The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Copyright1
Page 4
ZyWALL 35 User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy, and if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
Certifications
Go to www.zyxel.com
1 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
2 Select the certification you wish to view from this page
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not
apply if the product is modified, misused, tampered with, damaged by an act of God, or
subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind of character to the
purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
Safety Warnings
1 To reduce the risk of fire, use only No. 26 AWG or larger telephone wire.
2 Do not use this product near water, for example, in a wet basement or near a swimming
pool.
3 Avoid using this product during an electrical storm. There may be a remote risk of
electric shock from lightening.
ZyXEL Limited Warranty3
Page 6
ZyWALL 35 User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Customer Support
METHOD
LOCATION
WORLDWIDE
NORTH
AMERICA
GERMANY
FRANCE
SPAIN
DENMARK
NORWAY
SWEDEN
FINLAND
a. “+” is the (prefix) number you enter to make an international telephone call.
SUPPORT E-MAILTELEPHONE
SALES E-MAILFAXFTP SITE
support@zyxel.com.tw +886-3-578-3942www.zyxel.com
sales@zyxel.com.tw+886-3-578-2439ftp.zyxel.com
support@zyxel.com+1-800-255-4101
+1-714-632-0882
sales@zyxel.com+1-714-632-0858ftp.us.zyxel.com
support@zyxel.de+49-2405-6909-0www.zyxel.deZyXEL Deutschland GmbH.
sales@zyxel.de+49-2405-6909-99
info@zyxel.fr+33 (0)4 72 52 97 97www.zyxel.frZ yX E L F r an c e
+33 (0)4 72 52 19 20
support@zyxel.es+34 902 195 420www.zyxel.es Z y X E L C o m m u n i c at i o n s
sales@zyxel.es+34 913 005 345
support@zyxel.dk +45 39 55 07 00www.zyxel.dk Z y X E L C o m m u n i c a t i o n s A / S
sales@zyxel.dk +45 39 55 07 07
support@zyxel.no +47 22 80 61 80www.zyxel.no Z y X E L C o m m u n i c a t i o n s A / S
Congratulations on your purchase of the ZyWALL 35.
Note: Register your product online to receive e-mail notices of firmware
upgrades and information at www.zyxel.com
www.us.zyxel.com
Your ZyWALL is easy to install and configure.
for North American products.
About This User's Guide
This manual is designed to guide you through the configuration of your ZyWALL for its
various applications. The web configurator parts of this guide contain background information
on features configurable by web configurator. The SMT parts of this guide contain
background information solely on features not configurable by web configurator.
for global products, or at
Note: Use the web configurator, System Management Terminal (SMT) or
command interpreter interface to configure your ZyWALL. Not all features
can be configured through all interfaces.
Related Documentation
• Supporting Disk
Refer to the included CD for support documents.
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
a detailed easy-to-follow connection diagram, default settings, handy checklists and
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• ZyXEL Glossary and Web Site
Please refer to www.zyxel.com for an online glossary of networking terms and additional
support documentation.
User Guide Feedback
Help us help you! E-mail all User Guide-related comments, questions or suggestions for
improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing
Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park,
Hsinchu, 300, Taiwan. Thank you!
Preface45
Page 48
ZyWALL 35 User’s Guide
Syntax Conventions
• “Enter” means for you to type one or more characters. “Select” or “Choose” means for
you to use one predefined choices.
• The SMT menu titles and labels are in Bold Times New Roman font. Predefined field
choices are in Bold Arial font. Command and arrow keys are enclosed in square
brackets. [ENTER] means the Enter, or carriage return key; [ESC] means the Escape key
and [SPACE BAR] means the Space Bar.
• Mouse action sequences are denoted using a comma. For example, “click the Apple icon,
Control Panels and then Modem” means first click the Apple icon, then point your
mouse pointer to Control Panels and then click Modem.
• For brevity’s sake, we will use “e.g.,” as a shorthand for “for instance”, and “i.e.,” for
“that is” or “in other words” throughout this manual.
Graphics Icons Key
ZyWALLComputerNotebook computer
ServerDSLAMFirewall
TelephoneSwitchRouter
Wireless Signal
Note: The following section offers some background information on DSL.
Skip to Chapter 1 if you wish to begin working with your router right away.
46Preface
Page 49
CHAPTER1
Getting to Know Your ZyWALL
This chapter introduces the main features and applications of the ZyWALL.
1.1 ZyWALL 35 Internet Security Appliance Overview
The ZyWALL 35 is the ideal secure gateway for all data passing between the Internet and the
LAN.
By integrating NAT, firewall, content filtering, certificates and VPN capability, ZyXEL’s
ZyWALL is a complete security solution that protects your Intranet and efficiently manages
data traffic on your network. Dual WAN ports, dial backup and traffic redirect enhance
reliability. You can deploy the ZyWALL as a transparent firewall in an existing network with
minimal configuration.
ZyWALL 35 User’s Guide
The ZyWALL allows you to manage the bandwidth usage of your network's traffic. It also has
two WAN interfaces and can balance the traffic load between them. You can control which IP
addresses and applications get how much bandwidth. You can set priority for different types of
traffic and/or IP addresses. You can also allot bandwidth to specific traffic types to guarantee
delivery.
The PCMCIA/CardBus slot allows you to add a 802.11b/g-compliant wireless LAN. The
ZyWALL offers highly secured wireless connectivity to your wired network with IEEE
802.1x, WEP data encryption, WPA (Wi-Fi Protected Access) and MAC address filtering. The
ZyWALL increases network security by adding the option to change port roles from LAN to
DMZ (De-Militarized Zone) for use with publicly accessible servers.
The embedded web configurator is easy to operate.
1.2 ZyWALL Features
The following sections describe ZyWALL features.
Table 1 Feature Specifications
FEATURESPECIFICATION
Number of Static Routes50
Number of Policy Routes48
Number of NAT Sessions10,000
Number of Port Forwarding Rules50
Chapter 1 Getting to Know Your ZyWALL47
Page 50
ZyWALL 35 User’s Guide
Table 1 Feature Specifications
FEATURESPECIFICATION
Number of Address Mapping Rules50
Number of IPSec VPN Tunnels/Security Associations35
1.2.1 Physical Features
1.2.1.1 Auto-negotiating 10/100 Mbps Ethernet LAN
The LAN interface automatically detects if it’s on a 10 or a 100 Mbps Ethernet.
1.2.1.2 Auto-crossover 10/100 Mbps Ethernet LAN
The LAN interface automatically adjusts to either a crossover or straight-through Ethernet
cable.
1.2.1.3 Auto-negotiating 10/100 Mbps Ethernet DMZ
Public servers (Web, FTP, etc.) attached to a DeMilitarized Zone (DMZ) port are visible to the
outside world (while still being protected from DoS (Denial of Service) attacks such as SYN
flooding and Ping of Death) and can also be accessed from the secure LAN.
1.2.1.4 Auto-crossover 10/100 Mbps Ethernet DMZ
The DMZ interface automatically adjusts to either a crossover or straight-through Ethernet
cable.
1.2.1.5 LAN/DMZ Interface
The ZyWALL provides four LAN ports that can also function as virtual DMZ ports. You can
configure the ports as LAN or DMZ ports by changing the port role settings in the LAN or
DMZ screen through the Web configurator.
1.2.1.6 Dual Auto-negotiating 10/100 Mbps Ethernet WAN
The 10/100 Mbps Ethernet WAN ports attach to the Internet via broadband modem or router.
You can use a second connection for load sharing to increase overall network throughput or as
a backup to enhance network reliability.
1.2.1.7 Dual Auto-crossover 10/100 Mbps Ethernet WAN
The WAN interface automatically adjusts to either a crossover or straight-through Ethernet
cable.
48Chapter 1 Getting to Know Your ZyWALL
Page 51
1.2.1.8 Dial Backup WAN
The dial backup port can be used in reserve as a traditional dial-up connection when/if ever the
WAN 1, 2 and traffic redirect connections fail.
1.2.1.9 Time and Date
The ZyWALL allows you to get the current time and date from an external server when you
turn on your ZyWALL. You can also set the time manually. The Real Time Chip (RTC) keeps
track of the time and date.
1.2.1.10 Reset Button
Use the reset button to restore the factory default password to 1234; IP address to 192.168.1.1,
subnet mask to 255.255.255.0 and DHCP server enabled with a pool of 32 IP addresses
starting at 192.168.1.33.
1.2.1.11 Dual PCMCIA and CardBus Slot
ZyWALL 35 User’s Guide
The dual PCMCIA and Card Bus slot provides the option of a wireless LAN.
1.2.1.12 IEEE 802.11 b/g Wireless LAN
The optional wireless LAN card provides mobility and a fast network environment for small
and home offices. Users can connect to the local area network without any wiring efforts and
enjoy reliable high-speed connectivity.
1.2.2 Non-Physical Features
1.2.2.1 Load Balancing
The ZyWALL improves quality of service and maximizes bandwidth utilization by dividing
traffic loads between the two WAN interfaces (or ports).
1.2.2.2 SIP Passthrough
The ZyWALL includes a SIP Application Layer Gateway (ALG). It allows VoIP calls to pass
through NAT by examining and translating IP addresses embedded in the data stream.
