P-660H/HW/W-T Series
ADSL 2+ Gateway
User’s Guide
Version 3.40
6/2005
P-660H/HW/W-T Series User’ Guide
Copyright © 2005 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright |
2 |
P-660H/HW/W-T Series User’ Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
•This device may not cause harmful interference.
•This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and the receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
3 |
Federal Communications Commission (FCC) Interference Statement |
P-660H/HW/W-T Series User’ Guide
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
ZyXEL Communications Corporation declared that Prestige 660HW-T1 is limited in CH1~11 from 2400 to 2483.5 MHz by specified firmware controlled in USA.
Certifications
Go to www.zyxel.com
1Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
2Select the certification you wish to view from this page.
Federal Communications Commission (FCC) Interference Statement |
4 |
P-660H/HW/W-T Series User’ Guide
For your safety, be sure to read and follow all warning notices and instructions.
•To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
•Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
•Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
•Do NOT use the device if the power supply is damaged as it might cause electrocution.
•If the power supply is damaged, remove it from the power outlet.
•Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
•Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
•If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
•Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
•Do NOT expose your device to dampness, dust or corrosive liquids.
•Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
•Make sure to connect the cables to the correct ports.
•Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
•Do NOT store things on the device.
•Connect ONLY suitable accessories to the device.
5 |
Safety Warnings |
P-660H/HW/W-T Series User’ Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
ZyXEL Limited Warranty |
6 |
P-660H/HW/W-T Series User’ Guide
Please have the following information ready when you contact customer support.
•Product model and serial number.
•Warranty Information.
•Date that you received your device.
•Brief description of the problem and the steps you took to solve it.
METHOD |
SUPPORT E-MAIL |
TELEPHONEA |
WEB SITE |
REGULAR MAIL |
||
LOCATION |
SALES E-MAIL |
FAX |
FTP SITE |
|||
|
||||||
|
|
|
|
|
||
CORPORATE |
support@zyxel.com.tw |
+886-3-578-3942 |
www.zyxel.com |
ZyXEL Communications Corp. |
||
|
|
|
www.europe.zyxel.com |
6 Innovation Road II |
||
HEADQUARTERS |
|
|
|
|
Science Park |
|
sales@zyxel.com.tw |
+886-3-578-2439 |
ftp.zyxel.com |
||||
(WORLDWIDE) |
Hsinchu 300 |
|||||
|
|
|
|
ftp.europe.zyxel.com |
Taiwan |
|
|
info@cz.zyxel.com |
+420 241 091 350 |
www.zyxel.cz |
ZyXEL Communications |
||
|
|
|
|
|
Czech s.r.o. |
|
|
info@cz.zyxel.com |
+420 241 091 359 |
|
|||
CZECH REPUBLIC |
|
Modranská 621 |
||||
|
|
|
|
|||
|
|
|
|
|
143 01 Praha 4 - Modrany |
|
|
|
|
|
|
Ceská Republika |
|
|
|
|
|
|
|
|
|
support@zyxel.dk |
+45 |
39 55 07 00 |
www.zyxel.dk |
ZyXELCommunicationsA/S |
|
DENMARK |
|
|
|
|
Columbusvej 5 |
|
sales@zyxel.dk |
+45 |
39 55 07 07 |
|
|||
|
2860 Soeborg |
|||||
|
|
|
|
|
Denmark |
|
|
support@zyxel.fi |
+358-9-4780-8411 |
www.zyxel.fi |
ZyXEL Communications Oy |
||
FINLAND |
|
|
|
|
Malminkaari 10 |
|
sales@zyxel.fi |
+358-9-4780 8448 |
|
||||
|
00700 Helsinki |
|||||
|
|
|
|
|
Finland |
|
|
info@zyxel.fr |
+33 |
(0)4 72 52 97 97 |
www.zyxel.fr |
ZyXEL France |
|
|
|
|
|
|
1 rue des Vergers |
|
FRANCE |
|
+33 |
(0)4 72 52 19 20 |
|
||
|
|
Bat. 1 / C |
||||
|
|
|
|
|
69760 Limonest |
|
|
|
|
|
|
France |
|
|
support@zyxel.de |
+49-2405-6909-0 |
www.zyxel.de |
ZyXEL Deutschland GmbH. |
||
GERMANY |
|
|
|
|
Adenauerstr. 20/A2 D-52146 |
|
sales@zyxel.de |
+49-2405-6909-99 |
|
||||
|
Wuerselen |
|||||
|
|
|
|
|
Germany |
|
|
support@zyxel.com |
+1-800-255-4101 |
www.us.zyxel.com |
ZyXEL Communications Inc. |
||
NORTH AMERICA |
|
+1-714-632-0882 |
|
1130 N. Miller St. |
||
|
|
|
|
Anaheim |
||
sales@zyxel.com |
+1-714-632-0858 |
ftp.us.zyxel.com |
||||
|
CA 92806-2001 |
|||||
|
|
|
|
|
U.S.A. |
|
|
support@zyxel.no |
+47 |
22 80 61 80 |
www.zyxel.no |
ZyXELCommunicationsA/S |
|
NORWAY |
|
|
|
|
Nils Hansens vei 13 |
|
sales@zyxel.no |
+47 |
22 80 61 81 |
|
|||
|
0667 Oslo |
|||||
|
|
|
|
|
Norway |
|
|
support@zyxel.es |
+34 |
902 195 420 |
www.zyxel.es |
ZyXEL Communications |
|
SPAIN |
|
|
|
|
Alejandro Villegas 33 |
|
sales@zyxel.es |
+34 |
913 005 345 |
|
|||
|
1º,28043Madrid |
|||||
|
|
|
|
|
Spain |
|
|
support@zyxel.se |
+46 |
31 744 7700 |
www.zyxel.se |
ZyXEL Communications A/S |
|
SWEDEN |
|
|
|
|
Sjöporten 4, 41764 Göteborg |
|
sales@zyxel.se |
+46 |
31 744 7701 |
|
|||
|
|
Sweden |
||||
|
|
|
|
|
|
7 |
Customer Support |
P-660H/HW/W-T Series User’ Guide
METHOD |
SUPPORT E-MAIL |
TELEPHONEA |
WEB SITE |
REGULAR MAIL |
|
LOCATION |
SALES E-MAIL |
FAX |
FTP SITE |
||
|
|||||
|
|
|
|
|
|
|
support@zyxel.co.uk |
+44 (0) 1344 303044 |
www.zyxel.co.uk |
ZyXEL Communications UK |
|
|
|
08707 555779 (UK only) |
|
Ltd.,11 The Courtyard, |
|
UNITED KINGDOM |
|
|
|
Eastern Road, Bracknell, |
|
sales@zyxel.co.uk |
+44 (0) 1344 303034 |
ftp.zyxel.co.uk |
|||
|
Berkshire, RG12 2XB, |
||||
|
|
|
|
||
|
|
|
|
United Kingdom (UK) |
|
|
|
|
|
|
a. “+” is the (prefix) number you enter to make an international telephone call.
