ZyXEL P-660HW-61 User guide

Category
Networking
Type
User guide
Prestige 660H/HW Series
802.11g Wireless ADSL2+ 4-Port Security Gateway
Users Guide
Version 3.40
January 2005
Prestige 660H/HW Series User’s Guide
Copyright 2
Copyright
Copyright © 2005 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Prestige 660H/HW Series User’s Guide
3 Federal Communications Commission (FCC) Interference Statement
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy, and if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and the receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
This product has been designed for the WLAN 2.4 GHz network throughout the EC region and
Switzerland, with restrictions in France.
Certifications
1 Go to www.zyxel.com
2 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
3 Select the certification you wish to view from this page
Prestige 660H/HW Series User’s Guide
ZyXEL Limited Warranty 4
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not
apply if the product is modified, misused, tampered with, damaged by an act of God, or
subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind of character to the
purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
Safety Warnings
1 To reduce the risk of fire, use only No. 26 AWG or larger telephone wire.
2 Do not use this product near water, for example, in a wet basement or near a swimming
pool.
3 Avoid using this product during an electrical storm. There may be a remote risk of
electric shock from lightening.
Prestige 660H/HW Series User’s Guide
5 Customer Support
Customer Support
Please have the following information ready when you contact customer support.
Product model and serial number.
Warranty Information.
Date that you received your device.
Brief description of the problem and the steps you took to solve it.
METHOD
LOCATION
SUPPORT E-MAIL TELEPHONE
a. “+” is the (prefix) number you enter to make an international telephone call.
A
WEB SITE
REGULAR MAIL
SALES E-MAIL FAX FTP SITE
WORLDWIDE
[email protected] +886-3-578-3942 www.zyxel.com
www.europe.zyxel.com
ZyXEL Communications Corp.
6 Innovation Road II
Science Park
Hsinchu 300
Tai wan
[email protected] +886-3-578-2439 ftp.zyxel.com
ftp.europe.zyxel.com
NORTH
AMERICA
[email protected] +1-800-255-4101
+1-714-632-0882
www.us.zyxel.com ZyXEL Communications Inc.
1130 N. Miller St.
Anaheim
CA 92806-2001
U.S.A.
[email protected] +1-714-632-0858 ftp.us.zyxel.com
GERMANY
[email protected] +49-2405-6909-0 www.zyxel.de ZyXEL Deutschland GmbH.
Adenauerstr. 20/A2 D-52146
Wuerselen
Germany
[email protected] +49-2405-6909-99
FRANCE
[email protected] +33 (0)4 72 52 97 97 www.zyxel.fr ZyXEL France
1 rue des Vergers
Bat. 1 / C
69760 Limonest
France
+33 (0)4 72 52 19 20
SPAIN
[email protected] +34 902 195 420 www.zyxel.es Z yX EL Co mm un i c at i o ns
A l e j a n d r o V i l l e g a s 3 3
1 º , 2 8 0 4 3 M a d r i d
Spain
[email protected] +34 913 005 345
DENMARK
[email protected] +45 39 55 07 00 www.zyxel.dk Z y X E L C o m m u n i c a t i o n s A / S
Columbusvej 5
2860 Soeborg
Denmark
[email protected] +45 39 55 07 07
NORWAY
[email protected] +47 22 80 61 80 www.zyxel.no Z y X E L C o m m u n i c a t i o n s A / S
Nils Hansens vei 13
0667 Oslo
Norway
[email protected] +47 22 80 61 81
SWEDEN
[email protected] +46 31 744 7700 www.zyxel.se ZyXEL Communications A/S
Sjöporten 4, 41764 Göteborg
Sweden
[email protected] +46 31 744 7701
FINLAND
[email protected] +358-9-4780-8411 www.zyxel.fi Z y X E L C o m m un i c a t io n s O y
Malminkaari 10
00700 Helsinki
Finland
[email protected] +358-9-4780 8448
Prestige 660H/HW Series User’s Guide
6
Table of Contents
Copyright .................................................................................................................. 2
Federal Communications Commission (FCC) Interference Statement ............... 3
ZyXEL Limited Warranty.......................................................................................... 4
Customer Support.................................................................................................... 5
Table of Contents..................................................................................................... 6
List of Figures ........................................................................................................ 22
List of Tables .......................................................................................................... 30
Preface .................................................................................................................... 36
Introduction to DSL................................................................................................ 38
Chapter 1
Getting To Know Your Prestige............................................................................. 40
1.1 Introducing the Prestige .....................................................................................40
1.1.1 Features of the Prestige ...........................................................................41
1.1.2 Applications for the Prestige .....................................................................46
1.1.2.1 Internet Access ...............................................................................46
1.1.3 Firewall for Secure Broadband Internet Access .......................................47
1.1.3.1 LAN to LAN Application ...................................................................47
1.1.4 Prestige Hardware Installation and Connection ........................................47
Chapter 2
Introducing the Web Configurator........................................................................ 48
2.1 Web Configurator Overview ...............................................................................48
2.1.1 Accessing the Prestige Web Configurator ................................................48
2.1.2 Resetting the Prestige ..............................................................................49
2.1.2.1 Using the Reset Button ...................................................................49
2.1.3 Navigating the Prestige Web Configurator ...............................................50
Chapter 3
Wizard Setup for Internet Access ......................................................................... 54
3.1 Introduction ........................................................................................................54
Prestige 660H/HW Series User’s Guide
7
3.1.1 Encapsulation ...........................................................................................54
3.1.1.1 ENET ENCAP .................................................................................54
3.1.1.2 PPP over Ethernet ..........................................................................54
3.1.1.3 PPPoA .............................................................................................54
3.1.1.4 RFC 1483 ........................................................................................55
3.1.2 Multiplexing ...............................................................................................55
3.1.2.1 VC-based Multiplexing ....................................................................55