1.2.2.3 Transparent Firewall
Transparent firewall is also known as a bridge firewall. The ZyWALL can act as a bridge and
still have the capability of filtering and inspecting the packets between a router and the LAN,
or two routers. You do not need to do any other changes to your existing network. By
deploying a ZyWALL in each segment, you can prevent the virus from spreading to the whole
company network.
Chapter 1 Getting to Know Your ZyWALL49
Page 52
ZyWALL 35 User’s Guide
1.2.2.4 STP (Spanning Tree Protocol) / RSTP (Rapid STP)
When the ZyWALL is set to bridge mode, (R)STP detects and breaks network loops and
provides backup links between switches, bridges or routers. It allows a bridge to interact with
other (R)STP -compliant bridges in your network to ensure that only one path exists between
any two stations on the network.
1.2.2.5 Bandwidth Management
Bandwidth management allows you to allocate network resources according to defined
policies. This policy-based bandwidth allocation helps your network to better handle real-time
applications such as Voice-over-IP (VoIP).
1.2.2.6 IPSec VPN Capability
Establish a Virtual Private Network (VPN) to connect with business partners and branch
offices using data encryption and the Internet to provide secure communications without the
expense of leased site-to-site lines. The ZyWALL VPN is based on the IPSec standard and is
fully interoperable with other IPSec-based VPN products.
1.2.2.7 X-Auth (Extended Authentication)
X-Auth provides added security for VPN by requiring each VPN client to use a username and
password.
1.2.2.8 Certificates
The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates
are based on public-private key pairs. Certificates provide a way to exchange public keys for
use in authentication.
1.2.2.9 SSH
The ZyWALL uses the SSH (Secure Shell) secure communication protocol to provide secure
encrypted communication between two hosts over an unsecured network.
1.2.2.10 HTTPS
HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL is a web protocol
that encrypts and decrypts web sessions. Use HTTPS for secure web configurator access to the
ZyWALL
1.2.2.11 Firewall
The ZyWALL is a stateful inspection firewall with DoS (Denial of Service) protection. By
default, when the firewall is activated, all incoming traffic from the WAN to the LAN is
blocked unless it is initiated from the LAN. The ZyWALL firewall supports TCP/UDP
inspection, DoS detection and prevention, real time alerts, reports and logs.
50Chapter 1 Getting to Know Your ZyWALL
Page 53
1.2.2.12 Content Filtering
The ZyWALL can block web features such as ActiveX controls, Java applets and cookies, as
well as disable web proxies. The ZyWALL can block or allow access to web sites that you
specify. The ZyWALL can also block access to web sites containing keywords that you
specify. You can define time periods and days during which content filtering is enabled and
include or exclude a range of users on the LAN from content filtering.
You can also subscribe to category-based content filtering that allows your ZyWALL to check
web sites against an external database of dynamically updated ratings of millions of web sites.
1.2.2.13 Universal Plug and Play (UPnP)
Using the standard TCP/IP protocol, the ZyWALL and other UPnP-enabled devices can
dynamically join a network, obtain an IP address and convey its capabilities to other devices
on the network.
1.2.2.14 RADIUS (RFC2138, 2139)
RADIUS (Remote Authentication Dial In User Service) server enables authentication,
authorization and accounting for your wireless network.
ZyWALL 35 User’s Guide
1.2.2.15 IEEE 802.1x for Network Security
The ZyWALL supports the IEEE 802.1x standard that works with the IEEE 802.11 to enhance
user authentication. With the local user profile, the ZyWALL allows you to configure up 32
user profiles without a network authentication server. In addition, centralized user and
accounting management is possible on an optional network authentication server.
1.2.2.16 Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft.
Key differences between WPA and WEP are user authentication and improved data
encryption.
1.2.2.17 Wireless LAN MAC Address Filtering
Your ZyWALL can check the MAC addresses of wireless stations against a list of allowed or
denied MAC addresses.
1.2.2.18 WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless
network to help keep network communications private.
1.2.2.19 Packet Filtering
The packet filtering mechanism blocks unwanted traffic from entering/leaving your network.
Chapter 1 Getting to Know Your ZyWALL51
Page 54
ZyWALL 35 User’s Guide
1.2.2.20 Call Scheduling
Configure call time periods to restrict and allow access for users on remote nodes.
1.2.2.21 PPPoE
PPPoE facilitates the interaction of a host with an Internet modem to achieve access to highspeed data networks via a familiar "dial-up networking" user interface.
1.2.2.22 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of
data from a remote client to a private server, creating a Virtual Private Network (VPN) using a
TCP/IP-based network.
PPTP supports on-demand, multi-protocol and virtual private networking over public
networks, such as the Internet. The ZyWALL supports one PPTP server connection at any
given time.
1.2.2.23 Dynamic DNS Support
With Dynamic DNS (Domain Name System) support, you can have a static hostname alias for
a dynamic IP address, allowing the host to be more easily accessible from various locations on
the Internet. You must register for this service with a Dynamic DNS service provider.
1.2.2.24 IP Multicast
Deliver IP packets to a specific group of hosts using IP multicast. IGMP (Internet Group
Management Protocol) is the protocol used to support multicast groups. The latest version is
version 2 (see RFC 2236); the ZyWALL supports both versions 1 and 2.
1.2.2.25 IP Alias
IP Alias allows you to partition a physical network into logical networks over the same
Ethernet interface. The ZyWALL supports three logical LAN and/or DMZ interfaces via its
single physical Ethernet LAN and/or DMZ interface with the ZyWALL itself as the gateway
for each network.
1.2.2.26 IP Policy Routing
IP Policy Routing provides a mechanism to override the default routing behavior and alter
packet forwarding based on the policies defined by the network administrator.
52Chapter 1 Getting to Know Your ZyWALL
Page 55
1.2.2.27 Central Network Management
Central Network Management (CNM) allows an enterprise or service provider network
administrator to manage your ZyWALL. The enterprise or service provider network
administrator can configure your ZyWALL, perform firmware upgrades and do
troubleshooting for you.
1.2.2.28 SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging
management information between network devices. SNMP is a member of the TCP/IP
protocol suite. Your ZyWALL supports SNMP agent functionality, which allows a manager
station to manage and monitor the ZyWALL through the network. The ZyWALL supports
SNMP version one (SNMPv1).
1.2.2.29 Network Address Translation (NAT)
Network Address Translation (NAT) allows the translation of an Internet protocol address
used within one network (for example a private IP address used in a local network) to a
different IP address known within another network (for example a public IP address used on
the Internet).
ZyWALL 35 User’s Guide
1.2.2.30 Traffic Redirect
Traffic Redirect forwards WAN traffic to a backup gateway on the LAN when the ZyWALL
cannot connect to the Internet, thus acting as an auxiliary backup when your regular WAN
connection fails.
1.2.2.31 Port Forwarding
Use this feature to forward incoming service requests to a server on your local network. You
may enter a single port number or a range of port numbers to be forwarded, and the local IP
address of the desired server.
DHCP (Dynamic Host Configuration Protocol) allows the individual client computers to
obtain the TCP/IP configuration at start-up from a centralized DHCP server. The ZyWALL
has built-in DHCP server capability, enabled by default, which means it can assign IP
addresses, an IP default gateway and DNS servers to all systems that support the DHCP client.
The ZyWALL can also act as a surrogate DHCP server (DHCP Relay) where it relays IP
address assignment from the actual real DHCP server to the clients.
Chapter 1 Getting to Know Your ZyWALL53
Page 56
ZyWALL 35 User’s Guide
1.2.2.33 Full Network Management
The embedded web configurator is an all-platform web-based utility that allows you to easily
access the ZyWALL’s management interface. Most functions of the ZyWALL are also
software configurable via the SMT (System Management Terminal) interface. The SMT is a
menu-driven interface that you can access from a terminal emulator through the console port
or over a telnet connection.
1.2.2.34 RoadRunner Support
In addition to standard cable modem services, the ZyWALL supports Time Warner’s
RoadRunner Service.
1.2.2.35 Logging and Tracing
Built-in message logging and packet tracing.
Unix syslog facility support.
Firewall logs.
Content filtering logs.
1.2.2.36 Upgrade ZyWALL Firmware via LAN
The firmware of the ZyWALL can be upgraded via the LAN.
1.2.2.37 Embedded FTP and TFTP Servers
The ZyWALL’s embedded FTP and TFTP Servers enable fast firmware upgrades as well as
configuration file backups and restoration.
1.3 Applications for the ZyWALL
Here are some examples of what you can do with your ZyWALL.
1.3.1 Secure Broadband Internet Access via Cable or DSL Modem
You can connect a cable modem, DSL or wireless modem to the ZyWALL for broadband
Internet access via Ethernet or wireless port on the modem. The ZyWALL guarantees not only
high speed Internet access, but secure internal network protection and traffic management as
well.
54Chapter 1 Getting to Know Your ZyWALL
Page 57
Figure 1 Secure Internet Access via Cable, DSL or Wireless Modem
1.3.2 VPN Application
ZyWALL VPN is an ideal cost-effective way to connect branch offices and business partners
over the Internet without the need (and expense) for leased lines between sites.
