P-660H/HW/W-T Series
ADSL 2+ Gateway
User’s Guide
Version 3.40
6/2005
P-660H/HW/W-T Series User’ Guide
Copyright
Copyright © 2005 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Copyright 2
P-660H/HW/W-T Series User’ Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
3 Federal Communications Commission (FCC) Interference Statement
P-660H/HW/W-T Series User’ Guide
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
ZyXEL Communications Corporation declared that Prestige 660HW-T1 is limited in CH1~11
from 2400 to 2483.5 MHz by specified firmware controlled in USA.
Certifications
Go to www.zyxel.com
1 Select your product from the drop-down list box on the ZyXEL
home page to go to that product's page.
2 Select the certification you wish to view from this page.
Federal Communications Commission (FCC) Interference Statement 4
P-660H/HW/W-T Series User’ Guide
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger
telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them.
Do NOT allow anything to rest on the power cord and do NOT locate the product where
anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be
damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings
5 Safety Warnings
P-660H/HW/W-T Series User’ Guide
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not
apply if the product is modified, misused, tampered with, damaged by an act of God, or
subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind of character to the
purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
ZyXEL Limited Warranty 6
P-660H/HW/W-T Series User’ Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Customer Support
METHOD
LOCATION
CORPORATE
HEADQUARTERS
(WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
NORTH AMERICA
NORWAY
SPAIN
SWEDEN
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420 241 091 350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420 241 091 359
support@zyxel.dk +45 39 55 07 00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45 39 55 07 07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
i nf o @z y xe l .f r + 33 (0 ) 4 7 2 5 2 9 7 9 7 w ww .z y xe l . fr Z yX E L F r an c e
+33 (0)4 72 52 19 20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.com +1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47 22 80 61 80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47 22 80 61 81
support@zyxel.es +34 902 195 420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34 913 005 345
support@zyxel.se +46 31 744 7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46 31 744 7701
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp.
6 Innovation Road II
Sc ien ce P ar k
Hsinchu 300
Ta iw a n
Czech s.r.o.
Modranská 621
143 01 Praha 4 - Modrany
Ceská Republika
Col um bu sv ej 5
2860 Soeborg
Denmark
Mal mi nk aa ri 10
00700 Helsinki
Finland
1 ru e d e s V er ge r s
Ba t. 1 / C
69760 Limonest
France
Adenauerstr. 20/A2 D-52146
Wuerselen
Germany
1130 N. Miller St.
Anaheim
CA 92806-2001
U.S.A.
Ni ls H ans en s ve i 13
0667 Oslo
Norway
Alejandro Villegas 33
1º, 28043 Madrid
Spain
Sjöporten 4, 41764 Göteborg
Sweden
7 Customer Support
P-660H/HW/W-T Series User’ Guide
METHOD
LOCATION
UNITED KINGDOM
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.co.uk +44 (0) 1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44 (0) 1344 303034 ftp.zyxel.co.uk
A
WEB SITE
www.zyxel.co.uk ZyXEL Communications UK
a. “+” is the (prefix) number you enter to make an international telephone call.
REGULAR MAIL
Ltd.,11 The Courtyard,
Eastern Road, Bracknell,
Berkshire, RG12 2XB,
United Kingdom (UK)
Customer Support 8
P-660H/HW/W-T Series User’ Guide
9 Customer Support
P-660H/HW/W-T Series User’ Guide
Table of Contents
Copyright ..................................................................................................................2
Federal Communications Commission (FCC) Interference Statement ............... 3
Safety Warnings ....................................................................................................... 5
ZyXEL Limited Warranty.......................................................................................... 6
Customer Support.................................................................................................... 7
Table of Contents ................................................................................................... 10
List of Figures ........................................................................................................ 24
List of Tables ..........................................................................................................32
Preface ....................................................................................................................38
Introduction to DSL................................................................................................ 40
Chapter 1
Getting To Know Your Prestige............................................................................. 42
1.1 Introducing the Prestige .....................................................................................42
1.2 Features .............................................................................................................42
1.2.1 Wireless Features (P-660HW/P-660W) ....................................................45
1.3 Applications for the Prestige ..............................................................................46
1.3.1 Protected Internet Access .........................................................................46
1.3.2 LAN to LAN Application ............................................................................46
1.4 Front Panel LEDs ...............................................................................................46
1.5 Hardware Connection ........................................................................................47
Chapter 2
Introducing the Web Configurator........................................................................ 48
2.1 Web Configurator Overview ...............................................................................48
2.1.1 Accessing the Web Configurator ..............................................................48
2.1.2 Resetting the Prestige ..............................................................................49
2.1.2.1 Using the Reset Button ...................................................................49
2.1.3 Navigating the Web Configurator ..............................................................50
2.2 Change Login Password ...................................................................................52
Table of Contents 10
P-660H/HW/W-T Series User’ Guide
Chapter 3
Wizard Setup for Internet Access......................................................................... 54
3.1 Introduction ........................................................................................................54
3.1.1 Internet Access Wizard Setup ..................................................................54
Chapter 4
LAN Setup............................................................................................................... 62
4.1 LAN Overview ...................................................................................................62
4.1.1 LANs, WANs and the Prestige ..................................................................62
4.1.2 DHCP Setup .............................................................................................63
4.1.2.1 IP Pool Setup ..................................................................................63
4.1.3 DNS Server Address ................................................................................63
4.1.4 DNS Server Address Assignment .............................................................63
4.2 LAN TCP/IP ........................................................................................................64
4.2.1 IP Address and Subnet Mask ...................................................................64
4.2.1.1 Private IP Addresses .......................................................................65
4.2.2 RIP Setup .................................................................................................65
4.2.3 Multicast ....................................................................................................66
4.2.4 Any IP .......................................................................................................66
4.2.4.1 How Any IP Works ..........................................................................67
4.3 Configuring LAN ................................................................................................68
Chapter 5
Wireless LAN .......................................................................................................... 70
5.1 Wireless LAN Introduction .................................................................................70
5.2 Wireless Security Overview ...............................................................................70
5.2.1 Encryption .................................................................................................70
5.2.2 Authentication ...........................................................................................70
5.2.3 Restricted Access .....................................................................................71
5.2.4 Hide Prestige Identity ................................................................................71
5.3 The Main Wireless LAN Screen ........................................................................71
5.4 Configuring the Wireless Screen .......................................................................73
5.4.1 WEP Encryption ........................................................................................73
5.5 Configuring MAC Filters ..................................................................................75
5.6 Introduction to WPA .........................................................................................77
5.6.1 WPA-PSK Application Example ................................................................77
5.6.2 WPA with RADIUS Application Example ..................................................78
5.6.3 Wireless Client WPA Supplicants ............................................................79
5.7 Configuring IEEE 802.1x and WPA ...................................................................79
5.7.1 No Access Allowed or Authentication .......................................................80
5.7.2 Authentication Required: 802.1x ...............................................................80
5.7.3 Authentication Required: WPA .................................................................82
