The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Copyright1
Page 3
ZyWALL P1 User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy, and if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
Certifications
1 Go to www.zyxel.com
2 Select your product from the drop-down list box on the ZyXEL
home page to go to that product's page.
3 Select the certification you wish to view from this page
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger
telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them.
Do NOT allow anything to rest on the power cord and do NOT locate the product where
anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be
damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings3
Page 5
ZyWALL P1 User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not
apply if the product is modified, misused, tampered with, damaged by an act of God, or
subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind of character to the
purchaser.
ZyXEL Limited Warranty
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
Safety Warnings
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger
telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
4ZyXEL Limited Warranty
Page 6
ZyWALL P1 User’s Guide
• Place connecting cables carefully so that no one will step on them or stumble over them.
Do NOT allow anything to rest on the power cord and do NOT locate the product where
anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be
damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
ZyXEL Limited Warranty5
Page 7
ZyWALL P1 User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it. .
Note: Register your product online to receive e-mail notices of firmware upgrades and
information at www.zyxel.com for global products, or at www.us.zyxel.com for
North American products.
Your ZyWALL is easy to install and configure.
About This User's Guide
This manual is designed to guide you through the configuration of your ZyWALL for its
various applications.
Note: Use the web configurator or command interpreter interface (CLI) to configure
your ZyWALL. Not all features can be configured through all interfaces.
Related Documentation
• Supporting Disk
Refer to the included CD for support documents.
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
a detailed easy-to-follow connection diagram, default settings, handy checklists and
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• ZyXEL Glossary and Web Site
Please refer to www.zyxel.com for an online glossary of networking terms and additional
support documentation.
User Guide Feedback
Help us help you. E-mail all User Guide-related comments, questions or suggestions for
improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing
Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park,
Hsinchu, 300, Taiwan. Thank you!
Syntax Conventions
• “Enter” means for you to type one or more characters. “Select” or “Choose” means for
you to use one predefined choices.
Preface29
Page 31
ZyWALL P1 User’s Guide
• Mouse action sequences are denoted using a comma. For example, “click the Apple icon,
Control Panels and then Modem” means first click the Apple icon, then point your
mouse pointer to Control Panels and then click Modem.
• For brevity’s sake, we will use “e.g.,” as a shorthand for “for instance”, and “i.e.,” for
“that is” or “in other words” throughout this manual.
• The ZyWALL P1 Internet Security Appliance will be referred to as the ZyWALL in this
User’s Guide.
Graphics Icons Key
ZyWALLComputerNotebook computer
ServerDSLAMFirewall
TelephoneSwitchRouter
VPN Tunnel
30Preface
Page 32
Getting to Know Your ZyWALL
This chapter introduces the main features and applications of the ZyWALL.
1.1 Overview
The ZyWALL can be pre-configured by a network administrator makes an ideal plug-andplay security device for telecommuters who are always on the move and need a secure
connection to the company network through the Internet
By integrating NAT, firewall, certificates and VPN capability, ZyXEL’s ZyWALL is a
complete security solution that protects your computer. In addition, the embedded web
configurator is easy to operate.
ZyWALL P1 User’s Guide
CHAPTER1
1.2 ZyWALL Features
The following sections describe ZyWALL features.
Table 1 Feature Specifications
FEATURESPECIFICATION
Number of Static Routes12
Number of NAT Sessions2048
Number of IPSec VPN Tunnels/Security Associations1
1.2.1 Physical Features
10/100 Mbps Ethernet LAN and WAN
The Ethernet ports are auto-negotiating and auto-crossover.
An auto-negotiating port can detect and adjust to the optimum Ethernet speed (10/100Mpbs)
and duplex mode (full duplex or half duplex) of the connected device.
An auto-crossover (auto-MDI/MDI-X) port automatically works with a straight-through or
crossover Ethernet cable.
Chapter 1 Getting to Know Your ZyWALL31
Page 33
ZyWALL P1 User’s Guide
Time and Date
The ZyWALL allows you to get the current time and date from an external server when you
turn on your ZyWALL. You can also set the time manually. The Real Time Chip (RTC) keeps
track of the time and date.
Reset Button
Use the reset button to restore the factory default password to 1234; IP address to
192.168.167.1, subnet mask to 255.255.255.0 and DHCP server enabled with a pool of 1 with
192.168.167.33 as the client IP address.
1.2.2 Non-Physical Features
IPSec VPN Capability
Establish a Virtual Private Network (VPN) to connect with business partners and branch
offices using data encryption and the Internet to provide secure communications without the
expense of leased site-to-site lines. The ZyWALL VPN is based on the IPSec standard and is
fully interoperable with other IPSec-based VPN products.
X-Auth (Extended Authentication)
X-Auth provides added security for VPN by requiring a VPN client to use a username and
password.
Certificates
The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates
are based on public-private key pairs. Certificates provide a way to exchange public keys for
use in authentication.
SSH
The ZyWALL uses the SSH (Secure Shell) secure communication protocol to provide secure
encrypted communication between two hosts over an unsecured network.
HTTPS
HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL is a web protocol
that encrypts and decrypts web sessions. Use HTTPS for secure web configurator access to the
ZyWALL
32Chapter 1 Getting to Know Your ZyWALL
Page 34
ZyWALL P1 User’s Guide
Firewall
The ZyWALL is a stateful inspection firewall with DoS (Denial of Service) protection. By
default, when the firewall is activated, all incoming traffic from the WAN to the LAN is
blocked unless it is initiated from the LAN. The ZyWALL firewall supports TCP/UDP
inspection, DoS detection and prevention, real time alerts, reports and logs.
Universal Plug and Play (UPnP)
Using the standard TCP/IP protocol, the ZyWALL and other UPnP-enabled devices can
dynamically join a network, obtain an IP address and convey its capabilities to other devices
on the network.
PPPoE
PPPoE facilitates the interaction of a host with an Internet modem to achieve access to highspeed data networks via a familiar "dial-up networking" user interface.
PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of
data from a remote client to a private server, creating a Virtual Private Network (VPN) using a
TCP/IP-based network.
PPTP supports on-demand, multi-protocol and virtual private networking over public
networks, such as the Internet. The ZyWALL supports one PPTP server connection at any
given time.
Dynamic DNS Support
With Dynamic DNS (Domain Name System) support, you can have a static hostname alias for
a dynamic IP address, allowing the host to be more easily accessible from various locations on
the Internet. You must register for this service with a Dynamic DNS service provider.
IP Multicast
Deliver IP packets to a specific group of hosts using IP multicast. IGMP (Internet Group
Management Protocol) is the protocol used to support multicast groups. The latest version is
version 2 (see RFC 2236); the ZyWALL supports both versions 1 and 2.
Static Route
Static routes tell the ZyWALL routing information that it cannot learn automatically through
other means. This can arise in cases where RIP is disabled on the LAN or a remote network is
beyond the one that is directly connected to a remote node.
Chapter 1 Getting to Know Your ZyWALL33
Page 35
ZyWALL P1 User’s Guide
Central Network Management
Central Network Management (CNM) allows an enterprise or service provider network
administrator to manage your ZyWALL. The enterprise or service provider network
administrator can configure your ZyWALL, perform firmware upgrades and do
troubleshooting for you.
SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging
management information between network devices. SNMP is a member of the TCP/IP
protocol suite. Your ZyWALL supports SNMP agent functionality, which allows a manager
station to manage and monitor the ZyWALL through the network. The ZyWALL supports
SNMP version one (SNMPv1).
Network Address Translation (NAT)
Network Address Translation (NAT) allows the translation of an Internet protocol address
used within one network (for example a private IP address used in a local network) to a
different IP address known within another network (for example a public IP address used on
the Internet).
Port Forwarding
Use this feature to forward incoming service requests to a server on your local network. You
may enter a single port number or a range of port numbers to be forwarded, and the local IP
address of the desired server.
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol) allows the individual client computers to
obtain the TCP/IP configuration at start-up from a centralized DHCP server. The ZyWALL
has built-in DHCP server capability, enabled by default, which means it can assign IP
addresses, an IP default gateway and DNS servers to all systems that support the DHCP client.
Full Network Management
The embedded web configurator is an all-platform web-based utility that allows you to easily
access the ZyWALL’s management settings and configure the firewall.
RoadRunner Support
In addition to standard cable modem services, the ZyWALL supports Time Warner’s
RoadRunner Service.
Logging and Tracing
• Built-in message logging and packet tracing.
• Unix syslog facility support.
34Chapter 1 Getting to Know Your ZyWALL
Page 36
• Firewall logs.
Upgrade ZyWALL Firmware via LAN
The firmware of the ZyWALL can be upgraded via the LAN.
Embedded FTP and TFTP Servers
The ZyWALL’s embedded FTP and TFTP servers enable fast firmware upgrades as well as
configuration file backups and restoration.
1.3 Applications
Here are some examples of what you can do with your ZyWALL.
1.3.1 Secure Network Access for Telecommuters
ZyWALL P1 User’s Guide
The following figure shows a VPN network example. A telecommunter can simply connect
the pre-configured ZyWALL and enter the VPN account information to establish a VPN
connection through the Internet to headquaters.
Figure 1 Application: Telecommuters
1.3.2 LAN Network Protection
In most cases, firewalls are deployed to protect the local network (LAN) from attacks
originating from the WAN (such as the Internet). However, security outbreaks are possible on
the LAN via other means (such as file shareing with removable storage devices). You can use
the ZyWALL to provide network security on the LAN.
In the following example, computers in the Sales and Research departments are protected from
each other by the ZyWALLs on the LAN.
Chapter 1 Getting to Know Your ZyWALL35
Page 37
ZyWALL P1 User’s Guide
Figure 2 Application: LAN Network Protection
1.4 ZyWALL Hardware Connection
Refer to the Quick Start Guide for information on hardware connection and basic setup.
1.5 Front Panel LED
The LED and port labels are on the front panel.
Figure 3 Front Panel: LEDs
36Chapter 1 Getting to Know Your ZyWALL
Page 38
ZyWALL P1 User’s Guide
The following table describes the LEDs.
Table 2 Front Panel LEDs
LEDCOLORSTATUSDESCRIPTION
PWROffThe ZyWALL is turned off.
GreenOnThe ZyWALL is turned on.
BlinkingThe ZyWALL is starting.
WANOffThe WAN connection is not ready, or has failed.
GreenOnThe ZyWALL has a successful 10Mbps WAN connection.
BlinkingThe 10M WAN is sending or receiving packets.
AmberOnThe ZyWALL has a successful 100Mbps WAN connection.
BlinkingThe 100M WAN is sending or receiving packets.
VPNOffThe ZyWALL does not have a VON connection.
GreenOnThe ZyWALL has a successful VPN connection.
BlinkingThe ZyWALL is receiving or sending data through the VPN
connection.
ManagedOffThe ZyWALL does not have a CNM connection.
GreenOnThe ZyWALL has a successful CNM connection.
BlinkingThe ZyWALL is receiving or sending data using CNM.
LANOffThe LAN is not connected.
GreenOnThe ZyWALL has a successful 10Mbps LAN connection.
BlinkingThe 10M LAN is sending or receiving packets.
AmberOnThe ZyWALL has a successful 100Mbps LAN connection.
BlinkingThe 100M LAN is sending or receiving packets.
Chapter 1 Getting to Know Your ZyWALL37
Page 39
ZyWALL P1 User’s Guide
38Chapter 1 Getting to Know Your ZyWALL
Page 40
This chapter describes how to access the ZyWALL web configurator and provides an
overview of its screens.