3.1.2.2 LLC-based Multiplexing ...................................................................55
3.1.3 VPI and VCI ..............................................................................................55
3.1.4 Internet Access Wizard Setup: First Screen .............................................55
3.2 IP Address and Subnet Mask .............................................................................56
3.2.1 IP Address Assignment ............................................................................57
3.2.1.1 IP Assignment with PPPoA or PPPoE Encapsulation .....................57
3.2.1.2 IP Assignment with RFC 1483 Encapsulation .................................57
3.2.1.3 IP Assignment with ENET ENCAP Encapsulation ..........................57
3.2.1.4 Private IP Addresses .......................................................................58
3.2.2 Nailed-Up Connection (PPP) ....................................................................58
3.2.3 NAT ...........................................................................................................58
3.2.4 Internet Access Wizard Setup: Second Screen ........................................58
3.2.5 DHCP Setup .............................................................................................62
3.2.5.1 IP Pool Setup ..................................................................................62
3.2.6 Internet Access Wizard Setup: Third Screen ............................................62
3.2.7 Internet Access Wizard Setup: Connection Test .......................................64
3.2.7.1 Test Your Internet Connection .........................................................65
Chapter 4
Wizard Setup for Media Bandwidth Management ............................................... 66
4.1 Introduction ........................................................................................................66
4.1.1 Predefined Media Bandwidth Management Services ...............................66
4.2 Media Bandwidth Management Setup: First Screen ..........................................67
4.3 Media Bandwidth Mgnt. Wizard Setup: Second Screen ....................................68
4.4 Media Bandwidth Mgnt. Wizard Setup: Finish ...................................................69
Chapter 5
Password Setup ..................................................................................................... 70
5.1 Password Overview ...........................................................................................70
5.1.1 Configuring Password ...............................................................................70
Chapter 6
LAN Setup............................................................................................................... 72
6.1 LAN Overview ....................................................................................................72
6.1.1 LANs, WANs and the Prestige ..................................................................72
6.2 DNS Server Address ..........................................................................................73
Prestige 660H/HW Series User’s Guide
8
6.3 DNS Server Address Assignment ......................................................................73
6.4 LAN TCP/IP ........................................................................................................74
6.4.1 Factory LAN Defaults ................................................................................74
6.4.2 IP Address and Subnet Mask ...................................................................74
6.4.3 RIP Setup .................................................................................................74
6.4.4 Multicast ....................................................................................................75
6.5 Any IP .................................................................................................................75
6.5.1 How Any IP Works ....................................................................................76
6.6 Configuring LAN .................................................................................................77
6.7 Configuring Static DHCP ....................................................................................78
Chapter 7
Wireless LAN Setup ............................................................................................... 80
7.1 Introduction ........................................................................................................80
7.1.1 Additional Installation Requirements for Using 802.1x .............................80
7.1.2 Channel ....................................................................................................80
7.1.3 ESS ID ......................................................................................................80
7.1.4 RTS/CTS ..................................................................................................81
7.1.5 Fragmentation Threshold ..........................................................................82
7.2 Levels of Security ...............................................................................................82
7.3 Data Encryption with WEP .................................................................................83
7.4 Configuring Wireless LAN ..................................................................................83
7.5 Configuring MAC Filter .......................................................................................85
7.6 Network Authentication ......................................................................................87
7.6.1 EAP ...........................................................................................................87
7.6.1.1 RADIUS ...........................................................................................87
7.6.1.2 Types of RADIUS Messages ...........................................................88
7.6.2 EAP Authentication Overview ...................................................................88
7.7 Introduction to WPA ...........................................................................................89
7.7.1 User Authentication .................................................................................89
7.7.2 Encryption ................................................................................................89
7.8 WPA-PSK Application Example .........................................................................90
7.9 WPA with RADIUS Application Example ............................................................91
7.10 Security Parameters Summary ........................................................................92
7.11 Wireless Client WPA Supplicants ....................................................................93
7.12 Configuring 802.1x and WPA ...........................................................................93
7.12.1 Authentication Required: 802.1x .............................................................94
7.12.2 Authentication Required: WPA ...............................................................95
