ZyXEL P-2602HWNLI User Manual

P-2602HWNLI

802.11g Wireless ADSL2+ 4-Port VoIP IAD

User’s Guide

Version 3.40
12/2006
Edition 1
P-2602HWNLI User’s Guide
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright 3
P-2602HWNLI User’s Guide
Federal Communications Commission (FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

Certifications

• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Viewing Certifications
1 Go to http://www.zyxel.com.
2 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
3 Select the certification you wish to view from this page.
4 Certifications
P-2602HWNLI User’s Guide
Certifications 5
P-2602HWNLI User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
• Connect the power cord to the right supply voltage (110V AC in North America or 230V AC in Europe).
• Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.

Safety Warnings

6 Safety Warnings
P-2602HWNLI User’s Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
ZyXEL Limited Warranty 7
P-2602HWNLI User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.

Customer Support

METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
NORWAY
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Science Park Hsinchu 300 Ta iw a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Columbusvej 2860 Soeborg Denmark
Malminkaari 10 00700 Helsinki Finland
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
48, Zoldlomb Str. H-1025, Budapest Hungary
43, Dostyk ave.,Office 414 Dostyk Business Centre 050010, Almaty Republic of Kazakhstan
1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
Nils Hansens vei 13 0667 Oslo Norway
8 Customer Support
P-2602HWNLI User’s Guide
METHOD
LOCATION
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
a. “+” is the (prefix) number you enter to make an international telephone call.
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
info@pl.zyxel.com +48 (22) 333 8250 www.pl.zyxel.com ZyXEL Communications
+48 (22) 333 8251
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
A
WEB SITE
REGULAR MAIL
ul. Okrzei 1A 03-715 Warszawa Poland
Ostrovityanova 37a Str. Moscow, 117279 Russia
Arte, 21 5ª planta 28033 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
13, Pimonenko Str. Kiev, 04050 Ukraine
www.zyxel.co.uk ZyXEL Communications UK
Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
Customer Support 9
P-2602HWNLI User’s Guide
10 Customer Support
P-2602HWNLI User’s Guide

Table of Contents

Copyright ..................................................................................................................3
Certifications ............................................................................................................4
Safety Warnings ....................................................................................................... 6
ZyXEL Limited Warranty.......................................................................................... 7
Customer Support.................................................................................................... 8
Table of Contents ................................................................................................... 11
List of Figures ........................................................................................................ 25
List of Tables .......................................................................................................... 31
Preface ....................................................................................................................37
Chapter 1
Getting To Know the ZyXEL Device...................................................................... 39
1.1 Introducing the ZyXEL Device ............................................................................39
1.2 Features .............................................................................................................40
1.3 Applications ........................................................................................................46
1.3.1 Internet Access .........................................................................................46
1.3.1.1 Internet Single User Account ..........................................................46
1.3.2 Making Calls via Internet Telephony Service Provider ..............................46
1.3.3 Make Peer-to-peer Calls ...........................................................................47
1.3.4 Firewall for Secure Broadband Internet Access .......................................47
1.3.5 LAN to LAN Application ............................................................................48
1.3.6 Lights ........................................................................................................49
1.4 Splitters and Microfilters .....................................................................................50
1.4.1 Connecting a POTS Splitter ......................................................................51
1.4.2 Telephone Microfilters ...............................................................................51
Chapter 2
Introducing the Web Configurator........................................................................ 53
2.1 Web Configurator Overview ...............................................................................53
2.1.1 Accessing the Web Configurator ..............................................................53
2.1.2 The RESET Button ...................................................................................55
2.1.2.1 Using The Reset Button ..................................................................55
2.2 Web Configurator Main Screen ..........................................................................56
Table of Contents 11
P-2602HWNLI User’s Guide
2.2.1 Title Bar ....................................................................................................56
2.2.2 Navigation Panel .......................................................................................57
2.2.3 Main Window ............................................................................................59
2.2.4 Status Bar .................................................................................................59
Chapter 3
Internet and Wireless Setup Wizard ..................................................................... 61
3.1 Introduction ........................................................................................................61
3.2 Internet Access Wizard Setup ............................................................................61
3.2.1 Manual Configuration ................................................................................63
3.3 Wireless Connection Wizard Setup ....................................................................69
3.3.1 Manually Assign a WPA key .....................................................................73
3.3.2 Manually Assign a WEP key .....................................................................73
Chapter 4
VoIP Wizard............................................................................................................. 77
4.1 Introduction ........................................................................................................77
4.2 VOIP Wizard Setup ............................................................................................77
Chapter 5
Bandwidth Management Wizard ........................................................................... 81
5.1 Introduction ........................................................................................................81
5.2 Predefined Media Bandwidth Management Services ........................................81
5.3 Bandwidth Management Wizard Setup ..............................................................82
Chapter 6
WAN Setup.............................................................................................................. 87
6.1 WAN Overview ..................................................................................................87
6.1.1 Encapsulation ...........................................................................................87
6.1.1.1 ENET ENCAP .................................................................................87
6.1.1.2 PPP over Ethernet ..........................................................................87
6.1.1.3 PPPoA .............................................................................................87
6.1.1.4 RFC 1483 ........................................................................................88
6.1.2 Multiplexing ...............................................................................................88
6.1.2.1 VC-based Multiplexing ....................................................................88
6.1.2.2 LLC-based Multiplexing ...................................................................88
6.1.3 VPI and VCI ..............................................................................................88
6.1.4 IP Address Assignment ............................................................................88
6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................88
6.1.4.2 IP Assignment with RFC 1483 Encapsulation .................................89
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ..........................89
6.1.5 Nailed-Up Connection (PPP) ....................................................................89
6.2 PPPoE Encapsulation ........................................................................................89
12 Table of Contents
P-2602HWNLI User’s Guide
6.3 Metric ................................................................................................................90
6.4 Traffic Shaping ...................................................................................................90
6.4.1 ATM Traffic Classes ..................................................................................91
6.4.1.1 Constant Bit Rate (CBR) .................................................................91
6.4.1.2 Variable Bit Rate (VBR) ...................................................................91
