ZyXEL Communications P-660HW-T User Manual

0 (0)

P-660HW-T v2

802.11g Wireless ADSL 2+ 4-port Gateway

User’s Guide

Version 3.40
Edition 1
12/2006
P-660HW-T v2 User’s Guide
Copyright © 2006 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright 3
P-660HW-T v2 User’s Guide
Federal Communications Commission (FCC) Interference Statement
The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

Certifications

If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1 Reorient or relocate the receiving antenna.
2 Increase the separation between the equipment and the receiver.
3 Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
4 Consult the dealer or an experienced radio/TV technician for help.
FCC Radiation Exposure Statement
• The device complies with FCC RF radiation exposure limits set forth for an uncontrolled environment, under 47 CFR 2.1093 paragraph (d)(2). End users must follow the specific operating instructions for satisfying RF exposure compliance. To maintain compliance with FCC RF exposure compliance requirements, please follow operation instruction as documented in this manual.
• IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
• To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons.
注意 !
依據 低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用
者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。
4 Certifications
P-660HW-T v2 User’s Guide
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
Notices
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Viewing Certifications
1 Go to http://www.zyxel.com.
2 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
3 Select the certification you wish to view from this page.
Certifications 5
P-660HW-T v2 User’s Guide
For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged.

Safety Warnings

6 Safety Warnings
This product is recyclable. Dispose of it properly.
P-660HW-T v2 User’s Guide
Safety Warnings 7
P-660HW-T v2 User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.

ZyXEL Limited Warranty

To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.
8 ZyXEL Limited Warranty
P-660HW-T v2 User’s Guide

Customer Support

Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
COSTA RICA
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
HUNGARY
KAZAKHSTAN
NORTH AMERICA
SUPPORT E-MAIL TELEPHONE WEB SITE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
www.europe.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
ftp.europe.zyxel.com
soporte@zyxel.co.cr +506-2017878 www.zyxel.co.cr ZyXEL Costa Rica
sales@zyxel.co.cr +506-2015098 ftp.zyxel.co.cr
info@cz.zyxel.com +420-241-091-350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420-241-091-359
support@zyxel.dk +45-39-55-07-00 www.zyxel.dk ZyXEL Communications A/S
sales@zyxel.dk +45-39-55-07-07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33-4-72-52-97-97 www.zyxel.fr ZyXEL France
+33-4-72-52-19-20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.hu +36-1-3361649 www.zyxel.hu ZyXEL Hungary
info@zyxel.hu +36-1-3259100
http://zyxel.kz/support +7-3272-590-698 www.zyxel.kz ZyXEL Kazakhstan
sales@zyxel.kz +7-3272-590-689
support@zyxel.com 1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Science Park Hsinchu 300 Ta iw a n
Plaza Roble Escazú Etapa El Patio, Tercer Piso San José, Costa Rica
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Columbusvej 2860 Soeborg Denmark
Malminkaari 10 00700 Helsinki Finland
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
48, Zoldlomb Str. H-1025, Budapest Hungary
43, Dostyk ave.,Office 414 Dostyk Business Centre 050010, Almaty Republic of Kazakhstan
1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
Customer Support 9
P-660HW-T v2 User’s Guide
METHOD
LOCATION
NORWAY
POLAND
RUSSIA
SPAIN
SWEDEN
UKRAINE
UNITED KINGDOM
SUPPORT E-MAIL TELEPHONE WEB SITE
SALES E-MAIL FAX FTP SITE
support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S
sales@zyxel.no +47-22-80-61-81
info@pl.zyxel.com +48 (22) 333 8250 www.pl.zyxel.com ZyXEL Communications
+48 (22) 333 8251
http://zyxel.ru/support +7-095-542-89-29 www.zyxel.ru ZyXEL Russia
sales@zyxel.ru +7-095-542-89-25
support@zyxel.es +34-902-195-420 www.zyxel.es ZyXEL Communications
sales@zyxel.es +34-913-005-345
support@zyxel.se +46-31-744-7700 www.zyxel.se ZyXEL Communications A/S
sales@zyxel.se +46-31-744-7701
support@ua.zyxel.com +380-44-247-69-78 www.ua.zyxel.com ZyXEL Ukraine
sales@ua.zyxel.com +380-44-494-49-32
support@zyxel.co.uk +44-1344 303044
08707 555779 (UK only)
sales@zyxel.co.uk +44-1344 303034 ftp.zyxel.co.uk
www.zyxel.co.uk ZyXEL Communications UK
REGULAR MAIL
Nils Hansens vei 13 0667 Oslo Norway
ul. Okrzei 1A 03-715 Warszawa Poland
Ostrovityanova 37a Str. Moscow, 117279 Russia
Arte, 21 5ª planta 28033 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
13, Pimonenko Str. Kiev, 04050 Ukraine
Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
+” is the (prefix) number you enter to make an international telephone call.
10 Customer Support
P-660HW-T v2 User’s Guide

