Вы находитесь на странице: 1из 43

Users Manual

pakedgedevice&software inc.

K6 / K61 / K62
K6U / K61U / K62U
Preconfigured Audio/Video Bridging KIT

Users Manual Version 1.1


Users Manual

FCC Declaration of Conformity


Pakedge Device & Software, Inc., 1163 Triton Dr., Foster City, CA, declares under sole responsibility that the
K6/K6U, K61/K61U, and K62/K62U comply with 47 CFR Parts 2 and 15 of the FCC Rules as a Class B digital
device. These devices comply with Part 15 of FCC Rules. Operation of the devices is subject to the following
two conditions: (1) These devices may not cause harmful interference, and (2) these devices must accept any
interference that may cause undesired operation.

WARNING: TO PREVENT FIRE OR SHOCK HAZARD, DO NOT EXPOSE THIS PRODUCT TO RAIN OR MOISTURE.
THE UNIT MUST NOT BE EXPOSED TO DRIPPING OR SPLASHING WATER. CAUTION: DO NOT OPEN THE UNIT.
DO NOT PERFORM ANY SERVICING OTHER THAN THAT CONTAINED IN THE INSTALLATION AND
TROUBLESHOOTING INSTRUCTIONS. REFER ALL SERVICING TO QUALIFIED SERVICE PERSONNEL. CAUTION:
THIS DEVICE MUST BE INSTALLED AND USED IN STRICT ACCORDANCE WITH THE MANUFACTURERS
INSTRUCTIONS AS DESCRIBED IN THE USER DOCUMENTATION THAT COMES WITH THE PRODUCT.
WARNING: POSTPONE INSTALLATION UNTIL THERE IS NO RISK OF THUNDERSTORM OR LIGHTNING ACTIVITY
IN THE AREA.

SAFETY PRECAUTIONS:

When using this device, always follow basic safety precautions to reduce the risk of fire, electric shock, and injury to
persons, including the following:

Comply with all warning and caution statements in the instructions.


Retain the instructions for future reference.
Observe all warning and caution symbols that are affixed to this equipment.
Comply with all instructions that accompany this equipment.
Upon completion of any service or repairs to this product, ask the service technician to perform safety checks to
determine that the product is in safe operating condition.
Installation of this product must be in accordance with national wiring codes and must conform to local
regulations.
Avoid using this product during an electrical storm. There may be a risk of electric shock from lightning. For
added protection for this product during a lightning storm, or when it is left unattended and unused for long
periods of time, unplug the power supply and disconnect the CAT5e. This will prevent damage to the product
due to lightning and power surges.
Give particular attention to all safety precautions.
Operate this product only from the type of power source indicated on the products marking label. If you are
not sure what type of power is supplied to your home, consult your dealer or local power company.
It is recommended that the customer install an AC surge protector in the AC outlet to which this device is
connected. This is to avoid damage to the equipment from lightning strikes and other electrical surges.
Wipe the unit with a clean, dry cloth. Never use cleaning fluid or similar chemicals. Do not spray cleaners
directly on the unit or use forced air to remove dust.
Keep the device away from excessive heat and humidity and keep the device free from vibration and dust.
Do not directly cover the device or block the airflow to the device with insulation or any other objects.

2
Users Manual

Table of Contents
INTRODUCTION .................................................................................................... 4
CUSTOMER SERVICE AND TECHNICAL SUPPORT ................................................... 5
INSTALLING .......................................................................................................... 6
CONNECTING TO THE INTERNET ........................................................................... 7
PAKEDGE SUPPORTED FEATURES ......................................................................... 9
ACCESSING THE ROUTER .............................................................................................. 10
DISABLING OR CHANGING THE DHCP ............................................................................. 12
PORT FORWARDING ................................................................................................... 13
DHCP RESERVATION .................................................................................................. 15
CHANGING IP ADDRESS OF THE ROUTER .......................................................................... 17
VPN (PPTP/SSL) ..................................................................................................... 19
DUAL WAN REDUNDANCY .......................................................................................... 24
DYNAMIC DNS ......................................................................................................... 26
DMZ PORT .............................................................................................................. 28
GUEST NETWORK ...................................................................................................... 29
UNIVERSAL THREAT MANAGEMENT (UTM) SETTINGS ........................................................ 29
MORE INFORMATION ................................................................................................. 29
APPENDIX A ......................................................................................................... 30
CONFIGURING VLAN PORTS ON SW24-GBVC ................................................................. 30
APPENDIX B FAQS............................................................................................. 34
APPENDIX C SPECIFICATIONS ............................................................................. 35
R6V/R6S ................................................................................................................ 35
SW8-GBV (COMES WITH K61 AND K61U KITS) .............................................................. 37
SW24-GBVC (COMES WITH K62 AND K62U KITS).............................................................. 38
APPENDIX D LIMITED WARRANTY ..................................................................... 41

3
Users Manual

Introduction
The popularity and affordability of IP networking has driven Audio Video and control networks to share the
same physical wire with computer networks. However, unlike computer data that can tolerate a certain
degree of unpredictable latency, video streaming, audio streaming, and control systems cannot. These
sophisticated networks require the same robustness as an enterprise network to ensure the packets that carry
audio and video arrive in time and IP-based controls do not lose critical command packets.

