24.1 The USG SecuExtender Icon ........................................................................................................391
24.2 Status ............................................................................................................................................ 391
36.1 Resetting the USG ........................................................................................................................644
36.2 Getting More Troubleshooting Help ..............................................................................................645
Appendix A Customer Support ........................................................................................................646
Appendix B Legal Information..........................................................................................................652
Appendix C Product Features..........................................................................................................661
Index ..................................................................................................................................................665
USG20(W)-VPN Series User’s Guide
15
Page 16
PART I
User’s Guide
16
Page 17
17
Page 18
1.1 Overview
“USG” in this User’s Guide refers to all USG models in the series.
Table 1 USG Models
USG20-VPN
USG20W-VPN
USG20W-VPN has built-in Wi-Fi functionality
•See Table 12 on page 47 for default port / interface name mapping. See Table 13 on page 48 for
default interface / zone mapping.
See the product’s datasheet for detailed information on a specific model.
CHAPTER 1
Introduction
1.1.1 Applications
These are some USG application scenarios.
Security Router
Security includes a Stateful Packet Inspection (SPI) firewall, Content Filtering (CF) and Anti-Spam
(AS).
The USG supports IPv6 Ethernet, PPP, VLAN, and bridge routing. You may also create IPv6 policy
routes and IPv6 objects. The USG can also route IPv6 packets through IPv4 networks using
different tunneling methods.
Figure 2 Applications: IPv6 Routing
VPN Connectivity
Set up VPN tunnels with other companies, branch offices, telecommuters, and business travelers to
provide secure access to your network. You can also purchase the USG OTPv2 One-Time Password
System for strong two-factor authentication for Web Configurator, Web access, SSL VPN, and ZyXEL
IPSec VPN client user logins.
Figure 3 Applications: VPN Connectivity
SSL VPN Network Access
SSL VPN lets remote users use their web browsers for a very easy-to-use VPN solution. A user just
browses to the USG’s web address and enters his user name and password to securely connect to
the USG’s network. Here full tunnel mode creates a virtual connection for a remote user and gives
him a private IP address in the same subnet as the local network so he can access network
resources in the same way as if he were part of the internal network.
USG20(W)-VPN Series User’s Guide
19
Page 20
Chapter 1 Introduction
Web Mail File Share
Web-based Application
https://
Application Server
Non-Web
LAN (192.168.1.X)
A
B
C
Figure 4 SSL VPN With Full Tunnel Mode
User-Aware Access Control
Set up security policies to restrict access to sensitive information and shared resources based on
the user who is trying to access it. In the following figure user A can access both the Internet and
an internal file server. User B has a lower level of access and can only access the Internet. User C is
not even logged in, so and cannot access either the Internet or the file server.
Figure 5 Applications: User-Aware Access Control
Load Balancing
Set up multiple connections to the Internet on the same port, or different ports, including cellular
interfaces. In either case, you can balance the traffic loads between them.
Figure 6 Applications: Multiple WAN Interfaces
1.2 Management Overview
You can manage the USG in the following ways.
USG20(W)-VPN Series User’s Guide
20
Page 21
Chapter 1 Introduction
Web Configurator
The Web Configurator allows easy USG setup and management using an Internet browser. This
User’s Guide provides information about the Web Configurator.
Figure 7 Managing the USG: Web Configurator
Command-Line Interface (CLI)
The CLI allows you to use text-based commands to configure the USG. Access it using remote
management (for example, SSH or Telnet) or via the physical or Web Configurator console port.
See the Command Reference Guide for CLI details. The default settings for the console port are:
T
able 2 Console Port Default Settings
SETTINGVALUE
Speed115200 bps
Data Bits8
ParityNone
Stop Bit1
Flow ControlOff
FTP
Use File Transfer Protocol for firmware upgrades and configuration backup/restore.
SNMP
The device can be monitored and/or managed by an SNMP manager. See Section 30.11 on page
576.
USG20(W)-VPN Series User’s Guide
21
Page 22
Cloud CNM
Use the CloudCNM screen (see Section 30.13 on page 582) to enable and configure management
of the USG by a Central Network Management system.
1.3 Web Configurator
In order to use the Web Configurator, you must:
• Use one of the following web browser versions or later: Internet Explorer 7, Firefox 3.5, Chrome
9.0
• Allow pop-up windows (blocked by default in Windows XP Service Pack 2)
• Enable JavaScripts, Java permissions, and cookies
The recommended screen resolution is 1024 x 768 pixels.
1.3.1 Web Configurator Access
Chapter 1 Introduction
1Make sure your USG hardware is properly connected. See the Quick Start Guide.
2In your browser go to http://192.168.1.1. By default, the USG automatically routes this request to
its HTTPS server, and it is recommended to keep this setting. The Login screen appears.
3Type the user name (default: “admin”) and password (default: “1234”).
If you have a OTP (One-Time Password) token generate a number and enter it in the One-Time Password field. The number is only good for one login. You must use the token to generate a new
number the next time you log in.
4Click Login. If you logged in using the default user name and password, the Update Admin Info
screen appears. Otherwise, the dashboard appears.
USG20(W)-VPN Series User’s Guide
22
Page 23
Chapter 1 Introduction
5The Network Risk Warning screen displays any unregistered or disabled security services. Select
how often to display the screen and click OK.
If you select Never and you later want to bring this screen back, use these commands (note the
space before the underscore).
See the Command Line Interface (CLI) Reference Guide (RG) for details on all supported
commands.
USG20(W)-VPN Series User’s Guide
23
Page 24
Chapter 1 Introduction
A
C
B
6Follow the directions in the Update Admin Info screen. If you change the default password, the
Login screen appears after you click Apply. If you click Ignore, the Installation Setup Wizard
opens if the USG is using its default configuration; otherwise the dashboard appears.
1.3.2 Web Configurator Screens Overview
The Web Configurator screen is divided into these parts (as illustrated on page 24):
• A - title bar
• B - navigation panel
• C - main window
Title Bar
Figure 8 Title Bar
USG20(W)-VPN Series User’s Guide
24
Page 25
Chapter 1 Introduction
The title bar icons in the upper right corner provide the following functions.
Table 3 Title Bar: Web Configurator Icons
LABELDESCRIPTION
LogoutClick this to log out of the Web Configurator.
HelpClick this to open the help page for the current screen.
AboutClick this to display basic information about the USG.
Site MapClick this to see an overview of links to the Web Configurator screens.
Object Reference Click this to check which configuration items reference an object.
ConsoleClick this to open a Java-based console window from which you can run command line
CLIClick this to open a popup window that displays the CLI commands sent by the Web
interface (CLI) commands. You will be prompted to enter your user name and password.
See the Command Reference Guide for information about the commands.
Configurator to the USG.
About
Click About to display basic information about the USG.
Figure 9 About
Table 4 About
LABELDESCRIPTION
Current VersionThis shows the firmware version of the USG.
Released DateThis shows the date (yyyy-mm-dd) and time (hh:mm:ss) when the firmware is released.
OKClick this to close the screen.
Site Map
Click Site MAP to see an overview of links to the Web Configurator screens. Click a screen’s link to
go to that screen.
USG20(W)-VPN Series User’s Guide
25
Page 26
Figure 10 Site Map
Object Reference
Chapter 1 Introduction
Click Object Reference to open the Object Reference screen. Select the type of object and the
individual object and click Refresh to show which configuration settings reference the object.
Figure 11 Object Reference
The fields vary with the type of object. This table describes labels that can appear in this screen.
Table 5 Object References
LABELDESCRIPTION
Object Name This identifies the object for which the configuration settings that use it are displayed. Click the
#This field is a sequential value, and it is not associated with any entry.
ServiceThis is the type of setting that references the selected object. Click a service’s name to display
object’s name to display the object’s configuration screen in the main window.
the service’s configuration screen in the main window.
USG20(W)-VPN Series User’s Guide
26
Page 27
Chapter 1 Introduction
Table 5 Object References (continued)
LABELDESCRIPTION
PriorityIf it is applicable, this field lists the referencing configuration item’s position in its list,
NameThis field identifies the configuration item that references the object.
DescriptionIf the referencing configuration item has a description configured, it displays here.
RefreshClick this to update the information in this screen.
CancelClick Cancel to close the screen.
otherwise N/A displays.
Console
Click Console to open a Java-based console window from which you can run CLI commands. You
will be prompted to enter your user name and password. See the Command Reference Guide for
information about the commands.
Figure 12 Console Window
CLI Messages
Click CLI to look at the CLI commands sent by the Web Configurator. Open the pop-up window and
then click some menus in the web configurator to display the corresponding commands.
USG20(W)-VPN Series User’s Guide
27
Page 28
Figure 13 CLI Messages
1.3.3 Navigation Panel
Use the navigation panel menu items to open status and configuration screens. Click the arrow in
the middle of the right edge of the navigation panel to hide the panel or drag to resize it. The
following sections introduce the USG’s navigation panel menus and their screens.
Figure 14 Navigation Panel
Chapter 1 Introduction
Dashboard
The dashboard displays general device information, system status, system resource usage, licensed
service status, and interface status in widgets that you can re-arrange to suit your needs. See the
Web Help for details on the dashboard.
USG20(W)-VPN Series User’s Guide
28
Page 29
Chapter 1 Introduction
Monitor Menu
The monitor menu screens display status and statistics information.
Table 6 Monitor Menu Screens Summary
FOLDER OR LINK TABFUNCTION
System Status
Port StatisticsPort
Interface
Status
Traffic
Statistics
Session
Monitor
IGMP StatisticsIGMP
DDNS StatusDDNS
IP/MAC Binding IP/MAC
Login UsersLogin UsersLists the users currently logged into the USG.
Cellular StatusCellular
UPnP Port
Status
USB StorageStorage
Ethernet
Neighbor
Wireless
AP InformationWLAN
DCSConfigure dynamic wireless channel selection.
VPN Monitor
IPSecIPSecDisplays and manages the active IPSec SAs.
SSLSSLLists users currently logged into the VPN SSL client portal. You can also
L2TP over
IPSec
UTM Statistics
Content FilterReportCollect and display content filter statistics
Anti-SpamReportCollect and display spam statistics.
LogView LogLists log entries.
Statistics
Interface
Summary
Tra ffic
Statistics
Session
Monitor
Statistics
Status
Binding
Status
Port
Statistics
Information
Ethernet
Neighbor
Setting
Session
Monitor
StatusDisplays how many mail sessions the USG is currently checking and
View AP Log Lists AP log entries.
Displays packet statistics for each physical port.
Displays general interface information and packet statistics.
Collect and display traffic statistics.
Displays the status of all current sessions.
Collect and display IGMP statistics.
Displays the status of the USG’s DDNS domain names.
Lists the devices that have received an IP address from USG interfaces
using IP/MAC binding.
Displays details about the USG’s mobile broadband connection status.
Displays details about UPnP connections going through the USG.
Displays details about USB device connected to the USG.
View and manage the USG’s neighboring devices via Smart Connect
(Layer Link Discovery Protocol (LLDP)). Use the ZyXEL One Network
(ZON) utility to view and manage the USG’s neighboring devices via the
ZyXEL Discovery Protocol (ZDP).
Edit wireless AP information, remove APs, and reboot them.
log out individual users and delete related session information.
Displays details about current L2TP sessions.
DNSBL (Domain Name Service-based spam Black List) statistics.
USG20(W)-VPN Series User’s Guide
29
Page 30
Chapter 1 Introduction
Configuration Menu
Use the configuration menu screens to configure the USG’s features.
Table 7 Configuration Menu Screens Summary
FOLDER OR LINK TABFUNCTION
Quick SetupQuickly configure WAN interfaces or VPN connections.
Licensing
RegistrationRegistrationRegister the device and activate trial services.
ServiceView the licensed service status and upgrade licensed services.