7.12.3 Authentication Required: WPA-PSK .......................................................97
7.13 Configuring Local User Authentication .............................................................98
7.14 Configuring RADIUS ........................................................................................99
7.15 OTIST .............................................................................................................100
7.15.1 Activating OTIST ...................................................................................101
Prestige 660H/HW Series User’s Guide
9
Chapter 8
WAN Setup............................................................................................................ 104
8.1 WAN Overview .................................................................................................104
8.2 Metric ..............................................................................................................104
8.3 PPPoE Encapsulation ......................................................................................105
8.4 Traffic Shaping .................................................................................................105
8.5 Zero Configuration Internet Access ..................................................................106
8.6 Configuring WAN Setup ...................................................................................106
8.7 Traffic Redirect ................................................................................................109
8.8 Configuring WAN Backup .................................................................................110
Chapter 9
Network Address Translation (NAT) Screens .................................................... 114
9.1 NAT Overview ..................................................................................................114
9.1.1 NAT Definitions .......................................................................................114
9.1.2 What NAT Does ...................................................................................... 115
9.1.3 How NAT Works .....................................................................................115
9.1.4 NAT Application ......................................................................................116
9.1.5 NAT Mapping Types ............................................................................... 117
9.2 SUA (Single User Account) Versus NAT ..........................................................118
9.3 SUA Server ......................................................................................................118
9.3.1 Default Server IP Address ......................................................................118
9.3.2 Port Forwarding: Services and Port Numbers ........................................118
9.3.3 Configuring Servers Behind SUA (Example) ..........................................119
9.4 Selecting the NAT Mode ..................................................................................119
9.5 Configuring SUA Server ...................................................................................120
9.6 Configuring Address Mapping ..........................................................................122
9.7 Editing an Address Mapping Rule ....................................................................123
Chapter 10
Dynamic DNS Setup............................................................................................. 126
10.1 Dynamic DNS .................................................................................................126
10.1.1 DYNDNS Wildcard ................................................................................126
10.2 Configuring Dynamic DNS .............................................................................126
Chapter 11
Time and Date....................................................................................................... 128
11.1 Configuring Time and Date .............................................................................128
Chapter 12
Firewalls................................................................................................................ 130
12.1 Firewall Overview ...........................................................................................130
12.2 Types of Firewalls ..........................................................................................130
Prestige 660H/HW Series User’s Guide
10
12.2.1 Packet Filtering Firewalls ......................................................................130
12.2.2 Application-level Firewalls ....................................................................130
12.2.3 Stateful Inspection Firewalls ................................................................131
12.3 Introduction to ZyXEL’s Firewall .....................................................................131
12.3.1 Denial of Service Attacks ......................................................................132
12.4 Denial of Service ............................................................................................132
12.4.1 Basics ...................................................................................................132
12.4.2 Types of DoS Attacks ...........................................................................133
12.4.2.1 ICMP Vulnerability ......................................................................135
12.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................135
12.4.2.3 Traceroute ...................................................................................136
12.5 Stateful Inspection ..........................................................................................136
12.5.1 Stateful Inspection Process ..................................................................137
12.5.2 Stateful Inspection and the Prestige .....................................................138
12.5.3 TCP Security .........................................................................................138
12.5.4 UDP/ICMP Security ..............................................................................139
12.5.5 Upper Layer Protocols ..........................................................................139
12.6 Guidelines for Enhancing Security with Your Firewall ....................................139
12.6.1 Security In General ...............................................................................140
12.7 Packet Filtering Vs Firewall ............................................................................141
12.7.1 Packet Filtering: ....................................................................................141
12.7.1.1 When To Use Filtering .................................................................141
12.7.2 Firewall .................................................................................................141
12.7.2.1 When To Use The Firewall ..........................................................141
Chapter 13
Firewall Configuration ......................................................................................... 144