The Pakedge Audio-Video Bridging (AVB) line of products is designed to solve these issues with minimum
configuration. The simplicity of Pakedges solution allows custom installers to focus on quick, quality
installations without enterprise configuration worries.

Note: If this is your first time installing this product, please read this manual in its entirety.

Preset IP Address Values- the router KITs were designed to simplify a complex Audio-Video Bridging Network
installation and were preconfigured for out-of-the-box VLAN installations. Therefore, the IP address values
of all VLANs are predefined as described in the Quick Start Guide that came with your product. If different IP
address values are absolutely required, please be aware that changing them may affect other preconfigured
features. Contact Pakedge support for more information.

****Warning****
Regarding Factory Reset- the R6V or R6S were designed to be very robust and exceptionally
reliable products. Because of this, we do not recommend doing a factory reset unless
absolutely necessary. If you would like to continue with resetting the device, please contact
support at: support@pakedge.com or 650-385-8703.

NOTE: Using the routers hardware reset button will erase ALL Pakedge configurations and
make the device unreliable on your network.

4
Users Manual

Customer Service and Technical Support


Pakedge Device & Software, Inc. is committed to providing you with exceptional support on all of our
products. If at any time you wish to speak with one of our representatives, you may contact us at:

Customer Service
Email: customerservice@pakedge.com
Phone: 650.385.8701

Technical Support
Email: support@pakedge.com
Phone: 650.385.8703

Website: www.pakedge.com

Please visit our website for up-to-date support information.

Please be prepared to provide your product's model and serial number when contacting Pakedge Support.
Your model and serial numbers are printed on a label located on the electronic housing.

Pakedge Device & Software, Inc.


1163 Triton Dr.
Foster City, CA 94404
USA

5
Users Manual

Installing
For installation procedures, please refer to the Quick Start Guide that came with your specific KIT. You may
also visit our website for the current Manuals and Quick Start Guides at: www.pakedge.com

NOTE: If you install the KIT in a closed or multi-unit rack assembly, the operating ambient temperature
of the rack environment may be greater than room ambient temperature. Therefore, make sure to
install the equipment in an environment compatible with the manufacturer's maximum rated ambient
temperature.

For rack installation, make sure that the amount of air flow required for safe operation of the equipment is not
compromised.

For free-standing installation, make sure that the KIT has at least 1.5 in. (3.75cm) of clearance on each side to
allow for adequate air flow and cooling.

6
Users Manual

Connecting To the Internet


The R6V and R6S support the three main types of internet connections:

DHCP (Typically used by cable companies and DSL basic service)


Static IP (Fixed Public IP address mostly used by Business Class Broadband services)
PPPoE (Used by DSL companies such as AT&T)

Determine the type of internet connection from your Internet Service Provider (ISP), and then follow one of
the three instruction sets below to connect the router to the internet.

1. DHCP
By default, the router is set to connect to the internet in DHCP mode so there are no configuration
changes necessary if the ISP is using DHCP.

2. Static IP
To configure the router to use a static IP complete the following steps:

A. Determine the following information provided by the ISP:


i. Your assigned IP Address
ii. Subnet Mask
iii. Default Gateway
iv. DNS Server(s)
B. Plug your PC into any numbered port on the router using an Ethernet cable.
C. Open any Internet Browser on the PC and go to http://192.168.1.99.
D. Log into the router using pakedge / pakedgef as the username and password.
E. Navigate to Network under System on the left hand side of the screen and then click on Interface.
F. Next, click on the wan1 row, and you should see the configuration page for wan1.
G. Start by selecting Manual under the Addressing Mode heading and then enter the IP address and
Subnet mask information provided to you by the ISP. Once you are done, click OK at the bottom
of the page.
H. Next, click on DNS under the Network heading.
I. Type in the DNS values that you received from your ISP under Primary and Secondary DNS and
then click Apply.
J. Lastly, navigate to the Router tab on the left and Click on Static Route.
K. Click on the Create New button, right above the checkboxes.
L. In the Gateway field, type in the default gateway provided by the ISP and then click OK.
Note: Make sure that the Device field is set to wan1.
M. The Router is now configured and ready to be used.

7
Users Manual

3. PPPoE
To configure the router to use a PPPoE connection, you will need to complete the following steps:

A. Determine the following information provided by the ISP:


i. PPPoE Username
ii. PPPoE Password
B. Plug your PC into the router using an Ethernet cable.
C. Open any Internet Browser on the PC and go to http://192.168.1.99.
D. Log into the router using pakedge / pakedgef as the username and password.
E. Navigate to Network under System on the left hand side of the screen and then click on Interface.
F. Next, click on the wan1 row, and you should see the configuration page for wan1.
G. Click on the PPPoE radio button under the Addressing Mode heading.
H. Enter the username and password information provided by the ISP and click on OK at the bottom
of the screen.
I. The router is now configured and ready to be used. You can now go online.

8
Users Manual

Pakedge Supported Features


The R6V and R6S routers are very complex devices and Pakedge has pre-configured them so that minimal
amount of time is spent to install them. In addition to basic configurations, Pakedge supports additional
features, which may be of benefit to you.