Wireless
AP ManagementWLAN SettingConfiguration the USG’s general wireless settings.
DCSConfigure dynamic wireless channel selection.
Network
InterfacePort RoleUse this screen to set the USG’s flexible ports such as LAN, OPT,
EthernetManage Ethernet interfaces and virtual Ethernet interfaces.
PPPCreate and manage PPPoE and PPTP interfaces.
CellularConfigure a cellular Internet connection for an installed mobile
TunnelConfigure tunneling between IPv4 and IPv6 networks.
VLANCreate and manage VLAN interfaces and virtual VLAN interfaces.
BridgeCreate and manage bridges and virtual bridge interfaces.
Trun kCreate and manage trunks (groups of interfaces) for load
RoutingPolicy RouteCreate and manage routing policies.
Static RouteCreate and manage IP static routing information.
RIPConfigure device-level RIP settings.
OSPFConfigure device-level OSPF settings, including areas and virtual
DDNSDDNSDefine and manage the USG’s DDNS domain names.
NATNATSet up and manage port forwarding rules.
HTTP RedirectHTTP RedirectSet up and manage HTTP redirection rules.
ALGALGConfigure SIP, H.323, and FTP pass-through settings.
UPnPUPnPConfigure interfaces that allow UPnP and NAT-PMP connections.
IP/MAC
Binding
Layer 2
Isolation
DNS Inbound LBDNS Load
Web
Authentication
Security Policy
SummaryConfigure IP to MAC address bindings for devices connected to
Exempt ListConfigure ranges of IP addresses to which the USG does not apply
GeneralEnable layer-2 isolation on the USG and the internal interface(s).
White ListEnable and configure the white list.
Balancing
Web Authentication Define a web portal and exempt services from authentication.
SSOConfigure the USG to work with a Single Sign On agent.
WLAN, or DMZ.
broadband card.
balancing.
links.
each supported interface.
IP/MAC binding.
Configure DNS Load Balancing.
USG20(W)-VPN Series User’s Guide
30
Page 31
Chapter 1 Introduction
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR LINK TABFUNCTION
Policy ControlPolicyCreate and manage level-3 traffic rules and apply UTM profiles.
Session
Control
VPN
IPSec VPNVPN ConnectionConfigure IPSec tunnels.
SSL VPNAccess PrivilegeConfigure SSL VPN access rights for users and groups.
L2TP VPNL2TP VPNConfigure L2TP over IPSec tunnels.
BWMBWMEnable and configure bandwidth management rules.
UTM Profile
Content FilterProfileCreate and manage the detailed filtering rules for content filtering
Anti-SpamProfileTurn anti-spam on or off and manage anti-spam policies. Create
Object
ZoneZoneConfigure zone template(s) used to define various policies.
User/GroupUserCreate and manage users.
AP ProfileRadioCreate template(s) of radio settings to apply to policies as an
MON ProfileMON ProfileCreate and manage rogue AP monitoring files that can be
AddressAddressCreate and manage host, range, and network (subnet) addresses.
Session ControlLimit the number of concurrent client NAT/security policy sessions.
VPN GatewayConfigure IKE tunnels.
ConcentratorCombine IPSec VPN connections into a single secure network
Configuration
Provisioning
Global SettingConfigure the USG’s SSL VPN settings that apply to all connections.
SecuExtenderCheck for the latest version of the SecuExtender VPN client.
Trusted Web SitesCreate a list of allowed web sites that bypass content filtering
Forbidden Web
Sites
Mail ScanConfigure e-mail scanning details.
Black/White List Set up a black list to identify spam and a white list to identify
DNSBLHave the USG check e-mail against DNS Black Lists.
GroupCreate and manage groups of users.
SettingManage default settings for all users, general settings for user
MAC AddressConfigure the MAC addresses or OUI (Organizationally Unique
SSIDCreate template(s) of wireless settings to apply to radio profiles or
Address GroupCreate and manage groups of addresseto apply to policies as a
Set who can retrieve VPN rule settings from the USG using the USG
IPSec VPN Client.
profiles and then apply to a traffic flow using a security policy.
policies.
Create a list of web sites to block regardless of content filtering
policies.
anti-spam template(s) of settings to apply to a traffic flow using a
security policy.
legitimate e-mail.
sessions, and rules to force user authentication.
Identifier) of wireless clients for MAC authentication using the local
user database.
object.
policies as an object.
associated with different APs.
single objects.
USG20(W)-VPN Series User’s Guide
31
Page 32
Chapter 1 Introduction
Table 7 Configuration Menu Screens Summary (continued)
FOLDER OR LINK TABFUNCTION
ServiceServiceCreate and manage TCP and UDP services.
Service GroupCreate and manage groups of services to apply to policies as a
ScheduleScheduleCreate one-time and recurring schedules.
Schedule GroupCreate and manage groups of schedules to apply to policies as a
AAA ServerActive DirectoryConfigure the Active Directory settings.
LDAPConfigure the LDAP settings.
RADIUSConfigure the RADIUS settings.
Auth. MethodAuthentication
CertificateMy CertificatesCreate and manage the USG’s certificates.
ISP AccountISP AccountCreate and manage ISP account information for PPPoE/PPTP
SSL Application SSL ApplicationCreate SSL web application or file sharing objects to apply to
DHCPv6RequestConfigure IPv6 DHCP request type and interface information.
System
Host NameHost NameConfigure the system and domain name for the USG.
USB StorageSettingsConfigure the settings for the connected USB devices.
Date/TimeDate/TimeConfigure the current date, time, and time zone in the USG.
Console SpeedConsole SpeedSet the console speed.
DNSDNSConfigure the DNS server and address records for the USG.
WWWService ControlConfigure HTTP, HTTPS, and general authentication.
SSHSSHConfigure SSH server and SSH service settings.
TELNETTELNETConfigure telnet server settings for the USG.
FTPFTPConfigure FTP server settings.
SNMPSNMPConfigure SNMP communities and services.
Auth. ServerAuth. ServerConfigure the USG to act as a RADIUS server.
CloudCNMCloudCNMEnable and configure management of the USG by a Central
LanguageLanguageSelect the Web Configurator language.
IPv6IPv6Enable IPv6 globally on the USG here.
ZONZONUse the ZyXEL One Network (ZON) utility to view and manage the
Log & Report
Email Daily
Report
Log SettingsLog SettingsConfigure the system log, e-mail logs, and remote syslog servers.
Method
Trusted CertificatesImport and manage certificates from trusted sources.
LeaseConfigure IPv6 DHCP lease type and interface information.
Login PageConfigure how the login and access user screens look.
Email Daily ReportConfigure where and how to send daily reports and what reports to
single object.
single object.
Create and manage ways of authenticating users.
interfaces.
policies.
Network Management system.
USG’s neighboring devices via the ZyXEL Discovery Protocol (ZDP).
send.
USG20(W)-VPN Series User’s Guide
32
Page 33
Chapter 1 Introduction
Maintenance Menu
Use the maintenance menu screens to manage configuration and firmware files, run diagnostics,
and reboot or shut down the USG.
Configuration FileManage and upload configuration files for the USG.
Firmware Package View the current firmware version and upload firmware. Reboot with your
Shell ScriptManage and run shell script files for the USG.
Packet CaptureCapture packets for analysis.
Core DumpConnect a USB device to the USG and save the USG operating system kernel
System LogConnect a USB device to the USG and archive the USG system logs to it
Network ToolIdentify problems with the connections. You can use Ping or TraceRoute to
Wireless Frame
Capture
Routing StatusCheck how the USG determines where to route a packet.
SNAT StatusView a clear picture on how the USG converts a packet’s source IP address
choice of firmware.
to it here.
here.
help you identify problems.
Capture wireless frames from APs for analysis.
and check the related settings.
1.3.4 Tables and Lists
Web Configurator tables and lists are flexible with several options for how to display their entries.
Click a column heading to sort the table’s entries according to that column’s criteria.
Figure 15 Sorting Table Entries by a Column’s Criteria
Click the down arrow next to a column heading for more options about how to display the entries.
The options available vary depending on the type of fields in the column. Here are some examples
of what you can do:
• Sort in ascending or descending (reverse) alphabetical order
• Select which columns to display
• Group entries by field
• Show entries in groups
• Filter by mathematical operators (<, >, or =) or searching for text
USG20(W)-VPN Series User’s Guide
33
Page 34
Chapter 1 Introduction
Figure 16 Common Table Column Options
Select a column heading cell’s right border and drag to re-size the column.
Figure 17 Resizing a Table Column
Select a column heading and drag and drop it to change the column order. A green check mark
displays next to the column’s title when you drag the column to a valid new location.
Figure 18 Moving Columns
Use the icons and fields at the bottom of the table to navigate to different pages of entries and
control how many entries display at a time.
Figure 19 Navigating Pages of Table Entries
The tables have icons for working with table entries. You can often use the [Shift] or [Ctrl] key to
select multiple entries to remove, activate, or deactivate.
USG20(W)-VPN Series User’s Guide
34
Page 35
Chapter 1 Introduction
Figure 20 Common Table Icons
Here are descriptions for the most common table icons.
Table 9 Common Table Icons
LABELDESCRIPTION
AddClick this to create a new entry. For features where the entry’s position in the numbered list is
EditDouble-click an entry or select it and click Edit to open a screen where you can modify the
RemoveTo remove an entry, select it and click Remove. The USG confirms you want to remove it before
ActivateTo turn on an entry, select it and click Activate.
InactivateTo turn off an entry, select it and click Inactivate.
ConnectTo connect an entry, select it and click Connect.
Disconnect To disconnect an entry, select it and click Disconnect.
Object
References
MoveTo change an entry’s position in a numbered list, select it and click Move to display a field to
important (features where the USG applies the table’s entries in order like the security policy for
example), you can select an entry and click Add to create a new entry after the selected entry.
entry’s settings. In some tables you can just click a table entry and edit it directly in the table.
For those types of tables small red triangles display for table entries with changes that you have
not yet applied.
doing so.
Select an entry and click Object References to check which settings use the entry.
type a number for where you want to put that entry and press [ENTER] to move the entry to the
number that you typed. For example, if you type 6, the entry you are moving becomes number 6
and the previous entry 6 (if there is one) gets pushed up (or down) one.
Working with Lists
When a list of available entries displays next to a list of selected entries, you can often just doubleclick an entry to move it from one list to the other. In some lists you can also use the [Shift] or
[Ctrl] key to select multiple entries, and then use the arrow button to move them to the other list.
Figure 21 Working with Lists
USG20(W)-VPN Series User’s Guide
35
Page 36
CHAPTER 2
Installation Setup Wizard
2.1 Installation Setup Wizard Screens
When you log into the Web Configurator for the first time or when you reset the USG to its default
configuration, the Installation Setup Wizard screen displays. This wizard helps you configure
Internet connection settings and activate subscription services. This chapter provides information
on configuring the Web Configurator's installation setup wizard. See the feature-specific chapters in
this User’s Guide for background information.
Figure 22 Installation Setup Wizard
• Click the double arrow in the upper right corner to display or hide the help.
• Click Go to Dashboard to skip the installation setup wizard or click Next to start configuring for
Internet access.
2.1.1 Internet Access Setup - WAN Interface
Use this screen to set how many WAN interfaces to configure and the first WAN interface’s type of
encapsulation and method of IP address assignment.
The screens vary depending on the encapsulation type. Refer to information provided by your ISP
to know what to enter in each field. Leave a field blank if you don’t have that information.
Note: Enter the Internet access information exactly as your ISP gave it to you.
USG20(W)-VPN Series User’s Guide
36
Page 37
Chapter 2 Installation Setup Wizard
Figure 23 Internet Access: Step 1
• I have two ISPs: Select this option to configure two Internet connections. Leave it cleared to
configure just one. This option appears when you are configuring the first WAN interface.
