ZyXEL Communications P-335WT User Manual

0 (0)
P-335
Firewall Router with Print Server
P-335WT
802.11g Wireless Firewall Router with Print Server

User’s Guide

Version 3.60
4/2005
P-335 Series User’s Guide

Copyright

Copyright © 2005 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
P-335 Series User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Certifications
Go to www.zyxel.com
1 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
2 Select the certification you wish to view from this page

4 Federal Communications Commission (FCC) Interference Statement

P-335 Series User’s Guide
Federal Communications Commission (FCC) Interference Statement 5
P-335 Series User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.

ZyXEL Limited Warranty

To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Safety Warnings
1 To reduce the risk of fire, use only No. 26 AWG or larger telephone wire.
2 Do not use this product near water, for example, in a wet basement or near a swimming
pool.
3 Avoid using this product during an electrical storm. There may be a remote risk of
electric shock from lightening.
This product has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France.
6 ZyXEL Limited Warranty
P-335 Series User’s Guide

Customer Support

Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
NORTH AMERICA
NORWAY
SPAIN
SWEDEN
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420 241 091 350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420 241 091 359
support@zyxel.dk +45 39 55 07 00 www.zyxel.dk Z y X E L C o m m u n i c a t i o n s A / S
sales@zyxel.dk +45 39 55 07 07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi Z y X EL C o m m un i c a t i on s O y
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33 (0)4 72 52 97 97 www.zyxel.fr Z y XE L Fr a nc e
+33 (0)4 72 52 19 20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.com +1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47 22 80 61 80 www.zyxel.no Z y X E L C o m m u n i c a t i o n s A / S
sales@zyxel.no +47 22 80 61 81
support@zyxel.es +34 902 195 420 www.zyxel.es Z y X E L C o m m u ni c a t i o n s
sales@zyxel.es +34 913 005 345
support@zyxel.se +46 31 744 7700 www.zyxel.se Z y X E L C o m m u n ic at i on s A/ S
sales@zyxel.se +46 31 744 7701
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Sc ien ce P ar k Hsinchu 300 Ta iw a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Col um bu sv ej 5 2860 Soeborg Denmark
Mal mi nk aa ri 10 00700 Helsinki Finland
1 ru e d e s V er ge r s Ba t. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
1130 N. Miller St. Anaheim
CA 92806-2001 U.S.A.
Ni ls H ans en s ve i 13 0667 Oslo Norway
Alejandro Villegas 33 1º, 28043 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
P-335 Series User’s Guide
METHOD
LOCATION
UNITED KINGDOM
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
technical@zyxel.co.uk +44 (0) 8702 909090 www.zyxel.co.uk ZyXEL Communications UK
sales@zyxel.co.uk +44 (0) 8702 909091 ftp.zyxel.co.uk
A
WEB SITE
a. “+” is the (prefix) number you enter to make an international telephone call.
REGULAR MAIL
Ltd.,11, The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
8 Customer Support
P-335 Series User’s Guide