5.7.4 Authentication Required: WPA-PSK .........................................................84
11 Table of Contents
P-660H/HW/W-T Series User’ Guide
5.8 Configuring Local User Authentication ..............................................................85
5.9 Configuring RADIUS .........................................................................................87
Chapter 6
WAN Setup.............................................................................................................. 90
6.1 WAN Overview ..................................................................................................90
6.1.1 Encapsulation ...........................................................................................90
6.1.1.1 ENET ENCAP .................................................................................90
6.1.1.2 PPP over Ethernet ..........................................................................90
6.1.1.3 PPPoA .............................................................................................90
6.1.1.4 RFC 1483 ........................................................................................91
6.1.2 Multiplexing ...............................................................................................91
6.1.2.1 VC-based Multiplexing ....................................................................91
6.1.2.2 LLC-based Multiplexing ...................................................................91
6.1.3 VPI and VCI ..............................................................................................91
6.1.4 IP Address Assignment ............................................................................91
6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................91
6.1.4.2 IP Assignment with RFC 1483 Encapsulation .................................92
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ..........................92
6.1.5 Nailed-Up Connection (PPP) ....................................................................92
6.1.6 NAT ...........................................................................................................92
6.2 Metric ................................................................................................................92
6.3 PPPoE Encapsulation ........................................................................................93
6.4 Traffic Shaping ...................................................................................................93
6.5 Zero Configuration Internet Access ....................................................................94
6.6 The Main WAN Screen ......................................................................................95
6.7 Configuring WAN Setup ....................................................................................95
6.8 Traffic Redirect ..................................................................................................98
6.9 Configuring WAN Backup ..................................................................................99
Chapter 7
Network Address Translation (NAT) Screens .................................................... 102
7.1 NAT Overview .................................................................................................102
7.1.1 NAT Definitions .......................................................................................102
7.1.2 What NAT Does ......................................................................................103
7.1.3 How NAT Works .....................................................................................103
7.1.4 NAT Application ......................................................................................104
7.1.5 NAT Mapping Types ...............................................................................105
7.2 SUA (Single User Account) Versus NAT ..........................................................106
7.3 SUA Server ......................................................................................................106
7.3.1 Default Server IP Address ......................................................................106
7.3.2 Port Forwarding: Services and Port Numbers ........................................106
7.3.3 Configuring Servers Behind SUA (Example) ..........................................107
Table of Contents 12
P-660H/HW/W-T Series User’ Guide
7.4 Selecting the NAT Mode .................................................................................107
7.5 Configuring SUA Server Set ...........................................................................108
7.6 Configuring Address Mapping Rules ...............................................................110
7.7 Editing an Address Mapping Rule ................................................................... 111
Chapter 8
Dynamic DNS Setup............................................................................................. 114
8.1 Dynamic DNS Overview .................................................................................114
8.1.1 DYNDNS Wildcard ..................................................................................114
8.2 Configuring Dynamic DNS ..............................................................................114
Chapter 9
Time and Date....................................................................................................... 116
9.1 Configuring Time and Date .............................................................................116
Chapter 10
Firewalls................................................................................................................ 118
10.1 Firewall Overview .......................................................................................... 118
10.2 Types of Firewalls ..........................................................................................118
10.2.1 Packet Filtering Firewalls ......................................................................118
10.2.2 Application-level Firewalls ....................................................................119
10.2.3 Stateful Inspection Firewalls ................................................................ 119
10.3 Introduction to ZyXEL’s Firewall .....................................................................119
10.3.1 Denial of Service Attacks ......................................................................120
10.4 Denial of Service ............................................................................................120
10.4.1 Basics ...................................................................................................120
10.4.2 Types of DoS Attacks ...........................................................................121
10.4.2.1 ICMP Vulnerability ......................................................................123
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................123
10.4.2.3 Traceroute ...................................................................................124
10.5 Stateful Inspection ..........................................................................................124
10.5.1 Stateful Inspection Process ..................................................................125
10.5.2 Stateful Inspection and the Prestige .....................................................126
10.5.3 TCP Security .........................................................................................126
10.5.4 UDP/ICMP Security ..............................................................................127
10.5.5 Upper Layer Protocols ..........................................................................127
10.6 Guidelines for Enhancing Security with Your Firewall ....................................127
10.6.1 Security In General ...............................................................................128
10.7 Packet Filtering Vs Firewall ............................................................................129
10.7.1 Packet Filtering: ....................................................................................129
10.7.1.1 When To Use Filtering .................................................................129
10.7.2 Firewall .................................................................................................129
10.7.2.1 When To Use The Firewall ..........................................................129
13 Table of Contents
P-660H/HW/W-T Series User’ Guide
Chapter 11
Firewall Configuration ......................................................................................... 132
11.1 Access Methods .............................................................................................132
11.2 Firewall Policies Overview .............................................................................132
11.3 Rule Logic Overview .....................................................................................133
11.3.1 Rule Checklist .......................................................................................133
11.3.2 Security Ramifications ..........................................................................133
11.3.3 Key Fields For Configuring Rules .........................................................134
11.3.3.1 Action ...........................................................................................134
11.3.3.2 Service .........................................................................................134
11.3.3.3 Source Address ...........................................................................134
11.3.3.4 Destination Address ....................................................................134
11.4 Connection Direction ......................................................................................134
11.4.1 LAN to WAN Rules ................................................................................134
11.4.2 Alerts .....................................................................................................135
11.5 Configuring Default Firewall Policy ..............................................................135
11.6 Rule Summary ..............................................................................................136
11.6.1 Configuring Firewall Rules ..................................................................138
11.7 Customized Services .....................................................................................141
11.8 Configuring A Customized Service ...............................................................141
