802.11g Wireless ADSL 2+ 4-port Gateway
User’s Guide
Version 3.40
Edition 1
3/2006
P-660HW-D Series User’s Guide
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright |
2 |
P-660HW-D Series User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
•This device may not cause harmful interference.
•This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and the receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
3 |
Federal Communications Commission (FCC) Interference Statement |
P-660HW-D Series User’s Guide
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
ZyXEL Communications Corporation declared that ZyXEL device is limited in CH1~11 from 2400 to 2483.5 MHz by specified firmware controlled in USA.
Certifications
1Go to www.zyxel.com
2Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
3Select the certification you wish to view from this page.
Federal Communications Commission (FCC) Interference Statement |
4 |
P-660HW-D Series User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
•To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
•Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
•Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
•Do NOT use the device if the power supply is damaged as it might cause electrocution.
•If the power supply is damaged, remove it from the power outlet.
•Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
•Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
•If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
•Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
•Do NOT expose your device to dampness, dust or corrosive liquids.
•Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
•Make sure to connect the cables to the correct ports.
•Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
•Do NOT store things on the device.
•Connect ONLY suitable accessories to the device.
5 |
Safety Warnings |
P-660HW-D Series User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
ZyXEL Limited Warranty |
6 |
P-660HW-D Series User’s Guide
Please have the following information ready when you contact customer support.
•Product model and serial number.
•Warranty Information.
•Date that you received your device.
•Brief description of the problem and the steps you took to solve it.