Table of Contents

Copyright .................................................................................................................. 3
Federal Communications Commission (FCC) Interference Statement ............... 4
ZyXEL Limited Warranty.......................................................................................... 6
Customer Support.................................................................................................... 7
Preface .................................................................................................................... 39
Chapter 1
Getting to Know Your Prestige ............................................................................. 43
1.1 Prestige Internet Security Gateway Overview ....................................................43
1.2 Prestige Features ...............................................................................................43
1.2.1 Physical Features .....................................................................................43
1.2.1.1 USB Port .........................................................................................43
1.2.1.2 OTIST Button (P-335WT only) ........................................................43
1.2.1.3 10/100M Auto-negotiating Ethernet/Fast Ethernet Interface(s) .......43
1.2.1.4 Auto-crossover 10/100 Mbps Ethernet Interface(s) .........................44
1.2.1.5 4-Port Switch ...................................................................................44
1.2.1.6 Time and Date .................................................................................44
1.2.1.7 Reset Button ...................................................................................44
1.2.2 Non-Physical Features .............................................................................44
1.2.2.1 Print Server .....................................................................................44
1.2.2.2 OTIST (P-335WT only) ...................................................................44
1.2.2.3 Media Bandwidth Management .......................................................44
1.2.2.4 Trend Micro Security Services ........................................................44
1.2.2.5 IPSec VPN Capability ......................................................................45
1.2.2.6 Firewall ............................................................................................45
1.2.2.7 IEEE 802.1x Network Security (P-335WT only) ..............................45
1.2.2.8 Content Filtering ..............................................................................45
1.2.2.9 Brute-Force Password Guessing Protection ...................................45
1.2.2.10 802.11b Wireless LAN Standard (P-335WT only) .........................45
1.2.2.11 802.11g Wireless LAN Standard (P-335WT only) .........................46
1.2.2.12 Packet Filtering .............................................................................46
1.2.2.13 Universal Plug and Play (UPnP) ...................................................46
1.2.2.14 Call Scheduling .............................................................................46
P-335 Series User’s Guide
1.3 Applications for the Prestige ..............................................................................49
1.3.1 Print Server Application ............................................................................49
1.3.2 Secure Broadband Internet Access via Cable or DSL Modem .................49
1.3.3 VPN Application ........................................................................................50
1.3.4 Wireless LAN Application (P-335WT only) ...............................................50
1.2.2.15 PPPoE ...........................................................................................46
1.2.2.16 PPTP Encapsulation .....................................................................46
1.2.2.17 Dynamic DNS Support ..................................................................47
1.2.2.18 IP Multicast ....................................................................................47
1.2.2.19 IP Alias ..........................................................................................47
1.2.2.20 SNMP ............................................................................................47
1.2.2.21 Network Address Translation (NAT) ..............................................47
1.2.2.22 Traffic Redirect ..............................................................................47
1.2.2.23 Port Forwarding .............................................................................47
1.2.2.24 DHCP (Dynamic Host Configuration Protocol) ..............................48
1.2.2.25 Any IP ............................................................................................48
1.2.2.26 Full Network Management ............................................................48
1.2.2.27 RoadRunner Support ....................................................................48
1.2.2.28 Logging and Tracing ......................................................................48
1.2.2.29 Upgrade Prestige Firmware via LAN .............................................48
1.2.2.30 Embedded FTP and TFTP Servers ...............................................48
1.2.2.31 Wireless Association List (P-335WT only) ....................................48
1.2.2.32 Wireless LAN Channel Usage (P-335WT only) ............................49
Chapter 2
Introducing the Web Configurator........................................................................ 53
2.1 Web Configurator Overview ...............................................................................53
2.2 Accessing the Prestige Web Configurator .........................................................53
2.3 Resetting the Prestige ........................................................................................54
2.3.1 Procedure To Use The Reset Button ........................................................54
2.3.2 Navigating the Prestige Web Configurator ...............................................54
2.3.3 Navigation Panel .......................................................................................55
Chapter 3
Wizard Setup .......................................................................................................... 59
3.1 Wizard Setup Overview ......................................................................................59
3.2 Wizard Setup: General Setup and System Name ..............................................59
3.2.1 Domain Name ...........................................................................................59
3.3 Wizard Setup: Wireless LAN (P-335WT only) ....................................................60
3.3.1 Wizard Setup : Wireless LAN : Basic Security ..........................................61
3.3.2 Wizard Setup : Wireless LAN : Extended Security ...................................63
3.4 Wizard Setup : Wireless LAN : OTIST (P-335WT only) .....................................63
3.5 Wizard Setup : Internet Access ..........................................................................65
10 Table of Contents
P-335 Series User’s Guide
3.5.1 Ethernet ....................................................................................................65
3.5.2 PPPoE Encapsulation ...............................................................................66
3.5.3 PPTP Encapsulation .................................................................................67
3.6 Wizard Setup : WAN ..........................................................................................69
3.6.1 WAN IP Address Assignment ...................................................................69
3.6.2 IP Address and Subnet Mask ...................................................................69
3.6.3 DNS Server Address Assignment .............................................................70
3.6.4 WAN MAC Address ..................................................................................70
3.7 Wizard Setup : Complete ...................................................................................73
Chapter 4
Media Bandwidth Management Setup.................................................................. 75
4.1 Media Bandwidth Management Setup Overview ...............................................75
4.2 Media Bandwidth Management Setup ...............................................................75
4.3 Media Bandwidth Management Setup : Services ..............................................76
4.4 Media Bandwidth Management Setup : Service Priority ....................................77
4.5 Media Bandwidth Management Setup Complete ...............................................78
Chapter 5
System Screens ..................................................................................................... 79
5.1 System Overview ...............................................................................................79
5.2 Configuring General Setup .................................................................................79
5.3 Dynamic DNS .....................................................................................................81
5.3.1 DynDNS Wildcard .....................................................................................81
5.4 Configuring Dynamic DNS .................................................................................81
5.5 Configuring Password ........................................................................................83
5.6 Configuring Time Setting ....................................................................................83
Chapter 6
LAN Screens...........................................................................................................87
6.1 LAN Overview ....................................................................................................87
6.2 DHCP Setup .......................................................................................................87
6.2.1 IP Pool Setup ............................................................................................87
6.2.2 System DNS Servers ................................................................................87
6.3 LAN TCP/IP ........................................................................................................87
6.3.1 Factory LAN Defaults ................................................................................87
6.3.2 IP Address and Subnet Mask ...................................................................88
6.3.3 RIP Setup .................................................................................................88
6.3.4 Multicast ....................................................................................................88
6.4 Any IP .................................................................................................................89
6.4.1 How Any IP Works ....................................................................................90
6.5 Configuring IP ....................................................................................................90
6.6 Configuring Static DHCP ....................................................................................93
Table of Contents 11
P-335 Series User’s Guide
6.7 Configuring IP Alias ............................................................................................94
Chapter 7
Wireless LAN (P-335WT)........................................................................................ 97
7.1 Introduction ........................................................................................................97
7.2 Wireless Security Overview ...............................................................................97
7.2.1 Encryption .................................................................................................97
7.2.2 Authentication ...........................................................................................97
7.2.3 Restricted Access .....................................................................................98
7.2.4 Hide Prestige Identity ................................................................................98
7.2.5 G-plus .......................................................................................................98
7.2.6 Using OTIST .............................................................................................98
7.3 Configuring Wireless LAN on the Prestige .........................................................98
7.4 Configuring the Wireless Screen ........................................................................99
7.4.1 No Security .............................................................................................101
7.4.2 WEP Encryption ......................................................................................103