Table of Contents

Copyright ..................................................................................................................3
Certifications ............................................................................................................4
Safety Warnings ....................................................................................................... 6
ZyXEL Limited Warranty.......................................................................................... 8
Customer Support.................................................................................................... 9
Table of Contents ................................................................................................... 11
List of Figures ........................................................................................................ 21
List of Tables .......................................................................................................... 27
Preface ....................................................................................................................31
Chapter 1
Getting To Know Your ZyXEL Device ...................................................................33
1.1 Introducing the ZyXEL Device ............................................................................33
1.2 Features .............................................................................................................33
1.2.1 Wireless Features .....................................................................................36
1.3 Applications for the ZyXEL Device .....................................................................37
1.3.1 Protected Internet Access .........................................................................37
1.3.2 LAN to LAN Application ............................................................................38
1.4 Front Panel LEDs ...............................................................................................38
1.5 Hardware Connection ........................................................................................39
Chapter 2
Introducing the Web Configurator........................................................................ 41
2.1 Web Configurator Overview ...............................................................................41
2.2 Accessing the Web Configurator ........................................................................41
2.3 Resetting the ZyXEL Device ..............................................................................43
2.3.1 Using the Reset Button .............................................................................43
2.4 Navigating the Web Configurator .......................................................................43
2.4.1 Navigation Panel .......................................................................................43
2.4.2 Status Screen ...........................................................................................46
2.4.3 Status: Any IP Table ..................................................................................49
2.4.4 Status: WLAN Status ................................................................................49
2.4.5 Status: Bandwidth Status ..........................................................................50
Table of Contents 11
P-660HW-T v2 User’s Guide
2.4.6 Status: Packet Statistics ............................................................................51
2.4.7 Changing Login Password .......................................................................52
Chapter 3
Wizard Setup for Internet Access......................................................................... 55
3.1 Introduction ........................................................................................................55
3.2 Internet Access Wizard Setup ............................................................................55
3.2.1 Automatic Detection ..................................................................................57
3.2.2 Manual Configuration ................................................................................57
3.3 Wireless Connection Wizard Setup ....................................................................62
3.3.1 Manually assign a WPA-PSK key .............................................................65
3.3.2 Manually assign a WEP key .....................................................................66
Chapter 4
Bandwidth Management Wizard ........................................................................... 69
4.1 Introduction ........................................................................................................69
4.2 Predefined Media Bandwidth Management Services ........................................69
4.3 Bandwidth Management Wizard Setup ..............................................................70
Chapter 5
WAN Setup.............................................................................................................. 75
5.1 WAN Overview ..................................................................................................75
5.1.1 Encapsulation ...........................................................................................75
5.1.1.1 ENET ENCAP .................................................................................75
5.1.1.2 PPP over Ethernet ..........................................................................75
5.1.1.3 PPPoA .............................................................................................76
5.1.1.4 RFC 1483 ........................................................................................76
5.1.2 Multiplexing ...............................................................................................76
5.1.2.1 VC-based Multiplexing ....................................................................76
5.1.2.2 LLC-based Multiplexing ...................................................................76
5.1.3 Encapsulation and Multiplexing Scenarios ...............................................76
5.1.3.1 Scenario 1: One VC, Multiple Protocols ..........................................77
5.1.3.2 Scenario 2: One VC, One Protocol (IP) ..........................................77
5.1.3.3 Scenario 3: Multiple VCs .................................................................77
5.1.4 VPI and VCI ..............................................................................................77
5.1.5 IP Address Assignment ............................................................................77
5.1.5.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................77
5.1.5.2 IP Assignment with RFC 1483 Encapsulation .................................77
5.1.5.3 IP Assignment with ENET ENCAP Encapsulation ..........................78
5.1.6 Nailed-Up Connection (PPP) ....................................................................78
5.1.7 NAT ...........................................................................................................78
5.2 Metric ................................................................................................................78
5.3 Traffic Shaping ...................................................................................................79
12 Table of Contents
P-660HW-T v2 User’s Guide
5.3.1 ATM Traffic Classes ..................................................................................80
5.3.1.1 Constant Bit Rate (CBR) .................................................................80
5.3.1.2 Variable Bit Rate (VBR) ...................................................................80
5.3.1.3 Unspecified Bit Rate (UBR) .............................................................80
5.4 Zero Configuration Internet Access ....................................................................80
5.5 Internet Connection ...........................................................................................81
5.5.1 Configuring Advanced Internet Connection Setup ....................................83
5.6 Configuring More Connections ...........................................................................84
5.6.1 More Connections Edit ............................................................................85
5.6.2 Configuring More Connections Advanced Setup .....................................88
5.7 Traffic Redirect ..................................................................................................89
5.8 Configuring WAN Backup ..................................................................................90
Chapter 6
Wireless LAN .......................................................................................................... 93
6.1 Wireless Network Overview ...............................................................................93
6.2 Wireless Security Overview ...............................................................................94
6.2.1 SSID .........................................................................................................94
6.2.2 MAC Address Filter ...................................................................................94
6.2.3 User Authentication ..................................................................................95
6.2.4 Encryption .................................................................................................95
6.2.5 One-Touch Intelligent Security Technology (OTIST) .................................96
6.3 Wireless Performance Overview ........................................................................96
6.4 General Wireless LAN Screen ..........................................................................96
6.4.1 No Security ...............................................................................................98
6.4.2 WEP Encryption ........................................................................................98
6.4.3 WPA-PSK/WPA2-PSK ..............................................................................99
6.4.4 WPA/WPA2 .............................................................................................101
6.4.5 Wireless LAN Advanced Setup ...............................................................103
6.5 OTIST ..............................................................................................................105
6.5.1 Enabling OTIST ......................................................................................105
6.5.1.1 AP .................................................................................................105
6.5.1.2 Wireless Client ..............................................................................106
6.5.2 Starting OTIST ........................................................................................107
6.5.3 Notes on OTIST ......................................................................................108
6.6 MAC Filter ...................................................................................................108
Chapter 7
LAN Setup..............................................................................................................111
7.1 LAN Overview ................................................................................................. 111
7.1.1 LANs, WANs and the ZyXEL Device ...................................................... 111
7.1.2 DHCP Setup ...........................................................................................112
7.1.2.1 IP Pool Setup ................................................................................112
Table of Contents 13
P-660HW-T v2 User’s Guide
7.1.3 DNS Server Address ..............................................................................112
7.1.4 DNS Server Address Assignment ........................................................... 113
7.2 LAN TCP/IP ......................................................................................................113
7.2.1 IP Address and Subnet Mask ................................................................. 113
7.2.2 RIP Setup ............................................................................................... 114
7.2.3 Multicast ..................................................................................................115
7.2.4 Any IP ..................................................................................................... 115
7.3 Configuring LAN IP .......................................................................................... 117
7.3.1 Configuring Advanced LAN Setup .......................................................... 117
7.4 DHCP Setup .....................................................................................................119
