P-334WT
802.11g Wireless Broadband Router with Firewall
USER’S GUIDE
Version 3.60
1/2006
P-334WT User’s Guide
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright |
3 |
P-334WT User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
•This device may not cause harmful interference.
•This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
•Reorient or relocate the receiving antenna.
•Increase the separation between the equipment and the receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Certifications
1Go to www.zyxel.com.
2Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
3Select the certification you wish to view from this page.
4 |
Federal Communications Commission (FCC) Interference Statement |
P-334WT User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
•To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
•Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
•Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
•Do NOT use the device if the power supply is damaged as it might cause electrocution.
•If the power supply is damaged, remove it from the power outlet.
•Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
•Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
•If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
•Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
•Do NOT expose your device to dampness, dust or corrosive liquids.
•Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
•Make sure to connect the cables to the correct ports.
•Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
•Do NOT store things on the device.
•Connect ONLY suitable accessories to the device.
Safety Warnings |
5 |
P-334WT User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.
6 |
ZyXEL Limited Warranty |
P-334WT User’s Guide
Please have the following information ready when you contact customer support.
•Product model and serial number.
•Warranty Information.
•Date that you received your device.
•Brief description of the problem and the steps you took to solve it.
METHOD |
SUPPORT E-MAIL |
TELEPHONEA |
WEB SITE |
|
|
|
|
|
|
REGULAR MAIL |
|
LOCATION |
SALES E-MAIL |
FAX |
FTP SITE |
||
|
|||||
|
|
|
|
|
|
|
support@zyxel.com.tw |
+886-3-578-3942 |
www.zyxel.com |
ZyXEL Communications Corp. |
|
CORPORATE |
|
|
www.europe.zyxel.com |
6 Innovation Road II |
|
|
|
|
|||
HEADQUARTERS |
|
|
|
Science Park |
|
sales@zyxel.com.tw |
+886-3-578-2439 |
ftp.zyxel.com |
|||
(WORLDWIDE) |
Hsinchu 300 |
||||
|
|
|
ftp.europe.zyxel.com |
Taiwan |
|
|
|
|
|
|
|
|
info@cz.zyxel.com |
+420-241-091-350 |
www.zyxel.cz |
ZyXEL Communications |
|
|
|
|
|
Czech s.r.o. |
|
|
info@cz.zyxel.com |
+420-241-091-359 |
|
||
CZECH REPUBLIC |
|
Modranská 621 |
|||
|
|
|
|
143 01 Praha 4 - Modrany |
|
|
|
|
|
Ceská Republika |
|
|
|
|
|
|
|
|
support@zyxel.dk |
+45-39-55-07-00 |
www.zyxel.dk |
ZyXEL Communications A/S |
|
DENMARK |
|
|
|
Columbusvej |
|
sales@zyxel.dk |
+45-39-55-07-07 |
|
|||
|
2860 Soeborg |
||||
|
|
||||
|
|
|
|
Denmark |
|
|
|
|
|
|
|
|
support@zyxel.fi |
+358-9-4780-8411 |
www.zyxel.fi |
ZyXEL Communications Oy |
|
FINLAND |
|
|
|
Malminkaari 10 |
|
sales@zyxel.fi |
+358-9-4780 8448 |
|
|||
|
00700 Helsinki |
||||
|
|
||||
|
|
|
|
Finland |
|
|
|
|
|
|
|
|
info@zyxel.fr |
+33-4-72-52-97-97 |
www.zyxel.fr |
ZyXEL France |
|
|
|
|
|
1 rue des Vergers |
|
|
|
+33-4-72-52-19-20 |
|
||
FRANCE |
|
|
Bat. 1 / C |
||
|
|
|
|
69760 Limonest |
|
|
|
|
|
France |
|
|
|
|
|
|
|
|
support@zyxel.de |
+49-2405-6909-0 |
www.zyxel.de |
ZyXEL Deutschland GmbH. |
|
GERMANY |
|
|
|
Adenauerstr. 20/A2 D-52146 |
|
sales@zyxel.de |
+49-2405-6909-99 |
|
|||
|
Wuerselen |
||||
|
|
||||
|
|
|
|
Germany |
|
|
|
|
|
|
|
|
support@zyxel.hu |
+36-1-3361649 |
www.zyxel.hu |
ZyXEL Hungary |
|
HUNGARY |
|
|
|
48, Zoldlomb Str. |
|
info@zyxel.hu |
+36-1-3259100 |
|
|||
|
H-1025, Budapest |
||||
|
|
||||
|
|
|
|
Hungary |
|
|
|
|
|
|
|
|
http://zyxel.kz/support |
+7-3272-590-698 |
www.zyxel.kz |
ZyXEL Kazakhstan |
|
|
|
|
|
43, Dostyk ave.,Office 414 |
|
|
sales@zyxel.kz |
+7-3272-590-689 |
|
||
KAZAKHSTAN |
|
Dostyk Business Centre |
|||
|
|
|
|
050010, Almaty |
|
|
|
|
|
Republic of Kazakhstan |
|
|
|
|
|
|
|
|
support@zyxel.com |
1-800-255-4101 |
www.us.zyxel.com |
ZyXEL Communications Inc. |
|
|
|
+1-714-632-0882 |
|
1130 N. Miller St. |
|
NORTH AMERICA |
|
|
Anaheim |
||
|
|
|
|||
|
|
|
|||
|
sales@zyxel.com |
+1-714-632-0858 |
ftp.us.zyxel.com |
CA 92806-2001 |
|
|
|
|
|
U.S.A. |
|
|
|
|
|
|
|
|
support@zyxel.no |
+47-22-80-61-80 |
www.zyxel.no |
ZyXEL Communications A/S |
|
NORWAY |
|
|
|
Nils Hansens vei 13 |
|
sales@zyxel.no |
+47-22-80-61-81 |
|
|||
|
0667 Oslo |
||||
|
|
||||
|
|
|
|
Norway |
|
|
|
|
|
|
Customer Support |
7 |
P-334WT User’s Guide
METHOD |
SUPPORT E-MAIL |
TELEPHONEA |
WEB SITE |
|
|
|
|
|
|
REGULAR MAIL |
|
LOCATION |
SALES E-MAIL |
FAX |
FTP SITE |
||
|
|||||
|
|
|
|
|
|
|
info@pl.zyxel.com |
+48-22-5286603 |
www.pl.zyxel.com |
ZyXEL Communications |
|
POLAND |
|
|
|
ul.Emilli Plater 53 |
|
|
+48-22-5206701 |
|
|||
|
|
00-113 Warszawa |
|||
|
|
|
|||
|
|
|
|
Poland |
|
|
|
|
|
|
|
|
http://zyxel.ru/support |
+7-095-542-89-29 |
www.zyxel.ru |
ZyXEL Russia |
|
RUSSIA |
|
|
|
Ostrovityanova 37a Str. |
|
sales@zyxel.ru |
+7-095-542-89-25 |
|
|||
|
Moscow, 117279 |
||||
|
|
||||
|
|
|
|
Russia |
|
|
|
|
|
|
|
|
support@zyxel.es |
+34-902-195-420 |
www.zyxel.es |
ZyXEL Communications |
|
SPAIN |
|
|
|
Alejandro Villegas 33 |
|
sales@zyxel.es |
+34-913-005-345 |
|
|||
|
1º, 28043 Madrid |
||||
|
|
||||
|
|
|
|
Spain |
|
|
|
|
|
|
|
|
support@zyxel.se |
+46-31-744-7700 |
www.zyxel.se |
ZyXEL Communications A/S |
|
SWEDEN |
|
|
|
Sjöporten 4, 41764 Göteborg |
|
sales@zyxel.se |
+46-31-744-7701 |
|
|||
|
|
Sweden |
|||
|
|
|
|
|
|
|
support@ua.zyxel.com |
+380-44-247-69-78 |
www.ua.zyxel.com |
ZyXEL Ukraine |
|
UKRAINE |
|
|
|
13, Pimonenko Str. |
|
sales@ua.zyxel.com |
+380-44-494-49-32 |
|
|||
|
Kiev, 04050 |
||||
|
|
||||
|
|
|
|
Ukraine |
|
|
|
|
|
|
|
|
support@zyxel.co.uk |
+44-1344 303044 |
www.zyxel.co.uk |
ZyXEL Communications UK |
|
|
|
08707 555779 (UK only) |
|
Ltd.,11 The Courtyard, |
|
UNITED KINGDOM |
|
|
Eastern Road, Bracknell, |
||
|
|
|
|||
|
|
|
|||
|
sales@zyxel.co.uk |
+44-1344 303034 |
ftp.zyxel.co.uk |
Berkshire, RG12 2XB, |
|
|
|
|
|
United Kingdom (UK) |
|
|
|
|
|
|
A. “+” is the (prefix) number you enter to make an international telephone call.
8 |
Customer Support |
P-334WT User’s Guide
Copyright |
.................................................................................................................. |
3 |
Federal Communications Commission (FCC) Interference Statement ............... |
4 |
|
Safety Warnings ....................................................................................................... |
5 |
|
ZyXEL Limited Warranty.......................................................................................... |
6 |
|
Customer Support.................................................................................................... |
7 |
|
Table of Contents ..................................................................................................... |
9 |
|
Preface .................................................................................................................... |
|
37 |
Chapter 1 |
|
|
Getting to Know Your Prestige ............................................................................. |
39 |
|
1.1 |
Prestige Overview .............................................................................................. |
39 |
1.2 |
Prestige Features ............................................................................................... |
39 |
|
1.2.1 Physical Features ..................................................................................... |
39 |
|
1.2.2 Non-Physical Features ............................................................................. |
40 |
|
1.2.3 Wireless Features ..................................................................................... |
43 |
1.3 |
Applications for the Prestige .............................................................................. |
45 |
|
1.3.1 Secure Broadband Internet Access via Cable or DSL Modem ................. |
45 |
|
1.3.2 VPN Application ........................................................................................ |
45 |
|
1.3.3 Wireless LAN Application ......................................................................... |
46 |
|
1.3.4 Front Panel LEDs ..................................................................................... |
47 |
Chapter 2 |
|
|
Introducing the Web Configurator........................................................................ |
49 |
|
2.1 |
Web Configurator Overview ............................................................................... |
49 |
2.2 |
Accessing the Prestige Web Configurator ......................................................... |
49 |
2.3 |
Resetting the Prestige ........................................................................................ |
50 |
|
2.3.1 Procedure to Use the Reset Button .......................................................... |
50 |
2.4 |
Navigating the Prestige Web Configurator ...................................................... |
50 |
|
2.4.1 Navigation Panel ....................................................................................... |
53 |
|
2.4.2 Summary: Any IP Table .......................................................................... |
55 |
|
2.4.3 Summary: DHCP Table ........................................................................... |
56 |
|
2.4.4 Summary: Parental Controls Statistics ................................................... |
57 |
|
2.4.4.1 General Control Mode and Per-User Control Mode ........................ |
57 |
|
2.4.5 Summary: VPN Monitor .......................................................................... |
59 |
|
2.4.6 Summary: Bandwidth Management Monitor ........................................... |
59 |
Table of Contents |
9 |
P-334WT User’s Guide
|
2.4.7 Summary: Packet Statistics ....................................................................... |
60 |
|
2.4.8 Summary: Port Isolation ........................................................................... |
61 |
|
2.4.9 Summary: Wireless Station Status ......................................................... |
62 |
|
2.4.9.1 WMM QoS ....................................................................................... |
62 |
Chapter 3 |
|
|
Connection Wizard................................................................................................. |
65 |
|
3.1 |
Wizard Setup ...................................................................................................... |
65 |
3.2 |
Connection Wizard: STEP 1: System Information ............................................. |
66 |
|
3.2.1 System Name ........................................................................................... |
66 |
|
3.2.2 Domain Name ........................................................................................... |
67 |
3.3 |
Connection Wizard: STEP 2: Wireless LAN ....................................................... |
67 |
|
3.3.1 Basic(WEP) Security ................................................................................. |
68 |
|
3.3.2 Extend(WPA-PSK or WPA2-PSK) Security ............................................... |
70 |
|
3.3.3 OTIST ........................................................................................................ |
70 |
3.4 |
Connection Wizard: STEP 3: Internet Configuration .......................................... |
71 |
|
3.4.1 Ethernet Connection ................................................................................. |
72 |
|
3.4.2 PPPoE Connection ................................................................................... |
73 |
|
