Arcadyan Technology AR4505NW DIGITAL TRANSMISSION SYSTEM User Manual 3com
Arcadyan Technology Corporation DIGITAL TRANSMISSION SYSTEM 3com
Contents
- 1. USERS MANUAL 1 OF 4
 - 2. USERS MANUAL 2 OF 4
 - 3. USERS MANUAL 3 OF 4
 - 4. USERS MANUAL 4 OF 4
 
USERS MANUAL 3 OF 4

Firewall 71
Special Applications Special Applications let you choose specific ports to be open for specific 
applications to work properly with the Network Address Translation (NAT) 
feature of the Router. 
Figure 56   Special Applications Screen
A list of popular applications has been included to choose from. Select 
your application from the Popular Applications drop-down menu. Then 
select the row that you want to copy the settings to from the Copy To 
drop-down menu, and click Copy To. The settings will be transferred to 
the row that you specified. Click Apply to save the setting for that 
application.
If your application is not listed, you will need to check with the 
application vendor to determine which ports need to be configured. You 
can manually enter the port information into the Router. 
To manually enter the port information:
1Specify the trigger port (the one used by the application when it is 
initialized) in the Trigger Port column, and specify whether the trigger is 
TCP or UDP.
2Specify the Public Ports used by the application, that will need to be 
opened up in the firewall for the application to work properly. Also 
specify whether these ports are TCP or UDP.
3Check the Enabled checkbox, then click Apply.

72 CHAPTER 5: CONFIGURING THE ROUTER
Virtual Servers The Virtual servers feature allows you to route external (Internet) calls for 
services such as a web server (port 80), FTP server (Port 21), or other 
applications through your Router to your internal network. Since your 
internal computers are protected by a firewall, machines from the 
Internet cannot get to them because they cannot be 'seen'.
If you need to configure the Virtual Server function for a specific 
application, you will need to contact the application vendor to find out 
which port settings you need. 
The maximum number of virtual servers that can be configured is 20. 
Figure 57   Virtual Servers Screen
A list of popular servers has been included to choose from. Select the 
server from the Popular servers drop-down menu. Then click Add, your 
selection will be added to the table. 
If the server that you want to use is not listed in the drop-down menu, 
you can manually add the virtual server to the table. 
To manually configure your virtual servers:
1Enter the IP address, and the description in the spaces provided for the 
internal machine.
2Select the protocol type (TCP, UDP, or both TCP and UDP) from the 
drop-down menu.
3Specify the public port that will be seen by clients on the Internet, and the 
LAN port which the traffic will be routed to.

Firewall 73
4You can enable or disable each Virtual Server entry by checking or 
unchecking the appropriate Enabled checkbox.
5Click Apply to save the changes for each Virtual Server entry.
DMZ If you have a client PC that cannot run an Internet application properly 
from behind the firewall, you can open the client up to unrestricted 
two-way Internet access. This may be necessary if the NAT feature is 
causing problems with an application such as a game or video 
conferencing application.
Figure 58   DMZ Screen
Use this feature on a temporary basis. The computer in the DMZ is not 
protected from hacker attacks. 
To put a computer in the DMZ: 
1Check the Enable 1-to-1 NAT checkbox.
2Enter the last digits of the LAN IP address in the Client PC IP Address field. 
Enter the IP address (if known) that will be accessing the DMZ PC into the 
Public IP Address field, so that only the computer on the Internet at this 
address can access the DMZ PC without firewall protection. If the IP 
address is not known, or if more than one PC on the Internet will need to 
access the DMZ PC, then set the Public IP Address to 0.0.0.0.
3Click Apply.

74 CHAPTER 5: CONFIGURING THE ROUTER
Schedule Rule The Router can be configured to restrict access to the Internet, email or 
other network services at specific days and times. Define the time in this 
page, and define the rules in the PC Privileges page (see page 75).
Figure 59   Schedule Rule Screen
1Click Add Rule to add a schedule rule (a screen similar to Figure 60 will 
appear).
Figure 60   Add Schedule Rule Screen
2Enter a name and comment for the schedule rule in the Name and 
Comment fields.
3Specify the schedule rules for the required days and times - note that all 
times should be in 24 hour format. 
4Click Apply.

