable) or 1 (enable).
-e <id> Turn on the flag of LAN 1 or LAN 2 if LAN port is enabled.
<id>: Enter 3 or 4.
-d <id> Turn off the flag of LAN port 1 or LAN port 2.
<id>: Enter 3 or 4.
-v View current status.
Example
Syntax
srv dhcp public start <IP address>
srv dhcp public cnt <IP counts>
srv dhcp public status
srv dhcp public add <MAC Addr XX-XX-XX-XX-XX-XX>
srv dhcp public del <MAC Addr XX-XX-XX-XX-XX-XX/all/ALL>
Syntax Description
Parameter Description
start <IP address> It means the starting point of the IP address pool for the DHCP
server.
Example
> srv dhcp public cnt 3
> srv dhcp public add 14-49-BC-0D-1F-48
> srv dhcp public status
Index MAC Address
0. 14-49-BC-0D-1F-48 !!!
Syntax
srv dhcp dns1 <DNS IP address>
Syntax Description
Parameter Description
<DNS IP address> It means the IP address that you want to use as DNS1.
Note: The IP Routed Subnet DNS must be the same as NAT Subnet
DNS).
Example
> srv dhcp dns1 168.95.1.1
% srv dhcp dns1 <DNS IP address>
% Now: 168.95.1.1
(IP Routed Subnet dns same as NAT Subnet dns)
Syntax
srv dhcp dns2 <DNS IP address>
Syntax Description
Parameter Description
<DNS IP address> It means the IP address that you want to use as DNS2.
Note: The IP Routed Subnet DNS must be the same as NAT Subnet
DNS).
Example
> srv dhcp dns2 10.1.1.1
% srv dhcp dns2 <DNS IP address>
% Now: 10.1.1.1
(IP Routed Subnet dns same as NAT Subnet dns)
Syntax
srv dhcp frcdnsmanl on
srv dhcp frcdnsmanl off
Syntax Description
Parameter Description
on It means to use manual setting for DNS setting.
Off It means to use auto settings acquired from ISP.
Example
> srv dhcp frcdnsmanl on
% Domain name server now is using manual settings!
> srv dhcp frcdnsmanl off
% Domain name server now is using auto settings!
Syntax
srv dhcp gateway <Gateway IP>
Syntax Description
Parameter Description
<Gateway IP> It means to specify a gateway address used for DHCP server.
Example
> srv dhcp gateway 192.168.2.1
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Syntax
srv dhcp ipcnt <IP counts>
Syntax Description
Parameter Description
<IP counts> It means the number (0 to 256) that you have to specify for the
DHCP server.
Example
> srv dhcp ipcnt ?
% srv dhcp ipcnt <IP counts>
% Now: 150
Syntax
srv dhcp relay servip <server ip>
srv dhcp relay subnet <index>
Syntax Description
Parameter Description
<server ip> It means the IP address that you want to used as DHCP server.
<index> It means subnet 1 or 2. Please type 1 or 2. The router will invoke
this function according to the subnet 1 or 2 specified here.
Example
> srv dhcp relay servip 192.168.1.46
> srv dhcp relay subnet 2
> srv dhcp relay servip ?
% srv dhcp relay servip <server ip>
% Now: 192.168.1.46
Syntax
srv dhcp startip <IP address>
Syntax Description
Parameter Description
<IP address> It means the IP address that you can specify for the DHCP server as
the starting point.
Example
> srv dhcp startip 192.168.1.53
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
Syntax
srv dhcp status <LAN1/2/3/.../100/ip_routed_subnet>
Syntax Description
Parameter Description
<LAN1/2/3/.../100/ip_rout It means to display current status for the selected interface.
ed_subnet>
Example
> srv dhcp status lan1
Syntax
srv dhcp leasetime <Lease Time (sec)>
Syntax Description
Parameter Description
<Lease Time (sec)> It means the lease time (500 to 1661992960) that DHCP server can
use. The unit is second.
Example
> srv dhcp leasetime ?
% srv dhcp leasetime <Lease Time (sec.)>
% Now: 86400
>
Syntax
srv dhcp nodetype <count>
Syntax Description
Parameter Description
<count> It means to specify a type for node.
1. B-node
2. P-node
4. M-node
8. H-node
Example
> srv dhcp nodetype 1
> srv dhcp nodetype ?
%% srv dhcp nodetype <count>
%% 1. B-node 2. P-node 4. M-node 8. H-node
% Now: 1
Syntax
srv dhcp primWINS <WINS IP address>
srv dhcp primWINS clear
Syntax Description
Parameter Description
<WINS IP address> It means the IP address of primary WINS server.
clear It means to remove the IP address settings of primary WINS server.
Example
> srv dhcp primWINS 192.168.1.88
> srv dhcp primWINS ?
%% srv dhcp primWINS <WINS IP address>
%% srv dhcp primWINS clear
% Now: 192.168.1.88
Syntax
srv dhcp secWINS <WINS IP address>
srv dhcp secWINS clear
Syntax Description
Parameter Description
<WINS IP address> It means the IP address of secondary WINS server.
clear It means to remove the IP address settings of second WINS server.
Example
> srv dhcp secWINS 192.168.1.180
> srv dhcp secWINS ?
%% srv dhcp secWINS <WINS IP address>
%% srv dhcp secWINS clear
% Now: 192.168.1.180
Syntax
srv dhcp expRecycleIP <sec time>
Syntax Description
Parameter Description
<sec time> It means to set the time (5~300 seconds) for checking if the IP can be
assigned again or not.
Example
Vigor> srv dhcp expRecycleIP 250
% DHCP expired_RecycleIP = 250
Syntax
srv dhcp tftp <TFTP server name>
Syntax Description
Parameter Description
<TFTP server name> It means to type the name of TFTP server.
Example
> srv dhcp tftp TF123
> srv dhcp tftp ?
%% srv dhcp tftp <TFTP server name>
% Now: TF123
Syntax
srv dhcp tftpdel
Example
> srv dhcp tftp TF123
> srv dhcp tftp ?
%% srv dhcp tftp <TFTP server name>
% Now: TF123
> srv dhcp tftpdel
% The TFTP Server Name had been deleted !!!
Syntax
srv dhcp option -h
srv dhcp option -l
srv dhcp option -d <idx>
srv dhcp option -e <1 or 0> -i <lan number> -s <Next Server IP Address>
srv dhcp option -e <1 or 0> -i <lan number> -c <option number> -v <option value>
srv dhcp option -e <1 or 0> -i <lan number> -c <option number> -x <option value>
srv dhcp option -e <1 or 0> -i <lan number> -c <option number> -a <option value>
srv dhcp option -u <idx unmber>
Syntax Description
Parameter Description
-h It means to display usage of this command.
-l It means to display all the user defined DHCP options.
-d <idx> It means to delete the option number by specifying its index number.
-e <1 or 0> It means to enable/disable custom option feature.
1:enable
0:disable
-i <lan number> <lan number> : It means to specify the LAN interface.
1: lan1
a: all LAN
r: routed subnet
-s <Next Server IP It means to set the next server IP address.
Address> Next Server IP Address: Enter an IP address.
-c <option It means to set option number. Available number ranges from 0 to 255.
number> option number: Enter a number.
-v <option value> It means to set option number by typing string.
option value: Enter a string.
-x <option value> It means to set option number with the format of Hexadecimal characters.
option value: Enter a number (hex).
-a <option value> It means to set the option value by specifying the IP address.
option value: Enter an IP address.
-u <idx number> It means to update the option value of the sepecified index.
idx number: Enter the index number of the option value.
Example
> srv dhcp option -e 1 -i 1/2 -c 18 -v /path
> srv dhcp option -l
% state idx interface opt type data
% enable 1 LAN1/2 18 ASCII
>
Syntax
Srv nat dmz n m [-<command> <parameter> | … ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
n It means to map selected WAN IP to certain host.
1: wan1
2: wan2
m It means the index number (1 to 300) of the DMZ host.
Default setting is “1” (WAN 1). It is only available for Static IP
mode. If you use other mode, you can set 1 ~ 8 in this field. If WAN
IP alias has been configured, then the number of DMZ host can be
added more.
-e It means to enable/disable such feature.
1:enable
0:disable
-i <IP address> It means to specify the private IP address (xxx.xxx.x.x) of the DMZ
host.
-r It means to remove DMZ host setting.
-v It means to display current status.
Example
> srv nat dmz 1 1 -i 192.168.1.96
> srv nat dmz -v
% WAN1 DMZ mapping status:
Index Status WAN1 aux IP Private IP
----------------------------------------------------
1 Disable 0.0.0.0 192.168.1.96
Syntax Description
Parameter Description
[options] The available commands with parameters are listed below.
on It means to enable IPSec ESP tunnel passthrough and IKE source port
(500) preservation.
off It means to disable IPSec ESP tunnel passthrough and IKE source
port (500) preservation.
status It means to display current status for checking.
Example
> srv nat ipsecpass on
> srv nat ipsecpass status
%% Status: IPsec ESP pass-thru and IKE src_port:500 preservation is
ON.
Syntax
srv nat openport n m [-<command> <parameter> | … ]
Syntax Description
Parameter Description
n It means the index number for the profiles. The range is from 1 to
260.
m It means to specify the sub-item number for this profile. The range
is from 1 to 10.
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-a <enable> It means to enable or disable the open port rule profile.
0: disable
1:enable
-c <comment> It means to type the description (less than 23 characters) for the
defined network service.
-l <source ip idx> It means to set source IP object.
1 to 192: for IP object
1 to 32: for IP group
0: Any
For example: srv nat openport 1 1 -l 1 -g 0
-g <source ip type> It means to set IP type.
0: IP object
1: IP group
For example: srv nat openport 1 1 -l 1 -g 0
-i <local ip> It means to set the IP address for local computer.
Local ip: Type an IP address in this field.
Example
> srv nat openport 1 1 -a 1 -c games -i 192.168.1.55 -w 1 1 -p TCP -s
56
Set WAN Port ok!!
> srv nat openport 1 1 -v
%% Status: Enable
%% Comment: games
%% WAN Interface: WAN1
%% Private IP address: 192.168.1.55
Index Protocal Start Port End Port
*****************************************************************
1. TCP 56 0
>
Syntax
srv nat portmap add <idx> <serv name> <proto> <pub port> <src ip type> <src ip idx> <pri ip>
<pri port> <wan idx> <alias IP>
srv nat portmap del <idx>
srv nat portmap disable <idx>
srv nat portmap enable <idx> <proto>
srv nat portmap flush
srv nat portmap table
srv nat portmap view
Example
> srv nat portmap add 1 name tcp 100 0 0 192.168.1.10 200 wan1 1
> srv nat portmap table
Example
> srv nat status
NAT Port Redirection Running Table:
20 0 0 0.0.0.0 0
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
Example
> srv nat showall ?
Index Proto WAN IP:Port Private IP:Port Act
*****************************************************************************
Syntax
srv nat pseudoctl session <value>
srv nat pseudoctl function <0-3>
Syntax Description
Parameter Description
session <value> Set the threshold of the session.
<value>: o to 2147483647.
function <0-3> 0: It means "Auto". Check the created pseudo port number
automatically when the session number is over the
threshold.
1: It means "Not". Create a pseudo port number based on
subnet setting. No verification.
2: It means "Must". Check the created pseudo port number
if it is used by other client.
3: Create a pseudo port number. No verification.
Example
> srv nat pseudoctl function 2
pesudo port: get hash pseudo port + subnet.
pseudo port search: check pseudo port(Must).
>
Syntax
srv nat RSTTimeout <value>
Syntax Description
Parameter Description
<value> Set the timeout value.
<value>: 0 to 10 (one unit is 10msec).
Example
> srv nat RSTTimeout 2
Set timeout 2 unit
> srv nat RSTTimeout ?
%% srv RSTtimeout <value> (unit is 10msec). (0<=value<=10)
--------------------------
now timeout set 2 unit
Syntax
srv nat trigger setdefault
srv nat trigger view
srv nat trigger n [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
setdefault Set to factory default settings.
view Dispaly all of the port triggering settings.
n “n” means the rule number.
<command><parameter>|…] The available commands with parameters are listed below.
[…] means that you can type in several commands in one line.
-c[XXX] Type a comment for such rule if required.
-e [0/1] Enable (1) or disable (0) a rule (specified with rule number).
-p [1/2/3] Specify the protocol for such trigger rule.
1 – TCP
2 – UDP
3 - All
-t Specify the port number (0~65535) for trigger.
-P Specify the incoming protocol for such trigger rule.
-i Specify the port number (0~65535) for incoming protocol.
-d Delete the selected trigger rule.
-v Display the port trigger settings for specified rule.
Example
> srv nat trigger 1 -c after_dinner
> srv nat trigger 1 -e 1
> srv nat trigger 1 -p 1
> srv nat trigger 1 -t 2000
> srv nat trigger 1 -P 2
> srv nat trigger 1 -i 3000
> srv nat trigger 1 -v
Status:Enable
Comment:after_dinner2000
Triggering Protocol:TCP
Triggering Port:2000
Incoming Protocol:UDP
Incoming Port:3000
Syntax
switch -i <switch idx_no><option>
Syntax Description
Parameter Description
<switch idx_no> It means the index number of the switch profile.
option The available commands with parameters are listed below.
cmd
acc
traffic [on/off/status/tx/rx]
cmd It means to send command to the client.
acc It means to set the client authentication account and password.
traffic It means to turn on/off or display the data transmission from the
<on/off/status/tx/rx> client.