2.1 Overview
The web configurator is an HTML-based management interface that allows easy ZyWALL
setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape
Navigator 7.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.
ZyWALL P1 User’s Guide
CHAPTER2
Introducing the Web
Configurator
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device. Web pop-up blocking is enabled by
default in Windows XP SP (Service Pack) 2.
• JavaScripts (enabled by default).
• Java permissions (enabled by default).
See the Troubleshooting chapter to see how to make sure these functions are allowed in
Internet Explorer.
2.2 Accessing the Web Configurator
Follow the steps below to access the advanced web configurator screens.
1 Make sure your ZyWALL hardware is properly connected and prepare your computer/
computer network to connect to the ZyWALL (refer to the Quick Start Guide).
2 Launch your web browser.
3 Type "192.168.167.1" as the URL.
4 The initial screen displays. Refer to the Quick Start Guide for more information.
5 To log into the ZyWALL, click ADVANCED in the navigation panel.
Chapter 2 Introducing the Web Configurator39
Page 41
ZyWALL P1 User’s Guide
Figure 4 Web Configurator: Initial Screen
6 A login screen displays. Type "1234" (default) as the password and click Login. In some
versions, the default password appears automatically - if this is the case, click Login.
Figure 5 Web Configurator: Login Screen
7 You should see a screen asking you to change your password (highly recommended) as
shown next. Type a new password (and retype it to confirm) and click Apply or click
Ignore.
Note: If you do not change the password, the following screen appears every time
you log in.
40Chapter 2 Introducing the Web Configurator
Page 42
ZyWALL P1 User’s Guide
Figure 6 Change Password Screen
8 Click Apply in the Replace Certificate screen to create a certificate using your
ZyWALL’s MAC address that will be specific to this device.
Note: If you do not replace the default certificate here or in the CERTIFICATES
screen, this screen displays every time you access the web configurator.
Figure 7 Replace Certificate Screen
9 You should now see the HOME screen (see Figure 8 on page 43)
Note: The management session automatically times out when the time period set in
the Administrator Inactivity Timer field expires (default five minutes). Simply
log back into the ZyWALL if this happens to you.
2.3 Resetting the ZyWALL
If you forget your password or cannot access the web configurator, you will need to reload the
factory-default configuration file or use the RESET button on the ZyWALL. Uploading this
configuration file replaces the current configuration file with the factory-default configuration
file. This means that you will lose all configurations that you had previously and the password
will be reset to 1234, also.
Chapter 2 Introducing the Web Configurator41
Page 43
ZyWALL P1 User’s Guide
2.3.1 Procedure to Use the Reset Button
Make sure the PWR LED is on (not blinking) before you begin this procedure.
1 Press the RESET button in for about 10 seconds and release it. When the PWR LED
starts to blink, the defaults have been restored and the ZyWALL restarts. Otherwise, go to
step 2.
2 Turn the ZyWALL off.
3 While pressing the RESET button, turn the ZyWALL on.
4 Continue to hold the RESET button. The PWR LED will begin to blink. This indicates
that the defaults have been restored. Release the RESET button.
5 Wait for the ZyWALL to finish restarting before accessing again.
2.4 Navigating the Web Configurator
The following summarizes how to navigate the web configurator from the HOME screen.
Note: Follow the instructions you see in the HOME screen or click the icon
(located in the top right corner of most screens) to view online help.
2.4.1 The HOME Screen
The following screen shows the HOME screen.
42Chapter 2 Introducing the Web Configurator
Page 44
Figure 8 Web Configurator: HOME
ZyWALL P1 User’s Guide
• Use the submenus to configure ZyWALL features.
• Click LOGOUT at any time to exit the web configurator.
• Click MAINTENANCE to view information about your ZyWALL or upgrade
configuration/firmware files. Maintenance includes General, Password, Time and Date, F/W (firmware) Upload, Configuration (Backup, Restore, Default), and Restart.
The following table describes the labels in this screen.
Table 3 Web Configurator: HOME
LABELDESCRIPTION
Wizards for
Quick Setup
Internet AccessClick Internet Access to use the initial configuration wizard. .
VPN WizardClick VPN Wizard to create VPN policies.
Device
Information
System NameThis is the System Name you enter in the MAINTENANCE General screen. It is for
Firmware Version This is the ZyNOS firmware version and the date created. ZyNOS is ZyXEL's
Routing ProtocolThis shows the routing protocol - IP for which the ZyWALL is configured. This field is
System TimeThis field displays your ZyWALL’s presentdate and time.
identification purposes.
proprietary Network Operating System (NOS) design.
not configurable.
Chapter 2 Introducing the Web Configurator43
Page 45
ZyWALL P1 User’s Guide
Table 3 Web Configurator: HOME (continued)
LABELDESCRIPTION
MemoryThe first number shows how many kilobytes of the heap memory the ZyWALL is
SessionsThe first number shows how many sessions are currently open on the ZyWALL.
Network Status
InterfaceThis is the port type. Port types are: WAN and LAN.
StatusFor the LAN port, this displays the port speed and duplex setting. For the WAN port,
IP AddressThis shows the port’s IP address.
Subnet MaskThis shows the port’s subnet mask.
DHCPThis shows the WAN port’s DHCP role - Client or None.
RenewIf you are using Ethernet encapsulation and the WAN port is configured to get the IP
Show StatisticsClick Show Statistics to see performance statistics such as the number of packets
Show DHCP
Table
VPN StatusClick VPN Status to display the active VPN connections.
using. Heap memory refers to the memory that is not used by ZyNOS (ZyXEL
Network Operating System) and is thus available for running processes like NAT,
VPN and the firewall.
The second number shows the ZyWALL's total heap memory (in kilobytes).
The bar displays what percent of the ZyWALL's heap memory is in use. The bar
turns from green to red when the maximum is being approached.
This includes all sessions that are currently:
•Traversing the ZyWALL
•Terminating at the ZyWALL
•Initiated from the ZyWALL
The second number is the maximum number of sessions that can be open at one
time.
The bar displays what percent of the maximum number of sessions is in use. The
bar turns from green to red when the maximum is being approached.
it displays the port speed and duplex setting if you’re using Ethernet encapsulation
and Down (line is down or not connected), Idle (line (ppp) idle), or Drop (dropping a
call) if you’re using PPPoE encapsulation.
This shows the LAN port’s DHCP role - Server or None.
address automatically from the ISP, click Renew to release the WAN port’s
dynamically assigned IP address and get the IP address afresh. Click Dial to dial up
the PPTP or PPPoE connection.
sent and number of packets received for each port, including WAN and LAN.
Click Show DHCP Table to show current DHCP client information.
2.4.2 Navigation Panel
After you enter the password, use the sub-menus on the navigation panel to configure
ZyWALL features. The following table describes the sub-menus.
44Chapter 2 Introducing the Web Configurator
Page 46
ZyWALL P1 User’s Guide
Table 4 Navigation Panel: Menu Summary
LINKTABFUNCTION
HOMEThis screen shows the ZyWALL’s general device and network
status information. Use this screen to access the wizards, statistics
and DHCP table.
LANLANUse this screen to configure LAN DHCP and TCP/IP settings.
Static DHCP Use this screen to assign fixed IP addresses on the LAN.
WANRouteThis screen allows you to configure route priority and traffic redirect
properties.
WANUse this screen to configure ZyWALL WAN port for internet
access.
DDNSUse this screen to configure dynamic DNS settings.
FIREWALLDefault RuleUse this screen to activate/deactivate the firewall and the direction
of network traffic to which to apply the rule
Rule Summary This screen shows a summary of the firewall rules, and allows you
Anti-ProbingUse this screen to change your anti-probing settings.
ThresholdUse this screen to configure the threshold for DoS attacks.
VPNVPN Rules
(IKE)
SA Monitor Use this screen to display and manage active VPN connections.
Global SettingUse this screen to set the VPN traffic and gateway domain name
CERTIFICATESMy Certificates Use this screen to view a summary list of certificates and manage
Trusted CAsUse this screen to view and manage the list of the trusted CAs.
Trusted
Remote Hosts
Directory
Servers
NATNAT OverviewUse this screen to enable NAT.
Port
Forwarding
Port Triggering Use this screen to change your ZyWALL’s port triggering settings.
STATIC ROUTEIP Static Route Use this screen to configure IP static routes.
to edit/add a firewall rule.
Use this screen to configure VPN connections using IKE and view
the rule summary.
update timers
certificates and certification requests.
Use this screen to view and manage the certificates belonging to
the trusted remote hosts.
Use this screen to view and manage the list of the directory
servers.
Use this screen to configureservers behind the ZyWALL.
Chapter 2 Introducing the Web Configurator45
Page 47
ZyWALL P1 User’s Guide
Table 4 Navigation Panel: Menu Summary (continued)
LINKTABFUNCTION
REMOTE MGMT WWWUse this screen to configure through which interface(s) and from
UPnPUPnPUse this screen to enable UPnP on the ZyWALL.
LOGSView LogUse this screen to view the logs for the categories that you
LOGOUTClick this label to exit the web configurator.
which IP address(es) users can use HTTPS or HTTP to manage
the ZyWALL.
SSHUse this screen to configure through which interface(s) and from
which IP address(es) users can use Secure Shell to manage the
ZyWALL.
TELNETUse this screen to configure through which interface(s) and from
which IP address(es) users can use Telnet to manage the
ZyWALL.
FTPUse this screen to configure through which interface(s) and from
which IP address(es) users can use FTP to access the ZyWALL.
SNMPUse this screen to configure your ZyWALL’s settings for Simple
Network Management Protocol management.
DNSUse this screen to configure through which interface(s) and from
which IP address(es) users can send DNS queries to the ZyWALL.
CNMUse this screen to configure your ZyWALL’s CNM (Central
Network Management) settings to allow management from a
remote CNM server.
PortsUse this screen to view the NAT port mapping rules that UPnP
creates on the ZyWALL.
selected.
Log SettingsUse this screen to change your ZyWALL’s log settings.
ReportsUse this screen to have the ZyWALL record and display the
network usage reports.
PasswordUse this screen to change your password.
Time and Date Use this screen to change your ZyWALL’s time and date.
F/W UploadUse this screen to upload firmware to your ZyWALL
ConfigurationUse this screen to backup and restore the configuration or reset
the factory defaults to your ZyWALL.
RestartThis screen allows you to reboot the ZyWALL without turning the
power off.
2.4.3 System Statistics
Click ShowStatistics in the HOME screen. Read-only information here includes port status
and packet specific statistics. Also provided is "Up Time" and "poll interval(s)". The Poll Interval(s) field is configurable.
46Chapter 2 Introducing the Web Configurator
Page 48
ZyWALL P1 User’s Guide
Figure 9 Home : Show Statistics
The following table describes the labels in this screen.
Table 5 Home: Show Statistics
LABEL DESCRIPTION
PortThis is the WAN or LAN port.
StatusThis displays the port speed and duplex setting if you’re using Ethernet
encapsulation and Down (line is down), Idle (line (ppp) idle), Dial (starting to trigger
a call) or Drop (dropping a call) if you’re using PPPoE encapsulation.
TxPktsThis is the number of transmitted packets on this port.
RxPktsThis is the number of received packets on this port.
CollisionsThis is the number of collisions on this port.
Tx B/sThis displays the transmission speed in bytes per second on this port.
Rx B/sThis displays the reception speed in bytes per second on this port.
Up TimeThis is the total amount of time the line has been up.
