P-2602HWLNI Series
802.11g Wireless ADSL2+ 4-Port VoIP IAD
User’s Guide
Version 3.40
9/2007
Edition 2
DEFAULT LOGIN
IP Address http://192.168.1.1
Administrator Name admin
Administrator Password admin
User Name user
User Password 1234
www.zyxel.com
About This User's Guide
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the ZyXEL Device using the web
configurator. You should have at least a basic knowledge of TCP/IP networking concepts and
topology.
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
" It is recommended you use the web configurator to configure the ZyXEL
Device.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com
certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
for additional support documentation and product
P-2602HWLNI User’s Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The P-2602HWLNI may be referred to as the “ZyXEL Device”, the “device”, the
“system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
P-2602HWLNI User’s Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is
not an exact representation of your device.
ZyXEL Device Computer Notebook computer
Server DSLAM Firewall
Telephone Switch Router
P-2602HWLNI User’s Guide
5
Safety Warnings
Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel should
service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in
North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Antenna Warning! This device meets ETSI and FCC certification requirements when
using the included antenna(s). Only use the included antenna(s).
6
This product is recyclable. Dispose of it properly.
P-2602HWLNI User’s Guide
Safety Warnings
P-2602HWLNI User’s Guide
7
Safety Warnings
8
P-2602HWLNI User’s Guide
Contents Overview
Contents Overview
Introduction ............................................................................................................................ 39
Introducing the ZyXEL Device ...................................................................................................41
Introducing the Web Configurator .............................................................................................. 49
Wizards and Status ................................................................................................................ 61
Internet and Wireless Setup Wizard .......................................................................................... 63
VoIP Wizard ............................................................................................................................... 77
Bandwidth Management Wizard ................................................................................................ 83
Status Screens .......................................................................................................................... 87
Network ................................................................................................................................... 99
WAN Setup .............................................................................................................................. 101
LAN Setup ................................................................................................................................117
Wireless LAN ........................................................................................................................... 129
Network Address Translation (NAT) Screens .......................................................................... 155
VoIP ....................................................................................................................................... 167
Voice ........................................................................................................................................ 169
VoIP Trunking ...........................................................................................................................211
Phone Usage ........................................................................................................................... 227
Security ................................................................................................................................. 231
Firewalls .................................................................................................................................. 233
Firewall Configuration .............................................................................................................. 245
Content Filtering ...................................................................................................................... 265
Introduction to IPSec ............................................................................................................... 269
VPN Screens ........................................................................................................................... 275
Certificates ............................................................................................................................... 301
Advanced .............................................................................................................................. 325
Static Route ............................................................................................................................. 327
Bandwidth Management .......................................................................................................... 331
Dynamic DNS Setup ................................................................................................................ 339
Remote Management Configuration ........................................................................................ 343
Universal Plug-and-Play (UPnP) ............................................................................................. 361
P-2602HWLNI User’s Guide
9
Contents Overview
Maintenance and Troubleshooting ..................................................................................... 373
System ..................................................................................................................................... 375
Call History ............................................................................................................................. 381
Logs ........................................................................................................................................ 387
Troubleshooting ....................................................................................................................... 401
Tools ........................................................................................................................................ 407
Diagnostic ............................................................................................................................... 419
Product Specifications ............................................................................................................. 423
Appendices and Index ......................................................................................................... 433
10
P-2602HWLNI User’s Guide
Table of Contents
Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents.................................................................................................................... 11
List of Figures ......................................................................................................................... 25
List of Tables...........................................................................................................................33
Part I: Introduction................................................................................. 39
Chapter 1
Introducing the ZyXEL Device...............................................................................................41
1.1 Overview .............................................................................................................................. 41
1.2 Ways to Manage the ZyXEL Device .................................................................................... 42
1.3 Good Habits for Managing the ZyXEL Device ..................................................................... 42
1.4 Applications for the ZyXEL Device ...................................................................................... 43
1.4.1 Internet Access ..........................................................................................................43
1.4.2 Making Calls via Internet Telephony Service Provider ............................................... 43
1.4.3 Make Peer-to-peer Calls ............................................................................................ 44
1.4.4 Firewall for Secure Broadband Internet Access ......................................................... 44
1.4.5 LAN to LAN Application .............................................................................................. 45
1.5 LEDs .................................................................................................................................... 46
1.6 The RESET Button .............................................................................................................. 47
1.6.1 Using The Reset Button ............................................................................................. 47
Chapter 2
Introducing the Web Configurator ........................................................................................ 49
2.1 Web Configurator Overview ................................................................................................. 49
2.1.1 Accessing the Web Configurator ................................................................................ 49
2.2 Login Types ......................................................................................................................... 50
2.2.1 User Access ............................................................................................................... 50
2.2.2 Administrator Access ................................................................................................. 50
2.3 Web Configurator Main Screen ........................................................................................... 52
P-2602HWLNI User’s Guide
11
Table of Contents
2.3.1 Title Bar ...................................................................................................................... 53
2.3.2 Navigation Panel ........................................................................................................ 53
2.3.3 Main Window ..............................................................................................................59
2.3.4 Status Bar ................................................................................................................... 59
Part II: Wizards and Status.................................................................... 61
Chapter 3
Internet and Wireless Setup Wizard...................................................................................... 63
3.1 Introduction .......................................................................................................................... 63
3.2 Internet Access Wizard Setup ............................................................................................. 63
3.2.1 Manual Configuration ................................................................................................. 66
3.3 Wireless Connection Wizard Setup ..................................................................................... 71
3.3.1 Manually Assign a WPA-PSK Key ............................................................................. 74
3.3.2 Manually Assign a WEP Key ...................................................................................... 74
Chapter 4
VoIP Wizard ............................................................................................................................. 77
4.1 Introduction .......................................................................................................................... 77
4.2 VoIP Wizard Setup .............................................................................................................. 77
Chapter 5
Bandwidth Management Wizard............................................................................................ 83
5.1 Introduction .......................................................................................................................... 83
