161
24online User Guide (Version 7.0.3.1) Copyright Elitecore Technologies Ltd., Ahmedabad, INDIA

24 Online User Guide

Embed Size (px)

Citation preview

  • 24online User Guide

    (Version 7.0.3.1)

    Copyright Elitecore Technologies Ltd., Ahmedabad, INDIA

  • Important Notice Information supplied by Elitecore is believed to be accurate and reliable at the time of printing but is presented without warranty of any kind expressed or implied. Users must take full responsibility for their application of any products. Elitecore assumes no responsibility for any errors that may appear in this document. Elitecore reserves the right, without notice to make changes in product design or specifications. Information is subject to change without notice. SOFTWARE LICENSE The software described in this document is furnished under the terms of Elitecores software license agreement. Please read these terms and conditions carefully before using the software. By using this software, you agree to be bound by the terms and conditions of this license. If you do not agree with the terms of this license, promptly return the unused software and manual (with proof of payment) to the place of purchase for a full refund LIMITED WARRANTY Software: Elitecore warrants for a period of ninety (90) days from the date of shipment from Elitecore: (1) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (2) the Software substantially conforms to its published specifications Except for the foregoing, the software is provided AS IS. This limited warranty extends only to the customer as the original licenses. Customers exclusive remedy and the entire liability of Elitecore and its suppliers under this warranty will be, at Elitecore or its service centers option, repair, replacement, or refund of the software if reported (or, upon, request, returned) to the party supplying the software to the customer. In no event does Elitecore warrant that the Software is error free, or that the customer will be able to operate the software without problems or interruptions. DISCLAIMER OF WARRANTY Except as specified in this warranty, all expressed or implied conditions, representations, and warranties including, without limitation, any implied warranty or merchantability, fitness for a particular purpose, non-infringement or arising from a course of dealing, usage, or trade practice, and hereby excluded to the extent allowed by applicable law. In no event will Elitecore or its supplier be liable for any lost revenue, profit, or data, or for special, indirect, consequential, incidental, or punitive damages however caused and regardless of the theory of liability arising out of the use of or inability to use the product even if Elitecore or its suppliers have been advised of the possibility of such damages. In a event shall Elitecores or its suppliers liability to the customer, whether in contract, tort (including negligence) or otherwise, exceed the price paid by the customer. The foregoing limitations shall apply even if the above stated warranty fails of its essential purpose. In no event shall Elitecore or its supplier be liable for any indirect, special, consequential, or incidental damages, including, without limitation, lost profits or loss or damage to data arising out of the use or inability to use this manual, even if Elitecore or its suppliers have been advised of the possibility of such damages. RESTRICTED RIGHTS Copyright 2000 Elitecore Technologies Ltd. All rights reserved. 24online-Internet on Cable, 24online-Internet on Cable logo are trademark of Elitecore Technologies Ltd. Information supplies by Elitecore Technologies Ltd. Is believed to be accurate and reliable at the time of printing, but Elitecore Technologies assumes no responsibility for any errors that may appear in this documents. Elitecore Technologies reserves the right, without notice, to make changes in product design or specifications. Information is subject to change without notice Corporate Headquarters Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G.Road, Ahmedabad 380015, INDIA Tele: 079-26405600 Fax: 079-26462200 24online website: http://www.24onlinebilling.comCompany website: http://www.elitecore.com

  • Guide Sets

    Guide Describes

    Installation & Registration Guide Installation & registration of 24online User Guide Detailed statistics Reports Detailed reports Console Guide Console Management PPPoE Server Configuration Guide Integration of PPPoE Server with 24online Analytical tool Guide Using the Analytical tool for diagnosing

    and troubleshooting common problems

  • Technical Support

    You may direct all questions, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer care/service department at the following address: Corporate Office eLitecore Technologies Ltd. 904, Silicon Tower Off C.G. Road Ahmedabad 380015 Gujarat, India. Phone: +91-79-26405600 Fax: +91-79-26462200 Web site: www.elitecore.com 24online support contact: Technical support (Corporate Office): +91-79- 26400707 Email: [email protected] Web site: www.24onlinebilling.com Visit www.24onlinebilling.com for the regional and latest contact information.

  • Notation conventions

    Material in this manual is presented in text, screen displays, or command-line notation.

    Item Convention Example

    Service provider

    Person/Company who provides Cable connection and has purchased 24online Software

    Server Machine where 24online server software is installed Client Machine where 24online client software is installed User Subscriber/Customer of the Service provider kbit kbit means kilo bits per second kbps kbps is kilo bytes per second (1 kilobyte=8 kilo bits) Customer name

    Actual name of the subscriber

    Username Username uniquely identifies the user of the system Section titles Bold and

    shaded font typefaces Report

    Topic titles Shaded font typefaces Introduction

    Subtitles Bold and Black typefaces

    Notation conventions

    Navigation link

    Bold typeface

    User management Pool management Create it means, to open the required page click on User management then on Pool management and finally on Create tab

    Name of a particular parameter or field or command button text

    Lowercase italic type

    Enter policy name, replace policy name with the specific name of a policy Or Click Name to select where Name denotes command button text which is to be clicked

    Cross references

    Hyperlink in different color

    Refer to Customizing Subscribers database, clicking on the link will open that particular topic

    Notes & points to remember

    Bold typeface between the black borders

    Note

    Prerequisites Bold typefaces between the black borders

    Prerequisite Prerequisite details Prerequisite details

  • Contents Introduction to 24online...................................................................................................11 How 24online works server and client..........................................................................11

    Planning and Understanding Business ................................................................................. 12 Business Scenario ................................................................................................................12

    Options for Internet connection .......................................................................................12 Possible locations for Internet distribution ......................................................................12 Benefits of starting Internet connection distribution project ...........................................12 Competition faced............................................................................................................12 Business objective............................................................................................................13

    Planning Business ................................................................................................................14 Policies.............................................................................................................................14

    Surfing time policy ......................................................................................................15 Access time policy .......................................................................................................15 Bandwidth policy .........................................................................................................15

    Packages...........................................................................................................................15 Users ................................................................................................................................16 Pools.................................................................................................................................16

    24online Basics..................................................................................................................... 18 Administration Consoles..................................................................................................18 Accessing 24online Web Administration Console ..........................................................18 Log on and Log off Procedure .........................................................................................19 Authorization and Access control....................................................................................21

    Setting Subscriber Base ....................................................................................................... 23 Surfing Quota policy........................................................................................................24

    Creating Surfing Quota policy .....................................................................................24 Access Time policy..........................................................................................................26

    Creating Access Time policy .......................................................................................26 Bandwidth policy .............................................................................................................29

    Pool based bandwidth policy .......................................................................................29 User based bandwidth policy .......................................................................................30 IP Address based bandwidth policy.............................................................................34

    Scheduling Policies..........................................................................................................37 Creating Schedule ........................................................................................................37

    Assigning Schedule to Bandwidth policy ........................................................................39 Pool ..................................................................................................................................42

    Creating Pool ...............................................................................................................42 Package ............................................................................................................................44

    Creating package..........................................................................................................44 Defining Renewal rules................................................................................................46 Deleting Package Renewal rule ...................................................................................48

    Users ................................................................................................................................49 Registering Users .........................................................................................................49

    Restrict Administration Console access...........................................................................53 User Type.........................................................................................................................55

    Creating User Type ......................................................................................................55 Deleting User Type ......................................................................................................56

    Setting Advanced Features................................................................................................... 57

  • Firewall rules ...................................................................................................................57 Defining Firewall rules ................................................................................................57 Changing Firewall Rule order......................................................................................60 Deleting Firewall Rule.................................................................................................61

    Cache................................................................................................................................62 Configuring Cache .......................................................................................................62 Defining External Cache..............................................................................................65

