Zyxel P-660HW-D user manual

P-660HW-D Series

802.11g Wireless ADSL 2+ 4-port Gateway
User’s Guide
Version 3.40
Edition 1
3/2006
P-660HW-D Series User’s Guide
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright 2
P-660HW-D Series User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.

3 Federal Communications Commission (FCC) Interference Statement

P-660HW-D Series User’s Guide
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
ZyXEL Communications Corporation declared that ZyXEL device is limited in CH1~11 from 2400 to 2483.5 MHz by specified firmware controlled in USA.
Certifications
1 Go to www.zyxel.com
2 Select your product from the drop-down list box on the ZyXEL home
page to go to that product's page.
3 Select the certification you wish to view from this page.
Federal Communications Commission (FCC) Interference Statement 4
P-660HW-D Series User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.

Safety Warnings

5 Safety Warnings
P-660HW-D Series User’s Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
ZyXEL Limited Warranty 6
P-660HW-D Series User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.

Customer Support

METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
NORWAY
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Science Park Hsinchu 300 Ta iw a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Columbusvej 2860 Soeborg Denmark
Malminkaari 10 00700 Helsinki Finland
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
48, Zoldlomb Str. H-1025, Budapest Hungary
43, Dostyk ave.,Office 414 Dostyk Business Centre 050010, Almaty Republic of Kazakhstan
1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
Nils Hansens vei 13 0667 Oslo Norway
7 Customer Support
P-660HW-D Series User’s Guide
METHOD
LOCATION
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
A. “+” is the (prefix) number you enter to make an international telephone call.
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
info@pl.zyxel.com +48-22-5286603 www.pl.zyxel.com ZyXEL Communications
+48-22-5206701
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
A
WEB SITE
REGULAR MAIL
ul.Emilli Plater 53 00-113 Warszawa Poland
Ostrovityanova 37a Str. Moscow, 117279 Russia
Alejandro Villegas 33 1º, 28043 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
13, Pimonenko Str. Kiev, 04050 Ukraine
www.zyxel.co.uk ZyXEL Communications UK
Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
Customer Support 8
P-660HW-D Series User’s Guide
9 Customer Support
P-660HW-D Series User’s Guide

Table of Contents

Copyright ..................................................................................................................2
Federal Communications Commission (FCC) Interference Statement ............... 3
Safety Warnings ....................................................................................................... 5
ZyXEL Limited Warranty.......................................................................................... 6
Customer Support.................................................................................................... 7
Table of Contents ................................................................................................... 10
List of Figures ........................................................................................................ 20
List of Tables ..........................................................................................................26
Preface ....................................................................................................................30
Chapter 1
Getting To Know Your P-660HW-D ....................................................................... 32
1.1 Introducing the P-660HW-D ...............................................................................32
1.2 Features .............................................................................................................33
1.2.1 Wireless Features .....................................................................................35
1.3 Applications for the ZyXEL device .....................................................................36
1.3.1 Protected Internet Access .........................................................................36
1.3.2 LAN to LAN Application ............................................................................36
1.4 Front Panel LEDs ...............................................................................................37
1.5 Hardware Connection ........................................................................................38
Chapter 2
Introducing the Web Configurator........................................................................ 40
2.1 Web Configurator Overview ...............................................................................40
2.2 Accessing the Web Configurator ........................................................................40
2.3 Resetting the ZyXEL device ...............................................................................42
2.3.1 Using the Reset Button .............................................................................42
2.4 Navigating the Web Configurator .......................................................................42
2.4.1 Navigation Panel .......................................................................................42
2.4.2 Status Screen ...........................................................................................45
2.4.3 Status: Any IP Table ..................................................................................48
2.4.4 Status: WLAN Status ................................................................................48
2.4.5 Status: Bandwidth Status ..........................................................................49
Table of Contents 10
P-660HW-D Series User’s Guide
2.4.6 Status: Packet Statistics ............................................................................50
2.4.7 Changing Login Password .......................................................................51
Chapter 3
Wizard Setup for Internet Access......................................................................... 54
3.1 Introduction ........................................................................................................54
3.2 Internet Access Wizard Setup ............................................................................54
3.2.1 Automatic Detection ..................................................................................56
3.2.2 Manual Configuration ................................................................................56
3.3 Wireless Connection Wizard Setup ....................................................................61
3.3.1 Manually assign a WPA-PSK key .............................................................64
3.3.2 Manually assign a WEP key .....................................................................65
Chapter 4
Bandwidth Management Wizard ........................................................................... 68
4.1 Introduction ........................................................................................................68
4.2 Predefined Media Bandwidth Management Services ........................................68
4.3 Bandwidth Management Wizard Setup ..............................................................69
Chapter 5
WAN Setup.............................................................................................................. 74
5.1 WAN Overview ..................................................................................................74
5.1.1 Encapsulation ...........................................................................................74
5.1.1.1 ENET ENCAP .................................................................................74
5.1.1.2 PPP over Ethernet ..........................................................................74
5.1.1.3 PPPoA .............................................................................................75
5.1.1.4 RFC 1483 ........................................................................................75
5.1.2 Multiplexing ...............................................................................................75
5.1.2.1 VC-based Multiplexing ....................................................................75
5.1.2.2 LLC-based Multiplexing ...................................................................75
5.1.3 Encapsulation and Multiplexing Scenarios ...............................................75
5.1.3.1 Scenario 1: One VC, Multiple Protocols ..........................................76
5.1.3.2 Scenario 2: One VC, One Protocol (IP) ..........................................76
5.1.3.3 Scenario 3: Multiple VCs .................................................................76
5.1.4 VPI and VCI ..............................................................................................76
5.1.5 IP Address Assignment ............................................................................76
5.1.5.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................76
5.1.5.2 IP Assignment with RFC 1483 Encapsulation .................................76
5.1.5.3 IP Assignment with ENET ENCAP Encapsulation ..........................77
5.1.6 Nailed-Up Connection (PPP) ....................................................................77
5.1.7 NAT ...........................................................................................................77
5.2 Metric ................................................................................................................77
5.3 Traffic Shaping ...................................................................................................78
11 Table of Contents
P-660HW-D Series User’s Guide
5.3.1 ATM Traffic Classes ..................................................................................79
5.3.1.1 Constant Bit Rate (CBR) .................................................................79
5.3.1.2 Variable Bit Rate (VBR) ...................................................................79