The current supported features are:

Port Forwarding sometimes known as port mapping. This feature allows forwarding a network port from
the internet to a port on the internal network behind the router. This is needed if the user wishes to
publish a web server or mail server inside the internal network or VLAN.
VPN this service allows a user to remotely connect to the internal network behind the router from the
internet. Pakedge currently supports 2 types of VPN connections: PPTP and SSL.
PPTP PPTP technology extends the Point to Point Protocol (PPP) standard for traditional dial-up
networking. PPTP operates at Layer 2 of the OSI model. As a network protocol, PPTP is best suited for
the remote access applications of VPNs, but it also supports LAN internetworking. PPTP client software
is included with all current Windows and Linux operating systems and is also included with Mac OS X
(10.2) and above.
SSL SSL runs on Secure Socket Layers technology and is accessible via https over web browsers. It
permits a user to establish safe and secure remote access sessions from virtually any internet browsers
to access home controls, share files, etc. SSL VPN advantage over IPsec VPN is that client software
does not need to be installed.
Disabling DHCP on a VLAN this feature is useful if the devices on a particular VLAN all have Static IP
addresses and no dynamic IPs are needed. Sometimes, a VLAN may already have a DHCP server on the
subnet, so they would need to disable the one on the router.
Dual WAN Redundancy the ability for a user to have two broadband connections (one from the cable
provider and another from the phone company) as a backup in case the first connection goes down.
Dynamic DNS Allows users with non-static IP addresses to access their device with a DNS name service
that tracks the IP address when it changes.
Changing Subnets You may change the default IP address of the router and any applicable subnets.
DHCP Reservation Reserve IP addresses per specific MAC Addresses
Configuring a WAN Gigabit Port The router can support networks that have more than 100Mbs incoming
from their ISP. The router can be configured to have a 1000Mbs WAN port to accommodate high-speed
internet connections. NOTE: Please contact Pakedge support for instructions.
DMZ The router has a physical De-Militarized Zone (DMZ) port that can be used to set up a Web or Email
server.
Guest VLAN The R6V and R6S are preconfigured with a guest network that can only access the Internet.

Each of these features is independent of each other and sequence of installation does not matter. Pakedge
will add more features over time. Please visit our website for the latest User Manuals:
http://www.pakedge.com

9
Users Manual

NOTE: Pakedge does not support anything outside of the features outlined in this manual. If you need more
advanced features, please refer to the Fortinet Administrator Guide for the Fortinet 60c at
http://www.pakedge.com/docs/fortigate_admin_4.pdf

Accessing the Router

To modify settings in the router, you will need to access the Router GUI:

1. Plug an Ethernet cable from the router to a PC computer.


2. Make sure your network card is set to obtain an IP Address automatically, and then open any internet
browser (I.E., Mozilla, Chrome, etc.) on the PC and go to address http://192.168.1.99.
3. Type in the administrator name- (pakedge, by default), and the password- (pakedgef, for the default
pakedge admin) and click on Login

You now have access to the router. Here, you may apply your desired configuration changes.

FOR SECURITY REASONS, IT IS HIGHLY


RECOMMENDED THAT YOU CHANGE THE
PASSWORD FOR THE USER PAKEDGE.

10
Users Manual

To change the default password, navigate to System -> Admin -> Administrators, check off the box next to
pakedge and then click on Change Password.

Figure 1

Next, type in your old and new password in the appropriate fields and click Ok.

Figure 2

11
Users Manual

Disabling or Changing the DHCP


To disable or change the DHCP on the Internal Network or a VLAN:

1. Navigate to System -> Network -> DHCP Server on the main screen as shown in Figure 3.
2. Click on the network or VLAN you wish to modify or deactivate DHCP on (VLAN 5 is used as an example).

Figure 3

3. Un-check the Enable box to deactivate DHCP. You can also modify the IP range by entering a new range in
the IP field.

Figure 4

4. Once you are done, click OK to save your changes.

12
Users Manual

Port Forwarding
Port Forwarding can allow a user on the internet to access equipment and services on your internal network
from anywhere outside the network.

To begin Port Forwarding:

1. Click on Firewall Objects -> Virtual IP -> Virtual IP and then click on Create New. (You may create multiple
Virtual IPs before moving one to the next step.)

Figure 5

2. On the next screen, check-off Port Forwarding and enter your specific information inside the boxes
outlined in red. Click Ok once you are done.

NOTE: If you have a Static IP address from your ISP, please enter your actual static External IP
address (from your ISP) in the External IP Address/Range field.

Figure 6
13
Users Manual

3. Now that the virtual IP has been created, the next step is to create a firewall policy allowing port
forwarding. Navigate to Policy -> Policy and click on Create New.

Figure 7

4. Fill out the next page using Figure 8 as a guide. Under Destination Address, click on Multiple on the right
hand side if you have more than 1 Virtual IP that you created.
NOTE: The Destination Interface/Zone needs to reflect the subnet to which you are Port Forwarding.

