ZyXEL Communications P-660H-T User Manual

0 (0)
P-660H-T Series
ADSL2+ 4-port Security Gateway
P-660HW-T Series
802.11g Wireless ADSL2+ 4-port Security Gateway

User’s Guide

Version 3.40
2/2006
P-660H/HW-T Series User’ Guide

Copyright

Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
P-660H/HW-T Series User’ Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
FCC Caution
Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
IMPORTANT NOTE: FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.

3 Federal Communications Commission (FCC) Interference Statement

P-660H/HW-T Series User’ Guide
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
ZyXEL Communications Corporation declared that Prestige 660HW-T1 is limited in CH1~11 from 2400 to 2483.5 MHz by specified firmware controlled in USA.
Certifications
Go to www.zyxel.com
1 Select your product from the drop-down list box on the ZyXEL
home page to go to that product's page.
2 Select the certification you wish to view from this page.
Federal Communications Commission (FCC) Interference Statement 4
P-660H/HW-T Series User’ Guide
For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.

Safety Warnings

5 Safety Warnings
P-660H/HW-T Series User’ Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
P-660H/HW-T Series User’ Guide
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.

Customer Support

METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
NORWAY
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Science Park Hsinchu 300 Ta iw a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Columbusvej 2860 Soeborg Denmark
Malminkaari 10 00700 Helsinki Finland
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
48, Zoldlomb Str. H-1025, Budapest Hungary
43, Dostyk ave.,Office 414 Dostyk Business Centre 050010, Almaty Republic of Kazakhstan
1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
Nils Hansens vei 13 0667 Oslo Norway
7 Customer Support
P-660H/HW-T Series User’ Guide
METHOD
LOCATION
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
a. “+” is the (prefix) number you enter to make an international telephone call.
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
info@pl.zyxel.com +48-22-5286603 www.pl.zyxel.com ZyXEL Communications
+48-22-5206701
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
A
WEB SITE
REGULAR MAIL
ul.Emilli Plater 53 00-113 Warszawa Poland
Ostrovityanova 37a Str. Moscow, 117279 Russia
Alejandro Villegas 33 1º, 28043 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
13, Pimonenko Str. Kiev, 04050 Ukraine
www.zyxel.co.uk ZyXEL Communications UK
Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
P-660H/HW-T Series User’ Guide
9 Customer Support
P-660H/HW-T Series User’ Guide