11.9 Example Firewall Rule ....................................................................................142
11.10 Predefined Services .....................................................................................146
11.11 Anti-Probing .................................................................................................148
11.12 DoS Thresholds ...........................................................................................149
11.12.1 Threshold Values ................................................................................150
11.12.2 Half-Open Sessions ............................................................................150
11.12.2.1 TCP Maximum Incomplete and Blocking Time ..........................150
11.12.3 Configuring Firewall Thresholds .........................................................151
Chapter 12
Content Filtering .................................................................................................. 154
12.1 Content Filtering Overview ............................................................................154
12.2 The Main Content Filter Screen .....................................................................154
12.3 Configuring Keyword Blocking .....................................................................155
12.4 Configuring the Schedule .............................................................................156
12.5 Configuring Trusted Computers ...................................................................156
Chapter 13
Remote Management Configuration .................................................................. 158
13.1 Remote Management Overview ....................................................................158
13.1.1 Remote Management Limitations .........................................................158
13.1.2 Remote Management and NAT ............................................................159
13.1.3 System Timeout ...................................................................................159
Table of Contents 14
P-660H/HW/W-T Series User’ Guide
13.2 Telnet ..............................................................................................................159
13.3 FTP ................................................................................................................160
13.4 Web ................................................................................................................160
13.5 Configuring Remote Management ................................................................160
Chapter 14
Universal Plug-and-Play (UPnP) ......................................................................... 162
14.1 Introducing Universal Plug and Play .............................................................162
14.1.1 How do I know if I'm using UPnP? ........................................................162
14.1.2 NAT Traversal .......................................................................................162
14.1.3 Cautions with UPnP ..............................................................................163
14.2 UPnP and ZyXEL ...........................................................................................163
14.2.1 Configuring UPnP ................................................................................163
14.3 Installing UPnP in Windows Example ............................................................164
14.4 Using UPnP in Windows XP Example ...........................................................168
Chapter 15
Logs Screens........................................................................................................ 176
15.1 Logs Overview ..............................................................................................176
15.1.1 Alerts and Logs .....................................................................................176
15.2 Configuring Log Settings ...............................................................................176
15.3 Displaying the Logs .......................................................................................178
15.4 SMTP Error Messages ...................................................................................179
15.4.1 Example E-mail Log ..............................................................................180
Chapter 16
Media Bandwidth Management Advanced Setup.............................................. 182
16.1 Media Bandwidth Management Overview .....................................................182
16.2 Bandwidth Classes and Filters .......................................................................182
16.3 Proportional Bandwidth Allocation .................................................................183
16.4 Bandwidth Management Usage Examples ....................................................183
16.4.1 Application-based Bandwidth Management Example ..........................183
16.4.2 Subnet-based Bandwidth Management Example .................................183
16.4.3 Application and Subnet-based Bandwidth Management Example .......184
16.5 Scheduler .......................................................................................................185
16.5.1 Priority-based Scheduler ......................................................................185
16.5.2 Fairness-based Scheduler ....................................................................185
16.6 Maximize Bandwidth Usage ...........................................................................185
16.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................185
16.6.2 Maximize Bandwidth Usage Example ..................................................186
16.7 Bandwidth Borrowing .....................................................................................187
16.7.1 Maximize Bandwidth Usage With Bandwidth Borrowing ......................187
16.8 The Main Media Bandwidth Management Screen ........................................188
15 Table of Contents
P-660H/HW/W-T Series User’ Guide
16.9 Configuring Summary ...................................................................................188
16.10 Configuring Class Setup ............................................................................190
16.10.1 Media Bandwidth Management Class Configuration ........................190
16.10.2 Media Bandwidth Management Statistics .........................................193
16.11 Bandwidth Monitor .....................................................................................194
Chapter 17
Maintenance ......................................................................................................... 196
17.1 Maintenance Overview ...................................................................................196
17.2 System Status Screen ...................................................................................196
17.2.1 System Statistics ...................................................................................198
17.3 DHCP Table Screen ......................................................................................200
17.4 Any IP Table Screen ......................................................................................201
17.5 Wireless Screen ............................................................................................201
17.5.1 Association List ....................................................................................201
17.6 Diagnostic Screens .......................................................................................202
17.6.1 General Diagnostic ..............................................................................202
17.6.2 DSL Line Diagnostic ...........................................................................203
17.7 Firmware Upgrade ........................................................................................205
Chapter 18
Introducing the SMT ............................................................................................208
18.1 SMT Introduction ............................................................................................208
18.1.1 Procedure for SMT Configuration via Telnet .........................................208
18.1.2 Entering Password ................................................................................208
18.1.3 Prestige SMT Menus Overview ............................................................209
18.2 Navigating the SMT Interface .........................................................................210
18.2.1 System Management Terminal Interface Summary ..............................211
18.3 Changing the System Password ....................................................................212
Chapter 19
Menu 1 General Setup ......................................................................................... 214
19.1 General Setup ................................................................................................214
19.2 Procedure To Configure Menu 1 ....................................................................214
19.2.1 Procedure to Configure Dynamic DNS .................................................215
Chapter 20
Menu 2 WAN Backup Setup ................................................................................ 218
20.1 Introduction to WAN Backup Setup ................................................................218
20.2 Configuring Dial Backup in Menu 2 ................................................................218
20.2.1 Traffic Redirect Setup ...........................................................................219
Table of Contents 16
P-660H/HW/W-T Series User’ Guide
Chapter 21
Menu 3 LAN Setup ...............................................................................................222
21.1 LAN Setup ......................................................................................................222
21.1.1 General Ethernet Setup ........................................................................222
21.2 Protocol Dependent Ethernet Setup ..............................................................223
21.3 TCP/IP Ethernet Setup and DHCP ................................................................223
Chapter 22
Wireless LAN Setup ............................................................................................. 226
22.1 Wireless LAN Overview .................................................................................226
22.2 Wireless LAN Setup .......................................................................................226
22.2.1 Wireless LAN MAC Address Filter ........................................................227
Chapter 23
