Nortel BSR222 manuals
BSR222
Table of contents
- Table Of Contents
- Table Of Contents
- how to get help
- New in this release
- Getting started
- First step
- Third step
- Preconfiguration checklist
- New products
- Existing products
- Business Element Manager
- Business Secure Router 222 (BSR222)
- IP addressing for SMB devices and DHCP
- Installing the Element Manager
- Converged small site (mixed-vendor environment): reference topology 1
- Configuring a converged small site (mixed-vendor environment)
- Smaller converged site (Greenfield and infrastructure replacement): reference topology 2
- Configuring a smaller converged site (Greenfield and infrastructure replacement)
- Smaller remote site (Greenfield and infrastructure replacement reference topology 3
- Configuring a smaller remote site (Greenfield and infrastructure replacement)
- WAN interconnected LAN reference topologies
- Configuring tunnels
- Interconnection of peer sites using BSR222 (topology 2 with topology 2)
- Interconnection of BSR222 and an incumbent router (topology 1 with topology 3)
- Interconnection of main and remote sites using BSR222 (topology 2 with topology 3)
- Maintenance
- Securing your SMB network
- BAP120 engineering rules and guidelines
- BAP120 performance measurements
- Third-party WiFi client interoperability
BSR222
Table of contents
- Table Of Contents
- Table Of Contents
- Preface
- Related publications
- Hard-copy technical manuals
- AC Power Adapter Specifications
- Introducing the Business Secure Router
- Hardware installation
- Front panel
- Rear panel
- Setting up your computer IP address
- Checking your computer IP address
- Configuring your Business Secure Router
- Using the wizard to configure for internet access
- Internet connection with ethernet
- Internet connection with PPPoE
- Internet connection with PPTP
- WAN IP address assignment
- Test your internet connection
- User Notes
- Firewall
- Security
- Advanced Router Configuration
- Adding IP telephony to a multi-site network
- Configuring the router to act as a Nortel VPN Server (Client Termination)
- Setting up the router for guest access
- Setting Up a Remote Office with a UNIStim IP Telephone
- Inter-Operability With Third-Party Routers
- Troubleshooting
- Problem: You cannot get a WAN IP address from the ISP
BSR222
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Preface
- Related publications
- USA and Canada Authorized Distributors
- CALA (Caribbean & Latin America)
- Chapter 1 Getting to know your Nortel Business Secure Router 222
- Physical features
- Auxiliary port
- Certificates
- Brute force password guessing protection
- PPTP Encapsulation
- SNMP
- Full network management
- Applications for the Nortel Business Secure Router 222
- Hardware Setup
- Introducing the SMT
- Logging on to the SMT
- Main menu
- Changing the system password
- SMT menus at a glance
- SMT menu 1 - general setup
- Configuring dynamic DNS
- WAN and Dial Backup Setup
- Dial backup
- Advanced WAN setup
- Remote node profile (Backup ISP)
- Editing PPP options
- Editing TCP/IP options
- Editing logon script
- Remote node filter
- LAN setup
- TCP/IP and DHCP ethernet setup menu
- IP Alias Setup
- Internet access
- Configuring the PPTP client
- Configuring the PPPoE client
- Basic setup complete
- Remote Node setup
- Remote Node profile setup
- PPPoE Encapsulation
- Outgoing Authentication Protocol
- Nailed-Up Connection
- Traffic Redirect setup
- IP Static Route Setup
- Dial-in User Setup
- Network Address Translation (NAT)
- NAT setup
- SUA Address Mapping Set
- User-Defined Address Mapping Sets
- Ordering Your Rules
- Configuring a server behind NAT
- General NAT examples
- Example 2: Internet access with an inside server
- Example 3: Multiple public IP addresses with inside servers
- Configuring Trigger Port forwarding
- Introducing the firewall
- Filter configuration
- Filter Structure
- filter set
- Configuring a Filter Set
- Configuring a Filter Rule
- Configuring a Generic Filter Rule
- Example Filter
- Filter Types and NAT
- Applying a Filter
- Applying Remote Node Filters
- SNMP Configuration
- SNMP Traps
- System security
- Configuring external RADIUS server