6.4.1.3 Unspecified Bit Rate (UBR) .............................................................92
6.5 Zero Configuration Internet Access ....................................................................92
6.6 Internet Access Setup .......................................................................................92
6.6.1 Advanced Internet Access Setup ..............................................................95
6.7 Configuring More Connections ...........................................................................96
6.8 More Connections Edit .......................................................................................97
6.9 More Connections Edit Advanced .....................................................................99
6.10 Configuring WAN Backup ..............................................................................100
Chapter 7
Status Screens ..................................................................................................... 103
7.1 Status Screen ...................................................................................................103
7.2 Client List .........................................................................................................107
7.3 Any IP Table .....................................................................................................109
7.4 WLAN Status ....................................................................................................109
7.4.1 Bandwidth Status ....................................................................................110
7.4.2 VPN Status ............................................................................................. 111
7.5 Packet Statistics ............................................................................................... 112
7.6 VoIP Statistics .................................................................................................. 114
Chapter 8
LAN Setup............................................................................................................. 117
8.1 LAN Overview ................................................................................................. 117
8.1.1 LANs, WANs and the ZyXEL Device ...................................................... 117
8.1.2 DHCP Setup ...........................................................................................118
8.1.2.1 IP Pool Setup ................................................................................118
8.1.3 DNS Server Address .............................................................................. 118
8.1.4 DNS Server Address Assignment ........................................................... 119
8.2 LAN TCP/IP ......................................................................................................119
8.2.1 IP Address and Subnet Mask ................................................................. 119
8.2.1.1 Private IP Addresses .....................................................................120
8.2.2 RIP Setup ...............................................................................................120
8.2.3 Multicast ..................................................................................................121
8.2.4 Any IP .....................................................................................................121
8.2.4.1 How Any IP Works ........................................................................122
8.3 Configuring LAN IP ..........................................................................................123
8.3.1 Configuring Advanced LAN Setup ..........................................................123
8.4 DHCP Setup .....................................................................................................125
Table of Contents 13
P-2602HWNLI User’s Guide
8.5 LAN Client List .................................................................................................126
8.6 LAN IP Alias .....................................................................................................128
Chapter 9
Wireless LAN ........................................................................................................ 131
9.1 Wireless Network Overview .............................................................................131
9.2 Wireless Security Overview .............................................................................131
9.2.1 SSID .......................................................................................................131
9.2.2 MAC Address Filter .................................................................................132
9.2.3 User Authentication ................................................................................132
9.2.4 Encryption ...............................................................................................132
9.2.5 One-Touch Intelligent Security Technology (OTIST) ...............................133
9.3 Wireless Performance Overview ......................................................................134
9.3.1 Quality of Service (QoS) .........................................................................134
9.4 General Wireless LAN Screen ........................................................................134
9.4.1 WEP Encryption ......................................................................................135
9.4.2 WPA-PSK/WPA2-PSK ............................................................................136
9.4.3 WPA/WPA2 .............................................................................................138
9.4.4 Wireless LAN Advanced Setup ...............................................................140
9.5 OTIST ..............................................................................................................142
9.5.1 Enabling OTIST ......................................................................................142
9.5.2 Starting OTIST ........................................................................................144
9.5.3 Notes on OTIST ......................................................................................145
9.6 MAC Filter ...................................................................................................145
9.7 WMM QoS ........................................................................................................147
9.7.1 WMM QoS Example ...............................................................................147
9.7.2 WMM QoS Priorities ...............................................................................147
9.7.3 Services ..................................................................................................148
9.8 QoS Screen ......................................................................................................148
9.8.1 ToS (Type of Service) and WMM QoS ....................................................148
9.8.2 Application Priority Configuration ............................................................150
9.5.1.1 AP .................................................................................................142
9.5.1.2 Wireless Client ..............................................................................143
Chapter 10
Network Address Translation (NAT) Screens.................................................... 153
10.1 NAT Overview ...............................................................................................153
10.1.1 NAT Definitions .....................................................................................153
10.1.2 What NAT Does ....................................................................................154
10.1.3 How NAT Works ...................................................................................154
10.1.4 NAT Application ....................................................................................155
10.1.5 NAT Mapping Types .............................................................................155
10.2 SUA (Single User Account) Versus NAT ........................................................156
14 Table of Contents
P-2602HWNLI User’s Guide
10.3 NAT General Setup .......................................................................................157
10.4 Port Forwarding ..............................................................................................158
10.4.1 Default Server IP Address ....................................................................158
10.4.2 Port Forwarding: Services and Port Numbers ......................................158
10.4.3 Configuring Servers Behind Port Forwarding (Example) ......................158
10.5 Configuring Port Forwarding .........................................................................159
10.5.1 Port Forwarding Rule Edit ....................................................................161
10.6 Address Mapping ..........................................................................................161
10.6.1 Address Mapping Rule Edit .................................................................163
Chapter 11
Voice ...................................................................................................................... 165
11.1 Introduction to VoIP ........................................................................................165
11.2 SIP ..................................................................................................................165
11.2.1 SIP Identities .........................................................................................165
11.2.1.1 SIP Number .................................................................................165
11.2.1.2 SIP Service Domain ....................................................................166
11.2.2 SIP Call Progression .............................................................................166
11.2.3 SIP Servers ...........................................................................................166
11.2.3.1 SIP User Agent ............................................................................167