Example
> switch -i 1 traffic on
External Device NO. 1 traffic statistic function is enable
Example
> switch status ?
External Device auto discovery status : Enable
No Respond to External Device : Enable
Display External Device syslog : Enable
>
Syntax
switch not_respond 0
switch not_respond 1
Syntax Description
Parameter Description
0 Disable the option of "No Respond to External Device
packets".
1 Enable the option of "No Respond to External Device
packets".
Example
> switch on
Enable Extrnal Device auto discovery!
Example
> switch off
Disable External Device auto discovery!
Example
> switch list?
No. Mac IP status Dur Time CWMP ACS_CTL Mod
el_Name firmware_version
--------------------------------------------------------------------------------
-------------------------------
G2280
>
Syntax
switch clear <idx>
Syntax Description
Parameter Description
<idx> It means the index number of each item shown on the table.
The range is from 1 to 8.
-f It means to clear all of the data.
Example
> switch clear 1
Switch Data clear successful
Example
> switch query on
Extern Device status query is Enable
> switch query off
Extern Device status query is Disable
Example
> switch syslog on
External Device syslog is Enable
Syntax
sys adminuser <option>
Syntax Description
Parameter Description
option Available options includes:
Local <0-1>
LDAP <0-1>
edit <INDEX>
delete <INDEX>
view <INDEX>
Local<0-1> 0 – Disable the local user.
1 – Enable the local user.
LDAP <0-1> 0 – Disable the LDAP.
1 – Enable the LDAP.
edit <INDEX> username Edit an existed user account or create a new local user account.
password <INDEX>: 1 ~8. There are eight profiles to be added / edited.
Username: Enter a new name for local user.
Password: Enter a password for local user.
delete <INDEX> Delete a local user account.
view <INDEX> Show the user account/password detail information.
Index:1
User Name:carrie
User Password:test123
Syntax
sys board button def <on/off>
sys board led control <on/off>
sys board led sleepMode <on/off>
sys board led sleepMode time <minute>
sys board usb p1/p2 <on/off>
Syntax Description
Parameter Description
button def <on/off> on – It is the default value (Enabled).
off – Disable the reset function of the factory reset button.
led control <on/off> on – It is the default value (Enabled). The LEDs on the front panel is
always on.
off – The LEDs on the front panel is always off.
led sleepMode <on/off> The function of SleepMode will be available only when LED control
is set to “On”.
on – Enable the function of sleep mode.
off – Disable the function of sleep mode.
led sleepMode time Set the countdown time for the LEDs to sleep.
<minute> [minute] – Enter a value (e.g., 1, 2, 3 and etc.)
usb p1/p2 <on/off> on – It is the default value (Enabled).
off – Disable the USB port 1 or 2.
Example
> sys board button def off
default button is off now.
> sys board button def on
default button is on now.
> sys board usb p2 off
USB port2 power is off now.
Syntax
sys bonjour [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one line.
-e <enable> It is used to disable/enable bonjour service (0: disable, 1: enable).
-h <enable> It is used to disable/enable http (web) service (0: disable, 1:
enable).
-t <enable> It is used to disable/enable telnet service (0: disable, 1: enable).
-f <enable> It is used to disable/enable FTP service (0: disable, 1: enable).
-s <enable> It is used to disable/enable SSH service (0: disable, 1: enable).
-p <enable> It is used to disable/enable printer service (0: disable, 1: enable).
-6 <enable> It is used to disable/enable IPv6 (0: disable, 1: enable).
Example
> sys bonjour -s 1
>
Syntax
sys cfg default
sys cfg status
Syntax Description
Parameter Description
default It means to reset current settings with default values.
status It means to display current profile version and status.
Example
> sys cfg status
Profile version: 3.0.0 Status: 1 (0x491e5e6c)
> sys cfg default
>
Example
> sys cmdlog
% Commands Log: (The lowest index is the newest !!!)
[1] sys cmdlog
[2] sys cmdlog ?
[3] sys ?
[4] sys cfg status
[5] sys cfg ?
Syntax
sys ftpd on
sys ftpd off
Syntax Description
Parameter Description
on It means to turn on the FTP server of the system.
off It means to turn off the FTP server of the system.
Example
> sys ftpd on
% sys ftpd turn on !!!
Syntax
sys domainname <wan1/wan2> <Domain Name Suffix>
sys domainname <wan1/wan2> clear
Syntax Description
Parameter Description
wan1/wan2 It means to specify WAN interface for assigning a name for it.
Domain Name Suffix It means the name for the domain of the system. The maximum
number of characters that you can set is 39.
clear It means to remove the domain name of the system.
Example
> sys domainname wan1 clever
> sys domainname wan2 intellegent
> sys domainname ?
% sys domainname <wan1/wan2> <Domain Name Suffix (max. 39 characters)>
% sys domainname <wan1/wan2> clear
% Now: wan1 == clever, wan2 ==intelligent
>
Example
> sys iface
Interface 0 Ethernet:
Status: UP
IP Address: 192.168.1.1 Netmask: 0xFFFFFF00 (Private)
IP Address: 0.0.0.0 Netmask: 0xFFFFFFFF
MAC: 00-50-7F-00-00-00
Interface 4 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-02
Interface 5 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-03
Interface 6 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-04
Interface 9 Ethernet:
Status: DOWN
IP Address: 0.0.0.0 Netmask: 0x00000000
MAC: 00-50-7F-00-00-07
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
>
Syntax
sys name <wan1/wan2> <ASCII string>
sys name <wan1/wan2> clear
Syntax Description
Parameter Description
wan1/wan2 It means to specify WAN interface for assigning a name for it.
ASCII string It means the name for router. The maximum character that you can
set is 39.
Example
> sys name wan1 drayrouter
> sys name ?
% sys name <wan1/wan2> <ASCII string (max. 20 characters)>
% sys name <wan1/wan2> clear
% Now: wan1 == drayrouter, wan2 ==
Note: The name can be used to recognize router’s identification in SysLog dialog.
Syntax
sys passwd <old password> <new password>
Syntax Description
Parameter Description
<old password> <new It means the password for administrator. The maximum character
Example
> sys passwd admin admin123
Password change successful !!!
> sys passwd admin123 admin
Password change successful !!!
Example
> sys reboot
>
Syntax
sys autoreboot <on/off/hour(s)>
Syntax Description
Parameter Description
on/off On – It means to enable the function of auto-reboot.
Off – It means to disable the function of auto-reboot.
hours It means to set the time schedule for router reboot.
For example, if you type “2” in this field, the router will reboot
with an interval of two hours.
Example
> sys autoreboot on
autoreboot is ON
> sys autoreboot 2
autoreboot is ON
autoreboot time is 2 hour(s)
Example
> sys commit
>
Example
> sys tftpd
% TFTP server enabled !!!
Example
> sys cc
Country Code : 0x 0 [International]
Wireless Region Code: 0x30
>
Example
> sys version
Router Model: Vigor1000B Version: 3.9.6.2 English
Profile version: 4.0.3 Status: 1 (0x45567207)
Router IP: 192.168.1.1 Netmask: 255.255.255.0
Firmware Build Date/Time: May 26 2021 22:37:34
Router Name: DrayTek
Revision: 1681_445_d90e70c V385_396
>
Example
> sys qrybuf
System Memory Status and Leakage List
Syntax
sys pollbuf on
sys pollbuf off
Syntax Description
Parameter Description
on It means to turn on pulling buffer.
off It means to turn off pulling buffer.
Example
> sys pollbuf on
% Buffer polling is on!
Syntax
sys tr069 get <parm> <option>
sys tr069 set <parm> <value>
sys tr069 getnoti <parm>
sys tr069 setnoti <parm> <value>
sys tr069 log
sys tr069 debug <on/off>
sys tr069 save
sys tr069 clear
sys tr069 inform <event code>
sys tr069 port <port num>
sys tr069 cert_auth <on/off>
sys tr069 only_standard_parm <on/off>
Syntax Description
Parameter Description
get <parm> <option> It means to get parameters for tr-069.
option=<nextlevel>: only gets nextlevel for GetParameterNames.
set <parm> <value> It means to set parameters for tr-069.
getnoti <parm> It means to get parameter notification value.
setnoti <parm> <value> It means to set parameter notification value.
Log It means to display the TR-069 log.
debug <on/off> on: turn on the function of sending debug message to syslog.
off: turn off the function of sending debug message to syslog.
save It means to save the parameters to the flash memory of the router.
clear It means to clear all tr069 parameters in the flash memory of the
router.
Inform <event code> It means to inform parameters for tr069 with different event codes.
[event code] includes:
0-"0 BOOTSTRAP",
1-"1 BOOT",
2-"2 PERIODIC",
3-"3 SCHEDULED",
4-"4 VALUE CHANGE",
5-"5 KICKED",
6-"6 CONNECTION REQUEST",
7-"7 TRANSFER COMPLETE",
8-"8 DIAGNOSTICS COMPLETE",
9-"M Reboot"
port <port num> It means to change tr069 listen port number.
cert_auth <on/off> on: turn on certificate-based authentication.
off: turn off certificate-based authentication.
only_standard_parm It means to turn on or off to exclude all the Vendor-Specific ("X_")
<on/off> parameters, and only send out standard parameters.
notify -n <on/off> It means to set CPE notification settings.
It means to / not to record the CPE notify log on the Syslog.
on: Record on the Syslog.
off: Not record on the Syslog.
notify -l <on/off> It means to / not to record the web login log on the Syslog.
on: Record on the Syslog.
off: Not record on the Syslog.
notify -c <on/off> It means to / not to record the web changed log on the Syslog.
on: Record on the Syslog.
Example
> sys tr069 get InternetGatewayDevice.ManagementServer.
Total number of parameter is 98
Total content length of parameter is 6473
InternetGatewayDevice.ManagementServer.URL= http://192.168.100.10:8080/ACSServer
/services/ACSServlet
InternetGatewayDevice.ManagementServer.Username= fae
InternetGatewayDevice.ManagementServer.Password=
InternetGatewayDevice.ManagementServer.PeriodicInformEnable= 0
InternetGatewayDevice.ManagementServer.PeriodicInformInterval= 900
InternetGatewayDevice.ManagementServer.PeriodicInformTime= 1970-01-01T00:00:00
InternetGatewayDevice.ManagementServer.ParameterKey=
InternetGatewayDevice.ManagementServer.ConnectionRequestURL= http://192.168.100.
1:8069/cwm/CRN.html
InternetGatewayDevice.ManagementServer.ConnectionRequestUsername= vigor
InternetGatewayDevice.ManagementServer.ConnectionRequestPassword=
InternetGatewayDevice.ManagementServer.UpgradesManaged= 0
InternetGatewayDevice.ManagementServer.UDPConnectionRequestAddress= 111.251.214.
196:38518
InternetGatewayDevice.ManagementServer.UDPConnectionRequestAddressNotification-L
imit= 0
InternetGatewayDevice.ManagementServer.STUNEnable= 0
InternetGatewayDevice.ManagementServer.STUNServerAddress=
InternetGatewayDevice.ManagementServer.STUNServerPort= 3478
InternetGatewayDevice.ManagementServer.STUNUsername=
InternetGatewayDevice.ManagementServer.STUNPassword=
InternetGatewayDevice.ManagementServer.STUNMaximumKeepAlivePeriod= -1
InternetGatewayDevice.ManagementServer.STUNMinimumKeepAlivePeriod= 60
InternetGatewayDevice.ManagementServer.NATDetected= 0
InternetGatewayDevice.ManagementServer.ManageableDeviceNumberOfEntries= 0
InternetGatewayDevice.ManagementServer.CPEEnable= 1
InternetGatewayDevice.ManagementServer.ApplyApEnable= 0
InternetGatewayDevice.ManagementServer.ApplyApPassword=
InternetGatewayDevice.ManagementServer.BWUNEnable= 1
InternetGatewayDevice.ManagementServer.BWUNPeriodic= 3
InternetGatewayDevice.ManagementServer.BWUNWANNumberOfEntries= 12
InternetGatewayDevice.ManagementServer.BWUNWAN.1.Enable= 0
InternetGatewayDevice.ManagementServer.BWUNWAN.1.Medium= 0
InternetGatewayDevice.ManagementServer.BWUNWAN.1.High= 0
InternetGatewayDevice.ManagementServer.BWUNWAN.1.TX= 0
Syntax
sys health cpu_usage
sys health mem_usage
sys health arp_status
sys health dos_status
sys health sess_usage
sys health view
sys health vpn_status
sys health voip_status
Syntax Description
Parameter Description
<command><parameter> The available commands with parameters are listed below.
cpu_usage -E <1/0> : Enable/disable this health parameter settings-CPU
<command><parameter> usage.
-w <threshold> : Sets the warning threshold, 0-100 percent.
-e <threshold> : Sets the emergency threshold, 0-100 percent.
-r <interval> : Sets the warning report interval, 1-1440 min.
-m <interval> : Sets the emergency report interval, 1-1440 min.
mem_usage - E <1/0> : Enable/disable this health parameter settings-memory
<command><parameter> usage.
-w <threshold> : Sets the warning threshold, 0-100 percent.
-e <threshold> : Sets the emergency threshold, 0-100 percent.
-r <interval> : Sets the warning report interval, 1-1440 min.
-m <interval> : Sets the emergency report interval, 1-1440 min.
arp_status -E <1/0> : Enable/disable this health parameter settings-ARP
<command><parameter> status.
-w <threshold> : Warning threshold, 0-100 percent.
-e <threshold> : Emergency threshold, 0-100 percent.
-r <interval>: Warning report interval, 1-1440 min.