    Defining WCCP router ....................................................................................................68 Defining Cache Routing policy ...................................................................................70 Removing Cache Routing policy .................................................................................71

    Backup and Restore .........................................................................................................72 Backup .........................................................................................................................72 Setting Backup schedule ..............................................................................................72 Backup Data.................................................................................................................74 Restoring Data .............................................................................................................75 Purge ............................................................................................................................75

    Client Services .................................................................................................................78 Setting Customized Messages......................................................................................78

    Setting Client Preferences................................................................................................82 Setting Customized Images..............................................................................................84 Setting Mailing Schedule of Proactive reports ................................................................85

    Schedule Mailing frequency of Remaining Usage report............................................85 Schedule Mailing frequency of Admin Activities Log report .....................................86

    Resetting Console Password ............................................................................................88 Managing and Monitoring Subscriber base .......................................................................... 89

    Monitoring Bandwidth Usage..............................................................................................89 Managing Policies................................................................................................................93

    Managing Surfing Quota policy.......................................................................................93 Updating Surfing Quota policy....................................................................................93 Deleting Surfing Quota policy .....................................................................................95

    Managing Access time policy..........................................................................................96 Updating Access time policy .......................................................................................96 Adding Access Time Entry to Policy...........................................................................97 Deleting Access Time Entry from Policy ....................................................................98 Deleting Access Time policy .......................................................................................99

    Managing Bandwidth policy..........................................................................................100 Updating Bandwidth policy .......................................................................................100 Updating Pool based Bandwidth policy.....................................................................100 Updating User based Bandwidth policy ....................................................................101 Updating IP Address based Bandwidth policy ..........................................................103 Adding Schedule to User/IP Address based Bandwidth policy.................................105 Removing Schedule to User/IP Address based Bandwidth policy ............................107 Adding IP Address to IP Address based Bandwidth policy ......................................108 Removing IP Address from IP Address based Bandwidth policy .............................109 Deleting Bandwidth policy ........................................................................................110

    Managing Schedule........................................................................................................112 Updating Schedule .....................................................................................................112 Adding Schedule Entry details...................................................................................113 Removing Schedule Entry details..............................................................................114 Deleting Schedule ......................................................................................................115

  • Managing Pool ...................................................................................................................116 Search Node ...............................................................................................................116 Updating Pool ............................................................................................................116 Deleting Pool .............................................................................................................119

    Managing Package .............................................................................................................121 Updating Package ......................................................................................................121 Deleting Package .......................................................................................................123

    Managing User...................................................................................................................125 Searching User ...........................................................................................................125 Live Users ..................................................................................................................126 Updating User ............................................................................................................127 Deleting User .............................................................................................................137

    User My Account...............................................................................................................138 Managing Administration Console Access........................................................................143

    Changing Visibility rights..........................................................................................143 Changing Modules & Sub modules default right ......................................................144

    Managing Services.............................................................................................................146 Managing Network ............................................................................................................148

    Viewing Interface configuration ................................................................................148 Updating DNS configuration .....................................................................................149

    Product Licensing and Updates .......................................................................................... 151 Product Version Information .....................................................................................151 Module License..........................................................................................................151 Upgrade 24online.......................................................................................................153 Steps to Upgrade to new version ...............................................................................153 Company Information................................................................................................154 Download Client ........................................................................................................156 Download Documentation .........................................................................................156

  • 24online User Guide

    About this Guide

    Welcome to the 24online Billing and Bandwidth Management software User guide. Guide provides user information for the software. Objective of the guide is to provide help users understand and use the software efficiently. New users may go through the document in the sequential manner in order to gain a thorough understanding of software. Experienced users or users looking for help on specific functionality may skip section as need be. Guide will help users of 24online to

    Configure Use Maintain the application

    Guide is for the users who want to manage their customer base with 24online. To work with 24online, one requires basic knowledge of Networking, TCP/IP and operating knowledge of Windows Operating System. Guide Organization This Guide provides information regarding the administration, maintenance, and customization of 24online.

    How do I search for relevant content? For help on how to perform certain task use Contents For help on a specific menu or screen function use Menu wise Screen and Table Index

    Guide is organized into six sections: Section 1 Planning & Understanding Business Section describes

    Preliminary information about the business Guidelines for planning & managing critical areas of business Explanation on various policies

    Section 2 24online Basics Section describes Section provides instructions

    to perform some basic operations for network configuration

    Section 3 Setting Subscriber base Section provides instructions for creating

    Various Policies Package

    Elitecore Technologies Ltd. 9

  • 24online User Guide

    Pool User Schedule

    Section 4 Setting Advanced features Section provides instructions for

    Defining Firewall rules Configuring Cache server Setting Data backup and restore schedules

    Section 5 Managing and Monitoring Subscriber base Section 6 Product Licensing and Updates

    Elitecore Technologies Ltd. 10

  • 24online User Guide

    Introduction to 24online

    24online is the complete billing and bandwidth management solution that helps broadband, dialup, wifi service providers, hotels, hotspots and cafes to provide time and usage based Internet access and manage subscribers and franchisees. It helps to organize and manage Internet distribution and user database. 24online can be integrated with the Billing solutions for ISP and allows customizing the authentication and accounting outside the core product.

    How 24online works server and client

    24online software consists of two components: 24online server and 24online client. Server The 24online software component residing at the Service Provider premises Client The 24online software component installed on the users computer The network connecting Server with clients is termed as the Internal network. Various options are available for connection but the common practice is to connect with Ethernet card and hub or switch. 24online Server is, connected to the Internet via the Internet Service Provider (ISP) to provide Internet related services to clients. The network connecting Server with ISP is termed as External network. Various options are available for connection but the common practice is to connect with Router and hub or switch. Every machine has a unique identifying number called an IP address. Computers use Internet Protocol (IP) to communicate with each other over the network. Server authenticates the IP address. If the IP address is valid and user is authorized user then user will be allowed to access the Internet. Hence, Server acts as a gateway between the two and all the traffic will pass through 24online server.

    Elitecore Technologies Ltd. 11

  • Error! Reference source not found. 24online User Guide Planning Business

    Elitecore Technologies Ltd. 12

    1SECTIO

    N

    Planning and Understanding Business This section describes

    Preliminary information about the business Guidelines for planning & managing critical areas of business Explanation on various policies

    Business Scenario

    Options for Internet connection

    Traditional Modem Dial Up connection through telephone line ISDN (Integrated Services Digital Network) DSL (Digital Subscriber line) Cable Broadband Wireless Enhanced Access

    Possible locations for Internet distribution

    Hotspots Cyber cafes Corporate sector Hotels Residential apartments Educational Institutes etc

    Benefits of starting Internet connection distribution project

    Service providers are in a unique position to offer a suite of economic broadband access solutions to small and mid-size businesses. In general, business applications can be differentiated from residential applications by: (1) providing productivity enhancements as opposed to the entertainment focus of residential applications, (3) requiring high bandwidth. Business applications that can best be supported: Real-time broadband applications, Commerce-related applications and Collaborative application, which allows multiple users in different locations of the office to share the information concurrently. Other applications that can be supported are college campus, telemedicine, real estate, work-at-home/telecommuting, and retail and government departments.

    Competition faced

    Because business applications provide productivity enhancements, there are specific sets of requirements like: Reliability

  • Error! Reference source not found. 24online User Guide Planning Business

    Elitecore Technologies Ltd. 13

    Business applications demand highly reliable networks. To successfully enter the local market and capture market share, service providers must deliver highly reliable access service. Security Business applications have privacy and competitive implications, thus requiring secured access. This implies authorized users must be authenticated before accessing the network and a firewall has to be integrated. Bandwidth Certain business applications demand huge bandwidth usage. Providing adequate and consistent bandwidth to customers is one of the key factors in improving the quality of service, gaining customer satisfaction, and as a result increasing business.