- IEEE 802.1x
- System information and diagnosis
- System Status
- System information and console port speed
- System Information
- Console port speed
- Packet triggered
- ppp log
- Firewall log
- WAN DHCP
- Firmware and configuration file maintenance
- Backup configuration
- Using the FTP command from the command line
- Example of FTP commands from the command line
- TFTP and FTP over WAN Management Limitations
- TFTP command example
- Back up via console port
- Restore configuration
- Restore Using FTP
- Restore using FTP session example
- Uploading Firmware and Configuration Files
- Firmware file upload
- Configuration file upload
- FTP Session Example of Firmware File Upload
- TFTP upload command example
- Uploading via console port
- Uploading Xmodem firmware using HyperTerminal
- Uploading Xmodem configuration file using HyperTerminal
- System Maintenance menus 8 to 10
- Command syntax
- Command usage
- Call control support
- Call History
- Time and Date setting
- Resetting the Time
- Remote Management
- Remote Management Limitations
- Call scheduling
- Setting up your computer IP address
- Installing components
- Configuring
- Verifying Settings
- Windows 2000/NT/XP
- Macintosh OS 8/9
- Macintosh OS X
- Triangle Route
- The Triangle Route Solutions
- Importing certificates
- Importing the Business Secure Router Certificate into Internet Explorer
- Enrolling and Importing SSL Client Certificates
- installing your personal certificates
- Using a certificate when accessing the Business Secure Router example
- PPPoE
- How PPPoE works
- PPTP
- PPTP and the Business Secure Router
- Control and PPP connections
- PPP data connection
- Hardware specifications
- AC Power Adapter Specifications
- IP subnetting
- Subnet masks
- Example: two subnets
- Example: four subnets
- Example: eight subnets
- Subnetting with Class A and Class B networks
- Command Interpreter
- Sys commands
- Exit Command
- IP commands
- IPSec commands
- Sys firewall commands
- Bandwidth management commands
- Certificates commands
- IEEE 802.1X commands
- NetBIOS filter commands
- Display NetBIOS filter settings
- Example commands
- Boot Commands
- Log descriptions
- VPN/IPSec logs
- VPN responder IPSec log
- Log commands
- Configuring what you want the Business Secure Router to log
- Log command example
- Appendix L
- SIP Identities
- SIP Service Domain
- SIP Servers
- SIP Redirect Server
- SIP Register Server
- sip alg
- signaling session timeout
- Index
BSR222
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Preface
- Related publications
- Getting Help from the Nortel Web site
- Getting Help from a specialist by using an Express Routing Code
- Getting to know your Nortel Business Secure Router 222
- Physical features
- Auxiliary port
- Certificates
- Brute force password guessing protection
- PPTP Encapsulation
- SNMP
- Full network management
- Applications for the Nortel Business Secure Router 222
- Hardware Setup
- Introducing the WebGUI
- Figure 2 Login screen
- Figure 3 Change password screen
- Restoring the factory default configuration settings
- Navigating the Business Secure Router WebGUI
- NN47922
- Figure 7 Contact Support
- Wizard setup
- Domain Name
- Ethernet
- PPTP
- Figure 10 Wizard 2: PPTP Encapsulation
- PPPoE Encapsulation
- Figure 11 Wizard2: PPPoE Encapsulation
- Wizard setup: Screen 3
- IP address and Subnet Mask
- DNS Server address assignment
- Table 6 Example of network properties for LAN servers with fixed IP addresses
- Figure 12 Wizard 3
- Basic Setup Complete
- User Notes
- Firewall
- VPN Client Termination
- Security
- Advanced Router Configuration
- Adding IP telephony to a multi-site network
- Configuring the router to act as a Nortel VPN Server (Client Termination)
- Allowing remote management of a LAN-connected BCM50
- Preventing heavy data traffic from impacting telephone calls
- Inter-Operability With Third-Party Routers
- System screens
- Configuring General Setup
- Figure 14 System general setup
- Dynamic DNS
- Figure 15 DDNS
- Configuring Password
- Figure 16 Password
- Predefined NTP time server list
- Configuring Time and Date
- Figure 17 Time and Date