Internet Access .................................................................................................... 230
23.1 Internet Access Overview ..............................................................................230
23.2 IP Policies ......................................................................................................230
23.3 IP Alias ...........................................................................................................230
23.4 IP Alias Setup .................................................................................................231
23.5 Route IP Setup ...............................................................................................232
23.6 Internet Access Configuration ........................................................................233
Chapter 24
Remote Node Configuration ............................................................................... 236
24.1 Remote Node Setup Overview .......................................................................236
24.2 Remote Node Setup .......................................................................................236
24.2.1 Remote Node Profile ............................................................................236
24.2.2 Encapsulation and Multiplexing Scenarios ...........................................237
24.2.2.1 Scenario 1: One VC, Multiple Protocols ......................................237
24.2.2.2 Scenario 2: One VC, One Protocol (IP) ......................................237
24.2.2.3 Scenario 3: Multiple VCs .............................................................237
24.2.3 Outgoing Authentication Protocol .........................................................239
24.3 Remote Node Network Layer Options ...........................................................240
24.3.1 My WAN Addr Sample IP Addresses ...................................................241
24.4 Remote Node Filter ........................................................................................242
24.5 Editing ATM Layer Options ............................................................................243
24.5.1 VC-based Multiplexing (non-PPP Encapsulation) ................................243
24.5.2 LLC-based Multiplexing or PPP Encapsulation ....................................243
24.5.3 Advance Setup Options ........................................................................244
Chapter 25
Static Route Setup ............................................................................................... 246
25.1 IP Static Route Overview ...............................................................................246
17 Table of Contents
P-660H/HW/W-T Series User’ Guide
25.2 Configuration ..................................................................................................246
Chapter 26
Bridging Setup ..................................................................................................... 250
26.1 Bridging in General ........................................................................................250
26.2 Bridge Ethernet Setup ....................................................................................250
26.2.1 Remote Node Bridging Setup ...............................................................250
26.2.2 Bridge Static Route Setup .....................................................................252
Chapter 27
Network Address Translation (NAT) ................................................................... 254
27.1 Using NAT ......................................................................................................254
27.1.1 SUA (Single User Account) Versus NAT ..............................................254
27.2 Applying NAT .................................................................................................254
27.3 NAT Setup ......................................................................................................256
27.3.1 Address Mapping Sets ..........................................................................256
27.3.1.1 SUA Address Mapping Set .........................................................257
27.3.1.2 User-Defined Address Mapping Sets ..........................................258
27.3.1.3 Ordering Your Rules ....................................................................259
27.4 Configuring a Server behind NAT ..................................................................260
27.5 General NAT Examples ..................................................................................261
27.5.1 Example 1: Internet Access Only ..........................................................262
27.5.2 Example 2: Internet Access with an Inside Server ...............................262
27.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............263
27.5.4 Example 4: NAT Unfriendly Application Programs ...............................267
Chapter 28
Enabling the Firewall ...........................................................................................270
28.1 Remote Management and the Firewall ..........................................................270
28.2 Access Methods .............................................................................................270
28.3 Enabling the Firewall ......................................................................................270
Chapter 29
Filter Configuration.............................................................................................. 272
29.1 About Filtering ................................................................................................272
29.1.1 The Filter Structure of the Prestige .......................................................273
29.2 Configuring a Filter Set for the Prestige .........................................................274
29.3 Filter Rules Summary Menus .........................................................................275
29.4 Configuring a Filter Rule ................................................................................276
29.4.1 TCP/IP Filter Rule .................................................................................277
29.4.2 Generic Filter Rule ................................................................................279
29.5 Filter Types and NAT .....................................................................................281
29.6 Example Filter ................................................................................................281
Table of Contents 18
P-660H/HW/W-T Series User’ Guide
29.7 Applying Filters and Factory Defaults ............................................................283
29.7.1 Ethernet Traffic .....................................................................................284
29.7.2 Remote Node Filters .............................................................................284
Chapter 30
SNMP Configuration ............................................................................................ 286
30.1 About SNMP ..................................................................................................286
30.2 Supported MIBs ............................................................................................287
30.3 SNMP Configuration ......................................................................................287
30.4 SNMP Traps ...................................................................................................288
Chapter 31
System Security ................................................................................................... 290
31.1 System Security .............................................................................................290
31.1.1 System Password .................................................................................290
31.1.2 Configuring External RADIUS Server ...................................................290
31.1.3 IEEE 802.1x ..........................................................................................292
31.2 Creating User Accounts on the Prestige ........................................................294
Chapter 32
System Information and Diagnosis .................................................................... 296
32.1 Overview ........................................................................................................296
32.2 System Status ................................................................................................296
32.3 System Information ........................................................................................298
32.3.1 System Information ...............................................................................298
32.3.2 Console Port Speed ..............................................................................299
32.4 Log and Trace ................................................................................................300
32.4.1 Viewing Error Log .................................................................................300
32.4.2 Syslog and Accounting .........................................................................301
32.5 Diagnostic ......................................................................................................303
Chapter 33
Firmware and Configuration File Maintenance ................................................. 306
33.1 Filename Conventions ...................................................................................306
33.2 Backup Configuration .....................................................................................307
33.2.1 Backup Configuration ...........................................................................307
33.2.2 Using the FTP Command from the Command Line ..............................308
33.2.3 Example of FTP Commands from the Command Line .........................308
33.2.4 GUI-based FTP Clients .........................................................................309
33.2.5 TFTP and FTP over WAN Management Limitations .............................309
33.2.6 Backup Configuration Using TFTP .......................................................310
33.2.7 TFTP Command Example ....................................................................310
33.2.8 GUI-based TFTP Clients ......................................................................310
19 Table of Contents
P-660H/HW/W-T Series User’ Guide
33.3 Restore Configuration ....................................................................................311
33.3.1 Restore Using FTP ...............................................................................311
33.3.2 Restore Using FTP Session Example ..................................................312