-m <interval>: Emergency report interval, 1-1440 min.
dos_status -E <1/0>: Enable / disable this health parameter settings-DoS
<command><parameter> status.
-r <interval>: Warning report interval, 1-1440 min.
-m <interval>: Emergency report interval, 1-1440 min.
sess_usage -E <1/0>: Enable/disable this health parameter setting-session
<command><parameter> usage.
-w <threshold> : Warning threshold, 0-100 percent.
-e <threshold> : Emergency threshold, 0-100 percent.
-r <interval>: Warning report interval, 1-1440 min.
-m <interval>: Emergency report interval, 1-1440 min.
View Displays current settings for health parameters.
Example
> sys health vpn_status -m 30
% Set emergency interval to 30 min.
> sys health view
% Warning Emergency
% ------------------------------------------------------------------
% [ ] CPU Status Threshold: 90 95
% Report Interval: 5 2
% ------------------------------------------------------------------
% [ ] Memory Status Threshold: 88 95
% Report Interval: 5 2
% ------------------------------------------------------------------
% [ ] ARP Status Threshold: 60 80
% Report Interval: 15 5
% ------------------------------------------------------------------
% [ ] Session Usage Threshold: 60 80
% Report Interval: 15 5
% ------------------------------------------------------------------
% [ ] DDoS Status Report Interval: 5 1
% ------------------------------------------------------------------
% [ ] VPN Status Report Interval: 0 30
% ------------------------------------------------------------------
% [ ] VoIP R-Factor Threshold: 60 40
% Report Interval: 1 1
Syntax
sys alg -e <0/1>
Syntax Description
Parameter Description
1 It means to enable ALG master switch.
0 It means to disable ALG master switch.
Example
Syntax
sys sip_alg <command> <parameter>
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one
line.
-e <0/1> 0: Disable the function of SIP ALG.
1: Enable the function of SIP ALG.
-p <parameter> It means to set the listening port for SIP ALG.
<parameter> : Ranges from 1 to 65535.
-u It means to enable or disable the listen along UDP path
setting.
0: Disable
1: Enable
-t It means to enable or disable the listen along TCP path
setting.
0: Disable
1: Enable
Example
> sys sip_alg -e 1
Enable SIP ALG
> sys sip_alg -p 65535
Current listening port: 65535
Syntax
sys rtsp_alg <command> <parameter>
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<parameter>|…] […] means that you can type in several commands in one
line.
-e <0/1> 0: Disable the function of RTSP ALG.
1: Enable the function of RTSP ALG.
-p <parameter> It means to set the listening port for SIP ALG.
<parameter> : Ranges from 1 to 65535.
-u It means to enable or disable the listen along UDP path
setting.
0: Disable
1: Enable
-t It means to enable or disable the listen along TCP path
setting.
0: Disable
1: Enable
-v It means to show RTP and RTCP portmap information of RTSP
ALG.
Example
> sys rtsp_alg -p 333
Current listening RTSP Port: 333
> sys rtsp_alg -v
Current Open PortMap Number of RTSP ALG: 0
Syntax
sys license reset_regser
sys license licera
sys license licifno <AUTO/WAN#>
sys license licalias <index>
sys license lic_trigger
sys license liclog
Syntax Description
Example
> sys license licifno wan3
Download interface is set as "WAN3" now.
> sys license licifno
License and Signature download interface setting:
licifno [AUTO/WAN#]
Ex: licifno wan1
Download interface is "WAN3" now.
Syntax
sys fr_log
Example
> sys fr_log ?
-----------------------------------------------------------------
Syntax
sys arp_AutoReq –d <value>
Syntax Description
Parameter Description
-d <value> Disable the function of ARP auto request.
0 – Enable
1 – Disable
Syntax
sys daylightsave [-<command> <parameter> | ... ]
Syntax Description
Parameter Description
[<command><parameter>|… The available commands with parameters are listed below.
] […] means that you can type in several commands in one line.
-v Display the daylight saving settings.
-r Set to factory default setting.
-e <1/0> Enable (1) / disable (0) daylight saving.
-t <0/1/2> Specify the saving type for daylight setting.
0 – Default
1 – Time range
2 - Yearly
-s <year> <month> <day> Set the detailed settings of the starting day for time range type.
<hour> year – must be the year after 2013.
month - 1 ~ 12
day – 1 ~ 31
hour – 0 ~ 23
e.g., sys daylightsave -s 2014 3 10 12
-d <year> <month> <day> Set the detailed settings of the ending day for time range type.
<hour> year – After 2013.
month - 1 ~ 12
day – 1 ~ 31
hour – 0 ~ 23
e.g., sys daylightsave -d 2014 9 10 12
-y <month> <th weekday> Set the detailed settings of the starting day for yearly type.
<day in week> <hour> month - 1 ~ 12
th weekday – 1 ~ 5, 9: last week
day in week - 0:Sun, 1:Mon, 2:Tue, 3:Wed, 4:Thu, 5: Fri, 6:Sat
hour – 0 ~ 23
e.g, sys daylightsave -y 9 1 0 14
-z <month> <th weekday> Set the detailed settings of the ending day for yearly type.
<day in week> <hour> month - 1 ~ 12
th weekday – 1 ~ 5, 9: last week
day in week - 0:Sun, 1:Mon, 2:Tue, 3:Wed, 4:Thu, 5: Fri, 6:Sat
hour – 0 ~ 23
e.g, sys daylightsave -z 3 1 6 14
Example
Syntax
sys dnsCacheTbl [<command><parameter>|…]
Syntax Description
Parameter Description
[<command><parameter>|… The available commands with parameters are listed below.
] […] means that you can type in several commands in one line.
-l Display DNS IPv4 entry in the DNS cache table.
-s Display DNS IPv6 entry in the DNS cache table.
-v Display the TTL limit value in the DNS cache table.
-t < ttl > Set the TTL limit value (0 /n) in the DNS cache table.
0 - No limit
n – Greater than or equal to 5.
-c Clear the DNS cache table.
Example
> sys dnsCacheTbl -l
%DNS Cache Table List
swm.draytek.com 192.168.18.18 601454 Black List
relay-20c8ac21.net.anydesk.com 84.17.34.77 11530 Black List
auth.draytek.com 35.189.201.134 602322 Black List
www.draytek.com 104.25.10.249 601712 Black List
ms.draytek.com 172.16.2.8 601448 Black List
> sys dnsCacheTbl -l
%DNS Cache Table List
DrayTek> sys dnsCacheTbl -t 50
% Set TTL limit: 50 seconds.
% When TTL larger than 50s , delete the DNS entry in the router's DNS cache
table.
DrayTek> sys dnsCacheTbl -v
% TTL limit: 50 seconds
% When TTL larger than 50s , delete the DNS entry in the router's DNS cache
table.
Syntax Description
Parameter Description
Syntax
sys mailalert [-<command> <parameter>]
Syntax Description
Parameter Description
Syntax
sys time server <domain>
sys time inquire
sys time show
sys time wan <option>
sys time zone <index>
sys time pseudo
Syntax Description
Parameter Description
domain Enter the domain name of the time server. The maximum length is
39 characters.
inquire Get the time based on the timer server settting.
Example
> sys time pseudo -E 1
> sys time zone 8
Set Time Zone OK
Syntax
sys eap_tls set <0/1>
Syntax Description
Parameter Description
0 Disable EAP-TLS compatibility!
1 Enable EAP-TLS compatibility!
Example
> sys eap_tls set 1
Enable EAP_TLS compatibility!
Syntax
sys dashboard [-<command> <value> | ... ]
sys dashboard show
Syntax Description
Parameter Description
[<command> The available commands with parameters are listed below.
<value>|…] […] means that you can type in several parameters in one line.
<command> “0 ~ 9” and “a” represent different sections to be
displayed on the dashboard.
0 : Front Panel
1 : System Information
2 : IPv4 LAN Information
3 : IPv4 Internet Access
4 : IPv6 Internet Access
5 : Interface
6 : Security
Example
> sys dashboard -0 1
Front Panel enabled
> sys dashboard show
Front Panel enabled
System Information enabled
IPv4 LAN Information enabled
IPv4 Internet Access enabled
IPv6 Internet Access enabled
Interface enabled
Security enabled
System Resource enabled
LTE Status enabled
Quick Access enabled
VoIP enabled
>
Syntax
sys max_session <150K/300K/500K/1000K>
Syntax Description
Parameter Description
<150K/300K/500K/1000K> At present, there are four values avaiable for selection.
Example
> sys max_session 150K
Please reboot to apply settings of MAX sessions : 150K
Example
> testmail
Send out test mail
Mail Alert:[Enable]
Interface :Any
WAN_Alias index:[0]
SMTP_Server:[255.255.255.255]
Example
>upnp off
UPNP say bye-bye
Example
>upnp on
UPNP start.
Example
> upnp nat ?
****************** IGD NAT Status ****************
((0))
InternalClient >>192.168.1.10<<, RemoteHost >>0.0.0.0<<
InternalPort >>21<<, ExternalPort >>21<<
PortMapProtocol >>TCP<<
The tmpvirtual server index >>0<<
PortMapLeaseDuration >>0<<, PortMapEnabled >>0<<
Ftp Example [MICROSOFT]
((1))
InternalClient >>0.0.0.0<<, RemoteHost >>0.0.0.0<<
InternalPort >>0<<, ExternalPort >>0<<
PortMapProtocol >><NULL><<
The tmpvirtual server index >>0<<
PortMapLeaseDuration >>0<<, PortMapEnabled >>0<<
PortMapProtocol >><NULL><<
The tmpvirtual server index >>0<<
PortMapLeaseDuration >>0<<, PortMapEnabled >>0<<
0<<
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page] ---
...
Example
> upnp on
UPNP start.
Example
> upnp on
UPNP start.
> upnp subscribe
> upnp subscribe
>>>> (1) serviceType urn:schemas-microsoft-com:service:OSInfo:1
sid = 7a2bbdd0-0047-4fc8-b870-4597b34da7fb
expireTime =6926
active =1
DeliveryURLs
=<http://192.168.1.113:2869/upnp/eventing/twtnpnsiun>
sid = d9cd47a5-d9c9-4d3d-8043-d03a82f27983
Example
> upnp tmpvs
****************** Temp virtual server status ****************
((0))
real_addr >>192.168.1.10<<, pseudo_addr >>172.16.3.229<<
real_port >>0<<, pseudo_port >>0<<
hit_portmap_index >>0<<
The protocol >>TCP<<
time >>0<<
((1))
real_addr >>0.0.0.0<<, pseudo_addr >>0.0.0.0<<
real_port >>0<<, pseudo_port >>0<<
hit_portmap_index >>0<<
The protocol >>0<<
time >>0<<
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
---
Syntax
upnp wan <n>
Syntax Description
Parameter Description
n It means to specify WAN interface (0 to 12) to apply UPnP.
n=0, it means to auto-select WAN interface.
n=1, WAN1
n=2, WAN2 ……….
Example
Syntax Description
usb user add <Index> <Username> <Password> <Permission> <Home path>
usb user rm <Index>
usb user enable <Index>
usb user disable <Index>
usb user list
Syntax Description
Parameter Description
add <Index> <Username> Add a new user profile.
<Password> <Permission> <Index> - It means the index number of the user profile. There are
<Home path> 16 profiles allowed to be configured. So the range of such option is
1 ~ 16.
<Username> - Type a text (maximum 131 characters) as the
username for the user profile.
<Password> - Type a text (maximum 131 characters) as the
password for the user profile.
<Permission> - Specify the action (RWDLCR) permitted. If one of the
actions is not allowed, simple type “-” instead.
R – Read File.
W – Write File.
D – Delete File.
L – List directory.
C – Create directory.
R – Remove selected directory.
<Home path> - Set the path (maximum 159 characters) for the USB
user profile.
rm <Index> Delete an existed user profile.
<Index> - It means the index number of the user profile. There are
16 profiles allowed to be configured. So the range of such option is
1 ~ 16.
enable <Index> Enable a user profile.
<Index> - It means the index number of the user profile. There are
16 profiles allowed to be configured. So the range of such option is
1 ~ 16.
disable <Index> Disable a user profile.
<Index> - It means the index number of the user profile. There are
16 profiles allowed to be configured. So the range of such option is
1 ~ 16.
list Display all of the user profile.
Example
> usb user add 1 root 1234 R-DLCR /usr
>
Syntax Description
usb temp set <c|-f|-a|-b|-m|-u|-l|-r>
usb temp show
usb temp all_data
Syntax Description
Parameter Description
set -c Set the temperature unit (Celsius).
set -f Set the temperature unit (Fahrenheit).
set -a Set the temperature sensor by using a probe or the built-in sensor
automatically.
The probe will be detected and used first, and fall back to the
built-in sensor if the probe is not detected.
set -b Set to use the built-in sensor.
set -m <0/1> Enable or disable the Alarm Setting.
1: Enable
0: Disable
set -u <value> Set the upper temperature limit.
<value>: Enter a value, e.g., 30.35.
set -l <value> Set the lower temperature limit.
<value>: Enter a value, e.g., 10.35.
set -r Shows the setting of temperature unit and sensor type.
show Displays current temperature.
all_data Displays all temperature data.
Example
> usb temp set -r
Show setting:temp set -r
Syntax Description
usb hum set <-m|-u|-l|-r>
usb hum show
usb hum all_data
Syntax Description
Parameter Description
set -m Enable or disable the Alarm Setting.
1: Enable
0: Disable
set -u <value> Set the upper humidity limit.