- Table 12 Time and Date
- Configuring ALG
- Table 13 ALG
- LAN screens
- DNS servers
- Multicast
- Configuring IP
- Configuring Static DHCP
- Configuring IP Alias
- WAN screens
- Configuring Route
- Configuring WAN ISP
- Figure 24 PPPoE Encapsulation
- Figure 25 PPTP Encapsulation
- Service type
- Figure 26 RR Service type
- Configuring WAN IP
- Figure 27 WAN: IP
- Table 22 WAN: IP
- Configuring WAN MAC
- Traffic redirect
- Configuring Traffic Redirect
- Figure 31 Traffic Redirect
- Configuring Dial Backup
- Figure 32 Dial Backup Setup
- Table 24 Dial Backup Setup
- Advanced Modem Setup
- Configuring Advanced Modem Setup
- Table 25 Advanced Setup
- Network Address Translation (NAT) Screens
- What NAT does
- How NAT works
- NAT application
- NAT mapping types
- Using NAT
- SUA Server
- Port forwarding: Services and Port Numbers
- Configuring SUA Server
- Figure 38 SUA/NAT setup
- Configuring Address Mapping
- Figure 39 Address Mapping
- Figure 40 Address Mapping edit
- Trigger Port Forwarding
- Two points to remember about Trigger Ports
- Configuring Trigger Port Forwarding
- Table 32 Trigger Port
- Static Route screens
- Configuring IP Static Route
- Figure 44 Static Route screen
- Configuring Route entry
- Firewalls
- Packet Filtering firewalls
- Introduction to the Business Secure Router firewall
- Denial of Service
- Types of DoS attacks
- Figure 47 Three-way handshake
- Figure 48 SYN flood
- Figure 49 Smurf attack
- Stateful inspection
- Stateful inspection process
- Stateful inspection and the Business Secure Router
- TCP security
- UDP/ICMP security
- Guidelines for enhancing security with your firewall
- Packet filtering vs. firewall
- Firewall screens
- Rule logic overview
- Key fields for configuring rules
- LAN to WAN rules
- Configuring firewall
- Figure 53 Enabling the firewall
- Configuring firewall rules
- Figure 54 Creating and editing a firewall rule
- Configuring source and destination addresses
- Configuring custom ports
- Example firewall rule
- Figure 58 Firewall rule edit IP example
- Figure 60 MyService rule configuration example
- Predefined services
- Table 42 Predefined services
- Alerts
- Configuring attack alert
- TCP maximum incomplete and blocking period
- Figure 62 Attack alert
- Content filtering
- Configure Content Filtering
- Table 44 Content filter
- IPSec
- VPN screens overview
- Other terminology
- Data confidentiality
- IPSec algorithms
- AH (Authentication Header) protocol
- Key management
- Encapsulation
- IPSec and NAT
- Secure Gateway Address
- Dynamic Secure Gateway Address
- Figure 68 Summary
- Table 49 Summary
- Keep Alive
- NAT Traversal
- NAT Traversal configuration
- Figure 70 VPN Contivity Client rule setup
- Configuring Advanced Setup
- Table 51 VPN Contivity Client advanced rule setup
- ID Type and content
- ID type and content examples
- Figure 72 VPN Branch Office rule setup
- Table 56 VPN Branch Office rule setup
- Configuring an IP Policy
- Table 57 VPN Branch Office — IP Policy
- Port forwarding server
- Figure 74 VPN Branch Office — IP Policy - Port Forwarding Server
- IKE phases
- Negotiation Mode
- Preshared key
- Configuring advanced Branch office setup
- Table 59 VPN Branch Office Advanced Rule Setup
- SA Monitor
- Figure 77 VPN SA Monitor
- Global settings
- Figure 78 VPN Global Setting
- Figure 79 VPN Client Termination
- Table 62 VPN Client Termination
- VPN Client Termination IP pool summary
- Figure 80 VPN Client Termination IP pool summary
- VPN Client Termination IP pool edit
- VPN Client Termination advanced
- Figure 82 VPN Client Termination advanced
- Table 65 VPN Client Termination advanced
- Advantages of certificates
- Configuration summary
- Figure 84 My Certificates
- Table 66 My Certificates
- Certificate file formats
- Importing a certificate
- Figure 85 My Certificate Import
- Creating a certificate
- Table 68 My Certificate create
- My Certificate details
- Figure 87 My Certificate details
- Table 69 My Certificate details
- Trusted CAs
- Figure 88 Trusted CAs
- Importing a Trusted CA's certificate
- Trusted CA Certificate details
- Figure 90 Trusted CA details
- Table 72 Trusted CA details
- Trusted remote hosts