11.2.3.2 SIP Proxy Server .........................................................................167
11.2.3.3 SIP Redirect Server .....................................................................168
11.2.3.4 SIP Register Server .....................................................................169
11.3 SIP Settings Screen .......................................................................................169
11.3.1 RTP .......................................................................................................171
11.4 SIP ALG .........................................................................................................171
11.5 Voice Coding ..................................................................................................171
11.6 PSTN Call Setup Signaling ............................................................................172
11.7 MWI (Message Waiting Indication) .................................................................172
11.8 Custom Tones (IVR) .......................................................................................172
11.8.0.1 Recording Custom Tones ............................................................172
11.8.0.2 Listening to Custom Tones ..........................................................173
11.8.0.3 Deleting Custom Tones ...............................................................173
11.9 Advanced SIP Setup Screen ..........................................................................173
11.10 Quality of Service (QoS) ...............................................................................177
11.10.1 Type Of Service (ToS) .........................................................................177
11.10.2 VLAN ...................................................................................................177
11.10.3 SIP QoS Screen ..................................................................................177
11.11 Phone ...........................................................................................................178
11.12 PSTN Line ....................................................................................................178
11.13 ISDN Line .....................................................................................................179
11.13.1 Voice Activity Detection/Silence Suppression .....................................179
11.13.2 Comfort Noise Generation ..................................................................179
Table of Contents 15
P-2602HWNLI User’s Guide
11.13.3 Echo Cancellation ...............................................................................179
11.14 Analog Phone Screen ..................................................................................179
11.15 Advanced Analog Phone Setup Screen .......................................................181
11.16 ISDN Phone Screen .....................................................................................182
11.17 Common Phone Settings Screen .................................................................182
11.18 Supplementary Phone Services Overview (PSTN) ......................................183
11.18.1 The Flash Key .....................................................................................184
11.18.2 Europe Type Supplementary Phone Services ....................................184
11.18.3 USA Type Supplementary Services ....................................................186
11.19 Supplementary Phone Services Overview (ISDN) .......................................187
11.20 Phone Region Screen ..................................................................................188
11.21 Speed Dial ....................................................................................................189
11.21.1 Peer-to-Peer Calls ..............................................................................189
11.22 Speed Dial Screen ........................................................................................190
11.23 Incoming Call Policy Screen .........................................................................191
11.24 PSTN Line Screen ........................................................................................193
11.25 ISDN Line Screen .........................................................................................194
11.18.2.1 European Call Hold ...................................................................184
11.18.2.2 European Call Waiting ..............................................................185
11.18.2.3 European Call Transfer .............................................................185
11.18.2.4 European Three-Way Conference .............................................185
11.18.2.5 European Call Return ................................................................186
11.18.3.1 USA Call Hold ............................................................................186
11.18.3.2 USA Call Waiting ......................................................................186
11.18.3.3 USA Call Transfer ......................................................................186
11.18.3.4 USA Three-Way Conference .....................................................187
11.18.3.5 USA Call Return ........................................................................187
Chapter 12
Phone Usage ........................................................................................................ 197
12.1 Dialing a Telephone Number ..........................................................................197
12.2 Using Speed Dial to Dial a Telephone Number ..............................................197
12.3 Internal Calls ..................................................................................................197
12.4 Checking the Device’s IP Address .................................................................197
12.5 Auto Firmware Upgrade .................................................................................198
Chapter 13
Firewalls................................................................................................................ 199
13.1 Firewall Overview ..........................................................................................199
13.2 Types of Firewalls ..........................................................................................199
13.2.1 Packet Filtering Firewalls ......................................................................199
13.2.2 Application-level Firewalls ....................................................................200
13.2.3 Stateful Inspection Firewalls .................................................................200
16 Table of Contents
P-2602HWNLI User’s Guide
13.3 Introduction to ZyXEL’s Firewall .....................................................................200
13.3.1 Denial of Service Attacks ......................................................................201
13.4 Denial of Service ............................................................................................201
13.4.1 Basics ...................................................................................................201
13.4.2 Types of DoS Attacks ...........................................................................202
13.4.2.1 ICMP Vulnerability ......................................................................204
13.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................204
13.4.2.3 Traceroute ...................................................................................205
13.5 Stateful Inspection ..........................................................................................205
13.5.1 Stateful Inspection Process ..................................................................206
13.5.2 Stateful Inspection on Your ZyXEL Device ...........................................207
13.5.3 TCP Security .........................................................................................207
13.5.4 UDP/ICMP Security ..............................................................................208
13.5.5 Upper Layer Protocols ..........................................................................208
13.6 Guidelines for Enhancing Security with Your Firewall ....................................209
13.6.1 Security In General ...............................................................................209
Chapter 14
Firewall Configuration ......................................................................................... 211
14.1 Access Methods ............................................................................................. 211
14.2 Firewall Policies Overview ............................................................................211
14.3 Rule Logic Overview .....................................................................................212
14.3.1 Rule Checklist .......................................................................................212
14.3.2 Security Ramifications ..........................................................................212
14.3.3 Key Fields For Configuring Rules .........................................................213
14.3.3.1 Action ..........................................................................................213
14.3.3.2 Service ........................................................................................213
14.3.3.3 Source Address ...........................................................................213
14.3.3.4 Destination Address ....................................................................213
14.4 Connection Direction ......................................................................................213
14.4.1 LAN to WAN Rules ...............................................................................214
14.4.2 Alerts .....................................................................................................214
14.5 Triangle Route ................................................................................................214
14.5.1 The “Triangle Route” Problem ..............................................................214
