ZyXEL Communications P660WTXV2 Users manual

P-660W-Tx v2
ADSL Router over POTS/ISDN
User’s Guide
Version 3.40 03/2008 Edition 2
IP Address http://192.168.1.1
Password 1234
www.zyxel.com
About This User's Guide
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the ZyXEL Device using the web configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.
Related Documentation
• Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary
information.
• Command Reference Guide The Command Reference Guide explains how to use the Command-Line Interface (CLI)
and CLI commands to configure the ZyXEL Device.
" It is recommended you use the web configurator to configure the ZyXEL
Device.
• Supporting Disk Refer to the included CD for support documents.
• ZyXEL Web Site Please refer to www.zyxel.com
certifications.
User’s Guide Feedback
Help us help you. Send all User’s Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you!
The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
for additional support documentation and product
P-660W-Tx v2 User’s Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your ZyXEL Device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The P-660W-T1 v2 and the P-660W-T3 v2 may be referred to as the “ZyXEL Device”, the “P-660W-Tx v2”, the “device”, the “system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and upper case text, for example, [ENTER] means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key. “Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket (>) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is not an exact representation of your ZyXEL Device.
4
P-660W-Tx v2 User’s Guide
Table 1 Common Icons
ZyXEL Device Computer Notebook
Server Printer Telephone
Switch Router Internet Cloud
Document Conventions
Firewall Modem Wireless Signal
Television DSLAM
P-660W-Tx v2 User’s Guide
5
Safety Warnings
Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• ONLY qualified service personnel should service or disassemble this device.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device. Connect it to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
• Use ONLY power wires of the appropriate wire gauge (see Chapter 20 on page 201 for details) for your device. Connect it to a power supply of the correct voltage (see Chapter
20 on page 201 for details).
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
• If the power adaptor or cord is damaged, remove it from the device and the power source.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s).
• If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged.
6
This product is recyclable. Dispose of it properly.
P-660W-Tx v2 User’s Guide
Safety Warnings
P-660W-Tx v2 User’s Guide
7
Safety Warnings
8
P-660W-Tx v2 User’s Guide
Contents Overview
Contents Overview
Introduction ............................................................................................................................27
Introducing the ZyXEL Device ...................................................................................................29
Introducing the Web Configurator .............................................................................................. 33
Setup Wizard .......................................................................................................................... 39
Connection Setup Wizard.......................................................................................................... 41
Media Bandwidth Management Wizard ..................................................................................... 49
Advanced Setup .....................................................................................................................53
LAN Setup ................................................................................................................................. 55
Wireless LAN ............................................................................................................................. 65
WAN Setup ................................................................................................................................ 81
Network Address Translation (NAT) Screens ............................................................................ 93
Dynamic DNS Setup ................................................................................................................ 103
Time and Date ......................................................................................................................... 105
Firewalls .................................................................................................................................. 107
Firewall Configuration ...............................................................................................................119
Content Filtering ...................................................................................................................... 139
Remote Management Configuration ........................................................................................ 143
Universal Plug-and-Play (UPnP) ............................................................................................. 147
Logs Screens ........................................................................................................................... 159
Media Bandwidth Management Advanced Setup .................................................................... 165
Maintenance .........................................................................................................................179
Maintenance ............................................................................................................................ 181
Troubleshooting and Specifications ..................................................................................193
Troubleshooting ....................................................................................................................... 195
Product Specifications ............................................................................................................. 201
Appendices ...........................................................................................................................207
P-660W-Tx v2 User’s Guide
9
Contents Overview
10
P-660W-Tx v2 User’s Guide
Table of Contents
Table of Contents
About This User's Guide ..........................................................................................................3
Document Conventions............................................................................................................4
Safety Warnings........................................................................................................................6
Contents Overview ...................................................................................................................9
Table of Contents....................................................................................................................11
List of Figures .........................................................................................................................19
List of Tables...........................................................................................................................23
Part I: Introduction................................................................................. 27
Chapter 1
Introducing the ZyXEL Device...............................................................................................29
1.1 Overview .............................................................................................................................. 29
1.2 Ways to Manage the ZyXEL Device .................................................................................... 29
1.3 Good Habits for Managing the ZyXEL Device ..................................................................... 30
1.4 LEDs .................................................................................................................................... 30
Chapter 2
Introducing the Web Configurator ........................................................................................33
2.1 Web Configurator Overview ................................................................................................. 33
2.1.1 Accessing the Web Configurator ................................................................................ 33
2.1.2 Resetting the ZyXEL Device ...................................................................................... 34
2.1.3 Navigating the Web Configurator ............................................................................... 34
2.2 Change Login Password .................................................................................................... 37
Part II: Setup Wizard .............................................................................. 39
Chapter 3
Connection Setup Wizard ......................................................................................................41
3.1 Introduction .......................................................................................................................... 41
3.1.1 Internet Access Wizard Setup .................................................................................... 41
P-660W-Tx v2 User’s Guide
11
Table of Contents
Chapter 4
Media Bandwidth Management Wizard.................................................................................49
4.1 Introduction .......................................................................................................................... 49
4.1.1 Media Bandwidth Management Wizard ..................................................................... 49
Part III: Advanced Setup........................................................................ 53
Chapter 5
LAN Setup................................................................................................................................55
5.1 LAN Overview ..................................................................................................................... 55
5.1.1 LANs, WANs and the ZyXEL Device .......................................................................... 55
5.1.2 DHCP Setup ...............................................................................................................56
5.1.3 DNS Server Address .................................................................................................. 56
5.1.4 DNS Server Address Assignment .............................................................................. 56
5.2 LAN TCP/IP ......................................................................................................................... 57
5.2.1 IP Address and Subnet Mask ..................................................................................... 57
5.2.2 RIP Setup ................................................................................................................... 58
5.2.3 Multicast ..................................................................................................................... 58
5.2.4 Any IP ......................................................................................................................... 59
5.3 Configuring LAN ................................................................................................................. 60
5.4 Configuring Static DHCP .................................................................................................... 62
Chapter 6
Wireless LAN...........................................................................................................................65
6.1 Wireless Network Overview ................................................................................................. 65
6.2 Wireless Security Overview .................................................................................................66
6.2.1 SSID ........................................................................................................................... 66
6.2.2 MAC Address Filter .................................................................................................... 66
6.2.3 User Authentication .................................................................................................... 66
6.2.4 Encryption .................................................................................................................. 67
6.3 Additional Wireless Terms ................................................................................................... 68
6.4 The Main Wireless LAN Screen .......................................................................................... 68
6.5 Configuring the Wireless Screen ........................................................................................ 70
6.5.1 No Security ................................................................................................................. 71
6.5.2 WEP Encryption ......................................................................................................... 72
6.5.3 WPA-PSK/WPA2-PSK ................................................................................................ 73
6.5.4 WPA/WPA2 ................................................................................................................ 75
6.6 Configuring MAC Filters ................................................................................................... 77
6.7 WDS Screen ........................................................................................................................ 79
Chapter 7
WAN Setup............................................................................................................................... 81
12
P-660W-Tx v2 User’s Guide
Table of Contents
7.1 WAN Overview ................................................................................................................... 81
7.1.1 Encapsulation ............................................................................................................. 81
7.1.2 Multiplexing ................................................................................................................ 82
7.1.3 VPI and VCI ............................................................................................................... 82
7.1.4 IP Address Assignment .............................................................................................. 82
7.1.5 Nailed-Up Connection (PPP) ..................................................................................... 83
7.1.6 NAT ............................................................................................................................ 83
7.2 Metric .................................................................................................................................. 83
7.3 PPPoE Encapsulation ......................................................................................................... 84
7.4 Traffic Shaping ..................................................................................................................... 84
7.5 Zero Configuration Internet Access ..................................................................................... 85
7.6 The Main WAN Screen .......................................................................................................85
7.7 Configuring WAN Setup ...................................................................................................... 86
7.8 Traffic Redirect .................................................................................................................... 90
7.9 Configuring WAN Backup ................................................................................................... 90
Chapter 8
Network Address Translation (NAT) Screens.......................................................................93
8.1 NAT Overview ..................................................................................................................... 93
8.1.1 NAT Definitions ..........................................................................................................93
8.1.2 What NAT Does ......................................................................................................... 94
8.1.3 How NAT Works ......................................................................................................... 94
8.1.4 NAT Application ..........................................................................................................94
8.1.5 NAT Mapping Types ................................................................................................... 95
8.2 SUA (Single User Account) Versus NAT ............................................................................. 96
8.3 SUA Server .......................................................................................................................... 96
8.3.1 Default Server IP Address .......................................................................................... 97
8.3.2 Port Forwarding: Services and Port Numbers ............................................................ 97
8.3.3 Configuring Servers Behind SUA (Example) ............................................................. 97
8.4 Selecting the NAT Mode ..................................................................................................... 98
8.5 Configuring SUA Server Set ............................................................................................... 98
8.6 Configuring Address Mapping Rules .................................................................................. 99
8.7 Editing an Address Mapping Rule .................................................................................... 101
Chapter 9
Dynamic DNS Setup .............................................................................................................103
9.1 Dynamic DNS Overview ................................................................................................... 103
9.1.1 DYNDNS Wildcard ................................................................................................... 103
9.2 Configuring Dynamic DNS ................................................................................................. 103
Chapter 10
Time and Date .......................................................................................................................105
10.1 Configuring Time and Date ............................................................................................. 105
P-660W-Tx v2 User’s Guide
13
Table of Contents
Chapter 11
Firewalls.................................................................................................................................107
11.1 Firewall Overview ............................................................................................................ 107
11.2 Types of Firewalls ............................................................................................................ 107
11.2.1 Packet Filtering Firewalls ....................................................................................... 107
11.2.2 Application-level Firewalls ...................................................................................... 108
11.2.3 Stateful Inspection Firewalls .................................................................................. 108
11.3 Introduction to ZyXEL’s Firewall ....................................................................................... 108
11.3.1 Denial of Service Attacks ....................................................................................... 109
11.4 Denial of Service .............................................................................................................. 109
11.4.1 Basics ..................................................................................................................... 109
11.4.2 Types of DoS Attacks ..............................................................................................110
11.5 Stateful Inspection .............................................................................................................113
11.5.1 Stateful Inspection Process .....................................................................................114
11.5.2 Stateful Inspection and the ZyXEL Device ..............................................................114
11.5.3 TCP Security ...........................................................................................................115
11.5.4 UDP/ICMP Security .................................................................................................115
11.5.5 Upper Layer Protocols .............................................................................................116
11.6 Guidelines for Enhancing Security with Your Firewall .......................................................116
11.6.1 Security In General ..................................................................................................116
11.7 Packet Filtering Vs Firewall ...............................................................................................117
11.7.1 Packet Filtering: .......................................................................................................117
11.7.2 Firewall ....................................................................................................................118
Chapter 12
Firewall Configuration ..........................................................................................................119
12.1 Access Methods ...............................................................................................................119
12.2 Firewall Policies Overview ...............................................................................................119
12.3 Rule Logic Overview ....................................................................................................... 120
12.3.1 Rule Checklist ........................................................................................................ 120
12.3.2 Security Ramifications ............................................................................................ 120
12.3.3 Key Fields For Configuring Rules .......................................................................... 121
12.4 Connection Direction ....................................................................................................... 121
12.4.1 LAN to WAN Rules ................................................................................................. 121
12.4.2 Alerts ...................................................................................................................... 122
12.5 The Main Firewall Screen ................................................................................................ 122
12.6 Configuring Default Firewall Policy ............................................................................... 122
12.7 Rule Summary ............................................................................................................... 123
12.7.1 Configuring Firewall Rules ................................................................................... 125
12.8 Customized Services ......................................................................................................128
12.9 Configuring A Customized Service ................................................................................. 128
12.10 Example Firewall Rule ................................................................................................... 129
12.11 Predefined Services ....................................................................................................... 133
14
P-660W-Tx v2 User’s Guide
Table of Contents
12.12 Anti-Probing ................................................................................................................... 134
12.13 DoS Thresholds ............................................................................................................ 135
12.13.1 Threshold Values ................................................................................................. 135
12.13.2 Half-Open Sessions ............................................................................................. 135
12.13.3 Configuring Firewall Thresholds ........................................................................... 136
Chapter 13
Content Filtering ...................................................................................................................139
13.1 Content Filtering Overview ............................................................................................. 139
