ZyXEL Communications VPCJ2, VPCL14 User Manual

Prestige 660H/HW Series
802.11g Wireless ADSL2+ 4-Port Security Gateway

User’s Guide

Version 3.40
5/2005
Prestige 660H/HW Series User’s Guide
Copyright © 2005 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Copyright 2
Prestige 660H/HW Series User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Certifications
Go to www.zyxel.com
1 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
2 Select the certification you wish to view from this page.

3 Federal Communications Commission (FCC) Interference Statement

Prestige 660H/HW Series User’s Guide

Safety Warnings

For your safety, be sure to read and follow all warning notices and instructions.
• To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.
• Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or power adaptor to the right supply voltage (110V AC in North America or 230V AC in Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord.
• If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
Safety Warnings 4
Prestige 660H/HW Series User’s Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
5 ZyXEL Limited Warranty
Prestige 660H/HW Series User’s Guide

Customer Support

Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
METHOD
LOCATION
CORPORATE HEADQUARTERS (WORLDWIDE)
CZECH REPUBLIC
DENMARK
FINLAND
FRANCE
GERMANY
NORTH AMERICA
NORWAY
SPAIN
SWEDEN
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com
info@cz.zyxel.com +420 241 091 350 www.zyxel.cz ZyXEL Communications
info@cz.zyxel.com +420 241 091 359
support@zyxel.dk +45 39 55 07 00 www.zyxel.dk Z y X E L C o m m u n i c a t i o n s A / S
sales@zyxel.dk +45 39 55 07 07
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi Z y X EL C o m m un i c a t i on s O y
sales@zyxel.fi +358-9-4780 8448
info@zyxel.fr +33 (0)4 72 52 97 97 www.zyxel.fr Z y XE L Fr a nc e
+33 (0)4 72 52 19 20
support@zyxel.de +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
sales@zyxel.de +49-2405-6909-99
support@zyxel.com +1-800-255-4101
+1-714-632-0882
sales@zyxel.com +1-714-632-0858 ftp.us.zyxel.com
support@zyxel.no +47 22 80 61 80 www.zyxel.no Z y X E L C o m m u n i c a t i o n s A / S
sales@zyxel.no +47 22 80 61 81
support@zyxel.es +34 902 195 420 www.zyxel.es Z y X E L C o m m u ni c a t i o n s
sales@zyxel.es +34 913 005 345
support@zyxel.se +46 31 744 7700 www.zyxel.se Z y X E L C o m m u n ic at i on s A/ S
sales@zyxel.se +46 31 744 7701
A
WEB SITE
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com ZyXEL Communications Inc.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II
Sc ien ce P ar k Hsinchu 300 Ta iw a n
Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika
Col um bu sv ej 5 2860 Soeborg Denmark
Mal mi nk aa ri 10 00700 Helsinki Finland
1 ru e d e s V er ge r s Ba t. 1 / C 69760 Limonest France
Adenauerstr. 20/A2 D-52146 Wuerselen Germany
1130 N. Miller St. Anaheim
CA 92806-2001 U.S.A.
Ni ls H ans en s ve i 13 0667 Oslo Norway
Alejandro Villegas 33 1º, 28043 Madrid Spain
Sjöporten 4, 41764 Göteborg Sweden
Customer Support 6
Prestige 660H/HW Series User’s Guide
METHOD
LOCATION
UNITED KINGDOM
SUPPORT E-MAIL TELEPHONE
SALES E-MAIL FAX FTP SITE
technical@zyxel.co.uk +44 (0) 8702 909090 www.zyxel.co.uk ZyXEL Communications UK
sales@zyxel.co.uk +44 (0) 8702 909091 ftp.zyxel.co.uk
A
WEB SITE
a. “+” is the (prefix) number you enter to make an international telephone call.
REGULAR MAIL
Ltd.,11, The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
7 Customer Support
Prestige 660H/HW Series User’s Guide

Table of Contents

Copyright .................................................................................................................. 2
Federal Communications Commission (FCC) Interference Statement ............... 3
Safety Warnings ....................................................................................................... 4
ZyXEL Limited Warranty.......................................................................................... 5
Customer Support.................................................................................................... 6
Table of Contents..................................................................................................... 8
List of Figures ........................................................................................................ 24
List of Tables .......................................................................................................... 32
Preface .................................................................................................................... 38
Introduction to DSL................................................................................................ 40
Chapter 1
Getting To Know Your Prestige.............................................................................42
1.1 Introducing the Prestige .....................................................................................42
1.1.1 Features of the Prestige ...........................................................................43
1.1.1.1 P-660HW Wireless Features ...........................................................47
1.1.2 Applications for the Prestige .....................................................................48
1.1.2.1 Internet Access ...............................................................................48
1.1.3 Firewall for Secure Broadband Internet Access .......................................49
1.1.3.1 LAN to LAN Application ...................................................................49
1.1.4 Front Panel LEDs .....................................................................................49
Chapter 2
Introducing the Web Configurator........................................................................ 52
2.1 Web Configurator Overview ...............................................................................52
2.1.1 Accessing the Prestige Web Configurator ................................................52
2.1.2 Resetting the Prestige ..............................................................................53
2.1.2.1 Using the Reset Button ...................................................................53
2.1.3 Navigating the Prestige Web Configurator ...............................................54
8
Prestige 660H/HW Series User’s Guide
Chapter 3
Wizard Setup for Internet Access.........................................................................58
3.1 Introduction to Internet Access Wizard ..............................................................58
3.1.1 Internet Access Wizard Setup ..................................................................58
Chapter 4
Wizard Setup for Media Bandwidth Management ............................................... 66
4.1 Introduction to Media Bandwidth Management ..................................................66
4.1.1 Predefined Media Bandwidth Management Services ...............................66
4.2 Media Bandwidth Management Setup ...............................................................67
Chapter 5
Password Setup .....................................................................................................70
5.1 Password Overview ...........................................................................................70
5.1.1 Configuring Password ...............................................................................70
Chapter 6
LAN Setup...............................................................................................................72
6.1 LAN Overview ....................................................................................................72
6.1.1 LANs, WANs and the Prestige ..................................................................72
6.2 DNS Server Address ..........................................................................................73
6.3 DNS Server Address Assignment ......................................................................73
6.4 LAN TCP/IP ........................................................................................................74
6.4.1 Factory LAN Defaults ................................................................................74
6.4.2 IP Address and Subnet Mask ...................................................................74
6.4.3 RIP Setup .................................................................................................75
6.4.4 Multicast ....................................................................................................75
6.5 Any IP .................................................................................................................76
6.5.1 How Any IP Works ....................................................................................76
6.6 Configuring LAN .................................................................................................77
6.7 Configuring Static DHCP ....................................................................................79
Chapter 7
Wireless LAN (Prestige 660HW)............................................................................ 82
7.1 Introduction ........................................................................................................82
7.2 Wireless Security Overview ...............................................................................82
7.2.1 Encryption .................................................................................................82
7.2.2 Authentication ...........................................................................................82
7.2.3 Restricted Access .....................................................................................83
7.2.4 Hide Prestige Identity ................................................................................83
7.2.5 G-plus .......................................................................................................83
7.2.6 Configuring Wireless LAN on the Prestige ...............................................83
7.3 Configuring the Wireless Screen ........................................................................84
9
Prestige 660H/HW Series User’s Guide
7.3.1 WEP Encryption ........................................................................................84
7.4 Configuring MAC Filters .....................................................................................87
7.5 Introduction to WPA ...........................................................................................89
7.5.1 WPA-PSK Application Example ................................................................89
7.5.2 WPA with RADIUS Application Example ..................................................90
7.5.3 Wireless Client WPA Supplicants ............................................................91