Table of Contents

Copyright ..................................................................................................................2
Federal Communications Commission (FCC) Interference Statement ............... 3
Safety Warnings ....................................................................................................... 5
ZyXEL Limited Warranty.......................................................................................... 6
Customer Support.................................................................................................... 7
Table of Contents ................................................................................................... 10
List of Figures ........................................................................................................ 24
List of Tables .......................................................................................................... 32
Preface ....................................................................................................................38
Introduction to DSL................................................................................................ 40
Chapter 1
Getting To Know Your Prestige............................................................................. 42
1.1 Introducing the Prestige .....................................................................................42
1.2 Features .............................................................................................................42
1.2.1 Wireless Features (P-660HW) ..................................................................45
1.3 Applications for the Prestige ..............................................................................46
1.3.1 Protected Internet Access .........................................................................46
1.3.2 LAN to LAN Application ............................................................................46
1.4 Front Panel LEDs ...............................................................................................46
1.5 Hardware Connection ........................................................................................47
Chapter 2
Introducing the Web Configurator........................................................................ 48
2.1 Web Configurator Overview ...............................................................................48
2.1.1 Accessing the Web Configurator ..............................................................48
2.1.2 Resetting the Prestige ..............................................................................49
2.1.2.1 Using the Reset Button ...................................................................49
2.1.3 Navigating the Web Configurator ..............................................................50
2.2 Change Login Password ...................................................................................52
Table of Contents 10
P-660H/HW-T Series User’ Guide
Chapter 3
Wizard Setup for Internet Access......................................................................... 54
3.1 Introduction ........................................................................................................54
3.1.1 Internet Access Wizard Setup ..................................................................54
Chapter 4
LAN Setup............................................................................................................... 62
4.1 LAN Overview ...................................................................................................62
4.1.1 LANs, WANs and the Prestige ..................................................................62
4.1.2 DHCP Setup .............................................................................................63
4.1.2.1 IP Pool Setup ..................................................................................63
4.1.3 DNS Server Address ................................................................................63
4.1.4 DNS Server Address Assignment .............................................................63
4.2 LAN TCP/IP ........................................................................................................64
4.2.1 IP Address and Subnet Mask ...................................................................64
4.2.1.1 Private IP Addresses .......................................................................65
4.2.2 RIP Setup .................................................................................................65
4.2.3 Multicast ....................................................................................................66
4.2.4 Any IP .......................................................................................................66
4.2.4.1 How Any IP Works ..........................................................................67
4.3 Configuring LAN ................................................................................................68
Chapter 5
Wireless LAN .......................................................................................................... 70
5.1 Wireless LAN Introduction .................................................................................70
5.2 Wireless Security Overview ...............................................................................70
5.2.1 Encryption .................................................................................................70
5.2.2 Authentication ...........................................................................................70
5.2.3 Restricted Access .....................................................................................71
5.2.4 Hide Prestige Identity ................................................................................71
5.3 The Main Wireless LAN Screen ........................................................................71
5.4 Configuring the Wireless Screen .......................................................................73
5.4.1 WEP Encryption ........................................................................................73
5.5 Configuring MAC Filters ..................................................................................75
5.6 Introduction to WPA .........................................................................................77
5.6.1 WPA-PSK Application Example ................................................................77
5.6.2 WPA with RADIUS Application Example ..................................................78
5.6.3 Wireless Client WPA Supplicants ............................................................79
5.7 Configuring IEEE 802.1x and WPA ...................................................................79
5.7.1 No Access Allowed or Authentication .......................................................80
5.7.2 Authentication Required: 802.1x ...............................................................80
5.7.3 Authentication Required: WPA .................................................................82
5.7.4 Authentication Required: WPA-PSK .........................................................84
11 Table of Contents
P-660H/HW-T Series User’ Guide
5.8 Configuring Local User Authentication ..............................................................85
5.9 Configuring RADIUS .........................................................................................87
Chapter 6
WAN Setup.............................................................................................................. 90
6.1 WAN Overview ..................................................................................................90
6.1.1 Encapsulation ...........................................................................................90
6.1.1.1 ENET ENCAP .................................................................................90
6.1.1.2 PPP over Ethernet ..........................................................................90
6.1.1.3 PPPoA .............................................................................................90
6.1.1.4 RFC 1483 ........................................................................................91
6.1.2 Multiplexing ...............................................................................................91
6.1.2.1 VC-based Multiplexing ....................................................................91
6.1.2.2 LLC-based Multiplexing ...................................................................91
6.1.3 VPI and VCI ..............................................................................................91
6.1.4 IP Address Assignment ............................................................................91
6.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................91
6.1.4.2 IP Assignment with RFC 1483 Encapsulation .................................92
6.1.4.3 IP Assignment with ENET ENCAP Encapsulation ..........................92
6.1.5 Nailed-Up Connection (PPP) ....................................................................92
6.1.6 NAT ...........................................................................................................92
6.2 Metric ................................................................................................................92
6.3 PPPoE Encapsulation ........................................................................................93
6.4 Traffic Shaping ...................................................................................................93
6.5 Zero Configuration Internet Access ....................................................................94
6.6 The Main WAN Screen ......................................................................................95
6.7 Configuring WAN Setup ....................................................................................95
6.8 Traffic Redirect ..................................................................................................98
6.9 Configuring WAN Backup ..................................................................................99
Chapter 7
Network Address Translation (NAT) Screens.................................................... 102
7.1 NAT Overview .................................................................................................102
7.1.1 NAT Definitions .......................................................................................102
7.1.2 What NAT Does ......................................................................................103
7.1.3 How NAT Works .....................................................................................103
7.1.4 NAT Application ......................................................................................104
7.1.5 NAT Mapping Types ...............................................................................105
7.2 SUA (Single User Account) Versus NAT ..........................................................106
7.3 SUA Server ......................................................................................................106
7.3.1 Default Server IP Address ......................................................................106
7.3.2 Port Forwarding: Services and Port Numbers ........................................106
7.3.3 Configuring Servers Behind SUA (Example) ..........................................107
Table of Contents 12
P-660H/HW-T Series User’ Guide
7.4 Selecting the NAT Mode .................................................................................107
7.5 Configuring SUA Server Set ...........................................................................108
7.6 Configuring Address Mapping Rules ...............................................................110
7.7 Editing an Address Mapping Rule ................................................................... 111
Chapter 8
Dynamic DNS Setup............................................................................................. 114
8.1 Dynamic DNS Overview .................................................................................114
8.1.1 DYNDNS Wildcard ..................................................................................114
8.2 Configuring Dynamic DNS ..............................................................................114
Chapter 9
Time and Date....................................................................................................... 116
9.1 Configuring Time and Date .............................................................................116
Chapter 10