Figure 8

5. Once you are done, click OK and you should see the new policy in the Policy table, similar to Figure 9.

Figure 9

14
Users Manual

DHCP Reservation

You may configure the DHCP server on the router to automatically assign a specific IP address to a device on
your network by using the DHCP Reservation feature. There are two methods to reserve an IP address for a
specific MAC address on your network:

Method 1:

1. Navigate to System -> Network -> DHCP Server.

Figure 10

2. Click the interface you want to configure and the configuration page will appear, as seen in Figure 11. (For
this example, we will use the Internal Interface). Now, click on Internal -> Check the IP Reservation box ->
Under IP Reservation click Create New

Figure 11
15
Users Manual

3. A window labeled New IP Mac Binding will open. Here, you can enter the IP and Mac Address you want
to reserve. Click Ok and then Ok again to complete the process.

Note: The IP address you are reserving MUST fall into the DCHP IP Range set on the router.
Example
IP: 192.168.1.150
Mac Address: 90:B6:FF:07:04:CB

Figure 12

Method 2:

1. You can also select the option Add from DHCP client List under IP Reservation, check on the specific
DHCP clients currently connected to your network and click on Add to Reserved button. Click
Return and then Ok to complete the process.

Figure 13

16
Users Manual

Changing IP Address of the Router

In order to change the IP Address of the router, please follow these steps:

1. Navigate to System -> Network -> DHCP Server -> Internal.

Figure 14

2. Under the Edit DCHP Service screen, change the IP Range, Network Mask, Default Gateway and DNS
Server to the desired configuration as seen in Figure 15 and click Ok.

Figure 15

17
Users Manual

3. Next, navigate to System -> Network -> Interface -> Internal.

Figure 16

4. On the Edit Interface page, under Addressing mode -> Manual -> IP/Net mask, enter the new IP/Netmask
and then click Ok. Once the settings are saved, your router will now be accessible with the new IP
Address.

Figure 17

18
Users Manual

VPN (PPTP/SSL)

Pakedge has pre-configured the R6V and R6S for both PPTP and SSL VPN access. Both VPN features are
enabled out-of-the-box on the router; however there are no users with permission to use VPN out-of-the-box.
To allow a user to use VPN access, please follow the instructions below:

1. To allow a user to use VPN to connect to the router, navigate to User -> User Group -> User Group and
click on the PPTP Users or SSL Users bar. (We will set up PPTP VPN as an example. The steps for SSL
VPN are the same).

Figure 18

2. On the Edit User Group screen, you can associate users with a group by clicking on the user name and
then clicking on the right arrow to associate it, or the left arrow to remove it. Once you are done, click
Ok to complete the process.

Figure 19
19
Users Manual

Changing the Default Password for VPN access:

A default user has been created for your convenience inside the router called pakedge. For security reasons,
it is highly recommended that you change the password for the VPN user pakedge.
To change the default password, navigate to User -> User -> User, and click on the pakedge user bar.

Figure 20

Next, type in your new password in the Password field and click Ok.

Figure 21

20
Users Manual

Creating New Users for VPN Access:

To create a new user or multiple new users that can access the router via PPTP and/or SSL VPN, navigate to
User -> User -> User, and click on the Create New button.

Figure 22

On the Edit User page, type in the name and password of the new user. Next, check the Add this user to
groups box and select the PPTP Users and/or SSL Users group to allow your new user to access the
network via VPN. Click Ok once you are done and the new user should now be created.

Figure 23

21
Users Manual

To test the SSL VPN feature:

Open a browser and type: https://xx.xx.xx.xx:10443 in the address bar using your unique external IP address
or FQDN (fully-qualified domain name). If you get the warning screen like the one below (Internet Explorer),
click on Continue to this website.

Figure 24

Once you see a login screen, type in a user name that you created or use pakedge for the default user. The
default password for user pakedge is pakedgef.

22
Users Manual

Once you successfully log in, you will see the SSL VPN portal page as shown below:

Figure 25

Once connected, you can reach any device on the network that has a valid IP Address by using the Connection
Tool or Tunnel Mode.

Note: If you are having trouble accessing a device on the network, confirm that the Default Gateway is set
properly to that device.

23
Users Manual

Dual WAN Redundancy

You can set up the two physical WAN interfaces (WAN 1 and WAN 2) on the router to provide link redundancy,
meaning that Internet services remain active if the WAN1 physical interface fails.

For example, if you have two Internet services connected to the R6V or R6S unit, T1 on WAN 1 and DSL on
WAN 2, you can configure WAN 2 to take over Internet traffic if WAN 1 fails.

The FortiGate unit tests the connection through an interface by sending a ping to a reliable server. If the
connection is active, the server will send a ping back to the FortiGate unit. If a ping test repeatedly fails, the
FortiGate unit considers that connection to have failed, and will select an alternate connection. In Network
Options, you can set the interval between pings and the number of times the ping test can fail before a
connection is considered failed.

To configure Dual Wan Redundancy:

1. Configure WAN 2 for Static, Dynamic, or PPPoE internet connection. (Refer to page 7 of this manual for
procedures.)

a. If WAN 2 is a static IP, you first need to create a new Static Route:
I. Go to Router -> Static -> Static Route.
II. Select Create New.
III. Select WAN 2 as the device for the secondary route.
IV. Enter the Gateway IP for the secondary route.
V. Set a distance of 11.
VI. Click OK.