• Encapsulation: Choose the Ethernet option when the WAN port is used as a regular Ethernet.
Otherwise, choose PPPoE or PPTP for a dial-up connection according to the information from
your ISP.
• WAN Interface: This is the interface you are configuring for Internet access.
• Zone: This is the security zone to which this interface and Internet connection belong.
• IP Address Assignment: Select Auto if your ISP did not assign you a fixed IP address.
Select Static if the ISP assigned a fixed IP address.
2.1.2 Internet Access: Ethernet
This screen is read-only if you set the previous screen’s IP Address Assignment field to Auto. If
you set the previous screen’s IP Address Assignment field to Static, use this screen to configure
your IP address settings.
Note: Enter the Internet access information exactly as given to you by your ISP or
network administrator.
USG20(W)-VPN Series User’s Guide
37
Page 38
Chapter 2 Installation Setup Wizard
Figure 24 Internet Access: Ethernet Encapsulation
• Encapsulation: This displays the type of Internet connection you are configuring.
• First WAN Interface: This is the number of the interface that will connect with your ISP.
• Zone: This is the security zone to which this interface and Internet connection will belong.
• IP Address: Enter your (static) public IP address. Auto displays if you selected Auto as the IPAddress Assignment in the previous screen.
The following fields display if you selected static IP address assignment.
• IP Subnet Mask: Enter the subnet mask for this WAN connection's IP address.
• Gateway IP Address: Enter the IP address of the router through which this WAN connection
will send traffic (the default gateway).
• First / Second DNS Server: These fields display if you selected static IP address assignment.
The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a
DNS server's IP address(es). The DNS server is extremely important because without it, you
must know the IP address of a computer before you can access it. The USG uses these (in the
order you specify here) to resolve domain names for VPN, DDNS and the time server. Leave the
field as 0.0.0.0 if you do not want to configure DNS servers.
2.1.3 Internet Access: PPPoE
Note: Enter the Internet access information exactly as given to you by your ISP.
USG20(W)-VPN Series User’s Guide
38
Page 39
Figure 25 Internet Access: PPPoE Encapsulation
2.1.3.1 ISP Parameters
• Type the PPPoE Service Name from your service provider. PPPoE uses a service name to identify
and reach the PPPoE server. You can use alphanumeric and -_@$./ characters, and it can be up
to 64 characters long.
• Authentication Type - Select an authentication protocol for outgoing connection requests.
Options are:
• CHAP/PAP - Your USG accepts either CHAP or PAP when requested by the remote node.
• CHAP - Your USG accepts CHAP only.
• PAP - Your USG accepts PAP only.
• MSCHAP - Your USG accepts MSCHAP only.
• MSCHAP-V2 - Your USG accepts MSCHAP-V2 only.
•Type the User Name given to you by your ISP. You can use alphanumeric and -_@$./ characters,
and it can be up to 31 characters long.
•Type the Password associated with the user name. Use up to 64 ASCII characters except the []
and ?. This field can be blank.
•Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeout in seconds that elapses before the router automatically disconnects from the PPPoE
server.
Chapter 2 Installation Setup Wizard
2.1.3.2 WAN IP Address Assignments
• WAN Interface: This is the name of the interface that will connect with your ISP.
• Zone: This is the security zone to which this interface and Internet connection will belong.
• IP Address: Enter your (static) public IP address. Auto displays if you selected Auto as the IPAddress Assignment in the previous screen.
USG20(W)-VPN Series User’s Guide
39
Page 40
Chapter 2 Installation Setup Wizard
• First / Second DNS Server: These fields display if you selected static IP address assignment.
The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a
DNS server's IP address(es). The DNS server is extremely important because without it, you
must know the IP address of a computer before you can access it. The USG uses these (in the
order you specify here) to resolve domain names for VPN, DDNS and the time server. Leave the
field as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server,
you must know the IP address of a machine in order to access it.
2.1.4 Internet Access: PPTP
Note: Enter the Internet access information exactly as given to you by your ISP.
Figure 26 Internet Access: PPTP Encapsulation
2.1.4.1 ISP Parameters
• Authentication Type - Select an authentication protocol for outgoing calls. Options are:
• CHAP/PAP - Your USG accepts either CHAP or PAP when requested by the remote node.
• CHAP - Your USG accepts CHAP only.
• PAP - Your USG accepts PAP only.
• MSCHAP - Your USG accepts MSCHAP only.
• MSCHAP-V2 - Your USG accepts MSCHAP-V2 only.
•Type the User Name given to you by your ISP. You can use alphanumeric and -_@$./ characters,
and it can be up to 31 characters long.
•Type the Password associated with the user name. Use up to 64 ASCII characters except the []
and ?. This field can be blank. Re-type your password in the next field to confirm it.
•Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeout in seconds that elapses before the router automatically disconnects from the PPTP
server.
USG20(W)-VPN Series User’s Guide
40
Page 41
Chapter 2 Installation Setup Wizard
2.1.4.2 PPTP Configuration
• Base Interface: This identifies the Ethernet interface you configure to connect with a modem or
router.
•Type a Base IP Address (static) assigned to you by your ISP.
• Type the IP Subnet Mask assigned to you by your ISP (if given).
• Server IP: Type the IP address of the PPTP server.
•Type a Connection ID or connection name. It must follow the “c:id” and “n:name” format. For
example, C:12 or N:My ISP. This field is optional and depends on the requirements of your
broadband modem or router. You can use alphanumeric and -_: characters, and it can be up to
31 characters long.
2.1.4.3 WAN IP Address Assignments
• First WAN Interface: This is the connection type on the interface you are configuring to
connect with your ISP.
• Zone This is the security zone to which this interface and Internet connection will belong.
• IP Address: Enter your (static) public IP address. Auto displays if you selected Auto as the IP Address Assignment in the previous screen.
• First / Second DNS Server: These fields display if you selected static IP address assignment.
The Domain Name System (DNS) maps a domain name to an IP address and vice versa. Enter a
DNS server's IP address(es). The DNS server is extremely important because without it, you
must know the IP address of a computer before you can access it. The USG uses these (in the
order you specify here) to resolve domain names for VPN, DDNS and the time server. Leave the
field as 0.0.0.0 if you do not want to configure DNS servers.
2.1.5 Internet Access Setup - Second WAN Interface
If you selected I have two ISPs, after you configure the First WAN Interface, you can configure
the Second WAN Interface. The screens for configuring the second WAN interface are similar to
the first (see Section 2.1.1 on page 36).
Fi
gure 27 Internet Access: Step 3: Second WAN Interface
USG20(W)-VPN Series User’s Guide
41
Page 42
Chapter 2 Installation Setup Wizard
2.1.6 Internet Access Succeed
This screen shows your Internet access settings that have been applied successfully.
Figure 28 Internet Access Succeed
2.1.7 Wireless Settings: SSID & Security
Configure SSID and wireless security in this screen.
Figure 29 Wireless Settings: SSID & Security
USG20(W)-VPN Series User’s Guide
42
Page 43
Chapter 2 Installation Setup Wizard
SSID Setting
• SSID - Enter a descriptive name of up to 32 printable characters for the wireless LAN.
• Security Mode - Select Pre-Shared Key to add security on this wireless network. Otherwise,
select None to allow any wireless client to associate this network without authentication.
• Pre-Shared Key - Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters
(including spaces and symbols) or 64 hexadecimal characters.
• Hidden SSID - Select this option if you want to hide the SSID in the outgoing beacon frame. A
wireless client then cannot obtain the SSID through scanning using a site survey tool.
• Enable Intra-BSS Traffic Blocking - Select this option if you want to prevent crossover traffic
from within the same SSID. Wireless clients can still access the wired network but cannot
communicate with each other.
For Built-in Wireless AP Only
• Bridged to: USGs with W in the model name have a built-in AP. Select an interface to bridge
with the built-in AP wireless network. Devices connected to this interface will then be in the same
broadcast domain as devices in the AP wireless network.
2.1.8 Internet Access - Device Registration
Click the link in this screen to register your device at portal.myzyxel.com.
Note: The USG must be connected to the Internet in order to register.
Figure 30 Internet Access: Device Registration
You will need the USG’s serial number and LAN MAC address to register it if you have not already
done so. Use the Configuration > Licensing > Registration > Service screen to update your
service subscription status.
USG20(W)-VPN Series User’s Guide
43
Page 44
Hardware, Interfaces and Zones
3.1 Hardware Overview
USG20-VPN and USG20W-VPN have different housings.
3.1.1 Front Panels
The LED indicators are located on the front panel.
Figure 31 USG20-VPN Front Panel
CHAPTER 3
Figure 32 USG20W-VPN Front Panel
The following table describes the LEDs.
Table 10 LED Descriptions
LEDCOLOR STATUSDESCRIPTION
PWROffThe USG is turned off.
GreenOnThe USG is turned on.
RedOnThere is a hardware component failure. Shut down the device, wait for a few
SYSGreenOffThe USG is not ready or has failed.
OnThe USG is ready and running.
BlinkingThe USG is booting.
RedOnThe USG had an error or has failed.
minutes and then restart the device (see Section 3.1.3 on page 46). If the
LED turns red again, then please contact your vendor.
USG20(W)-VPN Series User’s Guide
44
Page 45
Table 10 LED Descriptions (continued)
LEDCOLOR STATUSDESCRIPTION
WLANGreenOffThe built-in wireless LAN card is not ready or has failed.
P1, P2... GreenOffThere is no traffic on this port.
YellowOffThere is no connection on this port.
3.1.2 Rear Panels
The connection ports are located on the rear panel.
Figure 33 USG20-VPN Rear Panel
Chapter 3 Hardware, Interfaces and Zones
OnThe built-in wireless LAN card is ready.
BlinkingThe built-in wireless LAN card is sending or receiving packets.
OnThis port has a successful 10/100 Mbps connection.
BlinkingThe USG is sending or receiving packets on this port with a 10/100 Mbps
connection.
OnThis port has a successful 1000 Mbps connection.
BlinkingThe device is sending or receiving packets on this port with a 1000 Mbps
connection.
Figure 34 USG20W-VPN Rear Panel
The following table describes the items on the rear panel
Table 11 Rear Panel Items
LABELDESCRIPTION
PowerUse the included power cord to connect the power socket to a power outlet. Turn the power
switch on if your USG has a power switch.
USG20(W)-VPN Series User’s Guide
45
Page 46
Chapter 3 Hardware, Interfaces and Zones
Table 11 Rear Panel Items (continued)
LABELDESCRIPTION
WAN/LAN/DMZ/
(Gigabit SFP/
Ethernet Port)
ConsoleYou can use the console port to manage the USG using CLI commands. You will be
P1- You have to install an SFP (Small Form-factor Pluggable) transceiver and connect fiber
optic cables to it for using a 1Gbps/100Mbps WAN connection.
P2~P6 - Connect an Ethernet cable to the port for using a 1Gbps WAN/LAN/DMZ
connection.
prompted to enter your user name and password. See the Command Reference Guide for
more information about the CLI.
When configuring using the console port, you need a computer equipped with
communications software configured to the following parameters:
• Speed 115200 bps
•Data Bits 8
• Parity None
•Stop Bit 1
• Flow Control Off
Note: Use an 8-wire Ethernet cable to run your Gigabit Ethernet connection at 1000
Mbps. Using a 4-wire Ethernet cable limits your connection to 100 Mbps. Note that
the connection speed also depends on what the Ethernet device at the other end
can support.
3.1.3 Wall-mounting
Both USG20-VPN and USG20W-VPN can be mounted on a wall.
1Drill two holes 3 mm ~ 4 mm (0.12" ~ 0.16") wide, 20 mm ~ 30 mm (0.79” ~ 1.18”) deep and 150
mm apart, into a wall. Place two screw anchors in the holes.