13.2 The Main Content Filter Screen ....................................................................................... 139
13.3 Configuring Keyword Blocking ........................................................................................ 140
13.4 Configuring the Schedule ............................................................................................... 141
13.5 Configuring Trusted Computers ...................................................................................... 141
Chapter 14
Remote Management Configuration ...................................................................................143
14.1 Remote Management Overview ..................................................................................... 143
14.1.1 Remote Management Limitations .......................................................................... 143
14.1.2 Remote Management and NAT .............................................................................. 144
14.1.3 System Timeout .................................................................................................... 144
14.2 Telnet ............................................................................................................................... 144
14.3 FTP .................................................................................................................................. 144
14.4 Web ................................................................................................................................. 145
14.5 Configuring Remote Management .................................................................................. 145
Chapter 15
Universal Plug-and-Play (UPnP).......................................................................................... 147
15.1 Introducing Universal Plug and Play ............................................................................... 147
15.1.1 How do I know if I'm using UPnP? ......................................................................... 147
15.1.2 NAT Traversal ........................................................................................................ 147
15.1.3 Cautions with UPnP ............................................................................................... 147
15.2 UPnP and ZyXEL ............................................................................................................148
15.2.1 Configuring UPnP ................................................................................................. 148
15.3 Installing UPnP in Windows Example .............................................................................. 149
15.4 Using UPnP in Windows XP Example ............................................................................. 152
Chapter 16
Logs Screens ........................................................................................................................159
16.1 Logs Overview ................................................................................................................ 159
16.1.1 Alerts and Logs ...................................................................................................... 159
16.2 Configuring Log Settings ................................................................................................. 159
16.3 Displaying the Logs ........................................................................................................ 161
16.3.1 Example E-mail Log ............................................................................................... 162
P-660W-Tx v2 User’s Guide
15
Table of Contents
Chapter 17
Media Bandwidth Management Advanced Setup .............................................................. 165
17.1 Media Bandwidth Management Overview ...................................................................... 165
17.2 Bandwidth Classes and Filters ........................................................................................ 165
17.3 Proportional Bandwidth Allocation ................................................................................... 166
17.4 Bandwidth Management Usage Examples ...................................................................... 166
17.4.1 Application-based Bandwidth Management Example ............................................ 166
17.4.2 Subnet-based Bandwidth Management Example .................................................. 166
17.4.3 Application and Subnet-based Bandwidth Management Example ........................ 167
17.5 Scheduler ........................................................................................................................ 167
17.5.1 Priority-based Scheduler ........................................................................................ 168
17.5.2 Fairness-based Scheduler ..................................................................................... 168
17.6 Maximize Bandwidth Usage ............................................................................................ 168
17.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic .......................................... 168
17.6.2 Maximize Bandwidth Usage Example .................................................................... 168
17.7 Bandwidth Borrowing .......................................................................................................170
17.7.1 Maximize Bandwidth Usage With Bandwidth Borrowing ........................................ 170
17.8 The Main Media Bandwidth Management Screen .......................................................... 171
17.9 Configuring Summary ..................................................................................................... 171
17.10 Configuring Class Setup ............................................................................................... 172
17.10.1 Media Bandwidth Management Class Configuration ......................................... 173
17.10.2 Media Bandwidth Management Statistics ........................................................... 176
17.11 Bandwidth Monitor ....................................................................................................... 177
Part IV: Maintenance............................................................................ 179
Chapter 18
Maintenance ..........................................................................................................................181
18.1 Maintenance Overview .................................................................................................... 181
18.2 System Status Screen .................................................................................................... 181
18.2.1 System Statistics .................................................................................................... 183
18.3 DHCP Table Screen ....................................................................................................... 185
18.4 Any IP Table Screen ....................................................................................................... 185
18.5 Wireless Screen ............................................................................................................. 186
18.5.1 Association List ..................................................................................................... 186
18.6 Diagnostic Screens .......................................................................................................... 187
18.6.1 General Diagnostic ................................................................................................ 187
18.6.2 DSL Line Diagnostic ............................................................................................. 188
18.7 Firmware Upgrade .......................................................................................................... 189
18.8 FTP Command Line ........................................................................................................ 190
18.8.1 Filename Conventions .......................................................................................... 191
16
P-660W-Tx v2 User’s Guide
Table of Contents
18.8.2 FTP Command Line Procedure ............................................................................. 191
18.8.3 GUI-based FTP Clients .......................................................................................... 192
18.8.4 FTP Restrictions .................................................................................................... 192
Part V: Troubleshooting and Specifications...................................... 193
Chapter 19
Troubleshooting....................................................................................................................195
19.1 Power, Hardware Connections, and LEDs ...................................................................... 195
19.2 ZyXEL Device Access and Login .................................................................................... 196
19.3 Internet Access ................................................................................................................ 197
19.4 Reset the ZyXEL Device to Its Factory Defaults .............................................................. 198
19.5 Wireless Router/AP Troubleshooting ............................................................................... 199
Chapter 20
Product Specifications.........................................................................................................201
20.1 General ZyXEL Device Specifications ............................................................................. 201
20.2 Wall-mounting Instructions .............................................................................................. 205
20.3 Power Adaptor Specifications .......................................................................................... 206
Part VI: Appendices ............................................................................. 207
Appendix A Pop-up Windows, JavaScripts and Java Permissions ...................................... 209
Appendix B Wireless LANs ..................................................................................................217
Appendix C Common Services ............................................................................................231
Appendix D Legal Information ..............................................................................................235
Appendix E Customer Support .............................................................................................241
Index.......................................................................................................................................247
P-660W-Tx v2 User’s Guide
17
Table of Contents
18
P-660W-Tx v2 User’s Guide
List of Figures
List of Figures
Figure 1 High-speed Internet Access with the ZyXEL Device ................................................................ 29
Figure 2 Password Screen ..................................................................................................................... 34
Figure 3 Change Password at Login ...................................................................................................... 34
Figure 4 Web Configurator: Site Map Screen ....................................................................................... 35
Figure 5 Password .................................................................................................................................. 37
Figure 6 Internet Access Wizard Setup: ISP Parameters ....................................................................... 42
Figure 7 Internet Connection with PPPoE .............................................................................................. 43
Figure 8 Internet Connection with RFC 1483 ........................................................................................ 44
Figure 9 Internet Connection with ENET ENCAP ...................................................................................44
Figure 10 Internet Connection with PPPoA ............................................................................................ 45
Figure 11 Internet Access Wizard Setup: Third Screen .......................................................................... 46
Figure 12 Internet Access Wizard Setup: LAN Configuration ................................................................ 46
Figure 13 Internet Access Wizard Setup: Connection Tests .................................................................. 47
Figure 14 MBM Wizard: Media Bandwidth Management ...................................................................... 50
Figure 15 MBM Wizard: Media Bandwidth Management ...................................................................... 51
Figure 16 LAN and WAN IP Addresses .................................................................................................. 55
Figure 17 Any IP Example ...................................................................................................................... 59
Figure 18 LAN Setup .............................................................................................................................. 61
Figure 19 LAN > Static DHCP ................................................................................................................ 62
Figure 20 Example of a Wireless Network ............................................................................................. 65
Figure 21 Wireless LAN .......................................................................................................................... 69
Figure 22 Wireless Security Methods ..................................................................................................... 69
Figure 23 Network > Wireless LAN ....................................................................................................... 70
Figure 24 Network > Wireless LAN: No Security ................................................................................... 71
Figure 25 Wireless Screen ..................................................................................................................... 72
Figure 26 Network > Wireless LAN: WPA-PSK/ .....................................................................................74
Figure 27 Network > Wireless LAN > General: WPA/WPA2 ................................................................... 75
Figure 28 MAC Filter .............................................................................................................................. 78
Figure 29 Connecting Wireless Networks Using WDS .......................................................................... 79
Figure 30 Advanced Setup > Wireless LAN > WDS ............................................................................... 80
Figure 31 Example of Traffic Shaping .................................................................................................... 85
Figure 32 WAN ...................................................................................................................................... 85
Figure 33 WAN Setup (PPPoE) .............................................................................................................. 87
Figure 34 Traffic Redirect Example ........................................................................................................ 90
Figure 35 Traffic Redirect LAN Setup ..................................................................................................... 90
Figure 36 WAN Backup .......................................................................................................................... 91
Figure 37 How NAT Works ..................................................................................................................... 94
Figure 38 NAT Application With IP Alias ................................................................................................ 95
P-660W-Tx v2 User’s Guide
19
List of Figures
Figure 39 Multiple Servers Behind NAT Example ..................................................................................97
Figure 40 NAT Mode .............................................................................................................................. 98
Figure 41 Edit SUA/NAT Server Set ....................................................................................................... 99
Figure 42 Address Mapping Rules ....................................................................................................... 100
Figure 43 Edit Address Mapping Rule ................................................................................................. 101
Figure 44 Dynamic DNS ....................................................................................................................... 104
Figure 45 Time and Date ...................................................................................................................... 105
Figure 46 ZyXEL Device Firewall Application ....................................................................................... 109
Figure 47 Three-Way Handshake ..........................................................................................................110
Figure 48 SYN Flood ............................................................................................................................. 111
Figure 49 Smurf Attack ..........................................................................................................................112
Figure 50 Stateful Inspection .................................................................................................................113
Figure 51 Content Filtering .................................................................................................................. 122
Figure 52 Firewall: Default Policy ......................................................................................................... 123
Figure 53 Firewall: Rule Summary ...................................................................................................... 124
Figure 54 Firewall: Edit Rule ................................................................................................................ 126
Figure 55 Firewall: Customized Services ............................................................................................. 128
Figure 56 Firewall: Configure Customized Services ............................................................................. 129
Figure 57 Firewall Example: Rule Summary ........................................................................................ 130
Figure 58 Firewall Example: Edit Rule: Destination Address .............................................................. 130
Figure 59 Edit Custom Port Example ................................................................................................... 131
Figure 60 Firewall Example: Edit Rule: Select Customized Services ................................................... 132
Figure 61 Firewall Example: Rule Summary: My Service ................................................................... 133
Figure 62 Firewall: Anti Probing ........................................................................................................... 134
Figure 63 Firewall: Threshold ............................................................................................................... 136
Figure 64 Content Filtering .................................................................................................................. 139
Figure 65 Content Filter: Keyword ........................................................................................................ 140
Figure 66 Content Filter: Schedule ....................................................................................................... 141
Figure 67 Content Filter: Trusted .......................................................................................................... 141
Figure 68 Telnet Configuration on a TCP/IP Network ........................................................................... 144
Figure 69 Remote Management ........................................................................................................... 145
Figure 70 Configuring UPnP ................................................................................................................. 148
Figure 71 Add/Remove Programs: Windows Setup: Communication .................................................. 149
Figure 72 Add/Remove Programs: Windows Setup: Communication: Components ............................ 150
Figure 73 Network Connections ........................................................................................................... 150
Figure 74 Windows Optional Networking Components Wizard ............................................................ 151
Figure 75 Networking Services ............................................................................................................. 151
Figure 76 Network Connections ........................................................................................................... 152
Figure 77 Internet Connection Properties ............................................................................................ 153
Figure 78 Internet Connection Properties: Advanced Settings ............................................................. 154
Figure 79 Internet Connection Properties: Advanced Settings: Add .................................................... 154
Figure 80 System Tray Icon .................................................................................................................. 155
Figure 81 Internet Connection Status ................................................................................................... 155
20
P-660W-Tx v2 User’s Guide
List of Figures
Figure 82 Network Connections ........................................................................................................... 156
Figure 83 Network Connections: My Network Places .......................................................................... 157
Figure 84 Network Connections: My Network Places: Properties: Example ........................................ 157
Figure 85 Log Settings ......................................................................................................................... 160
Figure 86 View Logs ............................................................................................................................. 162
Figure 87 E-mail Log Example ............................................................................................................. 163
Figure 88 Application-based Bandwidth Management Example .......................................................... 166
Figure 89 Subnet-based Bandwidth Management Example ................................................................ 167
Figure 90 Application and Subnet-based Bandwidth Management Example ....................................... 167
Figure 91 Bandwidth Allotment Example .............................................................................................. 169
Figure 92 Maximize Bandwidth Usage Example .................................................................................. 170
Figure 93 Media Bandwidth Mgnt. ....................................................................................................... 171
Figure 94 Media Bandwidth Management: Summary .......................................................................... 171
Figure 95 Media Bandwidth Management: Class Setup ...................................................................... 173
Figure 96 Media Bandwidth Management: Class Configuration .......................................................... 174
Figure 97 Media Bandwidth Management Statistics ............................................................................ 176
Figure 98 Media Bandwidth Management: Monitor ............................................................................. 177
Figure 99 System Status ...................................................................................................................... 182
Figure 100 System Status: Show Statistics .......................................................................................... 184
Figure 101 DHCP Table ........................................................................................................................ 185
Figure 102 Any IP Table ....................................................................................................................... 186