<value>: Enter a value, e.g., 70.85.
set -l <value> Set the lower humidity limit.
<value>: Enter a value, e.g., 30.12.
set -r Shows the setting of the humidity.
show Displays current humidity.
all_data Displays all humidity data.
Example
> usb hum set -m 1
Enable Alarm Settings.
Syntax Description
vigbrg set -v <IP version> -w <WAN_idx> -l <LAN_idx> -e <0/1> -f <0/1>
Syntax Description
Parameter Description
-v <IP version> Indicate the IP version for the IP address.
4 – IPv4.
6 – IPv6.
-w <WAN_idx> WAN_idx – Indicate the WAN interface.
1 – WAN1
2 – WAN2
3 – WAN3
4 – WAN4
5 - WAN5
...
12 - WAN12
-l <LAN_idx> LAN_idx – Indicate the LAN interface.
1 – LAN1
2 – LAN2
3 – LAN3
4 – LAN4
5 - LAN5
6 - LAN6
....
100 - LAN100
e <0/1> Enable (1) or disable (0) the Vigor Bridge for WAN or/and LAN.
f <0/1> Enable (1) or disable (0) the firewall functions.
Example
> vigbrg set -v 4 -w 10 -l 100 -e 1
[WAN10] IPv4 bridge is enable. Set subnet[LAN100]
Example
> vigbrg closeall
Close all bridge and bridge firewall
Example
> vigbrg status
Show gConfig setting of bridge mode
[WAN10] IPv4 bridge is enable [LAN100].
>
Syntax
vigbrg cfgip <IP Address>
Syntax Description
Parameter Description
<IP Address> It means to type an IP address for users to manage the router.
Example
> vigbrg cfgip 192.168.1.15
> vigbrg cfgip ?
% Vigor Bridge Config IP,
% Now: 192.168.1.15
Example
> vigbrg wanstatus
Vigor Bridge: Stop
WAN mac table:
Index MAC Address Stamp Time PVC VLan Port
>
Example
> vigbrg wlanstatus
Vigor Bridge: Running
Syntax
vlan group id <set/set_ex> <p2/p7/p8/p9/p10>
Syntax Description
Parameter Description
id It means the group 0 to 99 for VLAN.
set It indicates each port can join more than one VLAN group.
set_ex It indicates each port can join one VLAN group at one time.
p2/p7/p8/p9/p10 It indicates LAN port 2 to LAN port 10. To group LAN2, LAN4,
LAN9, LAN10, LAN11 and/or LAN12 under one VLAN group,
please type the port number(s) you want.
Example
> vlan group 3 set p2 p7
OK.
Use cmd 'vlan status' if you want to check result.
> vlan status
VLAN is Disable :
---------------------------------------------------------------------
VLAN Enable VID Pri p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 subnet
---------------------------------------------------------------------
0 OFF 0 0 1:LAN1
1 OFF 0 0 1:LAN1
2 OFF 0 0 1:LAN1
3 OFF 0 0 V V 1:LAN1
4 OFF 0 0 1:LAN1
5 OFF 0 0 1:LAN1
6 OFF 0 0 1:LAN1
7 OFF 0 0 1:LAN1
8 OFF 0 0 1:LAN1
9 OFF 0 0 1:LAN1
10 OFF 0 0 1:LAN1
11 OFF 0 0 1:LAN1
12 OFF 0 0 1:LAN1
13 OFF 0 0 1:LAN1
14 OFF 0 0 1:LAN1
15 OFF 0 0 1:LAN1
16 OFF 0 0 1:LAN1
17 OFF 0 0 1:LAN1
18 OFF 0 0 1:LAN1
19 OFF 0 0 1:LAN1
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page]
Syntax
vlan off
Example
> vlan off
VLAN is Disable!
>
Syntax
vlan on
Example
> vlan on
VLAN is Enable!
>
Syntax
vlan pri n pri_no
Syntax Description
Parameter Description
n It means VLAN ID number.
n=VLAN ID number (from 0 to 7).
pri_no It means the priority of VLAN profile.
pri_no=0 ~7 (from none to highest priority).
Example
> vlan pri 1 2
VLAN1: Priority=2
>
Syntax
vlan restart
Syntax
vlan status
Example
> vlan status
VLAN is Disable :
---------------------------------------------------------------------
VLAN Enable VID Pri p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 subnet
---------------------------------------------------------------------
0 OFF 0 0 1:LAN1
1 OFF 0 2 1:LAN1
2 OFF 0 0 1:LAN1
3 OFF 0 0 V V 1:LAN1
4 OFF 0 0 1:LAN1
5 OFF 0 0 1:LAN1
6 OFF 0 0 1:LAN1
7 OFF 0 0 1:LAN1
8 OFF 0 0 1:LAN1
9 OFF 0 0 1:LAN1
10 OFF 0 0 1:LAN1
11 OFF 0 0 1:LAN1
12 OFF 0 0 1:LAN1
13 OFF 0 0 1:LAN1
14 OFF 0 0 1:LAN1
15 OFF 0 0 1:LAN1
16 OFF 0 0 1:LAN1
17 OFF 0 0 1:LAN1
18 OFF 0 0 1:LAN1
19 OFF 0 0 1:LAN1
--- MORE --- ['q': Quit, 'Enter': New Lines, 'Space Bar': Next Page] ---
>
Syntax
vlan subnet group_id
<1/2/3/4/5/6/7/8/9/10/11/12/13/14/15/16/17/18/19/20/21/22/23/24/25/26/27/28/29/
30/31/32/33/34/35/36/37/38/39/40/41/42/43/44/45/46/47/48/49/50/51/52/53/54/55/5
6/57/58/59/60/61/62/63/64/65/66/67/68/69/70/71/72/73/74/75/76/77/78/79/80/81/82
/83/84/85/86/87/88/89/90/91/92/93/94/95/96/97/98/99/100>
Syntax Description
Example
> vlan subnet group_id 2
% Vlan Group-0 using LAN2 !
Syntax
vlan submode <on/off/status>
Syntax Description
Parameter Description
on It means to enable the promiscuous mode.
off It means to enable the normal mode.
status It means to display if submode is normal mode or
promiscuous mode.
Example
> vlan submode on
% vlan subnet mode modified to promiscuous mode.
> vlan submode status
% vlan subnet mode : promiscuous mode
>
Syntax
vlan tagged <n> <on/off>
vlan tagged <unlimited> <on/off>
Syntax Description
Parameter Description
n It means VLAN channel.
The ranage is from 0 to 99.
on/off It means to enable/disable the tagged VLAN.
<unlimited> <on/off> unlimited on: It allows the incoming of untagged packets
even all VLAN are tagged.
unlimited off: It does not allows the incoming of untagged
packets.
<p1_untag> <on/off> P1_untag on: It allows the incoming of untagged packets
form LAN port 1.
P1_untag off: It does not allow the incoming of untagged
packets from LAN port 1.
Example
> vlan tagged unlimited on
Unlimited mode is ON
>
Syntax
vlan vid n vid_no
Syntax Description
Parameter Description
n It means VLAN channel.
The range is from 0 to 7.
vid_no It means the value of VLAN ID. Enter the value as the VLAN ID
number. The range is form 0 to 4095.
Example
> vlan vid 1 4095
VLAN1, vid=4095
>
Syntax
vlan sysvid <show / n>
Example
> vlan sysvid 100
You have set system VLAN ID to range: 100 ~ 367,
We recommend that you reboot the system now.
> vlan sysvid 200
You have set system VLAN ID to range: 200 ~ 467,
We recommend that you reboot the system now.
> vlan sysvid show
The system VLAN ID is in range: 200 ~ 467
Syntax
vpn l2lset <list index> peerid <peerid>
vpn l2lset <list index> localid <localid>
vpn l2lset <list index> main <auto/proposal index>
vpn l2lset <list index> aggressive <desg1/desg2/aesg1/aesg2/aesg5/aesg14>
vpn l2lset <list index> pfs <on/off>
vpn l2lset <list index> phase1<lifetime>
vpn l2lset <list index> phase2<lifetime>
vpn l2lset <list index> x509localid <0/1>
Syntax Description
Parameter Description
<list index> peerid <peerid> It means to set the L2L (LAN to LAN) profile with peer identity for
aggressive mode.
<list index> - Enter the index number of L2L (LAN to LAN) profile.
<peerid> - Enter the peer identity string for aggressive mode.
<list index> localid <localid> It means to set L2L (LAN to LAN) profile with local identity for
aggressive mode.
<list index> - Enter the index number of L2L (LAN to LAN) profile.
<localid> - Enter the ocal identity for aggressive mode.
<list index> main It means to choose proposal for main mode.
<auto/proposal index> <list index> - Enter the index number of L2L (LAN to LAN) profile.
<auto/proposal index> - Select auto (choose default proposal),
proposal (choose specified proposal.), or index number.
<list index> aggressive It means the chosen DH group for aggressive mode.
<desg1/desg2/aesg1/aesg2/ <list index> - Enter the index number of L2L (LAN to LAN) profile.
Example
> vpn l2lset 1 peerid 102
> vpn l2lset setdefault
setdefault!
Syntax
vpn l2lDrop l2lname <name>
vpn l2lDrop l2lidx <idx>
vpn l2lDrop h2lname <name>
vpn l2lDrop h2lidx <idx>
vpn l2lDrop <ifno>
vpn l2lDrop
Syntax Description
Parameter Description
l2lname <name> Terminate LAN to LAN VPN profile by specifying the profile
name.
l2lidx <idx> Terminate LAN to LAN profile name by specifying the index
number (1 to 192) of the profile.
h2lname <name> Terminate remote dial-in user profile (1 to 200) by specifying
the profile name.
h2lidx <idx> Terminate remote dial-in user profile by specifying the index
number (1 to 200) of the profile.
<ifno> Drop VPN with interface number. This is for debug only.
l2lDrop It means to drop all VPN connections.
Example
> vpn l2lDrop
% Drop all VPN
Syntax
vpn l2lDialout <idx>
vpn l2lDialout list
Syntax Description
Parameter Description
l2lDialout <idx> It means to build VPN connection by specifying the index number of
dial-out LAN to LAN profile.
<idx>: Enter an index number (1 to 32).
List It means to display LAN to LAN profiles (enabled).
Example
> vpn l2lDialout list
List LAN to LAN profiles of the status as Enable
Index Profile Status
Syntax
vpn dinset <list index>
vpn dinset <list index> <on/off>
vpn dinset <list index> username <USERNAME>
vpn dinset <list index> password <PASSWORD>
vpn dinset <list index> motp <on/off>
vpn dinset <list index> pin_secret <pin> <secret>
vpn dinset <list index> timeout <value>
vpn dinset <list index> dintype <Type> <on/off>
Syntax Description
Parameter Description
<list index> It means the index number of the profile.
<on/off> It means to enable or disable the profile.
on – Enable.
off – Disable.
username <USERNAME> It means to set the username for the remote dial-in VPN profile.
password <PASSWORD> It means to set the passowrd for the remote dial-in VPN profile.
motp <on/off> It means to enable or disable the authentication with mOTP
function.
on – Enable.
off – Disable.
Example
> vpn dinset 1
Password:
PIN: 1234
Secret: e759bb6f0e94c7ab4fe6
Syntax
vpn subnet <index> <1/2/3/.../100>
Syntax Description
Parameter Description
<index> It means the index number of the VPN profile.
<1/2/3/.../100> 1 – it means LAN1
2 – it means LAN2.
3 – it means LAN3
4 – it means LAN4.
...
100 – it means LAN100
Example
> vpn subnet 1 2
>
Syntax
Command of PPTP Dial-Out
vpn setup <index> <name> pptp_out <ip> <usr> <pwd> <nip> <nmask>
Command of IPSec Dial-Out
vpn setup <index> <name> ipsec_out <ip> <key> <nip> <nmask>
Command of L2Tp Dial-Out
vpn setup <index> <name> l2tp_out <ip> <usr> <pwd> <nip> <nmask>
Command of Dial-In
vpn setup <index> <name> dialin <ip> <usr> <pwd> <key> <nip> <nmask>
Syntax Description
Parameter Description
For PPTP Dial-Out
<index> It means the index number of the profile.
<name> It means the name of the profile.
<ip> It means the IP address to dial to.
<usr> <pwd> It means the user and the password required for the PPTP
connection.
<nip> <nmask> It means the remote network IP and the mask.
e.g.,
vpn setup 1 name1 pptp_out 1.2.3.4 vigor 1234 192.168.1.0
255.255.255.0
Example
> vpn setup 1 name1 dialin 1.2.3.4 vigor 1234 abc 192.168.1.0
255.255.255.0
% Profile Change Log ...
% Profile Index : 1
% Profile Name : name1
% Username : vigor
% Password : 1234
% Pre-share Key : abc
% Call Direction : Dial-In
% Type of Server : ISDN PPTP IPSec L2TP
% Dial from : 1.2.3.4
% Remote NEtwork IP : 192.168.1.0
% Remote NEtwork Mask : 255.255.255.0
>
Syntax
vpn option <index> <cmd1>=<param1> [<cmd2>=<para2> | ... ]
Syntax Description
Parameter Description
<index> It means the index number of the profile.
Available index numbers:
1 ~ 500
For Common Settings
<index> It means the index number of the profile.
pname It means the name of the profile.
ena It means to enable or disable the profile.
on – Enable
off - Disable
thr It means the way that VPN connection passes through. Available
settings are wlf, wlo, w2f, w2o, w1oB and w2oB.
w1f – WAN1 First.
w1o – WAN1 Only.
w2f – WAN2 First.
w2o – WAN2 Only.
w1oB - WAN1 Only (Only establish VPN if WAN2 down)
w2oB - WAN2 Only (Only establish VPN if WAN1 down)
thr_ai It means the connection through WAN IP Alias index.
