ZyXEL Prestige 334WT User Guide

P-334WT
802.11g Wireless Broadband Router with Firewall
User’s Guide
Version 3.60
1/2006
P-334WT User’s Guide

Copyright

The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright 3
P-334WT User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Certifications
1 Go to www.zyxel.com.
2 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
3 Select the certification you wish to view from this page.

4 Federal Communications Commission (FCC) Interference Statement

P-334WT User’s Guide

Safety Warnings

For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings 5
P-334WT User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.

ZyXEL Limited Warranty

To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information
www.zyxel.com for global products, or at www.us.zyxel.com for North American products.
at
6 ZyXEL Limited Warranty
P-334WT User’s Guide

Customer Support

Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
NORWAY
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Science Park Hsinchu 300 Ta iw a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Columbusvej 2860 Soeborg Denmark
Malminkaari 10 00700 Helsinki Finland
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
48, Zoldlomb Str. H-1025, Budapest Hungary
43, Dostyk ave.,Office 414 Dostyk Business Centre 050010, Almaty Republic of Kazakhstan
1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
Nils Hansens vei 13 0667 Oslo Norway
Customer Support 7
P-334WT User’s Guide
METHOD
LOCATION
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
A. “+” is the (prefix) number you enter to make an international telephone call.
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
info@pl.zyxel.com +48-22-5286603 www.pl.zyxel.com ZyXEL Communications
+48-22-5206701
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
A
WEB SITE
REGULAR MAIL
ul.Emilli Plater 53 00-113 Warszawa Poland
Ostrovityanova 37a Str. Moscow, 117279 Russia
Alejandro Villegas 33 1º, 28043 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
13, Pimonenko Str. Kiev, 04050 Ukraine
www.zyxel.co.uk ZyXEL Communications UK
Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
8 Customer Support
P-334WT User’s Guide

