All contents copyright (c) 2007 ZyXEL Communications Corporation.
8
Page 9
Prestige 2802HW(L)-Ix Support Notes
Application Notes
General Application Notes
Internet Connection
A typical Internet access application of the Prestige is shown below. For a small office, there are some
components needs to be checked before accessing the Internet.
• Before you begin
• Setting up the Windows
• Setting up the Prestige router
• Troubleshooting
• Before you begin
The Prestige is shipped with the following factory default:
2. DHCP server enabled with IP pool starting from 192.168.1.33
3. Default SMT menu password = 1234
• Setting up the PC (Windows OS)
1. Ethernet connection
All PCs must have an Ethernet adapter card installed.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
9
Page 10
Prestige 2802HW(L)-Ix Support Notes
• If you only have one PC, connect the PC's Ethernet adapter to the Prestige's LAN port with a
crossover (red one) Ethernet cable.
• If you have more than one PC, both the PC's Ethernet adapters and the Prestige's LAN port must
be connected to an external hub with straight Ethernet cable.
2. TCP/IP Installation
You must first install TCP/IP software on each PC before you can use it for Internet access. If you have already
installed TCP/IP, go to the next section to configure it; otherwise, follow these steps to install:
• In the Control Panel/Network window, click Add button.
• In the Select Network Component Type windows, select Protocol and click Add.
• In the Select Network Protocol windows, select Microsoft from the manufacturers, then select
TCP/IP from the Network Protocols and click OK.
3. TCP/IP Configuration
Follow these steps to configure Windows TCP/IP:
• In the Control Panel/Network window, click the TCP/IP entry to select it and click Properties
button.
• In the TCP/IP Properties window, select obtain an IP address automatically.
Note: Do not assign arbitrary IP address and subnet mask to your PCs, otherwise, you will not be able to access
the Internet.
• Click the WINS configuration tab and select Disable WINS Resolution.
• Click the Gateway tab. Highlight any installed gateways and click the Remove button until there
are none listed.
• Click the DNS Configuration tab and select Disable DNS.
• Click OK to save and close the TCP/IP properties window
• Click OK to close the Network window. You will be prompted to insert your Windows CD or disk.
When the drivers are updated, you will be asked if you want to restart the PC. Make sure your
Prestige is powered on before answering Yes to the prompt. Repeat the above steps for each
Windows PC on your network.
• Setting up the Prestige router
All contents copyright (c) 2007 ZyXEL Communications Corporation.
10
Page 11
Prestige 2802HW(L)-Ix Support Notes
The following procedure is for the most typical usage of the Prestige where you have a single-user account
(SUA). The Prestige supports embedded web server that allows you to use Web browser to configure it. Before
configuring the router using Browser please be sure there is no Telnet or Console login.
1. Retrieve Prestige Web
Please enter the LAN IP address of the Prestige router in the URL location to retrieve the web screen from the
Prestige. The default LAN IP of the Prestige is 192.168.1.1. See the example below. Note that you can either
use http://192.168.1.1
2. Login first
The default password is the default WEB GUI password, '1234'.
3. Configure Prestige for Internet access by using WIZARD SETUP
All contents copyright (c) 2007 ZyXEL Communications Corporation.
11
Page 12
Prestige 2802HW(L)-Ix Support Notes
The Web screen shown below takes PPPoE as the example.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
12
Page 13
Prestige 2802HW(L)-Ix Support Notes
Setup the Prestige as a DHCP Relay
• What is DHCP Relay?
DHCP stands for Dynamic Host Configuration Protocol. In addition to the DHCP server feature, the P2802
supports the DHCP relay function. When it is configured as DHCP server, it assigns the IP addresses to the
LAN clients. When it is configured as DHCP relay, it is reponsable for forwarding the requests and responses
negotiating between the DHCP clients and the server. See figure 1.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
13
Page 14
Prestige 2802HW(L)-Ix Support Notes
• Setup the Prestige as a DHCP Client
1. Toggle the DHCP to Relay in Network>LAN>DHCP Setup and enter the IP address of the DHCP server in
the 'Remote DHCP Server' field.
14
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 15
Prestige 2802HW(L)-Ix Support Notes
Configure an Internal Server Behind SUA
• Introduction
If you wish, you can make internal servers (e.g., Web, ftp or mail server) accessible for outside users, even
though SUA makes your LAN appear as a single machine to the outside world. A service is identified by the
port number. Also, since you need to specify the IP address of a server in the Prestige, a server must have a
fixed IP address and not be a DHCP client whose IP address potentially changes each time it is powered on.
In addition to the servers for specific services, SUA supports a default server. A service request that does not
have a server explicitly designated for it is forwarded to the default server. If the default server is not defined,
the service request is simply discarded.
• Configuration
To make a server visible to the outside world, specify the port number of the service and the inside address of
the server in 'Network>NAT>Port Forwarding', Port Forwarding Configuration. The outside users can access
the local server using the Prestige's
WAN IP
address.
• For example (Configuring an internal Web server for outside access) :
All contents copyright (c) 2007 ZyXEL Communications Corporation.
15
Page 16
Prestige 2802HW(L)-Ix Support Notes
• Port numbers for some services
ServicePort Number
FTP 21
Telnet 23
SMTP 25
DNS (Domain Name Server) 53
www-http (Web) 80
Configure a PPTP server Behind SUA
• Introduction
PPTP is a tunneling protocol defined by the PPTP forum that allows PPP packets to be encapsulated within
Internet Protocol (IP) packets and forwarded over any IP network, including the Internet itself.
In order to run the Windows 9x PPTP client, you must be able to establish an IP connection with a tunnel server
such as the Windows NT Server 4.0 Remote Access Server.
16
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 17
Prestige 2802HW(L)-Ix Support Notes
Windows Dial-Up Networking uses the Internet standard Point-to-Point (PPP) to provide a secure,optimized
multiple-protocol network connection over dial-up telephone lines. All data sent over this connection can be
encrypted and compressed, and multiple network level protocols (TCP/IP, NetBEUI and IPX) can be run
correctly. Windows NT Domain Login level security is preserved even across the Internet.
Window98 PPTP Client / Internet / NT RAS Server Protocol Stack
PPTP appears as new modem type (Virtual Private Networking Adapter) that can be selected when setting up a
connection in the Dial-Up Networking folder. The VPN Adapter type does not appear elsewhere in the system.
Since PPTP encapsulates its data stream in the PPP protocol, the VPN requires a second dial-up adapter. This
second dial-up adapter for VPN is added during the installation phase of the Upgrade in addition to the first
dial-up adapter that provides PPP support for the analog or ISDN modem.
The PPTP is supported in Windows NT and Windows 98 already. For Windows 95, it needs to be upgraded by
the Dial-Up Networking 1.2 upgrade.
• Configuration
This application note explains how to establish a PPTP connection with a remote private network in the Prestige
SUA case. In ZyNOS, all PPTP packets can be forwarded to the internal PPTP Server (WinNT server) behind
SUA. The port number of the PPTP has to be Configure in the WEB GUI Network > NAT > Port
Forwarding
for Prestige to forward to the appropriate private IP address of Windows NT server.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
17
Page 18
• Example
Prestige 2802HW(L)-Ix Support Notes
The following example shows how to dial to an ISP via the Prestige and then establish a tunnel to a private
network. There will be three items that you need to set up for PPTP application, these are PPTP server (WinNT),
PPTP client (Win9x) and the Prestige.
o PPTP server setup (WinNT)
Add the VPN service from Control Panel>Network
Add an user account for PPTP logged on user
Enable RAS port
Select the network protocols from RAS such as IPX, TCP/IP NetBEUI
Set the Internet gateway to Prestige
o PPTP client setup (Win9x)
Add one VPN connection from Dial-Up Networking by entering the correct
username & password and the IP address of the Prestige's Internet IP address for
logging to NT RAS server.
Set the Internet gateway to the router that is connecting to ISP
o Prestige router setup
• Before making a VPN connection from Win9x to WinNT server, you need to connect Prestige
router to your ISP first.
• Go to WEB GUI “Network>NAT>Port Forwarding”. Enter the IP address of the PPTP server
(WinNT server) and specify the Service Name for PPTP as shown below.
18
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 19
Prestige 2802HW(L)-Ix Support Notes
When you have finished the above settings, you can ping to the remote Win9x client from
WinNT. This ping command is used to demonstrate that remote the Win9x can be reached across the
Internet. If the Internet connection between two LANs is achieve, you can place a VPN call from the
remote Win9x client.
For example:
C:\ping 203.66.113.2
When a dial-up connection to ISP is established, a default gateway is assigned to the router traffic
through that connection. Therefore, the output below shows the default gateway of the Win9x client
after the dial-up connection has been established.
Before making a VPN connection from the Win9x client to the NT server, you need to know the exact
Internet IP address that the ISP assigns to Prestige router in SUA mode and enter this IP address in the
VPN dial-up dialog box. You can check this Internet IP address from PNC Monitor or WEB GUI Status
page. If the Internet IP address is a fixed IP address provided by ISP in SUA mode, then you can
always use this IP address for reaching the VPN server.
In the following example, the IP address '140.113.1.225' is dynamically assigned by ISP. You must
enter this IP address in the 'VPN Server' dialog box for reaching the PPTP server. After the VPN link is
established, you can start the network protocol application such as IP, IPX and NetBEUI.
19
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 20
Prestige 2802HW(L)-Ix Support Notes
Using NAT / Multi-NAT
• What is Multi-NAT?
NAT (Network Address Translation-NAT RFC 1631) is the translation of an Internet Protocol address used
within one network to a different IP address known within another network. One network is designated the
inside
network and the other is the
outside
. Typically, a company maps its local inside network addresses to one
or more global outside IP addresses and "unmaps" the global IP addresses on incoming packets back into local
IP addresses. The IP addresses for the NAT can be either fixed or dynamically assigned by the ISP. In addition,
you can designate servers, e.g., a web server and a telnet server, on your local network and make them
accessible to the outside world. If you do not define any servers, NAT offers the additional benefit of firewall
protection. In such case, all incoming connections to your network will be filtered out by the Prestige, thus
preventing intruders from probing your network.
