ZyXEL G-2000 Plus v2
4-port Wireless Router
User’s Guide
Version 3.60
Edition 1
2/2006
ZyXEL G-2000 Plus v2 User’s Guide
Copyright
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Copyright 3
ZyXEL G-2000 Plus v2 User’s Guide
Federal Communications Commission (FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation
Certifications
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
4 Certifications
ZyXEL G-2000 Plus v2 User’s Guide
ZyXEL Communications Corporation declared that P-662H/HW-Dx is limited in CH1~11
from 2400 to 2483.5 MHz by specified firmware controlled in USA.
Certifications
1 Go to www.zyxel.com
2 Select your product from the drop-down list box on the ZyXEL home
page to go to that product's page.
3 Select the certification you wish to view from this page.
Certifications 5
ZyXEL G-2000 Plus v2 User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger
telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them.
Do NOT allow anything to rest on the power cord and do NOT locate the product where
anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be
damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings
6 Safety Warnings
ZyXEL G-2000 Plus v2 User’s Guide
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty
shall not apply if the product has been modified, misused, tampered with, damaged by an act
of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
ZyXEL Limited Warranty 7
ZyXEL G-2000 Plus v2 User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Customer Support
METHOD
LOCATION
CORPORATE
HEADQUARTERS
(WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
NORWAY
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
1
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp.
6 Innovation Road II
Science Park
Hsinchu 300
Ta iw a n
Czech s.r.o.
Modranská 621
143 01 Praha 4 - Modrany
Ceská Republika
Columbusvej
2860 Soeborg
Denmark
Malminkaari 10
00700 Helsinki
Finland
1 rue des Vergers
Bat. 1 / C
69760 Limonest
France
Adenauerstr. 20/A2 D-52146
Wuerselen
Germany
48, Zoldlomb Str.
H-1025, Budapest
Hungary
43, Dostyk ave.,Office 414
Dostyk Business Centre
050010, Almaty
Republic of Kazakhstan
1130 N. Miller St.
Anaheim
CA 92806-2001
U.S.A.
Nils Hansens vei 13
0667 Oslo
Norway
8 Customer Support
ZyXEL G-2000 Plus v2 User’s Guide
METHOD
LOCATION
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
1. “+” is the (prefix) number you enter to make an international telephone call.
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
info@pl.zyxel.com +48-22-5286603 www.pl.zyxel.com ZyXEL Communications
+48-22-5206701
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
1
WEB SITE
REGULAR MAIL
ul.Emilli Plater 53
00-113 Warszawa
Poland
Ostrovityanova 37a Str.
Moscow, 117279
Russia
Arte, 21 5ª planta
28033 Madrid
Spain
Sjöporten 4, 41764 Göteborg
Sweden
13, Pimonenko Str.
Kiev, 04050
Ukraine
www.zyxel.co.uk ZyXEL Communications UK
Ltd.,11 The Courtyard,
Eastern Road, Bracknell,
Berkshire, RG12 2XB,
United Kingdom (UK)
Customer Support 9
ZyXEL G-2000 Plus v2 User’s Guide
10 Customer Support
ZyXEL G-2000 Plus v2 User’s Guide
Table of Contents
Copyright ..................................................................................................................3
Certifications ............................................................................................................4
Safety Warnings ....................................................................................................... 6
ZyXEL Limited Warranty.......................................................................................... 7
Customer Support.................................................................................................... 8
Table of Contents ................................................................................................... 11
List of Figures ........................................................................................................ 25
List of Tables .......................................................................................................... 31
Preface ....................................................................................................................35
Chapter 1
Getting to Know Your Device ................................................................................ 37
1.1 Introducing the ZyXEL G-2000 Plus v2 .............................................................37
1.2 Features .............................................................................................................37
1.2.1 Physical Features .....................................................................................37
1.2.2 Firmware Features ....................................................................................38
1.3 Applications for the ZyXEL device .....................................................................43
1.3.1 Internet Access and Wireless Network .....................................................43
1.3.2 Firewall for Secure Broadband Internet Access .......................................44
Chapter 2
Introducing the Web Configurator........................................................................ 45
2.1 Web Configurator Overview ...............................................................................45
2.2 Accessing the ZyXEL device Web Configurator ................................................45
2.3 Resetting the ZyXEL device ...............................................................................47
2.3.1 .Procedure To Use The Reset Button .......................................................47
2.3.2 Method of Restoring Factory-Defaults Via Web Configurator ...................47
2.4 Navigating the ZyXEL device Web Configurator ................................................47
Chapter 3
Wizard Setup .......................................................................................................... 51
3.1 Wizard Setup Overview ......................................................................................51
3.2 General Setup ....................................................................................................51
Table of Contents 11
ZyXEL G-2000 Plus v2 User’s Guide
3.3 Wizard Setup Wireless LAN ...............................................................................52
3.3.1 Name (SSID), Channel ID and Security ...................................................53
3.3.2 Configuring WEP or WPA(2)-PSK Security ...............................................54
3.3.3 Confirm Security Settings ..........................................................................55
3.4 Wizard Setup WAN ............................................................................................56
3.4.1 Ethernet .....................................................................................................56
3.4.2 PPPoE Encapsulation................................................................................58
3.4.3 PPTP Encapsulation..................................................................................59
3.5 Wizard Setup WAN IP .......................................................................................61
3.5.1 WAN IP Address Assignment ...................................................................61
3.5.2 IP Address and Subnet Mask ...................................................................61
3.5.3 DNS Server Address Assignment .............................................................62
3.5.4 WAN MAC Address ..................................................................................62
3.6 Basic Setup Complete ........................................................................................64
Chapter 4
System Screens ..................................................................................................... 67
4.1 System Overview ...............................................................................................67
4.2 Configuring General Setup .............................................................................67
4.3 Dynamic DNS ...................................................................................................68
4.3.1 DynDNS Wildcard .....................................................................................68
4.4 Configuring Dynamic DNS .................................................................................69
4.5 Configuring Password ......................................................................................70
4.6 Configuring Time Setting .................................................................................71
Chapter 5
LAN Screens........................................................................................................... 73
5.1 LAN Overview ....................................................................................................73
5.2 DHCP Setup .......................................................................................................73
5.2.1 IP Pool Setup ............................................................................................73
5.2.2 System DNS Servers ................................................................................73
5.3 LAN TCP/IP ........................................................................................................73
5.3.1 Factory LAN Defaults ................................................................................73
5.3.2 IP Address and Subnet Mask ...................................................................74
5.3.3 RIP Setup .................................................................................................74