System Up Time This is the total time the ZyWALL has been on.
Poll Interval(s)Enter the time interval for refreshing statistics in this field.
Set IntervalClick this button to apply the new poll interval you entered in the Poll Interval(s)
StopClick Stop to stop refreshing statistics.
field.
2.4.4 DHCP Table Screen
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual
clients to obtain TCP/IP configuration at start-up from a server. You can configure the
ZyWALL as a DHCP server or disable it. When configured as a server, the ZyWALL provides
the TCP/IP configuration for the DHCP client. If DHCP service is disabled, you must have
another DHCP server on your LAN, or else the computer must be manually configured.
Click ShowDHCP Table in the HOME screen. Read-only information here relates to your
DHCP status. The DHCP table shows current DHCP client information (including IP Address, HostName and MAC Address) of the network client using the ZyWALL’s DHCP
server.
Chapter 2 Introducing the Web Configurator47
Page 49
ZyWALL P1 User’s Guide
Figure 10 Home: DHCP Table
The following table describes the labels in this screen.
Table 6 Home: DHCP Table
LABEL DESCRIPTION
# This is the index number of the host computer.
IP AddressThis field displays the IP address relative to the # field listed above.
Host Name This field displays the computer host name.
MAC AddressThe MAC (Media Access Control) or Ethernet address on a LAN (Local Area Network)
ReserveSelect this check box to have the ZyWALL always assign this IP address to this MAC
RefreshClick Refresh to reload the DHCP table.
is unique to your computer (six pairs of hexadecimal notation).
A network interface card such as an Ethernet adapter has a hardwired address that is
assigned at the factory. This address follows an industry standard that ensures no
other adapter has a similar address.
address (and host name). You can select up to 8 entries in this table. After you click
Apply, the MAC address and IP address also display in the LAN Static DHCP screen
(where you can edit them).
2.4.5 VPN Status
Click VPN Status in the HOME screen when the ZyWALL. Read-only information here
includes encapsulation mode and security protocol. The Poll Interval(s) field is configurable.
48Chapter 2 Introducing the Web Configurator
Page 50
Figure 11 Home : VPN Status
The following table describes the labels in this screen.
ZyWALL P1 User’s Guide
Table 7 Home: VPN Status
LABELDESCRIPTION
#This is the security association index number.
NameThis field displays the identification name for this VPN policy.
EncapsulationThis field displays Tunnel or Transport mode.
IPSec AlgorithmThis field displays the security protocols used for an SA.
Both AH and ESP increase ZyWALL processing requirements and communications
latency (delay).
Poll Interval(s)Enter the time interval for refreshing statistics in this field.
Set IntervalClick this button to apply the new poll interval you entered in the Poll Interval(s)
field.
StopClick Stop to stop refreshing statistics.
Chapter 2 Introducing the Web Configurator49
Page 51
ZyWALL P1 User’s Guide
50Chapter 2 Introducing the Web Configurator
Page 52
This chapter provides information on the Wizard Setup screens in the advanced web
configurator.
3.1 Overview
The web configurator's setup wizards help you configure the WAN port on the ZyWALL to
access the Internet and edit VPN policies and configure IKE settings to establish a VPN
tunnel.
3.2 Internet Access Wizard Setup
ZyWALL P1 User’s Guide
CHAPTER3
Wizard Setup
The first Internet access wizard screen has three variations depending on what encapsulation
type you use. Refer to your ISP checklist in the Quick Start Guide to know what to enter in
each field. Leave a field blank if you don’t have that information.
3.2.1 ISP Parameters
The ZyWALL offers three choices of encapsulation. They are Ethernet, PPTP or PPPoE.
3.2.2 WAN and DNS
The second wizard screen allows you to configure WAN IP address assignment, DNS server
address assignment and the WAN MAC address.
3.2.2.1 WAN IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated
from the Internet, for instance, only between your two branch offices, you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private
networks.
Table 8 Private IP Address Ranges
10.0.0.0
172.16.0.0
192.168.0.0
Chapter 3 Wizard Setup51
-10.255.255.255
-172.31.255.255
-192.168.255.255
Page 53
ZyWALL P1 User’s Guide
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the
ISP can provide you with the Internet addresses for your local networks. On the other hand, if
you are part of a much larger organization, you should consult your network administrator for
the appropriate IP addresses.
Note: Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address
assignment, please refer to RFC 1597, Address Allocation for Private Internets
and RFC 1466, Guidelines for Management of IP Address Space.
3.2.2.2 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a
LAN share one common network number.
Where you obtain your network number depends on your particular situation. If the ISP or
your network administrator assigns you a block of registered IP addresses, follow their
instructions in selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single
user account and the ISP will assign you a dynamic IP address when the connection is
established. If this is the case, it is recommended that you select a network number from
192.168.0.0 to 192.168.255.0 and you must enable the Network Address Translation (NAT)
feature of the ZyWALL. The Internet Assigned Number Authority (IANA) reserved this block
of addresses specifically for private use; please do not use any other number unless you are
told otherwise. Let's say you select 192.168.1.0 as the network number; which covers 254
individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other
words, the first three numbers specify the network number while the last number identifies an
individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember,
for instance, 192.168.167.1, for your ZyWALL, but make sure that no other device on your
network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your ZyWALL will
compute the subnet mask automatically based on the IP address that you entered. You don't
need to change the subnet mask computed by the ZyWALL unless you are instructed to do
otherwise.
3.2.2.3 DNS Server Address Assignment
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and
vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is
extremely important because without it, you must know the IP address of a computer before
you can access it.
The ZyWALL can get the DNS server addresses in the following ways.
52Chapter 3 Wizard Setup
Page 54
1 The ISP tells you the DNS server addresses, usually in the form of an information sheet,
when you sign up. If your ISP gives you DNS server addresses, manually enter them in
the DNS server fields.
2 If your ISP dynamically assigns the DNS server IP addresses (along with the ZyWALL’s
WAN IP address), set the DNS server fields to get the DNS server address from the ISP.
3 You can manually enter the IP addresses of other DNS servers. These servers can be
public or private. A DNS server could even be behind a remote IPSec router.
3.2.2.4 Ethernet
For ISPs (such as Telstra) that send UDP heartbeat packets to verify that the customer is still
online, please create a WAN-to-WAN/ZyWALL firewall rule for those packets. Contact your
ISP to find the correct port number.
Choose Ethernet when the WAN port is used as a regular Ethernet.
Figure 12 Internet Access Wizard: Ethernet Encapsulation
ZyWALL P1 User’s Guide
The following table describes the labels in this screen
Chapter 3 Wizard Setup53
Page 55
ZyWALL P1 User’s Guide
.
Table 9 Internet Access Wizard: Ethernet Encapsulation
LABELDESCRIPTION
ISP Parameters for Internet Access
EncapsulationYou must choose the Ethernet option when the WAN port is used as a regular
WAN IP Address
Assignment
My WAN IP
Address
My WAN IP
Subnet Mask
Gateway IP
Address
First/Second DNS
Server
FinishClick Finish to save the settings.
Ethernet.
Note: You can select a service type in the advanced WAN screen
(refer to Section 5.3 on page 80).
Select Dynamic If your ISP did not assign you a fixed IP address. This is the
default selection.
Select Static If your ISP assigned a fixed IP address. The set the following fields.
Enter your WAN IP address in this field if you select Static in the WAN IP Address Assignment field.
Enter the IP subnet mask in this field if you select Static in the WAN IP Address Assignment field.
Enter the gateway IP address in this field if you select Static in the WAN IP Address Assignment field.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP
address and vice versa, e.g., the IP address of www.zyxel.com is 204.217.0.2. The
DNS server is extremely important because without it, you must know the IP
address of a computer before you can access it.
Enter the IP address(es) of the DNS server(s) provided by your ISP.
3.2.2.5 PPPoE Encapsulation
Point-to-Point Protocol over Ethernet (PPPoE) functions as a dial-up connection. PPPoE is an
IETF (Internet Engineering Task Force) draft standard specifying how a host personal
computer interacts with a broadband modem (for example xDSL, cable, wireless, etc.) to
achieve access to high-speed data networks. It preserves the existing Microsoft Dial-Up
Networking experience and requires no new learning or procedures.
For the service provider, PPPoE offers an access and authentication method that works with
existing access control systems (for instance, Radius). For the user, PPPoE provides a login
and authentication method that the existing Microsoft Dial-Up Networking software can
activate, and therefore requires no new learning or procedures for Windows users.
One of the benefits of PPPoE is the ability to let end users access one of multiple network
services, a function known as dynamic service selection. This enables the service provider to
easily create and offer new IP services for specific users.
Operationally, PPPoE saves significant effort for both the subscriber and the ISP/carrier, as it
requires no specific configuration of the broadband modem at the subscriber’s site.
54Chapter 3 Wizard Setup
Page 56
ZyWALL P1 User’s Guide
By implementing PPPoE directly on the ZyWALL (rather than individual computers), the
computers on the LAN do not need PPPoE software installed, since the ZyWALL does that
part of the task. Furthermore, with NAT, all of the LAN's computers will have Internet access.
Refer to Appendix C on page 289 for more information on PPPoE.
Figure 13 Internet Access Wizard: PPPoE Encapsulation
The following table describes the related labels in this screen.
Table 10 Internet Access Wizard: PPPoE Encapsulation
LABELDESCRIPTION
ISP Parameter for
Internet Access
EncapsulationChoose an encapsulation method from the pull-down list box. PPP over Ethernet
forms a dial-up connection.
Service Name Type the name of your service provider.
User NameType the user name given to you by your ISP.
Password Type the password associated with the user name above.
Retype Password Type your password again for confirmation.
Chapter 3 Wizard Setup55
Page 57
ZyWALL P1 User’s Guide
Table 10 Internet Access Wizard: PPPoE Encapsulation (continued)
LABELDESCRIPTION
Nailed-Up
Connection
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects
Select Nailed-Up Connection if you do not want the connection to time out.
from the PPPoE server. The default time is 100 seconds.
Refer to Table 9 on page 54 for other label descriptions.
3.2.2.6 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data
from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/
IP-based networks.
PPTP supports on-demand, multi-protocol, and virtual private networking over public
networks, such as the Internet.
Note: Refer to Appendix D on page 291 for more information on PPTP. . The
ZyWALL supports one PPTP server connection at any given time.
56Chapter 3 Wizard Setup
Page 58
Figure 14 Internet Access Wizard: PPTP Encapsulation
ZyWALL P1 User’s Guide
The following table describes the related labels in this screen.
Table 11 Internet Access Wizard: PPTP Encapsulation
LABELDESCRIPTION
ISP Parameters for
Internet Access
EncapsulationSelect PPTP from the drop-down list box.
User NameType the user name given to you by your ISP.
PasswordType the password associated with the User Name above.
Retype PasswordType your password again for confirmation.
Nailed-Up
Connection
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects
PPTP Configuration
My IP AddressType the (static) IP address assigned to you by your ISP.
Chapter 3 Wizard Setup57
Select Nailed-Up Connection if you do not want the connection to time out.
from the PPTP server.
Page 59
ZyWALL P1 User’s Guide
Table 11 Internet Access Wizard: PPTP Encapsulation (continued)
LABELDESCRIPTION
My IP Subnet Mask Type the subnet mask assigned to you by your ISP (if given).
Server IP AddressType the IP address of the PPTP server.
Connection ID/
Name
Enter the connection ID or connection name in this field. It must follow the "c:id"
and "n:name" format. For example, C:12 or N:My ISP.