7.6 Configuring IEEE 802.1x and WPA ....................................................................91
7.6.1 Authentication Required: 802.1x ...............................................................92
7.6.2 Authentication Required: WPA .................................................................94
7.6.3 Authentication Required: WPA-PSK .........................................................96
7.7 Configuring Local User Authentication ...............................................................97
7.8 Configuring RADIUS ..........................................................................................98
7.9 Introduction to OTIST .........................................................................................99
7.9.1 Enabling OTIST ........................................................................................99
7.9.1.1 AP ...................................................................................................99
7.9.1.2 Wireless Client ..............................................................................101
7.9.2 Starting OTIST ........................................................................................101
7.9.3 Notes on OTIST ......................................................................................102
Chapter 8
WAN Setup............................................................................................................ 104
8.1 WAN Overview .................................................................................................104
8.2 Metric ..............................................................................................................104
8.3 PPPoE Encapsulation ......................................................................................105
8.4 Traffic Shaping .................................................................................................105
8.5 Zero Configuration Internet Access ..................................................................106
8.6 Configuring WAN Setup ...................................................................................106
8.7 Traffic Redirect ................................................................................................109
8.8 Configuring WAN Backup ................................................................................. 110
Chapter 9
Network Address Translation (NAT) Screens.................................................... 114
9.1 NAT Overview .................................................................................................. 114
9.1.1 NAT Definitions ....................................................................................... 114
9.1.2 What NAT Does ......................................................................................115
9.1.3 How NAT Works .....................................................................................115
9.1.4 NAT Application ......................................................................................116
9.1.5 NAT Mapping Types ...............................................................................117
9.2 SUA (Single User Account) Versus NAT .......................................................... 118
9.3 SUA Server ...................................................................................................... 118
9.3.1 Default Server IP Address ...................................................................... 118
9.3.2 Port Forwarding: Services and Port Numbers ........................................118
9.3.3 Configuring Servers Behind SUA (Example) ..........................................119
10
Prestige 660H/HW Series User’s Guide
9.4 SIP ALG ........................................................................................................... 119
9.5 Selecting the NAT Mode ..................................................................................120
9.6 Configuring SUA Server ...................................................................................120
9.7 Configuring Address Mapping ..........................................................................122
9.8 Editing an Address Mapping Rule ....................................................................123
Chapter 10
Dynamic DNS Setup............................................................................................. 126
10.1 Dynamic DNS .................................................................................................126
10.1.1 DYNDNS Wildcard ................................................................................126
10.2 Configuring Dynamic DNS .............................................................................126
Chapter 11
Time and Date....................................................................................................... 128
11.1 Configuring Time and Date .............................................................................128
Chapter 12
Firewalls................................................................................................................130
12.1 Firewall Overview ...........................................................................................130
12.2 Types of Firewalls ..........................................................................................130
12.2.1 Packet Filtering Firewalls ......................................................................130
12.2.2 Application-level Firewalls ....................................................................130
12.2.3 Stateful Inspection Firewalls ................................................................131
12.3 Introduction to ZyXEL’s Firewall .....................................................................131
12.3.1 Denial of Service Attacks ......................................................................132
12.4 Denial of Service ............................................................................................132
12.4.1 Basics ...................................................................................................132
12.4.2 Types of DoS Attacks ...........................................................................133
12.4.2.1 ICMP Vulnerability ......................................................................135
12.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................135
12.4.2.3 Traceroute ...................................................................................136
12.5 Stateful Inspection ..........................................................................................136
12.5.1 Stateful Inspection Process ..................................................................137
12.5.2 Stateful Inspection and the Prestige .....................................................138
12.5.3 TCP Security .........................................................................................138
12.5.4 UDP/ICMP Security ..............................................................................139
12.5.5 Upper Layer Protocols ..........................................................................139
12.6 Guidelines for Enhancing Security with Your Firewall ....................................139
12.6.1 Security In General ...............................................................................140
12.7 Packet Filtering Vs Firewall ............................................................................141
12.7.1 Packet Filtering: ....................................................................................141
12.7.1.1 When To Use Filtering .................................................................141
12.7.2 Firewall .................................................................................................141
11
Prestige 660H/HW Series User’s Guide
12.7.2.1 When To Use The Firewall ..........................................................141
Chapter 13
Firewall Configuration .........................................................................................144
13.1 Access Methods .............................................................................................144
13.2 Firewall Policies Overview .............................................................................144
13.3 Rule Logic Overview ......................................................................................145
13.3.1 Rule Checklist .......................................................................................145
13.3.2 Security Ramifications ..........................................................................145
13.3.3 Key Fields For Configuring Rules .........................................................146
13.3.3.1 Action ..........................................................................................146
13.3.3.2 Service ........................................................................................146
13.3.3.3 Source Address ...........................................................................146
13.3.3.4 Destination Address ....................................................................146
13.4 Connection Direction Example .......................................................................146
13.4.1 LAN to WAN Rules ...............................................................................147
13.4.2 WAN to LAN Rules ...............................................................................147
13.4.3 Alerts .....................................................................................................148
13.5 Configuring Basic Firewall Settings ................................................................148
13.6 Rule Summary ...............................................................................................149
13.6.1 Configuring Firewall Rules ....................................................................151
13.7 Customized Services .....................................................................................154
13.8 Creating/Editing A Customized Service .........................................................154
13.9 Example Firewall Rule ...................................................................................155
13.10 Predefined Services .....................................................................................159
13.11 Anti-Probing ..................................................................................................161
13.12 Configuring Attack Alert ...............................................................................162
13.12.1 Threshold Values ................................................................................163
13.12.2 Half-Open Sessions ............................................................................163