7.5 LAN Client List .................................................................................................120
7.6 LAN IP Alias .....................................................................................................121
Chapter 8
Network Address Translation (NAT) Screens .................................................... 125
7.2.1.1 Private IP Addresses .....................................................................114
7.2.4.1 How Any IP Works ........................................................................116
8.1 NAT Overview .................................................................................................125
8.1.1 NAT Definitions .......................................................................................125
8.1.2 What NAT Does ......................................................................................126
8.1.3 How NAT Works .....................................................................................126
8.1.4 NAT Application ......................................................................................127
8.1.5 NAT Mapping Types ...............................................................................127
8.2 SUA (Single User Account) Versus NAT ..........................................................128
8.3 NAT General Setup .........................................................................................128
8.4 Port Forwarding ................................................................................................129
8.4.1 Default Server IP Address ......................................................................130
8.4.2 Port Forwarding: Services and Port Numbers ........................................130
8.4.3 Configuring Servers Behind Port Forwarding (Example) ........................131
8.5 Configuring Port Forwarding ...........................................................................131
8.5.1 Port Forwarding Rule Edit ......................................................................132
8.6 Address Mapping ............................................................................................133
8.6.1 Address Mapping Rule Edit ...................................................................135
Chapter 9
Firewalls................................................................................................................ 137
9.1 Firewall Overview ............................................................................................137
9.2 Types of Firewalls ............................................................................................137
9.2.1 Packet Filtering Firewalls ........................................................................137
9.2.2 Application-level Firewalls ......................................................................138
9.2.3 Stateful Inspection Firewalls ...................................................................138
9.3 Introduction to ZyXEL’s Firewall .......................................................................138
9.3.1 Denial of Service Attacks ........................................................................139
14 Table of Contents
P-660HW-T v2 User’s Guide
9.4 Denial of Service ..............................................................................................139
9.4.1 Basics .....................................................................................................139
9.4.2 Types of DoS Attacks .............................................................................140
9.4.2.1 ICMP Vulnerability ........................................................................142
9.4.2.2 Illegal Commands (NetBIOS and SMTP) ......................................142
9.4.2.3 Traceroute .....................................................................................143
9.5 Stateful Inspection ............................................................................................143
9.5.1 Stateful Inspection Process ....................................................................144
9.5.2 Stateful Inspection and the ZyXEL Device ..............................................144
9.5.3 TCP Security ...........................................................................................145
9.5.4 UDP/ICMP Security ................................................................................145
9.5.5 Upper Layer Protocols ............................................................................146
9.6 Guidelines for Enhancing Security with Your Firewall ......................................146
9.6.1 Security In General .................................................................................146
9.7 Packet Filtering Vs Firewall ..............................................................................147
9.7.1 Packet Filtering: ......................................................................................147
9.7.1.1 When To Use Filtering ...................................................................148
9.7.2 Firewall ...................................................................................................148
9.7.2.1 When To Use The Firewall ............................................................148
Chapter 10
Firewall Configuration ......................................................................................... 149
10.1 Access Methods .............................................................................................149
10.2 Firewall Policies Overview ............................................................................149
10.3 Rule Logic Overview .....................................................................................150
10.3.1 Rule Checklist .......................................................................................150
10.3.2 Security Ramifications ..........................................................................150
10.3.3 Key Fields For Configuring Rules ........................................................151
10.3.3.1 Action ..........................................................................................151
10.3.3.2 Service ........................................................................................151
10.3.3.3 Source Address ...........................................................................151
10.3.3.4 Destination Address ....................................................................151
10.4 Connection Direction ......................................................................................151
10.4.1 LAN to WAN Rules ...............................................................................152
10.4.2 Alerts .....................................................................................................152
10.5 General Firewall Policy ...............................................................................152
10.6 Firewall Rules Summary ...............................................................................153
10.6.1 Configuring Firewall Rules ..................................................................155
10.6.2 Customized Services ...........................................................................158
10.6.3 Configuring a Customized Service .....................................................159
10.7 Example Firewall Rule ...................................................................................159
10.8 Predefined Services .......................................................................................163
10.9 Anti-Probing ..................................................................................................165
Table of Contents 15
P-660HW-T v2 User’s Guide
10.10 DoS Thresholds ..........................................................................................166
10.10.1 Threshold Values ................................................................................166
10.10.2 Half-Open Sessions ............................................................................167
10.10.3 Configuring Firewall Thresholds .........................................................168
Chapter 11
Content Filtering .................................................................................................. 171
11.1 Content Filtering Overview ............................................................................171
11.2 Configuring Keyword Blocking .....................................................................171
11.3 Configuring the Schedule .............................................................................172
11.4 Configuring Trusted Computers ...................................................................173
Chapter 12
Static Route .......................................................................................................... 175
12.1 Static Route .................................................................................................175
12.2 Configuring Static Route ...............................................................................175
12.2.1 Static Route Edit .................................................................................176
10.10.2.1 TCP Maximum Incomplete and Blocking Time .........................167
Chapter 13
Bandwidth Management...................................................................................... 179
13.1 Bandwidth Management Overview ...............................................................179
13.2 Application-based Bandwidth Management ...................................................179
13.3 Subnet-based Bandwidth Management .........................................................179
13.4 Application and Subnet-based Bandwidth Management ...............................180
13.5 Scheduler .......................................................................................................180
13.5.1 Priority-based Scheduler ......................................................................180
13.5.2 Fairness-based Scheduler ....................................................................181
13.6 Maximize Bandwidth Usage ...........................................................................181
13.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................181
13.6.2 Maximize Bandwidth Usage Example ..................................................182
13.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 182
13.6.2.2 Fairness-based Allotment of Unused and Unbudgeted Bandwidth ... 183
13.6.3 Bandwidth Management Priorities ........................................................183
13.7 Over Allotment of Bandwidth ..........................................................................184
13.8 Configuring Summary ...................................................................................184
13.9 Bandwidth Management Rule Setup ............................................................185
13.9.1 Rule Configuration ................................................................................187
13.10 Bandwidth Monitor .....................................................................................189
16 Table of Contents
P-660HW-T v2 User’s Guide
Chapter 14
Dynamic DNS Setup............................................................................................. 191
14.1 Dynamic DNS Overview ...............................................................................191
14.1.1 DYNDNS Wildcard ................................................................................191
14.2 Configuring Dynamic DNS ............................................................................191
Chapter 15
Remote Management Configuration .................................................................. 195
15.1 Remote Management Overview ....................................................................195
15.1.1 Remote Management Limitations .........................................................195
15.1.2 Remote Management and NAT ............................................................196
15.1.3 System Timeout ...................................................................................196
15.2 WWW .............................................................................................................196
15.3 Telnet ..............................................................................................................197
15.4 Configuring Telnet ..........................................................................................197
15.5 Configuring FTP ............................................................................................198
15.6 SNMP .............................................................................................................199
15.6.1 Supported MIBs ....................................................................................200