ZyWALL 35 User’s Guide
Chapter 1 Getting to Know Your ZyWALL55
Page 58
ZyWALL 35 User’s Guide
Figure 2 VPN Application
56Chapter 1 Getting to Know Your ZyWALL
Page 59
Introducing the Web
This chapter describes how to access the ZyWALL web configurator and provides an
overview of its screens.
2.1 Web Configurator Overview
The embedded web configurator allows you to manage the ZyWALL from anywhere through
a browser such as Microsoft Internet Explorer or Netscape Navigator. Use Internet Explorer
6.0 and later or Netscape Navigator 7.0 and later versions with JavaScript enabled. It is
recommended that you set your screen resolution to 1024 by 768 pixels. The screens you see
in the web configurator may vary somewhat from the ones shown in this document due to
differences between individual firmware versions.
ZyWALL 35 User’s Guide
CHAPTER2
Configurator
2.2 Accessing the ZyWALL Web Configurator
1 Make sure your ZyWALL hardware is properly connected and prepare your computer/
computer network to connect to the ZyWALL (refer to the Quick Start Guide).
2 Launch your web browser.
3 Type "192.168.1.1" as the URL.
4 Type "1234" (default) as the password and click Login. In some versions, the default
password appears automatically - if this is the case, click Login.
5 You should see a screen asking you to change your password (highly recommended) as
shown next. Type a new password (and retype it to confirm) and click Apply or click
Ignore.
Note: If you do not change the password, the following screen
appears every time you log in.
Chapter 2 Introducing the Web Configurator57
Page 60
ZyWALL 35 User’s Guide
Figure 3 Change Password Screen
6 Click Apply in the Replace Certificate screen to create a certificate using your
ZyWALL’s MAC address that will be specific to this device.
Figure 4 Replace Certificate Screen
Note: If you do not replace the default certificate here or in the
CERTIFICATES screen, this screen displays every time you
access the web configurator.
7 You should now see the HOME screen (see Figure 6).
Note: The management session automatically times out when
the time period set in the Administrator Inactivity Timer field
expires (default five minutes). Simply log back into the ZyWALL
if this happens to you.
58Chapter 2 Introducing the Web Configurator
Page 61
2.3 Resetting the ZyWALL
If you forget your password or cannot access the web configurator, you will need to reload the
factory-default configuration file or use the RESET button on the back of the ZyWALL.
Uploading this configuration file replaces the current configuration file with the factorydefault configuration file. This means that you will lose all configurations that you had
previously and the speed of the console port will be reset to the default of 9600bps with 8 data
bit, no parity, one stop bit and flow control set to none. The password will be reset to 1234,
also.
2.3.1 Procedure To Use The Reset Button
Make sure the SYS LED is on (not blinking) before you begin this procedure.
1 Press the RESET button for ten seconds, and then release it. If the SYS LED begins to
blink, the defaults have been restored and the ZyWALL restarts. Otherwise, go to step 2.
2 Turn the ZyWALL off.
3 While pressing the RESET button, turn the ZyWALL on.
ZyWALL 35 User’s Guide
4 Continue to hold the RESET button. The SYS LED will begin to blink andflicker very
quickly after about 20 seconds. This indicates that the defaults have been restored and the
ZyWALL is now restarting.
5 Release the RESETbutton and wait for the ZyWALL to finish restarting.
2.3.2 Uploading a Configuration File Via Console Port
1 Download the default configuration file from the ZyXEL FTP site, unzip it and save it in
a folder.
2 Turn off the ZyWALL, begin a terminal emulation software session and turn on the
ZyWALL again. When you see the message "Press Any key to enter Debug Mode within
3 seconds", press any key to enter debug mode.
3 Enter "y" at the prompt below to go into debug mode.
4 Enter "atlc" after "Enter Debug Mode" message.
5 Wait for "Starting XMODEM upload" message before activating Xmodem upload on
your terminal. This is an example Xmodem configuration upload using HyperTerminal.
Chapter 2 Introducing the Web Configurator59
Page 62
ZyWALL 35 User’s Guide
Figure 5 Example Xmodem Upload
Type the configuration file’s location, or click Browse to search for it.
Choose the Xmodem protocol.
Then click Send.
6 After successful firmware upload, enter "atgo" to restart the router.
2.4 Navigating the ZyWALL Web Configurator
The following summarizes how to navigate the web configurator from the HOME screen.
The screen varies according to the device mode you select in the MAINTENANCE Device Mode screen.
2.4.1 Router Mode
The following screen displays when the ZyWALL is set to router mode. The ZyWALL is set
to router mode by default.
Note: Follow the instructions you see in the HOME screen or
click the
screens) to view online help.
icon (located in the top right corner of most
60Chapter 2 Introducing the Web Configurator
Page 63
Figure 6 Web Configurator HOME Screen in Router Mode
ZyWALL 35 User’s Guide
Use submenus to configure ZyWALL features.
Click LOGOUT at any time to exit the web configurator.
Click MAINTENANCE to view information about your ZyWALL or upgrade configuration/
firmware files. Maintenance includes General, Password, Time and Date, Device Mode, F/W (firmware) Upload, Configuration (Backup, Restore, Default), and Restart.
The following table describes the labels in this screen.
Table 2 Web Configurator HOME Screen in Router Mode
LABELDESCRIPTION
Wizards for
WAN1 Quick
Setup
Internet AccessClick Internet Access to use the initial configuration wizard. This configures WAN1.
VPN WizardClick VPN Wizard to create VPN policies.
Device
Information
Chapter 2 Introducing the Web Configurator61
Page 64
ZyWALL 35 User’s Guide
Table 2 Web Configurator HOME Screen in Router Mode (continued)
LABELDESCRIPTION
System NameThis is the System Name you enter in the MAINTENANCE General screen. It is for
Firmware Version This is the ZyNOS Firmware version and the date created. ZyNOS is ZyXEL's
Routing ProtocolThis shows the routing protocol - IP for which the ZyWALL is configured. This field is
Device ModeThis displays whether the ZyWALL is functioning as a router or a bridge.
FirewallThis displays whether or not the ZyWALL’s firewall is activated.
System TimeThis field displays your ZyWALL’s presentdate and time.
MemoryThe first number shows how many kilobytes of the heap memory the ZyWALL is
SessionsThe first number shows how many sessions are currently open on the ZyWALL.
Policy RoutesThe first number shows how many policy routes you have configured.
Network Status
InterfaceThis is the port type. Port types are: WAN1, WAN2, Dial, LAN, WLAN and DMZ.
StatusFor the LAN and DMZ ports, this displays the port speed and duplex setting. For the
IP AddressThis shows the port’s IP address.
Subnet MaskThis shows the port’s subnet mask.
DHCPThis shows the WAN port’s DHCP role - Client or None.
RenewIf you are using Ethernet encapsulation and the WAN port is configured to get the IP
identification purposes.
proprietary Network Operating System design.
not configurable.
using. Heap memory refers to the memory that is not used by ZyNOS (ZyXEL
Network Operating System) and is thus available for running processes like NAT,
VPN and the firewall.
The second number shows the ZyWALL's total heap memory (in kilobytes).
The bar displays what percent of the ZyWALL's heap memory is in use. The bar
turns from green to red when the maximum is being approached.
This includes all sessions that are currently:
•Traversing the ZyWALL
•Terminating at the ZyWALL
•Initiated from the ZyWALL
The second number is the maximum number of sessions that can be open at one
time.
The bar displays what percent of the maximum number of sessions is in use. The
bar turns from green to red when the maximum is being approached.
The second number shows the maximum number of policy routes that you can
configure on the ZyWALL.
The bar displays what percent of the ZyWALL's possible policy routes are
configured. The bar turns from green to red when the maximum is being
approached.
Click "+" to expand or "-" to collapse the LAN and DMZ IP alias drop-down lists.
WAN and Dial Backup port, it displays the port speed and duplex setting if you’re
using Ethernet encapsulation and Down (line is down or not connected), Idle (line
(ppp) idle), Dial (starting to trigger a call) or Drop (dropping a call) if you’re using
PPPoE encapsulation. For the WLAN port, it displays Active when WLAN is
enabled or Inactive when WLAN is disabled.
This shows the LAN port’s DHCP role - Server, Relay or None.
address automatically from the ISP, click Renew to release the WAN port’s
dynamically assigned IP address and get the IP address afresh. Click Dial to dial up
the PPTP, PPPoE or dial backup connection.
62Chapter 2 Introducing the Web Configurator
Page 65
Table 2 Web Configurator HOME Screen in Router Mode (continued)
LABELDESCRIPTION
Show StatisticsClick Show Statistics to see router performance statistics such as the number of
Show DHCP
Table
VPN StatusClick VPN Status to display the active VPN connections.
2.4.2 Bridge Mode
The following screen displays when the ZyWALL is set to bridge mode. While in bridge
mode, the ZyWALL cannot get an IP address from a DHCP server. The LAN, WAN, DMZ
and WLAN interfaces all have the same (static) IP address and subnet mask. You can
configure the ZyWALL's IP address in order to access the ZyWALL for management. If you
connect your computer directly to the ZyWALL, you also need to assign your computer a
static IP address in the same subnet as the ZyWALL's IP address in order to access the
ZyWALL.
ZyWALL 35 User’s Guide
packets sent and number of packets received for each port, including WAN1,
WAN2, Dial Backup, LAN, WLAN and DMZ.