14.5.2 Solving the “Triangle Route” Problem ...................................................215
14.6 General Firewall Policy ...............................................................................216
14.7 Firewall Rules Summary ...............................................................................218
14.7.1 Configuring Firewall Rules ..................................................................219
14.7.2 Customized Services ...........................................................................222
14.7.3 Configuring A Customized Service .....................................................223
14.8 Example Firewall Rule ...................................................................................223
14.9 Predefined Services .......................................................................................227
14.10 Firewall Threshold ....................................................................................227
Table of Contents 17
P-2602HWNLI User’s Guide
14.10.1 Threshold Values ................................................................................227
14.10.2 Half-Open Sessions ............................................................................228
14.10.3 Configuring Firewall Thresholds .........................................................229
Chapter 15
Content Filtering .................................................................................................. 231
15.1 Content Filtering Overview ............................................................................231
15.2 Configuring Keyword Blocking .....................................................................231
15.3 Configuring the Schedule .............................................................................232
15.4 Configuring Trusted Computers ...................................................................233
Chapter 16
Introduction to IPSec ........................................................................................... 235
16.1 VPN Overview ................................................................................................235
16.1.1 IPSec ....................................................................................................235
16.1.2 Security Association .............................................................................235
16.1.3 Other Terminology ................................................................................235
16.1.4 VPN Applications ..................................................................................236
16.2 IPSec Architecture .........................................................................................237
16.2.1 IPSec Algorithms ..................................................................................237
16.2.2 Key Management ..................................................................................237
16.3 Encapsulation .................................................................................................237
16.3.1 Transport Mode ....................................................................................238
16.3.2 Tunnel Mode ........................................................................................238
16.4 IPSec and NAT ...............................................................................................238
14.10.2.1 TCP Maximum Incomplete and Blocking Time .........................228
16.1.3.1 Encryption ...................................................................................235
16.1.3.2 Data Confidentiality .....................................................................236
16.1.3.3 Data Integrity ...............................................................................236
16.1.3.4 Data Origin Authentication ..........................................................236
Chapter 17
VPN Screens......................................................................................................... 241
17.1 VPN/IPSec Overview .....................................................................................241
17.2 IPSec Algorithms ............................................................................................241
17.2.1 AH (Authentication Header) Protocol ....................................................241
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................241
17.3 My IP Address ................................................................................................242
17.4 Secure Gateway Address ..............................................................................243
17.4.1 Dynamic Secure Gateway Address ......................................................243
17.5 VPN Setup Screen .........................................................................................243
17.6 Keep Alive ......................................................................................................245
17.7 VPN, NAT, and NAT Traversal .......................................................................246
18 Table of Contents
P-2602HWNLI User’s Guide
17.8 Remote DNS Server ......................................................................................247
17.9 ID Type and Content ......................................................................................247
17.9.1 ID Type and Content Examples ............................................................248
17.10 Pre-Shared Key ............................................................................................249
17.11 Editing VPN Policies .....................................................................................249
17.12 IKE Phases ..................................................................................................254
17.12.1 Negotiation Mode ................................................................................255
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................256
17.12.3 Perfect Forward Secrecy (PFS) .........................................................256
17.13 Configuring Advanced IKE Settings .............................................................256
17.14 Manual Key Setup ........................................................................................259
17.14.1 Security Parameter Index (SPI) .........................................................259
17.15 Configuring Manual Key ...............................................................................259
17.16 Viewing SA Monitor ......................................................................................262
17.17 Configuring Global Setting ...........................................................................264
17.18 Telecommuter VPN/IPSec Examples ...........................................................264
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................264
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................265
17.19 VPN and Remote Management ...................................................................267
Chapter 18
Static Route .......................................................................................................... 269
18.1 Static Route .................................................................................................269
18.2 Configuring Static Route ...............................................................................269
18.2.1 Static Route Edit .................................................................................271
Chapter 19
Bandwidth Management...................................................................................... 273
19.1 Bandwidth Management Overview ...............................................................273
19.2 Application-based Bandwidth Management ...................................................273
19.3 Subnet-based Bandwidth Management .........................................................273
19.4 Application and Subnet-based Bandwidth Management ...............................274
19.5 Scheduler .......................................................................................................274
19.5.1 Priority-based Scheduler ......................................................................274
19.5.2 Fairness-based Scheduler ....................................................................274
19.6 Maximize Bandwidth Usage ...........................................................................275
19.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................275
19.6.2 Maximize Bandwidth Usage Example ..................................................275
19.6.2.1 Priority-based Allotment of Unused and Unallocated Bandwidth 276
19.6.2.2 Fairness-based Allotment of Unused and Unallocated Bandwidth ... 276
19.6.3 Bandwidth Management Priorities ........................................................277
19.7 Over Allotment of Bandwidth ..........................................................................277
Table of Contents 19
P-2602HWNLI User’s Guide
19.8 Configuring Summary ...................................................................................278
19.9 Bandwidth Management Rule Setup ............................................................279
19.9.1 Rule Configuration ................................................................................280
19.10 Bandwidth Monitor .....................................................................................283
Chapter 20
Dynamic DNS Setup............................................................................................. 285
20.1 Dynamic DNS Overview ...............................................................................285
20.1.1 DYNDNS Wildcard ................................................................................285
20.2 Configuring Dynamic DNS ............................................................................285
Chapter 21
Remote Management Configuration .................................................................. 289
21.1 Remote Management Overview ....................................................................289
