ZyXEL P-660H-61, P-660H-63, P-660H-67 User Manual

Prestige 660H Series
ADSL 2/2+ Gateway
User's Guide
Version 3.40 (QT)
April 2004
Copyright
Copyright © 2004 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
ii Copyright
Federal Communications Commission (FCC)
Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and the receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4. Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Certifications
1. Go to www.zyxel.com
2. Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
3. Select the certification you wish to view from this page
FCC Statements iii
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out­dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Safety Warnings
1. To reduce the risk of fire, use only No. 26 AWG or larger telephone wire.
2. Do not use this product near water, for example, in a wet basement or near a swimming pool.
3. Avoid using this product during an electrical storm. There may be a remote risk of electric shock from lightening.
iv ZyXEL Warranty
Customer Support
Please have the following information ready when you contact customer support.
Product model and serial number.
Warranty Information.
Date that you received your device.
Brief description of the problem and the steps you took to solve it.
SUPPORT E-MAIL TELEPHONE1 WEB SITE METHOD
LOCATION
WORLDWIDE
AMERICA
SALES E-MAIL FAX1 FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw
support@zyxel.com +1-800-255-4101
sales@zyxel.com
support@zyxel.de +49-2405-6909-0 www.zyxel.de GERMANY
sales@zyxel.de
support@zyxel.es +34 902 195 420 SPAIN
sales@zyxel.es
support@zyxel.dk +45 39 55 07 00 www.zyxel.dk DENMARK
sales@zyxel.dk
support@zyxel.no +47 22 80 61 80 www.zyxel.no NORWAY
sales@zyxel.no
support@zyxel.se +46 31 744 7700 www.zyxel.se SWEDEN
sales@zyxel.se
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi FINLAND
sales@zyxel.fi
+886-3-578-2439 ftp.zyxel.com
+1-714-632-0882
+1-714-632-0858 ftp.us.zyxel.com
+49-2405-6909-99
+33 (0)4 72 52 97 97 FRANCE info@zyxel.fr
+33 (0)4 72 52 19 20
+34 913 005 345
+45 39 55 07 07
+47 22 80 61 81
+46 31 744 7701
+358-9-4780 8448
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com NORTH
www.zyxel.fr ZyXEL France
www.zyxel.es
ZyXEL Communications
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan
ZyXEL Communications Inc. 1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
ZyXEL Deutschland GmbH. Adenauerstr. 20/A2 D-52146 Wuerselen Germany
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Alejandro Villegas 33 1º, 28043 Madrid Spain
ZyXEL Communications A/S Columbusvej 5 2860 Soeborg Denmark
ZyXEL Communications A/S Nils Hansens vei 13 0667 Oslo Norway
ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg Sweden
ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland
1
“+” is the (prefix) number you enter to make an international telephone call.
Customer Support v
Table of Contents
Copyright............................................................................................................................................ii
Federal Communications Commission (FCC) Interference Statement ...................................... iii
ZyXEL Limited Warranty ...............................................................................................................iv
Customer Support..............................................................................................................................v
List of Figures...................................................................................................................................xii
List of Tables ...................................................................................................................................xvi
List of Charts...................................................................................................................................xix
Preface...............................................................................................................................................xx
Introduction to DSL.......................................................................................................................xxii
Getting Started......................................................................................................................................... I
Chapter 1 Getting To Know Your Prestige ................................................................................. 1-1
1.1 Introducing the Prestige ................................................................................................... 1-1
1.2 Features of the Prestige .................................................................................................... 1-1
1.3 Applications for the Prestige............................................................................................ 1-5
Chapter 2 Introducing the Web Configurator ............................................................................ 2-1
2.1 Web Configurator Overview............................................................................................ 2-1
2.2 Accessing the Prestige Web Configurator ....................................................................... 2-1
2.3 Resetting the Prestige....................................................................................................... 2-1
2.4 Navigating the Prestige Web Configurator ...................................................................... 2-2
Chapter 3 Wizard Setup................................................................................................................ 3-1
3.1 Wizard Setup Introduction............................................................................................... 3-1
3.2 Encapsulation...................................................................................................................3-1
3.3 Multiplexing..................................................................................................................... 3-2
3.4 VPI and VCI .................................................................................................................... 3-2
3.5 Wizard Setup Configuration: First Screen ....................................................................... 3-2
3.6 IP Address and Subnet Mask ........................................................................................... 3-3
3.7 IP Address Assignment.................................................................................................... 3-4
3.8 Nailed-Up Connection (PPP)........................................................................................... 3-5
3.9 NAT ................................................................................................................................. 3-5
3.10 Wizard Setup Configuration: Second Screen................................................................... 3-5
3.11 DHCP Setup..................................................................................................................... 3-9
3.12 Wizard Setup Configuration: Third Screen...................................................................... 3-9
3.13 Wizard Setup Configuration: Connection Tests ............................................................ 3-11
3.14 Test Your Internet Connection....................................................................................... 3-12
Password, LAN and WAN .....................................................................................................................II
Chapter 4 Password Setup ............................................................................................................ 4-1
4.1 Password Overview ......................................................................................................... 4-1
4.2 Configuring Password...................................................................................................... 4-1
Chapter 5 LAN Setup .................................................................................................................... 5-1
5.1 LAN Overview................................................................................................................. 5-1
vi Table of Contents
5.2 DNS Server Address.........................................................................................................5-1
5.3 DNS Server Address Assignment.....................................................................................5-2
5.4 LAN TCP/IP .....................................................................................................................5-2
5.5 Configuring LAN..............................................................................................................5-3
Chapter 6 WAN Setup....................................................................................................................6-1
6.1 WAN Overview ................................................................................................................6-1
6.2 Metric................................................................................................................................6-1
6.3 PPPoE Encapsulation........................................................................................................6-1
6.4 Traffic Shaping .................................................................................................................6-2
6.5 Configuring WAN Setup ..................................................................................................6-2
6.6 Traffic Redirect.................................................................................................................6-5
6.7 Configuring WAN Backup ...............................................................................................6-6
NAT, Dynamic DNS and Time and Date............................................................................................ III
Chapter 7 Network Address Translation (NAT) Screens ...........................................................7-1
7.1 NAT Overview .................................................................................................................7-1
7.2 SUA (Single User Account) Versus NAT ........................................................................7-4
7.3 SUA Server.......................................................................................................................7-4
7.4 Selecting the NAT Mode ..................................................................................................7-5
7.5 Configuring SUA Server ..................................................................................................7-6
7.6 Configuring Address Mapping .........................................................................................7-7
7.7 Editing an Address Mapping Rule....................................................................................7-9
Chapter 8 Dynamic DNS Setup .....................................................................................................8-1
8.1 Dynamic DNS...................................................................................................................8-1
8.2 Configuring Dynamic DNS ..............................................................................................8-1
Chapter 9 Time and Date...............................................................................................................9-3
9.1 Configuring Time and Date ..............................................................................................9-3
Firewall and Content Filter..................................................................................................................IV
Chapter 10 Firewalls ....................................................................................................................10-1
10.1 Firewall Overview ..........................................................................................................10-1
10.2 Types of Firewalls ..........................................................................................................10-1
10.3 Introduction to ZyXEL’s Firewall ..................................................................................10-2
10.4 Denial of Service ............................................................................................................10-3
10.5 Stateful Inspection ..........................................................................................................10-6
10.6 Guidelines for Enhancing Security with Your Firewall .................................................10-9
10.7 Packet Filtering Vs Firewall .........................................................................................10-10