METHOD |
SUPPORT E-MAIL |
TELEPHONEA |
WEB SITE |
REGULAR MAIL |
|
LOCATION |
SALES E-MAIL |
FAX |
FTP SITE |
||
|
|||||
|
|
|
|
|
|
CORPORATE |
support@zyxel.com.tw |
+886-3-578-3942 |
www.zyxel.com |
ZyXEL Communications Corp. |
|
|
|
www.europe.zyxel.com |
6 Innovation Road II |
||
HEADQUARTERS |
|
|
|
Science Park |
|
sales@zyxel.com.tw |
+886-3-578-2439 |
ftp.zyxel.com |
|||
(WORLDWIDE) |
Hsinchu 300 |
||||
|
|
|
ftp.europe.zyxel.com |
Taiwan |
|
|
info@cz.zyxel.com |
+420-241-091-350 |
www.zyxel.cz |
ZyXEL Communications |
|
|
|
|
|
Czech s.r.o. |
|
CZECH REPUBLIC |
info@cz.zyxel.com |
+420-241-091-359 |
|
||
|
Modranská 621 |
||||
|
|
|
|
143 01 Praha 4 - Modrany |
|
|
|
|
|
Ceská Republika |
|
|
support@zyxel.dk |
+45-39-55-07-00 |
www.zyxel.dk |
ZyXEL Communications A/S |
|
DENMARK |
|
|
|
Columbusvej |
|
sales@zyxel.dk |
+45-39-55-07-07 |
|
|||
|
2860 Soeborg |
||||
|
|
|
|
Denmark |
|
|
support@zyxel.fi |
+358-9-4780-8411 |
www.zyxel.fi |
ZyXEL Communications Oy |
|
FINLAND |
|
|
|
Malminkaari 10 |
|
sales@zyxel.fi |
+358-9-4780 8448 |
|
|||
|
00700 Helsinki |
||||
|
|
|
|
Finland |
|
|
info@zyxel.fr |
+33-4-72-52-97-97 |
www.zyxel.fr |
ZyXEL France |
|
|
|
|
|
1 rue des Vergers |
|
FRANCE |
|
+33-4-72-52-19-20 |
|
||
|
|
Bat. 1 / C |
|||
|
|
|
|
69760 Limonest |
|
|
|
|
|
France |
|
|
support@zyxel.de |
+49-2405-6909-0 |
www.zyxel.de |
ZyXEL Deutschland GmbH. |
|
GERMANY |
|
|
|
Adenauerstr. 20/A2 D-52146 |
|
sales@zyxel.de |
+49-2405-6909-99 |
|
|||
|
Wuerselen |
||||
|
|
|
|
Germany |
|
|
support@zyxel.hu |
+36-1-3361649 |
www.zyxel.hu |
ZyXEL Hungary |
|
HUNGARY |
|
|
|
48, Zoldlomb Str. |
|
info@zyxel.hu |
+36-1-3259100 |
|
|||
|
H-1025, Budapest |
||||
|
|
|
|
Hungary |
|
|
http://zyxel.kz/support |
+7-3272-590-698 |
www.zyxel.kz |
ZyXEL Kazakhstan |
|
|
|
|
|
43, Dostyk ave.,Office 414 |
|
KAZAKHSTAN |
sales@zyxel.kz |
+7-3272-590-689 |
|
||
|
Dostyk Business Centre |
||||
|
|
|
|
050010, Almaty |
|
|
|
|
|
Republic of Kazakhstan |
|
|
support@zyxel.com |
1-800-255-4101 |
www.us.zyxel.com |
ZyXEL Communications Inc. |
|
|
|
+1-714-632-0882 |
|
1130 N. Miller St. |
|
NORTH AMERICA |
|
|
|
Anaheim |
|
|
sales@zyxel.com |
+1-714-632-0858 |
ftp.us.zyxel.com |
CA 92806-2001 |
|
|
|
|
|
U.S.A. |
|
|
support@zyxel.no |
+47-22-80-61-80 |
www.zyxel.no |
ZyXEL Communications A/S |
|
NORWAY |
|
|
|
Nils Hansens vei 13 |
|
sales@zyxel.no |
+47-22-80-61-81 |
|
|||
|
0667 Oslo |
||||
|
|
|
|
Norway |
7 |
Customer Support |
P-660HW-D Series User’s Guide
METHOD |
SUPPORT E-MAIL |
TELEPHONEA |
WEB SITE |
REGULAR MAIL |
|
LOCATION |
SALES E-MAIL |
FAX |
FTP SITE |
||
|
|||||
|
|
|
|
|
|
|
info@pl.zyxel.com |
+48-22-5286603 |
www.pl.zyxel.com |
ZyXEL Communications |
|
POLAND |
|
|
|
ul.Emilli Plater 53 |
|
|
+48-22-5206701 |
|
|||
|
|
00-113 Warszawa |
|||
|
|
|
|
Poland |
|
|
http://zyxel.ru/support |
+7-095-542-89-29 |
www.zyxel.ru |
ZyXEL Russia |
|
RUSSIA |
|
|
|
Ostrovityanova 37a Str. |
|
sales@zyxel.ru |
+7-095-542-89-25 |
|
|||
|
Moscow, 117279 |
||||
|
|
|
|
Russia |
|
|
support@zyxel.es |
+34-902-195-420 |
www.zyxel.es |
ZyXEL Communications |
|
SPAIN |
|
|
|
Alejandro Villegas 33 |
|
sales@zyxel.es |
+34-913-005-345 |
|
|||
|
1º, 28043 Madrid |
||||
|
|
|
|
Spain |
|
|
support@zyxel.se |
+46-31-744-7700 |
www.zyxel.se |
ZyXEL Communications A/S |
|
SWEDEN |
|
|
|
Sjöporten 4, 41764 Göteborg |
|
sales@zyxel.se |
+46-31-744-7701 |
|
|||
|
|
Sweden |
|||
|
|
|
|
|
|
|
support@ua.zyxel.com |
+380-44-247-69-78 |
www.ua.zyxel.com |
ZyXEL Ukraine |
|
UKRAINE |
|
|
|
13, Pimonenko Str. |
|
sales@ua.zyxel.com |
+380-44-494-49-32 |
|
|||
|
Kiev, 04050 |
||||
|
|
|
|
Ukraine |
|
|
support@zyxel.co.uk |
+44-1344 303044 |
www.zyxel.co.uk |
ZyXEL Communications UK |
|
|
|
08707 555779 (UK only) |
|
Ltd.,11 The Courtyard, |
|
UNITED KINGDOM |
|
|
|
Eastern Road, Bracknell, |
|
|
sales@zyxel.co.uk |
+44-1344 303034 |
ftp.zyxel.co.uk |
Berkshire, RG12 2XB, |
|
|
|
|
|
United Kingdom (UK) |
A. “+” is the (prefix) number you enter to make an international telephone call.
Customer Support |
8 |
P-660HW-D Series User’s Guide
9 |
Customer Support |
P-660HW-D Series User’s Guide
Copyright |
.................................................................................................................. |
2 |
Federal Communications Commission (FCC) Interference Statement ............... |
3 |
|
Safety Warnings ....................................................................................................... |
5 |
|
ZyXEL Limited Warranty.......................................................................................... |
6 |
|
Customer Support.................................................................................................... |
7 |
|
Table of Contents ................................................................................................... |
10 |
|
List of Figures ........................................................................................................ |
20 |
|
List of Tables .......................................................................................................... |
26 |
|
Preface .................................................................................................................... |
|
30 |
Chapter 1 |
|
|
Getting To Know Your P-660HW-D ....................................................................... |
32 |
|
1.1 |
Introducing the P-660HW-D ............................................................................... |
32 |
1.2 |
Features ............................................................................................................. |
33 |
|
1.2.1 Wireless Features ..................................................................................... |
35 |
1.3 |
Applications for the ZyXEL device ..................................................................... |
36 |
|
1.3.1 Protected Internet Access ......................................................................... |
36 |
|
1.3.2 LAN to LAN Application ............................................................................ |
36 |
1.4 |
Front Panel LEDs ............................................................................................... |
37 |
1.5 |
Hardware Connection ........................................................................................ |
38 |
Chapter 2 |
|
|
Introducing the Web Configurator........................................................................ |
40 |
|
2.1 |
Web Configurator Overview ............................................................................... |
40 |
2.2 |
Accessing the Web Configurator ........................................................................ |
40 |
2.3 |
Resetting the ZyXEL device ............................................................................... |
42 |
|
2.3.1 Using the Reset Button ............................................................................. |
42 |
2.4 |
Navigating the Web Configurator ....................................................................... |
42 |
|
2.4.1 Navigation Panel ....................................................................................... |
42 |
|
2.4.2 Status Screen ........................................................................................... |
45 |
|
2.4.3 Status: Any IP Table .................................................................................. |
48 |
|
2.4.4 Status: WLAN Status ................................................................................ |
48 |
|
2.4.5 Status: Bandwidth Status .......................................................................... |
49 |
Table of Contents |
10 |
P-660HW-D Series User’s Guide
|
2.4.6 Status: Packet Statistics ............................................................................ |
50 |
|
2.4.7 Changing Login Password ....................................................................... |
51 |
Chapter 3 |
|
|
Wizard Setup for Internet Access......................................................................... |
54 |
|
3.1 |
Introduction ........................................................................................................ |
54 |
3.2 |
Internet Access Wizard Setup ............................................................................ |
54 |
|
3.2.1 Automatic Detection .................................................................................. |
56 |
|
3.2.2 Manual Configuration ................................................................................ |
56 |
3.3 |
Wireless Connection Wizard Setup .................................................................... |
61 |
|
3.3.1 Manually assign a WPA-PSK key ............................................................. |
64 |
|
3.3.2 Manually assign a WEP key ..................................................................... |
65 |
Chapter 4 |
|
|
Bandwidth Management Wizard ........................................................................... |
68 |
|
4.1 |
Introduction ........................................................................................................ |
68 |
4.2 |
Predefined Media Bandwidth Management Services ........................................ |
68 |
4.3 |
Bandwidth Management Wizard Setup .............................................................. |
69 |
Chapter 5 |
|
|
WAN Setup.............................................................................................................. |
74 |
|
5.1 |
WAN Overview .................................................................................................. |
74 |
|
5.1.1 Encapsulation ........................................................................................... |
74 |
|
5.1.1.1 ENET ENCAP ................................................................................. |
74 |
|
5.1.1.2 PPP over Ethernet .......................................................................... |
74 |
|
5.1.1.3 PPPoA ............................................................................................. |
75 |
|
5.1.1.4 RFC 1483 ........................................................................................ |
75 |
|
5.1.2 Multiplexing ............................................................................................... |
75 |
|
5.1.2.1 VC-based Multiplexing .................................................................... |
75 |
|
5.1.2.2 LLC-based Multiplexing ................................................................... |
75 |
|
5.1.3 Encapsulation and Multiplexing Scenarios ............................................... |
75 |
|
5.1.3.1 Scenario 1: One VC, Multiple Protocols .......................................... |
76 |
|
5.1.3.2 Scenario 2: One VC, One Protocol (IP) .......................................... |
76 |
|
5.1.3.3 Scenario 3: Multiple VCs ................................................................. |
76 |
|
5.1.4 VPI and VCI .............................................................................................. |
76 |
|
5.1.5 IP Address Assignment ............................................................................ |
76 |
|
5.1.5.1 IP Assignment with PPPoA or PPPoE Encapsulation ..................... |
76 |
|
5.1.5.2 IP Assignment with RFC 1483 Encapsulation ................................. |
76 |
|
5.1.5.3 IP Assignment with ENET ENCAP Encapsulation .......................... |
77 |
|
5.1.6 Nailed-Up Connection (PPP) .................................................................... |
77 |
|
5.1.7 NAT ........................................................................................................... |
77 |
5.2 |
Metric ................................................................................................................ |
77 |
5.3 |
Traffic Shaping ................................................................................................... |
78 |
11 |
Table of Contents |
|
P-660HW-D Series User’s Guide |
|
|
5.3.1 ATM Traffic Classes .................................................................................. |
79 |
|
5.3.1.1 Constant Bit Rate (CBR) ................................................................. |
79 |
|
5.3.1.2 Variable Bit Rate (VBR) ................................................................... |
79 |
|
5.3.1.3 Unspecified Bit Rate (UBR) ............................................................. |
79 |
5.4 |
Zero Configuration Internet Access .................................................................... |