This field is optional and depends on the requirements of your DSL modem.
Refer to Table 9 on page 54 for other label descriptions.
3.2.3 Internet Access Wizard Setup Complete
Well done! You have successfully set up your ZyWALL to operate on your network and
access the Internet.
Figure 15 Internet Access Wizard: Complete
3.3 VPN Wizard Setup
A VPN (Virtual Private Network) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing technologies/services used to transport traffic over
the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
Use the VPN wizard screens to configure a VPN rule that use a pre-shared key. If you want to
set the rule to use a certificate, please go to the advanced VPN screens for configuration.
58Chapter 3 Wizard Setup
Page 60
3.3.1 IPSec
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer.
3.3.2 Security Association
A Security Association (SA) is a contract between two parties indicating what security
parameters, such as keys and algorithms they will use.
3.3.3 My IP Address
My IP Address identifies the WAN IP address of the ZyWALL. You can enter the
ZyWALL's static WAN IP address (if it has one) or leave the field set to 0.0.0.0. The
ZyWALL has to rebuild the VPN tunnel if the My IP Address changes after setup.
ZyWALL P1 User’s Guide
3.3.4 Secure Gateway Address
Secure Gateway Address is the WAN IP address or domain name of the remote IPSec router
(secure gateway).
If the remote secure gateway has a static WAN IP address, enter it in the Secure Gateway Address field. You may alternatively enter the remote secure gateway’s domain name (if it
has one) in the Secure Gateway Address field.
You can also enter a remote secure gateway’s domain name in the Secure Gateway Address
field if the remote secure gateway has a dynamic WAN IP address and is using DDNS. The
ZyWALL has to rebuild the VPN tunnel each time the remote secure gateway’s WAN IP
address changes (there may be a delay until the DDNS servers are updated with the remote
gateway’s new WAN IP address).
3.3.4.1 Dynamic Secure Gateway Address
If the remote secure gateway has a dynamic WAN IP address and does not use DDNS, enter
0.0.0.0 as the secure gateway’s address. In this case only the remote secure gateway can
initiate SAs. This may be useful for telecommuters initiating a VPN tunnel to the company
network.
3.3.5 VPN Wizard: Gateway Policy Setting
Click VPN Wizard in the HOME screen to open the screen as shown and have the quick and
initial VPN configuration.
Configure the first VPN wizard screen to configure the settings between the ZyWALL and the
remote VPN router.
Chapter 3 Wizard Setup59
Page 61
ZyWALL P1 User’s Guide
Figure 16 VPN Wizard: Gateway Policy Setting
The following table describes the labels in this screen.
Table 12 VPN Wizard: Gateway Policy Setting
LABELDESCRIPTION
Gateway Policy Property
NameType up to 32 characters to identify this VPN gateway policy. You may use any
Gateway Policy Setting
My ZyWALLEnter the WAN IP address or the domain name of your ZyWALL. The ZyWALL uses
Remote
Gateway
NextClick Next to continue.
character, including spaces, but the ZyWALL drops trailing spaces.
its current WAN IP address (static or dynamic) in setting up the VPN tunnel if you
leave this field as 0.0.0.0.
The ZyWALL has to rebuild the VPN tunnel if the IP address changes after setup.
Enter the WAN IP address or the domain name of the IPSec router with which you're
making the VPN connection. Set this field to 0.0.0.0 if the remote IPSec router has a
dynamic WAN IP address.
3.3.6 VPN Wizard: Network Setting
Use the second VPN wizard screen to configure the settings for each LAN network behind the
ZyWALL and the remote VPN router.
Two active SAs cannot have the local and remote IP address(es) both the same. Two active
SAs can have the same local or remote IP address, but not both. You can configure multiple
SAs between the same local and remote IP addresses, as long as only one is active at any time.
60Chapter 3 Wizard Setup
Page 62
Figure 17 VPN Wizard: Network Setting
The following table describes the labels in this screen.
ZyWALL P1 User’s Guide
Table 13 VPN Wizard: Network Setting
LABEL DESCRIPTION
Network Policy Property
ActiveSelect this checkbox to enable this VPN rule.
NameType up to 32 characters to identify this VPN network policy. You may use any
character, including spaces, but the ZyWALL drops trailing spaces.
Network Policy Setting
Local NetworkLocal IP addresses must be static and correspond to the remote IPSec router's
configured remote IP addresses.
Select Single for a single IP address. Select Range IP for a specific range of IP
addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
Starting IP
Address
Ending IP
Address/
Subnet Mask
Remote
Network
When the Local Network field is configured to Single, enter a (static) IP address on
the LAN behind your ZyWALL. When the Local Network field is configured to Range IP, enter the beginning (static) IP address, in a range of computers on the LAN behind
your ZyWALL. When the Local Network field is configured to Subnet, this is a (static)
IP address on the LAN behind your ZyWALL.
When the Local Network field is configured to Single, this field is N/A. When the
Local Network field is configured to Range IP, enter the end (static) IP address, in a
range of computers on the LAN behind your ZyWALL. When the Local Network field
is configured to Subnet, this is a subnet mask on the LAN behind your ZyWALL.
Remote IP addresses must be static and correspond to the remote IPSec router's
configured local IP addresses.
Select Single for a single IP address. Select Range IP for a specific range of IP
addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
Chapter 3 Wizard Setup61
Page 63
ZyWALL P1 User’s Guide
Table 13 VPN Wizard: Network Setting (continued)
LABEL DESCRIPTION
Starting IP
Address
Ending IP
Address/
Subnet Mask
BackClick Back to return to the previous screen.
NextClick Next to continue.
3.3.7 IKE Phases
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1
(Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and
the second one uses that SA to negotiate SAs for IPSec.
Figure 18 Two Phases to Set Up the IPSec SA
When the Remote Network field is configured to Single, enter a (static) IP address
on the network behind the remote IPSec router. When the Remote Network field is
configured to Range IP, enter the beginning (static) IP address, in a range of
computers on the network behind the remote IPSec router. When the Remote Network field is configured to Subnet, enter a (static) IP address on the network
behind the remote IPSec router
When the Remote Network field is configured to Single, this field is not applicable.
When the Remote Network field is configured to Range IP, enter the end (static) IP
address, in a range of computers on the network behind the remote IPSec router.
When the Remote Network field is configured to Subnet, enter a subnet mask on the
network behind the remote IPSec router.
In phase 1 you must:
• Choose a negotiation mode.
• Authenticate the connection by entering a pre-shared key.
• Choose an encryption algorithm.
• Choose an authentication algorithm.
• Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2).
• Set the IKE SA lifetime. This field allows you to determine how long an IKE SA should
stay up before it times out. An IKE SA times out when the IKE SA lifetime period
expires. If an IKE SA times out when an IPSec SA is already established, the IPSec SA
stays connected.
62Chapter 3 Wizard Setup
Page 64
In phase 2 you must:
• Choose which protocol to use (ESP or AH) for the IKE key exchange.
• Choose an encryption algorithm.
• Choose an authentication algorithm
• Choose whether to enable Perfect Forward Secrecy (PFS) using Diffie-Hellman publickey cryptography (see Section 3.3.7 on page 62). Select None (the default) to disable
PFS.
• Choose Tunnel mode or Transport mode.
• Set the IPSec SA lifetime. This field allows you to determine how long the IPSec SA
should stay up before it times out. The ZyWALL automatically renegotiates the IPSec SA
if there is traffic when the IPSec SA lifetime period expires. The ZyWALL also
automatically renegotiates the IPSec SA if both IPSec routers have keep alive enabled,
even if there is no traffic. If an IPSec SA times out, then the IPSec router must renegotiate
the SA the next time someone attempts to send traffic.
3.3.7.1 Negotiation Mode
The phase 1 Negotiation Mode you select determines how the Security Association (SA) will
be established for each connection through IKE negotiations.
ZyWALL P1 User’s Guide
• Main Mode ensures the highest level of security when the communicating parties are
negotiating authentication (phase 1). It uses 6 messages in three round trips: SA
negotiation, Diffie-Hellman exchange and an exchange of nonces (a nonce is a random
number). This mode features identity protection (your identity is not revealed in the
negotiation).
• Aggressive Mode is quicker than Main Mode because it eliminates several steps when
the communicating parties are negotiating authentication (phase 1). However the tradeoff is that faster speed limits its negotiating power and it also does not provide identity
protection. It is useful in remote access situations where the address of the initiator is not
know by the responder and both parties want to use pre-shared key authentication.
3.3.7.2 Pre-Shared Key
A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is
called pre-shared because you have to share it with another party before you can communicate
with them over a secure connection.
3.3.7.3 Diffie-Hellman (DH) Key Groups
Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish
a shared secret over an unsecured communications channel. Diffie-Hellman is used within
IKE SA setup to establish session keys. 768-bit (Group 1 - DH1) and 1024-bit (Group 2 –
DH2) Diffie-Hellman groups are supported. Upon completion of the Diffie-Hellman
exchange, the two peers have a shared secret, but the IKE SA is not authenticated. For
authentication, use pre-shared keys.
Chapter 3 Wizard Setup63
Page 65
ZyWALL P1 User’s Guide
3.3.7.4 Perfect Forward Secrecy (PFS)
Enabling PFS means that the key is transient. The key is thrown away and replaced by a brand
new key using a new Diffie-Hellman exchange for each new IPSec SA setup. With PFS
enabled, if one key is compromised, previous and subsequent keys are not compromised,
because subsequent keys are not derived from previous keys. The (time-consuming) DiffieHellman exchange is the trade-off for this extra security.
This may be unnecessary for data that does not require such security, so PFS is disabled
(None) by default in the ZyWALL. Disabling PFS means new authentication and encryption
keys are derived from the same root secret (which may have security implications in the long
run) but allows faster SA setup (by bypassing the Diffie-Hellman key exchange).
3.4 IPSec Algorithms
The ESP and AH protocols are necessary to create a Security Association (SA), the
foundation of an IPSec VPN. An SA is built from the authentication provided by the AH and
ESP protocols. The primary function of key management is to establish and maintain the SA
between systems. Once the SA is established, the transport of data may commence.
3.4.1 AH (Authentication Header) Protocol
AH protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay
resistance), and non-repudiation but not for confidentiality, for which the ESP was designed.
In applications where confidentiality is not required or not sanctioned by government
encryption restrictions, an AH can be employed to ensure integrity. This type of
implementation does not protect the information from dissemination but will allow for
verification of the integrity of the information and authentication of the originator.
The ESP protocol (RFC 2406) provides encryption as well as some of the services offered by
AH. ESP authenticating properties are limited compared to the AH due to the non-inclusion of
the IP header information during the authentication process. However, ESP is sufficient if
only the upper layer protocols need to be authenticated.
64Chapter 3 Wizard Setup
Page 66
ZyWALL P1 User’s Guide
An added feature of the ESP is payload padding, which further protects communications by
concealing the size of the packet being transmitted.
Table 14 ESP and AH
ESPAH
EncryptionDES (default)
Data Encryption Standard (DES) is a
widely used method of data encryption
using a secret key. DES applies a 56-bit
key to each 64-bit block of data.
3DES
Triple DES (3DES) is a variant of DES,
which iterates three times with three
separate keys (3 x 56 = 168 bits),
effectively doubling the strength of DES.
AES
Advanced Encryption Standard is a
newer method of data encryption that
also uses a secret key. This
implementation of AES applies a 128-bit
key to 128-bit blocks of data. AES is
faster than 3DES.
Select NULL to set up a phase 2 tunnel
without encryption.