Customer Support |
8 |
P-660H/HW/W-T Series User’ Guide
9 |
Customer Support |
P-660H/HW/W-T Series User’ Guide
Copyright |
.................................................................................................................. |
2 |
Federal Communications Commission (FCC) Interference Statement ............... |
3 |
|
Safety Warnings ....................................................................................................... |
5 |
|
ZyXEL Limited Warranty.......................................................................................... |
6 |
|
Customer Support.................................................................................................... |
7 |
|
Table of Contents ................................................................................................... |
10 |
|
List of Figures ........................................................................................................ |
24 |
|
List of Tables .......................................................................................................... |
32 |
|
Preface .................................................................................................................... |
|
38 |
Introduction to DSL................................................................................................ |
40 |
|
Chapter 1 |
|
|
Getting To Know Your Prestige............................................................................. |
42 |
|
1.1 |
Introducing the Prestige ..................................................................................... |
42 |
1.2 |
Features ............................................................................................................. |
42 |
|
1.2.1 Wireless Features (P-660HW/P-660W) .................................................... |
45 |
1.3 |
Applications for the Prestige .............................................................................. |
46 |
|
1.3.1 Protected Internet Access ......................................................................... |
46 |
|
1.3.2 LAN to LAN Application ............................................................................ |
46 |
1.4 |
Front Panel LEDs ............................................................................................... |
46 |
1.5 |
Hardware Connection ........................................................................................ |
47 |
Chapter 2 |
|
|
Introducing the Web Configurator........................................................................ |
48 |
|
2.1 |
Web Configurator Overview ............................................................................... |
48 |
|
2.1.1 Accessing the Web Configurator .............................................................. |
48 |
|
2.1.2 Resetting the Prestige .............................................................................. |
49 |
|
2.1.2.1 Using the Reset Button ................................................................... |
49 |
|
2.1.3 Navigating the Web Configurator .............................................................. |
50 |
2.2 |
Change Login Password ................................................................................... |
52 |
Table of Contents |
10 |
P-660H/HW/W-T Series User’ Guide
Chapter 3 |
|
|
Wizard Setup for Internet Access......................................................................... |
54 |
|
3.1 |
Introduction ........................................................................................................ |
54 |
|
3.1.1 Internet Access Wizard Setup .................................................................. |
54 |
Chapter 4 |
|
|
LAN Setup............................................................................................................... |
62 |
|
4.1 |
LAN Overview ................................................................................................... |
62 |
|
4.1.1 LANs, WANs and the Prestige .................................................................. |
62 |
|
4.1.2 DHCP Setup ............................................................................................. |
63 |
|
4.1.2.1 IP Pool Setup .................................................................................. |
63 |
|
4.1.3 DNS Server Address ................................................................................ |
63 |
|
4.1.4 DNS Server Address Assignment ............................................................. |
63 |
4.2 |
LAN TCP/IP ........................................................................................................ |
64 |
|
4.2.1 IP Address and Subnet Mask ................................................................... |
64 |
|
4.2.1.1 Private IP Addresses ....................................................................... |
65 |
|
4.2.2 RIP Setup ................................................................................................. |
65 |
|
4.2.3 Multicast .................................................................................................... |
66 |
|
4.2.4 Any IP ....................................................................................................... |
66 |
|
4.2.4.1 How Any IP Works .......................................................................... |
67 |
4.3 |
Configuring LAN ................................................................................................ |
68 |
Chapter 5 |
|
|
Wireless LAN .......................................................................................................... |
70 |
|
5.1 |
Wireless LAN Introduction ................................................................................. |
70 |
5.2 |
Wireless Security Overview ............................................................................... |
70 |
|
5.2.1 Encryption ................................................................................................. |
70 |
|
5.2.2 Authentication ........................................................................................... |
70 |
|
5.2.3 Restricted Access ..................................................................................... |
71 |
|
5.2.4 Hide Prestige Identity ................................................................................ |
71 |
5.3 |
The Main Wireless LAN Screen ........................................................................ |
71 |
5.4 |
Configuring the Wireless Screen ....................................................................... |
73 |
|
5.4.1 WEP Encryption ........................................................................................ |
73 |
5.5 |
Configuring MAC Filters .................................................................................. |
75 |
5.6 |
Introduction to WPA ......................................................................................... |
77 |
|
5.6.1 WPA-PSK Application Example ................................................................ |
77 |
|
5.6.2 WPA with RADIUS Application Example .................................................. |
78 |
|
5.6.3 Wireless Client WPA Supplicants ............................................................ |
79 |
5.7 |
Configuring IEEE 802.1x and WPA ................................................................... |
79 |
|
5.7.1 No Access Allowed or Authentication ....................................................... |
80 |
|
5.7.2 Authentication Required: 802.1x ............................................................... |
80 |
|
5.7.3 Authentication Required: WPA ................................................................. |
82 |
|
5.7.4 Authentication Required: WPA-PSK ......................................................... |
84 |
11 |
Table of Contents |
|
P-660H/HW/W-T Series User’ Guide |
|
5.8 |
Configuring Local User Authentication .............................................................. |
85 |
5.9 |
Configuring RADIUS ......................................................................................... |
87 |
Chapter 6 |
|
|
WAN Setup.............................................................................................................. |
90 |
|
6.1 |
WAN Overview .................................................................................................. |
90 |
|
6.1.1 Encapsulation ........................................................................................... |
90 |
|
6.1.1.1 ENET ENCAP ................................................................................. |
90 |
|
6.1.1.2 PPP over Ethernet .......................................................................... |
90 |
|
6.1.1.3 PPPoA ............................................................................................. |
90 |
|
6.1.1.4 RFC 1483 ........................................................................................ |
91 |
|
6.1.2 Multiplexing ............................................................................................... |
91 |
|
6.1.2.1 VC-based Multiplexing .................................................................... |
91 |
|
6.1.2.2 LLC-based Multiplexing ................................................................... |
91 |
|
6.1.3 VPI and VCI .............................................................................................. |
91 |
|
6.1.4 IP Address Assignment ............................................................................ |
91 |
|
6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation ..................... |
91 |
|
6.1.4.2 IP Assignment with RFC 1483 Encapsulation ................................. |
92 |
|
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation .......................... |
92 |
|
6.1.5 Nailed-Up Connection (PPP) .................................................................... |
92 |
|
6.1.6 NAT ........................................................................................................... |
92 |
6.2 |
Metric ................................................................................................................ |
92 |
6.3 |
PPPoE Encapsulation ........................................................................................ |
93 |
6.4 |
Traffic Shaping ................................................................................................... |
93 |
6.5 |
Zero Configuration Internet Access .................................................................... |
94 |
6.6 |
The Main WAN Screen ...................................................................................... |
95 |
6.7 |
Configuring WAN Setup .................................................................................... |
95 |
6.8 |
Traffic Redirect .................................................................................................. |
98 |
6.9 |
Configuring WAN Backup .................................................................................. |
99 |
Chapter 7 |
|
|
Network Address Translation (NAT) Screens.................................................... |
102 |
|
7.1 |
NAT Overview ................................................................................................. |
102 |
|
7.1.1 NAT Definitions ....................................................................................... |
102 |
|
7.1.2 What NAT Does ...................................................................................... |
103 |
|
7.1.3 How NAT Works ..................................................................................... |
103 |
|
7.1.4 NAT Application ...................................................................................... |
104 |
|
7.1.5 NAT Mapping Types ............................................................................... |
105 |
7.2 |
SUA (Single User Account) Versus NAT .......................................................... |
106 |
7.3 |
SUA Server ...................................................................................................... |
106 |
|
7.3.1 Default Server IP Address ...................................................................... |
106 |
|
7.3.2 Port Forwarding: Services and Port Numbers ........................................ |
106 |
|
7.3.3 Configuring Servers Behind SUA (Example) .......................................... |
107 |
Table of Contents |
12 |