Figure 103 Association List .................................................................................................................. 186
Figure 104 Diagnostic: General ............................................................................................................ 187
Figure 105 Diagnostic: DSL Line .......................................................................................................... 188
Figure 106 Firmware Upgrade .............................................................................................................. 189
Figure 107 Network Temporarily Disconnected ....................................................................................190
Figure 108 Error Message .................................................................................................................... 190
Figure 109 Wall-mounting Example ...................................................................................................... 205
Figure 110 Masonry Plug and M4 Tap Screw .......................................................................................206
Figure 111 Pop-up Blocker ................................................................................................................... 209
Figure 112 Internet Options: Privacy .................................................................................................... 210
Figure 113 Internet Options: Privacy .....................................................................................................211
Figure 114 Pop-up Blocker Settings ......................................................................................................211
Figure 115 Internet Options: Security ................................................................................................... 212
Figure 116 Security Settings - Java Scripting ....................................................................................... 213
Figure 117 Security Settings - Java ...................................................................................................... 213
Figure 118 Java (Sun) .......................................................................................................................... 214
Figure 119 Mozilla Firefox: Tools > Options .......................................................................................... 215
Figure 120 Mozilla Firefox Content Security ......................................................................................... 215
Figure 121 Peer-to-Peer Communication in an Ad-hoc Network ......................................................... 217
Figure 122 Basic Service Set ............................................................................................................... 218
Figure 123 Infrastructure WLAN ........................................................................................................... 219
Figure 124 RTS/CTS ............................................................................................................................ 220
P-660W-Tx v2 User’s Guide
21
List of Figures
Figure 125 WPA(2) with RADIUS Application Example ....................................................................... 227
Figure 126 WPA(2)-PSK Authentication ............................................................................................... 228
22
P-660W-Tx v2 User’s Guide
List of Tables
List of Tables
Table 1 Common Icons ............................................................................................................................ 5
Table 2 Front Panel LEDs ...................................................................................................................... 30
Table 3 Web Configurator Screens Summary ....................................................................................... 35
Table 4 Password .................................................................................................................................. 37
Table 5 Internet Access Wizard Setup: ISP Parameters ....................................................................... 42
Table 6 Internet Connection with PPPoE ............................................................................................... 43
Table 7 Internet Connection with RFC 1483 .......................................................................................... 44
Table 8 Internet Connection with ENET ENCAP ...................................................................................44
Table 9 Internet Connection with PPPoA ............................................................................................... 45
Table 10 Internet Access Wizard Setup: LAN Configuration ................................................................. 47
Table 11 MBM Wizard: Media Bandwidth Management ........................................................................ 50
Table 12 MBM Wizard: Media Bandwidth Management ........................................................................ 51
Table 13 LAN Setup ............................................................................................................................... 61
Table 14 LAN Setup ............................................................................................................................... 63
Table 15 Types of Encryption for Each Type of Authentication ............................................................. 67
Table 16 Additional Wireless Terms ....................................................................................................... 68
Table 17 Wireless LAN .......................................................................................................................... 69
Table 18 Network > Wireless LAN > General ........................................................................................ 70
Table 19 Wireless No Security ............................................................................................................... 72
Table 20 Wireless LAN .......................................................................................................................... 73
Table 21 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK .................................................. 74
Table 22 Network > Wireless LAN > General: WPA/WPA2 ................................................................... 76
Table 23 MAC Filter ............................................................................................................................... 78
Table 24 Advanced Setup > Wireless LAN > WDS ............................................................................... 80
Table 25 WAN ........................................................................................................................................ 86
Table 26 WAN Setup ............................................................................................................................. 88
Table 27 WAN Backup ........................................................................................................................... 91
Table 28 NAT Definitions ....................................................................................................................... 93
Table 29 NAT Mapping Types ................................................................................................................ 96
Table 30 Services and Port Numbers .................................................................................................... 97
Table 31 NAT Mode ............................................................................................................................... 98
Table 32 Edit SUA/NAT Server Set ....................................................................................................... 99
Table 33 Address Mapping Rules ........................................................................................................ 100
Table 34 Edit Address Mapping Rule .................................................................................................. 102
Table 35 Dynamic DNS ....................................................................................................................... 104
Table 36 Time and Date ....................................................................................................................... 106
Table 37 Common IP Ports ...................................................................................................................110
Table 38 ICMP Commands That Trigger Alerts ....................................................................................112
P-660W-Tx v2 User’s Guide
23
List of Tables
Table 39 Legal NetBIOS Commands ....................................................................................................112
Table 40 Legal SMTP Commands .......................................................................................................112
Table 41 Firewall > Firewall Functions ................................................................................................. 122
Table 42 Firewall: Default Policy .......................................................................................................... 123
Table 43 Rule Summary ...................................................................................................................... 124
Table 44 Firewall: Edit Rule ................................................................................................................. 127
Table 45 Customized Services ............................................................................................................ 128
Table 46 Firewall: Configure Customized Services ............................................................................. 129
Table 47 Firewall: Anti Probing ............................................................................................................ 134
Table 48 Firewall: Threshold ................................................................................................................ 137
Table 49 Content Filter > Functions ..................................................................................................... 139
Table 50 Content Filter: Keyword ........................................................................................................ 140
Table 51 Content Filter: Schedule ....................................................................................................... 141
Table 52 Content Filter: Trusted .......................................................................................................... 142
Table 53 Remote Management ........................................................................................................... 145
Table 54 Configuring UPnP ................................................................................................................. 148
Table 55 Log Settings .......................................................................................................................... 160
Table 56 View Logs ............................................................................................................................. 162
Table 57 Application and Subnet-based Bandwidth Management Example ....................................... 167
Table 58 Media Bandwidth Mgnt. ........................................................................................................ 171
Table 59 Media Bandwidth Management: Summary ........................................................................... 172
Table 60 Media Bandwidth Management: Class Setup ....................................................................... 173
Table 61 Media Bandwidth Management: Class Configuration ........................................................... 174
Table 62 Services and Port Numbers .................................................................................................. 175
Table 63 Media Bandwidth Management Statistics ............................................................................. 176
Table 64 Media Bandwidth Management: Monitor .............................................................................. 177
Table 65 System Status ....................................................................................................................... 182
Table 66 System Status: Show Statistics ............................................................................................. 184
Table 67 DHCP Table .......................................................................................................................... 185
Table 68 Any IP Table .......................................................................................................................... 186
Table 69 Association List ..................................................................................................................... 187
Table 70 Diagnostic: General .............................................................................................................. 188
Table 71 Diagnostic: DSL Line ............................................................................................................ 188
Table 72 Firmware Upgrade ................................................................................................................ 189
Table 73 Filename Conventions .......................................................................................................... 191
Table 74 General Commands for GUI-based FTP Clients .................................................................. 192
Table 75 Hardware Specifications ....................................................................................................... 201
Table 76 Firmware Specifications ........................................................................................................ 202
Table 77 Standards Supported ............................................................................................................ 203
Table 78 Power Adaptor Specifications ............................................................................................... 206
Table 79 IEEE 802.11g ........................................................................................................................ 221
Table 80 Wireless Security Levels ....................................................................................................... 222
Table 81 Comparison of EAP Authentication Types ............................................................................ 225
24
P-660W-Tx v2 User’s Guide
List of Tables
Table 82 Wireless Security Relational Matrix ...................................................................................... 228
Table 83 Commonly Used Services ..................................................................................................... 231
P-660W-Tx v2 User’s Guide
25
List of Tables
26
P-660W-Tx v2 User’s Guide
PART I
Introduction
Introducing the ZyXEL Device (29)
Introducing the Web Configurator (33)
27
28
CHAPTER 1
Introducing the ZyXEL Device
This chapter introduces the main applications and features of the ZyXEL Device. It also introduces the ways you can manage the ZyXEL Device.
1.1 Overview
The ZyXEL Device is an ADSL2+ gateway that allows fast, secure Internet access over analog (POTS) or digital (ISDN) telephone lines (depending on your model).
The ZyXEL Device is an ADSL (Asymmetric Digital Subscriber Line) router and modem with wireless capability. See Chapter 20 on page 201 for a complete list of features.
Figure 1 High-speed Internet Access with the ZyXEL Device
Connect your computer(s) to the ZyXEL Device. The ZyXEL Device uses the phone line to provide high-speed Internet access to the computer(s). You can continue to use the phone line for regular phone calls as well. See the Quick Start Guide for instructions on making these connections.
1.2 Ways to Manage the ZyXEL Device
Use any of the following methods to manage the ZyXEL Device.
• Web Configurator. This is recommended for everyday management of the ZyXEL Device using a (supported) web browser. See Chapter 2 on page 33.
• Command Line Interface. Line commands are mostly used for troubleshooting by service engineers. See the CLI Reference Guide.
INTERNET
P-660W-Tx v2 User’s Guide
29
Chapter 1 Introducing the ZyXEL Device
• FTP. Use File Transfer Protocol for firmware upgrades and configuration backup/restore. See Chapter 18 on page 190.
1.3 Good Habits for Managing the ZyXEL Device
Do the following things regularly to make the ZyXEL Device more secure and to manage the ZyXEL Device more effectively.
• Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters.
• Write down the password and put it in a safe place.
• Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the ZyXEL Device becomes unstable or even crashes. If you forget your password, you will have to reset the ZyXEL Device to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the ZyXEL Device. You could simply restore your last configuration.
1.4 LEDs
The following figure shows the front panel LEDs.
The following table describes the LEDs.
Table 2 Front Panel LEDs
LED COLOR STATUS DESCRIPTION
POWER Green On The ZyXEL Device is receiving power and functioning
ETHERNET Green On The ZyXEL Device has a successful 10/100 Mb Ethernet
properly.
Blinking The ZyXEL Device is rebooting or performing diagnostics.
Off The system is not ready or has malfunctioned.
connection.
Blinking The ZyXEL Device is sending/receiving data.
Off The ZyXEL Device does not have an Ethernet connection.
30
P-660W-Tx v2 User’s Guide
Chapter 1 Introducing the ZyXEL Device
Table 2 Front Panel LEDs (continued)
LED COLOR STATUS DESCRIPTION
WLAN Green On The ZyXEL Device is ready, but is not sending/receiving data
through the wireless LAN.
Blinking The ZyXEL Device is sending/receiving data through the
wireless LAN.
Off The wireless LAN is not ready or has failed.
DSL Green Fast
Blinking
Slow Blinking
On The DSL link is successful.
Off The DSL link is down.
INTERNET Green On The ZyXEL Device has a successful connection to the
Blinking There is data traffic on the ZyXEL Device’s Internet
Off The ZyXEL Device has no connection with the Internet.
The ZyXEL Device is trying to detect the DSL signal.
The ZyXEL Device is initializing the DSL line.
Internet.
connection.
P-660W-Tx v2 User’s Guide
31
Chapter 1 Introducing the ZyXEL Device
32
P-660W-Tx v2 User’s Guide
CHAPTER 2
Introducing the Web
Configurator
This chapter describes how to access and navigate the web configurator.
2.1 Web Configurator Overview
The web configurator is an HTML-based management interface that allows easy ZyXEL Device setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device. Web pop-up blocking is enabled by default in Windows XP SP (Service Pack) 2.
• JavaScripts (enabled by default).
• Java permissions (enabled by default).
See the chapter on troubleshooting if you need to make sure these functions are allowed in Internet Explorer.
2.1.1 Accessing the Web Configurator
Note: Even though you can connect to the ZyXEL Device wirelessly, it is
recommended that you connect your computer to a LAN port for initial configuration.
1 Make sure your ZyXEL Device hardware is properly connected (refer to the Quick Start
Guide).
2 Prepare your computer/computer network to connect to the ZyXEL Device (refer to the
Quick Start Guide).
3 Launch your web browser.
4 Type “192.168.1.1” as the URL.
5 A window displays as shown.The Password field already contains the default password
“1234”. Click Login to proceed to a screen asking you to change your password or click Cancel to revert to the default password.
P-660W-Tx v2 User’s Guide
33
Chapter 2 Introducing the Web Configurator
Figure 2 Password Screen
6 It is highly recommended you change the default password! Enter a new password
between 1 and 30 characters, retype it to confirm and click Apply; alternatively click Ignore to proceed to the main menu if you do not want to change the password now.
Note: If you do not change the password at least once, the following screen appears
every time you log in.
Figure 3 Change Password at Login
7 You should now see the SITE MAP screen.
Note: The ZyXEL Device automatically times out after five minutes of inactivity.
Simply log back into the ZyXEL Device if this happens to you.
2.1.2 Resetting the ZyXEL Device
If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the ZyXEL Device to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”.
2.1.2.1 Using the Reset Button
1 Make sure the POWER LED is on (not blinking).
2 Press the RESET button for ten seconds or until the POWER LED begins to blink and
then release it. When the POWER LED begins to blink, the defaults have been restored and the ZyXEL Device restarts.
2.1.3 Navigating the Web Configurator
The following summarizes how to navigate the web configurator from the SITE MAP screen.
34
P-660W-Tx v2 User’s Guide
Chapter 2 Introducing the Web Configurator
• Click Wizard Setup to begin a series of screens to configure your ZyXEL Device for the first time.
• Click a link under Advanced Setup to configure advanced ZyXEL Device features.
• Click a link under Maintenance to see ZyXEL Device performance statistics, upload firmware and back up, restore or upload a configuration file.
• Click Site Map to go to the Site Map screen.
• Click Logout in the navigation panel when you have finished a ZyXEL Device management session.
Figure 4 Web Configurator: Site Map Screen
Note: Click the icon (located in the top right corner of most screens) to view
embedded help.
Table 3 Web Configurator Screens Summary
LINK SUB-LINK FUNCTION
Wizard Setup Connection Setup Use these screens for initial configuration including general
setup, ISP parameters for Internet Access and WAN IP/DNS Server/MAC address assignment.
Media Bandwidth Mgnt
Advanced Setup
Password Use this screen to change your password.
LAN LAN Setup Use this screen to configure LAN settings.
Static DHCP Use this screen to configure static DHCP settings on your LAN.
Wireless LAN Wireless Use this screen to configure the wireless LAN settings.
MAC Filter Use this screen to change MAC filter settings on the ZyXEL
WAN WAN Setup Use this screen to change the ZyXEL Device’s WAN remote
WAN Backup Use this screen to configure your traffic redirect properties and
NAT Use this screen to configure the NAT mode.
Dynamic DNS Use this screen to set up dynamic DNS.
Time and Date Use this screen to change your ZyXEL Device’s time and date.
Use these screens to limit bandwidth usage by application.
Device.
node settings.
WAN backup settings.
P-660W-Tx v2 User’s Guide
35
Chapter 2 Introducing the Web Configurator
Table 3 Web Configurator Screens Summary (continued)
LINK SUB-LINK FUNCTION
Firewall Default Policy Use this screen to activate/deactivate the firewall and the
Rule Summary This screen shows a summary of the firewall rules, and allows
Anti Probing Use this screen to change your anti-probing settings.
Threshold Use this screen to configure the threshold for DoS attacks.
Content Filter Keyword Use this screen to block sites containing certain keywords in the
Schedule Use this screen to set the days and times for the ZyXEL Device
Trusted Use this screen to exclude a range of users on the LAN from
Remote Management
UPnP Use this screen to enable UPnP on the ZyXEL Device.
Logs Log Settings Use this screen to change your ZyXEL Device’s log settings.
View Log Use this screen to view the logs for the categories that you
Media Bandwidth Management
Maintenance
System Status This screen contains administrative and system-related
DHCP Table This screen displays DHCP (Dynamic Host Configuration
Any IP Table Use this screen to view the IP and MAC addresses of LAN
Wireless LAN Association List This screen displays the MAC address(es) of the wireless
Summary Use this screen to assign bandwidth limits to specific types of
Class Setup Use this screen to define a bandwidth class.
Monitor Use this screen to view bandwidth class statistics.
direction of network traffic to which to apply the rule.
you to edit/add a firewall rule.
URL.
to perform content filtering.
content filtering on your ZyXEL Device.
Use this screen to configure through which interface(s) and from which IP address(es) users can use Telnet/FTP/Web to manage the ZyXEL Device.
selected.
traffic.
information.
Protocol) related information and is READ-ONLY.
computers communicating with the ZyXEL Device.
stations that are currently associating with the ZyXEL Device.
36
Diagnostic General These screens display information to help you identify problems
with the ZyXEL Device general connection.
DSL Line These screens display information to help you identify problems
with the DSL line.
Firmware Use this screen to upload firmware to your ZyXEL Device
LOGOUT Click Logout to exit the web configurator.