Range from 0 to 299.
nnpkt It means the NetBios Naming Packet.
on – Enable the function to pass the packet.
off – Disable the function to block the packet.
dir It means the call direction. Available settings are b, o and i.
b – Both
o – Dial-Out
i – Dial-In.
idle=[value] It means Always on and Idle Time out.
Available values include:
-1 – it means always on for dial-out.
0 – it means always on for dial-in.
Other numbers (e.g., idle=200, idle=300, idle=500) mean the router
will be idle after the interval (seconds) configured here.
palive It means to enable PING to keep alive.
-1 – disable the function.
1,2,3,4 – Enable the function and PING IP 1.2.3.4 to keep alive.
For Dial-Out Settings
ctype It means “Type of Server I am calling”.
“ctype=t” means PPTP.
“ctype=s” means IPSec.
“ctype= l” means L2TP(IPSec Policy None).
Example
> vpn option 1 idle=250
% Change Log..
Syntax
vpn mroute <index> list
vpn mroute <index> add <network ip>/<mask>
vpn mroute <index> del <network ip>/<mask>
Syntax Description
Parameter Description
list It means to display all of the route settings.
add It means to add a new route.
del It means to delete specified route.
<index> It means the index number of the profile.
Available index numbers:
1 ~ 500
<network ip>/<mask> Enter the IP address with the network mask address.
Example
> vpn mroute 1 add 192.168.5.0/24
% 192.168.5.0/24
% Add new route 192.168.5.0/24 to profile 1
Syntax
vpn list <index> all
vpn list <index> com
vpn list<index> out
vpn list <index> in
vpn list<index> net
Syntax Description
Parameter Description
all It means to list configuration of the specified profile.
com It means to list common settings of the specified profile.
out It means to list dial-out settings of the specified profile.
in It means to list dial-in settings of the specified profile.
net It means to list Network Settings of the specified profile.
Example
> vpn list 32 all
% Common Settings
% Dial-out Settings
% Dial-In Settings
% Allow Dial-in Type : ISDN IPsec L2TP (IPsec Policy None)
% Specify CLID/Number/IP : off
% Username : ???
% Password :
% VJ Compression : on
% Pre-Shared Key :
% IPsec Security Method : AH DES 3DES AES
% Callback Function : off
% Callback Number : off
% Callback Budget : 0
% Network Settings
% My Wan IP : 0.0.0.0
% Remote Gateway IP : 0.0.0.0
% Remote Network IP : 0.0.0.0
% Remote Network Mask : 255.255.255.0
% Local Network IP : 0.0.0.0
% Local Network Mask : 0.0.0.0
% RIP Direction : Disable
% Mode : Route Mode
% Change default route : Off
>
Syntax
Syntax Description
Parameter Description
<PPTP/IPsec/L2TP/SSLVPN> There are several types to be selected.
<on/off> on – enable VPN remote setting.
off – disable VPN remote setting.
Example
> vpn remote PPTP on
Set PPTP VPN Service : On
Syntax Description
Parameter Description
show_usable Display a list of LAN to LAN dial out profiles.
backup <add/del> <name> Set multiple VPN tunnels (LAN to LAN profiles) as backup tunnel.
<Member#1> <Member#2> add/del - Add or delete a profile for used in VPN Trunk.
name – Specify the name of the VPN trunk.
Member#1 – Indicate the first LAN to LAN profile.
Member#2 – Indicate the second LAN to LAN profile.
backup more_syslog These commands are used for RD debug.
<ON/OFF>
% Profile Index : 1
% Profile Name : name1j
% Username : vigor
% Password : 1234
% Call Direction : Dial-Out
% Type of Server : PPTP
% Dial to : 1.2.3.4
% Remote NEtwork IP : 192.168.1.0
% Remote NEtwork Mask : 255.255.255.0
> vpn setup 2 market pptp_out 5.6.7.8 vigor 5678 192.168.1.31 255.255.255.0
% Profile Change Log ...
% Profile Index : 2
% Profile Name : market
% Username : vigor
% Password : 5678
% Call Direction : Dial-Out
% Type of Server : PPTP
% Dial to : 5.6.7.8
% Remote NEtwork IP : 192.168.1.31
% Remote NEtwork Mask : 255.255.255.0
> vpn trunk lb add comp 1 2
%% Combination VPN Load Balance profile list :
<Index> < Name > < Member1(Active)Type > <
Member2(Act
ive)Type >
1 comp 1(YES)PPTP 2(YES)P
PTP
% Setting OK.
> vpn trunk bind set 1 y comp 2 192.168.10.1~192.168.10.2
192.168.99.1~192.168.99.254 1~65535 0 OFF
% VPN Load Balance Tunnel Bind Table Index[1] detail:
===========================================================
Action = ACTIVE
Trunk Profile(000) Name= comp
Binding Dial Out Index = 2
Binding Src IP = 192.168.10.1 ~ 192.168.10.2
Binding Dest IP = 192.168.99.1 ~ 192.168.99.254
Binding Dest Port = 1 ~ 65535
Binding Fragmented = NO
Binding Protocol = ANY Protocol
>
Syntax
vpn NetBios set <H2l/L2l> <index> <Block/Pass>
Syntax Description
Example
> vpn NetBios set H2l 1 Pass
% Remote Dial In Profile Index [1] :
% NetBios Block/Pass: [PASS]
Syntax
vpn mss show
vpn mss default
vpn mss set <connection type> <TCP maximum segment size range>
Syntax Description
Parameter Description
show It means to display current setting status.
default TCP maximum segment size for all the VPN connection will be set as
1360 bytes.
set Use it to specify the connection type and value of MSS.
<connection type> 1~4 represent various type.
1 – PPTP
2 – L2TP
3 – IPSec
4 – L2TP over IPSec
5 - GRE over IPsec
6 - SSL Tunnel
<TCP maximum segment size Each type has different segment size range.
range> PPTP – 1 ~ 1412
L2TP – 1 ~ 1408
IPSec – 1 ~ 1381
L2TP over IPsec – 1 ~ 1361
GRE over IPsec - 1 ~ 1365
SSL Tunnel - 1 ~ 1360
Example
Syntax
vpn ike -q
vpn ike -s
Example
> vpn ike -q
IKE Memory Status and Leakage List
Syntax
vpn Multicast set <H2l/L2l> <index> <Block/Pass>
Syntax Description
Parameter Description
<H2l/L2l> H2l means Host to LAN (Remote Access User Accounts).
L2l means LAN-to-LAN Profile.
<index> The index number (1 to 500) of the profile.
<Block/Pass> Set Block/Pass the Multicast Packets.
The default is Block.
Syntax
vpn pass2nd on
vpn pass2nd off
Syntax Description
Parameter Description
on/off on – the packets can pass through NAT.
off – the packets cannot pass through NAT.
Example
> vpn pass2nd on
% 2nd subnet is allowed to pass VPN tunnel!
Syntax
vpn pass2nat <on/off>
Syntax Description
Parameter Description
<on/off> on – the packets can pass through NAT.
off – the packets cannot pass through NAT.
Example
> vpn pass2nat on
% Packets would go through by NAT when VPN disconnect!!
Syntax
vpn sameSubnet -i <index> -e <subnet> -I <Virtual Subnet> -o <add/del>
vpn sameSubnet -i <value>
Syntax Description
Parameter Description
-i <value> Specify the index number of VPN profile.
-i <value> –E <0/1> Enable or disable the IPsec with the same subnet.
1 – enable.
0 – disable.
-i <value> –e <value> Translate specified LAN to virtual subnet.
1 – LAN1
2 – LAN2
3 – LAN3 …
-i <value> -I <Virtual Set the virtual subnet (e.g., 172.16.3.250).
Subnet>
-i <value> -o <add/del> Set the operation (add or delete) for the VPN profile.
-v Display current status of virtual subnet.
-m <value> Set the translated type.
<value> - 1 means Whole Subnet; 2 means Specific IP.
Example
> vpn sameSubnet -i 1 -e 1 -I 10.10.10.0 -o add
Add entry Succcess!!
> vpn sameSubnet -v
IPsec with the same subnet:
VPN profile 1 enable,
Whole Subnet:
translated LAN1 to Virtual subnet: 10.10.10.0
IPsec with the same subnet:
VPN profile 201 enable,
Whole Subnet:
IPsec with the same subnet:
VPN profile 203 enable,
Whole Subnet:
>
Syntax
vpn ovpn mode <0/1>
vpn ovpn show
vpn ovpn udp_mode <0/1>
Syntax Description
Parameter Description
mode <0/1> Enable (1) or disable (0) the OpenVPN function.
show Display the OpenVPN setting status.
udp_mode <0/1> Enable (1) or disable (0) the UDP mode.
tcp_mode <0/1> Enable (1) or disable (0) the TCP mode.
udp_port <1-65535> Set the UDP port number.
tcp_port <1-65535> Set the TCP port number.
cert <0/1> Enable (1) or disable (0) the certificate authentication.
replay <0/1> Enable (1) or disable (0) the replay option.
certmode <0/1/2> Set the Cipher Algorithm Mode.
0 - AES128
1 - AES256
2 - None
hmacmode <0/1/2> Set the Cipher HMAC mode.
0 - SHA1
1 - SHA256
2 - None
Example
> vpn ovpn show
Openvpn: Enable
support UDP: Enable
UDP port: 1194
support TCP: Enable
TCP port: 1194
Use certificate authentication: Enable
replay option: Enable
Cipher Algorithm: AES128
HMAC Algorithm: SHA1
>
Syntax
Syntax Description
Parameter Description
<WAN interface number> Type a number to represent the physical interface.
<MRU size> It means the number of PPP LCP MRU. The available range is from
1400 to 1600.
Example
> wan ppp_mru 1 ?
% Now: 1492
Syntax
wan mtu <value>
wan mtu2 <value>
Syntax Description
Parameter Description
value It means the number of MTU for PPP. The available range is from
1000 to 1500.
For Static IP/DHCP, the maximum number will be 1500.
For PPPoE, the maximum number will be 1492.
For PPTP/L2TP, the maximum number will be 1460.
Example
> wan mtu 1100
> wan mtu ?
Static IP/DHCP (Max MSS: 1500)
PPPoE(Max MSS: 1492)
PPTP/L2TP(Max MSS: 1460)
% wan ppp_mss <MSS size: 1000 ~ 1500>
% Now: 1100
Syntax
wan dns <wan_no><dns_select><ipv4_addr>
Example
> wan dns 1 pri 168.95.1.1
% Set WAN1 primary DNS done.
% Now: 168.95.1.1
Syntax
wan DF_check <on/off>
Syntax Description
Parameter Description
on/off It means to enable or disable DF.
Example
> wan DF_check on
%DF bit check enable!
Example
> wan disable
%WAN disabled.
Syntax
wan forward <on/off>
Syntax Description
Parameter Description
<on/off> It means to enable or disable WAN forward.
Example
> wan forward ?
%WAN forwarding is Disable!
Example
> wan status
BWAN1: Offline, stall=N
Mode: DHCP Client, Up Time=00:00:00
IP=---, GW IP=---
TX Packets=0, TX Rate(bps)=0, RX Packets=0, RX Rate(bps)=0
Primary DNS=0.0.0.0, Secondary DNS=0.0.0.0
Syntax
wan detect <wan1/wan2/...> <on/off/strict/always_on>
wan detect <wan1> <off> -t <time>
wan detect <wan1> <off> -i <Interval>
wan detect <wan1/wan2/...> target <ip addr>
wan detect <wan1/wan2/...> target2 <ip addr>
wan detect <wan1/wan2/...> target_gw <1/0>
wan detect <wan1/wan2/...> ttl <value>
wan detect <wan1/wan2/...> interval <interval>
wan detect <wan1/wan2/...> retry <retry>
wan detect status
Syntax Description
Parameter Description
<wan1/wan2/...> On - It means to enable ping detection. The IP address of the target
<on/off/strict/always_on> shall be set.
Off - It means to enable ARP detection (default).
strict - Enable Strict ARP detection.
always_on - disable link detect, always connected(only support
static IP)
<wan1> <off> -t <time> Set the time (0 to 256).
<wan1> <off> -i <Interval> Set the time interval (0 to time value).
Example
> wan detect status
WAN1: arp detect, send time=30, Interval = 5
WAN2: arp detect, send time=30, Interval = 5
WAN3: arp detect, send time=30, Interval = 5
WAN4: arp detect, send time=30, Interval = 5
WAN5: arp detect, send time=30, Interval = 5
WAN6: arp detect, send time=30, Interval = 5
WAN7: arp detect, send time=30, Interval = 5
WAN8: arp detect, send time=30, Interval = 5
WAN9: always on
WAN10: arp detect, send time=30, Interval = 5
WAN11: arp detect, send time=30, Interval = 5
WAN12: arp detect, send time=30, Interval = 5
WAN13: arp detect, send time=30, Interval = 5
WAN14: arp detect, send time=30, Interval = 5
WAN15: arp detect, send time=30, Interval = 5
WAN16: arp detect, send time=30, Interval = 5
WAN17: arp detect, send time=30, Interval = 5
WAN18: arp detect, send time=30, Interval = 5
WAN19: arp detect, send time=30, Interval = 5
WAN20: arp detect, send time=30, Interval = 5
WAN21: arp detect, send time=30, Interval = 5
WAN22: arp detect, send time=30, Interval = 5
WAN23: arp detect, send time=30, Interval = 5
Syntax
Syntax Description
Parameter Description
wan1/wan2/.... Specify which WAN will be applied with load balance.
on Make WAN interface as the member of load balance.
off Cancel WAN interface as the member of load balance.