13.12.2.1 TCP Maximum Incomplete and Blocking Time .........................163
Chapter 14
Content Filtering .................................................................................................. 166
14.1 Content Filtering Overview .............................................................................166
14.2 Configuring Keyword Blocking .......................................................................166
14.3 Configuring the Schedule ..............................................................................167
14.4 Configuring Trusted Computers .....................................................................168
Chapter 15
Remote Management Configuration .................................................................. 170
15.1 Remote Management Overview .....................................................................170
15.1.1 Remote Management Limitations .........................................................170
15.1.2 Remote Management and NAT ............................................................171
12
Prestige 660H/HW Series User’s Guide
15.1.3 System Timeout ...................................................................................171
15.2 Telnet ..............................................................................................................171
15.3 FTP ................................................................................................................171
15.4 Web ................................................................................................................172
15.5 Configuring Remote Management .................................................................172
Chapter 16
Universal Plug-and-Play (UPnP) ......................................................................... 174
16.1 Introducing Universal Plug and Play ..............................................................174
16.1.1 How do I know if I'm using UPnP? ........................................................174
16.1.2 NAT Traversal .......................................................................................174
16.1.3 Cautions with UPnP ..............................................................................174
16.2 UPnP and ZyXEL ...........................................................................................175
16.2.1 Configuring UPnP .................................................................................175
16.3 Installing UPnP in Windows Example ............................................................176
16.4 Using UPnP in Windows XP Example ...........................................................180
Chapter 17
Logs Screens........................................................................................................ 188
17.1 Logs Overview ...............................................................................................188
17.1.1 Alerts and Logs .....................................................................................188
17.2 Configuring Log Settings ................................................................................188
17.3 Displaying the Logs ........................................................................................190
17.4 SMTP Error Messages ...................................................................................191
17.4.1 Example E-mail Log ..............................................................................192
Chapter 18
Media Bandwidth Management Advanced Setup.............................................. 194
18.1 Bandwidth Management Advanced Setup Overview .....................................194
18.2 Bandwidth Classes and Filters .......................................................................194
18.3 Proportional Bandwidth Allocation .................................................................195
18.4 Bandwidth Management Usage Examples ....................................................195
18.4.1 Application-based Bandwidth Management Example ..........................195
18.4.2 Subnet-based Bandwidth Management Example .................................195
18.4.3 Application and Subnet-based Bandwidth Management Example .......196
18.5 Scheduler .......................................................................................................197
18.5.1 Priority-based Scheduler ......................................................................197
18.5.2 Fairness-based Scheduler ....................................................................197
18.6 Maximize Bandwidth Usage ...........................................................................197
18.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................197
18.6.2 Maximize Bandwidth Usage Example ..................................................198
18.7 Bandwidth Borrowing .....................................................................................199
18.7.1 Bandwidth Borrowing Example .............................................................199
13
Prestige 660H/HW Series User’s Guide
18.7.2 Maximize Bandwidth Usage With Bandwidth Borrowing ......................200
18.8 Configuring Summary ....................................................................................200
18.9 Configuring Class Setup ................................................................................202
18.9.1 DiffServ .................................................................................................203
18.9.1.1 DSCP and Per-Hop Behavior ......................................................203
18.9.2 Media Bandwidth Management Class Configuration ............................203
18.9.3 Media Bandwidth Management Statistics .............................................206
18.10 Bandwidth Monitor ......................................................................................207
Chapter 19
Maintenance ......................................................................................................... 210
19.1 Maintenance Overview ...................................................................................210
19.2 System Status Screen ....................................................................................210
19.2.1 System Statistics ...................................................................................212
19.3 DHCP Table Screen .......................................................................................214
19.4 Any IP Table Screen .......................................................................................215
19.5 Wireless Screen .............................................................................................215
19.5.1 Association List .....................................................................................215
19.6 Diagnostic Screens ........................................................................................216
19.6.1 Diagnostic General Screen ...................................................................216
19.6.2 Diagnostic DSL Line Screen .................................................................217
19.7 Firmware Screen ............................................................................................219
Chapter 20
Introducing the SMT ............................................................................................222
20.1 SMT Introduction ............................................................................................222
20.1.1 Procedure for SMT Configuration via Telnet .........................................222
20.1.2 Entering Password ................................................................................222
20.1.3 Prestige SMT Menu Overview ..............................................................223
20.2 Navigating the SMT Interface .........................................................................223
20.2.1 System Management Terminal Interface Summary ..............................225
20.3 Changing the System Password ....................................................................225
Chapter 21
Menu 1 General Setup ......................................................................................... 228
21.1 General Setup ................................................................................................228
21.2 Procedure To Configure Menu 1 ....................................................................228
21.2.1 Procedure to Configure Dynamic DNS .................................................229
Chapter 22
Menu 2 WAN Backup Setup ................................................................................ 232
22.1 Introduction to WAN Backup Setup ................................................................232
22.2 Configuring Dial Backup in Menu 2 ................................................................232
14
Prestige 660H/HW Series User’s Guide
22.2.1 Traffic Redirect Setup ...........................................................................233
Chapter 23
Menu 3 LAN Setup ...............................................................................................236
23.1 LAN Setup ......................................................................................................236
23.1.1 General Ethernet Setup ........................................................................236
23.2 Protocol Dependent Ethernet Setup ..............................................................237
23.3 CP/IP Ethernet Setup and DHCP ...................................................................237
Chapter 24
Wireless LAN Setup ............................................................................................. 240
24.1 Wireless LAN Overview .................................................................................240
24.2 Wireless LAN Setup .......................................................................................240
24.2.1 Wireless LAN MAC Address Filter ........................................................241
Chapter 25
Internet Access .................................................................................................... 244
25.1 Internet Access Overview ..............................................................................244
25.2 IP Policies ......................................................................................................244
25.3 IP Alias ...........................................................................................................244
25.4 IP Alias Setup .................................................................................................245
25.5 Route IP Setup ...............................................................................................246
25.6 Internet Access Configuration ........................................................................247