5.2 Bandwidth Management Wizard Setup ............................................................................... 83
Chapter 6
Status Screens........................................................................................................................ 87
6.1 Status Screen ..................................................................................................................... 87
6.2 Any IP Table ........................................................................................................................ 91
6.3 WLAN Status ....................................................................................................................... 92
6.4 Packet Statistics .................................................................................................................. 92
6.5 VoIP Statistics ...................................................................................................................... 94
6.6 LED Status ........................................................................................................................... 96
Part III: Network...................................................................................... 99
Chapter 7
WAN Setup.............................................................................................................................101
7.1 WAN Overview .................................................................................................................. 101
12
P-2602HWLNI User’s Guide
Table of Contents
7.1.1 Encapsulation ........................................................................................................... 101
7.1.2 Multiplexing .............................................................................................................. 102
7.1.3 VPI and VCI ............................................................................................................. 102
7.1.4 IP Address Assignment ............................................................................................ 102
7.1.5 Nailed-Up Connection (PPP) ................................................................................... 103
7.1.6 NAT .......................................................................................................................... 103
7.2 Metric ................................................................................................................................ 103
7.3 Traffic Shaping ................................................................................................................... 104
7.3.1 ATM Traffic Classes ................................................................................................. 105
7.4 Zero Configuration Internet Access ................................................................................... 105
7.5 Internet Access Setup ...................................................................................................... 106
7.5.1 Advanced Internet Access Setup ............................................................................. 108
7.6 WAN More Connections ................................................................................................... 109
7.7 More Connections Edit .......................................................................................................110
7.8 More Connections Edit Advanced .....................................................................................113
7.9 Traffic Redirect ...................................................................................................................114
7.10 WAN Backup Setup .........................................................................................................114
Chapter 8
LAN Setup.............................................................................................................................. 117
8.1 LAN Overview ....................................................................................................................117
8.1.1 LANs, WANs and the ZyXEL Device .........................................................................117
8.1.2 DHCP Setup ..............................................................................................................118
8.2 DNS Server Addresses ......................................................................................................118
8.3 LAN TCP/IP ........................................................................................................................118
8.3.1 IP Address and Subnet Mask ....................................................................................118
8.3.2 RIP Setup ................................................................................................................. 120
8.3.3 Multicast ................................................................................................................... 120
8.3.4 Any IP ....................................................................................................................... 121
8.4 Configuring LAN IP ............................................................................................................ 122
8.4.1 Configuring Advanced LAN Setup ........................................................................... 123
8.5 DHCP Setup ...................................................................................................................... 124
8.6 LAN Client List ................................................................................................................... 125
8.7 LAN IP Alias ...................................................................................................................... 126
Chapter 9
Wireless LAN.........................................................................................................................129
9.1 Wireless Network Overview ............................................................................................... 129
9.2 Wireless Security Overview ............................................................................................... 130
9.2.1 SSID ......................................................................................................................... 130
9.2.2 MAC Address Filter .................................................................................................. 130
9.2.3 User Authentication .................................................................................................. 130
9.2.4 Encryption ................................................................................................................ 131
P-2602HWLNI User’s Guide
13
Table of Contents
9.2.5 One-Touch Intelligent Security Technology (OTIST) ................................................ 132
9.3 Wireless Performance Overview ....................................................................................... 132
9.3.1 Quality of Service (QoS) .......................................................................................... 132
9.3.2 Wireless Distribution System (WDS) ........................................................................ 132
9.4 Additional Wireless Terms ................................................................................................. 133
9.5 General WLAN Screen ...................................................................................................... 133
9.5.1 No Security ............................................................................................................... 134
9.5.2 WEP Encryption Screen ........................................................................................... 135
9.5.3 WPA(2)-PSK ............................................................................................................ 136
9.5.4 WPA(2) Authentication Screen ................................................................................. 138
9.5.5 Wireless LAN Advanced Setup ............................................................................... 139
9.6 OTIST Screen .................................................................................................................... 140
9.6.1 Notes on OTIST ....................................................................................................... 143
9.7 MAC Filter ..................................................................................................................... 143
9.8 Association List .................................................................................................................. 145
9.9 QoS Screen ....................................................................................................................... 145
9.9.1 Application Priority Configuration ............................................................................. 147
9.10 WDS Screen .................................................................................................................... 148
9.10.1 Static WEP ............................................................................................................. 149
9.10.2 WPA-PSK ............................................................................................................... 150
9.10.3 WPA2-PSK ............................................................................................................. 152
Chapter 10
Network Address Translation (NAT) Screens.....................................................................155
10.1 NAT General Overview ................................................................................................... 155
10.1.1 NAT Definitions ...................................................................................................... 155
10.1.2 What NAT Does ..................................................................................................... 156
10.1.3 How NAT Works ..................................................................................................... 156
10.1.4 NAT Application ...................................................................................................... 156
10.1.5 NAT Mapping Types ............................................................................................... 157
10.2 SUA (Single User Account) Versus NAT ......................................................................... 158
10.3 NAT General Setup .......................................................................................................... 158
10.4 Port Forwarding ............................................................................................................. 159
10.4.1 Default Server IP Address ...................................................................................... 160
10.4.2 Port Forwarding: Services and Port Numbers ........................................................ 160
10.4.3 Configuring Servers Behind Port Forwarding (Example) ....................................... 160
10.5 Configuring Port Forwarding ............................................................................................ 161
10.5.1 Port Forwarding Rule Edit ..................................................................................... 162
10.6 Address Mapping ............................................................................................................ 163
10.6.1 Address Mapping Rule Edit ................................................................................... 164
Part IV: VoIP.......................................................................................... 167
14
P-2602HWLNI User’s Guide
Table of Contents
Chapter 11
Voice.......................................................................................................................................169
11.1 Introduction to VoIP .......................................................................................................... 169
11.2 SIP .................................................................................................................................. 169
11.2.1 SIP Identities ..........................................................................................................169
11.2.2 SIP Servers ............................................................................................................ 170
11.2.3 RTP ........................................................................................................................ 173