3.4.3 PPTP Connection ..................................................................................... |
74 |
|
3.4.4 Your IP Address......................................................................................... |
75 |
|
3.4.5 WAN IP Address Assignment ................................................................... |
76 |
|
3.4.6 IP Address and Subnet Mask ................................................................... |
76 |
|
3.4.7 DNS Server Address Assignment ............................................................. |
77 |
|
3.4.8 WAN IP and DNS Server Address Assignment......................................... |
77 |
|
3.4.9 WAN MAC Address ................................................................................... |
79 |
3.5 |
Connection Wizard: STEP 4: Bandwidth management ...................................... |
80 |
3.6 |
Connection Wizard Complete ............................................................................ |
80 |
Chapter 4 |
|
|
Wireless LAN .......................................................................................................... |
83 |
|
4.1 |
Introduction ........................................................................................................ |
83 |
4.2 |
Wireless Security Overview ............................................................................... |
83 |
|
4.2.1 Encryption ................................................................................................. |
83 |
|
4.2.2 Authentication ........................................................................................... |
83 |
|
4.2.3 Restricted Access ..................................................................................... |
84 |
|
4.2.4 Hide Prestige Identity ................................................................................ |
84 |
|
4.2.5 G-plus ....................................................................................................... |
84 |
|
4.2.6 Using OTIST ............................................................................................. |
84 |
4.3 |
Configuring Wireless LAN on the Prestige ......................................................... |
84 |
4.4 |
General Wireless LAN Screen ....................................................................... |
85 |
|
4.4.1 No Security ............................................................................................... |
86 |
|
4.4.2 WEP Encryption ........................................................................................ |
87 |
|
4.4.3 Static WEP Encryption .............................................................................. |
87 |
10 |
Table of Contents |
|
|
P-334WT User’s Guide |
|
4.4.4 Introduction to WPA and WPA2 ................................................................ |
89 |
|
4.4.5 WPA(2)-PSK Application Example ........................................................... |
89 |
|
4.4.6 WPA-PSK/WPA2-PSK Authentication Screen .......................................... |
89 |
|
4.4.7 Wireless Client WPA Supplicants ............................................................. |
91 |
|
4.4.8 WPA(2) with RADIUS Application Example .............................................. |
91 |
|
4.4.9 WPA/WPA2 Authentication Screen ........................................................... |
92 |
|
4.4.10 IEEE 802.1x Overview ............................................................................ |
94 |
|
4.4.11 IEEE 802.1x and Dynamic WEP Key Exchange ..................................... |
94 |
|
4.4.12 IEEE 802.1x and Static WEP Key Exchange .......................................... |
95 |
|
4.4.13 IEEE 802.1x + no WEP .......................................................................... |
98 |
4.5 |
OTIST ................................................................................................................. |
99 |
|
4.5.1 Activating OTIST ..................................................................................... |
100 |
4.6 |
MAC Filter ........................................................................................................ |
101 |
4.7 |
Wireless LAN Advanced Screen ...................................................................... |
102 |
4.8 WMM QoS ........................................................................................................ |
104 |
|
|
4.8.1 WMM QoS Example ............................................................................... |
104 |
|
4.8.2 WMM QoS Priorities ............................................................................... |
105 |
|
4.8.3 Services .................................................................................................. |
105 |
4.9 |
QoS Screen ...................................................................................................... |
107 |
|
4.9.1 ToS (Type of Service) and WMM QoS .................................................... |
107 |
4.10 Application Priority Configuration Screen ....................................................... |
109 |
|
Chapter 5 |
|
|
WAN........................................................................................................................ |
|
111 |
5.1 |
WAN Overview ................................................................................................. |
111 |
5.2 |
TCP/IP Priority (Metric) .................................................................................... |
111 |
5.3 WAN MAC Address .......................................................................................... |
111 |
|
5.4 |
WAN ISP Screen .............................................................................................. |
112 |
|
5.4.1 Ethernet Encapsulation ........................................................................... |
112 |
|
5.4.2 PPPoE Encapsulation ............................................................................. |
113 |
|
5.4.3 PPTP Encapsulation ............................................................................... |
116 |
5.5 |
Advanced WAN Screen .................................................................................... |
119 |
5.6 |
Traffic Redirect ................................................................................................. |
121 |
5.7 |
Traffic Redirect Screen ..................................................................................... |
122 |
Chapter 6 |
|
|
LAN........................................................................................................................ |
|
123 |
6.1 |
LAN Overview .................................................................................................. |
123 |
|
6.1.1 IP Pool Setup .......................................................................................... |
123 |
|
6.1.2 System DNS Servers .............................................................................. |
123 |
6.2 |
LAN TCP/IP ...................................................................................................... |
123 |
|
6.2.1 Factory LAN Defaults .............................................................................. |
123 |
|
6.2.2 IP Address and Subnet Mask ................................................................. |
124 |
Table of Contents |
11 |
P-334WT User’s Guide
|
6.2.3 RIP Setup ............................................................................................... |
124 |
|
6.2.4 Multicast .................................................................................................. |
124 |
6.3 |
Any IP ............................................................................................................... |
125 |
|
6.3.1 How Any IP Works .................................................................................. |
126 |
6.4 |
IP Screen ......................................................................................................... |
126 |
6.5 |
LAN IP Alias .................................................................................................... |
127 |
6.6 |
Advanced LAN Screen ..................................................................................... |
128 |
Chapter 7 |
|
|
DHCP Server......................................................................................................... |
131 |
|
7.1 DHCP ............................................................................................................... |
131 |
|
7.2 DHCP Screen ................................................................................................... |
131 |
|
7.3 |
Static DHCP Screen ......................................................................................... |
132 |
7.4 |
Client List Screen ............................................................................................. |
133 |
Chapter 8 |
|
|
Network Address Translation (NAT)................................................................... |
135 |
|
8.1 |
NAT Overview ............................................................................................... |
135 |
|
8.1.1 NAT Definitions ....................................................................................... |
135 |
|
8.1.2 What NAT Does ...................................................................................... |
136 |
|
8.1.3 How NAT Works ..................................................................................... |
136 |
|
8.1.4 NAT Application ...................................................................................... |
137 |
|
8.1.5 NAT Mapping Types ............................................................................... |
137 |
8.2 |
Using NAT ........................................................................................................ |
138 |
|
8.2.1 SUA (Single User Account) Versus NAT ................................................ |
138 |
8.3 |
SUA Server ...................................................................................................... |
138 |
|
8.3.1 Default Server IP Address ...................................................................... |
139 |
|
8.3.2 Port Forwarding: Services and Port Numbers ........................................ |
139 |
|
8.3.3 Configuring Servers Behind SUA (Example) .......................................... |
140 |
8.4 |
General NAT Screen ........................................................................................ |
140 |
8.5 |
Port Forwarding Screen ................................................................................... |
141 |
|
8.5.1 Port Forwarding Rule Setup .................................................................. |
143 |
8.6 |
Trigger Port Forwarding ................................................................................... |
143 |
|
8.6.1 Trigger Port Forwarding Example ........................................................... |
144 |
|
8.6.2 Two Points To Remember About Trigger Ports ....................................... |
144 |
8.7 |
Trigger Port Forwarding Screen ....................................................................... |
145 |
Chapter 9 |
|
|
Firewall.................................................................................................................. |
|
147 |
9.1 |
Introduction to Firewall ..................................................................................... |
147 |
|
9.1.1 What is a Firewall? ................................................................................. |
147 |
|
9.1.2 Stateful Inspection Firewall. .................................................................... |
147 |
|
9.1.3 About the Prestige Firewall ..................................................................... |
147 |
12 |
Table of Contents |
|
P-334WT User’s Guide |
|
9.1.4 Guidelines For Enhancing Security With Your Firewall |
