Call us: +61 2 9838 8899
FAX: +61 2 9838 8818

AuthorDrayTek Aust & NZ

Home»Articles Posted by DrayTek Aust & NZ

DrayTek NBN Ready Routers

The National Broadband Network (NBN) is being rolled out in many areas and in many locations work has already been completed. As a result we have had an influx of customers requiring information on suitable routers to connect to the NBN network. There is no need to change your computer if it is capable of a broadband connection. If you currently have an ADSL connection, you will only need to change your router to a NBN capable device. The NBN equipment installed at your premises will provide an Ethernet connection to allow you to attach your NBN-capable equipment. The picture below shows the type of equipment typically installed for NBN access.
nbn_draytek_router

 

Some of the requirements for NBN connectivity are:

  • A router with a high speed Ethernet WAN interface, preferably gigabit Ethernet
  • High throughput – Must easily handle at least 100Mb/s data throughput to the Internet
  • Reliability
  • Secure firewall
  • Easy to install and configure

DrayTek have two router models that well suited for the NBN. These are the Vigor2760 series routers and the Vigor2860 series routers. Both of these router models have ADSL2+/VDSL2 interfaces to cater for users who currently have ADSL on their premises as well as a Gigabit WAN interface for the NBN connection when it becomes available in their area.

The Vigor2760 series routers are ADSL/VDSL2 routers that can be configured to allow LAN port 4 to be used as a Gigabit Ethernet WAN interface.

2760vn_500

2760-wan-setting

The Vigor2860 series routers are high speed business grade ADSL/VDSL2 Dual WAN routers. WAN 2 is a Gigabit Ethernet WAN interface. This router has a rated throughput of 300Mb/s so can cater for any NBN connection requirements.

2860vnp_500

For customers who already have NBN and are thinking to upgrade the router hardware, the DrayTek broadband router range is a good solution. This includes the Vigor2130, Vigor2912, Vigor2925 series, Vigor3200 series, Vigor2960, Vigor3900 and Vigor300B.

broadband-routers

For more information on DrayTek NBN ready routers is available in our other blog articles titled “Introduction to DrayTek NBN Ready Routers”

http://blog.draytek.com.au/2013/12/10/introduction-to-draytek-nbn-ready-routers/

And “NBN Ready DrayTek Routers”

http://blog.draytek.com.au/2013/12/18/nbn-ready-draytek-routers/

 

Click here for the video giving an overview of the Vigor2860 router  series.

New Firmware Released to Improve Security in DrayTek Routers

DrayTek has released new firmware for several router models to improve security for users. The update addresses the SSL vulnerability CVE-2014-0224 also known as CCS Injection vulnerability.
The new firmware also includes bug fixes and improvements for some router models.
Firmware is now available for 13 models which include the following routers: Vigor2925 series, Vigor2960, Vigor300B, Vigor3900, VigorIPPBX2820, VigorIPPBX3510, Vigor2850, Vigor130, Vigor2760 delight version, Vigor2710ne, VigorPro 5510/5500/VigorPro 5300.

Some details of the improvements in the latest firmware are:

Vigor2925: Firmware version 3.7.4.2
• CVE-2014-0224 CCS injection vulnerability.
• Dashboard fixed

Vigor2960: Firmware version 1.0.8.2
• Upgrade OpenSSL to 0.9.8za to address security issues.
• Fixed: WCF (Web Content Filter) cannot be enabled when myVigor Portal changes Service Name from Commtouch to Cyren.
• Fixed: HA (High Availability).
• Fixed: DDNS failover 3G WAN didn’t work.

Vigor300B: Firmware Version: 1.0.8.2
• Web Portal stability improved
• Remove management port setting which may occupy port redirection.
• Add telnet timeout if not login in 60 seconds.
• Upgrade OpenSSL to 0.9.8za to address security issues.
• Fixed: CPU usage is too high when data flow monitor is enabled.
• Fixed: NAT Loopback to LAN More Subnet doesn’t work.
• Fixed: Reboot with Customized Configurations bug.
• Fixed: When firewall default policy (block) is used, HTTP is still available for access.
• Fixed: Web portal still supports URL redirect when login mode is disabled.
• Fixed: WAN Priority Bits didn’t work.
• Fixed: An error occurred in time object.
• Fixed: WCF (Web Content Filter) cannot be enabled when myVigor Portal changes
• Service Name from Commtouch to Cyren.
• Fixed: DDNS failover 3G WAN didn’t work.

Vigor3900 Series: Firmware Version: 1.0.8.2
• Improved: PPTP connection stability
• Improved Web Portal stability
• Remove management port setting which may occupy port redirection.
• Improved stability of High Availability function.
• Add telnet timeout if not login in 60 seconds.
• Fixed: High CPU usage when data flow monitor is enabled.
• Fixed: SSL VPN client not working
• Fixed: WCF license not working when HA is enabled.
• Fixed: CVM can’t perform configuration backup.
• Fixed: NAT Loopback to LAN More Subnet doesn’t work
• Fixed: DNS for PPTP Remote dial-in is not assigned according to the LAN Profile
• Fixed: Reboot with Customized Configurations bug
• Fixed: When firewall default policy (block) is used, HTTP is still available for access
• Fixed: Web portal still supports URL redirect when login mode is disabled
• Fixed: Packet count error when PPTP acceleration is enabled
• Fixed: mOTP User profile cannot be saved without Password
• Fixed: WAN Priority Bits doesn’t work
• Fixed: An error occurred in time object
• Fixed: An error occurred in WAN >> Switch mode >> double tag
• Upgrade OpenSSL to 0.9.8za to address security issues
• Fixed: WCF (Web Content Filter) cannot be enabled when myVigor Portal changes
• Fixed: HA (High Availability)
• Fixed: DDNS failover 3G WAN didn’t work