P-660W-Tx v2 User’s Guide
2.2 Change Login Password
It is highly recommended that you periodically change the password for accessing the ZyXEL Device. If you didn’t change the default one after you logged in or you want to change to a new password again, then click Password in the Site Map screen to display the screen as shown next.
Figure 5 Password
Chapter 2 Introducing the Web Configurator
The following table describes the fields in this screen.
Table 4 Password
LABEL DESCRIPTION
Old Password Type the default password or the existing password you use to access the system
in this field.
New Password Type the new password in this field.
Retype to Confirm Type the new password again in this field.
Apply Click Apply to save your changes back to the ZyXEL Device.
Cancel Click Cancel to begin configuring this screen afresh.
P-660W-Tx v2 User’s Guide
37
Chapter 2 Introducing the Web Configurator
38
P-660W-Tx v2 User’s Guide
PART II
Setup Wizard
Connection Setup Wizard (41)
Media Bandwidth Management Wizard (49)
39
40
CHAPTER 3
Connection Setup Wizard
The Connection Wizard assists you in setting up Internet access. This chapter provides information on the Connection Wizard screens in the web configurator.
3.1 Introduction
Use the Connection Wizard screens to configure your system for Internet access with the information given to you by your ISP (Internet Service Provider).
Note: See the advanced menu chapters for background information on these fields.
3.1.1 Internet Access Wizard Setup
1 In the SITE MAP screen click Connection Setup to display the first wizard screen.
P-660W-Tx v2 User’s Guide
41
Chapter 3 Connection Setup Wizard
Figure 6 Internet Access Wizard Setup: ISP Parameters
The following table describes the fields in this screen.
Table 5 Internet Access Wizard Setup: ISP Parameters
LABEL DESCRIPTION
Mode From the Mode drop-down list box, select Routing (default) if your ISP allows
multiple computers to share an Internet account. Otherwise select Bridge.
Encapsulation Select the encapsulation type your ISP uses from the Encapsulation drop-down list
box. Choices vary depending on what you select in the Mode field. If you select Bridge in the Mode field, select either PPPoA or RFC 1483. If you select Routing in the Mode field, select PPPoA, RFC 1483, ENET ENCAP or
PPPoE.
Multiplex Select the multiplexing method used by your ISP from the Multiplex drop-down list
Virtual Circuit IDVPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual circuit.
VPI Enter the VPI assigned to you. This field may already be configured.
VCI Enter the VCI assigned to you. This field may already be configured.
Next Click this button to go to the next wizard screen. The next wizard screen you see
box either VC-based or LLC-based.
Refer to the appendix for more information.
depends on what protocol you chose above. Click on the protocol link to see the next wizard screen for that protocol.
2 The next wizard screen varies depending on what mode and encapsulation type you use.
All screens shown are with routing mode. Configure the fields and click Next to continue.
42
P-660W-Tx v2 User’s Guide
Figure 7 Internet Connection with PPPoE
The following table describes the fields in this screen.
Chapter 3 Connection Setup Wizard
Table 6 Internet Connection with PPPoE
LABEL DESCRIPTION
Service Name Type the name of your PPPoE service here.
User Name Enter the user name exactly as your ISP assigned. If assigned a name in the form
user@domain where domain identifies a service name, then enter both components exactly as given.
Password Enter the password associated with the user name above.
IP Address A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not
Connection Select Connect on Demand when you don't want the connection up all the time and
Network Address Translation
Back Click Back to go back to the first wizard screen.
Next Click Next to continue to the next wizard screen.
fixed; the ISP assigns you a different one each time you connect to the Internet. Select Obtain an IP Address Automatically if you have a dynamic IP address;
otherwise select Static IP Address and type your ISP assigned IP address in the text box below.
specify an idle time-out (in seconds) in the Max. Idle Timeout field. The default setting selects Connection on Demand with 0 as the idle time-out, which means the Internet session will not timeout.
Select Nailed-Up Connection when you want your connection up all the time. The ZyXEL Device will try to bring up the connection automatically if it is disconnected.
Select None, SUA Only or Full Feature from the drop-down list box. Refer to the NAT chapter for more details.
P-660W-Tx v2 User’s Guide
43
Chapter 3 Connection Setup Wizard
Figure 8 Internet Connection with RFC 1483
The following table describes the fields in this screen.
Table 7 Internet Connection with RFC 1483
LABEL DESCRIPTION
IP Address This field is available if you select Routing in the Mode field.
Type your ISP assigned IP address in this field.
Network Address Translation
Back Click Back to go back to the first wizard screen.
Next Click Next to continue to the next wizard screen.
Select None, SUA Only or Full Feature from the drop-down list box. Refer to the NAT chapter for more details.
Figure 9 Internet Connection with ENET ENCAP
The following table describes the fields in this screen.
Table 8 Internet Connection with ENET ENCAP
LABEL DESCRIPTION
IP Address A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not
fixed; the ISP assigns you a different one each time you connect to the Internet. Select Obtain an IP Address Automatically if you have a dynamic IP address;
otherwise select Static IP Address and type your ISP assigned IP address in the IP Address text box below.
Subnet Mask Enter a subnet mask in dotted decimal notation.
Refer to the appendices to calculate a subnet mask If you are implementing subnetting.
44
P-660W-Tx v2 User’s Guide
Chapter 3 Connection Setup Wizard
Table 8 Internet Connection with ENET ENCAP (continued)
LABEL DESCRIPTION
ENET ENCAP Gateway
Network Address Translation
Back Click Back to go back to the first wizard screen.
Next Click Next to continue to the next wizard screen.
You must specify a gateway IP address (supplied by your ISP) when you use ENET ENCAP in the Encapsulation field in the previous screen.
Select None, SUA Only or Full Feature from the drop-sown list box. Refer to the NAT chapter for more details.
Figure 10 Internet Connection with PPPoA
The following table describes the fields in this screen.
Table 9 Internet Connection with PPPoA
LABEL DESCRIPTION
User Name Enter the login name that your ISP gives you.
Password Enter the password associated with the user name above.
IP Address This option is available if you select Routing in the Mode field.
A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet.
Click Obtain an IP Address Automatically if you have a dynamic IP address; otherwise click Static IP Address and type your ISP assigned IP address in the IP Address text box below.
Connection Select Connect on Demand when you don't want the connection up all the time and
specify an idle time-out (in seconds) in the Max. Idle Timeout field. The default setting selects Connection on Demand with 0 as the idle time-out, which means the Internet session will not timeout.
Select Nailed-Up Connection when you want your connection up all the time. The ZyXEL Device will try to bring up the connection automatically if it is disconnected.
P-660W-Tx v2 User’s Guide
45
Chapter 3 Connection Setup Wizard
Table 9 Internet Connection with PPPoA (continued)
LABEL DESCRIPTION
Network Address Translation
Back Click Back to go back to the first wizard screen.
Next Click Next to continue to the next wizard screen.
This option is available if you select Routing in the Mode field. Select None, SUA Only or Full Feature from the drop-sown list box. Refer to the NAT
chapter for more details.
3 Verify the settings in the screen shown next. To change the LAN information on the
ZyXEL Device, click Change LAN Configurations. Otherwise click Save Settings to save the configuration and skip to the section 3.13.
Figure 11 Internet Access Wizard Setup: Third Screen
46
If you want to change your ZyXEL Device LAN settings, click Change LAN Configuration to display the screen as shown next.
Figure 12 Internet Access Wizard Setup: LAN Configuration
P-660W-Tx v2 User’s Guide
Chapter 3 Connection Setup Wizard
The following table describes the fields in this screen.
Table 10 Internet Access Wizard Setup: LAN Configuration
LABEL DESCRIPTION
LAN IP Address Enter the IP address of your ZyXEL Device in dotted decimal notation, for
example, 192.168.1.1 (factory default). If you changed the ZyXEL Device's LAN IP address, you must use the new IP
address if you want to access the web configurator again.
LAN Subnet Mask Enter a subnet mask in dotted decimal notation.
DHCP
DHCP Server From the DHCP Server drop-down list box, select On to allow your ZyXEL
Client IP Pool Starting Address
Size of Client IP Pool This field specifies the size or count of the IP address pool.
Primary DNS Server Enter the IP addresses of the DNS servers. The DNS servers are passed to
Secondary DNS Server As above.
Back Click Back to go back to the previous screen.
Finish Click Finish to save the settings and proceed to the next wizard screen.
Device to assign IP addresses, an IP default gateway and DNS servers to computer systems that support the DHCP client. Select Off to disable DHCP server.
When DHCP server is used, set the following items:
This field specifies the first of the contiguous addresses in the IP address pool.
the DHCP clients along with the IP address and the subnet mask.
4 The ZyXEL Device automatically tests the connection to the computer(s) connected to
the LAN ports. To test the connection from the ZyXEL Device to the ISP, click Start Diagnose. Otherwise click Return to Main Menu to go back to the Site Map screen.
Figure 13 Internet Access Wizard Setup: Connection Tests
Launch your web browser and navigate to www.zyxel.com. Refer to the rest of this guide for more detailed information on the complete range of ZyXEL Device features. If you cannot access the Internet, open the web configurator again to confirm that the Internet settings you configured in the Wizard Setup are correct.
P-660W-Tx v2 User’s Guide
47
Chapter 3 Connection Setup Wizard
48
P-660W-Tx v2 User’s Guide
CHAPTER 4
Media Bandwidth Management
Wizard
4.1 Introduction
Bandwidth management allows you to allocate priority to different kinds of traffic on your network to ensure the smoother flow of network traffic. For example, you can allocate a high priority to XBox Live traffic. Use the Media Bandwidth Management (MBM) Wizard screens to configure bandwidth management on your ZyXEL Device.
" See Chapter 17 on page 165 for background information on Media Bandwidth
Management.
4.1.1 Media Bandwidth Management Wizard
1 In the SITE MAP screen click Media Bandwidth Management Wizard to display the
first wizard screen.
P-660W-Tx v2 User’s Guide
49
Chapter 4 Media Bandwidth Management Wizard
Figure 14 MBM Wizard: Media Bandwidth Management
The following table describes the fields in this screen.
Tabl e 11 MBM Wizard: Media Bandwidth Management
LABEL DESCRIPTION
Active Select Active to enable the Media Bandwidth Management feature on your ZyXEL
Device.
Select the service to apply bandwidth management
Next Click Next to continue with the Wizard.
Select the traffic type(s) to which you want to allocate priority. You can select the following:
XBox Live - a game playing device used for gaming on the Internet, as well as playing media files such as videos.
VoIP (SIP) - Voice over IP, this allows you to make calls over the Internet using a SIP server.
FTP - File Transfer Protocol, a service used for downloading files. E-Mail - the email application used on your computer, rather than web-based email. eMule - a file-sharing application WWW - the World Wide Web
If you do not use a service, it is not necessary to set a priority for that service.
2 Configure levels of priority for the services you have selected in the next screen.
50
P-660W-Tx v2 User’s Guide
Chapter 4 Media Bandwidth Management Wizard
Figure 15 MBM Wizard: Media Bandwidth Management
The following table describes the fields in this screen.
Table 12 MBM Wizard: Media Bandwidth Management
LABEL DESCRIPTION
Service This field lists the services selected in the previous screen
Priority Select a priority level for each service you have specified in the previous screen. The
Back Click Back to return to the previous screen.
Finish Click Finish to save your settings and return to the main menu.
options are High, Mid, Low and Others. Give voice and video applications a high priority, as quality is affected by transmission
delays. VoIP is a voice service and XBox Live is a video service, so they should receive a high priority.
Give Internet browsing a medium level priority as quality is not noticeably affected by brief delays.
Give data transfer services such as eMule, FTP or E-Mail a low priority as quality is not affected by delays in transmission.
Select Others for applications to which you do not want to apply QoS.
P-660W-Tx v2 User’s Guide
51
Chapter 4 Media Bandwidth Management Wizard
52
P-660W-Tx v2 User’s Guide
PART III
Advanced Setup
LAN Setup (55)
Wireless LAN (65)
WA N S e t u p ( 8 1 )
Network Address Translation (NAT) Screens (93)
Dynamic DNS Setup (103)
Time and Date (105)
Firewalls (107)
Firewall Configuration (119)
Content Filtering (139)
Remote Management Configuration (143)
Universal Plug-and-Play (UPnP) (147)
Logs Screens (159)
Media Bandwidth Management Advanced Setup (165)
53
54
CHAPTER 5
LAN Setup
This chapter describes how to configure LAN settings.
5.1 LAN Overview
A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses.
See Section 5.3 on page 60 to configure the LAN screens.
5.1.1 LANs, WANs and the ZyXEL Device
The actual physical connection determines whether the ZyXEL Device ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next.
Figure 16 LAN and WAN IP Addresses
P-660W-Tx v2 User’s Guide
55
Chapter 5 LAN Setup
5.1.2 DHCP Setup
DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the ZyXEL Device as a DHCP server or disable it. When configured as a server, the ZyXEL Device provides the TCP/IP configuration for the clients. If you turn DHCP service off, you must have another DHCP server on your LAN, or else the computer must be manually configured.
5.1.2.1 IP Pool Setup
The ZyXEL Device is pre-configured with a pool of IP addresses for the DHCP clients (DHCP Pool). See the product specifications in the appendices. Do not assign static IP addresses from the DHCP pool to your LAN computers.
5.1.3 DNS Server Address
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it. The DNS server addresses that you enter in the DHCP setup are passed to the client machines along with the assigned IP address and subnet mask.
There are two ways that an ISP disseminates the DNS server addresses. The first is for an ISP to tell a customer the DNS server addresses, usually in the form of an information sheet, when s/he signs up. If your ISP gives you the DNS server addresses, enter them in the DNS Server fields in DHCP Setup, otherwise, leave them blank.
Some ISP’s choose to pass the DNS servers using the DNS server extensions of PPP IPCP (IP Control Protocol) after the connection is up. If your ISP did not give you explicit DNS servers, chances are the DNS servers are conveyed through IPCP negotiation. The ZyXEL Device supports the IPCP DNS server extensions through the DNS proxy feature.