P-660H/HW/W-T Series User’ Guide
7.4 Selecting the NAT Mode ................................................................................. |
107 |
7.5 Configuring SUA Server Set ........................................................................... |
108 |
7.6 Configuring Address Mapping Rules ............................................................... |
110 |
7.7 Editing an Address Mapping Rule ................................................................... |
111 |
Chapter 8 |
|
Dynamic DNS Setup............................................................................................. |
114 |
8.1 Dynamic DNS Overview ................................................................................. |
114 |
8.1.1 DYNDNS Wildcard .................................................................................. |
114 |
8.2 Configuring Dynamic DNS .............................................................................. |
114 |
Chapter 9 |
|
Time and Date....................................................................................................... |
116 |
9.1 Configuring Time and Date ............................................................................. |
116 |
Chapter 10 |
|
Firewalls................................................................................................................ |
118 |
10.1 Firewall Overview .......................................................................................... |
118 |
10.2 Types of Firewalls .......................................................................................... |
118 |
10.2.1 Packet Filtering Firewalls ...................................................................... |
118 |
10.2.2 Application-level Firewalls .................................................................... |
119 |
10.2.3 Stateful Inspection Firewalls ................................................................ |
119 |
10.3 Introduction to ZyXEL’s Firewall ..................................................................... |
119 |
10.3.1 Denial of Service Attacks ...................................................................... |
120 |
10.4 Denial of Service ............................................................................................ |
120 |
10.4.1 Basics ................................................................................................... |
120 |
10.4.2 Types of DoS Attacks ........................................................................... |
121 |
10.4.2.1 ICMP Vulnerability ...................................................................... |
123 |
10.4.2.2 Illegal Commands (NetBIOS and SMTP) .................................... |
123 |
10.4.2.3 Traceroute ................................................................................... |
124 |
10.5 Stateful Inspection .......................................................................................... |
124 |
10.5.1 Stateful Inspection Process .................................................................. |
125 |
10.5.2 Stateful Inspection and the Prestige ..................................................... |
126 |
10.5.3 TCP Security ......................................................................................... |
126 |
10.5.4 UDP/ICMP Security .............................................................................. |
127 |
10.5.5 Upper Layer Protocols .......................................................................... |
127 |
10.6 Guidelines for Enhancing Security with Your Firewall .................................... |
127 |
10.6.1 Security In General ............................................................................... |
128 |
10.7 Packet Filtering Vs Firewall ............................................................................ |
129 |
10.7.1 Packet Filtering: .................................................................................... |
129 |
10.7.1.1 When To Use Filtering ................................................................. |
129 |
10.7.2 Firewall ................................................................................................. |
129 |
10.7.2.1 When To Use The Firewall .......................................................... |
129 |
13 |
Table of Contents |
|
P-660H/HW/W-T Series User’ Guide |
|
Chapter 11 |
|
|
Firewall Configuration ......................................................................................... |
132 |
|
11.1 |
Access Methods ............................................................................................. |
132 |
11.2 |
Firewall Policies Overview ............................................................................. |
132 |
11.3 |
Rule Logic Overview ..................................................................................... |
133 |
11.3.1 Rule Checklist ....................................................................................... |
133 |
|
11.3.2 Security Ramifications .......................................................................... |
133 |
|
11.3.3 Key Fields For Configuring Rules ......................................................... |
134 |
|
|
11.3.3.1 Action ........................................................................................... |
134 |
|
11.3.3.2 Service ......................................................................................... |
134 |
|
11.3.3.3 Source Address ........................................................................... |
134 |
|
11.3.3.4 Destination Address .................................................................... |
134 |
11.4 |
Connection Direction ...................................................................................... |
134 |
11.4.1 LAN to WAN Rules ................................................................................ |
134 |
|
11.4.2 Alerts ..................................................................................................... |
135 |
|
11.5 |
Configuring Default Firewall Policy .............................................................. |
135 |
11.6 |
Rule Summary .............................................................................................. |
136 |
11.6.1 Configuring Firewall Rules .................................................................. |
138 |
|
11.7 |
Customized Services ..................................................................................... |
141 |
11.8 |
Configuring A Customized Service ............................................................... |
141 |
11.9 |
Example Firewall Rule .................................................................................... |
142 |
11.10 Predefined Services ..................................................................................... |
146 |
|
11.11 Anti-Probing ................................................................................................. |
148 |
|
11.12 DoS Thresholds ........................................................................................... |
149 |
|
11.12.1 Threshold Values ................................................................................ |
150 |
|
11.12.2 Half-Open Sessions ............................................................................ |
150 |
|
|
11.12.2.1 TCP Maximum Incomplete and Blocking Time .......................... |
150 |
11.12.3 Configuring Firewall Thresholds ......................................................... |
151 |
|
Chapter 12 |
|
|
Content Filtering .................................................................................................. |
154 |
|
12.1 Content Filtering Overview ............................................................................ |
154 |
|
12.2 The Main Content Filter Screen ..................................................................... |
154 |
|
12.3 Configuring Keyword Blocking ..................................................................... |
155 |
|
12.4 Configuring the Schedule ............................................................................. |
156 |
|
12.5 Configuring Trusted Computers ................................................................... |
156 |
|
Chapter 13 |
|
|
Remote Management Configuration .................................................................. |
158 |
|
13.1 Remote Management Overview .................................................................... |
158 |
|
13.1.1 Remote Management Limitations ......................................................... |
158 |
|
13.1.2 Remote Management and NAT ............................................................ |
159 |
|
13.1.3 System Timeout ................................................................................... |
159 |
Table of Contents |
14 |
P-660H/HW/W-T Series User’ Guide
13.2 |
Telnet .............................................................................................................. |
159 |
13.3 |
FTP ................................................................................................................ |
160 |
13.4 Web ................................................................................................................ |
160 |
|
13.5 |
Configuring Remote Management ................................................................ |
160 |
Chapter 14 |
|
|
Universal Plug-and-Play (UPnP) ......................................................................... |
162 |
|
14.1 |
Introducing Universal Plug and Play ............................................................. |
162 |
14.1.1 How do I know if I'm using UPnP? ........................................................ |
162 |
|
14.1.2 NAT Traversal ....................................................................................... |
162 |
|
14.1.3 Cautions with UPnP .............................................................................. |
163 |
|
14.2 UPnP and ZyXEL ........................................................................................... |
163 |
|
14.2.1 Configuring UPnP ................................................................................ |
163 |
|
14.3 |
Installing UPnP in Windows Example ............................................................ |
164 |
14.4 |
Using UPnP in Windows XP Example ........................................................... |
168 |
Chapter 15 |
|
|
Logs Screens........................................................................................................ |
176 |
|
15.1 |
Logs Overview .............................................................................................. |
176 |
15.1.1 Alerts and Logs ..................................................................................... |
176 |
|
15.2 |
Configuring Log Settings ............................................................................... |
176 |
15.3 |
Displaying the Logs ....................................................................................... |
178 |
15.4 |
SMTP Error Messages ................................................................................... |
179 |
15.4.1 Example E-mail Log .............................................................................. |
180 |
|
Chapter 16 |
|
|
Media Bandwidth Management Advanced Setup.............................................. |
182 |
|
16.1 |
Media Bandwidth Management Overview ..................................................... |
182 |
16.2 |
Bandwidth Classes and Filters ....................................................................... |
182 |
16.3 |
Proportional Bandwidth Allocation ................................................................. |
183 |
16.4 |
Bandwidth Management Usage Examples .................................................... |
183 |
16.4.1 Application-based Bandwidth Management Example .......................... |
183 |
|
16.4.2 Subnet-based Bandwidth Management Example ................................. |
183 |
|
16.4.3 Application and Subnet-based Bandwidth Management Example ....... |
184 |
|
16.5 |
Scheduler ....................................................................................................... |
185 |
16.5.1 Priority-based Scheduler ...................................................................... |
185 |
|
16.5.2 Fairness-based Scheduler .................................................................... |