Firewalls................................................................................................................ 118
10.1 Firewall Overview .......................................................................................... 118
10.2 Types of Firewalls ..........................................................................................118
10.2.1 Packet Filtering Firewalls ......................................................................118
10.2.2 Application-level Firewalls ....................................................................119
10.2.3 Stateful Inspection Firewalls ................................................................ 119
10.3 Introduction to ZyXEL’s Firewall .....................................................................119
10.3.1 Denial of Service Attacks ......................................................................120
10.4 Denial of Service ............................................................................................120
10.4.1 Basics ...................................................................................................120
10.4.2 Types of DoS Attacks ...........................................................................121
10.4.2.1 ICMP Vulnerability ......................................................................123
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................123
10.4.2.3 Traceroute ...................................................................................124
10.5 Stateful Inspection ..........................................................................................124
10.5.1 Stateful Inspection Process ..................................................................125
10.5.2 Stateful Inspection and the Prestige .....................................................126
10.5.3 TCP Security .........................................................................................126
10.5.4 UDP/ICMP Security ..............................................................................127
10.5.5 Upper Layer Protocols ..........................................................................127
10.6 Guidelines for Enhancing Security with Your Firewall ....................................127
10.6.1 Security In General ...............................................................................128
10.7 Packet Filtering Vs Firewall ............................................................................129
10.7.1 Packet Filtering: ....................................................................................129
10.7.1.1 When To Use Filtering .................................................................129
10.7.2 Firewall .................................................................................................129
10.7.2.1 When To Use The Firewall ..........................................................129
13 Table of Contents
P-660H/HW-T Series User’ Guide
Chapter 11
Firewall Configuration ......................................................................................... 132
11.1 Access Methods .............................................................................................132
11.2 Firewall Policies Overview .............................................................................132
11.3 Rule Logic Overview .....................................................................................133
11.3.1 Rule Checklist .......................................................................................133
11.3.2 Security Ramifications ..........................................................................133
11.3.3 Key Fields For Configuring Rules .........................................................134
11.3.3.1 Action ...........................................................................................134
11.3.3.2 Service .........................................................................................134
11.3.3.3 Source Address ...........................................................................134
11.3.3.4 Destination Address ....................................................................134
11.4 Connection Direction ......................................................................................134
11.4.1 LAN to WAN Rules ................................................................................134
11.4.2 Alerts .....................................................................................................135
11.5 Configuring Default Firewall Policy ..............................................................135
11.6 Rule Summary ..............................................................................................136
11.6.1 Configuring Firewall Rules ..................................................................138
11.7 Customized Services .....................................................................................141
11.8 Configuring A Customized Service ...............................................................141
11.9 Example Firewall Rule ....................................................................................142
11.10 Predefined Services .....................................................................................146
11.11 Anti-Probing .................................................................................................148
11.12 DoS Thresholds ...........................................................................................149
11.12.1 Threshold Values ................................................................................150
11.12.2 Half-Open Sessions ............................................................................150
11.12.2.1 TCP Maximum Incomplete and Blocking Time ..........................150
11.12.3 Configuring Firewall Thresholds .........................................................151
Chapter 12
Content Filtering .................................................................................................. 154
12.1 Content Filtering Overview ............................................................................154
12.2 The Main Content Filter Screen .....................................................................154
12.3 Configuring Keyword Blocking .....................................................................155
12.4 Configuring the Schedule .............................................................................156
12.5 Configuring Trusted Computers ...................................................................156
Chapter 13
Remote Management Configuration .................................................................. 158
13.1 Remote Management Overview ....................................................................158
13.1.1 Remote Management Limitations .........................................................158
13.1.2 Remote Management and NAT ............................................................159
13.1.3 System Timeout ...................................................................................159
Table of Contents 14
P-660H/HW-T Series User’ Guide
13.2 Telnet ..............................................................................................................159
13.3 FTP ................................................................................................................160
13.4 Web ................................................................................................................160
13.5 Configuring Remote Management ................................................................160
Chapter 14
Universal Plug-and-Play (UPnP) ......................................................................... 162
14.1 Introducing Universal Plug and Play .............................................................162
14.1.1 How do I know if I'm using UPnP? ........................................................162
14.1.2 NAT Traversal .......................................................................................162
14.1.3 Cautions with UPnP ..............................................................................163
14.2 UPnP and ZyXEL ...........................................................................................163
14.2.1 Configuring UPnP ................................................................................163
14.3 Installing UPnP in Windows Example ............................................................164
14.4 Using UPnP in Windows XP Example ...........................................................168
Chapter 15
Logs Screens........................................................................................................ 176
15.1 Logs Overview ..............................................................................................176
15.1.1 Alerts and Logs .....................................................................................176
15.2 Configuring Log Settings ...............................................................................176
15.3 Displaying the Logs .......................................................................................178
15.4 SMTP Error Messages ...................................................................................179
15.4.1 Example E-mail Log ..............................................................................180
Chapter 16
Media Bandwidth Management Advanced Setup.............................................. 182
16.1 Media Bandwidth Management Overview .....................................................182
16.2 Bandwidth Classes and Filters .......................................................................182
16.3 Proportional Bandwidth Allocation .................................................................183
16.4 Bandwidth Management Usage Examples ....................................................183
16.4.1 Application-based Bandwidth Management Example ..........................183
16.4.2 Subnet-based Bandwidth Management Example .................................183
16.4.3 Application and Subnet-based Bandwidth Management Example .......184
16.5 Scheduler .......................................................................................................185
16.5.1 Priority-based Scheduler ......................................................................185
16.5.2 Fairness-based Scheduler ....................................................................185
16.6 Maximize Bandwidth Usage ...........................................................................185
16.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................185
16.6.2 Maximize Bandwidth Usage Example ..................................................186
16.7 Bandwidth Borrowing .....................................................................................187
16.7.1 Maximize Bandwidth Usage With Bandwidth Borrowing ......................187
16.8 The Main Media Bandwidth Management Screen ........................................188
15 Table of Contents
P-660H/HW-T Series User’ Guide
16.9 Configuring Summary ...................................................................................188
16.10 Configuring Class Setup ............................................................................190
16.10.1 Media Bandwidth Management Class Configuration ........................190
16.10.2 Media Bandwidth Management Statistics .........................................193
16.11 Bandwidth Monitor .....................................................................................194
Chapter 17
Maintenance ......................................................................................................... 196
17.1 Maintenance Overview ...................................................................................196
17.2 System Status Screen ...................................................................................196
17.2.1 System Statistics ...................................................................................198
17.3 DHCP Table Screen ......................................................................................200
17.4 Any IP Table Screen ......................................................................................201
17.5 Wireless Screen ............................................................................................201
17.5.1 Association List ....................................................................................201
17.6 Diagnostic Screens .......................................................................................202