    Business objective

    Secured and fast Access Optimize Network performance Subscriber satisfaction Generate more revenue without compromising on requirement

  • 24online User Guide Planning and

    Understanding

    Elitecore Technologies Ltd. 14

    Planning Business Requirement analysis is the first phase in business planning. It involves understanding customers requirements and result is the answers to all probable questions of the customers. Few common questions asked by a potential subscriber:

    How fast will be my access? Am I always connected to Internet? Will I get busy signals when trying to connect? Will my connection get slow during peak hours? What payment methods are available? What will be the charge for unlimited account? What will be the charge for limited account? _____ hours per month/year Can the account be changed? How do I renew my account? Can I renew my account after the expiry date? Will I be informed for renewal of my account? Can I change my personal details and Password? Can I view my current Bandwidth Usage? Will I have the facility to view my Account Status and Invoice? Is the Leased Line Package provided? What if I dont use Internet for couple of months? Do you send notices if I have been online too long or disconnect me for being online too long

    at a time? How many different services do you offer?

    Different customers will have different requirements but some of the common requirements are

    Speed Cost Bandwidth Network security Support services

    Business is all about selling a product or service that satisfies most of the needs of most of the customers. Success of business lies in how far the customer requirements are satisfied and how convincing your answers are to above queries. Efficient distribution and management of limited resources will result into:

    customer satisfaction expanded customer base increased revenues

    User subscribes for the Internet connection for a certain period. Bandwidth is the amount of data that can pass through the network at a given time. Due to steady increase in number of customers using Bandwidth, which is a limited resource, service providers face bandwidth shortage and congestion problems. To avoid the above scenario proactive strategy has to be implemented.

    Policies

  • 24online User Guide Planning and

    Understanding

    Elitecore Technologies Ltd. 15

    Policy is the strategy that specifies the Internet access duration and bandwidth usage for a User -subscriber. In other words, policy controls the Internet access of the subscriber. Consider all types of prospective users and their typical requirements, before deciding on a policy. Primary objective is to define a policy, which includes all the necessary parameters that satisfies most of the subscriber needs. Three areas that require concentration are:

    1. Surfing Time 2. Access Time 3. Bandwidth

    24online allows managing each of them through policies.

    Surfing time policy

    Use Surfing time policy to allocate and manage surfing time of the user. Surfing time policy defines the duration of surfing time and the period of subscription. The surfing time duration is the allowed time in hours for the User to access Internet. The period of subscription is the time period till the User is allowed access. Refer to Surfing time policy for more details.

    Access time policy

    Use Access time policy to set the allowed access time of the user. Access time policy defines timings or schedule for access and pricing factor for different time bands. It also allows specifying time band based discounts. Refer to Access time policy for more details.

    Bandwidth policy

    Use Bandwidth policy to allocate and restrict the bandwidth usage of the user. Bandwidth policy defines Guaranteed Bandwidth and Burstable Bandwidth. Guaranteed bandwidth is the minimum guaranteed bandwidth and burstable bandwidth is the maximum bandwidth that a user can use, if available. You can allocate bandwidth for a group of users, a single user, and for IP Address(s). Refer to Bandwidth policy for more details.

    Packages

    Package is an integration of Surfing quota policy, Access time policy, and Bandwidth policy with a rate scheme. Different packages can be created by combining the policies as per the subscriber requirement. Subscriber is charged based on the price defined in the package. Different packages are to be created for Leased Line user and the simple user as Access time policy is not applicable to Leased Line User. Three types of package can be created:

  • 24online User Guide Planning and

    Understanding

    Elitecore Technologies Ltd. 16

    1. Registration Only One time package which cannot be renewed on expiry 2. Renewal Only Package which can be renewed on expiry 3. Registration/Renewal Package will be registered and

    For Renewal only and Registration/Renewal package, package renewal rules are to be defined. Refer to Package for more details.

    Users

    As various methods are used by users for Internet connectivity, each user needs to be identified and managed in a different way. Currently, 24online identifies user as

    Leased Line User A customer who uses leased line connection for Internet connectivity and does not require 24online Client to log on is a Leased Line User.

    User Subscriber - A customer who uses any other connection method other than Leased Line and required 24online Client to log on is a User Subscriber.

    For authorization and access users are grouped into seven types:

    1. Administrator 2. Manager 3. Operator 4. Zone Manager (Only if Zone Management module is registered) 5. Zone Operator (Only if Zone Management module is registered) 6. User Subscriber 7. Leased Line User

    Each user needs to registered and access rights are assigned depending to the user type. Apart from above mentioned user type, additional user type can also be created, if required. Refer to Authorization and Access control for details on default rights Access control list for changing the default rights User Type Management for creating additional user type

    Pools

    Basic objective of pool management is to create and manage pools of IP addresses based upon certain criteria. The general criterion is geographical grouping of IP addresses. An IP Address must be a member of a pool. Define Pool as Public if all the IP addresses in the pool are public IP addresses routable over the Internet and do not require Network Address Translation (NAT). Define Pool as Private if all the IP addresses in the pool are private IP addresses and require Network Address Translation (NAT). Once you have configured network and registered your copy of 24online, you can start using 24online by creating customer base.

  • 24online User Guide Planning and

    Understanding

    Elitecore Technologies Ltd. 17

    For your convenience, 24online has certain predefined policies, packages and user types. These predefined settings are immediately available for use until configured otherwise. If the predefined setting does not satisfy your organizations requirement, 24online lets you define customized policies and packages to define different levels of access for different users.

  • 24online User Guide 24online Basics

    Elitecore Technologies Ltd. 18

    2SECTIO

    N

    24online Basics This section provides instructions

    to perform some basic operations for network configuration

    Administration Consoles

    24online provides two consoles for managing and configuring 24online server: 1. Web based Administration Console - Browser based Graphical User Interface

    a. Using Browser 2. Text based Administration Console

    a. Using Console Interface via remote login utility TELNET b. Direct Console connection by attaching a keyboard and monitor directly to

    24online server Use Web based Administration Console for

    Configuring various policies Registering and managing users Defining and managing packages Defining firewall rules Viewing bandwidth usage and other reports

    Use Text based Administration Console for

    Configuring Network Only those users with administrator rights can open and use Administration Consoles. Throughout the guide we will talk about web based administration. For text based administration, refer to Console guide.

    Accessing 24online Web Administration Console

    Web Administration Console access requires Microsoft Internet Explorer 5.5 or above and Display setting as True color (32 bits).

    Note Web Administration Console access requires Microsoft Internet Explorer 5.5 or above and Display setting as True color (32 bits) If you have logged on for the first time after installation and not yet registered 24online, refer to Installation and Registration guide for registering your copy of 24online Change the default password, the first time you log on to 24online after registration

  • 24online User Guide 24online Basics

    Elitecore Technologies Ltd. 19

    Log on and Log off Procedure

    Log on procedure verifies validity of user and creates a session until the user logs off. To open the login page, open the browser and type IP address in browsers URL box. A dialog box appears prompting to enter username and password. Use the default username administrator and password administrator to log on if you logging in for the first time after registration. Log on methods HTTP log in To open unencrypted login page, type http://

    Screen HTTP login page

    HTTPS log in 24online provides secured communication method which encrypts the user log on information and prevents unauthorized users from viewing the user information. For this, 24online uses https protocol. The secure Hypertext Transfer Protocol (HTTPS) is a communication protocol designed to transfer encrypted information between computers over World Wide Web. HTTPS is http using a Secure Socket Layer (SSL). A secure socket layer is an encryption protocol invoked on web server that uses HTTPS.