5.3.4 Multicast ....................................................................................................74
5.4 Configuring IP ...................................................................................................75
5.5 Configuring Static DHCP ...................................................................................78
5.6 Configuring IP Alias ..........................................................................................79
Chapter 6
Wireless LAN .......................................................................................................... 81
6.1 Wireless Network Overview ...............................................................................81
12 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
6.2 Wireless Security Overview ...............................................................................82
6.2.1 SSID .........................................................................................................82
6.2.2 MAC Address Filter ...................................................................................82
6.2.3 User Authentication ..................................................................................82
6.2.4 Encryption .................................................................................................83
6.3 Additional Wireless Terms ..................................................................................84
6.4 Configuring Wireless .........................................................................................84
6.5 Wireless Security - No Security ..........................................................................86
6.6 Configuring WEP Encryption ..............................................................................87
6.7 Configuring WPA(2)-PSK Authentication ...........................................................89
6.8 Configuring WPA(2) Authentication ....................................................................91
6.9 Configuring RADIUS ..........................................................................................93
6.10 Configuring 802.1x ...........................................................................................95
6.11 MAC Filter ......................................................................................................97
6.12 Configuring Roaming .....................................................................................99
Chapter 7
WAN....................................................................................................................... 101
7.1 WAN Overview .................................................................................................101
7.2 Configuring WAN ISP ......................................................................................101
7.2.1 Ethernet Encapsulation............................................................................101
7.2.1.1 Service Type .................................................................................102
7.2.2 PPPoE Encapsulation .............................................................................103
7.2.3 PPTP Encapsulation ...............................................................................105
7.3 Configuring WAN IP ........................................................................................107
7.4 Configuring WAN MAC ....................................................................................110
Chapter 8
Single User Account (SUA) / Network Address Translation (NAT).................. 113
8.1 NAT Overview ..................................................................................................113
8.1.1 NAT Definitions ....................................................................................... 113
8.1.2 What NAT Does ......................................................................................114
8.1.3 How NAT Works ..................................................................................... 114
8.1.4 NAT Application ......................................................................................115
8.1.5 NAT Mapping Types ............................................................................... 116
8.2 Using NAT ........................................................................................................117
8.2.1 SUA (Single User Account) Versus NAT ................................................117
8.3 SUA Server ......................................................................................................117
8.3.1 Default Server IP Address ......................................................................118
8.3.2 Port Forwarding: Services and Port Numbers ........................................118
8.3.3 Configuring Servers Behind SUA (Example) ..........................................119
8.4 Configuring SUA Server .................................................................................. 119
8.5 Configuring Address Mapping .........................................................................121
Table of Contents 13
ZyXEL G-2000 Plus v2 User’s Guide
8.5.1 Configuring Address Mapping ...............................................................123
8.6 Trigger Port Forwarding ...................................................................................125
8.6.1 Trigger Port Forwarding Example ...........................................................126
8.6.2 Two Points To Remember About Trigger Ports .......................................126
8.7 Configuring Trigger Port Forwarding ...............................................................126
Chapter 9
Static Route Screens ........................................................................................... 129
9.1 Static Route Overview ......................................................................................129
9.2 Configuring IP Static Route ...........................................................................129
9.2.1 Configuring Route Entry .........................................................................131
Chapter 10
Firewalls................................................................................................................ 133
10.1 Firewall Overview ...........................................................................................133
10.2 Types of Firewalls ..........................................................................................133
10.2.1 Packet Filtering Firewalls ......................................................................133
10.2.2 Application-level Firewalls ....................................................................133
10.2.3 Stateful Inspection Firewalls .................................................................134
10.3 Introduction to ZyXEL’s Firewall .....................................................................134
10.4 Denial of Service ............................................................................................135
10.4.1 Basics ...................................................................................................135
10.4.2 Types of DoS Attacks ...........................................................................136
10.4.2.1 ICMP Vulnerability ......................................................................139
10.4.2.2 Traceroute ...................................................................................139
10.5 Stateful Inspection ..........................................................................................140
10.5.1 Stateful Inspection Process ..................................................................140
10.5.2 Stateful Inspection and the ZyXEL device ............................................141
10.5.3 TCP Security .........................................................................................142
10.5.4 UDP/ICMP Security ..............................................................................142
10.5.5 Upper Layer Protocols ..........................................................................142
10.6 Guidelines For Enhancing Security With Your Firewall ..................................143
10.7 Packet Filtering Vs Firewall ............................................................................143
10.7.1 Packet Filtering: ....................................................................................143
10.7.1.1 When To Use Filtering .................................................................144
10.7.2 Firewall .................................................................................................144
10.7.2.1 When To Use The Firewall ..........................................................144
Chapter 11
Firewall Screens................................................................................................... 145
11.1 Access Methods .............................................................................................145
11.2 Firewall Policies Overview ..............................................................................145
11.3 Rule Logic Overview ......................................................................................146
14 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
11.3.1 Rule Checklist .......................................................................................146
11.3.2 Security Ramifications ..........................................................................146
11.3.3 Key Fields For Configuring Rules .........................................................147