7.4.3 Configuring WEP Encryption ..................................................................103
7.4.4 Introduction to WPA ................................................................................105
7.4.5 WPA-PSK Application Example ..............................................................106
7.4.6 Configuring WPA-PSK Authentication ....................................................106
7.4.7 Wireless Client WPA Supplicants ...........................................................108
7.4.8 WPA with RADIUS Application Example ................................................108
7.4.9 Configuring WPA Authentication .............................................................109
7.4.10 802.1x Overview ...................................................................................112
7.4.11 Configuring 802.1x and Dynamic WEP Key Exchange ........................112
7.4.12 Configuring 802.1x and Static WEP Key Exchange .............................115
7.4.13 Configuring 802.1x ................................................................................ 118
7.5 MAC Filter ........................................................................................................121
7.6 Roaming ...........................................................................................................123
7.7 OTIST ...............................................................................................................124
7.7.1 Activating OTIST .....................................................................................125
7.7.2 OTIST button ..........................................................................................125
Chapter 8
WAN Screens........................................................................................................ 127
8.1 WAN Overview .................................................................................................127
8.2 TCP/IP Priority (Metric) ....................................................................................127
8.3 Configuring Route ............................................................................................127
8.4 Configuring WAN ISP .......................................................................................128
8.4.1 Ethernet Encapsulation ...........................................................................128
8.4.2 PPPoE Encapsulation .............................................................................129
8.4.3 PPTP Encapsulation ...............................................................................132
8.5 Configuring WAN IP .........................................................................................134
12 Table of Contents
P-335 Series User’s Guide
8.6 Configuring WAN MAC .....................................................................................137
8.7 Traffic Redirect .................................................................................................138
8.8 Configuring Traffic Redirect ..............................................................................139
Chapter 9
Network Address Translation (NAT) Screens.................................................... 143
9.1 NAT Overview ..................................................................................................143
9.1.1 NAT Definitions .......................................................................................143
9.1.2 What NAT Does ......................................................................................144
9.1.3 How NAT Works .....................................................................................144
9.1.4 NAT Application ......................................................................................145
9.1.5 NAT Mapping Types ...............................................................................145
9.2 Using NAT ........................................................................................................147
9.2.1 SUA (Single User Account) Versus NAT ................................................147
9.3 SUA Server ......................................................................................................147
9.3.1 Default Server IP Address ......................................................................147
9.3.2 Port Forwarding: Services and Port Numbers ........................................148
9.3.3 Configuring Servers Behind SUA (Example) ..........................................149
9.4 Configuring SUA Server ..................................................................................149
9.5 Configuring Address Mapping ..........................................................................151
9.5.1 Configuring Address Mapping ................................................................152
9.6 Trigger Port Forwarding ...................................................................................154
9.6.1 Trigger Port Forwarding Example ...........................................................154
9.6.2 Two Points To Remember About Trigger Ports .......................................155
9.7 Configuring Trigger Port Forwarding ................................................................155
Chapter 10
Static Route Screens ...........................................................................................157
10.1 Static Route Overview ....................................................................................157
10.2 Configuring IP Static Route ............................................................................157
10.2.1 Configuring Route Entry .......................................................................158
Chapter 11
UPnP...................................................................................................................... 161
11.1 Universal Plug and Play Overview ................................................................161
11.1.1 How Do I Know If I'm Using UPnP? ......................................................161
11.1.2 NAT Traversal .......................................................................................161
11.1.3 Cautions with UPnP ..............................................................................161
11.2 UPnP and ZyXEL ...........................................................................................162
11.3 Configuring UPnP ...........................................................................................162
11.4 Installing UPnP in Windows Example .............................................................163
11.4.1 Installing UPnP in Windows Me ............................................................164
11.4.2 Installing UPnP in Windows XP ............................................................165
Table of Contents 13
P-335 Series User’s Guide
11.5 Using UPnP in Windows XP Example ............................................................166
11.5.1 Auto-discover Your UPnP-enabled Network Device .............................167
11.5.2 Web Configurator Easy Access ............................................................168
11.5.3 Web Configurator Easy Access ............................................................169
Chapter 12
Trend Micro Security Services ............................................................................ 171
12.1 Trend Micro Security Services Overview .......................................................171
12.1.1 TMSS Web Page ..................................................................................171
12.2 Configuring TMSS on the Prestige .................................................................174
12.2.1 TMSS Service Settings .........................................................................175
12.3 Configuring Virus Protection ..........................................................................176
12.4 Parental Controls Configuration .....................................................................178
12.4.1 Parental Controls Statistics ...................................................................181
Chapter 13
Firewall..................................................................................................................183
13.1 Introduction ....................................................................................................183
13.1.1 What is a Firewall? ...............................................................................183
13.1.2 Stateful Inspection Firewall. ..................................................................183
13.1.3 About the Prestige Firewall ...................................................................183
13.1.4 Guidelines For Enhancing Security With Your Firewall ........................184
13.2 Firewall Settings Screen ................................................................................184
13.3 The Firewall, NAT and Remote Management ................................................186
13.3.1 LAN-to-WAN rules ................................................................................186
13.3.2 WAN-to-LAN rules ................................................................................187
13.4 Services ........................................................................................................187
Chapter 14
Content Filtering ................................................................................................. 191
14.1 Introduction to Content Filtering .....................................................................191
14.2 Restrict Web Features ...................................................................................191
14.3 Days and Times .............................................................................................191
14.4 Configure Content Filtering ............................................................................191
14.5 Customizing Keyword Blocking URL Checking ..............................................194
14.5.1 Domain Name or IP Address URL Checking ........................................194
14.5.2 Full Path URL Checking .......................................................................194
14.5.3 File Name URL Checking .....................................................................194
Chapter 15
Remote Management Screens ............................................................................ 197
15.1 Remote Management Overview .....................................................................197
15.1.1 Remote Management Limitations .........................................................197
14 Table of Contents
P-335 Series User’s Guide
15.1.2 Remote Management and NAT ............................................................198
15.1.3 System Timeout ...................................................................................198
15.2 Configuring WWW ..........................................................................................198
15.3 Configuring Telnet ..........................................................................................199
15.4 Configuring TELNET ......................................................................................200
15.5 Configuring FTP .............................................................................................201
15.6 SNMP .............................................................................................................202
15.6.1 Supported MIBs ....................................................................................203
15.6.2 SNMP Traps .........................................................................................203
15.6.3 Configuring SNMP ................................................................................203
15.7 Configuring DNS ............................................................................................205
15.8 Configuring Security .......................................................................................206
Chapter 16
Introduction to IPSec ........................................................................................... 209
16.1 VPN Overview ................................................................................................209
16.1.1 IPSec ....................................................................................................209
16.1.2 Security Association .............................................................................209
16.1.3 Other Terminology ................................................................................209
16.1.3.1 Encryption ...................................................................................209
16.1.3.2 Data Confidentiality .....................................................................210
16.1.3.3 Data Integrity ...............................................................................210
16.1.3.4 Data Origin Authentication ..........................................................210
16.1.4 VPN Applications ..................................................................................210