2. To test a connection, a ping must be sent to a reliable server, usually a DNS server. The local gateway or a
common website should not be used because they are not reliable enough to confirm a connection. To
configure a ping server:

i. Go to Router -> Static -> Settings and click Create New.

Figure 26

24
Users Manual

ii. Set the interface to wan1, and enter the IP address for the Detect Server.

Figure 27

iii. You may repeat steps 2 and 3, using wan2 as the interface if you want the connection to switch back to
wan1 if wan2 fails.

25
Users Manual

Dynamic DNS
Dynamic DNS allows those users that have non-static IP address to have a static DNS name. There are many
services that allow you to register Dynamic DNS, some of which are free. In our example, we will use
DynDNS.com, but any in the drop down list will work. To set up a Dynamic DNS:

1. Navigate to System -> Network -> DNS.

Figure 28

2. Check the Enable DDNS checkbox and choose a service provider from the dropdown list. For our
example, we will use the members.dyndns.org and dnsalias.com" server.

Figure 29

26
Users Manual

3. Open a different tab on your browser and go to the DDNS providers website to sign up for their
service.

Figure 30

4. Once you successfully finish creating a DNS domain, go back to the router and enter the domain,
username and password for the service, as shown in the example below.

Figure 31

5. Click apply and you can now access your router from anywhere in the world. Please allow a few
hours for the domain to replicate.

27
Users Manual

DMZ Port
The DMZ port located on the router is a separate internal network on its own subnet. The DMZ port does not
have access to the normal internal VLANs; however, all the internal networks do have access to the DMZ port
(except for VLAN 6).

The value of the DMZ port is that it can be used with devices that need port forwarding policies, but do not
need access to anything else on the internal network. The purpose of placing a device on the DMZ port is to
add security to the network in case a device on the DMZ port is compromised by an intruder. If an intruder
gains access to the DMZ network, they will have no access to the internal network.

For example, if a web server needs special port forwarding policies, but does not need access to the internal
network, connect the web server to the physical DMZ port on the router and apply the relevant port
forwarding policies to the DMZ interface to allow communication with the internet.

To set up the port forwarding policies, use the procedure for creating a Virtual IP described previously and
then create a firewall policy using dmz as the destination interface.

Figure 32

Note: The internal networks will have access to the DMZ by default.

28
Users Manual

Guest Network
The R6V and R6S routers are configured to have VLAN6. VLAN6 is used for the Guest Network because it is
setup by a policy to only have internet access. The Guest Network does not have access to any other devices
on the internal network; however the other networks are able to communicate with devices on the Guest
Network.

If you would like to utilize the Guest Network, connect a VLAN capable wireless access point directly to the
router and configure it to broadcast VLAN6. Once the setup is complete, any device that connects to that
signal will be on the guest network.

Pakedge has a full line of 802.1q or VLAN capable wireless access point. Please contact Pakedge for exact
model numbers that support 802.1q or VLAN tagging.

Universal Threat Management (UTM) Settings


The K6U, K61U, and K62U KITs all come with pre-configured Universal Threat Management settings. To modify
these settings, please refer to our Supplemental UTM Manual on the dealer portal.

More Information
More information beyond the advanced features in this manual can be found in the Fortinet Administrator
Guide for FortiOS 4.0 at:

http://www.pakedge.com/docs/fortigate_admin_4.pdf

Pakedge will only support the features shown in this manual. However, support contracts are available
through Fortinet to allow advanced users to fully harness the power of this enterprise-class router. Please
contact Pakedge for pricing on these contracts.

29
Users Manual

Appendix A

Configuring VLAN Ports on SW24-GBVC


This section pertains only to the K62 / K62U KITs.

By default, the 24 port switch in the K62 / K62U KIT is configured with 6 different VLANS. The port allocation is
shown in the following figure:

Ports 1 and 24 are the trunk ports and all VLAN IDs are assigned to ports 1 and 24. Never change any default
values associated with these two ports. Otherwise, VLAN tags might not be passed properly.

The KIT allows the user to re-configure the switch to allocate enough ports per VLAN as needed. To change the
VLAN tagging on the switch:

1. Connect your computer to the network and open a web browser. Go to http://192.168.1.201 and log into
the SW24-GBVC interface. There is no password in the switch by default.

2. For this example, we will change which ports are allocated to VLAN 2. To view which ports are tagged to
VLAN 2, click on VLAN under Configuration. Under VLAN Configuration List, click on the radio button
for VLAN2 and then click Modify.
30
Users Manual

3. Check the additional ports that you want to add to VLAN2. You can also uncheck the ports that you want
to remove from VLAN2.

Note: If you add ports to VLAN 2, dont forget to remove that port from the default VLAN to which it was
assigned. For example, if you added Port 7 to VLAN 2, you have to remove it from VLAN 3.
4. Next, click on VLAN under Configuration and click on Port Config.

31
Users Manual

5. Under VLAN Per Port Configuration, use the drop down list for PVID (Port VLAN ID) to identify which
default VLAN is associated with each port. Click Apply once you are done and the switch will be
configured with your new settings.