17.6.1 General Diagnostic ..............................................................................202
17.6.2 DSL Line Diagnostic ...........................................................................203
17.7 Firmware Upgrade ........................................................................................205
Chapter 18
Introducing the SMT ............................................................................................208
18.1 SMT Introduction ............................................................................................208
18.1.1 Procedure for SMT Configuration via Telnet .........................................208
18.1.2 Entering Password ................................................................................208
18.1.3 Prestige SMT Menus Overview ............................................................209
18.2 Navigating the SMT Interface .........................................................................210
18.2.1 System Management Terminal Interface Summary .............................. 211
18.3 Changing the System Password ....................................................................212
Chapter 19
Menu 1 General Setup ......................................................................................... 214
19.1 General Setup ................................................................................................214
19.2 Procedure To Configure Menu 1 ....................................................................214
19.2.1 Procedure to Configure Dynamic DNS .................................................215
Chapter 20
Menu 2 WAN Backup Setup ................................................................................ 218
20.1 Introduction to WAN Backup Setup ................................................................218
20.2 Configuring Dial Backup in Menu 2 ................................................................218
20.2.1 Traffic Redirect Setup ...........................................................................219
Table of Contents 16
P-660H/HW-T Series User’ Guide
Chapter 21
Menu 3 LAN Setup ...............................................................................................222
21.1 LAN Setup ......................................................................................................222
21.1.1 General Ethernet Setup ........................................................................222
21.2 Protocol Dependent Ethernet Setup ..............................................................223
21.3 TCP/IP Ethernet Setup and DHCP ................................................................223
Chapter 22
Wireless LAN Setup ............................................................................................. 226
22.1 Wireless LAN Overview .................................................................................226
22.2 Wireless LAN Setup .......................................................................................226
22.2.1 Wireless LAN MAC Address Filter ........................................................227
Chapter 23
Internet Access .................................................................................................... 230
23.1 Internet Access Overview ..............................................................................230
23.2 IP Policies ......................................................................................................230
23.3 IP Alias ...........................................................................................................230
23.4 IP Alias Setup .................................................................................................231
23.5 Route IP Setup ...............................................................................................232
23.6 Internet Access Configuration ........................................................................233
Chapter 24
Remote Node Configuration ............................................................................... 236
24.1 Remote Node Setup Overview .......................................................................236
24.2 Remote Node Setup .......................................................................................236
24.2.1 Remote Node Profile ............................................................................236
24.2.2 Encapsulation and Multiplexing Scenarios ...........................................237
24.2.2.1 Scenario 1: One VC, Multiple Protocols ......................................237
24.2.2.2 Scenario 2: One VC, One Protocol (IP) ......................................237
24.2.2.3 Scenario 3: Multiple VCs .............................................................237
24.2.3 Outgoing Authentication Protocol .........................................................239
24.3 Remote Node Network Layer Options ...........................................................240
24.3.1 My WAN Addr Sample IP Addresses ...................................................241
24.4 Remote Node Filter ........................................................................................242
24.5 Editing ATM Layer Options ............................................................................243
24.5.1 VC-based Multiplexing (non-PPP Encapsulation) ................................243
24.5.2 LLC-based Multiplexing or PPP Encapsulation ....................................243
24.5.3 Advance Setup Options ........................................................................244
Chapter 25
Static Route Setup ............................................................................................... 246
25.1 IP Static Route Overview ...............................................................................246
17 Table of Contents
P-660H/HW-T Series User’ Guide
25.2 Configuration ..................................................................................................246
Chapter 26
Bridging Setup ..................................................................................................... 250
26.1 Bridging in General ........................................................................................250
26.2 Bridge Ethernet Setup ....................................................................................250
26.2.1 Remote Node Bridging Setup ...............................................................250
26.2.2 Bridge Static Route Setup .....................................................................252
Chapter 27
Network Address Translation (NAT)................................................................... 254
27.1 Using NAT ......................................................................................................254
27.1.1 SUA (Single User Account) Versus NAT ..............................................254
27.2 Applying NAT .................................................................................................254
27.3 NAT Setup ......................................................................................................256
27.3.1 Address Mapping Sets ..........................................................................256
27.3.1.1 SUA Address Mapping Set .........................................................257
27.3.1.2 User-Defined Address Mapping Sets ..........................................258
27.3.1.3 Ordering Your Rules ....................................................................259
27.4 Configuring a Server behind NAT ..................................................................260
27.5 General NAT Examples ..................................................................................261
27.5.1 Example 1: Internet Access Only ..........................................................262
27.5.2 Example 2: Internet Access with an Inside Server ...............................262
27.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............263
27.5.4 Example 4: NAT Unfriendly Application Programs ...............................267
Chapter 28
Enabling the Firewall ...........................................................................................270
28.1 Remote Management and the Firewall ..........................................................270
28.2 Access Methods .............................................................................................270
28.3 Enabling the Firewall ......................................................................................270
Chapter 29
Filter Configuration.............................................................................................. 272
29.1 About Filtering ................................................................................................272
29.1.1 The Filter Structure of the Prestige .......................................................273
29.2 Configuring a Filter Set for the Prestige .........................................................274
29.3 Filter Rules Summary Menus .........................................................................275
29.4 Configuring a Filter Rule ................................................................................276
29.4.1 TCP/IP Filter Rule .................................................................................277
29.4.2 Generic Filter Rule ................................................................................279
29.5 Filter Types and NAT .....................................................................................281
29.6 Example Filter ................................................................................................281
Table of Contents 18
P-660H/HW-T Series User’ Guide
29.7 Applying Filters and Factory Defaults ............................................................283
29.7.1 Ethernet Traffic .....................................................................................284
29.7.2 Remote Node Filters .............................................................................284
Chapter 30
SNMP Configuration ............................................................................................ 286
30.1 About SNMP ..................................................................................................286
30.2 Supported MIBs ............................................................................................287
30.3 SNMP Configuration ......................................................................................287
30.4 SNMP Traps ...................................................................................................288
Chapter 31
System Security ................................................................................................... 290
31.1 System Security .............................................................................................290
31.1.1 System Password .................................................................................290
31.1.2 Configuring External RADIUS Server ...................................................290
31.1.3 IEEE 802.1x ..........................................................................................292
31.2 Creating User Accounts on the Prestige ........................................................294
Chapter 32
System Information and Diagnosis .................................................................... 296
32.1 Overview ........................................................................................................296
32.2 System Status ................................................................................................296
32.3 System Information ........................................................................................298
32.3.1 System Information ...............................................................................298
32.3.2 Console Port Speed ..............................................................................299
32.4 Log and Trace ................................................................................................300
32.4.1 Viewing Error Log .................................................................................300
32.4.2 Syslog and Accounting .........................................................................301
32.5 Diagnostic ......................................................................................................303
Chapter 33
Firmware and Configuration File Maintenance ................................................. 306
33.1 Filename Conventions ...................................................................................306