16.2 IPSec Architecture .........................................................................................210
16.2.1 IPSec Algorithms ..................................................................................211
16.2.2 Key Management .................................................................................. 211
16.3 Encapsulation .................................................................................................211
16.3.1 Transport Mode ....................................................................................212
16.3.2 Tunnel Mode .........................................................................................212
16.4 IPSec and NAT ...............................................................................................212
Chapter 17
VPN Screens.......................................................................................................215
17.1 VPN/IPSec Overview .....................................................................................215
17.2 IPSec Algorithms ............................................................................................215
17.2.1 AH (Authentication Header) Protocol ....................................................215
17.2.2 ESP (Encapsulating Security Payload) Protocol ..................................215
17.3 My IP Address ................................................................................................216
17.4 Secure Gateway Address ..............................................................................216
17.4.1 Dynamic Secure Gateway Address ......................................................217
17.5 Summary Screen ...........................................................................................217
17.6 Keep Alive ......................................................................................................219
Table of Contents 15
P-335 Series User’s Guide
17.7 NAT Traversal ................................................................................................219
17.7.1 NAT Traversal Configuration .................................................................219
17.7.2 Remote DNS Server .............................................................................220
17.8 ID Type and Content ......................................................................................221
17.8.1 ID Type and Content Examples ............................................................222
17.9 Pre-Shared Key ..............................................................................................222
17.10 Editing VPN Rules ........................................................................................223
17.11 IKE Phases ..................................................................................................226
17.11.1 Negotiation Mode ................................................................................227
17.11.2 Diffie-Hellman (DH) Key Groups .........................................................228
17.11.3 Perfect Forward Secrecy (PFS) ..........................................................228
17.12 Configuring Advanced IKE Settings .............................................................228
17.13 Manual Key Setup ........................................................................................233
17.13.1 Security Parameter Index (SPI) ..........................................................234
17.14 Configuring Manual Key ...............................................................................234
17.15 Viewing SA Monitor ......................................................................................237
17.16 Configuring Global Setting ...........................................................................238
17.17 Telecommuter VPN/IPSec Examples ...........................................................239
17.17.1 Telecommuters Sharing One VPN Rule Example ..............................239
17.17.2 Telecommuters Using Unique VPN Rules Example ...........................240
17.18 VPN and Remote Management ...................................................................241
Chapter 18
Centralized Logs ..................................................................................................243
18.1 View Log ........................................................................................................243
18.2 Log Settings ...................................................................................................244
Chapter 19
Print Server...........................................................................................................249
19.1 Print Server Overview ....................................................................................249
19.2 Prestige Print Server ......................................................................................249
19.2.1 Installation Requirements .....................................................................249
19.3 Prestige Print Server Configuration ................................................................250
Chapter 20
Media Bandwidth Management........................................................................... 251
20.1 Media Bandwidth Management Overview ......................................................251
20.1.1 Application-based Bandwidth Management Example ..........................251
20.1.2 Subnet-based Bandwidth Management Example .................................252
20.1.3 Application and Subnet-based Bandwidth Management Example .......252
20.1.4 Bandwidth Usage Example ...................................................................253
20.1.5 Bandwidth Management Priorities ........................................................255
20.1.6 Bandwidth Management Services ........................................................255
16 Table of Contents
P-335 Series User’s Guide
20.1.6.1 Xbox Live ....................................................................................255
20.1.6.2 VoIP (SIP) ..................................................................................256
20.1.6.3 FTP .............................................................................................256
20.1.6.4 E-Mail ..........................................................................................256
20.1.6.5 eMule/eDonkey ...........................................................................256
20.1.6.6 WWW ..........................................................................................256
20.1.7 Services ................................................................................................257
20.2 Media Bandwidth Management Configuration Screen ...................................258
20.3 Editing Bandwidth Management Rules ..........................................................260
20.3.1 Bandwidth Borrowing ...........................................................................260
20.4 Configuring Bandwidth Management Rules and Services .............................261
20.5 Monitor Screen ...............................................................................................262
Chapter 21
Maintenance ......................................................................................................... 265
21.1 Maintenance Overview ...................................................................................265
21.2 Status Screen .................................................................................................265
21.2.1 System Statistics ...................................................................................267
21.3 DHCP Table Screen .......................................................................................267
21.4 Any IP Table ...................................................................................................268
21.5 Association List ..............................................................................................269
21.6 F/W Upload Screen ........................................................................................270
21.7 Configuration Screen .....................................................................................273
21.7.1 Backup Configuration ...........................................................................274
21.7.2 Restore Configuration ..........................................................................275
21.7.3 Back to Factory Defaults .......................................................................276
21.8 Restart Screen ...............................................................................................276
Chapter 22
Introducing the SMT ............................................................................................279
22.1 SMT Introduction ............................................................................................279
22.1.1 Procedure for SMT Configuration via Telnet .........................................279
22.1.2 Entering Password ................................................................................279
22.1.3 Prestige SMT Menu Overview ..............................................................280
22.2 Navigating the SMT Interface .........................................................................281
22.2.1 System Management Terminal Interface Summary ..............................282
22.3 Changing the System Password ....................................................................283
Chapter 23
Menu 1 General Setup ......................................................................................... 285
23.1 General Setup ................................................................................................285
23.2 Procedure To Configure Menu 1 ....................................................................285
23.2.1 Procedure to Configure Dynamic DNS .................................................287
Table of Contents 17
P-335 Series User’s Guide
Chapter 24
Menu 2 WAN Setup ..............................................................................................289
24.1 Introduction to WAN .......................................................................................289
24.2 WAN Setup .....................................................................................................289
Chapter 25
Menu 3 LAN Setup ...............................................................................................291
25.1 LAN Setup ......................................................................................................291
25.1.1 General Ethernet Setup ........................................................................291
25.2 Protocol Dependent Ethernet Setup ..............................................................292
25.3 TCP/IP Ethernet Setup and DHCP ................................................................292
25.3.1 IP Alias Setup .......................................................................................294
25.4 Wireless LAN Setup (P-335WT only) .............................................................295
25.4.1 Configuring MAC Address Filter ...........................................................297
25.4.2 Configuring Roaming on the Prestige ...................................................299
Chapter 26
Internet Access .................................................................................................... 301
26.1 Introduction to Internet Access Setup ............................................................301
26.2 Ethernet Encapsulation ..................................................................................301
26.3 Configuring the PPTP Client ..........................................................................303
26.4 Configuring the PPPoE Client ........................................................................303
26.5 Basic Setup Complete ....................................................................................304
Chapter 27
Remote Node Configuration ...............................................................................305
27.1 Introduction to Remote Node Setup ...............................................................305
27.2 Remote Node Profile Setup ...........................................................................305
27.2.1 Ethernet Encapsulation .........................................................................305
27.2.2 PPPoE Encapsulation ...........................................................................307
27.2.2.1 Outgoing Authentication Protocol ................................................307
27.2.2.2 Nailed-Up Connection .................................................................308
27.2.3 PPTP Encapsulation .............................................................................308
27.3 Edit IP .............................................................................................................309