11.3.3.1 Action ...........................................................................................147
11.3.3.2 Service .........................................................................................147
11.3.3.3 Source Address ...........................................................................147
11.3.3.4 Destination Address ....................................................................147
11.4 Connection Direction Examples .....................................................................147
11.4.1 LAN to WAN Rules ................................................................................148
11.4.2 WAN to LAN Rules ................................................................................148
11.5 Alerts ..............................................................................................................149
11.6 Configuring Firewall .......................................................................................149
11.6.1 Rule Summary ......................................................................................150
11.6.2 Configuring Firewall Rules ...................................................................152
11.6.3 Configuring Custom Services ...............................................................155
11.7 Example Firewall Rule ....................................................................................156
11.8 Predefined Services .......................................................................................159
Chapter 12
Content Filtering ................................................................................................. 163
12.1 Introduction to Content Filtering .....................................................................163
12.2 Restrict Web Features ...................................................................................163
12.3 Days and Times .............................................................................................163
12.4 Configure Content Filtering ...........................................................................163
Chapter 13
Remote Management Screens ............................................................................ 167
13.1 Remote Management Overview .....................................................................167
13.1.1 Remote Management Limitations .........................................................167
13.1.2 Remote Management and NAT ............................................................168
13.1.3 System Timeout ...................................................................................168
13.2 Configuring WWW ........................................................................................168
13.3 Configuring TELNET .....................................................................................169
13.4 Configuring FTP ............................................................................................171
13.5 SNMP ...........................................................................................................172
13.5.1 Supported MIBs ....................................................................................173
13.5.2 SNMP Traps .........................................................................................173
13.5.3 Configuring SNMP ................................................................................174
13.6 Configuring DNS ...........................................................................................175
13.7 Configuring Security ......................................................................................176
Table of Contents 15
ZyXEL G-2000 Plus v2 User’s Guide
Chapter 14
UPnP...................................................................................................................... 179
14.1 Universal Plug and Play Overview ................................................................179
14.1.1 How Do I Know If I'm Using UPnP? ......................................................179
14.1.2 NAT Traversal .......................................................................................179
14.1.3 Cautions with UPnP ..............................................................................179
14.2 UPnP and ZyXEL ...........................................................................................180
14.3 Configuring UPnP .........................................................................................180
14.4 Installing UPnP in Windows Example ............................................................181
14.4.1 Installing UPnP in Windows Me ............................................................181
14.4.2 Installing UPnP in Windows XP ............................................................182
14.5 Using UPnP in Windows XP Example ...........................................................183
14.5.1 Auto-discover Your UPnP-enabled Network Device .............................184
14.5.2 Web Configurator Easy Access ............................................................185
14.5.3 Web Configurator Easy Access ............................................................186
Chapter 15
Internal RADIUS Server ....................................................................................... 189
15.1 Internal RADIUS Overview .............................................................................189
15.2 Internal RADIUS Server Setting ....................................................................191
15.3 Trusted AP Overview .....................................................................................193
15.4 Configuring Trusted AP .................................................................................194
15.5 Trusted Users Overview .................................................................................195
15.6 Configuring Trusted Users ............................................................................195
Chapter 16
Certificates............................................................................................................ 199
16.1 Certificates Overview .....................................................................................199
16.1.1 Advantages of Certificates ....................................................................200
16.2 Self-signed Certificates ..................................................................................200
16.3 Configuration Summary .................................................................................200
16.4 My Certificates ..............................................................................................200
16.5 Certificate File Formats ..................................................................................203
16.6 Importing a Certificate ...................................................................................203
16.7 Creating a Certificate ....................................................................................204
16.8 My Certificate Details ....................................................................................207
16.9 Trusted CAs ..................................................................................................210
16.10 Importing a Trusted CA’s Certificate ............................................................212
16.11 Trusted CA Certificate Details .....................................................................213
Chapter 17
Log Screens.......................................................................................................... 217
17.1 Configuring View Log ...................................................................................217
16 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
17.2 Configuring Log Settings ...............................................................................218
17.3 Configuring Reports ......................................................................................221
Chapter 18
Maintenance ......................................................................................................... 223
18.1 Maintenance Overview ...................................................................................223
18.2 System Status Screen ...................................................................................223
18.2.1 System Statistics....................................................................................225
18.3 DHCP Table Screen ......................................................................................225
18.4 Association List .............................................................................................227
18.5 F/W Upload Screen .......................................................................................228
18.6 Configuration Screen ....................................................................................230
18.6.1 Backup Configuration .........................................................................231
18.6.2 Restore Configuration ..........................................................................231
18.6.3 Back to Factory Defaults ......................................................................233
18.7 Restart Screen ..............................................................................................233
Chapter 19
Introducing the SMT ............................................................................................235
19.1 SMT Introduction ............................................................................................235
19.2 Connect to your ZyXEL device Using Telnet ..................................................235