Click Show DHCP Table to show current DHCP client information.
The ZyWALL bridges traffic traveling between the ZyWALL's interfaces.
You can use the firewall in bridge mode (refer to the firewall chapters for details on
configuring the firewall).
Chapter 2 Introducing the Web Configurator63
Page 66
ZyWALL 35 User’s Guide
Figure 7 Web Configurator HOME Screen in Bridge Mode
The following table describes the labels not previously discussed (see Table 2).
Table 3 Web Configurator HOME Screen in Bridge Mode
LABELDESCRIPTION
Network Status
IP AddressThis is the IP address of your ZyWALL in dotted decimal notation.
Subnet MaskThis is the IP subnet mask of the ZyWALL.
Gateway IP
Address
Rapid Spanning
Tree Protocol
Bridge PriorityThis is the bridge priority of the ZyWALL.
Bridge Hello Time This is the interval of BPDUs (Bridge Protocol Data Units) from the root bridge.
Bridge Max AgeThis is the predefined interval that a bridge waits to get a Hello message (BPDU)
Forward DelayThis is the forward delay interval.
64Chapter 2 Introducing the Web Configurator
This is the gateway IP address.
This shows whether RSTP (Rapid Spanning Tree Protocol) is active or not. The
following labels or values relative to RSTP do not apply when RSTP is disabled.
from the root bridge.
Page 67
Table 3 Web Configurator HOME Screen in Bridge Mode (continued)
LABELDESCRIPTION
Bridge PortThis is the port type. Port types are: WAN1, WAN2, LAN, WLAN and DMZ.
Port StatusFor the WAN, LAN, and DMZ ports, this displays the port speed and duplex setting.
For the WAN port, it displays Down when the link is not ready or has failed.For the
WLAN port, it displays Active when WLAN is enabled or Inactive when WLAN is
disabled.
RSTP StatusThis is the RSTP status of the corresponding port.
RSTP ActiveThis shows whether or not RSTP is active on the corresponding port.
RSTP PriorityThis is the RSTP priority of the corresponding port.
RSTP Path CostThis is the cost of transmitting a frame from the root bridge to the corresponding
port.
Show StatisticsClick Show Statistics to see bridge performance statistics such as the number of
packets sent and number of packets received for each port, including WAN1,
WAN2, LAN, DMZ and WLAN.
2.4.3 Navigation Panel
ZyWALL 35 User’s Guide
After you enter the password, use the sub-menus on the navigation panel to configure
ZyWALL features.
The following table lists the features available for each mode.
Table 4 Feature Comparison
FEATUREBRIDGE MODEROUTER MODE
Internet Access WizardO
VPN WizardO
DHCP TableO
System StatisticsOO
LANO
BridgeO
Wireless LANOO
WANO
DMZO
Firewall OO
Content FilterOO
VPNO
CertificatesOO
Authentication ServerOO
NATO
Static RouteO
Bandwidth ManagementOO
DNSO
Chapter 2 Introducing the Web Configurator65
Page 68
ZyWALL 35 User’s Guide
Table 4 Feature Comparison
FEATUREBRIDGE MODEROUTER MODE
Remote ManagementOO
UPnPO
LogsOO
MaintenanceOO
Table Key: An O in a mode’s column shows that the device mode has the specified feature.
The information in this table was correct at the time of writing, although it may be subject to
change.
The following table describes the sub-menus.
Table 5 Screens Summary
LINKTABFUNCTION
HOMEThis screen shows the ZyWALL’s general device and network
LANLANUse this screen to configure LAN DHCP and TCP/IP settings.
BRIDGEBridgeUse this screen to change the bridge settings on the ZyWALL.
WIRELESS LAN WirelessUse this screen to configure the wireless LAN settings and WLAN
WANGeneralThis screen allows you to configure load balancing, route priority
DMZDMZUse this screen to configure your DMZ connection.
FIREWALLDefault RuleUse this screen to activate/deactivate the firewall and the direction
CONTENT
FILTER
status information. Use this screen to access the wizards, statistics
and DHCP table.
Static DHCP Use this screen to assign fixed IP addresses on the LAN.
IP AliasUse this screen to partition your LAN interface into subnets.
Port RolesUse this screen to change the LAN/DMZ port roles
authentication/security settings.
MAC FilterUse this screen to change MAC filter settings on the ZyWALL
and traffic redirect properties.
WAN1Use this screen to configure ZyWALL WAN1 port for internet
access.
WAN2Use this screen to change your WAN2 port settings.
Traffic Redirect Use this screen to configure your traffic redirect properties and
parameters.
Dial BackupUse this screen to configure the backup WAN dial-up connection
IP AliasUse this screen to partition your DMZ interface into subnets
of network traffic to which to apply the rule
Rule Summary This screen shows a summary of the firewall rules, and allows you
to edit/add a firewall rule.
Anti-ProbingUse this screen to change your anti-probing settings.
ThresholdUse this screen to configure the threshold for DoS attacks.
GeneralThis screen allows you to enable content filtering and block certain
web features.
66Chapter 2 Introducing the Web Configurator
Page 69
ZyWALL 35 User’s Guide
Table 5 Screens Summary (continued)
LINKTABFUNCTION
CategoriesUse this screen to select which categories of web pages to filter
out, as well as to register for external database content filtering and
view reports.
CustomizationUse this screen to customize the content filter list.
VPNVPN RulesUse this screen to configure VPN connections and view the rule
summary.
SA Monitor Use this screen to display and manage active VPN connections.
Global SettingUse this screen to allow NetBIOS packets through the VPN
connections.
CERTIFICATESMy Certificates Use this screen to view a summary list of certificates and manage
certificates and certification requests.
Trusted CAsUse this screen to view and manage the list of the trusted CAs.
Trusted
Remote Hosts
Directory
Servers
AUTH SERVERLocal User
Database
RADIUSConfigure this screen to use an external server to authenticate
NATNAT OverviewUse this screen to enable NAT.
Address
Mapping
Port
Forwarding
Port Triggering Use this screen to change your ZyWALL’s port triggering settings.
STATIC ROUTEIP Static Route Use this screen to configure IP static routes.
POLICY ROUTE Policy Rout
Summary
BW MGMTSummary Use this screen to enable bandwidth management on an interface.
Class SetupUse this screen to set up the bandwidth classes.
MonitorUse this screen to view the ZyWALL’s bandwidth usage and
DNSSystemUse this screen to configure the address and name server records.
CacheUse this screen to configure the DNS resolution cache.
LANUse this screen to configure LAN DNS information.
DDNSUse this screen to set up dynamic DNS.
REMOTE MGMT WWWUse this screen to configure through which interface(s) and from
SSHUse this screen to configure through which interface(s) and from
Use this screen to view and manage the certificates belonging to
the trusted remote hosts.
Use this screen to view and manage the list of the directory
servers.
Use this screen to configure the local user account(s) on the
ZyWALL.
wireless and/or VPN users.
Use this screen to configure network address translation mapping
rules.
Use this screen to configureservers behind the ZyWALL.
Use this screen to view a summary list of all the policies and
configure policies for use in IP policy routing.
allotments.
which IP address(es) users can use HTTPS or HTTP to manage
the ZyWALL.
which IP address(es) users can use Secure Shell to manage the
ZyWALL.
Chapter 2 Introducing the Web Configurator67
Page 70
ZyWALL 35 User’s Guide
Table 5 Screens Summary (continued)
LINKTABFUNCTION
UPnPUPnPUse this screen to enable UPnP on the ZyWALL.
LOGSView LogUse this screen to view the logs for the categories that you
LOGOUTClick this label to exit the web configurator.
TELNETUse this screen to configure through which interface(s) and from
which IP address(es) users can use Telnet to manage the
ZyWALL.
FTPUse this screen to configure through which interface(s) and from
which IP address(es) users can use FTP to access the ZyWALL.
SNMPUse this screen to configure your ZyWALL’s settings for Simple
Network Management Protocol management.
DNSUse this screen to configure through which interface(s) and from
which IP address(es) users can send DNS queries to the ZyWALL.
PortsUse this screen to view the NAT port mapping rules that UPnP
creates on the ZyWALL.
selected.
Log SettingsUse this screen to change your ZyWALL’s log settings.
ReportsUse this screen to have the ZyWALL record and display the
network usage reports.
PasswordUse this screen to change your password.
Time and Date Use this screen to change your ZyWALL’s time and date.
Device ModeUse this screen to configure and have your ZyWALL work as a
router or a bridge.
F/W UploadUse this screen to upload firmware to your ZyWALL
ConfigurationUse this screen to backup and restore the configuration or reset
the factory defaults to your ZyWALL.
RestartThis screen allows you to reboot the ZyWALL without turning the
power off.
2.4.4 System Statistics
Click ShowStatistics in the HOME screen. Read-only information here includes port status
and packet specific statistics. Also provided is "Up Time" and "poll interval(s)". The Poll Interval(s) field is configurable.
68Chapter 2 Introducing the Web Configurator
Page 71
Figure 8 Home : Show Statistics
The following table describes the labels in this screen.
Table 6 Home : Show Statistics
ZyWALL 35 User’s Guide
LABEL DESCRIPTION
Click the icon to display the chart of throughput statistics.
PortThis is the WAN1, WAN2, Dial Backup, LAN, DMZ or WLAN port.