79 |
5.5 |
Internet Connection ........................................................................................... |
80 |
|
5.5.1 Configuring Advanced Internet Connection Setup .................................... |
82 |
5.6 |
Configuring More Connections ........................................................................... |
83 |
|
5.6.1 More Connections Edit ............................................................................ |
84 |
|
5.6.2 Configuring More Connections Advanced Setup ..................................... |
87 |
5.7 |
Traffic Redirect .................................................................................................. |
88 |
5.8 |
Configuring WAN Backup .................................................................................. |
89 |
Chapter 6 |
|
|
LAN Setup............................................................................................................... |
92 |
|
6.1 |
LAN Overview ................................................................................................... |
92 |
|
6.1.1 LANs, WANs and the ZyXEL device ......................................................... |
92 |
|
6.1.2 DHCP Setup ............................................................................................. |
93 |
|
6.1.2.1 IP Pool Setup .................................................................................. |
93 |
|
6.1.3 DNS Server Address ................................................................................ |
93 |
|
6.1.4 DNS Server Address Assignment ............................................................. |
94 |
6.2 |
LAN TCP/IP ........................................................................................................ |
94 |
|
6.2.1 IP Address and Subnet Mask ................................................................... |
94 |
|
6.2.1.1 Private IP Addresses ....................................................................... |
95 |
|
6.2.2 RIP Setup ................................................................................................. |
95 |
|
6.2.3 Multicast .................................................................................................... |
96 |
|
6.2.4 Any IP ....................................................................................................... |
96 |
|
6.2.4.1 How Any IP Works .......................................................................... |
97 |
6.3 |
Configuring LAN IP ............................................................................................ |
98 |
|
6.3.1 Configuring Advanced LAN Setup ............................................................ |
98 |
6.4 DHCP Setup ..................................................................................................... |
100 |
|
6.5 |
LAN Client List ................................................................................................. |
101 |
6.6 |
LAN IP Alias ..................................................................................................... |
102 |
Chapter 7 |
|
|
Wireless LAN ........................................................................................................ |
106 |
|
7.1 |
Wireless Network Overview ............................................................................. |
106 |
7.2 |
Wireless Security Overview ............................................................................. |
107 |
|
7.2.1 SSID ....................................................................................................... |
107 |
|
7.2.2 MAC Address Filter ................................................................................. |
107 |
|
7.2.3 User Authentication ................................................................................ |
108 |
|
7.2.4 Encryption ............................................................................................... |
108 |
|
7.2.5 One-Touch Intelligent Security Technology (OTIST) ............................... |
109 |
Table of Contents |
12 |
P-660HW-D Series User’s Guide
7.3 |
Wireless Performance Overview ...................................................................... |
109 |
|
7.3.1 Quality of Service (QoS) ......................................................................... |
109 |
7.4 |
General Wireless LAN Screen ........................................................................ |
110 |
|
7.4.1 No Security ............................................................................................. |
111 |
|
7.4.2 WEP Encryption ...................................................................................... |
112 |
|
7.4.3 WPA-PSK/WPA2-PSK ............................................................................ |
113 |
|
7.4.4 WPA/WPA2 ............................................................................................. |
114 |
|
7.4.5 Wireless LAN Advanced Setup ............................................................... |
116 |
7.5 |
OTIST .............................................................................................................. |
118 |
|
7.5.1 Enabling OTIST ...................................................................................... |
118 |
|
7.5.1.1 AP ................................................................................................. |
118 |
|
7.5.1.2 Wireless Client .............................................................................. |
120 |
|
7.5.2 Starting OTIST ........................................................................................ |
120 |
|
7.5.3 Notes on OTIST ...................................................................................... |
121 |
7.6 |
MAC Filter ................................................................................................... |
122 |
7.7 WMM QoS ........................................................................................................ |
123 |
|
|
7.7.1 WMM QoS Example ............................................................................... |
123 |
|
7.7.2 WMM QoS Priorities ............................................................................... |
124 |
|
7.7.3 Services .................................................................................................. |
124 |
7.8 |
QoS Screen ...................................................................................................... |
126 |
|
7.8.1 ToS (Type of Service) and WMM QoS .................................................... |
126 |
|
7.8.2 Application Priority Configuration ............................................................ |
128 |
Chapter 8 |
|
|
Network Address Translation (NAT) Screens .................................................... |
130 |
|
8.1 |
NAT Overview ................................................................................................. |
130 |
|
8.1.1 NAT Definitions ....................................................................................... |
130 |
|
8.1.2 What NAT Does ...................................................................................... |
131 |
|
8.1.3 How NAT Works ..................................................................................... |
131 |
|
8.1.4 NAT Application ...................................................................................... |
132 |
|
8.1.5 NAT Mapping Types ............................................................................... |
132 |
8.2 |
SUA (Single User Account) Versus NAT .......................................................... |
133 |
8.3 |
NAT General Setup ......................................................................................... |
133 |
8.4 |
Port Forwarding ................................................................................................ |
134 |
|
8.4.1 Default Server IP Address ...................................................................... |
135 |
|
8.4.2 Port Forwarding: Services and Port Numbers ........................................ |
135 |
|
8.4.3 Configuring Servers Behind Port Forwarding (Example) ........................ |
135 |
8.5 |
Configuring Port Forwarding ........................................................................... |
136 |
|
8.5.1 Port Forwarding Rule Edit ...................................................................... |
137 |
8.6 |
Address Mapping ............................................................................................ |
138 |
|
8.6.1 Address Mapping Rule Edit ................................................................... |
140 |
13 |
Table of Contents |
P-660HW-D Series User’s Guide |
|
Chapter 9 |
|
Firewalls................................................................................................................ |
142 |
9.1 Firewall Overview ............................................................................................ |
142 |
9.2 Types of Firewalls ............................................................................................ |
142 |
9.2.1 Packet Filtering Firewalls ........................................................................ |
142 |
9.2.2 Application-level Firewalls ...................................................................... |
143 |
9.2.3 Stateful Inspection Firewalls .................................................................. |
143 |
9.3 Introduction to ZyXEL’s Firewall ....................................................................... |
143 |
9.3.1 Denial of Service Attacks ........................................................................ |
144 |
9.4 Denial of Service .............................................................................................. |
144 |
9.4.1 Basics ..................................................................................................... |
144 |
9.4.2 Types of DoS Attacks ............................................................................. |
145 |
9.4.2.1 ICMP Vulnerability ........................................................................ |
147 |
9.4.2.2 Illegal Commands (NetBIOS and SMTP) ...................................... |
147 |
9.4.2.3 Traceroute ..................................................................................... |
148 |
9.5 Stateful Inspection ............................................................................................ |
148 |
9.5.1 Stateful Inspection Process .................................................................... |
149 |
9.5.2 Stateful Inspection and the ZyXEL device .............................................. |
149 |
9.5.3 TCP Security ........................................................................................... |
150 |
9.5.4 UDP/ICMP Security ................................................................................ |
150 |
9.5.5 Upper Layer Protocols ............................................................................ |
151 |
9.6 Guidelines for Enhancing Security with Your Firewall ...................................... |
151 |
9.6.1 Security In General ................................................................................. |
151 |
9.7 Packet Filtering Vs Firewall .............................................................................. |
152 |
9.7.1 Packet Filtering: ...................................................................................... |
152 |
9.7.1.1 When To Use Filtering ................................................................... |
153 |
9.7.2 Firewall ................................................................................................... |
153 |
9.7.2.1 When To Use The Firewall ............................................................ |
153 |
Chapter 10 |
|
Firewall Configuration ......................................................................................... |
154 |
10.1 Access Methods ............................................................................................. |
154 |
10.2 Firewall Policies Overview ............................................................................ |
154 |
10.3 Rule Logic Overview ..................................................................................... |
155 |
10.3.1 Rule Checklist ....................................................................................... |
155 |