Firewall 75
PC Privileges The Router can be configured to restrict access to the Internet, email or 
other network services at specific days and times. Restriction can be set 
for a single computer, a range of computers, or multiple computers. 
You can define the traffic type permitted or not-permitted to the Internet.
Figure 61   PC Privileges Screen
To edit or delete specific existing filtering rules, click on Edit or Delete for 
the appropriate filtering rule.
To configure a new filtering rule: 
1Check the Enable Filtering Function checkbox. 
2Click Add PC (a screen similar to Figure 62 will appear).
Figure 62   PC Privileges Add PC Screen

76 CHAPTER 5: CONFIGURING THE ROUTER
3Enter a description in the Client PC Description field, and the IP address or 
IP address range into the Client PC IP Address fields.
4To bypass the URL Filter and Content Filter, check the corresponding 
Bypass checkbox. 
5Select the services to be blocked. A list of popular services is given on this 
screen, to block a particular service, check the appropriate Blocking 
checkbox.
If the service to be restricted is not listed here, you can enter a custom 
range of ports at the bottom of the page, under User Defined Blocked 
Ports.
6If you want the restriction to apply only at certain times, select the 
schedule rule to apply from the Schedule Rule drop-down menu.
Note that schedule rules are defined on the Schedule Rules screen 
(see page 74).
7Click Apply to add the settings.

Firewall 77
URL Filter To configure the URL filter feature, use the table on the URL Filter screen 
to specify the Web sites (www.somesite.com) and/or keywords you want 
to filter on your network.
For example, entering a keyword of xxx would block access to any URL 
that contains the string xxx.
Figure 63   URL Filter Screen
1Check the Enable URL Filtering Function checkbox.
2Enter the URL address or keywords in the URL/Keyword field.
3Select Denied or Allowed from the Mode drop-down menu. 
To complete this configuration, you will need to create or modify the 
filtering rule in the PC Privileges screen (see page 75).
From the PC Privileges Add PC screen (Figure 62), if you check the two 
options: Bypass URL Filter, and Bypass Content Filter, then the Web sites 
and keywords defined in this page will not be filtered out. 

78 CHAPTER 5: CONFIGURING THE ROUTER
Content Filter
You can use the list on the Content Filter page to specify the type of 
content that you want to filter out.
The Router comes with a 14-day free trial of the 3Com Content Filter 
Service (3CSBCFS). To activate the 14-day free trial of the service, you 
must first register your Router at www.3com.com. To continue using the 
service after the trial period, you must purchase the 12-month 
subscription license.
Figure 64   Content Filter Screen
To configure the Content Filter feature:
1Check the Enable Content Filtering Function checkbox. 
2Select the server that you want to use from the Content Filter Server 
drop-down menu. If the server you want to use is not listed, enter the 
server address manually.
3Define the time in the Server Timeout field (the default value is 3000ms). 
If the Content Filter Server does not respond within this time period, the 
Router will use the default content filter rule. The default rule is either 
Allow or Deny None of the above (Uncategorized URL). You can configure 
this rule at the bottom of the Content Filter page.

Firewall 79
4If you are not sure about your subscription status, click CHECK in 
Subscription Filtering Status to find out if you have a current, valid 
subscription.
5Subjects are listed under Core Categories and Productivity Categories. 
You can define what content should be viewed/blocked using the 
Allow/Deny option. The Deny option is used to filter out the content that 
contains the specific subject matter. Content with a specific subject 
matter will not be filtered out if the Allow option is checked. 
6Click Apply for the changes to take effect. 
Server Control The Router can be configured to restrict access to the Internet, email or 
other network services at specific days and times. Restriction can be set 
for the servers. 
You can define the traffic type permitted or not-permitted to the Internet.
Figure 65   Server Control Screen
In the Service Filtering Mode, select one option: 
■Denied except listed below. 
■All Allowed.
Click Add to add a new entry to the table (see Figure 66). 