Chapter 26
Remote Node Configuration ...............................................................................250
26.1 Remote Node Setup Overview .......................................................................250
26.2 Remote Node Setup .......................................................................................250
26.2.1 Remote Node Profile ............................................................................250
26.2.2 Encapsulation and Multiplexing Scenarios ...........................................251
26.2.2.1 Scenario 1: One VC, Multiple Protocols ......................................251
26.2.2.2 Scenario 2: One VC, One Protocol (IP) ......................................251
26.2.2.3 Scenario 3: Multiple VCs .............................................................251
26.2.3 Outgoing Authentication Protocol .........................................................253
26.3 Remote Node Network Layer Options ...........................................................254
26.3.1 My WAN Addr Sample IP Addresses ...................................................255
26.4 Remote Node Filter ........................................................................................256
26.5 Editing ATM Layer Options ............................................................................257
26.5.1 VC-based Multiplexing (non-PPP Encapsulation) ................................257
26.5.2 LLC-based Multiplexing or PPP Encapsulation ....................................257
26.5.3 Advance Setup Options ........................................................................258
15
Prestige 660H/HW Series User’s Guide
Chapter 27
Static Route Setup ...............................................................................................260
27.1 IP Static Route Overview ...............................................................................260
27.2 Configuration ..................................................................................................260
Chapter 28
Bridging Setup ..................................................................................................... 264
28.1 Bridging in General ........................................................................................264
28.2 Bridge Ethernet Setup ....................................................................................264
28.2.1 Remote Node Bridging Setup ...............................................................264
28.2.2 Bridge Static Route Setup .....................................................................266
Chapter 29
Network Address Translation (NAT)................................................................... 268
29.1 Using NAT ......................................................................................................268
29.1.1 SUA (Single User Account) Versus NAT ..............................................268
29.2 Applying NAT .................................................................................................268
29.3 NAT Setup ......................................................................................................270
29.3.1 Address Mapping Sets ..........................................................................270
29.3.1.1 SUA Address Mapping Set .........................................................271
29.3.1.2 User-Defined Address Mapping Sets ..........................................272
29.3.1.3 Ordering Your Rules ....................................................................273
29.4 Configuring a Server behind NAT ..................................................................274
29.5 General NAT Examples ..................................................................................275
29.5.1 Example 1: Internet Access Only ..........................................................276
29.5.2 Example 2: Internet Access with an Inside Server ...............................276
29.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............277
29.5.4 Example 4: NAT Unfriendly Application Programs ...............................281
Chapter 30
Enabling the Firewall ........................................................................................... 284
30.1 Remote Management and the Firewall ..........................................................284
30.2 Access Methods .............................................................................................284
30.3 Enabling the Firewall ......................................................................................284
Chapter 31
Filter Configuration..............................................................................................286
31.1 About Filtering ................................................................................................286
31.1.1 The Filter Structure of the Prestige .......................................................287
31.2 Configuring a Filter Set for the Prestige .........................................................288
31.3 Filter Rules Summary Menus .........................................................................289
31.4 Configuring a Filter Rule ................................................................................290
31.4.1 TCP/IP Filter Rule .................................................................................291
16
Prestige 660H/HW Series User’s Guide
31.4.2 Generic Filter Rule ................................................................................293
31.5 Filter Types and NAT .....................................................................................295
31.6 Example Filter ................................................................................................295
31.7 Applying Filters and Factory Defaults ............................................................297
31.7.1 Ethernet Traffic .....................................................................................298
31.7.2 Remote Node Filters .............................................................................298
Chapter 32
SNMP Configuration ............................................................................................300
32.1 About SNMP ..................................................................................................300
32.2 Supported MIBs ............................................................................................301
32.3 SNMP Configuration ......................................................................................301
32.4 SNMP Traps ...................................................................................................302
Chapter 33
System Security ...................................................................................................304
33.1 System Security .............................................................................................304
33.1.1 System Password .................................................................................304
33.1.2 Configuring External RADIUS Server ...................................................304
33.1.3 IEEE802.1x ...........................................................................................306
33.2 Creating User Accounts on the Prestige ........................................................308
Chapter 34
System Information and Diagnosis .................................................................... 310
34.1 Overview ........................................................................................................310
34.2 System Status ................................................................................................310
34.3 System Information ........................................................................................312
34.3.1 System Information ...............................................................................312
34.3.2 Console Port Speed ..............................................................................313
34.4 Log and Trace ................................................................................................314
34.4.1 Viewing Error Log .................................................................................314
34.4.2 Syslog and Accounting .........................................................................315
34.5 Diagnostic ......................................................................................................317
Chapter 35
Firmware and Configuration File Maintenance ................................................. 320
35.1 Filename Conventions ...................................................................................320
35.2 Backup Configuration .....................................................................................321
35.2.1 Backup Configuration ...........................................................................321
35.2.2 Using the FTP Command from the Command Line ..............................322
35.2.3 Example of FTP Commands from the Command Line .........................322
35.2.4 GUI-based FTP Clients .........................................................................323
35.2.5 TFTP and FTP over WAN Management Limitations .............................323
17
Prestige 660H/HW Series User’s Guide
35.2.6 Backup Configuration Using TFTP .......................................................324
35.2.7 TFTP Command Example ....................................................................324
35.2.8 GUI-based TFTP Clients ......................................................................324
35.3 Restore Configuration ....................................................................................325
35.3.1 Restore Using FTP ...............................................................................325
35.3.2 Restore Using FTP Session Example ..................................................326
35.4 Uploading Firmware and Configuration Files .................................................327
35.4.1 Firmware File Upload ............................................................................327
35.4.2 Configuration File Upload .....................................................................327
35.4.3 FTP File Upload Command from the DOS Prompt Example ................328
35.4.4 FTP Session Example of Firmware File Upload ...................................329
35.4.5 TFTP File Upload ..................................................................................329
35.4.6 TFTP Upload Command Example ........................................................330
Chapter 36
System Maintenance............................................................................................ 332
36.1 Command Interpreter Mode ...........................................................................332