185 |
|
16.6 |
Maximize Bandwidth Usage ........................................................................... |
185 |
16.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................ |
185 |
|
16.6.2 Maximize Bandwidth Usage Example .................................................. |
186 |
|
16.7 |
Bandwidth Borrowing ..................................................................................... |
187 |
16.7.1 Maximize Bandwidth Usage With Bandwidth Borrowing ...................... |
187 |
|
16.8 |
The Main Media Bandwidth Management Screen ........................................ |
188 |
15 |
Table of Contents |
|
P-660H/HW/W-T Series User’ Guide |
|
16.9 |
Configuring Summary ................................................................................... |
188 |
16.10 Configuring Class Setup ............................................................................ |
190 |
|
16.10.1 Media Bandwidth Management Class Configuration ........................ |
190 |
|
16.10.2 Media Bandwidth Management Statistics ......................................... |
193 |
|
16.11 Bandwidth Monitor ..................................................................................... |
194 |
|
Chapter 17 |
|
|
Maintenance ......................................................................................................... |
196 |
|
17.1 |
Maintenance Overview ................................................................................... |
196 |
17.2 |
System Status Screen ................................................................................... |
196 |
17.2.1 System Statistics ................................................................................... |
198 |
|
17.3 |
DHCP Table Screen ...................................................................................... |
200 |
17.4 |
Any IP Table Screen ...................................................................................... |
201 |
17.5 |
Wireless Screen ............................................................................................ |
201 |
17.5.1 Association List .................................................................................... |
201 |
|
17.6 |
Diagnostic Screens ....................................................................................... |
202 |
17.6.1 General Diagnostic .............................................................................. |
202 |
|
17.6.2 DSL Line Diagnostic ........................................................................... |
203 |
|
17.7 |
Firmware Upgrade ........................................................................................ |
205 |
Chapter 18 |
|
|
Introducing the SMT ............................................................................................ |
208 |
|
18.1 |
SMT Introduction ............................................................................................ |
208 |
18.1.1 Procedure for SMT Configuration via Telnet ......................................... |
208 |
|
18.1.2 Entering Password ................................................................................ |
208 |
|
18.1.3 Prestige SMT Menus Overview ............................................................ |
209 |
|
18.2 |
Navigating the SMT Interface ......................................................................... |
210 |
18.2.1 System Management Terminal Interface Summary .............................. |
211 |
|
18.3 |
Changing the System Password .................................................................... |
212 |
Chapter 19 |
|
|
Menu 1 General Setup ......................................................................................... |
214 |
|
19.1 |
General Setup ................................................................................................ |
214 |
19.2 |
Procedure To Configure Menu 1 .................................................................... |
214 |
19.2.1 Procedure to Configure Dynamic DNS ................................................. |
215 |
|
Chapter 20 |
|
|
Menu 2 WAN Backup Setup ................................................................................ |
218 |
|
20.1 |
Introduction to WAN Backup Setup ................................................................ |
218 |
20.2 |
Configuring Dial Backup in Menu 2 ................................................................ |
218 |
20.2.1 Traffic Redirect Setup ........................................................................... |
219 |
Table of Contents |
16 |
P-660H/HW/W-T Series User’ Guide
Chapter 21 |
|
|
Menu 3 LAN Setup ............................................................................................... |
222 |
|
21.1 |
LAN Setup ...................................................................................................... |
222 |
21.1.1 General Ethernet Setup ........................................................................ |
222 |
|
21.2 |
Protocol Dependent Ethernet Setup .............................................................. |
223 |
21.3 |
TCP/IP Ethernet Setup and DHCP ................................................................ |
223 |
Chapter 22 |
|
|
Wireless LAN Setup ............................................................................................. |
226 |
|
22.1 |
Wireless LAN Overview ................................................................................. |
226 |
22.2 |
Wireless LAN Setup ....................................................................................... |
226 |
22.2.1 Wireless LAN MAC Address Filter ........................................................ |
227 |
|
Chapter 23 |
|
|
Internet Access .................................................................................................... |
230 |
|
23.1 |
Internet Access Overview .............................................................................. |
230 |
23.2 |
IP Policies ...................................................................................................... |
230 |
23.3 |
IP Alias ........................................................................................................... |
230 |
23.4 |
IP Alias Setup ................................................................................................. |
231 |
23.5 |
Route IP Setup ............................................................................................... |
232 |
23.6 |
Internet Access Configuration ........................................................................ |
233 |
Chapter 24 |
|
|
Remote Node Configuration ............................................................................... |
236 |
|
24.1 |
Remote Node Setup Overview ....................................................................... |
236 |
24.2 |
Remote Node Setup ....................................................................................... |
236 |
24.2.1 Remote Node Profile ............................................................................ |
236 |
|
24.2.2 Encapsulation and Multiplexing Scenarios ........................................... |
237 |
|
|
24.2.2.1 Scenario 1: One VC, Multiple Protocols ...................................... |
237 |
|
24.2.2.2 Scenario 2: One VC, One Protocol (IP) ...................................... |
237 |
|
24.2.2.3 Scenario 3: Multiple VCs ............................................................. |
237 |
24.2.3 Outgoing Authentication Protocol ......................................................... |
239 |
|
24.3 |
Remote Node Network Layer Options ........................................................... |
240 |
24.3.1 My WAN Addr Sample IP Addresses ................................................... |
241 |
|
24.4 |
Remote Node Filter ........................................................................................ |
242 |
24.5 |
Editing ATM Layer Options ............................................................................ |
243 |
24.5.1 VC-based Multiplexing (non-PPP Encapsulation) ................................ |
243 |
|
24.5.2 LLC-based Multiplexing or PPP Encapsulation .................................... |
243 |
|
24.5.3 Advance Setup Options ........................................................................ |
244 |
|
Chapter 25 |
|
|
Static Route Setup ............................................................................................... |
246 |
|
25.1 |
IP Static Route Overview ............................................................................... |
246 |
17 |
Table of Contents |
|
P-660H/HW/W-T Series User’ Guide |
|
25.2 |
Configuration .................................................................................................. |
246 |
Chapter 26 |
|
|
Bridging Setup ..................................................................................................... |
250 |
|
26.1 |
Bridging in General ........................................................................................ |
250 |
26.2 |
Bridge Ethernet Setup .................................................................................... |
250 |
26.2.1 Remote Node Bridging Setup ............................................................... |
250 |
|
26.2.2 Bridge Static Route Setup ..................................................................... |
252 |
|
Chapter 27 |
|
|
Network Address Translation (NAT)................................................................... |
254 |
|
27.1 |
Using NAT ...................................................................................................... |
254 |
27.1.1 SUA (Single User Account) Versus NAT .............................................. |
254 |
|
27.2 |
Applying NAT ................................................................................................. |
254 |
27.3 |
NAT Setup ...................................................................................................... |
256 |
27.3.1 Address Mapping Sets .......................................................................... |
256 |
|
|
27.3.1.1 SUA Address Mapping Set ......................................................... |
257 |
|
27.3.1.2 User-Defined Address Mapping Sets .......................................... |
258 |
|
27.3.1.3 Ordering Your Rules .................................................................... |
259 |
27.4 |
Configuring a Server behind NAT .................................................................. |
260 |
27.5 |
General NAT Examples .................................................................................. |
261 |
27.5.1 Example 1: Internet Access Only .......................................................... |
262 |
|
27.5.2 Example 2: Internet Access with an Inside Server ............................... |
262 |
|
27.5.3 Example 3: Multiple Public IP Addresses With Inside Servers ............. |
263 |
|
27.5.4 Example 4: NAT Unfriendly Application Programs ............................... |
267 |
|
Chapter 28 |
|
|
Enabling the Firewall ........................................................................................... |
270 |
|
28.1 |
Remote Management and the Firewall .......................................................... |
270 |
28.2 |
Access Methods ............................................................................................. |
270 |
28.3 |
Enabling the Firewall ...................................................................................... |
270 |
Chapter 29 |
|
|
Filter Configuration.............................................................................................. |
272 |
|
29.1 |
About Filtering ................................................................................................ |
272 |
29.1.1 The Filter Structure of the Prestige ....................................................... |
273 |
|
29.2 |
Configuring a Filter Set for the Prestige ......................................................... |
274 |
29.3 |
Filter Rules Summary Menus ......................................................................... |
275 |
29.4 |
Configuring a Filter Rule ................................................................................ |
276 |
29.4.1 TCP/IP Filter Rule ................................................................................. |
277 |
|