StatusThis displays the port speed and duplex setting if you’re using Ethernet
encapsulation and Down (line is down), Idle (line (ppp) idle), Dial (starting to trigger
a call) or Drop (dropping a call) if you’re using PPPoE encapsulation.
TxPktsThis is the number of transmitted packets on this port.
RxPktsThis is the number of received packets on this port.
Tx B/sThis displays the transmission speed in bytes per second on this port.
Rx B/sThis displays the reception speed in bytes per second on this port.
Up TimeThis is the total amount of time the line has been up.
System Up Time This is the total time the ZyWALL has been on.
Poll Interval(s)Enter the time interval for refreshing statistics in this field.
Set IntervalClick this button to apply the new poll interval you entered in the Poll Interval(s)
field.
StopClick Stop to stop refreshing statistics.
2.4.4.1 Show Statistics: Line Chart
Click the icon in the Show Statistics screen. The screen shows you the line chart of each
port’s throughput statistics.
Chapter 2 Introducing the Web Configurator69
Page 72
ZyWALL 35 User’s Guide
Figure 9 Home : Show Statistics: Line Chart
The following table describes the labels in this screen.
Table 7 Home : Show Statistics: Line Chart
LABEL DESCRIPTION
Click the icon to go back to the Show Statistics screen.
PortSelect the check box(es) to display the throughput statistics of the corresponding
B/sSpecify the direction of the traffic for which you want to show throughput statistics in
Time RangeSet the range of time (in minute) over which to display the throughput.
Throughput
Range
ApplyClick Apply to save these settings back to the ZyWALL temporarily.
port(s).
this table.
Select Tx to display transmitted traffic throughput statistics and the amount of traffic
(in bytes). Select Rx to display received traffic throughput statistics and the amount
of traffic (in bytes).
Set the range of the throughput (in B/s, KB/s or MB/s) to display.
2.4.5 DHCP Table Screen
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual
clients to obtain TCP/IP configuration at start-up from a server. You can configure the
ZyWALL as a DHCP server or disable it. When configured as a server, the ZyWALL provides
the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another
DHCP server on your LAN, or else the computer must be manually configured.
Click ShowDHCP Table in the HOME screen when the ZyWALL is set to router mode.
Read-only information here relates to your DHCP status. The DHCP table shows current
DHCP client information (including IP Address, HostName and MAC Address) of all
network clients using the ZyWALL’s DHCP server.
70Chapter 2 Introducing the Web Configurator
Page 73
ZyWALL 35 User’s Guide
Figure 10 Home : DHCP Table
The following table describes the labels in this screen.
Table 8 Home : DHCP Table
LABEL DESCRIPTION
# This is the index number of the host computer.
IP AddressThis field displays the IP address relative to the # field listed above.
Host Name This field displays the computer host name.
MAC AddressThe MAC (Media Access Control) or Ethernet address on a LAN (Local Area Network)
ReserveSelect this check box to have the ZyWALL always assign this IP address to this MAC
RefreshClick Refresh to reload the DHCP table.
is unique to your computer (six pairs of hexadecimal notation).
A network interface card such as an Ethernet adapter has a hardwired address that is
assigned at the factory. This address follows an industry standard that ensures no
other adapter has a similar address.
address (and host name). You can select up to 8 entries in this table. After you click
Apply, the MAC address and IP address also display in the LAN Static DHCP screen
(where you can edit them).
2.4.6 VPN Status
Click VPN Status in the HOME screen when the ZyWALL is set to router mode. Read-only
information here includes encapsulation mode and security protocol. The Poll Interval(s)
field is configurable.
Chapter 2 Introducing the Web Configurator71
Page 74
ZyWALL 35 User’s Guide
Figure 11 Home : VPN Status
The following table describes the labels in this screen.
Table 9 Home : VPN Status
LABELDESCRIPTION
#This is the security association index number.
NameThis field displays the identification name for this VPN policy.
EncapsulationThis field displays Tunnel or Transport mode.
IPSec Algorithm This field displays the security protocols used for an SA.
Both AH and ESP increase ZyWALL processing requirements and communications
latency (delay).
Poll Interval(s)Enter the time interval for refreshing statistics in this field.
Set IntervalClick this button to apply the new poll interval you entered in the Poll Interval(s)
field.
StopClick Stop to stop refreshing statistics.
72Chapter 2 Introducing the Web Configurator
Page 75
This chapter provides information on the Wizard Setup screens in the web configurator. This
chapter is only applicable when the ZyWALL is in router mode.
3.1 Wizard Setup Overview
The web configurator's setup wizards help you configure WAN1 on the ZyWALL to access
the Internet and edit VPN policies and configure IKE settings to establish a VPN tunnel.
3.2 Internet Access
ZyWALL 35 User’s Guide
CHAPTER3
Wizard Setup
The first Internet access wizard screen has three variations depending on what encapsulation
type you use. Refer to your ISP checklist in the Quick Start Guide to know what to enter in
each field. Leave a field blank if you don’t have that information.
3.2.1 ISP Parameters
The ZyWALL offers three choices of encapsulation. They are Ethernet, PPTP or PPPoE.
3.2.1.1 Ethernet
For ISPs (such as Telstra) that send UDP heartbeat packets to verify that the customer is still
online, please create a WAN-to-WAN/ZyWALL firewall rule for those packets. Contact your
ISP to find the correct port number.
Choose Ethernet when the WAN port is used as a regular Ethernet.
Chapter 3 Wizard Setup73
Page 76
ZyWALL 35 User’s Guide
Figure 12 ISP Parameters : Ethernet Encapsulation
The following table describes the labels in this screen.
Table 10 ISP Parameters : Ethernet Encapsulation
LABELDESCRIPTION
ISP Parameters
for Internet
Access
EncapsulationYou must choose the Ethernet option when the WAN port is used as a regular
Service TypeChoose from Standard, Telstra (RoadRunner Telstra authentication method), RR-
User NameType the user name given to you by your ISP.
PasswordType the password associated with the user name above.
Retype Password Type your password again for confirmation.
Login Server IP
Address
Login Server
(Telia Login only)
Relogin Every
(min) (Telia Login
only)
NextClick Next to continue.
Ethernet. Otherwise, choose PPPoE or PPTP for a dial-up connection.
The following fields are not applicable (N/A) for the Standard service type.
Type the authentication server IP address here if your ISP gave you one.
This field is not available for Telia Login.
Type the domain name of the Telia login server, for example login1.telia.com.
Alternatively, click the right mouse button to copy and/or paste the IP address.
The Telia server logs the ZyWALL out if the ZyWALL does not log in periodically.
Type the number of minutes from 1 to 59 (30 default) for the ZyWALL to wait
between logins.
74Chapter 3 Wizard Setup
Page 77
3.2.1.2 PPPoE Encapsulation
Point-to-Point Protocol over Ethernet (PPPoE) functions as a dial-up connection. PPPoE is an
IETF (Internet Engineering Task Force) draft standard specifying how a host personal
computer interacts with a broadband modem (for example xDSL, cable, wireless, etc.) to
achieve access to high-speed data networks. It preserves the existing Microsoft Dial-Up
Networking experience and requires no new learning or procedures.
For the service provider, PPPoE offers an access and authentication method that works with
existing access control systems (for instance, Radius). For the user, PPPoE provides a login
and authentication method that the existing Microsoft Dial-Up Networking software can
activate, and therefore requires no new learning or procedures for Windows users.
One of the benefits of PPPoE is the ability to let end users access one of multiple network
services, a function known as dynamic service selection. This enables the service provider to
easily create and offer new IP services for specific users.
Operationally, PPPoE saves significant effort for both the subscriber and the ISP/carrier, as it
requires no specific configuration of the broadband modem at the subscriber’s site.
ZyWALL 35 User’s Guide
By implementing PPPoE directly on the ZyWALL (rather than individual computers), the
computers on the LAN do not need PPPoE software installed, since the ZyWALL does that
part of the task. Furthermore, with NAT, all of the LAN's computers will have Internet access.
Refer to Appendix D PPPoE for more information on PPPoE.
Chapter 3 Wizard Setup75
Page 78
ZyWALL 35 User’s Guide
Figure 13 ISP Parameters : PPPoE Encapsulation
The following table describes the labels in this screen.
Table 11 ISP Parameters : PPPoE Encapsulation
LABELDESCRIPTION
ISP Parameter for
Internet Access
EncapsulationChoose an encapsulation method from the pull-down list box. PPP over Ethernet
forms a dial-up connection.
Service Name Type the name of your service provider.
User NameType the user name given to you by your ISP.
Password Type the password associated with the user name above.
Retype Password Type your password again for confirmation.
Nailed-Up
Connection
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects
NextClick Next to continue.
Select Nailed-Up Connection if you do not want the connection to time out.
from the PPPoE server. The default time is 100 seconds.
3.2.1.3 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data
from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/
IP-based networks.
76Chapter 3 Wizard Setup
Page 79
ZyWALL 35 User’s Guide
PPTP supports on-demand, multi-protocol, and virtual private networking over public
networks, such as the Internet.
Refer to Appendix E PPTP for more information on PPTP.
Note: The ZYWALL supports one PPTP server connection at
any given time.