10.3.2 Security Ramifications .......................................................................... |
155 |
10.3.3 Key Fields For Configuring Rules ......................................................... |
156 |
10.3.3.1 Action .......................................................................................... |
156 |
10.3.3.2 Service ........................................................................................ |
156 |
10.3.3.3 Source Address ........................................................................... |
156 |
10.3.3.4 Destination Address .................................................................... |
156 |
10.4 Connection Direction ...................................................................................... |
156 |
10.4.1 LAN to WAN Rules ............................................................................... |
157 |
Table of Contents |
14 |
P-660HW-D Series User’s Guide
10.4.2 Alerts ..................................................................................................... |
157 |
|
10.5 |
General Firewall Policy ............................................................................... |
157 |
10.6 |
Firewall Rules Summary ............................................................................... |
158 |
10.6.1 Configuring Firewall Rules .................................................................. |
160 |
|
10.6.2 Customized Services ........................................................................... |
163 |
|
10.6.3 Configuring A Customized Service ..................................................... |
164 |
|
10.7 |
Example Firewall Rule ................................................................................... |
164 |
10.8 |
Predefined Services ....................................................................................... |
168 |
10.9 |
Anti-Probing .................................................................................................. |
170 |
10.10 DoS Thresholds .......................................................................................... |
171 |
|
10.10.1 Threshold Values ................................................................................ |
171 |
|
10.10.2 Half-Open Sessions ............................................................................ |
172 |
|
|
10.10.2.1 TCP Maximum Incomplete and Blocking Time ......................... |
172 |
10.10.3 Configuring Firewall Thresholds ......................................................... |
173 |
|
Chapter 11 |
|
|
Content Filtering .................................................................................................. |
176 |
|
11.1 Content Filtering Overview ............................................................................ |
176 |
|
11.2 Configuring Keyword Blocking ..................................................................... |
176 |
|
11.3 Configuring the Schedule ............................................................................. |
177 |
|
11.4 Configuring Trusted Computers ................................................................... |
178 |
|
Chapter 12 |
|
|
Static Route .......................................................................................................... |
180 |
|
12.1 |
Static Route ................................................................................................. |
180 |
12.2 |
Configuring Static Route ............................................................................... |
180 |
12.2.1 Static Route Edit ................................................................................. |
181 |
|
Chapter 13 |
|
|
Bandwidth Management ...................................................................................... |
184 |
|
13.1 |
Bandwidth Management Overview ............................................................... |
184 |
13.2 |
Application-based Bandwidth Management ................................................... |
184 |
13.3 |
Subnet-based Bandwidth Management ......................................................... |
184 |
13.4 |
Application and Subnet-based Bandwidth Management ............................... |
185 |
13.5 |
Scheduler ....................................................................................................... |
185 |
13.5.1 Priority-based Scheduler ...................................................................... |
186 |
|
13.5.2 Fairness-based Scheduler .................................................................... |
186 |
|
13.6 |
Maximize Bandwidth Usage ........................................................................... |
186 |
13.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................ |
186 |
|
13.6.2 Maximize Bandwidth Usage Example .................................................. |
187 |
13.6.2.1Priority-based Allotment of Unused and Unbudgeted Bandwidth 187
13.6.2.2Fairness-based Allotment of Unused and Unbudgeted Bandwidth ...
188
15 |
Table of Contents |
|
P-660HW-D Series User’s Guide |
|
13.6.3 Bandwidth Management Priorities ........................................................ |
188 |
|
13.7 |
Over Allotment of Bandwidth .......................................................................... |
189 |
13.8 |
Configuring Summary ................................................................................... |
189 |
13.9 |
Bandwidth Management Rule Setup ............................................................ |
190 |
13.9.1 Rule Configuration ................................................................................ |
192 |
|
13.10 Bandwidth Monitor ..................................................................................... |
194 |
|
Chapter 14 |
|
|
Dynamic DNS Setup............................................................................................. |
196 |
|
14.1 |
Dynamic DNS Overview ............................................................................... |
196 |
14.1.1 DYNDNS Wildcard ................................................................................ |
196 |
|
14.2 |
Configuring Dynamic DNS ............................................................................ |
196 |
Chapter 15 |
|
|
Remote Management Configuration .................................................................. |
200 |
|
15.1 |
Remote Management Overview .................................................................... |
200 |
15.1.1 Remote Management Limitations ......................................................... |
200 |
|
15.1.2 Remote Management and NAT ............................................................ |
201 |
|
15.1.3 System Timeout ................................................................................... |
201 |
|
15.2 WWW ............................................................................................................. |
201 |
|
15.3 |
Telnet .............................................................................................................. |
202 |
15.4 |
Configuring Telnet .......................................................................................... |
202 |
15.5 |
Configuring FTP ............................................................................................ |
203 |
15.6 SNMP ............................................................................................................. |
204 |
|
15.6.1 Supported MIBs .................................................................................... |
205 |
|
15.6.2 SNMP Traps ......................................................................................... |
206 |
|
15.6.3 Configuring SNMP ................................................................................ |
206 |
|
15.7 |
Configuring DNS .......................................................................................... |
207 |
15.8 |
Configuring ICMP ........................................................................................... |
208 |
Chapter 16 |
|
|
Universal Plug-and-Play (UPnP) ......................................................................... |
210 |
|
16.1 |
Introducing Universal Plug and Play ............................................................. |
210 |
16.1.1 How do I know if I'm using UPnP? ........................................................ |
210 |
|
16.1.2 NAT Traversal ....................................................................................... |
210 |
|
16.1.3 Cautions with UPnP .............................................................................. |
211 |
|
16.2 UPnP and ZyXEL ........................................................................................... |
211 |
|
16.2.1 Configuring UPnP ................................................................................ |
211 |
|
16.3 |
Installing UPnP in Windows Example ............................................................ |
212 |
16.3.1 Installing UPnP in Windows Me ............................................................ |
212 |
|
16.3.2 Installing UPnP in Windows XP ............................................................ |
214 |
|
16.4 |
Using UPnP in Windows XP Example ........................................................... |
215 |
16.4.1 Auto-discover Your UPnP-enabled Network Device ............................. |
215 |
Table of Contents |
16 |
P-660HW-D Series User’s Guide
16.4.2 Web Configurator Easy Access ............................................................ |
218 |
|
Chapter 17 |
|
|
System .................................................................................................................. |
|
222 |
17.1 |
General Setup ................................................................................................ |
222 |
17.1.1 General Setup and System Name ........................................................ |
222 |
|
17.1.2 General Setup ...................................................................................... |
222 |
|
17.2 |
Time Setting .................................................................................................. |
224 |
Chapter 18 |
|
|
Logs ...................................................................................................................... |
|
228 |
18.1 |
Logs Overview .............................................................................................. |
228 |
18.1.1 Alerts and Logs ..................................................................................... |
228 |
|
18.2 |
Viewing the Logs ............................................................................................ |
228 |
18.3 |
Configuring Log Settings ............................................................................... |
229 |
18.3.1 Example E-mail Log .............................................................................. |
232 |
|
Chapter 19 |
|
|
Tools...................................................................................................................... |
|
234 |
19.1 |
Firmware Upgrade ........................................................................................ |
234 |
19.2 |
Configuration Screen ..................................................................................... |
236 |
19.2.1 Backup Configuration ........................................................................... |
236 |
|
19.2.2 Restore Configuration ........................................................................... |
237 |
|
19.2.3 Back to Factory Defaults ....................................................................... |
238 |
|
19.3 |
Restart ............................................................................................................ |
238 |
Chapter 20 |
|
|
Diagnostic |
............................................................................................................ |
240 |
20.1 |
General Diagnostic ........................................................................................ |
240 |
20.2 |
DSL Line Diagnostic ..................................................................................... |
241 |
Chapter 21 |
|
|
Troubleshooting ................................................................................................... |
242 |
|
21.1 |
Problems Starting Up the ZyXEL device ........................................................ |
242 |
21.2 |
Problems with the LAN ................................................................................... |