15.6.2 SNMP Traps .........................................................................................201
15.6.3 Configuring SNMP ................................................................................201
15.7 Configuring DNS ..........................................................................................202
15.8 Configuring ICMP ...........................................................................................203
15.9 TR-069 ...........................................................................................................204
Chapter 16
Universal Plug-and-Play (UPnP) ......................................................................... 207
16.1 Introducing Universal Plug and Play .............................................................207
16.1.1 How do I know if I'm using UPnP? ........................................................207
16.1.2 NAT Traversal .......................................................................................207
16.1.3 Cautions with UPnP ..............................................................................208
16.2 UPnP and ZyXEL ...........................................................................................208
16.2.1 Configuring UPnP ................................................................................208
16.3 Installing UPnP in Windows Example ............................................................209
16.3.1 Installing UPnP in Windows Me ............................................................209
16.3.2 Installing UPnP in Windows XP ............................................................ 211
16.4 Using UPnP in Windows XP Example ...........................................................212
16.4.1 Auto-discover Your UPnP-enabled Network Device .............................212
16.4.2 Web Configurator Easy Access ............................................................215
Chapter 17
System .................................................................................................................. 219
17.1 General Setup ................................................................................................219
17.1.1 General Setup and System Name ........................................................219
Table of Contents 17
P-660HW-T v2 User’s Guide
17.1.2 General Setup ......................................................................................219
17.2 Time Setting ..................................................................................................221
Chapter 18
Logs ...................................................................................................................... 225
18.1 Logs Overview ..............................................................................................225
18.1.1 Alerts and Logs .....................................................................................225
18.2 Viewing the Logs ............................................................................................225
18.3 Configuring Log Settings ...............................................................................226
18.3.1 Example E-mail Log ..............................................................................228
18.4 Log Descriptions ............................................................................................229
Chapter 19
Tools...................................................................................................................... 245
19.1 Firmware Upgrade ........................................................................................245
19.2 Configuration Screen .....................................................................................247
19.2.1 Backup Configuration ...........................................................................247
19.2.2 Restore Configuration ...........................................................................248
19.2.3 Back to Factory Defaults .......................................................................249
19.3 Restart ............................................................................................................249
Chapter 20
Diagnostic ............................................................................................................251
20.1 General Diagnostic ........................................................................................251
20.2 DSL Line Diagnostic .....................................................................................252
Chapter 21
Troubleshooting ................................................................................................... 253
21.1 Problems Starting Up the ZyXEL Device .......................................................253
21.2 Problems with the LAN ...................................................................................253
21.3 Problems with the WAN .................................................................................254
21.4 Problems Accessing the ZyXEL Device .........................................................255
Appendix A
Product Specifications ........................................................................................ 257
Appendix B
About ADSL .......................................................................................................... 261
Introduction to DSL ................................................................................................ 261
ADSL Overview...................................................................................................... 261
Advantages of ADSL.............................................................................................. 261
Appendix C
Internal SPTGEN .................................................................................................. 263
18 Table of Contents
P-660HW-T v2 User’s Guide
Internal SPTGEN Overview ................................................................................... 263
The Configuration Text File Format........................................................................ 263
Internal SPTGEN FTP Download Example............................................................ 264
Internal SPTGEN FTP Upload Example ................................................................ 265
Example Internal SPTGEN Menus......................................................................... 266
Command Examples.............................................................................................. 278
Appendix D
Wall-mounting Instructions................................................................................. 279
Appendix E
Setting up Your Computer’s IP Address............................................................ 281
Windows 95/98/Me................................................................................................. 281
Windows 2000/NT/XP ............................................................................................ 284
Macintosh OS 8/9................................................................................................... 289
Macintosh OS X ..................................................................................................... 291
Linux....................................................................................................................... 292
Appendix F
IP Subnetting ........................................................................................................ 297
Introduction to IP Addresses .................................................................................. 297
Subnet Masks ........................................................................................................ 298
Subnetting .............................................................................................................. 299
Example: Two Subnets .......................................................................................... 300
Example: Four Subnets.......................................................................................... 301
Example Eight Subnets.......................................................................................... 302
Subnetting With Class A and Class B Networks. ................................................... 303
Appendix G
Command Interpreter........................................................................................... 305
Accessing the CLI .................................................................................................. 305
Command Syntax................................................................................................... 305
Command Usage ................................................................................................... 305
Log Commands...................................................................................................... 306
Log Command Example......................................................................................... 307
Appendix H
Firewall Commands ............................................................................................. 309
Appendix I
NetBIOS Filter Commands .................................................................................. 315
Introduction ............................................................................................................ 315
Display NetBIOS Filter Settings ............................................................................. 315
Table of Contents 19
P-660HW-T v2 User’s Guide
NetBIOS Filter Configuration.................................................................................. 316
Appendix J
Splitters and Microfilters ..................................................................................... 317
Connecting a POTS Splitter ................................................................................... 317
Telephone Microfilters ............................................................................................ 317
ZyXEL Device With ISDN....................................................................................... 319
Appendix K
Wireless LANs ...................................................................................................... 321
Wireless LAN Topologies ....................................................................................... 321
Channel.................................................................................................................. 323
RTS/CTS................................................................................................................ 323
Fragmentation Threshold ....................................................................................... 324
Preamble Type....................................................................................................... 325
IEEE 802.11g Wireless LAN .................................................................................. 325
Wireless Security Overview ................................................................................... 326
RADIUS.................................................................................................................. 326
Types of Authentication.......................................................................................... 327
Dynamic WEP Key Exchange................................................................................ 329
WPA and WPA2 ..................................................................................................... 329
Security Parameters Summary .............................................................................. 333
Appendix L
Pop-up Windows, JavaScripts and Java Permissions ..................................... 335
Internet Explorer Pop-up Blockers ......................................................................... 335
JavaScripts............................................................................................................. 338
Appendix M
Triangle Route ...................................................................................................... 343
The Ideal Setup...................................................................................................... 343
The “Triangle Route” Problem................................................................................ 343
The “Triangle Route” Solutions .............................................................................. 344
IP Aliasing .............................................................................................................. 344
Index...................................................................................................................... 345
20 Table of Contents
P-660HW-T v2 User’s Guide