19.2.1 Entering Password ................................................................................235
19.3 Changing the System Password ....................................................................236
19.4 ZyXEL device SMT Menu Overview Example ...............................................236
19.5 Navigating the SMT Interface .........................................................................237
19.5.1 System Management Terminal Interface Summary ..............................239
19.6 Changing the System Password ....................................................................239
Chapter 20
General Setup....................................................................................................... 241
20.1 General Setup ................................................................................................241
20.1.1 Procedure To Configure Menu 1 ...........................................................241
20.1.2 Procedure to Configure Dynamic DNS .................................................243
Chapter 21
Menu 2 WAN Setup .............................................................................................. 245
21.1 Introduction to WAN .......................................................................................245
21.2 WAN Setup .....................................................................................................245
Chapter 22
LAN Setup............................................................................................................. 247
22.1 LAN Setup ......................................................................................................247
22.1.1 General Ethernet Setup ........................................................................247
Table of Contents 17
ZyXEL G-2000 Plus v2 User’s Guide
22.2 Protocol Dependent Ethernet Setup ..............................................................248
22.3 TCP/IP Ethernet Setup and DHCP ................................................................248
22.3.1 IP Alias Setup .......................................................................................250
22.4 Wireless LAN Setup .......................................................................................252
22.4.1 Configuring MAC Address Filter ...........................................................254
Chapter 23
Internet Access .................................................................................................... 257
23.1 Introduction to Internet Access Setup ............................................................257
23.2 Ethernet Encapsulation ..................................................................................257
23.3 Configuring the PPTP Client ..........................................................................258
23.4 Configuring the PPPoE Client ........................................................................260
23.5 Basic Setup Complete ....................................................................................261
Chapter 24
Remote Node Configuration ............................................................................... 263
24.1 Introduction to Remote Node Setup ...............................................................263
24.2 Remote Node Profile Setup ...........................................................................263
24.2.1 Ethernet Encapsulation .........................................................................263
24.2.2 PPPoE Encapsulation ...........................................................................266
24.2.2.1 Outgoing Authentication Protocol ................................................266
24.2.2.2 Nailed-Up Connection .................................................................266
24.2.3 PPTP Encapsulation .............................................................................267
24.3 Edit IP .............................................................................................................269
24.4 Remote Node Filter ........................................................................................271
Chapter 25
Static Route Setup ............................................................................................... 273
25.1 IP Static Route Setup .....................................................................................273
Chapter 26
Dial-in User Setup ................................................................................................ 275
26.1 Dial-in User Setup ..........................................................................................275
Chapter 27
Network Address Translation (NAT)................................................................... 277
27.1 Using NAT ......................................................................................................277
27.1.1 SUA (Single User Account) Versus NAT ..............................................277
27.2 Applying NAT .................................................................................................277
27.3 NAT Setup ......................................................................................................279
27.3.1 Address Mapping Sets ..........................................................................279
27.3.1.1 User-Defined Address Mapping Sets ..........................................281
27.3.1.2 Ordering Your Rules ....................................................................282
18 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
27.4 Configuring a Server behind NAT ..................................................................284
27.5 General NAT Examples ..................................................................................285
27.5.1 Example 1: Internet Access Only ..........................................................286
27.5.2 Example 2: Internet Access with an Inside Server ...............................286
27.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............287
27.5.4 Example 4: NAT Unfriendly Application Programs ...............................291
27.6 Configuring Trigger Port Forwarding .............................................................292
Chapter 28
Filter Configuration.............................................................................................. 295
28.1 Introduction to Filters ......................................................................................295
28.1.1 The Filter Structure of the ZyXEL device ..............................................296
28.2 Configuring a Filter Set ..................................................................................297
28.2.1 Configuring a Filter Rule .......................................................................300
28.2.2 Configuring a TCP/IP Filter Rule ..........................................................300
28.2.3 Configuring a Generic Filter Rule .........................................................304
28.3 Example Filter ................................................................................................306
28.4 Filter Types and NAT ......................................................................................309
28.5 Firewall Versus Filters ....................................................................................309
28.6 Applying a Filter ............................................................................................309
28.6.1 Applying LAN Filters .............................................................................309
28.6.2 Applying Remote Node Filters ..............................................................310
Chapter 29
Enabling the Firewall ........................................................................................... 311
29.1 Remote Management and the Firewall .......................................................... 311
29.2 Access Methods ............................................................................................. 311
29.3 Enabling the Firewall ...................................................................................... 311
Chapter 30
SNMP Configuration ............................................................................................ 313
30.1 About SNMP ..................................................................................................313
30.2 Supported MIBs ............................................................................................314
30.3 SNMP Configuration ......................................................................................314
30.4 SNMP Traps ...................................................................................................315
Chapter 31
System Security ................................................................................................... 317
31.1 System Security .............................................................................................317
31.1.1 System Password .................................................................................317
31.1.2 Configuring External RADIUS Server ...................................................317
31.1.3 802.1x ...................................................................................................319
Table of Contents 19
ZyXEL G-2000 Plus v2 User’s Guide
Chapter 32
System Information and Diagnosis .................................................................... 323
32.1 System Status ................................................................................................323