242 |
21.3 |
Problems with the WAN ................................................................................. |
243 |
21.4 |
Problems Accessing the ZyXEL device ......................................................... |
244 |
Appendix A |
|
|
Product Specifications ....................................................................................... |
246 |
|
Appendix B |
|
|
About ADSL .......................................................................................................... |
250 |
17 |
Table of Contents |
|
P-660HW-D Series User’s Guide |
Introduction to DSL ................................................................................................ |
250 |
ADSL Overview...................................................................................................... |
250 |
Advantages of ADSL.............................................................................................. |
250 |
Appendix C |
|
Wall-mounting Instructions................................................................................. |
252 |
Appendix D |
|
Setting up Your Computer’s IP Address............................................................ |
254 |
Windows 95/98/Me................................................................................................. |
254 |
Windows 2000/NT/XP ............................................................................................ |
257 |
Macintosh OS 8/9................................................................................................... |
262 |
Macintosh OS X ..................................................................................................... |
264 |
Linux....................................................................................................................... |
265 |
21.4.1 Verifying Settings .................................................................................. |
269 |
Appendix E |
|
IP Subnetting ........................................................................................................ |
270 |
IP Addressing......................................................................................................... |
270 |
IP Classes .............................................................................................................. |
270 |
Subnet Masks ........................................................................................................ |
271 |
Subnetting .............................................................................................................. |
271 |
Example: Two Subnets .......................................................................................... |
272 |
Example: Four Subnets.......................................................................................... |
274 |
Example Eight Subnets.......................................................................................... |
275 |
Subnetting With Class A and Class B Networks. ................................................... |
276 |
Appendix F |
|
Command Interpreter........................................................................................... |
278 |
Accessing the CLI .................................................................................................. |
278 |
Command Syntax................................................................................................... |
278 |
Command Usage ................................................................................................... |
278 |
Appendix G |
|
Firewall Commands ............................................................................................. |
280 |
Appendix H |
|
NetBIOS Filter Commands .................................................................................. |
286 |
Introduction ............................................................................................................ |
286 |
Display NetBIOS Filter Settings ............................................................................. |
286 |
NetBIOS Filter Configuration.................................................................................. |
287 |
Appendix I |
|
Table of Contents |
18 |
P-660HW-D Series User’s Guide
PPPoE ................................................................................................................... |
288 |
PPPoE in Action..................................................................................................... |
288 |
Benefits of PPPoE.................................................................................................. |
288 |
Traditional Dial-up Scenario ................................................................................... |
288 |
How PPPoE Works ................................................................................................ |
289 |
ZyXEL device as a PPPoE Client .......................................................................... |
289 |
Appendix J |
|
Splitters and Microfilters ..................................................................................... |
290 |
Connecting a POTS Splitter ................................................................................... |
290 |
Telephone Microfilters ............................................................................................ |
290 |
ZyXEL device With ISDN ....................................................................................... |
292 |
Appendix K |
|
Log Descriptions.................................................................................................. |
294 |
Log Commands...................................................................................................... |
308 |
Log Command Example......................................................................................... |
309 |
Appendix L |
|
Wireless LANs ...................................................................................................... |
310 |
Wireless LAN Topologies ....................................................................................... |
310 |
Channel.................................................................................................................. |
312 |
RTS/CTS................................................................................................................ |
312 |
Fragmentation Threshold ....................................................................................... |
313 |
Preamble Type ....................................................................................................... |
314 |
IEEE 802.11g Wireless LAN .................................................................................. |
314 |
Wireless Security Overview ................................................................................... |
315 |
IEEE 802.1x ........................................................................................................... |
315 |
RADIUS.................................................................................................................. |
316 |
Types of Authentication.......................................................................................... |
317 |
Dynamic WEP Key Exchange................................................................................ |
318 |
WPA and WPA2 ..................................................................................................... |
319 |
21.4.2 WPA(2)-PSK Application Example ....................................................... |
321 |
Security Parameters Summary .............................................................................. |
322 |
Appendix M |
|
Pop-up Windows, JavaScripts and Java Permissions ..................................... |
324 |
Internet Explorer Pop-up Blockers ......................................................................... |
324 |
JavaScripts............................................................................................................. |
327 |
Index...................................................................................................................... |
332 |
19 |
Table of Contents |
P-660HW-D Series User’s Guide
Figure 1 Protected Internet Access Applications ................................................................ |
36 |
Figure 2 LAN-to-LAN Application Example ......................................................................... |
37 |
Figure 3 Front Panel ........................................................................................................... |
37 |
Figure 4 Password Screen .................................................................................................. |
41 |
Figure 5 Change Password at Login ................................................................................... |
41 |
Figure 6 Select a Mode ....................................................................................................... |
42 |
Figure 7 Web Configurator: Main Screen .......................................................................... |
43 |
Figure 8 Status Screen ........................................................................................................ |
46 |
Figure 9 Status: Any IP Table .............................................................................................. |
48 |
Figure 10 Status: WLAN Status ........................................................................................... |
49 |
Figure 11 Status: Bandwidth Status ..................................................................................... |
49 |
Figure 12 Status: Packet Statistics ...................................................................................... |
50 |
Figure 13 System General .................................................................................................. |
52 |
Figure 14 Select a Mode ..................................................................................................... |
54 |
Figure 15 Wizard: Welcome ................................................................................................ |
55 |
Figure 16 Auto Detection: No DSL Connection ................................................................... |
55 |
Figure 17 Auto Detection: Failed ......................................................................................... |
56 |
Figure 18 Auto-Detection: PPPoE ....................................................................................... |
56 |
Figure 19 Internet Access Wizard Setup: ISP Parameters ................................................. |
57 |
Figure 20 Internet Connection with PPPoE ......................................................................... |
58 |
Figure 21 Internet Connection with RFC 1483 ................................................................... |
58 |
Figure 22 Internet Connection with ENET ENCAP ............................................................. |
59 |
Figure 23 Internet Connection with PPPoA ......................................................................... |
60 |
Figure 24 Connection Test Failed-1 .................................................................................... |
61 |
Figure 25 Connection Test Failed-2. ................................................................................... |
61 |
Figure 26 Connection Test Successful ................................................................................ |
62 |
Figure 27 Wireless LAN Setup Wizard 1 ............................................................................. |
62 |
Figure 28 Wireless LAN Setup Wizard 2 ............................................................................. |
63 |
Figure 29 Manually assign a WPA key ................................................................................ |
65 |
Figure 30 Manually assign a WEP key ............................................................................... |
65 |
Figure 31 Wireless LAN Setup 3 ......................................................................................... |
66 |
Figure 32 Internet Access and WLAN Wizard Setup Complete .......................................... |
67 |
Figure 33 Select a Mode ..................................................................................................... |
69 |
Figure 34 Wizard: Welcome ................................................................................................ |