  • 24online User Guide 24online Basics

    Elitecore Technologies Ltd. 20

    HTTPS protocol opens a secure hypertext transfer session with the specified site address. To open login page over secure HTTP, type https://

    Screen - HTTPS login page

    Screen Elements Description

    Username Specify User login name

  • 24online User Guide 24online Basics

    Elitecore Technologies Ltd. 21

    If you are logging on first time after installation, use default username administrator

    Password Specify user account password Asterisks are the placeholders If you are logging on for the first time after installation with username administrator, use default password administrator

    Login button Logs on to Web Administrator Console Click to login Register your 24online copy if Online registration page is displayed on successful log on Refer to Installation and Registration guide for more details on registration

    Diagnostic Tool

    Authorization and Access control

    Depending upon the rights assigned, user can perform all or any of the four tasks: Add, Delete, View, and Update By default, 24online has grouped users into seven types:

    1. Administrator Group Log on as Administrator group User to maintain, control and administer 24online. By default, the Administrator group User has the right to create, update, and delete system configuration & user information. Administrator can create multiple administrator level users

    2. Manager Group

    By default, the Manager group User has the right to create, update, and view user information. Delete action will not be available to the user of the Manager group by default

    3. Operator Group

    By default, the Operator group User has only the right to view user information. Create, update and delete actions will not be available to the user of the Operator group.

    4. Zone Manager Group (Only if Zone Management add-on module is registered)

    By default, the Zone Manager group User has the right to create, update, and view information of users belonging to the zones assigned to him. Delete action will not be available to the user of the Zone Manager group

    5. Zone Operator Group (Only if Zone Management add-on module is registered)

    By default, the Zone Operator group User has only the right to view information of users belonging to the zones assigned to him. Create, update and delete actions will not be available to the user with the Zone Operator group.

  • 24online User Guide 24online Basics

    Elitecore Technologies Ltd. 22

    6. User Subscriber Group User is the person who logs on to the client machine for using Internet resources.

    7. Leases Line User Subscriber Group

    Leased Line Users can access Internet without logging on to 24online Client. Surfing Time policy and Access Time policy will not be applicable in Packages created for Leased Line User Type. Bandwidth policy restriction will be applied for Leased Line Users. Data Transfer Policy restriction will be applied if Add on modules are enabled.

    To change the default rights of any user and create additional User Type to meet your requirement, please refer to Access Control List (ACL).

  • 24online User Guide Setting Subscriber Base

    3SECTIO

    N

    Setting Subscriber Base This section provides instructions for creating

    Various Policies Package Pool User Schedule

    Elitecore Technologies Ltd. 23

  • 24online User Guide Setting Subscriber Base

    Surfing Quota policy

    Elitecore Technologies Ltd. 24

    Surfing Quota policy

    Surfing time is analogous to a magazine subscription. Surfing quota policy should be used to define the period of subscription and the duration of surfing time. Surfing quota policy defines the duration of surfing time and the period of subscription. Surfing time duration is the allowed time in hours for the User to access Internet. Period of subscription is the time period till the user is allowed access. Number of users can share one policy. Multiple policies can be defined as per requirement. For example:

    i) 50 hours, 30 days gives access for 50 hours to be used within 30 days ii) 100 hours, Unlimited days - gives access for 100 hours iii) Unlimited time for 30 days gives unlimited access for 30 days iv) Unlimited policy gives access for unlimited time & days

    Creating Surfing Quota policy

    Prerequisite Create right for Policy Management, Surfing Quota policy

    Select Policy Management Surfing quota policy Create to open the create page

    Screen Create Surfing quota policy

    Screen Elements Description

    Create Surfing quota policy Policy name Specify policy name. Choose a name that best describes the policy

    Allows maximum of 60 characters Can be any combination of A Z, a z, _, 0 - 9

  • 24online User Guide Setting Subscriber Base

    Surfing Quota policy

    Elitecore Technologies Ltd. 25

    Allotted Time (hours:minutes)

    Restricts surfing hours Specify total surfing time (in Hours & minutes) allowed

    Limited time Creates Limited Time Surfing quota policy Click to select If Allotted Time is 5 hours then user can access for one hour for 5 days or 5 hours in day and policy will expire after 5 hours.

    Unlimited time Does not restrict surfing time and creates Unlimited Time Surfing Quota policy Click to select

    Session Pulse (in minutes)

    Specify Pulse rate Users are charged according to the specified pulse rate If Pulse rate is 2 minutes and price per session pulse is Rs 1.20 then user will be charged Rs 36 per hour

    Allotted Days (Option not available for Limited Time policy)

    Restricts surfing days Specify total surfing days allowed

    Unlimited Days (Option not available for Limited Time policy)

    Does not restrict surfing days and creates Unlimited Days Surfing Quota policy Click to select

    Description Specify full description of the policy Allows maximum of 255 characters Can be any combination of A Z, a z, _, 0 - 9

    Create button Creates policy Table Create Surfing quota policy screen elements

  • 24online User Guide Setting Subscriber Base

    Access Time policy

    Elitecore Technologies Ltd. 26

    Access Time policy

    User Internet access can be controlled as per the timings set in the Access time policy. Access time Policy also allows you to specify time band based discounts and charges for different time bands. Access time policy enables to set timings or schedule, for access and specify pricing factor for different time bands. Access time policy works on three basic strategies: Allow strategy By default, access is allowed unless specified otherwise E.g. To allow night hours access only - select Allow as the default strategy and disallow access from 7:00 to 21:00 Disallow strategy By default, access is disallowed unless specified otherwise E.g. another way to define "night hours access only - select disallow as the default strategy and allow access from 21:00 to 9:00 Few examples

    1. Full Access gives access for 24 hours, 7 days a week 2. Day hours only (Allow strategy) gives access during day time only i.e. disallow from

    21:00 to 9:00 in the morning 3. Day hours only (Allow strategy & disallow on Sunday) - give access only from 9:00 to

    21:00 and disallow all the time on Sunday. Pricing Factor Pricing Factor (50%, 100%, 150%, 200%, etc) allows Service Provider to define different rates for different time bands. Pricing Factor is specified in percentage and the user will be accounted for the number of hours or minutes as per the Pricing Factor. Few examples: -

    1. Pricing Factor = 0% from 00 to 8:00 for All Days Users will not be accounted if surf between 00 am to 8 am

    2. Pricing Factor=50% from 10:00 to 18:00 for Saturdays and Sundays

    Users will be accounted for half the time they surf on Saturdays and Sundays between 10:00 am to 18:00 pm i.e. if user surfs for 4 hours on Saturdays and Sundays between 10:00 am to 18:00 pm then he will be accounted for 2 hours only.

    3. 150% charges on Week Days (Monday to Friday) between 10:00 am to 18:00 pm.

    Users will be accounted for 150% of the time they surf on weekdays from 10:00 am to 18:00 pm i.e. if user surfs for total of 4 hours from Monday to Friday between 10:00 am to 18:00 pm then he will be accounted for 6 hours.

    Creating Access Time policy

    Prerequisite Create Right for Policy Management, Access time policy

  • 24online User Guide Setting Subscriber Base

    Access Time policy

    Elitecore Technologies Ltd. 27

    Select Policy Management Access time policy Create to open the create page

    Screen Create Access time policy

    Screen Elements Description

    Access Time Policy Details Name Specify policy name. Choose a name that best describes the policy to

    be created Allows maximum of 60 characters Can be any combination of A Z, a z, _, 0 - 9

    Default Strategy Based on the default strategy, user will be allowed or disallowed access Allow strategy allows access always unless specified otherwise Disallow strategy disallows access always unless specified otherwise Click to select

    Description Specify full description of the policy Allows maximum of 255 characters Can be any combination of A Z, a z, _, 0 - 9

    Create button Creates policy

  • 24online User Guide Setting Subscriber Base

    Access Time policy

    Elitecore Technologies Ltd. 28

    Creates the policy & allows defining access time. Refer to Manage Access time for more details.