NOTE: You can save this configuration file by going to Maintenance -> Configuration -> File -> Download

32
Users Manual

NOTE: Use the enclosed labels to re-label the back ports to reflect your new configuration.

33
Users Manual

Appendix B FAQs
1- What is the difference between the standard Fortigate 60C (RT-60C) and the Pakedge preconfigured
versions (R6V and R6S)?
- The Fortigate-60C with the Pakedge preconfigured version comes with a separate GUI and logon
from the Fortinet version. The separate Pakedge logon is limited to a basic set of options to get the
network up and running. This allows the powerful Fortigate router/security appliance to be
installed in any home without formal training.

2- Who provides support for the Fortigate Pakedge preconfigured versions (R6V and R6S)?
- Pakedge provides the basic support for the Pakedge pre-configuration. If an integrator wants to do
any configuration beyond Pakedges pre-configuration and needs support, they would have to
contact Fortinet.

3- What are the K62/K62U, K61/K61U, and K6/K6U and what are the advantages of purchasing the
product this way?
- The KITs contain everything an installer needs to quickly install and configure a powerful VLAN-
based enterprise network into any home without wasting precious time.

4- Do I need to purchase antivirus for my router to work?


- The router will work without an antivirus subscription, however the router will not be used to its
potential and malware could potentially penetrate your network. With a subscription, the router
will automatically receive the latest virus definitions for full perimeter network protection for as
long as the subscription is active.

5- Can I purchase antivirus only, without Fortinet support?


- No, Fortinet automatically supplies support when antivirus is purchased.

34
Users Manual

Appendix C Specifications

R6V/R6S Router

Interfaces:
Total Network Interfaces: 8
10/100/1000 Internal Switch Interfaces (Copper, RJ-45): 5
10/100 WAN Interfaces (Copper, RJ-45): 2
10/100 DMZ Interfaces (Copper, RJ-45): 1
USB Interfaces: 2 (1 Type-A, 1 Type-B)
ExpressCard 3G Slot 1
Internal Storage 8 GB
SDHC Card Slot (4GB to 32GB Class 6 or higher) Not provided

System Performance:
Firewall Throughput (1518 byte UDP packets) 1 Gbps
Firewall Throughput (512 byte UDP packets) 1 Gbps
Firewall Throughput (64 byte UDP packets) 1 Gbps
IPSec VPN Throughput 70 Mbps
SSL VPN Throughput 15 Mbps
Intrusion Protection Security Throughput (512 byte UDP packets) 60 Mbps
Intrusion Protection Security Throughput (HTTP) 50 Mbps
Antivirus Throughput (Proxy) 20 Mbps
Gateway-to-Gateway IPSec VPN Tunnels (System / VDOM) 500 / 50
Client-to-Gateway IPSec VPN Tunnels 800
Max Concurrent Firewall Sessions 80,000
Firewall Sessions/Sec 3,000
Max Concurrent SSL-VPN Users 550
Firewall Policies (System / VDOM) 5,000 / 500
Virtual Domains (Max / Default) 10 / 10

Environment:
Power Required 100-240 VAC, 50-60 Hz, 1.5 Amp Max
Power Consumption (AVG) 15.7 W
Heat Dissipation 53.6 BTU/h
Operating Temperature 32 104 deg F (0 40 deg C)
Storage Temperature -13 158 deg F (-25 70 deg C)
Humidity 5% to 90% non-condensing

35
Users Manual

NETWORKING FEATURES MECHANICAL


DHCP/PPPoE Client/Server Dimensions (dimensions are approximate)
1:1 NAT Height x Width x Length: 1.44 x 8.50 x 5.81 in. (3.66
Static/Dynamic Routing* x 21.59 x 14.76 cm)
Traffic shaping Weight 1.9 lb (0.86 kg)
Optional: Rackmount Bracket
Radius, LDAP, Active Dir
19 x 8 x 1.75 L x W x H
Local DB
User group support
OPTIONAL SUBSCRIPTION SERVICES
Automatic and scheduled
SECURITY FEATURES
Antivirus and IPS updates
Gateway antivirus protection
URL categorizing
(Virus, Spyware, Trojan)
Anti-spam RBL/SURBL
Integrated IPS (signature & anomaly)
Web filtering
Integrated URL filtering
Integrated Spam filtering
CERTIFICATIONS
VPN (IPSec, SSL, PPTP)
ICSA: Firewall, IPSec, SSL, Antivirus, IPS
VOIP Security (H323, SIP)

COMPLIANCE
FCC Class A, Part 15, UL/CUL, C Tick, CE, VCCI

36
Users Manual

SW8-GBV Switch (Comes with K61 and K61U KITs)

Standard Cable Connections


IEEE802.3 10BASE-T RJ-45 (10BASE-T): Category 3,4,5 UTP/STP
IEEE802.3u 100BASE-TX RJ-45 (100BASE-TX): Category 5 UTP/STP
IEEE802.3x full-duplex operation and flow control RJ-45 (1000BASE-T): Category 5,5e or enhanced
IEEE802.3ab/z 1000BASE-T UTP/STP
IEEE802.1Q VLAN interoperability Fiber: depends on Mini-GBIC types
IEEE802.1p Priority Operation
Operating Temperature
Memory 0 ~ 40C (32 ~ 104F)
8K MAC entries
180K Buffer Memory Network Data Rate
9K Byte Jumbo Frame 10/100/1000Mbps Auto-negotiation