21.1.1 Remote Management Limitations .........................................................289
21.1.2 Remote Management and NAT ............................................................290
21.1.3 System Timeout ....................................................................................290
21.2 WWW .............................................................................................................290
21.3 Telnet ..............................................................................................................291
21.4 Configuring Telnet ..........................................................................................292
21.5 Configuring FTP ............................................................................................293
21.6 SNMP .............................................................................................................294
21.6.1 Supported MIBs ....................................................................................295
21.6.2 SNMP Traps .........................................................................................295
21.6.3 Configuring SNMP ................................................................................296
21.7 Configuring DNS ..........................................................................................297
21.8 Configuring ICMP ...........................................................................................298
Chapter 22
Universal Plug-and-Play (UPnP) ......................................................................... 301
22.1 Introducing Universal Plug and Play .............................................................301
22.1.1 How do I know if I'm using UPnP? ........................................................301
22.1.2 NAT Traversal .......................................................................................301
22.1.3 Cautions with UPnP ..............................................................................302
22.2 UPnP and ZyXEL ...........................................................................................302
22.2.1 Configuring UPnP ................................................................................302
22.3 Installing UPnP in Windows Example ............................................................303
22.4 Using UPnP in Windows XP Example ...........................................................307
Chapter 23
System .................................................................................................................. 313
23.1 General Setup and System Name .................................................................313
23.1.1 General Setup ......................................................................................313
20 Table of Contents
P-2602HWNLI User’s Guide
23.2 Time Setting ..................................................................................................315
Chapter 24
Logs ...................................................................................................................... 319
24.1 Logs Overview ..............................................................................................319
24.1.1 Alerts and Logs .....................................................................................319
24.2 Viewing the Logs ............................................................................................319
24.3 Configuring Log Settings ...............................................................................320
24.4 SMTP Error Messages ...................................................................................323
24.4.1 Example E-mail Log ..............................................................................323
24.5 Log Descriptions ............................................................................................324
Chapter 25
Tools ...................................................................................................................... 333
25.1 Introduction ....................................................................................................333
25.2 Filename Conventions ...................................................................................333
25.3 File Maintenance Over WAN ..........................................................................334
25.4 Firmware Upgrade Screen ...........................................................................334
25.5 Backup and Restore ......................................................................................336
25.5.1 Backup Configuration ..........................................................................337
25.5.2 Restore Configuration ..........................................................................338
25.5.3 Reset to Factory Defaults ....................................................................339
25.6 Restart ............................................................................................................340
25.7 Using FTP or TFTP to Back Up Configuration ...............................................340
25.7.1 Using the FTP Commands to Back Up Configuration ..........................340
25.7.2 FTP Command Configuration Backup Example ..................................340
25.7.3 Configuration Backup Using GUI-based FTP Clients ...........................341
25.7.4 Backup Configuration Using TFTP .......................................................341
25.7.5 TFTP Command Configuration Backup Example .................................342
25.7.6 Configuration Backup Using GUI-based TFTP Clients .........................342
25.8 Using FTP or TFTP to Restore Configuration ..............................................343
25.8.1 Restore Using FTP Session Example ..................................................343
25.9 FTP and TFTP Firmware and Configuration File Uploads .............................343
25.9.1 FTP File Upload Command from the DOS Prompt Example ................343
25.9.2 FTP Session Example of Firmware File Upload ...................................344
25.9.3 TFTP File Upload ..................................................................................344
25.9.4 TFTP Upload Command Example ........................................................345
Chapter 26
Diagnostic ............................................................................................................347
26.1 General Diagnostic ........................................................................................347
26.2 DSL Line Diagnostic .....................................................................................347
Table of Contents 21
P-2602HWNLI User’s Guide
Chapter 27
Troubleshooting ................................................................................................... 351
27.1 Problems Starting Up the ZyXEL Device .......................................................351
27.2 Problems with the LAN ...................................................................................351
27.3 Problems with the WAN .................................................................................352
27.4 Problems Accessing the ZyXEL Device .........................................................353
27.4.1 Pop-up Windows, JavaScripts and Java Permissions ..........................353
27.5 Telephone Problems ......................................................................................361
Appendix A
Product Specifications ....................................................................................... 363
Power Adapter Specifications ................................................................................ 366
Appendix B
Setting up Your Computer’s IP Address............................................................ 369
27.4.1.1 Internet Explorer Pop-up Blockers ..............................................354
27.4.1.2 JavaScripts ..................................................................................357
27.4.1.3 Java Permissions ........................................................................359
Windows 95/98/Me................................................................................................. 369
Configuring ...................................................................................................... 371
Verifying Settings............................................................................................. 372
Windows 2000/NT/XP ............................................................................................ 372
Verifying Settings............................................................................................. 376
Macintosh OS 8/9................................................................................................... 376
Verifying Settings............................................................................................. 378
Macintosh OS X ..................................................................................................... 378
Verifying Settings............................................................................................. 379
Appendix C
IP Subnetting ........................................................................................................ 381
IP Addressing......................................................................................................... 381
IP Classes .............................................................................................................. 381
Subnet Masks ........................................................................................................ 382
Subnetting .............................................................................................................. 382
Example: Two Subnets .......................................................................................... 383
Example: Four Subnets.......................................................................................... 385
Example Eight Subnets.......................................................................................... 386
Subnetting With Class A and Class B Networks. ................................................... 387