Table of Contents

Copyright ..................................................................................................................3
Federal Communications Commission (FCC) Interference Statement ............... 4
Safety Warnings ....................................................................................................... 5
ZyXEL Limited Warranty.......................................................................................... 6
Customer Support.................................................................................................... 7
Table of Contents .....................................................................................................9
Preface ....................................................................................................................37
Chapter 1
Getting to Know Your Prestige ............................................................................. 39
1.1 Prestige Overview ..............................................................................................39
1.2 Prestige Features ...............................................................................................39
1.2.1 Physical Features .....................................................................................39
1.2.2 Non-Physical Features .............................................................................40
1.2.3 Wireless Features .....................................................................................43
1.3 Applications for the Prestige ..............................................................................45
1.3.1 Secure Broadband Internet Access via Cable or DSL Modem .................45
1.3.2 VPN Application ........................................................................................45
1.3.3 Wireless LAN Application .........................................................................46
1.3.4 Front Panel LEDs .....................................................................................47
Chapter 2
Introducing the Web Configurator........................................................................ 49
2.1 Web Configurator Overview ...............................................................................49
2.2 Accessing the Prestige Web Configurator .........................................................49
2.3 Resetting the Prestige ........................................................................................50
2.3.1 Procedure to Use the Reset Button ..........................................................50
2.4 Navigating the Prestige Web Configurator ......................................................50
2.4.1 Navigation Panel .......................................................................................53
2.4.2 Summary: Any IP Table ..........................................................................55
2.4.3 Summary: DHCP Table ...........................................................................56
2.4.4 Summary: Parental Controls Statistics ...................................................57
2.4.4.1 General Control Mode and Per-User Control Mode ........................57
2.4.5 Summary: VPN Monitor ..........................................................................59
2.4.6 Summary: Bandwidth Management Monitor ...........................................59
Table of Contents 9
P-334WT User’s Guide
Chapter 3
Connection Wizard................................................................................................. 65
3.1 Wizard Setup ......................................................................................................65
3.2 Connection Wizard: STEP 1: System Information .............................................66
3.3 Connection Wizard: STEP 2: Wireless LAN .......................................................67
3.4 Connection Wizard: STEP 3: Internet Configuration ..........................................71
3.5 Connection Wizard: STEP 4: Bandwidth management ......................................80
3.6 Connection Wizard Complete ............................................................................80
2.4.7 Summary: Packet Statistics .......................................................................60
2.4.8 Summary: Port Isolation ...........................................................................61
2.4.9 Summary: Wireless Station Status .........................................................62
2.4.9.1 WMM QoS .......................................................................................62
3.2.1 System Name ...........................................................................................66
3.2.2 Domain Name ...........................................................................................67
3.3.1 Basic(WEP) Security .................................................................................68
3.3.2 Extend(WPA-PSK or WPA2-PSK) Security ...............................................70
3.3.3 OTIST ........................................................................................................70
3.4.1 Ethernet Connection .................................................................................72
3.4.2 PPPoE Connection ...................................................................................73
3.4.3 PPTP Connection .....................................................................................74
3.4.4 Your IP Address .........................................................................................75
3.4.5 WAN IP Address Assignment ...................................................................76
3.4.6 IP Address and Subnet Mask ...................................................................76
3.4.7 DNS Server Address Assignment .............................................................77
3.4.8 WAN IP and DNS Server Address Assignment .........................................77
3.4.9 WAN MAC Address ...................................................................................79
Chapter 4
Wireless LAN .......................................................................................................... 83
4.1 Introduction ........................................................................................................83
4.2 Wireless Security Overview ...............................................................................83
4.2.1 Encryption .................................................................................................83
4.2.2 Authentication ...........................................................................................83
4.2.3 Restricted Access .....................................................................................84
4.2.4 Hide Prestige Identity ................................................................................84
4.2.5 G-plus .......................................................................................................84
4.2.6 Using OTIST .............................................................................................84
4.3 Configuring Wireless LAN on the Prestige .........................................................84
4.4 General Wireless LAN Screen .......................................................................85
4.4.1 No Security ...............................................................................................86
4.4.2 WEP Encryption ........................................................................................87
4.4.3 Static WEP Encryption ..............................................................................87
10 Table of Contents
P-334WT User’s Guide
4.4.4 Introduction to WPA and WPA2 ................................................................89
4.4.5 WPA(2)-PSK Application Example ...........................................................89
4.4.6 WPA-PSK/WPA2-PSK Authentication Screen ..........................................89
4.4.7 Wireless Client WPA Supplicants .............................................................91
4.4.8 WPA(2) with RADIUS Application Example ..............................................91
4.4.9 WPA/WPA2 Authentication Screen ...........................................................92
4.4.10 IEEE 802.1x Overview ............................................................................94
4.4.11 IEEE 802.1x and Dynamic WEP Key Exchange .....................................94
4.4.12 IEEE 802.1x and Static WEP Key Exchange ..........................................95
4.4.13 IEEE 802.1x + no WEP ..........................................................................98
4.5 OTIST .................................................................................................................99
4.5.1 Activating OTIST .....................................................................................100
4.6 MAC Filter ........................................................................................................101
4.7 Wireless LAN Advanced Screen ......................................................................102
4.8 WMM QoS ........................................................................................................104
4.8.1 WMM QoS Example ...............................................................................104
4.8.2 WMM QoS Priorities ...............................................................................105
4.8.3 Services ..................................................................................................105
4.9 QoS Screen ......................................................................................................107
4.9.1 ToS (Type of Service) and WMM QoS ....................................................107
4.10 Application Priority Configuration Screen .......................................................109
Chapter 5
WAN........................................................................................................................111
5.1 WAN Overview ................................................................................................. 111
5.2 TCP/IP Priority (Metric) .................................................................................... 111
5.3 WAN MAC Address .......................................................................................... 111
5.4 WAN ISP Screen ..............................................................................................112
5.4.1 Ethernet Encapsulation ........................................................................... 112
5.4.2 PPPoE Encapsulation .............................................................................113
5.4.3 PPTP Encapsulation ...............................................................................116
5.5 Advanced WAN Screen .................................................................................... 119
5.6 Traffic Redirect .................................................................................................121
5.7 Traffic Redirect Screen .....................................................................................122
Chapter 6
LAN........................................................................................................................123
6.1 LAN Overview ..................................................................................................123
6.1.1 IP Pool Setup ..........................................................................................123
6.1.2 System DNS Servers ..............................................................................123
6.2 LAN TCP/IP ......................................................................................................123
6.2.1 Factory LAN Defaults ..............................................................................123
6.2.2 IP Address and Subnet Mask .................................................................124
Table of Contents 11
P-334WT User’s Guide
6.3 Any IP ...............................................................................................................125
6.4 IP Screen .........................................................................................................126
6.5 LAN IP Alias ....................................................................................................127
6.6 Advanced LAN Screen .....................................................................................128
Chapter 7