    Manage Access Time Entry button

    Allows adding access time entry details to the policy. Details can be added whenenver required Click to add Refer to Manage Access time for more details

    Delete Access Time Entry button

    Allows deleting access time details. Refer to Manage Access time for details

    Table Create Access time policy screen elements

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 29

    Bandwidth policy

    Bandwidth is the amount of data passing through a media over a period of time and is measured in terms of kilobytes per second (kbps) or kilobits per second (kbits) (1 Byte = 8 bits). Bandwidth policy allocates & restricts bandwidth usage of user and controls web and network traffic. As bandwidth is a limited resource, it needs to be managed efficiently. The primary objective of bandwidth policy is to manage and distribute total bandwidth based on certain parameters and user attributes. The Internet influences network in such a way that if left unchecked, streaming media and recreational Web surfing can clog network. Bandwidth policy allows defining limits for the maximum bandwidth individual user can request. Each User is assigned an IP address. Similar IP addresses are grouped to form a pool. Bandwidth policy can be defined for:

    1. Pool 2. User 3. IP Address

    Pool based bandwidth policy

    Policy restricts bandwidth for a pool i.e. all the users defined under the pool will share the allocated bandwidth e.g. if there are 10 users in the pool and bandwidth allotted is 20 kbps, then all 10 users can draw bandwidth up to 20 kbps.

    Creating Pool based bandwidth policy

    Prerequisite Create Right for Policy Management, Bandwidth policy

    Select Policy Management Bandwidth policy Create to open the create page

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 30

    Screen Create Pool based Bandwidth policy

    Screen Elements Description

    Bandwidth Restriction Details Policy Name Specify policy name. Choose a name that best describes

    the policy to be created Allows maximum of 60 characters Can be any combination of A Z, a z, _, 0 - 9

    Policy based on Bandwidth policy can be created for a Pool, user or IP address Click Pool to create pool based policy

    Total Bandwidth Restricts total bandwidth which users of the pool can use Specify maximum bandwidth that pool users are allowed to use Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Description Specify full description of the policy Allows maximum of 255 characters Can be any combination of A Z, a z, _, 0 - 9

    Create button Creates the policy Cancel button Cancels the current operation

    Table Create Pool based Bandwidth policy screen elements

    User based bandwidth policy

    Policy restricts bandwidth for a particular user. There are two types of bandwidth restrictions: 1. Strict 2. Committed

    Strict

    In this type of bandwidth restriction, user cannot exceed the defined bandwidth limit. Strict policy can be implemented in two ways:

    1. Total (Upstream + Downstream) 2. Individual Upstream and Individual Downstream

    Implementation on Bandwidth specified Example

    Total (Upstream + Downstream)

    Total bandwidth Total bandwidth is 20 kbps then Upstream and Downstream combined cannot cross 20 kbps

    Individual Upstream and Individual Downstream

    Individual bandwidth i.e. separate for both

    Upstream and Downstream bandwidth is 20 kbps then either cannot cross 20 kbps

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 31

    Strict policy Bandwidth usage

    Bandwidth usage Bandwidth specified

    Individual For a particular user Shared Shared among all the users who have been assigned this policy

    Committed

    In this type of bandwidth restriction, user is allocated the guaranteed amount of bandwidth and user can draw bandwidth up to the defined burstable limit, if available. It enables to assign fixed minimum and maximum amounts of bandwidth to users. By borrowing excess bandwidth when it is available, users are able to burst above guaranteed minimum limits, up to the burst-able rate. Guaranteed rates also assure minimum bandwidth to critical users to receive constant levels of bandwidth during peak and non-peak traffic periods. Guaranteed represents the minimum guaranteed bandwidth and burstable represents the maximum bandwidth that a user can use, if available. Two ways to implement committed policy:

    1. Total (Upstream + Downstream) 2. Individual Upstream and Individual Downstream

    Implementation on Bandwidth specified Example

    Total (Upstream + Downstream)

    Guaranteed bandwidth Burstable bandwidth

    Guaranteed bandwidth is 20 kbps then upstream and downstream combined will get 20 kbps guaranteed (minimum) bandwidth Burstable bandwidth is 50 kbps then upstream and downstream combined can get up to 50 kbps of bandwidth (maximum), if available

    Individual Upstream and Individual Downstream

    Individual Guaranteed and Brustable bandwidth i.e. separate for both

    Individual guaranteed bandwidth is 20 kbps then upstream and downstream get 20 kbps guaranteed (minimum) bandwidth individually Individual brustable bandwidth is 50 kbps then upstream and downstream get maximum bandwidth up to 50 kbps, if available individually

    Committed policy Bandwidth usage

    Bandwidth usage Bandwidth specified

    Individual For a particular user Shared Shared among all the users who have been assigned this policy

    Creating User/IP Address based bandwidth policy

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 32

    Prerequisite Create Right for Policy Management, Bandwidth policy

    Select Policy Management Bandwidth policy Create to open the create page

    Screen Create Strict Bandwidth policy

    Screen Create Committed Bandwidth policy

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 33

    Screen Elements Description

    Bandwidth Restriction Details Policy Name Specify policy name. Choose a name that best describes the policy to be

    created Allows maximum of 60 characters Can be any combination of A Z, a z, _, 0 - 9

    Policy based on Creates policy based on the selection To create User based policy, click User To create IP Address based policy, click IP Address

    Policy type Specify type of bandwidth restriction to be applied If Strict restriction is applied, user can not exceed the defined bandwidth limit. If Committed restriction is applied, user is allocated the guaranteed amount of bandwidth and can draw bandwidth up to the defined burstable limit, if available. Click Strict to apply strict restriction Click Committed to apply committed restriction

    Implementation on Bandwidth restriction can be applied on uploading, downloading or both Click Total to implement bandwidth restriction on the Total (Upstream + Downstream) usage Click Individual to implement bandwidth restriction on the Individual Upstream and Individual Downstream bandwidth usage

    Total bandwidth (in KB) (Only for Strict Policy type and TOTAL Implementation type)

    Restricts total bandwidth which users can use Specify maximum bandwidth that users are allowed to use Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Upload Bandwidth (Only for Strict Policy type and INDIVIDUAL Implementation type)

    Restricts Upstream bandwidth usage for user Specify maximum amount of upload bandwidth Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Download Bandwidth (Only for Strict Policy type and INDIVIDUAL Implementation type)

    Restricts Downstream bandwidth usage for user Specify maximum amount of download bandwidth Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Guaranteed Burstable (in KB) (Only for Committed Policy type and TOTAL Implementation

    Guaranteed bandwidth is the minimum guaranteed bandwidth and burstable bandwidth is the maximum bandwidth that a user can use, if available Specify Guaranteed and Burstable total bandwidth user can use

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 34

    type) Minimum bandwidth allowed is 2 kbps and maximum is 4096 kbps Guaranteed Burstable Upload (in KB) (Only for Committed Policy type and Individual Implementation type)

    Specifies Guaranteed and Burstable amount of upstream bandwidth Minimum bandwidth allowed is 2 kbps and maximum is 4096 kbps

    Guaranteed Burstable Download (in KB) (Only for Committed Policy type and Individual Implementation type)

    Specifies Guaranteed and Burstable amount of downstream bandwidth Minimum bandwidth allowed is 2 kbps and maximum is 4096 kbps

    Bandwidth usage Specify whether the bandwidth specified is to be shared among all the users who have been assigned this policy or is for a particular user Click Individual if for a particular User Click Shared if to be shared among the users

    Client Side Bandwidth Factor (Only if Network Security Management (NSM) module is registered)

    Two types of security can be applied: Default & Session Default security is applied when user is not logged on and Session security is applied when user is logged on. It is possible to apply only default, only session or both the security simultaneously. By default, Default security is always applied i.e. even if NSM module is not registered. Depending on the client side-bandwidth factor, session (upload and download) and default (upload and download) bandwidth restrictions are applied to the user. Specify client side bandwidth factor

    Create button Creates the policy Cancel button Cancels the current operation and returns to Manage Bandwidth policy

    page Table Create User/IP address based Bandwidth policy screen elements

    IP Address based bandwidth policy

    Policy restricts the bandwidth for a particular IP address. It is similar to the User based policy with the same type of restrictions on Implementation type & Bandwidth usage.