80 CHAPTER 5: CONFIGURING THE ROUTER
Figure 66   Server Control Add Server Screen 
1Enter a description in the Server Description field, and the IP address or IP 
address range into the Server IP Address fields.
2Select the services that will be allowed. A list of popular services is given 
on this screen, to unblock a particular service, check the appropriate 
Allowed checkbox.
If the service to be allowed is not listed here, you can enter a custom 
range of ports at the bottom of the page, under User Defined Service 
Ports.
3Select the time that the rule will be enforced from the Scheduling Rule 
drop-down menu.
4Click Apply to save the settings. 

Quality of Service 81
Quality of Service The QoS (Quality of Service) function allows you to differentiate your 
network traffic and provide it with high-priority forwarding service.
QoS Settings The bandwidth gap between LAN and WAN may significantly degrade 
performance of critical network applications, such as VoIP, gaming, and 
VPN. This QoS function allows you to classify traffic of applications and 
provides them with differentiated services (Diffserv). 
Figure 67   QoS Settings Screen 
Define the minimum percentage of bandwidth for each type of traffic. 
Traffic Mapping You can define up to 16 rules to classify traffic into Diffserv forwarding 
groups and outgoing VCs in this page. 
Figure 68   Traffic Mapping screen 

82 CHAPTER 5: CONFIGURING THE ROUTER
Click Add to add a new traffic class rule (see Figure 69). 
Figure 69   Add New Traffic Class Rule Screen 
Traffic Statistics This page shows the WAN outbound traffic statistics of all the Diffserv 
forwarding groups in the last 12 hours. This page automatically updates 
every 5 minutes.
Figure 70   Traffic Statistics Screen 

Advanced 83
Advanced From the Advanced screen, you can configure:
■Security
■Static Routes
■RIP
■DDNS
■SNMP
■Syslog
■Proxy Arp
Security Using this advanced security settings page to set the detail settings for 
the Router. 
Figure 71   Security Screen
■NAT — Before you enable NAT (Network Address Translation), make 
sure you have changed the administrator password. NAT is the 
method by which the router shares the single IP address assigned by 
your ISP with the computers on your network. 
This function should only be disabled by advanced users, and if your 
ISP assigns you multiple IP addresses or you need NAT disabled for an 
advanced system configuration. If you have a single IP address and 
84 CHAPTER 5: CONFIGURING THE ROUTER
you turn NAT off, the computers on your network will not be able to 
access the Internet. Other problems may also occur. 
■IPSEC NAT-T Pass-through — NAT-T (NAT Traversal) is an Internet 
Draft proposed to IETF in order to help the problems associated 
with passing IPsec traffic through NAT Routers. For NAT-T to work, 
both ends of the connection need to support this function. Ensure 
that you select NAT-T only if it is needed as it will reduce LAN-WAN 
throughput. This Router supports NAT-T draft 2 implementation.
■Universal Plug and Play — This is a technology that offers seamless 
operation of voice messaging, video messaging, games, and other 
applications that are Universal Plug and Play compliant. Some 
applications require the Router's firewall to be configured in a specific 
way to operate properly. This usually requires opening TCP and UDP 
ports and in some instances setting trigger ports. An application that 
is Universal Plug and Play compliant has the ability to communicate 
with the Router, basically "telling" the Router which way it needs the 
firewall configured. The Router ships with the Universal Plug and Play 
feature disabled. If you are using any applications that are Universal 
Plug and Play compliant, and want to take advantage of the Universal 
Plug and Play features, you can enable this feature. Simply check the 
Enable Universal Plug and Play checkbox. Click Apply to save the 
change.
■WAN Ping Blocking — Computer hackers use what is known as 
"Pinging" to find potential victims on the Internet. By pinging a 
specific IP address and receiving a response from the IP address, a 
hacker can determine that something of interest might be there. 
The Router can be set up so it will not respond to an ICMP Ping from 
the outside. This heightens the level of security of your Router. 
To turn off the ping response, check Block ICMP Ping and click Apply; 
the router will not respond to an ICMP ping from the Internet.
■MSS Clamping — You might not be able to browse some Web sites or 
to send email messages that contain attachments from an Internet 
Connection Sharing client computer if your outbound connection is 
through a Windows XP-based Internet Connection Sharing host 
computer that uses Point-to-Point Protocol over Ethernet (PPPoE). 
This issue may occur if the Windows XP-based Internet Connection 
Sharing host computer uses a smaller Maximum Transmission Unit 
(MTU) size on the WAN interface (the PPPoE connection to the 
Internet) than it uses on the private interface (the Ethernet connection 
to the Internet Connection Sharing client). If a packet is larger than 
the MTU size on the WAN interface, the client sends an Internet 