11.2.4 Pulse Code Modulation .......................................................................................... 173
11.2.5 SIP Call Progression .............................................................................................. 173
11.2.6 SIP Call Progression Through Proxies ................................................................... 173
11.2.7 Voice Coding .......................................................................................................... 175
11.2.8 PSTN Call Setup Signaling .................................................................................... 175
11.2.9 MWI (Message Waiting Indication) ......................................................................... 175
11.2.10 Custom Tones (IVR) ............................................................................................. 176
11.3 Quality of Service (QoS) ..................................................................................................176
11.3.1 Type Of Service (ToS) ............................................................................................ 177
11.3.2 DiffServ ................................................................................................................... 177
11.3.3 VLAN ...................................................................................................................... 177
11.4 SIP Settings Screen ......................................................................................................... 178
11.5 Advanced SIP Setup Screen .......................................................................................... 179
11.6 SIP QoS Screen .............................................................................................................. 182
11.7 Phone .............................................................................................................................. 183
11.7.1 PSTN Line .............................................................................................................. 183
11.7.2 ISDN Line ...............................................................................................................184
11.7.3 Voice Activity Detection/Silence Suppression ........................................................ 184
11.7.4 Comfort Noise Generation ...................................................................................... 184
11.7.5 Echo Cancellation .................................................................................................. 184
11.8 Analog Phone ................................................................................................................. 184
11.8.1 PHONE Port Call Types ......................................................................................... 184
11.8.2 Configuring the Analog Phone Screen ................................................................... 185
11.9 Advanced Analog Phone Setup Screen .......................................................................... 187
11.10 ISDN Phone .................................................................................................................. 189
11.10.1 ISDN Phone Port Call Types ................................................................................ 189
11.10.2 Configuring the ISDN Phone Screen .................................................................... 190
11.11 Common Phone Settings Screen .................................................................................. 191
11.12 Ext. Table ....................................................................................................................... 191
11.13 Advanced Ext. Table Setup Screen ............................................................................... 193
11.14 Phone Services Overview .............................................................................................. 194
11.14.1 The Flash Key ...................................................................................................... 195
11.14.2 Europe Type Supplementary Phone Services ...................................................... 195
11.14.3 USA Type Supplementary Services ..................................................................... 196
11.15 Phone Region Screen ................................................................................................... 198
11.16 Speed Dial .................................................................................................................... 198
P-2602HWLNI User’s Guide
15
Table of Contents
11.17 Incoming Call Policy Screen ......................................................................................... 200
11.18 Distinctive Ring Screen ..................................................................................................202
11.19 SIP Prefix Screen ........................................................................................................... 204
11.20 PSTN Line ..................................................................................................................... 206
11.21 PSTN Line Screen .........................................................................................................206
11.22 ISDN Line Screen .......................................................................................................... 207
11.23 Fixed Line Numbers .......................................................................................................208
11.23.1 Multiple Subscriber Numbers ............................................................................... 208
11.23.2 Receiving Analog Calls With Digital Phones ........................................................ 209
11.23.3 Configuring the Fixed Line Numbers Screen ....................................................... 209
Chapter 12
VoIP Trunking........................................................................................................................ 211
12.1 VoIP Trunking Overview ..................................................................................................211
12.2 VoIP Trunking and Security ..............................................................................................211
12.2.1 Auto Attendant and Authentication ..........................................................................211
12.2.2 Peer Call Authentication ......................................................................................... 212
12.3 Call Rules ........................................................................................................................ 213
12.4 VoIP Trunking Scenarios ................................................................................................. 213
12.4.1 VoIP Phone To PSTN Phone ................................................................................. 213
12.4.2 PSTN Phone To VoIP Phone ................................................................................. 213
12.4.3 PSTN Phone To PSTN Phone via VoIP ................................................................. 214
12.5 Trunking General Screen ................................................................................................. 214
12.6 Trunking Peer Call Screen ............................................................................................... 215
12.7 Trunking Call Rule Screen ............................................................................................... 217
12.8 VoIP Trunking Example: VoIP to PSTN ........................................................................... 219
12.8.1 Background Information ......................................................................................... 219
12.8.2 Configuration Details: Outgoing ............................................................................. 219
12.8.3 Configuration Details: Incoming ............................................................................. 220
12.8.4 Call Progression ..................................................................................................... 221
12.9 VoIP Trunking Example: PSTN to PSTN via VoIP ........................................................... 221
12.9.1 Background Information ......................................................................................... 222
12.9.2 Configuration Details: Outgoing ............................................................................. 222
12.9.3 Configuration Details: Incoming ............................................................................. 224
12.9.4 Call Progression ..................................................................................................... 224
Chapter 13
Phone Usage ......................................................................................................................... 227
13.1 Dialing a Telephone Number ........................................................................................... 227
13.2 Using Speed Dial to Dial a Telephone Number ............................................................... 227
13.3 Internal Calls .................................................................................................................... 227
13.3.1 Phone Book ............................................................................................................ 228
13.3.2 Call Transfer ...........................................................................................................228
16
P-2602HWLNI User’s Guide
Table of Contents
13.3.3 Call Forwarding ...................................................................................................... 228
13.3.4 Follow Me ...............................................................................................................228
13.3.5 Call Pickup .............................................................................................................229
13.4 Checking the Device’s IP Address ................................................................................... 229
13.5 Auto Firmware Upgrade .................................................................................................. 229
Part V: Security .................................................................................... 231
Chapter 14
Firewalls................................................................................................................................. 233
14.1 Firewall Overview ........................................................................................................... 233
14.2 Types of Firewalls ............................................................................................................ 233
14.2.1 Packet Filtering Firewalls ....................................................................................... 233
14.2.2 Application-level Firewalls ...................................................................................... 234
14.2.3 Stateful Inspection Firewalls .................................................................................. 234
14.3 Introduction to ZyXEL’s Firewall ...................................................................................... 234
14.3.1 Denial of Service Attacks ....................................................................................... 235
14.4 Denial of Service ............................................................................................................. 235
14.4.1 Basics ..................................................................................................................... 235
14.4.2 Types of DoS Attacks ............................................................................................. 236
14.5 Stateful Inspection ........................................................................................................... 238
14.5.1 Stateful Inspection Process .................................................................................... 239
14.5.2 Stateful Inspection on Your ZyXEL Device ............................................................. 240
14.5.3 TCP Security .......................................................................................................... 240
14.5.4 UDP/ICMP Security ................................................................................................ 241
14.5.5 Upper Layer Protocols ........................................................................................... 241