Interface Operating Humidity


8* 10/100/1000Mbps auto MDI/MDI-X RJ-45 10% - 90% (non-condensing)
switching ports
1* SFP( mini-GBIC) port Transmission Mode
1 * Restore Default Button 10/100Mbps Full-duplex, Half-duplex
1000Mbps Full-duplex
Emission
FCC Class A, CE, VCCI, RoHS Power Supply
Internal power supply
100-240V/ 50-60Hz universal input

LED indications
System Power, Cat5e Port 1000M, 10/100M
Users Manual

SW24-GBVC Switch (Comes with K62 and K62U KITs)


Power Plug
To be compatible with electric service standards around the world, the switch is designed with a power supply
in the range of 100 to 240VAC, 50/60Hz. Please make sure that your outlet standard is within this range. To
power the switch, plug the female end of the power cord firmly into the receptacle of the switch and the other
end into a power outlet. After the power cord is plugged in, the power LED should be a solid blue to indicate
normal power status.

Network Standards Compatibility Electrical Specifications


IEEE 802.3i 10BASE-T Power consumption: 38.5W maximum
IEEE 802.3u 100BASE-TX, 100BASE-FX
IEEE 802.3ab 1000BASE-T Electromagnetic Emissions
IEEE 802.3z 1000BASE-X CE mark
IEEE 802.3x flow control EN 55022 Class A (Emissions)
EN 55024 (Immunity)
Physical Interfaces FCC Part 15 Class A
RJ45 Connectors for 10BASE-T, 100BASE-TX, and VCCI Class A
1000BASE-T (Auto Uplink on all ports): 24 ports C-Tick
Small form-factor pluggable (SFP) modules for fiber
Gigabit Ethernet interfaces (2 slots) Layer 2 Services
RS232 console port RJ45 8-pin plug to 9-hole DB9 plug IEEE 802.1Q static VLAN (1024)
IEEE 802.1p Class of Service (CoS)
LEDs IEEE 802.1D Spanning Tree Protocol
Blue LEDs for Speed, Link, Activity and Power IEEE 802.1v Protocol VLAN, Port VLAN, and MAC-based
VLAN
Physical Specifications IP subnet-based VLAN
Dimensions (w x d x h): 440 x 205 x 43 mm (17.3 x 8.1 x IEEE 802.1 Q-in-Q
1.6 in) IEEE 802.3ad Link Aggregation (LACP)
Weight: 2.27 kg (5.0 lbs) IEEE 802.1x port access authentication
IGMP v1, v2, v3 snooping support
Environmental Specifications Static multicast filtering
Operating temperature: 0 to 55 C (32 to 131 F) Ingress rate limit in 1 Kbps increments
Storage temperature: 20 to 70 C (4 to 158 F) Weighted round robin (WRR) queue technology
Operating humidity: 90% maximum relative humidity, MLD v1, v2 snooping
non-condensing
Storage humidity: 95% maximum relative humidity, non-
condensing

38
Users Manual

Security ANSI/TIA-1057 LLDP Media Endpoint Discovery (LLDP-


Access Control Lists (ACL) MED)
MAC, IP, TCP ACLs: L2/L3/L4 DHCP relay (with backup servers)
Network storm protection including broadcast multicast GARP/GVRP/GMRP
and unicast traffic SYSLOG
MAC filtering TFTP, SFTP, HTTP, SCP, or local USB flash firmware
Private group CoS upgrade
IEEE 802.1x port access authentication Port description
Port security RFC 1519 CIDR
DoS Proxy ARP
Dynamic ARP inspection DNS lookup
RADIUS (RFC 2865)
RADIUS accounting (RFC 2866) Performance Specifications
TACACS+ Forwarding modes: Store-and-forward
System memory: 128 MB
Switch Management Specifications Packet buffer memory: 1.5 MB buffer memory
SNMP v1, v2c, v3 with multiple IP addresses Code storage (flash): 32 MB
RFC 1157, 1902-1907 Address database size: 8 K media access control (MAC)
RFC 768 UDP addresses
UDP relay Number of VLANs: 1024 (1-4093)
RFC 854-859 telnet Number of trunks: 64
RFC 951 BOOTP Number of queues: 8
RFC 1213 MIB II Number of static route: 32
RFC 1757 RMON groups 1, 2, 3, and 9 Number of routed VLANs: 32
RFC 1215 SNMP Traps Number of ARP entries: 480
RFC 1493 Bridge MIB Number of ACL rules: 224
RFC 1643 Ethernet Interface MIB Jumbo frame support: up to 9 K packet size
RFC 1534 DHCP and BOOTP interoperation
RFC 2131, 2132 DHCP, and BOOTP User Interfaces
Private Enterprise MIB Command Line Interface (CLI) via console port
Port mirroring support (many-to-one) Web-based management via embedded HTTP server
DHCP/BOOTP relay-primary and backup (RFC 3046, protected with Secure Sockets Layer
option 82) Telnet remote login
RFC 2030 Simple Network Time Protocol (SNTP)
DHCP server Maintenance
DHCP L2 relay Supports debugging output
IEEE 802.1AB Link Layer Discovery Protocol (LLDP) Supports ping (Packet Internet Groper)
39
Users Manual