2Screw two screws with 6 mm ~ 8 mm (0.24" ~ 0.31") wide heads into the screw anchors. Do not
screw the screws all the way in to the wall; leave a small gap between the head of the screw and
the wall.
The gap must be big enough for the screw heads to slide into the screw slots and the connection
cables to run down the back of the USG.
Note: Make sure the screws are securely fixed to the wall and strong enough to hold the
weight of the USG with the connection cables.
3Use the holes on the bottom of the USG to hang the USG on the screws.
Wall-mount the USG horizontally. The USG's side panels with ventilation
slots should not be facing up or down as this position is less safe.
USG20(W)-VPN Series User’s Guide
46
Page 47
Figure 35 Wall Mounting
Chapter 3 Hardware, Interfaces and Zones
Screw Specifications
3.2 Default Zones, Interfaces, and Ports
The default configurations for zones, interfaces, and ports are as follows. References to interfaces
may be generic rather than the specific name used in your model. For example, this guide may use
“the WAN interface” rather than “wan1” or “wan2”.
The following table shows the default physical port and interface mapping for each model at the
time of writing.
Table 12 Default Physical Port - Interface Mapping
PORT / INTERFACEP1P2P3P4P5P6
• USG20-VPN
• USG20W-VPN
sfpwanlan1lan1lan1lan1
sfpwanlan1lan1lan1lan1
USG20(W)-VPN Series User’s Guide
47
Page 48
Chapter 3 Hardware, Interfaces and Zones
The following table shows the default interface and zone mapping for each model at the time of
writing.
Table 13 Default Zone - Interface Mapping
ZONE / INTERFACEWANLAN1LAN2DMZ
• USG20-VPN
• USG20W-VPN
WAN
WAN_PPP
SFP
SFP_PPP
WAN
WAN_PPP
SFP
SFP_PPP
3.3 Stopping the USG
Always use Maintenance > Shutdown > Shutdown or the shutdown command before you turn
off the USG or remove the power. Not doing so can cause the firmware to become corrupt.
LAN1LAN2DMZ
LAN1LAN2DMZ
USG20(W)-VPN Series User’s Guide
48
Page 49
4.1 Quick Setup Overview
The Web Configurator's quick setup wizards help you configure Internet and VPN connection
settings. This chapter provides information on configuring the quick setup screens in the Web
Configurator. See the feature-specific chapters in this User’s Guide for background information.
In the Web Configurator, click Configuration > Quick Setup to open the first Quick Setup
screen.
Figure 36 Quick Setup
CHAPTER 4
Quick Setup Wizards
•WAN Interface
Click this link to open a wizard to set up a WAN (Internet) connection. This wizard creates
matching ISP account settings in the USG if you use PPPoE or PPTP. See Section 4.2 on page 50.
•VPN SETUP
Use VPN Setup to configure a VPN (Virtual Private Network) rule for a secure connection to
another computer or network. Use VPN Settings for Configuration Provisioning to set up a
VPN rule that can be retrieved with the USG IPSec VPN Client. You only need to enter a user
name, password and the IP address of the USG in the IPSec VPN Client to get all VPN settings
automatically from the USG. See Section 4.3 on page 55.Use VPN Settings for L2TP VPN Settings to configure the L2TP VPN for clients.
USG20(W)-VPN Series User’s Guide
49
Page 50
Chapter 4 Quick Setup Wizards
•Wizard Help
If the help does not automatically display when you run the wizard, click teh arrow to display it.
4.2 WAN Interface Quick Setup
Click WAN Interface in the main Quick Setup screen to open the WAN Interface Quick Setup
Wizard Welcome screen. Use these screens to configure an interface to connect to the Internet. Click Next.
Figure 37 WAN Interface Quick Setup Wizard
4.2.1 Choose an Ethernet Interface
Select the Ethernet interface (names vary by model) that you want to configure for a WAN
connection and click Next.
USG20(W)-VPN Series User’s Guide
50
Page 51
Figure 38 Choose an Ethernet Interface
4.2.2 Select WAN Type
WAN Type Selection: Select the type of encapsulation this connection is to use. Choose Ethernet
when the WAN port is used as a regular Ethernet.
Chapter 4 Quick Setup Wizards
Otherwise, choose PPPoE or PPTP for a dial-up connection according to the information from your
ISP.
Figure 39 WAN Interface Setup: Step 2
The screens vary depending on what encapsulation type you use. Refer to information provided by
your ISP to know what to enter in each field. Leave a field blank if you don’t have that information.
Note: Enter the Internet access information exactly as your ISP gave it to you.
4.2.3 Configure WAN IP Settings
Use this screen to select whether the interface should use a fixed or dynamic IP address.
USG20(W)-VPN Series User’s Guide
51
Page 52
Chapter 4 Quick Setup Wizards
Figure 40 WAN Interface Setup: Step 2 Dynamic IP
Figure 41 WAN Interface Setup: Step 2 Fixed IP
• WAN Interface: This is the interface you are configuring for Internet access.
• Zone: This is the security zone to which this interface and Internet connection belong.
• IP Address Assignment: Select Auto If your ISP did not assign you a fixed IP address.
Select Static if you have a fixed IP address and enter the IP address, subnet mask, gateway IP
address (optional) and DNS server IP address(es).
4.2.4 ISP and WAN and ISP Connection Settings
Use this screen to configure the ISP and WAN interface settings. This screen is read-only if you
select Ethernet and set t the IP Address Assignment to AutoStatic. If you set the IP Address Assignment to static and/or select PPTP or PPPoE, enter the Internet access information exactly
as your ISP gave it to you.
Note: Enter the Internet access information exactly as your ISP gave it to you.
USG20(W)-VPN Series User’s Guide
52
Page 53
Chapter 4 Quick Setup Wizards
Figure 42 WAN and ISP Connection Settings: (PPTP Shown)
The following table describes the labels in this screen.
Table 14 WAN and ISP Connection Settings
LABELDESCRIPTION
ISP Parameter This section appears if the interface uses a PPPoE or PPTP Internet connection.
EncapsulationThis displays the type of Internet connection you are configuring.
Authentication
Type
User NameType the user name given to you by your ISP. You can use alphanumeric and -_
Password Type the password associated with the user name above. Use up to 64 ASCII characters
Retypeto
nfirm
Co
Nailed-Up Select Nailed-Up if you do not want the connection to time out.
Use the drop-down list box to select an authentication protocol for outgoing calls.
Options are:
CHAP/PAP - Your USG accepts either CHAP or PAP when requested by this remote
node.
CHAP - Your USG accepts CHAP only.
PAP - Your USG accepts PAP only.
MSCHAP - Your USG accepts MSCHAP only.
MSCHAP-V2 - Your USG accepts MSCHAP-V2 only.
characters, and it can be up to 31 characters long.
except the [] and ?. This field can be blank.
Type your password again for confirmation.
USG20(W)-VPN Series User’s Guide
@$./
53
Page 54
Chapter 4 Quick Setup Wizards
Table 14 WAN and ISP Connection Settings (continued)
LABELDESCRIPTION
Idle TimeoutType the time in seconds that elapses before the router automatically disconnects from
PPTP ConfigurationThis section only appears if the interface uses a PPPoE or PPTP Internet connection.
Base InterfaceThis displays the identity of the Ethernet interface you configure to connect with a
Base IP Address Type the (static) IP address assigned to you by your ISP.
IP Subnet MaskType the subnet mask assigned to you by your ISP (if given).
Server IPType the IP address of the PPTP server.
Connection IDEnter the connection ID or connection name in this field. It must follow the "c:id" and
WAN Interface
Setup
WAN InterfaceThis displays the identity of the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will
IP AddressThis field is read-only when the WAN interface uses a dynamic IP address. If your WAN
First DNS
Server
Second DNS
Server
BackClick Back to return to the previous screen.
NextClick Next to continue.
the PPPoE server. 0 means no timeout.
modem or router.
"n:name" format. For example, C:12 or N:My ISP.
This field is optional and depends on the requirements of your DSL modem.
You can use alphanumeric and -_
belong.
interface uses a static IP address, enter it in this field.
These fields only display for an interface with a static IP address. Enter the DNS server
IP address(es) in the field(s) to the right.
Leave the field as 0.0.0.0 if you do not want to configure DNS servers. If you do not
configure a DNS server, you must know the IP address of a machine in order to access
it.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP
address and vice versa. The DNS server is extremely important because without it, you
must know the IP address of a computer before you can access it. The USG uses a
system DNS server (in the order you specify here) to resolve domain names for VPN,
DDNS and the time server.
: characters, and it can be up to 31 characters long.
4.2.5 Quick Setup Interface Wizard: Summary
This screen displays the WAN interface’s settings.
USG20(W)-VPN Series User’s Guide
54
Page 55
Chapter 4 Quick Setup Wizards
Figure 43 Interface Wizard: Summary WAN (PPTP Shown)
The following table describes the labels in this screen.
Table 15 Interface Wizard: Summary WAN
LABELDESCRIPTION
EncapsulationThis displays what encapsulation this interface uses to connect to the Internet.
Service NameThis field only appears for a PPPoE interface. It displays the PPPoE service name specified
Server IPThis field only appears for a PPTP interface. It displays the IP address of the PPTP server.
User NameThis is the user name given to you by your ISP.
Nailed-Up If No displays the connection will not time out. Yes means the USG uses the idle timeout.
Idle TimeoutThis is how many seconds the connection can be idle before the router automatically
Connection IDIf you specified a connection ID, it displays here.
WAN InterfaceThis identifies the interface you configure to connect with your ISP.
ZoneThis field displays to which security zone this interface and Internet connection will belong.
IP Address
Assignment
First DNS Server
Second DNS
Server
CloseClick Close to exit the wizard.
in the ISP account.
disconnects from the PPPoE server. 0 means no timeout.
This field displays whether the WAN IP address is static or dynamic (Auto).
If the IP Address Assignment is Static, these fields display the DNS server IP
address(es).
4.3 VPN Setup Wizard
Click VPN Setup in the main Quick Setup screen to open the VPN Setup Wizard Welcome screen.
USG20(W)-VPN Series User’s Guide
55
Page 56
Figure 44 VPN Setup Wizard
4.3.1 Welcome
Use wizards to create Virtual Private Network (VPN) rules. After you complete the wizard, the Phase
1 rule settings appear in the VPN > IPSec VPN > VPN Gateway screen and the Phase 2 rule
settings appear in the VPN > IPSec VPN > VPN Connection screen.
• VPN Settings configures a VPN tunnel for a secure connection to another computer or network.
• VPN Settings for Configuration Provisioning sets up a VPN rule the USG IPSec VPN Client
can retrieve. Just enter a user name, password and the IP address of the USG in the IPSec VPN
Client to get the VPN settings automatically from the USG.
• VPN Settings for L2TP VPN Settings sets up a L2TP VPN rule that the USG IPSec L2TP VPN
client can retrieve.
Figure 45 VPN Setup Wizard Welcome
Chapter 4 Quick Setup Wizards
USG20(W)-VPN Series User’s Guide
56
Page 57
Chapter 4 Quick Setup Wizards
4.3.2 VPN Setup Wizard: Wizard Type
Choose Express to create a VPN rule with the default phase 1 and phase 2 settings to connect to
another ZLD-based USG using a pre-shared key.
Choose Advanced to change the default settings and/or use certificates instead of a pre-shared
key to create a VPN rule to connect to another IPSec device.
Figure 46 VPN Setup Wizard: Wizard Type
4.3.3 VPN Express Wizard - Scenario
Click the Express radio button as shown in Figure 46 on page 57 to display the following screen.
USG20(W)-VPN Series User’s Guide
57
Page 58
Chapter 4 Quick Setup Wizards
Figure 47 VPN Express Wizard: Scenario
Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use
1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
Select the scenario that best describes your intended VPN connection. The figure on the left of the
screen changes to match the scenario you select.