29.4.2 Generic Filter Rule ................................................................................ |
279 |
|
29.5 |
Filter Types and NAT ..................................................................................... |
281 |
29.6 |
Example Filter ................................................................................................ |
281 |
Table of Contents |
18 |
P-660H/HW/W-T Series User’ Guide
29.7 |
Applying Filters and Factory Defaults ............................................................ |
283 |
29.7.1 Ethernet Traffic ..................................................................................... |
284 |
|
29.7.2 Remote Node Filters ............................................................................. |
284 |
|
Chapter 30 |
|
|
SNMP Configuration ............................................................................................ |
286 |
|
30.1 About SNMP .................................................................................................. |
286 |
|
30.2 |
Supported MIBs ............................................................................................ |
287 |
30.3 |
SNMP Configuration ...................................................................................... |
287 |
30.4 SNMP Traps ................................................................................................... |
288 |
|
Chapter 31 |
|
|
System Security ................................................................................................... |
290 |
|
31.1 |
System Security ............................................................................................. |
290 |
31.1.1 System Password ................................................................................. |
290 |
|
31.1.2 Configuring External RADIUS Server ................................................... |
290 |
|
31.1.3 IEEE 802.1x .......................................................................................... |
292 |
|
31.2 |
Creating User Accounts on the Prestige ........................................................ |
294 |
Chapter 32 |
|
|
System Information and Diagnosis .................................................................... |
296 |
|
32.1 |
Overview ........................................................................................................ |
296 |
32.2 |
System Status ................................................................................................ |
296 |
32.3 |
System Information ........................................................................................ |
298 |
32.3.1 System Information ............................................................................... |
298 |
|
32.3.2 Console Port Speed .............................................................................. |
299 |
|
32.4 |
Log and Trace ................................................................................................ |
300 |
32.4.1 Viewing Error Log ................................................................................. |
300 |
|
32.4.2 Syslog and Accounting ......................................................................... |
301 |
|
32.5 |
Diagnostic ...................................................................................................... |
303 |
Chapter 33 |
|
|
Firmware and Configuration File Maintenance ................................................. |
306 |
|
33.1 |
Filename Conventions ................................................................................... |
306 |
33.2 |
Backup Configuration ..................................................................................... |
307 |
33.2.1 Backup Configuration ........................................................................... |
307 |
|
33.2.2 Using the FTP Command from the Command Line .............................. |
308 |
|
33.2.3 Example of FTP Commands from the Command Line ......................... |
308 |
|
33.2.4 GUI-based FTP Clients ......................................................................... |
309 |
|
33.2.5 TFTP and FTP over WAN Management Limitations ............................. |
309 |
|
33.2.6 Backup Configuration Using TFTP ....................................................... |
310 |
|
33.2.7 TFTP Command Example .................................................................... |
310 |
|
33.2.8 GUI-based TFTP Clients ...................................................................... |
310 |
19 |
Table of Contents |
|
P-660H/HW/W-T Series User’ Guide |
|
33.3 |
Restore Configuration .................................................................................... |
311 |
33.3.1 Restore Using FTP ............................................................................... |
311 |
|
33.3.2 Restore Using FTP Session Example .................................................. |
312 |
|
33.4 |
Uploading Firmware and Configuration Files ................................................. |
313 |
33.4.1 Firmware File Upload ............................................................................ |
313 |
|
33.4.2 Configuration File Upload ..................................................................... |
313 |
|
33.4.3 FTP File Upload Command from the DOS Prompt Example ................ |
314 |
|
33.4.4 FTP Session Example of Firmware File Upload ................................... |
315 |
|
33.4.5 TFTP File Upload .................................................................................. |
315 |
|
33.4.6 TFTP Upload Command Example ........................................................ |
316 |
|
Chapter 34 |
|
|
System Maintenance............................................................................................ |
318 |
|
34.1 |
Command Interpreter Mode ........................................................................... |
318 |
34.2 |
Call Control Support ....................................................................................... |
319 |
34.2.1 Budget Management ............................................................................ |
319 |
|
34.3 |
Time and Date Setting .................................................................................... |
320 |
34.3.1 Resetting the Time ................................................................................ |
322 |
|
Chapter 35 |
|
|
Remote Management ........................................................................................... |
324 |
|
35.1 |
Remote Management Overview ..................................................................... |
324 |
35.2 Remote Management ..................................................................................... |
324 |
|
35.2.1 Remote Management Setup ................................................................. |
324 |
|
35.2.2 Remote Management Limitations ......................................................... |
325 |
|
35.3 Remote Management and NAT ...................................................................... |
326 |
|
35.4 |
System Timeout ............................................................................................. |
326 |
Chapter 36 |
|
|
IP Policy Routing.................................................................................................. |
328 |
|
36.1 |
IP Policy Routing Overview ............................................................................ |
328 |
36.2 |
Benefits of IP Policy Routing .......................................................................... |
328 |
36.3 |
Routing Policy ................................................................................................ |
328 |
36.4 |
IP Routing Policy Setup ................................................................................. |
329 |
36.5 |
Applying an IP Policy ..................................................................................... |
332 |
36.5.1 Ethernet IP Policies .............................................................................. |
332 |
|
36.6 |
IP Policy Routing Example ............................................................................. |
333 |
Chapter 37 |
|
|
Call Scheduling .................................................................................................... |
338 |
|
37.1 |
Introduction .................................................................................................... |
338 |
Table of Contents |
20 |
P-660H/HW/W-T Series User’ Guide
Chapter 38 |
|
Troubleshooting ................................................................................................... |
342 |
38.1 Problems Starting Up the Prestige ................................................................. |
342 |
38.2 Problems with the LAN ................................................................................... |
342 |
38.3 Problems with the WAN ................................................................................. |
343 |
38.4 Problems Accessing the Prestige .................................................................. |
344 |
38.4.1 Pop-up Windows, JavaScripts and Java Permissions .......................... |
344 |
38.4.1.1 Internet Explorer Pop-up Blockers .............................................. |
344 |
38.4.1.2 JavaScripts .................................................................................. |
347 |
38.4.1.3 Java Permissions ........................................................................ |
349 |
38.4.2 ActiveX Controls in Internet Explorer .................................................... |
351 |
Appendix A |
|
Product Specifications ....................................................................................... |
354 |
Appendix B |
|
Wall-mounting Instructions................................................................................. |
358 |
Appendix C |
|
Setting up Your Computer’s IP Address............................................................ |
360 |
Windows 95/98/Me................................................................................................. |
360 |
Windows 2000/NT/XP ............................................................................................ |
363 |
Macintosh OS 8/9................................................................................................... |
368 |
Macintosh OS X ..................................................................................................... |
370 |
Linux....................................................................................................................... |
371 |
Appendix D |
|
IP Subnetting ........................................................................................................ |
376 |
IP Addressing......................................................................................................... |
376 |
IP Classes .............................................................................................................. |
376 |
Subnet Masks ........................................................................................................ |
377 |
Subnetting .............................................................................................................. |
377 |
Example: Two Subnets .......................................................................................... |
378 |
Example: Four Subnets.......................................................................................... |
380 |
Example Eight Subnets.......................................................................................... |
381 |
Subnetting With Class A and Class B Networks. ................................................... |
382 |
Appendix E |
|
Boot Commands .................................................................................................. |
384 |
Appendix F |
|
Command Interpreter........................................................................................... |
386 |
Command Syntax................................................................................................... |
386 |
21 |
Table of Contents |
|
P-660H/HW/W-T Series User’ Guide |
Command Usage ................................................................................................... |
386 |
Appendix G |
|
Firewall Commands ............................................................................................. |