70 |
Figure 35 Bandwidth Management Wizard: General Information ....................................... |
70 |
Figure 36 Bandwidth Management Wizard: Configuration .................................................. |
71 |
Figure 37 Bandwidth Management Wizard: Complete ........................................................ |
72 |
Figure 38 Example of Traffic Shaping ................................................................................. |
78 |
List of Figures |
20 |
P-660HW-D Series User’s Guide
Figure 39 Internet Connection (PPPoE) .............................................................................. |
80 |
Figure 40 Advanced Internet Connection Setup ................................................................. |
82 |
Figure 41 More Connections ............................................................................................... |
84 |
Figure 42 More Connections Edit ........................................................................................ |
85 |
Figure 43 More Connections Advanced Setup ................................................................... |
87 |
Figure 44 Traffic Redirect Example ..................................................................................... |
88 |
Figure 45 Traffic Redirect LAN Setup ................................................................................. |
89 |
Figure 46 WAN Backup Setup ............................................................................................ |
89 |
Figure 47 LAN and WAN IP Addresses .............................................................................. |
92 |
Figure 48 Any IP Example .................................................................................................. |
97 |
Figure 49 LAN IP ................................................................................................................. |
98 |
Figure 50 Advanced LAN Setup .......................................................................................... |
99 |
Figure 51 DHCP Setup ....................................................................................................... |
100 |
Figure 52 LAN Client List .................................................................................................... |
101 |
Figure 53 Physical Network & Partitioned Logical Networks .............................................. |
103 |
Figure 54 LAN IP Alias ........................................................................................................ |
103 |
Figure 55 Example of a Wireless Network .......................................................................... |
106 |
Figure 56 Wireless LAN: General ...................................................................................... |
110 |
Figure 57 Wireless: No Security .......................................................................................... |
111 |
Figure 58 Wireless: Static WEP Encryption ........................................................................ |
112 |
Figure 59 Wireless: WPA-PSK/WPA2-PSK ......................................................................... |
113 |
Figure 60 Wireless: WPA/WPA2 ......................................................................................... |
115 |
Figure 61 Advanced ............................................................................................................ |
117 |
Figure 62 OTIST ................................................................................................................. |
119 |
Figure 63 Example Wireless Client OTIST Screen ............................................................. |
120 |
Figure 64 Security Key ........................................................................................................ |
120 |
Figure 65 OTIST in Progress (AP) ...................................................................................... |
120 |
Figure 66 OTIST in Progress (Client) .................................................................................. |
120 |
Figure 67 No AP with OTIST Found ................................................................................... |
121 |
Figure 68 Start OTIST? ....................................................................................................... |
121 |
Figure 69 MAC Address Filter ............................................................................................. |
122 |
Figure 70 Wireless LAN: QoS ............................................................................................. |
127 |
Figure 71 Application Priority Configuration ........................................................................ |
128 |
Figure 72 How NAT Works .................................................................................................. |
131 |
Figure 73 NAT Application With IP Alias ............................................................................. |
132 |
Figure 74 NAT General ....................................................................................................... |
134 |
Figure 75 Multiple Servers Behind NAT Example ............................................................... |
136 |
Figure 76 NAT Port Forwarding .......................................................................................... |
136 |
Figure 77 Port Forwarding Rule Setup .............................................................................. |
137 |
Figure 78 Address Mapping Rules ...................................................................................... |
139 |
Figure 79 Edit Address Mapping Rule .............................................................................. |
140 |
Figure 80 Firewall Application ............................................................................................. |
144 |
Figure 81 Three-Way Handshake ....................................................................................... |
145 |
21 |
List of Figures |
P-660HW-D Series User’s Guide |
|
Figure 82 SYN Flood ........................................................................................................... |
146 |
Figure 83 Smurf Attack ....................................................................................................... |
147 |
Figure 84 Stateful Inspection ............................................................................................... |
148 |
Figure 85 Firewall: General ................................................................................................. |
157 |
Figure 86 Firewall Rules .................................................................................................... |
159 |
Figure 87 Firewall: Edit Rule ............................................................................................... |
161 |
Figure 88 Firewall: Customized Services ............................................................................ |
163 |
Figure 89 Firewall: Configure Customized Services ........................................................... |
164 |
Figure 90 Firewall Example: Rules ..................................................................................... |
165 |
Figure 91 Edit Custom Port Example .................................................................................. |
165 |
Figure 92 Firewall Example: Edit Rule: Destination Address ............................................. |
166 |
Figure 93 Firewall Example: Edit Rule: Select Customized Services ................................. |
167 |
Figure 94 Firewall Example: Rules: MyService .................................................................. |
168 |
Figure 95 Firewall: Anti Probing .......................................................................................... |
170 |
Figure 96 Firewall: Threshold .............................................................................................. |
173 |
Figure 97 Content Filter: Keyword ...................................................................................... |
176 |
Figure 98 Content Filter: Schedule ..................................................................................... |
177 |
Figure 99 Content Filter: Trusted ........................................................................................ |
178 |
Figure 100 Example of Static Routing Topology ................................................................. |
180 |
Figure 101 Static Route ....................................................................................................... |
181 |
Figure 102 Static Route Edit ............................................................................................... |
182 |
Figure 103 Subnet-based Bandwidth Management Example ............................................. |
185 |
Figure 104 Bandwidth Management: Summary .................................................................. |
189 |
Figure 105 Bandwidth Management: Rule Setup ............................................................... |
191 |
Figure 106 Bandwidth Management Rule Configuration .................................................... |
192 |
Figure 107 Bandwidth Management: Monitor .................................................................... |
195 |
Figure 108 Dynamic DNS ................................................................................................... |
197 |
Figure 109 Remote Management: WWW ........................................................................... |
201 |
Figure 110 Telnet Configuration on a TCP/IP Network ....................................................... |
202 |
Figure 111 Remote Management: Telnet ............................................................................ |
203 |
Figure 112 Remote Management: FTP ............................................................................... |
204 |
Figure 113 SNMP Management Model ............................................................................... |
205 |
Figure 114 Remote Management: SNMP ........................................................................... |
206 |
Figure 115 Remote Management: DNS .............................................................................. |
208 |
Figure 116 Remote Management: ICMP ............................................................................. |
209 |
Figure 117 Configuring UPnP ............................................................................................. |
211 |
Figure 118 Add/Remove Programs: Windows Setup: Communication ............................... |
213 |
Figure 119 Add/Remove Programs: Windows Setup: Communication: Components ......... |
213 |
Figure 120 Network Connections ........................................................................................ |
214 |
Figure 121 Windows Optional Networking Components Wizard ........................................ |
214 |
Figure 122 Networking Services ......................................................................................... |
215 |
Figure 123 Network Connections ........................................................................................ |
216 |
Figure 124 Internet Connection Properties ........................................................................ |
216 |
List of Figures |
22 |
P-660HW-D Series User’s Guide
Figure 125 Internet Connection Properties: Advanced Settings ......................................... |
217 |
Figure 126 Internet Connection Properties: Advanced Settings: Add ................................. |
217 |
Figure 127 System Tray Icon .............................................................................................. |
217 |
Figure 128 Internet Connection Status ................................................................................ |
218 |
Figure 129 Network Connections ........................................................................................ |
219 |
Figure 130 Network Connections: My Network Places ....................................................... |
220 |
Figure 131 Network Connections: My Network Places: Properties: Example ..................... |
220 |
Figure 132 System General Setup ...................................................................................... |
223 |
Figure 133 System Time Setting ......................................................................................... |
224 |