..........................148 |
|
9.2 General Firewall Screen ................................................................................... |
148 |
|
9.3 |
Services Screen .............................................................................................. |
149 |
Chapter 10 |
|
|
Content Filtering ................................................................................................. |
153 |
|
10.1 |
Introduction to Content Filtering ..................................................................... |
153 |
10.2 |
Restrict Web Features ................................................................................... |
153 |
10.3 |
Days and Times ............................................................................................. |
153 |
10.4 |
Filter Screen ................................................................................................... |
153 |
10.5 |
Schedule ........................................................................................................ |
155 |
10.6 |
Customizing Keyword Blocking URL Checking .............................................. |
156 |
10.6.1 Domain Name or IP Address URL Checking ........................................ |
156 |
|
10.6.2 Full Path URL Checking ....................................................................... |
156 |
|
10.6.3 File Name URL Checking ..................................................................... |
157 |
|
Chapter 11 |
|
|
Introduction to IPSec ........................................................................................... |
159 |
|
11.1 VPN Overview ................................................................................................ |
159 |
|
11.1.1 IPSec .................................................................................................... |
159 |
|
11.1.2 Security ................................................................................................. |
159 |
|
11.1.3 Other Terminology ................................................................................. |
159 |
|
|
11.1.3.1 Encryption .................................................................................... |
159 |
|
11.1.3.2 Data Confidentiality ..................................................................... |
160 |
|
11.1.3.3 Data Integrity ............................................................................... |
160 |
|
11.1.3.4 Data Origin Authentication ........................................................... |
160 |
11.1.4 VPN Applications .................................................................................. |
160 |
|
11.2 IPSec Architecture .......................................................................................... |
160 |
|
11.2.1 IPSec Algorithms .................................................................................. |
161 |
|
11.2.2 Key Management .................................................................................. |
161 |
|
11.3 Encapsulation ................................................................................................. |
161 |
|
11.3.1 Transport Mode ..................................................................................... |
162 |
|
11.3.2 Tunnel Mode ......................................................................................... |
162 |
|
11.4 IPSec and NAT ............................................................................................... |
162 |
|
Chapter 12 |
|
|
VPN Screens....................................................................................................... |
165 |
|
12.1 |
VPN/IPSec Overview ..................................................................................... |
165 |
12.2 |
IPSec Algorithms ............................................................................................ |
165 |
12.2.1 AH (Authentication Header) Protocol .................................................... |
165 |
|
12.2.2 ESP (Encapsulating Security Payload) Protocol .................................. |
165 |
|
12.3 |
My IP Address ................................................................................................ |
166 |
12.4 |
Secure Gateway Address .............................................................................. |
166 |
Table of Contents |
13 |
P-334WT User’s Guide
12.4.1 Dynamic Secure Gateway Address ...................................................... |
167 |
12.5 VPN Summary Screen ................................................................................... |
167 |
12.6 Keep Alive ...................................................................................................... |
168 |
12.7 NAT Traversal ................................................................................................ |
169 |
12.7.1 NAT Traversal Configuration ................................................................. |
169 |
12.7.2 Remote DNS Server ............................................................................. |
169 |
12.8 ID Type and Content ...................................................................................... |
170 |
12.8.1 ID Type and Content Examples ............................................................ |
171 |
12.9 Pre-Shared Key .............................................................................................. |
172 |
12.10 VPN Rules .................................................................................................... |
172 |
12.11 IKE Phases .................................................................................................. |
176 |
12.11.1 Negotiation Mode ................................................................................ |
177 |
12.11.2 Diffie-Hellman (DH) Key Groups ......................................................... |
177 |
12.11.3 Perfect Forward Secrecy (PFS) .......................................................... |
177 |
12.12 Advanced Rule Setup Screen ...................................................................... |
178 |
12.13 Manual Key .................................................................................................. |
182 |
12.13.1 Security Parameter Index (SPI) .......................................................... |
182 |
12.14 Manual Key Screen ...................................................................................... |
183 |
12.15 SA Monitor Screen ....................................................................................... |
185 |
12.16 Global Setting Screen .................................................................................. |
186 |
12.17 Telecommuter VPN/IPSec Examples ........................................................... |
187 |
12.17.1 Telecommuters Sharing One VPN Rule Example .............................. |
187 |
12.17.2 Telecommuters Using Unique VPN Rules Example ........................... |
188 |
12.18 VPN and Remote Management ................................................................... |
189 |
Chapter 13 |
|
Trend Micro Home Network Security (TMSS) .................................................... |
191 |
13.1 Trend Micro Home Network Security Overview ............................................. |
191 |
13.2 Installing the Trend Micro Dashboard ............................................................ |
192 |
13.2.1 Installing the Trend Micro Dashboard: Troubleshooting ........................ |
193 |
13.3 Activating Your Free Services ........................................................................ |
194 |
13.3.1 Registering a Trend Micro Customer Account....................................... |
195 |
13.3.2 Installing Trend Micro Internet Security ................................................. |
197 |
13.3.3 Registering Trend Micro Internet Security ............................................. |
200 |
13.4 TMSS Settings ............................................................................................... |
201 |
13.4.1 TMSS General Screen .......................................................................... |
201 |
13.4.2 Exception List Screen .......................................................................... |
202 |
13.4.3 Virus Protection Screen ....................................................................... |
204 |
13.4.4 Parental Control Screen ...................................................................... |
205 |
13.4.4.1 General Control Mode and Per-User Control Mode .................... |
205 |
13.4.4.2 Parents Override Password ........................................................ |
206 |
13.4.5 Configuring an Access Profile in General Control Mode ...................... |
208 |
13.4.6 Configuring a Schedule ........................................................................ |
209 |
14 |
Table of Contents |
|
|
P-334WT User’s Guide |
13.4.7 Configuring the User List in Per-User Mode ......................................... |
210 |
|
13.4.8 Content Blocking Categories ................................................................. |
211 |
|
13.5 |
Port Isolation ................................................................................................. |
212 |
Chapter 14 |
|
|
Static Route Screens ........................................................................................... |
215 |
|
14.1 |
Static Route Overview .................................................................................... |
215 |
14.2 |
IP Static Route Screen ................................................................................... |
215 |
14.2.1 Static Route Setup Screen ................................................................... |
216 |
|
Chapter 15 |
|
|
Bandwidth Management...................................................................................... |
219 |
|
15.1 |
Bandwidth Management Overview ............................................................... |
219 |
15.2 |
Application-based Bandwidth Management ................................................... |
219 |
15.3 |
Subnet-based Bandwidth Management ......................................................... |
219 |
15.4 |
Application and Subnet-based Bandwidth Management ............................... |
220 |
15.5 |
Bandwidth Management Priorities ................................................................ |
221 |
15.6 |
Predefined Bandwidth Management Services ............................................... |
221 |
15.6.1 Services and Port Numbers .................................................................. |
222 |
|
15.7 |
Default Bandwidth Management Classes and Priorities ................................ |
224 |
15.8 |
Bandwidth Management General Configuration ........................................... |
224 |
15.9 |
Bandwidth Management Advanced Configuration ........................................ |
225 |
15.9.1 Rule Configuration with the Pre-defined Service ................................ |
227 |
|
15.9.2 Rule Configuration with the User-defined Service .............................. |
228 |
|
15.10 Bandwidth Management Monitor .............................................................. |
229 |
|
Chapter 16 |
|
|
Remote Management Screens ............................................................................ |
231 |
|
16.1 |
Remote Management Overview ..................................................................... |
231 |
16.1.1 Remote Management Limitations ......................................................... |
231 |
|
16.1.2 Remote Management and NAT ............................................................ |
232 |
|
16.1.3 System Timeout ................................................................................... |
232 |
|
16.2 WWW Screen .............................................................................................. |
232 |
|
16.3 |
Telnet .............................................................................................................. |
233 |
16.4 |
Telnet Screen ................................................................................................. |
233 |
16.5 |
FTP Screen .................................................................................................... |
234 |
16.6 SNMP ............................................................................................................. |
235 |
|
16.6.1 Supported MIBs .................................................................................... |
237 |
|
16.6.2 SNMP Traps ......................................................................................... |
237 |
|
16.7 SNMP Screen ................................................................................................ |
237 |
|
16.8 DNS Screen ................................................................................................ |
238 |
|
16.9 |
Security Screen ............................................................................................ |
239 |
Table of Contents |
15 |
P-334WT User’s Guide
Chapter 17 |
|
|
UPnP...................................................................................................................... |
|
241 |
17.1 |
Universal Plug and Play Overview ................................................................ |
241 |
17.1.1 How Do I Know If I'm Using UPnP? ...................................................... |
241 |
|
17.1.2 NAT Traversal ....................................................................................... |
241 |
|
17.1.3 Cautions with UPnP .............................................................................. |
241 |
|
17.2 UPnP and ZyXEL ........................................................................................... |
242 |
|
17.3 UPnP Screen ................................................................................................. |
242 |
|
17.4 |
Installing UPnP in Windows Example ............................................................ |
243 |
17.4.1 Installing UPnP in Windows Me ............................................................ |
243 |
|
17.4.2 Installing UPnP in Windows XP ............................................................ |
244 |
|
17.5 |
Using UPnP in Windows XP Example ........................................................... |
245 |
17.5.1 Auto-discover Your UPnP-enabled Network Device ............................. |
246 |
|
17.5.2 Web Configurator Easy Access ............................................................ |
247 |
|
17.5.3 Web Configurator Easy Access ............................................................ |
248 |
|
Chapter 18 |
|
|
System .................................................................................................................. |
|
251 |
18.1 |
System Overview ........................................................................................... |
251 |
18.2 |
System General Screen ............................................................................... |
251 |
18.3 Dynamic DNS ................................................................................................. |
252 |
|
18.3.1 DynDNS Wildcard ................................................................................. |
252 |
|
18.4 Dynamic DNS Screen .................................................................................... |
252 |
|
18.5 |
Time Setting Screen ....................................................................................... |
254 |
Chapter 19 |
|
|
Logs....................................................................................................................... |
|
257 |
19.1 |
View Log ....................................................................................................... |
257 |
19.2 |
Log Settings ................................................................................................... |
258 |
Chapter 20 |
|
|
Tools...................................................................................................................... |
|
261 |
20.1 |
Firmware Upload Screen ............................................................................... |
261 |
20.2 |
Configuration Screen ..................................................................................... |
262 |
20.2.1 Backup Configuration ........................................................................... |
263 |
|
20.2.2 Restore Configuration ........................................................................... |
263 |
|
20.2.3 Back to Factory Defaults ....................................................................... |
264 |
|
20.3 |
Restart Screen ............................................................................................... |
265 |
Chapter 21 |
|
|
Introducing the SMT ............................................................................................ |
267 |
|
21.1 |
SMT Introduction ............................................................................................ |
267 |
21.1.1 Procedure for SMT Configuration via Telnet ......................................... |
267 |
16 |
Table of Contents |
|
|
P-334WT User’s Guide |
21.1.2 Entering Password ................................................................................ |
267 |
|
21.1.3 Prestige SMT Menu Overview .............................................................. |
268 |
|
21.2 |
Navigating the SMT Interface ......................................................................... |
269 |
21.2.1 System Management Terminal Interface Summary .............................. |
271 |
|
21.3 |
Changing the System Password .................................................................... |
271 |
Chapter 22 |
|
|
Menu 1 General Setup ......................................................................................... |
273 |
|
22.1 |
General Setup ................................................................................................ |
273 |
22.2 |
Procedure To Configure Menu 1 .................................................................... |
273 |
22.2.1 Procedure to Configure Dynamic DNS ................................................. |
275 |
|
Chapter 23 |
|
|
Menu 2 WAN Setup .............................................................................................. |
277 |
|
23.1 WAN Setup ..................................................................................................... |
277 |
|
Chapter 24 |
|
|
Menu 3 LAN Setup ............................................................................................... |
279 |
|
24.1 |
LAN Setup ...................................................................................................... |
279 |
24.1.1 General Ethernet Setup ........................................................................ |
279 |
|
24.2 |
Protocol Dependent Ethernet Setup .............................................................. |
280 |
24.3 |
TCP/IP Ethernet Setup and DHCP ................................................................ |
280 |
24.3.1 IP Alias Setup ....................................................................................... |
282 |
|
24.4 |
Wireless LAN Setup ....................................................................................... |
283 |
24.4.1 Configuring MAC Address Filter ........................................................... |
285 |
|
24.4.2 Configuring Roaming on the Prestige ................................................... |
286 |
|
Chapter 25 |
|
|
Internet Access .................................................................................................... |
287 |
|
25.1 |
Introduction to Internet Access Setup ............................................................ |
287 |
25.2 |
Ethernet Encapsulation .................................................................................. |
287 |
25.3 |
Configuring the PPTP Client .......................................................................... |
289 |
25.4 |
Configuring the PPPoE Client ........................................................................ |
289 |
25.5 |
Basic Setup Complete .................................................................................... |
290 |
Chapter 26 |
|
|
Remote Node Configuration ............................................................................... |
291 |
|
26.1 |
Introduction to Remote Node Setup ............................................................... |
291 |
26.2 |
Remote Node Profile Setup ........................................................................... |
291 |
26.2.1 Ethernet Encapsulation ......................................................................... |
291 |
|
26.2.2 PPPoE Encapsulation ........................................................................... |
293 |
|
|
26.2.2.1 Outgoing Authentication Protocol ................................................ |
293 |
|
26.2.2.2 Nailed-Up Connection ................................................................. |
294 |
Table of Contents |
17 |
P-334WT User’s Guide
26.2.3 PPTP Encapsulation ............................................................................. |
294 |
|
26.3 |
Edit IP ............................................................................................................. |
295 |
26.4 |
Remote Node Filter ........................................................................................ |
297 |
26.4.1 Traffic Redirect Setup ........................................................................... |
298 |
|
Chapter 27 |
|
|
Static Route Setup ............................................................................................... |
301 |
|
27.1 |
IP Static Route Setup ..................................................................................... |
301 |
Chapter 28 |
|
|
Network Address Translation (NAT)................................................................... |
303 |
|
28.1 |
Using NAT ...................................................................................................... |
303 |
28.1.1 SUA (Single User Account) Versus NAT .............................................. |
303 |
|
28.2 |
Applying NAT ................................................................................................. |
303 |
28.3 |
NAT Setup ...................................................................................................... |
305 |
28.3.1 Address Mapping Sets .......................................................................... |
305 |
|
|
28.3.1.1 User-Defined Address Mapping Sets .......................................... |
306 |
|
28.3.1.2 Ordering Your Rules .................................................................... |
307 |
28.4 |
Configuring a Server behind NAT .................................................................. |
309 |
28.5 |
General NAT Examples .................................................................................. |
310 |
28.5.1 Example 1: Internet Access Only .......................................................... |
310 |
|
28.5.2 Example 2: Internet Access with an Inside Server ............................... |
311 |
|
28.5.3 Example 3: Multiple Public IP Addresses With Inside Servers ............. |
312 |
|
28.5.4 Example 4: NAT Unfriendly Application Programs ............................... |
315 |
|
28.6 |
Configuring Trigger Port Forwarding ............................................................. |
316 |
Chapter 29 |
|
|
Enabling the Firewall ........................................................................................... |
319 |
|
29.1 |
Remote Management and the Firewall .......................................................... |
319 |
29.2 |
Access Methods ............................................................................................. |
319 |
29.3 |
Enabling the Firewall ...................................................................................... |
319 |
Chapter 30 |
|
|
Filter Configuration.............................................................................................. |
321 |
|
30.1 |
Introduction to Filters ...................................................................................... |
321 |
30.1.1 The Filter Structure of the Prestige ....................................................... |
322 |
|
30.2 |
Configuring a Filter Set .................................................................................. |
323 |
30.2.1 Configuring a Filter Rule ....................................................................... |
325 |
|
30.2.2 Configuring a TCP/IP Filter Rule .......................................................... |
325 |
|
30.2.3 Configuring a Generic Filter Rule ......................................................... |
328 |
|
30.3 |
Example Filter ................................................................................................ |
330 |
30.4 |
Filter Types and NAT ...................................................................................... |
332 |
30.5 |
Firewall Versus Filters .................................................................................... |
333 |
18 |
Table of Contents |
|
P-334WT User’s Guide |
|
30.6 |
Applying a Filter ............................................................................................ |
333 |
30.6.1 Applying LAN Filters ............................................................................. |
333 |
|
30.6.2 Applying Remote Node Filters .............................................................. |
334 |
|
Chapter 31 |
|
|
SNMP Configuration ............................................................................................ |
335 |
|
31.1 About SNMP .................................................................................................. |
335 |
|
31.2 |
Supported MIBs ............................................................................................ |
336 |
31.3 |
SNMP Configuration ...................................................................................... |
336 |
31.4 SNMP Traps ................................................................................................... |
337 |
|
Chapter 32 |
|
|
System Security ................................................................................................... |
339 |
|
32.1 |
System Security ............................................................................................. |
339 |
32.2 |
System Password .......................................................................................... |
339 |
32.3 |
Configuring External RADIUS Server ............................................................ |
339 |
32.4 |
IEEE 802.1x ................................................................................................... |
341 |
Chapter 33 |
|
|
System Information and Diagnosis .................................................................... |
343 |
|
33.1 |
System Status ................................................................................................ |
343 |
33.2 |
System Information ........................................................................................ |
345 |
33.2.1 System Information ............................................................................... |
345 |
|
33.2.2 Console Port Speed .............................................................................. |
346 |
|
33.3 |
Log and Trace ................................................................................................ |
346 |
33.3.1 Syslog Logging ..................................................................................... |
346 |
|
|
33.3.1.1 CDR ............................................................................................ |
348 |
|
33.3.1.2 Packet triggered .......................................................................... |
348 |
|
33.3.1.3 Filter log ..................................................................................... |
349 |
|
33.3.1.4 PPP log ...................................................................................... |
349 |
|
33.3.1.5 Firewall log .................................................................................. |
350 |
33.3.2 Call-Triggering Packet .......................................................................... |
350 |
|
33.4 |
Diagnostic ...................................................................................................... |
351 |
33.4.1 WAN DHCP .......................................................................................... |
352 |
|
Chapter 34 |
|
|
Firmware and Configuration File Maintenance ................................................. |
355 |
|
34.1 |
Filename Conventions ................................................................................... |
355 |
34.2 |
Backup Configuration ..................................................................................... |
356 |
34.2.1 Backup Configuration ........................................................................... |
356 |
|
34.2.2 Using the FTP Command from the Command Line .............................. |
357 |
|
34.2.3 Example of FTP Commands from the Command Line ......................... |
357 |
|
34.2.4 GUI-based FTP Clients ......................................................................... |
357 |
Table of Contents |
19 |
P-334WT User’s Guide
34.2.5 TFTP and FTP over WAN Management Limitations ............................. |
358 |
|
34.2.6 Backup Configuration Using TFTP ....................................................... |
358 |
|
34.2.7 TFTP Command Example .................................................................... |
358 |
|
34.2.8 GUI-based TFTP Clients ...................................................................... |
359 |
|
34.3 |
Restore Configuration .................................................................................... |
359 |
34.3.1 Restore Using FTP ............................................................................... |
359 |
|
34.3.2 Restore Using FTP Session Example .................................................. |
360 |
|
34.4 |
Uploading Firmware and Configuration Files ................................................. |
361 |
34.4.1 Firmware File Upload ............................................................................ |
361 |
|
34.4.2 Configuration File Upload ..................................................................... |
361 |
|
34.4.3 FTP File Upload Command from the DOS Prompt Example ................ |
362 |
|
34.4.4 FTP Session Example of Firmware File Upload ................................... |
363 |
|
34.4.5 TFTP File Upload .................................................................................. |
363 |
|
34.4.6 TFTP Upload Command Example ........................................................ |
363 |
|
Chapter 35 |
|
|
System Maintenance............................................................................................ |
365 |
|
35.1 |
Command Interpreter Mode ........................................................................... |
365 |
35.1.1 Command Syntax ................................................................................. |
365 |
|
35.1.2 Command Usage .................................................................................. |
366 |
|
35.2 |
Call Control Support ....................................................................................... |
366 |
35.2.1 Budget Management ............................................................................ |
366 |
|
35.2.2 Call History ........................................................................................... |
367 |
|
35.3 |
Time and Date Setting .................................................................................... |
368 |
35.3.1 Resetting the Time ................................................................................ |
370 |
|
Chapter 36 |
|
|
Remote Management ........................................................................................... |
371 |
|
36.1 Remote Management ..................................................................................... |
371 |
|
36.1.1 Remote Management Limitations ......................................................... |
372 |
|
Chapter 37 |
|
|
Call Scheduling .................................................................................................... |
373 |
|
37.1 |
Introduction to Call Scheduling ...................................................................... |
373 |
Chapter 38 |
|
|
VPN/IPSec Setup .................................................................................................. |
377 |
|
38.1 |
VPN/IPSec Overview ..................................................................................... |
377 |
38.2 |
IPSec Summary Screen ................................................................................. |
378 |
38.3 |
IKE Setup ....................................................................................................... |
383 |
38.4 |
Manual Setup ................................................................................................. |
384 |
38.4.1 Active Protocol ...................................................................................... |
385 |
|
38.4.2 Security Parameter Index (SPI) ............................................................ |
385 |
20 |
Table of Contents |
|
P-334WT User’s Guide |
|
Chapter 39 |
|
|
SA Monitor ............................................................................................................ |
387 |
|
39.1 |
SA Monitor Overview ..................................................................................... |
387 |
39.2 |
Using SA Monitor ........................................................................................... |
387 |
Chapter 40 |
|
|
Troubleshooting ................................................................................................... |
389 |
|
40.1 |
Problems Starting Up the Prestige ................................................................. |
389 |
40.2 |
Problems with the LAN ................................................................................... |
389 |
40.3 |
Problems with the WAN ................................................................................. |
390 |
40.4 |
Problems Accessing the Prestige .................................................................. |
391 |
40.5 |
Problems with Restricted Web Pages and Keyword Blocking ....................... |
391 |
40.5.1 Pop-up Windows, JavaScripts and Java Permissions .......................... |
392 |
|
|
40.5.1.1 Internet Explorer Pop-up Blockers .............................................. |
393 |
|
40.5.1.2 JavaScripts .................................................................................. |
396 |
|
40.5.1.3 Java Permissions ........................................................................ |
398 |
40.5.2 ActiveX Controls in Internet Explorer .................................................... |
400 |
|
Appendix A |
|
|
Setting up Your Computer’s IP Address............................................................ |
403 |
|
40.5.3 Verifying Settings .................................................................................. |
418 |
|
Appendix B |
|
|
IP Subnetting ........................................................................................................ |
419 |
|
Appendix C |
|
|
PPPoE ................................................................................................................... |
|
427 |
Appendix D |
|
|
PPTP...................................................................................................................... |
|
429 |
Appendix E |
|
|
Wireless LANs ...................................................................................................... |
433 |
|
Appendix F |
|
|
Log Descriptions.................................................................................................. |
443 |
|
Appendix G |
|
|
Wall-mounting Instructions................................................................................. |
459 |
Table of Contents |
21 |
P-334WT User’s Guide
22 |
Table of Contents |
P-334WT User’s Guide
Figure 1 Secure Internet Access via Cable, DSL or Wireless Modem ................................ |
45 |
Figure 2 VPN Application .................................................................................................... |
46 |
Figure 3 Internet Access Application Example .................................................................... |
46 |
Figure 4 P-334WT Front Panel ........................................................................................... |
47 |
Figure 5 Change Password Screen .................................................................................... |
50 |
Figure 6 Web Configurator Status Screen .......................................................................... |
51 |
Figure 7 Summary: Any IP Table ........................................................................................ |
56 |
Figure 8 Summary: DHCP Table ......................................................................................... |
56 |
Figure 9 Summary: Parental Control Statistics ................................................................... |
58 |
Figure 10 Summary: VPN Monitor ...................................................................................... |
59 |
Figure 11 Summary: BW MGMT Monitor ............................................................................ |
60 |
Figure 12 Summary: Packet Statistics ................................................................................ |
60 |
Figure 13 Summary: Port Isolation ...................................................................................... |
62 |
Figure 14 Summary: Wireless Association List ................................................................... |
63 |
Figure 15 Select Wizard or Advanced Mode ....................................................................... |
65 |
Figure 16 Select a Language .............................................................................................. |
66 |
Figure 17 Welcome to the Connection Wizard .................................................................... |
66 |
Figure 18 Wizard Step 1: System Information ..................................................................... |
67 |
Figure 19 Wizard Step 2: Wireless LAN .............................................................................. |
68 |
Figure 20 Wizard Step 2: Basic(WEP) Security .................................................................. |
69 |
Figure 21 Wizard Step 2: Extend(WPA-PSK or WPA2-PSK) Security ................................ |
70 |
Figure 22 Wizard Step 2: OTIST ......................................................................................... |
71 |
Figure 23 Wizard Step 3: ISP Parameters. ......................................................................... |
72 |
Figure 24 Wizard Step 3: Ethernet Connection ................................................................... |
72 |
Figure 25 Wizard Step 3: PPPoE Connection ..................................................................... |
73 |
Figure 26 Wizard Step 3: PPTP Connection ....................................................................... |
74 |
Figure 27 Wizard Step 3: Your IP Address .......................................................................... |
75 |
Figure 28 Wizard Step 3: WAN IP and DNS Server Addresses .......................................... |
78 |
Figure 29 Wizard Step 3: WAN MAC Address .................................................................... |
79 |
Figure 30 Wizard Step 4: Bandwidth Management ............................................................ |
80 |
Figure 31 Connection Wizard Save ................................................................................... |
81 |
Figure 32 Connection Wizard Complete ............................................................................. |
81 |
Figure 33 Wireless ............................................................................................................. |
85 |
Figure 34 Wireless: No Security .......................................................................................... |
86 |
Figure 35 Wireless: Static WEP Encryption ........................................................................ |
88 |
Figure 36 WPA(2)-PSK Authentication ............................................................................... |
89 |
List of Figures |
23 |
P-334WT User’s Guide
Figure 37 Wireless: WPA-PSK/WPA2-PSK ......................................................................... |
90 |
Figure 38 WPA(2) with RADIUS Application Example ........................................................ |
92 |
Figure 39 Wireless: WPA/WPA2 ......................................................................................... |
92 |
Figure 40 Wireless: 802.1x and Dynamic WEP .................................................................. |
94 |
Figure 41 Wireless: 802.1x and Static WEP ....................................................................... |
96 |
Figure 42 Wireless: 802.1x ................................................................................................. |
98 |
Figure 43 OTIST ................................................................................................................. |
100 |
Figure 44 OTIST Start ......................................................................................................... |
101 |
Figure 45 OTIST Process ................................................................................................... |
101 |
Figure 46 MAC Address Filter ............................................................................................. |
102 |
Figure 47 Advanced ............................................................................................................ |
103 |
Figure 48 QoS ..................................................................................................................... |
108 |
Figure 49 Application Priority Configuration ........................................................................ |
109 |
Figure 50 Ethernet Encapsulation ....................................................................................... |
112 |
Figure 51 PPPoE Encapsulation ......................................................................................... |
114 |
Figure 52 PPTP Encapsulation ........................................................................................... |
117 |
Figure 53 Advanced ............................................................................................................ |
119 |
Figure 54 Traffic Redirect WAN Setup ................................................................................ |
121 |
Figure 55 Traffic Redirect LAN Setup ................................................................................. |
121 |
Figure 56 WAN: Traffic Redirect .......................................................................................... |
122 |
Figure 57 Any IP Example Application ................................................................................ |
125 |
Figure 58 LAN IP ................................................................................................................. |
126 |
Figure 59 LAN IP Alias ........................................................................................................ |
127 |
Figure 60 Advanced ............................................................................................................ |
129 |
Figure 61 General ............................................................................................................... |
131 |
Figure 62 Static DHCP ........................................................................................................ |
133 |
Figure 63 Client List ............................................................................................................ |
134 |
Figure 64 How NAT Works .................................................................................................. |
136 |
Figure 65 NAT Application With IP Alias ............................................................................. |
137 |
Figure 66 Multiple Servers Behind NAT Example ............................................................... |
140 |
Figure 67 NAT General ....................................................................................................... |
141 |
Figure 68 Port Forwarding .................................................................................................. |
142 |
Figure 69 Port Forwarding Rule Setup ................................................................................ |
143 |
Figure 70 Trigger Port Forwarding Process: Example ........................................................ |
144 |
Figure 71 Trigger Port ......................................................................................................... |
145 |
Figure 72 General ............................................................................................................... |
148 |
Figure 73 Services .............................................................................................................. |
150 |
Figure 74 Content Filter Disabled ....................................................................................... |
153 |
Figure 75 Content Filter: Filter ............................................................................................ |
154 |
Figure 76 Content Filter: Schedule ..................................................................................... |
155 |
Figure 77 Encryption and Decryption .................................................................................. |
160 |
Figure 78 IPSec Architecture .............................................................................................. |
161 |
Figure 79 Transport and Tunnel Mode IPSec Encapsulation .............................................. |
162 |
24 |
List of Figures |
P-334WT User’s Guide |
|
Figure 80 IPSec Summary Fields ....................................................................................... |
167 |
Figure 81 VPN Summary .................................................................................................... |
167 |
Figure 82 NAT Router Between IPSec Routers .................................................................. |
169 |
Figure 83 VPN Host using Intranet DNS Server Example .................................................. |
170 |
Figure 84 Mismatching ID Type and Content Configuration Example ................................ |
172 |
Figure 85 VPN Rule Setup .................................................................................................. |
173 |
Figure 86 Two Phases to Set Up the IPSec SA .................................................................. |
176 |
Figure 87 Advanced Rule Setup ......................................................................................... |
178 |
Figure 88 Rule Setup with Manual Key ............................................................................... |
183 |
Figure 89 SA Monitor .......................................................................................................... |
186 |
Figure 90 Global Setting ..................................................................................................... |
186 |
Figure 91 Telecommuters Sharing One VPN Rule Example ............................................... |
188 |
Figure 92 Telecommuters Using Unique VPN Rules Example ........................................... |
189 |
Figure 93 TMSS First Time Access ..................................................................................... |
192 |
Figure 94 Security Warning Message Box .......................................................................... |
192 |
Figure 95 Trend Micro Dashboard) ..................................................................................... |
193 |
Figure 96 Dashboard Service Summary Screen ................................................................. |
195 |
Figure 97 3 Steps Screen .................................................................................................... |
196 |
Figure 98 Account Registration Screen .............................................................................. |
196 |
Figure 99 Download Now Screen ....................................................................................... |
198 |
Figure 100 Registration Information Screen ....................................................................... |
199 |
Figure 101 Trend Micro Internet Security Registration Screen ........................................... |
200 |
Figure 102 TMSS General Screen ...................................................................................... |
201 |
Figure 103 Exception List Screen ....................................................................................... |
203 |
Figure 104 Virus Protection Screen .................................................................................... |
204 |
Figure 105 Parental Control Screen: General Control Mode .............................................. |
206 |
Figure 106 Parental Control Screen: Per-User Control Mode ............................................. |
207 |
Figure 107 General Mode: Edit Category ........................................................................... |
209 |
Figure 108 General Mode: Edit Schedule ........................................................................... |
210 |
Figure 109 Per-User Control Mode: Edit User List .............................................................. |
211 |
Figure 110 Port Isolation Example ...................................................................................... |
213 |
Figure 111 Port Isolation ..................................................................................................... |
213 |
Figure 112 Example of Static Routing Topology .................................................................. |
215 |
Figure 113 IP Static Route .................................................................................................. |
216 |
Figure 114 Static Route Setup ............................................................................................ |
217 |
Figure 115 Subnet-based Bandwidth Management Example ............................................. |
220 |
Figure 116 Bandwidth Management: General ..................................................................... |
225 |
Figure 117 Bandwidth Management: Advanced ................................................................. |
226 |
Figure 118 Bandwidth Management Rule Configuration: Pre-defined Service ................... |
227 |
Figure 119 Bandwidth Management Rule Configuration: User-defined Service ................. |
228 |
Figure 120 Bandwidth Management: Monitor ..................................................................... |
229 |
Figure 121 WWW Remote Management ............................................................................ |
232 |
Figure 122 Telnet Configuration on a TCP/IP Network ....................................................... |
233 |
List of Figures |
25 |
P-334WT User’s Guide
Figure 123 Telnet Remote Management ............................................................................. |
234 |
Figure 124 FTP Remote Management ................................................................................ |
234 |
Figure 125 SNMP Management Model ............................................................................... |
236 |
Figure 126 SNMP Remote Management ............................................................................ |
237 |
Figure 127 DNS Remote Management ............................................................................... |
238 |
Figure 128 Security Remote Management ......................................................................... |
239 |
Figure 129 Configuring UPnP ............................................................................................. |
242 |
Figure 130 System General ............................................................................................... |
251 |
Figure 131 Dynamic DNS ................................................................................................... |
253 |
Figure 132 Time Setting ...................................................................................................... |
254 |
Figure 133 View Log ........................................................................................................... |
257 |
Figure 134 Log Settings ...................................................................................................... |
259 |
Figure 135 Maintenance Firmware Upload ......................................................................... |
261 |
Figure 136 Upload Warning ................................................................................................ |
262 |
Figure 137 Network Temporarily Disconnected .................................................................. |
262 |
Figure 138 Upload Error Message ...................................................................................... |
262 |
Figure 139 Configuration ..................................................................................................... |
263 |
Figure 140 Configuration Restore Successful ..................................................................... |
264 |
Figure 141 Temporarily Disconnected ................................................................................. |
264 |
Figure 142 Configuration Restore Error .............................................................................. |
264 |
Figure 143 System Restart ................................................................................................. |
265 |
Figure 144 Login Screen ..................................................................................................... |
267 |
Figure 145 SMT Main Menu ................................................................................................ |
270 |
Figure 146 Menu 23 System Password .............................................................................. |
272 |
Figure 147 Menu 1 General Setup. ..................................................................................... |
274 |
Figure 148 Menu 1.1 Configure Dynamic DNS .................................................................. |
275 |
Figure 149 Menu 2 WAN Setu ............................................................................................ |
277 |
Figure 150 Menu 3 LAN Setup ............................................................................................ |
279 |
Figure 151 Menu 3.1 LAN Port Filter Setup. ....................................................................... |
279 |
Figure 152 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... |
280 |
Figure 153 Physical Network & Partitioned Logical Networks ............................................ |
282 |
Figure 154 Menu 3.2.1: IP Alias Setup ............................................................................... |
282 |
Figure 155 Menu 3.5: Wireless LAN Setup ......................................................................... |
283 |
Figure 156 Menu 3.5.1: WLAN MAC Address Filter ........................................................... |
285 |
Figure 157 Menu 3.5.2: Roaming Configuration ................................................................. |
286 |
Figure 158 Menu 4 Internet Access Setup .......................................................................... |
287 |
Figure 159 Internet Access Setup (PPTP) ......................................................................... |
289 |
Figure 160 Internet Access Setup (PPPoE) ........................................................................ |
290 |
Figure 161 Menu 11.1 Remote Node Profile for Ethernet Encapsulation ............................ |
292 |
Figure 162 Menu 11.1 Remote Node Profile for PPPoE Encapsulation .............................. |
293 |
Figure 163 Menu 11.1 Remote Node Profile for PPTP Encapsulation ................................ |
295 |
Figure 164 Menu 11.3 Remote Node Network Layer Options for Ethernet Encapsulation . 296 |
|
Figure 165 Menu 11.5: Remote Node Filter (Ethernet Encapsulation) ................................ |
297 |
26 |
List of Figures |
P-334WT User’s Guide |
|
Figure 166 Menu 11.5: Remote Node Filter (PPPoE or PPTP Encapsulation) ................... |
298 |
Figure 167 Menu 11.6: Traffic Redirect Setup .................................................................... |
298 |
Figure 168 Menu 12 IP Static Route Setup ........................................................................ |
301 |
Figure 169 Menu12.1 Edit IP Static Route .......................................................................... |
301 |
Figure 170 Menu 4: Applying NAT for Internet Access ....................................................... |
304 |
Figure 171 Menu 11.3 Applying NAT to the Remote Node ................................................. |
304 |
Figure 172 Menu 15 NAT Setup .......................................................................................... |
305 |
Figure 173 Menu 15.1 Address Mapping Sets .................................................................... |
305 |
Figure 174 Menu 15.1.255 SUA Address Mapping Rules ................................................. |
306 |
Figure 175 Menu 15.1.1 First Set ........................................................................................ |
307 |
Figure 176 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ......................... |
308 |
Figure 177 Menu 15.2.1 NAT Server Setup ........................................................................ |
309 |
Figure 178 Multiple Servers Behind NAT Example ............................................................. |
310 |
Figure 179 NAT Example 1 ................................................................................................. |
310 |
Figure 180 Menu 4 Internet Access & NAT Example ......................................................... |
311 |
Figure 181 NAT Example 2 ................................................................................................. |
311 |
Figure 182 Menu 15.2.1 Specifying an Inside Server ......................................................... |
312 |
Figure 183 NAT Example 3 ................................................................................................. |
313 |
Figure 184 NAT Example 3: Menu 11.3 .............................................................................. |
313 |
Figure 185 Example 3: Menu 15.1.1.1 ............................................................................... |
314 |
Figure 186 Example 3: Final Menu 15.1.1 .......................................................................... |
314 |
Figure 187 Example 3: Menu 15.2 ...................................................................................... |
315 |
Figure 188 NAT Example 4 ................................................................................................. |
315 |
Figure 189 Example 4: Menu 15.1.1.1 Address Mapping Rule. .......................................... |
316 |
Figure 190 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ |
316 |
Figure 191 Menu 15.3 Trigger Port Setup ........................................................................... |
317 |
Figure 192 Menu 21.2 Firewall Setup ................................................................................. |
320 |
Figure 193 Outgoing Packet Filtering Process .................................................................... |
321 |
Figure 194 Filter Rule Process ............................................................................................ |
323 |
Figure 195 Menu 21: Filter and Firewall Setup ................................................................... |
324 |
Figure 196 Menu 21.1: Filter Set Configuration .................................................................. |
324 |
Figure 197 Menu 21.1.1.1 TCP/IP Filter Rule. .................................................................... |
326 |
Figure 198 Executing an IP Filter ........................................................................................ |
328 |
Figure 199 Menu 21.1.4.1 Generic Filter Rule .................................................................... |
329 |
Figure 200 Telnet Filter Example ........................................................................................ |
330 |
Figure 201 Example Filter: Menu 21.1.3.1 .......................................................................... |
331 |
Figure 202 Example Filter Rules Summary: Menu 21.1.3 .................................................. |
332 |
Figure 203 Protocol and Device Filter Sets ......................................................................... |
333 |
Figure 204 Filtering LAN Traffic .......................................................................................... |
333 |
Figure 205 Filtering Remote Node Traffic ........................................................................... |
334 |
Figure 206 SNMP Management Model ............................................................................... |
335 |
Figure 207 Menu 22 SNMP Configuration .......................................................................... |
336 |
Figure 208 Menu 23 System Security ................................................................................. |
339 |
List of Figures |
27 |
P-334WT User’s Guide
Figure 209 Menu 23.2 System Security : RADIUS Server .................................................. |
340 |
Figure 210 Menu 23.4 System Security : IEEE802.1x ........................................................ |
341 |
Figure 211 Menu 24 System Maintenance .......................................................................... |
343 |
Figure 212 Menu 24.1 System Maintenance : Status ......................................................... |
344 |
Figure 213 Menu 24.2 System Information and Console Port Speed ............................... |
345 |
Figure 214 Menu 24.2.1 System Maintenance : Information ............................................. |
345 |
Figure 215 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... |
346 |
Figure 216 Menu 24.3.2 System Maintenance : Syslog Logging ........................................ |
347 |
Figure 217 Call-Triggering Packet Example ........................................................................ |
351 |
Figure 218 Menu 24.4 System Maintenance : Diagnostic ................................................... |
352 |
Figure 219 LAN & WAN DHCP ........................................................................................... |
352 |
Figure 220 Telnet in Menu 24.5 ........................................................................................... |
356 |
Figure 221 FTP Session Example ...................................................................................... |
357 |
Figure 222 Telnet into Menu 24.6. ....................................................................................... |
360 |
Figure 223 Restore Using FTP Session Example ............................................................... |
360 |
Figure 224 Telnet Into Menu 24.7.1 Upload System Firmware ........................................... |
361 |
Figure 225 Telnet Into Menu 24.7.2 System Maintenance . ................................................ |
362 |
Figure 226 FTP Session Example of Firmware File Upload ............................................... |
363 |
Figure 227 Command Mode in Menu 24 ............................................................................. |
365 |
Figure 228 Valid Commands ............................................................................................... |
366 |
Figure 229 Menu 24.9 System Maintenance : Call Control ................................................. |
366 |
Figure 230 Budget Management ......................................................................................... |
367 |
Figure 231 Menu 24.9.2 - Call History ................................................................................ |
368 |
Figure 232 Menu 24: System Maintenance ....................................................................... |
369 |
Figure 233 Menu 24.10 System Maintenance: Time and Date Setting ............................... |
369 |
Figure 234 Menu 24.11 – Remote Management Control .................................................... |
371 |
Figure 235 Menu 26 Schedule Setup .................................................................................. |
373 |
Figure 236 Menu 26.1 Schedule Set Setup ....................................................................... |
374 |
Figure 237 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... |
375 |
Figure 238 VPN SMT Menu Tree ........................................................................................ |
377 |
Figure 239 Menu 27 VPN/IPSec Setup ............................................................................... |
377 |
Figure 240 Menu 27 ............................................................................................................ |
378 |
Figure 241 Menu 27.1.1 IPSec Setup ................................................................................. |
380 |
Figure 242 Menu 27.1.1.1 IKE Setup .................................................................................. |
383 |
Figure 243 Menu 27.1.1.2 Manual Setup ............................................................................ |
385 |
Figure 244 Menu 27.2 SA Monitor ...................................................................................... |
387 |
Figure 245 Pop-up Blocker ................................................................................................. |
393 |
Figure 246 Internet Options ............................................................................................... |
394 |
Figure 247 Internet Options ................................................................................................ |
395 |
Figure 248 Pop-up Blocker Settings ................................................................................... |
396 |
Figure 249 Internet Options ................................................................................................ |
397 |
Figure 250 Security Settings - Java Scripting ..................................................................... |
398 |
Figure 251 Security Settings - Java .................................................................................... |
399 |
28 |
List of Figures |
P-334WT User’s Guide |
|
Figure 252 Java (Sun) ......................................................................................................... |
400 |
Figure 253 Internet Options Security .................................................................................. |
401 |
Figure 254 Security Setting ActiveX Controls ..................................................................... |
402 |
Figure 255 WIndows 95/98/Me: Network: Configuration ..................................................... |
404 |
Figure 256 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... |
405 |
Figure 257 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ |
406 |
Figure 258 Windows XP: Start Menu .................................................................................. |
407 |
Figure 259 Windows XP: Control Panel .............................................................................. |
407 |
Figure 260 Windows XP: Control Panel: Network Connections: Properties ....................... |
408 |
Figure 261 Windows XP: Local Area Connection Properties .............................................. |
408 |
Figure 262 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... |
409 |
Figure 263 Windows XP: Advanced TCP/IP Properties ...................................................... |
410 |
Figure 264 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... |
411 |
Figure 265 Macintosh OS 8/9: Apple Menu ........................................................................ |
412 |
Figure 266 Macintosh OS 8/9: TCP/IP ................................................................................ |
412 |
Figure 267 Macintosh OS X: Apple Menu ........................................................................... |
413 |
Figure 268 Macintosh OS X: Network ................................................................................. |
414 |
Figure 269 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ |
415 |
Figure 270 Red Hat 9.0: KDE: Ethernet Device: General ................................................. |
415 |
Figure 271 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. |
416 |
Figure 272 Red Hat 9.0: KDE: Network Configuration: Activate ................................. |
416 |
Figure 273 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. |
417 |
Figure 274 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. |
417 |
Figure 275 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... |
417 |
Figure 276 Red Hat 9.0: Restart Ethernet Card ................................................................ |
418 |
Figure 277 Red Hat 9.0: Checking TCP/IP Properties ...................................................... |
418 |
Figure 278 Single-Computer per Router Hardware Configuration ...................................... |
428 |
Figure 279 Prestige as a PPPoE Client .............................................................................. |
428 |
Figure 280 Transport PPP frames over Ethernet ............................................................... |
429 |
Figure 281 PPTP Protocol Overview .................................................................................. |
430 |
Figure 282 Example Message Exchange between Computer and an ANT ........................ |
431 |
Figure 283 Peer-to-Peer Communication in an Ad-hoc Network ........................................ |
433 |
Figure 284 Basic Service Set .............................................................................................. |
434 |
Figure 285 Infrastructure WLAN ......................................................................................... |
435 |
Figure 286 RTS/CTS .......................................................................................................... |
436 |
Figure 287 Displaying Log Categories Example ................................................................. |
457 |
Figure 288 Displaying Log Parameters Example ................................................................ |
457 |
Figure 289 Wall-mounting Example .................................................................................... |
459 |
List of Figures |
29 |
P-334WT User’s Guide
30 |
List of Figures |