13.1 Access Methods .............................................................................................144
13.2 Firewall Policies Overview .............................................................................144
13.3 Rule Logic Overview ......................................................................................145
13.3.1 Rule Checklist .......................................................................................145
13.3.2 Security Ramifications ..........................................................................145
13.3.3 Key Fields For Configuring Rules .........................................................146
13.3.3.1 Action ..........................................................................................146
13.3.3.2 Service ........................................................................................146
13.3.3.3 Source Address ...........................................................................146
13.3.3.4 Destination Address ....................................................................146
13.4 Connection Direction Example .......................................................................146
13.4.1 LAN to WAN Rules ...............................................................................147
13.4.2 WAN to LAN Rules ...............................................................................147
13.4.3 Alerts .....................................................................................................148
13.5 Configuring Basic Firewall Settings ................................................................148
13.6 Rule Summary ...............................................................................................149
Prestige 660H/HW Series User’s Guide
11
13.6.1 Configuring Firewall Rules ....................................................................151
13.7 Customized Services .....................................................................................154
13.8 Creating/Editing A Customized Service .........................................................154
13.9 Example Firewall Rule ...................................................................................155
13.10 Predefined Services .....................................................................................159
13.11 Anti-Probing ..................................................................................................161
13.12 Configuring Attack Alert ...............................................................................162
13.12.1 Threshold Values ................................................................................163
13.12.2 Half-Open Sessions ............................................................................163
13.12.2.1 TCP Maximum Incomplete and Blocking Time .........................163
Chapter 14
Content Filtering .................................................................................................. 166
14.1 Content Filtering Overview .............................................................................166
14.2 Configuring Keyword Blocking .......................................................................166
14.3 Configuring the Schedule ..............................................................................167
14.4 Configuring Trusted Computers .....................................................................168
Chapter 15
Remote Management Configuration .................................................................. 170
15.1 Remote Management Overview .....................................................................170
15.1.1 Remote Management Limitations .........................................................170
15.1.2 Remote Management and NAT ............................................................171
15.1.3 System Timeout ...................................................................................171
15.2 Telnet ..............................................................................................................171
15.3 FTP ................................................................................................................171
15.4 Web ................................................................................................................172
15.5 Configuring Remote Management .................................................................172
Chapter 16
Universal Plug-and-Play (UPnP) ......................................................................... 174
16.1 Introducing Universal Plug and Play ..............................................................174
16.1.1 How do I know if I'm using UPnP? ........................................................174
16.1.2 NAT Traversal .......................................................................................174
16.1.3 Cautions with UPnP ..............................................................................174
16.2 UPnP and ZyXEL ...........................................................................................175
16.2.1 Configuring UPnP .................................................................................175
16.3 Installing UPnP in Windows Example ............................................................176
16.4 Using UPnP in Windows XP Example ...........................................................180
Chapter 17
Logs Screens........................................................................................................ 188
17.1 Logs Overview ...............................................................................................188
Prestige 660H/HW Series User’s Guide
12
17.1.1 Alerts and Logs .....................................................................................188
17.2 Configuring Log Settings ................................................................................188
17.3 Displaying the Logs ........................................................................................190
17.4 SMTP Error Messages ...................................................................................191
17.4.1 Example E-mail Log ..............................................................................192
Chapter 18
Media Bandwidth Management Advanced Setup.............................................. 194
18.1 Bandwidth Management Advanced Setup Overview .....................................194
18.2 Bandwidth Classes and Filters .......................................................................194
18.3 Proportional Bandwidth Allocation .................................................................195
18.4 Bandwidth Management Usage Examples ....................................................195
18.4.1 Application-based Bandwidth Management Example ..........................195
18.4.2 Subnet-based Bandwidth Management Example .................................195
18.4.3 Application and Subnet-based Bandwidth Management Example .......196
18.5 Scheduler .......................................................................................................197
18.5.1 Priority-based Scheduler ......................................................................197