27.4 Remote Node Filter ........................................................................................311
27.4.1 Traffic Redirect Setup ...........................................................................312
Chapter 28
Static Route Setup ...............................................................................................315
28.1 IP Static Route Setup .....................................................................................315
18 Table of Contents
P-335 Series User’s Guide
Chapter 29
Network Address Translation (NAT)................................................................... 317
29.1 Using NAT ......................................................................................................317
29.1.1 SUA (Single User Account) Versus NAT ..............................................317
29.2 Applying NAT .................................................................................................317
29.3 NAT Setup ......................................................................................................319
29.3.1 Address Mapping Sets ..........................................................................320
29.3.1.1 User-Defined Address Mapping Sets ..........................................321
29.3.1.2 Ordering Your Rules ....................................................................322
29.4 Configuring a Server behind NAT ..................................................................324
29.5 General NAT Examples ..................................................................................325
29.5.1 Example 1: Internet Access Only ..........................................................325
29.5.2 Example 2: Internet Access with an Inside Server ...............................326
29.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............327
29.5.4 Example 4: NAT Unfriendly Application Programs ...............................330
29.6 Configuring Trigger Port Forwarding .............................................................331
Chapter 30
Enabling the Firewall ........................................................................................... 333
30.1 Remote Management and the Firewall ..........................................................333
30.2 Access Methods .............................................................................................333
30.3 Enabling the Firewall ......................................................................................333
Chapter 31
Filter Configuration..............................................................................................335
31.1 Introduction to Filters ......................................................................................335
31.1.1 The Filter Structure of the Prestige .......................................................336
31.2 Configuring a Filter Set ..................................................................................337
31.2.1 Configuring a Filter Rule .......................................................................338
31.2.2 Configuring a TCP/IP Filter Rule ..........................................................339
31.2.3 Configuring a Generic Filter Rule .........................................................341
31.3 Example Filter ................................................................................................343
31.4 Filter Types and NAT ......................................................................................345
31.5 Firewall Versus Filters ....................................................................................346
31.6 Applying a Filter ............................................................................................346
31.6.1 Applying LAN Filters .............................................................................346
31.6.2 Applying Remote Node Filters ..............................................................347
Chapter 32
SNMP Configuration ............................................................................................349
32.1 About SNMP ..................................................................................................349
32.2 Supported MIBs ............................................................................................350
32.3 SNMP Configuration ......................................................................................350
Table of Contents 19
P-335 Series User’s Guide
32.4 SNMP Traps ...................................................................................................351
Chapter 33
System Security ...................................................................................................353
33.1 System Security .............................................................................................353
33.1.1 System Password .................................................................................353
33.1.2 Configuring External RADIUS Server ...................................................353
33.1.3 802.1x ...................................................................................................355
Chapter 34
System Information and Diagnosis .................................................................... 359
34.1 System Status ................................................................................................359
34.2 System Information ........................................................................................361
34.2.1 System Information ...............................................................................361
34.2.2 Console Port Speed ..............................................................................362
34.3 Log and Trace ................................................................................................362
34.3.1 Syslog Logging .....................................................................................362
34.3.2 Call-Triggering Packet ..........................................................................367
34.4 Diagnostic ......................................................................................................368
34.4.1 WAN DHCP ..........................................................................................369
34.3.1.1 CDR ............................................................................................364
34.3.1.2 Packet triggered ..........................................................................366
34.3.1.3 Filter log .....................................................................................366
34.3.1.4 PPP log ......................................................................................366
34.3.1.5 Firewall log ..................................................................................367
Chapter 35
Firmware and Configuration File Maintenance ................................................. 371
35.1 Filename Conventions ...................................................................................371
35.2 Backup Configuration .....................................................................................372
35.2.1 Backup Configuration ...........................................................................372
35.2.2 Using the FTP Command from the Command Line ..............................373
35.2.3 Example of FTP Commands from the Command Line .........................374
35.2.4 GUI-based FTP Clients .........................................................................374
35.2.5 TFTP and FTP over WAN Management Limitations .............................374
35.2.6 Backup Configuration Using TFTP .......................................................375
35.2.7 TFTP Command Example ....................................................................375
35.2.8 GUI-based TFTP Clients ......................................................................376
35.3 Restore Configuration ....................................................................................376
35.3.1 Restore Using FTP ...............................................................................376
35.3.2 Restore Using FTP Session Example ..................................................378
35.4 Uploading Firmware and Configuration Files .................................................378
35.4.1 Firmware File Upload ............................................................................378
20 Table of Contents
P-335 Series User’s Guide
35.4.2 Configuration File Upload .....................................................................379
35.4.3 FTP File Upload Command from the DOS Prompt Example ................379
35.4.4 FTP Session Example of Firmware File Upload ...................................380
35.4.5 TFTP File Upload ..................................................................................380
35.4.6 TFTP Upload Command Example ........................................................381
Chapter 36
System Maintenance............................................................................................ 383
36.1 Command Interpreter Mode ...........................................................................383
36.1.1 Command Syntax .................................................................................383
36.1.2 Command Usage ..................................................................................384
36.2 Call Control Support .......................................................................................384
36.2.1 Budget Management ............................................................................384
36.2.2 Call History ...........................................................................................385
36.3 Time and Date Setting ....................................................................................386
36.3.1 Resetting the Time ................................................................................388
Chapter 37
Remote Management ........................................................................................... 389
37.1 Remote Management .....................................................................................389
37.1.1 Remote Management Limitations .........................................................390
Chapter 38
Call Scheduling ....................................................................................................393
38.1 Introduction to Call Scheduling ......................................................................393
Chapter 39
VPN/IPSec Setup .................................................................................................. 397
39.1 VPN/IPSec Overview .....................................................................................397
39.2 IPSec Summary Screen .................................................................................398
39.3 IKE Setup .......................................................................................................404
39.4 Manual Setup .................................................................................................406
39.4.1 Active Protocol ......................................................................................407
39.4.2 Security Parameter Index (SPI) ............................................................407
Chapter 40
SA Monitor ............................................................................................................ 409
40.1 SA Monitor Overview .....................................................................................409
40.2 Using SA Monitor ...........................................................................................409
Chapter 41
Troubleshooting ...................................................................................................413
41.1 Problems Starting Up the Prestige .................................................................413
Table of Contents 21
P-335 Series User’s Guide
41.2 Problems with the LAN ...................................................................................413
41.3 Problems with the WAN .................................................................................414
41.4 Problems Accessing the Prestige ..................................................................415
41.5 Problems with Restricted Web Pages and Keyword Blocking .......................415
41.5.1 Pop-up Windows, JavaScripts and Java Permissions ..........................416
41.5.2 ActiveX Controls in Internet Explorer ....................................................424
41.5.1.1 Internet Explorer Pop-up Blockers ..............................................417
41.5.1.2 JavaScripts ..................................................................................420
41.5.1.3 Java Permissions ........................................................................422
22 Table of Contents
P-335 Series User’s Guide
Table of Contents 23
P-335 Series User’s Guide
24 Table of Contents
P-335 Series User’s Guide