5.3.1.3 Unspecified Bit Rate (UBR) .............................................................79
5.4 Zero Configuration Internet Access ....................................................................79
5.5 Internet Connection ...........................................................................................80
5.5.1 Configuring Advanced Internet Connection Setup ....................................82
5.6 Configuring More Connections ...........................................................................83
5.6.1 More Connections Edit ............................................................................84
5.6.2 Configuring More Connections Advanced Setup .....................................87
5.7 Traffic Redirect ..................................................................................................88
5.8 Configuring WAN Backup ..................................................................................89
Chapter 6
LAN Setup............................................................................................................... 92
6.1 LAN Overview ...................................................................................................92
6.1.1 LANs, WANs and the ZyXEL device .........................................................92
6.1.2 DHCP Setup .............................................................................................93
6.1.2.1 IP Pool Setup ..................................................................................93
6.1.3 DNS Server Address ................................................................................93
6.1.4 DNS Server Address Assignment .............................................................94
6.2 LAN TCP/IP ........................................................................................................94
6.2.1 IP Address and Subnet Mask ...................................................................94
6.2.1.1 Private IP Addresses .......................................................................95
6.2.2 RIP Setup .................................................................................................95
6.2.3 Multicast ....................................................................................................96
6.2.4 Any IP .......................................................................................................96
6.2.4.1 How Any IP Works ..........................................................................97
6.3 Configuring LAN IP ............................................................................................98
6.3.1 Configuring Advanced LAN Setup ............................................................98
6.4 DHCP Setup .....................................................................................................100
6.5 LAN Client List .................................................................................................101
6.6 LAN IP Alias .....................................................................................................102
Chapter 7
Wireless LAN ........................................................................................................ 106
7.1 Wireless Network Overview .............................................................................106
7.2 Wireless Security Overview .............................................................................107
7.2.1 SSID .......................................................................................................107
7.2.2 MAC Address Filter .................................................................................107
7.2.3 User Authentication ................................................................................108
7.2.4 Encryption ...............................................................................................108
7.2.5 One-Touch Intelligent Security Technology (OTIST) ...............................109
Table of Contents 12
P-660HW-D Series User’s Guide
7.3 Wireless Performance Overview ......................................................................109
7.3.1 Quality of Service (QoS) .........................................................................109
7.4 General Wireless LAN Screen ........................................................................110
7.4.1 No Security ............................................................................................. 111
7.4.2 WEP Encryption ...................................................................................... 112
7.4.3 WPA-PSK/WPA2-PSK ............................................................................113
7.4.4 WPA/WPA2 ............................................................................................. 114
7.4.5 Wireless LAN Advanced Setup ...............................................................116
7.5 OTIST .............................................................................................................. 118
7.5.1 Enabling OTIST ......................................................................................118
7.5.1.1 AP ................................................................................................. 118
7.5.1.2 Wireless Client ..............................................................................120
7.5.2 Starting OTIST ........................................................................................120
7.5.3 Notes on OTIST ......................................................................................121
7.6 MAC Filter ...................................................................................................122
7.7 WMM QoS ........................................................................................................123
7.7.1 WMM QoS Example ...............................................................................123
7.7.2 WMM QoS Priorities ...............................................................................124
7.7.3 Services ..................................................................................................124
7.8 QoS Screen ......................................................................................................126
7.8.1 ToS (Type of Service) and WMM QoS ....................................................126
7.8.2 Application Priority Configuration ............................................................128
Chapter 8
Network Address Translation (NAT) Screens .................................................... 130
8.1 NAT Overview .................................................................................................130
8.1.1 NAT Definitions .......................................................................................130
8.1.2 What NAT Does ......................................................................................131
8.1.3 How NAT Works .....................................................................................131
8.1.4 NAT Application ......................................................................................132
8.1.5 NAT Mapping Types ...............................................................................132
8.2 SUA (Single User Account) Versus NAT ..........................................................133
8.3 NAT General Setup .........................................................................................133
8.4 Port Forwarding ................................................................................................134
8.4.1 Default Server IP Address ......................................................................135
8.4.2 Port Forwarding: Services and Port Numbers ........................................135
8.4.3 Configuring Servers Behind Port Forwarding (Example) ........................135
8.5 Configuring Port Forwarding ...........................................................................136
8.5.1 Port Forwarding Rule Edit ......................................................................137
8.6 Address Mapping ............................................................................................138
8.6.1 Address Mapping Rule Edit ...................................................................140
13 Table of Contents
P-660HW-D Series User’s Guide
Chapter 9
Firewalls................................................................................................................ 142
9.1 Firewall Overview ............................................................................................142
9.2 Types of Firewalls ............................................................................................142
9.2.1 Packet Filtering Firewalls ........................................................................142
9.2.2 Application-level Firewalls ......................................................................143
9.2.3 Stateful Inspection Firewalls ..................................................................143
9.3 Introduction to ZyXEL’s Firewall .......................................................................143
9.3.1 Denial of Service Attacks ........................................................................144
9.4 Denial of Service ..............................................................................................144
9.4.1 Basics .....................................................................................................144
9.4.2 Types of DoS Attacks .............................................................................145
9.4.2.1 ICMP Vulnerability ........................................................................147
9.4.2.2 Illegal Commands (NetBIOS and SMTP) ......................................147
9.4.2.3 Traceroute .....................................................................................148
9.5 Stateful Inspection ............................................................................................148
9.5.1 Stateful Inspection Process ....................................................................149
9.5.2 Stateful Inspection and the ZyXEL device ..............................................149