- Figure 91 Trusted remote hosts
- Verifying a certificate of a trusted remote host
- Figure 92 Remote host certificates
- Importing a certificate of a trusted remote host
- Trusted remote host certificate details
- Figure 95 Trusted remote host details
- Table 75 Trusted remote host details
- Directory servers
- Add or edit a directory server
- Figure 97 Directory server add
- Bandwidth management
- Bandwidth classes and filters
- Application and subnet based bandwidth management
- Configuring summary
- Configuring class setup
- Figure 100 Bandwidth Manager: Class setup
- Bandwidth Manager Class Configuration
- Figure 101 Bandwidth Manager: Edit class
- Bandwidth management statistics
- Figure 102 Bandwidth management statistics
- Monitor
- IEEE 802.1x
- EAP Authentication overview
- Configuring 802.1X
- Figure 105 802.1X
- Authentication server
- Figure 106 Local User database
- Edit Local User Database
- Figure 107 Local User database edit
- Table 87 Local User database edit
- Current split networks
- Current split networks edit
- Configuring RADIUS
- Figure 110 RADIUS
- Remote management screens
- Remote management and NAT
- Introduction to HTTPS
- Configuring WWW
- Figure 112 WWW
- HTTPS example
- Internet Explorer warning messages
- Figure 114 Figure 18-4 Security Certificate 1 (Netscape)
- Avoiding the browser warning messages
- Logon screen
- Figure 116 Logon screen (Internet Explorer)
- Figure 117 Login screen (Netscape)
- Figure 118 Replace certificate
- Figure 119 Device-specific certificate
- SSH overview
- How SSH works
- SSH implementation on the Business Secure Router
- Figure 123 SSH
- Secure Telnet using SSH examples
- Example 2: Linux
- Secure FTP using SSH example
- Telnet
- Configuring TELNET
- Configuring FTP
- Configuring SNMP
- Figure 131 SNMP Management Model
- Supported MIBs
- REMOTE MANAGEMENT: SNMP
- Configuring DNS
- Configuring Security
- Figure 134 Security
- UPnP
- Cautions with UPnP
- Figure 135 Configuring UPnP
- Displaying UPnP port mapping
- Installing UPnP in Windows example
- Installing UPnP in Windows XP
- Figure 139 Network connections
- Using UPnP in Windows XP example
- Figure 142 Internet gateway icon
- Figure 144 Internet connection properties advanced setup
- WebGUI easy access
- Figure 148 Network connections
- Logs Screens
- Figure 150 View Log
- Configuring Log settings
- Figure 151 Log settings
- Table 102 Log settings
- Configuring Reports
- Figure 152 Reports
- Viewing Web site hits
- Figure 153 Web site hits report example
- Viewing Protocol/Port
- Viewing LAN IP address
- Figure 155 LAN IP address report example
- Reports specifications
- Call scheduling screens
- Figure 156 Call schedule summary
- Call scheduling edit
- Table 109 Call schedule edit
- Applying Schedule Sets to a remote node
- Maintenance
- Figure 159 System Status
- System statistics
- DHCP Table screen
- F/W Upload screen
- Figure 162 Firmware upload
- Figure 163 Firmware Upload In Process
- Configuration screen
- Backup configuration
- Restore configuration
- Restart screen
- Figure 170 Restart screen
- Troubleshooting
- Problems with the LAN LED
- Problems with the WAN interface
- Problems accessing an internet Web site
- Problems with the WebGUI
- Allowing Pop-up Windows, JavaScript and Java Permissions
- Enabling Pop-up Blockers with Exceptions
- Figure 173 Internet options
- Internet Explorer JavaScript
- Figure 175 Internet options
- Internet Explorer Java Permissions
- JAVA (Sun)
- Netscape Pop-up Blockers
- Allowing Pop-ups
- Enable Pop-up Blockers with Exceptions
- Figure 182 Popup Windows
- Netscape Java Permissions and JavaScript
- Figure 184 Advanced
- Figure 185 Scripts & Plug-ins
- Log Descriptions
- Table 126 UPnP Logs
- Table 129 Access Logs
- Table 130 ACL Setting Notes
- VPN/IPSec Logs
- VPN Responder IPSec Log
- Figure 187 Example VPN Responder IPSec Log
- Table 133 Sample IKE Key Exchange Logs
- Table 134 Sample IPSec Logs During Packet Transmission
- Table 137 Certificate Path Verification Failure Reason Codes
- Table 138 IIEEE 802.1X Logs
- Log Commands
- Displaying Logs
- Log Command Example
- Index
manualsdatabase
Your AI-powered manual search engine