18.5.2 Fairness-based Scheduler ....................................................................197
18.6 Maximize Bandwidth Usage ...........................................................................197
18.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic ........................197
18.6.2 Maximize Bandwidth Usage Example ..................................................198
18.7 Bandwidth Borrowing .....................................................................................199
18.7.1 Bandwidth Borrowing Example .............................................................199
18.7.2 Maximize Bandwidth Usage With Bandwidth Borrowing ......................200
18.8 Configuring Summary ....................................................................................200
18.9 Configuring Class Setup ................................................................................202
18.9.1 Media Bandwidth Management Class Configuration ............................203
18.9.2 Media Bandwidth Management Statistics .............................................205
18.10 Bandwidth Monitor ......................................................................................206
Chapter 19
Maintenance ......................................................................................................... 208
19.1 Maintenance Overview ...................................................................................208
19.2 System Status Screen ....................................................................................208
19.2.1 System Statistics ...................................................................................210
19.3 DHCP Table Screen .......................................................................................212
19.4 Any IP Table Screen .......................................................................................213
19.5 Wireless Screen .............................................................................................213
19.5.1 Association List .....................................................................................213
19.6 Diagnostic Screens ........................................................................................214
19.6.1 Diagnostic General Screen ...................................................................214
19.6.2 Diagnostic DSL Line Screen .................................................................215
19.7 Firmware Screen ............................................................................................217
Prestige 660H/HW Series User’s Guide
13
Chapter 20
Introducing the SMT ............................................................................................ 220
20.1 SMT Introduction ............................................................................................220
20.1.1 Procedure for SMT Configuration via Telnet .........................................220
20.1.2 Entering Password ................................................................................220
20.1.3 Prestige SMT Menu Overview ..............................................................221
20.2 Navigating the SMT Interface .........................................................................221
20.2.1 System Management Terminal Interface Summary ..............................223
20.3 Changing the System Password ....................................................................223
Chapter 21
Menu 1 General Setup ......................................................................................... 226
21.1 General Setup ................................................................................................226
21.2 Procedure To Configure Menu 1 ....................................................................226
21.2.1 Procedure to Configure Dynamic DNS .................................................227
Chapter 22
Menu 2 WAN Backup Setup ................................................................................ 230
22.1 Introduction to WAN Backup Setup ................................................................230
22.2 Configuring Dial Backup in Menu 2 ................................................................230
22.2.1 Traffic Redirect Setup ...........................................................................231
Chapter 23
Menu 3 LAN Setup ............................................................................................... 234
23.1 LAN Setup ......................................................................................................234
23.1.1 General Ethernet Setup ........................................................................234
23.2 Protocol Dependent Ethernet Setup ..............................................................235
23.3 CP/IP Ethernet Setup and DHCP ...................................................................235
Chapter 24
Wireless LAN Setup ............................................................................................. 238
24.1 Wireless LAN Overview .................................................................................238
24.2 Wireless LAN Setup .......................................................................................238
24.2.1 Wireless LAN MAC Address Filter ........................................................239
Chapter 25
Internet Access .................................................................................................... 242
25.1 Internet Access Overview ..............................................................................242
25.2 IP Policies ......................................................................................................242
25.3 IP Alias ...........................................................................................................242
25.4 IP Alias Setup .................................................................................................243
25.5 Route IP Setup ...............................................................................................244
25.6 Internet Access Configuration ........................................................................245
Prestige 660H/HW Series User’s Guide
14
Chapter 26
Remote Node Configuration ............................................................................... 248
26.1 Remote Node Setup Overview .......................................................................248
26.2 Remote Node Setup .......................................................................................248
26.2.1 Remote Node Profile ............................................................................248
26.2.2 Encapsulation and Multiplexing Scenarios ...........................................249
26.2.2.1 Scenario 1: One VC, Multiple Protocols ......................................249
26.2.2.2 Scenario 2: One VC, One Protocol (IP) ......................................249
26.2.2.3 Scenario 3: Multiple VCs .............................................................249
26.2.3 Outgoing Authentication Protocol .........................................................251