If the Primary and Secondary DNS Server fields in the LAN Setup screen are not specified, for instance, left as 0.0.0.0, the ZyXEL Device tells the DHCP clients that it itself is the DNS server. When a computer sends a DNS query to the ZyXEL Device, the ZyXEL Device forwards the query to the real DNS server learned through IPCP and relays the response back to the computer.
Please note that DNS proxy works only when the ISP uses the IPCP DNS server extensions. It does not mean you can leave the DNS servers out of the DHCP setup under all circumstances. If your ISP gives you explicit DNS servers, make sure that you enter their IP addresses in the LAN Setup screen. This way, the ZyXEL Device can pass the DNS servers to the computers and the computers can query the DNS server directly without the ZyXEL Device’s intervention.
5.1.4 DNS Server Address Assignment
56
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
There are two ways that an ISP disseminates the DNS server addresses.
P-660W-Tx v2 User’s Guide
• The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, enter them in the DNS Server fields in the LAN Setup screen.
• The ZyXEL Device acts as a DNS proxy when the Primary and Secondary DNS Server fields are left blank in the LAN Setup screen.
5.2 LAN TCP/IP
The ZyXEL Device has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability.
5.2.1 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number.
Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
Chapter 5 LAN Setup
If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from
192.168.0.0 to 192.168.255.0 and you must enable the Network Address Translation (NAT) feature of the ZyXEL Device. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. Let's say you select 192.168.1.0 as the network number; which covers 254 individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your ZyXEL Device, but make sure that no other device on your network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your ZyXEL Device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the ZyXEL Device unless you are instructed to do otherwise.
5.2.1.1 Private IP Addresses
Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks:
• 10.0.0.0 — 10.255.255.255
• 172.16.0.0 — 172.31.255.255
• 192.168.0.0 — 192.168.255.255
P-660W-Tx v2 User’s Guide
57
Chapter 5 LAN Setup
You can obtain your IP address from the IANA, from an ISP or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.
" Regardless of your particular situation, do not create an arbitrary IP address;
always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space.
5.2.2 RIP Setup
RIP (Routing Information Protocol) allows a router to exchange routing information with other routers. The RIP Direction field controls the sending and receiving of RIP packets. When set to:
Both - the ZyXEL Device will broadcast its routing table periodically and incorporate the RIP information that it receives.
In Only - the ZyXEL Device will not send any RIP packets but will accept all RIP packets received.
Out Only - the ZyXEL Device will send out RIP packets but will not accept any RIP packets received.
None - the ZyXEL Device will not send any RIP packets and will ignore any RIP packets received.
The Version field controls the format and the broadcasting method of the RIP packets that the ZyXEL Device sends (it recognizes both formats when receiving). RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology.
Both RIP-2B and RIP-2M sends the routing data in RIP-2 format; the difference being that
RIP-2B uses subnet broadcasting while RIP-2M uses multicasting.
5.2.3 Multicast
Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1.
IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data. IGMP version 2 (RFC
2236) is an improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use. If you would like to read more detailed information about interoperability between IGMP version 2 and version 1, please see sections 4 and 5 of RFC 2236. The class D IP address is used to identify host groups and can be in the range 224.0.0.0 to 239.255.255.255. The address
58
P-660W-Tx v2 User’s Guide
224.0.0.0 is not assigned to any group and is used by IP multicast computers. The address
224.0.0.1 is used for query messages and is assigned to the permanent group of all IP hosts (including gateways). All hosts must join the 224.0.0.1 group in order to participate in IGMP. The address 224.0.0.2 is assigned to the multicast routers group.
The ZyXEL Device supports both IGMP version 1 (IGMP-v1) and IGMP version 2 (IGMP- v2). At start up, the ZyXEL Device queries all directly connected networks to gather group membership. After that, the ZyXEL Device periodically updates this information. IP multicasting can be enabled/disabled on the ZyXEL Device LAN and/or WAN interfaces in the web configurator (LAN; WAN). Select None to disable IP multicasting on these interfaces.
5.2.4 Any IP
Traditionally, you must set the IP addresses and the subnet masks of a computer and the ZyXEL Device to be in the same subnet to allow the computer to access the Internet (through the ZyXEL Device). In cases where your computer is required to use a static IP address in another network, you may need to manually configure the network settings of the computer every time you want to access the Internet via the ZyXEL Device.
With the Any IP feature and NAT enabled, the ZyXEL Device allows a computer to access the Internet without changing the network settings (such as IP address and subnet mask) of the computer, when the IP addresses of the computer and the ZyXEL Device are not in the same subnet. Whether a computer is set to use a dynamic or static (fixed) IP address, you can simply connect the computer to the ZyXEL Device and access the Internet.
Chapter 5 LAN Setup
The following figure depicts a scenario where a computer is set to use a static private IP address in the corporate environment. In a residential house where a ZyXEL Device is installed, you can still use the computer to access the Internet without changing the network settings, even when the IP addresses of the computer and the ZyXEL Device are not in the same subnet.
Figure 17 Any IP Example
The Any IP feature does not apply to a computer using either a dynamic IP address or a static IP address that is in the same subnet as the ZyXEL Device’s IP address.
P-660W-Tx v2 User’s Guide
59
Chapter 5 LAN Setup
" You must enable NAT/SUA to use the Any IP feature on the ZyXEL Device.
5.2.4.1 How Any IP Works
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network. IP routing table is defined on IP Ethernet devices (the ZyXEL Device) to decide which hop to use, destination.
The following lists out the steps taken, when a computer tries to access the Internet for the first time through the ZyXEL Device.
1 When a computer (which is in a different subnet) first attempts to access the Internet, it
sends packets to its default gateway (which is not the ZyXEL Device) by looking at the MAC address in its ARP table.
2 When the computer cannot locate the default gateway, an ARP request is broadcast on
the LAN.
3 The ZyXEL Device receives the ARP request and replies to the computer with its own
MAC address.
4 The computer updates the MAC address for the default gateway to the ARP table. Once
the ARP table is updated, the computer is able to access the Internet through the ZyXEL Device.
5 When the ZyXEL Device receives packets from the computer, it creates an entry in the
IP routing table so it can properly forward packets intended for the computer.
to help forward data along to its specified
After all the routing information is updated, the computer can access the ZyXEL Device and the Internet as if it is in the same subnet as the ZyXEL Device.
5.3 Configuring LAN
Click LAN > LAN Setup to open the LAN Setup screen. See Section 5.1 on page 55 for background information.
60
P-660W-Tx v2 User’s Guide
Figure 18 LAN Setup
Chapter 5 LAN Setup
The following table describes the fields in this screen.
Table 13 LAN Setup
LABEL DESCRIPTION
DHCP
DHCP If set to Server, your ZyXEL Device can assign IP addresses, an IP default
gateway and DNS servers to Windows 95, Windows NT and other systems that support the DHCP client.
If set to None, the DHCP server will be disabled. If set to Relay, the ZyXEL Device acts as a surrogate DHCP server and relays
DHCP requests and responses between the remote server and the clients. Enter the IP address of the actual, remote DHCP server in the Remote DHCP Server field in this case.
When DHCP is used, the following items need to be set:
Client IP Pool Starting Address
Size of Client IP Pool
Primary DNS Server
Secondary DNS Server
Remote DHCP Server
TCP/IP
This field specifies the first of the contiguous addresses in the IP address pool.
This field specifies the size or count of the IP address pool.
Enter the IP addresses of the DNS servers. The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask.
As above.
If Relay is selected in the DHCP field above then enter the IP address of the actual remote DHCP server here.
P-660W-Tx v2 User’s Guide
61
Chapter 5 LAN Setup
Table 13 LAN Setup (continued)
LABEL DESCRIPTION
IP Address Enter the IP address of your ZyXEL Device in dotted decimal notation, for
IP Subnet Mask Type the subnet mask assigned to you by your ISP (if given).
RIP Direction Select the RIP direction from None, Both, In Only and Out Only.
RIP Version Select the RIP version from RIP-1, RIP-2B and RIP-2M.
Multicast IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to
Any IP Setup Select the Active check box to enable the Any IP feature. This allows a
Apply Click Apply to save your changes back to the ZyXEL Device.
Cancel Click Cancel to begin configuring this screen afresh.
example, 192.168.1.1 (factory default).
establish membership in a multicast group. The ZyXEL Device supports both IGMP version 1 (IGMP-v1) and IGMP-v2. Select None to disable it.
computer to access the Internet without changing the network settings (such as IP address and subnet mask) of the computer, even when the IP addresses of the computer and the ZyXEL Device are not in the same subnet.
When you disable the Any IP feature, only computers with dynamic IP addresses or static IP addresses in the same subnet as the ZyXEL Device’s LAN IP address can connect to the ZyXEL Device or access the Internet through the ZyXEL Device.
5.4 Configuring Static DHCP
Click LAN > Static DHCP to open the Static DHCP screen. See Section 5.1.2 on page 56 for background information.
Figure 19 LAN > Static DHCP
62
P-660W-Tx v2 User’s Guide
Chapter 5 LAN Setup
The following table describes the fields in this screen.
Table 14 LAN Setup
LABEL DESCRIPTION
# This is the index number for the entries in this table.
MAC Address Type the MAC address of the device for which you are configuring the IP
address. Use hexadecimal characters in the following format: “0A:A0:00:BB:CC:DD”
IP Address Type the IP address for the device you are configuring in dotted decimal
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes back to the ZyXEL Device.
Cancel Click Cancel to begin configuring this screen afresh.
notation, for example, “150.222.0.1”.
P-660W-Tx v2 User’s Guide
63
Chapter 5 LAN Setup
64
P-660W-Tx v2 User’s Guide
CHAPTER 6
Wireless LAN
This chapter discusses how to configure the wireless network settings in your ZyXEL Device. See the appendices for more detailed information about wireless networks.
6.1 Wireless Network Overview
The following figure provides an example of a wireless network.
Figure 20 Example of a Wireless Network
The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.The wireless clients use the access point (AP) to interact with other devices (such as the printer) or with the Internet. Your ZyXEL Device is the AP.
Every wireless network must follow these basic guidelines.
• Every wireless client in the same wireless network must use the same SSID. The SSID is the name of the wireless network. It stands for Service Set IDentity.
• If two wireless networks overlap, they should use different channels. Like radio stations or television channels, each wireless network uses a specific channel,
or frequency, to send and receive information.
P-660W-Tx v2 User’s Guide
65
Chapter 6 Wireless LAN
• Every wireless client in the same wireless network must use security compatible with the AP.
Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network.
6.2 Wireless Security Overview
The following sections introduce different types of wireless security you can set up in the wireless network.
6.2.1 SSID
Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network.
6.2.2 MAC Address Filter
Every wireless client has a unique identification number, called a MAC address.1 A MAC address is usually written using twelve hexadecimal characters or 00:A0:C5:00:00:02. To get the MAC address for each wireless client, see the appropriate User’s Guide or other documentation.
You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security). If a wireless client is not allowed to use the wireless network, it does not matter if it has the correct settings.
This type of security does not protect the information that is sent in the wireless network. Furthermore, there are ways for unauthorized devices to get the MAC address of an authorized wireless client. Then, they can use that MAC address to use the wireless network.
6.2.3 User Authentication
You can make every user log in to the wireless network before they can use it. This is called user authentication. However, every wireless client in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, there are two typical places to store the user names and passwords for each user.
2
; for example, 00A0C5000002
66
• In the AP: this feature is called a local user database or a local database.
• In a RADIUS server: this is a server used in businesses more than in homes.
1. Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks.
These kinds of wireless devices might not have MAC addresses.
2. Hexadecimal characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
P-660W-Tx v2 User’s Guide
If your AP does not provide a local user database and if you do not have a RADIUS server, you cannot set up user names and passwords for your users.
Unauthorized devices can still see the information that is sent in the wireless network, even if they cannot use the wireless network. Furthermore, there are ways for unauthorized wireless users to get a valid user name and password. Then, they can use that user name and password to use the wireless network.
Local user databases also have an additional limitation that is explained in the next section.
6.2.4 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message.
The types of encryption you can choose depend on the type of user authentication. (See
Section 6.2.3 on page 66 for information about this.)
Table 15 Types of Encryption for Each Type of Authentication
Weakest No Security WPA
Strongest WPA2-PSK WPA2
Chapter 6 Wireless LAN
NO AUTHENTICATION RADIUS SERVER
Static WEP
WPA-PSK
For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2. If users do not have to log in with a user name and password in order to access the wireless network, you can choose no encryption, Static WEP, WPA-PSK, or WPA2-PSK.
Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. For example, suppose the AP does not have a local user database, and you do not have a RADIUS server. Therefore, there is no user authentication. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA. Therefore, you should set up Static WEP in the wireless network.
" It is recommended that wireless networks use WPA-PSK, WPA, or stronger
encryption. IEEE 802.1x and WEP encryption are better than none at all, but it is still possible for unauthorized devices to figure out the original information pretty quickly.
" It is not possible to use WPA-PSK, WPA or stronger encryption with a local
user database. In this case, it is better to set up stronger encryption with no authentication than to set up weaker encryption with the local user database.
P-660W-Tx v2 User’s Guide
67
Chapter 6 Wireless LAN
When you select WPA2 or WPA2-PSK in your ZyXEL Device, you can also select an option (WPA Compatible) to support WPA as well. In this case, if some wireless clients support WPA and some support WPA2, you should set up WPA2-PSK or WPA2 (depending on the type of wireless network login) and select the WPA Compatible option in the ZyXEL Device.
Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key.
6.3 Additional Wireless Terms
The following table describes wireless network terms and acronyms used in the ZyXEL Device’s Web Configurator.
Table 16 Additional Wireless Terms
TERM DESCRIPTION
Intra-BSS Traffic This describes direct communication (not through the ZyXEL Device) between
RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are
Preamble A preamble affects the timing in your wireless network. There are two
Authentication The process of verifying whether a wireless device is allowed to use the
Max. Frame Burst Enable this to improve the performance of both pure IEEE 802.11g and mixed
Fragmentation Threshold
Roaming If you have two or more ZyXEL Devices (or other wireless access points) on
two wireless devices within a wireless network. You might disable this kind of communication to enhance security within your wireless network.
sometimes not aware of each other’s presence. This may cause them to send information to the AP at the same time and result in information colliding and not getting through.