32.2 System Information ........................................................................................325
32.2.1 System Information ...............................................................................325
32.2.2 Console Port Speed ..............................................................................326
32.3 Log and Trace ................................................................................................326
32.3.1 Viewing Error Log .................................................................................326
32.3.2 UNIX Syslog .........................................................................................327
32.3.2.1 CDR ............................................................................................328
32.3.2.2 Packet triggered ..........................................................................328
32.3.2.3 Filter log .....................................................................................329
32.3.2.4 PPP log ......................................................................................329
32.3.2.5 Firewall log ..................................................................................330
32.3.3 Call-Triggering Packet ..........................................................................330
32.4 Diagnostic ......................................................................................................331
32.4.1 WAN DHCP ..........................................................................................332
Chapter 33
Firmware and Configuration File Maintenance ................................................. 335
33.1 Filename Conventions ...................................................................................335
33.2 Backup Configuration .....................................................................................336
33.2.1 Backup Configuration Using FTP .........................................................336
33.2.2 Using the FTP command from the DOS Prompt ..................................337
33.2.3 GUI-based FTP Clients .........................................................................338
33.2.4 TFTP and FTP over WAN Management Limitations .............................338
33.2.5 Backup Configuration Using TFTP .......................................................339
33.2.6 Example: TFTP Command ...................................................................339
33.2.7 GUI-based TFTP Clients ......................................................................340
33.3 Restore Configuration ...................................................................................340
33.3.1 Restore Using FTP ...............................................................................340
33.3.2 Restore Using FTP Session Example ..................................................341
33.4 Uploading Firmware and Configuration Files .................................................342
33.4.1 Firmware Upload ..................................................................................342
33.4.2 Configuration File Upload .....................................................................343
33.4.3 Using the FTP command from the DOS Prompt Example ...................343
33.4.4 TFTP File Upload ..................................................................................344
33.4.5 Example: TFTP Command ...................................................................345
Chapter 34
System Maintenance and Information ...............................................................347
34.1 Command Interpreter Mode ...........................................................................347
34.2 Call Control Support .......................................................................................348
20 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
34.2.1 Budget Management ............................................................................349
34.2.2 Call History ...........................................................................................350
34.3 Time and Date Setting ....................................................................................351
34.3.1 Resetting the Time ................................................................................353
Chapter 35
Remote Management ........................................................................................... 355
35.1 Remote Management .....................................................................................355
35.1.1 Telnet ....................................................................................................356
35.1.2 FTP .......................................................................................................357
35.1.3 Web ......................................................................................................357
35.1.4 Remote Management Limitations .........................................................357
35.2 Remote Management and NAT ......................................................................357
35.3 System Timeout .............................................................................................358
Chapter 36
Call Scheduling .................................................................................................... 359
36.1 Introduction to Call Scheduling ......................................................................359
Chapter 37
Troubleshooting ................................................................................................... 363
Problems Starting Up the ZyXEL device ................................................................ 363
Problems with the Ethernet Interface ..................................................................... 363
Problems with the Password.................................................................................. 364
Problems with Telnet .............................................................................................. 364
Problems with the WLAN Interface ........................................................................ 364
Appendix A
Product Specifications ....................................................................................... 365
Appendix B
Brute-Force Password Guessing Protection..................................................... 367
Example ................................................................................................................. 367
Appendix C
Setting up Your Computer’s IP Address............................................................ 369
Windows 95/98/Me................................................................................................. 369
Windows 2000/NT/XP ............................................................................................ 372
Macintosh OS 8/9................................................................................................... 376
Macintosh OS X ..................................................................................................... 378
Appendix D
IP Address Assignment Conflicts ......................................................................381
Table of Contents 21
ZyXEL G-2000 Plus v2 User’s Guide
Case A: The ZyXEL device is using the same LAN and WAN IP addresses......... 381
Case B: The ZyXEL device LAN IP address conflicts with the DHCP client IP address
381
Case C: The Subscriber IP address is the same as the IP address of a network device
382
Case D: Two or more subscribers have the same IP address. .............................. 382
Appendix E
IP Subnetting ........................................................................................................ 385
IP Addressing......................................................................................................... 385
IP Classes .............................................................................................................. 385
Subnet Masks ........................................................................................................ 386
Subnetting .............................................................................................................. 386
Example: Two Subnets .......................................................................................... 387
Example: Four Subnets.......................................................................................... 389
Example Eight Subnets.......................................................................................... 390
Subnetting With Class A and Class B Networks. ................................................... 391
Appendix F
Command Interpreter........................................................................................... 393
Command Syntax................................................................................................... 393
Command Usage ................................................................................................... 393
Appendix G
Log Descriptions.................................................................................................. 395
Log Commands...................................................................................................... 396
Log Command Example......................................................................................... 398
Appendix H
Wireless LAN and IEEE 802.11 ...........................................................................399
Benefits of a Wireless LAN .................................................................................... 399
Wireless LAN Basics.............................................................................................. 402