14.6 Guidelines for Enhancing Security with Your Firewall ..................................................... 242
14.6.1 Security In General ................................................................................................ 242
14.7 Packet Filtering Vs Firewall ............................................................................................. 243
14.7.1 Packet Filtering: ..................................................................................................... 243
14.7.2 Firewall ................................................................................................................... 243
Chapter 15
Firewall Configuration ..........................................................................................................245
15.1 Access Methods .............................................................................................................. 245
15.2 General Firewall Policy Overview ................................................................................... 245
15.3 Rule Logic Overview ....................................................................................................... 246
15.3.1 Rule Checklist ........................................................................................................ 246
15.3.2 Security Ramifications ............................................................................................ 246
15.3.3 Key Fields For Configuring Rules .......................................................................... 247
15.4 Connection Direction ....................................................................................................... 247
P-2602HWLNI User’s Guide
17
Table of Contents
15.4.1 LAN to WAN Rules ................................................................................................. 248
15.4.2 Alerts ...................................................................................................................... 248
15.5 General Firewall Policy ................................................................................................... 248
15.6 Firewall Rules Summary ................................................................................................. 249
15.6.1 Configuring Firewall Rules ................................................................................... 251
15.6.2 Customized Services ............................................................................................ 254
15.6.3 Configuring a Customized Service ....................................................................... 254
15.7 Example Firewall Rule .....................................................................................................255
15.8 DoS Thresholds .............................................................................................................. 259
15.8.1 Threshold Values ................................................................................................... 259
15.8.2 Half-Open Sessions ............................................................................................... 260
15.8.3 Configuring Firewall Thresholds ............................................................................. 260
15.9 Firewall Commands .........................................................................................................262
Chapter 16
Content Filtering ................................................................................................................... 265
16.1 Content Filtering Overview ............................................................................................. 265
16.2 Configuring Keyword Blocking ........................................................................................ 265
16.3 Configuring the Schedule .............................................................................................. 266
16.4 Configuring Trusted Computers ..................................................................................... 267
Chapter 17
Introduction to IPSec............................................................................................................269
17.1 VPN Overview ............................................................................................................... 269
17.1.1 IPSec ...................................................................................................................... 269
17.1.2 Security Association ............................................................................................... 269
17.1.3 Other Terminology .................................................................................................. 269
17.1.4 VPN Applications ................................................................................................... 270
17.2 IPSec Architecture ........................................................................................................... 270
17.2.1 IPSec Algorithms .................................................................................................... 271
17.2.2 Key Management ................................................................................................... 271
17.3 Encapsulation .................................................................................................................. 271
17.3.1 Transport Mode ...................................................................................................... 272
17.3.2 Tunnel Mode ......................................................................................................... 272
17.4 IPSec and NAT ................................................................................................................ 272
Chapter 18
VPN Screens.......................................................................................................................... 275
18.1 VPN/IPSec Overview ....................................................................................................... 275
18.2 IPSec Algorithms ............................................................................................................. 275
18.2.1 AH (Authentication Header) Protocol ..................................................................... 275
18.2.2 ESP (Encapsulating Security Payload) Protocol .................................................... 275
18.3 My IP Address ................................................................................................................. 276
18
P-2602HWLNI User’s Guide
Table of Contents
18.4 Secure Gateway Address ................................................................................................ 276
18.4.1 Dynamic Secure Gateway Address ....................................................................... 277
18.5 VPN Setup Screen ..........................................................................................................277
18.6 Keep Alive ....................................................................................................................... 279
18.7 VPN, NAT, and NAT Traversal ......................................................................................... 279
18.8 Remote DNS Server ........................................................................................................ 280
18.9 ID Type and Content ........................................................................................................ 281
18.9.1 ID Type and Content Examples ............................................................................. 282
18.10 Pre-Shared Key ............................................................................................................. 283
18.11 Editing VPN Policies ..................................................................................................... 283
18.12 IKE Phases ................................................................................................................... 288
18.12.1 Negotiation Mode ................................................................................................. 289
18.12.2 Diffie-Hellman (DH) Key Groups .......................................................................... 289
18.12.3 Perfect Forward Secrecy (PFS) .......................................................................... 289
18.13 Configuring Advanced IKE Settings ............................................................................. 289
18.14 Manual Key Setup .........................................................................................................292
18.14.1 Security Parameter Index (SPI) .......................................................................... 292
18.15 Configuring Manual Key ............................................................................................... 292
18.16 Viewing SA Monitor ......................................................................................................295
18.17 Configuring Global Setting ............................................................................................ 297
18.18 Telecommuter VPN/IPSec Examples ............................................................................ 297
18.18.1 Telecommuters Sharing One VPN Rule Example ................................................ 297
18.18.2 Telecommuters Using Unique VPN Rules Example ............................................. 298
18.19 VPN and Remote Management ..................................................................................... 300
Chapter 19
Certificates ............................................................................................................................301
19.1 Certificates Overview ...................................................................................................... 301
19.1.1 Advantages of Certificates ..................................................................................... 302
19.2 Self-signed Certificates .................................................................................................... 302
19.3 Configuration Summary ................................................................................................... 302
19.4 My Certificates ................................................................................................................. 303
19.5 My Certificate Import ...................................................................................................... 304
19.5.1 Certificate File Formats .......................................................................................... 305
19.6 My Certificate Create ...................................................................................................... 306
19.7 My Certificate Details ...................................................................................................... 308
19.8 Trusted CAs ....................................................................................................................311
19.9 Trusted CA Import ......................................................................................................... 313
19.10 Trusted CA Details ......................................................................................................... 314
19.11 Trusted Remote Hosts ................................................................................................. 316
19.12 Verifying a Trusted Remote Host’s Certificate ............................................................... 318
19.12.1 Trusted Remote Host Certificate Fingerprints ...................................................... 318
19.13 Trusted Remote Hosts Import ...................................................................................... 319
P-2602HWLNI User’s Guide
19
Table of Contents
19.14 Trusted Remote Host Certificate Details ..................................................................... 319
19.15 Directory Servers ........................................................................................................... 322
19.16 Directory Server Add and Edit ...................................................................................... 323
Part VI: Advanced ................................................................................ 325
Chapter 20
Static Route ........................................................................................................................... 327