Advanced 85
Control Message Protocol (ICMP) error to the external server to 
request that the server negotiate the TCP Maximum Segment Size 
(MSS). However, this message may be blocked by some firewalls. 
When this occurs, the packet is dropped. To allow the message to go 
through the firewall, enable MSS Clamping. MSS clamping will make 
Internet Connection Sharing to set the MSS value low enough to 
match the external interface. 
■Remote Administration — This feature allows you to make changes to 
your Router’s settings from anywhere on the Internet. Four options are 
available: 
■If you do not want to use this feature, select Disable Remote 
Administration.
■Select Enable administration from a single Internet Host, and enter 
the IP address, to allow only one computer to use the remote 
administration. This is more secure, as only the specified IP address 
will be able to manage the Router.
■Select Enable administration from a whole Subnet Internet Host, 
and enter the IP address and subnet mask, to allow PCs from that 
specific subnet group to use the remote administration.
■Select Enable administration from any Internet Host, this allows 
any computer to access the router remotely. 
Before you enable this function, ensure that you have set the 
Administration Password.

86 CHAPTER 5: CONFIGURING THE ROUTER
Static Routes You can configure static routes in this page. 
To add a static route entry to the table, click Add.
To change an existing entry, click Edit. To delete an entry, click Delete.
Figure 72   Static Routes Screen
This screen shows a list of current static route entries. For each entry, the 
following information is displayed:
■Index — the index of the entry.
■Network Address — the network address of the route. 
■Subnet Mask — the subnet mask of the route.
A network address of 0.0.0.0 and a subnet mask of 0.0.0.0 indicates the 
default route.
■Gateway — the router used to route data to the network specified by 
the network address.
After you have finished making changes to the table, click Apply. 

Advanced 87
RIP RIP (Routing Information Protocol) - RIP allows the network administrator 
to set up routing information on one RIP-enabled device and send that 
information to all RIP-enabled devices on the network. 
Figure 73   RIP Parameter Screen
You can set up RIP independently on both LAN and WAN interfaces.
1Check the Enable RIP checkbox. 
2Check the Enable Auto summary checkbox. Auto summarization sends 
simplified routing data to other RIP-enabled devices rather than full 
routing data.
3Select the Operation Mode:
■Disabled — RIP is not enabled for the WAN or LAN interface.
■Enabled — RIP is enabled for the WAN or LAN interface. The router 
will transmit RIP update information to other RIP-enabled devices.
■Silent — RIP is enabled, however the router only receives RIP update 
messages, it will not transmit any messages itself.
4In the Version field, select 1 or 2.
3Com recommends that you only use RIPv1 if there is an existing 
RIP-enabled device on your network that does not support RIPv2. In all 
other cases, you should use RIPv2.
88 CHAPTER 5: CONFIGURING THE ROUTER
5Use the Poison Reverse drop-down menu to enable or disable Poison 
Reverse on the router. Enabling Poison Reverse on your Router allows it to 
indicate to other RIP-enabled devices that they have both routes that 
point to each other, preventing data loops.
6Use the Authentication Required field to choose the mode of 
authentication:
■None — Switches off authentication on the specified interface.
■Password — An unencrypted text password that needs to be set on all 
RIP-enabled devices connected to this router. RIP information is not 
shared between devices whose passwords do not match.
7In the Authentication Code field, enter the password that is required if 
the Password option has been selected.
8Click Apply.
DDNS The Router provides a list of dynamic DNS providers for you to choose 
from. Dynamic Domain Name Server (DDNS) enables you to map a static 
domain name to a dynamic IP address. 
The Router supports five DDNS providers: 
■DynDNS.org
■TZO.com
■Dt DNS.com
■No-IP.com
■Zoneedit.com