<ip/session> Set the load balance mode to IP(default) or session based.
status Show the current status.
Example
> wan lb ip 192.168.2.25
Set OK
> wan lb status
WAN1: on
WAN2: on
WAN3: on
WAN4: on
WAN5: on
WAN6: on
WAN7: on
...
WAN52: on
>
Syntax
wan lbel <enable> <idx> <protocol> <port> <portend> <comment>
wan lbel status <idx>
Syntax Description
Parameter Description
Idx Enter the index number (1 to 32) for the exception list.
enable Enter 1 (enable) or 0 (disable) the selected profile.
protocol <protocol>: Enter TCP, UDP, all. "All" means "TCP+UDP".
port Enter a number (0 to 65535) as starting port.
It it is set with "0", then the port range (1 to 65535) will not be
Example
> wan lbel 1 1 tcp 1 65533 testing
> wan lbel status 1
whitelist[1] status:enable, protocol:tcp, port:1~65533,
comment:testing
>
Syntax
wan mvlan <pvc_no/status/save/enable/disable> <on/off/clear/tag tag_no> <service
type/vlan priority> <px ... >
Syntax Description
Parameter Description
pvc_no It means index number of PVC. There are 10 PVC, 0(Channel-1) to
7(Channel-8) allowed to be configured.
However, only 2 to 9 are available for configuration.
status It means to display the whole Bridge status.
save It means to save the configuration into flash of Vigor router.
enable/disable It means to enable/disable the Multi-VLAN function.
on/off It means to turn on/off bridge mode for the specific channel.
clear It means to turn off/clear the port.
tag tag_no It means to tag a number for the VLAN.
-1: No need to add tag number.
1-4095: Available setting numbers used as tagged number.
service type It means to specify the service type for VLAN.
0: Normal.
1: IGMP.
vlan priority It means to specify the priority for the VALN setting.
Range is from 0 to 7.
px It means LAN port. Available setting number is from 2 to 4. Port
number 1 is locked for NAT usage.
Example
PVC 7 will map to LAN port 2/3/4 in bridge mode; service type is Normal. No tag added.
>
Syntax
wan multifno <channel #><WAN interface #>
wan multifno status
Syntax Description
Parameter Description
<channel #><WAN interface <channel #> - There are several channels including VLAN and PVC.
#> Available settings are:
13=Channel 13
14=Channel 14
...
52=Channel 52
WAN interface # - Enter a number to indicate the WAN interface.
1=WAN1
status It means to display current bridge status.
Example
> wan multifno 13 1
% Configured channel 13 uplink to WAN1
> wan multifno status
% Channel 13 uplink ifno: 3
% Channel 14 uplink ifno: 3
% Channel 15 uplink ifno: 3
% Channel 16 uplink ifno: 3
% Channel 17 uplink ifno: 3
...
>
Syntax
wan vlan wan <#> tag <value>
wan vlan wan <#> <enable/disable>
wan vlan wan <#> pri <value>
wan vlan stat
Example
> wan vlan wan 1 pri 6
> Set priority to 6 for WAN1
> wan vlan stat
% Interface Pri Tag Enabled
% ======================================
% WAN1 6 0
% WAN2 0 0
% WAN3 0 0
% WAN4 0 0
% WAN5 0 0
...
Syntax
wan budget wan <#> rdate <day><hour>
wan budget wan <#> <enable|disable>
wan budget wan <#> thres <budget limit (MB)>
wan budget wan <#> gthres <budget limit (GB)>
wan budget wan <#> mode <monthly|periodic|none>
wan budget wan <#> psday <th day in periodic>
wan budget wan <#> custom_mode <0/1>
wan budget wan <#> custom_mode_reset_hour <hour>
wan budget wan <#> action <action bitmap>
wan budget status
Syntax Description
Parameter Description
wan <#> rdate <day><hour> wan <#>: Specify the WAN interface (1 to 12).
rdate <day><hour>: Specify the WAN budget refresh time.
day – Available settings are from 1 to 30.
hour – Available settings are from 1 to 23.
E.g., wan budget wan 1 rdate 5 10
If monthy mode is selected: WAN budget will be refreshed on 5th
day at 10:00 in each month.
If periodic mode is selected: WAN budget will be refreshed every 5
days and 10 hours.
<enable|disable> enable - Enable the function of wan budget.
disable - Disable the function of wan budget.
thres <budget limit (MB)> Specify the maximum value for WAN budget limit. (Unit: MB)
budget limit – Type a number.
gthres <budget limit (GB)> Specify the maximum value of wan budget limit. (Unit: GB)
budget limit – Type a number.
mode Specify the calculation mode (monthly, periodically, or none) for
<monthly|periodic|none> WAN budget.
psday <th day in periodic> It is used only when mode is set with “periodic”. Specify the order
of “today” in the cycle.
E.g., wan budget wan 5 psday It means “today” is the 5th day
in the billing cycle.
custom_mode <0/1> Set the custom mode ( cycle in hours or in days).
0: cycle_in_hours
1: cycle_in_days
custom_mode_reset_hour Set the reset hour value.
<hour> hour: Enter 1 to 23.
action <action bitmap> Determine the action to be performed when it reaches the WAN
budget limit.
action bitmap – Type a total number of actions to be executed.
Different numbers represent different actions.
1: shotdown wan
2: send mail alert
4: send sms alert
For example, if you type “5” (5=1+4), the system will send SMS alert
Example
> wan budget wan 1 action 5
% WAN 1 budget action set to 5
> wan budget wan 1 gthres 10
% WAN 1 budget limit set to 10 GB
Syntax
wan detect_mtu -i <Host/IP address> -s <mtu_size> -d <decrease size> -w <1: WAN1 ,2:
WAN2, ...> -c <count>
Syntax Description
Parameter Description
-i <Host/IP address> Specify the IPv4 target to detect. If can be an IPv4 address or
domain name.
Host/IP address: Enter the IP address/domain name of the target.
-s <mtu_size> Set the MTU size base for Discovery.
mtu_size: Available setting is 1000 ~ 1500.
-d <decrease size> Set the MTU size to decrease between detections.
decrease size: Available setting is 1 ~ 100.
-w <number> Specify the WAN interface.
number: Enter the number of WAN interface.
1: WAN1
2: WAN2….and etc.
-c <count> Set the maximum times of ping failure during a Discovery.
count: Available settings are 1 ~ 10. Default value is 3.
Example
> wan detect_mtu -w 1 -i 8.8.8.8 -s 1500 -d 30 -c 10
detecting mtu size:1500!!!
mtu size:1470!!!
Syntax
wan detect_mtu6 -i <Host/IP address> -s <mtu_size> -w <number>
Syntax Description
Parameter Description
-i <Host/IP address> Specify the IPv6 target to detect. If can be an IPv6 address or
domain name.
Example
> wan detect_mtu6 -w 2 -i 2404:6800:4008:c06::5e -s 1500
>
Syntax
wan failover off <index>
wan failover on <1><2><3><4><5><6>
wan failover show <index>
Syntax Description
Parameter Description
failover off <index> Set specified WAN interface to always on.
index – Ranges from 1 to 12.
failover on There are six fields which represent different options.
<1><2><3><4><5><6>
Field 1 – Specify WAN interface as failover WAN by typing 1 to 7.
Field 2 – Enable / disable the action for the failover WAN. Such
action is “Active When selected WAN [disconnect/reached traffic
threshold]”.
0 – Disable
1 - Enable
Field 3 - Enable / disable the action for the failover WAN. Such
action is “Active When [any/all] of selected WAN disconnect or
reached traffic threshold”.
0 – Disable
1 - Enable
Field 4 – Specify main WAN by typing 1 to 7. The main WAN will be
set to always on.
Field 5 – Specify traffic threshold [Download threshold(Kbps)].
Field 6 - Specify traffic threshold [Upload threshold (Kbps)].
For example, WAN 2 will be set as failover, and will be active when
any of selected WANs has reached traffic threshold. WAN 4 is the
selected WAN. Download threshold : 50 Kbpsl; Upload threshold : 20
Kbps. You can type as follows:
wan failover on 2 1 0 4 50 20
show <index> Display parameters settings for WAN interface.
index – Ranges from 1 to 12.
Example
> wan failover on 2 1 0 4 50 20
Syntax
hsportal setup -p <profile> <-l <lan>> <-s <ssid>> ...
hsportal setup -p <profile> -c
Syntax Description
Parameter Description
-p Indicate available profile to be configured.
Number of profile: 1 /2 /3 / 4.
-l Apply to LAN interfaces. E.g., apply LAN1 and LAN2:
-l 1, 2.
-m Select login mode.
0:skip
1:click
2:social
3:pin
4:social or pin
-f Configure facebook login.
0: disable.
1: enable.
-g Configure google login.
0: disable.
1: enable.
-h Enable HTTPS redirection.
0: disable.
1: enable.
-v Enable portal detection.
0: disable.
1: enable.
-i Configure APP ID.
For example, to configure facebook APP id, you can type:
>hsportal -p 1 -f -i this_is_app_id
Profile 1 set facebook login disabled ... [OK]
-k Configure app key.
For example, to configure google APP key, you can type:
> hsportal -p 1 -g -i this_is_app_key
Profile 1 set google login disabled ... [OK]
Example
> hsportal setup -p 1 -c
Reset profile 1 ... [OK]
> hsportal setup -p 1 -r 0
Profile 1 set landing page mode 0 ... [OK]
> hsportal setup -p 2 -g 1 -k app_key_google
Profile 2 set google login enabled ... [OK]
Profile 2 set API KEY ... [OK]
>
Syntax
hsportal info -e <0/1>
hsportal info –c
hsportal info –n <0/1>
hsportal info –a <0/1>
hsportal info –m <1~10>
hsportal info –s <1~10>
Syntax Description
Parameter Description
-e <0/1> Enable database to record information.
0 - disable
1 – enable
-c Clear user information database.
-n <0/1> Enable notification for user information.
0 - disable
1 – enable
-a <0/1> Enable auto backup and start a new record for user information.
0 - disable
1 – enable
Example
> hsportal info -e 1
Enabled database to record information ... [OK]
> hsportal info -a 1
Enabled auto backup and start a new record for user information ...
[OK]
>
Syntax
hsportal level -p <index> [-e <enable>] [-t <mins>] ...
Syntax Description
Parameter Description
-p <index> It means to specify (add) a quota policy profile.
<index>: Enter the index number (1 to 20) of the quota policy
profile.
-e <0/1> It means to enable or disable the quota policy profile.
0: disable.
1: enable.
-t <value> It means to set expired time for quota policy.
<value>: Enter a number (unit:minutes).
-i <0/1> -o <value> It means to enable or disable the function of idle timeout
0: disable.
1: enable.
If enabled,
-o <value>: Set the idle timeout (unit:minutes) if idle timeout is
enabled.
For example: hsportal level -p 1 -e 1 -i 1 -o 300
-d <value> It means to set the maximum number of devices that can be
connected to the network using the same account.
<value>: Enter a number (0 to 100). "0" means unlimited.
For example: hsportal level -p 1 -e 1 -d 0
-b <0/1> It means to enable or disable the function of bandwidth limit.
0: disable.
1: enable.
-ru <0/1> It means to specify the bandwidth limit download unit.
0: kbps
1: mbps
-tu <0/1> It means to specify the bandwidth limit upload unit.
0: kbps.
Example
> hsportal level -p 1 -e 1 -r 1 -f 30000
>
Syntax
radius enable <0/1>
radius authport <port number>
radius set_auth_method <method idx>
radius client add <idx> -i <address> -m <mask> -p <prefix> -l <length> -s <secret>
radius client del <idx>
radius show
Syntax Description
Parameter Description
enable <0/1> Enable (1) or disable (0) the RADIUS server.
authport <port number> Configure the port number for authentication.
Port number: Available range is from 0 to 65535.
Default value is “1812”.
set_auth_method <method Specify which method will be used for authentication.
idx> Method idx: 0 and 1
0: Only PAP
1: PAP/CHAP/MS-CHAP/MS-CHAPv2
client add <idx> -i <address> Specify a client to be authenticated by RADIUS server by typing
-m <mask> -p <prefix> -l required information as follows:
<length> -s <secret> -i <address>: client IPv4 address(domain)
-m <mask>: client IPv4 mask
-p <prefix>: client IPv6 prefix
-l <length>: client IPv6 prefix length
-s <secret>: shared secret
ex: radius client add 1 -i 192.168.1.1 -m 255.255.255.0 -s 123
client del <idx> del - Delete related settings for selected client.
Idx - Specify the index number of client profiles.
show Display the status of RADIUS server.
enable_dot1x <0/1> Enable (1) or disable (0) the 802.1X Authentication function of
RADIUS Server. Default is disabled.
set_dot1x_method -e Set a method for 802.1X authentication of RADIUS server.
<method_idx> Method idx: 1 to 4.
1: EAP_PEAP/MSCHAPv2
2: EAP_TTLS/PAP
3: EAP_TTLS/MSCHAP
4: EAP_TTLS/MSCHAPv2
set_dot1x_method -d Delete the method for 802.1X authentication of RADIUS server.
<method_idx> Method idx: 1 to 4.