388 |
Appendix H |
|
NetBIOS Filter Commands .................................................................................. |
394 |
Introduction ............................................................................................................ |
394 |
Display NetBIOS Filter Settings ............................................................................. |
394 |
NetBIOS Filter Configuration.................................................................................. |
395 |
Appendix I |
|
Splitters and Microfilters ..................................................................................... |
398 |
Connecting a POTS Splitter ................................................................................... |
398 |
Telephone Microfilters ............................................................................................ |
398 |
Prestige With ISDN ................................................................................................ |
399 |
Appendix J |
|
PPPoE ................................................................................................................... |
402 |
PPPoE in Action..................................................................................................... |
402 |
Benefits of PPPoE.................................................................................................. |
402 |
Traditional Dial-up Scenario ................................................................................... |
402 |
How PPPoE Works ................................................................................................ |
403 |
Prestige as a PPPoE Client ................................................................................... |
403 |
Appendix K |
|
Log Descriptions.................................................................................................. |
404 |
Log Commands...................................................................................................... |
418 |
Log Command Example......................................................................................... |
419 |
Appendix L |
|
Wireless LANs ...................................................................................................... |
420 |
Wireless LAN Topologies ....................................................................................... |
420 |
Channel.................................................................................................................. |
422 |
RTS/CTS................................................................................................................ |
422 |
Fragmentation Threshold ....................................................................................... |
423 |
Preamble Type ....................................................................................................... |
424 |
IEEE 802.1x ........................................................................................................... |
425 |
RADIUS.................................................................................................................. |
425 |
Types of Authentication.......................................................................................... |
426 |
WPA ....................................................................................................................... |
428 |
Security Parameters Summary .............................................................................. |
429 |
Table of Contents |
22 |
P-660H/HW/W-T Series User’ Guide
Appendix M |
|
Internal SPTGEN .................................................................................................. |
430 |
Internal SPTGEN Overview ................................................................................... |
430 |
The Configuration Text File Format........................................................................ |
430 |
Internal SPTGEN FTP Download Example............................................................ |
431 |
Internal SPTGEN FTP Upload Example ................................................................ |
432 |
Command Examples.............................................................................................. |
453 |
Index...................................................................................................................... |
456 |
23 |
Table of Contents |
P-660H/HW/W-T Series User’ Guide
Figure 1 Protected Internet Access Applications ................................................................ |
46 |
Figure 2 LAN-to-LAN Application Example ......................................................................... |
46 |
Figure 3 Password Screen .................................................................................................. |
49 |
Figure 4 Change Password at Login ................................................................................... |
49 |
Figure 5 Web Configurator: Site Map Screen ................................................................... |
50 |
Figure 6 Password .............................................................................................................. |
52 |
Figure 7 Internet Access Wizard Setup: ISP Parameters ................................................... |
54 |
Figure 8 Internet Connection with PPPoE ........................................................................... |
55 |
Figure 9 Internet Connection with RFC 1483 ..................................................................... |
56 |
Figure 10 Internet Connection with ENET ENCAP ............................................................. |
57 |
Figure 11 Internet Connection with PPPoA ......................................................................... |
58 |
Figure 12 Internet Access Wizard Setup: Third Screen ...................................................... |
59 |
Figure 13 Internet Access Wizard Setup: LAN Configuration ............................................ |
59 |
Figure 14 Internet Access Wizard Setup: Connection Tests ............................................... |
60 |
Figure 15 LAN and WAN IP Addresses .............................................................................. |
62 |
Figure 16 Any IP Example .................................................................................................. |
67 |
Figure 17 LAN Setup ........................................................................................................... |
68 |
Figure 18 Wireless LAN ...................................................................................................... |
72 |
Figure 19 Wireless Security Methods ................................................................................. |
73 |
Figure 20 Wireless Screen .................................................................................................. |
74 |
Figure 21 MAC Filter ........................................................................................................... |
76 |
Figure 22 WPA - PSK Authentication .................................................................................. |
78 |
Figure 23 WPA with RADIUS Application Example2 .......................................................... |
79 |
Figure 24 Wireless LAN: 802.1x/WPA: No Access Allowed ................................................ |
80 |
Figure 25 Wireless LAN: 802.1x/WPA: No Authentication .................................................. |
80 |
Figure 26 Wireless LAN: 802.1x/WPA: 802.1xl ................................................................... |
81 |
Figure 27 Wireless LAN: 802.1x/WPA: WPA ....................................................................... |
83 |
Figure 28 Wireless LAN: 802.1x/WPA:WPA-PSK ............................................................... |
84 |
Figure 29 Local User Database .......................................................................................... |
86 |
Figure 30 RADIUS .............................................................................................................. |
87 |
Figure 31 Example of Traffic Shaping ................................................................................. |
94 |
Figure 32 WAN ................................................................................................................... |
95 |
Figure 33 WAN Setup (PPPoE) .......................................................................................... |
96 |
Figure 34 Traffic Redirect Example ..................................................................................... |
99 |
Figure 35 Traffic Redirect LAN Setup ................................................................................. |
99 |
Figure 36 WAN Backup ....................................................................................................... |
100 |
Figure 37 How NAT Works .................................................................................................. |
104 |
Figure 38 NAT Application With IP Alias ............................................................................. |
104 |
List of Figures |
24 |
P-660H/HW/W-T Series User’ Guide
Figure 39 Multiple Servers Behind NAT Example ............................................................... |
107 |
Figure 40 NAT Mode ........................................................................................................... |
108 |
Figure 41 Edit SUA/NAT Server Set ................................................................................... |
109 |
Figure 42 Address Mapping Rules ...................................................................................... |
110 |
Figure 43 Edit Address Mapping Rule .............................................................................. |
112 |
Figure 44 Dynamic DNS ..................................................................................................... |
115 |
Figure 45 Time and Date ..................................................................................................... |
116 |
Figure 46 Prestige Firewall Application ............................................................................... |
120 |
Figure 47 Three-Way Handshake ....................................................................................... |
122 |
Figure 48 SYN Flood ........................................................................................................... |
122 |
Figure 49 Smurf Attack ....................................................................................................... |
123 |
Figure 50 Stateful Inspection ............................................................................................... |
125 |
Figure 51 Firewall: Default Policy ........................................................................................ |
135 |
Figure 52 Firewall: Rule Summary ..................................................................................... |
137 |
Figure 53 Firewall: Edit Rule ............................................................................................... |
139 |
Figure 54 Firewall: Customized Services ............................................................................ |
141 |
Figure 55 Firewall: Configure Customized Services ........................................................... |
142 |
Figure 56 Firewall Example: Rule Summary ....................................................................... |
143 |
Figure 57 Firewall Example: Edit Rule: Destination Address ............................................. |
144 |
Figure 58 Edit Custom Port Example .................................................................................. |
144 |
Figure 59 Firewall Example: Edit Rule: Select Customized Services ................................. |
145 |
Figure 60 Firewall Example: Rule Summary: My Service .................................................. |
146 |
Figure 61 Firewall: Anti Probing .......................................................................................... |
149 |
Figure 62 Firewall: Threshold .............................................................................................. |
151 |
Figure 63 Content Filtering ................................................................................................. |
154 |