33.2 Backup Configuration .....................................................................................307
33.2.1 Backup Configuration ...........................................................................307
33.2.2 Using the FTP Command from the Command Line ..............................308
33.2.3 Example of FTP Commands from the Command Line .........................308
33.2.4 GUI-based FTP Clients .........................................................................309
33.2.5 TFTP and FTP over WAN Management Limitations .............................309
33.2.6 Backup Configuration Using TFTP .......................................................310
33.2.7 TFTP Command Example ....................................................................310
33.2.8 GUI-based TFTP Clients ......................................................................310
19 Table of Contents
P-660H/HW-T Series User’ Guide
33.3 Restore Configuration ....................................................................................311
33.3.1 Restore Using FTP ...............................................................................311
33.3.2 Restore Using FTP Session Example ..................................................312
33.4 Uploading Firmware and Configuration Files .................................................313
33.4.1 Firmware File Upload ............................................................................313
33.4.2 Configuration File Upload .....................................................................313
33.4.3 FTP File Upload Command from the DOS Prompt Example ................314
33.4.4 FTP Session Example of Firmware File Upload ...................................315
33.4.5 TFTP File Upload ..................................................................................315
33.4.6 TFTP Upload Command Example ........................................................316
Chapter 34
System Maintenance............................................................................................ 318
34.1 Command Interpreter Mode ...........................................................................318
34.2 Call Control Support .......................................................................................319
34.2.1 Budget Management ............................................................................319
34.3 Time and Date Setting ....................................................................................320
34.3.1 Resetting the Time ................................................................................322
Chapter 35
Remote Management ........................................................................................... 324
35.1 Remote Management Overview .....................................................................324
35.2 Remote Management .....................................................................................324
35.2.1 Remote Management Setup .................................................................324
35.2.2 Remote Management Limitations .........................................................325
35.3 Remote Management and NAT ......................................................................326
35.4 System Timeout .............................................................................................326
Chapter 36
IP Policy Routing.................................................................................................. 328
36.1 IP Policy Routing Overview ............................................................................328
36.2 Benefits of IP Policy Routing ..........................................................................328
36.3 Routing Policy ................................................................................................328
36.4 IP Routing Policy Setup .................................................................................329
36.5 Applying an IP Policy .....................................................................................332
36.5.1 Ethernet IP Policies ..............................................................................332
36.6 IP Policy Routing Example .............................................................................333
Chapter 37
Call Scheduling .................................................................................................... 338
37.1 Introduction ....................................................................................................338
Table of Contents 20
P-660H/HW-T Series User’ Guide
Chapter 38
Troubleshooting ................................................................................................... 342
38.1 Problems Starting Up the Prestige .................................................................342
38.2 Problems with the LAN ...................................................................................342
38.3 Problems with the WAN .................................................................................343
38.4 Problems Accessing the Prestige ..................................................................344
38.4.1 Pop-up Windows, JavaScripts and Java Permissions ..........................344
38.4.1.1 Internet Explorer Pop-up Blockers ..............................................344
38.4.1.2 JavaScripts ..................................................................................347
38.4.1.3 Java Permissions ........................................................................349
38.4.2 ActiveX Controls in Internet Explorer ....................................................351
Appendix A
Product Specifications ....................................................................................... 354
Appendix B
Wall-mounting Instructions................................................................................. 358
Appendix C
Setting up Your Computer’s IP Address............................................................ 360
Windows 95/98/Me................................................................................................. 360
Windows 2000/NT/XP ............................................................................................ 363
Macintosh OS 8/9................................................................................................... 368
Macintosh OS X ..................................................................................................... 370
Linux....................................................................................................................... 371
Figure 256 Verifying Settings ...........................................................................375
Appendix D
IP Subnetting ........................................................................................................ 376
IP Addressing......................................................................................................... 376
IP Classes .............................................................................................................. 376
Subnet Masks ........................................................................................................ 377
Subnetting .............................................................................................................. 377
Example: Two Subnets .......................................................................................... 378
Example: Four Subnets.......................................................................................... 380
Example Eight Subnets.......................................................................................... 381
Subnetting With Class A and Class B Networks. ................................................... 382
Appendix E
Boot Commands ..................................................................................................384
Appendix F
Command Interpreter........................................................................................... 386
21 Table of Contents
P-660H/HW-T Series User’ Guide
Command Syntax................................................................................................... 386
Command Usage ................................................................................................... 386
Appendix G
Firewall Commands ............................................................................................. 388
Appendix H
NetBIOS Filter Commands .................................................................................. 394
Introduction ............................................................................................................ 394
Display NetBIOS Filter Settings ............................................................................. 394
NetBIOS Filter Configuration.................................................................................. 395
Appendix I
Splitters and Microfilters ..................................................................................... 398
Connecting a POTS Splitter ................................................................................... 398
Telephone Microfilters ............................................................................................ 398
Prestige With ISDN ................................................................................................ 399
Appendix J
PPPoE ................................................................................................................... 402
PPPoE in Action..................................................................................................... 402
Benefits of PPPoE.................................................................................................. 402
Traditional Dial-up Scenario................................................................................... 402
How PPPoE Works ................................................................................................ 403
Prestige as a PPPoE Client ................................................................................... 403
Appendix K
Wireless LANs ...................................................................................................... 404
Wireless LAN Topologies ....................................................................................... 404
Channel.................................................................................................................. 406
RTS/CTS................................................................................................................ 406
Fragmentation Threshold ....................................................................................... 407
Preamble Type....................................................................................................... 408
IEEE 802.1x ........................................................................................................... 409
RADIUS.................................................................................................................. 409
Types of Authentication.......................................................................................... 410
WPA ....................................................................................................................... 412
Security Parameters Summary .............................................................................. 413
Appendix L
Log Descriptions.................................................................................................. 414
Log Commands...................................................................................................... 428
Table of Contents 22
P-660H/HW-T Series User’ Guide
Log Command Example......................................................................................... 429
Appendix M
Internal SPTGEN .................................................................................................. 430
Internal SPTGEN Overview ................................................................................... 430
The Configuration Text File Format........................................................................ 430
Internal SPTGEN FTP Download Example............................................................ 431
Internal SPTGEN FTP Upload Example ................................................................ 432
Command Examples.............................................................................................. 453
Index...................................................................................................................... 456
23 Table of Contents
P-660H/HW-T Series User’ Guide