    Creating IP Address based bandwidth policy

    For creating IP Address based bandwidth policy, refer to Creating User based bandwidth policy.

    Prerequisite Create Right for Policy Management, Bandwidth policy Presence of at least one pool

    Assigning Bandwidth Policy to IP Address

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 35

    After creating policy, specify to which IP Address(s) the policy will be applied. Policy can be applied to the IP Address even after the creation of policy as and when required.

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 36

    Screen Assigning Bandwidth policy to IP address

    Screen Elements Description

    Pool Name Every IP address belongs to a pool. Select Pool in which IP address is defined. Click Pool name list to select

    Select Select the IP address to which policy is to be applied. Bandwidth restriction will be applied to all the IP Address(s) selected. Click Select against the IP address to be attached More than one IP address can also be selected

    Select All Selects all IP Addresses Click Select All to select all the IP Addresses

    Apply restriction button

    Applies bandwidth restriction to the selected IP address

    Cancel button Cancels the current operation and returns to Edit Bandwidth policy page

    Table Assigning Bandwidth policy to IP Address

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 37

    Scheduling Policies

    Schedule defines a time schedule for the policy. It specifies the hours during which the policy can be active on each day of the week. You can define a different schedule for each day of the week, or same schedule for every day of the week. The basic reason to define Schedule is to apply different bandwidth restrictions at different times during the week. Schedule can be used to override the default bandwidth restrictions placed by Bandwidth policy and specify the alternate bandwidth restriction during the selected Schedule.

    Creating Schedule

    Prerequisite Create Right for Policy Management, Schedule

    Select Policy Management Schedule Create to open the create page

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 38

    Screen Define Schedule

    Screen Elements Description

    Schedule details Name Specify schedule name. Choose a name that best describes schedule

    Allows maximum of 50 characters Can be any combination of A Z, a z, _, 0 - 9

    Description Specify full description of schedule Allows maximum of 250 characters Can be any combination of A Z, a z, _, 0 - 9

    Create button Creates schedule and allows to enter the schedule details Click Add Schedule Entry details to add details to the schedule Refer to Add Schedule Entry details for more details

    Schedule Entry Add button Opens a new page to add Schedule Entry details. Details can be

    entered whenever required even after creation of schedule. Refer to Add Schedule Entry details to add details

    Save button Saves schedule Cancel button Cancels the current operation and returns to Manage Schedule page

    Table Define Schedule screen elements

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 39

    Assigning Schedule to Bandwidth policy

    Bandwidth restriction placed by the Schedule will override the default bandwidth restrictions placed by Bandwidth policy during the time interval specified in the Schedule.

    Prerequisite Bandwidth policy created Update right for policy Management, Bandwidth policy

    Select Policy Management Bandwidth policy Manage to open the manage policy page. Click policy to which schedule is to be attached Click Add Details

    Screen - Assigning Schedule to Bandwidth policy

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 40

    Screen Elements Description

    Schedule Details Policy Name Displays bandwidth policy name to which schedule will be

    applied Policy Type Displays type bandwidth restriction applied by the bandwidth

    policy, modify if required Implementation on Displays how the bandwidth policy is implemented, modify if

    required Total implements bandwidth restriction on the Total (Upstream + Downstream) usage Individual implements bandwidth restriction on the Individual Upstream and Individual Downstream bandwidth usage

    Total Bandwidth (Only for Strict Policy type and TOTAL Implementation type)

    Restricts total bandwidth which users can use Specify maximum bandwidth that users are allowed to use Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Upload Bandwidth (Only for Strict Policy type and INDIVIDUAL Implementation type)

    Restricts Upstream bandwidth usage for user Specify maximum amount of upload bandwidth Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Download Bandwidth (Only for Strict Policy type and INDIVIDUAL Implementation type)

    Restricts Downstream bandwidth usage for user Specify maximum amount of download bandwidth Minimum bandwidth allowed is 2 kbps and Maximum is 4096 kbps

    Guaranteed Burstable (in KB) (Only for Committed Policy type and TOTAL Implementation type)

    Guaranteed bandwidth is the minimum guaranteed bandwidth and burstable bandwidth is the maximum bandwidth that a user can use, if available Specify Guaranteed and Burstable total bandwidth user can use Minimum bandwidth allowed is 2 kbps and maximum is 4096 kbps

    Guaranteed Burstable Upload (in KB) (Only for Committed Policy type and Individual Implementation type)

    Specifies Guaranteed and Burstable amount of upstream bandwidth Minimum bandwidth allowed is 2 kbps and maximum is 4096 kbps

    Guaranteed Burstable Download (in KB) (Only for Committed Policy type and Individual Implementation type)

    Specifies Guaranteed and Burstable amount of downstream bandwidth Minimum bandwidth allowed is 2 kbps and maximum is 4096 kbps

    Schedule The specified bandwidth restriction will override the restriction placed by the bandwidth policy Click to select the schedule

  • 24online User Guide Setting Subscriber Base

    Bandwidth policy

    Elitecore Technologies Ltd. 41

    View details link Opens a new window and displays the schedule details Click to view

    Create button Creates & attaches the schedule details for the selected weekday

    Cancel button Cancels the current operation and returns to the Edit Schedule page

    Table - Assigning Schedule to Bandwidth policy screen elements

  • 24online User Guide Setting Subscriber Base

    Pool

    Elitecore Technologies Ltd. 42

    Pool

    Pool is a grouping of IP addresses based upon some criteria. The general criterion is geographical grouping of IP addresses. An IP Address must be a member of a pool. A pool can contain up to 254 IP addresses. Each user is assigned one or more IP Address(s), and can log on from the assigned IP Address(s) only.

    Creating Pool

    Prerequisite Create Right for User Management, Pool Bandwidth policy created

    Select User Management Pool Management Create Pool to open create page

    Screen - Create Pool

  • 24online User Guide Setting Subscriber Base

    Pool

    Elitecore Technologies Ltd. 43

    Screen Elements Description

    Pool Details Pool name Specify pool name. Choose a name that best describes the pool

    characteristics Allows maximum of 50 characters Can be any combination of A Z, a z, _, 0 - 9

    Is Pool Public Public IP address is routable over the Internet and do not need Network Address Translation (NAT) Click to Select, if IP Addresses in the pool are public IP Addresses

    Bandwidth policy Specify Bandwidth policy to be applied Click Bandwidth Policy list to select Click View details link to view details of the policy

    Show details link View details of the selected bandwidth policy External Interface (Only if SNAT module is registered)

    Specify External Interface through which the requests will be forwarded Click to select

    SNAT IP address (Only if SNAT module is registered)

    Specify IP address which is to be used for forwarding requests

    Description Specify full description of the pool Allows maximum of 250 characters Can be any combination of A Z, a z, _, 0 - 9

    Machine details From To IP addresses to be included in the pool Machine name Machine name Create button Creates pool

    Table Create Pool screen elements

  • 24online User Guide Setting Subscriber Base

    Package

    Elitecore Technologies Ltd. 44

    Package

    Package is an integration of Surfing quota policy, Access time policy, and Bandwidth policy with a rate scheme. Different packages can be created by combining the policies as per the subscriber requirement. Subscriber is charged based on the price defined in the package. Access time policy is not applicable to leased line users i.e. unlimited access time policy is applied to leased line users.