AuthenticationMD5 (default)
MD5 (Message Digest 5) produces a
128-bit digest to authenticate packet
data.
SHA1
SHA1 (Secure Hash Algorithm) produces
a 160-bit digest to authenticate packet
data.
Select MD5 for minimal security and SHA-1 for maximum security.
MD5 (default)
MD5 (Message Digest 5) produces a
128-bit digest to authenticate packet
data.
SHA1
SHA1 (Secure Hash Algorithm) produces
a 160-bit digest to authenticate packet
data.
Chapter 3 Wizard Setup65
Page 67
ZyWALL P1 User’s Guide
3.4.3 IKE Tunnel Setting (IKE Phase 1)
Figure 19 VPN Wizard: IKE Tunnel Setting
The following table describes the labels in this screen.
Table 15 VPN Wizard: IKE Tunnel Setting
LABELDESCRIPTION
Negotiation ModeUse the radio buttons to select Main Mode or Aggressive Mode. Multiple SAs
Encryption Algorithm When DES is used for data communications, both sender and receiver must
Authentication
Algorithm
Key GroupYou must choose a key group for phase 1 IKE setup. DH1 (default) refers to
SA Life Time
(Seconds)
connecting through a secure gateway must have the same negotiation mode.
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of AES uses a 128-bit key. AES is faster than
3DES.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman
Group 2 a 1024 bit (1Kb) random number.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
66Chapter 3 Wizard Setup
Page 68
Table 15 VPN Wizard: IKE Tunnel Setting (continued)
LABELDESCRIPTION
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a
communicating party during a phase 1 IKE negotiation. It is called "pre-shared"
because you have to share it with another party before you can communicate
with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal
("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x (zero
x), which is not counted as part of the 16 to 62 character range for the key. For
example, in "0x0123456789ABCDEF", 0x denotes that the key is hexadecimal
and 0123456789ABCDEF is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will
receive a PYLD_MALFORMED (payload malformed) packet if the same preshared key is not used on both ends.
Back Click Back to return to the previous screen.
NextClick Next to continue.
3.4.4 IPSec Setting (IKE Phase 2)
Figure 20 VPN Wizard: IPSec Setting
ZyWALL P1 User’s Guide
The following table describes the labels in this screen.
Table 16 VPN Wizard: IPSec Setting
LABELDESCRIPTION
Encapsulation Mode Select Tu nnel mode or Transport mode.
IPSec ProtocolSelect the security protocols used for an SA.
Both AH and ESP increase ZyWALL processing requirements and
communications latency (delay).
Chapter 3 Wizard Setup67
Page 69
ZyWALL P1 User’s Guide
Table 16 VPN Wizard: IPSec Setting (continued)
LABELDESCRIPTION
Encryption Algorithm When DES is used for data communications, both sender and receiver must
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back Click Back to return to the previous screen.
NextClick Next to continue.
know the same secret key, which can be used to encrypt and decrypt the
message or to generate and verify a message authentication code. The DES
encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES
that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased
throughput. This implementation of AES uses a 128-bit key. AES is faster than
3DES. Select NULL to set up a tunnel without encryption. When you select
NULL, you do not enter an encryption key.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data. The SHA1 algorithm is generally
considered stronger than MD5, but is slower. Select MD5 for minimal security
and SHA-1 for maximum security.
Define the length of time before an IKE SA automatically renegotiates in this
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec
SA setup. This allows faster IPSec setup, but is not so secure.
Select DH1 or DH2 to enable PFS. DH1 refers to Diffie-Hellman Group 1 a 768
bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb)
random number (more secure, yet slower).
3.4.5 VPN Status Summary
This read-only screen shows the status of the current VPN setting. Use the summary table to
check whether what you have configured is correct.
68Chapter 3 Wizard Setup
Page 70
Figure 21 VPN Wizard: VPN Status
ZyWALL P1 User’s Guide
The following table describes the labels in this screen.
Table 17 VPN Wizard: VPN Status
LABELDESCRIPTION
Gateway Setting
My ZyWALLThis is the WAN IP address or domain name of your ZyWALL.
Remote Gateway
Address
Network Setting
Local Network
Starting IP AddressThis is a (static) IP address on the LAN behind your ZyWALL.
Ending IP Address/
Subnet Mask
Remote Network
Starting IP AddressThis is a (static) IP address on the network behind the remote IPSec router.
Ending IP Address/
Subnet Mask
This is the IP address or domain name used to identify the remote IPSec router.
When the local network is configured for a single IP address, this field is not
applicable. When the local network is configured for a range IP address, this is
the end (static) IP address, in a range of computers on the LAN behind your
ZyWALL. When the local network is configured for a subnet, this is a subnet
mask on the LAN behind your ZyWALL.
When the remote network is configured for a single IP address, this field is not
applicable. When the remote network is configured for a range IP address, this
is the end (static) IP address, in a range of computers on the network behind the
remote IPSec router. When the remote network is configured for a subnet, this is
a subnet mask on the network behind the remote IPSec router.
Chapter 3 Wizard Setup69
Page 71
ZyWALL P1 User’s Guide
Table 17 VPN Wizard: VPN Status (continued)
LABELDESCRIPTION
IKE Tunnel Setting
(IKE Phase 1)
Negotiation ModeThis shows Main Mode or Aggressive Mode. Multiple SAs connecting through
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES or AES.
Authentication
Algorithm
Key GroupThis is the key group you chose for phase 1 IKE setup.
SA Life Time
(Seconds)
Pre-Shared KeyThis is a pre-shared key identifying a communicating party during a phase 1 IKE
IPSec Setting (IKE
Phase 2)
Encapsulation Mode This shows Tun nel mode or Transport mode.
IPSec ProtocolESP or AH are the security protocols used for an SA.
Encryption Algorithm This is the method of data encryption. Options can be DES, 3DES, AES or
Authentication
Algorithm
SA Life Time
(Seconds)
Perfect Forward
Secret (PFS)
Back Click Back to return to the previous screen.
FinishClick Finish to complete and save the wizard setup.
a secure gateway must have the same negotiation mode.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
negotiation.
NULL.
MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash
algorithms used to authenticate packet data.
This is the length of time before an IKE SA automatically renegotiates.
Perfect Forward Secret (PFS) is disabled (None) by default in phase 2 IPSec SA
setup. Otherwise, DH1 or DH2 are selected to enable PFS.
3.4.6 VPN Wizard Setup Complete
Congratulations! You have successfully set up the VPN rule after any existing rule(s) for your
ZyWALL.
70Chapter 3 Wizard Setup
Page 72
Figure 22 VPN Wizard: Complete
ZyWALL P1 User’s Guide
Chapter 3 Wizard Setup71
Page 73
ZyWALL P1 User’s Guide
72Chapter 3 Wizard Setup
Page 74
This chapter describes how to configure LAN settings.
4.1 LAN Overview
Local Area Network (LAN) is a shared communication system to which many computers are
attached. The LAN screens can help you configure a LAN DHCP server and manage IP
addresses.
4.2 DHCP Setup
ZyWALL P1 User’s Guide
CHAPTER4
LAN Screens
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual
clients to obtain TCP/IP configuration at start-up from a server. You can configure the
ZyWALL as a DHCP server or disable it. When configured as a server, the ZyWALL provides
the TCP/IP configuration for the DHCP client. If DHCP service is disabled, you must have
another DHCP server on your LAN, or else the computer must be manually configured.
4.2.1 IP Pool Setup
The ZyWALL is pre-configured to provide one IP address of 169.254.1.33 to a DHCP client.
This configuration leaves 253 IP addresses (excluding the ZyWALL itself) in the lower range
for other server computers, for instance, servers for mail, FTP, TFTP, web, etc., that you may
have.
4.2.2 DNS Servers
Use the DNS screens to configure the DNS server information that the ZyWALL sends to the
DHCP client devices on the LAN.
There are three places where you can configure DNS setup on the ZyWALL.
1 Use the MAINTENANCE General screen to configure the ZyWALL to use a DNS
server to resolve domain names for ZyWALL system features like VPN, DDNS and the
time server.
2 Use the LAN screen to configure the DNS server information that the ZyWALL sends to
the DHCP client devices on the LAN.
Chapter 4 LAN Screens73
Page 75
ZyWALL P1 User’s Guide
4.3 LAN TCP/IP
The ZyWALL has built-in DHCP server capability that assigns IP addresses and DNS servers
to systems that support DHCP client capability.
4.3.1 Factory LAN Defaults
The LAN parameters of the ZyWALL are preset in the factory with the following values:
• IP address of 192.168.167.1 with subnet mask of 255.255.255.0.
• DHCP server enabled with one client IP address of 192.168.167.33.
These parameters should work for the majority of installations. If your ISP gives you explicit
DNS server address(es), read the embedded web configurator help regarding what fields need
to be configured.
4.3.2 IP Address and Subnet Mask
Refer to Section 3.2.2.2 on page 52 for this information.
4.3.3 RIP Setup
RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to exchange
routing information with other routers. RIP Direction controls the sending and receiving of
RIP packets. When set to Both or Out Only, the ZyWALL will broadcast its routing table
periodically. When set to Both or In Only, it will incorporate the RIP information that it
receives; when set to None, it will not send any RIP packets and will ignore any RIP packets
received.
RIP Version controls the format and the broadcasting method of the RIP packets that the
ZyWALL sends (it recognizes both formats when receiving). RIP-1 is universally supported;
but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you
have an unusual network topology.
Both RIP-2B and RIP-2M send routing data in RIP-2 format; the difference being that RIP-2B uses subnet broadcasting while RIP-2M uses multicasting. Multicasting can reduce the
load on non-router machines since they generally do not listen to the RIP multicast address
and so will not receive the RIP packets. However, if one router uses multicasting, then all
routers on your network must use multicasting, also.
By default, RIP Direction is set to Both and RIP Version to RIP-1.
74Chapter 4 LAN Screens
Page 76
4.3.4 Multicast
Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1
recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to
a group of hosts on the network - not everybody and not just 1.
IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish
membership in a Multicast group - it is not used to carry user data. IGMP version 2 (RFC
2236) is an improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use. If
you would like to read more detailed information about interoperability between IGMP
version 2 and version 1, please see sections 4 and 5 of RFC 2236. The class D IP address is
used to identify host groups and can be in the range 224.0.0.0 to 239.255.255.255. The address
224.0.0.0 is not assigned to any group and is used by IP multicast computers. The address
224.0.0.1 is used for query messages and is assigned to the permanent group of all IP hosts
(including gateways). All hosts must join the 224.0.0.1 group in order to participate in IGMP.
The address 224.0.0.2 is assigned to the multicast routers group.
The ZyWALL supports both IGMP version 1 (IGMP-v1) and IGMP version 2 (IGMP-v2). At
start up, the ZyWALL queries all directly connected networks to gather group membership.
After that, the ZyWALL periodically updates this information. IP multicasting can be enabled/
disabled on the ZyWALL LAN and/or WAN interfaces in the web configurator (LAN; WA N). Select None to disable IP multicasting on these interfaces.
ZyWALL P1 User’s Guide
4.4 Configuring LAN
Click LAN to open the LAN screen.
Figure 23 LAN: LAN
Chapter 4 LAN Screens75
Page 77
ZyWALL P1 User’s Guide
The following table describes the labels in this screen.