DHCP Server......................................................................................................... 131
7.1 DHCP ...............................................................................................................131
7.2 DHCP Screen ...................................................................................................131
7.3 Static DHCP Screen .........................................................................................132
7.4 Client List Screen .............................................................................................133
Chapter 8
Network Address Translation (NAT)...................................................................135
6.2.3 RIP Setup ...............................................................................................124
6.2.4 Multicast ..................................................................................................124
6.3.1 How Any IP Works ..................................................................................126
8.1 NAT Overview ...............................................................................................135
8.1.1 NAT Definitions .......................................................................................135
8.1.2 What NAT Does ......................................................................................136
8.1.3 How NAT Works .....................................................................................136
8.1.4 NAT Application ......................................................................................137
8.1.5 NAT Mapping Types ...............................................................................137
8.2 Using NAT ........................................................................................................138
8.2.1 SUA (Single User Account) Versus NAT ................................................138
8.3 SUA Server ......................................................................................................138
8.3.1 Default Server IP Address ......................................................................139
8.3.2 Port Forwarding: Services and Port Numbers ........................................139
8.3.3 Configuring Servers Behind SUA (Example) ..........................................140
8.4 General NAT Screen ........................................................................................140
8.5 Port Forwarding Screen ...................................................................................141
8.5.1 Port Forwarding Rule Setup ..................................................................143
8.6 Trigger Port Forwarding ...................................................................................143
8.6.1 Trigger Port Forwarding Example ...........................................................144
8.6.2 Two Points To Remember About Trigger Ports .......................................144
8.7 Trigger Port Forwarding Screen .......................................................................145
Chapter 9
Firewall..................................................................................................................147
9.1 Introduction to Firewall .....................................................................................147
9.1.1 What is a Firewall? .................................................................................147
9.1.2 Stateful Inspection Firewall. ....................................................................147
9.1.3 About the Prestige Firewall .....................................................................147
12 Table of Contents
P-334WT User’s Guide
9.1.4 Guidelines For Enhancing Security With Your Firewall ..........................148
9.2 General Firewall Screen ...................................................................................148
9.3 Services Screen ..............................................................................................149
Chapter 10
Content Filtering ................................................................................................. 153
10.1 Introduction to Content Filtering .....................................................................153
10.2 Restrict Web Features ...................................................................................153
10.3 Days and Times .............................................................................................153
10.4 Filter Screen ...................................................................................................153
10.5 Schedule ........................................................................................................155
10.6 Customizing Keyword Blocking URL Checking ..............................................156
10.6.1 Domain Name or IP Address URL Checking ........................................156
10.6.2 Full Path URL Checking .......................................................................156
10.6.3 File Name URL Checking .....................................................................157
Chapter 11
Introduction to IPSec ........................................................................................... 159
11.1 VPN Overview ................................................................................................159
11.1.1 IPSec ....................................................................................................159
11.1.2 Security .................................................................................................159
11.1.3 Other Terminology .................................................................................159
11.1.3.1 Encryption ....................................................................................159
11.1.3.2 Data Confidentiality .....................................................................160
11.1.3.3 Data Integrity ...............................................................................160
11.1.3.4 Data Origin Authentication ...........................................................160
11.1.4 VPN Applications ..................................................................................160
11.2 IPSec Architecture ..........................................................................................160
11.2.1 IPSec Algorithms ..................................................................................161
11.2.2 Key Management ..................................................................................161
11.3 Encapsulation .................................................................................................161
11.3.1 Transport Mode .....................................................................................162
11.3.2 Tunnel Mode .........................................................................................162
11.4 IPSec and NAT ...............................................................................................162
Chapter 12
VPN Screens.......................................................................................................165
12.1 VPN/IPSec Overview .....................................................................................165
12.2 IPSec Algorithms ............................................................................................165
12.2.1 AH (Authentication Header) Protocol ....................................................165
12.2.2 ESP (Encapsulating Security Payload) Protocol ..................................165
12.3 My IP Address ................................................................................................166
12.4 Secure Gateway Address ..............................................................................166
Table of Contents 13
P-334WT User’s Guide
12.5 VPN Summary Screen ...................................................................................167
12.6 Keep Alive ......................................................................................................168
12.7 NAT Traversal ................................................................................................169
12.8 ID Type and Content ......................................................................................170
12.9 Pre-Shared Key ..............................................................................................172
12.10 VPN Rules ....................................................................................................172
12.11 IKE Phases ..................................................................................................176
12.12 Advanced Rule Setup Screen ......................................................................178
12.13 Manual Key ..................................................................................................182
12.14 Manual Key Screen ......................................................................................183
12.15 SA Monitor Screen .......................................................................................185
12.16 Global Setting Screen ..................................................................................186
12.17 Telecommuter VPN/IPSec Examples ...........................................................187
12.18 VPN and Remote Management ...................................................................189
12.4.1 Dynamic Secure Gateway Address ......................................................167
12.7.1 NAT Traversal Configuration .................................................................169
12.7.2 Remote DNS Server .............................................................................169
12.8.1 ID Type and Content Examples ............................................................171
12.11.1 Negotiation Mode ................................................................................177
12.11.2 Diffie-Hellman (DH) Key Groups .........................................................177
12.11.3 Perfect Forward Secrecy (PFS) ..........................................................177
12.13.1 Security Parameter Index (SPI) ..........................................................182
12.17.1 Telecommuters Sharing One VPN Rule Example ..............................187
12.17.2 Telecommuters Using Unique VPN Rules Example ...........................188
Chapter 13
Trend Micro Home Network Security (TMSS) ....................................................191
13.1 Trend Micro Home Network Security Overview .............................................191
13.2 Installing the Trend Micro Dashboard ............................................................192
13.2.1 Installing the Trend Micro Dashboard: Troubleshooting ........................193
13.3 Activating Your Free Services ........................................................................194
13.3.1 Registering a Trend Micro Customer Account.......................................195
13.3.2 Installing Trend Micro Internet Security .................................................197
13.3.3 Registering Trend Micro Internet Security .............................................200
13.4 TMSS Settings ...............................................................................................201
13.4.1 TMSS General Screen ..........................................................................201
13.4.2 Exception List Screen ..........................................................................202
13.4.3 Virus Protection Screen .......................................................................204
13.4.4 Parental Control Screen ......................................................................205
13.4.4.1 General Control Mode and Per-User Control Mode ....................205
13.4.4.2 Parents Override Password ........................................................206
13.4.5 Configuring an Access Profile in General Control Mode ......................208
13.4.6 Configuring a Schedule ........................................................................209
14 Table of Contents
P-334WT User’s Guide
13.4.7 Configuring the User List in Per-User Mode .........................................210
13.4.8 Content Blocking Categories .................................................................211
13.5 Port Isolation .................................................................................................212
Chapter 14
Static Route Screens ...........................................................................................215
14.1 Static Route Overview ....................................................................................215
14.2 IP Static Route Screen ...................................................................................215
14.2.1 Static Route Setup Screen ...................................................................216
Chapter 15
Bandwidth Management......................................................................................219
15.1 Bandwidth Management Overview ...............................................................219
15.2 Application-based Bandwidth Management ...................................................219
15.3 Subnet-based Bandwidth Management .........................................................219
15.4 Application and Subnet-based Bandwidth Management ...............................220
15.5 Bandwidth Management Priorities ................................................................221
15.6 Predefined Bandwidth Management Services ...............................................221
15.6.1 Services and Port Numbers ..................................................................222
15.7 Default Bandwidth Management Classes and Priorities ................................224
15.8 Bandwidth Management General Configuration ...........................................224
15.9 Bandwidth Management Advanced Configuration ........................................225
15.9.1 Rule Configuration with the Pre-defined Service ................................227
15.9.2 Rule Configuration with the User-defined Service ..............................228
15.10 Bandwidth Management Monitor ..............................................................229
Chapter 16
Remote Management Screens ............................................................................ 231
16.1 Remote Management Overview .....................................................................231
16.1.1 Remote Management Limitations .........................................................231
16.1.2 Remote Management and NAT ............................................................232
16.1.3 System Timeout ...................................................................................232
16.2 WWW Screen ..............................................................................................232
16.3 Telnet ..............................................................................................................233
16.4 Telnet Screen .................................................................................................233
16.5 FTP Screen ....................................................................................................234
16.6 SNMP .............................................................................................................235
16.6.1 Supported MIBs ....................................................................................237
16.6.2 SNMP Traps .........................................................................................237
16.7 SNMP Screen ................................................................................................237
16.8 DNS Screen ................................................................................................238
16.9 Security Screen ............................................................................................239
Table of Contents 15
P-334WT User’s Guide
Chapter 17
UPnP...................................................................................................................... 241
17.1 Universal Plug and Play Overview ................................................................241
17.2 UPnP and ZyXEL ...........................................................................................242
17.3 UPnP Screen .................................................................................................242
17.4 Installing UPnP in Windows Example ............................................................243
17.5 Using UPnP in Windows XP Example ...........................................................245
Chapter 18
System .................................................................................................................. 251
17.1.1 How Do I Know If I'm Using UPnP? ......................................................241
17.1.2 NAT Traversal .......................................................................................241
17.1.3 Cautions with UPnP ..............................................................................241
17.4.1 Installing UPnP in Windows Me ............................................................243
17.4.2 Installing UPnP in Windows XP ............................................................244
17.5.1 Auto-discover Your UPnP-enabled Network Device .............................246
17.5.2 Web Configurator Easy Access ............................................................247
17.5.3 Web Configurator Easy Access ............................................................248
18.1 System Overview ...........................................................................................251
18.2 System General Screen ...............................................................................251
18.3 Dynamic DNS .................................................................................................252
18.3.1 DynDNS Wildcard .................................................................................252
18.4 Dynamic DNS Screen ....................................................................................252
18.5 Time Setting Screen .......................................................................................254
Chapter 19
Logs....................................................................................................................... 257
19.1 View Log .......................................................................................................257
19.2 Log Settings ...................................................................................................258
Chapter 20
Tools ...................................................................................................................... 261
20.1 Firmware Upload Screen ...............................................................................261
20.2 Configuration Screen .....................................................................................262
20.2.1 Backup Configuration ...........................................................................263
20.2.2 Restore Configuration ...........................................................................263
20.2.3 Back to Factory Defaults .......................................................................264
20.3 Restart Screen ...............................................................................................265
Chapter 21
Introducing the SMT ............................................................................................267
21.1 SMT Introduction ............................................................................................267
21.1.1 Procedure for SMT Configuration via Telnet .........................................267
16 Table of Contents
P-334WT User’s Guide
21.1.2 Entering Password ................................................................................267
21.1.3 Prestige SMT Menu Overview ..............................................................268
21.2 Navigating the SMT Interface .........................................................................269
21.2.1 System Management Terminal Interface Summary ..............................271
21.3 Changing the System Password ....................................................................271
Chapter 22
Menu 1 General Setup ......................................................................................... 273
22.1 General Setup ................................................................................................273
22.2 Procedure To Configure Menu 1 ....................................................................273
22.2.1 Procedure to Configure Dynamic DNS .................................................275
Chapter 23
Menu 2 WAN Setup ..............................................................................................277
23.1 WAN Setup .....................................................................................................277
Chapter 24
Menu 3 LAN Setup ...............................................................................................279
24.1 LAN Setup ......................................................................................................279
24.1.1 General Ethernet Setup ........................................................................279
24.2 Protocol Dependent Ethernet Setup ..............................................................280
24.3 TCP/IP Ethernet Setup and DHCP ................................................................280
24.3.1 IP Alias Setup .......................................................................................282
24.4 Wireless LAN Setup .......................................................................................283
24.4.1 Configuring MAC Address Filter ...........................................................285
24.4.2 Configuring Roaming on the Prestige ...................................................286
Chapter 25
Internet Access .................................................................................................... 287
25.1 Introduction to Internet Access Setup ............................................................287
25.2 Ethernet Encapsulation ..................................................................................287
25.3 Configuring the PPTP Client ..........................................................................289
25.4 Configuring the PPPoE Client ........................................................................289
25.5 Basic Setup Complete ....................................................................................290
Chapter 26
Remote Node Configuration ...............................................................................291
26.1 Introduction to Remote Node Setup ...............................................................291
26.2 Remote Node Profile Setup ...........................................................................291
26.2.1 Ethernet Encapsulation .........................................................................291
26.2.2 PPPoE Encapsulation ...........................................................................293
26.2.2.1 Outgoing Authentication Protocol ................................................293
26.2.2.2 Nailed-Up Connection .................................................................294
Table of Contents 17
P-334WT User’s Guide
26.3 Edit IP .............................................................................................................295
26.4 Remote Node Filter ........................................................................................297
Chapter 27
Static Route Setup ...............................................................................................301
27.1 IP Static Route Setup .....................................................................................301
Chapter 28
Network Address Translation (NAT)...................................................................303
28.1 Using NAT ......................................................................................................303
28.2 Applying NAT .................................................................................................303
28.3 NAT Setup ......................................................................................................305
28.4 Configuring a Server behind NAT ..................................................................309
28.5 General NAT Examples ..................................................................................310
28.6 Configuring Trigger Port Forwarding .............................................................316
26.2.3 PPTP Encapsulation .............................................................................294
26.4.1 Traffic Redirect Setup ...........................................................................298
28.1.1 SUA (Single User Account) Versus NAT ..............................................303
28.3.1 Address Mapping Sets ..........................................................................305
28.3.1.1 User-Defined Address Mapping Sets ..........................................306
28.3.1.2 Ordering Your Rules ....................................................................307
28.5.1 Example 1: Internet Access Only ..........................................................310
28.5.2 Example 2: Internet Access with an Inside Server ............................... 311
28.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............312
28.5.4 Example 4: NAT Unfriendly Application Programs ...............................315
Chapter 29
Enabling the Firewall ...........................................................................................319
29.1 Remote Management and the Firewall ..........................................................319
29.2 Access Methods .............................................................................................319
29.3 Enabling the Firewall ......................................................................................319
Chapter 30
Filter Configuration..............................................................................................321
30.1 Introduction to Filters ......................................................................................321
30.1.1 The Filter Structure of the Prestige .......................................................322
30.2 Configuring a Filter Set ..................................................................................323
30.2.1 Configuring a Filter Rule .......................................................................325
30.2.2 Configuring a TCP/IP Filter Rule ..........................................................325
30.2.3 Configuring a Generic Filter Rule .........................................................328
30.3 Example Filter ................................................................................................330
30.4 Filter Types and NAT ......................................................................................332
30.5 Firewall Versus Filters ....................................................................................333
18 Table of Contents
P-334WT User’s Guide
30.6 Applying a Filter ............................................................................................333
30.6.1 Applying LAN Filters .............................................................................333
30.6.2 Applying Remote Node Filters ..............................................................334
Chapter 31
SNMP Configuration ............................................................................................335
31.1 About SNMP ..................................................................................................335
31.2 Supported MIBs ............................................................................................336
31.3 SNMP Configuration ......................................................................................336
31.4 SNMP Traps ...................................................................................................337
Chapter 32
System Security ...................................................................................................339
32.1 System Security .............................................................................................339
32.2 System Password ..........................................................................................339
32.3 Configuring External RADIUS Server ............................................................339
32.4 IEEE 802.1x ...................................................................................................341
Chapter 33
System Information and Diagnosis .................................................................... 343
33.1 System Status ................................................................................................343
33.2 System Information ........................................................................................345
33.2.1 System Information ...............................................................................345
33.2.2 Console Port Speed ..............................................................................346
33.3 Log and Trace ................................................................................................346
33.3.1 Syslog Logging .....................................................................................346
33.3.1.1 CDR ............................................................................................348
33.3.1.2 Packet triggered ..........................................................................348
33.3.1.3 Filter log .....................................................................................349
33.3.1.4 PPP log ......................................................................................349
33.3.1.5 Firewall log ..................................................................................350
33.3.2 Call-Triggering Packet ..........................................................................350
33.4 Diagnostic ......................................................................................................351
33.4.1 WAN DHCP ..........................................................................................352
Chapter 34
Firmware and Configuration File Maintenance ................................................. 355
34.1 Filename Conventions ...................................................................................355
34.2 Backup Configuration .....................................................................................356
34.2.1 Backup Configuration ...........................................................................356
34.2.2 Using the FTP Command from the Command Line ..............................357
34.2.3 Example of FTP Commands from the Command Line .........................357
34.2.4 GUI-based FTP Clients .........................................................................357
Table of Contents 19
P-334WT User’s Guide
34.3 Restore Configuration ....................................................................................359
34.4 Uploading Firmware and Configuration Files .................................................361
Chapter 35
System Maintenance............................................................................................ 365
34.2.5 TFTP and FTP over WAN Management Limitations .............................358
34.2.6 Backup Configuration Using TFTP .......................................................358
34.2.7 TFTP Command Example ....................................................................358
34.2.8 GUI-based TFTP Clients ......................................................................359
34.3.1 Restore Using FTP ...............................................................................359
34.3.2 Restore Using FTP Session Example ..................................................360
34.4.1 Firmware File Upload ............................................................................361
34.4.2 Configuration File Upload .....................................................................361
34.4.3 FTP File Upload Command from the DOS Prompt Example ................362
34.4.4 FTP Session Example of Firmware File Upload ...................................363
34.4.5 TFTP File Upload ..................................................................................363
34.4.6 TFTP Upload Command Example ........................................................363
35.1 Command Interpreter Mode ...........................................................................365
35.1.1 Command Syntax .................................................................................365
35.1.2 Command Usage ..................................................................................366
35.2 Call Control Support .......................................................................................366
35.2.1 Budget Management ............................................................................366
35.2.2 Call History ...........................................................................................367
35.3 Time and Date Setting ....................................................................................368
35.3.1 Resetting the Time ................................................................................370
Chapter 36
Remote Management ........................................................................................... 371
36.1 Remote Management .....................................................................................371
36.1.1 Remote Management Limitations .........................................................372
Chapter 37
Call Scheduling ....................................................................................................373
37.1 Introduction to Call Scheduling ......................................................................373
Chapter 38
VPN/IPSec Setup .................................................................................................. 377
38.1 VPN/IPSec Overview .....................................................................................377
38.2 IPSec Summary Screen .................................................................................378
38.3 IKE Setup .......................................................................................................383
38.4 Manual Setup .................................................................................................384
38.4.1 Active Protocol ......................................................................................385
38.4.2 Security Parameter Index (SPI) ............................................................385
20 Table of Contents
P-334WT User’s Guide
Chapter 39
SA Monitor ............................................................................................................ 387
39.1 SA Monitor Overview .....................................................................................387
39.2 Using SA Monitor ...........................................................................................387
Chapter 40
Troubleshooting ................................................................................................... 389
40.1 Problems Starting Up the Prestige .................................................................389
40.2 Problems with the LAN ...................................................................................389
40.3 Problems with the WAN .................................................................................390
40.4 Problems Accessing the Prestige ..................................................................391
40.5 Problems with Restricted Web Pages and Keyword Blocking .......................391
40.5.1 Pop-up Windows, JavaScripts and Java Permissions ..........................392
40.5.1.1 Internet Explorer Pop-up Blockers ..............................................393
40.5.1.2 JavaScripts ..................................................................................396
40.5.1.3 Java Permissions ........................................................................398
40.5.2 ActiveX Controls in Internet Explorer ....................................................400
Appendix A
Setting up Your Computer’s IP Address............................................................ 403
40.5.3 Verifying Settings ..................................................................................418
Appendix B
IP Subnetting ........................................................................................................ 419
Appendix C
PPPoE ................................................................................................................... 427
Appendix D
PPTP...................................................................................................................... 429
Appendix E
Wireless LANs ...................................................................................................... 433
Appendix F
Log Descriptions.................................................................................................. 443
Appendix G
Wall-mounting Instructions................................................................................. 459
Table of Contents 21
P-334WT User’s Guide
22 Table of Contents
P-334WT User’s Guide

List of Figures

Figure 1 Secure Internet Access via Cable, DSL or Wireless Modem ................................ 45
Figure 2 VPN Application .................................................................................................... 46
Figure 3 Internet Access Application Example .................................................................... 46
Figure 4 P-334WT Front Panel ........................................................................................... 47
Figure 5 Change Password Screen .................................................................................... 50
Figure 6 Web Configurator Status Screen .......................................................................... 51
Figure 7 Summary: Any IP Table ........................................................................................ 56
Figure 8 Summary: DHCP Table ......................................................................................... 56
Figure 9 Summary: Parental Control Statistics ................................................................... 58
Figure 10 Summary: VPN Monitor ...................................................................................... 59
Figure 11 Summary: BW MGMT Monitor ............................................................................ 60
Figure 12 Summary: Packet Statistics ................................................................................ 60
Figure 13 Summary: Port Isolation ...................................................................................... 62
Figure 14 Summary: Wireless Association List ................................................................... 63
Figure 15 Select Wizard or Advanced Mode ....................................................................... 65
Figure 16 Select a Language .............................................................................................. 66
Figure 17 Welcome to the Connection Wizard .................................................................... 66
Figure 18 Wizard Step 1: System Information ..................................................................... 67
Figure 19 Wizard Step 2: Wireless LAN .............................................................................. 68
Figure 20 Wizard Step 2: Basic(WEP) Security .................................................................. 69
Figure 21 Wizard Step 2: Extend(WPA-PSK or WPA2-PSK) Security ................................ 70
Figure 22 Wizard Step 2: OTIST ......................................................................................... 71
Figure 23 Wizard Step 3: ISP Parameters. ......................................................................... 72
Figure 24 Wizard Step 3: Ethernet Connection ................................................................... 72
Figure 25 Wizard Step 3: PPPoE Connection ..................................................................... 73
Figure 26 Wizard Step 3: PPTP Connection ....................................................................... 74
Figure 27 Wizard Step 3: Your IP Address .......................................................................... 75
Figure 28 Wizard Step 3: WAN IP and DNS Server Addresses .......................................... 78
Figure 29 Wizard Step 3: WAN MAC Address .................................................................... 79
Figure 30 Wizard Step 4: Bandwidth Management ............................................................ 80
Figure 31 Connection Wizard Save ................................................................................... 81
Figure 32 Connection Wizard Complete ............................................................................. 81
Figure 33 Wireless ............................................................................................................. 85
Figure 34 Wireless: No Security .......................................................................................... 86
Figure 35 Wireless: Static WEP Encryption ........................................................................ 88
Figure 36 WPA(2)-PSK Authentication ............................................................................... 89
List of Figures 23
P-334WT User’s Guide
Figure 37 Wireless: WPA-PSK/WPA2-PSK ......................................................................... 90
Figure 38 WPA(2) with RADIUS Application Example ........................................................ 92
Figure 39 Wireless: WPA/WPA2 ......................................................................................... 92
Figure 40 Wireless: 802.1x and Dynamic WEP .................................................................. 94
Figure 41 Wireless: 802.1x and Static WEP ....................................................................... 96
Figure 42 Wireless: 802.1x ................................................................................................. 98
Figure 43 OTIST ................................................................................................................. 100
Figure 44 OTIST Start ......................................................................................................... 101
Figure 45 OTIST Process ................................................................................................... 101
Figure 46 MAC Address Filter ............................................................................................. 102
Figure 47 Advanced ............................................................................................................ 103
Figure 48 QoS ..................................................................................................................... 108
Figure 49 Application Priority Configuration ........................................................................ 109
Figure 50 Ethernet Encapsulation ....................................................................................... 112
Figure 51 PPPoE Encapsulation ......................................................................................... 114
Figure 52 PPTP Encapsulation ........................................................................................... 117
Figure 53 Advanced ............................................................................................................ 119
Figure 54 Traffic Redirect WAN Setup ................................................................................ 121
Figure 55 Traffic Redirect LAN Setup ................................................................................. 121
Figure 56 WAN: Traffic Redirect .......................................................................................... 122
Figure 57 Any IP Example Application ................................................................................ 125
Figure 58 LAN IP ................................................................................................................. 126
Figure 59 LAN IP Alias ........................................................................................................ 127
Figure 60 Advanced ............................................................................................................ 129
Figure 61 General ............................................................................................................... 131
Figure 62 Static DHCP ........................................................................................................ 133
Figure 63 Client List ............................................................................................................ 134
Figure 64 How NAT Works .................................................................................................. 136
Figure 65 NAT Application With IP Alias ............................................................................. 137
Figure 66 Multiple Servers Behind NAT Example ............................................................... 140
Figure 67 NAT General ....................................................................................................... 141
Figure 68 Port Forwarding .................................................................................................. 142
Figure 69 Port Forwarding Rule Setup ................................................................................ 143
Figure 70 Trigger Port Forwarding Process: Example ........................................................ 144
Figure 71 Trigger Port .........................................................................................................145
Figure 72 General ............................................................................................................... 148
Figure 73 Services .............................................................................................................. 150
Figure 74 Content Filter Disabled ....................................................................................... 153
Figure 75 Content Filter: Filter ............................................................................................ 154
Figure 76 Content Filter: Schedule ..................................................................................... 155
Figure 77 Encryption and Decryption .................................................................................. 160
Figure 78 IPSec Architecture .............................................................................................. 161
Figure 79 Transport and Tunnel Mode IPSec Encapsulation .............................................. 162
24 List of Figures
P-334WT User’s Guide
Figure 80 IPSec Summary Fields ....................................................................................... 167
Figure 81 VPN Summary .................................................................................................... 167
Figure 82 NAT Router Between IPSec Routers .................................................................. 169
Figure 83 VPN Host using Intranet DNS Server Example .................................................. 170
Figure 84 Mismatching ID Type and Content Configuration Example ................................ 172
Figure 85 VPN Rule Setup .................................................................................................. 173
Figure 86 Two Phases to Set Up the IPSec SA .................................................................. 176
Figure 87 Advanced Rule Setup ......................................................................................... 178
Figure 88 Rule Setup with Manual Key ............................................................................... 183
Figure 89 SA Monitor .......................................................................................................... 186
Figure 90 Global Setting ..................................................................................................... 186
Figure 91 Telecommuters Sharing One VPN Rule Example ............................................... 188
Figure 92 Telecommuters Using Unique VPN Rules Example ........................................... 189
Figure 93 TMSS First Time Access ..................................................................................... 192
Figure 94 Security Warning Message Box .......................................................................... 192
Figure 95 Trend Micro Dashboard) ..................................................................................... 193
Figure 96 Dashboard Service Summary Screen ................................................................. 195
Figure 97 3 Steps Screen .................................................................................................... 196
Figure 98 Account Registration Screen .............................................................................. 196
Figure 99 Download Now Screen ....................................................................................... 198
Figure 100 Registration Information Screen ....................................................................... 199
Figure 101 Trend Micro Internet Security Registration Screen ........................................... 200
Figure 102 TMSS General Screen ...................................................................................... 201
Figure 103 Exception List Screen ....................................................................................... 203
Figure 104 Virus Protection Screen .................................................................................... 204
Figure 105 Parental Control Screen: General Control Mode .............................................. 206
Figure 106 Parental Control Screen: Per-User Control Mode ............................................. 207
Figure 107 General Mode: Edit Category ........................................................................... 209
Figure 108 General Mode: Edit Schedule ........................................................................... 210
Figure 109 Per-User Control Mode: Edit User List .............................................................. 211
Figure 110 Port Isolation Example ...................................................................................... 213
Figure 111 Port Isolation ..................................................................................................... 213
Figure 112 Example of Static Routing Topology .................................................................. 215
Figure 113 IP Static Route .................................................................................................. 216
Figure 114 Static Route Setup ............................................................................................ 217
Figure 115 Subnet-based Bandwidth Management Example ............................................. 220
Figure 116 Bandwidth Management: General ..................................................................... 225
Figure 117 Bandwidth Management: Advanced ................................................................. 226
Figure 118 Bandwidth Management Rule Configuration: Pre-defined Service ................... 227
Figure 119 Bandwidth Management Rule Configuration: User-defined Service ................. 228
Figure 120 Bandwidth Management: Monitor ..................................................................... 229
Figure 121 WWW Remote Management ............................................................................ 232
Figure 122 Telnet Configuration on a TCP/IP Network ....................................................... 233
List of Figures 25
P-334WT User’s Guide
Figure 123 Telnet Remote Management ............................................................................. 234
Figure 124 FTP Remote Management ................................................................................ 234
Figure 125 SNMP Management Model ............................................................................... 236
Figure 126 SNMP Remote Management ............................................................................ 237
Figure 127 DNS Remote Management ............................................................................... 238
Figure 128 Security Remote Management ......................................................................... 239
Figure 129 Configuring UPnP ............................................................................................. 242
Figure 130 System General ............................................................................................... 251
Figure 131 Dynamic DNS ................................................................................................... 253
Figure 132 Time Setting ...................................................................................................... 254
Figure 133 View Log ........................................................................................................... 257
Figure 134 Log Settings ...................................................................................................... 259
Figure 135 Maintenance Firmware Upload ......................................................................... 261
Figure 136 Upload Warning ................................................................................................ 262
Figure 137 Network Temporarily Disconnected .................................................................. 262
Figure 138 Upload Error Message ...................................................................................... 262
Figure 139 Configuration ..................................................................................................... 263
Figure 140 Configuration Restore Successful ..................................................................... 264
Figure 141 Temporarily Disconnected ................................................................................. 264
Figure 142 Configuration Restore Error .............................................................................. 264
Figure 143 System Restart ................................................................................................. 265
Figure 144 Login Screen ..................................................................................................... 267
Figure 145 SMT Main Menu ................................................................................................ 270
Figure 146 Menu 23 System Password .............................................................................. 272
Figure 147 Menu 1 General Setup. ..................................................................................... 274
Figure 148 Menu 1.1 Configure Dynamic DNS .................................................................. 275
Figure 149 Menu 2 WAN Setu ............................................................................................ 277
Figure 150 Menu 3 LAN Setup ............................................................................................ 279
Figure 151 Menu 3.1 LAN Port Filter Setup. ....................................................................... 279
Figure 152 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 280
Figure 153 Physical Network & Partitioned Logical Networks ............................................ 282
Figure 154 Menu 3.2.1: IP Alias Setup ............................................................................... 282
Figure 155 Menu 3.5: Wireless LAN Setup ......................................................................... 283
Figure 156 Menu 3.5.1: WLAN MAC Address Filter ........................................................... 285
Figure 157 Menu 3.5.2: Roaming Configuration ................................................................. 286
Figure 158 Menu 4 Internet Access Setup .......................................................................... 287
Figure 159 Internet Access Setup (PPTP) ......................................................................... 289
Figure 160 Internet Access Setup (PPPoE) ........................................................................ 290
Figure 161 Menu 11.1 Remote Node Profile for Ethernet Encapsulation ............................ 292
Figure 162 Menu 11.1 Remote Node Profile for PPPoE Encapsulation .............................. 293
Figure 163 Menu 11.1 Remote Node Profile for PPTP Encapsulation ................................ 295
Figure 164 Menu 11.3 Remote Node Network Layer Options for Ethernet Encapsulation . 296
Figure 165 Menu 11.5: Remote Node Filter (Ethernet Encapsulation) ................................ 297
26 List of Figures
P-334WT User’s Guide
Figure 166 Menu 11.5: Remote Node Filter (PPPoE or PPTP Encapsulation) ................... 298
Figure 167 Menu 11.6: Traffic Redirect Setup .................................................................... 298
Figure 168 Menu 12 IP Static Route Setup ........................................................................ 301
Figure 169 Menu12.1 Edit IP Static Route .......................................................................... 301
Figure 170 Menu 4: Applying NAT for Internet Access ....................................................... 304
Figure 171 Menu 11.3 Applying NAT to the Remote Node ................................................. 304
Figure 172 Menu 15 NAT Setup .......................................................................................... 305
Figure 173 Menu 15.1 Address Mapping Sets .................................................................... 305
Figure 174 Menu 15.1.255 SUA Address Mapping Rules ................................................. 306
Figure 175 Menu 15.1.1 First Set ........................................................................................ 307
Figure 176 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ......................... 308
Figure 177 Menu 15.2.1 NAT Server Setup ........................................................................ 309
Figure 178 Multiple Servers Behind NAT Example ............................................................. 310
Figure 179 NAT Example 1 ................................................................................................. 310
Figure 180 Menu 4 Internet Access & NAT Example ......................................................... 311
Figure 181 NAT Example 2 ................................................................................................. 311
Figure 182 Menu 15.2.1 Specifying an Inside Server ......................................................... 312
Figure 183 NAT Example 3 ................................................................................................. 313
Figure 184 NAT Example 3: Menu 11.3 .............................................................................. 313
Figure 185 Example 3: Menu 15.1.1.1 ............................................................................... 314
Figure 186 Example 3: Final Menu 15.1.1 .......................................................................... 314
Figure 187 Example 3: Menu 15.2 ...................................................................................... 315
Figure 188 NAT Example 4 ................................................................................................. 315
Figure 189 Example 4: Menu 15.1.1.1 Address Mapping Rule. .......................................... 316
Figure 190 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ 316
Figure 191 Menu 15.3 Trigger Port Setup ........................................................................... 317
Figure 192 Menu 21.2 Firewall Setup ................................................................................. 320
Figure 193 Outgoing Packet Filtering Process .................................................................... 321
Figure 194 Filter Rule Process ............................................................................................ 323
Figure 195 Menu 21: Filter and Firewall Setup ................................................................... 324
Figure 196 Menu 21.1: Filter Set Configuration .................................................................. 324
Figure 197 Menu 21.1.1.1 TCP/IP Filter Rule. .................................................................... 326
Figure 198 Executing an IP Filter ........................................................................................ 328
Figure 199 Menu 21.1.4.1 Generic Filter Rule .................................................................... 329
Figure 200 Telnet Filter Example ........................................................................................ 330
Figure 201 Example Filter: Menu 21.1.3.1 .......................................................................... 331
Figure 202 Example Filter Rules Summary: Menu 21.1.3 .................................................. 332
Figure 203 Protocol and Device Filter Sets ......................................................................... 333
Figure 204 Filtering LAN Traffic .......................................................................................... 333
Figure 205 Filtering Remote Node Traffic ........................................................................... 334
Figure 206 SNMP Management Model ............................................................................... 335
Figure 207 Menu 22 SNMP Configuration .......................................................................... 336
Figure 208 Menu 23 System Security ................................................................................. 339
List of Figures 27
P-334WT User’s Guide
Figure 209 Menu 23.2 System Security : RADIUS Server .................................................. 340
Figure 210 Menu 23.4 System Security : IEEE802.1x ........................................................ 341
Figure 211 Menu 24 System Maintenance .......................................................................... 343
Figure 212 Menu 24.1 System Maintenance : Status ......................................................... 344
Figure 213 Menu 24.2 System Information and Console Port Speed ............................... 345
Figure 214 Menu 24.2.1 System Maintenance : Information ............................................. 345
Figure 215 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... 346
Figure 216 Menu 24.3.2 System Maintenance : Syslog Logging ........................................ 347
Figure 217 Call-Triggering Packet Example ........................................................................ 351
Figure 218 Menu 24.4 System Maintenance : Diagnostic ................................................... 352
Figure 219 LAN & WAN DHCP ........................................................................................... 352
Figure 220 Telnet in Menu 24.5 ........................................................................................... 356
Figure 221 FTP Session Example ...................................................................................... 357
Figure 222 Telnet into Menu 24.6. ....................................................................................... 360
Figure 223 Restore Using FTP Session Example ............................................................... 360
Figure 224 Telnet Into Menu 24.7.1 Upload System Firmware ........................................... 361
Figure 225 Telnet Into Menu 24.7.2 System Maintenance . ................................................ 362
Figure 226 FTP Session Example of Firmware File Upload ............................................... 363
Figure 227 Command Mode in Menu 24 ............................................................................. 365
Figure 228 Valid Commands ............................................................................................... 366
Figure 229 Menu 24.9 System Maintenance : Call Control ................................................. 366
Figure 230 Budget Management ......................................................................................... 367
Figure 231 Menu 24.9.2 - Call History ................................................................................ 368
Figure 232 Menu 24: System Maintenance ....................................................................... 369
Figure 233 Menu 24.10 System Maintenance: Time and Date Setting ............................... 369
Figure 234 Menu 24.11 – Remote Management Control .................................................... 371
Figure 235 Menu 26 Schedule Setup .................................................................................. 373
Figure 236 Menu 26.1 Schedule Set Setup ....................................................................... 374
Figure 237 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... 375
Figure 238 VPN SMT Menu Tree ........................................................................................ 377
Figure 239 Menu 27 VPN/IPSec Setup ............................................................................... 377
Figure 240 Menu 27 ............................................................................................................ 378
Figure 241 Menu 27.1.1 IPSec Setup ................................................................................. 380
Figure 242 Menu 27.1.1.1 IKE Setup .................................................................................. 383
Figure 243 Menu 27.1.1.2 Manual Setup ............................................................................ 385
Figure 244 Menu 27.2 SA Monitor ...................................................................................... 387
Figure 245 Pop-up Blocker ................................................................................................. 393
Figure 246 Internet Options ............................................................................................... 394
Figure 247 Internet Options ................................................................................................ 395
Figure 248 Pop-up Blocker Settings ................................................................................... 396
Figure 249 Internet Options ................................................................................................ 397
Figure 250 Security Settings - Java Scripting ..................................................................... 398
Figure 251 Security Settings - Java .................................................................................... 399
28 List of Figures
P-334WT User’s Guide
Figure 252 Java (Sun) ......................................................................................................... 400
Figure 253 Internet Options Security .................................................................................. 401
Figure 254 Security Setting ActiveX Controls ..................................................................... 402
Figure 255 WIndows 95/98/Me: Network: Configuration ..................................................... 404
Figure 256 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 405
Figure 257 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 406
Figure 258 Windows XP: Start Menu .................................................................................. 407
Figure 259 Windows XP: Control Panel .............................................................................. 407
Figure 260 Windows XP: Control Panel: Network Connections: Properties ....................... 408
Figure 261 Windows XP: Local Area Connection Properties .............................................. 408
Figure 262 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 409
Figure 263 Windows XP: Advanced TCP/IP Properties ...................................................... 410
Figure 264 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 411
Figure 265 Macintosh OS 8/9: Apple Menu ........................................................................ 412
Figure 266 Macintosh OS 8/9: TCP/IP ................................................................................ 412
Figure 267 Macintosh OS X: Apple Menu ........................................................................... 413
Figure 268 Macintosh OS X: Network ................................................................................. 414
Figure 269 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 415
Figure 270 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 415
Figure 271 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 416
Figure 272 Red Hat 9.0: KDE: Network Configuration: Activate ................................. 416
Figure 273 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 417
Figure 274 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 417
Figure 275 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 417
Figure 276 Red Hat 9.0: Restart Ethernet Card ................................................................ 418
Figure 277 Red Hat 9.0: Checking TCP/IP Properties ...................................................... 418
Figure 278 Single-Computer per Router Hardware Configuration ...................................... 428
Figure 279 Prestige as a PPPoE Client .............................................................................. 428
Figure 280 Transport PPP frames over Ethernet ............................................................... 429
Figure 281 PPTP Protocol Overview .................................................................................. 430
Figure 282 Example Message Exchange between Computer and an ANT ........................ 431
Figure 283 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 433
Figure 284 Basic Service Set .............................................................................................. 434
Figure 285 Infrastructure WLAN ......................................................................................... 435
Figure 286 RTS/CTS .......................................................................................................... 436
Figure 287 Displaying Log Categories Example ................................................................. 457
Figure 288 Displaying Log Parameters Example ................................................................ 457
Figure 289 Wall-mounting Example .................................................................................... 459
List of Figures 29
P-334WT User’s Guide
30 List of Figures
Loading...
+ 437 hidden pages