20.1 Static Route .................................................................................................................... 327
20.2 Configuring Static Route ..................................................................................................327
20.2.1 Static Route Edit ................................................................................................... 328
Chapter 21
Bandwidth Management.......................................................................................................331
21.1 Bandwidth Management Overview ................................................................................. 331
21.2 Application-based Bandwidth Management .................................................................... 331
21.3 Auto Classifier ................................................................................................................. 331
21.4 Subnet-based Bandwidth Management .......................................................................... 332
21.5 Application and Subnet-based Bandwidth Management ................................................. 333
21.5.1 Bandwidth Management Priorities ......................................................................... 333
21.6 Configuring Bandwidth Management (General) .............................................................. 333
21.7 Bandwidth Management Rule Setup ............................................................................. 334
21.7.1 Rule Configuration ................................................................................................. 335
21.8 Bandwidth Monitor ......................................................................................................... 337
Chapter 22
Dynamic DNS Setup ............................................................................................................. 339
22.1 Dynamic DNS Overview ................................................................................................ 339
22.1.1 DYNDNS Wildcard ................................................................................................. 339
22.2 Configuring Dynamic DNS ............................................................................................... 339
Chapter 23
Remote Management Configuration ...................................................................................343
23.1 Remote Management Overview ..................................................................................... 343
23.1.1 Remote Management Limitations .......................................................................... 344
23.1.2 Remote Management and NAT .............................................................................. 344
23.1.3 System Timeout .................................................................................................... 344
23.2 Introduction to HTTPS .....................................................................................................345
23.3 HTTP ............................................................................................................................... 346
23.4 Telnet ............................................................................................................................... 347
23.5 Configuring Telnet ............................................................................................................ 347
20
P-2602HWLNI User’s Guide
Table of Contents
23.6 Configuring FTP ............................................................................................................. 348
23.7 SNMP .............................................................................................................................. 349
23.7.1 Supported MIBs ..................................................................................................... 350
23.7.2 SNMP Traps ........................................................................................................... 351
23.7.3 Configuring SNMP ................................................................................................. 351
23.8 Configuring DNS ............................................................................................................ 352
23.9 Configuring ICMP ............................................................................................................ 353
23.10 SSH ............................................................................................................................. 354
23.11 How SSH Works ............................................................................................................355
23.12 SSH Implementation on the ZyXEL Device ................................................................... 356
23.12.1 Requirements for Using SSH ............................................................................... 356
23.13 Configuring SSH ............................................................................................................ 356
23.14 Secure Telnet Using SSH Examples ............................................................................. 357
23.14.1 Example 1: Microsoft Windows ............................................................................ 357
23.14.2 Example 2: Linux .................................................................................................. 357
23.15 Secure FTP Using SSH Example .................................................................................. 358
Chapter 24
Universal Plug-and-Play (UPnP).......................................................................................... 361
24.1 Introducing Universal Plug and Play ............................................................................... 361
24.1.1 How do I know if I'm using UPnP? ......................................................................... 361
24.1.2 NAT Traversal ........................................................................................................ 361
24.1.3 Cautions with UPnP ............................................................................................... 361
24.2 UPnP and ZyXEL ............................................................................................................362
24.2.1 Configuring UPnP .................................................................................................. 362
24.3 Installing UPnP in Windows Example .............................................................................. 363
24.4 Using UPnP in Windows XP Example ............................................................................. 366
Part VII: Maintenance and Troubleshooting ...................................... 373
Chapter 25
System ................................................................................................................................... 375
25.1 General Setup and System Name ................................................................................... 375
25.1.1 General Setup ....................................................................................................... 375
25.2 Time Setting .................................................................................................................... 377
Chapter 26
Call History ........................................................................................................................... 381
26.1 Call History Overview ..................................................................................................... 381
26.2 Viewing the Call History Summary .................................................................................. 381
26.3 Viewing Call History ......................................................................................................... 382
P-2602HWLNI User’s Guide
21
Table of Contents
26.4 Configuring Call History Settings .................................................................................... 384
Chapter 27
Logs ...................................................................................................................................... 387
27.1 Logs Overview ................................................................................................................ 387
27.1.1 Alerts and Logs ...................................................................................................... 387
27.2 Viewing the Logs ............................................................................................................. 387
27.3 Configuring Log Settings ................................................................................................ 388
27.4 SMTP Error Messages .................................................................................................... 390
27.4.1 Example E-mail Log ............................................................................................... 391
27.5 Log Descriptions .............................................................................................................. 392
Chapter 28
Troubleshooting.................................................................................................................... 401
28.1 Power, Hardware Connections, and LEDs ...................................................................... 401
28.2 ZyXEL Device Access and Login .................................................................................... 402
28.3 Internet Access ................................................................................................................ 404
28.4 Phone Calls and VoIP ......................................................................................................405
Chapter 29
Tools.......................................................................................................................................407
29.1 Introduction ...................................................................................................................... 407
29.2 Filename Conventions ..................................................................................................... 407
29.3 File Maintenance Over WAN ........................................................................................... 408
29.4 Firmware Upgrade Screen ............................................................................................ 409
29.5 Backup and Restore .......................................................................................................410
29.5.1 Backup Configuration .............................................................................................411
29.5.2 Restore Configuration ............................................................................................411
29.5.3 Reset to Factory Defaults ...................................................................................... 412
29.6 Restart ............................................................................................................................. 413
29.7 Using FTP or TFTP to Back Up Configuration ................................................................ 413
29.7.1 Using the FTP Commands to Back Up Configuration ............................................ 413
29.7.2 FTP Command Configuration Backup Example ................................................... 414
29.7.3 Configuration Backup Using GUI-based FTP Clients ............................................ 414
29.7.4 Backup Configuration Using TFTP ......................................................................... 414
29.7.5 TFTP Command Configuration Backup Example .................................................. 415
29.7.6 Configuration Backup Using GUI-based TFTP Clients .......................................... 415
29.8 Using FTP or TFTP to Restore Configuration ............................................................... 416
29.8.1 Restore Using FTP Session Example .................................................................... 416
29.9 FTP and TFTP Firmware and Configuration File Uploads .............................................. 416
29.9.1 FTP File Upload Command from the DOS Prompt Example ................................. 417
29.9.2 FTP Session Example of Firmware File Upload .................................................... 417
29.9.3 TFTP File Upload ................................................................................................... 417
22
P-2602HWLNI User’s Guide
Table of Contents
29.9.4 TFTP Upload Command Example ......................................................................... 418
Chapter 30
Diagnostic ............................................................................................................................. 419
30.1 General Diagnostic ......................................................................................................... 419
30.2 DSL Line Diagnostic ...................................................................................................... 419
Chapter 31
Product Specifications.........................................................................................................423
31.1 Hardware Specifications .................................................................................................. 423
31.2 Firmware Specifications ...................................................................................................423
31.3 Voice Specifications ......................................................................................................... 427
31.4 Wireless Features (Wireless Devices Only) .................................................................... 429
31.4.1 IEEE 802.11g Wireless LAN .................................................................................. 430
31.5 Power Adaptor Specifications .......................................................................................... 431
Part VIII: Appendices and Index ......................................................... 433
Appendix A Setting up Your Computer’s IP Address............................................................ 435
Appendix B Pop-up Windows, JavaScripts and Java Permissions ...................................... 447
Appendix C IP Addresses and Subnetting ........................................................................... 453
Appendix D Wireless LANs .................................................................................................. 461
Appendix E Services ............................................................................................................ 475
Appendix F Legal Information ..............................................................................................479
Appendix G Customer Support ............................................................................................483
Index....................................................................................................................................... 489
P-2602HWLNI User’s Guide
23
Table of Contents
24
P-2602HWLNI User’s Guide
List of Figures
List of Figures
Figure 1 Internet Access Application ...................................................................................................... 43
Figure 2 Internet Telephony Service Provider Application ...................................................................... 44
Figure 3 Peer-to-peer Calling ................................................................................................................. 44
Figure 4 Firewall Application .................................................................................................................. 45
Figure 5 LAN-to-LAN Application ........................................................................................................... 45
Figure 6 LEDs ......................................................................................................................................... 46
Figure 7 Password Screen ..................................................................................................................... 50
Figure 8 Change Password Screen ........................................................................................................ 51
Figure 9 Replace Certificate Screen ....................................................................................................... 51
Figure 10 Wizard or Advanced Screen .................................................................................................. 52
Figure 11 Main Screen ........................................................................................................................... 52
Figure 12 Select a Mode ........................................................................................................................ 64
Figure 13 Wizard Welcome .................................................................................................................... 64
Figure 14 Auto Detection: No DSL Connection ...................................................................................... 65
Figure 15 Auto-Detection: PPPoE .......................................................................................................... 65
Figure 16 Auto Detection: Failed ............................................................................................................ 66
Figure 17 Internet Access Wizard Setup: ISP Parameters ..................................................................... 67
Figure 18 Internet Connection with PPPoE ............................................................................................ 68
Figure 19 Internet Connection with RFC 1483 ...................................................................................... 68
Figure 20 Internet Connection with ENET ENCAP ................................................................................. 69
Figure 21 Internet Connection with PPPoA ............................................................................................ 70
Figure 22 Connection Test Failed-1 ........................................................................................................ 71
Figure 23 Connection Test Failed-2. ....................................................................................................... 71
Figure 24 Connection Test Successful ................................................................................................... 72
Figure 25 Wireless LAN Setup Wizard 1 ................................................................................................ 72
Figure 26 Wireless LAN ......................................................................................................................... 73
Figure 27 Manually Assign a WPA-PSK Key .......................................................................................... 74
Figure 28 Manually Assign a WEP Key .................................................................................................. 74
Figure 29 Wireless LAN Setup 3 ............................................................................................................ 75
Figure 30 Internet Access and WLAN Wizard Setup Complete ............................................................. 76
Figure 31 VoIP Phone Calls ................................................................................................................... 77
Figure 32 Select a Mode ........................................................................................................................ 78
Figure 33 Wizard: Welcome ................................................................................................................... 79
Figure 34 SIP Server Profile Selection ................................................................................................... 79
Figure 35 VoIP Wizard Configuration ..................................................................................................... 80
Figure 36 SIP Registration Test .............................................................................................................. 81
Figure 37 VoIP Wizard Fail ..................................................................................................................... 81
Figure 38 VoIP Wizard Finish ................................................................................................................ 81
P-2602HWLNI User’s Guide
25
List of Figures
Figure 39 Select a Mode ........................................................................................................................ 83
Figure 40 Wizard: Welcome ................................................................................................................... 84
Figure 41 Bandwidth Management Wizard: General Information ........................................................... 84
Figure 42 Bandwidth Management Wizard: Complete ........................................................................... 85
Figure 43 Status Screen ......................................................................................................................... 88
Figure 44 Any IP Table ........................................................................................................................... 91
Figure 45 WLAN Status .......................................................................................................................... 92
Figure 46 Packet Statistics ..................................................................................................................... 93
Figure 47 VoIP Statistics ......................................................................................................................... 94
Figure 48 LED Status ............................................................................................................................. 96
Figure 49 Example of Traffic Shaping .................................................................................................. 104
Figure 50 Internet Access Setup (PPPoE) ........................................................................................... 106
Figure 51 Advanced Internet Access Setup ......................................................................................... 108
Figure 52 WAN More Connections ........................................................................................................110
Figure 53 More Connections Edit ..........................................................................................................111
Figure 54 More Connections Edit Advanced .........................................................................................113
Figure 55 Traffic Redirect Example .......................................................................................................114
Figure 56 Traffic Redirect LAN Setup ....................................................................................................114
Figure 57 WAN Backup Setup ...............................................................................................................115
Figure 58 LAN and WAN IP Addresses .................................................................................................117
Figure 59 Any IP Example .................................................................................................................... 121
Figure 60 LAN IP .................................................................................................................................. 122
Figure 61 Advanced LAN Setup ........................................................................................................... 123
Figure 62 DHCP Setup ......................................................................................................................... 124
Figure 63 LAN Client List ...................................................................................................................... 126
Figure 64 Physical Network & Partitioned Logical Networks ................................................................ 127
Figure 65 LAN IP Alias ......................................................................................................................... 127
Figure 66 Example of a Wireless Network ........................................................................................... 129
Figure 67 Example of a WDS Link ....................................................................................................... 132
Figure 68 Wireless LAN: General ........................................................................................................ 134
Figure 69 Wireless: No Security ........................................................................................................... 135
Figure 70 Wireless: Static WEP Encryption .......................................................................................... 136
Figure 71 Wireless: WPA(2)-PSK ......................................................................................................... 137
Figure 72 Wireless: WPA(2) ................................................................................................................. 138
Figure 73 Wireless LAN: Advanced ...................................................................................................... 139
Figure 74 Network > Wireless LAN > OTIST ........................................................................................ 141
Figure 75 Example: Wireless Client OTIST Screen ............................................................................. 142
Figure 76 OTIST: Settings .................................................................................................................... 142
Figure 77 OTIST: In Progress on the ZyXEL Device ............................................................................ 142
Figure 78 OTIST: In Progress on the Wireless Device ......................................................................... 143
Figure 79 Start OTIST? ........................................................................................................................ 143
Figure 80 MAC Address Filter .............................................................................................................. 144
Figure 81 Wireless LAN: Association List ............................................................................................. 145
26
P-2602HWLNI User’s Guide
List of Figures
Figure 82 Wireless LAN: QoS .............................................................................................................. 146
Figure 83 Application Priority Configuration ......................................................................................... 147
Figure 84 Wireless LAN > WDS ........................................................................................................... 149
Figure 85 Wireless LAN > WDS > Static WEP ..................................................................................... 150
Figure 86 Example: WDS Link using WPA-PSK with TKIP .................................................................. 151
Figure 87 Wireless LAN > WDS > WPA-PSK ....................................................................................... 151
Figure 88 Wireless LAN > WDS > WPA2-PSK .................................................................................... 152
Figure 89 How NAT Works ................................................................................................................... 156
Figure 90 NAT Application With IP Alias .............................................................................................. 157
Figure 91 NAT General ......................................................................................................................... 159
Figure 92 Multiple Servers Behind NAT Example ................................................................................ 160
Figure 93 Port Forwarding .................................................................................................................... 161
Figure 94 Port Forwarding Rule Setup ............................................................................................... 162
Figure 95 Address Mapping Rules ....................................................................................................... 163
Figure 96 Edit Address Mapping Rule ................................................................................................ 165
Figure 97 SIP User Agent ..................................................................................................................... 170
Figure 98 SIP Proxy Server .................................................................................................................. 171
Figure 99 SIP Redirect Server .............................................................................................................. 172
Figure 100 SIP Call Through Proxy Servers ........................................................................................ 174
Figure 101 DiffServ: Differentiated Service Field .................................................................................. 177
Figure 102 SIP > SIP Settings .............................................................................................................. 178
Figure 103 VoIP > SIP Settings > Advanced ........................................................................................ 180
Figure 104 SIP > QoS .......................................................................................................................... 183
Figure 105 Phone > Analog Phone ...................................................................................................... 186
Figure 106 Phone > Analog Phone > Advanced .................................................................................. 188
Figure 107 Phone > ISDN Phone ......................................................................................................... 190
Figure 108 Phone > Common .............................................................................................................. 191
Figure 109 VoIP > Phone > Ext. Table ................................................................................................. 192
Figure 110 VoIP > Phone > Ext. Table > Advanced .............................................................................. 194
Figure 111 VoIP > Phone > Region ...................................................................................................... 198
Figure 112 Phone Book > Speed Dial ................................................................................................... 199
Figure 113 Phone Book > Incoming Call Policy .................................................................................... 200
Figure 114 Phone Book > Distinctive Ring ........................................................................................... 203
Figure 115 Phone Book > SIP Prefix .................................................................................................... 205
Figure 116 PSTN Line > General ......................................................................................................... 206
Figure 117 ISDN Line > General .......................................................................................................... 207
Figure 118 VoIP > Fixed Line Numbers Screen ................................................................................... 210
Figure 119 Peer Devices Connecting ................................................................................................... 212
Figure 120 VoIP Phone To PSTN Phone .............................................................................................. 213
Figure 121 PSTN Phone To VoIP Phone .............................................................................................. 214
Figure 122 PSTN Phone To PSTN Phone via VoIP ............................................................................. 214
Figure 123 VoIP > Trunking > General ................................................................................................. 214
Figure 124 VoIP > Trunking > Peer Call .............................................................................................. 216
P-2602HWLNI User’s Guide
27
List of Figures
Figure 125 VoIP > Trunking > Call Rule ............................................................................................... 218
Figure 126 VoIP to PSTN Example ...................................................................................................... 219
Figure 127 VoIP to PSTN Example - Speed Dial Screen ..................................................................... 220
Figure 128 VoIP to PSTN Example - Outgoing Authentication ............................................................. 220
Figure 129 VoIP to PSTN Example - Incoming Authentication ............................................................. 221
Figure 130 PSTN to PSTN Example .................................................................................................... 222
Figure 131 PSTN to PSTN Example: General Configuration ............................................................... 223
Figure 132 PSTN to PSTN Example - Outgoing Authentication ........................................................... 223
Figure 133 PSTN to PSTN Example - Call Rule .................................................................................. 224
Figure 134 PSTN to PSTN Example - Incoming Authentication ........................................................... 224
Figure 135 Firewall Application ............................................................................................................ 235
Figure 136 Three-Way Handshake ....................................................................................................... 236
Figure 137 SYN Flood .......................................................................................................................... 237
Figure 138 Smurf Attack ....................................................................................................................... 237
Figure 139 Stateful Inspection .............................................................................................................. 239
Figure 140 Firewall: General ................................................................................................................ 248
Figure 141 Firewall Rules .................................................................................................................... 250
Figure 142 Firewall: Edit Rule .............................................................................................................. 252
Figure 143 Firewall: Customized Services ........................................................................................... 254
Figure 144 Firewall: Configure Customized Services ........................................................................... 255
Figure 145 Firewall Example: Rules ..................................................................................................... 256
Figure 146 Edit Custom Port Example ................................................................................................. 256
Figure 147 Firewall Example: Edit Rule: Destination Address ............................................................ 257
Figure 148 Firewall Example: Edit Rule: Select Customized Services ................................................. 258
Figure 149 Firewall Example: Rules: MyService .................................................................................259
Figure 150 Firewall: Threshold ............................................................................................................. 261
Figure 151 Content Filter: Keyword ...................................................................................................... 265
Figure 152 Content Filter: Schedule ..................................................................................................... 266
Figure 153 Content Filter: Trusted ........................................................................................................ 267
Figure 154 Encryption and Decryption ................................................................................................. 270
Figure 155 IPSec Architecture .............................................................................................................. 271
Figure 156 Transport and Tunnel Mode IPSec Encapsulation ............................................................. 272
Figure 157 IPSec Summary Fields ....................................................................................................... 277
Figure 158 VPN Setup .......................................................................................................................... 278
Figure 159 NAT Router Between IPSec Routers ................................................................................. 280
Figure 160 VPN Host using Intranet DNS Server Example .................................................................. 281
Figure 161 Edit VPN Policies .............................................................................................................. 284
Figure 162 Two Phases to Set Up the IPSec SA ................................................................................. 288
Figure 163 Advanced VPN Policies ...................................................................................................... 290
Figure 164 VPN: Manual Key ............................................................................................................... 293
Figure 165 VPN: SA Monitor ................................................................................................................ 296
Figure 166 VPN: Global Setting ........................................................................................................... 297
Figure 167 Telecommuters Sharing One VPN Rule Example .............................................................. 298
28
P-2602HWLNI User’s Guide
List of Figures
Figure 168 Telecommuters Using Unique VPN Rules Example ........................................................... 299
Figure 169 Certificate Configuration Overview ..................................................................................... 302
Figure 170 My Certificates ................................................................................................................... 303
Figure 171 My Certificate Import .......................................................................................................... 305
Figure 172 My Certificate Create .......................................................................................................... 306
Figure 173 My Certificate Details ......................................................................................................... 309
Figure 174 Trusted CAs ........................................................................................................................ 312
Figure 175 Trusted CA Import .............................................................................................................. 313
Figure 176 Trusted CA Details ............................................................................................................. 314
Figure 177 Trusted Remote Hosts ........................................................................................................ 317
Figure 178 Remote Host Certificates ................................................................................................... 318
Figure 179 Certificate Details .............................................................................................................. 318
Figure 180 Trusted Remote Host Import .............................................................................................. 319
Figure 181 Trusted Remote Host Details ............................................................................................. 320
Figure 182 Directory Servers ................................................................................................................ 323
Figure 183 Directory Server Add and Edit ............................................................................................ 324
Figure 184 Example of Static Routing Topology ................................................................................... 327
Figure 185 Static Route ........................................................................................................................ 328
Figure 186 Static Route Edit ................................................................................................................. 329
Figure 187 Subnet-based Bandwidth Management Example .............................................................. 332
Figure 188 Bandwidth Management: General ...................................................................................... 333
Figure 189 Bandwidth Management: Rule Setup ................................................................................. 334
Figure 190 Bandwidth Management Rule Configuration ...................................................................... 335
Figure 191 Bandwidth Management: Monitor ......................................................................................337
Figure 192 Dynamic DNS ..................................................................................................................... 340
Figure 193 Secure and Insecure Remote Management From the WAN .............................................. 343
Figure 194 HTTPS Implementation ...................................................................................................... 345
Figure 195 Remote Management: HTTP .............................................................................................346
Figure 196 Telnet Configuration on a TCP/IP Network ......................................................................... 347
Figure 197 Remote Management: Telnet ............................................................................................. 348
Figure 198 Remote Management: FTP ................................................................................................ 349
Figure 199 SNMP Management Model ................................................................................................ 350
Figure 200 Remote Management: SNMP ............................................................................................ 351
Figure 201 Remote Management: DNS ............................................................................................... 353
Figure 202 Remote Management: ICMP .............................................................................................. 354
Figure 203 SSH Communication Over the WAN Example .................................................................. 355
Figure 204 How SSH Works ................................................................................................................. 355
Figure 205 ADVANCED > REMOTE MGMT > SSH ............................................................................. 356
Figure 206 SSH Example 1: Store Host Key ........................................................................................ 357
Figure 207 SSH Example 2: Test ........................................................................................................ 358
Figure 208 SSH Example 2: Log in ...................................................................................................... 358
Figure 209 Secure FTP: Firmware Upload Example ............................................................................ 359
Figure 210 Configuring UPnP ............................................................................................................... 362
P-2602HWLNI User’s Guide
29
List of Figures
Figure 211 Add/Remove Programs: Windows Setup: Communication ................................................ 363
Figure 212 Add/Remove Programs: Windows Setup: Communication: Components .......................... 364
Figure 213 Network Connections ......................................................................................................... 364
Figure 214 Windows Optional Networking Components Wizard .......................................................... 365
Figure 215 Networking Services ........................................................................................................... 365
Figure 216 Network Connections ......................................................................................................... 366
Figure 217 Internet Connection Properties .......................................................................................... 367
Figure 218 Internet Connection Properties: Advanced Settings ........................................................... 368
Figure 219 Internet Connection Properties: Advanced Settings: Add .................................................. 368
Figure 220 System Tray Icon ................................................................................................................ 369
Figure 221 Internet Connection Status ................................................................................................. 369
Figure 222 Network Connections ......................................................................................................... 370
Figure 223 Network Connections: My Network Places ........................................................................ 371
Figure 224 Network Connections: My Network Places: Properties: Example ...................................... 371
Figure 225 System General Setup ....................................................................................................... 376
Figure 226 System Time Setting .......................................................................................................... 377
Figure 227 Call History > Summary ...................................................................................................... 382
Figure 228 Call History > Call History ................................................................................................... 383
Figure 229 Call History > Call History Settings ..................................................................................... 384
Figure 230 View Log ............................................................................................................................. 388
Figure 231 Log Settings ....................................................................................................................... 389
Figure 232 E-mail Log Example ........................................................................................................... 391
Figure 233 Firmware Upgrade .............................................................................................................. 409
Figure 234 Firmware Upload In Progress ............................................................................................. 410
Figure 235 Network Temporarily Disconnected ....................................................................................410
Figure 236 Error Message .................................................................................................................... 410
Figure 237 Configuration .......................................................................................................................411
Figure 238 Configuration Upload Successful ....................................................................................... 412
Figure 239 Network Temporarily Disconnected ....................................................................................412
Figure 240 Configuration Upload Error ................................................................................................. 412
Figure 241 Reset Warning Message .................................................................................................... 412
Figure 242 Reset In Process Message ................................................................................................ 413
Figure 243 Restart Screen ................................................................................................................... 413
Figure 244 FTP Session Example ........................................................................................................ 414
Figure 245 Restore Using FTP Session Example ................................................................................ 416
Figure 246 FTP Session Example of Firmware File Upload ................................................................. 417
Figure 247 Diagnostic: General ............................................................................................................ 419
Figure 248 Diagnostic: DSL Line .......................................................................................................... 420
Figure 249 WIndows 95/98/Me: Network: Configuration ...................................................................... 436
Figure 250 Windows 95/98/Me: TCP/IP Properties: IP Address .......................................................... 437
Figure 251 Windows 95/98/Me: TCP/IP Properties: DNS Configuration .............................................. 438
Figure 252 Windows XP: Start Menu .................................................................................................... 439
Figure 253 Windows XP: Control Panel ............................................................................................... 439
30
P-2602HWLNI User’s Guide