9.5.3 TCP Security ...........................................................................................150
9.5.4 UDP/ICMP Security ................................................................................150
9.5.5 Upper Layer Protocols ............................................................................151
9.6 Guidelines for Enhancing Security with Your Firewall ......................................151
9.6.1 Security In General .................................................................................151
9.7 Packet Filtering Vs Firewall ..............................................................................152
9.7.1 Packet Filtering: ......................................................................................152
9.7.1.1 When To Use Filtering ...................................................................153
9.7.2 Firewall ...................................................................................................153
9.7.2.1 When To Use The Firewall ............................................................153
Chapter 10
Firewall Configuration ......................................................................................... 154
10.1 Access Methods .............................................................................................154
10.2 Firewall Policies Overview ............................................................................154
10.3 Rule Logic Overview .....................................................................................155
10.3.1 Rule Checklist .......................................................................................155
10.3.2 Security Ramifications ..........................................................................155
10.3.3 Key Fields For Configuring Rules .........................................................156
10.3.3.1 Action ..........................................................................................156
10.3.3.2 Service ........................................................................................156
10.3.3.3 Source Address ...........................................................................156
10.3.3.4 Destination Address ....................................................................156
10.4 Connection Direction ......................................................................................156
10.4.1 LAN to WAN Rules ...............................................................................157
Table of Contents 14
P-660HW-D Series User’s Guide
10.4.2 Alerts .....................................................................................................157
10.5 General Firewall Policy ...............................................................................157
10.6 Firewall Rules Summary ...............................................................................158
10.6.1 Configuring Firewall Rules ..................................................................160
10.6.2 Customized Services ...........................................................................163
10.6.3 Configuring A Customized Service .....................................................164
10.7 Example Firewall Rule ...................................................................................164
10.8 Predefined Services .......................................................................................168
10.9 Anti-Probing ..................................................................................................170
10.10 DoS Thresholds ..........................................................................................171
10.10.1 Threshold Values ................................................................................171
10.10.2 Half-Open Sessions ............................................................................172
10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................172
10.10.3 Configuring Firewall Thresholds .........................................................173
Chapter 11
Content Filtering .................................................................................................. 176
11.1 Content Filtering Overview ............................................................................176
11.2 Configuring Keyword Blocking .....................................................................176
11.3 Configuring the Schedule .............................................................................177
11.4 Configuring Trusted Computers ...................................................................178
Chapter 12
Static Route .......................................................................................................... 180
12.1 Static Route .................................................................................................180
12.2 Configuring Static Route ...............................................................................180
12.2.1 Static Route Edit .................................................................................181
Chapter 13
Bandwidth Management...................................................................................... 184
13.1 Bandwidth Management Overview ...............................................................184
13.2 Application-based Bandwidth Management ...................................................184
13.3 Subnet-based Bandwidth Management .........................................................184
13.4 Application and Subnet-based Bandwidth Management ...............................185
13.5 Scheduler .......................................................................................................185
13.5.1 Priority-based Scheduler ......................................................................186
13.5.2 Fairness-based Scheduler ....................................................................186
13.6 Maximize Bandwidth Usage ...........................................................................186
13.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................186
13.6.2 Maximize Bandwidth Usage Example ..................................................187
13.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 187
13.6.2.2 Fairness-based Allotment of Unused and Unbudgeted Bandwidth ... 188
15 Table of Contents
P-660HW-D Series User’s Guide
13.6.3 Bandwidth Management Priorities ........................................................188
13.7 Over Allotment of Bandwidth ..........................................................................189
13.8 Configuring Summary ...................................................................................189
13.9 Bandwidth Management Rule Setup ............................................................190
13.9.1 Rule Configuration ................................................................................192
13.10 Bandwidth Monitor .....................................................................................194
Chapter 14
Dynamic DNS Setup............................................................................................. 196
14.1 Dynamic DNS Overview ...............................................................................196
14.1.1 DYNDNS Wildcard ................................................................................196
14.2 Configuring Dynamic DNS ............................................................................196
Chapter 15
Remote Management Configuration .................................................................. 200
15.1 Remote Management Overview ....................................................................200
15.1.1 Remote Management Limitations .........................................................200
15.1.2 Remote Management and NAT ............................................................201
15.1.3 System Timeout ...................................................................................201
15.2 WWW .............................................................................................................201
15.3 Telnet ..............................................................................................................202
15.4 Configuring Telnet ..........................................................................................202
15.5 Configuring FTP ............................................................................................203
15.6 SNMP .............................................................................................................204
15.6.1 Supported MIBs ....................................................................................205
15.6.2 SNMP Traps .........................................................................................206
15.6.3 Configuring SNMP ................................................................................206
15.7 Configuring DNS ..........................................................................................207
15.8 Configuring ICMP ...........................................................................................208
Chapter 16
Universal Plug-and-Play (UPnP) ......................................................................... 210
16.1 Introducing Universal Plug and Play .............................................................210
16.1.1 How do I know if I'm using UPnP? ........................................................210
16.1.2 NAT Traversal .......................................................................................210
16.1.3 Cautions with UPnP ..............................................................................211
16.2 UPnP and ZyXEL ...........................................................................................211
16.2.1 Configuring UPnP ................................................................................211
16.3 Installing UPnP in Windows Example ............................................................212
16.3.1 Installing UPnP in Windows Me ............................................................212
16.3.2 Installing UPnP in Windows XP ............................................................214
