Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Nortel BSR222 manuals

BSR222 first page preview

BSR222

Brand: Nortel | Category: Network Hardware
Table of contents
BSR222 first page preview

BSR222

Brand: Nortel | Category: Network Router
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Preface
  13. Related publications
  14. USA and Canada Authorized Distributors
  15. CALA (Caribbean & Latin America)
  16. Chapter 1 Getting to know your Nortel Business Secure Router 222
  17. Physical features
  18. Auxiliary port
  19. Certificates
  20. Brute force password guessing protection
  21. PPTP Encapsulation
  22. SNMP
  23. Full network management
  24. Applications for the Nortel Business Secure Router 222
  25. Hardware Setup
  26. Introducing the SMT
  27. Logging on to the SMT
  28. Main menu
  29. Changing the system password
  30. SMT menus at a glance
  31. SMT menu 1 - general setup
  32. Configuring dynamic DNS
  33. WAN and Dial Backup Setup
  34. Dial backup
  35. Advanced WAN setup
  36. Remote node profile (Backup ISP)
  37. Editing PPP options
  38. Editing TCP/IP options
  39. Editing logon script
  40. Remote node filter
  41. LAN setup
  42. TCP/IP and DHCP ethernet setup menu
  43. IP Alias Setup
  44. Internet access
  45. Configuring the PPTP client
  46. Configuring the PPPoE client
  47. Basic setup complete
  48. Remote Node setup
  49. Remote Node profile setup
  50. PPPoE Encapsulation
  51. Outgoing Authentication Protocol
  52. Nailed-Up Connection
  53. Traffic Redirect setup
  54. IP Static Route Setup
  55. Dial-in User Setup
  56. Network Address Translation (NAT)
  57. NAT setup
  58. SUA Address Mapping Set
  59. User-Defined Address Mapping Sets
  60. Ordering Your Rules
  61. Configuring a server behind NAT
  62. General NAT examples
  63. Example 2: Internet access with an inside server
  64. Example 3: Multiple public IP addresses with inside servers
  65. Configuring Trigger Port forwarding
  66. Introducing the firewall
  67. Filter configuration
  68. Filter Structure
  69. filter set
  70. Configuring a Filter Set
  71. Configuring a Filter Rule
  72. Configuring a Generic Filter Rule
  73. Example Filter
  74. Filter Types and NAT
  75. Applying a Filter
  76. Applying Remote Node Filters
  77. SNMP Configuration
  78. SNMP Traps
  79. System security
  80. Configuring external RADIUS server
  81. IEEE 802.1x
  82. System information and diagnosis
  83. System Status
  84. System information and console port speed
  85. System Information
  86. Console port speed
  87. Packet triggered
  88. ppp log
  89. Firewall log
  90. WAN DHCP
  91. Firmware and configuration file maintenance
  92. Backup configuration
  93. Using the FTP command from the command line
  94. Example of FTP commands from the command line
  95. TFTP and FTP over WAN Management Limitations
  96. TFTP command example
  97. Back up via console port
  98. Restore configuration
  99. Restore Using FTP
  100. Restore using FTP session example
  101. Uploading Firmware and Configuration Files
  102. Firmware file upload
  103. Configuration file upload
  104. FTP Session Example of Firmware File Upload
  105. TFTP upload command example
  106. Uploading via console port
  107. Uploading Xmodem firmware using HyperTerminal
  108. Uploading Xmodem configuration file using HyperTerminal
  109. System Maintenance menus 8 to 10
  110. Command syntax
  111. Command usage
  112. Call control support
  113. Call History
  114. Time and Date setting
  115. Resetting the Time
  116. Remote Management
  117. Remote Management Limitations
  118. Call scheduling
  119. Setting up your computer IP address
  120. Installing components
  121. Configuring
  122. Verifying Settings
  123. Windows 2000/NT/XP
  124. Macintosh OS 8/9
  125. Macintosh OS X
  126. Triangle Route
  127. The Triangle Route Solutions
  128. Importing certificates
  129. Importing the Business Secure Router Certificate into Internet Explorer
  130. Enrolling and Importing SSL Client Certificates
  131. installing your personal certificates
  132. Using a certificate when accessing the Business Secure Router example
  133. PPPoE
  134. How PPPoE works
  135. PPTP
  136. PPTP and the Business Secure Router
  137. Control and PPP connections
  138. PPP data connection
  139. Hardware specifications
  140. AC Power Adapter Specifications
  141. IP subnetting
  142. Subnet masks
  143. Example: two subnets
  144. Example: four subnets
  145. Example: eight subnets
  146. Subnetting with Class A and Class B networks
  147. Command Interpreter
  148. Sys commands
  149. Exit Command
  150. IP commands
  151. IPSec commands
  152. Sys firewall commands
  153. Bandwidth management commands
  154. Certificates commands
  155. IEEE 802.1X commands
  156. NetBIOS filter commands
  157. Display NetBIOS filter settings
  158. Example commands
  159. Boot Commands
  160. Log descriptions
  161. VPN/IPSec logs
  162. VPN responder IPSec log
  163. Log commands
  164. Configuring what you want the Business Secure Router to log
  165. Log command example
  166. Appendix L
  167. SIP Identities
  168. SIP Service Domain
  169. SIP Servers
  170. SIP Redirect Server
  171. SIP Register Server
  172. sip alg
  173. signaling session timeout
  174. Index
BSR222 first page preview