Figure 64 Content Filter: Keyword ...................................................................................... |
155 |
Figure 65 Content Filter: Schedule ..................................................................................... |
156 |
Figure 66 Content Filter: Trusted ........................................................................................ |
157 |
Figure 67 Telnet Configuration on a TCP/IP Network ......................................................... |
159 |
Figure 68 Remote Management ......................................................................................... |
160 |
Figure 69 Configuring UPnP ............................................................................................... |
163 |
Figure 70 Add/Remove Programs: Windows Setup: Communication ................................. |
165 |
Figure 71 Add/Remove Programs: Windows Setup: Communication: Components .......... |
165 |
Figure 72 Network Connections .......................................................................................... |
166 |
Figure 73 Windows Optional Networking Components Wizard .......................................... |
167 |
Figure 74 Networking Services ........................................................................................... |
168 |
Figure 75 Network Connections .......................................................................................... |
169 |
Figure 76 Internet Connection Properties .......................................................................... |
170 |
Figure 77 Internet Connection Properties: Advanced Settings ........................................... |
171 |
Figure 78 Internet Connection Properties: Advanced Settings: Add ................................... |
171 |
Figure 79 System Tray Icon ................................................................................................ |
172 |
Figure 80 Internet Connection Status .................................................................................. |
172 |
Figure 81 Network Connections .......................................................................................... |
173 |
25 |
List of Figures |
P-660H/HW/W-T Series User’ Guide |
|
Figure 82 Network Connections: My Network Places ......................................................... |
174 |
Figure 83 Network Connections: My Network Places: Properties: Example ....................... |
174 |
Figure 84 Log Settings ........................................................................................................ |
177 |
Figure 85 View Logs ........................................................................................................... |
179 |
Figure 86 E-mail Log Example ............................................................................................ |
180 |
Figure 87 Application-based Bandwidth Management Example ......................................... |
183 |
Figure 88 Subnet-based Bandwidth Management Example ............................................... |
184 |
Figure 89 Application and Subnet-based Bandwidth Management Example ..................... |
184 |
Figure 90 Bandwidth Allotment Example ............................................................................ |
186 |
Figure 91 Maximize Bandwidth Usage Example ................................................................. |
187 |
Figure 92 Media Bandwidth Mgnt. ..................................................................................... 188 |
|
Figure 93 Media Bandwidth Management: Summary ......................................................... |
189 |
Figure 94 Media Bandwidth Management: Class Setup ..................................................... |
190 |
Figure 95 Media Bandwidth Management: Class Configuration ......................................... |
191 |
Figure 96 Media Bandwidth Management Statistics .......................................................... |
193 |
Figure 97 Media Bandwidth Management: Monitor ........................................................... |
194 |
Figure 98 System Status ..................................................................................................... |
197 |
Figure 99 System Status: Show Statistics ........................................................................... |
199 |
Figure 100 DHCP Table ...................................................................................................... |
200 |
Figure 101 Any IP Table ...................................................................................................... |
201 |
Figure 102 Association List ................................................................................................. |
202 |
Figure 103 Diagnostic: General .......................................................................................... |
203 |
Figure 104 Diagnostic: DSL Line ........................................................................................ |
204 |
Figure 105 Firmware Upgrade ............................................................................................ |
205 |
Figure 106 Network Temporarily Disconnected .................................................................. |
206 |
Figure 107 Error Message .................................................................................................. |
206 |
Figure 108 Login Screen ..................................................................................................... |
209 |
Figure 109 Menu 23.1 Change Password ........................................................................... |
212 |
Figure 110 Menu 1 General Setup ...................................................................................... |
215 |
Figure 111 Menu 1.1 Configure Dynamic DNS .................................................................. |
216 |
Figure 112 Menu 2 WAN Backup Setup .............................................................................. |
218 |
Figure 113 Menu 2.1Traffic Redirect Setup ......................................................................... |
219 |
Figure 114 Menu 3 LAN Setup ............................................................................................ |
222 |
Figure 115 Menu 3.1 LAN Port Filter Setup ........................................................................ |
222 |
Figure 116 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... |
223 |
Figure 117 Menu 3.5 - Wireless LAN Setup ....................................................................... |
226 |
Figure 118 Menu 3.5.1 WLAN MAC Address Filtering ........................................................ |
228 |
Figure 119 IP Alias Network Example ................................................................................. |
231 |
Figure 120 Menu 3.2 TCP/IP and DHCP Setup ................................................................. |
231 |
Figure 121 Menu 3.2.1 IP Alias Setup ................................................................................ |
232 |
Figure 122 Menu 1 General Setup ...................................................................................... |
233 |
Figure 123 Menu 4 Internet Access Setup .......................................................................... |
233 |
Figure 124 Menu 11 Remote Node Setup ........................................................................... |
237 |
List of Figures |
26 |
P-660H/HW/W-T Series User’ Guide
Figure 125 Menu 11.1 Remote Node Profile ...................................................................... |
238 |
Figure 126 Menu 11.3 Remote Node Network Layer Options ............................................ |
240 |
Figure 127 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection ........................... |
242 |
Figure 128 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) ............... |
242 |
Figure 129 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) ................. |
243 |
Figure 130 Menu 11.6 for VC-based Multiplexing ............................................................... |
243 |
Figure 131 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation .......................... |
244 |
Figure 132 Menu 11.1 Remote Node Profile ....................................................................... |
244 |
Figure 133 Menu 11.8 Advance Setup Options .................................................................. |
245 |
Figure 134 Sample Static Routing Topology ....................................................................... |
246 |
Figure 135 Menu 12 Static Route Setup ............................................................................. |
247 |
Figure 136 Menu 12.1 IP Static Route Setup ...................................................................... |
247 |
Figure 137 Menu12.1.1 Edit IP Static Route ....................................................................... |
247 |
Figure 138 Menu 11.1 Remote Node Profile ....................................................................... |
251 |
Figure 139 Menu 11.3 Remote Node Network Layer Options ............................................ |
251 |
Figure 140 Menu 12.3.1 Edit Bridge Static Route ............................................................... |
252 |
Figure 141 Menu 4 Applying NAT for Internet Access ........................................................ |
255 |
Figure 142 Applying NAT in Menus 4 & 11.3 ....................................................................... |
255 |
Figure 143 Menu 15 NAT Setup ........................................................................................ |
256 |
Figure 144 Menu 15.1 Address Mapping Sets .................................................................... |
257 |
Figure 145 Menu 15.1.255 SUA Address Mapping Rules .................................................. |
257 |
Figure 146 Menu 15.1.1 First Set ........................................................................................ |
258 |
Figure 147 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ........................ |
259 |
Figure 148 Menu 15.2 NAT Server Setup ........................................................................... |
260 |
Figure 149 Menu 15.2.1 NAT Server Setup ........................................................................ |
261 |
Figure 150 Multiple Servers Behind NAT Example ............................................................. |
261 |
Figure 151 NAT Example 1 ................................................................................................. |
262 |
Figure 152 Menu 4 Internet Access & NAT Example .......................................................... |
262 |
Figure 153 NAT Example 2 ................................................................................................. |
263 |
Figure 154 Menu 15.2.1 Specifying an Inside Server ......................................................... |
263 |
Figure 155 NAT Example 3 ................................................................................................. |
264 |
Figure 156 Example 3: Menu 11.3 ...................................................................................... |
265 |
Figure 157 Example 3: Menu 15.1.1.1 ................................................................................ |
265 |
Figure 158 Example 3: Final Menu 15.1.1 .......................................................................... |
266 |
Figure 159 Example 3: Menu 15.2.1 ................................................................................... |
266 |
Figure 160 NAT Example 4 ................................................................................................. |
267 |
Figure 161 Example 4: Menu 15.1.1.1 Address Mapping Rule ........................................... |
267 |
Figure 162 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ |
268 |
Figure 163 Menu 21.2 Firewall Setup ................................................................................. |
271 |
Figure 164 Outgoing Packet Filtering Process .................................................................... |
272 |
Figure 165 Filter Rule Process ............................................................................................ |
273 |
Figure 166 Menu 21 Filter Set Configuration ...................................................................... |
274 |