Figure 134 View Log ........................................................................................................... |
229 |
Figure 135 Log Settings ...................................................................................................... |
230 |
Figure 136 E-mail Log Example .......................................................................................... |
232 |
Figure 137 Firmware Upgrade ............................................................................................ |
234 |
Figure 138 Firmware Upload In Progress ........................................................................... |
235 |
Figure 139 Network Temporarily Disconnected .................................................................. |
235 |
Figure 140 Error Message .................................................................................................. |
236 |
Figure 141 Configuration ..................................................................................................... |
236 |
Figure 142 Configuration Restore Successful ..................................................................... |
237 |
Figure 143 Temporarily Disconnected ................................................................................. |
237 |
Figure 144 Configuration Restore Error .............................................................................. |
238 |
Figure 145 Restart Screen .................................................................................................. |
238 |
Figure 146 Diagnostic: General .......................................................................................... |
240 |
Figure 147 Diagnostic: DSL Line ........................................................................................ |
241 |
Figure 148 Wall-mounting Example .................................................................................... |
252 |
Figure 149 WIndows 95/98/Me: Network: Configuration ..................................................... |
255 |
Figure 150 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... |
256 |
Figure 151 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ |
257 |
Figure 152 Windows XP: Start Menu .................................................................................. |
258 |
Figure 153 Windows XP: Control Panel .............................................................................. |
258 |
Figure 154 Windows XP: Control Panel: Network Connections: Properties ....................... |
259 |
Figure 155 Windows XP: Local Area Connection Properties .............................................. |
259 |
Figure 156 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... |
260 |
Figure 157 Windows XP: Advanced TCP/IP Properties ...................................................... |
261 |
Figure 158 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... |
262 |
Figure 159 Macintosh OS 8/9: Apple Menu ........................................................................ |
263 |
Figure 160 Macintosh OS 8/9: TCP/IP ................................................................................ |
263 |
Figure 161 Macintosh OS X: Apple Menu ........................................................................... |
264 |
Figure 162 Macintosh OS X: Network ................................................................................. |
265 |
Figure 163 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ |
266 |
Figure 164 Red Hat 9.0: KDE: Ethernet Device: General ................................................. |
266 |
Figure 165 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. |
267 |
Figure 166 Red Hat 9.0: KDE: Network Configuration: Activate ................................. |
267 |
Figure 167 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. |
268 |
23 |
List of Figures |
P-660HW-D Series User’s Guide |
|
Figure 168 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. |
268 |
Figure 169 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... |
268 |
Figure 170 Red Hat 9.0: Restart Ethernet Card ................................................................ |
269 |
Figure 171 Red Hat 9.0: Checking TCP/IP Properties ...................................................... |
269 |
Figure 172 Single-Computer per Router Hardware Configuration ...................................... |
289 |
Figure 173 ZyXEL device as a PPPoE Client ..................................................................... |
289 |
Figure 174 Connecting a POTS Splitter .............................................................................. |
290 |
Figure 175 Connecting a Microfilter .................................................................................... |
291 |
Figure 176 Connecting a Microfilter and Y-Connector ........................................................ |
291 |
Figure 177 ZyXEL device with ISDN ................................................................................... |
292 |
Figure 178 Displaying Log Categories Example ................................................................. |
308 |
Figure 179 Displaying Log Parameters Example ................................................................ |
308 |
Figure 180 Peer-to-Peer Communication in an Ad-hoc Network ........................................ |
310 |
Figure 181 Basic Service Set .............................................................................................. |
311 |
Figure 182 Infrastructure WLAN ......................................................................................... |
312 |
Figure 183 RTS/CTS .......................................................................................................... |
313 |
Figure 184 WPA(2) with RADIUS Application Example ...................................................... |
321 |
Figure 185 WPA(2)-PSK Authentication ............................................................................. |
322 |
Figure 186 Pop-up Blocker ................................................................................................. |
324 |
Figure 187 Internet Options ............................................................................................... |
325 |
Figure 188 Internet Options ................................................................................................ |
326 |
Figure 189 Pop-up Blocker Settings ................................................................................... |
327 |
Figure 190 Internet Options ................................................................................................ |
328 |
Figure 191 Security Settings - Java Scripting ..................................................................... |
329 |
Figure 192 Security Settings - Java .................................................................................... |
330 |
Figure 193 Java (Sun) ......................................................................................................... |
331 |
List of Figures |
24 |
P-660HW-D Series User’s Guide
25 |
List of Figures |
P-660HW-D Series User’s Guide
Table 1 ADSL Standards .................................................................................................... |
32 |
Table 2 Front Panel LEDs .................................................................................................. |
37 |
Table 3 Web Configurator Screens Summary .................................................................... |
43 |
Table 4 Status Screen ........................................................................................................ |
46 |
Table 5 Status: Any IP Table .............................................................................................. |
48 |
Table 6 Status: WLAN Status ............................................................................................. |
49 |
Table 7 Status: Packet Statistics ........................................................................................ |
50 |
Table 8 Internet Access Wizard Setup: ISP Parameters .................................................... |
57 |
Table 9 Internet Connection with PPPoE .......................................................................... |
58 |
Table 10 Internet Connection with RFC 1483 .................................................................... |
59 |
Table 11 Internet Connection with ENET ENCAP .............................................................. |
59 |
Table 12 Internet Connection with PPPoA ......................................................................... |
60 |
Table 13 Wireless LAN Setup Wizard 1 ............................................................................. |
63 |
Table 14 Wireless LAN Setup Wizard 2 ............................................................................. |
64 |
Table 15 Manually assign a WPA key ................................................................................ |
65 |
Table 16 Manually assign a WEP key ................................................................................ |
66 |
Table 17 Media Bandwidth Management Setup: Services ................................................. |
68 |
Table 18 Bandwidth Management Wizard: General Information ........................................ |
70 |
Table 19 Bandwidth Management Wizard: Configuration .................................................. |
71 |
Table 20 Internet Connection ............................................................................................. |
80 |
Table 21 Advanced Internet Connection Setup .................................................................. |
82 |
Table 22 More Connections ............................................................................................... |
84 |
Table 23 More Connections Edit ........................................................................................ |
85 |
Table 24 More Connections Advanced Setup .................................................................... |
87 |
Table 25 WAN Backup Setup ............................................................................................. |
90 |
Table 26 LAN IP ................................................................................................................. |
98 |
Table 27 Advanced LAN Setup .......................................................................................... |
99 |
Table 28 DHCP Setup ........................................................................................................ |
100 |
Table 29 LAN Client List ..................................................................................................... |
102 |
Table 30 LAN IP Alias ........................................................................................................ |
103 |
Table 31 Types of Encryption for Each Type of Authentication .......................................... |
108 |
Table 32 Wireless LAN: General ........................................................................................ |
110 |
Table 33 Wireless No Security ........................................................................................... |
111 |
Table 34 Wireless: Static WEP Encryption ......................................................................... |
112 |
Table 35 Wireless: WPA-PSK/WPA2-PSK ......................................................................... |
114 |
Table 36 Wireless: WPA/WPA2 .......................................................................................... |
115 |
Table 37 Wireless LAN: Advanced ..................................................................................... |
117 |
Table 38 OTIST .................................................................................................................. |
119 |
List of Tables |
26 |
P-660HW-D Series User’s Guide
Table 39 MAC Address Filter ............................................................................................. |
123 |
Table 40 WMM QoS Priorities ............................................................................................ |
124 |
Table 41 Commonly Used Services ................................................................................... |
124 |
Table 42 Wireless LAN: QoS .............................................................................................. |
127 |
Table 43 Application Priority Configuration ........................................................................ |
128 |