BSR222

Brand: Nortel | Category: Network Router
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. Table Of Contents
  22. Table Of Contents
  23. Table Of Contents
  24. Table Of Contents
  25. Table Of Contents
  26. Preface
  27. Related publications
  28. Getting Help from the Nortel Web site
  29. Getting Help from a specialist by using an Express Routing Code
  30. Getting to know your Nortel Business Secure Router 222
  31. Physical features
  32. Auxiliary port
  33. Certificates
  34. Brute force password guessing protection
  35. PPTP Encapsulation
  36. SNMP
  37. Full network management
  38. Applications for the Nortel Business Secure Router 222
  39. Hardware Setup
  40. Introducing the WebGUI
  41. Figure 2 Login screen
  42. Figure 3 Change password screen
  43. Restoring the factory default configuration settings
  44. Navigating the Business Secure Router WebGUI
  45. NN47922
  46. Figure 7 Contact Support
  47. Wizard setup
  48. Domain Name
  49. Ethernet
  50. PPTP
  51. Figure 10 Wizard 2: PPTP Encapsulation
  52. PPPoE Encapsulation
  53. Figure 11 Wizard2: PPPoE Encapsulation
  54. Wizard setup: Screen 3
  55. IP address and Subnet Mask
  56. DNS Server address assignment
  57. Table 6 Example of network properties for LAN servers with fixed IP addresses
  58. Figure 12 Wizard 3
  59. Basic Setup Complete
  60. User Notes
  61. Firewall
  62. VPN Client Termination
  63. Security
  64. Advanced Router Configuration
  65. Adding IP telephony to a multi-site network
  66. Configuring the router to act as a Nortel VPN Server (Client Termination)
  67. Allowing remote management of a LAN-connected BCM50
  68. Preventing heavy data traffic from impacting telephone calls
  69. Inter-Operability With Third-Party Routers
  70. System screens
  71. Configuring General Setup
  72. Figure 14 System general setup
  73. Dynamic DNS
  74. Figure 15 DDNS
  75. Configuring Password
  76. Figure 16 Password
  77. Predefined NTP time server list
  78. Configuring Time and Date
  79. Figure 17 Time and Date
  80. Table 12 Time and Date
  81. Configuring ALG
  82. Table 13 ALG
  83. LAN screens
  84. DNS servers
  85. Multicast
  86. Configuring IP
  87. Configuring Static DHCP
  88. Configuring IP Alias
  89. WAN screens
  90. Configuring Route
  91. Configuring WAN ISP
  92. Figure 24 PPPoE Encapsulation
  93. Figure 25 PPTP Encapsulation
  94. Service type
  95. Figure 26 RR Service type
  96. Configuring WAN IP
  97. Figure 27 WAN: IP
  98. Table 22 WAN: IP
  99. Configuring WAN MAC
  100. Traffic redirect
  101. Configuring Traffic Redirect
  102. Figure 31 Traffic Redirect
  103. Configuring Dial Backup
  104. Figure 32 Dial Backup Setup
  105. Table 24 Dial Backup Setup
  106. Advanced Modem Setup
  107. Configuring Advanced Modem Setup
  108. Table 25 Advanced Setup
  109. Network Address Translation (NAT) Screens
  110. What NAT does
  111. How NAT works
  112. NAT application
  113. NAT mapping types
  114. Using NAT
  115. SUA Server
  116. Port forwarding: Services and Port Numbers
  117. Configuring SUA Server
  118. Figure 38 SUA/NAT setup
  119. Configuring Address Mapping
  120. Figure 39 Address Mapping
  121. Figure 40 Address Mapping edit
  122. Trigger Port Forwarding
  123. Two points to remember about Trigger Ports
  124. Configuring Trigger Port Forwarding
  125. Table 32 Trigger Port
  126. Static Route screens
  127. Configuring IP Static Route
  128. Figure 44 Static Route screen
  129. Configuring Route entry
  130. Firewalls
  131. Packet Filtering firewalls
  132. Introduction to the Business Secure Router firewall
  133. Denial of Service
  134. Types of DoS attacks
  135. Figure 47 Three-way handshake
  136. Figure 48 SYN flood
  137. Figure 49 Smurf attack
  138. Stateful inspection
  139. Stateful inspection process
  140. Stateful inspection and the Business Secure Router
  141. TCP security
  142. UDP/ICMP security
  143. Guidelines for enhancing security with your firewall