16.4 Using UPnP in Windows XP Example ...........................................................215
16.4.1 Auto-discover Your UPnP-enabled Network Device .............................215
Table of Contents 16
P-660HW-D Series User’s Guide
16.4.2 Web Configurator Easy Access ............................................................218
Chapter 17
System .................................................................................................................. 222
17.1 General Setup ................................................................................................222
17.1.1 General Setup and System Name ........................................................222
17.1.2 General Setup ......................................................................................222
17.2 Time Setting ..................................................................................................224
Chapter 18
Logs ...................................................................................................................... 228
18.1 Logs Overview ..............................................................................................228
18.1.1 Alerts and Logs .....................................................................................228
18.2 Viewing the Logs ............................................................................................228
18.3 Configuring Log Settings ...............................................................................229
18.3.1 Example E-mail Log ..............................................................................232
Chapter 19
Tools ...................................................................................................................... 234
19.1 Firmware Upgrade ........................................................................................234
19.2 Configuration Screen .....................................................................................236
19.2.1 Backup Configuration ...........................................................................236
19.2.2 Restore Configuration ...........................................................................237
19.2.3 Back to Factory Defaults .......................................................................238
19.3 Restart ............................................................................................................238
Chapter 20
Diagnostic ............................................................................................................240
20.1 General Diagnostic ........................................................................................240
20.2 DSL Line Diagnostic .....................................................................................241
Chapter 21
Troubleshooting ................................................................................................... 242
21.1 Problems Starting Up the ZyXEL device ........................................................242
21.2 Problems with the LAN ...................................................................................242
21.3 Problems with the WAN .................................................................................243
21.4 Problems Accessing the ZyXEL device .........................................................244
Appendix A
Product Specifications ....................................................................................... 246
Appendix B
About ADSL .......................................................................................................... 250
17 Table of Contents
P-660HW-D Series User’s Guide
Introduction to DSL ................................................................................................ 250
ADSL Overview...................................................................................................... 250
Advantages of ADSL.............................................................................................. 250
Appendix C
Wall-mounting Instructions................................................................................. 252
Appendix D
Setting up Your Computer’s IP Address............................................................ 254
Windows 95/98/Me................................................................................................. 254
Windows 2000/NT/XP ............................................................................................ 257
Macintosh OS 8/9................................................................................................... 262
Macintosh OS X ..................................................................................................... 264
Linux....................................................................................................................... 265
21.4.1 Verifying Settings ..................................................................................269
Appendix E
IP Subnetting ........................................................................................................ 270
IP Addressing......................................................................................................... 270
IP Classes .............................................................................................................. 270
Subnet Masks ........................................................................................................ 271
Subnetting .............................................................................................................. 271
Example: Two Subnets .......................................................................................... 272
Example: Four Subnets.......................................................................................... 274
Example Eight Subnets.......................................................................................... 275
Subnetting With Class A and Class B Networks. ................................................... 276
Appendix F
Command Interpreter........................................................................................... 278
Accessing the CLI .................................................................................................. 278
Command Syntax................................................................................................... 278
Command Usage ................................................................................................... 278
Appendix G
Firewall Commands ............................................................................................. 280
Appendix H
NetBIOS Filter Commands .................................................................................. 286
Introduction ............................................................................................................ 286
Display NetBIOS Filter Settings ............................................................................. 286
NetBIOS Filter Configuration.................................................................................. 287
Appendix I
Table of Contents 18
P-660HW-D Series User’s Guide
PPPoE ................................................................................................................... 288
PPPoE in Action..................................................................................................... 288
Benefits of PPPoE.................................................................................................. 288
Traditional Dial-up Scenario................................................................................... 288
How PPPoE Works ................................................................................................ 289
ZyXEL device as a PPPoE Client .......................................................................... 289
Appendix J
Splitters and Microfilters ..................................................................................... 290
Connecting a POTS Splitter ................................................................................... 290
Telephone Microfilters ............................................................................................ 290
ZyXEL device With ISDN ....................................................................................... 292
Appendix K
Log Descriptions.................................................................................................. 294
Log Commands...................................................................................................... 308
Log Command Example......................................................................................... 309
Appendix L
Wireless LANs ...................................................................................................... 310
Wireless LAN Topologies ....................................................................................... 310
Channel.................................................................................................................. 312
RTS/CTS................................................................................................................ 312
Fragmentation Threshold ....................................................................................... 313
Preamble Type....................................................................................................... 314
IEEE 802.11g Wireless LAN .................................................................................. 314
Wireless Security Overview ................................................................................... 315
IEEE 802.1x ........................................................................................................... 315
RADIUS.................................................................................................................. 316
Types of Authentication.......................................................................................... 317
Dynamic WEP Key Exchange................................................................................ 318
WPA and WPA2 ..................................................................................................... 319