List of Figures

Figure 1 Protected Internet Access Applications ................................................................ 38
Figure 2 LAN-to-LAN Application Example ......................................................................... 38
Figure 3 Front Panel ..........................................................................................................38
Figure 4 Password Screen .................................................................................................. 42
Figure 5 Change Password at Login ................................................................................... 42
Figure 6 Select a Mode ....................................................................................................... 43
Figure 7 Web Configurator: Main Screen ........................................................................... 44
Figure 8 Status Screen ........................................................................................................ 47
Figure 9 Status: Any IP Table .............................................................................................. 49
Figure 10 Status: WLAN Status ........................................................................................... 50
Figure 11 Status: Bandwidth Status ..................................................................................... 50
Figure 12 Status: Packet Statistics ...................................................................................... 51
Figure 13 System General .................................................................................................. 53
Figure 14 Select a Mode ..................................................................................................... 55
Figure 15 Wizard: Welcome ................................................................................................ 56
Figure 16 Auto Detection: No DSL Connection ................................................................... 56
Figure 17 Auto Detection: Failed ......................................................................................... 57
Figure 18 Auto-Detection: PPPoE ....................................................................................... 57
Figure 19 Internet Access Wizard Setup: ISP Parameters ................................................. 58
Figure 20 Internet Connection with PPPoE ......................................................................... 59
Figure 21 Internet Connection with RFC 1483 .................................................................... 59
Figure 22 Internet Connection with ENET ENCAP ............................................................. 60
Figure 23 Internet Connection with PPPoA ......................................................................... 61
Figure 24 Connection Test Failed-1 .................................................................................... 62
Figure 25 Connection Test Failed-2. ................................................................................... 62
Figure 26 Connection Test Successful ................................................................................ 63
Figure 27 Wireless LAN Setup Wizard 1 ............................................................................. 63
Figure 28 Wireless LAN Setup Wizard 2 ............................................................................. 64
Figure 29 Manually assign a WPA-PSK key ....................................................................... 66
Figure 30 Manually assign a WEP key ............................................................................... 66
Figure 31 Wireless LAN Setup 3 ......................................................................................... 67
Figure 32 Internet Access and WLAN Wizard Setup Complete .......................................... 68
Figure 33 Select a Mode ..................................................................................................... 70
Figure 34 Wizard: Welcome ................................................................................................ 71
Figure 35 Bandwidth Management Wizard: General Information ....................................... 71
Figure 36 Bandwidth Management Wizard: Configuration .................................................. 72
Figure 37 Bandwidth Management Wizard: Complete ........................................................ 73
Figure 38 Example of Traffic Shaping ................................................................................. 79
List of Figures 21
P-660HW-T v2 User’s Guide
Figure 39 Internet Connection (PPPoE) .............................................................................. 81
Figure 40 Advanced Internet Connection Setup ................................................................. 83
Figure 41 More Connections ............................................................................................... 85
Figure 42 More Connections Edit ........................................................................................ 86
Figure 43 More Connections Advanced Setup ................................................................... 88
Figure 44 Traffic Redirect Example ..................................................................................... 89
Figure 45 Traffic Redirect LAN Setup ................................................................................. 90
Figure 46 WAN Backup Setup ............................................................................................ 90
Figure 47 Example of a Wireless Network .......................................................................... 93
Figure 48 Wireless LAN: General ...................................................................................... 97
Figure 49 Wireless: No Security .......................................................................................... 98
Figure 50 Wireless: Static WEP Encryption ........................................................................ 99
Figure 51 Wireless: WPA-PSK/WPA2-PSK ......................................................................... 100
Figure 52 Wireless: WPA/WPA2 ......................................................................................... 102
Figure 53 Advanced ............................................................................................................ 104
Figure 54 OTIST ................................................................................................................. 106
Figure 55 Example Wireless Client OTIST Screen ............................................................. 107
Figure 56 Security Key ........................................................................................................ 107
Figure 57 OTIST in Progress (AP) ...................................................................................... 107
Figure 58 OTIST in Progress (Client) .................................................................................. 107
Figure 59 No AP with OTIST Found ................................................................................... 108
Figure 60 Start OTIST? ....................................................................................................... 108
Figure 61 MAC Address Filter ............................................................................................. 109
Figure 62 LAN and WAN IP Addresses .............................................................................. 111
Figure 63 Any IP Example .................................................................................................. 116
Figure 64 LAN IP ................................................................................................................. 117
Figure 65 Advanced LAN Setup .......................................................................................... 118
Figure 66 DHCP Setup ....................................................................................................... 119
Figure 67 LAN Client List .................................................................................................... 120
Figure 68 Physical Network & Partitioned Logical Networks .............................................. 122
Figure 69 LAN IP Alias ........................................................................................................ 122
Figure 70 How NAT Works .................................................................................................. 126
Figure 71 NAT Application With IP Alias ............................................................................. 127
Figure 72 NAT General ...................................................................................................... 129
Figure 73 Multiple Servers Behind NAT Example ............................................................... 131
Figure 74 NAT Port Forwarding .......................................................................................... 131
Figure 75 Port Forwarding Rule Setup .............................................................................. 132
Figure 76 Address Mapping Rules ...................................................................................... 134
Figure 77 Edit Address Mapping Rule .............................................................................. 135
Figure 78 Firewall Application ............................................................................................. 139
Figure 79 Three-Way Handshake ....................................................................................... 140
Figure 80 SYN Flood ........................................................................................................... 141
Figure 81 Smurf Attack ....................................................................................................... 142
22 List of Figures
P-660HW-T v2 User’s Guide
Figure 82 Stateful Inspection ............................................................................................... 143
Figure 83 Firewall: General ................................................................................................. 152
Figure 84 Firewall Rules .................................................................................................... 154
Figure 85 Firewall: Edit Rule ............................................................................................... 156
Figure 86 Firewall: Customized Services ............................................................................ 158
Figure 87 Firewall: Configure Customized Services ........................................................... 159
Figure 88 Firewall Example: Rules ..................................................................................... 160
Figure 89 Edit Custom Port Example .................................................................................. 160
Figure 90 Firewall Example: Edit Rule: Destination Address ............................................. 161
Figure 91 Firewall Example: Edit Rule: Select Customized Services ................................. 162
Figure 92 Firewall Example: Rules: MyService .................................................................. 163
Figure 93 Firewall: Anti Probing .......................................................................................... 165
Figure 94 Firewall: Threshold .............................................................................................. 168
Figure 95 Content Filter: Keyword ...................................................................................... 171
Figure 96 Content Filter: Schedule ..................................................................................... 172
Figure 97 Content Filter: Trusted ........................................................................................ 173