    Creating package

    Prerequisite Create Right for Package Management, Package At least one Pool created At least one Policy of each type created

    Select Package Management Package Create to open create page

    Screen Create Package

  • 24online User Guide Setting Subscriber Base

    Package

    Elitecore Technologies Ltd. 45

    Screen Create Package for Leased line users

    Screen Elements Description

    Package details Package name Specify package name. Choose a name that best describes the

    package characteristics Allows maximum of 50 characters Can be any combination of A Z, a z, _, 0 - 9

    Package Type Specify whether the created package is registration only or renewal only or registration/renewal package. Registration package One time package which cannot be renewed on expiry Renewal package Package which can be renewed on expiry If you select both, then package will be created and will be able to renew the package on expiry If package type is renewal only or registration/renewal then renewal rules are to be defined. Refer Define Renewal Rules for defining renewal rules

    Connection Type Specify whether package is for leased line or not. Specify connection type as Leased line, if user type is leased line user Specify connection type as User, for all other user types

    Surfing time policy Specify Surfing quota policy that should be applied to the package users Click Surfing quota policy list to select

    Access time policy Specify Access time policy that should be applied to the package users For leased line users, Unlimited policy is applied

  • 24online User Guide Setting Subscriber Base

    Package

    Elitecore Technologies Ltd. 46

    Click Access time policy list to select

    Bandwidth policy Specify Bandwidth policy that should be applied to the package users Click Bandwidth policy list to select

    Security Enabled (Only if NSM module is registered and Connection type is User)

    Two types of security can be applied: Default & Session Default security is applied when user is not logged on and Session security is applied when user is logged on. It is possible to apply only default, only session or both the security simultaneously. By default, Default security is always applied i.e. even if NSM module is not registered. Select Yes to apply default and session security both Select No to apply only the session security Depending on Client side bandwidth factor the session bandwidth restriction is applied.

    Price Specify rate to be charged to the package users Create button Creates package Cancel button Cancels the current operation Renewal Rules (Only if the package type is Renewal or Renewal/Register) Add Rule button Allows to specify the package renewal rules. Rules can be

    defined at the time of creation of the package or even after the creation of package as per the requirement. Click to add Refer to Define Renewal Rule for more details

    Delete button Allows to delete the defined renewal rules Refer to Delete Renewal Rule for more details

    Table Create Package screen elements

    Defining Renewal rules

    Renewal rules are to be defined only if package is of Renewal only or Register/Renewal type. If required, renewal rules can also be defined after the creation of package. Select Package Management Package Manage to view the list of packages created. Click the package for which renewal rules are to be defined.

  • 24online User Guide Setting Subscriber Base

    Package

    Elitecore Technologies Ltd. 47

    Screen Define Package Renewal rules

    Screen Elements Description Renewal Rules Displays list of all packages which are defined as

    Package type Renewal or Register and Renewal both

    Renewal from Package Renew from package Selected package(s) can be renewed to the current

    package Click to select

    Renewal Rule Details Renew to this package Specify whether renewal should be allowed or not

    Click to allow

    Carry Forward Hours Specify whether to carry forward the unused/remaning hours or not to the renew package Click to carry forward

    Carry Forward Days Specify whether to carry forward the unused/remaning days or not to the renew package Click to carry forward

    Carry Forward Data Transfer (Only if Data Transfer module is registered)

    Specify whether to carry forward the unused/remaning data transfer quota or not to the renew package Click to carry forward

    Add Rule button Add the rule Cancel button Cancels current operation

    Table Define Package Renewal rules screen elements

  • 24online User Guide Setting Subscriber Base

    Package

    Elitecore Technologies Ltd. 48

    Deleting Package Renewal rule

    Select Package Management Package Manage to view the list of packages created. Click the package for which renewal rules is to be deleted. Click Select against the rule to be deleted Click Select All if you want to delete all the rules Click Delete

    Screen Delete Package Renewal rules screen elements

  • 24online User Guide Setting Subscriber Base

    Users

    Elitecore Technologies Ltd. 49

    Users

    Following types of users are supported by 24online and all the users of any user type are required to be registered:

    1. Administrator User 2. Manager User 3. Operator User 4. User Subscriber 5. Leased Line User 6. Zone Manager User (Only if Zone Management module is registered) 7. Zone Operator User (Only if Zone Management module is registered)

    It is also possible to create a customized user type if required. Refer to ACL, User Type Management to create customized user type. Create customized user type before registering user of customized user type.

    Registering Users

    Prerequisite Set System date from Console Package and policies created Pool created Create Right for User Management, Manage Users

    Select User Management Manage Users User to open the user registration page

  • 24online User Guide Setting Subscriber Base

    Users

    Elitecore Technologies Ltd. 50

    Screen - Register User

    Screen Elements Description

    User Information Customer name Specify Customer name

    Allows maximum of 60 characters Can be any combination of A Z, a z, _, 0 - 9

    User name Specify a name that uniquely identifies customer & used to log on Allows maximum of 15 characters Can be any combination of A Z, a z, _, 0 - 9

    Password Specify Password Allows maximum of 15 characters

  • 24online User Guide Setting Subscriber Base

    Users

    Elitecore Technologies Ltd. 51

    Can be any combination of A Z, a z, _, 0 - 9 Confirm Password Should be same as Password User Type Default access rights are assigned to the user depending on User Type.

    Refer to Authorization and Access control for more details. Leased Line User do not require 24online Client to log on in order to access Internet Click User type list to select

    User Package Information Package Depending on package selected, various policies will be applied

    Specify package Click Package list to select

    Bandwidth Policy Bandwidth policy By default, bandwidth policy defined in the package is applied to the user. It is

    possible to override the bandwidth policy defined in the package. To override the bandwidth policy defined in package and assign another policy -Click Bandwidth policy list to select

    Login Restriction Allowed Login from Specify login restriction

    Available options 1) Allowed from all the nodes (Not applicable to Leased Line user) Allows user to login from all the nodes in the network 2) Allowed from selected node Allows user to login from the selected node only. 2) Allowed from selected pool (Not applicable to Leased Line user) Allows Users to login only from all the nodes of the selected pool only. Click to select

    Select Node button

    Open a new window and allows to select the IP address from which user can log on Click Select Node Click Pool name list to select Click Select against the IP address to be assigned

    Bind to MAC Binds MAC Address with IP Address and is unique for each machine Enable to places an additional layer of security. If enabled MAC Address will be stored the first time user logs on. If user tries to access Internet from any other machine by changing IP Address, user will not be able to log on.