21.4.2 WPA(2)-PSK Application Example .......................................................321
Security Parameters Summary .............................................................................. 322
Appendix M
Pop-up Windows, JavaScripts and Java Permissions ..................................... 324
Internet Explorer Pop-up Blockers ......................................................................... 324
JavaScripts............................................................................................................. 327
Index...................................................................................................................... 332
19 Table of Contents
P-660HW-D Series User’s Guide

List of Figures

Figure 1 Protected Internet Access Applications ................................................................ 36
Figure 2 LAN-to-LAN Application Example ......................................................................... 37
Figure 3 Front Panel ...........................................................................................................37
Figure 4 Password Screen .................................................................................................. 41
Figure 5 Change Password at Login ................................................................................... 41
Figure 6 Select a Mode ....................................................................................................... 42
Figure 7 Web Configurator: Main Screen .......................................................................... 43
Figure 8 Status Screen ........................................................................................................ 46
Figure 9 Status: Any IP Table .............................................................................................. 48
Figure 10 Status: WLAN Status ........................................................................................... 49
Figure 11 Status: Bandwidth Status ..................................................................................... 49
Figure 12 Status: Packet Statistics ...................................................................................... 50
Figure 13 System General .................................................................................................. 52
Figure 14 Select a Mode ..................................................................................................... 54
Figure 15 Wizard: Welcome ................................................................................................ 55
Figure 16 Auto Detection: No DSL Connection ................................................................... 55
Figure 17 Auto Detection: Failed ......................................................................................... 56
Figure 18 Auto-Detection: PPPoE ....................................................................................... 56
Figure 19 Internet Access Wizard Setup: ISP Parameters ................................................. 57
Figure 20 Internet Connection with PPPoE ......................................................................... 58
Figure 21 Internet Connection with RFC 1483 ................................................................... 58
Figure 22 Internet Connection with ENET ENCAP ............................................................. 59
Figure 23 Internet Connection with PPPoA ......................................................................... 60
Figure 24 Connection Test Failed-1 .................................................................................... 61
Figure 25 Connection Test Failed-2. ................................................................................... 61
Figure 26 Connection Test Successful ................................................................................ 62
Figure 27 Wireless LAN Setup Wizard 1 ............................................................................. 62
Figure 28 Wireless LAN Setup Wizard 2 ............................................................................. 63
Figure 29 Manually assign a WPA key ................................................................................ 65
Figure 30 Manually assign a WEP key ............................................................................... 65
Figure 31 Wireless LAN Setup 3 ......................................................................................... 66
Figure 32 Internet Access and WLAN Wizard Setup Complete .......................................... 67
Figure 33 Select a Mode ..................................................................................................... 69
Figure 34 Wizard: Welcome ................................................................................................ 70
Figure 35 Bandwidth Management Wizard: General Information ....................................... 70
Figure 36 Bandwidth Management Wizard: Configuration .................................................. 71
Figure 37 Bandwidth Management Wizard: Complete ........................................................ 72
Figure 38 Example of Traffic Shaping ................................................................................. 78
List of Figures 20
P-660HW-D Series User’s Guide
Figure 39 Internet Connection (PPPoE) .............................................................................. 80
Figure 40 Advanced Internet Connection Setup ................................................................. 82
Figure 41 More Connections ............................................................................................... 84
Figure 42 More Connections Edit ........................................................................................ 85
Figure 43 More Connections Advanced Setup ................................................................... 87
Figure 44 Traffic Redirect Example ..................................................................................... 88
Figure 45 Traffic Redirect LAN Setup ................................................................................. 89
Figure 46 WAN Backup Setup ............................................................................................ 89
Figure 47 LAN and WAN IP Addresses .............................................................................. 92
Figure 48 Any IP Example .................................................................................................. 97
Figure 49 LAN IP ................................................................................................................. 98
Figure 50 Advanced LAN Setup .......................................................................................... 99
Figure 51 DHCP Setup ....................................................................................................... 100
Figure 52 LAN Client List .................................................................................................... 101
Figure 53 Physical Network & Partitioned Logical Networks .............................................. 103
Figure 54 LAN IP Alias ........................................................................................................ 103
Figure 55 Example of a Wireless Network .......................................................................... 106
Figure 56 Wireless LAN: General ...................................................................................... 110
Figure 57 Wireless: No Security .......................................................................................... 111
Figure 58 Wireless: Static WEP Encryption ........................................................................ 112
Figure 59 Wireless: WPA-PSK/WPA2-PSK ......................................................................... 113
Figure 60 Wireless: WPA/WPA2 ......................................................................................... 115
Figure 61 Advanced ............................................................................................................ 117
Figure 62 OTIST ................................................................................................................. 119
Figure 63 Example Wireless Client OTIST Screen ............................................................. 120
Figure 64 Security Key ........................................................................................................ 120
Figure 65 OTIST in Progress (AP) ...................................................................................... 120
Figure 66 OTIST in Progress (Client) .................................................................................. 120
Figure 67 No AP with OTIST Found ................................................................................... 121
Figure 68 Start OTIST? ....................................................................................................... 121
Figure 69 MAC Address Filter ............................................................................................. 122
Figure 70 Wireless LAN: QoS ............................................................................................. 127
Figure 71 Application Priority Configuration ........................................................................ 128
Figure 72 How NAT Works .................................................................................................. 131
Figure 73 NAT Application With IP Alias ............................................................................. 132
Figure 74 NAT General ....................................................................................................... 134
Figure 75 Multiple Servers Behind NAT Example ............................................................... 136
Figure 76 NAT Port Forwarding .......................................................................................... 136
Figure 77 Port Forwarding Rule Setup .............................................................................. 137
Figure 78 Address Mapping Rules ...................................................................................... 139