• Site-to-site - The remote IPSec device has a static IP address or a domain name. This USG can
initiate the VPN tunnel.
• Site-to-site with Dynamic Peer - The remote IPSec device has a dynamic IP address. Only the
remote IPSec device can initiate the VPN tunnel.
• Remote Access (Server Role) - Allow incoming connections from IPSec VPN clients. The
clients have dynamic IP addresses and are also known as dial-in users. Only the clients can
initiate the VPN tunnel.
• Remote Access (Client Role) - Connect to an IPSec server. This USG is the client (dial-in user)
and can initiate the VPN tunnel.
USG20(W)-VPN Series User’s Guide
58
Page 59
Chapter 4 Quick Setup Wizards
4.3.4 VPN Express Wizard - Configuration
Figure 48 VPN Express Wizard: Configuration
• Secure Gateway: Any displays in this field if it is not configurable for the chosen scenario.
Otherwise, enter the WAN IP address or domain name of the remote IPSec device (secure
gateway) to identify the remote IPSec router by its IP address or a domain name. Use 0.0.0.0 if
the remote IPSec router has a dynamic WAN IP address.
• Pre-Shared Key: Type the password. Both ends of the VPN tunnel must use the same password.
Use 8 to 31 case-sensitive ASCII characters or 8 to 31 pairs of hexadecimal (“0-9”, “A-F”)
characters. Proceed a hexadecimal key with “0x”. You will receive a PYLD_MALFORMED (payload
malformed) packet if the same pre-shared key is not used on both ends.
• Local Policy (IP/Mask): Type the IP address of a computer on your network that can use the
tunnel. You can also specify a subnet. This must match the remote IP address configured on the
remote IPSec device.
• Remote Policy (IP/Mask): Any displays in this field if it is not configurable for the chosen
scenario. Otherwise, type the IP address of a computer behind the remote IPSec device. You can
also specify a subnet. This must match the local IP address configured on the remote IPSec
device.
4.3.5 VPN Express Wizard - Summary
This screen provides a read-only summary of the VPN tunnel’s configuration and commands that
you can copy and paste into another ZLD-based USG’s command line interface to configure it.
USG20(W)-VPN Series User’s Guide
59
Page 60
Chapter 4 Quick Setup Wizards
Figure 49 VPN Express Wizard: Summary
• Rule Name: Identifies the VPN gateway policy.
• Secure Gateway: IP address or domain name of the remote IPSec device. If this field displays
Any, only the remote IPSec device can initiate the VPN connection.
• Pre-Shared Key: VPN tunnel password. It identifies a communicating party during a phase 1
IKE negotiation.
• Local Policy: IP address and subnet mask of the computers on the network behind your USG
that can use the tunnel.
• Remote Policy: IP address and subnet mask of the computers on the network behind the
remote IPSec device that can use the tunnel. If this field displays Any, only the remote IPSec
device can initiate the VPN connection.
• Copy and paste the Configuration for Secure Gateway commands into another ZLD-based
USG’s command line interface to configure it to serve as the other end of this VPN tunnel. You
can also use a text editor to save these commands as a shell script file with a “.zysh” filename
extension. Use the file manager to run the script in order to configure the VPN connection. See
the commands reference guide for details on the commands displayed in this list.
4.3.6 VPN Express Wizard - Finish
Now the rule is configured on the USG. The Phase 1 rule settings appear in the VPN > IPSec VPN
> VPN Gateway screen and the Phase 2 rule settings appear in the VPN > IPSec VPN > VPN
Connection screen.
USG20(W)-VPN Series User’s Guide
60
Page 61
Chapter 4 Quick Setup Wizards
Figure 50 VPN Express Wizard: Finish
Click Close to exit the wizard.
4.3.7 VPN Advanced Wizard - Scenario
Click the Advanced radio button as shown in Figure 46 on page 57 to display the following screen.
USG20(W)-VPN Series User’s Guide
61
Page 62
Chapter 4 Quick Setup Wizards
Figure 51 VPN Advanced Wizard: Scenario
Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use
1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
Select the scenario that best describes your intended VPN connection. The figure on the left of the
screen changes to match the scenario you select.
• Site-to-site - The remote IPSec device has a static IP address or a domain name. This USG can
initiate the VPN tunnel.
• Site-to-site with Dynamic Peer - The remote IPSec device has a dynamic IP address. Only the
remote IPSec device can initiate the VPN tunnel.
• Remote Access (Server Role) - Allow incoming connections from IPSec VPN clients. The
clients have dynamic IP addresses and are also known as dial-in users. Only the clients can
initiate the VPN tunnel.
• Remote Access (Client Role) - Connect to an IPSec server. This USG is the client (dial-in user)
and can initiate the VPN tunnel.
4.3.8 VPN Advanced Wizard - Phase 1 Settings
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication)
and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA (Security Association).
USG20(W)-VPN Series User’s Guide
62
Page 63
Chapter 4 Quick Setup Wizards
Figure 52 VPN Advanced Wizard: Phase 1 Settings
• Secure Gateway: Any displays in this field if it is not configurable for the chosen scenario.
Otherwise, enter the WAN IP address or domain name of the remote IPSec device (secure
gateway) to identify the remote IPSec device by its IP address or a domain name. Use 0.0.0.0 if
the remote IPSec device has a dynamic WAN IP address.
• My Address (interface): Select an interface from the drop-down list box to use on your USG.
• Negotiation Mode: This displays Main or Aggressive:
• Main encrypts the USG’s and remote IPSec router’s identities but takes more time to establish
the IKE SA
• Aggressive is faster but does not encrypt the identities.
The USG and the remote IPSec router must use the same negotiation mode. Multiple SAs
connecting through a secure gateway must have the same negotiation mode.
• Encryption Algorithm: 3DES and AES use encryption. The longer the key, the higher the
security (this may affect throughput). Both sender and receiver must use the same secret key,
which can be used to encrypt and decrypt the message or to generate and verify a message
authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a
variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased throughput.
AES128 uses a 128-bit key and is faster than 3DES. AES192 uses a 192-bit key, and AES256
uses a 256-bit key.
• Authentication Algorithm: MD5 gives minimal security and SHA512 gives the highest
security. MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are hash algorithms used to
authenticate packet data. The stronger the algorithm the slower it is.
• Key Group: DH5 is more secure than DH1 or DH2 (although it may affect throughput). DH1
(default) refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman
Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit
random number.
• SA Life Time: Set how often the USG renegotiates the IKE SA. A short SA life time increases
security, but renegotiation temporarily disconnects the VPN tunnel.
• NAT Traversal: Select this if the VPN tunnel must pass through NAT (there is a NAT router
between the IPSec devices).
USG20(W)-VPN Series User’s Guide
63
Page 64
Chapter 4 Quick Setup Wizards
Note: The remote IPSec device must also have NAT traversal enabled. See the help in the
main IPSec VPN screens for more information.
• Dead Peer Detection (DPD) has the USG make sure the remote IPSec device is there before
transmitting data through the IKE SA. If there has been no traffic for at least 15 seconds, the
USG sends a message to the remote IPSec device. If it responds, the USG transmits the data. If
it does not respond, the USG shuts down the IKE SA.
• Authentication Method: Select Pre-Shared Key to use a password or Certificate to use one
of the USG’s certificates.
4.3.9 VPN Advanced Wizard - Phase 2
Phase 2 in an IKE uses the SA that was established in phase 1 to negotiate SAs for IPSec.
Figure 53 VPN Advanced Wizard: Phase 2 Settings
• Active Protocol: ESP is compatible with NAT, AH is not.
• Encapsulation: Tunnel is compatible with NAT, Transport is not.
• Encryption Algorithm: 3DES and AES use encryption. The longer the AES key, the higher the
security (this may affect throughput). Null uses no encryption.
• Authentication Algorithm: MD5 gives minimal security and SHA512 gives the highest
security. MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are hash algorithms used to
authenticate packet data. The stronger the algorithm the slower it is.
• SA Life Time: Set how often the USG renegotiates the IKE SA. A short SA life time increases
security, but renegotiation temporarily disconnects the VPN tunnel.
• Perfect Forward Secrecy (PFS): Disabling PFS allows faster IPSec setup, but is less secure.
Select DH1, DH2 or DH5 to enable PFS. DH5 is more secure than DH1 or DH2 (although it may
affect throughput). DH1 refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to
Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a
1536 bit random number (more secure, yet slower).
• Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also
specify a subnet. This must match the remote IP address configured on the remote IPSec device.
• Remote Policy (IP/Mask): Type the IP address of a computer behind the remote IPSec device.
You can also specify a subnet. This must match the local IP address configured on the remote
IPSec device.
• Nailed-Up: This displays for the site-to-site and remote access client role scenarios. Select this
to have the USG automatically renegotiate the IPSec SA when the SA life time expires.
USG20(W)-VPN Series User’s Guide
64
Page 65
Chapter 4 Quick Setup Wizards
4.3.10 VPN Advanced Wizard - Summary
This is a read-only summary of the VPN tunnel settings.
Figure 54 VPN Advanced Wizard: Summary
• Rule Name: Identifies the VPN connection (and the VPN gateway).
• Secure Gateway: IP address or domain name of the remote IPSec device.
• Pre-Shared Key: VPN tunnel password.
• Certificate: The certificate the USG uses to identify itself when setting up the VPN tunnel.
• Local Policy: IP address and subnet mask of the computers on the network behind your USG
that can use the tunnel.
• Remote Policy: IP address and subnet mask of the computers on the network behind the
remote IPSec device that can use the tunnel.
• Copy and paste the Configuration for Remote Gateway commands into another ZLD-based
USG’s command line interface.
• Click Save to save the VPN rule.
4.3.11 VPN Advanced Wizard - Finish
Now the rule is configured on the USG. The Phase 1 rule settings appear in the VPN > IPSec VPN
> VPN Gateway screen and the Phase 2 rule settings appear in the VPN > IPSec VPN > VPN
Connection screen.
USG20(W)-VPN Series User’s Guide
65
Page 66
Figure 55 VPN Wizard: Finish
Chapter 4 Quick Setup Wizards
Click Close to exit the wizard.
4.4 VPN Settings for Configuration Provisioning Wizard:
Wizard Type
Use VPN Settings for Configuration Provisioning to set up a VPN rule that can be retrieved
with the USG IPSec VPN Client.
VPN rules for the USG IPSec VPN Client have certain restrictions. They must not contain the
following settings:
• AH active protocol
• NULL encryption
• SHA512 authentication
• A subnet or range remote policy
USG20(W)-VPN Series User’s Guide
66
Page 67
Chapter 4 Quick Setup Wizards
Choose Express to create a VPN rule with the default phase 1 and phase 2 settings and to use a
pre-shared key.
Choose Advanced to change the default settings and/or use certificates instead of a pre-shared
key in the VPN rule.
Figure 56 VPN Settings for Configuration Provisioning Express Wizard: Wizard Type
Click the Express radio button as shown in the previous screen to display the following screen.
USG20(W)-VPN Series User’s Guide
67
Page 68
Chapter 4 Quick Setup Wizards
Figure 57 VPN for Configuration Provisioning Express Wizard: Settings Scenario
Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use
1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
Application Scenario: Only the Remote Access (Server Role) is allowed in this wizard. It
allows incoming connections from the USG IPSec VPN Client.
Figure 58 VPN for Configuration Provisioning Express Wizard: Configuration
• Secure Gateway: Any displays in this field because it is not configurable in this wizard. It allows
incoming connections from the USG IPSec VPN Client.
• Pre-Shared Key: Type the password. Both ends of the VPN tunnel must use the same password.