QoS Statistics
Supports 802.1p/DSCP priority Supports the port send and receive message of statistics
Supports strict priority (SP), weighted round of tour
scheduling (WRR) Security Features
Supports 4 priority queues Supports user password protection
Supports port-based bandwidth control

40
Users Manual

Appendix D Limited Warranty


Congratulations on your purchase of a Pakedge Device & Software product! We believe Pakedge designs and
manufacture the finest home networking products on the market. With proper installation, setup, and care,
you should enjoy many years of unparalleled performance. Please read this consumer protection plan
carefully and retain it with your other important documents.

This is a LIMITED WARRANTY as defined by the U.S. Consumer Product Warranty and Federal Trade
Commission Improvement Act.

9.1 What Is Covered Under the Terms of This Warranty

SERVICE LABOR: Pakedge will pay for service labor by an approved Pakedge service center when needed as a
result of a manufacturing defect for a period of one (1) year from the effective date of delivery to the end
user.

PARTS: Pakedge will provide new or rebuilt replacement parts for the parts that fail due to defects in materials
or workmanship for a period of one (1) year from the effective date of delivery to the end user. Such
replacement parts are then subsequently warranted for the remaining portion (if any) of the original warranty
period.

9.2 What Is Not Covered Under the Terms of This Warranty

This warranty only covers failure due to defects in materials and workmanship that occur during normal use
and does not cover normal maintenance. This warranty does not cover any appearance item; any damage to
living structure; failure resulting from accident (for example: flood, electrical shorts, insulation); misuse,
abuse, neglect, mishandling, misapplication, faulty or improper installation or setup adjustments; improper
maintenance, alteration, improper use of any input signal and/or power, damage due to lightning or power
line surges, spikes and brownouts; damage that occurs during shipping or transit; or damage that is attributed
to acts of God.

The foregoing limited warranty is Pakedges sole warranty and is applicable only to products sold as new by
Authorized Dealers. The remedies provided herein are in lieu of a) any and all other remedies and warranties,
whether expressed, implied or statutory, including but not limited to: a) any implied warranty of
merchantability, fitness for a particular purpose or non-infringement, and b) any and all obligations and
liabilities of Pakedge for damages including but not limited to: incidental, consequential or special damages, or
any financial loss, lost profits or expense, or loss of network connection arising out of or in connection with
the purchase, use or performance of the product, even if Pakedge has been advised of the possibility of such
damages.

CAUTION: DAMAGE RESULTING DIRECTLY OR INDIRECTLY FROM IMPROPER INSTALLATION OR SETUP IS


SPECIFICALLY EXCLUDED FROM COVERAGE UNDER THIS WARRRANTY. IT IS IMPERATIVE THAT INSTALLATION
AND SETUP WORK BE PERFORMED ONLY BY AN AUTHORIZED PAKEDGE DEALER TO PROTECT YOUR RIGHTS

41
Users Manual

UNDER THIS WARRANTY. THIS WILL ALSO ENSURE THAT YOU ENJOY THE FINE PERFORMANCE YOUR PAKEDGE
PRODUCT IS CAPABLE OF PROVIDING.

9.3 Rights, Limits, and Exclusions

Pakedge limits its obligation under any implied warranties under state laws to a period not to exceed the
warranty period. There are no express warranties. Pakedge also excludes any obligation on its part for
incidental or consequential damages related to the failure of this product to function properly. Some states
do not allow limitations on how long an implied warranty lasts, and some states do not allow the exclusion or
limitation of incidental or consequential damages. In this case, the above limitations or exclusions may not
apply to you. This warranty gives you specific legal rights, and you may also have other rights that vary from
state to state.

9.4 Effective Warranty Date

This warranty begins on the effective date of delivery to the end user. For your convenience, keep the original
bill of sale as evidence of the purchase date from your authorized dealer.

9.5 Important: Warranty Registration

Please register your product at www.pakedge.com. It is imperative that Pakedge knows how to reach you
promptly if we should discover a safety problem or product update for which you must be notified. In
addition, you may be eligible for discounts on future upgrades as new networking standards come about.

9.6 To Obtain Service, Contact Your Pakedge Dealer.

Repairs made under the terms of the Limited Warranty covering your Pakedge product will be performed by
an Authorized Pakedge Service Center. These arrangements must be made through the selling Pakedge
Dealer. If this is not possible, contact Pakedge directly for further instructions. Prior to returning a defective
product directly to Pakedge, you must obtain a Return Material Authorization number and shipping
instructions. Return shipping costs will be the responsibility of the owner.

For additional information about this warranty, visit our website:

Pakedge Device & Software, Inc.


1163 Triton Dr.
Foster City, CA 94404
USA

Email- support@pakedge.com
www.pakedge.com

42
Users Manual

pakedgedevice&software inc.

1163 Triton Drive


Foster City, CA 94404
USA

Visit Us At:
www.pakedge.com

Pakedge Device & Software Inc. 2011 All Rights Reserved

43

Вам также может понравиться