Fragmentation Threshold ....................................................................................... 403
IEEE 802.11 ........................................................................................................... 404
Appendix I
Wireless LAN Security......................................................................................... 405
IEEE 802.11g Wireless LAN .................................................................................. 405
IEEE 802.1x ........................................................................................................... 405
RADIUS.................................................................................................................. 406
Types of Authentication.......................................................................................... 407
WEP Authentication ............................................................................................... 408
22 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
WPA(2) ................................................................................................................... 410
Security Parameters Summary .............................................................................. 413
Appendix J
Types of EAP Authentication.............................................................................. 417
EAP-MD5 (Message-Digest Algorithm 5)............................................................... 417
EAP-TLS (Transport Layer Security)...................................................................... 417
EAP-TTLS (Tunneled Transport Layer Service) .................................................... 417
PEAP (Protected EAP)........................................................................................... 418
LEAP ...................................................................................................................... 418
Appendix K
Roaming................................................................................................................ 419
Roaming Overview................................................................................................. 419
Appendix L
Antenna Selection and Positioning Recommendation..................................... 421
Antenna Characteristics ......................................................................................... 421
Types of Antennas For WLAN................................................................................ 422
Connector Type...................................................................................................... 422
Appendix M
Triangle Route ...................................................................................................... 423
The Ideal Setup...................................................................................................... 423
The “Triangle Route” Problem................................................................................ 423
The “Triangle Route” Solutions .............................................................................. 424
IP Aliasing .............................................................................................................. 424
Gateways on the WAN Side................................................................................... 425
Table of Contents 23
ZyXEL G-2000 Plus v2 User’s Guide
24 Table of Contents
ZyXEL G-2000 Plus v2 User’s Guide
List of Figures
Figure 1 Internet Access Application ..................................................................... 44
Figure 2 Firewall Application .................................................................................. 44
Figure 3 Change Password Screen ....................................................................... 46
Figure 4 Replace Certificate Screen ...................................................................... 46
Figure 5 The MAIN MENU Screen of the Web Configurator .................................. 48
Figure 6 Enter System and Domain Names. .......................................................... 52
Figure 7 Enter Name and Select Security .............................................................. 53
Figure 8 Wireless LAN Basic Security ................................................................... 54
Figure 9 Wireless LAN Extend Security ................................................................. 55
Figure 10 LAN Setup Confirmation ........................................................................ 56
Figure 11 Ethernet Encapsulation .......................................................................... 57
Figure 12 PPPoE Encapsulation ............................................................................ 59
Figure 13 PPTP Encapsulation .............................................................................. 60
Figure 14 WAN Setup ............................................................................................ 63
Figure 15 Wizard Finish ......................................................................................... 65
Figure 16 System General Setup ........................................................................... 67
Figure 17 DDNS ..................................................................................................... 69
Figure 18 Password. .............................................................................................. 70
Figure 19 Time Setting ........................................................................................... 71
Figure 20 LAN IP .................................................................................................... 76
Figure 21 Static DHCP ........................................................................................... 79
Figure 22 IP Alias ................................................................................................... 80
Figure 23 Example of a Wireless Network ............................................................. 81
Figure 24 Wireless ................................................................................................ 85
Figure 25 Wireless: No Security ............................................................................. 87
Figure 26 Wireless: Static WEP Encryption ........................................................... 88
Figure 27 Wireless: WPA(2)-PSK .......................................................................... 90
Figure 28 Wireless: WPA(2) ................................................................................... 92
Figure 29 Wireless: WPA(2) ................................................................................... 94
Figure 30 Wireless: 802.1x .................................................................................... 96
Figure 31 MAC Address Filter ................................................................................ 98
Figure 32 Roaming ................................................................................................. 99
Figure 33 Ethernet Encapsulation .......................................................................... 102
Figure 34 Ethernet Encapsulation .......................................................................... 103
Figure 35 PPPoE Encapsulation ............................................................................ 104
Figure 36 PPTP Encapsulation .............................................................................. 106
Figure 37 WAN: IP ................................................................................................ 108
Figure 38 MAC Setup ............................................................................................. 110
List of Figures 25
ZyXEL G-2000 Plus v2 User’s Guide
Figure 39 How NAT Works ..................................................................................... 115
Figure 40 NAT Application With IP Alias ................................................................ 116
Figure 41 Multiple Servers Behind NAT Example .................................................. 119
Figure 42 SUA/NAT Setup ..................................................................................... 120
Figure 43 Address Mapping ................................................................................... 122
Figure 44 Address Mapping Edit ............................................................................ 124
Figure 45 Trigger Port Forwarding Process: Example ........................................... 126
Figure 46 Trigger Port ............................................................................................ 127
Figure 47 Example of Static Routing Topology ...................................................... 129
Figure 48 Static Route ............................................................................................ 130
Figure 49 Static Route: Edit ................................................................................... 131
Figure 50 ZyXEL device Firewall Application ......................................................... 135
Figure 51 Three-Way Handshake .......................................................................... 137
Figure 52 SYN Flood .............................................................................................. 138
Figure 53 Smurf Attack .......................................................................................... 139
Figure 54 Stateful Inspection .................................................................................. 140
Figure 55 LAN to WAN Traffic ................................................................................ 148
