We have 6 Billion BiPAC GX Series manuals available for free PDF download: User Manual, Quick Install Manual, Quick Start Manual, Specifications . BiPAC (G)X(L) Series Network Router pdf manual download. Also for: Bipac x, Bipac g, Bipac gx, Bipac xl, Bipac g. 3G/ADSL2+ (g) (VPN) Firewall Router. BiPAC (G)X(L) Series Network Router pdf manual download. Also for: Bipac x, Bipac gx, Bipac.

Author: Fezuru Goltirn
Country: Djibouti
Language: English (Spanish)
Genre: Sex
Published (Last): 10 December 2017
Pages: 338
PDF File Size: 7.66 Mb
ePub File Size: 4.53 Mb
ISBN: 949-8-15015-779-7
Downloads: 59050
Price: Free* [*Free Regsitration Required]
Uploader: Makora

Restart the device or contact support. Refer to manual for details if you want to change the setting. Check to disable the Dynamic Mankal function. If it is set to 0.

Billion BiPAC 7402(G)X(L) Series Quick Start Manual

If the router is not functioning properly, first check this chapter for simple troubleshooting before contacting your service provider or Billion support. Please be note that the domain only should be specified, not the full URL. There are no pre-defined URL filter rules; you can add filter rules to meet your requirements. This process usually works for resetting any router to it’s factory setting. Choose Remote Access from Connect Type drop-down menu. Wireless Security wireless Router Only The easiest way of configuring Virtual Servers is to manually assign static IP address to each virtual server PC, with an address that does not fall into the 7402gs of IP addresses that are to be issued by the DHCP server.

Web Interface username And Password Edit One-to-one Nat network Address Translation If you haven’t yet changed the defaul password, we recommend that you change it first thing you do after logging billiom. To prevent unauthorized wireless stations from accessing data transmitted over the network, the router offers secure data encryption, known as WEP. DoS Attack Block Duration: There are two words should be connected with a ‘.


A user-defined name for the connection e. Select the ID manusl that you would like to use. LAN Connection Bipzc 6. Specify Remote ID type. Mankal Table Routing Table Valid: The preset port filter rules in the Packet Filter must modify accordingly to the level of Firewall, which is selected.

Then click on Network and Sharing Center at the top bar 3. Installing The Router Important note for using this router Do not use this router under hipac humidity or high temperatures. Whether the connection is currently active.

The address of this subnet is obtained during IPCP negotiation. Usually, the only details you will need for the Quick Start wizard to get you online are your login often in the form of username ispnameyour password and the encapsulation type.

This natural firewall is on when NAT function is enabled. The following MIBs are supported: Source IP Address Range: The source port of packets to be monitored.

Click on Network 2. The key will be changed every packets when you select Stateful mode. Do not open or repair the case by yourself. Lit when one of LAN ports connected to an Ethernet device. Specify an IP address on this virtual interface.

The reason for this is that when using NAT, your publicly accessible IP address will be used by and point to your router, which then needs to deliver all traffic to the private IP addresses used by your PCs.

  CM300DY 24H PDF

Improper operation could damage the router. Ensure that all other devices connected to the same telephone line as your Billion router e. Log information can be seen in the Status — Event Log after enabling.

Default is Auto, it is negotiated when establishing a connection. The routers are installed in the head office and branch office accordingly.

Billion BiPAC GX Series Manuals

Select the connection mode. If not, check manua it is listed in the forbidden list, and if present then the connection attempt is dropped. The period of renewal time for changing the security key automatically between wireless client and Access Point AP.

There are no pre-define MAC Address filter rules; you can add the filter rules to meet your requirements. Configuring Pcs In Windows Vista The protocol used is determined by the particular application. The Host Name Computer Name of client. You may also view the status of this function using the Status — Check the domain in the URL to determine if it is in the trusted list.

When the Network and Sharing Center window pops up, select and click on Change adapter settings on the left window panel. The secure password length should be 16 characters which may include numbers and characters.