List of Figures

Figure 1 Protected Internet Access Applications ................................................................ 46
Figure 2 LAN-to-LAN Application Example ......................................................................... 46
Figure 3 P-660H-T FrontPanel LEDs ............................................................................... 47
Figure 4 Password Screen .................................................................................................. 49
Figure 5 Change Password at Login ................................................................................... 49
Figure 6 Web Configurator: Site Map Screen ................................................................... 50
Figure 7 Password ..............................................................................................................52
Figure 8 Internet Access Wizard Setup: ISP Parameters ................................................... 54
Figure 9 Internet Connection with PPPoE ........................................................................... 55
Figure 10 Internet Connection with RFC 1483 ................................................................... 56
Figure 11 Internet Connection with ENET ENCAP ............................................................. 57
Figure 12 Internet Connection with PPPoA ......................................................................... 58
Figure 13 Internet Access Wizard Setup: Third Screen ...................................................... 59
Figure 14 Internet Access Wizard Setup: LAN Configuration ............................................ 59
Figure 15 Internet Access Wizard Setup: Connection Tests ............................................... 60
Figure 16 LAN and WAN IP Addresses .............................................................................. 62
Figure 17 Any IP Example .................................................................................................. 67
Figure 18 LAN Setup ........................................................................................................... 68
Figure 19 Wireless LAN ...................................................................................................... 72
Figure 20 Wireless Security Methods ................................................................................. 73
Figure 21 Wireless Screen .................................................................................................. 74
Figure 22 MAC Filter ...........................................................................................................76
Figure 23 WPA - PSK Authentication .................................................................................. 78
Figure 24 WPA with RADIUS Application Example2 .......................................................... 79
Figure 25 Wireless LAN: 802.1x/WPA: No Access Allowed ................................................ 80
Figure 26 Wireless LAN: 802.1x/WPA: No Authentication .................................................. 80
Figure 27 Wireless LAN: 802.1x/WPA: 802.1xl ................................................................... 81
Figure 28 Wireless LAN: 802.1x/WPA: WPA ....................................................................... 83
Figure 29 Wireless LAN: 802.1x/WPA:WPA-PSK ............................................................... 84
Figure 30 Local User Database .......................................................................................... 86
Figure 31 RADIUS .............................................................................................................. 87
Figure 32 Example of Traffic Shaping ................................................................................. 94
Figure 33 WAN ................................................................................................................... 95
Figure 34 WAN Setup (PPPoE) .......................................................................................... 96
Figure 35 Traffic Redirect Example ..................................................................................... 99
Figure 36 Traffic Redirect LAN Setup ................................................................................. 99
Figure 37 WAN Backup ....................................................................................................... 100
Figure 38 How NAT Works .................................................................................................. 104
List of Figures 24
P-660H/HW-T Series User’ Guide
Figure 39 NAT Application With IP Alias ............................................................................. 104
Figure 40 Multiple Servers Behind NAT Example ............................................................... 107
Figure 41 NAT Mode ........................................................................................................... 108
Figure 42 Edit SUA/NAT Server Set ................................................................................... 109
Figure 43 Address Mapping Rules ...................................................................................... 110
Figure 44 Edit Address Mapping Rule .............................................................................. 112
Figure 45 Dynamic DNS ..................................................................................................... 115
Figure 46 Time and Date ..................................................................................................... 116
Figure 47 Prestige Firewall Application ............................................................................... 120
Figure 48 Three-Way Handshake ....................................................................................... 122
Figure 49 SYN Flood ........................................................................................................... 122
Figure 50 Smurf Attack ....................................................................................................... 123
Figure 51 Stateful Inspection ............................................................................................... 125
Figure 52 Firewall: Default Policy ........................................................................................ 135
Figure 53 Firewall: Rule Summary ..................................................................................... 137
Figure 54 Firewall: Edit Rule ............................................................................................... 139
Figure 55 Firewall: Customized Services ............................................................................ 141
Figure 56 Firewall: Configure Customized Services ........................................................... 142
Figure 57 Firewall Example: Rule Summary ....................................................................... 143
Figure 58 Firewall Example: Edit Rule: Destination Address ............................................. 144
Figure 59 Edit Custom Port Example .................................................................................. 144
Figure 60 Firewall Example: Edit Rule: Select Customized Services ................................. 145
Figure 61 Firewall Example: Rule Summary: My Service .................................................. 146
Figure 62 Firewall: Anti Probing .......................................................................................... 149
Figure 63 Firewall: Threshold .............................................................................................. 151
Figure 64 Content Filtering ................................................................................................. 154
Figure 65 Content Filter: Keyword ...................................................................................... 155
Figure 66 Content Filter: Schedule ..................................................................................... 156
Figure 67 Content Filter: Trusted ........................................................................................ 157
Figure 68 Telnet Configuration on a TCP/IP Network ......................................................... 159
Figure 69 Remote Management ......................................................................................... 160
Figure 70 Configuring UPnP ............................................................................................... 163
Figure 71 Add/Remove Programs: Windows Setup: Communication ................................. 165
Figure 72 Add/Remove Programs: Windows Setup: Communication: Components .......... 165
Figure 73 Network Connections .......................................................................................... 166
Figure 74 Windows Optional Networking Components Wizard .......................................... 167
Figure 75 Networking Services ........................................................................................... 168
Figure 76 Network Connections .......................................................................................... 169
Figure 77 Internet Connection Properties .......................................................................... 170
Figure 78 Internet Connection Properties: Advanced Settings ........................................... 171
Figure 79 Internet Connection Properties: Advanced Settings: Add ................................... 171
Figure 80 System Tray Icon ................................................................................................ 172
Figure 81 Internet Connection Status .................................................................................. 172
25 List of Figures