Figure 79 Edit Address Mapping Rule .............................................................................. 140
Figure 80 Firewall Application ............................................................................................. 144
Figure 81 Three-Way Handshake ....................................................................................... 145
21 List of Figures
P-660HW-D Series User’s Guide
Figure 82 SYN Flood ........................................................................................................... 146
Figure 83 Smurf Attack ....................................................................................................... 147
Figure 84 Stateful Inspection ............................................................................................... 148
Figure 85 Firewall: General ................................................................................................. 157
Figure 86 Firewall Rules .................................................................................................... 159
Figure 87 Firewall: Edit Rule ............................................................................................... 161
Figure 88 Firewall: Customized Services ............................................................................ 163
Figure 89 Firewall: Configure Customized Services ........................................................... 164
Figure 90 Firewall Example: Rules ..................................................................................... 165
Figure 91 Edit Custom Port Example .................................................................................. 165
Figure 92 Firewall Example: Edit Rule: Destination Address ............................................. 166
Figure 93 Firewall Example: Edit Rule: Select Customized Services ................................. 167
Figure 94 Firewall Example: Rules: MyService .................................................................. 168
Figure 95 Firewall: Anti Probing .......................................................................................... 170
Figure 96 Firewall: Threshold .............................................................................................. 173
Figure 97 Content Filter: Keyword ...................................................................................... 176
Figure 98 Content Filter: Schedule ..................................................................................... 177
Figure 99 Content Filter: Trusted ........................................................................................ 178
Figure 100 Example of Static Routing Topology ................................................................. 180
Figure 101 Static Route ....................................................................................................... 181
Figure 102 Static Route Edit ............................................................................................... 182
Figure 103 Subnet-based Bandwidth Management Example ............................................. 185
Figure 104 Bandwidth Management: Summary .................................................................. 189
Figure 105 Bandwidth Management: Rule Setup ............................................................... 191
Figure 106 Bandwidth Management Rule Configuration .................................................... 192
Figure 107 Bandwidth Management: Monitor .................................................................... 195
Figure 108 Dynamic DNS ................................................................................................... 197
Figure 109 Remote Management: WWW ........................................................................... 201
Figure 110 Telnet Configuration on a TCP/IP Network ....................................................... 202
Figure 111 Remote Management: Telnet ............................................................................ 203
Figure 112 Remote Management: FTP ............................................................................... 204
Figure 113 SNMP Management Model ............................................................................... 205
Figure 114 Remote Management: SNMP ........................................................................... 206
Figure 115 Remote Management: DNS .............................................................................. 208
Figure 116 Remote Management: ICMP ............................................................................. 209
Figure 117 Configuring UPnP ............................................................................................. 211
Figure 118 Add/Remove Programs: Windows Setup: Communication ............................... 213
Figure 119 Add/Remove Programs: Windows Setup: Communication: Components ......... 213
Figure 120 Network Connections ........................................................................................ 214
Figure 121 Windows Optional Networking Components Wizard ........................................ 214
Figure 122 Networking Services ......................................................................................... 215
Figure 123 Network Connections ........................................................................................ 216
Figure 124 Internet Connection Properties ........................................................................ 216
List of Figures 22
P-660HW-D Series User’s Guide
Figure 125 Internet Connection Properties: Advanced Settings ......................................... 217
Figure 126 Internet Connection Properties: Advanced Settings: Add ................................. 217
Figure 127 System Tray Icon .............................................................................................. 217
Figure 128 Internet Connection Status ................................................................................ 218
Figure 129 Network Connections ........................................................................................ 219
Figure 130 Network Connections: My Network Places ....................................................... 220
Figure 131 Network Connections: My Network Places: Properties: Example ..................... 220
Figure 132 System General Setup ...................................................................................... 223
Figure 133 System Time Setting ......................................................................................... 224
Figure 134 View Log ........................................................................................................... 229
Figure 135 Log Settings ...................................................................................................... 230
Figure 136 E-mail Log Example .......................................................................................... 232
Figure 137 Firmware Upgrade ............................................................................................ 234
Figure 138 Firmware Upload In Progress ........................................................................... 235
Figure 139 Network Temporarily Disconnected .................................................................. 235
Figure 140 Error Message .................................................................................................. 236
Figure 141 Configuration ..................................................................................................... 236
Figure 142 Configuration Restore Successful ..................................................................... 237
Figure 143 Temporarily Disconnected ................................................................................. 237
Figure 144 Configuration Restore Error .............................................................................. 238
Figure 145 Restart Screen .................................................................................................. 238
Figure 146 Diagnostic: General .......................................................................................... 240
Figure 147 Diagnostic: DSL Line ........................................................................................ 241
Figure 148 Wall-mounting Example .................................................................................... 252
Figure 149 WIndows 95/98/Me: Network: Configuration ..................................................... 255
Figure 150 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 256
Figure 151 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 257
Figure 152 Windows XP: Start Menu .................................................................................. 258
Figure 153 Windows XP: Control Panel .............................................................................. 258
Figure 154 Windows XP: Control Panel: Network Connections: Properties ....................... 259
Figure 155 Windows XP: Local Area Connection Properties .............................................. 259
Figure 156 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 260
Figure 157 Windows XP: Advanced TCP/IP Properties ...................................................... 261
Figure 158 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 262
Figure 159 Macintosh OS 8/9: Apple Menu ........................................................................ 263
Figure 160 Macintosh OS 8/9: TCP/IP ................................................................................ 263
Figure 161 Macintosh OS X: Apple Menu ........................................................................... 264
Figure 162 Macintosh OS X: Network ................................................................................. 265
Figure 163 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 266
Figure 164 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 266
Figure 165 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 267
Figure 166 Red Hat 9.0: KDE: Network Configuration: Activate ................................. 267