The SUA feature that the Prestige supports previously operates by mapping the private IP addresses to a global
IP address. It is only one subset of the NAT. The Prestige with ZyNOS V3.40 supports the most of the features
of the NAT based on RFC 1631, and we call this feature as 'Multi-NAT'. For more information on IP address
translation, please refer to RFC 1631,
• How NAT works
All contents copyright (c) 2007 ZyXEL Communications Corporation.
The IP Network Address Translator (NAT)
.
20
Page 21
Prestige 2802HW(L)-Ix Support Notes
If we define the local IP addresses as the Internal Local Addresses (ILA) and the global IP addresses as the
Inside Global Address (IGA), see the following figure. The term 'inside' refers to the set of networks that are
subject to translation. NAT operates by mapping the ILA to the IGA required for communication with hosts on
other networks. It replaces the original IP source address (and TCP or UDP source port numbers) and then
forwards each packet to the Internet ISP, thus making them appear as if they had come from the NAT system
itself (e.g., the Prestige router). The Prestige keeps track of the original addresses and port numbers so incoming
reply packets can have their original values restored.
1. NAT Mapping Types
NAT supports five types of IP/port mapping. They are:
2. One to One
In One-to-One mode, the Prestige maps one ILA to one IGA.
3. Many to One
In Many-to-One mode, the Prestige maps multiple ILA to one IGA. This is equivalent to SUA (i.e., PAT, port
address translation), ZyXEL's Single User Account feature that previous ZyNOS routers supported (the SUA
only option in today's routers).
4. Many to Many Overload
In Many-to-Many Overload mode, the Prestige maps the multiple ILA to shared IGA.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
21
Page 22
Prestige 2802HW(L)-Ix Support Notes
5. Many to Many No Overload
In Many-to-Many No Overload mode, the Prestige maps each ILA to unique IGA.
• Server
In Server mode, the Prestige maps multiple inside servers to one global IP address. This allows us to specify
multiple servers of different types behind the NAT for outside access. Note, if you want to map each server to
one unique IGA please use the One-to-One mode.
The following table summarizes these types.
NA T Type IP Mapping
Mapping
Direction
One-to-One ILA1<--->IGA1 Both
ILA1---->IGA1
Many-to-One (SUA/PAT)
ILA2---->IGA1
Outgoing
...
ILA1---->IGA1
ILA2---->IGA2
Many-to-Many Overload
ILA3---->IGA1
Outgoing
ILA4---->IGA2
...
ILA1---->IGA1
Many-to-Many No
Overload
(Allocate by Connections)
ILA2---->IGA3
ILA3---->IGA2
ILA4---->IGA4
Outgoing
...
Server
Incoming
Server 2 IP<----IGA1
Server 1 IP<----IGA1
• SUA Versus NAT
SUA (Single User Account) in previous ZyNOS versions is a NAT set with 2 rules, Many-to-One and Server.
The Prestige now has Full Feature NAT support to map global IP addresses to local IP addresses of clients or
servers. With multiple global IP addresses, multiple severs of the same type (e.g., FTP servers) are allowed on
the LAN for outside access. In previous ZyNOS versions (that supported SUA 'visible' servers had to be of
22
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 23
Prestige 2802HW(L)-Ix Support Notes
different types. The Prestige supports NAT sets on a remote node basis. They are reusable, but only one set is
allowed for each remote node. The Prestige 2802HWL supports 8 sets since there are 8 remote node. The
default SUA (Read Only) Set is a convenient, pre-configured, read only, Many-to-One mapping set, sufficient
for most purposes and helpful to people already familiar with SUA in previous ZyNOS versions.
• WEB GUI Menus
1. Applying NAT in the WEB GUI
You apply NAT via WEB GUI “Network>NAT>General" as displayed next. The next figure that you could
apply NAT for Internet access –Full Feature.
The following table describes the options for Network Address Translation.
FieldOptionsDescription
When you select this option the SMT will use Address
Full Feature
Mapping Set 1 (Menu 15.1-see later for further
discussion).
None
Network Address Translation
NAT is disabled when you select this option.
When you select this option the SMT will use Address
Mapping Set 255 (Menu 15.1-see later for further
SUA Only
discussion). This option use basically Many-to-One
Overload mapping. Select Full Feature when you
require other mapping types. It is a convenient,
All contents copyright (c) 2007 ZyXEL Communications Corporation.
23
Page 24
Prestige 2802HW(L)-Ix Support Notes
pre-configured, read only, Many-to-One mapping set,
sufficient for most purposes and helpful to people
already familiar with SUA in previous ZyNOS
versions. Note that there is also a Server type whose
IGA is 0.0.0.0 in this set.
2. Address Mapping Sets and NAT Server Sets
Use the Address Mapping Sets menus and submenus to create the mapping table used to assign global addresses
to LAN clients. Each remote node must specify which NAT Address Mapping Set to use. The P2802HWL has
8 remote nodes and so allows you to configure 8 NAT Address Mapping Set. You can see nine NAT Address
Mapping sets in WEB GUI Network > NAT > Address Mapping. You can only configure from Set 1 to
Set 10 when you select Full Feature in WEB GUI NAT configuration. When you select SUA Only, thePort
Forwarding
will auto configure as to Many to one and Server as default in system.
The NAT Server Set is a list of LAN side servers mapped to external ports. To use this set (one set for the
Prestige), a server rule must be set up inside the NAT Address Mapping set. Please see NAT Server Sets for
further information on these menus.
Enter WEB GUI Network > NAT > Address Mapping to bring up Address Mapping Sets Menu.
Now let's look at WEB GUI MenuNetwork > NAT > Address Mapping.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
24
Page 25
Prestige 2802HW(L)-Ix Support Notes
FieldDescriptionOption/Example
# This is the rule index number.
Local Start IP This is the starting local IP address (ILA).
0.0.0.0 for the
Many-to-One type.
This is the starting local IP address (ILA). If the rule is for all
Local End IP
local IPs, then the Start IP is 0.0.0.0 and the End IP is
255.255.255.255
255.255.255.255.
Global Start
This is the starting global IP address (IGA). If you have a
0.0.0.0
IP
dynamic IP, enter 0.0.0.0 as the Global Start IP.
Global End IP This is the ending global IP address (IGA). N/A
Type This is the NAT mapping types. Many-to-One and Server
Click the edit icon to go to the screen where you can edit the
address mapping rule.
Modify
Click the delete icon to delete an existing address mapping
N/A
rule. Note that subsequent address mapping rules move up by
one when you take this action.
To edit an address mapping rule, click the rule's edit icon in the Address Mapping screen to display the screen
show next.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
25
Page 26
Prestige 2802HW(L)-Ix Support Notes
The following table describes the fields in this screen.
FieldDescriptionOption/Example
One-to-One
Press [CHOOSE BAR] to toggle through a total of 5 types.
Many-to-One
Many-to-Many Overload
Type
These are the mapping types discussed above plus a server type.
Many-to-Many No
Some examples follow to clarify these a little more.
Overload
Server
Start This is the starting local IP address (ILA) 0.0.0.0
Local
IP
End
This is the ending local IP address (ILA). If the rule is for all
local IPs, then put the Start IP as 0.0.0.0 and the End IP as
255.255.255.255
255.255.255.255. This field is N/A for One-to-One type.
This is the starting global IP address (IGA). If you have a
Global
IP
Start
dynamic IP, enter 0.0.0.0 as the Global Start IP.
This is the ending global IP address (IGA). This field is N/A for
End
0.0.0.0
200.1.1.64
One-to-One, Many-to-One and Server types.
Note: For all Local and Global IPs, the End IP address must begin after the IP Start address, i.e., you cannot
have an End IP address beginning before the Start IP address.
• NAT Server Sets
The NAT Server Set is a list of LAN side servers mapped to external ports (similar to the old SUA menu of
before). If you wish, you can make inside servers for different services, e.g., Web or FTP, visible to the outside
users, even though NAT makes your network appears as a single machine to the outside world. A server is
identified by the port number, e.g., Web service is on port 80 and FTP on port 21.
As an example (see the following figure), if you have a Web server at 192.168.1.36 and a FTP server at
192.168.1.33, then you need to specify for port 80 (Web) the server at IP address 192.168.1.36 and for port 21
(FTP) another at IP address 192.168.1.33.
26
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 27
Prestige 2802HW(L)-Ix Support Notes
Please note that a server can support more than one service, e.g., a server can provide both FTP and Mail
service, while another provides only Web service.
The following procedures show how to configure a server behind NAT.
Step 1. EnterNetwork > NAT > Address Mapping in the WEB GUI to go to Address Mapping Setup.
Step 2. Enter Edit Details of Server Mapping Setto go to NAT Server Setup.
Step 3. Selet the service type in Service Name field and the inside IP address of the server in the Server IP
Address field.
Step 4. Press Add icon to add your configuration after you define all the servers, press Apply icon to save the
settings.
27
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 28
Prestige 2802HW(L)-Ix Support Notes
The most often used port numbers are shown in the following table. Please refer RFC 1700 for further
information about port numbers.
ServicePort Number
FTP 20,21
Telnet 23
SMTP 25
DNS (Domain Name Server) 53
www-http (Web) 80
PPTP (Point-to-Point Tunneling
1723
Protocol)
1. Internet Access Only
In our Internet Access example, we only need one rule where all our ILAs map to one IGA assigned by the ISP.
See the following figure.
28
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 29
Prestige 2802HW(L)-Ix Support Notes
From WEB GUINetwork > NAT > General shown above simply choose the SUA Only option in the NAT
Setup. This is the Many-to-One mapping discussed earlier.
