ZyXEL Prestige 2602H, Prestige 2602HW User Guide

Prestige 2602H Series

ADSL VoIP IAD

Prestige 2602HW Series

802.11g Wireless ADSL VoIP IAD
User’s Guide
Version 3.40
5/2005
Prestige 2602H/HW Series User’s Guide

Copyright

Copyright © 2005 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Prestige 2602H/HW Series User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Note: Antenna Warning! This device meets ETSI and FCC certification requirements
when using the included antenna(s). Only use the included antenna(s).
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Certifications
www.zyxel.com
Go to

4 Federal Communications Commission (FCC) Interference Statement

Prestige 2602H/HW Series User’s Guide
1 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
2 Select the certification you wish to view from this page.
Federal Communications Commission (FCC) Interference Statement 5
Prestige 2602H/HW Series User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.

Safety Warnings

6 Safety Warnings
Prestige 2602H/HW Series User’s Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Prestige 2602H/HW Series User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.

Customer Support

METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
NORTH AMERICA
NORWAY
SPAIN
SWEDEN
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420 241 091 350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420 241 091 359
support@zyxel.dk +45 39 55 07 00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45 39 55 07 07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
i nf o @z y xe l .f r + 3 3 ( 0 )4 72 52 97 97 w ww .z y xe l . fr Z yX E L Fr a nc e
+33 (0)4 72 52 19 20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.com +1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47 22 80 61 80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47 22 80 61 81
support@zyxel.es +34 902 195 420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34 913 005 345
support@zyxel.se +46 31 744 7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46 31 744 7701
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Sc ien ce P ar k Hsinchu 300 Ta i w a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Col um bu sv ej 5 2860 Soeborg Denmark
Mal mi nk aa ri 10 00700 Helsinki Finland
1 ru e d e s V er ge r s Ba t. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
1130 N. Miller St. Anaheim
CA 92806-2001 U.S.A.
Ni ls H ans en s ve i 13 0667 Oslo Norway
Alejandro Villegas 33 1º, 28043 Madrid Spa i n
Sjöporten 4, 41764 Göteborg Sweden
8 Customer Support
Prestige 2602H/HW Series User’s Guide
METHOD
LOCATION
UNITED KINGDOM
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.co.uk +44 (0) 1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44 (0) 1344 303034 ftp.zyxel.co.uk
A
WEB SITE
www.zyxel.co.uk ZyXEL Communications UK
a. “+” is the (prefix) number you enter to make an international telephone call.
REGULAR MAIL
Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
Prestige 2602H/HW Series User’s Guide
10 Customer Support
Prestige 2602H/HW Series User’s Guide