1: EAP_PEAP/MSCHAPv2
2: EAP_TTLS/PAP
3: EAP_TTLS/MSCHAP
4: EAP_TTLS/MSCHAPv2
Example
> radius client add 1 -i 192.168.1.1 -m 255.255.255.0 -s 123
Set radius server client OK
>
Syntax Description
Parameter Description
<options>... The available commands with parameters are listed below.
[…] means that you can type in several parameters in one line.
-V Show current setting.
-v <index> Show current setting for certain RADIUS profile.
<index>: Enter the index number of the profile.
-l <index> Show the server status log.
<index>: Enter the index number of the profile.
-c "<index> <comment>" Set the comment for certain RADIUS profile.
<index>: Enter the index number of the profile.
<comment>: Enter a string.
-f <index> Set the selected profile as the default external RADIUS profile.
<index>: Enter the index number of the profile.
-e "<index> <param>" Enable or disable the external RADIUS profile.
<index>: Enter the index number of the profile.
<param>: 0 or 1. 0 is disable; 1 is enable.
ex: -e "2 1" to enable the profile 2
-i "<index> <index2> Set the hostname or IP address for the selected RADIUS server
<hostname/IP>" profile.
<index>: Enter the index number of the profile.
<index2>: 0 or 1. 0 means the primary server; 1 means the
secondary server.
ex: -i "1 0 192.168.1.1" or -i "2 1 www.google.com"
-p "<index> <index2> Set the destination port for the selected RADIUS server.
<port_number>" <index>: Enter the index number of the profile.
<index2>: 0 or 1. 0 means the primary server; 1 means the
secondary server.
<port_number>: 1 ~ 65535.
ex : -p "1 1 1812"
-s "<index> <index2> Set the shared secret for the selected RADIUS server.
<secret>" <index>: Enter the index number of the profile.
<index2>: 0 or 1. 0 means the primary server; 1 means the
secondary server.
<secret>: 1 ~ 65535.
ex : -s "3 0 123"
-r "<index> <index2> Set the retry number for the selected RADIUS server.
<retry>" <index>: Enter the index number of the profile.
<index2>: 0 or 1. 0 means the primary server; 1 means the
secondary server.
<retry>: 1 to 3.
ex : -s "3 0 2"
-a "<index> <param>" Enable or disable the accounting port for the selected RADIUS
server.
<index>: Enter the index number of the profile.
<param>: 0 or 1. 0 is disable; 1 is enable.
-b "<index> <index2> Set the accounting port for the selected RADIUS server.
<port_number>" <index>: Enter the index number of the profile.
<index2>: 0 or 1. 0 means the primary server; 1 means the
Example
> radius external -i "1 0 192.168.1.1"
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
> radius external -V
Profile default enable comment
% 1 v
% 2
% 3
% 4
RADIUS timeout: 2 seconds
>
Syntax
local_8021x enable <0/1>
local_8021x set_localdot1x_method -e <method_idx>
local_8021x set_localdot1x_method -d <method_idx>
local_8021x show
Syntax Description
Parameter Description
enable Enable or disable the configuration.
0: disable.
1: enable.
-e <method_idx> Set the authentication method.
<method_idx>: 1 to 4,
1: EAP_PEAP/MSCHAPv2
2: EAP_TTLS/PAP
3: EAP_TTLS/MSCHAP
Example
> local_8021x set_localdot1x_method -e 1
This setting will take effect after rebooting.
Please use "sys reboot" command to reboot the router.
> local_8021x show
% Local 802.1X enable: disable
>
Syntax
wol up <MAC Address>
wol fromWan <on/off/any>
wol fromWan_Setting <idx> <ip address> <mask>
Syntax Description
Parameter Description
<MAC Address> It means the MAC address of the host.
<on/off/any> It means to enable or disable the function of WOL from WAN.
on: enable
off: disable
any: It means any source IP address can pass through NAT and wake
up the LAN client.
This command will allow the user to choose whether WoL packets
can be passed from the Internet to the LAN network from a specific
WAN interface.
<idx> <ip address> <mask> It means the index number (from 1 to 4).
These commands will allow the user to configure the LAN clients
that the user may wake up from the Internet through the use of the
WoL packet.
ip address - It means the WAN IP address.
mask - It means the mask of the IP address.
Example
> wol fromWan on
% wol fromWan on
Syntax
user set <-a|-b|-c|-d|-e|-l|-o|-q|-r|-s|-u>
user edit <PROFILE_IDX>
<-a|-d|-e|-f|-i|-o|-m|-n|-p|-q|-r|-s|-t|-u|-v|-w|-x|-A|-H|-T|-P|-l|-L|-D>
user account <USER_NAME><-t|-d|-q|-r|-w>
user setdefault
Syntax Description
Parameter Description
set It means to configure general setup for the user management.
edit It means to modify the selected user profile.
account It means to set time and data quota for specified user account.
setdefault It means to reset to factory default settings.
User Set
-a <Profile idx> <User It means to pass an IP Address.
name><IP_Address> Profile idx- type the index number of the selected profile.
User name- type the user name that you want it to pass.
IP_Address- type the IP address that you want it to pass.
-b <user name> Block specifies user or IP address.
-b ip <ip address> user name – type the user name that you want to block.
ip address –– type the IP address that you want to block.
-c <user name> Clear the user record.
-c all user name – type the user name that you want to get clear
corresponding record.
all – all of the records will be removed.
-d Enable the User management in Rule-Based mode.
-e Enable the User management in User-Based mode.
-l all Show online user.
-l user all – all of the users will be displayed on the screen.
-l ip user name – type the user name that you want to view on the
screen.
ip – type the IP address that you want to view on the screen.
-o It means to show user account information.
e.g.,-o
-q It means to trigger the alert tool to do authentication.
-r <user name | all> Remove the user record.
user name – type the name of the user profile.
all – all of the user profile settings will be removed.
-s <0/1> It means to set login service.
0:HTTPS
1:HTTP
Example
> user account admin -d 1
Syntax
appqos view
appqos enable <0/1>
appqos traceable <-v | -e AP_INDEX CLASS | -d AP_INDEX>
appqos untraceable <-v | -e AP_INDEX CLASS | -d AP_INDEX>
Syntax Description
Parameter Description
view It means to display current status of APP QoS.
enable <0/1> It means to enable or disable the function of APP QoS.
traceable/ untraceable The APPs are divided into traceable and untraceable based on their
properties.
-v It means to view the content of all traceable APs.
Use “appqos traceable –v” to display all of the traceable APS with
speficed index number.
Use “appqos untraceable –v” to display all of the untraceable APS
with speficed index number.
-e It menas to enable QoS for application(s) and assign QoS class.
AP_INDEX Each index number represents one application.
Index number: 50, 51, 52, 53, 54, 58, 60, 62, 63, 64, 65, 66, 68 are
used for 13 traceabel APPs.
Index number: 0~49, 55~59, 61, 67, 69, and 70~123 are used for 125
untraceable AP.
CLASS Specifies the QoS class of the application, from 1 to 4
1:Class 1, 2:Class 2, 3:Class 3, 4:Other Class
-d It means to disable QoS for application(s).
Example
> appqos enable 1
Syntax
nand bad
nand usage
Example
>nand usage
Show NAND Flash Usage:
Partition Total Used Available Use%
cfg 4194304 7920 4186384 0%
bin_web 33554432 11869493 21684939 35%
cfg-bak 4194304 7920 4186384 0%
bin_web-bak 33554432 11869493 21684939 35%
> nand bad
Show NAND Flash Bad Blocks:
Block Address Partition
1020 0x07f80000 unused
1021 0x07fa0000 unused
1022 0x07fc0000 unused
1023 0x07fe0000 unused
Syntax
apm enable
apm disable
apm show
apm clear
apm discover
apm query
Syntax Description
Parameter Description
enable It means to enable APM function.
disable It means to disable APM function.
show It displays current information of APM profile.
clear It is used to remove all of the APM profile.
discover It is used to search VigorAP on LAN.
query It is used to query any VigorAP which has been registered to APM
(Central AP Management) in Vigor router. Information related to
the registered AP will be send back to Vigor router for updating the
Example
> apm clear
Clear all clients ... done
Syntax
apm profile clone <from index><to index><new name>
apm profile del <index>
apm profile reset
apm profile summary
apm profile show <profile index>
apm profile apply <profile index> <client index1 index2 .. index5>>
Syntax Description
Parameter Description
clone It is used to copy the same parameters settings from one profile to
another APM profile.
del It is used to delete a specified APM profile. The default (index #1)
should not be deleted.
reset It is used to reset to factory settings for WLAN profile.
summary It is used to list all of the APM profiles with required information.
show It is used to display specified APM profile.
apply It is used to apply the selected APM profile onto specified VigorAP.
from index Type an index number in this field. It is the original APM profile to
be cloned to other APM profile.
to index Type an index number in this file. It is the target profile which will
clone the parameters settings from an existed APM profile.
new name Type a name for a new APM profile.
profile index Enter the index number of existed profile.
client index1/2/3/4/5 It is useful for applying the selected APM profile to the specified
VigorAP.
Example
> apm profile clone 1 2 forcarrie
(Done)
1 - - - - -
3 - - - - -
4 - - - - -
5 - - - - -
6 - - - - -
7 - - - - -
8 - - - - -
9 - - - - -
10 - - - - -
...
...
19
>
Syntax
apm cache show
apm cache clear
Syntax Description
Parameter Description
show It means to display the information related to VigorAP registered
Vigor1000B .
clear It means to remove the information related to VigorAP registered
Vigor1000B .
Example
> apm cache show
MAC Name Auth
------------ -------------------- --------------------
00507FF17EE5 VigorAP903 admin:admin
001DAA04F060 VigorAP1000C admin:admin
00507FF17EE8 VigorAP903 admin:admin
>
Syntax
apm lbcfg set <value>
apm lbcfg show
Syntax Description
Example
> apm lbcfg show
apm LoadBalance Config :
1. Enable LoadBalance : 0
2. Enable station limit : 0
3. Enable traffic limit : 0
4. limit Number : 64
5. Upload limit : 0
6. Download limit : 0
7. Enable disassociation by idle time : 0
8. Enable disassociation by Signal strength : 0
Syntax
apm apsyslog <AP_Index>
Syntax Description
Parameter Description
AP_Index Specify the index number which represents VigorAP.
Example
> apm apsyslog 1
8d 02:46:09 syslog: [APM] Send Rogue AP Detection data.
8d 02:53:04 syslog: [APM] Run AP Detection / Discovery.
8d 02:56:09 syslog: [APM] Send Rogue AP Detection data.
8d 03:00:42 kernel: 60:fa:cd:55:f5:ea had disassociated.
8d 03:03:12 syslog: [APM] Run AP Detection / Discovery.
8d 03:06:09 syslog: [APM] Send Rogue AP Detection data.
8d 03:13:21 syslog: [APM] Run AP Detection / Discovery.
8d 03:16:10 syslog: [APM] Send Rogue AP Detection data.
8d 03:16:41 kernel: 60:fa:cd:55:f5:ea had associated successfully
8d 03:16:55 kernel: 60:fa:cd:55:f5:ea had disassociated.
Syntax
apm syslog
Syntax
apm stanum <AP_Index>
Syntax Description
Parameter Description
AP_Index Specify the index number which represents VigorAP.
Example
> apm stanum 1
Syntax
ha set [-<command> <parameter>| ... ]
Syntax Description
Parameter Description
Example
> ha set -h -4 LAN1 192.168.1.1
% Enable IPv4 Virtual IP on LAN1
Syntax
ha show –c
ha show –g
Syntax Description
Parameter Description
Example
> ha show -g
% High Availability : Disable
% Redundancy Method : Active-Standby
% Group ID : 1
% Priority ID : 10
% Update DDNS : Disable
% Protocol : IPv4
% Management Interface : LAN1
% Authentication Key : draytek
% Syslog : OFF
%
% [ Index | Enable | Virtual IP ]
% LAN1 - 192.168.100.2
% LAN2 - 192.168.200.2
% LAN3 - 192.168.3.2
% LAN4 - 192.168.4.2
% LAN5 - 192.168.5.2
% LAN6 - 192.168.6.2
% LAN7 - 192.168.7.2
% LAN8 - 192.168.8.2
% LAN9 - 192.168.9.2
% LAN10 - 192.168.10.2
% LAN11 - 192.168.11.2
...
...
% LAN27 On FE80::200:5EFF:FE00:101
% LAN28 On FE80::200:5EFF:FE00:101
% LAN29 On FE80::200:5EFF:FE00:101
% LAN30 On FE80::200:5EFF:FE00:101
% LAN31 On FE80::
>
Syntax
ha status –a <Detail Level>
ha status –m <Detail Level>
Example
> ha status -m 2
% [Local Router] Marketing
% IP : 192.168.100.1 (FE80::21D:AAFF:FE4B:3E80)
% Status : !