Figure 56 WAN to LAN Traffic ................................................................................ 149
Figure 57 Default Rule .......................................................................................... 150
Figure 58 Rule Summary ....................................................................................... 151
Figure 59 Creating/Editing A Firewall Rule ............................................................ 153
Figure 60 Creating/Editing A Custom Service ........................................................ 155
Figure 61 Rule Summary ....................................................................................... 156
Figure 62 Rule Edit Example ................................................................................. 157
Figure 63 Edit Custom Service Example ............................................................... 157
Figure 64 My Service Rule Configuration .............................................................. 158
Figure 65 My Service Example Rule Summary ..................................................... 159
Figure 66 Content Filter ......................................................................................... 164
Figure 67 Remote Management: WWW ................................................................ 169
Figure 68 Telnet Configuration on a TCP/IP Network ............................................ 170
Figure 69 Remote Management: Telnet ................................................................. 170
Figure 70 Remote Management: FTP .................................................................... 171
Figure 71 SNMP Management Model .................................................................... 172
Figure 72 Remote Management: SNMP ................................................................ 174
Figure 73 Remote Management: DNS ................................................................... 176
Figure 74 Security .................................................................................................. 177
Figure 75 Configuring UPnP .................................................................................. 180
Figure 76 ZyXEL device Authenticates Wireless Stations ..................................... 190
Figure 77 ZyXEL device Authenticates other AP’s ................................................ 190
Figure 78 Internal RADIUS Server Setting Screen ............................................... 192
Figure 79 Trusted AP Overview ............................................................................. 193
Figure 80 Trusted AP Screen ................................................................................. 194
Figure 81 Trusted Users Screen ............................................................................ 196
26 List of Figures
ZyXEL G-2000 Plus v2 User’s Guide
Figure 82 My Certificates ....................................................................................... 201
Figure 83 My Certificate Import .............................................................................. 204
Figure 84 My Certificate Create ............................................................................. 205
Figure 85 My Certificate Details ............................................................................. 208
Figure 86 Trusted CAs ........................................................................................... 211
Figure 87 Trusted CA Import .................................................................................. 212
Figure 88 Trusted CA Details ................................................................................. 214
Figure 89 View Log ................................................................................................ 217
Figure 90 Log Settings ........................................................................................... 219
Figure 91 Reports .................................................................................................. 221
Figure 92 System Status ........................................................................................ 224
Figure 93 System Status: Show Statistics .............................................................. 225
Figure 94 Maintenance DHCP Table ...................................................................... 226
Figure 95 Association List ...................................................................................... 227
Figure 96 Firmware Upload .................................................................................... 228
Figure 97 Firmware Upload In Process .................................................................. 229
Figure 98 Network Temporarily Disconnect ........................................................... 229
Figure 99 Firmware Upload Error ........................................................................... 230
Figure 100 Configuration ........................................................................................ 231
Figure 101 Configuration Upload Successful ......................................................... 232
Figure 102 Network Temporarily Disconnected ..................................................... 232
Figure 103 Configuration Upload Error .................................................................. 233
Figure 104 Reset Warning Message ...................................................................... 233
Figure 105 Restart Screen ..................................................................................... 234
Figure 106 Login Screen ........................................................................................ 235
Figure 107 Login Screen ........................................................................................ 236
Figure 108 Menu 23.1 System Security : Change Password ................................. 236
Figure 109 ZyXEL device SMT Menu Overview Example ..................................... 237
Figure 110 ZyXEL device SMT Main Menu ........................................................... 239
Figure 111 Menu 23: System Security .................................................................... 240
Figure 112 Menu 23 System Password ................................................................. 240
Figure 113 Menu 1 General Setup ......................................................................... 242
Figure 114 Menu 1.1 Configure Dynamic DNS ..................................................... 243
Figure 115 Menu 2 WAN Setup .............................................................................. 245
Figure 116 Menu 3 LAN Setup .............................................................................. 247
Figure 117 Menu 3.1 LAN Port Filter Setup. .......................................................... 247
Figure 118 Menu 3.2 TCP/IP Setup ....................................................................... 248
Figure 119 Physical Network & Partitioned Logical Networks ................................ 250
Figure 120 Menu 3.2.1: IP Alias Setup .................................................................. 251
Figure 121 Menu 3.5 Wireless LAN Setup ............................................................. 253
Figure 122 Menu 3.5 Wireless LAN Setup ............................................................ 255
Figure 123 Menu 3.5.1 WLAN MAC Address Filter ............................................... 255
Figure 124 Menu 4 Internet Access Setup ............................................................. 257
List of Figures 27
ZyXEL G-2000 Plus v2 User’s Guide
Figure 125 Internet Access Setup (PPTP) ............................................................ 259
Figure 126 Internet Access Setup (PPPoE) ........................................................... 260
Figure 127 Menu 11.1 Remote Node Profile for Ethernet Encapsulation ............... 264
Figure 128 Menu 11.1 Remote Node Profile for PPPoE Encapsulation ................. 266
Figure 129 Menu 11.1 Remote Node Profile for PPTP Encapsulation ................... 268
Figure 130 Menu 11.3 Remote Node Network Layer Options for Ethernet
Figure 131 Menu 11.5: Remote Node Filter (Ethernet Encapsulation) ................... 271
Figure 132 Menu 11.5: Remote Node Filter (PPPoE and PPTP Encapsulation) ... 271
Figure 133 Menu 12 IP Static Route Setup ........................................................... 273
Figure 134 Menu12.1 Edit IP Static Route ............................................................. 273
Figure 135 Menu 14- Dial-in User Setup ................................................................ 275
Figure 136 Menu 14.1- Edit Dial-in User ................................................................ 276
Figure 137 Menu 4 Applying NAT for Internet Access ........................................... 278
Figure 138 Menu 11.3 Applying NAT to the Remote Node .................................... 278
Figure 139 Menu 15 NAT Setup ............................................................................. 279
Figure 140 Menu 15.1 Address Mapping Sets ....................................................... 280
Figure 141 Menu 15.1.255 SUA Address Mapping Rules .................................... 280
Figure 142 Menu 15.1.1 First Set ........................................................................... 281
Figure 143 .Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ........... 283
Figure 144 Menu 15.2.1 NAT Server Setup ........................................................... 285
Figure 145 Multiple Servers Behind NAT Example ................................................ 285