26.3 Remote Node Network Layer Options ...........................................................252
26.3.1 My WAN Addr Sample IP Addresses ...................................................253
26.4 Remote Node Filter ........................................................................................254
26.5 Editing ATM Layer Options ............................................................................255
26.5.1 VC-based Multiplexing (non-PPP Encapsulation) ................................255
26.5.2 LLC-based Multiplexing or PPP Encapsulation ....................................255
26.5.3 Advance Setup Options ........................................................................256
Chapter 27
Static Route Setup ............................................................................................... 258
27.1 IP Static Route Overview ...............................................................................258
27.2 Configuration ..................................................................................................258
Chapter 28
Bridging Setup ..................................................................................................... 262
28.1 Bridging in General ........................................................................................262
28.2 Bridge Ethernet Setup ....................................................................................262
28.2.1 Remote Node Bridging Setup ...............................................................262
28.2.2 Bridge Static Route Setup .....................................................................264
Chapter 29
Network Address Translation (NAT) ................................................................... 266
29.1 Using NAT ......................................................................................................266
29.1.1 SUA (Single User Account) Versus NAT ..............................................266
29.2 Applying NAT .................................................................................................266
29.3 NAT Setup ......................................................................................................268
29.3.1 Address Mapping Sets ..........................................................................268
29.3.1.1 SUA Address Mapping Set .........................................................269
29.3.1.2 User-Defined Address Mapping Sets ..........................................270
29.3.1.3 Ordering Your Rules ....................................................................271
29.4 Configuring a Server behind NAT ..................................................................272
29.5 General NAT Examples ..................................................................................273
29.5.1 Example 1: Internet Access Only ..........................................................274
Prestige 660H/HW Series User’s Guide
15
29.5.2 Example 2: Internet Access with an Inside Server ...............................274
29.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............275
29.5.4 Example 4: NAT Unfriendly Application Programs ...............................279
Chapter 30
Enabling the Firewall ........................................................................................... 282
30.1 Remote Management and the Firewall ..........................................................282
30.2 Access Methods .............................................................................................282
30.3 Enabling the Firewall ......................................................................................282
Chapter 31
Filter Configuration.............................................................................................. 284
31.1 About Filtering ................................................................................................284
31.1.1 The Filter Structure of the Prestige .......................................................285
31.2 Configuring a Filter Set for the Prestige .........................................................286
31.3 Filter Rules Summary Menus .........................................................................287
31.4 Configuring a Filter Rule ................................................................................288
31.4.1 TCP/IP Filter Rule .................................................................................289
31.4.2 Generic Filter Rule ................................................................................291
31.5 Filter Types and NAT .....................................................................................293
31.6 Example Filter ................................................................................................293
31.7 Applying Filters and Factory Defaults ............................................................295
31.7.1 Ethernet Traffic .....................................................................................296
31.7.2 Remote Node Filters .............................................................................296
Chapter 32
SNMP Configuration ............................................................................................ 298
32.1 About SNMP ..................................................................................................298
32.2 Supported MIBs ............................................................................................299
32.3 SNMP Configuration ......................................................................................299
32.4 SNMP Traps ...................................................................................................300
Chapter 33
System Security ................................................................................................... 302
33.1 System Security .............................................................................................302
33.1.1 System Password .................................................................................302
33.1.2 Configuring External RADIUS Server ...................................................302
33.1.3 IEEE802.1x ...........................................................................................304
33.2 Creating User Accounts on the Prestige ........................................................306
Chapter 34
System Information and Diagnosis .................................................................... 308
34.1 Overview ........................................................................................................308
Prestige 660H/HW Series User’s Guide
16
34.2 System Status ................................................................................................308
34.3 System Information ........................................................................................310
34.3.1 System Information ...............................................................................310
34.3.2 Console Port Speed ..............................................................................311
34.4 Log and Trace ................................................................................................312