36.2 Call Control Support .......................................................................................333
36.2.1 Budget Management ............................................................................333
36.3 Time and Date Setting ....................................................................................334
36.3.1 Resetting the Time ................................................................................335
Chapter 37
Remote Management ........................................................................................... 338
37.1 Remote Management Overview .....................................................................338
37.2 Remote Management .....................................................................................338
37.2.1 Remote Management Setup .................................................................338
37.2.2 Remote Management Limitations .........................................................339
37.3 Remote Management and NAT ......................................................................340
37.4 System Timeout .............................................................................................340
Chapter 38
IP Policy Routing.................................................................................................. 342
38.1 IP Policy Routing Overview ............................................................................342
38.2 Benefits of IP Policy Routing ..........................................................................342
38.3 Routing Policy ................................................................................................342
38.4 IP Routing Policy Setup .................................................................................343
38.5 Applying an IP Policy .....................................................................................346
38.5.1 Ethernet IP Policies ..............................................................................346
38.6 IP Policy Routing Example .............................................................................347
18
Prestige 660H/HW Series User’s Guide
Chapter 39
Call Scheduling ....................................................................................................352
39.1 Introduction ....................................................................................................352
Chapter 40
Internal SPTGEN .................................................................................................. 356
40.1 Internal SPTGEN Overview ...........................................................................356
40.2 The Configuration Text File Format ................................................................356
40.2.1 Internal SPTGEN File Modification - Important Points to Remember ...357
40.3 Internal SPTGEN FTP Download Example ....................................................357
40.4 Internal SPTGEN FTP Upload Example ........................................................358
Chapter 41
Troubleshooting ...................................................................................................360
41.1 Problems Starting Up the Prestige .................................................................360
41.2 Problems with the LAN LED ...........................................................................360
41.3 Problems with the DSL LED ...........................................................................361
41.4 Problems with the LAN Interface ....................................................................361
41.5 Problems with the WAN Interface ..................................................................361
41.6 Problems with Internet Access .......................................................................362
41.7 Problems with the Password ..........................................................................362
41.8 Problems with the Web Configurator .............................................................363
41.9 Problems with Remote Management .............................................................363
Appendix A
Splitters and Microfilters ..................................................................................... 364
Connecting a POTS Splitter ................................................................................... 364
Telephone Microfilters ............................................................................................ 365
Prestige With ISDN ................................................................................................ 365
Appendix B
Setting up Your Computer’s IP Address............................................................ 368
Windows 95/98/Me................................................................................................. 368
Installing Components ..................................................................................... 369
Configuring ...................................................................................................... 370
Verifying Settings............................................................................................. 371
Windows 2000/NT/XP ............................................................................................ 371
Verifying Settings............................................................................................. 375
Macintosh OS 8/9................................................................................................... 375
Verifying Settings............................................................................................. 377
Macintosh OS X ..................................................................................................... 377
Verifying Settings............................................................................................. 378
19
Prestige 660H/HW Series User’s Guide
Appendix C
IP Subnetting ........................................................................................................ 380
IP Addressing......................................................................................................... 380
IP Classes .............................................................................................................. 380
Subnet Masks ........................................................................................................ 381
Subnetting .............................................................................................................. 381
Example: Two Subnets .......................................................................................... 382
Example: Four Subnets.......................................................................................... 384
Example Eight Subnets.......................................................................................... 385
Subnetting With Class A and Class B Networks. ................................................... 386
Appendix D
PPPoE ................................................................................................................... 388
PPPoE in Action..................................................................................................... 388
Benefits of PPPoE.................................................................................................. 388
Traditional Dial-up Scenario................................................................................... 388
How PPPoE Works ................................................................................................ 389
Prestige as a PPPoE Client ................................................................................... 389
Appendix E
Virtual Circuit Topology ......................................................................................390
Appendix F
Wireless LANs ...................................................................................................... 392
Wireless LAN Topologies ....................................................................................... 392
Ad-hoc Wireless LAN Configuration ................................................................ 392
BSS.................................................................................................................. 392
ESS.................................................................................................................. 393
Channel.................................................................................................................. 394
RTS/CTS................................................................................................................ 394
Fragmentation Threshold ....................................................................................... 395
Preamble Type....................................................................................................... 396
IEEE 802.1x ........................................................................................................... 397
RADIUS.................................................................................................................. 397
Types of RADIUS Messages ........................................................................... 397
EAP Authentication ................................................................................................ 398
Types of Authentication......................................................................................... 399
EAP-MD5 (Message-Digest Algorithm 5) ........................................................ 399
EAP-TLS (Transport Layer Security) ............................................................... 399
EAP-TTLS (Tunneled Transport Layer Service) .............................................. 399
PEAP (Protected EAP) .................................................................................... 400
LEAP................................................................................................................ 400
20
Prestige 660H/HW Series User’s Guide
WEP Authentication Steps ..................................................................................... 400
Dynamic WEP Key Exchange ......................................................................... 401
WPA ....................................................................................................................... 402
User Authentication ........................................................................................ 402
Encryption ....................................................................................................... 402
Security Parameters Summary .............................................................................. 403