Figure 167 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 268
23 List of Figures
P-660HW-D Series User’s Guide
Figure 168 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 268
Figure 169 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 268
Figure 170 Red Hat 9.0: Restart Ethernet Card ................................................................ 269
Figure 171 Red Hat 9.0: Checking TCP/IP Properties ...................................................... 269
Figure 172 Single-Computer per Router Hardware Configuration ...................................... 289
Figure 173 ZyXEL device as a PPPoE Client ..................................................................... 289
Figure 174 Connecting a POTS Splitter .............................................................................. 290
Figure 175 Connecting a Microfilter .................................................................................... 291
Figure 176 Connecting a Microfilter and Y-Connector ........................................................ 291
Figure 177 ZyXEL device with ISDN ................................................................................... 292
Figure 178 Displaying Log Categories Example ................................................................. 308
Figure 179 Displaying Log Parameters Example ................................................................ 308
Figure 180 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 310
Figure 181 Basic Service Set .............................................................................................. 311
Figure 182 Infrastructure WLAN ......................................................................................... 312
Figure 183 RTS/CTS .......................................................................................................... 313
Figure 184 WPA(2) with RADIUS Application Example ...................................................... 321
Figure 185 WPA(2)-PSK Authentication ............................................................................. 322
Figure 186 Pop-up Blocker ................................................................................................. 324
Figure 187 Internet Options ............................................................................................... 325
Figure 188 Internet Options ................................................................................................ 326
Figure 189 Pop-up Blocker Settings ................................................................................... 327
Figure 190 Internet Options ................................................................................................ 328
Figure 191 Security Settings - Java Scripting ..................................................................... 329
Figure 192 Security Settings - Java .................................................................................... 330
Figure 193 Java (Sun) ......................................................................................................... 331
List of Figures 24
P-660HW-D Series User’s Guide
25 List of Figures
P-660HW-D Series User’s Guide

List of Tables

Table 1 ADSL Standards .................................................................................................... 32
Table 2 Front Panel LEDs .................................................................................................. 37
Table 3 Web Configurator Screens Summary .................................................................... 43
Table 4 Status Screen ........................................................................................................ 46
Table 5 Status: Any IP Table .............................................................................................. 48
Table 6 Status: WLAN Status ............................................................................................. 49
Table 7 Status: Packet Statistics ........................................................................................ 50
Table 8 Internet Access Wizard Setup: ISP Parameters .................................................... 57
Table 9 Internet Connection with PPPoE .......................................................................... 58
Table 10 Internet Connection with RFC 1483 .................................................................... 59
Table 11 Internet Connection with ENET ENCAP .............................................................. 59
Table 12 Internet Connection with PPPoA ......................................................................... 60
Table 13 Wireless LAN Setup Wizard 1 ............................................................................. 63
Table 14 Wireless LAN Setup Wizard 2 ............................................................................. 64
Table 15 Manually assign a WPA key ................................................................................ 65
Table 16 Manually assign a WEP key ................................................................................ 66
Table 17 Media Bandwidth Management Setup: Services ................................................. 68
Table 18 Bandwidth Management Wizard: General Information ........................................ 70
Table 19 Bandwidth Management Wizard: Configuration .................................................. 71
Table 20 Internet Connection ............................................................................................. 80
Table 21 Advanced Internet Connection Setup .................................................................. 82
Table 22 More Connections ............................................................................................... 84
Table 23 More Connections Edit ........................................................................................ 85
Table 24 More Connections Advanced Setup .................................................................... 87
Table 25 WAN Backup Setup ............................................................................................. 90
Table 26 LAN IP ................................................................................................................. 98
Table 27 Advanced LAN Setup .......................................................................................... 99
Table 28 DHCP Setup ........................................................................................................ 100
Table 29 LAN Client List ..................................................................................................... 102
Table 30 LAN IP Alias ........................................................................................................ 103
Table 31 Types of Encryption for Each Type of Authentication .......................................... 108
Table 32 Wireless LAN: General ........................................................................................ 110
Table 33 Wireless No Security ........................................................................................... 111
Table 34 Wireless: Static WEP Encryption ......................................................................... 112
Table 35 Wireless: WPA-PSK/WPA2-PSK ......................................................................... 114
Table 36 Wireless: WPA/WPA2 .......................................................................................... 115
Table 37 Wireless LAN: Advanced ..................................................................................... 117
Table 38 OTIST .................................................................................................................. 119
List of Tables 26
P-660HW-D Series User’s Guide
Table 39 MAC Address Filter ............................................................................................. 123
Table 40 WMM QoS Priorities ............................................................................................ 124
Table 41 Commonly Used Services ................................................................................... 124
Table 42 Wireless LAN: QoS .............................................................................................. 127
Table 43 Application Priority Configuration ........................................................................ 128
Table 44 NAT Definitions .................................................................................................... 130
Table 45 NAT Mapping Types ............................................................................................ 133
Table 46 NAT General ........................................................................................................ 134
Table 47 Services and Port Numbers ................................................................................. 135
Table 48 NAT Port Forwarding ........................................................................................... 137
Table 49 Port Forwarding Rule Setup ................................................................................ 138
Table 50 Address Mapping Rules ...................................................................................... 139
Table 51 Edit Address Mapping Rule ................................................................................. 140
Table 52 Common IP Ports ................................................................................................ 145
Table 53 ICMP Commands That Trigger Alerts .................................................................. 147
Table 54 Legal NetBIOS Commands ................................................................................. 147
Table 55 Legal SMTP Commands .................................................................................... 147
Table 56 Firewall: General ................................................................................................. 158
Table 57 Firewall Rules ...................................................................................................... 159
Table 58 Firewall: Edit Rule ................................................................................................ 162