33.4 Uploading Firmware and Configuration Files .................................................313
33.4.1 Firmware File Upload ............................................................................313
33.4.2 Configuration File Upload .....................................................................313
33.4.3 FTP File Upload Command from the DOS Prompt Example ................314
33.4.4 FTP Session Example of Firmware File Upload ...................................315
33.4.5 TFTP File Upload ..................................................................................315
33.4.6 TFTP Upload Command Example ........................................................316
Chapter 34
System Maintenance............................................................................................ 318
34.1 Command Interpreter Mode ...........................................................................318
34.2 Call Control Support .......................................................................................319
34.2.1 Budget Management ............................................................................319
34.3 Time and Date Setting ....................................................................................320
34.3.1 Resetting the Time ................................................................................322
Chapter 35
Remote Management ........................................................................................... 324
35.1 Remote Management Overview .....................................................................324
35.2 Remote Management .....................................................................................324
35.2.1 Remote Management Setup .................................................................324
35.2.2 Remote Management Limitations .........................................................325
35.3 Remote Management and NAT ......................................................................326
35.4 System Timeout .............................................................................................326
Chapter 36
IP Policy Routing.................................................................................................. 328
36.1 IP Policy Routing Overview ............................................................................328
36.2 Benefits of IP Policy Routing ..........................................................................328
36.3 Routing Policy ................................................................................................328
36.4 IP Routing Policy Setup .................................................................................329
36.5 Applying an IP Policy .....................................................................................332
36.5.1 Ethernet IP Policies ..............................................................................332
36.6 IP Policy Routing Example .............................................................................333
Chapter 37
Call Scheduling .................................................................................................... 338
37.1 Introduction ....................................................................................................338
Table of Contents 20
P-660H/HW/W-T Series User’ Guide
Chapter 38
Troubleshooting ................................................................................................... 342
38.1 Problems Starting Up the Prestige .................................................................342
38.2 Problems with the LAN ...................................................................................342
38.3 Problems with the WAN .................................................................................343
38.4 Problems Accessing the Prestige ..................................................................344
38.4.1 Pop-up Windows, JavaScripts and Java Permissions ..........................344
38.4.1.1 Internet Explorer Pop-up Blockers ..............................................344
38.4.1.2 JavaScripts ..................................................................................347
38.4.1.3 Java Permissions ........................................................................349
38.4.2 ActiveX Controls in Internet Explorer ....................................................351
Appendix A
Product Specifications ....................................................................................... 354
Appendix B
Wall-mounting Instructions................................................................................. 358
Appendix C
Setting up Your Computer’s IP Address............................................................ 360
Windows 95/98/Me................................................................................................. 360
Windows 2000/NT/XP ............................................................................................ 363
Macintosh OS 8/9................................................................................................... 368
Macintosh OS X ..................................................................................................... 370
Linux....................................................................................................................... 371
Appendix D
IP Subnetting ........................................................................................................ 376
IP Addressing......................................................................................................... 376
IP Classes .............................................................................................................. 376
Subnet Masks ........................................................................................................ 377
Subnetting .............................................................................................................. 377
Example: Two Subnets .......................................................................................... 378
Example: Four Subnets.......................................................................................... 380
Example Eight Subnets.......................................................................................... 381
Subnetting With Class A and Class B Networks. ................................................... 382
Appendix E
Boot Commands ..................................................................................................384
Appendix F
Command Interpreter........................................................................................... 386
Command Syntax................................................................................................... 386
21 Table of Contents
P-660H/HW/W-T Series User’ Guide
Command Usage ................................................................................................... 386
Appendix G
Firewall Commands ............................................................................................. 388
Appendix H
NetBIOS Filter Commands .................................................................................. 394
Introduction ............................................................................................................ 394
Display NetBIOS Filter Settings ............................................................................. 394
NetBIOS Filter Configuration.................................................................................. 395
Appendix I
Splitters and Microfilters ..................................................................................... 398
Connecting a POTS Splitter ................................................................................... 398
Telephone Microfilters ............................................................................................ 398
Prestige With ISDN ................................................................................................ 399
Appendix J
PPPoE ................................................................................................................... 402
PPPoE in Action..................................................................................................... 402
Benefits of PPPoE.................................................................................................. 402
Traditional Dial-up Scenario................................................................................... 402
How PPPoE Works ................................................................................................ 403
Prestige as a PPPoE Client ................................................................................... 403
Appendix K
Log Descriptions.................................................................................................. 404
Log Commands...................................................................................................... 418
Log Command Example......................................................................................... 419
Appendix L
Wireless LANs ...................................................................................................... 420
Wireless LAN Topologies ....................................................................................... 420
Channel.................................................................................................................. 422
RTS/CTS................................................................................................................ 422
Fragmentation Threshold ....................................................................................... 423
Preamble Type....................................................................................................... 424
IEEE 802.1x ........................................................................................................... 425
RADIUS.................................................................................................................. 425
Types of Authentication.......................................................................................... 426
WPA ....................................................................................................................... 428
Security Parameters Summary .............................................................................. 429
Table of Contents 22
P-660H/HW/W-T Series User’ Guide
Appendix M
Internal SPTGEN .................................................................................................. 430