  144. Packet filtering vs. firewall
  145. Firewall screens
  146. Rule logic overview
  147. Key fields for configuring rules
  148. LAN to WAN rules
  149. Configuring firewall
  150. Figure 53 Enabling the firewall
  151. Configuring firewall rules
  152. Figure 54 Creating and editing a firewall rule
  153. Configuring source and destination addresses
  154. Configuring custom ports
  155. Example firewall rule
  156. Figure 58 Firewall rule edit IP example
  157. Figure 60 MyService rule configuration example
  158. Predefined services
  159. Table 42 Predefined services
  160. Alerts
  161. Configuring attack alert
  162. TCP maximum incomplete and blocking period
  163. Figure 62 Attack alert
  164. Content filtering
  165. Configure Content Filtering
  166. Table 44 Content filter
  167. IPSec
  168. VPN screens overview
  169. Other terminology
  170. Data confidentiality
  171. IPSec algorithms
  172. AH (Authentication Header) protocol
  173. Key management
  174. Encapsulation
  175. IPSec and NAT
  176. Secure Gateway Address
  177. Dynamic Secure Gateway Address
  178. Figure 68 Summary
  179. Table 49 Summary
  180. Keep Alive
  181. NAT Traversal
  182. NAT Traversal configuration
  183. Figure 70 VPN Contivity Client rule setup
  184. Configuring Advanced Setup
  185. Table 51 VPN Contivity Client advanced rule setup
  186. ID Type and content
  187. ID type and content examples
  188. Figure 72 VPN Branch Office rule setup
  189. Table 56 VPN Branch Office rule setup
  190. Configuring an IP Policy
  191. Table 57 VPN Branch Office — IP Policy
  192. Port forwarding server
  193. Figure 74 VPN Branch Office — IP Policy - Port Forwarding Server
  194. IKE phases
  195. Negotiation Mode
  196. Preshared key
  197. Configuring advanced Branch office setup
  198. Table 59 VPN Branch Office Advanced Rule Setup
  199. SA Monitor
  200. Figure 77 VPN SA Monitor
  201. Global settings
  202. Figure 78 VPN Global Setting
  203. Figure 79 VPN Client Termination
  204. Table 62 VPN Client Termination
  205. VPN Client Termination IP pool summary
  206. Figure 80 VPN Client Termination IP pool summary
  207. VPN Client Termination IP pool edit
  208. VPN Client Termination advanced
  209. Figure 82 VPN Client Termination advanced
  210. Table 65 VPN Client Termination advanced
  211. Advantages of certificates
  212. Configuration summary
  213. Figure 84 My Certificates
  214. Table 66 My Certificates
  215. Certificate file formats
  216. Importing a certificate
  217. Figure 85 My Certificate Import
  218. Creating a certificate
  219. Table 68 My Certificate create
  220. My Certificate details
  221. Figure 87 My Certificate details
  222. Table 69 My Certificate details
  223. Trusted CAs
  224. Figure 88 Trusted CAs
  225. Importing a Trusted CA's certificate
  226. Trusted CA Certificate details
  227. Figure 90 Trusted CA details
  228. Table 72 Trusted CA details
  229. Trusted remote hosts
  230. Figure 91 Trusted remote hosts
  231. Verifying a certificate of a trusted remote host
  232. Figure 92 Remote host certificates
  233. Importing a certificate of a trusted remote host
  234. Trusted remote host certificate details
  235. Figure 95 Trusted remote host details
  236. Table 75 Trusted remote host details
  237. Directory servers
  238. Add or edit a directory server
  239. Figure 97 Directory server add
  240. Bandwidth management
  241. Bandwidth classes and filters
  242. Application and subnet based bandwidth management
  243. Configuring summary
  244. Configuring class setup
  245. Figure 100 Bandwidth Manager: Class setup
  246. Bandwidth Manager Class Configuration
  247. Figure 101 Bandwidth Manager: Edit class
  248. Bandwidth management statistics
  249. Figure 102 Bandwidth management statistics
  250. Monitor
  251. IEEE 802.1x
  252. EAP Authentication overview
  253. Configuring 802.1X
  254. Figure 105 802.1X
  255. Authentication server