% High Availability : ! Disable
% Redundancy Method : Active-Standby
% Group ID : 1
% Priority ID : 10
% Update DDNS : Disable
% Protocol : IPv4
% Management Interface : LAN1
% Authentication Key : draytek
% Virtual IP: (Max. 51 Virtual IPs)
% ! OFF
% Virtual IPv6: (Max. 51 Virtual IPv6s)
% ON LAN1 FE80::200:5EFF:FE00:101
% ON LAN2 FE80::200:5EFF:FE00:101
% ON LAN3 FE80::200:5EFF:FE00:101
% ON LAN4 FE80::200:5EFF:FE00:101
% ON LAN5 FE80::200:5EFF:FE00:101
% ON LAN6 FE80::200:5EFF:FE00:101
% ON LAN7 FE80::200:5EFF:FE00:101
% ON LAN8 FE80::200:5EFF:FE00:101
% ON LAN9 FE80::200:5EFF:FE00:101
% ON LAN10 FE80::200:5EFF:FE00:101
% ON LAN11 FE80::200:5EFF:FE00:101
% ON LAN12 FE80::200:5EFF:FE00:101
% ON LAN13 FE80::200:5EFF:FE00:101
% ON LAN14 FE80::200:5EFF:FE00:101
% ON LAN15 FE80::200:5EFF:FE00:101
% ON LAN16 FE80::200:5EFF:FE00:101
% ON LAN17 FE80::200:5EFF:FE00:101
% ON LAN18 FE80::200:5EFF:FE00:101
% ON LAN19 FE80::200:5EFF:FE00:101
% ON LAN20 FE80::200:5EFF:FE00:101
% ON LAN21 FE80::200:5EFF:FE00:101
>
Syntax
Syntax Description
Parameter Description
LAN_port Specify the LAN port number (1 to 12).
Example
>swm show 3
** If you want to display SWM debug log : "swm show debug log"
** Enable/Disable SWM console debug log : "swm show console log en/dis"
** Enable/Disable SWM syslog debug log : "swm show syslog log en/dis"
********************************************************************************
LAN Port Level UP - Link Model UP - MAC UP - Port Model Name MA
C IP Address Down - Port
--------- --------- ---------------- ------------ --------- ---------------- --
3 1 Router 8 G2280 0
01DAA0CCD08 192.168.1.10
-------------------------------------------------------------------------------
*****************************************************************************
VLAN Table:
VID VLAN Name Port Num Forbidden Port Num
----- ------------ -------------------- --------------------
1 vlan1 1-28 none
*****************************************************************************
(Total 1 Switch)
Syntax Description
Parameter Description
MAC Enter the MAC address (e.g., 001DAA0CCD08) of the VigorSwitch.
Example
> swm get 001DAA0CCD08
Start get cfg from 001daa0ccd08 external switch
Result: [OK].
>
Syntax
swm post <MAC>
Syntax Description
Parameter Description
MAC Enter the MAC address (e.g., 001DAA0CCD08) of the VigorSwitch.
Example
> swm post 001DAA0CCD08
Start post cfg to 001daa0ccd08 external switch with currect settings.
Please wait a few seconds...
Result: [OK].
>
Syntax
swm auth show
swm auth clear <index>
Syntax Description
Parameter Description
show Display recorded external switch MAC address list.
clear <index> Clear specific index of authentication record table.
Index range: (1 - 30)
Syntax
swm extvlan <LAN_Port><VLAN_idx><Port_Description>
Syntax Description
Parameter Description
LAN_Port Setting range is from 1 to 12. Specify the LAN port connecting to
VigorSwitch.
VLAN_idx Type the enabled internal VLAN number.
Index number range for VLAN is from 0 to 99.
Port_Description Setting range is from 1 to 24.
Example
> swm extvlan 2 1 10
Set OK
System will cover the original VLAN settings on your VigorSwitch. Please backup the
configuration file before you run this function.
System also will select the physical connect port as trunk port and let it join each VLAN group.
Before using such command, please use [swm show] to check valid VLAN index firstly.
Example
> swm enable ?
Enable Switch Mangement: swm enable
Syntax Description
Parameter Description
set <IDX> <NAME> <1> It means to set group name and group password.
<PASSWD> <IDX>: Enter the index number (1 to 10) of the group.
<NAME>: Enter the name of the group.
<1>: It means the password flag.
<PASSWD>: Enter a string as the password.
show It means to display switch group status.
add <IDX> <MAC> It means to add a switch into the group as a member switch.
<IDX>: Enter the index number (1 to 10) of the group.
<MAC>: Enter the MAC address of VigorSwitch.
delete <IDX> <MAC> It means to delete a switch from the group.
<IDX>: Enter the index number (1 to 10) of the group.
<MAC>: Enter the MAC address of VigorSwitch.
Example
> swm group set 10 pease 1 jpsword
> swm group show
Index Group Name Passwd Flag Member Switch
------ --------------- ----------- --------------------------------
1 peace 1 G2280(192.168.1.11),
2 0
3 0
4 0
5 0
6 0
7 0
8 0
9 0
10 pease 1
Syntax
swm profile add/delete <MAC>
swm profile show
Syntax Description
Parameter Description
add/delete <MAC> It means to add or delete a member switch from the profile.
<MAC>: Enter the MAC address of the switch.
show It means to display switch profile.
enable_all/disable_all It means to enable or disable all LAN ports of the specified switch
<MAC> managed by Vigor router.
<MAC>: Enter the MAC address of the member switch.
Example
> swm profile show
Name IP Address MAC Model Group
------------- -------------- ----------- ------ -------------------------
G2280 192.168.1.10 001daa0ccd08 G2280 peace,pease,
>
Syntax
swm detail comment <MAC> <COMMENT>
swm detail name <MAC> <NAME>
swm detail passwd <MAC> <PASSWD>
swm detail config <MAC> <config>
swm detail show
swm detail port show <MAC>
swm detail port <MAC> <PORT> <FLAG> <SCHED1> <SCHED2> <DESCRIPTION>
swm detail rate <MAC> <PORT> <i/e> <e/d>
swm detail rate <MAC> <PORT> <i/e> <ratelimit>
Syntax Description
Parameter Description
comment <MAC> It means to set a comment for VigorSwitch.
<COMMENT> <MAC>: Enter the MAC address of the VigorSwitch to be modified.
<COMMENT>: Add an additional explanation for the switch.
name <MAC> <NAME> It means to set a name for VigorSwitch.
<MAC>: Enter the MAC address of the VigorSwitch to be modified.
<NAME>: Enter the name of VigorSwitch.
passwd <MAC> <PASSWD> It means to set a login password for VigorSwitch.
<MAC>: Enter the MAC address of the VigorSwitch to be modified.
<NAME>: Enter the login password of VigorSwitch.
Example
> swm detail rate 001DAA0CCD08 1 i 5000
> swm detail comment 001DAA0CCD08 availablefor2floor
> swm detail rate 001DAA0CCD08 1 i 5000
> swm detail show
Idx Name MAC Comment Config Status
---- ------------- ------------ ---------------- ------------ --------
1 G2280 001daa0ccd08 1 None Connect
>
Syntax
swm maintain reboot <MAC>
swm maintain reset <MAC>
swm maintain show
Syntax Description
Parameter Description
reboot <MAC> It means to reboot VigorSwitch with current settings.
<MAC>: Enter the MAC address of the VigorSwitch to be modified.
reset <MAC> It means to reset VigorSwitch with factory default settings.
<MAC>: Enter the MAC address of the VigorSwitch to be modified.
show It means to display comment, MAC and connection status of the
switch.
Example
> swm maintain show
Name IP Address MAC Model
---------------- ---------------- ------------- ------
G2280 192.168.1.10 001daa0ccd08 G2280
> swm maintain reset 001daa0ccd08
Preparing to reset.
Please wait for few minutes and do not turn off power.
Syntax
swm search mac <MAC>
swm search ip <IP>
swm search description <Input>
Syntax Description
Parameter Description
Mac <MAC> <MAC>: Enter the MAC address of the VigorSwitch to be searched.
ip <IP> <IP>: Enter the IP address of the VigorSwitch to be searched.
description <input> <input>: Enter the model name of the VigorSwitch to be searched.
Example
> swm search mac 001daa0ccd08
Type IP Address MAC Description / Name Lan Port
UpLink Port Level Port
------- ----------- ----------------- ---------------------------- --------
--------------- ----- -------
Switch 192.168.1.10 00:1D:AA:0C:CD:08 G2280 P3
Syntax
swm db ctl en/dis
swm db ctl show
swm db alert notify <N/S>
swm db alert action <S/B>
swm db alert sms <IDX>
swm db alert mail <IDX>
Syntax Description
Parameter Description
ctl en/dis It means to enable or disable the function of displaying database
control status.
en: Enable the function.
dis: Disable the function.
ctl show It means to show the the database control status.
alert notify <N/S> It means to set alert notification (N or S) condition when storage
exceeded.
N:Don't send notification.
S: Send notification.
alert action <S/B> It means to set the alert action (S or B) condition when storage
exceeded.
S: Stop recording urser information.
B: Backup and clean up all user info, and start a new record.
alert sms <IDX> It means to set SMS object which will get the information from Vigor
router if something wrong with VigorSwitch.
<IDX>: Enter the index number of the mail object.
alert mail <IDX> It means to set mail object which will get the information from
Vigor router if something wrong with VigorSwitch.
<IDX>: Enter the index number of the mail object.
Example
> swm db ctl en
Enable database to recoard SWM information.
>
Syntax
swm alert enable/disable
swm alert show
swm alert en/dis <Idx>
Syntax Description
Parameter Description
enable/disable It means to enable/disable Alert mechanism.
enable: Enable the mechanism.
disable: Disable the mechanism.
show It means to display a list of all alert setup.
en/dis <Idx> It means to enable / disable the Alert Action settings.
en: Enable the settings.
dis: Disabel the settings.
<Idx>: Enter the index number (1 to 8) of the alert action item.
set <Idx> log <e/d> It means to enable / disable the function of creating log of alert.
e: Enable the settings.
d: Disabel the settings.
<Idx>: Enter the index number (1 to 8) of the alert action item.
Note that No Log for index 1; and log for index 2 is enabled in
default.
set <Idx> name <name> It means to set level name of each alert.
<Idx>: Enter the index number (1 to 8) of the alert action item.
<name>: Enter a short description of the alert.
set <Idx> color <O/R/N> It means to define the color for each level of alert. The color of
index 1 is No color and unable to be changed.
<Idx>: Enter the index number (2 to 8) of the alert action item.
<O/R/N>: "O" means orange; "R" means red; "N" means no color.
set <Idx> notif <e/d> It means to enable or disable the function of sending notifiction to
specified phone number via SMS.
<Idx>: Enter the index number (3 to 8) of the alert action item.
e: Enable the settings.
d: Disabel the settings.
set <idx> obj <object idx> It means to specify SMS/Email service object(s) for the alert item.
<object value> Each alert can be set with up to four objects.
<Idx>: Enter the index number (3 to 8) of the alert action item.
<object idx>: Enter the queue number (1 to 4) for specifying an
object profile.
<object value>: Enter the index number (1 to 10) of the SMS/Email
service object profile.
display It means to display all switches with port alert state.
en/dis <sw/port> <mac> It means to enable or disable the Switch Alert /Port Alert action.
en: Enable the function.
dis: Disable the function.
<sw/port>: "sw" means Switch Alert; "port" means Port Alert.
Example
> swm alert set 2 color N
> swm alert show
Idx En/Dis Level Color Create Log Send Notification(1-4)
--- ----- ----------------- --------- --------- ------------------------------
1 En No Alert No Color Disable Disable 0 , 0 , 0 , 0
2 En Minor Alert No Color Enable Disable 0 , 0 , 0 , 0
3 En Moderate Alert Orange Enable Disable 0 , 0 , 0 , 0
Syntax
swm log show filter
swm log show day
swm log show week
swm log set level <idx> on/off
swm log set type <idx> on/off
swm log set switch <mac> on/off
Syntax Description
Parameter Description
show filter It means to display the log filter setup.
show day It means to display the quantity of day log.
show week It means to display the quantity of week log.
set level <idx> on/off It means to turn on or turn off the alert level.
<idx>: 1 to 8.
Example
> swm log show filter
Index Status Level En/Dis
----- ------ --------------- --------
1 off No Alert En
2 off Minor Alert En
3 off Moderate Alert En
4 off Major Alert En
5 off Dis
6 off Dis
7 off Dis
8 off Dis
Syntax
swm snmp sys <MAC>
swm snmp iftbl <MAC> <port_num>
swm snmp poe <MAC>
swm snmp trpcom show <MAC>
swm snmp trpcom set <MAC> <name>
Syntax Description
Parameter Description
sys <MAC> It means to show the system information.
<MAC>: Enter the MAC address of the VigorSwitch.
iftbl <MAC> <port_num> It means to show port interface information.
<MAC>: Enter the MAC address of the VigorSwitch.
Example
> swm snmp sys 001daa0ccd08
sysDescr:DrayTek Corp. 24-Port 10/100/1000BaseT + 4-Port 100M/1000M
Combo SFP L2
Switch
sysObjectID:1.3.6.1.4.1.7367
sysUpTime:310 hr 56 m 38 s
sysContact:Default
sysName:G2280
sysLocation:Default
sysServices:79
ifNumber:0
> swm snmp trpcom show 001daa0ccd08
Trap Community:public
>
Syntax
service -s
service -r
service -l <account> <password>
service -i <new_owner> <new_owner_email>
service -t <yes>/<no>
service -c
Syntax Description
Parameter Description
-s Display the service status.
-r Refresh the service status
-l <account><password> Login to MyVigor server. Enter the account and password registered
to MyVigor server
account - Enter the name of the account.
Password - Enter the password of the account.
-i Enter the name and the e-mail address of the new owner for service
Example
> service -l carrieni ttt0016ttt5
Login Account:carrieni, Pw:ttt0016ttt5
Login Success! Please check Service Status again!
> service -s
Show service status.
Now state is [SS_STATE_REG_ACC_VALID]
Service Status:
Model Name : Vigor1000B Series
Serial Number: 2019053108580701
MAC Address : 00:1D:AA:73:4A:78
Owner Account: carrieni
E-mail : ca******i@draytek.com