Table 18 LAN: LAN
LABELDESCRIPTION
LAN TCP/IP
IP AddressType the IP address of your ZyWALL in dotted decimal notation. 192.168.167.1 is
IP Subnet MaskThe subnet mask specifies the network number portion of an IP address. Your
RIP DirectionRIP (Routing Information Protocol, RFC1058 and RFC 1389) allows a router to
RIP VersionThe RIP Version field controls the format and the broadcasting method of the RIP
MulticastSelect IGMP V-1 or IGMP V-2 or None. IGMP (Internet Group Multicast Protocol) is
the factory default. Alternatively, click the right mouse button to copy and/or paste
the IP address.
ZyWALL automatically calculate the subnet mask based on the IP address that you
assign. Unless you are implementing subnetting, use the subnet mask computed
by the ZyWALL.
exchange routing information with other routers. The RIP Direction field controls
the sending and receiving of RIP packets. Select the RIP direction from Both/In Only/Out Only/None. When set to Both or Out Only, the ZyWALL will broadcast
its routing table periodically. When set to Both or In Only, it will incorporate the RIP
information that it receives; when set to None, it will not send any RIP packets and
will ignore any RIP packets received. Both is the default.
packets that the ZyWALL sends (it recognizes both formats when receiving). RIP-1
is universally supported but RIP-2 carries more information. RIP-1 is probably
adequate for most networks, unless you have an unusual network topology. Both
RIP-2B and RIP-2M sends the routing data in RIP-2 format; the difference being
that RIP-2B uses subnet broadcasting while RIP-2M uses multicasting.
Multicasting can reduce the load on non-router machines since they generally do
not listen to the RIP multicast address and so will not receive the RIP packets.
However, if one router uses multicasting, then all routers on your network must use
multicasting, also. By default, RIP direction is set to Both and the Version set to
RIP-1.
a network-layer protocol used to establish membership in a Multicast group - it is
not used to carry user data. IGMP version 2 (RFC 2236) is an improvement over
version 1 (RFC 1112) but IGMP version 1 is still in wide use. If you would like to
read more detailed information about interoperability between IGMP version 2 and
version 1, please see sections 4 and 5 of RFC 2236.
individual clients (workstations) to obtain TCP/IP configuration at startup from a
server.
Select Server to set the ZyWALL to assign network information (IP address, DNS
information etc.) to an Ethernet device connected to the LAN port.
Select None to to stop the ZyWALL from acting as a DHCP server. you must have
another DHCP server on your LAN, or else the computer must be manually
configured.
Select Relay to set the ZyWALL to forward network configuration requests to a
DHCP server on the LAN network
This field is applicable when you select Server in the DHCP field.
Specify the IP address for the DHCP client. Make sure the IP address is in the
same range as the ZyWALL’s LAN IP address.
This field is applicable when you select Relay in the DHCP field.
Enter the IP address (in dotted decimal notation) of a DHCP server on the LAN.
76Chapter 4 LAN Screens
Page 78
Table 18 LAN: LAN (continued)
LABELDESCRIPTION
ZyWALL P1 User’s Guide
DNS Servers
Assigned by
DHCP Server
First DNS Server
Second DNS
Server
Third DNS Server
Windows
Networking
(NetBIOS over
TCP/IP)
Allow between
LAN and WAN
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.
The ZyWALL passes a DNS (Domain Name System) server IP address (in the
order you specify here) to the DHCP client. The ZyWALL only passes this
information to the LAN DHCP client when you select the DHCP Server check box.
When you clear the DHCP Server check box, DHCP service is disabled and you
must have another DHCP sever on your LAN, or else the computers must have
their DNS server addresses manually configured.
Select From ISP if your ISP dynamically assigns DNS server information (and the
ZyWALL's WAN IP address). Use the drop-down list box to select a DNS server IP
address that the ISP assigns in the field to the right.
Select User-Defined if you have the IP address of a DNS server. Enter the DNS
server's IP address in the field to the right. If you chose User-Defined, but leave
the IP address set to 0.0.0.0, User-Defined changes to None after you click Apply.
If you set a second choice to User-Defined, and enter the same IP address, the
second User-Defined changes to None after you click Apply.
Select DNS Relay to have the ZyWALL act as a DNS proxy. The ZyWALL's LAN IP
address displays in the field to the right (read-only). The ZyWALL tells the DHCP
client on the LAN that the ZyWALL itself is the DNS server. When a computer on
the LAN sends a DNS query to the ZyWALL, the ZyWALL forwards the query to the
ZyWALL's system DNS server (configured in the DNS System screen) and relays
the response back to the computer. You can only select DNS Relay for one of the
three servers; if you select DNS Relay for a second or third DNS server, that choice
changes to None after you click Apply.
Select None if you do not want to configure DNS servers. If you do not configure a
DNS server, you must know the IP address of a computer in order to access it.
NetBIOS (Network Basic Input/Output System) are TCP or UDP packets that
enable a computer to connect to and communicate with a LAN. For some dial-up
services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls.
However it may sometimes be necessary to allow NetBIOS packets to pass
through to the WAN in order to find a computer on the WAN.
Select this check box to forward NetBIOS packets from the LAN to the WAN and
from the WAN to the LAN. If your firewall is enabled with the default policy set to
block WAN to LAN traffic, you also need to enable the default WAN to LAN firewall
rule that forwards NetBIOS traffic.
Clear this check box to block all NetBIOS packets going from the LAN to the WAN
and from the WAN to the LAN.
4.5 Configuring Static DHCP
This table allows you to assign one IP address on the LAN to a specific computer based on the
MAC address.
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address
is assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02.
To change your ZyWALL’s static DHCP settings, click LAN, then the Static DHCP tab. The
screen appears as shown.
Chapter 4 LAN Screens77
Page 79
ZyWALL P1 User’s Guide
Figure 24 LAN: Static DHCP
The following table describes the labels in this screen.
Table 19 LAN: Static DHCP
LABELDESCRIPTION
#This is the index number of the Static IP table entry (row).
MAC Address Type the MAC address (with colons) of a computer on your LAN.
IP AddressType the IP address that you want to assign to the computer on your LAN.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.
Alternatively, click the right mouse button to copy and/or paste the IP address.
78Chapter 4 LAN Screens
Page 80
This chapter describes how to configure WAN settings.
5.1 WAN Overview
See Chapter 3 on page 51 for more information on the fields in the WAN screens.
5.1.1 TCP/IP Priority (Metric)
The metric represents the "cost of transmission". A router determines the best route for
transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the
measurement of cost, with a minimum of "1" for directly connected networks. The number
must be between "1" and "15"; a number greater than "15" means the link is down. The
smaller the number, the lower the "cost".
ZyWALL P1 User’s Guide
CHAPTER5
WAN Screens
The metric sets the priority for the ZyWALL's routes to the Internet. Each route must have a
unique metric.
5.1.2 WAN MAC Address
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address
is assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02.
Table 20 Example of Network Properties for LAN Servers with Fixed IP Addresses
Choose an IP address
Subnet mask 255.255.255.0
Gateway (or default route)192.168.167.1(ZyWALL LAN IP)
5.2 WAN Route Setup
Click WA N to open the Route screen.
192.168.167.2 ~ 192.168.167.32; 192.168.167.34 ~
192.168.167.254.
Chapter 5 WAN Screens79
Page 81
ZyWALL P1 User’s Guide
Figure 25 WAN: Route
The following table describes the labels in this screen.
Table 21 WAN: Route
LABELDESCRIPTION
Route Priority
WANThe default WAN connection is "1” as your broadband connection via the WAN port
should always be your preferred method of accessing the WAN.
Windows
Networking
(NetBIOS over
TCP/IP):
Allow between
WAN and LAN
Allow Trigger Dial Select this option to allow NetBIOS packets to initiate calls.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.
NetBIOS (Network Basic Input/Output System) are TCP or UDP packets that
enable a computer to connect to and communicate with a LAN. For some dial-up
services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls.
Select this check box to forward NetBIOS packets from the LAN to the WAN and
from the WAN to the LAN. If your firewall is enabled with the default policy set to
block WAN to LAN traffic, you also need to enable the default WAN to LAN firewall
rule that forwards NetBIOS traffic.
Clear this check box to block all NetBIOS packets going from the LAN to the WAN
and from the WAN to the LAN.
5.3 Configuring WAN Setup
To change your ZyWALL's WAN ISP, IP and MAC settings, click WA N , then the WA N tab.
The screen differs by the encapsulation.
5.3.1 Ethernet Encapsulation
The screen shown next is for Ethernet encapsulation.
80Chapter 5 WAN Screens
Page 82
Figure 26 WAN: WAN: Ethernet
ZyWALL P1 User’s Guide
The following table describes the labels in this screen.
Table 22 WAN: WAN: Ethernet
LABELDESCRIPTION
ISP Parameters
for Internet
Access
EncapsulationYou must choose the Ethernet option when the WAN port is used as a regular
Ethernet.
Service TypeChoose from Standard, Te lstra (RoadRunner Telstra authentication method), RR-
User NameType the user name given to you by your ISP.
PasswordType the password associated with the user name above.
Retype to Confirm Type your password again to make sure that you have entered is correctly.
The following fields do not appear with the Standard service type.
Type the authentication server IP address here if your ISP gave you one.
This field is not available for Telia Login.
Type the domain name of the Telia login server, for example login1.telia.com.
Chapter 5 WAN Screens81
Page 83
ZyWALL P1 User’s Guide
Table 22 WAN: WAN: Ethernet (continued)
LABELDESCRIPTION
Relogin
Every(min)
(Telia Login only)
WAN IP Address
Assignment
Get automatically
from ISP
Use Fixed IP
Address
My WAN IP
Address
My WAN IP
Subnet Mask
Gateway IP
Address
Advanced Setup
Enable NAT
(Network Address
Translation)
RIP DirectionRIP (Routing Information Protocol) allows a router to exchange routing information
RIP VersionThe RIP Version field controls the format and the broadcasting method of the RIP
Enable MulticastSelect this check box to turn on IGMP (Internet Group Multicast Protocol). IGMP is
The Telia server logs the ZyWALL out if the ZyWALL does not log in periodically.
Type the number of minutes from 1 to 59 (30 default) for the ZyWALL to wait
between logins.
Select this option If your ISP did not assign you a fixed IP address. This is the
default selection.
Select this option If the ISP assigned a fixed IP address.
Enter your WAN IP address in this field if you selected Use Fixed IP Address.
Enter the IP subnet mask (if your ISP gave you one) in this field if you selected Use Fixed IP Address.
Enter the gateway IP address (if your ISP gave you one) in this field if you selected
Use Fixed IP Address.
Network Address Translation (NAT) allows the translation of an Internet protocol
address used within one network (for example a private IP address used in a local
network) to a different IP address known within another network (for example a
public IP address used on the Internet).
Select this checkbox to enable NAT.
For more information about NAT see Chapter 11 on page 177.
with other routers. The RIP Direction field controls the sending and receiving of
RIP packets.
Choose Both, None, In Only or Out Only.
When set to Both or Out Only, the ZyWALL will broadcast its routing table
periodically.
When set to Both or In Only, the ZyWALL will incorporate RIP information that it
receives.
When set to None, the ZyWALL will not send any RIP packets and will ignore any
RIP packets received.
By default, RIP Direction is set to Both.
packets that the ZyWALL sends (it recognizes both formats when receiving).
Choose RIP-1, RIP-2B or RIP-2M.
RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is
probably adequate for most networks, unless you have an unusual network
topology. Both RIP-2B and RIP-2M sends the routing data in RIP-2 format; the
difference being that RIP-2B uses subnet broadcasting while RIP-2M uses
multicasting. Multicasting can reduce the load on non-router machines since they
generally do not listen to the RIP multicast address and so will not receive the RIP
packets. However, if one router uses multicasting, then all routers on your network
must use multicasting, also. By default, the RIP Version field is set to RIP-1.
a network-layer protocol used to establish membership in a Multicast group - it is
not used to carry user data.
82Chapter 5 WAN Screens
Page 84
ZyWALL P1 User’s Guide
Table 22 WAN: WAN: Ethernet (continued)
LABELDESCRIPTION
Multicast VersionChoose None (default), IGMP-V1 or IGMP-V2. IGMP (Internet Group Multicast
Protocol) is a session-layer protocol used to establish membership in a Multicast
group – it is not used to carry user data. IGMP version 2 (RFC 2236) is an
improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use. If
you would like to read more detailed information about interoperability between
IGMP version 2 and version 1, please see sections 4 and 5 of RFC 2236.
Spoof WAN MAC
Address
Clone the
computer’s MAC
address – IP
Address
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.
You can use the factory assigned default MAC Address or cloning the MAC
address from a computer on your LAN.
Otherwise, select the check box next to Spoof WAN MAC Address and enter the
IP address of the computer on the LAN whose MAC you are cloning. Once it is
successfully configured, the address will be copied to the rom file (ZyNOS
configuration file). It will not change unless you change the setting or upload a
different ROM file.
Enter the IP address of the computer on the LAN whose MAC you are cloning.
It is recommended that you clone the MAC address prior to hooking up the WAN
port.
5.3.2 PPPoE Encapsulation
The ZyWALL supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF
Draft standard (RFC 2516) specifying how a computer interacts with a broadband modem
(DSL, cable, wireless, etc.) connection. The PPPoE option is for a dial-up connection using
PPPoE.
For the service provider, PPPoE offers an access and authentication method that works with
existing access control systems (for example Radius). PPPoE provides a login and
authentication method that the existing Microsoft Dial-Up Networking software can activate,
and therefore requires no new learning or procedures for Windows users.
One of the benefits of PPPoE is the ability to let you access one of multiple network services,
a function known as dynamic service selection. This enables the service provider to easily
create and offer new IP services for individuals.
Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires
no specific configuration of the broadband modem at the customer site.
By implementing PPPoE directly on the ZyWALL (rather than individual computers), the
computers on the LAN do not need PPPoE software installed, since the ZyWALL does that
part of the task. Furthermore, with NAT, all of the LANs’ computers will have access.
The screen shown next is for PPPoE encapsulation.
Chapter 5 WAN Screens83
Page 85
ZyWALL P1 User’s Guide
Figure 27 WAN: WAN: PPPoE
The following table describes the labels not previously discussed.
Table 23 WAN: WAN: PPPoE
LABELDESCRIPTION
ISP Parameters
for Internet
Access
EncapsulationThe PPPoE choice is for a dial-up connection using PPPoE. The router supports
PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF Draft standard
(RFC 2516) specifying how a computer interacts with a broadband modem (i.e.
DSL, cable, wireless, etc.) connection. Operationally, PPPoE saves significant effort
for both the end user and ISP/carrier, as it requires no specific configuration of the
broadband modem at the customer site. By implementing PPPoE directly on the
router rather than individual computers, the computers on the LAN do not need
PPPoE software installed, since the router does that part of the task. Further, with
NAT, all of the LAN's computers will have access.
Service NameType the PPPoE service name provided to you. PPPoE uses a service name to
identify and reach the PPPoE server.
84Chapter 5 WAN Screens
Page 86
Table 23 WAN: WAN: PPPoE (continued)
LABELDESCRIPTION
Nailed-Up Select Nailed-Up if you do not want the connection to time out.
Idle TimeoutThis value specifies the time in seconds that elapses before the ZyWALL
automatically disconnects from the PPPoE server.
Refer to Table 22 on page 81 for other field descriptions.
5.3.3 PPTP Encapsulation
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of
data from a remote client to a private server, creating a Virtual Private Network (VPN) using
TCP/IP-based networks.
PPTP supports on-demand, multi-protocol and virtual private networking over public
networks, such as the Internet. The screen shown next is for PPTP encapsulation.
ZyWALL P1 User’s Guide
Chapter 5 WAN Screens85
Page 87
ZyWALL P1 User’s Guide
Figure 28 WAN: WAN: PPTP
The following table describes the labels not previously discussed.
Table 24 WAN: WAN: PPTP
LABELDESCRIPTION
ISP Parameters for
Internet Access
EncapsulationPoint-to-Point Tunneling Protocol (PPTP) is a network protocol that enables
secure transfer of data from a remote client to a private server, creating a Virtual
Private Network (VPN) using TCP/IP-based networks. PPTP supports ondemand, multi-protocol, and virtual private networking over public networks, such
as the Internet. The ZyWALL supports only one PPTP server connection at any
given time. To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP
connection.
86Chapter 5 WAN Screens
Page 88
ZyWALL P1 User’s Guide
Table 24 WAN: WAN: PPTP (continued)
LABELDESCRIPTION
Nailed-upSelect Nailed-Up if you do not want the connection to time out.
Idle TimeoutThis value specifies the time in seconds that elapses before the ZyWALL
PPTP
Configuration
My IP AddressType the (static) IP address assigned to you by your ISP.
My IP Subnet Mask Your ZyWALL will automatically calculate the subnet mask based on the IP
Server IP AddressType the IP address of the PPTP server.
Connection ID/
Name
automatically disconnects from the PPTP server.
address that you assign. Unless you are implementing subnetting, use the subnet
mask computed by the ZyWALL.
Type your identification name for the PPTP server.
Refer to Table 22 on page 81 for other field descriptions.
5.4 Dynamic DNS
Dynamic DNS allows you to update your current dynamic IP address with one or many
dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You
can also access your FTP server or Web site on your own computer using a domain name (for
instance myhost.dhs.org, where myhost is a name of your choice) that will never change
instead of using an IP address that changes each time you reconnect. Your friends or relatives
will always be able to call you even if they don't know your IP address.
First of all, you need to have registered a dynamic DNS account with www.dyndns.org. This is
for people with a dynamic IP from their ISP or DHCP server that would still like to have a
domain name. The Dynamic DNS service provider will give you a password or key.
Note: You must go to the Dynamic DNS service provider’s website and register a
user account and a domain name before you can use the Dynamic DNS
service with your ZyWALL.
5.4.1 DYNDNS Wildcard
Enabling the wildcard feature for your host causes *.yourhost.dyndns.org to be aliased to the
same IP address as yourhost.dyndns.org. This feature is useful if you want to be able to use,
for example, www.yourhost.dyndns.org and still reach your hostname.
Note: If you have a private WAN IP address, then you cannot use Dynamic DNS.
Chapter 5 WAN Screens87
Page 89
ZyWALL P1 User’s Guide
5.4.2 Configuring Dynamic DNS
To change your ZyWALL’s DDNS, click WA N, then the DDNS tab. The screen appears as
shown.
Figure 29 WAN: DDNS
The following table describes the labels in this screen.
Table 25 WAN: DDNS
LABELDESCRIPTION
Account Setup
Enable DDNSSelect this check box to use dynamic DNS.
Service ProviderThis is the name of your Dynamic DNS service provider.
DDNS TypeSelect the type of service that you are registered for from your Dynamic DNS
service provider.
Select Dynamic DNS if you have the Dynamic DNS service.
Select Static DNS if you have the Static DNS service.
Select Custom DNS if you have the Custom DNS service.
UsernameEnter your user name. You can use up to 31 alphanumeric characters (and the
PasswordEnter the password associated with the user name above. You can use up to 31
Domain Name 1~3Enter the host names in these fields.
Enable Wildcard
Options
underscore). Spaces are not allowed.
alphanumeric characters (and the underscore). Spaces are not allowed.
Select the check box to enable DYNDNS Wildcard.
88Chapter 5 WAN Screens
Page 90
Table 25 WAN: DDNS (continued)
LABELDESCRIPTION
ZyWALL P1 User’s Guide
Enable off line option
(Only applies to
custom DNS)
IP Address Update
Policy
This option is applicable when Custom DNS is selected in the DDNS Type field.
Check with your Dynamic DNS service provider to have traffic redirected to a
URL (that you can specify) while you are off line.
Select Use WAN IP Address to have the ZyWALL update the domain name
with the WAN port's IP address.
Select DDNS server auto detect IP Address only when there are one or more
NAT routers between the ZyWALL and the DDNS server. This feature has the
DDNS server automatically detect and use the IP address of the NAT router that
has a public IP address.
Select Use specified IP Address and enter the IP address if you have a static
IP address.
Note: The DDNS server may not be able to detect the proper IP
address if there is an HTTP proxy server between the
ZyWALL and the DDNS server.
ApplyClick Apply to save your changes back to the ZyWALL.
ResetClick Reset to begin configuring this screen afresh.
Chapter 5 WAN Screens89
Page 91
ZyWALL P1 User’s Guide
90Chapter 5 WAN Screens
Page 92
This chapter gives some background information on firewalls and introduces the ZyWALL
firewall.
6.1 Firewall Overview
Originally, the term firewall referred to a construction technique designed to prevent the
spread of fire from one room to another. The networking term firewall is a system or group of
systems that enforces an access-control policy between two networks. It may also be defined
as a mechanism used to protect a trusted network from an untrusted network. Of course,
firewalls cannot solve every security problem. A firewall is one of the mechanisms used to
establish a network security perimeter in support of a network security policy. It should never
be the only mechanism or method employed. For a firewall to guard effectively, you must
design and deploy it appropriately. This requires integrating the firewall into a broad
information-security policy. In addition, specific policies must be implemented within the
firewall itself.
ZyWALL P1 User’s Guide
CHAPTER6
Firewalls
6.2 Types of Firewalls
There are three main types of firewalls:
1 Packet Filtering Firewalls
2 Application-level Firewalls
3 Stateful Inspection Firewalls
6.2.1 Packet Filtering Firewalls
Packet filtering firewalls restrict access based on the source/destination computer network
address of a packet and the type of application.
6.2.2 Application-level Firewalls
Application-level firewalls restrict access by serving as proxies for external servers. Since they
use programs written for specific Internet services, such as HTTP, FTP and telnet, they can
evaluate network packets for valid application-specific data. Application-level gateways have
a number of general advantages over the default mode of permitting application traffic directly
to internal hosts:
Chapter 6 Firewalls91
Page 93
ZyWALL P1 User’s Guide
1 Information hiding prevents the names of internal systems from being made known via
DNS to outside systems, since the application gateway is the only host whose name must
be made known to outside systems.
2 Robust authentication and logging pre-authenticates application traffic before it reaches
internal hosts and causes it to be logged more effectively than if it were logged with
standard host logging. Filtering rules at the packet filtering router can be less complex
than they would be if the router needed to filter application traffic and direct it to a
number of specific systems. The router need only allow application traffic destined for
the application gateway and reject the rest.
6.2.3 Stateful Inspection Firewalls
Stateful inspection firewalls restrict access by screening data packets against defined access
rules. They make access control decisions based on IP address and protocol. They also
"inspect" the session data to assure the integrity of the connection and to adapt to dynamic
protocols. These firewalls generally provide the best speed and transparency; however, they
may lack the granular application level access control or caching that some proxies support.
See Section 6.5 on page 97 for more information on Stateful Inspection.
Firewalls, of one type or another, have become an integral part of standard security solutions
for enterprises.