2. Internet Access with an Internal Server
29
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 30
Prestige 2802HW(L)-Ix Support Notes
In this case, we do exactly as above (use the convenient pre-configured SUA Only set) and also go to Menu
Network > NAT > Port Forwarding
as shown below.
to specify the Internet Server behind the NAT as shown in the NAT
3. Using Multiple Global IP addresses for clients and servers (One-to-One, Many-to-One, Server Set mapping
types are used)
30
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 31
Prestige 2802HW(L)-Ix Support Notes
In this case we have 3 IGAs (IGA1, IGA2 and IGA3) from the ISP. We have two very busy internal FTP
servers and also an internal general server for the web and mail. In this case, we want to assign the 3 IGAs by
the following way using 4 NAT rules.
5. Rule 1 (One-to-One type) to map the FTP Server 1 with ILA1 (192.168.1.10) to IGA1.
6. Rule 2 (One-to-One type) to map the FTP Server 2 with ILA2 (192.168.1.11) to IGA2.
7. Rule 3 (Many-to-One type) to map the other clients to IGA3.
8. Rule 4 (Server type) to map a web server and mail server with ILA3 (192.168.1.20) to IGA3. Type
Server allows us to specify multiple servers, of different types, to other machines behind NAT on
the LAN.
Step 1:
In this case, we need to configure Address Mapping Set 1 from Network > NAT > Address Mapping
Menu. Therefore we must choose the Full Feature option inNetwork > NAT > General.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
31
Page 32
Prestige 2802HW(L)-Ix Support Notes
Step 2:
Go to menu 15.1 and choose 1 (not 255, SUA this time) to begin configuring this new set. Enter a Set Name,
choose the Edit Action and then select 1 from Select Rule field. Press [ENTER] to confirm. See the following
setup for the four rules in our case.
Rule 1 Setup: Select One-to-One type to map the FTP Server 1 with ILA1 (192.168.1.10) to IGA1.
Rule 2 Setup: Selecting One-to-One type to map the FTP Server 2 with ILA2 (192.168.1.11) to IGA2.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
32
Page 33
Prestige 2802HW(L)-Ix Support Notes
Rule 3 Setup: Select Many-to-One type to map the other clients to IGA3.
Rule 4 Setup: Select Server type to map our web server and mail server with ILA3 (192.168.1.20) to IGA3.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
33
Page 34
Prestige 2802HW(L)-Ix Support Notes
When we have configured all four rules WEB GUI Address Mapping Configuration should look as follows.
Idx Local Start IP Local End IP Global Start IP Global End IP Type
Now we configure all other incoming traffic to go to our web server aand mail server from Menu 15.2 - NAT
Server Setup (not Set 1, Set 1 is used for SUA Only case).
34
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 35
Prestige 2802HW(L)-Ix Support Notes
4. Support Non NAT Friendly Applications
Some servers providing Internet applications such as some mIRC servers do not allow users to login using the
same IP address. In this case it is better to use Many-to-Many No Overload or One-to-One NAT mapping types,
thus each user login to the server using a unique global IP address. The following figure illustrates this.
One rule configured for using Many-to-Many No Overload mapping type is shown below.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
35
Page 36
Prestige 2802HW(L)-Ix Support Notes
The three rules configured for using One-to-One mapping type is shown below.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
36
Page 37
Prestige 2802HW(L)-Ix Support Notes
Prestige supports multiple type of NAT mapping rules
All contents copyright (c) 2007 ZyXEL Communications Corporation.
37
Page 38
Prestige 2802HW(L)-Ix Support Notes
• SUA
• One to One
• Many to One
• Many to Many overload
• Many One to One
• Server
The following table summarizes these types.
NAT TypeIP Mapping
One-to-One ILA1<--->IGA1
ILA1<--->IGA1
Many-to-One
ILA2<--->IGA1
(SUA/PAT)
...
ILA1<--->IGA1
ILA2<--->IGA2
Many-to-Many
ILA3<--->IGA1
Overload
ILA4<--->IGA2
ILA1<--->IGA1
ILA2<--->IGA2
Many-to-Many No
ILA3<--->IGA3
Overload
ILA4<--->IGA4
Server
(SUA)
...
Server 1 IP<--->IGA1
Server 2 IP<--->IGA1
All contents copyright (c) 2007 ZyXEL Communications Corporation.
38
Page 39
Prestige 2802HW(L)-Ix Support Notes
Using the Dynamic DNS (DDNS)
1. What is DDNS?
The DDNS service, an IP Registry provides a public central database where information such as email
addresses, hostnames, IPs etc. can be stored and retrieved. This solves the problems if your DNS server uses an
IP associated with dynamic IPs.
Without DDNS, we always tell the users to use the WAN IP of the Prestige to access the internal server. It is
inconvenient for the users if this IP is dynamic. With DDNS supported by the Prestige, you apply a DNS name
(e.g., www.zyxel.com.tw) for your server (e.g., Web server) from a DDNS server. The outside users can always
access the web server using the www.zyxel.com.tw regardless of the WAN IP of the Prestige.
When the ISP assigns the Prestige a new IP, the Prestige must inform the DDNS server the change of this IP so
that the server can update its IP-to-DNS entry. Once the IP-to-DNS table in the DDNS server is updated, the
DNS name for your web server (i.e., www.zyxel.com.tw) is still usable.
The DDNS server stores password-protected email addresses with IPs and hostnames and accepts queries based
on email addresses. So, there must be an email entry in the Prestige menu 1.
The DDNS servers the Prestige supports currently is WWW.DYNDNS.ORG where you apply the DNS from
and update the WAN IP to.
• Setup the DDNS
• Before configuring the DDNS settings in the Prestige, you must register an account from the
DDNS server such as WWW.DYNDNS.ORG first. After the registration, you have a hostname for
your internal server and a password using to update the IP to the DDNS server.
•Go toAdvanced > Dynamic DNS in WEB GUI and active 'Dynamic DNS' checkbox and press
Apply for configuring the settings of the DDNS.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
39
Page 40
Prestige 2802HW(L)-Ix Support Notes
Key Settings for using DDNS function:
Option Description
Active Dynamic DNS
Select this check box to use dynamic DNS
Enter the DDNS server in this field. Currently, we support
Service Provider
WWW.DYNDNS.ORG
Select the type of service that you are registered for from your Dynamic DNS
Dynamic DNS Type
service provider.
Enter the hostname you subscribe from the above DDNS server.
Host Name
You can specify up to two host names in the field separated by a comma (“,”)
User Name
Password
Enter the user name.
Enter the password that the DDNS server gives to you.
.
Enable Wildcard
Select the check box to enable DynDNS Wildcard.
Option
This option is available when CustomDNS is selected in the DDNS Type field.
Enable off line option
Check with your Dynamic DNS service provider to have traffic redirected to a
All contents copyright (c) 2007 ZyXEL Communications Corporation.
40
Page 41
Prestige 2802HW(L)-Ix Support Notes
RL (that you can specify) while you are off line.
Use WAN IP Addr ess
Select this option to update IP Address of the host name to the WAN IP Address.
Select this option only when there are one or more NAT routers between ZyXEL
Device and DDNS server. This feature has DDNS server automatically detect
Dynamic DNS server
auto detect IP Address
and use the IP address of the NAT router that has a public IP address.
NOTES :
The DDNS server may not be able to detect the proper IP address if there is an
HTTP proxy server between the ZyXEL Device and the DDNS server.
Use specific IP Address
Tyep the IP address of hostname. Use this if you have a static IP address.
Network Management Using SNMP
1. SNMP Overview
The
Simple Network Management Protocol
(SNMP) is an applications-layer protocol used to exchange the
management information between network devices (e.g., routers). By using SNMP, network administrators can
more easily manage network performance, find and solve network problems. The SNMP is a member of the
TCP/IP protocol suite, it uses the UDP to exchange messages between a management Client and an Agent,
residing in a network node.
There are two versions of SNMP: Version 1 and Version 2. ZyXEL supports SNMPv1. Most of the changes
introduced in Version 2 increase SNMP's security capabilities. SNMP encompasses three main areas:
1. A small set of management operations.
2. Definitions of management variables.
3. Data representation.
The operations allowed are: Get, GetNext, Set, and Trap. These functions operates on variables that exist in
network nodes. Examples of variables include statistic counters, node port status, and so on. All of the SNMP
management functions are carried out through these simple operations. No action operations are available, but
these can be simulated by the setting of flag variables. For example, to reset a node, a counter variable named
'time to reset' could be set to a value, causing the node to reset after the time had elapsed.
SNMP variables are defined using the OSI Abstract Syntax Notation One (ASN.1). ASN.1 specifies how a
variable is encoded in a transmitted data frame; it is very powerful because the encoded data is self-defining.
41
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 42
Prestige 2802HW(L)-Ix Support Notes
For example, the encoding of a text string includes an indication that the data unit is a string, along with its
length and value. ASN.1 is a flexible way of defining protocols, especially for network management protocols
where nodes may support different sets of manageable variables.
The net of variables that each node supports is called the
Management Information Base
(MIB). The MIB is
made up of several parts, including the Standard MIB, specified as part of SNMP, and Enterprise Specific MIB,
which are defined by different manufacturer for hardware specific management.
The current Internet-standard MIB, MIB-II, is defined in RFC 1213 and contains 171 objects. These objects are
grouped by protocol (including TCP, IP, UDP, SNMP, and other categories, including 'system' and 'interface.'
The Internet Management Model is as shown in figure 1. Interactions between the NMS and managed devices
can be any of four different types of commands:
6. Reads
Read is used to monitor the managed devices, NMSs read variables that are maintained by the devices.
7. Writes
Write is used to control the managed devices, NMSs write variables that are stored in the managed
devices.
8. Traversal operations
NMSs use these operations to determine which variables a managed device supports and to sequentially
gather information from variable tables (such as IP routing table) in managed devices.
9. Traps
The managed devices to asynchronously report certain events to NMSs use trap.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
42
Page 43
Prestige 2802HW(L)-Ix Support Notes
2. SNMPv1 Operations
SNMP itself is a simple request/response protocol. 4 SNMPv1 operations are defined as below.
•Get
Allows the NMS to retrieve an object variable from the agent.
•GetNext
Allows the NMS to retrieve the next object variable from a table or list within an agent. In
SNMPv1, when a NMS wants to retrieve all elements of a table from an agent, it initiates a Get
operation, followed by a series of GetNext operations.
•Set
Allows the NMS to set values for object variables within an agent.
•Trap
Used by the agent to inform the NMS of some events.
The SNMPv1 messages contains two part. The first part contains a version and a community name. The second
part contains the actual SNMP protocol data unit (PDU) specifying the operation to be performed (Get, Set, and
43
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 44
Prestige 2802HW(L)-Ix Support Notes
so on) and the object values involved in the operation. The following figure shows the SNMPv1 message
format.
The SNMP PDU contains the following fields:
• PDU type Specifies the type of PDU.
• Request ID Associates requests with responses.
• Error status Indicates an error and an error type.
• Error index Associates the error with a particular object variable.
• Variable-bindings Associates particular object with their value.
3. ZyXEL SNMP Implementation
ZyXEL currently includes SNMP support in some Prestige routers. It is implemented based on the SNMPv1, so
it will be able to communicate with SNMPv1 NMSs. For SNMPv1 operation, ZyXEL permits one community
string so that the router can belong to only one community and allows trap messages to be sent to only one
NMS manager.
Some traps are sent to the SNMP manager when anyone of the following events happens:
• coldStart (defined in RFC-1215) :
If the machine coldstarts, the trap will be sent after booting.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
44
Page 45
Prestige 2802HW(L)-Ix Support Notes
• warmStart (defined in RFC-1215) :
If the machine warmstarts, the trap will be sent after booting.
• linkDown (defined in RFC-1215) :
If any link of IDSL or WAN is down, the trap will be sent with the port number . The port number is its
interface index under the interface group.
• linkUp (defined in RFC-1215) :
If any link of IDSL or WAN is up, the trap will be sent with the port number . The port number is its
interface index under the interface group.
• authenticationFailure (defined in RFC-1215) :
When receiving any SNMP get or set requirement with wrong community, this trap is sent to the manager.
1. whyReboot (defined in ZYXEL-MIB) :
When the system is going to restart (warmstart), the trap will be sent with the reason of restart before rebooting.
(i) For intentional reboot :
In some cases (download new files, CI command "sys reboot", ...), reboot is done intentionally. And traps with
the message "System reboot by user !" will be sent.
(ii) For fatal error :
System has to reboot for some fatal errors. And traps with the message of the fatal code will be sent.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
45
Page 46
Prestige 2802HW(L)-Ix Support Notes
4. Configure the Prestige for SNMP
The SNMP related settings in Prestige are configured in WEB GUI menu
SNMP
, SNMP Configuration. The following steps describe a simple setup procedure for configuring all SNMP
settings.
Advanced > Remote MGMT >
All contents copyright (c) 2007 ZyXEL Communications Corporation.
46
Page 47
Prestige 2802HW(L)-Ix Support Notes
Key Settings:
Option Descriptions
You may change the server port number for a server if needed, however you must use
Port
the same port number in order to use that service for remote management.
Select the interface through which a computer may access the ZyXEL Device using
Access Status
the service.
A secured client is a “trusted” computer that is allowed to communicate with the
ZyXEL device using this service.
Secured Client
Select All to allow any computer to access ZyXEL device using this service.
IP
Choose Selected to just allow the computer with the IP address that you specify to
access the ZyXEL device using this service.
Enter the correct Get Community. This Get Community must match the 'Get-' and
Get Community
'GetNext' community requested from the NMS. The default is 'public'.
Set Community
Community
Enter the correct Set Community. This Set Community must match the
'Set-community requested from the NMS. The default is 'public'.
Enter the community name in each sent trap to the NMS. This Trap Community must
match what the NMS is expecting. The default is 'public'.
47
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 48
Prestige 2802HW(L)-Ix Support Notes
Destination
Using syslog
4. Prestige Setup
Enter the IP address of the NMS that you wish to send the traps to. If 0.0.0.0 is entered, the Prestige will not send trap any NMS manager.
Configuration:
1. Click Active to enable Syslog logging.
2. Syslog IP Address, enter the IP address of the UNIX server that you wish to send the syslog.
3. Log Facility, select the location from the drop down list box. The log facility allows you to log the messages
to different files in the syslog server. Refer to the syslog server manual for more information.
• UNIX Setup
48
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 49
Prestige 2802HW(L)-Ix Support Notes
1. Make sure that your syslogd starts with -r argument.
-r
, this option will enable the facility to receive message from the network using an Internet domain socket with
the syslog services. The default setting is not enabled.
2. Edit the file /etc/syslog.conf by adding the following line at the end of the /etc/syslog.conf file.
local1.* /var/log/zyxel.log
Where /var/log/zyxel.log is the full path of the log file.
3. Restart syslogd.
• CDR log(call messages)
Format:
sdcmdSyslogSend( SYSLOG_CDR, SYSLOG_INFO, String );
String = board xx line xx channel xx, call xx, str
board = the hardware board ID
line = the WAN ID in a board
channel = channel ID within the WAN
call = the call reference number which starts from 1 and increments by 1 for each new call
str = C01 Outgoing Call dev xx ch xx (dev:device No. ch:channel No.)
C01 Incoming Call xxxxBps xxxxx (L2TP,xxxxx means Remote Call ID)
C01 Incoming Call xxxx (means connected speed) xxxxx (means Remote Call ID)
L02 Tunnel Connected(L2TP)
C02 OutCall Connected xxxx (means connected speed) xxxxx (means Remote Call ID)
C02 CLID call refused
L02 Call Terminated
C02 Call Terminated
Example:
Feb 14 16:57:17 192.168.1.1 ZyXEL Communications Corp.: board 0 line 0 channel 0, call 18, C01 Incoming
Call OK
Feb 14 17:07:18 192.168.1.1 ZyXEL Communications Corp.: board 0 line 0 channel 0, call 18, C02 Call Terminated
49
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 50
Prestige 2802HW(L)-Ix Support Notes
• Packet triggered log
Format:
sdcmdSyslogSend( SYSLOG_PKTTRI, SYSLOG_NOTICE, String );
String = Packet trigger: Protocol=xx Data=xxxxxxxxxx
Protocol: (1:IP 2:IPX 3:IPXHC 4:BPDU 5:ATALK 6:IPNG)
Data: We will send forty-eight Hex characters to the server
This message is available when the 'Log' is enabled in the filter rule setting. The message consists of the packet
header and the log of the filter rules.
Format:
sdcmdSyslogSend(SYSLOG_FILLOG, SYSLOG_NOTICE, String );
String = IP[Src=xx.xx.xx.xx Dst=xx.xx.xx.xx prot spo=xxxx dpo=xxxx]S04>R01mD
IP[...] is the packet header and S04>R01mD means filter set 4 (S) and rule 1 (R), match (m) drop (D).
Src: Source Address
Dst: Destination Address
prot: Protocol (TCP,UDP,ICMP)
spo: Source port
dpo: Destination port
In a typical environment, a LAN router is required to connect two local networks. The Prestige can connect
three local networks to the ISP or a remote node, we call this function as 'IP Alias'. In this case, an internal
router is not required. For example, the network manager can divide the local network into three networks and
connect them to the Internet using Prestige's single user account. See the figure below.
51
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 52
Prestige 2802HW(L)-Ix Support Notes
The Prestige supports three virtual LAN interfaces via its single physical Ethernet interface. The first network
can be configured in menu 3.2 as usual. The second and third networks that we call 'IP Alias 1' and 'IP Alias 2'
can be configured in menu 3.2.1-IP Alias Setup.
There are three internal virtual LAN interfaces for the Prestige to route the packets from/to the three networks
correctly. They are enif0 for the major network, enif0:0 for the IP alias 1 and enif0:1 for the IP alias 2.
Therefore, three routes are created in the Prestige as shown below when the three networks are configured. If
the Prestige's DHCP is also enabled, the IP pool for the clients can be any of the three networks.
Dest FF Len Interface Gateway Metric stat Timer Use
192.168.3.0 00 24 enif0:1 192.168.3.1 1 041b 0 0
192.168.2.0 00 24 enif0:0 192.168.2.1 1 041b 0 0
192.168.1.0 00 24 enif0 192.168.1.1 1 041b 0 0
ras>
Two new protocol filter interfaces in menu 3.2.1 allow you to accept or deny LAN packets from/to the IP alias
1 and IP alias 2 go through the Prestige. The filter set in menu 3.1 is used for main network configured in menu
3.2.
• IP Alias Setup
1. Edit the first network in WEB GUI menu Network > LAN > IP Aliasby configuring the Prestige's first
LAN IP address.
52
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 53
Prestige 2802HW(L)-Ix Support Notes
Key Settings:
IP Alias 1,2
Select the check box to configure another LAN network for ZyXEL Device.
Enter IP address of your ZyXEL Device in dotted decimal notation.
IP Addr ess
Alternatively, click the right mouse button to copy and/or pate IP address.
Your ZyXEL device will automatically calculate the subnet mask based on the IP address
IP Subnet
the you assign. Unless you are implementing subnetting, use the subnet mask computed
Mask
by ZyXEL device.
Using IP Multicast
• What is IP Multicast ?
Traditionally, IP packets are transmitted in two ways - unicast or broadcast. Multicast is a third way to
deliver IP packets to a group of hosts. Host groups are identified by class D IP addresses, i.e., those with
53
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 54
Prestige 2802HW(L)-Ix Support Notes
"1110" as their higher-order bits. In dotted decimal notation, host group addresses range from 224.0.0.0 to
239.255.255.255. Among them, 224.0.0.1 is assigned to the permanent IP hosts group, and 224.0.0.2 is
assigned to the multicast routers group.
IGMP (Internet Group Management Protocol) is the protocol used to support multicast groups. The latest
version is version 2 (see RFC2236). IP hosts use IGMP to report their multicast group membership to any
immediate-neighbor multicast routers so the multicast routers can decide if a multicast packet needs to be
forwarded. At start up, the Prestige queries all directly connected networks to gather group membership.
After that, the Prestige updates the information by periodic queries. The Prestige implementation of IGMP is
also compatible with version 1. The multicast setting can be turned on or off on Ethernet and remote nodes.
• IP Multicast Setup
Enable IGMP in Prestige's LAN in WEB GUI Network > LAN > Advanced :
Enable IGMP in Prestige's WAN remote node in WEB GUI Network > WAN > Internet Connection >
Advanced Setup
t:
All contents copyright (c) 2007 ZyXEL Communications Corporation.
54
Page 55
Prestige 2802HW(L)-Ix Support Notes
Key Settings:
Multicast
IGMP-v1 for IGMP version 1, IGMP-v2 for IGMP version 2.
Using Prestige traffic redirect
• What is Traffic Redirect ?
Traffic redirect forwards WAN traffic to a backup gateway when Prestige cannot connect to the Internet
through it's normal gateway. Thus make your backup gateway as an auxiliary backup of your WAN
connection. Once Prestige detects it's WAN connectivity is broken, Prestige will try to forward outgoing
traffic to backup gateway that users specify in traffic redirect configuration menu.
• How to deploy backup gateway?
You can deploy the backup gateway on LAN of Prestige.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
55
Page 56
Prestige 2802HW(L)-Ix Support Notes
Traffic Redirect on LAN port
• Traffic Redirect Setup
Configure parameters that determine when Prestige will forward WAN traffic to the backup gateway using
Network > WAN > WAN Backup in WEB GUI.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
56
Page 57
Prestige 2802HW(L)-Ix Support Notes
Key Settings:
Label Description
Backup
Type
Check
WAN IP
Address1-3
Fail
Select the method that the Prestige uses to check the DSL connection.
Select DSL Link to have the Prestige check if the connection to the DSLAM is up. Select ICMP to have the
Prestige periodically ping the IP addresses configured in the Check WAN IP Address fields.
Configure this field to test your Prestige's WAN accessibility. Type the IP address of a reliable nearby
computer (for example, your ISP's DNS server address).
If you select ICMP in the Backup Type field, you must configure at least one IP address here.
When using a WAN backup connection, the Prestige periodically pin gs the addresses configured here and
uses the other WAN backup connection (if configured) if there is no response.
Type the number of times (2 recommended) that your Prestige may ping the IP addresses configured in the
Tolerance
Recovery
Check WAN IP Address fields without getting a response before switching to a WAN backup connection (or
a different WAN backup connection).
When the Prestige is using a lower priority connection (usually a WAN backup connection), it periodically
All contents copyright (c) 2007 ZyXEL Communications Corporation.
57
Page 58
Prestige 2802HW(L)-Ix Support Notes
Label Description
Interval
Timeout
Traffic
Redirect
Active
Metric
checks to whether or not it can use a higher priority connection.
Type the number of seconds (30 recommended) for the Prestige to wait between checks. Allow more time if
your destination IP address handles lots of traffic.
Type the number of seconds (3 recommended) for your Prestige to wait for a ping response from one of the
IP addresses in the Check WAN IP Address fields before timing out the request. The WAN connection is
considered "down" after the Prestige times out the number of times specified in the Fail Tolerance field. Use
a higher value in this field if your network is busy or congested.
Select this check box to have the Prestige use traffic redirect if the normal WAN connection goes down.
If you activate traffic redirect, you must configure at least one Check WAN IP Address.
This field sets this route's priority among the routes the Prestige uses.
The metric represents the "cost of transmission". A router determines the best route for transmission by
choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a
minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number
greater than "15" means the link is down. The smaller the number, the lower the "cost".
Backup
Gateway
Back Click Back to return to the previous screen.
Apply Click Apply to save the changes.
Cancel Click Cancel to begin configuring this screen afresh.
Type the IP address of your backup gateway in dotted decimal notation. The Prestige automatically forwards
traffic to this IP address if the Prestige's Internet connection terminates.
Using Universal Plug n Play (UPnP)
• 1. What is UPnP
All contents copyright (c) 2007 ZyXEL Communications Corporation.
58
Page 59
Prestige 2802HW(L)-Ix Support Notes
UPnP (Universal Plug and Play) makes connecting PCs of all form factors, intelligent appliances, and wireless
devices in the home, office, and everywhere in between easier and even automatic by leveraging TCP/IP and
Web technologies. UPnP can be supported on essentially any operating system and works with essentially any
type of physical networking media – wired or wireless.
UPnP also supports NAT Traversal which can automatically solve many NAT unfriendly problems. By UPnP,
applications assign the dynamic port mappings to Internet gateway and delete the mappings when the
connections are complete.
The key components in UPnP are devices, services, and control points.
•Devices: Network devices, such as networking gateways, TV, refrigerators, printers...etc, which
provides services.
•Services: Services are provided by devices, such as time services provided by alarm clocks. In
UPnP, services are described in XML format. Control points can set/get services information from
devices.
•Control points: Control points can manipulate network devices When you add a new control
point (in this case, a laptop) to a network, the device may ask the network to find UPnP-enabled
devices. These devices respond with their URLs and device descriptions.
UPnP Operations
All contents copyright (c) 2007 ZyXEL Communications Corporation.
59
Page 60
Prestige 2802HW(L)-Ix Support Notes
•Addressing: UPnPv1 devices MAY support IPv4, IPv6, or both. For IPv4, each devices should have DHCP
client, when the device gets connected to the network, it will discover DHCP server on network to get an IP
address. If not, then Auto-IP mechanism should be supported so that the device can give itself an IP
address.(169.254.0.0/16)
•Discovery: Whenever a device is added on the network, it will advertise it's service over the network.
Control point can also discover services provided by devices.
• Description: Control points can get more detailed service information from devices' description in XML
format. The description may include product name, model name, serial number, vendor ID, and
embedded services...etc.
• Control: Devices can be manipulated by control points through Control message.
• Eventing: Devices can send event message to notify control points if there is any update on services
provided.
• Presentation: Each device can provide their own control interface by URL link. So that users can go to
the device's presentation web page by the URL to control this device.
• 2. Using UPnP in ZyXEL devices
In this example, we will introduce how to enable UPnP function in ZyXEL devices. Currently, Microsoft MSN
is the most popular application exploiting UPnP, so we take Microsoft MSN application as an example in this
support note. You can learn how MSN benefit from NAT traversal feature in UPnP in this application note.
In the diagram, suppose PC1 and PC2 both sign in MSN server, and they would like to establish a video
conference. PC1 is behind PPPoE dial-up router which supports UPnP. Since the router supports UPnP, we
don't need to setup NAT mapping for PC1. As long as we enable UPnP function on the router, PC1 will assign
the mapping to the router dynamically. Note that since PC1 must support UPnP, we presume that it's OS is
Microsoft WinME or WinXP.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
60
Page 61
Prestige 2802HW(L)-Ix Support Notes
Device: Prestige Router
Service: NAT function provided by Prestige Router
Control Point: PC1
1. Enable UPnP function in ZyXEL device
Go to Advanced->UPnP, check two boxes, Active UPnP feature and Allow users to make configuration
changes through UPnP.
The first check box enables UPnP function in this device.
The second check box allow users' application to change configuration in this device. For instance, if you
enable this item, then user's MSN application can assign dynamic port mapping to the router. So that network
administrator don't need to setup SUA port mapping in the router.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
61
Page 62
Prestige 2802HW(L)-Ix Support Notes
2. After getting IP address, you can go to open MSN application on PC and sign in MSN server.
3. Start a Video conversation with one online user.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
62
Page 63
Prestige 2802HW(L)-Ix Support Notes
4. On the opposite side, your partner select Accept to accept your conversation request.
5. Finally, your video conversation is achieved.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
63
Page 64
Prestige 2802HW(L)-Ix Support Notes
Wireless Application Notes
Infrastructure mode
What is Infrastructure mode?
Infrastructure mode, sometimes referred to as Access Point mode, is an operating mode of an 802.11b/Wi-Fi
client unit. In infrastructure mode, the client unit can associate with an 802.11b/Wi-Fi Access Point and
communicate with other clients in infrastructure mode through that access point.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
64
Page 65
Prestige 2802HW(L)-Ix Support Notes
Configuration Wireless Access Point to Infrastructure mode using Web configurator.
To configure Infrastructure mode of your Prestige wireless VoIP IAD please follow the steps below.
1. From the web configurator main menu, clickNetwork > Wireless LAN > General.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
65
Page 66
Prestige 2802HW(L)-Ix Support Notes
3. Configure the desired configuration on Prestige wireless VoIP IAD and check the Active wireless LAN
check box.
4. When finish click on apply button to take effect.
•
Configuration Wireless Station to Infrastructure mode
To configure Infrastructure mode on your ZyAIR B-100/B-200/B-300 wireless NIC card please follow the
following steps.
1. Double click on the utility icon in your windows task bar the utility will pop up on your windows screen.
2. Select configuration tab.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
66
Page 67
Prestige 2802HW(L)-Ix Support Notes
3. Select Infrastructure from the operation mode pull down menu, fill in an SSID or leave it as any if you wish
to connect to any AP than press Apply Change to take effect.
4. Click on Site Survey tab, and press search all the available AP will be listed.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
67
Page 68
Prestige 2802HW(L)-Ix Support Notes
5. Double click on the AP you want to associated with.
6. After the client have associated with the selected AP. The linked AP's channel, current linkup rate, SSID,
link quality, and signal strength will show on the Link Info page. You now successfully associate with the
selected AP with Infrastructure Mode.
Wireless MAC address filtering
MAC Filter Overview
Users can use MAC Filter as a method to restrict unauthorized stations from accessing the APs. ZyXEL's APs
provide the capability for checking MAC address of the station before allowing it to connect to the network.
This provides an additional layer of control layer in that only stations with registered MAC addresses can
connect. This approach requires that the list of MAC addresses be configured.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
68
Page 69
Prestige 2802HW(L)-Ix Support Notes
2. ZyXEL MAC Filter Implementation
ZyXEL's MAC Filter Implementation allows users to define a list to allow or block association from STAs. The
filter set allows users to input 12 entries in the list. If Allow Association is selected, all other STAs which are
not on the list will be denied. Otherwise, if Deny Association is selected, all other STAs which are not on the
list will be allowed for association. Users can choose either way to configure their filter rule.
3. Configure the WLAN MAC Filter
The MAC Filter related settings in ZyXEL APs are configured in menu 3.5.1, WLAN MAC Address Filter
Configuration. Before you configure the MAC filter, you need to know the MAC address of the client first. If
not knowing what your MAC address is, please enter a command "ipconfig /all" after DOS prompt to get the
MAC (physical) address of your wireless client.
If you use WEB configuration, the MAC Address Filter configuration are as shown below.
1. Using a web browser, login AP by giving the LAN IP address of AP in URL field. Default LAN IP is
192.168.1.1, default password to login web configurator is 1234.
2. Click Network, and click Wireless LAN tab on the left.
3. Click MAC Filter link and check Active MAC Filter to enable MAC Filter.
4. Select the Filter Action to allow or deny association from hosts in the list.
5. Enter the MAC Addresses which you may want to apply the filter to allow or block associations from.
6. Click Apply to make your setting work.
69
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 70
Prestige 2802HW(L)-Ix Support Notes
Key Settings :
Option Descriptions
Allow or block association from MAC addresses contained in this list. If Allow Association
is selected in this field, hosts with MAC addresses configured in this list will be allowed to
Filter Action
associate with AP. If Deny Association is selected in this field, hosts with MAC addresses
configured in this list will be blocked.
MAC Address This field specifies those MAC Addresses that you want to add in the list.
WEP configuration (Wired Equivalent Privacy)
Introduction
70
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 71
Prestige 2802HW(L)-Ix Support Notes
The 802.11 standard describes the communication that occurs in wireless LANs.
The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from
eavesdropping, because wireless transmissions are easier to intercept than transmissions over wired
networks, and wireless is a shared medium, everything that is transmitted or received over a wireless
network can be intercepted.
WEP relies on a secret key that is shared between a mobile station (e.g. a laptop with a wireless Ethernet
card) and an access point (i.e. a base station). The secret key is used to encrypt packets before they are
transmitted, and an integrity check is used to ensure that packages are not modified during the transition.
The standard does not discuss how the shared key is established. In practice, most installations use a
single key that is shared between all mobile stations and access points APs.
WEP employs the key encryption algorithm, Ron's Code 4 Pseudo Random Number Generator (RC4
PRNG). The same key is used to encrypt and decrypt the data.
WEP has defences against this attack. To avoid encrypting two cipher texts with the same key stream, an
Initialisation Vector (IV) is used to augment the shared WEP key (secret key) and produce a different
RC4 key for each packet, the IV is also included in the package. WEP key (secret key) are available in
two types, 64-bits and 128-bits. Many times you will see them referenced as 40-bits and 104-bits instead.
The reson for this misnomer is that the WEP key ( 40/104 bits ) is concatenated with the initialisation
vector ( 24 bits ) resulting in a 64/128 bit total key size.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
71
Page 72
Prestige 2802HW(L)-Ix Support Notes
Setting up the Access Point
Most access points and clients have the ability to hold up to 4 WEP keys simultaneously. You need to
specify one of the 4 keys as default Key for data encryption. To set up the Access Point, you will need to
set the one of the following parameters:
o 64-bit WEP key (secret key) with 5 characters
o 64-bit WEP key (secret key) with 10 hexadecimal digits
o 128-bit WEP key (secret key) with 13 characters
o 128-bit WEP key (secret key) with 26 hexadecimal digits
All contents copyright (c) 2007 ZyXEL Communications Corporation.
72
Page 73
Prestige 2802HW(L)-Ix Support Notes
• Setting up the Access Point with Web configurator
Key settings
Hexadecimal digits have to preceded by '0x',
WEP Key type Example
Key1= 2e3f4
Key2= 5y7js
64-bit WEP with 5 characters
Key3= 24fg7
Key4= 98jui
Key1= 0x123456789A
64-bit WEP with 10 hexadecimal digits
Key2= 0x23456789AB
('0-9', 'A-F')
Key3= 0x3456789ABC
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Select one of the WEP key as default Key to encrypt wireless data transmission.
The receiver will use the corresponding key to decrypt the data.
For example, if access point use Key 3 to encrypt data, then station will use Key 3 to decrypt data.
So, the Key 3 of station has to equal to the Key 3 of access point.
Though access point use Key 3 as default key, but the station can use the other Key as its default key to
encrypt wireless data transmission.
Access Point (encrypt data by Key 3) --------> Station (decrypt data by Key 3)
Access Point (decrypt data by Key 2) <-------- Station (encrypt data by Key 2)
In this case, access point transmits data to station which encrypt data by Key 3 of access point. The
station will decrypt the data by its Key 3.
At the same time, when the station transmits data to access point which encrypt data by Key 2.
The access point will decrypt the data by its Key 2.
Enter exactly 5, 13 or 29 characters to match the security strength 40/64bit, 128-bit, 256-nit respectively.
Setting up the Station
1. Double click on the utility icon in your windows task bar or right click the utility icon then select
'Show Config Utility'.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
74
Page 75
Prestige 2802HW(L)-Ix Support Notes
The utility will pop up on your windows screen.
Note: If the utility icon doesn't exist in your task bar, click Start -> Programs -> IEEE802.11b WLAN
Card -> IEEE802.11b WLAN Card.
2. Select the 'Encryption' tab.
Select encryption type correspond with access point.
Set up 4 Keys which correspond with the WEP Keys of access point.
And select on WEP key as default key to encrypt wireless data transmission.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
75
Page 76
Prestige 2802HW(L)-Ix Support Notes
All contents copyright (c) 2007 ZyXEL Communications Corporation.
76
Page 77
Prestige 2802HW(L)-Ix Support Notes
Key settings
The WEP Encryption type of station has to equal to the access point.
Check 'ASCII' field for characters WEP key or uncheck 'ASCII'field for Hexadecimal digits WEP key.
Hexadecimal digits don't need to preceded by '0x'.
IEEE 802.1x port-based authentication is desired to prevent unauthorized devices (clients) from gaining access
to the network. As LANs extend to hotels, airports, and corporate lobbies, insecure environments could be
created. 802.1x port-based network access control makes use of the physical access characteristics of IEEE 802 LAN infrastructures, such as 802.3 Ethernet, 802.11 Wireless LAN and VDSL LRE (Long Reach
Ethernet), in order to provide a means of authenticating and authorizing devices attached to a LAN port
that has point-to-point connection characteristics, and of preventing access to that port in cases the
authentication process fails.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
77
Page 78
Prestige 2802HW(L)-Ix Support Notes
IEEE 802.1x authentication is a client-server architecture delivered with EAPOL (Extensible Authentication
Protocol over LAN). The authentication server authenticates each client connected to a Access Point (For
Wireless LAN) or switch port (for Ethernet) before accessing any services offered by the Wireless AP. 802.1x
contains tree major components :
1. Authenticator :
The device (i.e. Wireless AP) facilitates authentication for the supplicant (Wireless client) attached on the
Wireless network. Authenticator controls the physical access to the network based on the authentication status
of the client. The authenticator acts as an intermediary (proxy) between the client and the authentication server
(i.e. RADIUS server), requesting identity information from the client, verifying that information with the
authentication server, and relaying a response to the client.
2. Supplicant :
The station (i.e. Wireless client) is being authenticated by an authenticator attached on the Wireless
network. The supplicant requests access to the LAN services and responds to the requests from the
authenticator. The station must be running 802.1x-compliant client software such as that offered in the
Microsoft Windows XP operating system, Meeting House AEGIS 802.1x client and Odyssey 802.1x client.
3. Authentication Server :
All contents copyright (c) 2007 ZyXEL Communications Corporation.
78
Page 79
Prestige 2802HW(L)-Ix Support Notes
The device (i.e. RADIUS server) provides an authentication service to an authenticator. This service
determines, from the credentials provided by the supplicant, whether the supplicant is authorized to
access the services provided by the authenticator. The authentication server performs the actual
authentication of the client. It validates the identity of the supplicant. Because the authenticator acts as the
proxy, the authentication service is transparent to the supplicant.
Some Wireless AP (i.e. ZyXEL Wireless AP) have built-in authentication server, external RADIUS
authentication server is not needed. In this case, Wireless AP is acted as both authenticator and authentication
server.
• Authentication Port State and Authentication Control
The port state determines whether or not the supplicant (Wireless Client) is granted access to the network
behind Wireless AP. There are two authentication port state on the AP, authorized state and unauthorized state.
By default, the port starts in the unauthorized state. While in this state, the port disallows all incoming and
outgoing data traffic except for 802.1x packets. When a supplicant is successfully authenticated, the port
transitions to the authorized state, allowing all traffic for the client to flow normally. If a client that does not
support 802.1x is connected to an unauthorized 802.1x port, the authenticator requests the client's identity. In
this situation, the client does not respond to the 802.1x request, the port remains in the unauthorized state, and
the client is not granted access to the network.
When 802.1x is enabled, the authenticator controls the port authorization state by using the following control
parameters. The following three authentication control parameter are applied in Wireless AP.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
79
Page 80
Prestige 2802HW(L)-Ix Support Notes
1. Force Authorized : Disables 802.1x and causes the port to transition to the authorized state without any
authentication exchange required. The port transmits and receives normal traffic without 802.1x-based
authentication of the client. This is the default port control setting. While AP is setup as Force Authorized,
Wireless client (supported 802.1x client or none-802.1x client) can always access the network.
2. Force Unauthorized : Causes the port to remain in the unauthorized state, ignoring all attempts by the client
to authenticate. The authenticator cannot provide authentication services to the supplicants through the port.
While AP is setup as Force Unauthorized, Wireless clients (supported 802.1x client or none-802.1x client)
never have the access for the network.
3. Auto : Enables 802.1x and causes the port to begin in the unauthorized state, allowing only EAPOL frames to
be sent and received through the port. The authentication process begins when the link state of the port
transitions from down to up, or when an EAPOL-start frame is received requests the identity of the client and
begins relaying authentication messages between supplicant and the authentication server. Each supplicant
attempting to access the network is uniquely identified by the authenticator by using the client's MAC address.
While AP is setup as Auto, only Wireless client supported 802.1x client can access the network.
• Re-Authentication
The administrator can enable periodic 802.1x client re-authentication and specify how often it occurs. When
re-authentication time out, Authenticator will send EAP-Request/ Identity to reinitiate authentication process.
In ZyXEL Wireless AP 802.1x implementation, if you do not specify a time period before enabling
re-authentication, the number of seconds between re-authentication attempts is 1800 seconds (30 minutes).
• EAPOL (Extensible Authentication Protocol over LAN)
Authenticators and supplicants communicate with one another by using the Extensible Authentication Protocol
(EAP, RFC-2284). EAP was originally designed to run over PPP and to authenticate dial-in users, but 802.1x
defines an encapsulation method for passing EAP packets over Ethernet frames. This method is referred to as
EAP over LANs, or EAPOL. Ethernet type of EAPOL is 88-8E , two octets in length. EAPOL encapsulations
are described for IEEE 802 compliant environment, such as 802.3 Ethernet, 802.11 Wireless LAN and Token
Ring/FDDI.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
80
Page 81
Prestige 2802HW(L)-Ix Support Notes
The EAP protocol can support multiple authentication mechanisms, such as MD5-challenge, One-Time
Passwords, Generic Token Card, TLS and TTLS etc. Typically, the authenticator will send an initial Identity
Request followed by one or more Requests for authentication information. When supplicant receive the EAP
request, it will reply associated EAP response. So far, ZyXEL Wireless AP only supports MD-5 challenge
authentication mechanism, but will support TLS and TTLS in the future.
EAPOL Exchange between 802.1x Authenticator and Supplicant
The authenticator or the supplicant can initiate authentication. If you enable 802.1x authentication on the
Wireless AP, the authenticator must initiate authentication when it determines that the Wireless link state
transitions from down to up. It then sends an EAP-request/identity frame to the 802.1x client to request its
identity (typically, the authenticator sends an initial identity/request frame followed by one or more requests for
authentication information). Upon receipt of the frame, the supplicant responds with an EAP-response/identity
frame.
However, if during bootup, the supplicant does not receive an EAP-request/identity frame from the Wireless AP,
the client can initiate authentication by sending an EAPOL-Start frame, which prompts the switch to request the
supplicant's identity. In above case, authenticator co-locate with authentication server. When the supplicant
supplies its identity, the authenticator directly exchanges EAPOL to the supplicant until authentication succeeds
or fails. If the authentication succeeds, the port becomes authorized. If the authentication fails, the port becomes
unauthorized. When the supplicant does not need Wireless access any more, it sends EAPOL-Logoff packet to
terminate its 802.1x session, the port state will become unauthorized. The following figure shows the EAPOL
exchange ping-pong chart.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
81
Page 82
Prestige 2802HW(L)-Ix Support Notes
The EAPOL packet contains the following fields: protocol version, packet type, packet body length and packet
body. Most of the fields are obvious. The packet type can have four different values, and these values are
described below:
All contents copyright (c) 2007 ZyXEL Communications Corporation.
82
Page 83
Prestige 2802HW(L)-Ix Support Notes
• EAP-Packet : Both the supplicant and the authenticator send this packet when authentication is
taking place. This is the packet that contains either the MD5-Challenge or TLS information
required for authentication.
• EAPOL-Start : This supplicant sends this packet when it wants to initiate the authentication
process.
• EAPOL-Logoff : The supplicant sends this packet when it wants to terminate its 802.1x session.
• EAPOL-Key : This is used for TLS authentication method. The Wireless AP uses this packet to
send the calculated WEP key to the supplicant after TLS negotiation has completed between the
supplicant and the RADIUS server.
IEEE 802.1x Configuration in ZyXEL Wireless Access Point
•Enable 802.1x in AP
When the IEEE 802.1x authentication is enabled, the wireless client must be authenticated by the ZyXEL AP
before it can communicate on your network through ZyXEL AP. By default, the 802.1x function is disabled
(Authentication Control= Force Authorized) to allow all wireless client. You can use Web Configuration to
configure it.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
83
Page 84
Prestige 2802HW(L)-Ix Support Notes
Configure in WEB GUI Configuration,
1. From the Web Configurator main menu, ClickNetwork > Wireless LAN > General and select
802.1x
2. Click Apply to make your setting work.
•
Using Internal Authentication Server
ZyXEL Wireless Access Point has an internal authentication server for authenticating the wireless 802.1x client
users. It builds total 32-users database and allows up to 32 authorized users to login to the Wireless AP
simultaneously. When you use internal authentication server, ZyXEL wireless AP is acted as Authenticator and
Authentication Server.
By storing wireless 802.1x client profiles locally, your ZyXEL AP is able to authenticate wireless client without
interacting with a extra network RADIUS server. Follow the steps to add user accounts on your ZyXEL AP.
84
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 85
Prestige 2802HW(L)-Ix Support Notes
Configure in WEB Configurator,
1. From the Web Configurator main menu, Network -> Wireless LA N -> Local User Database
2. Select one of the profile and check Active check box
3. Input the User Name andPassword then click Apply to save the profile.
Key settings :
OptionDescriptionsUser Name
Enter a username up to 31 alphanumeric characters long.
Press [SPACE BAR] to select Yes and press [Enter] to activate this 802.1x client
Active
profile.
Password
Enter a password up to 31 characters long.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
85
Page 86
Prestige 2802HW(L)-Ix Support Notes
• Using External RADIUS Authentication Server
In addition to the internal authentication server inside ZyXEL AP, you can use external RADIUS authentication
server to centrally manage the user account profile. RADIUS is based on a client-server model that supports
authentication, authorization and accounting. The wireless AP is the client and the server is the RADIUS server.
The authenticator includes the RADIUS client, which is responsible for encapsulating and decapsulating the
Extensible Authentication Protocol (EAP) frames and interacting with the authentication server. When the
authenticator receives EAPOL frames and relays them to the authentication server, the Ethernet header is
stripped and the remaining EAP frame is re-encapsulated in the RADIUS format. The EAP frames are not
modified or examined during encapsulation, and the authentication server must support EAP within the native
frame format. When the authenticator receives frames from the authentication server, the server's frame
header is removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the supplicant.
When the client supplies its identity, the authenticator begins its role as the intermediary, passing EAP frames
between the supplicant and the authentication server until authentication succeeds or fails. If the authentication
succeeds, the switch port becomes authorized. The specific exchange of EAP frames depends on the
authentication method being used. The figure below shows a message exchange initiated by the client using the
MD5 Challenge authentication method with a RADIUS server.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
86
Page 87
Prestige 2802HW(L)-Ix Support Notes
2.
Configure in WEB GUI Configurator,:
From the Web Configurator main menu, Click Network -> Wireless Lan to setup the RADIUS authentication
and accounting server configuration.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
87
Page 88
Prestige 2802HW(L)-Ix Support Notes
If accounting is required, you must setup the external RADIUS accounting server. Normally, RADIUS
authentication server and RADIUS accounting server are put in the same machine. However, they own
separated UDP port and shared secret, you can separate authentication and accounting service in two different
RADIUS servers. You can refer to RADIUS authentication configuration.
Key settings for authentication server:
OptionDescriptions
Server Address
Enter the IP address of the external RADIUS authentication server.
The default port of RADIUS server for authentication is 1812. You need not change
Port
this value unless your network administrator instructs you to do so.
Specify a password (up to 31 characters) as the key to be shared between external
RADIUS authentication server and ZyXEL AP (RADIUS client). The key is not send
Shared Secret
to the network. This key must be the same on the external RADIUS authentication
server and ZyXEL AP.
Site Survey
Introduction
What is Site Survey?
All contents copyright (c) 2007 ZyXEL Communications Corporation.
88
Page 89
Prestige 2802HW(L)-Ix Support Notes
An RF site survey is a MAP to RF contour of RF coverage in a particular facility. With wireless system it is
very difficult to predict the propagation of radio waves and detect the presence of interfering signals. Walls,
doors, elevator shafts, and other obstacles offer different degree of attenuation. This will cause the RF coverage
pattern be irregular and hard to predict.
Site survey can help us overcome these problem and even provide us a map of RF coverage of the facility.
Preparation
Below are the step to complete a simple site survey with simple tools.
1. First you will need to Obtain a facility diagram, such as a blueprints. This is for you to mark and take record
on.
2. Visually inspect the facility, walk through the facility to verify the accuracy of the diagram and mark down
any large obstacle you see that may effect the RF signal such as metal shelf, metal desk, etc on the diagram.
3. Identify user's area, when doing so ask a question where is wireless coverage needed and where does not, and
note and take note on the diagram this is information is needed to determine the number of AP required.
4. Determine the preliminary access point location on the facility diagram base on the service area needed,
obstacles, power wall jack considerations.
Survey on Site
1. With the diagram with all information you gathered in the preparation phase. Now you are ready to make the
survey.
2. Install an access point at the preliminary location.
3. User a notebook with wireless client installed and run it's utility. An utility will provide information such as
connection speed, current used channel, associated rate, link quality, signal strength and etc information as
shown in utility below.
89
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 90
Prestige 2802HW(L)-Ix Support Notes
4. It's always a good idea to start with putting the access point at the corner of the room and walk away from the
access point in a systematic manner. Record down the changes at point where transfer rate drop and the link
quality and signal strength information on the diagram as you go alone.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
90
Page 91
Prestige 2802HW(L)-Ix Support Notes
5. When you reach the farthest point of connection mark the spot. Now you move the access point to this new
spot as have already determine the farthest point of the access point installation spot if wireless service is
required from corner of the room.
6. Repeat step 1~5 and now you should be able to mark an RF coverage area as illustrated in above picutre.
7. You may need more than one access point is the RF coverage area have not cover all the wireless service area
you needed.
8. Repeat step 1~6 of survey on site as necessary, upon completion you will have an diagram and information of
site survey. As illustrated below.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
91
Page 92
Prestige 2802HW(L)-Ix Support Notes
Note: If there are more than one access point is needed be sure to make the adjacent access point service area
over lap one another. So the wireless station are able to roam. For more information please refer to roaming at
PSTN Lifeline Application Notes
Usage of PSTN Lifeline
By using the PSTN lifeline function, you can make and receive regular PSTN phone calls in coexistence with
VoIP service on the same set of phone. This can be done by simply assigning a prefix number (by default the
prefix for PSTN dial out is 0000 and can be change to value you wish to) and dial this prefix to switch over to
PSTN line than dial the PSTN number as normal.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
92
Page 93
Prestige 2802HW(L)-Ix Support Notes
Furthermore, when the P2802HWL – D1A experience power loss such as in case of earthquake and other
natural hazard that cause power loss, it will automatically switch to PSTN line and you can dial a regular phone
number without dialing a prefix number.
This can be applied on the emergency situation such as for contacting police, fire or emergency medical
services when is powerless situation. On the following section, it tells you how to configure lifeline under
P2802HWL – D1A WEB GUI.
Lifeline configuration
To configure lifeline in P2802HWL, click onVoIP > PSTN Line > General to display the following screen.
You can specify a prefix number in prefix field. This number will be used to switch from VoIP to PSTN
system when you wish to make a call to PSTN destination. For example, when you want to dial out to a PSTN
destination, you first pick up the phone, and you will heard a dial tone, than you push in the prefix number as
defined in prefix field in this case it will be 0000, than the device will switch over to PSTN line. At this
moment you will heard dial tone from PSTN again. At this state you can dial out to PSTN as you would on a
regular PSTN system.
93
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 94
Prestige 2802HW(L)-Ix Support Notes
Relay to PSTN
The Relay to PSTN field can be find under PSTN configuration WEB GUI in Relay to PSTN section. This field
is used to specify phone numbers to which the Prestige will always send calls through the regular PSTN phone
service without pushing prefix. In other words, numbers which specify on this field do not need to dial prefix
number to be dialed out. However, these numbers must be for phones on the PSTN (not VOIP phones) and
currently, P2802HWL support up to nine entries under this field.
After configuring the PSTN setup, click “Apply" to save changes back to P2802HWL.
Note: It is recommended to configure your local emergency services such as Police Dept, Fire Dept, Emergency
Medical services phone number in this field. Thus in any cases, these unit can be reach in case of emergency by
dialing their number without prefix, regardless if there are power loss.
How to connect Lifeline and DSL connection
To use both VOIP and regular phone service with P2802HWL's lifeline feature. You will need to connect
ADSL line and phone line appropriately and make proper configuration.
Making the correct connection it allows you to still receive phone calls while someone else is making outgoing
VoIP call though Prestige's 2 pots port, the following figure shows you how to connect your phone and
DSL service.
If your ADSL line type is Splitter type you ISP will provide you with splitter otherwise it should be splitterless.
For correct info you may check with your service provider as for which type of line you have.
Firgure 1 Splitter type
All contents copyright (c) 2007 ZyXEL Communications Corporation.
94
Page 95
Prestige 2802HW(L)-Ix Support Notes
1. The P2802HWL includes a DSL cable and a RJ-11 cable. Connect the DSL cable to the DSL
port and connect RJ-11 to Lifeline port.
2. Connect the RJ11 to the splitter phone jack or a telephone wall jack
3. Connect the DSL cable to the splitter modem jack or ADSL line
4. Connect the splitter jack where it label Line to ADSL line from the ISP.
Figure 2 Splitterless type
1. The P2802HWL includes a DSL cable and a RJ-11 cable. Connect the DSL cable to the DSL
port and connect RJ-11 to Lifeline port.
2. You need to obtain a regular PSTN Y connector from regular phone shop.
3. Connect the RJ-11 to one of the output jack on the Y connector
4. Connect the DSL cable to the other output jacket on the Y connector
5. Connect the Y connector input port with a phone cable to the wall Jack or line from ISP.
95
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 96
Prestige 2802HW(L)-Ix Support Notes
VoIP Application Notes
Setup SIP Account
VoIP is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send
faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network.
The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol that handles the setting
up, altering and tearing down of voice and multimedia sessions over the Internet. SIP signaling is separate from
the media for which it handles sessions. The media that is exchanged during the session can use a different path
from that of the signaling. SIP handles telephone calls and can interface with traditional circuit-switched
telephone networks.
The Prestige can hold up to two SIP account simultaneously please follow the below instruction to configure the
SIP account properly.
Note: You should have a voice account already set up and have VoIP information from your VoIP service
provider prior to configure SIP account on to the unit.
96
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 97
Prestige 2802HW(L)-Ix Support Notes
A
A
With the account information your ITSP provider provided now you may start.
Step 1. Open the web browser from your workstation to connect to the Prestige by entering the Management IP
address of the Prestige (LAN IP address). The default management IP of Prestige is 192.168.1.1.
Step 2. Enter the administrator password appear on the page of login and click on login. The default is '1234'
Step 3. On the left column click on VoIP to bring you to VoIP configuration menu than click on SIP. While in
the SIP Settings page use the account selector on upper right of the page to select the SIP account you will like
to configure.
Step 4. Check active sip box if you like to use this account and fill in the account information the ITSP
provided you in the SIP setting category. Which will normally include you SIP number, SIP local port, SIP
server address, SIP server port, Register server port, Register server address, SIP service domain.
Step 5. In the Authentication category fill in the User Name and authentication password your ITSP provided to
you.
Step 6. If you wish to send caller ID check the check box in the Caller ID category, if you do not wish to send
out caller ID leave the check box uncheck.
Step 7. Click on Apply to save the setting and take effect. If you would like to configure the 2nd SIP account,
please select SIP2 by using the SIP account selector than follow step 1 to 8 to complete the 2nd account setup.
Each field's detail description on this page is listed below.
Label Description
SIP
Account
SIP
Number
You can configure the Prestige to use multiple SIP accounts. Select one to
configure its settings on the Prestige.
SIP account's Uniform Resource Identifier (URI) identifies the SIP account
in a way similar to the way an e-mail address identifies an e-mail account. It is
also known as a SIP identity or address. The format of a SIP identity is
SIP-Number@SIP-Srevice-Domain.
Enter your SIP number in this field. You can use up to 31 ASCII characters.
SIP Local
Port
Use this field to configure the Prestige’s listening port for SIP. Leave this field
set to the default if you were not given a local port number for SIP.
SIP number is the part of the SIP URI that comes before the "@" symbol.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
97
Page 98
Prestige 2802HW(L)-Ix Support Notes
A
SIP Server
Address
SIP Server
Port
REGISTER
Server
Address
REGISTER
Server Port
Type the IP address of the SIP server in this field.
Enter the SIP server’s listening port for SIP in this field. Leave this field set to
the default if your VoIP service provider did not give you a local port number
for SIP.
A SIP register server maintains a database of SIP identity-to-IP address (or
domain name) mapping. The register server checks your user name and
password when you register.
Enter the SIP register server’s address in this field.
If you were not given a register server address, then enter the address
from the SIP Server Address field again here.
Enter the SIP register server’s listening port for SIP in this field.
If you were not given a register server port, then enter the port from the
SIP Service
Domain
User Name
Password
Send Caller
ID
Advanced
SIP Server Port field again here.
SIP service domain is the domain name that comes after the @ symbol in a
full SIP URI.
Enter the SIP service domain name in this field.You can use up to 127 ASCII
Extended set characters.
This is the user name for registering this SIP account with the SIP register
server. Type the user name exactly as it was given to you. Use ASCII
characters.
Type the password associated with the user name above. Use ASCII
Extended set characters.
Select this check box to show identification information when you make VoIP
calls. Clear this check box to not show identification information when you
make VoIP calls.
Click Advanced Setup to open a screen where you can configure the
Setup
Apply
Prestige’s advanced VoIP settings like SIP server settings, the RTP port
range and the coding type.
Click Apply to save your changes back to the Prestige.
All contents copyright (c) 2007 ZyXEL Communications Corporation.
98
Page 99
Prestige 2802HW(L)-Ix Support Notes
Reset
Click Reset to begin configuring this screen afresh.
Peer to Peer call
Topology
Topology Explanation
1. Device A and B located at Internet.
2. Device A and B WAN interface is Public Static IP (220.130.46.197 and 220.130.46.198).
3. SIP number for device A and B is 197 and 198.
Preparation and Steps
1. Install the device properly in user’s networking topology.
2. Setup device’s WAN connection.
3. Configuring SIP / VoIP related settings in device A and B.
There are two ways to make IP to IP call.
(1) Make you can call by speed dial like '#01' defined in the phone book.
You need to configure the self SIP number at VOIP screen and callee's IP address in the phone book
Note that there are 10 speed dial can be configured only so far.
99
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Page 100
Prestige 2802HW(L)-Ix Support Notes
(2) Make you can call by callee's SIP number
You need to configure the self SIP number and put callee's IP address at SIP server, SIP proxy, Domain
server all in the VOIP screen.
Setup--- Configuring SIP / VoIP related settings in device A
100
All contents copyright (c) 2007 ZyXEL Communications Corporation.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.