By setting this value lower than the default value, the wireless devices must sometimes get permission to send information to the ZyXEL Device. The lower the value, the more often the devices must get permission.
If this value is greater than the fragmentation threshold value (see below), then wireless devices never have to get permission to send information to the ZyXEL Device.
preamble modes: long and short. If a device uses a different preamble mode than the ZyXEL Device does, it cannot communicate with the ZyXEL Device.
wireless network.
IEEE 802.11b/g networks. Maximum Frame Burst sets the maximum time that the ZyXEL Device transmits IEEE 802.11g wireless traffic only.
A small fragmentation threshold is recommended for busy networks, while a larger threshold provides faster performance if the network is not very busy.
your wireless network, you can enable this option so that wireless devices can change locations without having to log in again. This is useful for devices, such as notebooks, that move around a lot.
6.4 The Main Wireless LAN Screen
Click Wireless LAN in the navigation panel to display the main Wireless LAN screen.
68
P-660W-Tx v2 User’s Guide
Chapter 6 Wireless LAN
Figure 21 Wireless LAN
The following table describes the links in this screen.
Table 17 Wireless LAN
LINK DESCRIPTION
Wireless Click this link to go to a screen where you can configure wireless settings.
MAC Filter Click this link to go to a screen where you can restrict access to your wireless
network by MAC address.
WDS Click this link to go to a screen where you can set up a WDS (Wireless Distribution
System) connection between your AP’s (access points).
The following figure shows the relative effectiveness of these wireless security methods available on your ZyXEL Device.
Figure 22 Wireless Security Methods
" You must enable the same wireless security settings on the ZyXEL Device and
on all wireless clients that you want to associate with it.
P-660W-Tx v2 User’s Guide
69
Chapter 6 Wireless LAN
" If you do not enable any wireless security on your ZyXEL Device, your network
is accessible to any wireless networking device that is within range.
6.5 Configuring the Wireless Screen
Click Advanced Setup > Wireless LAN to open the Wireless LAN screen.
Figure 23 Network > Wireless LAN
The following table describes the general wireless LAN labels in this screen.
Table 18 Network > Wireless LAN > General
LABEL DESCRIPTION
Enable Wireless LAN
Block Traffic between WLAN and LAN
ESSID The ESSID (Extended Service Set IDentity) identifies your wireless network. Enter a
Hide ESSID Select Yes to hide the ESSID from unauthorized individuals scanning for ESSIDs
Channel ID The range of radio frequencies used by wireless devices is called a channel.
Click the check box to activate the wireless feature on your ZyXEL Device.
descriptive name (up to 32 printable characters including spaces; alphabetic characters are case-sensitive) for the wireless LAN.
using a site survey tool or select No.to make it visible to wireless devices in range.
Select a wireless channel if interference from other nearby devices is a problem. The ZyXEL Device and other wireless devices in your wireless network must use the same channel.
70
P-660W-Tx v2 User’s Guide
Table 18 Network > Wireless LAN > General
LABEL DESCRIPTION
RTS/CTS Threshold
Fragmentation Threshold
Apply Click Apply to save your changes.
Reset Click Reset to reload the previous configuration for this screen.
See the rest of this chapter for information on the other labels in this screen.
6.5.1 No Security
Select No Security to allow wireless stations to communicate with the access points without any data encryption.
Chapter 6 Wireless LAN
The RTS (Request To Send) threshold (number of bytes) is for enabling RTS/CTS. Data with its frame size larger than this value will perform the RTS/CTS handshake. Setting this value to be larger than the maximum MSDU (MAC service data unit) size turns off RTS/CTS. Setting this value to zero turns on RTS/CTS.
Select the check box to change the default value and enter a new value between 0 and 2432.
This is the threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent.
Select the check box to change the default value and enter a value between 256 and
2432.
" If you do not enable any wireless security on your ZyXEL Device, your network
is accessible to any wireless networking device that is within range.
Figure 24 Network > Wireless LAN: No Security
P-660W-Tx v2 User’s Guide
71
Chapter 6 Wireless LAN
The following table describes the labels in this screen.
Table 19 Wireless No Security
LABEL DESCRIPTION
Security Mode Choose No Security from the drop-down list box.
Back Click Back to return to the previous screen.
Apply Click Apply to save your changes.
Reset Click Reset to reload the previous configuration for this screen.
6.5.2 WEP Encryption
WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communications private. It encrypts unicast and multicast communications in a network. Both the wireless stations and the access points must use the same WEP key.
Your ZyXEL Device allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys but only one key can be enabled at any one time.
In order to configure and enable WEP encryption; click Wireless LAN and Wireless to the display the Wireless screen.
Figure 25 Wireless Screen
72
P-660W-Tx v2 User’s Guide
Chapter 6 Wireless LAN
The following table describes the labels in this screen.
Table 20 Wireless LAN
LABEL DESCRIPTION
Security Mode Select Static WEP from the drop-down list.
You won’t see the following WEP-related fields if you have WPA or WPA-PSK enabled.
Passphrase Enter a "passphrase" (password phrase) of up to 63 case-sensitive printable
characters and click Generate to have the ZyXEL Device create four different WEP keys.
At the time of writing, you cannot use passphrase to generate 256-bit WEP keys.
Generate After you enter the passphrase, click Generate to have the ZyXEL Device generate
a WEP key automatically. The key displays in the WEP Key field.
WEP Key The WEP Key is used to encrypt data. Both the ZyXEL Device and other wireless
Back Click Back to go to the main wireless LAN setup screen.
Apply Click Apply to save your changes back to the ZyXEL Device.
Cancel Click Cancel to begin configuring this screen afresh.
devices on your network must use the same WEP key. If you want to manually set the WEP keys, type the key in this field. The length of
the key corresponds to the security strength. For 64-bit security, type 5 ASCII characters or 10 hexadecimal characters ("0-9",
"A-F"). For 128-bit security, type13 ASCII characters or 26 hexadecimal characters ("0-9",
"A-F").
6.5.3 WPA-PSK/WPA2-PSK
Click Advanced Setup > Wireless LAN to display the Wireless LAN screen. Select WPA- PSK or WPA2-PSK from the Security Mode list.
P-660W-Tx v2 User’s Guide
73
Chapter 6 Wireless LAN
Figure 26 Network > Wireless LAN: WPA-PSK/
The following table describes the labels in this screen.
Table 21 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK
LABEL DESCRIPTION
Security Mode Select WPA-PSK or WPA2-PSK from the drop-down box.
WPA Compatible This check box is available only when you select WPA2-PSK or WPA2 in the
Security Mode field. Select the check box to have both WPA2 and WPA wireless clients be able to
communicate with the ZyXEL Device even when the ZyXEL Device is using WPA2-PSK or WPA2.
Pre-Shared Key The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK
are the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses a simple common password, instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols).
ReAuthentication Timer (in seconds)
Specify how often wireless stations have to resend usernames and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30 minutes).
Note: If wireless station authentication is done using a RADIUS
server, the reauthentication timer on the RADIUS server has priority.
Idle Timeout The ZyXEL Device automatically disconnects a wireless station from the wired
network after a period of inactivity. The wireless station needs to enter the username and password again before access to the wired network is allowed. The default time interval is 3600 seconds (or 1 hour).
74
P-660W-Tx v2 User’s Guide
Table 21 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK
LABEL DESCRIPTION
Group Key Update Timer
Apply Click Apply to save your changes back to the ZyXEL Device.
Reset Click Reset to reload the previous configuration for this screen.
6.5.4 WPA/WPA2
Click Advanced Setup > Wireless LAN to display the Wireless LAN screen. Select WPA or WPA2 from the Security Mode list.
Figure 27 Network > Wireless LAN > General: WPA/WPA2
Chapter 6 Wireless LAN
The Group Key Update Timer is the rate at which the AP (if using WPA-PSK/ WPA2-PSK key management) or RADIUS server (if using WPA/WPA2 key management) sends a new group key out to all clients. The re-keying process is the WPA/WPA2 equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis. Setting of the Group Key Update Timer is also supported in WPA-PSK/WPA2-PSK mode. The default is 1800 seconds (30 minutes).
P-660W-Tx v2 User’s Guide
75
Chapter 6 Wireless LAN
The following table describes the labels in this screen.
Table 22 Network > Wireless LAN > General: WPA/WPA2
LABEL DESCRIPTION
WPA Compatible This check box is available only when you select WPA2-PSK or WPA2 in the
ReAuthentication Timer
Idle Timeout The ZyXEL Device automatically disconnects a wireless station from the wired
Group Key Update Timer
Authentication Server
IP Address Enter the IP address of the external authentication server in dotted decimal
Port Number Enter the port number of the external authentication server. The default port
Shared Secret Enter a password (up to 31 alphanumeric characters) as the key to be shared
Accounting Server
Active Select Yes from the drop down list box to enable user accounting through an
IP Address Enter the IP address of the external accounting server in dotted decimal notation.
Port Number Enter the port number of the external accounting server. The default port number
Shared Secret Enter a password (up to 31 alphanumeric characters) as the key to be shared
Apply Click Apply to save your changes back to the ZyXEL Device.
Reset Click Reset to reload the previous configuration for this screen.
Security Mode field. Select the check box to have both WPA2 and WPA wireless clients be able to
communicate with the ZyXEL Device even when the ZyXEL Device is using WPA2-PSK or WPA2.
Specify how often wireless stations have to resend usernames and passwords in order to stay connected. Enter a time interval between 10 and 9999 seconds. The default time interval is 1800 seconds (30 minutes).
Note: If wireless station authentication is done using a RADIUS
server, the reauthentication timer on the RADIUS server has priority.
network after a period of inactivity. The wireless station needs to enter the username and password again before access to the wired network is allowed. The default time interval is 3600 seconds (or 1 hour).
The Group Key Update Timer is the rate at which the AP (if using WPA-PSK/ WPA2-PSK key management) or RADIUS server (if using WPA/WPA2 key management) sends a new group key out to all clients. The re-keying process is the WPA/WPA2 equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis. Setting of the Group Key Update Timer is also supported in WPA-PSK/WPA2-PSK mode. The ZyXEL Device default is 1800 seconds (30 minutes).
notation.
number is 1812. You need not change this value unless your network administrator instructs you
to do so with additional information.
between the external authentication server and the ZyXEL Device. The key must be the same on the external authentication server and your ZyXEL
Device. The key is not sent over the network.
external authentication server.
is 1813. You need not change this value unless your network administrator instructs you
to do so with additional information.
between the external accounting server and the ZyXEL Device. The key must be the same on the external accounting server and your ZyXEL
Device. The key is not sent over the network.
76
P-660W-Tx v2 User’s Guide
Chapter 6 Wireless LAN
" If you are configuring the ZyXEL Device from a computer connected to the
wireless LAN and you change the ZyXEL Device’s ESSID or security settings (see Figure 22 on page 69), you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the ZyXEL Device’s new settings.
6.6 Configuring MAC Filters
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC addresses of the devices to configure this screen. To change your ZyXEL Device’s MAC filter settings, click Advanced Setup > Wireless LAN > MAC Filter to open the MAC Filter screen. The screen appears as shown.
" Be careful not to list your computer’s MAC address and set the Action field to
Deny Association when managing the ZyXEL Device via a wireless
connection. This would lock you out.
P-660W-Tx v2 User’s Guide
77
Chapter 6 Wireless LAN
Figure 28 MAC Filter
78
The following table describes the fields in this menu.
Table 23 MAC Filter
LABEL DESCRIPTION
Active Select Yes from the drop down list box to enable MAC address filtering.
Action Define the filter action for the list of MAC addresses in the MAC Address table.
Select Deny Association to block access to the router, MAC addresses not listed will be allowed to access the ZyXEL Device. Select Allow Association to permit access to the router, MAC addresses not listed will be denied access to the ZyXEL Device.
MAC Address Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal
character pairs, for example, 12:34:56:78:9a:bc of the wireless stations that are allowed or denied access to the ZyXEL Device in these address fields.
Back Click Back to go to the main wireless LAN setup screen.
P-660W-Tx v2 User’s Guide
Table 23 MAC Filter (continued)
LABEL DESCRIPTION
Apply Click Apply to save your changes back to the ZyXEL Device.
Cancel Click Cancel to begin configuring this screen afresh.
6.7 WDS Screen
The WDS (Wireless Distribution System) allows you to configure the ZyXEL Device to connect to two or more APs via wireless when WDS is enabled. An AP using WDS can function as a wireless network bridge allowing you to wirelessly connect two wired network segments.
Figure 29 Connecting Wireless Networks Using WDS
Chapter 6 Wireless LAN
Use this screen to set up WDS between your ZyXEL Device and another AP.
" WDS security is independent of the security settings between the ZyXEL
Device and any wireless clients.
" At the time of writing, WDS is compatible with other ZyXEL APs only. Not all
models support WDS links. Check your other AP’s documentation.
P-660W-Tx v2 User’s Guide
79
Chapter 6 Wireless LAN
Figure 30 Advanced Setup > Wireless LAN > WDS
The following table describes the labels in this screen.
Table 24 Advanced Setup > Wireless LAN > WDS
LABEL DESCRIPTION
Enable WDS Security
# This is the index number of the access point (AP) with which you are setting up a
Active Select this to enable a WDS connection with this AP.
Remote Bridge MAC Address
PSK Type a PSK (Pre-Shared Key) in this field between 8~63 characters long (A~Z,
Back Click Back to return to the Wireless LAN menu screen.
Apply Click Apply to save your changes back to the ZyXEL Device.
Cancel Click Cancel to cancel your changes.
Select this to set up security on your ZyXEL Device’s bridged connection with an AP. Select AES (Advanced Encryption Standard) as your security method if the AP’s on your network support it. Otherwise select TKIP Security (ZyAIR Series Compatible) (Temporal Key Integrity Protocol).
If you de-select this option, the data sent between APs is not encrypted. Anyone can read it.
WDS connection.
Type the MAC address of the AP with which you are setting up a WDS connection in a valid MAC address format (six hexadecimal character pairs, for example 12:34:56:78:9a:bc)..
a~z,0~9).
80
P-660W-Tx v2 User’s Guide
CHAPTER 7
WAN Setup
This chapter describes how to configure WAN settings.
7.1 WAN Overview
A WAN (Wide Area Network) is an outside connection to another network or the Internet.
7.1.1 Encapsulation
Be sure to use the encapsulation method required by your ISP. The ZyXEL Device supports the following methods.
7.1.1.1 ENET ENCAP
The MAC Encapsulated Routing Link Protocol (ENET ENCAP) is only implemented with the IP network protocol. IP packets are routed between the Ethernet interface and the WAN interface and then formatted so that they can be understood in a bridged environment. For instance, it encapsulates routed Ethernet frames into bridged ATM cells. ENET ENCAP requires that you specify a gateway IP address in the ENET ENCAP Gateway field in the second wizard screen. You can get this information from your ISP.
7.1.1.2 PPP over Ethernet
PPPoE provides access control and billing functionality in a manner similar to dial-up services using PPP. The ZyXEL Device bridges a PPP session over Ethernet (PPP over Ethernet, RFC
2516) from your computer to an ATM PVC (Permanent Virtual Circuit) which connects to ADSL Access Concentrator where the PPP session terminates. One PVC can support any number of PPP sessions from your LAN. For more information on PPPoE, see the appendices.
7.1.1.3 PPPoA
PPPoA stands for Point to Point Protocol over ATM Adaptation Layer 5 (AAL5). A PPPoA connection functions like a dial-up Internet connection. The ZyXEL Device encapsulates the PPP session based on RFC1483 and sends it through an ATM PVC (Permanent Virtual Circuit) to the Internet Service Provider’s (ISP) DSLAM (digital access multiplexer). Please refer to RFC 2364 for more information on PPPoA. Refer to RFC 1661 for more information on PPP.
P-660W-Tx v2 User’s Guide
81
Chapter 7 WAN Setup
7.1.1.4 RFC 1483
RFC 1483 describes two methods for Multiprotocol Encapsulation over ATM Adaptation Layer 5 (AAL5). The first method allows multiplexing of multiple protocols over a single ATM virtual circuit (LLC-based multiplexing) and the second method assumes that each protocol is carried over a separate ATM virtual circuit (VC-based multiplexing). Please refer to the RFC for more detailed information.
7.1.2 Multiplexing
There are two conventions to identify what protocols the virtual circuit (VC) is carrying. Be sure to use the multiplexing method required by your ISP.
7.1.2.1 VC-based Multiplexing
In this case, by prior mutual agreement, each protocol is assigned to a specific virtual circuit; for example, VC1 carries IP, etc. VC-based multiplexing may be dominant in environments where dynamic creation of large numbers of ATM VCs is fast and economical.
7.1.2.2 LLC-based Multiplexing
In this case one VC carries multiple protocols with protocol identifying information being contained in each packet header. Despite the extra bandwidth and processing overhead, this method may be advantageous if it is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on the number of simultaneous VCs.
7.1.3 VPI and VCI
Be sure to use the correct Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) numbers assigned to you. The valid range for the VPI is 0 to 255 and for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Please see the appendix for more information.
7.1.4 IP Address Assignment
A static IP is a fixed IP that your ISP gives you. A dynamic IP is not fixed; the ISP assigns you a different one each time. The Single User Account feature can be enabled or disabled if you have either a dynamic or static IP. However the encapsulation method assigned influences your choices for IP address and ENET ENCAP gateway.
7.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation
If you have a dynamic IP, then the IP Address and ENET ENCAP Gateway fields are not applicable (N/A). If you have a static IP, then you only need to fill in the IP Address field and not the ENET ENCAP Gateway field.
7.1.4.2 IP Assignment with RFC 1483 Encapsulation
In this case the IP Address Assignment must be static with the same requirements for the IP Address and ENET ENCAP Gateway fields as stated above.
82
P-660W-Tx v2 User’s Guide
7.1.4.3 IP Assignment with ENET ENCAP Encapsulation
In this case you can have either a static or dynamic IP. For a static IP you must fill in all the IP Address and ENET ENCAP Gateway fields as supplied by your ISP. However for a dynamic IP, the ZyXEL Device acts as a DHCP client on the WAN port and so the IP Address and ENET ENCAP Gateway fields are not applicable (N/A) as the DHCP server
assigns them to the ZyXEL Device.
7.1.5 Nailed-Up Connection (PPP)
A nailed-up connection is a dial-up line where the connection is always up regardless of traffic demand. The ZyXEL Device does two things when you specify a nailed-up connection. The first is that idle timeout is disabled. The second is that the ZyXEL Device will try to bring up the connection when turned on and whenever the connection is down. A nailed-up connection can be very expensive for obvious reasons.
Do not specify a nailed-up connection unless your telephone company offers flat-rate service or you need a constant connection and the cost is of no concern.
7.1.6 NAT
Chapter 7 WAN Setup
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
7.2 Metric
The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number greater than "15" means the link is down. The smaller the number, the lower the "cost".
The metric sets the priority for the ZyXEL Device routes to the Internet. If any two of the default routes have the same metric, the ZyXEL Device uses the following pre-defined priorities:
• Normal route: designated by the ISP (see Section 7.7 on page 86)
• Traffic-redirect route (see Section 7.8 on page 90)
• WAN-backup route, also called dial-backup (see Section 7.9 on page 90)
For example, if the normal route has a metric of "1" and the traffic-redirect route has a metric of "2" and dial-backup route has a metric of "3", then the normal route acts as the primary default route. If the normal route fails to connect to the Internet, the ZyXEL Device tries the traffic-redirect route next. In the same manner, the ZyXEL Device uses the dial-backup route if the traffic-redirect route also fails.
If you want the dial-backup route to take first priority over the traffic-redirect route or even the normal route, all you need to do is set the dial-backup route’s metric to "1" and the others to "2" (or greater).
P-660W-Tx v2 User’s Guide
83
Chapter 7 WAN Setup
IP Policy Routing overrides the default routing behavior and takes priority over all of the routes mentioned above.
7.3 PPPoE Encapsulation
The ZyXEL Device supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF Draft standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPPoE option is for a dial-up connection using PPPoE.
For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for example Radius). PPPoE provides a login and authentication method that the existing Microsoft Dial-Up Networking software can activate, and therefore requires no new learning or procedures for Windows users.
One of the benefits of PPPoE is the ability to let you access one of multiple network services, a function known as dynamic service selection. This enables the service provider to easily create and offer new IP services for individuals.
Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires no specific configuration of the broadband modem at the customer site.
By implementing PPPoE directly on the ZyXEL Device (rather than individual computers), the computers on the LAN do not need PPPoE software installed, since the ZyXEL Device does that part of the task. Furthermore, with NAT, all of the LANs’ computers will have access.
7.4 Traffic Shaping
Traffic Shaping is an agreement between the carrier and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network. This agreement helps eliminate congestion, which is important for transmission of real time data such as audio and video connections.
Peak Cell Rate (PCR) is the maximum rate at which the sender can send cells. This parameter may be lower (but not higher) than the maximum line speed. 1 ATM cell is 53 bytes (424 bits), so a maximum speed of 832Kbps gives a maximum PCR of 1962 cells/sec. This rate is not guaranteed because it is dependent on the line speed.
Sustained Cell Rate (SCR) is the mean cell rate of each bursty traffic source. It specifies the maximum average rate at which cells can be sent over the virtual connection. SCR may not be greater than the PCR.
Maximum Burst Size (MBS) is the maximum number of cells that can be sent at the PCR. After MBS is reached, cell rates fall below SCR until cell rate averages to the SCR again. At this time, more cells (up to the MBS) can be sent at the PCR again.
84
If the PCR, SCR or MBS is set to the default of "0", the system will assign a maximum value that correlates to your upstream line rate.
The following figure illustrates the relationship between PCR, SCR and MBS.
P-660W-Tx v2 User’s Guide
Figure 31 Example of Traffic Shaping
7.5 Zero Configuration Internet Access
Once you turn on and connect the ZyXEL Device to a telephone jack, it automatically detects the Internet connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and makes the necessary configuration changes. In cases where additional account information (such as an Internet account user name and password) is required or the ZyXEL Device cannot connect to the ISP, you will be redirected to web screen(s) for information input or troubleshooting.
Chapter 7 WAN Setup
Zero configuration for Internet access is disabled when
• the ZyXEL Device is in bridge mode
• you set the ZyXEL Device to use a static (fixed) WAN IP address.
7.6 The Main WAN Screen
Click WA N in the navigation panel to display the man WA N screen.
See Section 7.1 on page 81 for more information.
Figure 32 WAN
P-660W-Tx v2 User’s Guide
85
Chapter 7 WAN Setup
The following table describes the links in this screen.
Table 25 WAN
LINK DESCRIPTION
WAN Setup Click this link to go to the screen where you can configure your ZyXEL Device for an
WAN Backup Click this link to go to the screen where you can configure WAN backup connections
Internet connection.
(traffic redirect and dial backup).
7.7 Configuring WAN Setup
To change your ZyXEL Device’s WAN remote node settings, click WA N and WAN S e t u p . The screen differs by the encapsulation.
See Section 7.1 on page 81 for more information.
86
P-660W-Tx v2 User’s Guide
Figure 33 WAN Setup (PPPoE)
Chapter 7 WAN Setup
P-660W-Tx v2 User’s Guide
87
Chapter 7 WAN Setup
The following table describes the fields in this screen.
Table 26 WAN Setup
LABEL DESCRIPTION
Name Enter the name of your Internet Service Provider, e.g., MyISP. This information
Mode Select Routing (default) from the drop-down list box if your ISP allows multiple
Encapsulation Select the method of encapsulation used by your ISP from the drop-down list
Multiplex Select the method of multiplexing used by your ISP from the drop-down list.
Virtual Circuit ID VPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual
VPI The valid range for the VPI is 0 to 255. Enter the VPI assigned to you.
VCI The valid range for the VCI is 32 to 65535 (0 to 31 is reserved for local
ATM QoS Type Select CBR (Continuous Bit Rate) to specify fixed (always-on) bandwidth for
Cell Rate Cell rate configuration often helps eliminate traffic congestion that slows
Peak Cell Rate Divide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak
Sustain Cell Rate The Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be
Maximum Burst Size
is for identification purposes only.
computers to share an Internet account. Otherwise select Bridge.
box. Choices vary depending on the mode you select in the Mode field. If you select Bridge in the Mode field, select either PPPoA or RFC 1483. If you select Routing in the Mode field, select PPPoA, RFC 1483, ENET
ENCAP or PPPoE.
Choices are VC or LLC.
circuit. Refer to the appendix for more information.
management of ATM traffic). Enter the VCI assigned to you.
voice or data traffic. Select UBR (Unspecified Bit Rate) for applications that are non-time sensitive, such as e-mail. Select VBR (Variable Bit Rate) for bursty traffic and bandwidth sharing with other applications.
transmission of real time data such as audio and video connections.
Cell Rate (PCR). This is the maximum rate at which the sender can send cells. Type the PCR here.
transmitted. Type the SCR, which must be less than the PCR. Note that system default is 0 cells/sec.
Maximum Burst Size (MBS) refers to the maximum number of cells that can be sent at the peak rate. Type the MBS, which is less than 65535.
88
Login Information (PPPoA and PPPoE encapsulation only)
Service Name (PPPoE only) Type the name of your PPPoE service here.
User Name Enter the user name exactly as your ISP assigned. If assigned a name in the
form user@domain where domain identifies a service name, then enter both components exactly as given.
Password Enter the password associated with the user name above.
IP Address This option is available if you select Routing in the Mode field.
A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet.
Select Obtain an IP Address Automatically if you have a dynamic IP address; otherwise select Static IP Address and type your ISP assigned IP address in the IP Address field below.
P-660W-Tx v2 User’s Guide
Chapter 7 WAN Setup
Table 26 WAN Setup (continued)
LABEL DESCRIPTION
Connection (PPPoA and PPPoE
encapsulation only)
Nailed-Up Connection
Connect on Demand
Max Idle Timeout Specify an idle time-out in the Max Idle Timeout field when you select Connect
PPPoE Passthrough
(PPPoE encapsulation only)
Subnet Mask (ENET ENCAP
encapsulation only)
ENET ENCAP Gateway
(ENET ENCAP encapsulation only)
Zero Configuration This feature is not applicable/available when you configure the ZyXEL Device to
MTU The MTU (Maximum Transmission Unit, measured in bytes) sets the largest
Back Click Back to return to the previous screen.
Apply Click Apply to save the changes.
Cancel Click Cancel to begin configuring this screen afresh.
Select Nailed-Up Connection when you want your connection up all the time. The ZyXEL Device will try to bring up the connection automatically if it is disconnected.
Select Connect on Demand when you don't want the connection up all the time and specify an idle time-out in the Max Idle Timeout field.
on Demand. The default setting is 0, which means the Internet session will not timeout.
This field is available when you select PPPoE encapsulation. In addition to the ZyXEL Device's built-in PPPoE client, you can enable PPPoE
pass through to allow up to ten hosts on the LAN to use PPPoE client software on their computers to connect to the ISP via the ZyXEL Device. Each host can have a separate account and a public WAN IP address.
PPPoE pass through is an alternative to NAT for application where NAT is not appropriate.
Disable PPPoE pass through if you do not need to allow hosts on the LAN to use PPPoE client software on their computers to connect to the ISP.
Enter a subnet mask in dotted decimal notation. Refer to the appendices to calculate a subnet mask If you are implementing
subnetting.