Internal SPTGEN Overview ................................................................................... 430
The Configuration Text File Format ........................................................................ 430
Internal SPTGEN FTP Download Example............................................................ 431
Internal SPTGEN FTP Upload Example ................................................................ 432
Command Examples.............................................................................................. 453
Index...................................................................................................................... 456
23 Table of Contents
P-660H/HW/W-T Series User’ Guide
List of Figures
Figure 1 Protected Internet Access Applications ................................................................ 46
Figure 2 LAN-to-LAN Application Example ......................................................................... 46
Figure 3 Password Screen .................................................................................................. 49
Figure 4 Change Password at Login ................................................................................... 49
Figure 5 Web Configurator: Site Map Screen ................................................................... 50
Figure 6 Password ..............................................................................................................52
Figure 7 Internet Access Wizard Setup: ISP Parameters ................................................... 54
Figure 8 Internet Connection with PPPoE ........................................................................... 55
Figure 9 Internet Connection with RFC 1483 ..................................................................... 56
Figure 10 Internet Connection with ENET ENCAP ............................................................. 57
Figure 11 Internet Connection with PPPoA ......................................................................... 58
Figure 12 Internet Access Wizard Setup: Third Screen ...................................................... 59
Figure 13 Internet Access Wizard Setup: LAN Configuration ............................................ 59
Figure 14 Internet Access Wizard Setup: Connection Tests ............................................... 60
Figure 15 LAN and WAN IP Addresses .............................................................................. 62
Figure 16 Any IP Example .................................................................................................. 67
Figure 17 LAN Setup ........................................................................................................... 68
Figure 18 Wireless LAN ...................................................................................................... 72
Figure 19 Wireless Security Methods ................................................................................. 73
Figure 20 Wireless Screen .................................................................................................. 74
Figure 21 MAC Filter ...........................................................................................................76
Figure 22 WPA - PSK Authentication .................................................................................. 78
Figure 23 WPA with RADIUS Application Example2 .......................................................... 79
Figure 24 Wireless LAN: 802.1x/WPA: No Access Allowed ................................................ 80
Figure 25 Wireless LAN: 802.1x/WPA: No Authentication .................................................. 80
Figure 26 Wireless LAN: 802.1x/WPA: 802.1xl ................................................................... 81
Figure 27 Wireless LAN: 802.1x/WPA: WPA ....................................................................... 83
Figure 28 Wireless LAN: 802.1x/WPA:WPA-PSK ............................................................... 84
Figure 29 Local User Database .......................................................................................... 86
Figure 30 RADIUS .............................................................................................................. 87
Figure 31 Example of Traffic Shaping ................................................................................. 94
Figure 32 WAN ................................................................................................................... 95
Figure 33 WAN Setup (PPPoE) .......................................................................................... 96
Figure 34 Traffic Redirect Example ..................................................................................... 99
Figure 35 Traffic Redirect LAN Setup ................................................................................. 99
Figure 36 WAN Backup ....................................................................................................... 100
Figure 37 How NAT Works .................................................................................................. 104
Figure 38 NAT Application With IP Alias ............................................................................. 104
List of Figures 24
P-660H/HW/W-T Series User’ Guide
Figure 39 Multiple Servers Behind NAT Example ............................................................... 107
Figure 40 NAT Mode ........................................................................................................... 108
Figure 41 Edit SUA/NAT Server Set ................................................................................... 109
Figure 42 Address Mapping Rules ...................................................................................... 110
Figure 43 Edit Address Mapping Rule .............................................................................. 112
Figure 44 Dynamic DNS ..................................................................................................... 115
Figure 45 Time and Date ..................................................................................................... 116
Figure 46 Prestige Firewall Application ............................................................................... 120
Figure 47 Three-Way Handshake ....................................................................................... 122
Figure 48 SYN Flood ........................................................................................................... 122
Figure 49 Smurf Attack ....................................................................................................... 123
Figure 50 Stateful Inspection ............................................................................................... 125
Figure 51 Firewall: Default Policy ........................................................................................ 135
Figure 52 Firewall: Rule Summary ..................................................................................... 137
Figure 53 Firewall: Edit Rule ............................................................................................... 139
Figure 54 Firewall: Customized Services ............................................................................ 141
Figure 55 Firewall: Configure Customized Services ........................................................... 142
Figure 56 Firewall Example: Rule Summary ....................................................................... 143
Figure 57 Firewall Example: Edit Rule: Destination Address ............................................. 144
Figure 58 Edit Custom Port Example .................................................................................. 144
Figure 59 Firewall Example: Edit Rule: Select Customized Services ................................. 145
Figure 60 Firewall Example: Rule Summary: My Service .................................................. 146
Figure 61 Firewall: Anti Probing .......................................................................................... 149
Figure 62 Firewall: Threshold .............................................................................................. 151
Figure 63 Content Filtering ................................................................................................. 154
Figure 64 Content Filter: Keyword ...................................................................................... 155
Figure 65 Content Filter: Schedule ..................................................................................... 156
Figure 66 Content Filter: Trusted ........................................................................................ 157
Figure 67 Telnet Configuration on a TCP/IP Network ......................................................... 159
Figure 68 Remote Management ......................................................................................... 160
Figure 69 Configuring UPnP ............................................................................................... 163
Figure 70 Add/Remove Programs: Windows Setup: Communication ................................. 165
Figure 71 Add/Remove Programs: Windows Setup: Communication: Components .......... 165
Figure 72 Network Connections .......................................................................................... 166
Figure 73 Windows Optional Networking Components Wizard .......................................... 167
Figure 74 Networking Services ........................................................................................... 168
Figure 75 Network Connections .......................................................................................... 169
Figure 76 Internet Connection Properties .......................................................................... 170
Figure 77 Internet Connection Properties: Advanced Settings ........................................... 171
Figure 78 Internet Connection Properties: Advanced Settings: Add ................................... 171
Figure 79 System Tray Icon ................................................................................................ 172
Figure 80 Internet Connection Status .................................................................................. 172
Figure 81 Network Connections .......................................................................................... 173
25 List of Figures
P-660H/HW/W-T Series User’ Guide
Figure 82 Network Connections: My Network Places ......................................................... 174
Figure 83 Network Connections: My Network Places: Properties: Example ....................... 174