    Personal Information Address1, Address2, City, State, Country, Zip, phone

    Complete address & phone number of Customer Address1 is the compulsory field

    Birth date Specify date of birth of user Click Popup Calendar to select the date

    Email Specify user Email-id Invoice Information

  • 24online User Guide Setting Subscriber Base

    Users

    Elitecore Technologies Ltd. 52

    Generate Invoice Select the check box to Generate Invoice. Invoices will be generated only for the prepaid packages Click Printable Format to print the invoice generated

    Register button Registers user Review button Allow to review the registration details of User before registration

    Click to review details

    Table Register User screen elements

  • 24online User Guide Setting Subscriber Base

    Managing Administration Console Access

    Elitecore Technologies Ltd. 53

    Restrict Administration Console access

    Apart from restricting various operations for different types of user, Administration Console access can also be restricted. Administrator can restrict access to individual IP addresses or subnets by creating an access control list. Select System Management ACL Access Configuration

    Scre rict Administration Console Access

    en Rest

    Screen Elements Description

    Access Restriction Enable IP Address Restriction

    Allows to enable/disable IP Address Restriction Select Yes to enable IP Address Restriction Select No to disable IP Address Restriction Enabling restriction will allow only the specified IP addresses to

  • 24online User Guide Setting Subscriber Base

    Managing Administration Console Access

    Elitecore Technologies Ltd. 54

    access the management console Console Access Allows Access From

    to access Text based

    resses

    cific IP addresses

    Specify whether Users will be ableAdministration Console from all IP Addresses or from specific IP

    ddresses only A Select All IP Addresses to allow access from all IP add Select Specific IP Addresses to allow access from spe

    IP Address list (Only for Specific IP Addresses)

    Specify from which IP Address(s) Users will be able to access Text based Administration Console Click Add to add IP address to the list Click IP Address and Remove to remove IP address from the list Click Remove All to remove all IP Addresses from list

    Web Access User Type Specify which user has access to Web based Administration

    Console Click User type to select

    Allows Access From

    Specify whether the selected User will be able to access Web Administration Console from all IP Addresses or from specific IP Addresses only Select All IP Addresses to allow access from all IP addresses Select Specific IP Addresses to allow access from specific IP addresses

    IP Address list (Only for Specific IP Addresses)

    Specifies from which IP Address(s) selected user will be able to access Web Administration Console Click Add to add IP address to the list Click IP Address and Remove to remove IP address from the list Click Remove All to remove all IP Addresses from list

    Save button Saves configuration Table Restrict Administration Console Access screen elements

  • 24online User Guide Setting Subscriber Base

    Managing Administration Console Access

    Elitecore Technologies Ltd. 55

    User Type

    For authorization and access control, 24online has seven predefined user types namely: 1. Administrator 2. Manager 3. Operator 4. Zone Manager (Only if Zone Management module is registered) 5. Zone Operator (Only if Zone Management module is registered) 6. User Subscriber 7. Leased Line User

    Apart from above mentioned user type, additional user type can also be created, if required.

    Creating User Type

    Prerequisite Create Right for System Management, ACL

    Select System Management ACL User Type Management to open the user type management page and Click Create

    Screen Create User Type

    Screen Elements Description Create Custom User type User type Specify a name that uniquely identifies user type Description Specify full description of the user type

    Allows maximum of 255 characters Can be any combination of A-Z, a-z,_, 0-9

  • 24online User Guide Setting Subscriber Base

    Managing Administration Console Access

    Elitecore Technologies Ltd. 56

    Update button Add a new user type Cancel button Cancels the current operation and returns to User

    type management page Table Create User Type screen elements

    Deleting User Type

    Prerequisite Delete Right for System Management, ACL

    Screen Delete User Type

    Screen Elements Description

    Select Select user type for deletion Click Select to select More than one user type can also be selected

    Select All Select all user types Click Select All to select all user types

    Delete button Deletes all the selected user types Click to delete

    Table Delete User Type screen elements

  • 24online User guide

    4SECTIO

    N

    Setting Advanced Features This section provides instructions for

    Defining Firewall rules Configuring Cache server Setting Data backup and restore schedules

    Firewall rules

    A firewall protects the network from unauthorized access and typically guards the Internal network against malicious access; however, firewalls may also be configured to limit the access of Internal users. The purpose of a firewall is to keep people on the Internet from accessing data on Internal Network. Firewall defines certain rules that determine what traffic should be allowed in or out of the Internal network. One can restrict access to certain IP addresses or domain names, or block certain traffic by blocking the TCP/IP ports used. Firewall inspects both inbound and outbound Network traffic to determine, based on the configured Rules, whether to allow the traffic or not.

    Defining Firewall rules

    Prerequisite Create Right for System Management, Firewall

    Select System Management Firewall Create Access to define a firewall rule

    Elitecore Technologies Ltd. 57

  • 24online User guide

    Screen Define Firewall rule

    Screen Elements Description

    Source and InformDestination ation Sname/IP Address

    ify Source Domain name, IP address or Network for which rule is be define

    Generally Source address is the Internal Netw

    ource Domain Specto d

    ork address D tination Domain name/IP Address

    a or IP addrebe defined

    rally D ddress i he External

    es Specify Destination Domain n me ss for which the rule is to

    Gene estination a s t address Port Details Source Port Specify source port address

    Range of ports can be specified using : e.g. 2

    0:25 Port Type Specify whether the rule should be applied to e source

    port or not

    Select Include or Exclude

    the traffic from th

    Destination Port Specify destination port address

    Elitecore Technologies Ltd. 58

  • 24online User guide

    Range of ports can be specified using : e.g. 20:25 Port Type ecify w d e applied

    destination port or not

    t Include or Exclude

    Sp hether rule shoul b to the traffic from the

    SelecNetwork Protocol TCP Implements rule for the TCP protocol U s rule for the UDP protocol DP ImplementICMP Implements rule for the ICMP protocol A nts rule for the All protocols ll Protocols ImplemeRule Action Action Click Select Action list to select

    pt A llow equest tDrop Denie s the request Proxy Allow access Port forwarding Allows access through forwa

    Acce llow access i.e. as access i.e. drop

    s the r o pass

    rded port Forwarding Address Information (Only for Rule Action is Port Forwarding) Forwarded IP A

    IP address to which request is to be forwardedddress

    F h request is to be forwarded orwarded Port Port to whicD n escriptioD cription cify full e ru

    Allows maximum of 255 characters Can be any combination of A-Z, a-z,_, 0-9

    es Spe description of th le

    Save button Saves the rule Table Define Firewall rule screen elements

    Source IP Source Destination IP Destination Port Result address/Domain name

    address/Domain name Port

    Action - Accept/Proxy * * * * Access from all the IP

    addresses to all the IP addresses

    * * www.yahoo.com * All IP addresses are allowed to access yahoo.com

    192.168.1.242 * * * 192.168.1.242 is allowed access all the IP addresses

    192.168.1.242 * 242.128.34.54 * 192.168.1.242 is allowed to access 242.128.34.54

    Action Drop * * * * Access to all is denied

    some technical reasons)

    (want to stop access temporarily due to

    * * www.hotmail.com * All the IP addresses

    Elitecore Technologies Ltd. 59

  • 24online User guide

    are denied access to hotmail.com

    192.168.1.242 * * * 192.168.1.242 is denied the access to all

    192.168.1.242 * 242.128.34.54 * 192.168.1.242 is denied the access to 242.128.34.54

    Action - Port forwarding Forwarded IP 192.168.1.58 Port 80 * * 242.128.34.54 9090 Requests from any

    Source IP Address to Destination IP Address 242.128.34.54 on Port 9090 is forwarded to IP Address 192.168.1.58 on port 80.

    Action - Port forwarding Forwarded IP 192.168.1.61 Port * *

    * 242.128.30.10 * Requests from any Source IP Address to Destination IP Address 242.128.30.10 is forwarded to IP Address 192.168.1.61.

    hanging Firewall Rule order

    Rules are ord y. es are applied, they are processed from the top downwards and the first suitable rule Hence, while adding multiple rules put specific rules before general rules. Otherwise, a general rule might allow a packet that you specifically have a rule written to deny later in the list. When a packet matches th r forwarded without being tested by the rest of the rules in Example of Firewall rule order for DRRule 1 Sourc 92.168 Destination: www.yahoo.com

    C

    ered by their priorit When the rul found is applied.

    , it is necessary to

    e rule, the packet is immediately dropped o the list.

    OP action e IP address: 1 .1.76

    Action: Drop Rule 2 Source: * Destination: www.yahoo.com Action: Allow Here if the order is changed i.e. Rule 2 precedes Rule 1 then Host 192.168.1.76 will be able to access www.yahoo.com even though the DROP rule is specified. Select System Management Firewall Manage Access Click the rule whose order is to be changed Click Moveup to move the selected rule one step up