VigorIPPBXTM 2820 Series: Firmware Version: 3.5.10.1
• CVE-2014-0224 CCS injection vulnerability
• Fixed: When PVC WAN ran with PPPoE mode, SIP Trunk would fail to register

VigorIPPBX 3510 Series: Firmware Version: 3.5.10.1
• CVE-2014-0224 CCS injection vulnerability

Vigor2850 Series: Firmware Version: 3.6.6.1
• CVE-2014-0224 CCS injection vulnerability
Vigor130 Series: Firmware Version: 3.7.5.2
• CVE-2014-0224 CCS injection vulnerability

Vigor2760 Series (Delight): Firmware Version: 3.7.5.2
• CVE-2014-0224 CCS injection vulnerability
• Support all telnet commands in WEB console GUI.
• Support Huawei E3131, Huawei E3276 and ZTE MF823 USB dongles.
Vigor2710ne Series: Firmware Version: 3.2.8.1
• CVE-2014-0224 CCS injection vulnerability

VigorPro 5300 Series: Firmware Version: 3.3.6.3
• CVE-2014-0224 CCS injection vulnerability

VigorPro 5500 Series: Firmware Version: 3.3.5.1
• CVE-2014-0224 CCS injection vulnerability

VigorPro 5510 Series: Firmware Version: 3.3.6.3
• CVE-2014-0224 CCS injection vulnerability

The firmware can be downloaded from: http://www.draytek.com.au/downloads.php

DrayTek Vigor2760 Series Router – DrayOS Version Now Available

2760

From Early May, DrayTek made a major upgrade for the Vigor2760 Series routers. Originally designed with Linux OS, these routers are now running on the DrayOS platform. This change is implemented to provide better security as well as an improved user interface.

In the Vigor2760 series running the latest DrayOS firmware version 3.7.5.2, you will notice the login page has changed and now displays “Delight” at the bottom corner. This will help our technical support staff know that you are using the DrayOS platform and be able to provide you with better services.

login-page

These new routers us the same hardware as the Linux based routers but have DrayOS firmware installed. In the future you can also identify the Vigor2760 series from the routers label which will have “Delight” or “Ver:D” printed on the label.

labels

For those customers who are now using the Linux based platform, the system does not allow you to upgrade from the Linux platform to the DrayOS platform by yourself. If you wish to upgrade your router to DrayOS platform, please contact out technical support staff (support@draytek.com.au) to arrange for you to return the router to us so we can upgrade the system for you.

Please note that once the router is upgraded to the DrayOS platform any existing configuration will be erased and also you will not be able to roll back to the Linux platform. You will need to re-configure your router as new. If you have any questions regarding this issue please contact our technical support staff.

Video – DrayTek VDSL Solutions

draytek-vdsl-solution_pic

DrayTek Australia & NZ  is pleased to announce our latest video on DrayTek VDSL Solutions.

VDSL2 is expected to become one of the main alternatives for the aging ADSL2+ connections. It offers faster speeds than ADSL.  The increased bandwidth offered by VDSL means that transmission of high quality video, such as HDTV from the Internet will be easily achievable.  This video provides a brief overview of the VDSL solutions available from DrayTek. Products introduced are the Vigor130, Vigor2760, Vigor2860 series routers.

More information on DrayTek VDSL products is available on our web site: http://www.draytek.com.au/products.php?type=xdsl

Click here to watch the video

New Firmware: Version: 3.6.7 now available for Vigor2920 Router

Draytek has recently released a new firmware, version 3.6.7 for for the Vigor2920 router. The firmware introduces new features as well as a number of bug fixes. Some of the new features include:

  • Added support for new 3G modems
  • Support NS/ANY/SOA type for DNS cache.
  • Multiple SNMP Manager Host IP and Notification Host IP(v4 and v6).
  • User configurable daylight saving.
  • Add wizards menu
  • IPv6 firewall allows incoming packets transferred to certain ports.
  • Add some TR-069 parameters for setting WAN >> WAN mode: Backup or Always On, LAN >> DHCP relay enable/disable, DHCP relay IP address and Device hostname, LAN >> Bind IP to MAC, VPN >> Create Phase2 SA for each subnet.(IPSec), VPN >> Netbios Naming Packets Pass/Block, Firewall >> IPv6 Group/IPv6 Object, SNMP, and Diagnostics >> Ping Diagnosis.
  • Support to block for tunnel ver. 0.2.3.25, hotspot shield with ver.3.19, telnet protocol by using “putty” or “pietty”, and LINE app in 3.5.1.36 (for PC) version and in 4.1.1 version (for mobile) for APP Enforcement.
  • Block page for DNS filter.
  • Route policy supports VPN LAN to LAN traffic.
  • Added option to force the user clicking on a button to proceed the operation under the option URL Redirect on LAN>>Web Portal Setup.
  • Add VLAN tag for WAN IPv6 packets if WAN VLAN tag is enabled.

Click here to download the firmware.