Figure 84 Log Settings ........................................................................................................ 177
Figure 85 View Logs ........................................................................................................... 179
Figure 86 E-mail Log Example ............................................................................................ 180
Figure 87 Application-based Bandwidth Management Example ......................................... 183
Figure 88 Subnet-based Bandwidth Management Example ............................................... 184
Figure 89 Application and Subnet-based Bandwidth Management Example ..................... 184
Figure 90 Bandwidth Allotment Example ............................................................................ 186
Figure 91 Maximize Bandwidth Usage Example ................................................................. 187
Figure 92 Media Bandwidth Mgnt. ..................................................................................... 188
Figure 93 Media Bandwidth Management: Summary ......................................................... 189
Figure 94 Media Bandwidth Management: Class Setup ..................................................... 190
Figure 95 Media Bandwidth Management: Class Configuration ......................................... 191
Figure 96 Media Bandwidth Management Statistics .......................................................... 193
Figure 97 Media Bandwidth Management: Monitor ........................................................... 194
Figure 98 System Status ..................................................................................................... 197
Figure 99 System Status: Show Statistics ........................................................................... 199
Figure 100 DHCP Table ...................................................................................................... 200
Figure 101 Any IP Table ...................................................................................................... 201
Figure 102 Association List ................................................................................................. 202
Figure 103 Diagnostic: General .......................................................................................... 203
Figure 104 Diagnostic: DSL Line ........................................................................................ 204
Figure 105 Firmware Upgrade ............................................................................................ 205
Figure 106 Network Temporarily Disconnected .................................................................. 206
Figure 107 Error Message .................................................................................................. 206
Figure 108 Login Screen ..................................................................................................... 209
Figure 109 Menu 23.1 Change Password ........................................................................... 212
Figure 110 Menu 1 General Setup ...................................................................................... 215
Figure 111 Menu 1.1 Configure Dynamic DNS .................................................................. 216
Figure 112 Menu 2 WAN Backup Setup .............................................................................. 218
Figure 113 Menu 2.1Traffic Redirect Setup ......................................................................... 219
Figure 114 Menu 3 LAN Setup ............................................................................................ 222
Figure 115 Menu 3.1 LAN Port Filter Setup ........................................................................ 222
Figure 116 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 223
Figure 117 Menu 3.5 - Wireless LAN Setup ....................................................................... 226
Figure 118 Menu 3.5.1 WLAN MAC Address Filtering ........................................................ 228
Figure 119 IP Alias Network Example ................................................................................. 231
Figure 120 Menu 3.2 TCP/IP and DHCP Setup ................................................................. 231
Figure 121 Menu 3.2.1 IP Alias Setup ................................................................................ 232
Figure 122 Menu 1 General Setup ...................................................................................... 233
Figure 123 Menu 4 Internet Access Setup .......................................................................... 233
Figure 124 Menu 11 Remote Node Setup ........................................................................... 237
List of Figures 26
P-660H/HW/W-T Series User’ Guide
Figure 125 Menu 11.1 Remote Node Profile ...................................................................... 238
Figure 126 Menu 11.3 Remote Node Network Layer Options ............................................ 240
Figure 127 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection ........................... 242
Figure 128 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) ............... 242
Figure 129 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) ................. 243
Figure 130 Menu 11.6 for VC-based Multiplexing ............................................................... 243
Figure 131 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation .......................... 244
Figure 132 Menu 11.1 Remote Node Profile ....................................................................... 244
Figure 133 Menu 11.8 Advance Setup Options .................................................................. 245
Figure 134 Sample Static Routing Topology ....................................................................... 246
Figure 135 Menu 12 Static Route Setup ............................................................................. 247
Figure 136 Menu 12.1 IP Static Route Setup ...................................................................... 247
Figure 137 Menu12.1.1 Edit IP Static Route ....................................................................... 247
Figure 138 Menu 11.1 Remote Node Profile ....................................................................... 251
Figure 139 Menu 11.3 Remote Node Network Layer Options ............................................ 251
Figure 140 Menu 12.3.1 Edit Bridge Static Route ............................................................... 252
Figure 141 Menu 4 Applying NAT for Internet Access ........................................................ 255
Figure 142 Applying NAT in Menus 4 & 11.3 ....................................................................... 255
Figure 143 Menu 15 NAT Setup ........................................................................................ 256
Figure 144 Menu 15.1 Address Mapping Sets .................................................................... 257
Figure 145 Menu 15.1.255 SUA Address Mapping Rules .................................................. 257
Figure 146 Menu 15.1.1 First Set ........................................................................................ 258
Figure 147 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ........................ 259
Figure 148 Menu 15.2 NAT Server Setup ........................................................................... 260
Figure 149 Menu 15.2.1 NAT Server Setup ........................................................................ 261
Figure 150 Multiple Servers Behind NAT Example ............................................................. 261
Figure 151 NAT Example 1 ................................................................................................. 262
Figure 152 Menu 4 Internet Access & NAT Example .......................................................... 262
Figure 153 NAT Example 2 ................................................................................................. 263
Figure 154 Menu 15.2.1 Specifying an Inside Server ......................................................... 263
Figure 155 NAT Example 3 ................................................................................................. 264
Figure 156 Example 3: Menu 11.3 ...................................................................................... 265
Figure 157 Example 3: Menu 15.1.1.1 ................................................................................ 265
Figure 158 Example 3: Final Menu 15.1.1 .......................................................................... 266
Figure 159 Example 3: Menu 15.2.1 ................................................................................... 266
Figure 160 NAT Example 4 ................................................................................................. 267
Figure 161 Example 4: Menu 15.1.1.1 Address Mapping Rule ........................................... 267
Figure 162 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ 268
Figure 163 Menu 21.2 Firewall Setup ................................................................................. 271
Figure 164 Outgoing Packet Filtering Process .................................................................... 272
Figure 165 Filter Rule Process ............................................................................................ 273
Figure 166 Menu 21 Filter Set Configuration ...................................................................... 274
Figure 167 NetBIOS_WAN Filter Rules Summary ............................................................. 274
27 List of Figures
P-660H/HW/W-T Series User’ Guide
Figure 168 NetBIOS_LAN Filter Rules Summary .............................................................. 275
Figure 169 IGMP Filter Rules Summary ............................................................................ 275
Figure 170 Menu 21.1.x.1 TCP/IP Filter Rule ..................................................................... 277
Figure 171 Executing an IP Filter ........................................................................................ 279
Figure 172 Menu 21.1.5.1 Generic Filter Rule ................................................................... 280
Figure 173 Protocol and Device Filter Sets ......................................................................... 281
Figure 174 Sample Telnet Filter .......................................................................................... 282
Figure 175 Menu 21.1.6.1 Sample Filter ............................................................................ 282