You must specify a gateway IP address (supplied by your ISP) when you select ENET ENCAP in the Encapsulation field.
use a static WAN IP address or in bridge mode. Select Yes to set the ZyXEL Device to automatically detect the Internet
connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and make the necessary configuration changes.
Select No to disable this feature. You must manually configure the ZyXEL Device for Internet access.
frame size your ZyXEL Device can send. Setting a high MTU allows larger frames to be sent from your device resulting in the more efficient use of bandwidth. However, the size of frames on your network may be limited by the Ethernet maximum frame size limit of 1500 bytes. Furthermore, if other devices have a smaller MTU setting, they must fragment packets received from the ZyXEL Device, resulting in slower overall transmission speeds. Type the MTU in this field if your ISP gave you it. Otherwise leave it at its default setting.
P-660W-Tx v2 User’s Guide
89
Chapter 7 WAN Setup
7.8 Traffic Redirect
Traffic redirect forwards traffic to a backup gateway when the ZyXEL Device cannot connect to the Internet. An example is shown in the figure below.
Figure 34 Traffic Redirect Example
The following network topology allows you to avoid triangle route security issues when the backup gateway is connected to the LAN. Use IP alias to configure the LAN into two or three logical networks with the ZyXEL Device itself as the gateway for each LAN network. Put the protected LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another subnet (Subnet 2). Configure filters that allow packets from the protected LAN (Subnet 1) to the backup gateway (Subnet 2).
Figure 35 Traffic Redirect LAN Setup
7.9 Configuring WAN Backup
Click WA N, then WAN Backup. The screen appears as shown. Use this screen to change your ZyXEL Device’s WAN backup settings.
90
P-660W-Tx v2 User’s Guide
Figure 36 WAN Backup
Chapter 7 WAN Setup
The following table describes the fields in this screen.
Table 27 WAN Backup
LABEL DESCRIPTION
Backup Type Select the method that the ZyXEL Device uses to check the DSL connection.
Select DSL Link to have the ZyXEL Device check if the connection to the DSLAM is up. Select ICMP to have the ZyXEL Device periodically ping the IP addresses configured in the Check WAN IP Address fields.
Check WAN IP Address1-3
Configure this field to test your ZyXEL Device's WAN accessibility. Type the IP address of a reliable nearby computer (for example, your ISP's DNS server address).
" If you activate either traffic redirect or dial backup,
you must configure at least one IP address here.
When using a WAN backup connection, the ZyXEL Device periodically pings the addresses configured here and uses the other WAN backup connection (if configured) if there is no response.
Fail Tolerance Type the number of times (2 recommended) that your ZyXEL Device may ping the
IP addresses configured in the Check WAN IP Address field without getting a response before switching to a WAN backup connection (or a different WAN backup connection).
Recovery Interval When the ZyXEL Device is using a lower priority connection (usually a WAN
backup connection), it periodically checks to whether or not it can use a higher priority connection.
Type the number of seconds (30 recommended) for the ZyXEL Device to wait between checks. Allow more time if your destination IP address handles lots of traffic.
P-660W-Tx v2 User’s Guide
91
Chapter 7 WAN Setup
Table 27 WAN Backup (continued)
LABEL DESCRIPTION
Timeout Type the number of seconds (3 recommended) for your ZyXEL Device to wait for a
Traffic Redirect Traffic redirect forwards traffic to a backup gateway when the ZyXEL Device
Active Select this check box to have the ZyXEL Device use traffic redirect if the normal
Metric This field sets this route's priority among the routes the ZyXEL Device uses.
Backup Gateway Type the IP address of your backup gateway in dotted decimal notation. The
Back Click Back to return to the previous screen.
Apply Click Apply to save the changes.
Cancel Click Cancel to begin configuring this screen afresh.
ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request. The WAN connection is considered "down" after the ZyXEL Device times out the number of times specified in the Fail Tolerance field. Use a higher value in this field if your network is busy or congested.
cannot connect to the Internet.
WAN connection goes down.
" If you activate traffic redirect, you must configure at
least one Check WAN IP Address.
The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number greater than "15" means the link is down. The smaller the number, the lower the "cost".
ZyXEL Device automatically forwards traffic to this IP address if the ZyXEL Device's Internet connection terminates.
92
P-660W-Tx v2 User’s Guide
CHAPTER 8
Network Address Translation
(NAT) Screens
This chapter discusses how to configure NAT on the ZyXEL Device.
8.1 NAT Overview
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
8.1.1 NAT Definitions
Inside/outside denotes where a host is located relative to the ZyXEL Device, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.
Global/local denotes the IP address of a host in a packet as the packet traverses a router, for example, the local address refers to the IP address of a host when the packet is in the local network, while the global address refers to the IP address of the host when the same packet is traveling in the WAN side.
Note that inside/outside refers to the location of a host, while global/local refers to the IP address of a host used in a packet. Thus, an inside local address (ILA) is the IP address of an inside host in a packet when the packet is still in the local network, while an inside global address (IGA) is the IP address of the same inside host when the packet is on the WAN side. The following table summarizes this information.
Table 28 NAT Definitions
ITEM DESCRIPTION
Inside This refers to the host on the LAN.
Outside This refers to the host on the WAN.
Local This refers to the packet address (source or destination) as the packet travels on the
Global This refers to the packet address (source or destination) as the packet travels on the
LAN.
WAN.
NAT never changes the IP address (either local or global) of an outside host.
P-660W-Tx v2 User’s Guide
93
Chapter 8 Network Address Translation (NAT) Screens
8.1.2 What NAT Does
In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host. Note that the IP address (either local or global) of an outside host is never changed.
The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP. In addition, you can designate servers, for example, a web server and a telnet server, on your local network and make them accessible to the outside world. If you do not define any servers (for Many-to-One and Many-to-Many Overload mapping – see Table 29 on page 96), NAT offers the additional benefit of firewall protection. With no servers defined, your ZyXEL Device filters out all incoming inquiries, thus preventing intruders from probing your network. For more information on IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT).
8.1.3 How NAT Works
Each packet has two addresses – a source address and a destination address. For outgoing packets, the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address) is the source address on the WAN. For incoming packets, the ILA is the destination address on the LAN, and the IGA is the destination address on the WAN. NAT maps private (local) IP addresses to globally unique ones required for communication with hosts on other networks. It replaces the original IP source address (and TCP or UDP source port numbers for Many-to-One and Many-to-Many Overload NAT mapping) in each packet and then forwards it to the Internet. The ZyXEL Device keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored. The following figure illustrates this.
Figure 37 How NAT Works
8.1.4 NAT Application
The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the ZyXEL Device can communicate with three distinct WAN networks. More examples follow at the end of this chapter.
94
P-660W-Tx v2 User’s Guide
Chapter 8 Network Address Translation (NAT) Screens
Figure 38 NAT Application With IP Alias
8.1.5 NAT Mapping Types
NAT supports five types of IP/port mapping. They are:
One to One: In One-to-One mode, the ZyXEL Device maps one local IP address to one global IP address.
Many to One: In Many-to-One mode, the ZyXEL Device maps multiple local IP addresses to one global IP address. This is equivalent to SUA (for instance, PAT, port address translation), ZyXEL’s Single User Account feature that previous ZyXEL routers supported (the SUA Only option in today’s routers).
Many to Many Overload: In Many-to-Many Overload mode, the ZyXEL Device maps the multiple local IP addresses to shared global IP addresses.
Many-to-Many No Overload: maps each local IP address to a unique global IP address.
Server: This type allows you to specify inside servers of different services behind the NAT to be accessible to the outside world.
Port numbers do NOT change for One-to-One and Many-to-Many No Overload NAT mapping types.
In Many-to-Many No Overload mode, the ZyXEL Device
P-660W-Tx v2 User’s Guide
95
Chapter 8 Network Address Translation (NAT) Screens
The following table summarizes these types.
Table 29 NAT Mapping Types
TYPE IP MAPPING
One-to-One ILA1ÅÆ IGA1
Many-to-One (SUA/PAT) ILA1ÅÆ IGA1
ILA2ÅÆ IGA1 …
Many-to-Many Overload ILA1ÅÆ IGA1
ILA2ÅÆ IGA2 ILA3ÅÆ IGA1 ILA4ÅÆ IGA2 …
Many-to-Many No Overload ILA1ÅÆ IGA1
ILA2ÅÆ IGA2 ILA3ÅÆ IGA3 …
Server Server 1 IPÅÆ IGA1
Server 2 IPÅÆ IGA1 Server 3 IPÅÆ IGA1
8.2 SUA (Single User Account) Versus NAT
SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server. The ZyXEL Device also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types as outlined in Table 29 on page 96.
• Choose SUA Only if you have just one public WAN IP address for your ZyXEL Device.
• Choose Full Feature if you have multiple public WAN IP addresses for your ZyXEL Device.
8.3 SUA Server
A SUA server set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though SUA makes your whole inside network appear as a single computer to the outside world.
You may enter a single port number or a range of port numbers to be forwarded, and the local IP address of the desired server. The port number identifies a service; for example, web service is on port 80 and FTP on port 21. In some cases, such as for unknown services or where one server can support more than one service (for example both FTP and web service), it might be better to specify a range of port numbers. You can allocate a server IP address that corresponds to a port or a range of ports.
96
Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP.
P-660W-Tx v2 User’s Guide
Chapter 8 Network Address Translation (NAT) Screens
8.3.1 Default Server IP Address
In addition to the servers for specified services, NAT supports a default server IP address. A default server receives packets from ports that are not specified in this screen.
If you do not assign an IP address in Server Set 1 (default server) the ZyXEL Device discards all packets received for ports that are not specified here or in the remote management setup.
8.3.2 Port Forwarding: Services and Port Numbers
The most often used port numbers are shown in the following table. Please refer to RFC 1700 for further information about port numbers.
Table 30 Services and Port Numbers
SERVICES PORT NUMBER
ECHO 7
FTP (File Transfer Protocol) 21
SMTP (Simple Mail Transfer Protocol) 25
DNS (Domain Name System) 53
Finger 79
HTTP (Hyper Text Transfer protocol or WWW, Web) 80
POP3 (Post Office Protocol) 110
NNTP (Network News Transport Protocol) 119
SNMP (Simple Network Management Protocol) 161
SNMP trap 162
PPTP (Point-to-Point Tunneling Protocol) 1723
8.3.3 Configuring Servers Behind SUA (Example)
Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of
192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet.
IP address assigned by ISP.
Figure 39 Multiple Servers Behind NAT Example
P-660W-Tx v2 User’s Guide
97
Chapter 8 Network Address Translation (NAT) Screens
8.4 Selecting the NAT Mode
You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the ZyXEL Device. Click NAT to open the following screen.
Figure 40 NAT Mode
The following table describes the labels in this screen.
Table 31 NAT Mode
LABEL DESCRIPTION
None Select this radio button to disable NAT.
SUA Only Select this radio button if you have just one public WAN IP address for your ZyXEL
Edit Details Click this link to go to the NAT - Edit SUA/NAT Server Set screen.
Full Feature Select this radio button if you have multiple public WAN IP addresses for your ZyXEL
Edit Details Click this link to go to the NAT - Address Mapping Rules screen.
Apply Click Apply to save your configuration.
Device. The ZyXEL Device uses Address Mapping Set 1 in the NAT - Edit SUA/NAT Server Set screen.
Device.
8.5 Configuring SUA Server Set
If you do not assign an IP address in Server Set 1 (default server) the ZyXEL Device discards all packets received for ports that are not specified here or in the remote management setup.
Click NAT, select SUA Only and click Edit Details to open the following screen.
See Section 8.3 on page 96 for more information. See Table 30 on page 97 for port numbers commonly used for particular services.
98
P-660W-Tx v2 User’s Guide
Figure 41 Edit SUA/NAT Server Set
Chapter 8 Network Address Translation (NAT) Screens
The following table describes the fields in this screen.
Table 32 Edit SUA/NAT Server Set
LABEL DESCRIPTION
Start Port No. Enter a port number in this field.
To forward only one port, enter the port number again in the End Port No. field. To forward a series of ports, enter the start port number here and the end port
number in the End Port No. field.
End Port No. Enter a port number in this field.
To forward only one port, enter the port number again in the Start Port No. field above and then enter it again in this field.
To forward a series of ports, enter the last port number in a series that begins with the port number in the Start Port No. field above.
Server IP Address
Save Click Save to save your changes back to the ZyXEL Device.
Cancel Click Cancel to return to the previous configuration.
Enter your server IP address in this field.
8.6 Configuring Address Mapping Rules
Ordering your rules is important because the ZyXEL Device applies the rules in the order that you specify. When a rule matches the current packet, the ZyXEL Device takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty
P-660W-Tx v2 User’s Guide
99
Chapter 8 Network Address Translation (NAT) Screens
rules. For example, if you have already configured rules 1 to 6 in your current set and now you configure rule number 9. In the set summary screen, the new rule will be rule 7, not 9. Now if you delete rule 4, rules 5 to 7 will be pushed up by 1 rule, so old rules 5, 6 and 7 become new rules 4, 5 and 6.
Click NAT, select Full Feature and click Edit Details to open the following screen. Use this screen to change your ZyXEL Device’s address mapping settings.
Figure 42 Address Mapping Rules
The following table describes the fields in this screen.
Table 33 Address Mapping Rules
LABEL DESCRIPTION
Local Start IP This is the starting Inside Local IP Address (ILA). Local IP addresses are N/A for
Server port mapping.
Local End IP This is the end Inside Local IP Address (ILA). If the rule is for all local IP addresses,
then this field displays 0.0.0.0 as the Local Start IP address and 255.255.255.255 as the Local End IP address. This field is N/A for One-to-one and Server mapping types.
Global Start IP This is the starting Inside Global IP Address (IGA). Enter 0.0.0.0 here if you have a
dynamic IP address from your ISP. You can only do this for Many-to-One and Server mapping types.
Global End IP This is the ending Inside Global IP Address (IGA). This field is N/A for One-to-one,
Many-to-One and Server mapping types.
100
P-660W-Tx v2 User’s Guide
Loading...