Figure 146 NAT Example 1 .................................................................................... 286
Figure 147 Menu 4 Internet Access & NAT Example ............................................ 286
Figure 148 NAT Example 2 .................................................................................... 287
Figure 149 Menu 15.2.1 Specifying an Inside Server ............................................ 287
Figure 150 NAT Example 3 .................................................................................... 288
Figure 151 NAT Example 3: Menu 11.3 ................................................................. 289
Figure 152 Example 3: Menu 15.1.1.1 .................................................................. 290
Figure 153 Example 3: Final Menu 15.1.1 ............................................................. 290
Figure 154 Example 3: Menu 15.2 ......................................................................... 291
Figure 155 NAT Example 4 .................................................................................... 291
Figure 156 Example 4: Menu 15.1.1.1 Address Mapping Rule. ............................. 292
Figure 157 Example 4: Menu 15.1.1 Address Mapping Rules ............................... 292
Figure 158 Menu 15.3 Trigger Port Setup .............................................................. 293
Figure 159 Outgoing Packet Filtering Process ....................................................... 295
Figure 160 Filter Rule Process ............................................................................... 297
Figure 161 Menu 21: Filter and Firewall Setup ...................................................... 298
Figure 162 Menu 21.1: Filter Set Configuration ..................................................... 298
Figure 163 Menu 21.1.1.1 TCP/IP Filter Rule. ....................................................... 301
Figure 164 Executing an IP Filter ........................................................................... 304
Figure 165 Menu 21.1.4.1 Generic Filter Rule ....................................................... 305
Figure 166 Telnet Filter Example ........................................................................... 307
Encapsulation ............................................................................... 269
28 List of Figures
ZyXEL G-2000 Plus v2 User’s Guide
Figure 167 Example Filter: Menu 21.1.3.1 ............................................................. 307
Figure 168 Example Filter Rules Summary: Menu 21.1.3 ..................................... 308
Figure 169 Protocol and Device Filter Sets ............................................................ 309
Figure 170 Filtering LAN Traffic ............................................................................. 310
Figure 171 Filtering Remote Node Traffic .............................................................. 310
Figure 172 Menu 21.2 Firewall Setup .................................................................... 312
Figure 173 SNMP Management Model .................................................................. 313
Figure 174 Menu 22 SNMP Configuration ............................................................ 315
Figure 175 Menu 23 System Security .................................................................... 317
Figure 176 Menu 23 System Security .................................................................... 318
Figure 177 Menu 23.2 System Security : RADIUS Server ..................................... 318
Figure 178 Menu 23 System Security .................................................................... 319
Figure 179 Menu 23.4 System Security : IEEE802.1x ........................................... 320
Figure 180 Menu 24 System Maintenance ............................................................ 323
Figure 181 Menu 24.1 System Maintenance : Status ............................................ 324
Figure 182 Menu 24.2 System Information and Console Port Speed .................... 325
Figure 183 Menu 24.2.1 System Information : Information .................................... 325
Figure 184 Menu 24.2.2 System Maintenance : Change Console Port Speed ...... 326
Figure 185 Menu 24.3 System Maintenance : Log and Trace ............................... 327
Figure 186 Menu 24.3.2 System Maintenance : UNIX Syslog .............................. 327
Figure 187 Call-Triggering Packet Example ........................................................... 331
Figure 188 LAN & WAN DHCP .............................................................................. 333
Figure 189 Menu 24.5 Backup Configuration ......................................................... 337
Figure 190 FTP Session Example ......................................................................... 338
Figure 191 Menu 24.6 Restore Configuration ........................................................ 341
Figure 192 Restore Using FTP Session Examplei ................................................. 341
Figure 193 Menu 24.7 System Maintenance: Upload Firmware ............................ 342
Figure 194 Menu 24.7.1 System Maintenance : Upload System Firmware ........... 343
Figure 195 Menu 24.7.2 System Maintenance: Upload System Configuration File 343
Figure 196 FTP Session Example ......................................................................... 344
Figure 197 Menu 24 System Maintenance ............................................................ 348
Figure 198 Valid CI Commands ............................................................................. 348
Figure 199 Menu 24.9 System Maintenance : Call Control .................................... 349
Figure 200 Budget Management ............................................................................ 349
Figure 201 Menu 24.9.2 - Call History ................................................................... 350
Figure 202 Menu 24.10 System Maintenance : Time and Date Setting ................. 352
Figure 203 Menu 24.11 – Remote Management Control ....................................... 356
Figure 204 Telnet Configuration on a TCP/IP Network .......................................... 357
Figure 205 Menu 26 Schedule Setup ..................................................................... 359
Figure 206 Menu 26.1 Schedule Set Setup .......................................................... 360
Figure 207 Applying Schedule Set(s) to a Remote Node (PPPoE) ....................... 362
Figure 208 WIndows 95/98/Me: Network: Configuration ........................................ 370
Figure 209 Windows 95/98/Me: TCP/IP Properties: IP Address ............................ 371
List of Figures 29
ZyXEL G-2000 Plus v2 User’s Guide
Figure 210 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............... 372
Figure 211 Windows XP: Start Menu ...................................................................... 373
Figure 212 Windows XP: Control Panel ................................................................. 373
Figure 213 Windows XP: Control Panel: Network Connections: Properties .......... 374
Figure 214 Windows XP: Local Area Connection Properties ................................. 374
Figure 215 Windows XP: Advanced TCP/IP Settings ............................................ 375
Figure 216 Windows XP: Internet Protocol (TCP/IP) Properties ............................ 376
Figure 217 Macintosh OS 8/9: Apple Menu ........................................................... 377
Figure 218 Macintosh OS 8/9: TCP/IP ................................................................... 377
Figure 219 Macintosh OS X: Apple Menu .............................................................. 378
Figure 220 Macintosh OS X: Network .................................................................... 379
Figure 221 IP Address Conflicts: CaseA ................................................................ 381
Figure 222 IP Address Conflicts: Case B .............................................................. 382
Figure 223 IP Address Conflicts: Case C ............................................................... 382
Figure 224 IP Address Conflicts: Case D ............................................................... 383
Figure 225 IBSS (Ad-hoc) Wireless LAN ............................................................... 400
Figure 226 Basic Service Set ................................................................................. 401
Figure 227 Extended Service Set .......................................................................... 402
Figure 228 RTS/CTS ............................................................................................. 403
Figure 229 WEP Authentication Steps ................................................................... 409
Figure 230 WPA with RADIUS Application Example .............................................. 413
Figure 231 Sequences for EAP MD5–Challenge Authentication ........................... 414
Figure 232 Sequences for PEAP, MS–CHAP V2 Authentication ........................... 415
Figure 233 Roaming Example ................................................................................ 420
Figure 234 Ideal Setup ........................................................................................... 423
Figure 235 “Triangle Route” Problem ..................................................................... 424
Figure 236 IP Alias ................................................................................................. 425
Figure 237 Gateways on the WAN Side ................................................................. 425
30 List of Figures