34.4.1 Viewing Error Log .................................................................................312
34.4.2 Syslog and Accounting .........................................................................313
34.5 Diagnostic ......................................................................................................315
Chapter 35
Firmware and Configuration File Maintenance ................................................. 318
35.1 Filename Conventions ...................................................................................318
35.2 Backup Configuration .....................................................................................319
35.2.1 Backup Configuration ...........................................................................319
35.2.2 Using the FTP Command from the Command Line ..............................320
35.2.3 Example of FTP Commands from the Command Line .........................320
35.2.4 GUI-based FTP Clients .........................................................................321
35.2.5 TFTP and FTP over WAN Management Limitations .............................321
35.2.6 Backup Configuration Using TFTP .......................................................322
35.2.7 TFTP Command Example ....................................................................322
35.2.8 GUI-based TFTP Clients ......................................................................322
35.3 Restore Configuration ....................................................................................323
35.3.1 Restore Using FTP ...............................................................................323
35.3.2 Restore Using FTP Session Example ..................................................324
35.4 Uploading Firmware and Configuration Files .................................................325
35.4.1 Firmware File Upload ............................................................................325
35.4.2 Configuration File Upload .....................................................................325
35.4.3 FTP File Upload Command from the DOS Prompt Example ................326
35.4.4 FTP Session Example of Firmware File Upload ...................................327
35.4.5 TFTP File Upload ..................................................................................327
35.4.6 TFTP Upload Command Example ........................................................328
Chapter 36
System Maintenance............................................................................................ 330
36.1 Command Interpreter Mode ...........................................................................330
36.2 Call Control Support .......................................................................................331
36.2.1 Budget Management ............................................................................331
36.3 Time and Date Setting ....................................................................................332
36.3.1 Resetting the Time ................................................................................333
Chapter 37
Remote Management ........................................................................................... 336
37.1 Remote Management Overview .....................................................................336
Prestige 660H/HW Series User’s Guide
17
37.2 Remote Management .....................................................................................336
37.2.1 Remote Management Setup .................................................................336
37.2.2 Remote Management Limitations .........................................................337
37.3 Remote Management and NAT ......................................................................338
37.4 System Timeout .............................................................................................338
Chapter 38
IP Policy Routing.................................................................................................. 340
38.1 IP Policy Routing Overview ............................................................................340
38.2 Benefits of IP Policy Routing ..........................................................................340
38.3 Routing Policy ................................................................................................340
38.4 IP Routing Policy Setup .................................................................................341
38.5 Applying an IP Policy .....................................................................................344
38.5.1 Ethernet IP Policies ..............................................................................344
38.6 IP Policy Routing Example .............................................................................345
Chapter 39
Call Scheduling .................................................................................................... 350
39.1 Introduction ....................................................................................................350
Chapter 40
Internal SPTGEN .................................................................................................. 354
40.1 Internal SPTGEN Overview ...........................................................................354
40.2 The Configuration Text File Format ................................................................354
40.2.1 Internal SPTGEN File Modification - Important Points to Remember ...355
40.3 Internal SPTGEN FTP Download Example ....................................................355
40.4 Internal SPTGEN FTP Upload Example ........................................................356
Chapter 41
Troubleshooting ................................................................................................... 358
41.1 Problems Starting Up the Prestige .................................................................358
41.2 Problems with the LAN LED ...........................................................................358
41.3 Problems with the DSL LED ...........................................................................359
41.4 Problems with the LAN Interface ....................................................................359
41.5 Problems with the WAN Interface ..................................................................359
41.6 Problems with Internet Access .......................................................................360
41.7 Problems with the Password ..........................................................................360
41.8 Problems with the Web Configurator .............................................................361
41.9 Problems with Remote Management .............................................................361
Appendix A
Splitters and Microfilters ..................................................................................... 362
Connecting a POTS Splitter ................................................................................... 362
Prestige 660H/HW Series User’s Guide
18
Telephone Microfilters ............................................................................................ 363