P-660H/HW-T Series User’ Guide
Figure 82 Network Connections .......................................................................................... 173
Figure 83 Network Connections: My Network Places ......................................................... 174
Figure 84 Network Connections: My Network Places: Properties: Example ....................... 174
Figure 85 Log Settings ........................................................................................................ 177
Figure 86 View Logs ........................................................................................................... 179
Figure 87 E-mail Log Example ............................................................................................ 180
Figure 88 Application-based Bandwidth Management Example ......................................... 183
Figure 89 Subnet-based Bandwidth Management Example ............................................... 184
Figure 90 Application and Subnet-based Bandwidth Management Example ..................... 184
Figure 91 Bandwidth Allotment Example ............................................................................ 186
Figure 92 Maximize Bandwidth Usage Example ................................................................. 187
Figure 93 Media Bandwidth Mgnt. ..................................................................................... 188
Figure 94 Media Bandwidth Management: Summary ......................................................... 189
Figure 95 Media Bandwidth Management: Class Setup ..................................................... 190
Figure 96 Media Bandwidth Management: Class Configuration ......................................... 191
Figure 97 Media Bandwidth Management Statistics .......................................................... 193
Figure 98 Media Bandwidth Management: Monitor ........................................................... 194
Figure 99 System Status ..................................................................................................... 197
Figure 100 System Status: Show Statistics ......................................................................... 199
Figure 101 DHCP Table ...................................................................................................... 200
Figure 102 Any IP Table ...................................................................................................... 201
Figure 103 Association List ................................................................................................. 202
Figure 104 Diagnostic: General .......................................................................................... 203
Figure 105 Diagnostic: DSL Line ........................................................................................ 204
Figure 106 Firmware Upgrade ............................................................................................ 205
Figure 107 Network Temporarily Disconnected .................................................................. 206
Figure 108 Error Message .................................................................................................. 206
Figure 109 Login Screen ..................................................................................................... 209
Figure 110 Menu 23.1 Change Password ........................................................................... 212
Figure 111 Menu 1 General Setup ...................................................................................... 215
Figure 112 Menu 1.1 Configure Dynamic DNS .................................................................. 216
Figure 113 Menu 2 WAN Backup Setup .............................................................................. 218
Figure 114 Menu 2.1Traffic Redirect Setup ......................................................................... 219
Figure 115 Menu 3 LAN Setup ............................................................................................ 222
Figure 116 Menu 3.1 LAN Port Filter Setup ........................................................................ 222
Figure 117 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 223
Figure 118 Menu 3.5 - Wireless LAN Setup ....................................................................... 226
Figure 119 Menu 3.5.1 WLAN MAC Address Filtering ........................................................ 228
Figure 120 IP Alias Network Example ................................................................................. 231
Figure 121 Menu 3.2 TCP/IP and DHCP Setup ................................................................. 231
Figure 122 Menu 3.2.1 IP Alias Setup ................................................................................ 232
Figure 123 Menu 1 General Setup ...................................................................................... 233
Figure 124 Menu 4 Internet Access Setup .......................................................................... 233
List of Figures 26
P-660H/HW-T Series User’ Guide
Figure 125 Menu 11 Remote Node Setup ........................................................................... 237
Figure 126 Menu 11.1 Remote Node Profile ...................................................................... 238
Figure 127 Menu 11.3 Remote Node Network Layer Options ............................................ 240
Figure 128 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection ........................... 242
Figure 129 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) ............... 242
Figure 130 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) ................. 243
Figure 131 Menu 11.6 for VC-based Multiplexing ............................................................... 243
Figure 132 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation .......................... 244
Figure 133 Menu 11.1 Remote Node Profile ....................................................................... 244
Figure 134 Menu 11.8 Advance Setup Options .................................................................. 245
Figure 135 Sample Static Routing Topology ....................................................................... 246
Figure 136 Menu 12 Static Route Setup ............................................................................. 247
Figure 137 Menu 12.1 IP Static Route Setup ...................................................................... 247
Figure 138 Menu12.1.1 Edit IP Static Route ....................................................................... 247
Figure 139 Menu 11.1 Remote Node Profile ....................................................................... 251
Figure 140 Menu 11.3 Remote Node Network Layer Options ............................................ 251
Figure 141 Menu 12.3.1 Edit Bridge Static Route ............................................................... 252
Figure 142 Menu 4 Applying NAT for Internet Access ........................................................ 255
Figure 143 Applying NAT in Menus 4 & 11.3 ....................................................................... 255
Figure 144 Menu 15 NAT Setup ........................................................................................ 256
Figure 145 Menu 15.1 Address Mapping Sets .................................................................... 257
Figure 146 Menu 15.1.255 SUA Address Mapping Rules .................................................. 257
Figure 147 Menu 15.1.1 First Set ........................................................................................ 258
Figure 148 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ........................ 259
Figure 149 Menu 15.2 NAT Server Setup ........................................................................... 260
Figure 150 Menu 15.2.1 NAT Server Setup ........................................................................ 261
Figure 151 Multiple Servers Behind NAT Example ............................................................. 261
Figure 152 NAT Example 1 ................................................................................................. 262
Figure 153 Menu 4 Internet Access & NAT Example .......................................................... 262
Figure 154 NAT Example 2 ................................................................................................. 263
Figure 155 Menu 15.2.1 Specifying an Inside Server ......................................................... 263
Figure 156 NAT Example 3 ................................................................................................. 264
Figure 157 Example 3: Menu 11.3 ...................................................................................... 265
Figure 158 Example 3: Menu 15.1.1.1 ................................................................................ 265
Figure 159 Example 3: Final Menu 15.1.1 .......................................................................... 266
Figure 160 Example 3: Menu 15.2.1 ................................................................................... 266
Figure 161 NAT Example 4 ................................................................................................. 267
Figure 162 Example 4: Menu 15.1.1.1 Address Mapping Rule ........................................... 267
Figure 163 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ 268
Figure 164 Menu 21.2 Firewall Setup ................................................................................. 271
Figure 165 Outgoing Packet Filtering Process .................................................................... 272
Figure 166 Filter Rule Process ............................................................................................ 273