List of Figures

Figure 1 Prestige Print Server Application .......................................................................... 49
Figure 2 Secure Internet Access via Cable, DSL or Wireless Modem ................................ 50
Figure 3 VPN Application .................................................................................................... 50
Figure 4 Internet Access Application Example .................................................................... 51
Figure 5 Change Password Screen .................................................................................... 54
Figure 6 The MAIN MENU Screen of the Web Configurator ............................................... 55
Figure 7 Wizard Setup : General ......................................................................................... 60
Figure 8 Wizard Setup : Wireless LAN ................................................................................ 60
Figure 9 Wizard Setup : Wireless LAN : Basic Security ...................................................... 62
Figure 10 Wizard Setup : Wireless LAN : Extended Security ............................................. 63
Figure 11 Wizard Setup : Wireless LAN : OTIST ................................................................ 64
Figure 12 Wizard Setup : Internet Access : Ethernet Encapsulation .................................. 65
Figure 13 Wizard Setup : Internet Access : PPPoE Encapsulation .................................... 67
Figure 14 Wizard Setup : Internet Access : PPTP Encapsulation ....................................... 68
Figure 15 Wizard Setup : WAN ........................................................................................... 71
Figure 16 Wizard Setup : WAN IP and DNS Server Address Assignment .......................... 72
Figure 17 Wizard Setup : WAN MAC Address .................................................................... 73
Figure 18 Wizard Setup : Complete .................................................................................... 74
Figure 19 Media Bandwidth Management Setup ............................................................... 76
Figure 20 Media Bandwidth Management Setup : Services ............................................... 77
Figure 21 Media Bandwidth Management Setup : Service Priority ..................................... 78
Figure 22 Media Bandwidth Management Setup : Complete .............................................. 78
Figure 23 System General Setup ....................................................................................... 80
Figure 24 DDNS .................................................................................................................. 82
Figure 25 Password ............................................................................................................ 83
Figure 26 Time Setting ........................................................................................................ 84
Figure 27 Any IP Example Application ................................................................................ 89
Figure 28 LAN IP ................................................................................................................. 91
Figure 29 Static DHCP ........................................................................................................ 94
Figure 30 IP Alias ................................................................................................................ 95
Figure 31 Prestige Wireless Security Levels ....................................................................... 99
Figure 32 Wireless ............................................................................................................. 100
Figure 33 Wireless: No Security .......................................................................................... 102
Figure 34 Wireless: Static WEP Encryption ........................................................................ 104
Figure 35 WPA - PSK Authentication .................................................................................. 106
Figure 36 Wireless: WPA-PSK ............................................................................................ 107
List of Figures 25
P-335 Series User’s Guide
Figure 37 WPA with RADIUS Application Example ............................................................ 109
Figure 38 Wireless: WPA .................................................................................................... 110
Figure 39 Wireless: 802.1x and Dynamic WEP .................................................................. 113
Figure 40 Wireless: 802.1x and Static WEP ....................................................................... 116
Figure 41 Wireless: 802.1x ................................................................................................. 119
Figure 42 MAC Address Filter ............................................................................................. 122
Figure 43 Roaming ..............................................................................................................123
Figure 44 OTIST ................................................................................................................. 124
Figure 45 OTIST Start ......................................................................................................... 125
Figure 46 OTIST Process ................................................................................................... 125
Figure 47 WAN: Route ........................................................................................................ 128
Figure 48 Ethernet Encapsulation ....................................................................................... 129
Figure 49 PPPoE Encapsulation ......................................................................................... 131
Figure 50 PPTP Encapsulation ........................................................................................... 133
Figure 51 WAN: IP .............................................................................................................135
Figure 52 MAC Setup .......................................................................................................... 137
Figure 53 Traffic Redirect WAN Setup ................................................................................ 138
Figure 54 Traffic Redirect LAN Setup ................................................................................. 139
Figure 55 WAN: Traffic Redirect .......................................................................................... 140
Figure 56 How NAT Works .................................................................................................. 145
Figure 57 NAT Application With IP Alias ............................................................................. 145
Figure 58 Multiple Servers Behind NAT Example ............................................................... 149
Figure 59 SUA/NAT Setup .................................................................................................. 150
Figure 60 Address Mapping ................................................................................................ 151
Figure 61 Address Mapping Rule ........................................................................................ 153
Figure 62 Trigger Port Forwarding Process: Example ........................................................ 154
Figure 63 Trigger Port .........................................................................................................156
Figure 64 Example of Static Routing Topology ................................................................... 157
Figure 65 Static Route .........................................................................................................158
Figure 66 Static Route: Edit ................................................................................................ 159
Figure 67 Configuring UPnP ............................................................................................... 163
Figure 68 TMSS First Time Access ..................................................................................... 171
Figure 69 Download ActiveX to View TMSS Web Page ..................................................... 172
Figure 70 TMSS Web Page(Dashboard) ............................................................................ 172
Figure 71 TMSS Service Summary ..................................................................................... 172
Figure 72 TMSS 3 Steps ..................................................................................................... 173
Figure 73 TMSS Registration Form .................................................................................... 173
Figure 74 Example TMSS Activated Service Summary Screen ......................................... 174
Figure 75 Example TMSS Activated Parental Controls Screen .......................................... 174
Figure 76 TMSS Main Screen ............................................................................................. 174
Figure 77 TMSS Service Settings ....................................................................................... 175
Figure 78 Virus Protection ................................................................................................... 176
Figure 79 No Parental Controls License ............................................................................. 178
26 List of Figures
P-335 Series User’s Guide
Figure 80 Parental Controls ................................................................................................ 179
Figure 81 Parental Controls Statistics ................................................................................. 181
Figure 82 Firewall: Settings ................................................................................................. 185