Prestige With ISDN ................................................................................................ 363
Appendix B
Setting up Your Computer’s IP Address............................................................ 366
Windows 95/98/Me................................................................................................. 366
Installing Components ..................................................................................... 367
Configuring ...................................................................................................... 368
Verifying Settings ............................................................................................. 369
Windows 2000/NT/XP ............................................................................................ 369
Verifying Settings ............................................................................................. 373
Macintosh OS 8/9................................................................................................... 373
Verifying Settings ............................................................................................. 375
Macintosh OS X ..................................................................................................... 375
Verifying Settings ............................................................................................. 376
Appendix C
IP Subnetting ........................................................................................................ 378
IP Addressing......................................................................................................... 378
IP Classes .............................................................................................................. 378
Subnet Masks ........................................................................................................ 379
Subnetting .............................................................................................................. 379
Example: Two Subnets .......................................................................................... 380
Example: Four Subnets.......................................................................................... 382
Example Eight Subnets.......................................................................................... 383
Subnetting With Class A and Class B Networks. ................................................... 384
Appendix D
PPPoE ................................................................................................................... 386
PPPoE in Action..................................................................................................... 386
Benefits of PPPoE.................................................................................................. 386
Traditional Dial-up Scenario ................................................................................... 386
How PPPoE Works ................................................................................................ 387
Prestige as a PPPoE Client ................................................................................... 387
Appendix E
Virtual Circuit Topology ...................................................................................... 388
Appendix F
Wireless LAN and IEEE 802.11 ........................................................................... 390
Benefits of a Wireless LAN .................................................................................... 390
IEEE 802.11 ........................................................................................................... 390
Prestige 660H/HW Series User’s Guide
19
Ad-hoc Wireless LAN Configuration....................................................................... 391
Infrastructure Wireless LAN Configuration............................................................. 391
Appendix G
Wireless LAN With IEEE 802.1x .......................................................................... 394
Security Flaws with IEEE 802.11 ........................................................................... 394
Deployment Issues with IEEE 802.11 .................................................................... 394
IEEE 802.1x ........................................................................................................... 394
Advantages of the IEEE 802.1x ............................................................................. 394
RADIUS Server Authentication Sequence....................................................... 395
Appendix H
Types of EAP Authentication.............................................................................. 396
EAP-MD5 (Message-Digest Algorithm 5)............................................................... 396
EAP-TLS (Transport Layer Security)...................................................................... 396
EAP-TTLS (Tunneled Transport Layer Service) .................................................... 396
PEAP (Protected EAP)........................................................................................... 397
LEAP ...................................................................................................................... 397
Appendix I
Antenna Selection and Positioning Recommendation..................................... 398
Antenna Characteristics ......................................................................................... 398
Frequency........................................................................................................ 398
Radiation Pattern ............................................................................................. 398
Antenna Gain................................................................................................... 398
Types of Antennas For WLAN................................................................................ 399
Positioning Antennas ....................................................................................... 399
Connector Type...................................................................................................... 399
Appendix J
Example Internal SPTGEN Screens.................................................................... 400
Command Examples.............................................................................................. 420
Appendix K
Command Interpreter........................................................................................... 422
Command Syntax................................................................................................... 422
Command Usage ................................................................................................... 422
Appendix L
Firewall Commands ............................................................................................. 424
41.10 Sys Firewall Commands ..............................................................................424
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450

ZyXEL P-660HW-61 User guide

Category
Networking
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI