P-662H/HW-D Series
802.11g ADSL 2+ 4-Port Security Gateway
User’s Guide
Version 3.40
Edition 1
7/2006
P-662H/HW-D Series User’s Guide
Copyright
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Copyright 3
P-662H/HW-D Series User’s Guide
Federal Communications Commission (FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation
Certifications
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
4 Certifications
P-662H/HW-D Series User’s Guide
ZyXEL Communications Corporation declared that P-662H/HW-D is limited in CH1~11 from
2400 to 2483.5 MHz by specified firmware controlled in USA.
Viewing Certifications
1 Go to www.zyxel.com
2 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
3 Select the certification you wish to view from this page.
Certifications 5
P-662H/HW-D Series User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger
telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them.
Do NOT allow anything to rest on the power cord and do NOT locate the product where
anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be
damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings
This product is recyclable. Dispose of it properly.
6 Safety Warnings
P-662H/HW-D Series User’s Guide
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty
shall not apply if the product has been modified, misused, tampered with, damaged by an act
of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
ZyXEL Limited Warranty 7
P-662H/HW-D Series User’s Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Customer Support
METHOD
LOCATION
CORPORATE
HEADQUARTERS
(WORLDWIDE)
COSTA RICA
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
SUPPORT E-MAIL TELEPHONE WEB SITE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
www.europe.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
ftp.europe.zyxel.com
soporte@zyxel.co.cr +506-2017878 www.zyxel.co.cr ZyXEL Costa Rica
sales@zyxel.co.cr +506-2015098 ftp.zyxel.co.cr
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp.
6 Innovation Road II
Science Park
Hsinchu 300
Ta iw a n
Plaza Roble Escazú
Etapa El Patio, Tercer Piso
San José, Costa Rica
Czech s.r.o.
Modranská 621
143 01 Praha 4 - Modrany
Ceská Republika
Columbusvej
2860 Soeborg
Denmark
Malminkaari 10
00700 Helsinki
Finland
1 rue des Vergers
Bat. 1 / C
69760 Limonest
France
Adenauerstr. 20/A2 D-52146
Wuerselen
Germany
48, Zoldlomb Str.
H-1025, Budapest
Hungary
43, Dostyk ave.,Office 414
Dostyk Business Centre
050010, Almaty
Republic of Kazakhstan
1130 N. Miller St.
Anaheim
CA 92806-2001
U.S.A.
8 Customer Support
P-662H/HW-D Series User’s Guide
METHOD
LOCATION
NORWAY
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
SUPPORT E-MAIL TELEPHONE WEB SITE
SALES E-MAIL FAX FTP SITE
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
info@pl.zyxel.com +48 (22) 333 8250 www.pl.zyxel.com ZyXEL Communications
+48 (22) 333 8251
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
www.zyxel.co.uk ZyXEL Communications UK
REGULAR MAIL
Nils Hansens vei 13
0667 Oslo
Norway
ul. Okrzei 1A
03-715 Warszawa
Poland
Ostrovityanova 37a Str.
Moscow, 117279
Russia
Arte, 21 5ª planta
28033 Madrid
Spain
Sjöporten 4, 41764 Göteborg
Sweden
13, Pimonenko Str.
Kiev, 04050
Ukraine
Ltd.,11 The Courtyard,
Eastern Road, Bracknell,
Berkshire, RG12 2XB,
United Kingdom (UK)
+” is the (prefix) number you enter to make an international telephone call.
Customer Support 9
P-662H/HW-D Series User’s Guide
10 Customer Support
P-662H/HW-D Series User’s Guide
Table of Contents
Copyright ..................................................................................................................3
Certifications ............................................................................................................4
Safety Warnings ....................................................................................................... 6
ZyXEL Limited Warranty.......................................................................................... 7
Customer Support.................................................................................................... 8
Table of Contents ................................................................................................... 11
List of Figures ........................................................................................................ 25
List of Tables .......................................................................................................... 33
Preface ....................................................................................................................39
Chapter 1
Getting To Know Your ZyXEL Device................................................................... 41
1.1 Introducing the ZyXEL Device ............................................................................41
1.1.1 Features of the ZyXEL Device ..................................................................41
1.1.1.1 P-662HW Wireless Features ...........................................................45
1.1.2 Applications for the ZyXEL Device ...........................................................45
1.1.2.1 Internet Access ...............................................................................46
1.1.2.2 LAN to LAN Application ...................................................................46
1.1.3 Firewall for Secure Broadband Internet Access .......................................46
1.1.4 Front Panel LEDs .....................................................................................47
Chapter 2
Introducing the Web Configurator........................................................................ 49
2.1 Web Configurator Overview ...............................................................................49
2.2 Accessing the Web Configurator ........................................................................49
2.3 Resetting the ZyXEL Device ..............................................................................51
2.3.1 Using the Reset Button .............................................................................52
2.4 Navigating the Web Configurator ......................................................................52
2.4.1 Navigation Panel .......................................................................................52
2.4.2 Status Screen ............................................................................................55
2.4.3 Status: Any IP Table...................................................................................58
2.4.4 Status: WLAN Status .................................................................................58
2.4.5 Status: Bandwidth Status ...........................................................................59
Table of Contents 11
P-662H/HW-D Series User’s Guide
2.4.6 Status: VPN Status ....................................................................................59
2.4.7 Status: Packet Statistics.............................................................................60
2.4.8 Changing Login Password .......................................................................62
Chapter 3
Wizard Setup for Internet Access......................................................................... 65
3.1 Introduction ........................................................................................................65
3.2 Internet Access Wizard Setup ............................................................................65
3.2.1 Automatic Detection ..................................................................................67
3.2.2 Manual Configuration ................................................................................67
3.3 Wireless Connection Wizard Setup ....................................................................72
3.3.1 Automatically assign a WPA key ...............................................................75
3.3.2 Manually assign a WPA-PSK key..............................................................75
3.3.3 Manually assign a WEP key ......................................................................76
Chapter 4
Bandwidth Management Wizard ........................................................................... 79
4.1 Introduction ........................................................................................................79
4.2 Predefined Media Bandwidth Management Services ........................................79
4.3 Bandwidth Management Wizard Setup ..............................................................80
Chapter 5
WAN Setup.............................................................................................................. 85
5.1 WAN Overview ..................................................................................................85
5.1.1 Encapsulation ...........................................................................................85
5.1.1.1 ENET ENCAP .................................................................................85
5.1.1.2 PPP over Ethernet ..........................................................................85
5.1.1.3 PPPoA .............................................................................................86
5.1.1.4 RFC 1483 ........................................................................................86
5.1.2 Multiplexing ...............................................................................................86
5.1.2.1 VC-based Multiplexing ....................................................................86
5.1.2.2 LLC-based Multiplexing ...................................................................86
5.1.3 VPI and VCI ..............................................................................................86
5.1.4 IP Address Assignment ............................................................................87
5.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................87
5.1.4.2 IP Assignment with RFC 1483 Encapsulation .................................87
5.1.4.3 IP Assignment with ENET ENCAP Encapsulation ..........................87
5.1.5 Nailed-Up Connection (PPP) ....................................................................87
5.1.6 NAT ...........................................................................................................87
5.2 Metric ................................................................................................................88
5.3 Traffic Shaping ...................................................................................................88
5.3.1 ATM Traffic Classes ..................................................................................89
5.3.1.1 Constant Bit Rate (CBR) .................................................................89
12 Table of Contents
P-662H/HW-D Series User’s Guide
5.3.1.2 Variable Bit Rate (VBR) ...................................................................89
5.3.1.3 Unspecified Bit Rate (UBR) .............................................................90
5.4 Zero Configuration Internet Access ....................................................................90
5.5 Internet Connection ...........................................................................................90
5.5.1 Configuring Advanced Internet Connection ...............................................92
5.6 Configuring More Connections ...........................................................................94
5.6.1 More Connections Edit .............................................................................95
5.6.2 Configuring More Connections Advanced Setup.......................................98
5.7 Traffic Redirect ...................................................................................................99
5.8 Configuring WAN Backup ................................................................................100
5.9 WAN Backup Advanced Screen ......................................................................102
5.10 Dial Backup Modem Setup ............................................................................105
Chapter 6
LAN Setup............................................................................................................. 109
6.1 LAN Overview .................................................................................................109
6.1.1 LANs, WANs and the ZyXEL Device ......................................................109
6.1.2 DHCP Setup ........................................................................................... 110
6.1.2.1 IP Pool Setup ................................................................................110
6.1.3 DNS Server Address .............................................................................. 110
6.1.4 DNS Server Address Assignment ........................................................... 111
6.2 LAN TCP/IP ...................................................................................................... 111
6.2.1 IP Address and Subnet Mask ................................................................. 111
6.2.1.1 Private IP Addresses ..................................................................... 112
6.2.2 RIP Setup ............................................................................................... 112
6.2.3 Multicast .................................................................................................. 113
6.2.4 Any IP .....................................................................................................113
6.2.4.1 How Any IP Works ........................................................................ 114
6.3 Configuring LAN IP ..........................................................................................115
6.3.1 Configuring Advanced LAN Setup ........................................................... 115
6.4 DHCP Setup .....................................................................................................117
6.5 LAN Client List ................................................................................................. 118
6.6 LAN IP Alias ..................................................................................................... 119
Chapter 7
Wireless LAN ........................................................................................................ 123
7.1 Wireless Network Overview .............................................................................123
7.2 Wireless Security Overview .............................................................................124
7.2.1 SSID .......................................................................................................124
7.2.2 MAC Address Filter .................................................................................124
7.2.3 User Authentication ................................................................................124
7.2.4 Encryption ...............................................................................................125
7.2.5 One-Touch Intelligent Security Technology (OTIST) ...............................126
Table of Contents 13
P-662H/HW-D Series User’s Guide
7.3 Wireless Performance Overview ......................................................................126
7.3.1 Quality of Service (QoS) .........................................................................126
7.4 Additional Wireless Terms ................................................................................127
7.5 General Wireless LAN Screen ........................................................................127
7.5.1 No Security .............................................................................................129
7.5.2 WEP Encryption Screen .........................................................................129
7.5.3 WPA(2)-PSK ...........................................................................................130
7.5.4 WPA(2) Authentication Screen ...............................................................132
7.5.5 Wireless LAN Advanced Setup................................................................134
7.6 OTIST ...............................................................................................................135
7.6.1 Enabling OTIST ......................................................................................135
7.6.1.1 AP .................................................................................................136
7.6.1.2 Wireless Client ..............................................................................137
7.6.2 Starting OTIST ........................................................................................138
7.6.3 Notes on OTIST ......................................................................................138
7.7 MAC Filter ...................................................................................................139
7.8 WMM QoS ........................................................................................................141
7.8.1 WMM QoS Example ...............................................................................141
7.8.2 WMM QoS Priorities ...............................................................................141
7.8.3 Services ..................................................................................................142
7.9 QoS Screen ......................................................................................................144
7.9.1 ToS (Type of Service) and WMM QoS ....................................................144
7.9.2 Application Priority Configuration.............................................................146
7.10 Multiple SSID (P-662HW-D Models only) .......................................................147
7.10.1 Multiple SSID Commands .....................................................................148
7.10.2 Multiple SSID Example .........................................................................150
Chapter 8
DMZ ....................................................................................................................... 151
8.1 Introduction ......................................................................................................151
8.2 Configuring DMZ .............................................................................................151
8.3 DMZ Public IP Address Example .....................................................................153
8.4 DMZ Private and Public IP Address Example ..................................................154
Chapter 9
Network Address Translation (NAT) Screens .................................................... 157
9.1 NAT Overview .................................................................................................157
9.1.1 NAT Definitions .......................................................................................157
9.1.2 What NAT Does ......................................................................................158
9.1.3 How NAT Works .....................................................................................158
9.1.4 NAT Application ......................................................................................159
9.1.5 NAT Mapping Types ...............................................................................159
9.2 SUA (Single User Account) Versus NAT ..........................................................160
14 Table of Contents
P-662H/HW-D Series User’s Guide
9.3 NAT General Setup .........................................................................................160
9.4 Port Forwarding ................................................................................................161
9.4.1 Default Server IP Address ......................................................................162
9.4.2 Port Forwarding: Services and Port Numbers ........................................162
9.4.3 Configuring Servers Behind Port Forwarding (Example) ........................163
9.5 Configuring Port Forwarding ...........................................................................163
9.5.1 Port Forwarding Rule Edit .......................................................................164
9.6 Address Mapping ............................................................................................165
9.6.1 Address Mapping Rule Edit ....................................................................167
Chapter 10
Firewalls................................................................................................................ 169
10.1 Firewall Overview ..........................................................................................169
10.2 Types of Firewalls ..........................................................................................169
10.2.1 Packet Filtering Firewalls ......................................................................169
10.2.2 Application-level Firewalls ....................................................................170
10.2.3 Stateful Inspection Firewalls ................................................................170
10.3 Introduction to ZyXEL’s Firewall .....................................................................170
10.3.1 Denial of Service Attacks ......................................................................171
10.4 Denial of Service ............................................................................................171
10.4.1 Basics ...................................................................................................171
10.4.2 Types of DoS Attacks ...........................................................................172
10.4.2.1 ICMP Vulnerability ......................................................................174
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................174
10.4.2.3 Traceroute ...................................................................................175
10.5 Stateful Inspection ..........................................................................................175
10.5.1 Stateful Inspection Process ..................................................................176
10.5.2 Stateful Inspection and the ZyXEL Device ............................................176
10.5.3 TCP Security .........................................................................................177
10.5.4 UDP/ICMP Security ..............................................................................177
10.5.5 Upper Layer Protocols ..........................................................................178
10.6 Guidelines for Enhancing Security with Your Firewall ....................................178
10.6.1 Security In General ...............................................................................179
10.7 Packet Filtering Vs Firewall ............................................................................179
10.7.1 Packet Filtering: ....................................................................................180
10.7.1.1 When To Use Filtering .................................................................180
10.7.2 Firewall .................................................................................................180
10.7.2.1 When To Use The Firewall ..........................................................180
Chapter 11
Firewall Configuration ......................................................................................... 181
11.1 Access Methods .............................................................................................181
11.2 Firewall Policies Overview ..............................................................................181
Table of Contents 15
P-662H/HW-D Series User’s Guide
11.3 Rule Logic Overview ......................................................................................182
11.3.1 Rule Checklist .......................................................................................182
11.3.2 Security Ramifications ..........................................................................182
11.3.3 Key Fields For Configuring Rules .........................................................183
11.3.3.1 Action ...........................................................................................183
11.3.3.2 Service .........................................................................................183
11.3.3.3 Source Address ...........................................................................183
11.3.3.4 Destination Address ....................................................................183
11.4 Connection Direction ......................................................................................183
11.4.1 LAN to WAN Rules ................................................................................184
11.4.2 Alerts .....................................................................................................184
11.5 General Firewall Policy ................................................................................184
11.6 Firewall Rules Summary ...............................................................................185
11.6.1 Configuring Firewall Rules ...................................................................187
11.6.2 Customized Services ............................................................................190
11.6.3 Configuring A Customized Service .......................................................191
11.7 Example Firewall Rule ....................................................................................191
11.8 Predefined Services .......................................................................................195
11.9 Anti-Probing ....................................................................................................197
11.10 DoS Thresholds ...........................................................................................198
11.10.1 Threshold Values ................................................................................198
11.10.2 Half-Open Sessions ............................................................................199
11.10.2.1 TCP Maximum Incomplete and Blocking Time ..........................199
11.10.3 Configuring Firewall Thresholds ..........................................................200
Chapter 12
Anti-Virus Packet Scan........................................................................................ 203
12.1 Overview ........................................................................................................203
12.1.1 Types of Computer Viruses ..................................................................203
12.2 Signature-Based Virus Scan ..........................................................................203
12.2.1 Computer Virus Infection and Prevention .............................................204
12.3 Introduction to the ZyXEL Device Anti-virus Packet Scan .............................204
12.3.1 How the ZyXEL Device Virus Scan Works ..........................................205
12.3.2 Limitations of the ZyXEL Device Packet Scan ......................................205
12.4 Anti-Virus Packet Scan Configuration ...........................................................205
12.5 Registration and Online Update ....................................................................207
12.5.1 Updating the Anti-Virus Packet Scan ....................................................209
Chapter 13
Content Filtering .................................................................................................. 211
13.1 Content Filtering Overview ............................................................................ 211
13.2 Configuring Keyword Blocking ...................................................................... 211
13.3 Configuring the Schedule ..............................................................................212
16 Table of Contents
P-662H/HW-D Series User’s Guide
13.4 Configuring Trusted Computers ....................................................................213
Chapter 14
Content Access Control ...................................................................................... 215
14.1 Content Access Control Overview .................................................................215
14.1.1 Content Access Control WLAN Application ..........................................215
14.1.2 Configuration Steps ..............................................................................215
14.2 Activating CAC and Creating User Groups ..................................................216
14.2.1 Configuring Time Schedule ..................................................................217
14.2.2 Configuring Services .............................................................................219
14.2.2.1 Available Services .......................................................................220
14.2.3 Configuring Web Site Filters .................................................................222
14.2.4 Testing Web Site Access Privileges ......................................................227
14.3 User Account Setup ......................................................................................228
14.4 User Online Status ........................................................................................229
14.5 Content Access Control Logins ......................................................................230
14.5.1 User Login ............................................................................................230
14.5.2 Administrator Login ...............................................................................231
Chapter 15
Introduction to IPSec ........................................................................................... 233
15.1 VPN Overview ................................................................................................233
15.1.1 IPSec ....................................................................................................233
15.1.2 Security Association .............................................................................233
15.1.3 Other Terminology ................................................................................233
15.1.3.1 Encryption ...................................................................................233
15.1.3.2 Data Confidentiality .....................................................................234
15.1.3.3 Data Integrity ...............................................................................234
15.1.3.4 Data Origin Authentication ..........................................................234
15.1.4 VPN Applications ..................................................................................234
15.2 IPSec Architecture .........................................................................................235
15.2.1 IPSec Algorithms ..................................................................................235
15.2.2 Key Management ..................................................................................235
15.3 Encapsulation .................................................................................................235
15.3.1 Transport Mode ....................................................................................236
15.3.2 Tunnel Mode ........................................................................................236
15.4 IPSec and NAT ...............................................................................................236
Chapter 16
VPN Screens......................................................................................................... 239
16.1 VPN/IPSec Overview .....................................................................................239
16.2 IPSec Algorithms ............................................................................................239
16.2.1 AH (Authentication Header) Protocol ....................................................239
Table of Contents 17
P-662H/HW-D Series User’s Guide
16.2.2 ESP (Encapsulating Security Payload) Protocol ..................................239
16.3 My IP Address ................................................................................................240
16.4 Secure Gateway Address ..............................................................................241
16.4.1 Dynamic Secure Gateway Address ......................................................241
16.5 VPN Setup Screen ........................................................................................241
16.6 Keep Alive ......................................................................................................243
16.7 VPN, NAT, and NAT Traversal .......................................................................244
16.8 Remote DNS Server ......................................................................................245
16.9 ID Type and Content ......................................................................................245
16.9.1 ID Type and Content Examples ............................................................246
16.10 Pre-Shared Key ............................................................................................247
16.11 Editing VPN Policies ....................................................................................247
16.12 IKE Phases .................................................................................................252
16.12.1 Negotiation Mode ................................................................................253
16.12.2 Diffie-Hellman (DH) Key Groups .........................................................254
16.12.3 Perfect Forward Secrecy (PFS) .........................................................254
16.13 Configuring Advanced IKE Settings ............................................................254
16.14 Manual Key Setup ........................................................................................257
16.14.1 Security Parameter Index (SPI) .........................................................257
16.15 Configuring Manual Key ..............................................................................257
16.16 Viewing SA Monitor .....................................................................................260
16.17 Configuring Global Setting ..........................................................................261
16.18 Telecommuter VPN/IPSec Examples ...........................................................262
16.18.1 Telecommuters Sharing One VPN Rule Example ..............................262
16.18.2 Telecommuters Using Unique VPN Rules Example ...........................263
16.19 VPN and Remote Management ...................................................................264
Chapter 17
Certificates............................................................................................................ 265
17.1 Certificates Overview .....................................................................................265
17.1.1 Advantages of Certificates ....................................................................266
17.2 Self-signed Certificates ..................................................................................266
17.3 Configuration Summary .................................................................................266
17.4 My Certificates ..............................................................................................267
17.5 My Certificate Import .....................................................................................269
17.5.1 Certificate File Formats .........................................................................269
17.6 My Certificate Create ....................................................................................270
17.7 My Certificate Details ....................................................................................272
17.8 Trusted CAs .................................................................................................275
17.9 Trusted CA Import ........................................................................................277
17.10 Trusted CA Details .......................................................................................278
17.11 Trusted Remote Hosts ................................................................................280
17.12 Verifying a Trusted Remote Host’s Certificate ..............................................282
18 Table of Contents
P-662H/HW-D Series User’s Guide
17.12.1 Trusted Remote Host Certificate Fingerprints .....................................282
17.13 Trusted Remote Hosts Import ....................................................................283
17.14 Trusted Remote Host Certificate Details ....................................................283
17.15 Directory Servers .........................................................................................286
17.16 Directory Server Add or Edit ......................................................................287
Chapter 18
Static Route .......................................................................................................... 289
18.1 Static Route .................................................................................................289
18.2 Configuring Static Route ...............................................................................289
18.2.1 Static Route Edit ..................................................................................290
Chapter 19
Bandwidth Management...................................................................................... 293
19.1 Bandwidth Management Overview ...............................................................293
19.2 Application-based Bandwidth Management ...................................................293
19.3 Subnet-based Bandwidth Management .........................................................293
19.4 Application and Subnet-based Bandwidth Management ...............................294
19.5 Scheduler .......................................................................................................294
19.5.1 Priority-based Scheduler ......................................................................294
19.5.2 Fairness-based Scheduler ....................................................................295
19.6 Maximize Bandwidth Usage ...........................................................................295
19.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................295
19.6.2 Maximize Bandwidth Usage Example ..................................................296
19.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 296
19.6.2.2 Fairness-based Allotment of Unused and Unbudgeted
Bandwidth ...........................................................................................297
19.6.3 Bandwidth Management Priorities ........................................................297
19.7 Configuring Summary ...................................................................................297
19.8 Bandwidth Management Rule Setup ............................................................299
19.8.1 Rule Configuration .................................................................................300
19.9 Bandwidth Monitor ........................................................................................302
Chapter 20
Dynamic DNS Setup............................................................................................. 305
20.1 Dynamic DNS Overview ................................................................................305
20.1.1 DYNDNS Wildcard ................................................................................305
20.2 Configuring Dynamic DNS ............................................................................305
Chapter 21
Remote Management Configuration .................................................................. 309
21.1 Remote Management Overview ....................................................................309
21.1.1 Remote Management Limitations .........................................................309
Table of Contents 19
P-662H/HW-D Series User’s Guide
21.1.2 Remote Management and NAT ............................................................310
21.1.3 System Timeout ...................................................................................310
21.2 WWW .............................................................................................................310
21.3 Telnet .............................................................................................................. 311
21.4 Configuring Telnet .......................................................................................... 311
21.5 Configuring FTP ............................................................................................312
21.6 SNMP .............................................................................................................313
21.6.1 Supported MIBs ....................................................................................314
21.6.2 SNMP Traps .........................................................................................315
21.6.3 Configuring SNMP .................................................................................315
21.7 Configuring DNS ...........................................................................................317
21.8 Configuring ICMP ...........................................................................................317
21.9 TR-069 ...........................................................................................................319
Chapter 22
Universal Plug-and-Play (UPnP) ......................................................................... 321
22.1 Introducing Universal Plug and Play .............................................................321
22.1.1 How do I know if I'm using UPnP? ........................................................321
22.1.2 NAT Traversal .......................................................................................321
22.1.3 Cautions with UPnP ..............................................................................322