Table 44 NAT Definitions .................................................................................................... |
130 |
Table 45 NAT Mapping Types ............................................................................................ |
133 |
Table 46 NAT General ........................................................................................................ |
134 |
Table 47 Services and Port Numbers ................................................................................. |
135 |
Table 48 NAT Port Forwarding ........................................................................................... |
137 |
Table 49 Port Forwarding Rule Setup ................................................................................ |
138 |
Table 50 Address Mapping Rules ...................................................................................... |
139 |
Table 51 Edit Address Mapping Rule ................................................................................. |
140 |
Table 52 Common IP Ports ................................................................................................ |
145 |
Table 53 ICMP Commands That Trigger Alerts .................................................................. |
147 |
Table 54 Legal NetBIOS Commands ................................................................................. |
147 |
Table 55 Legal SMTP Commands .................................................................................... |
147 |
Table 56 Firewall: General ................................................................................................. |
158 |
Table 57 Firewall Rules ...................................................................................................... |
159 |
Table 58 Firewall: Edit Rule ................................................................................................ |
162 |
Table 59 Customized Services ........................................................................................... |
163 |
Table 60 Firewall: Configure Customized Services ............................................................ |
164 |
Table 61 Predefined Services ........................................................................................... |
168 |
Table 62 Firewall: Anti Probing ........................................................................................... |
171 |
Table 63 Firewall: Threshold .............................................................................................. |
173 |
Table 64 Content Filter: Keyword ....................................................................................... |
177 |
Table 65 Content Filter: Schedule ...................................................................................... |
178 |
Table 66 Content Filter: Trusted ......................................................................................... |
178 |
Table 67 Static Route ......................................................................................................... |
181 |
Table 68 Static Route Edit .................................................................................................. |
182 |
Table 69 Application and Subnet-based Bandwidth Management Example ...................... |
185 |
Table 70 Maximize Bandwidth Usage Example ................................................................. |
187 |
Table 71 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ......... |
187 |
Table 72 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ...... |
188 |
Table 73 Bandwidth Management Priorities ....................................................................... |
188 |
Table 74 Over Allotment of Bandwidth Example ................................................................ |
189 |
Table 75 Media Bandwidth Management: Summary .......................................................... |
190 |
Table 76 Bandwidth Management: Rule Setup .................................................................. |
191 |
Table 77 Bandwidth Management Rule Configuration ....................................................... |
192 |
Table 78 Services and Port Numbers ................................................................................. |
194 |
Table 79 Dynamic DNS ...................................................................................................... |
197 |
Table 80 Remote Management: WWW .............................................................................. |
202 |
Table 81 Remote Management: Telnet .............................................................................. |
203 |
27 |
List of Tables |
|
P-660HW-D Series User’s Guide |
Table 82 Remote Management: FTP ................................................................................. |
204 |
Table 83 SNMP Traps ........................................................................................................ |
206 |
Table 84 Remote Management: SNMP .............................................................................. |
207 |
Table 85 Remote Management: DNS ................................................................................ |
208 |
Table 86 Remote Management: ICMP ............................................................................... |
209 |
Table 87 Configuring UPnP ................................................................................................ |
212 |
Table 88 System General Setup ........................................................................................ |
223 |
Table 89 System Time Setting ............................................................................................ |
225 |
Table 90 View Log .............................................................................................................. |
229 |
Table 91 Log Settings ......................................................................................................... |
230 |
Table 92 Firmware Upgrade ............................................................................................... |
234 |
Table 93 Maintenance Restore Configuration .................................................................... |
237 |
Table 94 Diagnostic: General ............................................................................................. |
240 |
Table 95 Diagnostic: DSL Line ........................................................................................... |
241 |
Table 96 Troubleshooting Starting Up Your ZyXEL device ................................................. |
242 |
Table 97 Troubleshooting the LAN ..................................................................................... |
242 |
Table 98 Troubleshooting the WAN .................................................................................... |
243 |
Table 99 Troubleshooting Accessing the ZyXEL device .................................................... |
244 |
Table 100 Device ................................................................................................................ |
246 |
Table 101 Firmware ............................................................................................................ |
247 |
Table 102 Classes of IP Addresses ................................................................................... |
270 |
Table 103 Allowed IP Address Range By Class ................................................................. |
271 |
Table 104 “Natural” Masks ................................................................................................ |
271 |
Table 105 Alternative Subnet Mask Notation ..................................................................... |
272 |
Table 106 Two Subnets Example ....................................................................................... |
272 |
Table 107 Subnet 1 ............................................................................................................ |
273 |
Table 108 Subnet 2 ............................................................................................................ |
273 |
Table 109 Subnet 1 ............................................................................................................ |
274 |
Table 110 Subnet 2 ............................................................................................................ |
274 |
Table 111 Subnet 3 ............................................................................................................. |
274 |
Table 112 Subnet 4 ............................................................................................................ |
275 |
Table 113 Eight Subnets .................................................................................................... |
275 |
Table 114 Class C Subnet Planning ................................................................................... |
275 |
Table 115 Class B Subnet Planning ................................................................................... |
276 |
Table 116 Firewall Commands ........................................................................................... |
280 |
Table 117 NetBIOS Filter Default Settings ......................................................................... |
287 |
Table 118 System Maintenance Logs ................................................................................ |
294 |
Table 119 System Error Logs ............................................................................................. |
295 |
Table 120 Access Control Logs .......................................................................................... |
295 |
Table 121 TCP Reset Logs ................................................................................................ |
296 |
Table 122 Packet Filter Logs .............................................................................................. |
296 |
Table 123 ICMP Logs ......................................................................................................... |
297 |
Table 124 CDR Logs .......................................................................................................... |
297 |
List of Tables |
28 |
P-660HW-D Series User’s Guide
Table 125 PPP Logs ........................................................................................................... |
297 |
|
Table 126 UPnP Logs ........................................................................................................ |
298 |
|
Table 127 Content Filtering Logs ....................................................................................... |
298 |
|
Table 128 Attack Logs ........................................................................................................ |
299 |
|
Table 129 IPSec Logs ........................................................................................................ |
300 |
|
Table 130 IKE Logs ............................................................................................................ |
300 |
|
Table 131 PKI Logs ............................................................................................................ |
303 |
|
Table 132 Certificate Path Verification Failure Reason Codes ........................................... |
304 |
|
Table 133 802.1X Logs ...................................................................................................... |
305 |
|
Table 134 ACL Setting Notes ............................................................................................. |
306 |
|
Table 135 ICMP Notes ....................................................................................................... |
306 |
|
Table 136 Syslog Logs ....................................................................................................... |
307 |
|
Table 137 |
RFC-2408 ISAKMP Payload Types ................................................................... |
307 |
Table 138 IEEE 802.11g ..................................................................................................... |
314 |
|
Table 139 |
Wireless Security Levels ................................................................................... |
315 |
Table 140 |
Comparison of EAP Authentication Types ......................................................... |
318 |
Table 141 |
Wireless Security Relational Matrix ................................................................... |
322 |
29 |
List of Tables |