Appendix D
About ADSL .......................................................................................................... 389
Introduction to DSL ................................................................................................ 389
22 Table of Contents
P-2602HWNLI User’s Guide
ADSL Overview...................................................................................................... 389
Advantages of ADSL.............................................................................................. 389
Appendix E
Virtual Circuit Topology ......................................................................................391
Appendix F
Wireless LANs ...................................................................................................... 393
Wireless LAN Topologies ....................................................................................... 393
Ad-hoc Wireless LAN Configuration ................................................................ 393
BSS.................................................................................................................. 393
ESS.................................................................................................................. 394
Channel.................................................................................................................. 395
RTS/CTS................................................................................................................ 395
Fragmentation Threshold ....................................................................................... 396
Preamble Type....................................................................................................... 397
IEEE 802.11g Wireless LAN .................................................................................. 397
Wireless Security Overview ................................................................................... 398
IEEE 802.1x ........................................................................................................... 398
RADIUS.................................................................................................................. 399
Types of RADIUS Messages ........................................................................... 399
Types of Authentication.......................................................................................... 400
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 400
EAP-TLS (Transport Layer Security) ............................................................... 400
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 400
PEAP (Protected EAP) .................................................................................... 401
LEAP................................................................................................................ 401
Dynamic WEP Key Exchange................................................................................ 401
WPA and WPA2 ..................................................................................................... 402
Encryption ....................................................................................................... 402
User Authentication ........................................................................................ 403
Wireless Client WPA Supplicants .................................................................... 403
WPA(2) with RADIUS Application Example..................................................... 403
27.5.1 WPA(2)-PSK Application Example .......................................................404
Security Parameters Summary .............................................................................. 405
Appendix G
Common Services............................................................................................... 407
Appendix H
Internal SPTGEN .................................................................................................. 411
Internal SPTGEN Overview ................................................................................... 411
The Configuration Text File Format ........................................................................ 411
Table of Contents 23
P-2602HWNLI User’s Guide
Internal SPTGEN File Modification - Important Points to Remember.............. 412
Internal SPTGEN FTP Download Example............................................................ 412
Internal SPTGEN FTP Upload Example ................................................................ 413
Example Internal SPTGEN Menus......................................................................... 414
Command Examples.............................................................................................. 426
Appendix I
Commands............................................................................................................ 427
Accessing the Command Interpreter...................................................................... 427
Command Syntax................................................................................................... 427
Command Usage ................................................................................................... 427
Filtering .................................................................................................................. 427
The Filter Structure of the ZyXEL Device ........................................................ 429
Packet Filtering Vs. Firewall ............................................................................ 430
Filter Commands ............................................................................................. 431
WAN Call Schedules.............................................................................................. 432
Index...................................................................................................................... 435
24 Table of Contents
P-2602HWNLI User’s Guide

List of Figures

Figure 1 Internet Access Application ...................................................................... 46
Figure 2 Internet Telephony Service Provider Application ..................................... 47
Figure 3 Peer-to-peer Calling ................................................................................. 47
Figure 4 Firewall Application .................................................................................. 48
Figure 5 LAN-to-LAN Application ........................................................................... 49
Figure 6 Lights ....................................................................................................... 49
Figure 7 Connecting a POTS Splitter ..................................................................... 51
Figure 8 Connecting a Microfilter ........................................................................... 52
Figure 9 Password Screen ..................................................................................... 54
Figure 10 Change Password Screen ..................................................................... 54
Figure 11 Wizard or Advanced Screen ................................................................. 55
Figure 12 Main Screen ........................................................................................... 56
Figure 13 Select a Mode ........................................................................................ 61
Figure 14 Wizard Welcome .................................................................................... 62
Figure 15 Auto Detection: No DSL Connection ...................................................... 62
Figure 16 Auto-Detection: PPPoE .......................................................................... 63
Figure 17 Auto Detection: Failed ............................................................................ 63
Figure 18 Internet Access Wizard Setup: ISP Parameters .................................... 64
Figure 19 Internet Connection with PPPoE ............................................................ 65
Figure 20 Internet Connection with RFC 1483 ....................................................... 66
Figure 21 Internet Connection with ENET ENCAP ................................................ 67
Figure 22 Internet Connection with PPPoA ............................................................ 68
Figure 23 Connection Test Failed-1 ....................................................................... 69
Figure 24 Connection Test Failed-2. ...................................................................... 69
Figure 25 Connection Test Successful ................................................................... 70
Figure 26 Wireless LAN Setup Wizard 1 ................................................................ 71
Figure 27 Wireless LAN ......................................................................................... 72
Figure 28 Manually Assign a WPA key .................................................................. 73
Figure 29 Manually Assign a WEP key .................................................................. 74
Figure 30 Wireless LAN Setup 3 ............................................................................ 75
Figure 31 Internet Access and WLAN Wizard Setup Complete ............................. 75
Figure 32 Select a Mode ........................................................................................ 77
Figure 33 Wizard: Welcome ................................................................................... 78
Figure 34 VOIP Wizard Configuration .................................................................... 78
Figure 35 SIP Registration Test ............................................................................. 79
Figure 36 VoIP Wizard Fail .................................................................................... 79
Figure 37 VOIP Wizard Finish ............................................................................... 80
Figure 38 Select a Mode ........................................................................................ 83
List of Figures 25
P-2602HWNLI User’s Guide
Figure 39 Wizard: Welcome ................................................................................... 83
Figure 40 Bandwidth Management Wizard: General Information .......................... 84
Figure 41 Bandwidth Management Wizard: Service Configuration ........................ 85
Figure 42 Bandwidth Management Wizard: Complete ........................................... 86
Figure 43 Example of Traffic Shaping .................................................................... 91
Figure 44 Internet Access Setup (PPPoE) ............................................................. 93
Figure 45 Advanced Internet Access Setup ........................................................... 95
Figure 46 More Connections .................................................................................. 97
Figure 47 More Connections Edit ........................................................................... 98
Figure 48 More Connections Edit Advanced .......................................................... 100
Figure 49 WAN Backup Setup ............................................................................... 101
Figure 50 Status Screen ......................................................................................... 104
Figure 51 Client List ............................................................................................... 108
Figure 52 Any IP Table ........................................................................................... 109
Figure 53 WLAN Status .......................................................................................... 110
Figure 54 Bandwidth Status ................................................................................... 111
Figure 55 Status: VPN Status ................................................................................. 112
Figure 56 Packet Statistics ..................................................................................... 113
Figure 57 VoIP Statistics ........................................................................................ 114
Figure 58 LAN and WAN IP Addresses ................................................................. 117
Figure 59 Any IP Example ..................................................................................... 122
Figure 60 LAN IP .................................................................................................... 123
Figure 61 Advanced LAN Setup ............................................................................. 124
Figure 62 DHCP Setup .......................................................................................... 125
Figure 63 LAN Client List ....................................................................................... 127
Figure 64 Physical Network & Partitioned Logical Networks ................................. 128
Figure 65 LAN IP Alias ........................................................................................... 129
Figure 66 Wireless LAN: General ......................................................................... 134
Figure 67 Wireless: Static WEP Encryption ........................................................... 136
Figure 68 Wireless: WPA-PSK/WPA2-PSK ............................................................ 137
Figure 69 Wireless: WPA/WPA2 ............................................................................ 139
Figure 70 Advanced ............................................................................................... 141
Figure 71 OTIST .................................................................................................... 143
Figure 72 Example Wireless Client OTIST Screen ................................................ 144
Figure 73 Security Key ........................................................................................... 144
Figure 74 OTIST in Progress (AP) ......................................................................... 144
Figure 75 OTIST in Progress (Client) ..................................................................... 144
Figure 76 No AP with OTIST Found ...................................................................... 145
Figure 77 Start OTIST? .......................................................................................... 145
Figure 78 MAC Address Filter ................................................................................ 146
Figure 79 Wireless LAN: QoS ................................................................................ 149
Figure 80 Application Priority Configuration ........................................................... 150
Figure 81 How NAT Works ..................................................................................... 155
26 List of Figures
P-2602HWNLI User’s Guide
Figure 82 NAT Application With IP Alias ................................................................ 155
Figure 83 NAT General .......................................................................................... 157
Figure 84 Multiple Servers Behind NAT Example .................................................. 159
Figure 85 Port Forwarding ..................................................................................... 160
Figure 86 Port Forwarding Rule Setup ................................................................. 161
Figure 87 Address Mapping Rules ......................................................................... 162
Figure 88 Edit Address Mapping Rule ................................................................. 164
Figure 89 SIP User Agent ...................................................................................... 167
Figure 90 SIP Proxy Server ................................................................................... 168
Figure 91 SIP Redirect Server ............................................................................... 169
Figure 92 SIP > SIP Settings ................................................................................. 170
Figure 93 VoIP > SIP Settings > Advanced ........................................................... 174
Figure 94 SIP > QoS .............................................................................................. 178
Figure 95 Phone > Analog Phone .......................................................................... 180
Figure 96 Phone > Analog Phone > Advanced ...................................................... 181
Figure 97 Phone > ISDN Phone ............................................................................. 182
Figure 98 Phone > Common .................................................................................. 183
Figure 99 VoIP > Phone > Region ......................................................................... 189
Figure 100 Phone Book > Speed Dial .................................................................... 190
Figure 101 Phone Book > Incoming Call Policy ..................................................... 192
Figure 102 PSTN Line > General ........................................................................... 194
Figure 103 ISDN Line > General ............................................................................ 195
Figure 104 Firewall Application .............................................................................. 201
Figure 105 Three-Way Handshake ........................................................................ 203
Figure 106 SYN Flood ............................................................................................ 203
Figure 107 Smurf Attack ........................................................................................ 204
Figure 108 Stateful Inspection ................................................................................ 206
Figure 109 Ideal Firewall Setup ............................................................................. 214
Figure 110 “Triangle Route” Problem ..................................................................... 215
Figure 111 IP Alias ................................................................................................. 216
Figure 112 Firewall: General .................................................................................. 217
Figure 113 Firewall Rules ...................................................................................... 218
Figure 114 Firewall: Edit Rule ................................................................................ 220
Figure 115 Firewall: Customized Services ............................................................. 222
Figure 116 Firewall: Configure Customized Services ............................................. 223
Figure 117 Firewall Example: Rules ....................................................................... 224
Figure 118 Edit Custom Port Example ................................................................... 224
Figure 119 Firewall Example: Edit Rule: Destination Address .............................. 225
Figure 120 Firewall Example: Edit Rule: Select Customized Services .................. 226
Figure 121 Firewall Example: Rules: MyService ................................................... 227
Figure 122 Firewall: Threshold ............................................................................... 229
Figure 123 Content Filter: Keyword ....................................................................... 232
Figure 124 Content Filter: Schedule ...................................................................... 233
List of Figures 27
P-2602HWNLI User’s Guide
Figure 125 Content Filter: Trusted ......................................................................... 234
Figure 126 Encryption and Decryption ................................................................... 236
Figure 127 IPSec Architecture ............................................................................... 237
Figure 128 Transport and Tunnel Mode IPSec Encapsulation ............................... 238
Figure 129 IPSec Summary Fields ........................................................................ 243
Figure 130 VPN Setup ........................................................................................... 244
Figure 131 NAT Router Between IPSec Routers ................................................... 246
Figure 132 VPN Host using Intranet DNS Server Example ................................... 247
Figure 133 Edit VPN Policies ................................................................................ 250
Figure 134 Two Phases to Set Up the IPSec SA ................................................... 254
Figure 135 Advanced VPN Policies ....................................................................... 257
Figure 136 VPN: Manual Key ................................................................................. 260
Figure 137 VPN: SA Monitor .................................................................................. 263
Figure 138 VPN: Global Setting ............................................................................. 264
Figure 139 Telecommuters Sharing One VPN Rule Example ................................ 265
Figure 140 Telecommuters Using Unique VPN Rules Example ............................ 266
Figure 141 Example of Static Routing Topology .................................................... 269
Figure 142 Static Route .......................................................................................... 270
Figure 143 Static Route Edit .................................................................................. 271
Figure 144 Subnet-based Bandwidth Management Example ................................ 274
Figure 145 Bandwidth Management: Summary ..................................................... 278
Figure 146 Bandwidth Management: Rule Setup .................................................. 279
Figure 147 Bandwidth Management Rule Configuration ....................................... 281
Figure 148 Bandwidth Management: Monitor ....................................................... 283
Figure 149 Dynamic DNS ...................................................................................... 286
Figure 150 Remote Management: WWW .............................................................. 291
Figure 151 Telnet Configuration on a TCP/IP Network .......................................... 292
Figure 152 Remote Management: Telnet ............................................................... 292
Figure 153 Remote Management: FTP .................................................................. 293
Figure 154 SNMP Management Model .................................................................. 294
Figure 155 Remote Management: SNMP .............................................................. 296
Figure 156 Remote Management: DNS ................................................................. 298
Figure 157 Remote Management: ICMP ............................................................... 299
Figure 158 Configuring UPnP ................................................................................ 303
Figure 159 Add/Remove Programs: Windows Setup: Communication .................. 304
Figure 160 Add/Remove Programs: Windows Setup: Communication: Components
Figure 161 Network Connections ........................................................................... 305
Figure 162 Windows Optional Networking Components Wizard ........................... 306
Figure 163 Networking Services ............................................................................ 306
Figure 164 Network Connections ........................................................................... 307
Figure 165 Internet Connection Properties ........................................................... 308
Figure 166 Internet Connection Properties: Advanced Settings ............................ 309
304
28 List of Figures
P-2602HWNLI User’s Guide
Figure 167 Internet Connection Properties: Advanced Settings: Add .................... 309
Figure 168 System Tray Icon ................................................................................. 310
Figure 169 Internet Connection Status ................................................................... 310
Figure 170 Network Connections ........................................................................... 311
Figure 171 Network Connections: My Network Places .......................................... 312
Figure 172 Network Connections: My Network Places: Properties: Example ........ 312
Figure 173 System General Setup ......................................................................... 314
Figure 174 System Time Setting ............................................................................ 315
Figure 175 View Log .............................................................................................. 320
Figure 176 Log Settings ......................................................................................... 321
Figure 177 E-mail Log Example ............................................................................. 324
Figure 178 Firmware Upgrade ............................................................................... 335
Figure 179 Firmware Upload In Progress .............................................................. 336
Figure 180 Network Temporarily Disconnected ..................................................... 336
Figure 181 Firmware Upload Error Message ......................................................... 336
Figure 182 Configuration ........................................................................................ 337
Figure 183 Configuration Upload Successful ......................................................... 338
Figure 184 Network Temporarily Disconnected ..................................................... 339
Figure 185 Configuration Upload Error .................................................................. 339
Figure 186 Reset Warning Message ...................................................................... 339
Figure 187 Restart Screen ..................................................................................... 340
Figure 188 FTP Session Example ......................................................................... 341
Figure 189 Restore Using FTP Session Example .................................................. 343
Figure 190 FTP Session Example of Firmware File Upload .................................. 344
Figure 191 Diagnostic: General ............................................................................. 347
Figure 192 Diagnostic: DSL Line ........................................................................... 348
Figure 193 Pop-up Blocker .................................................................................... 354
Figure 194 Internet Options ................................................................................... 355
Figure 195 Internet Options ................................................................................... 356
Figure 196 Pop-up Blocker Settings ...................................................................... 357
Figure 197 Internet Options ................................................................................... 358
Figure 198 Security Settings - Java Scripting ........................................................ 359
Figure 199 Security Settings - Java ....................................................................... 360
Figure 200 Java (Sun) ............................................................................................ 361
Figure 201 WIndows 95/98/Me: Network: Configuration ........................................ 370
Figure 202 Windows 95/98/Me: TCP/IP Properties: IP Address ............................ 371
Figure 203 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............... 372
Figure 204 Windows XP: Start Menu ..................................................................... 373
Figure 205 Windows XP: Control Panel ................................................................. 373
Figure 206 Windows XP: Control Panel: Network Connections: Properties .......... 374
Figure 207 Windows XP: Local Area Connection Properties ................................. 374
Figure 208 Windows XP: Advanced TCP/IP Settings ............................................ 375
Figure 209 Windows XP: Internet Protocol (TCP/IP) Properties ............................ 376
List of Figures 29
P-2602HWNLI User’s Guide
Figure 210 Macintosh OS 8/9: Apple Menu ........................................................... 377
Figure 211 Macintosh OS 8/9: TCP/IP ................................................................... 377
Figure 212 Macintosh OS X: Apple Menu .............................................................. 378
Figure 213 Macintosh OS X: Network .................................................................... 379
Figure 214 Virtual Circuit Topology ........................................................................ 391
Figure 215 Peer-to-Peer Communication in an Ad-hoc Network ........................... 393
Figure 216 Basic Service Set ................................................................................. 394
Figure 217 Infrastructure WLAN ............................................................................ 395
Figure 218 RTS/CTS .............................................................................................. 396
Figure 219 WPA(2) with RADIUS Application Example ......................................... 404
Figure 220 WPA(2)-PSK Authentication ................................................................ 405
Figure 221 Configuration Text File Format: Column Descriptions .......................... 411
Figure 222 Invalid Parameter Entered: Command Line Example .......................... 412
Figure 223 Valid Parameter Entered: Command Line Example ............................. 412
Figure 224 Internal SPTGEN FTP Download Example ......................................... 413
Figure 225 Internal SPTGEN FTP Upload Example .............................................. 413
Figure 226 Outgoing Packet Filtering Process ....................................................... 428
Figure 227 Filter Rule Process ............................................................................... 429
30 List of Figures
Loading...
+ 412 hidden pages