22.2 UPnP and ZyXEL ...........................................................................................322
22.2.1 Configuring UPnP .................................................................................322
22.3 Installing UPnP in Windows Example ............................................................323
22.4 Using UPnP in Windows XP Example ...........................................................326
Chapter 23
System .................................................................................................................. 333
23.1 General Setup ................................................................................................333
23.1.1 General Setup and System Name ........................................................333
23.1.2 General Setup .......................................................................................333
23.2 Time Setting ..................................................................................................335
Chapter 24
Logs ...................................................................................................................... 339
24.1 Logs Overview ..............................................................................................339
24.1.1 Alerts and Logs .....................................................................................339
24.2 Viewing the Logs ............................................................................................339
24.3 Configuring Log Settings ...............................................................................340
24.4 SMTP Error Messages ...................................................................................343
24.4.1 Example E-mail Log .............................................................................343
20 Table of Contents
P-662H/HW-D Series User’s Guide
Chapter 25
Tools ...................................................................................................................... 345
25.1 Firmware Upgrade ........................................................................................345
25.2 Configuration Screen .....................................................................................347
25.2.1 Backup Configuration ...........................................................................347
25.2.2 Restore Configuration ...........................................................................348
25.2.3 Back to Factory Defaults .......................................................................349
25.3 Restart ............................................................................................................349
Chapter 26
Diagnostic............................................................................................................. 351
26.1 General Diagnostic ........................................................................................351
26.2 DSL Line Diagnostic .....................................................................................352
Chapter 27
Troubleshooting ................................................................................................... 353
27.1 Problems Starting Up the ZyXEL Device .......................................................353
27.2 Problems with the LAN ...................................................................................353
27.3 Problems with the WAN .................................................................................354
27.4 Problems Accessing the ZyXEL Device .........................................................355
27.4.1 Pop-up Windows, JavaScripts and Java Permissions ..........................355
27.4.1.1 Internet Explorer Pop-up Blockers ..............................................355
27.4.1.2 JavaScripts ..................................................................................358
27.4.1.3 Java Permissions ........................................................................360
27.4.2 ActiveX Controls in Internet Explorer ....................................................362
Appendix A
Product Specifications ....................................................................................... 365
Appendix B
About ADSL .......................................................................................................... 369
Introduction to DSL ................................................................................................ 369
ADSL Overview...................................................................................................... 369
Advantages of ADSL.............................................................................................. 369
Appendix C
Wall-mounting Instructions................................................................................. 371
Appendix D
Setting up Your Computer’s IP Address............................................................ 373
Windows 95/98/Me................................................................................................. 373
Windows 2000/NT/XP ............................................................................................ 376
Macintosh OS 8/9................................................................................................... 381
Table of Contents 21
P-662H/HW-D Series User’s Guide
Macintosh OS X ..................................................................................................... 383
Linux....................................................................................................................... 384
Appendix E
IP Addresses and Subnetting ............................................................................. 389
Introduction to IP Addresses .................................................................................. 389
Subnet Masks ........................................................................................................ 391
Subnetting .............................................................................................................. 391
Example: Two Subnets .......................................................................................... 392
Example: Four Subnets.......................................................................................... 393
Example Eight Subnets.......................................................................................... 394
Subnetting With Class A and Class B Networks. ................................................... 395
Appendix F
Wireless LANs ...................................................................................................... 397
Wireless LAN Topologies ....................................................................................... 397
Channel.................................................................................................................. 399
RTS/CTS................................................................................................................ 399
Fragmentation Threshold ....................................................................................... 400
Preamble Type....................................................................................................... 401
IEEE 802.11g Wireless LAN .................................................................................. 401
IEEE 802.1x ........................................................................................................... 402
RADIUS.................................................................................................................. 402
Types of Authentication.......................................................................................... 403
WPA(2)................................................................................................................... 405
Security Parameters Summary .............................................................................. 407
Appendix G
Importing Certificates .......................................................................................... 409
Import ZyXEL Device Certificates into Netscape Navigator ................................... 409
Importing the ZyXEL Device’s Certificate into Internet Explorer ............................ 409
Enrolling and Importing SSL Client Certificates ..................................................... 413
Using a Certificate When Accessing the ZyXEL Device Example ......................... 417
Appendix H
Command Interpreter........................................................................................... 419
Command Syntax................................................................................................... 419
Access via Telnet .................................................................................................. 419
Command Usage ................................................................................................... 419
Appendix I
Certificates Commands ....................................................................................... 421
22 Table of Contents
P-662H/HW-D Series User’s Guide
Appendix J
Boot Commands ..................................................................................................425
Appendix K
Firewall Commands ............................................................................................. 427
Appendix L
NetBIOS Filter Commands .................................................................................. 433
Introduction ............................................................................................................ 433
Display NetBIOS Filter Settings ............................................................................. 433
NetBIOS Filter Configuration.................................................................................. 434
Appendix M
Internal SPTGEN .................................................................................................. 437
Internal SPTGEN Overview ................................................................................... 437
The Configuration Text File Format ........................................................................ 437
Internal SPTGEN FTP Download Example............................................................ 438
Internal SPTGEN FTP Upload Example ................................................................ 439
Command Examples.............................................................................................. 460
Appendix N