Figure 98 Example of Static Routing Topology ................................................................... 175
Figure 99 Static Route .........................................................................................................176
Figure 100 Static Route Edit ............................................................................................... 177
Figure 101 Subnet-based Bandwidth Management Example ............................................. 180
Figure 102 Bandwidth Management: Summary .................................................................. 184
Figure 103 Bandwidth Management: Rule Setup ............................................................... 186
Figure 104 Bandwidth Management Rule Configuration .................................................... 187
Figure 105 Bandwidth Management: Monitor .................................................................... 189
Figure 106 Dynamic DNS ................................................................................................... 192
Figure 107 Remote Management: WWW ........................................................................... 196
Figure 108 Telnet Configuration on a TCP/IP Network ....................................................... 197
Figure 109 Remote Management: Telnet ............................................................................ 198
Figure 110 Remote Management: FTP ............................................................................... 199
Figure 111 SNMP Management Model ............................................................................... 200
Figure 112 Remote Management: SNMP ........................................................................... 201
Figure 113 Remote Management: DNS .............................................................................. 203
Figure 114 Remote Management: ICMP ............................................................................. 204
Figure 115 Enabling TR-069 .............................................................................................. 205
Figure 116 Configuring UPnP ............................................................................................. 208
Figure 117 Add/Remove Programs: Windows Setup: Communication ............................... 210
Figure 118 Add/Remove Programs: Windows Setup: Communication: Components ......... 210
Figure 119 Network Connections ........................................................................................ 211
Figure 120 Windows Optional Networking Components Wizard ........................................ 211
Figure 121 Networking Services ......................................................................................... 212
Figure 122 Network Connections ........................................................................................ 213
Figure 123 Internet Connection Properties ........................................................................ 213
Figure 124 Internet Connection Properties: Advanced Settings ......................................... 214
List of Figures 23
P-660HW-T v2 User’s Guide
Figure 125 Internet Connection Properties: Advanced Settings: Add ................................. 214
Figure 126 System Tray Icon .............................................................................................. 214
Figure 127 Internet Connection Status ................................................................................ 215
Figure 128 Network Connections ........................................................................................ 216
Figure 129 Network Connections: My Network Places ....................................................... 217
Figure 130 Network Connections: My Network Places: Properties: Example ..................... 217
Figure 131 System General Setup ...................................................................................... 220
Figure 132 System Time Setting ......................................................................................... 221
Figure 133 View Log ........................................................................................................... 226
Figure 134 Log Settings ...................................................................................................... 227
Figure 135 E-mail Log Example .......................................................................................... 229
Figure 136 Firmware Upgrade ............................................................................................ 245
Figure 137 Firmware Upload In Progress ........................................................................... 246
Figure 138 Network Temporarily Disconnected .................................................................. 246
Figure 139 Error Message .................................................................................................. 247
Figure 140 Configuration ..................................................................................................... 247
Figure 141 Configuration Restore Successful ..................................................................... 248
Figure 142 Temporarily Disconnected ................................................................................. 248
Figure 143 Configuration Restore Error .............................................................................. 249
Figure 144 Restart Screen .................................................................................................. 249
Figure 145 Diagnostic: General .......................................................................................... 251
Figure 146 Diagnostic: DSL Line ........................................................................................ 252
Figure 147 Configuration Text File Format: Column Descriptions ....................................... 263
Figure 148 Invalid Parameter Entered: Command Line Example ....................................... 264
Figure 149 Valid Parameter Entered: Command Line Example ......................................... 264
Figure 150 Internal SPTGEN FTP Download Example ...................................................... 265
Figure 151 Internal SPTGEN FTP Upload Example ........................................................... 265
Figure 152 Wall-mounting Example .................................................................................... 279
Figure 153 WIndows 95/98/Me: Network: Configuration ..................................................... 282
Figure 154 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 283
Figure 155 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 284
Figure 156 Windows XP: Start Menu .................................................................................. 285
Figure 157 Windows XP: Control Panel .............................................................................. 285
Figure 158 Windows XP: Control Panel: Network Connections: Properties ....................... 286
Figure 159 Windows XP: Local Area Connection Properties .............................................. 286
Figure 160 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 287
Figure 161 Windows XP: Advanced TCP/IP Properties ...................................................... 288
Figure 162 Windows XP: Internet Protocol (TCP/IP) Properties ......................................... 289
Figure 163 Macintosh OS 8/9: Apple Menu ........................................................................ 290
Figure 164 Macintosh OS 8/9: TCP/IP ................................................................................ 290
Figure 165 Macintosh OS X: Apple Menu ........................................................................... 291
Figure 166 Macintosh OS X: Network ................................................................................. 292
Figure 167 Red Hat 9.0: KDE: Network Configuration: Devices ........................................ 293
24 List of Figures
P-660HW-T v2 User’s Guide
Figure 168 Red Hat 9.0: KDE: Ethernet Device: General ................................................. 293
Figure 169 Red Hat 9.0: KDE: Network Configuration: DNS ............................................. 294
Figure 170 Red Hat 9.0: KDE: Network Configuration: Activate ....................................... 294
Figure 171 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 .............................. 295
Figure 172 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 .................................. 295
Figure 173 Red Hat 9.0: DNS Settings in resolv.conf ...................................................... 295
Figure 174 Red Hat 9.0: Restart Ethernet Card ................................................................ 296
Figure 175 Red Hat 9.0: Checking TCP/IP Properties ...................................................... 296
Figure 176 Displaying Log Categories Example ................................................................. 306
Figure 177 Displaying Log Parameters Example ................................................................ 306
Figure 178 Connecting a POTS Splitter .............................................................................. 317
Figure 179 Connecting a Microfilter .................................................................................... 318
Figure 180 Connecting a Microfilter and Y-Connector ........................................................ 318
Figure 181 ZyXEL Device with ISDN .................................................................................. 319
Figure 182 Peer-to-Peer Communication in an Ad-hoc Network ........................................ 321
Figure 183 Basic Service Set .............................................................................................. 322
Figure 184 Infrastructure WLAN ......................................................................................... 323
Figure 185 RTS/CTS ........................................................................................................... 324
Figure 186 WPA(2) with RADIUS Application Example ...................................................... 332
Figure 187 WPA(2)-PSK Authentication ............................................................................. 332
Figure 188 Pop-up Blocker ................................................................................................. 335
Figure 189 Internet Options ................................................................................................ 336
Figure 190 Internet Options (2) ........................................................................................... 337
Figure 191 Pop-up Blocker Settings ................................................................................... 338
Figure 192 Internet Options (3) ........................................................................................... 339
Figure 193 Security Settings - Java Scripting ..................................................................... 340
Figure 194 Security Settings - Java .................................................................................... 341
Figure 195 Java (Sun) ......................................................................................................... 342
Figure 196 Ideal Setup ........................................................................................................ 343
Figure 197 “Triangle Route” Problem .................................................................................. 344
Figure 198 IP Alias .............................................................................................................. 344
List of Figures 25
P-660HW-T v2 User’s Guide
26 List of Figures
P-660HW-T v2 User’s Guide