Figure 167 Menu 21 Filter Set Configuration ...................................................................... 274
27 List of Figures
P-660H/HW-T Series User’ Guide
Figure 168 NetBIOS_WAN Filter Rules Summary ............................................................. 274
Figure 169 NetBIOS_LAN Filter Rules Summary .............................................................. 275
Figure 170 IGMP Filter Rules Summary ............................................................................ 275
Figure 171 Menu 21.1.x.1 TCP/IP Filter Rule ..................................................................... 277
Figure 172 Executing an IP Filter ........................................................................................ 279
Figure 173 Menu 21.1.5.1 Generic Filter Rule ................................................................... 280
Figure 174 Protocol and Device Filter Sets ......................................................................... 281
Figure 175 Sample Telnet Filter .......................................................................................... 282
Figure 176 Menu 21.1.6.1 Sample Filter ............................................................................ 282
Figure 177 Menu 21.1.6.1 Sample Filter Rules Summary .................................................. 283
Figure 178 Filtering Ethernet Traffic .................................................................................... 284
Figure 179 Filtering Remote Node Traffic ........................................................................... 284
Figure 180 SNMP Management Model ............................................................................... 286
Figure 181 Menu 22 SNMP Configuration .......................................................................... 288
Figure 182 Menu 23 – System Security .............................................................................. 290
Figure 183 Menu 23.2 System Security: RADIUS Server ................................................... 291
Figure 184 Menu 23 System Security ................................................................................. 292
Figure 185 Menu 23.4 System Security: IEEE 802.1x ........................................................ 292
Figure 186 Menu 14 Dial-in User Setup .............................................................................. 295
Figure 187 Menu 14.1 Edit Dial-in User .............................................................................. 295
Figure 188 Menu 24 System Maintenance ......................................................................... 296
Figure 189 Menu 24.1 System Maintenance : Status ......................................................... 297
Figure 190 Menu 24.2 System Information and Console Port Speed ................................. 298
Figure 191 Menu 24.2.1 System Maintenance: Information ............................................... 299
Figure 192 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... 300
Figure 193 Menu 24.3 System Maintenance: Log and Trace ............................................. 300
Figure 194 Sample Error and Information Messages ......................................................... 301
Figure 195 Menu 24.3.2 System Maintenance: Syslog and Accounting ............................. 301
Figure 196 Syslog Example ................................................................................................ 302
Figure 197 Menu 24.4 System Maintenance : Diagnostic ................................................... 303
Figure 198 Telnet in Menu 24.5 ........................................................................................... 308
Figure 199 FTP Session Example ...................................................................................... 309
Figure 200 Telnet into Menu 24.6 ........................................................................................ 312
Figure 201 Restore Using FTP Session Example ............................................................... 312
Figure 202 Telnet Into Menu 24.7.1 Upload System Firmware .......................................... 313
Figure 203 Telnet Into Menu 24.7.2 System Maintenance ................................................. 314
Figure 204 FTP Session Example of Firmware File Upload ............................................... 315
Figure 205 Command Mode in Menu 24 ............................................................................. 318
Figure 206 Valid Commands ............................................................................................... 318
Figure 207 Menu 24.9 System Maintenance: Call Control .................................................. 319
Figure 208 Menu 24.9.1 System Maintenance: Budget Management ................................ 320
Figure 209 Menu 24 System Maintenance ......................................................................... 321
Figure 210 Menu 24.10 System Maintenance: Time and Date Setting ............................... 321
List of Figures 28
P-660H/HW-T Series User’ Guide
Figure 211 Menu 24.11 Remote Management Control ....................................................... 325
Figure 212 Menu 25 IP Routing Policy Setup ..................................................................... 329
Figure 213 Menu 25.1 IP Routing Policy Setup .................................................................. 330
Figure 214 Menu 25.1.1 IP Routing Policy .......................................................................... 331
Figure 215 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 333
Figure 216 Menu 11.3 Remote Node Network Layer Options ............................................ 333
Figure 217 Example of IP Policy Routing ........................................................................... 334
Figure 218 IP Routing Policy Example ................................................................................ 335
Figure 219 IP Routing Policy Example ................................................................................ 336
Figure 220 Applying IP Policies Example ........................................................................... 336
Figure 221 Menu 26 Schedule Setup .................................................................................. 338
Figure 222 Menu 26.1 Schedule Set Setup ....................................................................... 339
Figure 223 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... 340
Figure 224 Pop-up Blocker ................................................................................................. 345
Figure 225 Internet Options ............................................................................................... 345
Figure 226 Internet Options ................................................................................................ 346
Figure 227 Pop-up Blocker Settings ................................................................................... 347
Figure 228 Internet Options ................................................................................................ 348
Figure 229 Security Settings - Java Scripting ..................................................................... 349
Figure 230 Security Settings - Java .................................................................................... 350
Figure 231 Java (Sun) ......................................................................................................... 351
Figure 232 Internet Options Security .................................................................................. 352
Figure 233 Security Setting ActiveX Controls ..................................................................... 353
Figure 234 Wall-mounting Example .................................................................................... 358
Figure 235 WIndows 95/98/Me: Network: Configuration ..................................................... 361
Figure 236 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 362
Figure 237 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 363
Figure 238 Windows XP: Start Menu .................................................................................. 364
Figure 239 Windows XP: Control Panel .............................................................................. 364
Figure 240 Windows XP: Control Panel: Network Connections: Properties ....................... 365
Figure 241 Windows XP: Local Area Connection Properties .............................................. 365
Figure 242 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 366
Figure 243 Windows XP: Advanced TCP/IP Properties ...................................................... 367
Figure 244 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 368
Figure 245 Macintosh OS 8/9: Apple Menu ........................................................................ 369
Figure 246 Macintosh OS 8/9: TCP/IP ................................................................................ 369
Figure 247 Macintosh OS X: Apple Menu ........................................................................... 370
Figure 248 Macintosh OS X: Network ................................................................................. 371
Figure 249 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 372
Figure 250 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 372
Figure 251 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 373
Figure 252 Red Hat 9.0: KDE: Network Configuration: Activate ................................. 373
Figure 253 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 374
29 List of Figures
Loading...
+ 436 hidden pages