Figure 14 ISP Parameters : PPTP Encapsulation
The following table describes the labels in this screen.
Table 12 ISP Parameters : PPTP Encapsulation
LABELDESCRIPTION
ISP Parameters for
Internet Access
EncapsulationSelect PPTP from the drop-down list box.
User NameType the user name given to you by your ISP.
PasswordType the password associated with the User Name above.
Retype PasswordType your password again for confirmation.
Nailed-Up
Connection
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects
PPTP Configuration
Chapter 3 Wizard Setup77
Select Nailed-Up Connection if you do not want the connection to time out.
from the PPTP server.
Page 80
ZyWALL 35 User’s Guide
Table 12 ISP Parameters : PPTP Encapsulation
LABELDESCRIPTION
My IP AddressType the (static) IP address assigned to you by your ISP.
My IP Subnet Mask Type the subnet mask assigned to you by your ISP (if given).
Server IP AddressType the IP address of the PPTP server.
Connection ID/
Name
NextClick Next to continue.
Enter the connection ID or connection name in this field. It must follow the "c:id"
and "n:name" format. For example, C:12 or N:My ISP.
This field is optional and depends on the requirements of your xDSL modem.
3.2.2 WAN and DNS
The second wizard screen allows you to configure WAN IP address assignment, DNS server
address assignment and the WAN MAC address.
3.2.2.1 WAN IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated
from the Internet, for instance, only between your two branch offices, you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private
networks.
Table 13 Private IP Address Ranges
10.0.0.0
172.16.0.0
192.168.0.0
-10.255.255.255
-172.31.255.255
-192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the
ISP can provide you with the Internet addresses for your local networks. On the other hand, if
you are part of a much larger organization, you should consult your network administrator for
the appropriate IP addresses.
Note: Regardless of your particular situation, do not create an
arbitrary IP address; always follow the guidelines above. For
more information on address assignment, please refer to RFC
1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
3.2.2.2 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a
LAN share one common network number.
78Chapter 3 Wizard Setup
Page 81
ZyWALL 35 User’s Guide
Where you obtain your network number depends on your particular situation. If the ISP or
your network administrator assigns you a block of registered IP addresses, follow their
instructions in selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single
user account and the ISP will assign you a dynamic IP address when the connection is
established. If this is the case, it is recommended that you select a network number from
192.168.0.0 to 192.168.255.0 and you must enable the Network Address Translation (NAT)
feature of the ZyWALL. The Internet Assigned Number Authority (IANA) reserved this block
of addresses specifically for private use; please do not use any other number unless you are
told otherwise. Let's say you select 192.168.1.0 as the network number; which covers 254
individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other
words, the first three numbers specify the network number while the last number identifies an
individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember,
for instance, 192.168.1.1, for your ZyWALL, but make sure that no other device on your
network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your ZyWALL will
compute the subnet mask automatically based on the IP address that you entered. You don't
need to change the subnet mask computed by the ZyWALL unless you are instructed to do
otherwise.
3.2.2.3 DNS Server Address Assignment
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and
vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is
extremely important because without it, you must know the IP address of a computer before
you can access it.
The ZyWALL can get the DNS server addresses in the following ways.
1 The ISP tells you the DNS server addresses, usually in the form of an information sheet,
when you sign up. If your ISP gives you DNS server addresses, manually enter them in
the DNS server fields.
2 If your ISP dynamically assigns the DNS server IP addresses (along with the ZyWALL’s
WAN IP address), set the DNS server fields to get the DNS server address from the ISP.
3 You can manually enter the IP addresses of other DNS servers. These servers can be
public or private. A DNS server could even be behind a remote IPSec router (see the
Private DNS Server section in Chapter 20 DNS).
3.2.2.4 WAN MAC Address
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address
is assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02.
Chapter 3 Wizard Setup79
Page 82
ZyWALL 35 User’s Guide
You can configure the WAN port's MAC address by either using the factory default or cloning
the MAC address from a computer on your LAN. Once it is successfully configured, the
address will be copied to the "rom" file (ZyNOS configuration file). It will not change unless
you change the setting or upload a different "rom" file.
Table 14 Example of Network Properties for LAN Servers with Fixed IP Addresses
Choose an IP address192.168.1.2-192.168.1.32; 192.168.1.65-192.168.1.254.
Subnet mask 255.255.255.0
Gateway (or default route)192.168.1.1(ZyWALL LAN IP)
The second wizard screen varies according to the type of encapsulation that you select in the
second wizard screen.
Figure 15 WAN and DNS
Note: ZyXEL recommends you clone the MAC address from a
computer on your LAN even if your ISP does not require MAC
address authentication.
80Chapter 3 Wizard Setup
Page 83
ZyWALL 35 User’s Guide
The following table describes the labels in this screen.
Table 15 WAN and DNS
LABELDESCRIPTION
WAN IP Address
Assignment
Get automatically from
ISP
Use fixed IP addressSelect this option If the ISP assigned a fixed IP address.
My WAN IP AddressEnter your WAN IP address in this field if you selected Use fixed IP
My WAN IP Subnet Mask Enter the IP subnet mask in this field if you selected Use fixed IP address.
Remote IP Subnet Mask Enter the gateway IP subnet mask (if your ISP gave you one) in this field if
Remote/Gateway IP
Address
System DNS Servers DNS (Domain Name System) is for mapping a domain name to its
First DNS Server
Second DNS Server
Third DNS Server
WAN MAC AddressThe MAC address field allows you to configure the WAN port's MAC
Factory Default Select this option to use the factory assigned default MAC Address.
Spoof this Computer's
MAC Address - IP
Address
BackClick Back to return to the previous screen.
FinishClick Finish to complete and save the wizard setup.
Select this option If your ISP did not assign you a fixed IP address. This is
the default selection.
address.
This field is available when you select Ethernet encapsulation in the
previous wizard screen.
you selected Use fixed IP address. This field is not available when you
select Ethernet encapsulation in the previous wizard screen.
Enter the gateway IP address in this field if you selected Use fixed IP address.
corresponding IP address and vice versa, e.g., the IP address of
www.zyxel.com is 204.217.0.2. The DNS server is extremely important
because without it, you must know the IP address of a computer before you
can access it.
Select From ISP if your ISP dynamically assigns DNS server information
(and the ZyWALL's WAN IP address). The field to the right displays the
(read-only) DNS server IP address that the ISP assigns.
Select User-Defined if you have the IP address of a DNS server. Enter the
DNS server's IP address in the field to the right.
Select None if you do not want to configure DNS servers. If you do not
configure a system DNS server, you must use IP addresses when
configuring VPN, DDNS and the time server.
Address by either using the factory default or cloning the MAC address from
a computer on your LAN.
Select this option and enter the IP address of the computer on the LAN
whose MAC you are cloning. Once it is successfully configured, the address
will be copied to the rom file (ZyNOS configuration file). It will not change
unless you change the setting or upload a different rom file. It is advisable to
clone the MAC address from a computer on your LAN even if your ISP does
not presently require MAC address authentication.
3.2.3 Internet Access Wizard Setup Complete
Well done! You have successfully set up your ZyWALL to operate on your network and
access the Internet.
Chapter 3 Wizard Setup81
Page 84
ZyWALL 35 User’s Guide
Figure 16 Internet Access Wizard Setup Complete
3.3 VPN Overview
A VPN (Virtual Private Network) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing technologies/services used to transport traffic over
the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
3.3.1 IPSec
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer.
3.3.2 Security Association
A Security Association (SA) is a contract between two parties indicating what security
parameters, such as keys and algorithms they will use.
3.4 VPN Wizard
Use the VPN wizard screens to configure a VPN rule that use a pre-shared key. If you want to
set the rule to use a certificate, please go to the VPN screens for configuration.
82Chapter 3 Wizard Setup
Page 85
3.4.1 My IP Address
My IP Address identifies the WAN IP address of the ZyWALL. You can enter the
ZyWALL's static WAN IP address (if it has one) or leave the field set to 0.0.0.0. The
ZyWALL has to rebuild the VPN tunnel if the My IP Address changes after setup.
3.4.2 Secure Gateway Address
Secure Gateway Address is the WAN IP address or domain name of the remote IPSec router
(secure gateway).
If the remote secure gateway has a static WAN IP address, enter it in the Secure Gateway Address field. You may alternatively enter the remote secure gateway’s domain name (if it
has one) in the Secure Gateway Address field.
You can also enter a remote secure gateway’s domain name in the Secure Gateway Address
field if the remote secure gateway has a dynamic WAN IP address and is using DDNS. The
ZyWALL has to rebuild the VPN tunnel each time the remote secure gateway’s WAN IP
address changes (there may be a delay until the DDNS servers are updated with the remote
gateway’s new WAN IP address).
ZyWALL 35 User’s Guide
3.4.2.1 Dynamic Secure Gateway Address
If the remote secure gateway has a dynamic WAN IP address and does not use DDNS, enter
0.0.0.0 as the secure gateway’s address. In this case only the remote secure gateway can
initiate SAs. This may be useful for telecommuters initiating a VPN tunnel to the company
network.
The Secure Gateway IP Address may be configured as 0.0.0.0 only when using IKE key
management and not Manual key management.
Click VPN Wizard in the HOME screen to open the screen as shown and have the quick and
initial VPN configuration.