Figure 176 Menu 21.1.6.1 Sample Filter Rules Summary .................................................. 283
Figure 177 Filtering Ethernet Traffic .................................................................................... 284
Figure 178 Filtering Remote Node Traffic ........................................................................... 284
Figure 179 SNMP Management Model ............................................................................... 286
Figure 180 Menu 22 SNMP Configuration .......................................................................... 288
Figure 181 Menu 23 – System Security .............................................................................. 290
Figure 182 Menu 23.2 System Security: RADIUS Server ................................................... 291
Figure 183 Menu 23 System Security ................................................................................. 292
Figure 184 Menu 23.4 System Security: IEEE 802.1x ........................................................ 292
Figure 185 Menu 14 Dial-in User Setup .............................................................................. 295
Figure 186 Menu 14.1 Edit Dial-in User .............................................................................. 295
Figure 187 Menu 24 System Maintenance ......................................................................... 296
Figure 188 Menu 24.1 System Maintenance : Status ......................................................... 297
Figure 189 Menu 24.2 System Information and Console Port Speed ................................. 298
Figure 190 Menu 24.2.1 System Maintenance: Information ............................................... 299
Figure 191 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... 300
Figure 192 Menu 24.3 System Maintenance: Log and Trace ............................................. 300
Figure 193 Sample Error and Information Messages ......................................................... 301
Figure 194 Menu 24.3.2 System Maintenance: Syslog and Accounting ............................. 301
Figure 195 Syslog Example ................................................................................................ 302
Figure 196 Menu 24.4 System Maintenance : Diagnostic ................................................... 303
Figure 197 Telnet in Menu 24.5 ........................................................................................... 308
Figure 198 FTP Session Example ...................................................................................... 309
Figure 199 Telnet into Menu 24.6 ........................................................................................ 312
Figure 200 Restore Using FTP Session Example ............................................................... 312
Figure 201 Telnet Into Menu 24.7.1 Upload System Firmware .......................................... 313
Figure 202 Telnet Into Menu 24.7.2 System Maintenance ................................................. 314
Figure 203 FTP Session Example of Firmware File Upload ............................................... 315
Figure 204 Command Mode in Menu 24 ............................................................................. 318
Figure 205 Valid Commands ............................................................................................... 318
Figure 206 Menu 24.9 System Maintenance: Call Control .................................................. 319
Figure 207 Menu 24.9.1 System Maintenance: Budget Management ................................ 320
Figure 208 Menu 24 System Maintenance ......................................................................... 321
Figure 209 Menu 24.10 System Maintenance: Time and Date Setting ............................... 321
Figure 210 Menu 24.11 Remote Management Control ....................................................... 325
List of Figures 28
P-660H/HW/W-T Series User’ Guide
Figure 211 Menu 25 IP Routing Policy Setup ..................................................................... 329
Figure 212 Menu 25.1 IP Routing Policy Setup .................................................................. 330
Figure 213 Menu 25.1.1 IP Routing Policy .......................................................................... 331
Figure 214 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 333
Figure 215 Menu 11.3 Remote Node Network Layer Options ............................................ 333
Figure 216 Example of IP Policy Routing ........................................................................... 334
Figure 217 IP Routing Policy Example ................................................................................ 335
Figure 218 IP Routing Policy Example ................................................................................ 336
Figure 219 Applying IP Policies Example ........................................................................... 336
Figure 220 Menu 26 Schedule Setup .................................................................................. 338
Figure 221 Menu 26.1 Schedule Set Setup ....................................................................... 339
Figure 222 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... 340
Figure 223 Pop-up Blocker ................................................................................................. 345
Figure 224 Internet Options ............................................................................................... 345
Figure 225 Internet Options ................................................................................................ 346
Figure 226 Pop-up Blocker Settings ................................................................................... 347
Figure 227 Internet Options ................................................................................................ 348
Figure 228 Security Settings - Java Scripting ..................................................................... 349
Figure 229 Security Settings - Java .................................................................................... 350
Figure 230 Java (Sun) ......................................................................................................... 351
Figure 231 Internet Options Security .................................................................................. 352
Figure 232 Security Setting ActiveX Controls ..................................................................... 353
Figure 233 WIndows 95/98/Me: Network: Configuration ..................................................... 361
Figure 234 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 362
Figure 235 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 363
Figure 236 Windows XP: Start Menu .................................................................................. 364
Figure 237 Windows XP: Control Panel .............................................................................. 364
Figure 238 Windows XP: Control Panel: Network Connections: Properties ....................... 365
Figure 239 Windows XP: Local Area Connection Properties .............................................. 365
Figure 240 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 366
Figure 241 Windows XP: Advanced TCP/IP Properties ...................................................... 367
Figure 242 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 368
Figure 243 Macintosh OS 8/9: Apple Menu ........................................................................ 369
Figure 244 Macintosh OS 8/9: TCP/IP ................................................................................ 369
Figure 245 Macintosh OS X: Apple Menu ........................................................................... 370
Figure 246 Macintosh OS X: Network ................................................................................. 371
Figure 247 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 372
Figure 248 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 372
Figure 249 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 373
Figure 250 Red Hat 9.0: KDE: Network Configuration: Activate ................................. 373
Figure 251 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 374
Figure 252 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 374
Figure 253 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 374
29 List of Figures
P-660H/HW/W-T Series User’ Guide
Figure 254 Red Hat 9.0: Restart Ethernet Card ................................................................ 375
Figure 255 Red Hat 9.0: Checking TCP/IP Properties ...................................................... 375
Figure 256 Option to Enter Debug Mode ............................................................................ 384
Figure 257 Boot Module Commands .................................................................................. 385
Figure 258 Connecting a POTS Splitter .............................................................................. 398
Figure 259 Connecting a Microfilter .................................................................................... 399
Figure 260 Prestige with ISDN ............................................................................................ 399
Figure 261 Single-Computer per Router Hardware Configuration ...................................... 403
Figure 262 Prestige as a PPPoE Client .............................................................................. 403
Figure 263 Displaying Log Categories Example ................................................................. 418
Figure 264 Displaying Log Parameters Example ................................................................ 418
Figure 265 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 420
Figure 266 Basic Service Set .............................................................................................. 421
Figure 267 Infrastructure WLAN ......................................................................................... 422
Figure 268 RTS/CTS .......................................................................................................... 423
Figure 269 Configuration Text File Format: Column Descriptions ....................................... 430
Figure 270 Invalid Parameter Entered: Command Line Example ....................................... 431
Figure 271 Valid Parameter Entered: Command Line Example ......................................... 431
Figure 272 Internal SPTGEN FTP Download Example ..................................................... 432
Figure 273 Internal SPTGEN FTP Upload Example ........................................................... 432
List of Figures 30