List of Tables

Table 1 ADSL Standards .................................................................................................... 33
Table 2 Front Panel LEDs .................................................................................................. 39
Table 3 Web Configurator Screens Summary .................................................................... 44
Table 4 Status Screen ........................................................................................................ 47
Table 5 Status: Any IP Table .............................................................................................. 49
Table 6 Status: WLAN Status ............................................................................................. 50
Table 7 Status: Packet Statistics ........................................................................................ 51
Table 8 Internet Access Wizard Setup: ISP Parameters .................................................... 58
Table 9 Internet Connection with PPPoE ........................................................................... 59
Table 10 Internet Connection with RFC 1483 .................................................................... 60
Table 11 Internet Connection with ENET ENCAP .............................................................. 60
Table 12 Internet Connection with PPPoA ......................................................................... 61
Table 13 Wireless LAN Setup Wizard 1 ............................................................................. 64
Table 14 Wireless LAN Setup Wizard 2 ............................................................................. 65
Table 15 Manually assign a WPA key ................................................................................ 66
Table 16 Manually assign a WEP key ................................................................................ 67
Table 17 Media Bandwidth Management Setup: Services ................................................. 69
Table 18 Bandwidth Management Wizard: General Information ........................................ 71
Table 19 Bandwidth Management Wizard: Configuration .................................................. 72
Table 20 Internet Connection ............................................................................................. 81
Table 21 Advanced Internet Connection Setup .................................................................. 83
Table 22 More Connections ............................................................................................... 85
Table 23 More Connections Edit ........................................................................................ 86
Table 24 More Connections Advanced Setup .................................................................... 88
Table 25 WAN Backup Setup ............................................................................................. 91
Table 26 Types of Encryption for Each Type of Authentication .......................................... 95
Table 27 Wireless LAN: General ........................................................................................ 97
Table 28 Wireless No Security ........................................................................................... 98
Table 29 Wireless: Static WEP Encryption ......................................................................... 99
Table 30 Wireless: WPA-PSK/WPA2-PSK ......................................................................... 100
Table 31 Wireless: WPA/WPA2 .......................................................................................... 102
Table 32 Wireless LAN: Advanced ..................................................................................... 104
Table 33 OTIST .................................................................................................................. 106
Table 34 MAC Address Filter ............................................................................................. 109
Table 35 LAN IP ................................................................................................................. 117
Table 36 Advanced LAN Setup .......................................................................................... 118
Table 37 DHCP Setup ........................................................................................................ 119
Table 38 LAN Client List ..................................................................................................... 121
List of Tables 27
P-660HW-T v2 User’s Guide
Table 39 LAN IP Alias ........................................................................................................ 122
Table 40 NAT Definitions .................................................................................................... 125
Table 41 NAT Mapping Types ............................................................................................ 128
Table 42 NAT General ........................................................................................................ 129
Table 43 Services and Port Numbers ................................................................................. 130
Table 44 NAT Port Forwarding ........................................................................................... 132
Table 45 Port Forwarding Rule Setup ................................................................................ 133
Table 46 Address Mapping Rules ...................................................................................... 134
Table 47 Edit Address Mapping Rule ................................................................................. 135
Table 48 Common IP Ports ................................................................................................ 140
Table 49 ICMP Commands That Trigger Alerts .................................................................. 142
Table 50 Legal NetBIOS Commands ................................................................................. 142
Table 51 Legal SMTP Commands ..................................................................................... 142
Table 52 Firewall: General ................................................................................................. 153
Table 53 Firewall Rules ...................................................................................................... 154
Table 54 Firewall: Edit Rule ................................................................................................ 157
Table 55 Customized Services ........................................................................................... 158
Table 56 Firewall: Configure Customized Services ............................................................ 159
Table 57 Predefined Services ............................................................................................ 163
Table 58 Firewall: Anti Probing ........................................................................................... 166
Table 59 Firewall: Threshold .............................................................................................. 168
Table 60 Content Filter: Keyword ....................................................................................... 172
Table 61 Content Filter: Schedule ...................................................................................... 173
Table 62 Content Filter: Trusted ......................................................................................... 173
Table 63 Static Route .........................................................................................................176
Table 64 Static Route Edit .................................................................................................. 177
Table 65 Application and Subnet-based Bandwidth Management Example ...................... 180
Table 66 Maximize Bandwidth Usage Example ................................................................. 182
Table 67 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ......... 182
Table 68 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ...... 183
Table 69 Bandwidth Management Priorities ....................................................................... 183
Table 70 Over Allotment of Bandwidth Example ................................................................ 184
Table 71 Media Bandwidth Management: Summary .......................................................... 185
Table 72 Bandwidth Management: Rule Setup .................................................................. 186
Table 73 Bandwidth Management Rule Configuration ....................................................... 187
Table 74 Services and Port Numbers ................................................................................. 189
Table 75 Dynamic DNS ...................................................................................................... 192
Table 76 Remote Management: WWW .............................................................................. 197