Chapter 3 Wizard Setup83
Page 86
ZyWALL 35 User’s Guide
Figure 17 VPN Wizard : Gateway Setting
The following table describes the labels in this screen.
Table 16 VPN Wizard : Gateway Setting
LABELDESCRIPTION
My IP AddressEnter the WAN IP address of your ZyWALL or leave the field set to 0.0.0.0.
The following applies if the My IP Address field is configured as 0.0.0.0:
•When the WAN port operation mode is set to Active/Passive, the ZyWALL uses
the IP address (static or dynamic) of the WAN port that is in use.
•When the WAN port operation mode is set to Active/Active, the ZyWALL uses the
IP address (static or dynamic) of the primary (highest priority) WAN port to set up
the VPN tunnel as long as the corresponding WAN1 or WAN2 connection is up. If
the corresponding WAN1 or WAN2 connection goes down, the ZyWALL uses the
IP address of the other WAN port.
•If both WAN connections go down, the ZyWALL uses the dial backup IP address
for the VPN tunnel when using dial backup or the LAN IP address when using
traffic redirect. See the chapter on WAN for details on dial backup and traffic
redirect.
The VPN tunnel has to be rebuilt if this IP address changes.
Secure
Gateway
Address
IP AddressSelect IP Address and enter the WAN IP address of the remote IPSec router (secure
gateway) in the field below to identify the remote IPSec router by its IP address.
Domain NameSelect Domain Name and enter the domain name of the remote IPSec router (secure
gateway) in the field below to identify the remote IPSec router by a domain name.
NextClick Next to continue.
84Chapter 3 Wizard Setup
Page 87
3.4.3 Network Setting
Two active SAs cannot have the local and remote IP address(es) both the same. Two active
SAs can have the same local or remote IP address, but not both. You can configure multiple
SAs between the same local and remote IP addresses, as long as only one is active at any time.
Figure 18 VPN Wizard : Network Setting
ZyWALL 35 User’s Guide
The following table describes the labels in this screen.
Table 17 VPN Wizard : Network Setting
LABEL DESCRIPTION
Local NetworkLocal IP addresses must be static and correspond to the remote IPSec router's
configured remote IP addresses.
Select Single for a single IP address. Select Range IP for a specific range of IP
addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
Starting IP
Address
Ending IP
Address/
Subnet Mask
Remote
Network
When the Local Network field is configured to Single, enter a (static) IP address on
the LAN behind your ZyWALL. When the Local Network field is configured to Range IP, enter the beginning (static) IP address, in a range of computers on the LAN behind
your ZyWALL. When the Local Network field is configured to Subnet, this is a (static)
IP address on the LAN behind your ZyWALL.
When the Local Network field is configured to Single, this field is N/A. When the
Local Network field is configured to Range IP, enter the end (static) IP address, in a
range of computers on the LAN behind your ZyWALL. When the Local Network field
is configured to Subnet, this is a subnet mask on the LAN behind your ZyWALL.
Remote IP addresses must be static and correspond to the remote IPSec router's
configured local IP addresses.
Select Single for a single IP address. Select Range IP for a specific range of IP
addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
Chapter 3 Wizard Setup85
Page 88
ZyWALL 35 User’s Guide
Table 17 VPN Wizard : Network Setting
LABEL DESCRIPTION
Starting IP
Address
Ending IP
Address/
Subnet Mask
BackClick Back to return to the previous screen.
NextClick Next to continue.
3.4.4 IKE Phases
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1
(Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and
the second one uses that SA to negotiate SAs for IPSec.
Figure 19 Two Phases to Set Up the IPSec SA
When the Remote Network field is configured to Single, enter a (static) IP address
on the network behind the remote IPSec router. When the Remote Network field is
configured to Range IP, enter the beginning (static) IP address, in a range of
computers on the network behind the remote IPSec router. When the Remote Network field is configured to Subnet, enter a (static) IP address on the network
behind the remote IPSec router
When the Remote Network field is configured to Single, this field is N/A. When the
Remote Network field is configured to Range IP, enter the end (static) IP address, in
a range of computers on the network behind the remote IPSec router. When the
Remote Network field is configured to Subnet, enter a subnet mask on the network
behind the remote IPSec router.
In phase 1 you must:
• Choose a negotiation mode.
• Authenticate the connection by entering a pre-shared key.
• Choose an encryption algorithm.
• Choose an authentication algorithm.
• Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2).
86Chapter 3 Wizard Setup
Page 89
ZyWALL 35 User’s Guide
• Set the IKE SA lifetime. This field allows you to determine how long an IKE SA should
stay up before it times out. An IKE SA times out when the IKE SA lifetime period
expires. If an IKE SA times out when an IPSec SA is already established, the IPSec SA
stays connected.
In phase 2 you must:
• Choose which protocol to use (ESP or AH) for the IKE key exchange.
• Choose an encryption algorithm.
• Choose an authentication algorithm
• Choose whether to enable Perfect Forward Secrecy (PFS) using Diffie-Hellman publickey cryptography – see the IKE Phases section. Select None (the default) to disable PFS.
• Choose Tunnel mode or Transport mode.
• Set the IPSec SA lifetime. This field allows you to determine how long the IPSec SA
should stay up before it times out. The ZyWALL automatically renegotiates the IPSec SA
if there is traffic when the IPSec SA lifetime period expires. The ZyWALL also
automatically renegotiates the IPSec SA if both IPSec routers have keep alive enabled,
even if there is no traffic. If an IPSec SA times out, then the IPSec router must renegotiate
the SA the next time someone attempts to send traffic.
3.4.4.1 Negotiation Mode
The phase 1 Negotiation Mode you select determines how the Security Association (SA) will
be established for each connection through IKE negotiations.
• Main Mode ensures the highest level of security when the communicating parties are
negotiating authentication (phase 1). It uses 6 messages in three round trips: SA
negotiation, Diffie-Hellman exchange and an exchange of nonces (a nonce is a random
number). This mode features identity protection (your identity is not revealed in the
negotiation).
• Aggressive Mode is quicker than Main Mode because it eliminates several steps when
the communicating parties are negotiating authentication (phase 1). However the tradeoff is that faster speed limits its negotiating power and it also does not provide identity
protection. It is useful in remote access situations where the address of the initiator is not
know by the responder and both parties want to use pre-shared key authentication.
3.4.4.2 Pre-Shared Key
A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is
called pre-shared because you have to share it with another party before you can communicate
with them over a secure connection.
Chapter 3 Wizard Setup87
Page 90
ZyWALL 35 User’s Guide
3.4.4.3 Diffie-Hellman (DH) Key Groups
Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish
a shared secret over an unsecured communications channel. Diffie-Hellman is used within
IKE SA setup to establish session keys. 768-bit (Group 1 - DH1) and 1024-bit (Group 2 –
DH2) Diffie-Hellman groups are supported. Upon completion of the Diffie-Hellman
exchange, the two peers have a shared secret, but the IKE SA is not authenticated. For
authentication, use pre-shared keys.
3.4.4.4 Perfect Forward Secrecy (PFS)
Enabling PFS means that the key is transient. The key is thrown away and replaced by a brand
new key using a new Diffie-Hellman exchange for each new IPSec SA setup. With PFS
enabled, if one key is compromised, previous and subsequent keys are not compromised,
because subsequent keys are not derived from previous keys. The (time-consuming) DiffieHellman exchange is the trade-off for this extra security.
This may be unnecessary for data that does not require such security, so PFS is disabled
(None) by default in the ZyWALL. Disabling PFS means new authentication and encryption
keys are derived from the same root secret (which may have security implications in the long
run) but allows faster SA setup (by bypassing the Diffie-Hellman key exchange).
3.5 IPSec Algorithms
The ESP and AH protocols are necessary to create a Security Association (SA), the
foundation of an IPSec VPN. An SA is built from the authentication provided by the AH and
ESP protocols. The primary function of key management is to establish and maintain the SA
between systems. Once the SA is established, the transport of data may commence.
3.5.1 AH (Authentication Header) Protocol
AH protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not for confidentiality, for which the ESP was designed.
In applications where confidentiality is not required or not sanctioned by government
encryption restrictions, an AH can be employed to ensure integrity. This type of
implementation does not protect the information from dissemination but will allow for
verification of the integrity of the information and authentication of the originator.
The ESP protocol (RFC 2406) provides encryption as well as some of the services offered by
AH. ESP authenticating properties are limited compared to the AH due to the non-inclusion of
the IP header information during the authentication process. However, ESP is sufficient if
only the upper layer protocols need to be authenticated.
88Chapter 3 Wizard Setup
Page 91
ZyWALL 35 User’s Guide
An added feature of the ESP is payload padding, which further protects communications by
concealing the size of the packet being transmitted.
Table 18 ESP and AH
ESPAH
EncryptionDES (default)
Data Encryption Standard (DES) is a
widely used method of data encryption
using a secret key. DES applies a 56-bit
key to each 64-bit block of data.
3DES
Triple DES (3DES) is a variant of DES,
which iterates three times with three
separate keys (3 x 56 = 168 bits),
effectively doubling the strength of DES.
AES
Advanced Encryption Standard is a
newer method of data encryption that
also uses a secret key. This
implementation of AES applies a 128-bit
key to 128-bit blocks of data. AES is
faster than 3DES.