Figure 167 NetBIOS_WAN Filter Rules Summary ............................................................. |
274 |
27 |
List of Figures |
P-660H/HW/W-T Series User’ Guide |
|
Figure 168 NetBIOS_LAN Filter Rules Summary .............................................................. |
275 |
Figure 169 IGMP Filter Rules Summary ............................................................................ |
275 |
Figure 170 Menu 21.1.x.1 TCP/IP Filter Rule ..................................................................... |
277 |
Figure 171 Executing an IP Filter ........................................................................................ |
279 |
Figure 172 Menu 21.1.5.1 Generic Filter Rule ................................................................... |
280 |
Figure 173 Protocol and Device Filter Sets ......................................................................... |
281 |
Figure 174 Sample Telnet Filter .......................................................................................... |
282 |
Figure 175 Menu 21.1.6.1 Sample Filter ............................................................................ |
282 |
Figure 176 Menu 21.1.6.1 Sample Filter Rules Summary .................................................. |
283 |
Figure 177 Filtering Ethernet Traffic .................................................................................... |
284 |
Figure 178 Filtering Remote Node Traffic ........................................................................... |
284 |
Figure 179 SNMP Management Model ............................................................................... |
286 |
Figure 180 Menu 22 SNMP Configuration .......................................................................... |
288 |
Figure 181 Menu 23 – System Security .............................................................................. |
290 |
Figure 182 Menu 23.2 System Security: RADIUS Server ................................................... |
291 |
Figure 183 Menu 23 System Security ................................................................................. |
292 |
Figure 184 Menu 23.4 System Security: IEEE 802.1x ........................................................ |
292 |
Figure 185 Menu 14 Dial-in User Setup .............................................................................. |
295 |
Figure 186 Menu 14.1 Edit Dial-in User .............................................................................. |
295 |
Figure 187 Menu 24 System Maintenance ......................................................................... |
296 |
Figure 188 Menu 24.1 System Maintenance : Status ......................................................... |
297 |
Figure 189 Menu 24.2 System Information and Console Port Speed ................................. |
298 |
Figure 190 Menu 24.2.1 System Maintenance: Information ............................................... |
299 |
Figure 191 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... |
300 |
Figure 192 Menu 24.3 System Maintenance: Log and Trace ............................................. |
300 |
Figure 193 Sample Error and Information Messages ......................................................... |
301 |
Figure 194 Menu 24.3.2 System Maintenance: Syslog and Accounting ............................. |
301 |
Figure 195 Syslog Example ................................................................................................ |
302 |
Figure 196 Menu 24.4 System Maintenance : Diagnostic ................................................... |
303 |
Figure 197 Telnet in Menu 24.5 ........................................................................................... |
308 |
Figure 198 FTP Session Example ...................................................................................... |
309 |
Figure 199 Telnet into Menu 24.6 ........................................................................................ |
312 |
Figure 200 Restore Using FTP Session Example ............................................................... |
312 |
Figure 201 Telnet Into Menu 24.7.1 Upload System Firmware .......................................... |
313 |
Figure 202 Telnet Into Menu 24.7.2 System Maintenance ................................................. |
314 |
Figure 203 FTP Session Example of Firmware File Upload ............................................... |
315 |
Figure 204 Command Mode in Menu 24 ............................................................................. |
318 |
Figure 205 Valid Commands ............................................................................................... |
318 |
Figure 206 Menu 24.9 System Maintenance: Call Control .................................................. |
319 |
Figure 207 Menu 24.9.1 System Maintenance: Budget Management ................................ |
320 |
Figure 208 Menu 24 System Maintenance ......................................................................... |
321 |
Figure 209 Menu 24.10 System Maintenance: Time and Date Setting ............................... |
321 |
Figure 210 Menu 24.11 Remote Management Control ....................................................... |
325 |
List of Figures |
28 |
P-660H/HW/W-T Series User’ Guide
Figure 211 Menu 25 IP Routing Policy Setup ..................................................................... |
329 |
Figure 212 Menu 25.1 IP Routing Policy Setup .................................................................. |
330 |
Figure 213 Menu 25.1.1 IP Routing Policy .......................................................................... |
331 |
Figure 214 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... |
333 |
Figure 215 Menu 11.3 Remote Node Network Layer Options ............................................ |
333 |
Figure 216 Example of IP Policy Routing ........................................................................... |
334 |
Figure 217 IP Routing Policy Example ................................................................................ |
335 |
Figure 218 IP Routing Policy Example ................................................................................ |
336 |
Figure 219 Applying IP Policies Example ........................................................................... |
336 |
Figure 220 Menu 26 Schedule Setup .................................................................................. |
338 |
Figure 221 Menu 26.1 Schedule Set Setup ....................................................................... |
339 |
Figure 222 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... |
340 |
Figure 223 Pop-up Blocker ................................................................................................. |
345 |
Figure 224 Internet Options ............................................................................................... |
345 |
Figure 225 Internet Options ................................................................................................ |
346 |
Figure 226 Pop-up Blocker Settings ................................................................................... |
347 |
Figure 227 Internet Options ................................................................................................ |
348 |
Figure 228 Security Settings - Java Scripting ..................................................................... |
349 |
Figure 229 Security Settings - Java .................................................................................... |
350 |
Figure 230 Java (Sun) ......................................................................................................... |
351 |
Figure 231 Internet Options Security .................................................................................. |
352 |
Figure 232 Security Setting ActiveX Controls ..................................................................... |
353 |
Figure 233 WIndows 95/98/Me: Network: Configuration ..................................................... |
361 |
Figure 234 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... |
362 |
Figure 235 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ |
363 |
Figure 236 Windows XP: Start Menu .................................................................................. |
364 |
Figure 237 Windows XP: Control Panel .............................................................................. |
364 |
Figure 238 Windows XP: Control Panel: Network Connections: Properties ....................... |
365 |
Figure 239 Windows XP: Local Area Connection Properties .............................................. |
365 |
Figure 240 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... |
366 |
Figure 241 Windows XP: Advanced TCP/IP Properties ...................................................... |
367 |
Figure 242 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... |
368 |
Figure 243 Macintosh OS 8/9: Apple Menu ........................................................................ |
369 |
Figure 244 Macintosh OS 8/9: TCP/IP ................................................................................ |
369 |
Figure 245 Macintosh OS X: Apple Menu ........................................................................... |
370 |
Figure 246 Macintosh OS X: Network ................................................................................. |
371 |
Figure 247 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ |
372 |
Figure 248 Red Hat 9.0: KDE: Ethernet Device: General ................................................. |
372 |
Figure 249 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. |
373 |
Figure 250 Red Hat 9.0: KDE: Network Configuration: Activate ................................. |
373 |
Figure 251 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. |
374 |
Figure 252 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. |
374 |
Figure 253 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... |
374 |
29 |
List of Figures |
P-660H/HW/W-T Series User’ Guide |
|
Figure 254 Red Hat 9.0: Restart Ethernet Card ................................................................ |
375 |
Figure 255 Red Hat 9.0: Checking TCP/IP Properties ...................................................... |
375 |
Figure 256 Option to Enter Debug Mode ............................................................................ |
384 |
Figure 257 Boot Module Commands .................................................................................. |
385 |
Figure 258 Connecting a POTS Splitter .............................................................................. |
398 |
Figure 259 Connecting a Microfilter .................................................................................... |
399 |
Figure 260 Prestige with ISDN ............................................................................................ |
399 |
Figure 261 Single-Computer per Router Hardware Configuration ...................................... |
403 |
Figure 262 Prestige as a PPPoE Client .............................................................................. |
403 |
Figure 263 Displaying Log Categories Example ................................................................. |
418 |
Figure 264 Displaying Log Parameters Example ................................................................ |
418 |
Figure 265 Peer-to-Peer Communication in an Ad-hoc Network ........................................ |
420 |
Figure 266 Basic Service Set .............................................................................................. |
421 |
Figure 267 Infrastructure WLAN ......................................................................................... |
422 |
Figure 268 RTS/CTS .......................................................................................................... |
423 |
Figure 269 Configuration Text File Format: Column Descriptions ....................................... |
430 |
Figure 270 Invalid Parameter Entered: Command Line Example ....................................... |
431 |
Figure 271 Valid Parameter Entered: Command Line Example ......................................... |
431 |
Figure 272 Internal SPTGEN FTP Download Example ..................................................... |
432 |
Figure 273 Internal SPTGEN FTP Upload Example ........................................................... |
432 |
List of Figures |
30 |