Figure 83 Firewall Rule Directions ...................................................................................... 186
Figure 84 Firewall: Service .................................................................................................. 188
Figure 85 Content Filter ...................................................................................................... 192
Figure 86 Remote Management: WWW ............................................................................. 199
Figure 87 Telnet Configuration on a TCP/IP Network ......................................................... 200
Figure 88 Remote Management: Telnet .............................................................................. 200
Figure 89 Remote Management: FTP ................................................................................. 201
Figure 90 SNMP Management Model ................................................................................. 202
Figure 91 Remote Management: SNMP ............................................................................. 204
Figure 92 Remote Management: DNS ................................................................................ 205
Figure 93 Security ............................................................................................................... 206
Figure 94 Encryption and Decryption .................................................................................. 210
Figure 95 IPSec Architecture .............................................................................................. 211
Figure 96 Transport and Tunnel Mode IPSec Encapsulation .............................................. 212
Figure 97 IPSec Summary Fields ....................................................................................... 217
Figure 98 VPN: Summary ................................................................................................... 218
Figure 99 NAT Router Between IPSec Routers .................................................................. 219
Figure 100 VPN Host using Intranet DNS Server Example ................................................ 220
Figure 101 Mismatching ID Type and Content Configuration Example .............................. 222
Figure 102 VPN: Rule Setup (Basic) ................................................................................... 223
Figure 103 Two Phases to Set Up the IPSec SA ................................................................ 227
Figure 104 VPN IKE: Advanced .......................................................................................... 229
Figure 105 Setup: Manual ................................................................................................... 235
Figure 106 SA Monitor ........................................................................................................ 238
Figure 107 VPN: Global Setting .......................................................................................... 239
Figure 108 Telecommuters Sharing One VPN Rule Example ............................................. 240
Figure 109 Telecommuters Using Unique VPN Rules Example ......................................... 241
Figure 110 View Logs .......................................................................................................... 244
Figure 111 Log Settings ...................................................................................................... 246
Figure 112 Configuring Print Server Screen ....................................................................... 250
Figure 113 Application-based Bandwidth Management Example ....................................... 252
Figure 114 Subnet-based Bandwidth Management Example ............................................. 252
Figure 115 Application and Subnet-based Bandwidth Management Example .................... 253
Figure 116 Bandwidth Usage Example ............................................................................... 254
Figure 117 Maximize Bandwidth Usage Example ............................................................... 255
Figure 118 Bandwidth Management Configuration ............................................................. 259
Figure 119 Bandwidth Management Edit ............................................................................ 261
Figure 120 Bandwidth Management Monitor ...................................................................... 263
Figure 121 Maintenance Status .......................................................................................... 266
Figure 122 Maintenance System Statistics ......................................................................... 267
List of Figures 27
P-335 Series User’s Guide
Figure 123 Maintenance DHCP Table ................................................................................. 268
Figure 124 Maintenance Any IP .......................................................................................... 269
Figure 125 Maintenance Association List .......................................................................... 270
Figure 126 Maintenance Firmware Upload ......................................................................... 271
Figure 127 Upload Warning ................................................................................................ 272
Figure 128 Network Temporarily Disconnected .................................................................. 272
Figure 129 Upload Error Message ...................................................................................... 273
Figure 130 Maintenance Configuration ............................................................................... 274
Figure 131 Configuration Restore Successful ..................................................................... 275
Figure 132 Temporarily Disconnected ................................................................................. 276
Figure 133 Configuration Restore Error .............................................................................. 276
Figure 134 System Restart ................................................................................................. 277
Figure 135 Login Screen ..................................................................................................... 280
Figure 136 SMT Menu Overview ........................................................................................ 280
Figure 137 SMT Main Menu ................................................................................................ 282
Figure 138 Menu 23: System Security ................................................................................ 283
Figure 139 Menu 23 System Password .............................................................................. 283
Figure 140 Menu 1 General Setup. ..................................................................................... 286
Figure 141 Menu 1.1 Configure Dynamic DNS .................................................................. 287
Figure 142 Menu 2 WAN Setup .......................................................................................... 289
Figure 143 Menu 3 LAN Setup ............................................................................................ 291
Figure 144 Menu 3.1 LAN Port Filter Setup. ....................................................................... 291
Figure 145 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 292
Figure 146 Physical Network & Partitioned Logical Networks ............................................ 294
Figure 147 Menu 3.2.1: IP Alias Setup ............................................................................... 294
Figure 148 Menu 3.5 Wireless LAN Setup .......................................................................... 296
Figure 149 Menu 3.5 Wireless LAN Setup ......................................................................... 298
Figure 150 Menu 3.5.1 WLAN MAC Address Filter ............................................................ 299
Figure 151 Menu 3.5 Wireless LAN Setup .......................................................................... 300
Figure 152 Menu 3.5.2 Roaming Configuration .................................................................. 300
Figure 153 Menu 4 Internet Access Setup .......................................................................... 301
Figure 154 Internet Access Setup (PPTP) ......................................................................... 303
Figure 155 Internet Access Setup (PPPoE) ........................................................................ 304
Figure 156 Menu 11.1 Remote Node Profile for Ethernet Encapsulation ............................ 306
Figure 157 Menu 11.1 Remote Node Profile for PPPoE Encapsulation .............................. 307
Figure 158 Menu 11.1 Remote Node Profile for PPTP Encapsulation ................................ 309
Figure 159 Menu 11.3 Remote Node Network Layer Options for Ethernet Encapsulation . 310
Figure 160 Menu 11.5: Remote Node Filter (Ethernet Encapsulation) ................................ 312
Figure 161 Menu 11.5: Remote Node Filter (PPPoE or PPTP Encapsulation) ................... 312
Figure 162 Menu 11.6: Traffic Redirect Setup .................................................................... 313
Figure 163 Menu 12 IP Static Route Setup ........................................................................ 315
Figure 164 Menu12.1 Edit IP Static Route .......................................................................... 315
Figure 165 Menu 4 Applying NAT for Internet Access ........................................................ 318
28 List of Figures
P-335 Series User’s Guide
Figure 166 Menu 11.3 Applying NAT to the Remote Node ................................................. 319