Table 59 Customized Services ........................................................................................... 163
Table 60 Firewall: Configure Customized Services ............................................................ 164
Table 61 Predefined Services ........................................................................................... 168
Table 62 Firewall: Anti Probing ........................................................................................... 171
Table 63 Firewall: Threshold .............................................................................................. 173
Table 64 Content Filter: Keyword ....................................................................................... 177
Table 65 Content Filter: Schedule ...................................................................................... 178
Table 66 Content Filter: Trusted ......................................................................................... 178
Table 67 Static Route .........................................................................................................181
Table 68 Static Route Edit .................................................................................................. 182
Table 69 Application and Subnet-based Bandwidth Management Example ...................... 185
Table 70 Maximize Bandwidth Usage Example ................................................................. 187
Table 71 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ......... 187
Table 72 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ...... 188
Table 73 Bandwidth Management Priorities ....................................................................... 188
Table 74 Over Allotment of Bandwidth Example ................................................................ 189
Table 75 Media Bandwidth Management: Summary .......................................................... 190
Table 76 Bandwidth Management: Rule Setup .................................................................. 191
Table 77 Bandwidth Management Rule Configuration ....................................................... 192
Table 78 Services and Port Numbers ................................................................................. 194
Table 79 Dynamic DNS ...................................................................................................... 197
Table 80 Remote Management: WWW .............................................................................. 202
Table 81 Remote Management: Telnet .............................................................................. 203
27 List of Tables
P-660HW-D Series User’s Guide
Table 82 Remote Management: FTP ................................................................................. 204
Table 83 SNMP Traps ........................................................................................................ 206
Table 84 Remote Management: SNMP .............................................................................. 207
Table 85 Remote Management: DNS ................................................................................ 208
Table 86 Remote Management: ICMP ............................................................................... 209
Table 87 Configuring UPnP ................................................................................................ 212
Table 88 System General Setup ........................................................................................ 223
Table 89 System Time Setting ............................................................................................ 225
Table 90 View Log .............................................................................................................. 229
Table 91 Log Settings .........................................................................................................230
Table 92 Firmware Upgrade ............................................................................................... 234
Table 93 Maintenance Restore Configuration .................................................................... 237
Table 94 Diagnostic: General ............................................................................................. 240
Table 95 Diagnostic: DSL Line ........................................................................................... 241
Table 96 Troubleshooting Starting Up Your ZyXEL device ................................................. 242
Table 97 Troubleshooting the LAN ..................................................................................... 242
Table 98 Troubleshooting the WAN .................................................................................... 243
Table 99 Troubleshooting Accessing the ZyXEL device .................................................... 244
Table 100 Device ................................................................................................................ 246
Table 101 Firmware ............................................................................................................247
Table 102 Classes of IP Addresses ................................................................................... 270
Table 103 Allowed IP Address Range By Class ................................................................. 271
Table 104 “Natural” Masks ................................................................................................ 271
Table 105 Alternative Subnet Mask Notation ..................................................................... 272
Table 106 Two Subnets Example ....................................................................................... 272
Table 107 Subnet 1 ............................................................................................................273
Table 108 Subnet 2 ............................................................................................................273
Table 109 Subnet 1 ............................................................................................................274
Table 110 Subnet 2 ............................................................................................................274
Table 111 Subnet 3 ............................................................................................................. 274
Table 112 Subnet 4 ............................................................................................................275
Table 113 Eight Subnets .................................................................................................... 275
Table 114 Class C Subnet Planning ................................................................................... 275
Table 115 Class B Subnet Planning ................................................................................... 276
Table 116 Firewall Commands ........................................................................................... 280
Table 117 NetBIOS Filter Default Settings ......................................................................... 287
Table 118 System Maintenance Logs ................................................................................ 294
Table 119 System Error Logs ............................................................................................. 295
Table 120 Access Control Logs .......................................................................................... 295
Table 121 TCP Reset Logs ................................................................................................ 296
Table 122 Packet Filter Logs .............................................................................................. 296
Table 123 ICMP Logs ......................................................................................................... 297
Table 124 CDR Logs .......................................................................................................... 297
List of Tables 28
P-660HW-D Series User’s Guide
Table 125 PPP Logs ........................................................................................................... 297
Table 126 UPnP Logs ........................................................................................................ 298
Table 127 Content Filtering Logs ....................................................................................... 298
Table 128 Attack Logs ........................................................................................................ 299
Table 129 IPSec Logs ........................................................................................................ 300
Table 130 IKE Logs ............................................................................................................300
Table 131 PKI Logs ............................................................................................................303
Table 132 Certificate Path Verification Failure Reason Codes ........................................... 304
Table 133 802.1X Logs ...................................................................................................... 305
Table 134 ACL Setting Notes ............................................................................................. 306
Table 135 ICMP Notes ....................................................................................................... 306
Table 136 Syslog Logs ....................................................................................................... 307
Table 137 RFC-2408 ISAKMP Payload Types ................................................................... 307
Table 138 IEEE 802.11g ..................................................................................................... 314
Table 139 Wireless Security Levels ................................................................................... 315
Table 140 Comparison of EAP Authentication Types ......................................................... 318
Table 141 Wireless Security Relational Matrix ................................................................... 322
29 List of Tables
Loading...
+ 309 hidden pages