Roaming................................................................................................................. 403
Requirements for Roaming.............................................................................. 404
Appendix G
Antenna Selection and Positioning Recommendation..................................... 406
Antenna Characteristics ......................................................................................... 406
Frequency........................................................................................................ 406
Radiation Pattern ............................................................................................. 406
Antenna Gain................................................................................................... 406
Types of Antennas For WLAN................................................................................ 407
Positioning Antennas ....................................................................................... 407
Connector Type...................................................................................................... 407
Appendix H
Example Internal SPTGEN Screens.................................................................... 408
Command Examples.............................................................................................. 428
Appendix I
Command Interpreter........................................................................................... 430
Command Syntax................................................................................................... 430
Command Usage ................................................................................................... 430
Appendix J
Firewall Commands ............................................................................................. 432
Sys Firewall Commands ........................................................................................ 432
Appendix K
Brute-Force Password Guessing Protection..................................................... 434
Example ................................................................................................................. 434
Appendix L
Boot Commands ..................................................................................................436
Appendix M
Log Descriptions.................................................................................................. 438
Log Commands...................................................................................................... 447
21
Prestige 660H/HW Series User’s Guide
Configuring What You Want the Prestige to Log ............................................. 447
Displaying Logs ............................................................................................... 447
Log Command Example......................................................................................... 448
Index...................................................................................................................... 450
22
Prestige 660H/HW Series User’s Guide
23
Prestige 660H/HW Series User’s Guide

List of Figures

Figure 1 Prestige Internet Access Application .................................................................... 48
Figure 2 Firewall Application ............................................................................................... 49
Figure 3 Prestige LAN-to-LAN Application .......................................................................... 49
Figure 4 P-660H Front Panel .............................................................................................. 49
Figure 5 P-660HW Front Panel ........................................................................................... 50
Figure 6 Password Screen .................................................................................................. 53
Figure 7 Change Password at Login ................................................................................... 53
Figure 8 Web Configurator: Site Map Screen ................................................................... 54
Figure 9 Internet Access Wizard Setup: First Screen ......................................................... 59
Figure 10 Internet Connection with PPPoE ......................................................................... 60
Figure 11 Internet Connection with RFC 1483 ................................................................... 61
Figure 12 Internet Connection with ENET ENCAP ............................................................. 61
Figure 13 Internet Connection with PPPoA ......................................................................... 62
Figure 14 Internet Access Wizard Setup: Third Screen ...................................................... 64
Figure 15 Internet Access Wizard Setup: LAN Configuration ............................................. 64
Figure 16 Internet Access Wizard Setup: Connection Tests ............................................... 65
Figure 17 Media Bandwidth Mgnt. Wizard Setup: First Screen .......................................... 67
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen .................................... 68
Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish ................................................... 69
Figure 20 Password ............................................................................................................ 70
Figure 21 LAN and WAN IP Addresses .............................................................................. 72
Figure 22 Any IP Example .................................................................................................. 76
Figure 23 LAN Setup ........................................................................................................... 78
Figure 24 LAN: Static DHCP ............................................................................................... 80
Figure 25 Wireless Security Methods ................................................................................. 84
Figure 26 Wireless Screen .................................................................................................. 85
Figure 27 MAC Address Filter ............................................................................................. 88
Figure 28 WPA - PSK Authentication .................................................................................. 90
Figure 29 WPA with RADIUS Application Example2 .......................................................... 91
Figure 30 Wireless LAN: 802.1x/WPA: No Authentication .................................................. 92
Figure 31 Wireless LAN: 802.1x/WPA: 802.1xl ................................................................... 93
Figure 32 Wireless LAN: 802.1x/WPA: WPAl ...................................................................... 95
Figure 33 Wireless LAN: 802.1x/WPA:WPA-PSKl .............................................................. 96
Figure 34 Local User Database .......................................................................................... 97
Figure 35 RADIUS .............................................................................................................. 98
Figure 36 OTIST ................................................................................................................. 100
24
Prestige 660H/HW Series User’s Guide
Figure 37 Example Wireless Client OTIST Screen ............................................................. 101
Figure 38 Security Key ........................................................................................................ 101
Figure 39 OTIST in Progress (Prestige) .............................................................................. 101
Figure 40 OTIST in Progress (Client) .................................................................................. 101
Figure 41 No AP with OTIST Found ................................................................................... 102
Figure 42 Start OTIST? ....................................................................................................... 102
Figure 43 Example of Traffic Shaping ................................................................................. 106
Figure 44 WAN Setup (PPPoE) .......................................................................................... 107
Figure 45 Traffic Redirect Example ..................................................................................... 110
Figure 46 Traffic Redirect LAN Setup ................................................................................. 110
Figure 47 WAN Backup ....................................................................................................... 111
Figure 48 How NAT Works .................................................................................................. 116
Figure 49 NAT Application With IP Alias ............................................................................. 116
Figure 50 Multiple Servers Behind NAT Example ............................................................... 119
Figure 51 NAT Mode ........................................................................................................... 120
Figure 52 Edit SUA/NAT Server Set ................................................................................... 121
Figure 53 Address Mapping Rules ...................................................................................... 122
Figure 54 Address Mapping Rule Edit ................................................................................ 123
Figure 55 Dynamic DNS ..................................................................................................... 127
Figure 56 Time and Date ..................................................................................................... 128
Figure 57 Prestige Firewall Application ............................................................................... 132
Figure 58 Three-Way Handshake ....................................................................................... 133
Figure 59 SYN Flood ........................................................................................................... 134
Figure 60 Smurf Attack ....................................................................................................... 135
Figure 61 Stateful Inspection ............................................................................................... 137
Figure 62 LAN to WAN Traffic ............................................................................................. 147
Figure 63 WAN to LAN Traffic ............................................................................................. 147
Figure 64 Firewall: Default Policy ........................................................................................ 148