Figure 167 Menu 15 NAT Setup .......................................................................................... 320
Figure 168 Menu 15.1 Address Mapping Sets .................................................................... 320
Figure 169 Menu 15.1.255 SUA Address Mapping Rules ................................................. 320
Figure 170 Menu 15.1.1 First Set ........................................................................................ 322
Figure 171 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ......................... 323
Figure 172 Menu 15.2.1 NAT Server Setup ........................................................................ 324
Figure 173 Multiple Servers Behind NAT Example ............................................................. 325
Figure 174 NAT Example 1 ................................................................................................. 325
Figure 175 Menu 4 Internet Access & NAT Example ......................................................... 326
Figure 176 NAT Example 2 ................................................................................................. 326
Figure 177 Menu 15.2.1 Specifying an Inside Server ......................................................... 327
Figure 178 NAT Example 3 ................................................................................................. 328
Figure 179 NAT Example 3: Menu 11.3 .............................................................................. 328
Figure 180 Example 3: Menu 15.1.1.1 ............................................................................... 329
Figure 181 Example 3: Final Menu 15.1.1 .......................................................................... 329
Figure 182 Example 3: Menu 15.2 ...................................................................................... 330
Figure 183 NAT Example 4 ................................................................................................. 330
Figure 184 Example 4: Menu 15.1.1.1 Address Mapping Rule. .......................................... 331
Figure 185 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ 331
Figure 186 Menu 15.3 Trigger Port Setup ........................................................................... 332
Figure 187 Menu 21.2 Firewall Setup ................................................................................. 334
Figure 188 Outgoing Packet Filtering Process .................................................................... 335
Figure 189 Filter Rule Process ............................................................................................ 336
Figure 190 Menu 21: Filter and Firewall Setup ................................................................... 337
Figure 191 Menu 21.1: Filter Set Configuration .................................................................. 337
Figure 192 Menu 21.1.1.1 TCP/IP Filter Rule. .................................................................... 339
Figure 193 Executing an IP Filter ........................................................................................ 341
Figure 194 Menu 21.1.4.1 Generic Filter Rule .................................................................... 342
Figure 195 Telnet Filter Example ........................................................................................ 343
Figure 196 Example Filter: Menu 21.1.3.1 .......................................................................... 344
Figure 197 Example Filter Rules Summary: Menu 21.1.3 .................................................. 345
Figure 198 Protocol and Device Filter Sets ......................................................................... 346
Figure 199 Filtering LAN Traffic .......................................................................................... 347
Figure 200 Filtering Remote Node Traffic ........................................................................... 347
Figure 201 SNMP Management Model ............................................................................... 349
Figure 202 Menu 22 SNMP Configuration .......................................................................... 351
Figure 203 Menu 23 System Security ................................................................................. 353
Figure 204 Menu 23 System Security ................................................................................. 353
Figure 205 Menu 23.2 System Security : RADIUS Server .................................................. 354
Figure 206 Menu 23 System Security ................................................................................. 355
Figure 207 Menu 23.4 System Security : IEEE802.1x ........................................................ 356
Figure 208 Menu 24 System Maintenance ......................................................................... 359
List of Figures 29
P-335 Series User’s Guide
Figure 209 Menu 24.1 System Maintenance : Status ......................................................... 360
Figure 210 Menu 24.2 System Information and Console Port Speed ............................... 361
Figure 211 Menu 24.2.1 System Maintenance : Information .............................................. 361
Figure 212 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... 362
Figure 213 Menu 24.3.2 System Maintenance : Syslog Logging ........................................ 362
Figure 214 Syslog Example ................................................................................................ 364
Figure 215 Call-Triggering Packet Example ........................................................................ 368
Figure 216 Menu 24.4 System Maintenance : Diagnostic ................................................... 369
Figure 217 LAN & WAN DHCP ........................................................................................... 369
Figure 218 Telnet in Menu 24.5 ........................................................................................... 373
Figure 219 FTP Session Example ...................................................................................... 374
Figure 220 Telnet into Menu 24.6. ....................................................................................... 377
Figure 221 Restore Using FTP Session Example ............................................................... 378
Figure 222 Telnet Into Menu 24.7.1 Upload System Firmware ........................................... 379
Figure 223 Telnet Into Menu 24.7.2 System Maintenance . ................................................ 379
Figure 224 FTP Session Example of Firmware File Upload ............................................... 380
Figure 225 Command Mode in Menu 24 ............................................................................. 383
Figure 226 Valid Commands ............................................................................................... 384
Figure 227 Menu 24.9 System Maintenance : Call Control ................................................. 384
Figure 228 Budget Management ......................................................................................... 385
Figure 229 Menu 24.9.2 - Call History ................................................................................ 385
Figure 230 Menu 24: System Maintenance ....................................................................... 386
Figure 231 Menu 24.10 System Maintenance: Time and Date Setting ............................... 387
Figure 232 Menu 24.11 – Remote Management Control .................................................... 390
Figure 233 Menu 26 Schedule Setup .................................................................................. 393
Figure 234 Menu 26.1 Schedule Set Setup ....................................................................... 394
Figure 235 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... 395
Figure 236 VPN SMT Menu Tree ........................................................................................ 397
Figure 237 Menu 27 VPN/IPSec Setup ............................................................................... 398
Figure 238 Menu 27 ............................................................................................................ 398
Figure 239 Menu 27.1.1 IPSec Setup ................................................................................. 401
Figure 240 Menu 27.1.1.1 IKE Setup .................................................................................. 405
Figure 241 Menu 27.1.1.2 Manual Setup ............................................................................ 407
Figure 242 Menu 27.2 SA Monitor ...................................................................................... 410
Figure 243 Pop-up Blocker ................................................................................................. 417
Figure 244 Internet Options ............................................................................................... 418
Figure 245 Internet Options ................................................................................................ 419
Figure 246 Pop-up Blocker Settings ................................................................................... 420
Figure 247 Internet Options ................................................................................................ 421
Figure 248 Security Settings - Java Scripting ..................................................................... 422
Figure 249 Security Settings - Java .................................................................................... 423
Figure 250 Java (Sun) ......................................................................................................... 424
Figure 251 Internet Options Security .................................................................................. 425
30 List of Figures
Loading...
+ 479 hidden pages