Use 8 to 31 case-sensitive ASCII characters or 8 to 31 pairs of hexadecimal (“0-9”, “A-F”)
characters. Proceed a hexadecimal key with “0x”. You will receive a PYLD_MALFORMED (payload
malformed) packet if the same pre-shared key is not used on both ends.
• Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also
specify a subnet. This must match the remote IP address configured on the remote IPSec device.
• Remote Policy (IP/Mask): Any displays in this field because it is not configurable in this
wizard.
4.4.3 VPN Settings for Configuration Provisioning Express Wizard Summary
This screen has a read-only summary of the VPN tunnel’s configuration and commands you can
copy and paste into another ZLD-based USG’s command line interface to configure it.
USG20(W)-VPN Series User’s Guide
69
Page 70
Chapter 4 Quick Setup Wizards
Figure 59 VPN for Configuration Provisioning Express Wizard: Summary
• Rule Name: Identifies the VPN gateway policy.
• Secure Gateway: Any displays in this field because it is not configurable in this wizard. It allows
incoming connections from the USG IPSec VPN Client.
• Pre-Shared Key: VPN tunnel password. It identifies a communicating party during a phase 1
IKE negotiation.
• Local Policy: (Static) IP address and subnet mask of the computers on the network behind your
USG that can be accessed using the tunnel.
• Remote Policy: Any displays in this field because it is not configurable in this wizard.
•The Configuration for Secure Gateway displays the configuration that the USG IPSec VPN
Client will get from the USG.
• Click Save to save the VPN rule.
4.4.4 VPN Settings for Configuration Provisioning Express Wizard - Finish
Now the rule is configured on the USG. The Phase 1 rule settings appear in the VPN > IPSec VPN
> VPN Gateway screen and the Phase 2 rule settings appear in the VPN > IPSec VPN > VPN
Connection screen. Enter the IP address of the USG in the USG IPSec VPN Client to get all these
VPN settings automatically from the USG.
USG20(W)-VPN Series User’s Guide
70
Page 71
Chapter 4 Quick Setup Wizards
Figure 60 VPN for Configuration Provisioning Express Wizard: Finish
Click Close to exit the wizard.
4.4.5 VPN Settings for Configuration Provisioning Advanced Wizard Scenario
Click the Advanced radio button as shown in the screen shown in Figure 56 on page 67 to display
the following screen.
USG20(W)-VPN Series User’s Guide
71
Page 72
Chapter 4 Quick Setup Wizards
Figure 61 VPN for Configuration Provisioning Advanced Wizard: Scenario Settings
Rule Name: Type the name used to identify this VPN connection (and VPN gateway). You may use
1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
Application Scenario: Only the Remote Access (Server Role) is allowed in this wizard. It
allows incoming connections from the USG IPSec VPN Client.
There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication)
and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA (Security Association).
• Secure Gateway: Any displays in this field because it is not configurable in this wizard. It allows
incoming connections from the USG IPSec VPN Client.
• My Address (interface): Select an interface from the drop-down list box to use on your USG.
• Negotiation Mode:This displays Main or Aggressive:
• Main encrypts the USG’s and remote IPSec router’s identities but takes more time to establish
the IKE SA
• Aggressive is faster but does not encrypt the identities.
The USG and the remote IPSec router must use the same negotiation mode. Multiple SAs
connecting through a secure gateway must have the same negotiation mode.
• Encryption Algorithm: 3DES and AES use encryption. The longer the key, the higher the
security (this may affect throughput). Both sender and receiver must know the same secret key,
which can be used to encrypt and decrypt the message or to generate and verify a message
authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a
variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also
requires more processing power, resulting in increased latency and decreased throughput.
AES128 uses a 128-bit key and is faster than 3DES. AES192 uses a 192-bit key and AES256 uses
a 256-bit key.
• Authentication Algorithm: MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are
hash algorithms used to authenticate packet data. MD5 gives minimal security. SHA1 gives
higher security and SHA256 gives the highest security. The stronger the algorithm, the slower it
is.
• Key Group: DH5 is more secure than DH1 or DH2 (although it may affect throughput). DH1
(default) refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman
Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a 1536 bit
random number.
• SA Life Time: Set how often the USG renegotiates the IKE SA. A short SA life time increases
security, but renegotiation temporarily disconnects the VPN tunnel.
• Authentication Method: Select Pre-Shared Key to use a password or Certificate to use one
of the USG’s certificates.
• Active Protocol: ESP is compatible with NAT. AH is not available in this wizard.
• Encapsulation: Tunnel is compatible with NAT, Transport is not.
• Encryption Algorithm: 3DES and AES use encryption. The longer the AES key, the higher the
security (this may affect throughput). Null uses no encryption.
• Authentication Algorithm: MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are
hash algorithms used to authenticate packet data. MD5 gives minimal security. SHA1 gives
higher security and SHA256 gives the highest security. The stronger the algorithm, the slower it
is.
• SA Life Time: Set how often the USG renegotiates the IKE SA. A short SA life time increases
security, but renegotiation temporarily disconnects the VPN tunnel.
• Perfect Forward Secrecy (PFS): Disabling PFS allows faster IPSec setup, but is less secure.
Select DH1, DH2 or DH5 to enable PFS. DH5 is more secure than DH1 or DH2 (although it may
affect throughput). DH1 refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to
Diffie-Hellman Group 2 a 1024 bit (1Kb) random number. DH5 refers to Diffie-Hellman Group 5 a
1536 bit random number (more secure, yet slower).
• Local Policy (IP/Mask): Type the IP address of a computer on your network. You can also
specify a subnet. This must match the remote IP address configured on the remote IPSec device.
• Remote Policy (IP/Mask): Any displays in this field because it is not configurable in this
wizard.
• Nailed-Up: This displays for the site-to-site and remote access client role scenarios. Select this
to have the USG automatically renegotiate the IPSec SA when the SA life time expires.
4.4.8 VPN Settings for Configuration Provisioning Advanced Wizard Summary
This is a read-only summary of the VPN tunnel settings.
USG20(W)-VPN Series User’s Guide
74
Page 75
Chapter 4 Quick Setup Wizards
Figure 64 VPN for Configuration Provisioning Advanced Wizard: Summary
Summary
• Rule Name: Identifies the VPN connection (and the VPN gateway).
• Secure Gateway: Any displays in this field because it is not configurable in this wizard. It
allows incoming connections from the USG IPSec VPN Client.
• Pre-Shared Key: VPN tunnel password.
• Local Policy: IP address and subnet mask of the computers on the network behind your USG
that can use the tunnel.
• Remote Policy: Any displays in this field because it is not configurable in this wizard.
Phase 1
• Negotiation Mode: This displays Main or Aggressive:
• Main encrypts the USG’s and remote IPSec router’s identities but takes more time to establish
the IKE SA
• Aggressive is faster but does not encrypt the identities.
The USG and the remote IPSec router must use the same negotiation mode. Multiple SAs
connecting through a secure gateway must have the same negotiation mode.
USG20(W)-VPN Series User’s Guide
75
Page 76
Chapter 4 Quick Setup Wizards
• Encryption Algorithm: This displays the encryption method used. The longer the key, the
higher the security, the lower the throughput (possibly).
• DES uses a 56-bit key.
• 3DES uses a 168-bit key.
• AES128 uses a 128-bit key
• AES192 uses a 192-bit key
• AES256 uses a 256-bit key.
• Authentication Algorithm: This displays the authentication algorithm used. The stronger the
algorithm, the slower it is.
• MD5 gives minimal security.
• SHA1 gives higher security
• SHA256 gives the highest security.
• Key Group: This displays the Diffie-Hellman (DH) key group used. DH5 is more secure than
DH1 or DH2 (although it may affect throughput).
• DH1 uses a 768 bit random number.
• DH2 uses a 1024 bit (1Kb) random number.
• DH5 uses a 1536 bit random number.
Phase 2
• Active Protocol: This displays ESP (compatible with NAT) or AH.
• Encapsulation: This displays Tunnel (compatible with NAT) or Transport.
• Encryption Algorithm: This displays the encryption method used. The longer the key, the
higher the security, the lower the throughput (possibly).
• DES uses a 56-bit key.
• 3DES uses a 168-bit key.
• AES128 uses a 128-bit key
• AES192 uses a 192-bit key
• AES256 uses a 256-bit key.
• Null uses no encryption.
• Authentication Algorithm: This displays the authentication algorithm used. The stronger the
algorithm, the slower it is.
• MD5 gives minimal security.
• SHA1 gives higher security
• SHA256 gives the highest security..
The Configuration for Secure Gateway displa
will get from the USG.
Click Save to save the VPN rule.
ys the configuration that the USG IPSec VPN Client
4.4.9 VPN Settings for Configuration Provisioning Advanced Wizard- Finish
Now the rule is configured on the USG. The Phase 1 rule settings appear in the VPN > IPSec VPN
> VPN Gateway screen and the Phase 2 rule settings appear in the VPN > IPSec VPN > VPN
USG20(W)-VPN Series User’s Guide
76
Page 77
Chapter 4 Quick Setup Wizards
Connection screen. Enter the IP address of the USG in the USG IPSec VPN Client to get all these
VPN settings automatically from the USG.
Figure 65 VPN for Configuration Provisioning Advanced Wizard: Finish
Click Close to exit the wizard.
4.5 VPN Settings for L2TP VPN Settings Wizard
Use VPN Settings for L2TP VPN Settings to set up an L2TP VPN rule. Click Configuration >
Quick Setup > VPN Settings and select VPN Settings for L2TP VPN Settings to see the
• Rule Name: Type the name used to identify this L2TP VPN connection (and L2TP VPN gateway).
You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first
character cannot be a number. This value is case-sensitive.
USG20(W)-VPN Series User’s Guide
78
Page 79
• My Address (interface): Select one of the interfaces from the pull down menu to apply the
L2TP VPN rule.
• Pre-Shared Key: Type the password. Both ends of the VPN tunnel must use the same password.
Use 8 to 31 case-sensitive ASCII characters or 8 to 31 pairs of hexadecimal (“0-9”, “A-F”)
characters. Proceed a hexadecimal key with “0x”. You will receive a PYLD_MALFORMED (payload
malformed) packet if the same pre-shared key is not used on both ends.
• IP Address Pool: Select Range or Subnet from the pull down menu. This IP address pool is used
to assign to the L2TP VPN clients.
• Starting IP Address: Enter the starting IP address in the field.
• End IP Address: Enter the ending IP address in the field.
• First DNS Server (Optional): Enter the first DNS server IP address in the field. Leave the filed
as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server you
must know the IP address of a machine in order to access it.
• Second DNS Server (Optional):Enter the second DNS server IP address in the field. Leave the
filed as 0.0.0.0 if you do not want to configure DNS servers. If you do not configure a DNS server
you must know the IP address of a machine in order to access it.
• Allow L2TP traffic Through WAN: Select this check box to allow traffic from L2TP clients to go
to the Internet.
Click Next to continue the wizard.
USG20(W)-VPN Series User’s Guide
79
Page 80
Chapter 4 Quick Setup Wizards
Note: DNS (Domain Name System) is for mapping a domain name to its corresponding IP
address and vice versa. The DNS server is extremely important because without it,
you must know the IP address of a computer before you can access it. The USG
uses a system DNS server (in the order you specify here) to resolve domain names
for VPN, DDNS and the time server.
4.5.3 VPN Settings for L2TP VPN Setting Wizard - Summary
This is a read-only summary of the L2TP VPN settings.
• Rule Name: Identifies the L2TP VPN connection (and the L2TP VPN gateway).
• Secure Gateway: “Any” displays in this field because it is not configurable in this wizard. It
allows incoming connections from the L2TP VPN Client.
• Pre-Shared Key: L2TP VPN tunnel password.
• My Address (Interface): This displays the interface to use on your USG for the L2TP tunnel.