Figure 65 Firewall: Rule Summary ..................................................................................... 149
Figure 66 Firewall: Edit Rule ............................................................................................... 152
Figure 67 Firewall: Customized Services ............................................................................ 154
Figure 68 Firewall: Configure Customized Services ........................................................... 155
Figure 69 Firewall Example: Rule Summary ....................................................................... 156
Figure 70 Firewall Example: Edit Rule: Destination Address ............................................. 157
Figure 71 Edit Custom Port Example .................................................................................. 157
Figure 72 Firewall Example: Edit Rule: Select Customized Services ................................. 158
Figure 73 Firewall Example: Rule Summary: My Service .................................................. 159
Figure 74 Firewall: Anti Probing .......................................................................................... 162
Figure 75 Firewall: Threshold .............................................................................................. 164
Figure 76 Content Filter: Keyword ...................................................................................... 166
Figure 77 Content Filter: Schedule ..................................................................................... 167
Figure 78 Content Filter: Trusted ........................................................................................ 168
Figure 79 Telnet Configuration on a TCP/IP Network ......................................................... 171
25
Prestige 660H/HW Series User’s Guide
Figure 80 Remote Management ......................................................................................... 172
Figure 81 Configuring UPnP ............................................................................................... 175
Figure 82 Add/Remove Programs: Windows Setup: Communication ................................. 177
Figure 83 Add/Remove Programs: Windows Setup: Communication: Components .......... 177
Figure 84 Network Connections .......................................................................................... 178
Figure 85 Windows Optional Networking Components Wizard .......................................... 179
Figure 86 Networking Services ........................................................................................... 180
Figure 87 Network Connections .......................................................................................... 181
Figure 88 Internet Connection Properties .......................................................................... 182
Figure 89 Internet Connection Properties: Advanced Settings ........................................... 183
Figure 90 Internet Connection Properties: Advanced Settings: Add ................................... 183
Figure 91 System Tray Icon ................................................................................................ 184
Figure 92 Internet Connection Status .................................................................................. 184
Figure 93 Network Connections .......................................................................................... 185
Figure 94 Network Connections: My Network Places ......................................................... 186
Figure 95 Network Connections: My Network Places: Properties: Example ....................... 186
Figure 96 Log Settings ........................................................................................................ 189
Figure 97 View Logs ........................................................................................................... 191
Figure 98 E-mail Log Example ............................................................................................ 192
Figure 99 Application-based Bandwidth Management Example ......................................... 195
Figure 100 Subnet-based Bandwidth Management Example ............................................. 196
Figure 101 Application and Subnet-based Bandwidth Management Example ................... 196
Figure 102 Bandwidth Allotment Example .......................................................................... 198
Figure 103 Maximize Bandwidth Usage Example ............................................................... 199
Figure 104 Bandwidth Borrowing Example ......................................................................... 200
Figure 105 Media Bandwidth Management: Summary ....................................................... 201
Figure 106 Media Bandwidth Management: Class Setup ................................................... 202
Figure 107 DiffServ: Differentiated Service Field ................................................................ 203
Figure 108 Media Bandwidth Management: Class Configuration ....................................... 204
Figure 109 Media Bandwidth Management Statistics ........................................................ 207
Figure 110 Media Bandwidth Management: Monitor .......................................................... 208
Figure 111 System Status .................................................................................................... 211
Figure 112 System Status: Show Statistics ......................................................................... 213
Figure 113 DHCP Table ...................................................................................................... 214
Figure 114 Any IP Table ...................................................................................................... 215
Figure 115 Association List ................................................................................................. 216
Figure 116 Diagnostic: General ........................................................................................... 217
Figure 117 Diagnostic: DSL Line ......................................................................................... 218
Figure 118 Firmware Upgrade ............................................................................................ 219
Figure 119 Network Temporarily Disconnected ................................................................... 220
Figure 120 Error Message .................................................................................................. 220
Figure 121 Login Screen ..................................................................................................... 223
Figure 122 Prestige SMT Menu Overview .......................................................................... 223
26
Prestige 660H/HW Series User’s Guide
Figure 123 Menu 23.1 Change Password ........................................................................... 226
Figure 124 Menu 1 General Setup ...................................................................................... 229
Figure 125 Menu 1.1 Configure Dynamic DNS .................................................................. 230
Figure 126 Menu 2 WAN Backup Setup ............................................................................. 232
Figure 127 Menu 2.1Traffic Redirect Setup ......................................................................... 233
Figure 128 Menu 3 LAN Setup ............................................................................................ 236
Figure 129 Menu 3.1 LAN Port Filter Setup ........................................................................ 236
Figure 130 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 237
Figure 131 Menu 3.5 - Wireless LAN Setup ....................................................................... 240
Figure 132 Menu 3.5.1 WLAN MAC Address Filtering ........................................................ 242
Figure 133 IP Alias Network Example ................................................................................. 245
Figure 134 Menu 3.2 TCP/IP and DHCP Setup ................................................................. 245
Figure 135 Menu 3.2.1 IP Alias Setup ................................................................................ 246
Figure 136 Menu 1 General Setup ...................................................................................... 247
Figure 137 Menu 4 Internet Access Setup .......................................................................... 247
Figure 138 Menu 11 Remote Node Setup ........................................................................... 251
Figure 139 Menu 11.1 Remote Node Profile ...................................................................... 252
Figure 140 Menu 11.3 Remote Node Network Layer Options ............................................ 254
Figure 141 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection ........................... 256
Figure 142 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) ............... 256
Figure 143 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) ................. 257
Figure 144 Menu 11.6 for VC-based Multiplexing ............................................................... 257
Figure 145 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation .......................... 258
Figure 146 Menu 11.1 Remote Node Profile ....................................................................... 258
Figure 147 Menu 11.8 Advance Setup Options .................................................................. 259
Figure 148 Sample Static Routing Topology ....................................................................... 260
Figure 149 Menu 12 Static Route Setup ............................................................................. 261
Figure 150 Menu 12.1 IP Static Route Setup ...................................................................... 261
Figure 151 Menu12.1.1 Edit IP Static Route ....................................................................... 261
Figure 152 Menu 11.1 Remote Node Profile ....................................................................... 265
Figure 153 Menu 11.3 Remote Node Network Layer Options ............................................ 265
Figure 154 Menu 12.3.1 Edit Bridge Static Route ............................................................... 266
Figure 155 Menu 4 Applying NAT for Internet Access ........................................................ 269
Figure 156 Applying NAT in Menus 4 & 11.3 ....................................................................... 269
Figure 157 Menu 15 NAT Setup ........................................................................................ 270