Select NULL to set up a phase 2 tunnel
without encryption.
Authentication MD5 (default)
MD5 (Message Digest 5) produces a
128-bit digest to authenticate packet
data.
SHA1
SHA1 (Secure Hash Algorithm) produces
a 160-bit digest to authenticate packet
data.
Select MD5 for minimal security and SHA-1 for maximum security.
MD5 (default)
MD5 (Message Digest 5) produces a
128-bit digest to authenticate packet
data.
SHA1
SHA1 (Secure Hash Algorithm) produces
a 160-bit digest to authenticate packet
data.
Chapter 3 Wizard Setup89
Page 92
ZyWALL 35 User’s Guide
3.5.3 IKE Tunnel Setting (IKE Phase 1)
Figure 20 VPN Wizard : IKE Tunnel Setting
The following table describes the labels in this screen.
Table 19 VPN Wizard : IKE Tunnel Setting
LABELDESCRIPTION
Negotiation ModeUse the radio buttons to select Main Mode or Aggressive Mode. Multiple SAs
Encryption Algorithm When DES is used for data communications, both sender and receiver must
Authentication
Algorithm
Key GroupYou must choose a key group for phase 1 IKE setup. DH1 (default) refers to
SA Life Time
(Seconds)
connecting through a secure gateway must have the same negotiation mode.
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of AES uses a 128-bit key. AES is faster than
3DES.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman
Group 2 a 1024 bit (1Kb) random number.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
90Chapter 3 Wizard Setup
Page 93
Table 19 VPN Wizard : IKE Tunnel Setting (continued)
LABELDESCRIPTION
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a
communicating party during a phase 1 IKE negotiation. It is called "pre-shared"
because you have to share it with another party before you can communicate
with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal
("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x (zero
x), which is not counted as part of the 16 to 62 character range for the key. For
example, in "0x0123456789ABCDEF", 0x denotes that the key is hexadecimal
and 0123456789ABCDEF is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will
receive a PYLD_MALFORMED (payload malformed) packet if the same preshared key is not used on both ends.
Back Click Back to return to the previous screen.
NextClick Next to continue.
3.5.4 IPSec Setting (IKE Phase 2)
Figure 21 VPN Wizard : IPSec Setting
ZyWALL 35 User’s Guide
Chapter 3 Wizard Setup91
Page 94
ZyWALL 35 User’s Guide
The following table describes the labels in this screen.
Table 20 VPN Wizard : IPSec Setting
LABELDESCRIPTION
Encapsulation Mode Select Tunn el mode or Transport mode.
IPSec ProtocolSelect the security protocols used for an SA.
Encryption Algorithm When DES is used for data communications, both sender and receiver must
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back Click Back to return to the previous screen.
NextClick Next to continue.
Both AH and ESP increase ZyWALL processing requirements and
communications latency (delay).
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of AES uses a 128-bit key. AES is faster than
3DES. Select NULL to set up a tunnel without encryption. When you select
NULL, you do not enter an encryption key.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec
SA setup. This allows faster IPSec setup, but is not so secure.
Select DH1 or DH2 to enable PFS. DH1 refers to Diffie-Hellman Group 1 a 768
bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb)
random number (more secure, yet slower).
3.5.5 VPN Status Summary
This read-only screen shows the status of the current VPN setting. Use the summary table to
check whether what you have configured is correct.
92Chapter 3 Wizard Setup
Page 95
Figure 22 VPN Wizard : VPN Status
ZyWALL 35 User’s Guide
The following table describes the labels in this screen.
Table 21 VPN Wizard : VPN Status
LABELDESCRIPTION
Gateway Setting
My IP AddressThis is the WAN IP address of your ZyWALL.
Secure Gateway
Address
Network Setting
Local Network
Starting IP AddressThis is a (static) IP address on the LAN behind your ZyWALL.
Ending IP Address/
Subnet Mask
Remote Network
Chapter 3 Wizard Setup93
This is the IP address or domain name used to identify the remote IPSec router.
When the local network is configured for a single IP address, this field is N/A.
When the local network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the LAN behind your ZyWALL.
When the local network is configured for a subnet, this is a subnet mask on the
LAN behind your ZyWALL.
Page 96
ZyWALL 35 User’s Guide
Table 21 VPN Wizard : VPN Status (continued)
LABELDESCRIPTION
Starting IP AddressThis is a (static) IP address on the network behind the remote IPSec router.
Ending IP Address/
Subnet Mask
IKE Tunnel Setting
(IKE Phase 1)
Negotiation ModeThis shows Main Mode or Aggressive Mode. Multiple SAs connecting through
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES or AES.
Authentication
Algorithm
Key GroupThis is the key group you chose for phase 1 IKE setup.
SA Life Time
(Seconds)
Pre-Shared KeyThis is a pre-shared key identifying a communicating party during a phase 1 IKE
IPSec Setting (IKE
Phase 2)
Encapsulation Mode This shows Tunne l mode or Transport mode.
IPSec ProtocolESP or AH are the security protocols used for an SA.
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES, AES or
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back Click Back to return to the previous screen.
FinishClick Finish to complete and save the wizard setup.
When the remote network is configured for a single IP address, this field is N/A.
When the remote network is configured for a range IP address, this is the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the remote network is configured for a subnet, this is a
subnet mask on the network behind the remote IPSec router.
a secure gateway must have the same negotiation mode.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
negotiation.
NULL.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec SA
setup. Otherwise, DH1 or DH2 are selected to enable PFS.
3.5.6 VPN Wizard Setup Complete
Congratulations! You have successfully set up the VPN rule after any existing rule(s) for your
ZyWALL.
94Chapter 3 Wizard Setup
Page 97
Figure 23 VPN Wizard Setup Complete
ZyWALL 35 User’s Guide
Chapter 3 Wizard Setup95
Page 98
ZyWALL 35 User’s Guide
96Chapter 3 Wizard Setup
Page 99
This chapter describes how to configure LAN settings. This chapter is only applicable when
the ZyWALL is in router mode.
4.1 LAN Overview
Local Area Network (LAN) is a shared communication system to which many computers are
attached. The LAN screens can help you configure a LAN DHCP server, manage IP addresses,
and partition your physical network into logical networks.
4.2 DHCP Setup
ZyWALL 35 User’s Guide
CHAPTER4
LAN Screens
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual
clients to obtain TCP/IP configuration at start-up from a server. You can configure the
ZyWALL as a DHCP server or disable it. When configured as a server, the ZyWALL provides
the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another
DHCP server on your LAN, or else the computer must be manually configured.
4.2.1 IP Pool Setup
The ZyWALL is pre-configured with a pool of 128 IP addresses starting from 192.168.1.33 to
192.168.1.160. This configuration leaves 127 IP addresses (excluding the ZyWALL itself) in
the lower range for other server computers, for instance, servers for mail, FTP, TFTP, web,
etc., that you may have.
4.2.2 DNS Servers
Use the DNS screens to configure the DNS server information that the ZyWALL sends to the
DHCP client devices on the LAN.
There are three places where you can configure DNS setup on the ZyWALL.
1 Use the DNS System screen to configure the ZyWALL to use a DNS server to resolve
domain names for ZyWALL system features like VPN, DDNS and the time server.
2 Use the DNS LAN screen to configure the DNS server information that the ZyWALL
sends to the DHCP client devices on the LAN.
3 Use the REMOTE MGMT DNS screen to configure the ZyWALL (in router mode) to
accept or discard DNS queries.
Chapter 4 LAN Screens97
Page 100
ZyWALL 35 User’s Guide
4.3 LAN TCP/IP
The ZyWALL has built-in DHCP server capability that assigns IP addresses and DNS servers
to systems that support DHCP client capability.
4.3.1 Factory LAN Defaults
The LAN parameters of the ZyWALL are preset in the factory with the following values:
• IP address of 192.168.1.1 with subnet mask of 255.255.255.0 (24 bits)
• DHCP server enabled with 128 client IP addresses starting from 192.168.1.33.
These parameters should work for the majority of installations. If your ISP gives you explicit
DNS server address(es), read the embedded web configurator help regarding what fields need
to be configured.
4.3.2 IP Address and Subnet Mask
See the IP Address and Subnet Mask section in the Wizard Setup chapter for this information.
4.3.3 RIP Setup
RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to exchange
routing information with other routers. RIP Direction controls the sending and receiving of
RIP packets. When set to Both or Out Only, the ZyWALL will broadcast its routing table
periodically. When set to Both or In Only, it will incorporate the RIP information that it
receives; when set to None, it will not send any RIP packets and will ignore any RIP packets
received.
RIP Version controls the format and the broadcasting method of the RIP packets that the
ZyWALL sends (it recognizes both formats when receiving). RIP-1 is universally supported;
but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you
have an unusual network topology.
Both RIP-2B and RIP-2M send routing data in RIP-2 format; the difference being that RIP-2B uses subnet broadcasting while RIP-2M uses multicasting. Multicasting can reduce the
load on non-router machines since they generally do not listen to the RIP multicast address
and so will not receive the RIP packets. However, if one router uses multicasting, then all
routers on your network must use multicasting, also.
By default, RIP Direction is set to Both and RIP Version to RIP-1.
98Chapter 4 LAN Screens
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.