Splitters and Microfilters ..................................................................................... 463
Connecting a POTS Splitter ................................................................................... 463
Telephone Microfilters ............................................................................................ 463
ZyXEL Device With ISDN....................................................................................... 464
Appendix O
Log Descriptions.................................................................................................. 465
Log Commands...................................................................................................... 479
Log Command Example......................................................................................... 480
Appendix P
Triangle Route ...................................................................................................... 481
The Ideal Setup...................................................................................................... 481
The “Triangle Route” Problem................................................................................ 481
The “Triangle Route” Solutions .............................................................................. 482
IP Aliasing .............................................................................................................. 482
Gateways on the WAN Side................................................................................... 483
Index...................................................................................................................... 485
Table of Contents 23
P-662H/HW-D Series User’s Guide
24 Table of Contents
P-662H/HW-D Series User’s Guide
List of Figures
Figure 1 ZyXEL Device Internet Access Application ........................................................... 46
Figure 2 ZyXEL Device LAN-to-LAN Application Example ................................................. 46
Figure 3 Firewall Application ............................................................................................... 47
Figure 4 P-662H Front Panel .............................................................................................. 47
Figure 5 P-662HW Front Panel ........................................................................................... 47
Figure 6 Password Screen .................................................................................................. 50
Figure 7 Change Password at Login ................................................................................... 50
Figure 8 Replace Factory Default Certificate ...................................................................... 51
Figure 9 Select a Mode ....................................................................................................... 51
Figure 10 Web Configurator: Main Screen ........................................................................ 52
Figure 11 Status Screen ...................................................................................................... 56
Figure 12 Status: Any IP Table ............................................................................................ 58
Figure 13 Status: WLAN Status ........................................................................................... 59
Figure 14 Status: Bandwidth Status .................................................................................... 59
Figure 15 Status: VPN Status .............................................................................................. 60
Figure 16 Status: Packet Statistics ...................................................................................... 61
Figure 17 System General .................................................................................................. 62
Figure 18 Select a Mode ..................................................................................................... 65
Figure 19 Wizard: Welcome ................................................................................................ 66
Figure 20 Auto Detection: No DSL Connection ................................................................... 66
Figure 21 Auto Detection: Failed ......................................................................................... 67
Figure 22 Auto-Detection: PPPoE ....................................................................................... 67
Figure 23 Internet Access Wizard Setup: ISP Parameters ................................................. 68
Figure 24 Internet Connection with PPPoE ......................................................................... 69
Figure 25 Internet Connection with RFC 1483 ................................................................... 69
Figure 26 Internet Connection with ENET ENCAP ............................................................. 70
Figure 27 Internet Connection with PPPoA ......................................................................... 71
Figure 28 Connection Test Failed-1 .................................................................................... 72
Figure 29 Connection Test Failed-2. ................................................................................... 72
Figure 30 Connection Test Successful ................................................................................ 73
Figure 31 Wireless LAN Setup Wizard 1 ............................................................................. 73
Figure 32 Wireless LAN Setup Wizard 2 ............................................................................. 74
Figure 33 Manually assign a WPA key ................................................................................ 76
Figure 34 Manually assign a WEP key ............................................................................... 76
Figure 35 Wireless LAN Setup 3 ......................................................................................... 77
Figure 36 Internet Access and WLAN Wizard Setup Complete .......................................... 78
Figure 37 Select a Mode ..................................................................................................... 80
Figure 38 Wizard: Welcome ................................................................................................ 81
List of Figures 25
P-662H/HW-D Series User’s Guide
Figure 39 Bandwidth Management Wizard: General Information ....................................... 81
Figure 40 Bandwidth Management Wizard: Configuration .................................................. 82
Figure 41 Bandwidth Management Wizard: Complete ........................................................ 83
Figure 42 Example of Traffic Shaping ................................................................................. 89
Figure 43 Internet Connection (PPPoE) .............................................................................. 91
Figure 44 Advanced Internet Connection ............................................................................ 93
Figure 45 More Connections ............................................................................................... 95
Figure 46 More Connections Edit ........................................................................................ 96
Figure 47 More Connections Advanced Setup ................................................................... 98
Figure 48 Traffic Redirect Example ..................................................................................... 99
Figure 49 Traffic Redirect LAN Setup ................................................................................. 100
Figure 50 WAN Backup Setup ............................................................................................ 101
Figure 51 WAN Backup Advanced Setup ........................................................................... 103
Figure 52 WAN Dial Backup Modem Setup ........................................................................ 106
Figure 53 LAN and WAN IP Addresses .............................................................................. 109
Figure 54 Any IP Example .................................................................................................. 114
Figure 55 LAN IP ................................................................................................................. 115
Figure 56 Advanced LAN Setup .......................................................................................... 116
Figure 57 DHCP Setup ....................................................................................................... 117
Figure 58 LAN Client List .................................................................................................... 118
Figure 59 Physical Network & Partitioned Logical Networks .............................................. 120
Figure 60 LAN IP Alias ........................................................................................................ 120
Figure 61 Example of a Wireless Network .......................................................................... 123
Figure 62 Wireless LAN: General ...................................................................................... 128
Figure 63 Wireless: No Security .......................................................................................... 129
Figure 64 Wireless: Static WEP Encryption ........................................................................ 130
Figure 65 Wireless: WPA(2)-PSK ....................................................................................... 131
Figure 66 Wireless: WPA(2) ................................................................................................ 132
Figure 67 Advanced ............................................................................................................ 134
Figure 68 OTIST ................................................................................................................. 136
Figure 69 Example Wireless Client OTIST Screen ............................................................. 137
Figure 70 Security Key ........................................................................................................ 138
Figure 71 OTIST in Progress (AP) ...................................................................................... 138
Figure 72 OTIST in Progress (Client) .................................................................................. 138
Figure 73 No AP with OTIST Found ................................................................................... 138