Table of Contents

Copyright .................................................................................................................. 3
Federal Communications Commission (FCC) Interference Statement ............... 4
Safety Warnings ....................................................................................................... 6
ZyXEL Limited Warranty.......................................................................................... 7
Customer Support.................................................................................................... 8
Table of Contents ................................................................................................... 11
List of Figures ........................................................................................................ 29
List of Tables .......................................................................................................... 37
Preface .................................................................................................................... 43
Introduction to DSL................................................................................................ 45
Chapter 1
Getting To Know Your Prestige............................................................................. 47
1.1 Introducing the Prestige .....................................................................................47
1.1.1 Features of the Prestige ...........................................................................48
1.1.1.1 P2602HW Wireless Features ..........................................................52
1.2 Applications for the Prestige ..............................................................................53
1.2.1 Internet Access .........................................................................................53
1.2.1.1 Internet Single User Account ..........................................................54
1.2.2 Making Calls via Internet Telephony Service Provider ..............................54
1.2.3 Make Peer-to-peer Calls ...........................................................................54
1.2.4 Firewall for Secure Broadband Internet Access .......................................55
1.2.5 LAN to LAN Application ............................................................................55
1.2.6 Front Panel LEDs .....................................................................................56
Chapter 2
Introducing the Web Configurator........................................................................ 59
2.1 Web Configurator Overview ...............................................................................59
2.1.1 Accessing the Prestige Web Configurator ................................................59
2.1.2 Resetting the Prestige ..............................................................................60
2.1.2.1 Using The Reset Button ..................................................................60
2.1.3 Navigating the Prestige Web Configurator ...............................................61
Table of Contents 11
Prestige 2602H/HW Series User’s Guide
Chapter 3
Wizard Setup .......................................................................................................... 65
3.1 Wizard Setup Introduction ..................................................................................65
3.1.1 Wizard Setup: First Screen .......................................................................65
3.1.2 Wizard Setup: Second Screen ..................................................................66
3.1.3 Wizard Setup: Third Screen ......................................................................70
3.1.4 Internet Access Wizard Setup: Fourth Screen ..........................................72
3.1.5 Wizard Setup: Connection Test ................................................................74
3.1.5.1 Test Your Internet Connection .........................................................75
3.2 Media Bandwidth Management Wizard .............................................................75
3.2.1 Predefined Media Bandwidth Management Services ...............................76
3.2.2 Media Bandwidth Management Setup: First Screen ................................76
3.2.3 Media Bandwidth Mgnt. Wizard Setup: Second Screen ...........................77
3.2.4 Media Bandwidth Mgnt. Wizard Setup: Finish ..........................................78
3.3 Password Setup .................................................................................................79
3.3.1 Configuring Password ...............................................................................79
Chapter 4
LAN Setup............................................................................................................... 81
4.1 LAN Overview ....................................................................................................81
4.1.1 LANs, WANs and the Prestige ..................................................................81
4.1.2 DHCP Setup .............................................................................................81
4.1.2.1 IP Pool Setup ..................................................................................82
4.2 DNS Server Address ..........................................................................................82
4.3 DNS Server Address Assignment ......................................................................82
4.4 LAN TCP/IP ........................................................................................................83
4.4.1 Factory LAN Defaults ................................................................................83
4.5 LAN TCP/IP ........................................................................................................83
4.5.1 IP Address and Subnet Mask ...................................................................83
4.5.1.1 Private IP Addresses .......................................................................84
4.5.2 RIP Setup .................................................................................................84
4.5.3 Multicast ....................................................................................................85
4.6 Any IP .................................................................................................................85
4.6.1 How Any IP Works ....................................................................................86
4.7 Configuring LAN .................................................................................................87
4.8 Configuring Static DHCP ....................................................................................89
Chapter 5
Wireless LAN (P2602HW Models)......................................................................... 91
5.1 Introduction ........................................................................................................91
5.2 Wireless Security Overview ...............................................................................91
5.2.1 Encryption .................................................................................................91
5.2.2 Authentication ...........................................................................................91
12 Table of Contents
Prestige 2602H/HW Series User’s Guide
5.2.3 Restricted Access .....................................................................................92
5.2.4 Hide Prestige Identity ................................................................................92
5.2.5 Configuring Wireless LAN on the Prestige ...............................................92
5.3 Configuring the Wireless Screen ........................................................................93
5.3.1 WEP Encryption ........................................................................................93
5.4 Configuring MAC Filters .....................................................................................95
5.5 Introduction to WPA ...........................................................................................97
5.5.1 WPA-PSK Application Example ................................................................97
5.5.2 WPA with RADIUS Application Example ..................................................98
5.5.3 Wireless Client WPA Supplicants ............................................................99
5.6 Configuring IEEE 802.1x and WPA ....................................................................99
5.6.1 Authentication Required: 802.1x .............................................................100
5.6.2 Authentication Required: WPA ...............................................................102
5.6.3 Authentication Required: WPA-PSK .......................................................104
5.7 Configuring Local User Authentication .............................................................105
5.8 Configuring RADIUS ........................................................................................106
Chapter 6
WAN Setup............................................................................................................ 109
6.1 WAN Overview .................................................................................................109
6.1.1 Encapsulation .........................................................................................109
6.1.1.1 ENET ENCAP ...............................................................................109
6.1.1.2 PPP over Ethernet ........................................................................109
6.1.1.3 PPPoA ...........................................................................................109
6.1.1.4 RFC 1483 ...................................................................................... 110
6.1.2 Multiplexing ............................................................................................. 110
6.1.2.1 VC-based Multiplexing .................................................................. 110
6.1.2.2 LLC-based Multiplexing ................................................................. 110
6.1.3 VPI and VCI ............................................................................................110
6.1.4 IP Address Assignment ..........................................................................110
6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation ................... 110
6.1.4.2 IP Assignment with RFC 1483 Encapsulation ............................... 111
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ........................ 111
6.1.5 Nailed-Up Connection (PPP) .................................................................. 111
6.2 Metric .............................................................................................................. 111
6.3 PPPoE Encapsulation ...................................................................................... 112
6.4 Traffic Shaping .................................................................................................112
6.5 Zero Configuration Internet Access .................................................................. 113