• IP Address Pool: This displays the IP address pool used to assign to the L2TP VPN clients.
Click Save to complete the L2TP VPN Setting and the following screen will show.
USG20(W)-VPN Series User’s Guide
80
Page 81
Chapter 4 Quick Setup Wizards
4.5.4 VPN Settings for L2TP VPN Setting Wizard Completed
Figure 70 VPN Settings for L2TP VPN Settings Wizard: Finish
Now the rule is configured on the USG. The L2TP VPN rule settings appear in the VPN > L2TP VPN
screen and also in the VPN > IPSec VPN > VPN Connection and VPN Gateway screen.
USG20(W)-VPN Series User’s Guide
81
Page 82
5.1 Overview
Use the Dashboard screens to check status information about the USG.
5.1.1 What You Can Do in this Chapter
Use the main Dashboard screen to see the USG’s general device information, system status,
system resource usage, licensed service status, and interface status. You can also display other
status screens for more information.
Use the Dashboard screens to view the following.
• Device Information Screen on page 84
• System Status Screen on page 85
• VPN Status Screen on page 86
• DHCP Table Screen on page 87
• Number of Login Users Screen on page 88
• System Resources Screen on page 89
• CPU Usage Screen on page 90
• Memory Usage Screen on page 91
• Active Session Screen on page 92
• Extension Slot Screen on page 93
• Interface Status Summary Screen on page 93
• Secured Service Status Screen on page 94
• Content Filter Statistics Screen on page 95
• Top 5 IPv4/IPv6 Security Policy Rules that Blocked Traffic Screen on page 96
• Top 5 IPv4/IPv6 Security Policy Rules that Blocked Traffic Screen on page 96
• Top 5 IPv4/IPv6 Security Policy Rules that Blocked Traffic Screen on page 96
• The Latest Alert Logs Screen on page 96
CHAPTER 5
Dashboard
5.2 Main Dashboard Screen
The Dashboard screen displays when you log into the USG or click Dashboard in the navigation
panel. The dashboard displays general device information, system status, system resource usage,
licensed service status, and interface status in widgets that you can re-arrange to suit your needs.
You can also collapse, refresh, and close individual widgets.
USG20(W)-VPN Series User’s Guide
82
Page 83
Chapter 5 Dashboard
A
B
C
D
E
Click on the icon to go to the OneSecurity.com website where there is guidance on configuration
walkthroughs, troubleshooting, and other information.
Figure 71 Dashboard
The following table describes the labels in this screen.
Table 16 Dashboard
LABELDESCRIPTION
Widget Settings
(A)
expand /
collapse widget
(B)
Refresh time
setting (C)
Refresh Now (D) Click this to update the widget’s information immediately.
Close widget (E)Click this to close the widget. Use Widget Setting to re-open it.
Virtual Device
Rear PanelClick this to view details about the USG’s rear panel. Hover your cursor over a connected
Use this link to open or close widgets by selecting/clearing the associated checkbox.
Click this to collapse a widget. It then becomes a down arrow. Click it again to enlarge the
widget again.
Set the interval for refreshing the information displayed in the widget.
interface or slot to display status details.
USG20(W)-VPN Series User’s Guide
83
Page 84
Chapter 5 Dashboard
Table 16 Dashboard (continued)
LABELDESCRIPTION
Front PanelClick this to view details about the status of the USG’s front panel LEDs and connections.
NameThis field displays the name of each interface.
StatusThis field displays the current status of each interface or device installed in a slot. The
ZoneThis field displays the zone to which the interface is currently assigned.
IP Address/
Mask
See Section 3.1.1 on page 44 for LED descriptions. An unconnected interface or slo
appears grayed out.
The following front and rear panel labels display when you hover your cursor over a
connected interface or slot.
possible values depend on what type of interface it is.
Inactive - The Ethernet interface is disabled.
Down - The Ethernet interface does not have any physical ports associated with it or the
Ethernet interface is enabled but not connected.
Speed / Duplex - The Ethernet interface is enabled and connected. This field displays the
port speed and duplex setting (Full or Half).
The status for a WLAN card is none.
For cellular (mobile broadband) interfaces, see Section 9.5 on page 173 for the status that
can appear.
For the auxiliary interface:
Inactive - The auxiliary interface is disabled.
Connected - The auxiliary interface is enabled and connected.
Disconnected - The auxiliary interface is not connected.
This field displays the current IP address and subnet mask assigned to the interface. If the
interface is a member of an active virtual router, this field displays the IP address it is
currently using. This is either the static IP address of the interface (if it is the master) or
the management IP address (if it is a backup).
t
5.2.1 Device Information Screen
The Device Information screen displays USG’s system and model name, serial number, MAC
address and firmware version shown in the below screen.
Figure 72 Dashboard > Device Information (Example)
USG20(W)-VPN Series User’s Guide
84
Page 85
Chapter 5 Dashboard
This tabel describes the fields in the above screen.
Table 17 Dashboard > Device Information
LABELDESCRIPTION
Device InformationThis identifies a device installed in one of the USG’s extension slots, the Security
System NameThis field displays the name used to identify the USG on any network. Click the
Model NameThis field displays the model name of this USG.
Serial NumberThis field displays the serial number of this USG. The serial number is used for
MAC Address RangeThis field displays the MAC addresses used by the USG. Each physical port has
Firmware VersionThis field displays the version number and date of the firmware the USG is
Extension Module slot, or USB ports. For an installed SEM (Security Extension
Module) card, this field displays what kind of SEM card is installed.
SEM-VPN - The VPN accelerator. The SEM-VPN provides 500 Mbps VPN
throughput, 2,000 IPSec VPN tunnels, and 750 SSL VPN users.
SEM-DUAL - accelerator for both VPN and UTM. The SEM-DUAL provides the
benefits of the SEM-VPN.
link and open the Host Name screen where you can edit and make changes to
the system and domain name.
device tracking and control.
one MAC address. The first MAC address is assigned to physical port 1, the
second MAC address is assigned to physical port 2, and so on.
currently running. Click the link to open the Firmware Package screen where
you can upload firmware.
5.2.2 System Status Screen
Figure 73 Dashboard > System Status (Example)
This table describes the fields in the above screen.
Table 18 Dashboard > System Status
LABELDESCRIPTION
System UptimeThis field displays how long the USG has been running since it last restarted or
was turned on.
Current Date/TimeThis field displays the current date and time in the USG. The format is yyyy-mm-
dd hh:mm:ss. Click on the link to see the Date/Time screen where you can
make edits and changes to the date, time and time zone information.
VPN StatusClick on the link to look at the VPN tunnels that are currently established. See
Section 5.2.3 on page 86. Cl
product page at the ZyXEL website.
SSL VPN StatusThe first number is the actual number of VPN tunnels up and the second number
is the maximum number of SSL VPN tunnels allowed.
ick on the VPN icon to go to the ZyXEL VPN Client
USG20(W)-VPN Series User’s Guide
85
Page 86
Chapter 5 Dashboard
Table 18 Dashboard > System Status
LABELDESCRIPTION
DHCP TableClick this to look at the IP addresses currently assigned to the USG’s DHCP
Current Login UserThis field displays the user name used to log in to the current session, the
Number of Login UsersThis field displays the number of users currently logged in to the USG. Click the
Boot StatusThis field displays details about the USG’s startup state.
clients and the IP addresses reserved for specific MAC addresses. See Section
2.4 on page 87.
5.
amount of reauthentication time remaining, and the amount of lease time
remaining.
icon to pop-open a list of the users who are currently logged in to the USG.
OK - The USG started up successfully.
Firmware update OK - A firmware update was successful.
Problematic configuration after firmware update - The application of the
configuration failed after a firmware upgrade.
System default configuration - The USG successfully applied the system
default configuration. This occurs when the USG starts for the first time or you
intentionally reset the USG to the system default settings.
Fallback to lastgood configuration - The USG was unable to apply the
startup-config.conf configuration file and fell back to the lastgood.conf
configuration file.
Fallback to system default configuration - The USG was unable to apply the
lastgood.conf configuration file and fell back to the system default configuration
file (system-default.conf).
Booting in progress - The USG is still applying the system configuration.
5.2.3 VPN Status Screen
Click on VPN Status link to look at the VPN tunnels that are currently established. The following
screen will show.
Figure 74 Dashboard > System Status > VPN Status
This table describes the fields in the above screen.
USG20(W)-VPN Series User’s Guide
86
Page 87
Chapter 5 Dashboard
Table 19 Dashboard > System Status > VPN Status
LABLEDESCRIPTION
#This field is a sequential value, and it is not associated with a specific SA.
NameThis field displays the name of the IPSec SA.
EncapsulationThis field displays how the IPSec SA is encapsulated.
AlgorithmThis field displays the encryption and authentication algorithms used in the SA.
Refresh IntervalSelect how often you want this window to be updated automatically.
RefreshClick this to update the information in the window right away.
ZyXEL VPN Client Product Page
5.2.4 DHCP Table Screen
Click on the DHCP Table link to look at the IP addresses currently assigned to DHCP clients and the
IP addresses reserved for specific MAC addresses. The following screen will show.
USG20(W)-VPN Series User’s Guide
87
Page 88
Chapter 5 Dashboard
Figure 75 Dashboard > System Status > DHCP Table
This table describes the fields in the above screen.
Table 20 Dashboard > System Status > DHCP Table
LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific entry.
InterfaceThis field identifies the interface that assigned an IP address to a DHCP client.
IP AddressThis field displays the IP address currently assigned to a DHCP client or reserved
Host NameThis field displays the name used to identify this device on the network (the
MAC AddressThis field displays the MAC address to which the IP address is currently assigned
DescriptionFor a static DHCP entry, the host name or the description you configured shows
ReserveIf this field is selected, this entry is a static DHCP entry. The IP address is
for a specific MAC address. Click the column’s heading cell to sort the table
entries by IP address. Click the heading cell again to reverse the sort order.
computer name). The USG learns these from the DHCP client requests. “None”
shows here for a static DHCP entry.
or for which the IP address is reserved. Click the column’s heading cell to sort
the table entries by MAC address. Click the heading cell again to reverse the sort
order.
here. This field is blank for dynamic DHCP entries.
reserved for the MAC address.
If this field is clear, this entry is a dynamic DHCP entry. The IP address is
assigned to a DHCP client.
To create a static DHCP entry using an existing dynamic DHCP entry, select this
field, and then click Apply.
To remove a static DHCP entry, clear this field, and then click Apply.
5.2.5 Number of Login Users Screen
Click the Number of Login Users link to see the following screen.
USG20(W)-VPN Series User’s Guide
88
Page 89
Chapter 5 Dashboard
Figure 76 Dashboard > System Status > Number of Login Users
This table describes the fields in the above screen.
Table 21 Dashboard > System Status > Number of Login Users
LABELDESCRIPTION
#This field is a sequential value and is not associated with any entry.
User IDThis field displays the user name of each user who is currently logged in to the
Reauth Lease T.This field displays the amount of reauthentication time remaining and the
TypeThis field displays the way the user logged in to the USG.
IP addressThis field displays the IP address of the computer used to log in to the USG.
User InfoThis field displays the types of user accounts the USG uses. If the user type is
Force LogoutClick this icon to end a user’s session.
USG.
amount of lease time remaining for each user.
ext-user (external user), this field will show its external-group information
when you move your mouse over it.
If the external user matches two external-group objects, both external-group
object names will be shown.
5.2.6 System Resources Screen
Hover your mouse over an item and click the arrow on the right to see more details on that
resource.
USG20(W)-VPN Series User’s Guide
89
Page 90
Chapter 5 Dashboard
Figure 77 Dashboard > System Resources
This table describes the fields in the above screen.