Figure 74 Start OTIST? ....................................................................................................... 139
Figure 75 MAC Address Filter ............................................................................................. 140
Figure 76 Wireless LAN: QoS ............................................................................................. 145
Figure 77 Application Priority Configuration ........................................................................ 146
Figure 78 Multiple SSID Network Example ......................................................................... 148
Figure 79 DMZ .................................................................................................................... 152
Figure 80 DMZ Public Address Example ............................................................................ 154
Figure 81 DMZ Private and Public Address Example ......................................................... 155
26 List of Figures
P-662H/HW-D Series User’s Guide
Figure 82 How NAT Works .................................................................................................. 158
Figure 83 NAT Application With IP Alias ............................................................................. 159
Figure 84 NAT General ....................................................................................................... 161
Figure 85 Multiple Servers Behind NAT Example ............................................................... 163
Figure 86 NAT Port Forwarding .......................................................................................... 163
Figure 87 Port Forwarding Rule Setup ............................................................................... 164
Figure 88 Address Mapping Rules ...................................................................................... 166
Figure 89 Edit Address Mapping Rule ............................................................................... 167
Figure 90 Firewall Application ............................................................................................. 171
Figure 91 Three-Way Handshake ....................................................................................... 172
Figure 92 SYN Flood ........................................................................................................... 173
Figure 93 Smurf Attack ....................................................................................................... 174
Figure 94 Stateful Inspection ............................................................................................... 175
Figure 95 Firewall: General ................................................................................................. 184
Figure 96 Firewall Rules .................................................................................................... 186
Figure 97 Firewall: Edit Rule ............................................................................................... 188
Figure 98 Firewall: Customized Services ............................................................................ 190
Figure 99 Firewall: Configure Customized Services ........................................................... 191
Figure 100 Firewall Example: Rules ................................................................................... 192
Figure 101 Edit Custom Port Example ................................................................................ 192
Figure 102 Firewall Example: Edit Rule: Destination Address ........................................... 193
Figure 103 Firewall Example: Edit Rule: Select Customized Services ............................... 194
Figure 104 Firewall Example: Rules: MyService ................................................................ 195
Figure 105 Firewall: Anti Probing ........................................................................................ 197
Figure 106 Firewall: Threshold ............................................................................................ 200
Figure 107 ZyXEL Device Anti-virus Application ................................................................ 204
Figure 108 Anti-Virus: Packet Scan .................................................................................... 206
Figure 109 Anti-Virus: Registration and Virus Information Update ...................................... 208
Figure 110 Virus Scan Update in Progress ......................................................................... 209
Figure 111 Virus Scan Update Successful .......................................................................... 209
Figure 112 Content Filter: Keyword ..................................................................................... 211
Figure 113 Content Filter: Schedule .................................................................................... 212
Figure 114 Content Filter: Trusted ....................................................................................... 213
Figure 115 Content Access Control with WLAN Application .............................................. 215
Figure 116 Content Access Control: General ..................................................................... 216
Figure 117 Control Access Control: General: Time Scheduling ......................................... 218
Figure 118 Content Access Control: General: Services ..................................................... 219
Figure 119 Content Access Control: General: Web Site Filter ........................................... 222
Figure 120 Content Access Control: General: Diagnose ................................................... 227
Figure 121 Content Access Control: User Profiles ............................................................. 228
Figure 122 Content Access Control: Online Status ............................................................ 229
Figure 123 Content Access Control: User Login Screen .................................................. 230
Figure 124 Content Access Control: User Logout Screen ................................................. 230
List of Figures 27
P-662H/HW-D Series User’s Guide
Figure 125 Encryption and Decryption ................................................................................ 234
Figure 126 IPSec Architecture ............................................................................................ 235
Figure 127 Transport and Tunnel Mode IPSec Encapsulation ............................................ 236
Figure 128 IPSec Summary Fields ..................................................................................... 241
Figure 129 VPN Setup ........................................................................................................ 242
Figure 130 NAT Router Between IPSec Routers ................................................................ 244
Figure 131 VPN Host using Intranet DNS Server Example ................................................ 245
Figure 132 Edit VPN Policies ............................................................................................. 248
Figure 133 Two Phases to Set Up the IPSec SA ................................................................ 252
Figure 134 Advanced VPN Policies .................................................................................... 255
Figure 135 VPN: Manual Key .............................................................................................. 258
Figure 136 VPN: SA Monitor ............................................................................................... 261
Figure 137 VPN: Global Setting .......................................................................................... 261
Figure 138 Telecommuters Sharing One VPN Rule Example ............................................. 262
Figure 139 Telecommuters Using Unique VPN Rules Example ......................................... 263
Figure 140 Certificate Configuration Overview ................................................................... 266
Figure 141 My Certificates ................................................................................................. 267
Figure 142 My Certificate Import ......................................................................................... 269
Figure 143 My Certificate Create ........................................................................................ 270
Figure 144 My Certificate Details ........................................................................................ 273
Figure 145 Trusted CAs ...................................................................................................... 276
Figure 146 Trusted CA Import ............................................................................................. 277
Figure 147 Trusted CA Details ............................................................................................ 278
Figure 148 Trusted Remote Hosts ...................................................................................... 281
Figure 149 Remote Host Certificates .................................................................................. 282
Figure 150 Certificate Details ............................................................................................. 282
Figure 151 Trusted Remote Host Import ............................................................................. 283
Figure 152 Trusted Remote Host Details ............................................................................ 284
Figure 153 Directory Servers .............................................................................................. 287
Figure 154 Directory Server Add ......................................................................................... 288
Figure 155 Example of Static Routing Topology ................................................................. 289
Figure 156 Static Route ....................................................................................................... 290
Figure 157 Static Route Edit ............................................................................................... 291
Figure 158 Subnet-based Bandwidth Management Example ............................................. 294
Figure 159 Bandwidth Management: Summary .................................................................. 298
Figure 160 Bandwidth Management: Rule Setup ............................................................... 299
Figure 161 Bandwidth Management Rule Configuration .................................................... 300