  256. Figure 106 Local User database
  257. Edit Local User Database
  258. Figure 107 Local User database edit
  259. Table 87 Local User database edit
  260. Current split networks
  261. Current split networks edit
  262. Configuring RADIUS
  263. Figure 110 RADIUS
  264. Remote management screens
  265. Remote management and NAT
  266. Introduction to HTTPS
  267. Configuring WWW
  268. Figure 112 WWW
  269. HTTPS example
  270. Internet Explorer warning messages
  271. Figure 114 Figure 18-4 Security Certificate 1 (Netscape)
  272. Avoiding the browser warning messages
  273. Logon screen
  274. Figure 116 Logon screen (Internet Explorer)
  275. Figure 117 Login screen (Netscape)
  276. Figure 118 Replace certificate
  277. Figure 119 Device-specific certificate
  278. SSH overview
  279. How SSH works
  280. SSH implementation on the Business Secure Router
  281. Figure 123 SSH
  282. Secure Telnet using SSH examples
  283. Example 2: Linux
  284. Secure FTP using SSH example
  285. Telnet
  286. Configuring TELNET
  287. Configuring FTP
  288. Configuring SNMP
  289. Figure 131 SNMP Management Model
  290. Supported MIBs
  291. REMOTE MANAGEMENT: SNMP
  292. Configuring DNS
  293. Configuring Security
  294. Figure 134 Security
  295. UPnP
  296. Cautions with UPnP
  297. Figure 135 Configuring UPnP
  298. Displaying UPnP port mapping
  299. Installing UPnP in Windows example
  300. Installing UPnP in Windows XP
  301. Figure 139 Network connections
  302. Using UPnP in Windows XP example
  303. Figure 142 Internet gateway icon
  304. Figure 144 Internet connection properties advanced setup
  305. WebGUI easy access
  306. Figure 148 Network connections
  307. Logs Screens
  308. Figure 150 View Log
  309. Configuring Log settings
  310. Figure 151 Log settings
  311. Table 102 Log settings
  312. Configuring Reports
  313. Figure 152 Reports
  314. Viewing Web site hits
  315. Figure 153 Web site hits report example
  316. Viewing Protocol/Port
  317. Viewing LAN IP address
  318. Figure 155 LAN IP address report example
  319. Reports specifications
  320. Call scheduling screens
  321. Figure 156 Call schedule summary
  322. Call scheduling edit
  323. Table 109 Call schedule edit
  324. Applying Schedule Sets to a remote node
  325. Maintenance
  326. Figure 159 System Status
  327. System statistics
  328. DHCP Table screen
  329. F/W Upload screen
  330. Figure 162 Firmware upload
  331. Figure 163 Firmware Upload In Process
  332. Configuration screen
  333. Backup configuration
  334. Restore configuration
  335. Restart screen
  336. Figure 170 Restart screen
  337. Troubleshooting
  338. Problems with the LAN LED
  339. Problems with the WAN interface
  340. Problems accessing an internet Web site
  341. Problems with the WebGUI
  342. Allowing Pop-up Windows, JavaScript and Java Permissions
  343. Enabling Pop-up Blockers with Exceptions
  344. Figure 173 Internet options
  345. Internet Explorer JavaScript
  346. Figure 175 Internet options
  347. Internet Explorer Java Permissions
  348. JAVA (Sun)
  349. Netscape Pop-up Blockers
  350. Allowing Pop-ups
  351. Enable Pop-up Blockers with Exceptions
  352. Figure 182 Popup Windows
  353. Netscape Java Permissions and JavaScript
  354. Figure 184 Advanced
  355. Figure 185 Scripts & Plug-ins
  356. Log Descriptions
  357. Table 126 UPnP Logs
  358. Table 129 Access Logs
  359. Table 130 ACL Setting Notes
  360. VPN/IPSec Logs
  361. VPN Responder IPSec Log
  362. Figure 187 Example VPN Responder IPSec Log
  363. Table 133 Sample IKE Key Exchange Logs
  364. Table 134 Sample IPSec Logs During Packet Transmission
  365. Table 137 Certificate Path Verification Failure Reason Codes
  366. Table 138 IIEEE 802.1X Logs
  367. Log Commands
  368. Displaying Logs
  369. Log Command Example
  370. Index
Related products
222BCNBLNBCM200BCM400BAP120BES200BCM 450BES1000BCM50 2.0
Nortel categories
More Nortel categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine