ZyXEL Prestige 334WT User Guide

0 (0)

P-334WT

802.11g Wireless Broadband Router with Firewall

USERS GUIDE

Version 3.60

1/2006

ZyXEL Prestige 334WT User Guide

P-334WT User’s Guide

Copyright

Copyright © 2006 by ZyXEL Communications Corporation.

The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.

Published by ZyXEL Communications Corporation. All rights reserved.

Disclaimer

ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.

Trademarks

ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.

Copyright

3

P-334WT User’s Guide

Federal Communications

Commission (FCC) Interference

Statement

This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:

This device may not cause harmful interference.

This device must accept any interference received, including interference that may cause undesired operations.

This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.

If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and the receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio/TV technician for help.

Notice 1

Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.

This Class B digital apparatus complies with Canadian ICES-003.

Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.

Certifications

1Go to www.zyxel.com.

2Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.

3Select the certification you wish to view from this page.

4

Federal Communications Commission (FCC) Interference Statement

P-334WT User’s Guide

Safety Warnings

For your safety, be sure to read and follow all warning notices and instructions.

To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.

Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.

Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).

Do NOT use the device if the power supply is damaged as it might cause electrocution.

If the power supply is damaged, remove it from the power outlet.

Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.

Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.

If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.

Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.

Do NOT expose your device to dampness, dust or corrosive liquids.

Do NOT use this product near water, for example, in a wet basement or near a swimming pool.

Make sure to connect the cables to the correct ports.

Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.

Do NOT store things on the device.

Connect ONLY suitable accessories to the device.

Safety Warnings

5

P-334WT User’s Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.

Note

Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.

To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.

Registration

Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.

6

ZyXEL Limited Warranty

P-334WT User’s Guide

Customer Support

Please have the following information ready when you contact customer support.

Product model and serial number.

Warranty Information.

Date that you received your device.

Brief description of the problem and the steps you took to solve it.

METHOD

SUPPORT E-MAIL

TELEPHONEA

WEB SITE

 

 

 

 

 

REGULAR MAIL

LOCATION

SALES E-MAIL

FAX

FTP SITE

 

 

 

 

 

 

 

support@zyxel.com.tw

+886-3-578-3942

www.zyxel.com

ZyXEL Communications Corp.

CORPORATE

 

 

www.europe.zyxel.com

6 Innovation Road II

 

 

 

HEADQUARTERS

 

 

 

Science Park

sales@zyxel.com.tw

+886-3-578-2439

ftp.zyxel.com

(WORLDWIDE)

Hsinchu 300

 

 

 

ftp.europe.zyxel.com

Taiwan

 

 

 

 

 

 

info@cz.zyxel.com

+420-241-091-350

www.zyxel.cz

ZyXEL Communications

 

 

 

 

Czech s.r.o.

 

info@cz.zyxel.com

+420-241-091-359

 

CZECH REPUBLIC

 

Modranská 621

 

 

 

 

143 01 Praha 4 - Modrany

 

 

 

 

Ceská Republika

 

 

 

 

 

 

support@zyxel.dk

+45-39-55-07-00

www.zyxel.dk

ZyXEL Communications A/S

DENMARK

 

 

 

Columbusvej

sales@zyxel.dk

+45-39-55-07-07

 

 

2860 Soeborg

 

 

 

 

 

 

Denmark

 

 

 

 

 

 

support@zyxel.fi

+358-9-4780-8411

www.zyxel.fi

ZyXEL Communications Oy

FINLAND

 

 

 

Malminkaari 10

sales@zyxel.fi

+358-9-4780 8448

 

 

00700 Helsinki

 

 

 

 

 

 

Finland

 

 

 

 

 

 

info@zyxel.fr

+33-4-72-52-97-97

www.zyxel.fr

ZyXEL France

 

 

 

 

1 rue des Vergers

 

 

+33-4-72-52-19-20

 

FRANCE

 

 

Bat. 1 / C

 

 

 

 

69760 Limonest

 

 

 

 

France

 

 

 

 

 

 

support@zyxel.de

+49-2405-6909-0

www.zyxel.de

ZyXEL Deutschland GmbH.

GERMANY

 

 

 

Adenauerstr. 20/A2 D-52146

sales@zyxel.de

+49-2405-6909-99

 

 

Wuerselen

 

 

 

 

 

 

Germany

 

 

 

 

 

 

support@zyxel.hu

+36-1-3361649

www.zyxel.hu

ZyXEL Hungary

HUNGARY

 

 

 

48, Zoldlomb Str.

info@zyxel.hu

+36-1-3259100

 

 

H-1025, Budapest

 

 

 

 

 

 

Hungary

 

 

 

 

 

 

http://zyxel.kz/support

+7-3272-590-698

www.zyxel.kz

ZyXEL Kazakhstan

 

 

 

 

43, Dostyk ave.,Office 414

 

sales@zyxel.kz

+7-3272-590-689

 

KAZAKHSTAN

 

Dostyk Business Centre

 

 

 

 

050010, Almaty

 

 

 

 

Republic of Kazakhstan

 

 

 

 

 

 

support@zyxel.com

1-800-255-4101

www.us.zyxel.com

ZyXEL Communications Inc.

 

 

+1-714-632-0882

 

1130 N. Miller St.

NORTH AMERICA

 

 

Anaheim

 

 

 

 

 

 

 

sales@zyxel.com

+1-714-632-0858

ftp.us.zyxel.com

CA 92806-2001

 

 

 

 

U.S.A.

 

 

 

 

 

 

support@zyxel.no

+47-22-80-61-80

www.zyxel.no

ZyXEL Communications A/S

NORWAY

 

 

 

Nils Hansens vei 13

sales@zyxel.no

+47-22-80-61-81

 

 

0667 Oslo

 

 

 

 

 

 

Norway

 

 

 

 

 

Customer Support

7

P-334WT User’s Guide

METHOD

SUPPORT E-MAIL

TELEPHONEA

WEB SITE

 

 

 

 

 

REGULAR MAIL

LOCATION

SALES E-MAIL

FAX

FTP SITE

 

 

 

 

 

 

 

info@pl.zyxel.com

+48-22-5286603

www.pl.zyxel.com

ZyXEL Communications

POLAND

 

 

 

ul.Emilli Plater 53

 

+48-22-5206701

 

 

 

00-113 Warszawa

 

 

 

 

 

 

 

Poland

 

 

 

 

 

 

http://zyxel.ru/support

+7-095-542-89-29

www.zyxel.ru

ZyXEL Russia

RUSSIA

 

 

 

Ostrovityanova 37a Str.

sales@zyxel.ru

+7-095-542-89-25

 

 

Moscow, 117279

 

 

 

 

 

 

Russia

 

 

 

 

 

 

support@zyxel.es

+34-902-195-420

www.zyxel.es

ZyXEL Communications

SPAIN

 

 

 

Alejandro Villegas 33

sales@zyxel.es

+34-913-005-345

 

 

1º, 28043 Madrid

 

 

 

 

 

 

Spain

 

 

 

 

 

 

support@zyxel.se

+46-31-744-7700

www.zyxel.se

ZyXEL Communications A/S

SWEDEN

 

 

 

Sjöporten 4, 41764 Göteborg

sales@zyxel.se

+46-31-744-7701

 

 

 

Sweden

 

 

 

 

 

 

support@ua.zyxel.com

+380-44-247-69-78

www.ua.zyxel.com

ZyXEL Ukraine

UKRAINE

 

 

 

13, Pimonenko Str.

sales@ua.zyxel.com

+380-44-494-49-32

 

 

Kiev, 04050

 

 

 

 

 

 

Ukraine

 

 

 

 

 

 

support@zyxel.co.uk

+44-1344 303044

www.zyxel.co.uk

ZyXEL Communications UK

 

 

08707 555779 (UK only)

 

Ltd.,11 The Courtyard,

UNITED KINGDOM

 

 

Eastern Road, Bracknell,

 

 

 

 

 

 

 

sales@zyxel.co.uk

+44-1344 303034

ftp.zyxel.co.uk

Berkshire, RG12 2XB,

 

 

 

 

United Kingdom (UK)

 

 

 

 

 

A. “+” is the (prefix) number you enter to make an international telephone call.

8

Customer Support

P-334WT User’s Guide

Table of Contents

Copyright

..................................................................................................................

3

Federal Communications Commission (FCC) Interference Statement ...............

4

Safety Warnings .......................................................................................................

5

ZyXEL Limited Warranty..........................................................................................

6

Customer Support....................................................................................................

7

Table of Contents .....................................................................................................

9

Preface ....................................................................................................................

 

37

Chapter 1

 

 

Getting to Know Your Prestige .............................................................................

39

1.1

Prestige Overview ..............................................................................................

39

1.2

Prestige Features ...............................................................................................

39

 

1.2.1 Physical Features .....................................................................................

39

 

1.2.2 Non-Physical Features .............................................................................

40

 

1.2.3 Wireless Features .....................................................................................

43

1.3

Applications for the Prestige ..............................................................................

45

 

1.3.1 Secure Broadband Internet Access via Cable or DSL Modem .................

45

 

1.3.2 VPN Application ........................................................................................

45

 

1.3.3 Wireless LAN Application .........................................................................

46

 

1.3.4 Front Panel LEDs .....................................................................................

47

Chapter 2

 

 

Introducing the Web Configurator........................................................................

49

2.1

Web Configurator Overview ...............................................................................

49

2.2

Accessing the Prestige Web Configurator .........................................................

49

2.3

Resetting the Prestige ........................................................................................

50

 

2.3.1 Procedure to Use the Reset Button ..........................................................

50

2.4

Navigating the Prestige Web Configurator ......................................................

50

 

2.4.1 Navigation Panel .......................................................................................

53

 

2.4.2 Summary: Any IP Table ..........................................................................

55

 

2.4.3 Summary: DHCP Table ...........................................................................

56

 

2.4.4 Summary: Parental Controls Statistics ...................................................

57

 

2.4.4.1 General Control Mode and Per-User Control Mode ........................

57

 

2.4.5 Summary: VPN Monitor ..........................................................................

59

 

2.4.6 Summary: Bandwidth Management Monitor ...........................................

59

Table of Contents

9

P-334WT User’s Guide

 

2.4.7 Summary: Packet Statistics .......................................................................

60

 

2.4.8 Summary: Port Isolation ...........................................................................

61

 

2.4.9 Summary: Wireless Station Status .........................................................

62

 

2.4.9.1 WMM QoS .......................................................................................

62

Chapter 3

 

 

Connection Wizard.................................................................................................

65

3.1

Wizard Setup ......................................................................................................

65

3.2

Connection Wizard: STEP 1: System Information .............................................

66

 

3.2.1 System Name ...........................................................................................

66

 

3.2.2 Domain Name ...........................................................................................

67

3.3

Connection Wizard: STEP 2: Wireless LAN .......................................................

67

 

3.3.1 Basic(WEP) Security .................................................................................

68

 

3.3.2 Extend(WPA-PSK or WPA2-PSK) Security ...............................................

70

 

3.3.3 OTIST ........................................................................................................

70

3.4

Connection Wizard: STEP 3: Internet Configuration ..........................................

71

 

3.4.1 Ethernet Connection .................................................................................

72

 

3.4.2 PPPoE Connection ...................................................................................

73

 

3.4.3 PPTP Connection .....................................................................................

74

 

3.4.4 Your IP Address.........................................................................................

75

 

3.4.5 WAN IP Address Assignment ...................................................................

76

 

3.4.6 IP Address and Subnet Mask ...................................................................

76

 

3.4.7 DNS Server Address Assignment .............................................................

77

 

3.4.8 WAN IP and DNS Server Address Assignment.........................................

77

 

3.4.9 WAN MAC Address ...................................................................................

79

3.5

Connection Wizard: STEP 4: Bandwidth management ......................................

80

3.6

Connection Wizard Complete ............................................................................

80

Chapter 4

 

 

Wireless LAN ..........................................................................................................

83

4.1

Introduction ........................................................................................................

83

4.2

Wireless Security Overview ...............................................................................

83

 

4.2.1 Encryption .................................................................................................

83

 

4.2.2 Authentication ...........................................................................................

83

 

4.2.3 Restricted Access .....................................................................................

84

 

4.2.4 Hide Prestige Identity ................................................................................

84

 

4.2.5 G-plus .......................................................................................................

84

 

4.2.6 Using OTIST .............................................................................................

84

4.3

Configuring Wireless LAN on the Prestige .........................................................

84

4.4

General Wireless LAN Screen .......................................................................

85

 

4.4.1 No Security ...............................................................................................

86

 

4.4.2 WEP Encryption ........................................................................................

87

 

4.4.3 Static WEP Encryption ..............................................................................

87

10

Table of Contents

 

 

P-334WT User’s Guide

 

4.4.4 Introduction to WPA and WPA2 ................................................................

89

 

4.4.5 WPA(2)-PSK Application Example ...........................................................

89

 

4.4.6 WPA-PSK/WPA2-PSK Authentication Screen ..........................................

89

 

4.4.7 Wireless Client WPA Supplicants .............................................................

91

 

4.4.8 WPA(2) with RADIUS Application Example ..............................................

91

 

4.4.9 WPA/WPA2 Authentication Screen ...........................................................

92

 

4.4.10 IEEE 802.1x Overview ............................................................................

94

 

4.4.11 IEEE 802.1x and Dynamic WEP Key Exchange .....................................

94

 

4.4.12 IEEE 802.1x and Static WEP Key Exchange ..........................................

95

 

4.4.13 IEEE 802.1x + no WEP ..........................................................................

98

4.5

OTIST .................................................................................................................

99

 

4.5.1 Activating OTIST .....................................................................................

100

4.6

MAC Filter ........................................................................................................

101

4.7

Wireless LAN Advanced Screen ......................................................................

102

4.8 WMM QoS ........................................................................................................

104

 

4.8.1 WMM QoS Example ...............................................................................

104

 

4.8.2 WMM QoS Priorities ...............................................................................

105

 

4.8.3 Services ..................................................................................................

105

4.9

QoS Screen ......................................................................................................

107

 

4.9.1 ToS (Type of Service) and WMM QoS ....................................................

107

4.10 Application Priority Configuration Screen .......................................................

109

Chapter 5

 

 

WAN........................................................................................................................

 

111

5.1

WAN Overview .................................................................................................

111

5.2

TCP/IP Priority (Metric) ....................................................................................

111

5.3 WAN MAC Address ..........................................................................................

111

5.4

WAN ISP Screen ..............................................................................................

112

 

5.4.1 Ethernet Encapsulation ...........................................................................

112

 

5.4.2 PPPoE Encapsulation .............................................................................

113

 

5.4.3 PPTP Encapsulation ...............................................................................

116

5.5

Advanced WAN Screen ....................................................................................

119

5.6

Traffic Redirect .................................................................................................

121

5.7

Traffic Redirect Screen .....................................................................................

122

Chapter 6

 

 

LAN........................................................................................................................

 

123

6.1

LAN Overview ..................................................................................................

123

 

6.1.1 IP Pool Setup ..........................................................................................

123

 

6.1.2 System DNS Servers ..............................................................................

123

6.2

LAN TCP/IP ......................................................................................................

123

 

6.2.1 Factory LAN Defaults ..............................................................................

123

 

6.2.2 IP Address and Subnet Mask .................................................................

124

Table of Contents

11

P-334WT User’s Guide

 

6.2.3 RIP Setup ...............................................................................................

124

 

6.2.4 Multicast ..................................................................................................

124

6.3

Any IP ...............................................................................................................

125

 

6.3.1 How Any IP Works ..................................................................................

126

6.4

IP Screen .........................................................................................................

126

6.5

LAN IP Alias ....................................................................................................

127

6.6

Advanced LAN Screen .....................................................................................

128

Chapter 7

 

 

DHCP Server.........................................................................................................

131

7.1 DHCP ...............................................................................................................

131

7.2 DHCP Screen ...................................................................................................

131

7.3

Static DHCP Screen .........................................................................................

132

7.4

Client List Screen .............................................................................................

133

Chapter 8

 

 

Network Address Translation (NAT)...................................................................

135

8.1

NAT Overview ...............................................................................................

135

 

8.1.1 NAT Definitions .......................................................................................

135

 

8.1.2 What NAT Does ......................................................................................

136

 

8.1.3 How NAT Works .....................................................................................

136

 

8.1.4 NAT Application ......................................................................................

137

 

8.1.5 NAT Mapping Types ...............................................................................

137

8.2

Using NAT ........................................................................................................

138

 

8.2.1 SUA (Single User Account) Versus NAT ................................................

138

8.3

SUA Server ......................................................................................................

138

 

8.3.1 Default Server IP Address ......................................................................

139

 

8.3.2 Port Forwarding: Services and Port Numbers ........................................

139

 

8.3.3 Configuring Servers Behind SUA (Example) ..........................................

140

8.4

General NAT Screen ........................................................................................

140

8.5

Port Forwarding Screen ...................................................................................

141

 

8.5.1 Port Forwarding Rule Setup ..................................................................

143

8.6

Trigger Port Forwarding ...................................................................................

143

 

8.6.1 Trigger Port Forwarding Example ...........................................................

144

 

8.6.2 Two Points To Remember About Trigger Ports .......................................

144

8.7

Trigger Port Forwarding Screen .......................................................................

145

Chapter 9

 

 

Firewall..................................................................................................................

 

147

9.1

Introduction to Firewall .....................................................................................

147

 

9.1.1 What is a Firewall? .................................................................................

147

 

9.1.2 Stateful Inspection Firewall. ....................................................................

147

 

9.1.3 About the Prestige Firewall .....................................................................

147

12

Table of Contents

 

P-334WT User’s Guide

9.1.4 Guidelines For Enhancing Security With Your Firewall

..........................148

9.2 General Firewall Screen ...................................................................................

148

9.3

Services Screen ..............................................................................................

149

Chapter 10

 

Content Filtering .................................................................................................

153

10.1

Introduction to Content Filtering .....................................................................

153

10.2

Restrict Web Features ...................................................................................

153

10.3

Days and Times .............................................................................................

153

10.4

Filter Screen ...................................................................................................

153

10.5

Schedule ........................................................................................................

155

10.6

Customizing Keyword Blocking URL Checking ..............................................

156

10.6.1 Domain Name or IP Address URL Checking ........................................

156

10.6.2 Full Path URL Checking .......................................................................

156

10.6.3 File Name URL Checking .....................................................................

157

Chapter 11

 

Introduction to IPSec ...........................................................................................

159

11.1 VPN Overview ................................................................................................

159

11.1.1 IPSec ....................................................................................................

159

11.1.2 Security .................................................................................................

159

11.1.3 Other Terminology .................................................................................

159

 

11.1.3.1 Encryption ....................................................................................

159

 

11.1.3.2 Data Confidentiality .....................................................................

160

 

11.1.3.3 Data Integrity ...............................................................................

160

 

11.1.3.4 Data Origin Authentication ...........................................................

160

11.1.4 VPN Applications ..................................................................................

160

11.2 IPSec Architecture ..........................................................................................

160

11.2.1 IPSec Algorithms ..................................................................................

161

11.2.2 Key Management ..................................................................................

161

11.3 Encapsulation .................................................................................................

161

11.3.1 Transport Mode .....................................................................................

162

11.3.2 Tunnel Mode .........................................................................................

162

11.4 IPSec and NAT ...............................................................................................

162

Chapter 12

 

VPN Screens.......................................................................................................

165

12.1

VPN/IPSec Overview .....................................................................................

165

12.2

IPSec Algorithms ............................................................................................

165

12.2.1 AH (Authentication Header) Protocol ....................................................

165

12.2.2 ESP (Encapsulating Security Payload) Protocol ..................................

165

12.3

My IP Address ................................................................................................

166

12.4

Secure Gateway Address ..............................................................................

166

Table of Contents

13

P-334WT User’s Guide

12.4.1 Dynamic Secure Gateway Address ......................................................

167

12.5 VPN Summary Screen ...................................................................................

167

12.6 Keep Alive ......................................................................................................

168

12.7 NAT Traversal ................................................................................................

169

12.7.1 NAT Traversal Configuration .................................................................

169

12.7.2 Remote DNS Server .............................................................................

169

12.8 ID Type and Content ......................................................................................

170

12.8.1 ID Type and Content Examples ............................................................

171

12.9 Pre-Shared Key ..............................................................................................

172

12.10 VPN Rules ....................................................................................................

172

12.11 IKE Phases ..................................................................................................

176

12.11.1 Negotiation Mode ................................................................................

177

12.11.2 Diffie-Hellman (DH) Key Groups .........................................................

177

12.11.3 Perfect Forward Secrecy (PFS) ..........................................................

177

12.12 Advanced Rule Setup Screen ......................................................................

178

12.13 Manual Key ..................................................................................................

182

12.13.1 Security Parameter Index (SPI) ..........................................................

182

12.14 Manual Key Screen ......................................................................................

183

12.15 SA Monitor Screen .......................................................................................

185

12.16 Global Setting Screen ..................................................................................

186

12.17 Telecommuter VPN/IPSec Examples ...........................................................

187

12.17.1 Telecommuters Sharing One VPN Rule Example ..............................

187

12.17.2 Telecommuters Using Unique VPN Rules Example ...........................

188

12.18 VPN and Remote Management ...................................................................

189

Chapter 13

 

Trend Micro Home Network Security (TMSS) ....................................................

191

13.1 Trend Micro Home Network Security Overview .............................................

191

13.2 Installing the Trend Micro Dashboard ............................................................

192

13.2.1 Installing the Trend Micro Dashboard: Troubleshooting ........................

193

13.3 Activating Your Free Services ........................................................................

194

13.3.1 Registering a Trend Micro Customer Account.......................................

195

13.3.2 Installing Trend Micro Internet Security .................................................

197

13.3.3 Registering Trend Micro Internet Security .............................................

200

13.4 TMSS Settings ...............................................................................................

201

13.4.1 TMSS General Screen ..........................................................................

201

13.4.2 Exception List Screen ..........................................................................

202

13.4.3 Virus Protection Screen .......................................................................

204

13.4.4 Parental Control Screen ......................................................................

205

13.4.4.1 General Control Mode and Per-User Control Mode ....................

205

13.4.4.2 Parents Override Password ........................................................

206

13.4.5 Configuring an Access Profile in General Control Mode ......................

208

13.4.6 Configuring a Schedule ........................................................................

209

14

Table of Contents

 

 

P-334WT User’s Guide

13.4.7 Configuring the User List in Per-User Mode .........................................

210

13.4.8 Content Blocking Categories .................................................................

211

13.5

Port Isolation .................................................................................................

212

Chapter 14

 

 

Static Route Screens ...........................................................................................

215

14.1

Static Route Overview ....................................................................................

215

14.2

IP Static Route Screen ...................................................................................

215

14.2.1 Static Route Setup Screen ...................................................................

216

Chapter 15

 

 

Bandwidth Management......................................................................................

219

15.1

Bandwidth Management Overview ...............................................................

219

15.2

Application-based Bandwidth Management ...................................................

219

15.3

Subnet-based Bandwidth Management .........................................................

219

15.4

Application and Subnet-based Bandwidth Management ...............................

220

15.5

Bandwidth Management Priorities ................................................................

221

15.6

Predefined Bandwidth Management Services ...............................................

221

15.6.1 Services and Port Numbers ..................................................................

222

15.7

Default Bandwidth Management Classes and Priorities ................................

224

15.8

Bandwidth Management General Configuration ...........................................

224

15.9

Bandwidth Management Advanced Configuration ........................................

225

15.9.1 Rule Configuration with the Pre-defined Service ................................

227

15.9.2 Rule Configuration with the User-defined Service ..............................

228

15.10 Bandwidth Management Monitor ..............................................................

229

Chapter 16

 

 

Remote Management Screens ............................................................................

231

16.1

Remote Management Overview .....................................................................

231

16.1.1 Remote Management Limitations .........................................................

231

16.1.2 Remote Management and NAT ............................................................

232

16.1.3 System Timeout ...................................................................................

232

16.2 WWW Screen ..............................................................................................

232

16.3

Telnet ..............................................................................................................

233

16.4

Telnet Screen .................................................................................................

233

16.5

FTP Screen ....................................................................................................

234

16.6 SNMP .............................................................................................................

235

16.6.1 Supported MIBs ....................................................................................

237

16.6.2 SNMP Traps .........................................................................................

237

16.7 SNMP Screen ................................................................................................

237

16.8 DNS Screen ................................................................................................

238

16.9

Security Screen ............................................................................................

239

Table of Contents

15

P-334WT User’s Guide

Chapter 17

 

 

UPnP......................................................................................................................

 

241

17.1

Universal Plug and Play Overview ................................................................

241

17.1.1 How Do I Know If I'm Using UPnP? ......................................................

241

17.1.2 NAT Traversal .......................................................................................

241

17.1.3 Cautions with UPnP ..............................................................................

241

17.2 UPnP and ZyXEL ...........................................................................................

242

17.3 UPnP Screen .................................................................................................

242

17.4

Installing UPnP in Windows Example ............................................................

243

17.4.1 Installing UPnP in Windows Me ............................................................

243

17.4.2 Installing UPnP in Windows XP ............................................................

244

17.5

Using UPnP in Windows XP Example ...........................................................

245

17.5.1 Auto-discover Your UPnP-enabled Network Device .............................

246

17.5.2 Web Configurator Easy Access ............................................................

247

17.5.3 Web Configurator Easy Access ............................................................

248

Chapter 18

 

 

System ..................................................................................................................

 

251

18.1

System Overview ...........................................................................................

251

18.2

System General Screen ...............................................................................

251

18.3 Dynamic DNS .................................................................................................

252

18.3.1 DynDNS Wildcard .................................................................................

252

18.4 Dynamic DNS Screen ....................................................................................

252

18.5

Time Setting Screen .......................................................................................

254

Chapter 19

 

 

Logs.......................................................................................................................

 

257

19.1

View Log .......................................................................................................

257

19.2

Log Settings ...................................................................................................

258

Chapter 20

 

 

Tools......................................................................................................................

 

261

20.1

Firmware Upload Screen ...............................................................................

261

20.2

Configuration Screen .....................................................................................

262

20.2.1 Backup Configuration ...........................................................................

263

20.2.2 Restore Configuration ...........................................................................

263

20.2.3 Back to Factory Defaults .......................................................................

264

20.3

Restart Screen ...............................................................................................

265

Chapter 21

 

 

Introducing the SMT ............................................................................................

267

21.1

SMT Introduction ............................................................................................

267

21.1.1 Procedure for SMT Configuration via Telnet .........................................

267

16

Table of Contents

 

 

P-334WT User’s Guide

21.1.2 Entering Password ................................................................................

267

21.1.3 Prestige SMT Menu Overview ..............................................................

268

21.2

Navigating the SMT Interface .........................................................................

269

21.2.1 System Management Terminal Interface Summary ..............................

271

21.3

Changing the System Password ....................................................................

271

Chapter 22

 

 

Menu 1 General Setup .........................................................................................

273

22.1

General Setup ................................................................................................

273

22.2

Procedure To Configure Menu 1 ....................................................................

273

22.2.1 Procedure to Configure Dynamic DNS .................................................

275

Chapter 23

 

 

Menu 2 WAN Setup ..............................................................................................

277

23.1 WAN Setup .....................................................................................................

277

Chapter 24

 

 

Menu 3 LAN Setup ...............................................................................................

279

24.1

LAN Setup ......................................................................................................

279

24.1.1 General Ethernet Setup ........................................................................

279

24.2

Protocol Dependent Ethernet Setup ..............................................................

280

24.3

TCP/IP Ethernet Setup and DHCP ................................................................

280

24.3.1 IP Alias Setup .......................................................................................

282

24.4

Wireless LAN Setup .......................................................................................

283

24.4.1 Configuring MAC Address Filter ...........................................................

285

24.4.2 Configuring Roaming on the Prestige ...................................................

286

Chapter 25

 

 

Internet Access ....................................................................................................

287

25.1

Introduction to Internet Access Setup ............................................................

287

25.2

Ethernet Encapsulation ..................................................................................

287

25.3

Configuring the PPTP Client ..........................................................................

289

25.4

Configuring the PPPoE Client ........................................................................

289

25.5

Basic Setup Complete ....................................................................................

290

Chapter 26

 

 

Remote Node Configuration ...............................................................................

291

26.1

Introduction to Remote Node Setup ...............................................................

291

26.2

Remote Node Profile Setup ...........................................................................

291

26.2.1 Ethernet Encapsulation .........................................................................

291

26.2.2 PPPoE Encapsulation ...........................................................................

293

 

26.2.2.1 Outgoing Authentication Protocol ................................................

293

 

26.2.2.2 Nailed-Up Connection .................................................................

294

Table of Contents

17

P-334WT User’s Guide

26.2.3 PPTP Encapsulation .............................................................................

294

26.3

Edit IP .............................................................................................................

295

26.4

Remote Node Filter ........................................................................................

297

26.4.1 Traffic Redirect Setup ...........................................................................

298

Chapter 27

 

 

Static Route Setup ...............................................................................................

301

27.1

IP Static Route Setup .....................................................................................

301

Chapter 28

 

 

Network Address Translation (NAT)...................................................................

303

28.1

Using NAT ......................................................................................................

303

28.1.1 SUA (Single User Account) Versus NAT ..............................................

303

28.2

Applying NAT .................................................................................................

303

28.3

NAT Setup ......................................................................................................

305

28.3.1 Address Mapping Sets ..........................................................................

305

 

28.3.1.1 User-Defined Address Mapping Sets ..........................................

306

 

28.3.1.2 Ordering Your Rules ....................................................................

307

28.4

Configuring a Server behind NAT ..................................................................

309

28.5

General NAT Examples ..................................................................................

310

28.5.1 Example 1: Internet Access Only ..........................................................

310

28.5.2 Example 2: Internet Access with an Inside Server ...............................

311

28.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............

312

28.5.4 Example 4: NAT Unfriendly Application Programs ...............................

315

28.6

Configuring Trigger Port Forwarding .............................................................

316

Chapter 29

 

 

Enabling the Firewall ...........................................................................................

319

29.1

Remote Management and the Firewall ..........................................................

319

29.2

Access Methods .............................................................................................

319

29.3

Enabling the Firewall ......................................................................................

319

Chapter 30

 

 

Filter Configuration..............................................................................................

321

30.1

Introduction to Filters ......................................................................................

321

30.1.1 The Filter Structure of the Prestige .......................................................

322

30.2

Configuring a Filter Set ..................................................................................

323

30.2.1 Configuring a Filter Rule .......................................................................

325

30.2.2 Configuring a TCP/IP Filter Rule ..........................................................

325

30.2.3 Configuring a Generic Filter Rule .........................................................

328

30.3

Example Filter ................................................................................................

330

30.4

Filter Types and NAT ......................................................................................

332

30.5

Firewall Versus Filters ....................................................................................

333

18

Table of Contents

 

P-334WT User’s Guide

30.6

Applying a Filter ............................................................................................

333

30.6.1 Applying LAN Filters .............................................................................

333

30.6.2 Applying Remote Node Filters ..............................................................

334

Chapter 31

 

 

SNMP Configuration ............................................................................................

335

31.1 About SNMP ..................................................................................................

335

31.2

Supported MIBs ............................................................................................

336

31.3

SNMP Configuration ......................................................................................

336

31.4 SNMP Traps ...................................................................................................

337

Chapter 32

 

 

System Security ...................................................................................................

339

32.1

System Security .............................................................................................

339

32.2

System Password ..........................................................................................

339

32.3

Configuring External RADIUS Server ............................................................

339

32.4

IEEE 802.1x ...................................................................................................

341

Chapter 33

 

 

System Information and Diagnosis ....................................................................

343

33.1

System Status ................................................................................................

343

33.2

System Information ........................................................................................

345

33.2.1 System Information ...............................................................................

345

33.2.2 Console Port Speed ..............................................................................

346

33.3

Log and Trace ................................................................................................

346

33.3.1 Syslog Logging .....................................................................................

346

 

33.3.1.1 CDR ............................................................................................

348

 

33.3.1.2 Packet triggered ..........................................................................

348

 

33.3.1.3 Filter log .....................................................................................

349

 

33.3.1.4 PPP log ......................................................................................

349

 

33.3.1.5 Firewall log ..................................................................................

350

33.3.2 Call-Triggering Packet ..........................................................................

350

33.4

Diagnostic ......................................................................................................

351

33.4.1 WAN DHCP ..........................................................................................

352

Chapter 34

 

 

Firmware and Configuration File Maintenance .................................................

355

34.1

Filename Conventions ...................................................................................

355

34.2

Backup Configuration .....................................................................................

356

34.2.1 Backup Configuration ...........................................................................

356

34.2.2 Using the FTP Command from the Command Line ..............................

357

34.2.3 Example of FTP Commands from the Command Line .........................

357

34.2.4 GUI-based FTP Clients .........................................................................

357

Table of Contents

19

P-334WT User’s Guide

34.2.5 TFTP and FTP over WAN Management Limitations .............................

358

34.2.6 Backup Configuration Using TFTP .......................................................

358

34.2.7 TFTP Command Example ....................................................................

358

34.2.8 GUI-based TFTP Clients ......................................................................

359

34.3

Restore Configuration ....................................................................................

359

34.3.1 Restore Using FTP ...............................................................................

359

34.3.2 Restore Using FTP Session Example ..................................................

360

34.4

Uploading Firmware and Configuration Files .................................................

361

34.4.1 Firmware File Upload ............................................................................

361

34.4.2 Configuration File Upload .....................................................................

361

34.4.3 FTP File Upload Command from the DOS Prompt Example ................

362

34.4.4 FTP Session Example of Firmware File Upload ...................................

363

34.4.5 TFTP File Upload ..................................................................................

363

34.4.6 TFTP Upload Command Example ........................................................

363

Chapter 35

 

 

System Maintenance............................................................................................

365

35.1

Command Interpreter Mode ...........................................................................

365

35.1.1 Command Syntax .................................................................................

365

35.1.2 Command Usage ..................................................................................

366

35.2

Call Control Support .......................................................................................

366

35.2.1 Budget Management ............................................................................

366

35.2.2 Call History ...........................................................................................

367

35.3

Time and Date Setting ....................................................................................

368

35.3.1 Resetting the Time ................................................................................

370

Chapter 36

 

 

Remote Management ...........................................................................................

371

36.1 Remote Management .....................................................................................

371

36.1.1 Remote Management Limitations .........................................................

372

Chapter 37

 

 

Call Scheduling ....................................................................................................

373

37.1

Introduction to Call Scheduling ......................................................................

373

Chapter 38

 

 

VPN/IPSec Setup ..................................................................................................

377

38.1

VPN/IPSec Overview .....................................................................................

377

38.2

IPSec Summary Screen .................................................................................

378

38.3

IKE Setup .......................................................................................................

383

38.4

Manual Setup .................................................................................................

384

38.4.1 Active Protocol ......................................................................................

385

38.4.2 Security Parameter Index (SPI) ............................................................

385

20

Table of Contents

 

P-334WT User’s Guide

Chapter 39

 

 

SA Monitor ............................................................................................................

387

39.1

SA Monitor Overview .....................................................................................

387

39.2

Using SA Monitor ...........................................................................................

387

Chapter 40

 

 

Troubleshooting ...................................................................................................

389

40.1

Problems Starting Up the Prestige .................................................................

389

40.2

Problems with the LAN ...................................................................................

389

40.3

Problems with the WAN .................................................................................

390

40.4

Problems Accessing the Prestige ..................................................................

391

40.5

Problems with Restricted Web Pages and Keyword Blocking .......................

391

40.5.1 Pop-up Windows, JavaScripts and Java Permissions ..........................

392

 

40.5.1.1 Internet Explorer Pop-up Blockers ..............................................

393

 

40.5.1.2 JavaScripts ..................................................................................

396

 

40.5.1.3 Java Permissions ........................................................................

398

40.5.2 ActiveX Controls in Internet Explorer ....................................................

400

Appendix A

 

Setting up Your Computer’s IP Address............................................................

403

40.5.3 Verifying Settings ..................................................................................

418

Appendix B

 

IP Subnetting ........................................................................................................

419

Appendix C

 

PPPoE ...................................................................................................................

 

427

Appendix D

 

PPTP......................................................................................................................

 

429

Appendix E

 

Wireless LANs ......................................................................................................

433

Appendix F

 

Log Descriptions..................................................................................................

443

Appendix G

 

Wall-mounting Instructions.................................................................................

459

Table of Contents

21

P-334WT User’s Guide

22

Table of Contents

P-334WT User’s Guide

List of Figures

Figure 1 Secure Internet Access via Cable, DSL or Wireless Modem ................................

45

Figure 2 VPN Application ....................................................................................................

46

Figure 3 Internet Access Application Example ....................................................................

46

Figure 4 P-334WT Front Panel ...........................................................................................

47

Figure 5 Change Password Screen ....................................................................................

50

Figure 6 Web Configurator Status Screen ..........................................................................

51

Figure 7 Summary: Any IP Table ........................................................................................

56

Figure 8 Summary: DHCP Table .........................................................................................

56

Figure 9 Summary: Parental Control Statistics ...................................................................

58

Figure 10 Summary: VPN Monitor ......................................................................................

59

Figure 11 Summary: BW MGMT Monitor ............................................................................

60

Figure 12 Summary: Packet Statistics ................................................................................

60

Figure 13 Summary: Port Isolation ......................................................................................

62

Figure 14 Summary: Wireless Association List ...................................................................

63

Figure 15 Select Wizard or Advanced Mode .......................................................................

65

Figure 16 Select a Language ..............................................................................................

66

Figure 17 Welcome to the Connection Wizard ....................................................................

66

Figure 18 Wizard Step 1: System Information .....................................................................

67

Figure 19 Wizard Step 2: Wireless LAN ..............................................................................

68

Figure 20 Wizard Step 2: Basic(WEP) Security ..................................................................

69

Figure 21 Wizard Step 2: Extend(WPA-PSK or WPA2-PSK) Security ................................

70

Figure 22 Wizard Step 2: OTIST .........................................................................................

71

Figure 23 Wizard Step 3: ISP Parameters. .........................................................................

72

Figure 24 Wizard Step 3: Ethernet Connection ...................................................................

72

Figure 25 Wizard Step 3: PPPoE Connection .....................................................................

73

Figure 26 Wizard Step 3: PPTP Connection .......................................................................

74

Figure 27 Wizard Step 3: Your IP Address ..........................................................................

75

Figure 28 Wizard Step 3: WAN IP and DNS Server Addresses ..........................................

78

Figure 29 Wizard Step 3: WAN MAC Address ....................................................................

79

Figure 30 Wizard Step 4: Bandwidth Management ............................................................

80

Figure 31 Connection Wizard Save ...................................................................................

81

Figure 32 Connection Wizard Complete .............................................................................

81

Figure 33 Wireless .............................................................................................................

85

Figure 34 Wireless: No Security ..........................................................................................

86

Figure 35 Wireless: Static WEP Encryption ........................................................................

88

Figure 36 WPA(2)-PSK Authentication ...............................................................................

89

List of Figures

23

P-334WT User’s Guide

Figure 37 Wireless: WPA-PSK/WPA2-PSK .........................................................................

90

Figure 38 WPA(2) with RADIUS Application Example ........................................................

92

Figure 39 Wireless: WPA/WPA2 .........................................................................................

92

Figure 40 Wireless: 802.1x and Dynamic WEP ..................................................................

94

Figure 41 Wireless: 802.1x and Static WEP .......................................................................

96

Figure 42 Wireless: 802.1x .................................................................................................

98

Figure 43 OTIST .................................................................................................................

100

Figure 44 OTIST Start .........................................................................................................

101

Figure 45 OTIST Process ...................................................................................................

101

Figure 46 MAC Address Filter .............................................................................................

102

Figure 47 Advanced ............................................................................................................

103

Figure 48 QoS .....................................................................................................................

108

Figure 49 Application Priority Configuration ........................................................................

109

Figure 50 Ethernet Encapsulation .......................................................................................

112

Figure 51 PPPoE Encapsulation .........................................................................................

114

Figure 52 PPTP Encapsulation ...........................................................................................

117

Figure 53 Advanced ............................................................................................................

119

Figure 54 Traffic Redirect WAN Setup ................................................................................

121

Figure 55 Traffic Redirect LAN Setup .................................................................................

121

Figure 56 WAN: Traffic Redirect ..........................................................................................

122

Figure 57 Any IP Example Application ................................................................................

125

Figure 58 LAN IP .................................................................................................................

126

Figure 59 LAN IP Alias ........................................................................................................

127

Figure 60 Advanced ............................................................................................................

129

Figure 61 General ...............................................................................................................

131

Figure 62 Static DHCP ........................................................................................................

133

Figure 63 Client List ............................................................................................................

134

Figure 64 How NAT Works ..................................................................................................

136

Figure 65 NAT Application With IP Alias .............................................................................

137

Figure 66 Multiple Servers Behind NAT Example ...............................................................

140

Figure 67 NAT General .......................................................................................................

141

Figure 68 Port Forwarding ..................................................................................................

142

Figure 69 Port Forwarding Rule Setup ................................................................................

143

Figure 70 Trigger Port Forwarding Process: Example ........................................................

144

Figure 71 Trigger Port .........................................................................................................

145

Figure 72 General ...............................................................................................................

148

Figure 73 Services ..............................................................................................................

150

Figure 74 Content Filter Disabled .......................................................................................

153

Figure 75 Content Filter: Filter ............................................................................................

154

Figure 76 Content Filter: Schedule .....................................................................................

155

Figure 77 Encryption and Decryption ..................................................................................

160

Figure 78 IPSec Architecture ..............................................................................................

161

Figure 79 Transport and Tunnel Mode IPSec Encapsulation ..............................................

162

24

List of Figures

P-334WT User’s Guide

Figure 80 IPSec Summary Fields .......................................................................................

167

Figure 81 VPN Summary ....................................................................................................

167

Figure 82 NAT Router Between IPSec Routers ..................................................................

169

Figure 83 VPN Host using Intranet DNS Server Example ..................................................

170

Figure 84 Mismatching ID Type and Content Configuration Example ................................

172

Figure 85 VPN Rule Setup ..................................................................................................

173

Figure 86 Two Phases to Set Up the IPSec SA ..................................................................

176

Figure 87 Advanced Rule Setup .........................................................................................

178

Figure 88 Rule Setup with Manual Key ...............................................................................

183

Figure 89 SA Monitor ..........................................................................................................

186

Figure 90 Global Setting .....................................................................................................

186

Figure 91 Telecommuters Sharing One VPN Rule Example ...............................................

188

Figure 92 Telecommuters Using Unique VPN Rules Example ...........................................

189

Figure 93 TMSS First Time Access .....................................................................................

192

Figure 94 Security Warning Message Box ..........................................................................

192

Figure 95 Trend Micro Dashboard) .....................................................................................

193

Figure 96 Dashboard Service Summary Screen .................................................................

195

Figure 97 3 Steps Screen ....................................................................................................

196

Figure 98 Account Registration Screen ..............................................................................

196

Figure 99 Download Now Screen .......................................................................................

198

Figure 100 Registration Information Screen .......................................................................

199

Figure 101 Trend Micro Internet Security Registration Screen ...........................................

200

Figure 102 TMSS General Screen ......................................................................................

201

Figure 103 Exception List Screen .......................................................................................

203

Figure 104 Virus Protection Screen ....................................................................................

204

Figure 105 Parental Control Screen: General Control Mode ..............................................

206

Figure 106 Parental Control Screen: Per-User Control Mode .............................................

207

Figure 107 General Mode: Edit Category ...........................................................................

209

Figure 108 General Mode: Edit Schedule ...........................................................................

210

Figure 109 Per-User Control Mode: Edit User List ..............................................................

211

Figure 110 Port Isolation Example ......................................................................................

213

Figure 111 Port Isolation .....................................................................................................

213

Figure 112 Example of Static Routing Topology ..................................................................

215

Figure 113 IP Static Route ..................................................................................................

216

Figure 114 Static Route Setup ............................................................................................

217

Figure 115 Subnet-based Bandwidth Management Example .............................................

220

Figure 116 Bandwidth Management: General .....................................................................

225

Figure 117 Bandwidth Management: Advanced .................................................................

226

Figure 118 Bandwidth Management Rule Configuration: Pre-defined Service ...................

227

Figure 119 Bandwidth Management Rule Configuration: User-defined Service .................

228

Figure 120 Bandwidth Management: Monitor .....................................................................

229

Figure 121 WWW Remote Management ............................................................................

232

Figure 122 Telnet Configuration on a TCP/IP Network .......................................................

233

List of Figures

25

P-334WT User’s Guide

Figure 123 Telnet Remote Management .............................................................................

234

Figure 124 FTP Remote Management ................................................................................

234

Figure 125 SNMP Management Model ...............................................................................

236

Figure 126 SNMP Remote Management ............................................................................

237

Figure 127 DNS Remote Management ...............................................................................

238

Figure 128 Security Remote Management .........................................................................

239

Figure 129 Configuring UPnP .............................................................................................

242

Figure 130 System General ...............................................................................................

251

Figure 131 Dynamic DNS ...................................................................................................

253

Figure 132 Time Setting ......................................................................................................

254

Figure 133 View Log ...........................................................................................................

257

Figure 134 Log Settings ......................................................................................................

259

Figure 135 Maintenance Firmware Upload .........................................................................

261

Figure 136 Upload Warning ................................................................................................

262

Figure 137 Network Temporarily Disconnected ..................................................................

262

Figure 138 Upload Error Message ......................................................................................

262

Figure 139 Configuration .....................................................................................................

263

Figure 140 Configuration Restore Successful .....................................................................

264

Figure 141 Temporarily Disconnected .................................................................................

264

Figure 142 Configuration Restore Error ..............................................................................

264

Figure 143 System Restart .................................................................................................

265

Figure 144 Login Screen .....................................................................................................

267

Figure 145 SMT Main Menu ................................................................................................

270

Figure 146 Menu 23 System Password ..............................................................................

272

Figure 147 Menu 1 General Setup. .....................................................................................

274

Figure 148 Menu 1.1 Configure Dynamic DNS ..................................................................

275

Figure 149 Menu 2 WAN Setu ............................................................................................

277

Figure 150 Menu 3 LAN Setup ............................................................................................

279

Figure 151 Menu 3.1 LAN Port Filter Setup. .......................................................................

279

Figure 152 Menu 3.2 TCP/IP and DHCP Ethernet Setup ...................................................

280

Figure 153 Physical Network & Partitioned Logical Networks ............................................

282

Figure 154 Menu 3.2.1: IP Alias Setup ...............................................................................

282

Figure 155 Menu 3.5: Wireless LAN Setup .........................................................................

283

Figure 156 Menu 3.5.1: WLAN MAC Address Filter ...........................................................

285

Figure 157 Menu 3.5.2: Roaming Configuration .................................................................

286

Figure 158 Menu 4 Internet Access Setup ..........................................................................

287

Figure 159 Internet Access Setup (PPTP) .........................................................................

289

Figure 160 Internet Access Setup (PPPoE) ........................................................................

290

Figure 161 Menu 11.1 Remote Node Profile for Ethernet Encapsulation ............................

292

Figure 162 Menu 11.1 Remote Node Profile for PPPoE Encapsulation ..............................

293

Figure 163 Menu 11.1 Remote Node Profile for PPTP Encapsulation ................................

295

Figure 164 Menu 11.3 Remote Node Network Layer Options for Ethernet Encapsulation . 296

Figure 165 Menu 11.5: Remote Node Filter (Ethernet Encapsulation) ................................

297

26

List of Figures

P-334WT User’s Guide

Figure 166 Menu 11.5: Remote Node Filter (PPPoE or PPTP Encapsulation) ...................

298

Figure 167 Menu 11.6: Traffic Redirect Setup ....................................................................

298

Figure 168 Menu 12 IP Static Route Setup ........................................................................

301

Figure 169 Menu12.1 Edit IP Static Route ..........................................................................

301

Figure 170 Menu 4: Applying NAT for Internet Access .......................................................

304

Figure 171 Menu 11.3 Applying NAT to the Remote Node .................................................

304

Figure 172 Menu 15 NAT Setup ..........................................................................................

305

Figure 173 Menu 15.1 Address Mapping Sets ....................................................................

305

Figure 174 Menu 15.1.255 SUA Address Mapping Rules .................................................

306

Figure 175 Menu 15.1.1 First Set ........................................................................................

307

Figure 176 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set .........................

308

Figure 177 Menu 15.2.1 NAT Server Setup ........................................................................

309

Figure 178 Multiple Servers Behind NAT Example .............................................................

310

Figure 179 NAT Example 1 .................................................................................................

310

Figure 180 Menu 4 Internet Access & NAT Example .........................................................

311

Figure 181 NAT Example 2 .................................................................................................

311

Figure 182 Menu 15.2.1 Specifying an Inside Server .........................................................

312

Figure 183 NAT Example 3 .................................................................................................

313

Figure 184 NAT Example 3: Menu 11.3 ..............................................................................

313

Figure 185 Example 3: Menu 15.1.1.1 ...............................................................................

314

Figure 186 Example 3: Final Menu 15.1.1 ..........................................................................

314

Figure 187 Example 3: Menu 15.2 ......................................................................................

315

Figure 188 NAT Example 4 .................................................................................................

315

Figure 189 Example 4: Menu 15.1.1.1 Address Mapping Rule. ..........................................

316

Figure 190 Example 4: Menu 15.1.1 Address Mapping Rules ............................................

316

Figure 191 Menu 15.3 Trigger Port Setup ...........................................................................

317

Figure 192 Menu 21.2 Firewall Setup .................................................................................

320

Figure 193 Outgoing Packet Filtering Process ....................................................................

321

Figure 194 Filter Rule Process ............................................................................................

323

Figure 195 Menu 21: Filter and Firewall Setup ...................................................................

324

Figure 196 Menu 21.1: Filter Set Configuration ..................................................................

324

Figure 197 Menu 21.1.1.1 TCP/IP Filter Rule. ....................................................................

326

Figure 198 Executing an IP Filter ........................................................................................

328

Figure 199 Menu 21.1.4.1 Generic Filter Rule ....................................................................

329

Figure 200 Telnet Filter Example ........................................................................................

330

Figure 201 Example Filter: Menu 21.1.3.1 ..........................................................................

331

Figure 202 Example Filter Rules Summary: Menu 21.1.3 ..................................................

332

Figure 203 Protocol and Device Filter Sets .........................................................................

333

Figure 204 Filtering LAN Traffic ..........................................................................................

333

Figure 205 Filtering Remote Node Traffic ...........................................................................

334

Figure 206 SNMP Management Model ...............................................................................

335

Figure 207 Menu 22 SNMP Configuration ..........................................................................

336

Figure 208 Menu 23 System Security .................................................................................

339

List of Figures

27

P-334WT User’s Guide

Figure 209 Menu 23.2 System Security : RADIUS Server ..................................................

340

Figure 210 Menu 23.4 System Security : IEEE802.1x ........................................................

341

Figure 211 Menu 24 System Maintenance ..........................................................................

343

Figure 212 Menu 24.1 System Maintenance : Status .........................................................

344

Figure 213 Menu 24.2 System Information and Console Port Speed ...............................

345

Figure 214 Menu 24.2.1 System Maintenance : Information .............................................

345

Figure 215 Menu 24.2.2 System Maintenance : Change Console Port Speed ...................

346

Figure 216 Menu 24.3.2 System Maintenance : Syslog Logging ........................................

347

Figure 217 Call-Triggering Packet Example ........................................................................

351

Figure 218 Menu 24.4 System Maintenance : Diagnostic ...................................................

352

Figure 219 LAN & WAN DHCP ...........................................................................................

352

Figure 220 Telnet in Menu 24.5 ...........................................................................................

356

Figure 221 FTP Session Example ......................................................................................

357

Figure 222 Telnet into Menu 24.6. .......................................................................................

360

Figure 223 Restore Using FTP Session Example ...............................................................

360

Figure 224 Telnet Into Menu 24.7.1 Upload System Firmware ...........................................

361

Figure 225 Telnet Into Menu 24.7.2 System Maintenance . ................................................

362

Figure 226 FTP Session Example of Firmware File Upload ...............................................

363

Figure 227 Command Mode in Menu 24 .............................................................................

365

Figure 228 Valid Commands ...............................................................................................

366

Figure 229 Menu 24.9 System Maintenance : Call Control .................................................

366

Figure 230 Budget Management .........................................................................................

367

Figure 231 Menu 24.9.2 - Call History ................................................................................

368

Figure 232 Menu 24: System Maintenance .......................................................................

369

Figure 233 Menu 24.10 System Maintenance: Time and Date Setting ...............................

369

Figure 234 Menu 24.11 – Remote Management Control ....................................................

371

Figure 235 Menu 26 Schedule Setup ..................................................................................

373

Figure 236 Menu 26.1 Schedule Set Setup .......................................................................

374

Figure 237 Applying Schedule Set(s) to a Remote Node (PPPoE) ....................................

375

Figure 238 VPN SMT Menu Tree ........................................................................................

377

Figure 239 Menu 27 VPN/IPSec Setup ...............................................................................

377

Figure 240 Menu 27 ............................................................................................................

378

Figure 241 Menu 27.1.1 IPSec Setup .................................................................................

380

Figure 242 Menu 27.1.1.1 IKE Setup ..................................................................................

383

Figure 243 Menu 27.1.1.2 Manual Setup ............................................................................

385

Figure 244 Menu 27.2 SA Monitor ......................................................................................

387

Figure 245 Pop-up Blocker .................................................................................................

393

Figure 246 Internet Options ...............................................................................................

394

Figure 247 Internet Options ................................................................................................

395

Figure 248 Pop-up Blocker Settings ...................................................................................

396

Figure 249 Internet Options ................................................................................................

397

Figure 250 Security Settings - Java Scripting .....................................................................

398

Figure 251 Security Settings - Java ....................................................................................

399

28

List of Figures

P-334WT User’s Guide

Figure 252 Java (Sun) .........................................................................................................

400

Figure 253 Internet Options Security ..................................................................................

401

Figure 254 Security Setting ActiveX Controls .....................................................................

402

Figure 255 WIndows 95/98/Me: Network: Configuration .....................................................

404

Figure 256 Windows 95/98/Me: TCP/IP Properties: IP Address .........................................

405

Figure 257 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................

406

Figure 258 Windows XP: Start Menu ..................................................................................

407

Figure 259 Windows XP: Control Panel ..............................................................................

407

Figure 260 Windows XP: Control Panel: Network Connections: Properties .......................

408

Figure 261 Windows XP: Local Area Connection Properties ..............................................

408

Figure 262 Windows XP: Internet Protocol (TCP/IP) Properties .........................................

409

Figure 263 Windows XP: Advanced TCP/IP Properties ......................................................

410

Figure 264 Windows XP: Internet Protocol (TCP/IP) Properties .........................................

411

Figure 265 Macintosh OS 8/9: Apple Menu ........................................................................

412

Figure 266 Macintosh OS 8/9: TCP/IP ................................................................................

412

Figure 267 Macintosh OS X: Apple Menu ...........................................................................

413

Figure 268 Macintosh OS X: Network .................................................................................

414

Figure 269 Red Hat 9.0: KDE: Network Configuration: Devices ........................................

415

Figure 270 Red Hat 9.0: KDE: Ethernet Device: General .................................................

415

Figure 271 Red Hat 9.0: KDE: Network Configuration: DNS .............................................

416

Figure 272 Red Hat 9.0: KDE: Network Configuration: Activate .................................

416

Figure 273 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ..............................

417

Figure 274 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 ..................................

417

Figure 275 Red Hat 9.0: DNS Settings in resolv.conf ......................................................

417

Figure 276 Red Hat 9.0: Restart Ethernet Card ................................................................

418

Figure 277 Red Hat 9.0: Checking TCP/IP Properties ......................................................

418

Figure 278 Single-Computer per Router Hardware Configuration ......................................

428

Figure 279 Prestige as a PPPoE Client ..............................................................................

428

Figure 280 Transport PPP frames over Ethernet ...............................................................

429

Figure 281 PPTP Protocol Overview ..................................................................................

430

Figure 282 Example Message Exchange between Computer and an ANT ........................

431

Figure 283 Peer-to-Peer Communication in an Ad-hoc Network ........................................

433

Figure 284 Basic Service Set ..............................................................................................

434

Figure 285 Infrastructure WLAN .........................................................................................

435

Figure 286 RTS/CTS ..........................................................................................................

436

Figure 287 Displaying Log Categories Example .................................................................

457

Figure 288 Displaying Log Parameters Example ................................................................

457

Figure 289 Wall-mounting Example ....................................................................................

459

List of Figures

29

P-334WT User’s Guide

30

List of Figures

Loading...
+ 437 hidden pages