Figure 162 Bandwidth Management: Monitor .................................................................... 303
Figure 163 Dynamic DNS ................................................................................................... 306
Figure 164 Remote Management: WWW ........................................................................... 310
Figure 165 Telnet Configuration on a TCP/IP Network ....................................................... 311
Figure 166 Remote Management: Telnet ............................................................................ 312
Figure 167 Remote Management: FTP ............................................................................... 313
28 List of Figures
P-662H/HW-D Series User’s Guide
Figure 168 SNMP Management Model ............................................................................... 314
Figure 169 Remote Management: SNMP ........................................................................... 316
Figure 170 Remote Management: DNS .............................................................................. 317
Figure 171 Remote Management: ICMP ............................................................................ 318
Figure 172 Enabling TR-069 .............................................................................................. 319
Figure 173 Configuring UPnP ............................................................................................. 322
Figure 174 Add/Remove Programs: Windows Setup: Communication ............................... 324
Figure 175 Add/Remove Programs: Windows Setup: Communication: Components ........ 324
Figure 176 Network Connections ........................................................................................ 325
Figure 177 Windows Optional Networking Components Wizard ........................................ 325
Figure 178 Networking Services ......................................................................................... 326
Figure 179 Network Connections ........................................................................................ 327
Figure 180 Internet Connection Properties ........................................................................ 327
Figure 181 Internet Connection Properties: Advanced Settings ......................................... 328
Figure 182 Internet Connection Properties: Advanced Settings: Add ................................. 328
Figure 183 System Tray Icon .............................................................................................. 329
Figure 184 Internet Connection Status ................................................................................ 329
Figure 185 Network Connections ........................................................................................ 330
Figure 186 Network Connections: My Network Places ....................................................... 331
Figure 187 Network Connections: My Network Places: Properties: Example ..................... 331
Figure 188 System General Setup ...................................................................................... 334
Figure 189 System Time Setting ......................................................................................... 335
Figure 190 View Log ........................................................................................................... 340
Figure 191 Log Settings ...................................................................................................... 341
Figure 192 E-mail Log Example .......................................................................................... 343
Figure 193 Firmware Upgrade ............................................................................................ 345
Figure 194 Firmware Upload In Progress ........................................................................... 346
Figure 195 Network Temporarily Disconnected .................................................................. 346
Figure 196 Error Message .................................................................................................. 347
Figure 197 Configuration ..................................................................................................... 347
Figure 198 Configuration Restore Successful ..................................................................... 348
Figure 199 Temporarily Disconnected ................................................................................. 348
Figure 200 Configuration Restore Error .............................................................................. 349
Figure 201 Restart Screen .................................................................................................. 349
Figure 202 Diagnostic: General .......................................................................................... 351
Figure 203 Diagnostic: DSL Line ........................................................................................ 352
Figure 204 Pop-up Blocker ................................................................................................. 356
Figure 205 Internet Options ............................................................................................... 356
Figure 206 Internet Options ................................................................................................ 357
Figure 207 Pop-up Blocker Settings ................................................................................... 358
Figure 208 Internet Options ................................................................................................ 359
Figure 209 Security Settings - Java Scripting ..................................................................... 360
Figure 210 Security Settings - Java .................................................................................... 361
List of Figures 29
P-662H/HW-D Series User’s Guide
Figure 211 Java (Sun) ......................................................................................................... 361
Figure 212 Internet Options Security .................................................................................. 362
Figure 213 Security Setting ActiveX Controls ..................................................................... 363
Figure 214 Wall-mounting Example .................................................................................... 371
Figure 215 WIndows 95/98/Me: Network: Configuration ..................................................... 374
Figure 216 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 375
Figure 217 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 376
Figure 218 Windows XP: Start Menu .................................................................................. 377
Figure 219 Windows XP: Control Panel .............................................................................. 377
Figure 220 Windows XP: Control Panel: Network Connections: Properties ....................... 378
Figure 221 Windows XP: Local Area Connection Properties .............................................. 378
Figure 222 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 379
Figure 223 Windows XP: Advanced TCP/IP Properties ...................................................... 380
Figure 224 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 381
Figure 225 Macintosh OS 8/9: Apple Menu ........................................................................ 382
Figure 226 Macintosh OS 8/9: TCP/IP ................................................................................ 382
Figure 227 Macintosh OS X: Apple Menu ........................................................................... 383
Figure 228 Macintosh OS X: Network ................................................................................. 384
Figure 229 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 385
Figure 230 Red Hat 9.0: KDE: Ethernet Device: General .................................................. 385
Figure 231 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 386
Figure 232 Red Hat 9.0: KDE: Network Configuration: Activate .................................. 386
Figure 233 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 ............................... 387
Figure 234 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 387
Figure 235 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 387
Figure 236 Red Hat 9.0: Restart Ethernet Card ................................................................. 388
Figure 237 Red Hat 9.0: Checking TCP/IP Properties ....................................................... 388
Figure 238 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 397
Figure 239 Basic Service Set .............................................................................................. 398
Figure 240 Infrastructure WLAN ......................................................................................... 399
Figure 241 RTS/CTS .......................................................................................................... 400
Figure 242 Security Certificate ............................................................................................ 409
Figure 243 Login Screen ..................................................................................................... 410
Figure 244 Certificate General Information before Import ................................................... 410
Figure 245 Certificate Import Wizard 1 ............................................................................... 411
Figure 246 Certificate Import Wizard 2 ............................................................................... 411
Figure 247 Certificate Import Wizard 3 ............................................................................... 412
Figure 248 Root Certificate Store ........................................................................................ 412
Figure 249 Certificate General Information after Import ...................................................... 413
Figure 250 ZyXEL Device Trusted CA Screen .................................................................... 414
Figure 251 CA Certificate Example ..................................................................................... 414
Figure 252 Personal Certificate Import Wizard 1 ................................................................ 415
Figure 253 Personal Certificate Import Wizard 2 ................................................................ 415
30 List of Figures