Table 77 Remote Management: Telnet .............................................................................. 198
Table 78 Remote Management: FTP ................................................................................. 199
Table 79 SNMP Traps ........................................................................................................ 201
Table 80 Remote Management: SNMP .............................................................................. 202
Table 81 Remote Management: DNS ................................................................................ 203
28 List of Tables
P-660HW-T v2 User’s Guide
Table 82 Remote Management: ICMP ............................................................................... 204
Table 83 TR-069 Commands ............................................................................................. 205
Table 84 Configuring UPnP ................................................................................................ 209
Table 85 System General Setup ........................................................................................ 220
Table 86 System Time Setting ............................................................................................ 222
Table 87 View Log .............................................................................................................. 226
Table 88 Log Settings .........................................................................................................227
Table 89 System Maintenance Logs .................................................................................. 229
Table 90 System Error Logs ............................................................................................... 230
Table 91 Access Control Logs ............................................................................................ 231
Table 92 TCP Reset Logs .................................................................................................. 231
Table 93 Packet Filter Logs ................................................................................................ 232
Table 94 ICMP Logs ........................................................................................................... 232
Table 95 CDR Logs ............................................................................................................ 233
Table 96 PPP Logs .............................................................................................................233
Table 97 UPnP Logs .......................................................................................................... 233
Table 98 Content Filtering Logs ......................................................................................... 233
Table 99 Attack Logs ..........................................................................................................234
Table 100 IPSec Logs ........................................................................................................ 235
Table 101 IKE Logs ............................................................................................................236
Table 102 PKI Logs ............................................................................................................238
Table 103 Certificate Path Verification Failure Reason Codes ........................................... 239
Table 104 802.1X Logs ...................................................................................................... 240
Table 105 ACL Setting Notes ............................................................................................. 241
Table 106 ICMP Notes ....................................................................................................... 242
Table 107 Syslog Logs ....................................................................................................... 243
Table 108 RFC-2408 ISAKMP Payload Types ................................................................... 243
Table 109 Firmware Upgrade ............................................................................................. 245
Table 110 Maintenance Restore Configuration .................................................................. 248
Table 111 Diagnostic: General ............................................................................................ 251
Table 112 Diagnostic: DSL Line ......................................................................................... 252
Table 113 Troubleshooting Starting Up Your ZyXEL Device .............................................. 253
Table 114 Troubleshooting the LAN ................................................................................... 253
Table 115 Troubleshooting the WAN .................................................................................. 254
Table 116 Troubleshooting Accessing the ZyXEL Device .................................................. 255
Table 117 Device Specifications ......................................................................................... 257
Table 118 Firmware ............................................................................................................258
Table 119 Abbreviations Used in the Example Internal SPTGEN Screens Table .............. 266
Table 120 Menu 1 General Setup ...................................................................................... 266
Table 121 Menu 3 ............................................................................................................... 266
Table 122 Menu 4 Internet Access Setup .......................................................................... 270
Table 123 Menu 12 .............................................................................................................271
Table 124 Menu 15 SUA Server Setup .............................................................................. 272
List of Tables 29
P-660HW-T v2 User’s Guide
Table 125 Menu 21.1 Filter Set #1 ..................................................................................... 273
Table 126 Menu 21.1 Filer Set #2, ..................................................................................... 275
Table 127 Menu 23 System Menus .................................................................................... 276
Table 128 Menu 24.11 Remote Management Control ........................................................ 277
Table 129 Command Examples ......................................................................................... 278
Table 130 Classes of IP Addresses ................................................................................... 297
Table 131 Allowed IP Address Range By Class ................................................................. 298
Table 132 “Natural” Masks ................................................................................................. 298
Table 133 Alternative Subnet Mask Notation ..................................................................... 299
Table 134 Two Subnets Example ....................................................................................... 300
Table 135 Subnet 1 ............................................................................................................300
Table 136 Subnet 2 ............................................................................................................300
Table 137 Subnet 1 ............................................................................................................301
Table 138 Subnet 2 ............................................................................................................301
Table 139 Subnet 3 ............................................................................................................302
Table 140 Subnet 4 ............................................................................................................302
Table 141 Eight Subnets .................................................................................................... 302
Table 142 Class C Subnet Planning ................................................................................... 303
Table 143 Class B Subnet Planning ................................................................................... 303
Table 144 Firewall Commands ........................................................................................... 309
Table 145 NetBIOS Filter Default Settings ......................................................................... 316
Table 146 IEEE 802.11g ..................................................................................................... 325
Table 147 Wireless Security Levels ................................................................................... 326
Table 148 Comparison of EAP Authentication Types ......................................................... 329
Table 149 Wireless Security Relational Matrix ................................................................... 333
30 List of Tables
Loading...
+ 321 hidden pages