Chapter 11 Firewall Configuration.............................................................................................11-1
11.1 Remote Management and the Firewall ...........................................................................11-1
11.2 Enabling the Firewall......................................................................................................11-1
11.3 Attack Alert ....................................................................................................................11-1
Chapter 12 Creating Custom Rules ............................................................................................12-1
12.1 Rules Overview ..............................................................................................................12-1
12.2 Rule Logic Overview......................................................................................................12-1
12.3 Connection Direction......................................................................................................12-2
12.4 Rule Summary ................................................................................................................12-3
12.5 Predefined Services.........................................................................................................12-5
12.6 Creating/Editing Firewall Rules .....................................................................................12-7
Table of Contents vii
12.7 Timeout........................................................................................................................ 12-10
Chapter 13 Customized Services ................................................................................................ 13-1
13.1 Introduction to Customized Services ............................................................................. 13-1
13.2 Creating/Editing A Customized Service ........................................................................ 13-2
13.3 Example Custom Service Firewall Rule ........................................................................ 13-2
Chapter 14 Content Filtering...................................................................................................... 14-1
14.1 Content Filtering Overview ........................................................................................... 14-1
14.2 Configuring Keyword Blocking..................................................................................... 14-1
14.3 Configuring the Schedule............................................................................................... 14-2
14.4 Configuring Trusted Computers .................................................................................... 14-3
Remote Management, UPnP and Logs ................................................................................................. V
Chapter 15 Remote Management Configuration...................................................................... 15-1
15.1 Remote Management Overview..................................................................................... 15-1
15.2 Telnet ............................................................................................................................. 15-2
15.3 FTP................................................................................................................................. 15-2
15.4 Web................................................................................................................................ 15-2
15.5 Configuring Remote Management................................................................................. 15-2
Chapter 16 Universal Plug-and-Play (UPnP)............................................................................ 16-1
16.1 Introducing Universal Plug and Play ............................................................................. 16-1
16.2 UPnP and ZyXEL .......................................................................................................... 16-1
16.3 Installing UPnP in Windows Example........................................................................... 16-2
16.4 Using UPnP in Windows XP Example.......................................................................... 16-4
Chapter 17 Logs Screens ............................................................................................................. 17-1
17.1 Logs Overview............................................................................................................... 17-1
17.2 Configuring Log Settings............................................................................................... 17-1
17.3 Displaying the Logs ....................................................................................................... 17-3
17.4 SMTP Error Messages ................................................................................................... 17-4
Bandwidth Management.......................................................................................................................VI
Chapter 18 Bandwidth Management ......................................................................................... 18-1
18.1 Bandwidth Management Overview................................................................................ 18-1
18.2 Bandwidth Classes and Filters ....................................................................................... 18-1
18.3 Proportional Bandwidth Allocation ............................................................................... 18-1
18.4 Bandwidth Management Usage Examples..................................................................... 18-2
18.5 Scheduler........................................................................................................................ 18-3
18.6 Maximize Bandwidth Usage.......................................................................................... 18-3
18.7 Bandwidth Borrowing.................................................................................................... 18-5
18.8 Configuring Summary.................................................................................................... 18-7
18.9 Configuring Class Setup ................................................................................................ 18-8
18.10 Bandwidth Monitor.................................................................................................. 18-12
Maintenance........................................................................................................................................ VII
Chapter 19 Maintenance ............................................................................................................. 19-1
19.1 Maintenance Overview .................................................................................................. 19-1
19.2 System Status Screen ..................................................................................................... 19-1
19.3 DHCP Table Screen....................................................................................................... 19-4
19.4 Diagnostic Screens......................................................................................................... 19-5
19.5 Firmware Screen ............................................................................................................ 19-6
viii Table of Contents
SMT General Configuration .............................................................................................................VIII
Chapter 20 Introducing the SMT................................................................................................20-1
20.1 SMT Introduction ...........................................................................................................20-1
20.2 Navigating the SMT Interface ........................................................................................20-2
20.3 Changing the System Password......................................................................................20-4
Chapter 21 Menu 1 General Setup..............................................................................................21-1
21.1 General Setup..................................................................................................................21-1
21.2 Procedure To Configure Menu 1 ....................................................................................21-1
Chapter 22 Menu 2 WAN Backup Setup....................................................................................22-1
22.1 Introduction to WAN Backup Setup...............................................................................22-1
22.2 Configuring Dial Backup in Menu 2 ..............................................................................22-1
Chapter 23 Menu 3 LAN Setup ...................................................................................................23-1
23.1 LAN Setup......................................................................................................................23-1
23.2 Protocol Dependent Ethernet Setup................................................................................23-2
23.3 TCP/IP Ethernet Setup and DHCP .................................................................................23-2
Chapter 24 Internet Access..........................................................................................................24-1
24.1 Internet Access Overview...............................................................................................24-1
24.2 IP Policies .......................................................................................................................24-1
24.3 IP Alias ...........................................................................................................................24-1
24.4 IP Alias Setup .................................................................................................................24-2
24.5 Route IP Setup ................................................................................................................24-3
24.6 Internet Access Configuration ........................................................................................24-4
Chapter 25 Remote Node Configuration ....................................................................................25-1
25.1 Remote Node Setup Overview .......................................................................................25-1
25.2 Remote Node Setup ........................................................................................................25-1
25.3 Remote Node Network Layer Options ...........................................................................25-5
25.4 Remote Node Filter.........................................................................................................25-7
25.5 Editing ATM Layer Options...........................................................................................25-8
Chapter 26 Static Route Setup ....................................................................................................26-1
26.1 IP Static Route Overview ...............................................................................................26-1
26.2 Configuration..................................................................................................................26-1
Chapter 27 Bridging Setup ..........................................................................................................27-1
27.1 Bridging in General ........................................................................................................27-1
27.2 Bridge Ethernet Setup.....................................................................................................27-1
Chapter 28 Network Address Translation (NAT) .....................................................................28-1
28.1 Using NAT......................................................................................................................28-1
28.2 Applying NAT ................................................................................................................28-1
28.3 NAT Setup......................................................................................................................28-3
28.4 Configuring a Server behind NAT..................................................................................28-8
28.5 General NAT Examples..................................................................................................28-9
Chapter 29 Enabling the Firewall ...............................................................................................29-1
29.1 Remote Management and the Firewall ...........................................................................29-1
29.2 Access Methods ..............................................................................................................29-1
29.3 Enabling the Firewall......................................................................................................29-1
SMT Advanced Management ...............................................................................................................IX
Table of Contents ix
Chapter 30 Filter Configuration................................................................................................. 30-1
30.1 About Filtering............................................................................................................... 30-1
30.2 Configuring a Filter Set for the Prestige ........................................................................ 30-3
30.3 Filter Rules Summary Menus ........................................................................................ 30-4
30.4 Configuring a Filter Rule ............................................................................................... 30-5
30.5 Filter Types and NAT .................................................................................................. 30-10
30.6 Example Filter.............................................................................................................. 30-10
30.7 Applying Filters and Factory Defaults......................................................................... 30-13
Chapter 31 SNMP Configuration............................................................................................... 31-1
31.1 About SNMP.................................................................................................................. 31-1
31.2 Supported MIBs............................................................................................................. 31-2
31.3 SNMP Configuration ..................................................................................................... 31-2
31.4 SNMP Traps................................................................................................................... 31-3
Chapter 32 System Security ........................................................................................................ 32-1
32.1 System Security ............................................................................................................. 32-1
Chapter 33 System Information and Diagnosis......................................................................... 33-1
33.1 Overview........................................................................................................................ 33-1
33.2 System Status................................................................................................................. 33-1
33.3 System Information........................................................................................................ 33-3
33.4 Log and Trace ................................................................................................................ 33-5
33.5 Diagnostic ...................................................................................................................... 33-7
Chapter 34 Firmware and Configuration File Maintenance ................................................... 34-1
34.1 Filename Conventions.................................................................................................... 34-1
34.2 Backup Configuration.................................................................................................... 34-2
34.3 Restore Configuration.................................................................................................... 34-5
34.4 Uploading Firmware and Configuration Files ............................................................... 34-6
Chapter 35 System Maintenance ................................................................................................ 35-1
35.1 Command Interpreter Mode........................................................................................... 35-1
35.2 Call Control Support...................................................................................................... 35-2
35.3 Time and Date Setting.................................................................................................... 35-3
Chapter 36 Remote Management............................................................................................... 36-1
36.1 Remote Management Overview..................................................................................... 36-1
36.2 Remote Management ..................................................................................................... 36-1
36.3 Remote Management and NAT ..................................................................................... 36-3
36.4 System Timeout ............................................................................................................. 36-3
Chapter 37 IP Policy Routing ..................................................................................................... 37-1
37.1 IP Policy Routing Overview .......................................................................................... 37-1
37.2 Benefits of IP Policy Routing ........................................................................................ 37-1
37.3 Routing Policy ............................................................................................................... 37-1
37.4 IP Routing Policy Setup................................................................................................. 37-1
37.5 Applying an IP Policy.................................................................................................... 37-4
37.6 IP Policy Routing Example............................................................................................ 37-5
Chapter 38 Call Scheduling ........................................................................................................ 38-1
38.1 Introduction.................................................................................................................... 38-1
Chapter 39 Internal SPTGEN .................................................................................................... 39-1
39.1 Internal SPTGEN Overview .......................................................................................... 39-1
x Table of Contents
39.2 The Configuration Text File Format...............................................................................39-1
39.3 Internal SPTGEN FTP Download Example ...................................................................39-3
39.4 Internal SPTGEN FTP Upload Example ........................................................................39-3
Appendices and Index............................................................................................................................ X
Appenidx A Troubleshooting........................................................................................................A-1
Problems Starting Up the Prestige...............................................................................................A-1
Problems with the LAN LED ......................................................................................................A-1
Problems with the DSL LED.......................................................................................................A-1
Problems with the LAN Interface................................................................................................A-2
Problems with the WAN Interface...............................................................................................A-2
Problems with Internet Access ....................................................................................................A-2
Problems with the Password ........................................................................................................ A-3
Problems with the Web Configurator ..........................................................................................A-3
Problems with Remote Management...........................................................................................A-3
Appenidx B IP Subnetting ............................................................................................................B-1
Appenidx C PPPoE........................................................................................................................C-1
Appenidx D Virtual Circuit Topology .........................................................................................D-1
Appenidx E Example Internal SPTGEN Screens ....................................................................... E-1
Appenidx F Setting up Your Computer’s IP Address................................................................ F-1
Appenidx G Splitters and Microfilters ........................................................................................G-1
Appenidx H Log Descriptions.......................................................................................................H-1
Appenidx I Index ............................................................................................................................I-1
Table of Contents xi
List of Figures
Figure 1-1 Prestige Internet Access Application .................................................................................1-5
Figure 1-2 Firewall Application........................................................................................................... 1-6
Figure 1-3 Prestige LAN-to-LAN Application.................................................................................... 1-6
Figure 2-1 Password Screen................................................................................................................. 2-1
Figure 2-2 Web Configurator SITE MAP Screen................................................................................ 2-2
Figure 3-1 Wizard Screen 1 ................................................................................................................. 3-2
Figure 3-2 Internet Connection with PPPoE........................................................................................ 3-5
Figure 3-3 Internet Connection with RFC 1483 .................................................................................. 3-6
Figure 3-4 Internet Connection with ENET ENCAP........................................................................... 3-7
Figure 3-5 Internet Connection with PPPoA .......................................................................................3-8
Figure 3-6 Wizard Screen 3 ............................................................................................................... 3-10
Figure 3-7 Wizard: LAN Configuration ............................................................................................ 3-10
Figure 3-8 Wizard Screen 4 ............................................................................................................... 3-12
Figure 4-1 Password ............................................................................................................................ 4-1
Figure 5-1 LAN and WAN IP Addresses ............................................................................................ 5-1
Figure 5-2 LAN Setup ......................................................................................................................... 5-4
Figure 6-1 Example of Traffic Shaping ............................................................................................... 6-2
Figure 6-2 WAN Setup (PPPoE) ......................................................................................................... 6-3
Figure 6-3 Traffic Redirect Example................................................................................................... 6-6
Figure 6-4 Traffic Redirect LAN Setup............................................................................................... 6-6
Figure 6-5 WAN Backup ..................................................................................................................... 6-7
Figure 7-1 How NAT Works ............................................................................................................... 7-2
Figure 7-2 NAT Application With IP Alias......................................................................................... 7-3
Figure 7-3 Multiple Servers Behind NAT Example ............................................................................ 7-5
Figure 7-4 NAT Mode ......................................................................................................................... 7-6
Figure 7-5 Edit SUA/NAT Server Set ................................................................................................. 7-7
Figure 7-6 Address Mapping Rules ..................................................................................................... 7-8
Figure 7-7 Address Mapping Rule Edit ............................................................................................... 7-9
Figure 8-1 Dynamic DNS .................................................................................................................... 8-1
Figure 9-1 Time and Date .................................................................................................................... 9-3
Figure 10-1 Prestige Firewall Application......................................................................................... 10-2
Figure 10-2 Three-Way Handshake................................................................................................... 10-4
Figure 10-3 SYN Flood ..................................................................................................................... 10-4
Figure 10-4 Smurf Attack .................................................................................................................. 10-5
Figure 10-5 Stateful Inspection.......................................................................................................... 10-6
Figure 11-1 Enabling the Firewall ..................................................................................................... 11-1
Figure 11-2 Alert................................................................................................................................ 11-3
Figure 12-1 LAN to WAN Traffic..................................................................................................... 12-3
Figure 12-2 WAN to LAN Traffic..................................................................................................... 12-3
Figure 12-3 Firewall Rules Summary: First Screen........................................................................... 12-4
Figure 12-4 Creating/Editing A Firewall Rule .................................................................................. 12-8
Figure 12-5 Adding/Editing Source and Destination Addresses ....................................................... 12-9
Figure 12-6 Timeout ........................................................................................................................ 12-10
Figure 13-1 Customized Services ...................................................................................................... 13-1
Figure 13-2 Creating/Editing A Customized Service ........................................................................ 13-2
Figure 13-3 Edit Rule Example ......................................................................................................... 13-3
Figure 13-4 Configure Source IP Example........................................................................................ 13-3
Figure 13-5 Customized Service for MyService Example ................................................................ 13-4
xii List of Figures
Figure 13-6 Syslog Rule Configuration Example...............................................................................13-5
Figure 13-7 Rule Summary Example .................................................................................................13-6
Figure 14-1 Content Filter: Keyword .................................................................................................14-1
Figure 14-2 Content Filter: Schedule..................................................................................................14-2
Figure 14-3 Content Filter: Trusted....................................................................................................14-3
Figure 15-1 Telnet Configuration on a TCP/IP Network ...................................................................15-2
Figure 15-2 Remote Management Control .........................................................................................15-2
Figure 16-1 Configuring UPnP...........................................................................................................16-2
Figure 17-1 Log Settings ....................................................................................................................17-2
Figure 17-2 View Logs.......................................................................................................................17-4
Figure 17-3 E-mail Log Example .......................................................................................................17-5
Figure 19-1 System Status ..................................................................................................................19-1
Figure 19-2 System Status: Show Statistics .......................................................................................19-3
Figure 19-3 DHCP Table....................................................................................................................19-4
Figure 19-4 Diagnostic General..........................................................................................................19-5
Figure 19-5 Diagnostic DSL Line ......................................................................................................19-6
Figure 19-6 Firmware Upgrade ..........................................................................................................19-7
Figure 19-7 Network Temporarily Disconnected...............................................................................19-8
Figure 19-8 Error Message .................................................................................................................19-8
Figure 20-1 Login Screen ...................................................................................................................20-1
Figure 20-2 Prestige 660H-61 SMT Menu Overview ........................................................................20-2
Figure 20-3 SMT Main Menu.............................................................................................................20-3
Figure 20-4 Menu 23.1 Change Password..........................................................................................20-4
Figure 21-1 Menu 1 General Setup.....................................................................................................21-1
Figure 21-2 Menu 1.1 Configure Dynamic DNS................................................................................21-2
Figure 22-1 Menu 2 WAN Backup Setup ..........................................................................................22-1
Figure 22-2 Menu 2.1Traffic Redirect Setup......................................................................................22-2
Figure 23-1 Menu 3 LAN Setup.........................................................................................................23-1
Figure 23-2 Menu 3.1 LAN Port Filter Setup.....................................................................................23-1
Figure 23-3 Menu 3.2 TCP/IP and DHCP Ethernet Setup .................................................................23-2
Figure 24-1 Physical Network Figure 24-2 Partitioned Logical Networks .................24-1
Figure 24-3 Menu 3.2 TCP/IP and DHCP Setup................................................................................24-2
Figure 24-4 Menu 3.2.1 IP Alias Setup ..............................................................................................24-3
Figure 24-5 Menu 1 General Setup.....................................................................................................24-4
Figure 24-6 Menu 4 Internet Access Setup ........................................................................................24-4
Figure 25-1 Menu 11 Remote Node Setup .........................................................................................25-2
Figure 25-2 Menu 11.1 Remote Node Profile ....................................................................................25-3
Figure 25-3 Menu 11.3 Remote Node Network Layer Options .........................................................25-5
Figure 25-4 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection.......................................25-7
Figure 25-5 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) ...........................25-7
Figure 25-6 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) ...............................25-8
Figure 25-7 Menu 11.6 for VC-based Multiplexing...........................................................................25-8
Figure 25-8 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation .....................................25-9
Figure 25-9 Menu 11.1 Remote Node Profile ....................................................................................25-9
Figure 25-10 Menu 11.8 Advance Setup Options ............................................................................25-10
Figure 26-1 Sample Static Routing Topology ....................................................................................26-1
Figure 26-2 Menu 12 Static Route Setup............................................................................................26-2
Figure 26-3 Menu 12.1 IP Static Route Setup ....................................................................................26-2
Figure 26-4 Menu12.1.1 Edit IP Static Route ....................................................................................26-3
Figure 27-1 Menu 11.1 Remote Node Profile ....................................................................................27-2
Figure 27-2 Menu 11.3 Remote Node Network Layer Options .........................................................27-2
List of Figures xiii
Figure 27-3 Menu 12.3.1 Edit Bridge Static Route ........................................................................... 27-3
Figure 28-1 Applying NAT in Menus 4............................................................................................. 28-2
Figure 28-2 Applying NAT in Menus 11.3........................................................................................ 28-3
Figure 28-3 Menu 15 NAT Setup ...................................................................................................... 28-4
Figure 28-4 Menu 15.1 Address Mapping Sets ................................................................................. 28-4
Figure 28-5 Menu 15.1.255 SUA Address Mapping Rules ............................................................... 28-5
Figure 28-6 Menu 15.1.1 First Set ..................................................................................................... 28-6
Figure 28-7 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set.................................... 28-7
Figure 28-8 Menu 15.2 NAT Server Setup........................................................................................ 28-8
Figure 28-9 Menu 15.2.1 NAT Server Setup..................................................................................... 28-9
Figure 28-10 Multiple Servers Behind NAT Example ...................................................................... 28-9
Figure 28-11 NAT Example 1 ......................................................................................................... 28-10
Figure 28-12 Menu 4 Internet Access & NAT Example ................................................................. 28-10
Figure 28-13 NAT Example 2 ......................................................................................................... 28-11
Figure 28-14 Menu 15.2.1 Specifying an Inside Server .................................................................. 28-11
Figure 28-15 NAT Example 3 ......................................................................................................... 28-12
Figure 28-16 Example 3: Menu 11.3 ............................................................................................... 28-13
Figure 28-17 Example 3: Menu 15.1.1.1 ......................................................................................... 28-13
Figure 28-18 Example 3: Final Menu 15.1.1................................................................................... 28-14
Figure 28-19 NAT Example 4 ......................................................................................................... 28-15
Figure 28-20 Example 4: Menu 15.1.1.1 Address Mapping Rule ................................................... 28-16
Figure 28-21 Example 4: Menu 15.1.1 Address Mapping Rules..................................................... 28-16
Figure 29-1 Menu 21.2 Firewall Setup .............................................................................................. 29-2
Figure 30-1 Outgoing Packet Filtering Process ................................................................................. 30-1
Figure 30-2 Filter Rule Process ......................................................................................................... 30-2
Figure 30-3 Menu 21 Filter Set Configuration .................................................................................. 30-3
Figure 30-4 NetBIOS_WAN Filter Rules Summary ......................................................................... 30-3
Figure 30-5 NetBIOS_LAN Filter Rules Summary........................................................................... 30-4
Figure 30-6 IGMP Filter Rules Summary.......................................................................................... 30-4
Figure 30-7 Menu 21.1.x.1 TCP/IP Filter Rule ................................................................................. 30-6
Figure 30-8 Executing an IP Filter..................................................................................................... 30-8
Figure 30-9 Menu 21.1.5.1 Generic Filter Rule................................................................................. 30-9
Figure 30-10 Protocol and Device Filter Sets.................................................................................. 30-10
Figure 30-11 Sample Telnet Filter................................................................................................... 30-11
Figure 30-12 Menu 21.1.6.1 Sample Filter...................................................................................... 30-12
Figure 30-13 Menu 21.1.6.1 Sample Filter Rules Summary ........................................................... 30-13
Figure 30-14 Filtering Ethernet Traffic ........................................................................................... 30-14
Figure 30-15 Filtering Remote Node Traffic................................................................................... 30-14
Figure 31-1 SNMP Management Model............................................................................................ 31-1
Figure 31-2 Menu 22 SNMP Configuration ...................................................................................... 31-2
Figure 32-1 Menu 23 – System Security ........................................................................................... 32-1
Figure 33-1 Menu 24 System Maintenance ....................................................................................... 33-1
Figure 33-2 Menu 24.1 System Maintenance : Status ....................................................................... 33-2
Figure 33-3 Menu 24.2 System Information and Console Port Speed............................................... 33-3
Figure 33-4 Menu 24.2.1 System Maintenance : Information........................................................... 33-4
Figure 33-5 Menu 24.2.2 System Maintenance : Change Console Port Speed ................................. 33-5
Figure 33-6 Menu 24.3 System Maintenance : Log and Trace.......................................................... 33-5
Figure 33-7 Sample Error and Information Messages ....................................................................... 33-5
Figure 33-8 Menu 24.3.2 System Maintenance: Syslog and Accounting.......................................... 33-6
Figure 33-9 Menu 24.4 System Maintenance: Diagnostic................................................................. 33-8
Figure 34-1 Telnet in Menu 24.5 ....................................................................................................... 34-2
xiv List of Figures
Figure 34-2 FTP Session Example .....................................................................................................34-3
Figure 34-3 Telnet into Menu 24.6.....................................................................................................34-5
Figure 34-4 Restore Using FTP Session Example..............................................................................34-6
Figure 34-5 Telnet Into Menu 24.7.1 Upload System Firmware........................................................34-7
Figure 34-6 Telnet Into Menu 24.7.2 System Maintenance ...............................................................34-7
Figure 34-7 FTP Session Example of Firmware File Upload.............................................................34-8
Figure 35-1 Command Mode in Menu 24 ..........................................................................................35-1
Figure 35-2 Valid Commands.............................................................................................................35-2
Figure 35-3 Menu 24.9 System Maintenance : Call Control..............................................................35-2
Figure 35-4 Menu 24.9.1 System Maintenance: Budget Management...............................................35-3
Figure 35-5 Menu 24 System Maintenance........................................................................................35-4
Figure 35-6 Menu 24.10 System Maintenance: Time and Date Setting.............................................35-4
Figure 36-1 Menu 24.11 Remote Management Control.....................................................................36-2
Figure 37-1 Menu 25 IP Routing Policy Setup...................................................................................37-2
Figure 37-2 Menu 25.1 IP Routing Policy Setup................................................................................37-2
Figure 37-3 Menu 25.1.1 IP Routing Policy.......................................................................................37-3
Figure 37-4 Menu 3.2 TCP/IP and DHCP Ethernet Setup .................................................................37-5
Figure 37-5 Menu 11.3 Remote Node Network Layer Options .........................................................37-5
Figure 37-6 Example of IP Policy Routing ........................................................................................37-6
Figure 37-7 IP Routing Policy Example.............................................................................................37-6
Figure 37-8 IP Routing Policy Example.............................................................................................37-7
Figure 37-9 Applying IP Policies Example ........................................................................................37-8
Figure 38-1 Menu 26 Schedule Setup.................................................................................................38-1
Figure 38-2 Menu 26.1 Schedule Set Setup .......................................................................................38-2
Figure 38-3 Applying Schedule Set(s) to a Remote Node (PPPoE)...................................................38-3
Figure 39-1 Configuration Text File Format: Column Descriptions ..................................................39-2
Figure 39-2 Invalid Parameter Entered: Command Line Example.....................................................39-3
Figure 39-3 Valid Parameter Entered: Command Line Example.......................................................39-3
Figure 39-4 Internal SPTGEN FTP Download Example ...................................................................39-3
Figure 39-5 Internal SPTGEN FTP Upload Example ........................................................................39-4
List of Figures xv
List of Tables
Table 2-1 Web Configurator Screens Summary .................................................................................. 2-2
Table 3-1 Wizard Screen 1 .................................................................................................................. 3-3
Table 3-2 Internet Connection with PPPoE ......................................................................................... 3-6
Table 3-3 Internet Connection with RFC 1483.................................................................................... 3-6
Table 3-4 Internet Connection with ENET ENCAP............................................................................ 3-7
Table 3-5 Internet Connection with PPPoA......................................................................................... 3-8
Table 3-6 Wizard: LAN Configuration.............................................................................................. 3-10
Table 4-1 Password.............................................................................................................................. 4-1
Table 5-1 LAN Setup........................................................................................................................... 5-4
Table 6-1 WAN Setup ......................................................................................................................... 6-3
Table 6-2 WAN Backup ...................................................................................................................... 6-7
Table 7-1 NAT Definitions.................................................................................................................. 7-1
Table 7-2 NAT Mapping Types........................................................................................................... 7-3
Table 7-3 Services and Port Numbers.................................................................................................. 7-5
Table 7-4 NAT Mode........................................................................................................................... 7-6
Table 7-5 Edit SUA/NAT Server Set................................................................................................... 7-7
Table 7-6 Address Mapping Rules....................................................................................................... 7-8
Table 7-7 Address Mapping Rule Edit .............................................................................................. 7-10
Table 8-1 Dynamic DNS ..................................................................................................................... 8-2
Table 9-1 Time and Date ..................................................................................................................... 9-3
Table 10-1 Common IP Ports............................................................................................................. 10-3
Table 10-2 ICMP Commands That Trigger Alerts ............................................................................ 10-5
Table 10-3 Legal NetBIOS Commands ............................................................................................. 10-5
Table 10-4 Legal SMTP Commands ................................................................................................. 10-5
Table 11-1 Alert................................................................................................................................. 11-3
Table 12-1 Firewall Rules Summary: First Screen ............................................................................ 12-4
Table 12-2 Predefined Services ......................................................................................................... 12-5
Table 12-3 Creating/Editing A Firewall Rule.................................................................................... 12-8
Table 12-4 Adding/Editing Source and Destination Addresses......................................................... 12-9
Table 12-5 Timeout.......................................................................................................................... 12-10
Table 13-1 Customized Services........................................................................................................ 13-1
Table 13-2 Creating/Editing A Customized Service.......................................................................... 13-2
Table 14-1 Content Filter: Keyword.................................................................................................. 14-2
Table 14-2 Content Filter: Schedule .................................................................................................. 14-3
Table 14-3 Content Filter: Trusted..................................................................................................... 14-3
Table 15-1 Remote Management Control.......................................................................................... 15-3
Table 16-1 Configuring UPnP ........................................................................................................... 16-2
Table 17-1 Log Settings..................................................................................................................... 17-2
Table 17-2 View Logs ....................................................................................................................... 17-4
Table 17-3 SMTP Error Messages..................................................................................................... 17-5
Table 18-1 Application-based Bandwidth Management Example .................................................... 18-2
Table 18-2 Subnet-based Bandwidth Management Example ............................................................ 18-2
Table 18-3 Application and Subnet-based Bandwidth Management Example.................................. 18-2
Table 18-4 Application and Subnet-based Bandwidth Management Example.................................. 18-3
Table 18-5 Bandwidth Allotment Example ....................................................................................... 18-4
Table 18-6 Maximize Bandwidth Usage Example ............................................................................ 18-5
Table 18-7 Bandwidth Borrowing Example ...................................................................................... 18-6
Table 18-8 Bandwidth Manager: Summary....................................................................................... 18-7
xvi List of Tables
Table 18-9 Bandwidth Manager: Summary........................................................................................18-7
Table 18-10 Bandwidth Manager: Class Setup ..................................................................................18-9
Table 18-11 Bandwidth Manager: Class Setup ..................................................................................18-9
Table 18-12 Bandwidth Manager: Class Configuration .....................................................................18-9
Table 18-13 Bandwidth Manager: Class Configuration ...................................................................18-10
Table 18-14 Services and Port Numbers ..........................................................................................18-11
Table 18-15 Bandwidth Management Statistics ...............................................................................18-11
Table 18-16 Bandwidth Management Statistics ...............................................................................18-12
Table 18-17 Bandwidth Manager Monitor .......................................................................................18-12
Table 18-18 Bandwidth Manager Monitor .......................................................................................18-12
Table 19-1 System Status ...................................................................................................................19-2
Table 19-2 System Status: Show Statistics.........................................................................................19-3
Table 19-3 DHCP Table .....................................................................................................................19-4
Table 19-4 Diagnostic General...........................................................................................................19-5
Table 19-5 Diagnostic DSL Line........................................................................................................19-6
Table 19-6 Firmware Upgrade............................................................................................................19-7
Table 20-1 Main Menu Commands ....................................................................................................20-2
Table 20-2 Main Menu Summary.......................................................................................................20-4
Table 21-1 Menu 1 General Setup......................................................................................................21-2
Table 21-2 Menu 1.1 Configure Dynamic DNS.................................................................................21-3
Table 22-1 Menu 2 WAN Backup Setup............................................................................................22-1
Table 22-2 Menu 2.1Traffic Redirect Setup.......................................................................................22-2
Table 23-1 DHCP Ethernet Setup.......................................................................................................23-2
Table 23-2 TCP/IP Ethernet Setup .....................................................................................................23-3
Table 24-1 Menu 3.2.1 IP Alias Setup................................................................................................24-3
Table 24-2 Menu 4 Internet Access Setup..........................................................................................24-5
Table 25-1 Menu 11.1 Remote Node Profile......................................................................................25-3
Table 25-2 Menu 11.3 Remote Node Network Layer Options...........................................................25-5
Table 25-3 Menu 11.8 Advance Setup Options................................................................................25-10
Table 26-1 Menu12.1.1 Edit IP Static Route......................................................................................26-3
Table 27-1 Remote Node Network Layer Options: Bridge Fields .....................................................27-3
Table 27-2 Menu 12.3.1 Edit Bridge Static Route..............................................................................27-3
Table 28-1 Applying NAT in Menus 4 and 11.3................................................................................28-3
Table 28-2 SUA Address Mapping Rules ..........................................................................................28-5
Table 28-3 Menu 15.1.1 First Set .......................................................................................................28-6
Table 28-4 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set......................................28-7
Table 30-1 Abbreviations Used in the Filter Rules Summary Menu..................................................30-4
Table 30-2 Rule Abbreviations Used..................................................................................................30-5
Table 30-3 Menu 21.1.x.1 TCP/IP Filter Rule ...................................................................................30-6
Table 30-4 Menu 21.1.5.1 Generic Filter Rule...................................................................................30-9
Table 30-5 Filter Sets Table .............................................................................................................30-13
Table 31-1 Menu 22 SNMP Configuration ........................................................................................31-2
Table 31-2 SNMP Traps.....................................................................................................................31-3
Table 31-3 Ports and Permanent Virtual Circuits...............................................................................31-3
Table 33-1 Menu 24.1 System Maintenance : Status .........................................................................33-2
Table 33-2 Menu 24.2.1 System Maintenance : Information .............................................................33-4
Table 33-3 Menu 24.3.2 System Maintenance : Syslog and Accounting...........................................33-6
Table 33-4 Menu 24.4 System Maintenance: Diagnostic...................................................................33-8
Table 34-1 Filename Conventions......................................................................................................34-2
Table 34-2 General Commands for GUI-based FTP Clients..............................................................34-3
Table 34-3 General Commands for GUI-based TFTP Clients ...........................................................34-4
List of Tables xvii
Table 35-1 Menu 24.9.1 System Maintenance: Budget Management............................................... 35-3
Table 35-2 Menu 24.10 System Maintenance: Time and Date Setting ............................................. 35-5
Table 36-1 Menu 24.11 Remote Management Control ..................................................................... 36-2
Table 37-1 Menu 25.1 IP Routing Policy Setup ................................................................................ 37-3
Table 37-2 Menu 25.1.1 IP Routing Policy ....................................................................................... 37-4
Table 38-1 Menu 26.1 Schedule Set Setup ........................................................................................ 38-2
xviii List of Tables
List of Charts
Chart A-1 Troubleshooting the Start-Up of Your Prestige..................................................................A-1
Chart A-2 Troubleshooting the LAN LED .......................................................................................... A-1
Chart A-3 Troubleshooting the DSL LED...........................................................................................A-1
Chart A-4 Troubleshooting the LAN Interface....................................................................................A-2
Chart A-5 Troubleshooting the WAN Interface ..................................................................................A-2
Chart A-6 Troubleshooting Internet Access ........................................................................................A-2
Chart A-7 Troubleshooting the Password............................................................................................A-3
Chart A-8 Troubleshooting the Web Configurator..............................................................................A-3
Chart A-9 Troubleshooting Remote Management...............................................................................A-3
Chart B-1 Classes of IP Addresses ...................................................................................................... B-1
Chart B-2 Allowed IP Address Range By Class.................................................................................. B-2
Chart B-3 “Natural” Masks ................................................................................................................. B-2
Chart B-4 Alternative Subnet Mask Notation......................................................................................B-2
Chart B-5 Subnet 1 .............................................................................................................................. B-3
Chart B-6 Subnet 2 .............................................................................................................................. B-3
Chart B-7 Subnet 1 .............................................................................................................................. B-4
Chart B-8 Subnet 2 .............................................................................................................................. B-4
Chart B-9 Subnet 3 .............................................................................................................................. B-4
Chart B-10 Subnet 4 ............................................................................................................................ B-5
Chart B-11 Eight Subnets ....................................................................................................................B-5
Chart B-12 Class C Subnet Planning................................................................................................... B-5
Chart B-13 Class B Subnet Planning................................................................................................... B-6
Chart H-1 System Maintenance Logs..................................................................................................H-1
Chart H-2 UPnP Logs..........................................................................................................................H-1
Chart H-3 Content Filtering Logs........................................................................................................H-2
Chart H-4 Attack Logs.........................................................................................................................H-2
Chart H-5 Access Logs........................................................................................................................H-3
Chart H-6 TCP Reset Logs ..................................................................................................................H-4
Chart H-7 ICMP Notes ........................................................................................................................H-4
List of Charts xix
Preface
Congratulations on your purchase of the Prestige 660H Series ADSL 2/2+ Gateway.
Register your product online to receive e-mail notices of
firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com
Your Prestige is easy to install and configure.
for North American products.
About This User's Guide
This manual is designed to guide you through the configuration of your Prestige for its various applications. The web configurator parts of this guide contain background information on features configurable by web configurator. The SMT parts of this guide contain background information solely on features not configurable by web configurator.
Use the web configurator, System Management Terminal (SMT)
or command interpreter interface to configure your Prestige. Not all features can be configured through all interfaces.
Related Documentation
Supporting Disk
Refer to the included CD for support documents.
Compact Guide
The Compact Guide is designed to help you get up and running right away. They contain
connection information and instructions on getting started.
Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary information.
ZyXEL Glossary and Web Site
Please refer to www.zyxel.com support documentation.
for an online glossary of networking terms and additional
User Guide Feedback
Help us help you! E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you!
Syntax Conventions
“Enter” means for you to type one or more characters. “Select” or “Choose” means for you to use one predefined choices.
The SMT menu titles and labels are in Bold Times New Roman font. Predefined field choices are in Bold Arial font. Command and arrow keys are enclosed in square brackets. [ENTER] means the Enter, or carriage return key; [ESC] means the Escape key and [SPACE BAR] means the Space Bar.
xx Preface
Mouse action sequences are denoted using a comma. For example, “click the Apple icon, Control Panels and then Modem” means first click the Apple icon, then point your mouse pointer to Control Panels and then click Modem.
For brevity’s sake, we will use “e.g.,” as a shorthand for “for instance”, and “i.e.,” for “that is” or “in other words” throughout this manual.
The Prestige 660H series may be referred to as the Prestige in this user’s guide. This refers all models (ADSL over POTS, ADSL over ISDN and T-ISDN (UR-2)) unless specifically identified.
Graphics Icons Key
Prestige
Server
Telephone
Computer
DSLAM
Switch
Notebook computer
Firewall
Router
The following section offers some background information on
DSL. Skip to Chapter 1 if you wish to begin working with your router right away.
Preface xxi
Header
Introduction to DSL
DSL (Digital Subscriber Line) technology enhances the data capacity of the existing twisted-pair wire that runs between the local telephone company switching offices and most homes and offices. While the wire itself can handle higher frequencies, the telephone switching equipment is designed to cut off signals above 4,000 Hz to filter noise off the voice line, but now everybody is searching for ways to get more bandwidth to improve access to the Web - hence DSL technologies.
There are actually seven types of DSL service, ranging in speeds from 16 Kbits/sec to 52 Mbits/sec. The services are either symmetrical (traffic flows at the same speed in both directions), or asymmetrical (the downstream capacity is higher than the upstream capacity). Asymmetrical services (ADSL) are suitable for Internet users because more information is usually downloaded than uploaded. For example, a simple button click in a web browser can start an extended download that includes graphics and text.
As data rates increase, the carrying distance decreases. That means that users who are beyond a certain distance from the telephone company’s central office may not be able to obtain the higher speeds.
A DSL connection is a point-to-point dedicated circuit, meaning that the link is always up and there is no dialing required.
Introduction to ADSL
It is an asymmetrical technology, meaning that the downstream data rate is much higher than the upstream data rate. As mentioned, this works well for a typical Internet session in which more information is downloaded, for example, from Web servers, than is uploaded. ADSL operates in a frequency range that is above the frequency range of voice services, so the two systems can operate over the same cable.
xxii Introduction to DSL
Getting Started
PPaarrtt II::
Getting Started
This part is structured as a step-by-step guide to help you access your Prestige. It covers key features
and applications, accessing the web configurator and configuring the wizard screens for initial setup.
I
Chapter 1
Getting To Know Your Prestige
This chapter describes the key features and applications of your Prestige.
1.1 Introducing the Prestige
Your Prestige integrates high-speed 10/100Mbps auto-negotiating LAN interface(s) and a high-speed ADSL port into a single package. The Prestige is ideal for high-speed Internet browsing and making LAN-to-LAN connections to remote networks. The Prestige is an ADSL router compatible with the ADSL/ADSL2/ADSL2+ standards. Maximum data rates attainable by the Prestige for each standard are shown in the next table.
DATA RATE
STANDARD
ADSL
ADSL2
ADSL2+
UPSTREAM DOWNSTREAM
832 kbps 8Mbps
3.5Mbps 12Mbps
3.5Mbps 24Mbps
The standard your ISP supports determines the maximum
upstream and downstream speeds attainable. Actual speeds attained also depend on the distance from your ISP, noise, line quality, etc.
By integrating DSL and NAT, the Prestige provides ease of installation and Internet access. The Prestige is also a complete security solution with a robust firewall and content filtering.
Three Prestige models are included in this user’s guide at the time of writing. In the product name, “H” denotes an integrated 4-port switch (hub).
Models ending in “1”, for example P660H-61, denote a device that works over the analog telephone system, POTS (Plain Old Telephone Service). Models ending in “3” denote a device that works over ISDN (Integrated Synchronous Digital System). Models ending in “7” denote a device that works over T-ISDN (UR-2).
Only use firmware for your Prestige’s specific model. Refer to
the label on the bottom of your Prestige.
The web browser-based Graphical User Interface (GUI) provides easy management.
1.2 Features of the Prestige
The following sections describe the features of the Prestige.
Getting To Know Your Prestige 1-1
High Speed Internet Access
Your Prestige ADSL/ADSL2/ADSL2+ router can support downstream transmission rates of up to 24Mbps and upstream transmission rates of 3.5Mbps. Actual speeds attained depend on ISP DSLAM environment.
Firewall
The Prestige is a stateful inspection firewall with DoS (Denial of Service) protection. By default, when the firewall is activated, all incoming traffic from the WAN to the LAN is blocked unless it is initiated from the LAN. The Prestige firewall supports TCP/UDP inspection, DoS detection and prevention, real time alerts, reports and logs.
You can configure most features of the Prestige via SMT but we
recommend you configure the firewall and content filters using the web configurator.
Content Filtering
Content filtering allows you to block access to forbidden Internet web sites, schedule when the Prestige should perform the filtering and give trusted LAN IP addresses unfiltered Internet access.
Traffic Redirect
Traffic redirect forwards WAN traffic to a backup gateway when the Prestige cannot connect to the Internet, thus acting as an auxiliary if your regular WAN connection fails.
Universal Plug and Play (UPnP)
Using the standard TCP/IP protocol, the Prestige and other UPnP enabled devices can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network.
PPPoE Support (RFC2516)
PPPoE (Point-to-Point Protocol over Ethernet) emulates a dial-up connection. It allows your ISP to use their existing network configuration with newer broadband technologies such as ADSL. The PPPoE driver on the Prestige is transparent to the computers on the LAN, which see only Ethernet and are not aware of PPPoE thus saving you from having to manage PPPoE clients on individual computers.
Network Address Translation (NAT)
Network Address Translation (NAT) allows the translation of an Internet protocol address used within one network (for example a private IP address used in a local network) to a different IP address known within another network (for example a public IP address used on the Internet).
10/100M Auto-negotiating Ethernet/Fast Ethernet Interface(s)
This auto-negotiation feature allows the Prestige to detect the speed of incoming transmissions and adjust appropriately without manual intervention. It allows data transfer of either 10 Mbps or 100 Mbps in either half-duplex or full-duplex mode depending on your Ethernet network.
Auto-Crossover (MDI/MDI-X) 10/100 Mbps Ethernet Interface(s)
These interfaces automatically adjust to either a crossover or straight-through Ethernet cable.
1-2 Getting To Know Your Prestige
Dynamic DNS Support
With Dynamic DNS support, you can have a static hostname alias for a dynamic IP address, allowing the host to be more easily accessible from various locations on the Internet. You must register for this service with a Dynamic DNS service provider.
Multiple PVC (Permanent Virtual Circuits) Support
Your Prestige supports up to 8 PVC’s.
ADSL Transmission Rate Standards
Full-Rate (ANSI T1.413, Issue 2; G.dmt (G.992.1) with line rate support of up to 8 Mbps
downstream and 832 Kbps upstream.
G.lite (G.992.2) with line rate support of up to 1.5Mbps downstream and 512Kbps upstream.
Supports Multi-Mode standard (ANSI T1.413, Issue 2; G.dmt (G.992.1); G.lite (G992.2)).
TCP/IP (Transmission Control Protocol/Internet Protocol) network layer protocol.
ATM Forum UNI 3.1/4.0 PVC.
Supports up to 8 PVCs (UBR, CBR, VBR).
Multiple Protocol over AAL5 (RFC 1483).
PPP over AAL5 (RFC 2364).
PPP over Ethernet over AAL5 (RFC 2516).
RFC 1661.
PPP over PAP (RFC 1334).
PPP over CHAP (RFC 1994).
Protocol Support
DHCP Support
DHCP (Dynamic Host Configuration Protocol) allows the individual clients (computers) to obtain the TCP/IP configuration at start-up from a centralized DHCP server. The Prestige has built-in DHCP server capability enabled by default. It can assign IP addresses, an IP default gateway and DNS servers to DHCP clients. The Prestige can now also act as a surrogate DHCP server (DHCP Relay) where it relays IP address assignment from the actual real DHCP server to the clients.
IP Alias
IP Alias allows you to partition a physical network into logical networks over the same Ethernet interface. The Prestige supports three logical LAN interfaces via its single physical Ethernet interface with the Prestige itself as the gateway for each LAN network.
IP Policy Routing (IPPR)
Traditionally, routing is based on the destination address only and the router takes the shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
PPP (Point-to-Point Protocol) link layer protocol.
Transparent bridging for unsupported network layer protocols.
Getting To Know Your Prestige 1-3
RIP I/RIP II
IGMP Proxy
ICMP support
ATM QoS support
MIB II support (RFC 1213)
Networking Compatibility
Your Prestige is compatible with the major ADSL DSLAM (Digital Subscriber Line Access Multiplexer) providers, making configuration as simple as possible for you.
Multiplexing
The Prestige supports VC-based and LLC-based multiplexing.
Encapsulation
The Prestige supports PPPoA (RFC 2364 - PPP over ATM Adaptation Layer 5), RFC 1483 encapsulation over ATM, MAC encapsulated routing (ENET encapsulation) as well as PPP over Ethernet (RFC 2516).
Network Management
Menu driven SMT (System Management Terminal) management
Embedded web configurator
CLI (Command Line Interpreter)
Remote Management via Telnet or Web
SNMP manageable
DHCP Server/Client/Relay
Built-in Diagnostic Tools
Syslog
Telnet Support (Password-protected telnet access to internal configuration manager)
TFTP/FTP server, firmware upgrade and configuration backup/support supported
Supports OAM F4/F5 loop-back, AIS and RDI OAM cells
Other PPPoE Features
PPPoE idle time out
PPPoE Dial on Demand
Diagnostics Capabilities
The Prestige can perform self-diagnostic tests. These tests check the integrity of the following circuitry:
FLASH memory
ADSL circuitry
RAM
LAN port
1-4 Getting To Know Your Prestige
Packet Filters
The Prestige's packet filtering functions allows added network security and management.
Ease of Installation
Your Prestige is designed for quick, intuitive and easy installation.
Housing
Your Prestige's compact and ventilated housing minimizes space requirements making it easy to position anywhere in your busy office.
1.3 Applications for the Prestige
Here are some example uses for which the Prestige is well suited.
1.3.1 Internet Access
The Prestige is the ideal high-speed Internet access solution. Your Prestige supports the TCP/IP protocol, which the Internet uses exclusively. It is compatible with all major ADSL DSLAM (Digital Subscriber Line Access Multiplexer) providers. A DSLAM is a rack of ADSL line cards with data multiplexed into a backbone network interface/connection (for example, T1, OC3, DS3, ATM or Frame Relay). Think of it as the equivalent of a modem rack for ADSL. A typical Internet access application is shown below.
Figure 1-1 Prestige Internet Access Application
Internet Single User Account
For a SOHO (Small Office/Home Office) environment, your Prestige offers the Single User Account (SUA) feature that allows multiple users on the LAN (Local Area Network) to access the Internet concurrently for the cost of a single IP address.
1.3.2 Firewall for Secure Broadband Internet Access
The Prestige provides protection from attacks by Internet hackers. By default, the firewall blocks all incoming traffic from the WAN. The firewall supports TCP/UDP inspection and DoS (Denial of Services) detection and prevention, as well as real time alerts, reports and logs.
Getting To Know Your Prestige 1-5
Figure 1-2 Firewall Application
1.3.3 LAN to LAN Application
You can use the Prestige to connect two geographically dispersed networks over the ADSL line. A typical LAN-to-LAN application for your Prestige is shown as follows.
Figure 1-3 Prestige LAN-to-LAN Application
1-6 Getting To Know Your Prestige
Loading...
+ 324 hidden pages