6.6 Configuring WAN Setup ...................................................................................113
6.7 Traffic Redirect .................................................................................................116
6.8 Configuring WAN Backup ................................................................................. 117
Table of Contents 13
Prestige 2602H/HW Series User’s Guide
Chapter 7
Network Address Translation (NAT) Screens.................................................... 121
7.1 NAT Overview ..................................................................................................121
7.1.1 NAT Definitions .......................................................................................121
7.1.2 What NAT Does ......................................................................................122
7.1.3 How NAT Works .....................................................................................122
7.1.4 NAT Application ......................................................................................123
7.1.5 NAT Mapping Types ...............................................................................123
7.2 SUA (Single User Account) Versus NAT ..........................................................124
7.3 SUA Server ......................................................................................................125
7.3.1 Default Server IP Address ......................................................................125
7.3.2 Port Forwarding: Services and Port Numbers ........................................125
7.3.3 Configuring Servers Behind SUA (Example) ..........................................126
7.4 Selecting the NAT Mode ..................................................................................126
7.5 Configuring SUA Server ...................................................................................127
7.6 Configuring Address Mapping ..........................................................................129
7.7 Editing an Address Mapping Rule ....................................................................130
Chapter 8
Introduction to VoIP ............................................................................................. 133
8.1 Introduction to VoIP ..........................................................................................133
8.2 SIP ..................................................................................................................133
8.2.1 SIP Identities ...........................................................................................133
8.2.1.1 SIP Number ...................................................................................133
8.2.1.2 SIP Service Domain ......................................................................134
8.2.2 SIP Call Progression ...............................................................................134
8.2.3 SIP Servers .............................................................................................134
8.2.3.1 SIP User Agent .............................................................................135
8.2.3.2 SIP Proxy Server ...........................................................................135
8.2.3.3 SIP Redirect Server ......................................................................136
8.2.3.4 SIP Register Server ......................................................................137
8.2.4 RTP .........................................................................................................137
8.3 SIP ALG ...........................................................................................................137
8.4 Pulse Code Modulation ....................................................................................137
8.5 Voice Coding ....................................................................................................138
8.5.1 G.711 .......................................................................................................138
8.5.2 G.729 ......................................................................................................138
8.6 PSTN Call Setup Signaling ..............................................................................138
8.7 MWI (Message Waiting Indication) ...................................................................138
Chapter 9
Voice Screens ....................................................................................................... 139
9.1 Voice Screens Introduction ..............................................................................139
14 Table of Contents
Prestige 2602H/HW Series User’s Guide
9.2 SIP Settings Configuration ...............................................................................139
9.3 Advanced Voice Settings Configuration ...........................................................140
9.4 Quality of Service (QoS) ..................................................................................143
9.4.1 Type Of Service (ToS) .............................................................................143
9.4.2 DiffServ ...................................................................................................143
9.4.2.1 DSCP and Per-Hop Behavior ........................................................143
9.4.3 VLAN ......................................................................................................143
9.5 QoS Configuration ............................................................................................144
9.6 Phone ...............................................................................................................145
9.6.1 Voice Activity Detection/Silence Suppression .........................................145
9.6.2 Comfort Noise Generation ......................................................................145
9.6.3 Echo Cancellation ...................................................................................145
9.7 Phone Configuration ........................................................................................145
9.8 Speed Dial ........................................................................................................147
9.8.1 Peer-to-Peer Calls ..................................................................................147
9.9 Speed Dial Configuration .................................................................................147
9.10 Lifeline (Prestige 2602HL/HWL) .....................................................................149
9.11 Lifeline Configuration (Prestige 2602HL/HWL) ..............................................149
9.12 Supplementary Phone Services Overview .....................................................150
9.12.1 The Flash Key .......................................................................................151
9.12.2 Europe Type Supplementary Phone Services ......................................151
9.12.2.1 European Call Hold .....................................................................151
9.12.2.2 European Call Waiting ................................................................152
9.12.2.3 European Call Transfer ...............................................................152
9.12.2.4 European Three-Way Conference ..............................................152
9.12.3 USA Type Supplementary Services ......................................................153
9.12.3.1 USA Call Hold .............................................................................153
9.12.3.2 USA Call Waiting ........................................................................153
9.12.3.3 USA Call Transfer .......................................................................153
9.12.3.4 USA Three-Way Conference .......................................................153
9.13 Common Phone Port Configuration ...............................................................154
9.14 Call Forward Configuration ............................................................................155
Chapter 10
Phone Usage ........................................................................................................ 159
10.1 Dialing a Telephone Number ..........................................................................159
10.2 Using Speed Dial to Dial a Telephone Number ..............................................159
10.3 Internal Calls ..................................................................................................159
10.4 Checking the Prestige’s IP Address ...............................................................159
10.5 Auto Firmware Upgrade .................................................................................160
Table of Contents 15
Prestige 2602H/HW Series User’s Guide
Chapter 11
Dynamic DNS Setup............................................................................................. 161
11.1 Dynamic DNS .................................................................................................161
11.1.1 DYNDNS Wildcard ................................................................................161
11.2 Configuring Dynamic DNS .............................................................................161
Chapter 12
Time and Date....................................................................................................... 163
12.1 Pre-defined NTP Time Servers List ................................................................163
12.2 Configuring Time and Date ............................................................................163
Chapter 13
Firewalls................................................................................................................ 167
13.1 Firewall Overview ...........................................................................................167
13.2 Types of Firewalls ..........................................................................................167
13.2.1 Packet Filtering Firewalls ......................................................................167
13.2.2 Application-level Firewalls ....................................................................167
13.2.3 Stateful Inspection Firewalls ................................................................168
13.3 Introduction to ZyXEL’s Firewall .....................................................................168
13.3.1 Denial of Service Attacks ......................................................................169
13.4 Denial of Service ............................................................................................169
13.4.1 Basics ...................................................................................................169
13.4.2 Types of DoS Attacks ...........................................................................170
13.4.2.1 ICMP Vulnerability ......................................................................172
13.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................172
13.4.2.3 Traceroute ...................................................................................173
13.5 Stateful Inspection ..........................................................................................173
13.5.1 Stateful Inspection Process ..................................................................174
13.5.2 Stateful Inspection and the Prestige .....................................................175
13.5.3 TCP Security .........................................................................................175
13.5.4 UDP/ICMP Security ..............................................................................176
13.5.5 Upper Layer Protocols ..........................................................................176
13.6 Guidelines for Enhancing Security with Your Firewall ....................................176
13.6.1 Security In General ...............................................................................177
13.7 Packet Filtering Vs Firewall ............................................................................178
13.7.1 Packet Filtering: ....................................................................................178
13.7.1.1 When To Use Filtering .................................................................178
13.7.2 Firewall .................................................................................................178
13.7.2.1 When To Use The Firewall ..........................................................178
Chapter 14
Firewall Configuration ......................................................................................... 181
14.1 Access Methods .............................................................................................181
16 Table of Contents
Prestige 2602H/HW Series User’s Guide
14.2 Firewall Policies Overview .............................................................................181
14.3 Rule Logic Overview ......................................................................................182
14.3.1 Rule Checklist .......................................................................................182
14.3.2 Security Ramifications ..........................................................................182
14.3.3 Key Fields For Configuring Rules .........................................................183
14.3.3.1 Action ..........................................................................................183
14.3.3.2 Service ........................................................................................183
14.3.3.3 Source Address ...........................................................................183
14.3.3.4 Destination Address ....................................................................183
14.4 Connection Direction Example .......................................................................183
14.4.1 LAN to WAN Rules ...............................................................................184
14.4.2 WAN to LAN Rules ...............................................................................184
14.4.3 Alerts .....................................................................................................185
14.5 Configuring Basic Firewall Settings ................................................................185
14.6 Rule Summary ...............................................................................................186
14.6.1 Configuring Firewall Rules ....................................................................188
14.7 Customized Services .....................................................................................191
14.8 Creating/Editing A Customized Service .........................................................191
14.9 Example Firewall Rule ...................................................................................192
14.10 Predefined Services .....................................................................................196
14.11 Anti-Probing ..................................................................................................198
14.12 DoS Thresholds ...........................................................................................199
14.12.1 Threshold Values ................................................................................200
14.12.2 Half-Open Sessions ............................................................................200
14.12.2.1 TCP Maximum Incomplete and Blocking Time .........................200
Chapter 15
Content Filtering .................................................................................................. 203
15.1 Content Filtering Overview .............................................................................203
15.2 Configuring Keyword Blocking .......................................................................203
15.3 Configuring the Schedule ..............................................................................204
15.4 Configuring Trusted Computers .....................................................................205
Chapter 16
Introduction to IPSec ........................................................................................... 207
16.1 VPN Overview ................................................................................................207
16.1.1 IPSec ....................................................................................................207
16.1.2 Security Association .............................................................................207
16.1.3 Other Terminology ................................................................................207
16.1.3.1 Encryption ...................................................................................207
16.1.3.2 Data Confidentiality .....................................................................208
16.1.3.3 Data Integrity ...............................................................................208
16.1.3.4 Data Origin Authentication ..........................................................208
Table of Contents 17
Prestige 2602H/HW Series User’s Guide
16.1.4 VPN Applications ..................................................................................208
16.2 IPSec Architecture .........................................................................................209
16.2.1 IPSec Algorithms ..................................................................................209
16.2.2 Key Management ..................................................................................209
16.3 Encapsulation .................................................................................................209
16.3.1 Transport Mode ....................................................................................210
16.3.2 Tunnel Mode ........................................................................................210
16.4 IPSec and NAT ...............................................................................................210
Chapter 17
VPN Screens......................................................................................................... 213
17.1 VPN/IPSec Overview .....................................................................................213
17.2 IPSec Algorithms ............................................................................................213
17.2.1 AH (Authentication Header) Protocol ...................................................213
17.2.2 ESP (Encapsulating Security Payload) Protocol .................................214
17.3 My IP Address ................................................................................................214
17.4 Secure Gateway Address ..............................................................................215
17.4.1 Dynamic Secure Gateway Address ......................................................215
17.5 VPN Summary Screen ...................................................................................215
17.6 Keep Alive ......................................................................................................217
17.7 Remote DNS Server ......................................................................................217
17.8 NAT Traversal ................................................................................................218
17.8.1 NAT Traversal Configuration .................................................................219
17.9 ID Type and Content ......................................................................................219
17.9.1 ID Type and Content Examples ............................................................220
17.10 Pre-Shared Key ............................................................................................221
17.11 Editing VPN Policies .....................................................................................221
17.12 IKE Phases .................................................................................................226
17.12.1 Negotiation Mode ................................................................................228
17.12.2 Diffie-Hellman (DH) Key Groups .........................................................228
17.12.3 Perfect Forward Secrecy (PFS) .........................................................228
17.13 Configuring Advanced IKE Settings .............................................................228
17.14 Manual Key Setup ........................................................................................231
17.14.1 Security Parameter Index (SPI) .........................................................231
17.15 Configuring Manual Key ...............................................................................232
17.16 Viewing SA Monitor ......................................................................................235
17.17 Configuring Global Setting ...........................................................................237
17.18 Telecommuter VPN/IPSec Examples ...........................................................237
17.18.1 Telecommuters Sharing One VPN Rule Example ..............................237
17.18.2 Telecommuters Using Unique VPN Rules Example ...........................238
17.19 VPN and Remote Management ...................................................................240
18 Table of Contents
Prestige 2602H/HW Series User’s Guide
Chapter 18
Remote Management Configuration .................................................................. 241
18.1 Remote Management Overview .....................................................................241
18.1.1 Remote Management Limitations .........................................................241
18.1.2 Remote Management and NAT ............................................................242
18.1.3 System Timeout ...................................................................................242
18.2 Telnet ..............................................................................................................242
18.3 FTP ................................................................................................................242
18.4 Web ................................................................................................................243
18.5 Configuring Remote Management .................................................................243
Chapter 19
Universal Plug-and-Play (UPnP) ......................................................................... 245
19.1 Introducing Universal Plug and Play ..............................................................245
19.1.1 How do I know if I'm using UPnP? ........................................................245
19.1.2 NAT Traversal .......................................................................................245
19.1.3 Cautions with UPnP ..............................................................................245
19.2 UPnP and ZyXEL ...........................................................................................246
19.2.1 Configuring UPnP .................................................................................246
19.3 Installing UPnP in Windows Example ............................................................247
19.4 Using UPnP in Windows XP Example ...........................................................251
Chapter 20
Logs Screens........................................................................................................ 259
20.1 Logs Overview ...............................................................................................259
20.1.1 Alerts and Logs .....................................................................................259
20.2 Configuring Log Settings ................................................................................259
20.3 Displaying the Logs ........................................................................................262
20.4 SMTP Error Messages ...................................................................................262
20.4.1 Example E-mail Log ..............................................................................263
Chapter 21
Media Bandwidth Management Advanced Setup.............................................. 265
21.1 Bandwidth Management Advanced Setup Overview .....................................265
21.2 Bandwidth Classes and Filters .......................................................................265
21.3 Proportional Bandwidth Allocation .................................................................266
21.4 Bandwidth Management Usage Examples ....................................................266
21.4.1 Application-based Bandwidth Management Example ..........................266
21.4.2 Subnet-based Bandwidth Management Example .................................266
21.4.3 Application and Subnet-based Bandwidth Management Example .......267
21.5 Scheduler .......................................................................................................268
21.5.1 Priority-based Scheduler ......................................................................268
21.5.2 Fairness-based Scheduler ....................................................................268
Table of Contents 19
Prestige 2602H/HW Series User’s Guide
21.6 Maximize Bandwidth Usage ...........................................................................268
21.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................268
21.6.2 Maximize Bandwidth Usage Example ..................................................269
21.7 Bandwidth Borrowing .....................................................................................270
21.7.1 Bandwidth Borrowing Example .............................................................270
21.7.2 Maximize Bandwidth Usage With Bandwidth Borrowing ......................271
21.8 Configuring Summary ....................................................................................271
21.9 Configuring Class Setup ................................................................................273
21.9.1 Media Bandwidth Management Class Configuration ............................274
21.9.2 Media Bandwidth Management Statistics .............................................276
21.10 Bandwidth Monitor ......................................................................................277
Chapter 22
Maintenance ......................................................................................................... 279
22.1 Maintenance Overview ...................................................................................279
22.2 System Status Screen ....................................................................................279
22.2.1 System Statistics ...................................................................................282
22.3 DHCP Table Screen .......................................................................................283
22.4 Any IP Table Screen .......................................................................................284
22.5 Wireless Screen .............................................................................................285
22.5.1 Association List .....................................................................................285
22.6 Diagnostic Screens ........................................................................................286
22.6.1 Diagnostic General Screen ...................................................................286
22.6.2 Diagnostic DSL Line Screen .................................................................286
22.7 Firmware Screen ............................................................................................288
Chapter 23
Introducing the SMT ............................................................................................291
23.1 Introduction to the SMT ..................................................................................291
23.1.1 Procedure for SMT Configuration via Telnet .........................................291
23.1.2 Entering Password ................................................................................291
23.2 Navigating the SMT Interface .........................................................................292
23.2.1 System Management Terminal Interface Summary ..............................293
23.2.2 SMT Menus Overview ..........................................................................294
23.3 Changing the System Password ....................................................................295
Chapter 24
Menu 1 General Setup ......................................................................................... 297
24.1 General Setup ................................................................................................297
24.2 Procedure To Configure Menu 1 ....................................................................297
24.2.1 Procedure to Configure Dynamic DNS .................................................298
20 Table of Contents
Prestige 2602H/HW Series User’s Guide
Chapter 25
Menu 2 WAN Backup Setup ................................................................................ 301
25.1 Introduction to WAN Backup Setup ................................................................301
25.2 Configuring WAN Backup in Menu 2 ..............................................................301
25.2.1 Traffic Redirect Setup ...........................................................................302
Chapter 26
Menu 3 LAN Setup ...............................................................................................305
26.1 LAN Setup ......................................................................................................305
26.1.1 General Ethernet Setup ........................................................................305
26.2 Protocol Dependent Ethernet Setup ..............................................................305
26.3 TCP/IP Ethernet Setup and DHCP ................................................................306
Chapter 27
Wireless LAN Setup ............................................................................................. 309
27.1 Wireless LAN Overview .................................................................................309
27.2 Wireless LAN Setup .......................................................................................309
27.2.1 Wireless LAN MAC Address Filter ........................................................310
Chapter 28
Internet Access .................................................................................................... 313
28.1 Internet Access Overview ..............................................................................313
28.2 IP Policies ......................................................................................................313
28.3 IP Alias ...........................................................................................................313
28.4 IP Alias Setup .................................................................................................314
28.5 Route IP Setup ...............................................................................................315
28.6 Internet Access Configuration ........................................................................316
Chapter 29
Remote Node Configuration ............................................................................... 319
29.1 Remote Node Setup Overview .......................................................................319
29.2 Remote Node Setup .......................................................................................319
29.2.1 Remote Node Profile ............................................................................319
29.2.2 Encapsulation and Multiplexing Scenarios ...........................................320
29.2.2.1 Scenario 1: One VC, Multiple Protocols ......................................320
29.2.2.2 Scenario 2: One VC, One Protocol (IP) ......................................320
29.2.2.3 Scenario 3: Multiple VCs .............................................................320
29.2.3 Outgoing Authentication Protocol .........................................................322
29.3 Remote Node Network Layer Options ...........................................................323
29.3.1 My WAN Addr Sample IP Addresses ...................................................324
29.4 Remote Node Filter ........................................................................................325
29.5 Editing ATM Layer Options ............................................................................326
29.5.1 VC-based Multiplexing (non-PPP Encapsulation) ................................326
Table of Contents 21
Prestige 2602H/HW Series User’s Guide
29.5.2 LLC-based Multiplexing or PPP Encapsulation ....................................327
29.5.3 Advance Setup Options ........................................................................327
Chapter 30
Static Route Setup ............................................................................................... 329
30.1 IP Static Route Overview ...............................................................................329
30.2 Configuration ..................................................................................................329
Chapter 31
Bridging Setup ..................................................................................................... 333
31.1 Bridging in General ........................................................................................333
31.2 Bridge Ethernet Setup ....................................................................................333
31.2.1 Remote Node Bridging Setup ...............................................................333
31.2.2 Bridge Static Route Setup .....................................................................335
Chapter 32
Network Address Translation (NAT)................................................................... 337
32.1 Using NAT ......................................................................................................337
32.1.1 SUA (Single User Account) Versus NAT ..............................................337
32.2 Applying NAT .................................................................................................337
32.3 NAT Setup ......................................................................................................339
32.3.1 Address Mapping Sets ..........................................................................339
32.3.1.1 SUA Address Mapping Set .........................................................340
32.3.1.2 User-Defined Address Mapping Sets ..........................................341
32.3.1.3 Ordering Your Rules ....................................................................341
32.4 Configuring a Server Behind NAT ..................................................................343
32.5 General NAT Examples ..................................................................................344
32.5.1 Example 1: Internet Access Only ..........................................................345
32.5.2 Example 2: Internet Access with an Inside Server ...............................345
32.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............346
32.5.4 Example 4: NAT Unfriendly Application Programs ...............................350
Chapter 33
Enabling the Firewall ...........................................................................................353
33.1 Remote Management and the Firewall ..........................................................353
33.2 Access Methods .............................................................................................353
33.3 Enabling the Firewall ......................................................................................353
Chapter 34
Filter Configuration.............................................................................................. 355
34.1 About Filtering ................................................................................................355
34.1.1 The Filter Structure of the Prestige .......................................................356
34.2 Configuring a Filter Set for the Prestige .........................................................357
22 Table of Contents
Prestige 2602H/HW Series User’s Guide
34.3 Filter Rules Summary Menus .........................................................................358
34.4 Configuring a Filter Rule ................................................................................359
34.4.1 TCP/IP Filter Rule .................................................................................360
34.4.2 Generic Filter Rule ................................................................................362
34.5 Filter Types and NAT .....................................................................................364
34.6 Example Filter ................................................................................................364
34.7 Applying Filters and Factory Defaults ............................................................366
34.7.1 Ethernet Traffic .....................................................................................367
34.7.2 Remote Node Filters .............................................................................367
Chapter 35
SNMP Configuration ............................................................................................ 369
35.1 About SNMP ..................................................................................................369
35.2 Supported MIBs ............................................................................................370
35.3 SNMP Configuration ......................................................................................370
35.4 SNMP Traps ...................................................................................................371
Chapter 36
System Security ................................................................................................... 373
36.1 System Security .............................................................................................373
36.1.1 System Password .................................................................................373
36.1.2 Configuring External RADIUS Server ...................................................373
36.1.3 IEEE802.1x ...........................................................................................375
36.2 Creating User Accounts on the Prestige ........................................................377
Chapter 37
System Information and Diagnosis .................................................................... 379
37.1 Overview ........................................................................................................379
37.2 System Status ................................................................................................379
37.3 System Information ........................................................................................381
37.3.1 System Information ...............................................................................381
37.3.2 Console Port Speed ..............................................................................382
37.4 Log and Trace ................................................................................................383
37.4.1 Viewing Error Log .................................................................................383
37.4.2 Syslog and Accounting .........................................................................384
37.5 Diagnostic ......................................................................................................386
Chapter 38
Firmware and Configuration File Maintenance ................................................. 389
38.1 Filename Conventions ...................................................................................389
38.2 Backup Configuration .....................................................................................390
38.2.1 Backup Configuration ...........................................................................390
38.2.2 Using the FTP Command from the Command Line ..............................391
Table of Contents 23
Prestige 2602H/HW Series User’s Guide
38.2.3 Example of FTP Commands from the Command Line .........................391
38.2.4 GUI-based FTP Clients .........................................................................392
38.2.5 TFTP and FTP over WAN Management Limitations .............................392
38.2.6 Backup Configuration Using TFTP .......................................................393
38.2.7 TFTP Command Example ....................................................................393
38.2.8 GUI-based TFTP Clients ......................................................................393
38.3 Restore Configuration ....................................................................................394
38.3.1 Restore Using FTP ...............................................................................394
38.3.2 Restore Using FTP Session Example ..................................................395
38.4 Uploading Firmware and Configuration Files .................................................396
38.4.1 Firmware File Upload ............................................................................396
38.4.2 Configuration File Upload .....................................................................396
38.4.3 FTP File Upload Command from the DOS Prompt Example ................397
38.4.4 FTP Session Example of Firmware File Upload ...................................398
38.4.5 TFTP File Upload ..................................................................................398
38.4.6 TFTP Upload Command Example ........................................................399
Chapter 39
System Maintenance............................................................................................ 401
39.1 Command Interpreter Mode ...........................................................................401
39.2 Call Control Support .......................................................................................402
39.2.1 Budget Management ............................................................................402
39.3 Time and Date Setting ....................................................................................403
39.3.1 Resetting the Time ................................................................................404
Chapter 40
Remote Management ........................................................................................... 407
40.1 Remote Management Overview .....................................................................407
40.2 Remote Management .....................................................................................407
40.2.1 Remote Management Setup .................................................................407
40.2.2 Remote Management Limitations .........................................................408
40.3 Remote Management and NAT ......................................................................409
40.4 System Timeout .............................................................................................409
Chapter 41
IP Policy Routing.................................................................................................. 411
41.1 IP Policy Routing Overview ............................................................................ 411
41.2 Benefits of IP Policy Routing .......................................................................... 411
41.3 Routing Policy ................................................................................................411
41.4 IP Routing Policy Setup .................................................................................412
41.5 Applying an IP Policy .....................................................................................415
41.5.1 Ethernet IP Policies ..............................................................................415
41.6 IP Policy Routing Example .............................................................................416
24 Table of Contents
Prestige 2602H/HW Series User’s Guide
Chapter 42
Call Scheduling .................................................................................................... 419
42.1 Introduction ....................................................................................................419
Chapter 43
VPN/IPSec Setup .................................................................................................. 423
43.1 VPN/IPSec Overview .....................................................................................423
43.2 IPSec Summary Screen .................................................................................424
43.3 IPSec Setup ...................................................................................................426
43.4 IKE Setup .......................................................................................................430
43.5 Manual Setup .................................................................................................432
43.5.1 Active Protocol ......................................................................................432
43.5.2 Security Parameter Index (SPI) ............................................................432
Chapter 44
SA Monitor ............................................................................................................ 435
44.1 SA Monitor Overview .....................................................................................435
44.2 Using SA Monitor ...........................................................................................435
Chapter 45
Troubleshooting ................................................................................................... 439
45.1 Problems Starting Up the Prestige .................................................................439
45.2 Problems with the LAN ...................................................................................439
45.3 Problems with the WAN .................................................................................440
45.4 Problems Accessing the Prestige ..................................................................441
45.4.1 Pop-up Windows, JavaScripts and Java Permissions ..........................441
45.4.1.1 Internet Explorer Pop-up Blockers ..............................................442
45.4.1.2 JavaScripts ..................................................................................445
45.4.1.3 Java Permissions ........................................................................447
45.5 Telephone Problems ......................................................................................449
Appendix A
Product Specifications ....................................................................................... 451
Prestige 2602H/HW Series Power Adaptor Specifications .................................... 455
Appendix B
Setting up Your Computer’s IP Address............................................................ 457
Windows 95/98/Me................................................................................................. 457
Configuring ...................................................................................................... 459
Verifying Settings............................................................................................. 460
Windows 2000/NT/XP ............................................................................................ 460
Verifying Settings............................................................................................. 464
Table of Contents 25
Prestige 2602H/HW Series User’s Guide
Macintosh OS 8/9................................................................................................... 465
Verifying Settings............................................................................................. 466
Macintosh OS X ..................................................................................................... 466
Verifying Settings............................................................................................. 468
Appendix C
IP Subnetting ........................................................................................................ 469
IP Addressing......................................................................................................... 469
IP Classes .............................................................................................................. 469
Subnet Masks ........................................................................................................ 470
Subnetting .............................................................................................................. 470
Example: Two Subnets .......................................................................................... 471
Example: Four Subnets.......................................................................................... 473
Example Eight Subnets.......................................................................................... 474
Subnetting With Class A and Class B Networks. ................................................... 475
Appendix D
PPPoE ................................................................................................................... 477
PPPoE in Action..................................................................................................... 477
Benefits of PPPoE.................................................................................................. 477
Traditional Dial-up Scenario................................................................................... 477
How PPPoE Works ................................................................................................ 478
Prestige as a PPPoE Client ................................................................................... 478
Appendix E
Wireless LANs ...................................................................................................... 479
Wireless LAN Topologies ....................................................................................... 479
Ad-hoc Wireless LAN Configuration ................................................................ 479
BSS.................................................................................................................. 479
ESS.................................................................................................................. 480
Channel.................................................................................................................. 481
RTS/CTS................................................................................................................ 481
Fragmentation Threshold ....................................................................................... 482
Preamble Type....................................................................................................... 483
IEEE 802.1x ........................................................................................................... 484
RADIUS.................................................................................................................. 484
Types of RADIUS Messages ........................................................................... 484
Types of Authentication.......................................................................................... 485
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 485
EAP-TLS (Transport Layer Security) ............................................................... 486
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 486
PEAP (Protected EAP) .................................................................................... 486
26 Table of Contents
Prestige 2602H/HW Series User’s Guide
LEAP................................................................................................................ 486
Dynamic WEP Key Exchange ......................................................................... 486
WPA ....................................................................................................................... 487
User Authentication ........................................................................................ 487
Encryption ....................................................................................................... 487
Security Parameters Summary .............................................................................. 488
Appendix F
Triangle Route ...................................................................................................... 489
The Ideal Setup...................................................................................................... 489
The “Triangle Route” Problem................................................................................ 489
The “Triangle Route” Solutions .............................................................................. 490
IP Aliasing .............................................................................................................. 490
Gateways on the WAN Side................................................................................... 491
Appendix G
Internal SPTGEN .................................................................................................. 493
Internal SPTGEN Overview ................................................................................... 493
The Configuration Text File Format ........................................................................ 493
Internal SPTGEN File Modification - Important Points to Remember.............. 493
Internal SPTGEN FTP Download Example............................................................ 494
Internal SPTGEN FTP Upload Example ................................................................ 495
Command Examples.............................................................................................. 516
Appendix H
Command Interpreter........................................................................................... 519
Command Syntax................................................................................................... 519
Command Usage ................................................................................................... 519
Appendix I
Firewall Commands ............................................................................................. 521
Sys Firewall Commands ........................................................................................ 521
Appendix J
Boot Commands ..................................................................................................523
Appendix K
Log Descriptions.................................................................................................. 525
Log Commands...................................................................................................... 534
Configuring What You Want the Prestige to Log ............................................. 534
Displaying Logs ............................................................................................... 535
Log Command Example......................................................................................... 536
Table of Contents 27
Prestige 2602H/HW Series User’s Guide
Index...................................................................................................................... 537
28 Table of Contents
Prestige 2602H/HW Series User’s Guide

List of Figures

Figure 1 Prestige Internet Access Application ....................................................... 54
Figure 2 Internet Telephony Service Provider Application ..................................... 54
Figure 3 Peer-to-peer Calling ................................................................................. 55
Figure 4 Firewall Application .................................................................................. 55
Figure 5 Prestige LAN-to-LAN Application ............................................................. 56
Figure 6 P2602H-C Series Front Panel ................................................................. 56
Figure 7 P2602HW-C Series Front Panel .............................................................. 56
Figure 8 Password Screen ..................................................................................... 60
Figure 9 Change Password at Login ...................................................................... 60
Figure 10 Web Configurator SITE MAP Screen ................................................... 62
Figure 11 Wizard Setup: First Screen .................................................................... 65
Figure 12 Internet Connection with PPPoE ............................................................ 67
Figure 13 Internet Connection with RFC 1483 ...................................................... 68
Figure 14 Internet Connection with ENET ENCAP ................................................ 68
Figure 15 Internet Connection with PPPoA ............................................................ 69
Figure 16 Wizard Setup: Third Screen .................................................................. 71
Figure 17 Internet Access Wizard Setup: Fourth Screen ....................................... 73
Figure 18 Wizard Setup: LAN Configuration .......................................................... 74
Figure 19 Wizard Setup: Connection Tests ............................................................ 75
Figure 20 Media Bandwidth Mgnt. Wizard Setup: First Screen ............................. 77
Figure 21 Media Bandwidth Mgnt. Wizard Setup: Second Screen (all services
selected) ....................................................................................... 78
Figure 22 Media Bandwidth Mgnt. Wizard Setup: Finish ....................................... 79
Figure 23 Password ............................................................................................... 79
Figure 24 LAN and WAN IP Addresses ................................................................. 81
Figure 25 Any IP Example ..................................................................................... 86
Figure 26 LAN Setup .............................................................................................. 87
Figure 27 LAN: Static DHCP .................................................................................. 89
Figure 28 Wireless Security Methods .................................................................... 93
Figure 29 Wireless Screen ..................................................................................... 94
Figure 30 MAC Address Filter ................................................................................ 96
Figure 31 WPA - PSK Authentication ..................................................................... 98
Figure 32 WPA with RADIUS Application Example2 .............................................. 99
Figure 33 Wireless LAN: 802.1x/WPA: No Access Allowed ................................... 100
Figure 34 Wireless LAN: 802.1x/WPA: No Authentication ..................................... 100
Figure 35 Wireless LAN: 802.1x/WPA: 802.1xl ...................................................... 101
Figure 36 Wireless LAN: 802.1x/WPA: WPA .......................................................... 103
Figure 37 Wireless LAN: 802.1x/WPA:WPA-PSK .................................................. 104
List of Figures 29
Prestige 2602H/HW Series User’s Guide
Figure 38 Local User Database ............................................................................. 105
Figure 39 RADIUS ................................................................................................. 106
Figure 40 Example of Traffic Shaping .................................................................... 113
Figure 41 WAN Setup (PPPoE) ............................................................................. 114
Figure 42 Traffic Redirect Example ........................................................................ 117
Figure 43 Traffic Redirect LAN Setup .................................................................... 117
Figure 44 WAN Backup .......................................................................................... 118
Figure 45 How NAT Works ..................................................................................... 123
Figure 46 NAT Application With IP Alias ................................................................ 123
Figure 47 Multiple Servers Behind NAT Example .................................................. 126
Figure 48 NAT Mode .............................................................................................. 127
Figure 49 Edit SUA/NAT Server Set ...................................................................... 128
Figure 50 Address Mapping Rules ......................................................................... 129
Figure 51 Address Mapping Rule Edit ................................................................... 130
Figure 52 SIP User Agent ...................................................................................... 135
Figure 53 SIP Proxy Server ................................................................................... 136
Figure 54 SIP Redirect Server ............................................................................... 137
Figure 55 SIP Settings ........................................................................................... 139
Figure 56 Voice Advanced Setup ........................................................................... 141
Figure 57 DiffServ: Differentiated Service Field ..................................................... 143
Figure 58 QoS ........................................................................................................ 144
Figure 59 Phone ..................................................................................................... 146
Figure 60 Speed Dial .............................................................................................. 148
Figure 61 Lifeline ................................................................................................... 150
Figure 62 Phone Port Common ............................................................................. 154
Figure 63 Voice Call Forward ................................................................................. 156
Figure 64 Dynamic DNS ........................................................................................ 162
Figure 65 Time and Date ........................................................................................ 164
Figure 66 Prestige Firewall Application .................................................................. 169
Figure 67 Three-Way Handshake .......................................................................... 171
Figure 68 SYN Flood .............................................................................................. 171
Figure 69 Smurf Attack .......................................................................................... 172
Figure 70 Stateful Inspection .................................................................................. 174
Figure 71 LAN to WAN Traffic ................................................................................ 184
Figure 72 WAN to LAN Traffic ................................................................................ 184
Figure 73 Firewall: Default Policy ........................................................................... 185
Figure 74 Firewall: Rule Summary ........................................................................ 187
Figure 75 Firewall: Edit Rule .................................................................................. 189
Figure 76 Firewall: Customized Services ............................................................... 191
Figure 77 Firewall: Configure Customized Services .............................................. 192
Figure 78 Firewall Example: Rule Summary .......................................................... 193
Figure 79 Firewall Example: Edit Rule: Destination Address ................................ 194
Figure 80 Edit Custom Port Example ..................................................................... 194
30 List of Figures
Loading...
+ 520 hidden pages