Figure 158 Menu 15.1 Address Mapping Sets .................................................................... 271
Figure 159 Menu 15.1.255 SUA Address Mapping Rules .................................................. 271
Figure 160 Menu 15.1.1 First Set ........................................................................................ 272
Figure 161 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ........................ 273
Figure 162 Menu 15.2 NAT Server Setup ........................................................................... 274
Figure 163 Menu 15.2.1 NAT Server Setup ........................................................................ 275
Figure 164 Multiple Servers Behind NAT Example ............................................................. 275
Figure 165 NAT Example 1 ................................................................................................. 276
27
Prestige 660H/HW Series User’s Guide
Figure 166 Menu 4 Internet Access & NAT Example .......................................................... 276
Figure 167 NAT Example 2 ................................................................................................. 277
Figure 168 Menu 15.2.1 Specifying an Inside Server ......................................................... 277
Figure 169 NAT Example 3 ................................................................................................. 278
Figure 170 Example 3: Menu 11.3 ...................................................................................... 279
Figure 171 Example 3: Menu 15.1.1.1 ................................................................................ 279
Figure 172 Example 3: Final Menu 15.1.1 .......................................................................... 280
Figure 173 Example 3: Menu 15.2.1 ................................................................................... 280
Figure 174 NAT Example 4 ................................................................................................. 281
Figure 175 Example 4: Menu 15.1.1.1 Address Mapping Rule ........................................... 281
Figure 176 Example 4: Menu 15.1.1 Address Mapping Rules ............................................ 282
Figure 177 Menu 21.2 Firewall Setup ................................................................................. 285
Figure 178 Outgoing Packet Filtering Process .................................................................... 286
Figure 179 Filter Rule Process ............................................................................................ 287
Figure 180 Menu 21 Filter Set Configuration ...................................................................... 288
Figure 181 NetBIOS_WAN Filter Rules Summary ............................................................. 288
Figure 182 NetBIOS_LAN Filter Rules Summary .............................................................. 289
Figure 183 IGMP Filter Rules Summary ............................................................................ 289
Figure 184 Menu 21.1.x.1 TCP/IP Filter Rule ..................................................................... 291
Figure 185 Executing an IP Filter ........................................................................................ 293
Figure 186 Menu 21.1.5.1 Generic Filter Rule ................................................................... 294
Figure 187 Protocol and Device Filter Sets ......................................................................... 295
Figure 188 Sample Telnet Filter .......................................................................................... 296
Figure 189 Menu 21.1.6.1 Sample Filter ............................................................................ 296
Figure 190 Menu 21.1.6.1 Sample Filter Rules Summary .................................................. 297
Figure 191 Filtering Ethernet Traffic .................................................................................... 298
Figure 192 Filtering Remote Node Traffic ........................................................................... 298
Figure 193 SNMP Management Model ............................................................................... 300
Figure 194 Menu 22 SNMP Configuration .......................................................................... 302
Figure 195 Menu 23 – System Security .............................................................................. 304
Figure 196 Menu 23.2 System Security: RADIUS Server ................................................... 305
Figure 197 Menu 23 System Security ................................................................................. 306
Figure 198 Menu 23.4 System Security: IEEE802.1x ......................................................... 306
Figure 199 Menu 14 Dial-in User Setup .............................................................................. 309
Figure 200 Menu 14.1 Edit Dial-in User .............................................................................. 309
Figure 201 Menu 24 System Maintenance ......................................................................... 310
Figure 202 Menu 24.1 System Maintenance : Status ......................................................... 311
Figure 203 Menu 24.2 System Information and Console Port Speed ................................. 312
Figure 204 Menu 24.2.1 System Maintenance: Information ............................................... 313
Figure 205 Menu 24.2.2 System Maintenance : Change Console Port Speed ................... 314
Figure 206 Menu 24.3 System Maintenance: Log and Trace ............................................. 314
Figure 207 Sample Error and Information Messages ......................................................... 315
Figure 208 Menu 24.3.2 System Maintenance: Syslog and Accounting ............................. 315
28
Prestige 660H/HW Series User’s Guide
Figure 209 Syslog Example ................................................................................................ 316
Figure 210 Menu 24.4 System Maintenance : Diagnostic ................................................... 317
Figure 211 Telnet in Menu 24.5 ........................................................................................... 322
Figure 212 FTP Session Example ...................................................................................... 323
Figure 213 Telnet into Menu 24.6 ........................................................................................ 326
Figure 214 Restore Using FTP Session Example ............................................................... 326
Figure 215 Telnet Into Menu 24.7.1 Upload System Firmware .......................................... 327
Figure 216 Telnet Into Menu 24.7.2 System Maintenance ................................................. 328
Figure 217 FTP Session Example of Firmware File Upload ............................................... 329
Figure 218 Command Mode in Menu 24 ............................................................................. 332
Figure 219 Valid Commands ............................................................................................... 332
Figure 220 Menu 24.9 System Maintenance: Call Control .................................................. 333
Figure 221 Menu 24.9.1 System Maintenance: Budget Management ................................ 333
Figure 222 Menu 24 System Maintenance ......................................................................... 334
Figure 223 Menu 24.10 System Maintenance: Time and Date Setting ............................... 335
Figure 224 Menu 24.11 Remote Management Control ....................................................... 339
Figure 225 Menu 25 IP Routing Policy Setup ..................................................................... 343
Figure 226 Menu 25.1 IP Routing Policy Setup .................................................................. 344
Figure 227 Menu 25.1.1 IP Routing Policy .......................................................................... 345
Figure 228 Menu 3.2 TCP/IP and DHCP Ethernet Setup ................................................... 347
Figure 229 Menu 11.3 Remote Node Network Layer Options ............................................ 347
Figure 230 Example of IP Policy Routing ........................................................................... 348
Figure 231 IP Routing Policy Example ................................................................................ 349
Figure 232 IP Routing Policy Example ................................................................................ 350
Figure 233 Applying IP Policies Example ........................................................................... 350
Figure 234 Menu 26 Schedule Setup .................................................................................. 352
Figure 235 Menu 26.1 Schedule Set Setup ....................................................................... 353
Figure 236 Applying Schedule Set(s) to a Remote Node (PPPoE) .................................... 354
Figure 237 Configuration Text File Format: Column Descriptions ....................................... 356
Figure 238 Invalid Parameter Entered: Command Line Example ....................................... 357
Figure 239 Valid Parameter Entered: Command Line Example ......................................... 357
Figure 240 Internal SPTGEN FTP Download Example ..................................................... 358
Figure 241 Internal SPTGEN FTP Upload Example ........................................................... 358
Figure 242 Connecting a POTS Splitter .............................................................................. 364
Figure 243 Connecting a Microfilter .................................................................................... 365
Figure 244 Prestige with ISDN ............................................................................................ 366
Figure 245 WIndows 95/98/Me: Network: Configuration ..................................................... 369
Figure 246 Windows 95/98/Me: TCP/IP Properties: IP Address ......................................... 370
Figure 247 Windows 95/98/Me: TCP/IP Properties: DNS Configuration ............................ 371
Figure 248 Windows XP: Start Menu .................................................................................. 372
Figure 249 Windows XP: Control Panel .............................................................................. 372
Figure 250 Windows XP: Control Panel: Network Connections: Properties ....................... 373
Figure 251 Windows XP: Local Area Connection Properties .............................................. 373
29
Loading...
+ 430 hidden pages