Table 22 .Dashboard > System Resources
LABELDESCRIPTION
CPU UsageThis field displays what percentage of the USG’s processing capability is
Memory UsageThis field displays what percentage of the USG’s RAM is currently being used.
Flash Usage This field displays what percentage of the USG’s onboard flash memory is
USB Storage UsageThis field shows how much storage in the USB device connected to the USG is in
Active SessionsThis field shows how many sessions, established and non-established, that pass
currently being used. Hover your cursor over this field to display the Show CPU Usage icon that takes you to a chart of the USG’s recent CPU usage.
Hover your cursor over this field to display the Show Memory Usage icon that
takes you to a chart of the USG’s recent memory usage.
currently being used.
use.
through/from/to/within the USG. Hover your cursor over this field to display
icons. Click the Detail icon to go to the Session Monitor screen to see details
about the active sessions. Click the Show Active Sessions icon to display a
chart of USG’s recent session usage.
5.2.7 CPU Usage Screen
Use the below screen to look at a chart of the USG’s recent CPU usage. To access this screen, click
CPU Usage in the dashboard.
USG20(W)-VPN Series User’s Guide
90
Page 91
Chapter 5 Dashboard
Figure 78 Dashboard > CPU Usage screen
This table describes the fields in the above screen.
Table 23 Dashboard > CPU Usage
LABELDESCRIPTION
The y-axis represents the percentage of CPU usage.
The x-axis shows the time period over which the CPU usage occurred
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.
5.2.8 Memory Usage Screen
Use the below screen to look at a chart of the USG’s recent memory (RAM) usage. To access this
screen, click Memory Usage in the dashboard.
Figure 79 Dashboard > Memory Usage screen
USG20(W)-VPN Series User’s Guide
91
Page 92
This table describes the fields in the above screen.
Table 24 Dashboard > Memory Usage screen.
LABELDESCRIPTION
The y-axis represents the percentage of RAM usage.
The x-axis shows the time period over which the RAM usage occurred
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.
5.2.9 Active Session Screen
To see the details of Active Sessions, move the cursor to the far right of the Active Sessions box and
the Detail and the Show Active Session icons appear. Click the Show Active Session icon.
Figure 80 Dashboard > Active Sessions > Show Active Session
Chapter 5 Dashboard
This table describes the fields in the above screen.
Table 25 Dashboard > Active Sessions > Show Active Session
SessionsThe y-axis represents the number of session.
The x-axis shows the time period over which the session usage occurred
Refresh IntervalEnter how often you want this window to be automatically updated.
Refresh NowClick this to update the information in the window right away.
USG20(W)-VPN Series User’s Guide
92
Page 93
5.2.10 Extension Slot Screen
Figure 81 Dashboard > Extension Slot
This table describes the fields in the above screen.
Table 26 Dashboard > Extension Slot
LABELDESCRIPTION
#
Extension SlotThis field displays the name of each extension slot.
DeviceThis field displays the name of the device connected to the extension slot (or
none if no device is detected). For an installed SEM (Security Extension Module)
card, this field displays what kind of SEM card is installed.
SEM-VPN - The VPN accelerator. The SEM-VPN provides 500 Mbps VPN
throughput, 2,000 IPSec VPN tunnels, and 750 SSL VPN users.
SEM-DUAL - accelerator for both VPN and UTM. The SEM-DUAL provides the
benefits of the SEM-VPN.
USB Flash Drive - Indicates a connected USB storage device and the drive’s
storage capacity.
StatusThe status for an installed WLAN card is none. For cellular (mobile broadband)
interfaces, see Section 6.10 on page 112 for the status that
installed SEM (Security Extension Module) card, this field displays one of the
following:
Active - The SEM card is working properly.
Ready to activate - The SEM was inserted while the USG was operating.
Restart the USG to use the SEM.
Driver load failed - An error occurred during the USG’s attempt to activate the
SEM card. Make sure the SEM is installed properly and the thumbscrews are
tightened. If this status still displays, contact your vendor.
Ready - A USB storage device connected to the USG is ready for the USG to use.
Unused - The USG is unable to mount a USB storage device connected to the
USG.
Chapter 5 Dashboard
can appear. For an
5.2.11 Interface Status Summary Screen
Interfaces per USG model vary.
Figure 82 Dashboard > Interface Status Summary
USG20(W)-VPN Series User’s Guide
93
Page 94
Chapter 5 Dashboard
This table describes the fields in the above screen.
Table 27 Dashboard > Interface Status Summary
LABELDESCRIPTION
NameThis field displays the name of each interface.
StatusThis field displays the current status of each interface. The possible values depend on
what type of interface it is.
For Ethernet interfaces:
Inactive - The Ethernet interface is disabled.
Down - The Ethernet interface does not have any physical ports associated with it or
the Ethernet interface is enabled but not connected.
Speed / Duplex - The Ethernet interface is enabled and connected. This field displays
the port speed and duplex setting (Full or Half).
For cellular (mobile broadband) interfaces, see Section 6.10 on page 112 for
that can appear.
For the auxiliary interface:
Inactive - The auxiliary interface is disabled.
Connected - The auxiliary interface is enabled and connected.
Disconnected - The auxiliary interface is not connected.
For PPP interfaces:
Connected - The PPP interface is connected.
Disconnected - The PPP interface is not connected.
If the PPP interface is disabled, it does not appear in the list.
For WLAN interfaces:
Up - The WLAN interface is enabled.
Down - The WLAN interface is disabled.
ZoneThis field displays the zone to which the interface is currently assigned.
IP Addr/Netmask This field displays the current IP address and subnet mask assigned to the interface. If
the IP address is 0.0.0.0/0.0.0.0, the interface is disabled or did not receive an IP
address and subnet mask via DHCP.
If this interface is a member of an active virtual router, this field displays the IP
address it is currently using. This is either the static IP address of the interface (if it is
the master) or the management IP address (if it is a backup).
IP AssignmentThis field displays the interface’s IP assignment. It will show DHCP or Static.
ActionUse this field to get or to update the IP address for the interface.
Click Renew to send a new DHCP request to a DHCP server.
Click the Connect icon to have the USG try to connect a PPPoE/PPTP interface. If the
interface cannot use one of these ways to get or to update its IP address, this field
displays n/a.
Click the Disconnect icon to stop a PPPoE/PPTP connection.
the status
5.2.12 Secured Service Status Screen
This part shows what security services are available and enabled.
USG20(W)-VPN Series User’s Guide
94
Page 95
Chapter 5 Dashboard
Figure 83 Dashboard > Secured Service Status
This table describes the fields in the above screen.
Table 28 Dashboard > Secured Service Status
LABELDESCRIPTION
#This field is a sequential value, and it is not associated with a specific status.
StatusThis field displays the status of the USG’s security services. It will show these
NameThis field displays the name of security services supported by this model. Status
VersionThis field displays the version number of the services.
ExpirationThis field displays the number of days remaining before the license expires.
types of status: Licensed, Unlicensed, Disabled or Enabled.
will show Licensed for Premium Service after you register the device at
myZyXEL.com. You can then activate security service licenses such as AntiSpam, Content Filter and so on.
5.2.13 Content Filter Statistics Screen
Configure Configuration > UTM Profile > Content Filter and then view results here.
Figure 84 Dashboard > Content Filter Statistics
This table describes the fields in the above screen.
Table 29 Dashboard > Content Filter Statistics
LABELDESCRIPTION
Web Request Statistics
Total Web Pages
Inspected
This is the number of web pages the USG has checked to see whether they
belong to the categories you selected in the content filter screen.
USG20(W)-VPN Series User’s Guide
95
Page 96
Chapter 5 Dashboard
Table 29 Dashboard > Content Filter Statistics
LABELDESCRIPTION
BlockedThis is the number of web pages that the USG blocked access.
WarnedThis is the number of web pages for which the USG has displayed a warning
PassedThis is the number of web pages that the USG allowed access.
Category Hit Summary
Security Threat
(unsafe)
Managed Web pagesThis is the number of requested web pages that belong to the managed
message to the access requesters.
This is the number of requested web pages that belong to the unsafe categories
you have selected in the content filter screen.
categories you have selected in the content filter screen.
5.2.14 Top 5 IPv4/IPv6 Security Policy Rules that Blocked Traffic Screen
Figure 85 Dashboard > Top 5 IPv4/IPv6 Security Policy Rules that Blocked Traffic
This table describes the fields in the above screen.
Table 30 Dashboard > Top 5 IPv4/IPv6 Security Policy Rules that Blocked Traffic
LABELDESCRIPTION
#This is the entry’s rank in the list of the most commonly triggered security
FromThis shows the zone packets came from that the triggered security policy.
ToThis shows the zone packets went to that the triggered security policy.
DescriptionThis field displays the descriptive name (if any) of the triggered security policy.
HitsThis field displays how many times the security policy was triggered.
policies.
5.2.15 The Latest Alert Logs Screen
Figure 86 Dashboard > The Latest Alert Logs
USG20(W)-VPN Series User’s Guide
96
Page 97
Chapter 5 Dashboard
This table describes the fields in the above screen.
Table 31 Dashboard > The Latest Alert Logs
LABELDESCRIPTION
#This is the entry’s rank in the list of alert logs.
TimeThis field displays the date and time the log was created.
PriorityThis field displays the severity of the log.
CategoryThis field displays the type of log generated.
MessageThis field displays the actual log message.
SourceThis field displays the source address (if any) in the packet that generated the log.
DestinationThis field displays the destination address (if any) in the packet that generated the log.
Source InterfaceThis field displays the incoming interface of the packet that generated the log.
USG20(W)-VPN Series User’s Guide
97
Page 98
PART II
Technical Reference
98
Page 99
99
Page 100
6.1 Overview
Use the Monitor screens to check status and statistics information.
6.1.1 What You Can Do in this Chapter
Use the Monitor screens for the following.
•Use the System Status > Port Statistics screen (see Section 6.2 on page 101) to look at
packet statistics for each physical port.
•Use the System Status > Port Statistics > Graph View screen (see Section 6.2 on page 101)
to look at a line graph of packet statistics for each physical port.
•Use the System Status > Interface Status screen (Section 6.3 on page 103) to see all of the
USG’s interfaces and their packet statistics.
•Use the System Status > Traffic Statistics screen (see Section 6.4 on page 105) to start or
stop data collection and view statistics.
•Use the System Status > Session Monitor screen (see Section 6.5 on page 108) to view
sessions by user or service.
•Use the System Status > IGMP Statistics screen (see Section 6.6 on page 109) to view
multicasting details.
•Use the System Status > DDNS Status screen (see Section 6.7 on page 110) to view the
status of the USG’s DDNS domain names.
•Use the System Status > IP/MAC Binding screen (Section 6.8 on page 111) to view a list of
devices that have received an IP address from USG interfaces with IP/MAC binding enabled.
•Use the System Status > Login Users screen (Section 6.9 on page 111) to look at a list of the
users currently logged into the USG.
•Use the System Status > Cellular Status screen (Section 6.10 on page 112) to check your
mobile broadband connection status.
•Use the System Status > UPnP Port Status screen (see Section 6.11 on page 114) to look at
a list of the NAT port mapping rules that UPnP creates on the USG.
•Use the System Status > USB Storage screen (Section 6.12 on page 115) to view information
about a connected USB storage device.
•Use the System Status > Ethernet Neighbor screen (Section 6.13 on page 116) to view and
manage the USG’s neighboring devices via Layer Link Discovery Protocol (LLDP).
•Use the Wireless > AP Information screen (Section 6.14.1 on page 117) to view information
on connected APs.
•Use the Wireless > Station Info screen (Section 6.14.3 on page 120) to view information on
connected wireless stations.
•Use the Wireless > Detected Device screen (Section 6.14.3 on page 120) to view information
about suspected rogue APs.
CHAPTER 6
Monitor
USG20(W)-VPN Series User’s Guide
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.