6.3 Introduction to ZyXEL’s Firewall
The ZyWALL firewall is a stateful inspection firewall and is designed to protect against
Denial of Service attacks when activated. The ZyWALL’s purpose is to allow a private Local
Area Network (LAN) to be securely connected to the Internet. The ZyWALL can be used to
prevent theft, destruction and modification of data, as well as log events, which may be
important to the security of your network. The ZyWALL also has packet-filtering capabilities.
The ZyWALL is installed between the LAN and a broadband modem connecting to the
Internet. This allows it to act as a secure gateway for all data passing between the Internet and
the LAN.
The ZyWALL has one Ethernet WAN port and one Ethernet LAN port, which are used to
physically separate the network into the following areas.
• The WAN (Wide Area Network) port attaches to the broadband modem (cable or DSL)
connecting to the Internet.
• The LAN (Local Area Network) port attaches to a network of computers, which needs
security from the outside world. These computers will have access to Internet services
such as e-mail, FTP, and the World Wide Web. However, inbound access will not be
allowed unless the remote host is authorized to use a specific service.
92Chapter 6 Firewalls
Page 94
Figure 30 ZyWALL Firewall Application
6.4 Denial of Service
ZyWALL P1 User’s Guide
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the
Internet. Their goal is not to steal information, but to disable a device or network so users no
longer have access to network resources. The ZyWALL is pre-configured to automatically
detect and thwart all known DoS attacks.
6.4.1 Basics
Computers share information over the Internet using a common language called TCP/IP. TCP/
IP, in turn, is a set of application protocols that perform specific functions. An extension
number, called the "TCP port" or "UDP port" identifies these protocols, such as HTTP (Web),
FTP (File Transfer Protocol), POP3 (E-mail), etc. For example, Web traffic by default uses
TCP port 80.
When computers communicate on the Internet, they are using the client/server model, where
the server "listens" on a specific TCP/UDP port for information requests from remote client
computers on the network. For example, a Web server typically listens on port 80. Please note
that while a computer may be intended for use over a single port, such as Web on port 80,
other ports are also active. If the person configuring or managing the computer is not careful, a
hacker could attack it over an unprotected port.
Some of the most common IP ports are:
Table 26 Common IP Ports
21FTP53DNS
23Telnet80HTTP
25SMTP110POP3
Chapter 6 Firewalls93
Page 95
ZyWALL P1 User’s Guide
6.4.2 Types of DoS Attacks
There are four types of DoS attacks:
1 Those that exploit bugs in a TCP/IP implementation.
2 Those that exploit weaknesses in the TCP/IP specification.
3 Brute-force attacks that flood a network with useless data.
4 IP Spoofing.
•"Ping of Death" and "Teardrop" attacks exploit bugs in the TCP/IP implementations of
various computer and host systems.
aPing of Death uses a "ping" utility to create an IP packet that exceeds
the maximum 65,536 bytes of data allowed by the IP specification.
The oversize packet is then sent to an unsuspecting system. Systems
may crash, hang or reboot.
bTeardrop attack exploits weaknesses in the reassembly of IP packet
fragments. As data is transmitted through a network, IP packets are
often broken up into smaller chunks. Each fragment looks like the
original IP packet except that it contains an offset field that says, for
instance, "This fragment is carrying bytes 200 through 400 of the
original (non fragmented) IP packet." The Teardrop program creates a
series of IP fragments with overlapping offset fields. When these
fragments are reassembled at the destination, some systems will
crash, hang, or reboot.
• Weaknesses in the TCP/IP specification leave it open to "SYN Flood" and "LAND"
attacks. These attacks are executed during the handshake that initiates a communication
session between two applications.
Figure 31 Three-Way Handshake
Under normal circumstances, the application that initiates a session sends a SYN
(synchronize) packet to the receiving server. The receiver sends back an ACK
(acknowledgment) packet and its own SYN, and then the initiator responds with an ACK
(acknowledgment). After this handshake, a connection is established.
aSYN Attack floods a targeted system with a series of SYN packets.
Each packet causes the targeted system to issue a SYN-ACK
94Chapter 6 Firewalls
Page 96
Figure 32 SYN Flood
ZyWALL P1 User’s Guide
response. While the targeted system waits for the ACK that follows
the SYN-ACK, it queues up all outstanding SYN-ACK responses on
what is known as a backlog queue. SYN-ACKs are moved off the
queue only when an ACK comes back or when an internal timer
(which is set at relatively long intervals) terminates the three-way
handshake. Once the queue is full, the system will ignore all
incoming SYN requests, making the system unavailable for
legitimate users.
bIn a LAND Attack, hackers flood SYN packets into the network with
a spoofed source IP address of the targeted system. This makes it
appear as if the host computer sent the packets to itself, making the
system unavailable while the target system tries to respond to itself.
•A brute-force attack, such as a "Smurf" attack, targets a feature in the IP specification
known as directed or subnet broadcasting, to quickly flood the target network with
useless data. A Smurf hacker floods a router with Internet Control Message Protocol
(ICMP) echo request packets (pings). Since the destination IP address of each packet is
the broadcast address of the network, the router will broadcast the ICMP echo request
packet to all hosts on the network. If there are numerous hosts, this will create a large
amount of ICMP echo request and response traffic. If a hacker chooses to spoof the
source IP address of the ICMP echo request packet, the resulting ICMP traffic will not
only clog up the "intermediary" network, but will also congest the network of the spoofed
source IP address, known as the "victim" network. This flood of broadcast traffic
consumes all available bandwidth, making communications impossible.
Chapter 6 Firewalls95
Page 97
ZyWALL P1 User’s Guide
Figure 33 Smurf Attack
6.4.2.1 ICMP Vulnerability
ICMP is an error-reporting protocol that works in concert with IP. The following ICMP types
trigger an alert:
Table 27 ICMP Commands That Trigger Alerts
5REDIRECT
13TIMESTAMP_REQUEST
14TIMESTAMP_REPLY
17ADDRESS_MASK_REQUEST
18ADDRESS_MASK_REPLY
6.4.2.2 Illegal Commands (NetBIOS and SMTP)
The only legal NetBIOS commands are the following - all others are illegal.
Table 28 Legal NetBIOS Commands
MESSAGE:
REQUEST:
POSITIVE:
NEGATIVE:
RETARGET:
KEEPALIVE:
96Chapter 6 Firewalls
Page 98
All SMTP commands are illegal except for those displayed in the following tables.
Table 29 Legal SMTP Commands
AUTHDATAEHLOETRNEXPNHELOHELPMAILNOOP
QUITRCPTRSETSAMLSENDSOML TURNVRFY
6.4.2.3 Traceroute
Traceroute is a utility used to determine the path a packet takes between two endpoints.
Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute
the firewall gaining knowledge of the network topology inside the firewall.
Often, many DoS attacks also employ a technique known as "IP Spoofing" as part of their
attack. IP Spoofing may be used to break into systems, to hide the hacker's identity, or to
magnify the effect of the DoS attack. IP Spoofing is a technique used to gain unauthorized
access to computers by tricking a router or firewall into thinking that the communications are
coming from within the trusted network. To engage in IP spoofing, a hacker must modify the
packet headers so that it appears that the packets originate from a trusted host and should be
allowed through the router or firewall. The ZyWALL blocks all IP Spoofing attempts.
ZyWALL P1 User’s Guide
6.5 Stateful Inspection
With stateful inspection, fields of the packets are compared to packets that are already known
to be trusted. For example, if you access some outside service, the proxy server remembers
things about your original request, like the port number and source and destination addresses.
This remembering is called saving the state. When the outside system responds to your
request, the firewall compares the received packets with the saved state to determine if they
are allowed in. The ZyWALL uses stateful packet inspection to protect the private LAN from
hackers and vandals on the Internet. By default, the ZyWALL’s stateful inspection allows all
communications to the Internet that originate from the LAN, and blocks all traffic to the LAN
that originates from the Internet. In summary, stateful inspection:
• Allows all sessions originating from the LAN (local network) to the WAN (Internet).
• Denies all sessions originating from the WAN to the LAN.
Chapter 6 Firewalls97
Page 99
ZyWALL P1 User’s Guide
Figure 34 Stateful Inspection
The previous figure shows the ZyWALL’s default firewall rules in action as well as
demonstrates how stateful inspection works. User A can initiate a Telnet session from within
the LAN and responses to this request are allowed. However other Telnet traffic initiated from
the WAN is blocked.
6.5.1 Stateful Inspection Process
In this example, the following sequence of events occurs when a TCP packet leaves the LAN
network through the firewall's WAN interface. The TCP packet is the first in a session, and the
packet's application layer protocol is configured for a firewall rule inspection:
1 The packet travels from the firewall's LAN to the WAN.
2 The packet is evaluated against the interface's existing outbound access list, and the
packet is permitted (a denied packet would simply be dropped at this point).
3 The firewall inspects packets to determine and record information about the state of the
packet's connection. This information is recorded in a new state table entry created for the
new connection. If there is not a firewall rule for this packet and it is not an attack, then
the setting in the Firewall Default Rule screen determines the action for this packet.
4 Based on the obtained state information, a firewall rule creates a temporary access list
entry that is inserted at the beginning of the WAN interface's inbound extended access
list. This temporary access list entry is designed to permit inbound packets of the same
connection as the outbound packet just inspected.
5 The outbound packet is forwarded out through the interface.
6 Later, an inbound packet reaches the interface. This packet is part of the connection
previously established with the outbound packet. The inbound packet is evaluated against
the inbound access list, and is permitted because of the temporary access list entry
previously created.
7 The packet is inspected by a firewall rule, and the connection's state table entry is updated
as necessary. Based on the updated state information, the inbound extended access list
98Chapter 6 Firewalls
Page 100
temporary entries might be modified, in order to permit only packets that are valid for the
current state of the connection.
8 Any additional inbound or outbound packets that belong to the connection are inspected
to update the state table entry and to modify the temporary inbound access list entries as
required, and are forwarded through the interface.
9 When the connection terminates or times out, the connection's state table entry is deleted
and the connection's temporary inbound access list entries are deleted.
6.5.2 Stateful Inspection and the ZyWALL
Additional rules may be defined to extend or override the default rules. For example, a rule
may be created which will:
1 Block all traffic of a certain type, such as IRC (Internet Relay Chat), from the LAN to the
Internet.
2 Allow certain types of traffic from the Internet to specific hosts on the LAN.
3 Allow access to a Web server to everyone but competitors.
ZyWALL P1 User’s Guide
4 Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by evaluating the network traffic’s Source IP address, Destination IP
address, IP protocol type, and comparing these to rules set by the administrator.
Note: The ability to define firewall rules is a very powerful tool. Using custom rules, it
is possible to disable all firewall protection or block all access to the Internet.
Use extreme caution when creating or deleting firewall rules. Test changes
after creating them to make sure they work correctly.
Below is a brief technical description of how these connections are tracked. Connections may
either be defined by the upper protocols (for instance, TCP), or by the ZyWALL itself (as with
the "virtual connections" created for UDP and ICMP).
6.5.3 TCP Security
The ZyWALL uses state information embedded in TCP packets. The first packet of any new
connection has its SYN flag set and its ACK flag cleared; these are "initiation" packets. All
packets that do not have this flag structure are called "subsequent" packets, since they
represent data that occurs later in the TCP stream.
If an initiation packet originates on the WAN, this means that someone is trying to make a
connection from the Internet into the LAN. Except in a few special cases (see Section 6.5.5 on
page 100), these packets are dropped and logged.
Chapter 6 Firewalls99
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.